10
10
# Data
11
11
# --------------------------------------------------------------
12
12
data "aws_iam_policy_document" "assume_role" {
13
+ count = local. enabled ? 1 : 0
14
+
13
15
statement {
14
16
actions = [" sts:AssumeRole" ]
15
17
effect = " Allow"
@@ -22,6 +24,8 @@ data "aws_iam_policy_document" "assume_role" {
22
24
}
23
25
24
26
data "aws_iam_policy_document" "es_logs" {
27
+ count = local. enabled ? 1 : 0
28
+
25
29
statement {
26
30
actions = [
27
31
" logs:CreateLogGroup" ,
@@ -54,6 +58,8 @@ data "aws_iam_policy_document" "es_logs" {
54
58
}
55
59
56
60
data "aws_iam_policy_document" "sns" {
61
+ count = local. enabled ? 1 : 0
62
+
57
63
statement {
58
64
actions = [
59
65
" sns:Publish"
@@ -68,8 +74,10 @@ data "aws_iam_policy_document" "sns" {
68
74
}
69
75
70
76
data "aws_iam_policy_document" "default" {
71
- source_json = data. aws_iam_policy_document . es_logs . json
72
- override_json = length (var. sns_arn ) > 0 ? data. aws_iam_policy_document . sns . json : " {}"
77
+ count = local. enabled ? 1 : 0
78
+
79
+ source_json = join (" " , data. aws_iam_policy_document . es_logs . * . json )
80
+ override_json = length (var. sns_arn ) > 0 ? join (" " , data. aws_iam_policy_document . sns . * . json ) : " {}"
73
81
}
74
82
75
83
locals {
@@ -189,15 +197,15 @@ resource "aws_security_group_rule" "ingress_to_es_cluster_from_lambda" {
189
197
resource "aws_iam_role" "default" {
190
198
count = local. enabled ? 1 : 0
191
199
name = local. function_name
192
- assume_role_policy = data. aws_iam_policy_document . assume_role . json
200
+ assume_role_policy = join ( " " , data. aws_iam_policy_document . assume_role . * . json )
193
201
tags = module. label . tags
194
202
}
195
203
196
204
resource "aws_iam_role_policy" "default" {
197
205
count = local. enabled ? 1 : 0
198
206
name = local. function_name
199
207
role = join (" " , aws_iam_role. default . * . name )
200
- policy = data. aws_iam_policy_document . default . json
208
+ policy = join ( " " , data. aws_iam_policy_document . default . * . json )
201
209
}
202
210
203
211
resource "aws_iam_role_policy_attachment" "default" {
0 commit comments