Skip to content

Commit

Permalink
Merge pull request #4 from UKHomeOffice/terraform-0.12
Browse files Browse the repository at this point in the history
Update module for Terraform 0.12
  • Loading branch information
tasharnvb authored Sep 10, 2019
2 parents 461f359 + 1a0d8d8 commit a358b41
Show file tree
Hide file tree
Showing 6 changed files with 459 additions and 435 deletions.
2 changes: 1 addition & 1 deletion .drone.yml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
pipeline:
validate:
image: quay.io/ukhomeofficedigital/terraform-toolset:v0.2.5
image: quay.io/ukhomeofficedigital/terraform-toolset:v0.12.6
commands:
- /acp/scripts/tf-validate.sh --no-docs
when:
Expand Down
1 change: 1 addition & 0 deletions .gitignore
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
.terraform
28 changes: 18 additions & 10 deletions iam.tf
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
data "aws_iam_policy_document" "assume_role" {
count = "${var.create}"
count = var.create ? 1 : 0

statement {
effect = "Allow"
Expand All @@ -14,7 +14,7 @@ data "aws_iam_policy_document" "assume_role" {
}

data "aws_iam_policy_document" "lambda_basic" {
count = "${var.create}"
count = var.create ? 1 : 0

statement {
sid = "AllowWriteToCloudwatchLogs"
Expand All @@ -32,9 +32,9 @@ data "aws_iam_policy_document" "lambda_basic" {
}

data "aws_iam_policy_document" "lambda" {
count = "${(var.create_with_kms_key == 1 ? 1 : 0) * var.create}"
count = var.create_with_kms_key && var.create ? 1 : 0

source_json = "${data.aws_iam_policy_document.lambda_basic.0.json}"
source_json = data.aws_iam_policy_document.lambda_basic[0].json

statement {
sid = "AllowKMSDecrypt"
Expand All @@ -48,17 +48,25 @@ data "aws_iam_policy_document" "lambda" {
}

resource "aws_iam_role" "lambda" {
count = "${var.create}"
count = var.create ? 1 : 0

name_prefix = "lambda"
assume_role_policy = "${data.aws_iam_policy_document.assume_role.0.json}"
assume_role_policy = data.aws_iam_policy_document.assume_role[0].json
}

resource "aws_iam_role_policy" "lambda" {
count = "${var.create}"
count = var.create ? 1 : 0

name_prefix = "lambda-policy-"
role = "${aws_iam_role.lambda.0.id}"

policy = "${element(compact(concat(data.aws_iam_policy_document.lambda.*.json, data.aws_iam_policy_document.lambda_basic.*.json)), 0)}"
role = aws_iam_role.lambda[0].id

policy = element(
compact(
concat(
data.aws_iam_policy_document.lambda.*.json,
data.aws_iam_policy_document.lambda_basic.*.json,
),
),
0,
)
}
Loading

0 comments on commit a358b41

Please sign in to comment.