Skip to content

Commit 1cdbc5a

Browse files
committed
Get enabled from module.this
1 parent 5a93ef4 commit 1cdbc5a

File tree

1 file changed

+13
-12
lines changed

1 file changed

+13
-12
lines changed

main.tf

Lines changed: 13 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -73,6 +73,7 @@ data "aws_iam_policy_document" "default" {
7373
}
7474

7575
locals {
76+
enabled = module.this.enabled
7677
skip_index_re = var.skip_index_re == null ? "^\\.kibana*" : var.skip_index_re
7778
}
7879

@@ -105,7 +106,7 @@ locals {
105106
# Resources
106107
#--------------------------------------------------------------
107108
resource "aws_lambda_function" "default" {
108-
count = var.enabled ? 1 : 0
109+
count = local.enabled ? 1 : 0
109110
filename = module.artifact.file
110111
function_name = local.function_name
111112
description = local.function_name
@@ -134,15 +135,15 @@ resource "aws_lambda_function" "default" {
134135
}
135136

136137
resource "aws_security_group" "default" {
137-
count = var.enabled ? 1 : 0
138+
count = local.enabled ? 1 : 0
138139
name = local.function_name
139140
description = local.function_name
140141
vpc_id = var.vpc_id
141142
tags = module.label.tags
142143
}
143144

144145
resource "aws_security_group_rule" "udp_dns_egress_from_lambda" {
145-
count = var.enabled ? 1 : 0
146+
count = local.enabled ? 1 : 0
146147
description = "Allow outbound UDP traffic from Lambda Elasticsearch cleanup to DNS"
147148
type = "egress"
148149
from_port = 53
@@ -153,7 +154,7 @@ resource "aws_security_group_rule" "udp_dns_egress_from_lambda" {
153154
}
154155

155156
resource "aws_security_group_rule" "tcp_dns_egress_from_lambda" {
156-
count = var.enabled ? 1 : 0
157+
count = local.enabled ? 1 : 0
157158
description = "Allow outbound TCP traffic from Lambda Elasticsearch cleanup to DNS"
158159
type = "egress"
159160
from_port = 53
@@ -164,7 +165,7 @@ resource "aws_security_group_rule" "tcp_dns_egress_from_lambda" {
164165
}
165166

166167
resource "aws_security_group_rule" "egress_from_lambda_to_es_cluster" {
167-
count = var.enabled ? 1 : 0
168+
count = local.enabled ? 1 : 0
168169
description = "Allow outbound traffic from Lambda Elasticsearch cleanup SG to Elasticsearch SG"
169170
type = "egress"
170171
from_port = 443
@@ -175,7 +176,7 @@ resource "aws_security_group_rule" "egress_from_lambda_to_es_cluster" {
175176
}
176177

177178
resource "aws_security_group_rule" "ingress_to_es_cluster_from_lambda" {
178-
count = var.enabled ? 1 : 0
179+
count = local.enabled ? 1 : 0
179180
description = "Allow inbound traffic to Elasticsearch domain from Lambda Elasticsearch cleanup SG"
180181
type = "ingress"
181182
from_port = 443
@@ -186,34 +187,34 @@ resource "aws_security_group_rule" "ingress_to_es_cluster_from_lambda" {
186187
}
187188

188189
resource "aws_iam_role" "default" {
189-
count = var.enabled ? 1 : 0
190+
count = local.enabled ? 1 : 0
190191
name = local.function_name
191192
assume_role_policy = data.aws_iam_policy_document.assume_role.json
192193
tags = module.label.tags
193194
}
194195

195196
resource "aws_iam_role_policy" "default" {
196-
count = var.enabled ? 1 : 0
197+
count = local.enabled ? 1 : 0
197198
name = local.function_name
198199
role = join("", aws_iam_role.default.*.name)
199200
policy = data.aws_iam_policy_document.default.json
200201
}
201202

202203
resource "aws_iam_role_policy_attachment" "default" {
203-
count = var.enabled ? 1 : 0
204+
count = local.enabled ? 1 : 0
204205
role = join("", aws_iam_role.default.*.name)
205206
policy_arn = "arn:aws:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole"
206207
}
207208

208209
resource "aws_cloudwatch_event_rule" "default" {
209-
count = var.enabled ? 1 : 0
210+
count = local.enabled ? 1 : 0
210211
name = local.function_name
211212
description = local.function_name
212213
schedule_expression = var.schedule
213214
}
214215

215216
resource "aws_lambda_permission" "default" {
216-
count = var.enabled ? 1 : 0
217+
count = local.enabled ? 1 : 0
217218
statement_id = "AllowExecutionFromCloudWatch"
218219
action = "lambda:InvokeFunction"
219220
function_name = join("", aws_lambda_function.default.*.arn)
@@ -222,7 +223,7 @@ resource "aws_lambda_permission" "default" {
222223
}
223224

224225
resource "aws_cloudwatch_event_target" "default" {
225-
count = var.enabled ? 1 : 0
226+
count = local.enabled ? 1 : 0
226227
target_id = local.function_name
227228
rule = join("", aws_cloudwatch_event_rule.default.*.name)
228229
arn = join("", aws_lambda_function.default.*.arn)

0 commit comments

Comments
 (0)