diff --git a/README.md b/README.md index 8f147b7..8d80353 100644 --- a/README.md +++ b/README.md @@ -5,7 +5,7 @@ ### Using the Repo Source ```hcl -github.com/pbs/terraform-aws-ecs-service-module?ref=6.1.0 +github.com/pbs/terraform-aws-ecs-service-module?ref=x.y.z ``` ### Alternative Installation Methods @@ -26,7 +26,7 @@ Integrate this module like so: ```hcl module "service" { - source = "github.com/pbs/terraform-aws-ecs-service-module?ref=6.1.0" + source = "github.com/pbs/terraform-aws-ecs-service-module?ref=x.y.z" # Required hosted_zone = "example.com" @@ -49,7 +49,7 @@ This module will create an ECS cluster if one is not provided. If you would like ```hcl module "service" { - source = "github.com/pbs/terraform-aws-ecs-service-module?ref=6.1.0" + source = "github.com/pbs/terraform-aws-ecs-service-module?ref=x.y.z" # Required hosted_zone = "example.com" @@ -73,7 +73,7 @@ module "service" { If this repo is added as a subtree, then the version of the module should be close to the version shown here: -`6.1.0` +`x.y.z` Note, however that subtrees can be altered as desired within repositories. @@ -103,7 +103,7 @@ Below is automatically generated documentation on this Terraform module using [t | Name | Source | Version | |------|--------|---------| | [cluster](#module\_cluster) | github.com/pbs/terraform-aws-ecs-cluster-module | 1.0.2 | -| [task](#module\_task) | github.com/pbs/terraform-aws-ecs-task-definition-module | 2.0.2 | +| [task](#module\_task) | github.com/pbs/terraform-aws-ecs-task-definition-module | 2.0.3 | ## Resources @@ -162,7 +162,6 @@ Below is automatically generated documentation on this Terraform module using [t | [organization](#input\_organization) | Organization using this module. Used to prefix tags so that they are easily identified as being from your organization | `string` | n/a | yes | | [product](#input\_product) | Tag used to group resources according to product | `string` | n/a | yes | | [repo](#input\_repo) | Tag used to point to the repo using this module | `string` | n/a | yes | -| [PYTHONPATH](#input\_PYTHONPATH) | (optional) PYTHONPATH of the application; required by the cwagent sidecar container | `string` | `":"` | no | | [acm\_arn](#input\_acm\_arn) | ARN of the ACM certificate to use for the service. If null, one will be guessed based on the primary hosted zone of the service. | `string` | `null` | no | | [alb\_ssl\_policy](#input\_alb\_ssl\_policy) | SSL policy to use for an Application Load Balancer application. | `string` | `"ELBSecurityPolicy-2016-08"` | no | | [aliases](#input\_aliases) | CNAME(s) that are allowed to be used for this service. Default is `product`.`hosted_zone`. e.g. [product.example.com] --> [product.example.com] | `list(string)` | `null` | no | @@ -241,6 +240,7 @@ Below is automatically generated documentation on this Terraform module using [t | [propagate\_tags](#input\_propagate\_tags) | Specifies whether to propagate the tags from the task definition or the service to the tasks | `string` | `"SERVICE"` | no | | [public\_service](#input\_public\_service) | Service should be provisioned in public subnet. Ignored if subnets defined. | `bool` | `false` | no | | [public\_subnets](#input\_public\_subnets) | Public subnets for the service. If null, public subnets will be looked up based on environment tag and will be selected based on public\_service. | `list(string)` | `null` | no | +| [pythonpath](#input\_pythonpath) | (optional) PYTHONPATH of the application; required by the cwagent sidecar container | `string` | `":"` | no | | [requires\_compatibilities](#input\_requires\_compatibilities) | (optional) capabilities that the task requires | `set(string)` |
[
"FARGATE"
]
| no | | [restricted\_cidr\_blocks](#input\_restricted\_cidr\_blocks) | CIDR blocks to receive restricted service access. If empty, no CIDRs will be allowed to connect. | `list(string)` |
[
"0.0.0.0/0"
]
| no | | [restricted\_sg](#input\_restricted\_sg) | SG to receive restricted service access. If null, no sg will be configured to connect | `string` | `null` | no | diff --git a/locals.tf b/locals.tf index 3cf11d7..1e7c6c8 100644 --- a/locals.tf +++ b/locals.tf @@ -64,7 +64,7 @@ locals { }, { "name" : "PYTHONPATH", - "value" : var.PYTHONPATH + "value" : var.pythonpath }, { "name" : "OTEL_EXPORTER_OTLP_PROTOCOL", @@ -109,7 +109,7 @@ locals { ] # setunion() cannot use empty sets - env_vars = var.enable_application_signals == false ? var.env_vars : var.env_vars == null || var.env_vars == [] ? local.application_signals_envs : setunion( + env_vars = var.enable_application_signals == false ? var.env_vars : var.env_vars == null || length(var.env_vars) == 0 ? local.application_signals_envs : setunion( local.application_signals_envs, var.env_vars ) diff --git a/optional-task.tf b/optional-task.tf index a8ef6fe..df35e4b 100644 --- a/optional-task.tf +++ b/optional-task.tf @@ -165,7 +165,7 @@ variable "enable_application_signals" { type = bool } -variable "PYTHONPATH" { +variable "pythonpath" { description = "(optional) PYTHONPATH of the application; required by the cwagent sidecar container" type = string diff --git a/outputs.tf b/outputs.tf index fabf5a3..0cc1093 100644 --- a/outputs.tf +++ b/outputs.tf @@ -85,5 +85,5 @@ output "lb_zone_id" { output "iam_task_role_arn" { description = "IAM role ARN associated with a task defition, if task defition is created by the ecs service module" - value = var.task_def_arn == null ? module.task[0].role_arn : "N/A" + value = var.task_def_arn == null ? module.task[0].role_arn : "N/A" } \ No newline at end of file diff --git a/task.tf b/task.tf index 3fe0050..b2244f8 100644 --- a/task.tf +++ b/task.tf @@ -1,6 +1,6 @@ module "task" { count = var.task_def_arn == null ? 1 : 0 - source = "github.com/pbs/terraform-aws-ecs-task-definition-module?ref=2.0.2" + source = "github.com/pbs/terraform-aws-ecs-task-definition-module?ref=2.0.3" name = local.name