Skip to content

Commit

Permalink
remove role module
Browse files Browse the repository at this point in the history
  • Loading branch information
badra001 committed Jan 21, 2022
1 parent c5f0f7d commit e31beb8
Show file tree
Hide file tree
Showing 2 changed files with 32 additions and 11 deletions.
6 changes: 3 additions & 3 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,15 +13,15 @@

## Modules

| Name | Source | Version |
|------|--------|---------|
| <a name="module_role"></a> [role](#module\_role) | git@github.e.it.census.gov:terraform-modules/aws-iam-role.git | n/a |
No modules.

## Resources

| Name | Type |
|------|------|
| [aws_dynamodb_table.table](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/dynamodb_table) | resource |
| [aws_iam_role.role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role) | resource |
| [aws_iam_role_policy_attachment.role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment) | resource |
| [aws_arn.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/arn) | data source |
| [aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity) | data source |
| [aws_iam_policy.lambda_policies](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy) | data source |
Expand Down
37 changes: 29 additions & 8 deletions role.tf
Original file line number Diff line number Diff line change
Expand Up @@ -3,17 +3,38 @@ locals {
lambda_policies = ["AWSLambdaBasicExecutionRole"]
}

module "role" {
source = "git@github.e.it.census.gov:terraform-modules/aws-iam-role.git"
resource "aws_iam_role" "role" {
count = var.create ? 1 : 0
description = "Lambda role for Dynamic Route53"
name = format("%v%v", local.lambda_name)
force_detach_policies = local._defaults["force_detach_policies"]
max_session_duration = var.max_session_duration
assume_role_policy = data.aws_iam_policy_document.lambda_assume.json

role_description = "Lambda role for Dynamic Route53"
role_name = local.lambda_name
enable_ldap_creation = false
assume_policy_document = data.aws_iam_policy_document.lambda_assume.json
attached_policies = [for k, v in data.aws_iam_policy.lambda_policies : k.arn]
inline_policies = [{ name = var.name, policy = data.aws_iam_policy_document.lambda_policy.json }]
inline_policy = {
name = var.name
policy = data.aws_iam_policy_document.lambda_policy.json
}

lifecycle {
ignore_changes = [tags["boc:tf_module_version"]]
}

tags = merge(
local.base_tags,
var.tags,
lookup(var.component_tags, "role", {}),
tomap({ Name = local.lambda_name })
)
}

resource "aws_iam_role_policy_attachment" "role" {
for_each = var.create ? toset([for k, v in data.aws_iam_policy.lambda_policies : k.arn]) : toset([])
role = var.create ? aws_iam_role.role[0].name : ""
policy_arn = each.value
}


data "aws_iam_policy" "lambda_policies" {
for_each = toset(local.lambda_policies)
name = each.key
Expand Down

0 comments on commit e31beb8

Please sign in to comment.