Skip to content

Commit b9a1019

Browse files
authored
Merge pull request #36 from fingerprintjs/rc
Release v1.0.0-rc.1
2 parents d04a199 + 0781b15 commit b9a1019

File tree

4 files changed

+17
-4
lines changed

4 files changed

+17
-4
lines changed

CHANGELOG.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,14 @@
1+
## [1.0.0-rc.1](https://github.com/fingerprintjs/terraform-aws-fingerprint-cloudfront-proxy-integration/compare/v0.6.0...v1.0.0-rc.1) (2024-08-13)
2+
3+
4+
### ⚠ BREAKING CHANGES
5+
6+
* v1.0.0
7+
8+
### Features
9+
10+
* v1.0.0 ([ce61945](https://github.com/fingerprintjs/terraform-aws-fingerprint-cloudfront-proxy-integration/commit/ce61945ddfc4a51fd7d8c4edf5e790dfc7117aad))
11+
112
## [0.6.0](https://github.com/fingerprintjs/terraform-aws-fingerprint-cloudfront-proxy-integration/compare/v0.5.0...v0.6.0) (2024-08-13)
213

314

examples/existing-ditribution/fingerprint.tf

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,5 +6,6 @@ module "fingerprint_cloudfront_integration" {
66
fpjs_shared_secret = var.fpjs_shared_secret
77

88
// You can define the proxy function's [permission boundary](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html)
9-
// fpjs_proxy_lambda_role_permissions_boundary_arn = "arn:aws:iam::aws:policy/AWSLambda_FullAccess"
9+
// See https://dev.fingerprint.com/docs/aws-cloudfront-integration-via-terraform#defining-a-permission-boundary-for-the-proxy-function
10+
// fpjs_proxy_lambda_role_permissions_boundary_arn = "arn:aws:iam::<YOUR_ACCOUNT_ID>:policy/YOUR_POLICY_NAME"
1011
}

examples/standalone-distribution/fingerprint.tf

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,5 +6,6 @@ module "fingerprint_cloudfront_integration" {
66
fpjs_shared_secret = var.fpjs_shared_secret
77

88
// You can define the proxy function's [permission boundary](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html)
9-
// fpjs_proxy_lambda_role_permissions_boundary_arn = "arn:aws:iam::aws:policy/AWSLambda_FullAccess"
9+
// See https://dev.fingerprint.com/docs/aws-cloudfront-integration-via-terraform#defining-a-permission-boundary-for-the-proxy-function
10+
// fpjs_proxy_lambda_role_permissions_boundary_arn = "arn:aws:iam::<YOUR_ACCOUNT_ID>:policy/YOUR_POLICY_NAME"
1011
}

variables.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ variable "fpjs_get_result_path" {
1010

1111
variable "fpjs_agent_download_path" {
1212
type = string
13-
description = "request path used to send ProCDN requests (aka FPJS_AGENT_DOWNLOAD_PATH)"
13+
description = "request path used to send agent download requests (aka FPJS_AGENT_DOWNLOAD_PATH)"
1414

1515
validation {
1616
condition = can(regex("^([a-zA-Z0-9\\-])+$", var.fpjs_agent_download_path))
@@ -31,6 +31,6 @@ variable "fpjs_shared_secret" {
3131

3232
variable "fpjs_proxy_lambda_role_permissions_boundary_arn" {
3333
type = string
34-
description = "permissions boundary ARN for the role assumed by the Proxy lambda"
34+
description = "Permissions boundary ARN for the role assumed by the Proxy lambda. Make sure your permissions boundary allows the function to access the Secrets Manager secret created for the integration (`secretsmanager:GetSecretValue`) and create logs (`logs:CreateLogStream`, `logs:CreateLogGroup`, `logs:PutLogEvents`)."
3535
default = null
3636
}

0 commit comments

Comments
 (0)