Skip to content

Commit

Permalink
Support AWS Provider V5 (#126)
Browse files Browse the repository at this point in the history
* Support AWS Provider V5

* Support AWS Provider V5

* remove deprecated API hashicorp/terraform-provider-aws#17465
  • Loading branch information
max-lobur authored Nov 10, 2023
1 parent dac7df9 commit 0586277
Show file tree
Hide file tree
Showing 12 changed files with 82 additions and 105 deletions.
7 changes: 4 additions & 3 deletions .github/renovate.json
Original file line number Diff line number Diff line change
@@ -1,13 +1,14 @@
{
"extends": [
"config:base",
":preserveSemverRanges"
":preserveSemverRanges",
":rebaseStalePrs"
],
"baseBranches": ["main", "master", "/^release\\/v\\d{1,2}$/"],
"baseBranches": ["main"],
"labels": ["auto-update"],
"dependencyDashboardAutoclose": true,
"enabledManagers": ["terraform"],
"terraform": {
"ignorePaths": ["**/context.tf", "examples/**"]
"ignorePaths": ["**/context.tf"]
}
}
1 change: 1 addition & 0 deletions .github/workflows/release-branch.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ on:
- 'docs/**'
- 'examples/**'
- 'test/**'
- 'README.*'

permissions:
contents: write
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/release-published.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,4 +11,4 @@ permissions:

jobs:
terraform-module:
uses: cloudposse/github-actions-workflows-terraform-module/.github/workflows/release.yml@main
uses: cloudposse/github-actions-workflows-terraform-module/.github/workflows/release-published.yml@main
71 changes: 16 additions & 55 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -33,12 +33,6 @@ Terraform module to create AWS CodeBuild project for AWS CodePipeline.
---

This project is part of our comprehensive ["SweetOps"](https://cpco.io/sweetops) approach towards DevOps.
[<img align="right" title="Share via Email" src="https://docs.cloudposse.com/images/ionicons/ios-email-outline-2.0.1-16x16-999999.svg"/>][share_email]
[<img align="right" title="Share on Google+" src="https://docs.cloudposse.com/images/ionicons/social-googleplus-outline-2.0.1-16x16-999999.svg" />][share_googleplus]
[<img align="right" title="Share on Facebook" src="https://docs.cloudposse.com/images/ionicons/social-facebook-outline-2.0.1-16x16-999999.svg" />][share_facebook]
[<img align="right" title="Share on Reddit" src="https://docs.cloudposse.com/images/ionicons/social-reddit-outline-2.0.1-16x16-999999.svg" />][share_reddit]
[<img align="right" title="Share on LinkedIn" src="https://docs.cloudposse.com/images/ionicons/social-linkedin-outline-2.0.1-16x16-999999.svg" />][share_linkedin]
[<img align="right" title="Share on Twitter" src="https://docs.cloudposse.com/images/ionicons/social-twitter-outline-2.0.1-16x16-999999.svg" />][share_twitter]


[![Terraform Open Source Modules](https://docs.cloudposse.com/images/terraform-open-source-modules.svg)][terraform_modules]
Expand Down Expand Up @@ -88,10 +82,6 @@ We highly recommend that in your code you pin the version to the exact version y
using so that your infrastructure remains stable, and update versions in a
systematic way so that they do not catch you by surprise.

Also, because of a bug in the Terraform registry ([hashicorp/terraform#21417](https://github.com/hashicorp/terraform/issues/21417)),
the registry shows many of our inputs as required when in fact they are optional.
The table below correctly indicates which inputs are required.


Include this module in your existing terraform code:

Expand Down Expand Up @@ -163,15 +153,15 @@ Available targets:

| Name | Version |
|------|---------|
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 0.13.0 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 2.0 |
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.3 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 5.0 |
| <a name="requirement_random"></a> [random](#requirement\_random) | >= 2.1 |

## Providers

| Name | Version |
|------|---------|
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 2.0 |
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 5.0 |
| <a name="provider_random"></a> [random](#provider\_random) | >= 2.1 |

## Modules
Expand Down Expand Up @@ -295,8 +285,6 @@ Available targets:

Like this project? Please give it a ★ on [our GitHub](https://github.com/cloudposse/terraform-aws-codebuild)! (it helps us **a lot**)

Are you using this project or any of our other projects? Consider [leaving a testimonial][testimonial]. =)



## Related Projects
Expand Down Expand Up @@ -339,10 +327,6 @@ We deliver 10x the value for a fraction of the cost of a full-time engineer. Our

Join our [Open Source Community][slack] on Slack. It's **FREE** for everyone! Our "SweetOps" community is where you get to talk with others who share a similar vision for how to rollout and manage infrastructure. This is the best place to talk shop, ask questions, solicit feedback, and work together as a community to build totally *sweet* infrastructure.

## Discourse Forums

Participate in our [Discourse Forums][discourse]. Here you'll find answers to commonly asked questions. Most questions will be related to the enormous number of projects we support on our GitHub. Come here to collaborate on answers, find solutions, and get ideas about the products and services we value. It only takes a minute to get started! Just sign in with SSO using your GitHub account.

## Newsletter

Sign up for [our newsletter][newsletter] that covers everything on our technology radar. Receive updates on what we're up to on GitHub as well as awesome new projects we discover.
Expand All @@ -353,7 +337,18 @@ Sign up for [our newsletter][newsletter] that covers everything on our technolog

[![zoom](https://img.cloudposse.com/fit-in/200x200/https://cloudposse.com/wp-content/uploads/2019/08/Powered-by-Zoom.png")][office_hours]

## Contributing
## ✨ Contributing



This project is under active development, and we encourage contributions from our community.
Many thanks to our outstanding contributors:

<a href="https://github.com/cloudposse/terraform-aws-codebuild/graphs/contributors">
<img src="https://contrib.rocks/image?repo=cloudposse/terraform-aws-codebuild&max=24" />
</a>



### Bug Reports & Feature Requests

Expand Down Expand Up @@ -427,33 +422,7 @@ We're a [DevOps Professional Services][hire] company based in Los Angeles, CA. W

We offer [paid support][commercial_support] on all of our projects.

Check out [our other projects][github], [follow us on twitter][twitter], [apply for a job][jobs], or [hire us][hire] to help with your cloud strategy and implementation.



### Contributors

<!-- markdownlint-disable -->
| [![Erik Osterman][osterman_avatar]][osterman_homepage]<br/>[Erik Osterman][osterman_homepage] | [![Igor Rodionov][goruha_avatar]][goruha_homepage]<br/>[Igor Rodionov][goruha_homepage] | [![Andriy Knysh][aknysh_avatar]][aknysh_homepage]<br/>[Andriy Knysh][aknysh_homepage] | [![Jamie Nelson][Jamie-BitFlight_avatar]][Jamie-BitFlight_homepage]<br/>[Jamie Nelson][Jamie-BitFlight_homepage] | [![Sarkis Varozian][sarkis_avatar]][sarkis_homepage]<br/>[Sarkis Varozian][sarkis_homepage] | [![Bircan Bilici][brcnblc_avatar]][brcnblc_homepage]<br/>[Bircan Bilici][brcnblc_homepage] | [![RB][nitrocode_avatar]][nitrocode_homepage]<br/>[RB][nitrocode_homepage] |
|---|---|---|---|---|---|---|
<!-- markdownlint-restore -->

[osterman_homepage]: https://github.com/osterman
[osterman_avatar]: https://img.cloudposse.com/150x150/https://github.com/osterman.png
[goruha_homepage]: https://github.com/goruha
[goruha_avatar]: https://img.cloudposse.com/150x150/https://github.com/goruha.png
[aknysh_homepage]: https://github.com/aknysh
[aknysh_avatar]: https://img.cloudposse.com/150x150/https://github.com/aknysh.png
[Jamie-BitFlight_homepage]: https://github.com/Jamie-BitFlight
[Jamie-BitFlight_avatar]: https://img.cloudposse.com/150x150/https://github.com/Jamie-BitFlight.png
[sarkis_homepage]: https://github.com/sarkis
[sarkis_avatar]: https://img.cloudposse.com/150x150/https://github.com/sarkis.png
[brcnblc_homepage]: https://github.com/brcnblc
[brcnblc_avatar]: https://img.cloudposse.com/150x150/https://github.com/brcnblc.png
[nitrocode_homepage]: https://github.com/nitrocode
[nitrocode_avatar]: https://img.cloudposse.com/150x150/https://github.com/nitrocode.png

[![README Footer][readme_footer_img]][readme_footer_link]
Check out [our other projects][github], [follow us on twitter][twitter], [apply for a job][jobs], or [hire us][hire] to help with your cloud strategy and implementation.[![README Footer][readme_footer_img]][readme_footer_link]
[![Beacon][beacon]][website]
<!-- markdownlint-disable -->
[logo]: https://cloudposse.com/logo-300x69.svg
Expand All @@ -463,12 +432,10 @@ Check out [our other projects][github], [follow us on twitter][twitter], [apply
[jobs]: https://cpco.io/jobs?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-codebuild&utm_content=jobs
[hire]: https://cpco.io/hire?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-codebuild&utm_content=hire
[slack]: https://cpco.io/slack?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-codebuild&utm_content=slack
[linkedin]: https://cpco.io/linkedin?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-codebuild&utm_content=linkedin
[twitter]: https://cpco.io/twitter?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-codebuild&utm_content=twitter
[testimonial]: https://cpco.io/leave-testimonial?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-codebuild&utm_content=testimonial
[office_hours]: https://cloudposse.com/office-hours?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-codebuild&utm_content=office_hours
[newsletter]: https://cpco.io/newsletter?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-codebuild&utm_content=newsletter
[discourse]: https://ask.sweetops.com/?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-codebuild&utm_content=discourse
[email]: https://cpco.io/email?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-codebuild&utm_content=email
[commercial_support]: https://cpco.io/commercial-support?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-codebuild&utm_content=commercial_support
[we_love_open_source]: https://cpco.io/we-love-open-source?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-codebuild&utm_content=we_love_open_source
Expand All @@ -479,11 +446,5 @@ Check out [our other projects][github], [follow us on twitter][twitter], [apply
[readme_footer_link]: https://cloudposse.com/readme/footer/link?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-codebuild&utm_content=readme_footer_link
[readme_commercial_support_img]: https://cloudposse.com/readme/commercial-support/img
[readme_commercial_support_link]: https://cloudposse.com/readme/commercial-support/link?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-codebuild&utm_content=readme_commercial_support_link
[share_twitter]: https://twitter.com/intent/tweet/?text=terraform-aws-codebuild&url=https://github.com/cloudposse/terraform-aws-codebuild
[share_linkedin]: https://www.linkedin.com/shareArticle?mini=true&title=terraform-aws-codebuild&url=https://github.com/cloudposse/terraform-aws-codebuild
[share_reddit]: https://reddit.com/submit/?url=https://github.com/cloudposse/terraform-aws-codebuild
[share_facebook]: https://facebook.com/sharer/sharer.php?u=https://github.com/cloudposse/terraform-aws-codebuild
[share_googleplus]: https://plus.google.com/share?url=https://github.com/cloudposse/terraform-aws-codebuild
[share_email]: mailto:?subject=terraform-aws-codebuild&body=https://github.com/cloudposse/terraform-aws-codebuild
[beacon]: https://ga-beacon.cloudposse.com/UA-76589703-4/cloudposse/terraform-aws-codebuild?pixel&cs=github&cm=readme&an=terraform-aws-codebuild
<!-- markdownlint-restore -->
6 changes: 3 additions & 3 deletions docs/terraform.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,15 +3,15 @@

| Name | Version |
|------|---------|
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 0.13.0 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 2.0 |
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.3 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 5.0 |
| <a name="requirement_random"></a> [random](#requirement\_random) | >= 2.1 |

## Providers

| Name | Version |
|------|---------|
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 2.0 |
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 5.0 |
| <a name="provider_random"></a> [random](#provider\_random) | >= 2.1 |

## Modules
Expand Down
10 changes: 10 additions & 0 deletions examples/bitbucket/versions.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
terraform {
required_version = ">= 1.3"

required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.0"
}
}
}
4 changes: 2 additions & 2 deletions examples/complete/versions.tf
Original file line number Diff line number Diff line change
@@ -1,10 +1,10 @@
terraform {
required_version = ">= 0.13.0"
required_version = ">= 1.3"

required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 2.0"
version = ">= 5.0"
}
random = {
source = "hashicorp/random"
Expand Down
18 changes: 10 additions & 8 deletions examples/vpc/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -3,21 +3,23 @@ provider "aws" {
}

module "vpc" {
source = "cloudposse/vpc/aws"
version = "0.21.1"
cidr_block = var.vpc_cidr_block
source = "cloudposse/vpc/aws"
version = "2.1.1"

ipv4_primary_cidr_block = var.vpc_cidr_block

context = module.this.context
}

module "subnets" {
source = "cloudposse/dynamic-subnets/aws"
version = "0.38.0"
source = "cloudposse/dynamic-subnets/aws"
version = "2.4.1"

availability_zones = var.availability_zones
vpc_id = module.vpc.vpc_id
igw_id = module.vpc.igw_id
cidr_block = module.vpc.vpc_cidr_block
nat_gateway_enabled = true
igw_id = [module.vpc.igw_id]
ipv4_cidr_block = [module.vpc.vpc_cidr_block]
nat_gateway_enabled = false
nat_instance_enabled = false

context = module.this.context
Expand Down
10 changes: 10 additions & 0 deletions examples/vpc/versions.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
terraform {
required_version = ">= 1.3"

required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.0"
}
}
}
38 changes: 15 additions & 23 deletions main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -59,7 +59,7 @@ resource "random_string" "bucket_prefix" {
}

locals {
cache_bucket_name = "${module.this.id}${var.cache_bucket_suffix_enabled ? "-${join("", random_string.bucket_prefix.*.result)}" : ""}"
cache_bucket_name = "${module.this.id}${var.cache_bucket_suffix_enabled ? "-${join("", random_string.bucket_prefix[*].result)}" : ""}"

## Clean up the bucket name to use only hyphens, and trim its length to 63 characters.
## As per https://docs.aws.amazon.com/AmazonS3/latest/dev/BucketRestrictions.html
Expand All @@ -71,7 +71,7 @@ locals {

s3_cache_enabled = var.cache_type == "S3"
create_s3_cache_bucket = local.s3_cache_enabled && var.s3_cache_bucket_name == null
s3_bucket_name = local.create_s3_cache_bucket ? join("", aws_s3_bucket.cache_bucket.*.bucket) : var.s3_cache_bucket_name
s3_bucket_name = local.create_s3_cache_bucket ? join("", aws_s3_bucket.cache_bucket[*].bucket) : var.s3_cache_bucket_name

## This is the magic where a map of a list of maps is generated
## and used to conditionally add the cache bucket option to the
Expand Down Expand Up @@ -134,7 +134,7 @@ resource "aws_iam_policy" "default_cache_bucket" {

name = "${module.this.id}-cache-bucket"
path = var.iam_policy_path
policy = join("", data.aws_iam_policy_document.permissions_cache_bucket.*.json)
policy = join("", data.aws_iam_policy_document.permissions_cache_bucket[*].json)
tags = module.this.tags
}

Expand Down Expand Up @@ -187,8 +187,8 @@ data "aws_iam_policy_document" "permissions" {
effect = "Allow"

resources = [
join("", data.aws_s3_bucket.secondary_artifact.*.arn),
"${join("", data.aws_s3_bucket.secondary_artifact.*.arn)}/*",
join("", data.aws_s3_bucket.secondary_artifact[*].arn),
"${join("", data.aws_s3_bucket.secondary_artifact[*].arn)}/*",
]
}
}
Expand Down Expand Up @@ -248,8 +248,8 @@ data "aws_iam_policy_document" "vpc_permissions" {

data "aws_iam_policy_document" "combined_permissions" {
override_policy_documents = compact([
join("", data.aws_iam_policy_document.permissions.*.json),
var.vpc_config != {} ? join("", data.aws_iam_policy_document.vpc_permissions.*.json) : null
join("", data.aws_iam_policy_document.permissions[*].json),
var.vpc_config != {} ? join("", data.aws_iam_policy_document.vpc_permissions[*].json) : null
])
}

Expand All @@ -265,22 +265,22 @@ data "aws_iam_policy_document" "permissions_cache_bucket" {
effect = "Allow"

resources = [
join("", aws_s3_bucket.cache_bucket.*.arn),
"${join("", aws_s3_bucket.cache_bucket.*.arn)}/*",
join("", aws_s3_bucket.cache_bucket[*].arn),
"${join("", aws_s3_bucket.cache_bucket[*].arn)}/*",
]
}
}

resource "aws_iam_role_policy_attachment" "default" {
count = module.this.enabled ? 1 : 0
policy_arn = join("", aws_iam_policy.default.*.arn)
role = join("", aws_iam_role.default.*.id)
policy_arn = join("", aws_iam_policy.default[*].arn)
role = join("", aws_iam_role.default[*].id)
}

resource "aws_iam_role_policy_attachment" "default_cache_bucket" {
count = module.this.enabled && local.s3_cache_enabled ? 1 : 0
policy_arn = join("", aws_iam_policy.default_cache_bucket.*.arn)
role = join("", aws_iam_role.default.*.id)
policy_arn = join("", aws_iam_policy.default_cache_bucket[*].arn)
role = join("", aws_iam_role.default[*].id)
}

resource "aws_codebuild_source_credential" "authorization" {
Expand All @@ -296,7 +296,7 @@ resource "aws_codebuild_project" "default" {
name = module.this.id
description = var.description
concurrent_build_limit = var.concurrent_build_limit
service_role = join("", aws_iam_role.default.*.arn)
service_role = join("", aws_iam_role.default[*].arn)
badge_enabled = var.badge_enabled
build_timeout = var.build_timeout
source_version = var.source_version != "" ? var.source_version : null
Expand Down Expand Up @@ -325,7 +325,7 @@ resource "aws_codebuild_project" "default" {
type = "S3"
location = var.secondary_artifact_location
artifact_identifier = var.secondary_artifact_identifier
encryption_disabled = ! var.secondary_artifact_encryption_enabled
encryption_disabled = !var.secondary_artifact_encryption_enabled
# According to AWS documention, in order to have the artifacts written
# to the root of the bucket, the 'namespace_type' should be 'NONE'
# (which is the default), 'name' should be '/', and 'path' should be
Expand Down Expand Up @@ -411,14 +411,6 @@ resource "aws_codebuild_project" "default" {
report_build_status = var.report_build_status
git_clone_depth = var.git_clone_depth != null ? var.git_clone_depth : null

dynamic "auth" {
for_each = var.private_repository ? [""] : []
content {
type = "OAUTH"
resource = join("", aws_codebuild_source_credential.authorization.*.id)
}
}

dynamic "git_submodules_config" {
for_each = var.fetch_git_submodules ? [""] : []
content {
Expand Down
Loading

0 comments on commit 0586277

Please sign in to comment.