Skip to content

Commit 4602fe0

Browse files
authored
Merge pull request #18 from SPHTech-Platform/add/tracing-policy
add support for tracing policy
2 parents c0baf05 + e9da285 commit 4602fe0

File tree

3 files changed

+9
-1
lines changed

3 files changed

+9
-1
lines changed

README.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,8 +45,9 @@
4545
| <a name="input_attach_policy_json"></a> [attach\_policy\_json](#input\_attach\_policy\_json) | Controls whether policy\_json should be added to IAM role for Lambda Function | `bool` | `false` | no |
4646
| <a name="input_attach_policy_jsons"></a> [attach\_policy\_jsons](#input\_attach\_policy\_jsons) | Controls whether policy\_jsons should be added to IAM role for Lambda Function | `bool` | `false` | no |
4747
| <a name="input_attach_policy_statements"></a> [attach\_policy\_statements](#input\_attach\_policy\_statements) | Controls whether policy\_jsons should be added to IAM role for Lambda Function | `bool` | `false` | no |
48+
| <a name="input_attach_tracing_policy"></a> [attach\_tracing\_policy](#input\_attach\_tracing\_policy) | whether to attach tracing policy to lambda role | `bool` | `false` | no |
4849
| <a name="input_authorization_type"></a> [authorization\_type](#input\_authorization\_type) | The type of authentication that the Lambda Function URL uses. Set to 'AWS\_IAM' to restrict access to authenticated IAM users only. Set to 'NONE' to bypass IAM authentication and create a public endpoint. | `string` | `"NONE"` | no |
49-
| <a name="input_cf_distribution_id"></a> [cf\_distribution\_id](#input\_cf\_distribution\_id) | distribution id to allow oidc role to update edge functions that are attached | `string` | `""` | no |
50+
| <a name="input_cf_distribution_id"></a> [cf\_distribution\_id](#input\_cf\_distribution\_id) | distribution id to allow oidc role to update edge functions that are attached | `string` | `null` | no |
5051
| <a name="input_cloudwatch_logs_retention_in_days"></a> [cloudwatch\_logs\_retention\_in\_days](#input\_cloudwatch\_logs\_retention\_in\_days) | Number of days the cloudwatch logs will be retained. Possible values are: 1, 3, 5, 7, 14, 30, 60, 90, 120, 150, 180, 365, 400, 545, 731, 1827, and 3653. | `number` | `7` | no |
5152
| <a name="input_code_signing_config_arn"></a> [code\_signing\_config\_arn](#input\_code\_signing\_config\_arn) | Amazon Resource Name (ARN) for a Code Signing Configuration | `string` | `null` | no |
5253
| <a name="input_cors"></a> [cors](#input\_cors) | CORS settings to be used by the Lambda Function URL | `any` | `{}` | no |

main.tf

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,7 @@ module "lambda" {
3333
timeout = var.timeout
3434
dead_letter_target_arn = var.dead_letter_target_arn
3535
tracing_mode = var.tracing_mode
36+
attach_tracing_policy = var.attach_tracing_policy
3637
vpc_subnet_ids = var.vpc_subnet_ids
3738
vpc_security_group_ids = var.vpc_security_group_ids
3839
package_type = var.package_type

variables.tf

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -159,6 +159,12 @@ variable "tracing_mode" {
159159
default = null
160160
}
161161

162+
variable "attach_tracing_policy" {
163+
description = "whether to attach tracing policy to lambda role"
164+
type = bool
165+
default = false
166+
}
167+
162168
variable "environment_variables" {
163169
description = "A map that defines environment variables for the Lambda Function."
164170
type = map(string)

0 commit comments

Comments
 (0)