Lambda deployments
New Features
Controlled, blue/green deployments of Lambda functions with (automatic) rolebacks and traffic shifting can be implemented using Lambda aliases and AWS CodeDeploy.
This release provides a new optional module to create AWS resources and permissions for creating and starting such CodeDeploy deployments as part of AWS CodePipelines.
Highlights:
- fully automated AWS CodePipelines triggered by ECR pushes of containerized Lambda functions
- creation of IAM roles with permissions following the principle of least privilege for CodePipeline, CodeBuild and CodeDeploy or bring your own roles
- optional CodeStar notifications via SNS
- ignore changes to Terraform state of your Lambda function by CodeDeploy deployments
see here for a real world example
backwards compatibility
The deployment is an optional add-on. In case you enhance existing Lambda functions using ignore_external_function_updates
your function will be recreated using the new lambda_external_lifecycle
resource with
a lifecycle block:
lifecycle {
ignore_changes = [
image_uri, last_modified, qualified_arn, version
]
}
Special thanks
Thanks @thisismana for collaborating on this feature
What's Changed
- Deployment of Lambda functions using AWS CodePipeline and CodeDeploy by @moritzzimmer in #23
Full Changelog: v5.8.0...v5.9.0