-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
aws_lambda_invocation : apply vs destroy #21905
Comments
Hey @abruyelles 👋 Thank you for taking the time to raise this! So that we have all of the necessary information to prioritize and investigate this, can you update the issue description with the rest of the information requested in the feature request template? |
@justinretzolk Sure, my bad
If
If
That new variable would be a string and not a boolean, because a hard-coded field name may overlaps with the user document Thank you for reviewing |
I've opened #29367 which would trigger the Lambda function on every resource state transition. It will manipulate the JSON payload to provide details to the Lambda function. It will add a key tf which holds the action [create, update, delete] and the prev_input (null for a create otherwise the event from the previous invocation. This way there is no need to provision multiple lambda functions as a single function can handle each event accordingly. |
This functionality has been released in v5.1.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Hi,
We are using the aws_lambda_invocation datasource from the aws provider as a way to protect some access while letting untrusted users perform the task
To illustrate, we want to create AWS ACM certificate, they require a DNS TXT
Our users are free to create the ACM certificates as well
However, we cannot let them manage the DNS zones
We are using an aws_lambda_invocation as a helper:
So far, so good
However, we have an issue on destroy : the TXT records are not deleted, because we cannot make the difference between an apply and a destroy : datasource parameters are the same
It would be awesome if an extra, optional parameter could be put to make the difference between an apply and a destroy
The text was updated successfully, but these errors were encountered: