sparse-intern-71089
10/06/2021, 8:33 PMbrainy-helmet-80249
10/06/2021, 8:42 PMpulumi up
as wellbillowy-army-68599
brainy-helmet-80249
10/06/2021, 9:19 PMbillowy-army-68599
brainy-helmet-80249
10/06/2021, 9:22 PMlittle-cartoon-10569
10/06/2021, 9:29 PMenvironment
and vpcConfig
args work. You've not provided a property name on the LHS. Is that a typescript feature, where it figures out the property name from the variable name? I've never seen it before.brainy-helmet-80249
10/06/2021, 10:04 PMinterface FunctionEnvironment {
/**
* Map of environment variables that are accessible from the function code during execution.
*/
variables?: pulumi.Input<{
[key: string]: pulumi.Input<string>;
}>;
}
interface FunctionVpcConfig {
/**
* List of security group IDs associated with the Lambda function.
*/
securityGroupIds: pulumi.Input<pulumi.Input<string>[]>;
/**
* List of subnet IDs associated with the Lambda function.
*/
subnetIds: pulumi.Input<pulumi.Input<string>[]>;
vpcId?: pulumi.Input<string>;
}
little-cartoon-10569
10/06/2021, 10:34 PM...
handler: "index.handler",
environment,
vpcConfig,
});
I expect this:
...
handler: "index.handler",
environment: environment,
vpcConfig: vpcConfig,
});
brainy-helmet-80249
10/06/2021, 10:42 PMred-match-15116
10/06/2021, 10:54 PMred-match-15116
10/06/2021, 11:01 PMbrainy-helmet-80249
10/06/2021, 11:34 PMred-match-15116
10/06/2021, 11:36 PM--logtostderr -v=9
https://www.pulumi.com/docs/troubleshooting/#verbose-loggingred-match-15116
10/06/2021, 11:37 PMJSON.stringify
in that specific case because it has a PolicyDocument
type which means that it gets converted to json string under the hood.quick-apartment-308
10/06/2021, 11:42 PMred-match-15116
10/06/2021, 11:44 PMenough-leather-70274
10/08/2021, 5:50 AMenough-leather-70274
10/08/2021, 6:03 AMenough-leather-70274
10/08/2021, 6:03 AMI1008 15:53:58.673933 34391 rpc.go:74] Marshaling property for RPC[Provider[aws, 0xc0018d6c00].Update(<<redacted>>,urn:pulumi:dev::<<redacted>>::aws:ec2/securityGroup:SecurityGroup$aws:iam/role:Role$aws:lambda/function:Function::<<redacted>>).news]: subnetIds={[{<<redacted>>} {<<redacted>>}]}
I1008 15:53:58.680811 34391 eventsink.go:59] Locking "aws_lambda_function"
I1008 15:53:58.680826 34391 eventsink.go:62] eventSink::Debug(<{%reset%}>Locking "aws_lambda_function"<{%reset%}>)
I1008 15:53:58.681017 34391 eventsink.go:59] Locked "aws_lambda_function"
I1008 15:53:58.681029 34391 eventsink.go:62] eventSink::Debug(<{%reset%}>Locked "aws_lambda_function"<{%reset%}>)
I1008 15:53:58.681373 34391 eventsink.go:59] Unlocking "aws_lambda_function"
I1008 15:53:58.681386 34391 eventsink.go:62] eventSink::Debug(<{%reset%}>Unlocking "aws_lambda_function"<{%reset%}>)
I1008 15:53:58.681559 34391 eventsink.go:59] Unlocked "aws_lambda_function"
I1008 15:53:58.681568 34391 eventsink.go:62] eventSink::Debug(<{%reset%}>Unlocked "aws_lambda_function"<{%reset%}>)
I1008 15:53:58.681568 34391 eventsink.go:62] eventSink::Debug(<{%reset%}>Unlocked "aws_lambda_function"<{%reset%}>)
I1008 15:53:58.684201 34391 eventsink.go:78] eventSink::Infoerr(<{%reset%}>panic: interface conversion: interface {} is []interface {}, not *schema.Set
enough-leather-70274
10/08/2021, 6:06 AM<<redacted>>
are our names/ ids)brainy-helmet-80249
10/08/2021, 6:12 AM*new* aws.lambda.Function
) and made sure to pass in a role's name (instead of the role) when defining RolePolicyAttachments. Those two steps got our build working again on 3.14.0.
new aws.iam.RolePolicyAttachment(
`${functionName}-lambda-execute-role-policy-attachment-${stack}`,
{
role: lambdaRole.name, // Pass in the name here, instead of lambdaRole
policyArn: aws.iam.ManagedPolicy.AWSLambdaExecute,
}
);
enough-leather-70274
10/08/2021, 6:17 AMbrave-planet-10645
10/08/2021, 7:56 AMbrave-planet-10645
10/08/2021, 7:57 AM4.22.2
(the latest) then try downgrading to `4.22.1`: https://github.com/pulumi/pulumi-aws/issues/1651brave-planet-10645
10/08/2021, 7:57 AM