{"id":21834660,"url":"https://github.com/mineiros-io/terraform-aws-lambda-function","last_synced_at":"2025-07-22T21:34:02.866Z","repository":{"id":43306817,"uuid":"273954734","full_name":"mineiros-io/terraform-aws-lambda-function","owner":"mineiros-io","description":"A Terraform module for deploying and managing Lambda functions on Amazon Web Services (AWS). https://aws.amazon.com/lambda/","archived":false,"fork":false,"pushed_at":"2022-04-06T13:13:45.000Z","size":341,"stargazers_count":41,"open_issues_count":0,"forks_count":25,"subscribers_count":7,"default_branch":"master","last_synced_at":"2025-04-14T08:56:24.302Z","etag":null,"topics":["amazon-web-services","aws","function","iac","lambda","lambda-functions","mineiros","serverless","terraform","terraform-aws","terraform-modules"],"latest_commit_sha":null,"homepage":"","language":"HCL","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/mineiros-io.png","metadata":{"files":{"readme":"README.md","changelog":"CHANGELOG.md","contributing":"CONTRIBUTING.md","funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":".github/CODEOWNERS","security":null,"support":null}},"created_at":"2020-06-21T17:43:29.000Z","updated_at":"2025-02-21T12:27:18.000Z","dependencies_parsed_at":"2022-09-06T10:31:50.906Z","dependency_job_id":null,"html_url":"https://github.com/mineiros-io/terraform-aws-lambda-function","commit_stats":null,"previous_names":[],"tags_count":6,"template":false,"template_full_name":null,"purl":"pkg:github/mineiros-io/terraform-aws-lambda-function","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/mineiros-io%2Fterraform-aws-lambda-function","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/mineiros-io%2Fterraform-aws-lambda-function/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/mineiros-io%2Fterraform-aws-lambda-function/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/mineiros-io%2Fterraform-aws-lambda-function/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/mineiros-io","download_url":"https://codeload.github.com/mineiros-io/terraform-aws-lambda-function/tar.gz/refs/heads/master","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/mineiros-io%2Fterraform-aws-lambda-function/sbom","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":266578670,"owners_count":23951149,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-07-22T02:00:09.085Z","response_time":66,"last_error":null,"robots_txt_status":null,"robots_txt_updated_at":null,"robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["amazon-web-services","aws","function","iac","lambda","lambda-functions","mineiros","serverless","terraform","terraform-aws","terraform-modules"],"created_at":"2024-11-27T20:14:03.046Z","updated_at":"2025-07-22T21:34:02.843Z","avatar_url":"https://github.com/mineiros-io.png","language":"HCL","readme":"[\u003cimg src=\"https://raw.githubusercontent.com/mineiros-io/brand/3bffd30e8bdbbde32c143e2650b2faa55f1df3ea/mineiros-primary-logo.svg\" width=\"400\"/\u003e](https://mineiros.io/?ref=terraform-aws-lambda-function)\n\n[![Build Status](https://github.com/mineiros-io/terraform-aws-lambda-function/workflows/CI/CD%20Pipeline/badge.svg)](https://github.com/mineiros-io/terraform-aws-lambda-function/actions)\n[![GitHub tag (latest SemVer)](https://img.shields.io/github/v/tag/mineiros-io/terraform-aws-lambda-function.svg?label=latest\u0026sort=semver)](https://github.com/mineiros-io/terraform-aws-lambda-function/releases)\n[![Terraform Version](https://img.shields.io/badge/terraform-1.x%20|%200.15%20|%200.14%20|%200.13%20|%200.12.20+-623CE4.svg?logo=terraform)](https://github.com/hashicorp/terraform/releases)\n[![AWS Provider Version](https://img.shields.io/badge/AWS-3-F8991D.svg?logo=terraform)](https://github.com/terraform-providers/terraform-provider-aws/releases)\n[![Join Slack](https://img.shields.io/badge/slack-@mineiros--community-f32752.svg?logo=slack)](https://mineiros.io/slack)\n\n# terraform-aws-lambda-function\n\nA [Terraform] module for deploying and managing [Serverless Lambda Functions] on [Amazon Web Services (AWS)][AWS].\n\n***This module supports both, Terraform v1.x, v0.15, v0.14, v0.13 as well as v0.12.20 and above.***\n\nThis module is part of our Infrastructure as Code (IaC) framework\nthat enables our users and customers to easily deploy and manage reusable,\nsecure, and production-grade cloud infrastructure.\n\n\n- [Module Features](#module-features)\n- [Getting Started](#getting-started)\n- [Module Argument Reference](#module-argument-reference)\n  - [Top-level Arguments](#top-level-arguments)\n    - [Module Configuration](#module-configuration)\n    - [Lambda Function Resource Configuration](#lambda-function-resource-configuration)\n- [Module Outputs](#module-outputs)\n- [External Documentation](#external-documentation)\n  - [AWS Lambda Documentation](#aws-lambda-documentation)\n  - [Terraform AWS Provider Documentation](#terraform-aws-provider-documentation)\n- [Module Versioning](#module-versioning)\n  - [Backwards compatibility in `0.0.z` and `0.y.z` version](#backwards-compatibility-in-00z-and-0yz-version)\n- [About Mineiros](#about-mineiros)\n- [Reporting Issues](#reporting-issues)\n- [Makefile Targets](#makefile-targets)\n- [License](#license)\n\n## Module Features\n\nIn contrast to the plain `terraform_resource` resource this module has better features.\nWhile all security features can be disabled as needed best practices\nare pre-configured.\n\nThese are some of our custom features:\n\n- **Standard Module Features**:\n  Deploy a local deployment package to AWS Lambda\n  Deploy a deployment package located in S3 to AWS Lambda\n\n- **Extended Module Features**:\n  Aliases, Permissions, VPC Config\n\n- *Features not yet implemented*:\n  Event Source Mapping,\n  Event Invoke Config\n  Layer Versions,\n  Provisioned Concurrency Config\n\n## Getting Started\n\nMost basic usage just setting required arguments:\n\n```hcl\nmodule \"terraform-aws-lambda-function\" {\n  source  = \"mineiros-io/lambda-function/aws\"\n  version = \"~\u003e 0.5.0\"\n\n  runtime  = \"python3.8\"\n  handler  = \"main\"\n  role_arn = aws_iam_role.lambda.arn\n  filename = \"deployment.zip\"\n}\n```\n\n**Note**: This module expects the ARN of an existing IAM Role through the `role_arn` variable.\nYou can consider or [terraform-aws-iam-role] module for easily setting up IAM Roles.\n\nAdvanced examples can be found in [examples/s3-complete-example/main.tf] setting\nall required and optional arguments to their default values.\n\n## Module Argument Reference\n\nSee [variables.tf] and [examples/] for details and use-cases.\n\n### Top-level Arguments\n\n#### Module Configuration\n\n- [**`module_enabled`**](#var-module_enabled): *(Optional `bool`)*\u003ca name=\"var-module_enabled\"\u003e\u003c/a\u003e\n\n  Specifies whether resources in the module will be created.\n\n  Default is `true`.\n\n- [**`module_tags`**](#var-module_tags): *(Optional `map(string)`)*\u003ca name=\"var-module_tags\"\u003e\u003c/a\u003e\n\n  A map of tags that will be applied to all created resources that accept tags.\n  Tags defined with 'module_tags' can be overwritten by resource-specific tags.\n\n  Default is `{}`.\n\n- [**`module_depends_on`**](#var-module_depends_on): *(Optional `list(dependencies)`)*\u003ca name=\"var-module_depends_on\"\u003e\u003c/a\u003e\n\n  A list of dependencies. Any object can be _assigned_ to this list to define a hidden external dependency.\n\n#### Lambda Function Resource Configuration\n\n- [**`function_name`**](#var-function_name): *(**Required** `string`)*\u003ca name=\"var-function_name\"\u003e\u003c/a\u003e\n\n  A unique name for the Lambda function.\n\n- [**`handler`**](#var-handler): *(Optional `string`)*\u003ca name=\"var-handler\"\u003e\u003c/a\u003e\n\n  The function entrypoint in the code. This is the name of the method in the code which receives the event and context parameter when this Lambda function is triggered.\n\n- [**`role_arn`**](#var-role_arn): *(**Required** `string`)*\u003ca name=\"var-role_arn\"\u003e\u003c/a\u003e\n\n  The ARN of the policy that is used to set the permissions boundary for the IAM role for the Lambda function.\n\n- [**`runtime`**](#var-runtime): *(**Required** `string`)*\u003ca name=\"var-runtime\"\u003e\u003c/a\u003e\n\n  The runtime the Lambda function should run in. A list of all available runtimes can be found here: https://docs.aws.amazon.com/lambda/latest/dg/lambda-runtimes.html\n\n  Default is `\"[]\"`.\n\n- [**`aliases`**](#var-aliases): *(Optional `map(alias)`)*\u003ca name=\"var-aliases\"\u003e\u003c/a\u003e\n\n  A map of aliases (keyed by the alias name) that will be created for the Lambda function. If `version` is omitted, the alias will automatically point to `$LATEST`.\n\n  Default is `{}`.\n\n  Example:\n\n  ```hcl\n  aliases = {\n    latest = {\n      description = \"The newest deployment.\"\n      additional_version_weights = {\n        stable = 0.5\n      }\n    }\n    stable = {\n      version     = 2\n      description = \"The latest stable deployment.\"\n    }\n  }\n  ```\n\n  Each `alias` object in the map accepts the following attributes:\n\n  - [**`description`**](#attr-aliases-description): *(Optional `string`)*\u003ca name=\"attr-aliases-description\"\u003e\u003c/a\u003e\n\n    Description of the alias.\n\n  - [**`function_version`**](#attr-aliases-function_version): *(Optional `string`)*\u003ca name=\"attr-aliases-function_version\"\u003e\u003c/a\u003e\n\n    Lambda function version for which you are creating the alias.\n    Pattern: `(\\$LATEST|[0-9]+)`.\n\n    Default is `\"$LATEST\"`.\n\n  - [**`additional_version_weights`**](#attr-aliases-additional_version_weights): *(Optional `map(string)`)*\u003ca name=\"attr-aliases-additional_version_weights\"\u003e\u003c/a\u003e\n\n    A map that defines the proportion of events that should be sent to different versions of a lambda function.\n\n- [**`description`**](#var-description): *(Optional `string`)*\u003ca name=\"var-description\"\u003e\u003c/a\u003e\n\n  A description of what the Lambda function does.\n\n- [**`publish`**](#var-publish): *(Optional `bool`)*\u003ca name=\"var-publish\"\u003e\u003c/a\u003e\n\n  Whether to publish creation/change as new Lambda function.\n  This allows you to use aliases to refer to execute different versions of the function in different environments.\n\n  Default is `false`.\n\n- [**`function_tags`**](#var-function_tags): *(Optional `map(string)`)*\u003ca name=\"var-function_tags\"\u003e\u003c/a\u003e\n\n  A map of tags that will be applied to the function.\n\n  Default is `{}`.\n\n- [**`vpc_subnet_ids`**](#var-vpc_subnet_ids): *(Optional `set(string)`)*\u003ca name=\"var-vpc_subnet_ids\"\u003e\u003c/a\u003e\n\n  A set of subnet IDs associated with the Lambda function.\n\n  Default is `[]`.\n\n- [**`layer_arns`**](#var-layer_arns): *(Optional `set(string)`)*\u003ca name=\"var-layer_arns\"\u003e\u003c/a\u003e\n\n  Set of Lambda Layer Version ARNs (maximum of 5) to attach to your Lambda function.\n  For details see https://docs.aws.amazon.com/lambda/latest/dg/configuration-layers.html\n\n  Default is `[]`.\n\n- [**`reserved_concurrent_executions`**](#var-reserved_concurrent_executions): *(Optional `number`)*\u003ca name=\"var-reserved_concurrent_executions\"\u003e\u003c/a\u003e\n\n  The amount of reserved concurrent executions for this Lambda function.\n  A value of 0 disables Lambda from being triggered and -1 removes any concurrency limitations.\n  For details see https://docs.aws.amazon.com/lambda/latest/dg/invocation-scaling.html\n\n  Default is `-1`.\n\n- [**`s3_bucket`**](#var-s3_bucket): *(Optional `string`)*\u003ca name=\"var-s3_bucket\"\u003e\u003c/a\u003e\n\n  The S3 bucket location containing the function's deployment package.\n  Conflicts with `filename`. This bucket must reside in the same AWS region where you are creating the Lambda function.\n\n- [**`source_code_hash`**](#var-source_code_hash): *(Optional `string`)*\u003ca name=\"var-source_code_hash\"\u003e\u003c/a\u003e\n\n  Used to trigger updates. Must be set to a base64-encoded SHA256 hash of the package file specified with either `filename` or `s3_key`.\n\n- [**`environment_variables`**](#var-environment_variables): *(Optional `map(string)`)*\u003ca name=\"var-environment_variables\"\u003e\u003c/a\u003e\n\n  A map of environment variables to pass to the Lambda function.\n  AWS will automatically encrypt these with KMS if a key is provided and decrypt them when running the function.\n\n  Default is `{}`.\n\n- [**`kms_key_arn`**](#var-kms_key_arn): *(Optional `string`)*\u003ca name=\"var-kms_key_arn\"\u003e\u003c/a\u003e\n\n  The ARN for the KMS encryption key that is used to encrypt environment variables. If none is provided when environment variables are in use, AWS Lambda uses a default service key.\n\n- [**`filename`**](#var-filename): *(Optional `string`)*\u003ca name=\"var-filename\"\u003e\u003c/a\u003e\n\n  The path to the local .zip file that contains the Lambda function source code.\n\n- [**`timeout`**](#var-timeout): *(Optional `number`)*\u003ca name=\"var-timeout\"\u003e\u003c/a\u003e\n\n  The amount of time the Lambda function has to run in seconds. For details see https://docs.aws.amazon.com/lambda/latest/dg/gettingstarted-limits.html\n\n  Default is `3`.\n\n- [**`dead_letter_config_target_arn`**](#var-dead_letter_config_target_arn): *(Optional `string`)*\u003ca name=\"var-dead_letter_config_target_arn\"\u003e\u003c/a\u003e\n\n  The ARN of an SNS topic or SQS queue to notify when an invocation fails.\n  If this option is used, the function's IAM role must be granted suitable access to write to the target object, which means allowing either the 'sns:Publish' or 'sqs:SendMessage' action on this ARN, depending on which service is targeted.\n\n- [**`s3_key`**](#var-s3_key): *(Optional `string`)*\u003ca name=\"var-s3_key\"\u003e\u003c/a\u003e\n\n  The S3 key of an object containing the function's deployment package.\n  Conflicts with `filename`.\n\n- [**`s3_object_version`**](#var-s3_object_version): *(Optional `string`)*\u003ca name=\"var-s3_object_version\"\u003e\u003c/a\u003e\n\n  The object version containing the function's deployment package.\n  Conflicts with `filename`.\n\n- [**`vpc_security_group_ids`**](#var-vpc_security_group_ids): *(Optional `set(string)`)*\u003ca name=\"var-vpc_security_group_ids\"\u003e\u003c/a\u003e\n\n  A set of security group IDs associated with the Lambda function.\n\n  Default is `[]`.\n\n- [**`memory_size`**](#var-memory_size): *(Optional `number`)*\u003ca name=\"var-memory_size\"\u003e\u003c/a\u003e\n\n  Amount of memory in MB the Lambda function can use at runtime.\n  For details see https://docs.aws.amazon.com/lambda/latest/dg/gettingstarted-limits.html\n\n  Default is `128`.\n\n- [**`permissions`**](#var-permissions): *(Optional `list(permission)`)*\u003ca name=\"var-permissions\"\u003e\u003c/a\u003e\n\n  A list of permission objects of external resources (like a CloudWatch Event Rule, SNS, or S3) that should have permission to access the Lambda function.\n\n  Default is `[]`.\n\n  Example:\n\n  ```hcl\n  permissions = [\n    {\n      statement_id = \"AllowExecutionFromSNS\"\n      principal    = \"sns.amazonaws.com\"\n      source_arn   = aws_sns_topic.lambda.arn\n    }\n  ]\n  ```\n\n  Each `permission` object in the list accepts the following attributes:\n\n  - [**`statement_id`**](#attr-permissions-statement_id): *(**Required** `string`)*\u003ca name=\"attr-permissions-statement_id\"\u003e\u003c/a\u003e\n\n    A unique statement identifier.\n\n  - [**`action`**](#attr-permissions-action): *(**Required** `string`)*\u003ca name=\"attr-permissions-action\"\u003e\u003c/a\u003e\n\n    The AWS Lambda action you want to allow in this statement. (e.g. `lambda:InvokeFunction`)\n\n  - [**`principal`**](#attr-permissions-principal): *(**Required** `string`)*\u003ca name=\"attr-permissions-principal\"\u003e\u003c/a\u003e\n\n    The principal who is getting this permission. e.g. `s3.amazonaws.com`, an AWS account ID, or any valid AWS service principal such as `events.amazonaws.com` or `sns.amazonaws.com`.\n\n  - [**`event_source_token`**](#attr-permissions-event_source_token): *(Optional `string`)*\u003ca name=\"attr-permissions-event_source_token\"\u003e\u003c/a\u003e\n\n    The Event Source Token to validate. Used with Alexa Skills.\n\n  - [**`qualifier`**](#attr-permissions-qualifier): *(Optional `string`)*\u003ca name=\"attr-permissions-qualifier\"\u003e\u003c/a\u003e\n\n    Query parameter to specify function version or alias name.\n    The permission will then apply to the specific qualified ARN. e.g. `arn:aws:lambda:aws-region:acct-id:function:function-name:2`.\n\n  - [**`source_account`**](#attr-permissions-source_account): *(Optional `string`)*\u003ca name=\"attr-permissions-source_account\"\u003e\u003c/a\u003e\n\n    This parameter is used for S3 and SES.\n    The AWS account ID (without a hyphen) of the source owner.\n\n  - [**`source_arn`**](#attr-permissions-source_arn): *(Optional `string`)*\u003ca name=\"attr-permissions-source_arn\"\u003e\u003c/a\u003e\n\n    When the principal is an AWS service, the ARN of the specific resource within that service to grant permission to. Without this, any resource from principal will be granted permission – even if that resource is from another account.\n    For S3, this should be the ARN of the S3 Bucket.\n    For CloudWatch Events, this should be the ARN of the CloudWatch Events Rule.\n    For API Gateway, this should be the ARN of the API, as described in\n    https://docs.aws.amazon.com/apigateway/latest/developerguide/api-gateway-control-access-using-iam-policies-to-invoke-api.html.\n\n- [**`tracing_mode`**](#var-tracing_mode): *(Optional `string`)*\u003ca name=\"var-tracing_mode\"\u003e\u003c/a\u003e\n\n  Can be either `PassThrough` or `Active`. If set to `PassThrough`, Lambda will only trace the request from an upstream service if it contains a tracing header with `sampled=1`. If set to `Active`, Lambda will respect any tracing header it receives from an upstream service. If no tracing header is received,\n  Lambda will call X-Ray for a tracing decision.\n\n## Module Outputs\n\nThe following attributes are exported by the module:\n\n- [**`function`**](#output-function): *(`object(function)`)*\u003ca name=\"output-function\"\u003e\u003c/a\u003e\n\n  All outputs of the `aws_lambda_function` resource.\"\n\n- [**`aliases`**](#output-aliases): *(`map(alias)`)*\u003ca name=\"output-aliases\"\u003e\u003c/a\u003e\n\n  A map of all created `aws_lambda_alias` resources keyed by name.\n\n- [**`permissions`**](#output-permissions): *(`list(permission)`)*\u003ca name=\"output-permissions\"\u003e\u003c/a\u003e\n\n  A map of all created `aws_lambda_permission` resources keyed by\n  `statement_id`.\n\n- [**`module_enabled`**](#output-module_enabled): *(`bool`)*\u003ca name=\"output-module_enabled\"\u003e\u003c/a\u003e\n\n  Whether this module is enabled.\n\n- [**`module_inputs`**](#output-module_inputs): *(`map(module_inputs)`)*\u003ca name=\"output-module_inputs\"\u003e\u003c/a\u003e\n\n  A map of all module arguments. Omitted optional arguments will be\n  represented with their actual defaults.\n\n- [**`module_tags`**](#output-module_tags): *(`map(string)`)*\u003ca name=\"output-module_tags\"\u003e\u003c/a\u003e\n\n  The map of tags that are being applied to all created resources that\n  accept tags.\n\n## External Documentation\n\n### AWS Lambda Documentation\n\n- General Documentation: https://docs.aws.amazon.com/lambda/latest/dg/welcome.html\n- Functions: https://docs.aws.amazon.com/lambda/latest/dg/lambda-functions.html\n- Aliases: https://docs.aws.amazon.com/lambda/latest/dg/configuration-aliases.html\n\n### Terraform AWS Provider Documentation\n\n- https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function\n- https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_alias\n- https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_permission\n\n## Module Versioning\n\nThis Module follows the principles of [Semantic Versioning (SemVer)].\n\nGiven a version number `MAJOR.MINOR.PATCH`, we increment the:\n\n1. `MAJOR` version when we make incompatible changes,\n2. `MINOR` version when we add functionality in a backwards compatible manner, and\n3. `PATCH` version when we make backwards compatible bug fixes.\n\n### Backwards compatibility in `0.0.z` and `0.y.z` version\n\n- Backwards compatibility in versions `0.0.z` is **not guaranteed** when `z` is increased. (Initial development)\n- Backwards compatibility in versions `0.y.z` is **not guaranteed** when `y` is increased. (Pre-release)\n\n## About Mineiros\n\n[Mineiros][homepage] is a remote-first company headquartered in Berlin, Germany\nthat solves development, automation and security challenges in cloud infrastructure.\n\nOur vision is to massively reduce time and overhead for teams to manage and\ndeploy production-grade and secure cloud infrastructure.\n\nWe offer commercial support for all of our modules and encourage you to reach out\nif you have any questions or need help. Feel free to email us at [hello@mineiros.io] or join our\n[Community Slack channel][slack].\n\n## Reporting Issues\n\nWe use GitHub [Issues] to track community reported issues and missing features.\n\n## Makefile Targets\n\nThis repository comes with a handy [Makefile].\nRun `make help` to see details on each available target.\n\n## License\n\n[![license][badge-license]][apache20]\n\nThis module is licensed under the Apache License Version 2.0, January 2004.\nPlease see [LICENSE] for full details.\n      \nCopyright \u0026copy; 2020-2022 [Mineiros GmbH][homepage]\n\n\n\u003c!-- References --\u003e\n\n[homepage]: https://mineiros.io/?ref=terraform-aws-lambda-function\n[hello@mineiros.io]: mailto:hello@mineiros.io\n[badge-build]: https://github.com/mineiros-io/terraform-aws-lambda-function/workflows/CI/CD%20Pipeline/badge.svg\n[badge-semver]: https://img.shields.io/github/v/tag/mineiros-io/terraform-aws-lambda-function.svg?label=latest\u0026sort=semver\n[badge-license]: https://img.shields.io/badge/license-Apache%202.0-brightgreen.svg\n[badge-terraform]: https://img.shields.io/badge/terraform-1.x%20|%200.15%20|%200.14%20|%200.13%20|%200.12.20+-623CE4.svg?logo=terraform\n[badge-slack]: https://img.shields.io/badge/slack-@mineiros--community-f32752.svg?logo=slack\n[build-status]: https://github.com/mineiros-io/terraform-aws-lambda-function/actions\n[releases-github]: https://github.com/mineiros-io/terraform-aws-lambda-function/releases\n[releases-terraform]: https://github.com/hashicorp/terraform/releases\n[apache20]: https://opensource.org/licenses/Apache-2.0\n[slack]: https://join.slack.com/t/mineiros-community/shared_invite/zt-ehidestg-aLGoIENLVs6tvwJ11w9WGg\n[Terraform]: https://www.terraform.io\n[AWS]: https://aws.amazon.com/\n[Serverless Lambda Functions]: https://aws.amazon.com/lambda/\n[Semantic Versioning (SemVer)]: https://semver.org/\n[terraform-aws-iam-role]: https://github.com/mineiros-io/terraform-aws-iam-role\n[examples/s3-complete-example/main.tf]: https://github.com/mineiros-io/terraform-aws-lambda-function/blob/master/examples/s3-complete-example/main.tf\n[variables.tf]: https://github.com/mineiros-io/terraform-aws-lambda-function/blob/master/variables.tf\n[examples/]: https://github.com/mineiros-io/terraform-aws-lambda-function/blob/master/examples\n[Issues]: https://github.com/mineiros-io/terraform-aws-lambda-function/issues\n[LICENSE]: https://github.com/mineiros-io/terraform-aws-lambda-function/blob/master/LICENSE\n[Makefile]: https://github.com/mineiros-io/terraform-aws-lambda-function/blob/master/Makefile\n[Pull Requests]: https://github.com/mineiros-io/terraform-aws-lambda-function/pulls\n[Contribution Guidelines]: https://github.com/mineiros-io/terraform-aws-lambda-function/blob/master/CONTRIBUTING.md\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fmineiros-io%2Fterraform-aws-lambda-function","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fmineiros-io%2Fterraform-aws-lambda-function","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fmineiros-io%2Fterraform-aws-lambda-function/lists"}