@@ -76,8 +76,8 @@ data "aws_iam_policy_document" "sns" {
7676data "aws_iam_policy_document" "default" {
7777 count = local. enabled ? 1 : 0
7878
79- source_json = join (" " , data. aws_iam_policy_document . es_logs . * . json )
80- override_json = length (var. sns_arn ) > 0 ? join (" " , data. aws_iam_policy_document . sns . * . json ) : " {}"
79+ source_policy_documents = [ join (" " , data. aws_iam_policy_document . es_logs [ * ] . json )]
80+ override_policy_documents = length (var. sns_arn ) > 0 ? [ join (" " , data. aws_iam_policy_document . sns [ * ] . json )] : [ " {}" ]
8181}
8282
8383locals {
@@ -98,7 +98,7 @@ module "label" {
9898
9999module "artifact" {
100100 source = " cloudposse/module-artifact/external"
101- version = " 0.7.1 "
101+ version = " 0.8.0 "
102102 enabled = module. this . enabled
103103 filename = " lambda.zip"
104104 module_name = " terraform-aws-lambda-elasticsearch-cleanup"
@@ -122,7 +122,7 @@ resource "aws_lambda_function" "default" {
122122 description = local. function_name
123123 timeout = var. timeout
124124 runtime = " python${ var . python_version } "
125- role = join (" " , aws_iam_role. default . * . arn )
125+ role = join (" " , aws_iam_role. default [ * ] . arn )
126126 handler = " es-cleanup.lambda_handler"
127127 source_code_hash = module. artifact . base64sha256
128128 tags = module. label . tags
@@ -140,7 +140,7 @@ resource "aws_lambda_function" "default" {
140140
141141 vpc_config {
142142 subnet_ids = var. subnet_ids
143- security_group_ids = [join (" " , aws_security_group. default . * . id )]
143+ security_group_ids = [join (" " , aws_security_group. default [ * ] . id )]
144144 }
145145}
146146
@@ -160,7 +160,7 @@ resource "aws_security_group_rule" "udp_dns_egress_from_lambda" {
160160 to_port = 53
161161 protocol = " udp"
162162 cidr_blocks = [" 0.0.0.0/0" ]
163- security_group_id = join (" " , aws_security_group. default . * . id )
163+ security_group_id = join (" " , aws_security_group. default [ * ] . id )
164164}
165165
166166resource "aws_security_group_rule" "tcp_dns_egress_from_lambda" {
@@ -171,7 +171,7 @@ resource "aws_security_group_rule" "tcp_dns_egress_from_lambda" {
171171 to_port = 53
172172 protocol = " tcp"
173173 cidr_blocks = [" 0.0.0.0/0" ]
174- security_group_id = join (" " , aws_security_group. default . * . id )
174+ security_group_id = join (" " , aws_security_group. default [ * ] . id )
175175}
176176
177177resource "aws_security_group_rule" "egress_from_lambda_to_es_cluster" {
@@ -182,7 +182,7 @@ resource "aws_security_group_rule" "egress_from_lambda_to_es_cluster" {
182182 to_port = 443
183183 protocol = " tcp"
184184 source_security_group_id = var. es_security_group_id
185- security_group_id = join (" " , aws_security_group. default . * . id )
185+ security_group_id = join (" " , aws_security_group. default [ * ] . id )
186186}
187187
188188resource "aws_security_group_rule" "ingress_to_es_cluster_from_lambda" {
@@ -192,27 +192,27 @@ resource "aws_security_group_rule" "ingress_to_es_cluster_from_lambda" {
192192 from_port = 443
193193 to_port = 443
194194 protocol = " tcp"
195- source_security_group_id = join (" " , aws_security_group. default . * . id )
195+ source_security_group_id = join (" " , aws_security_group. default [ * ] . id )
196196 security_group_id = var. es_security_group_id
197197}
198198
199199resource "aws_iam_role" "default" {
200200 count = local. enabled ? 1 : 0
201201 name = local. function_name
202- assume_role_policy = join (" " , data. aws_iam_policy_document . assume_role . * . json )
202+ assume_role_policy = join (" " , data. aws_iam_policy_document . assume_role [ * ] . json )
203203 tags = module. label . tags
204204}
205205
206206resource "aws_iam_role_policy" "default" {
207207 count = local. enabled ? 1 : 0
208208 name = local. function_name
209- role = join (" " , aws_iam_role. default . * . name )
210- policy = join (" " , data. aws_iam_policy_document . default . * . json )
209+ role = join (" " , aws_iam_role. default [ * ] . name )
210+ policy = join (" " , data. aws_iam_policy_document . default [ * ] . json )
211211}
212212
213213resource "aws_iam_role_policy_attachment" "default" {
214214 count = local. enabled ? 1 : 0
215- role = join (" " , aws_iam_role. default . * . name )
215+ role = join (" " , aws_iam_role. default [ * ] . name )
216216 policy_arn = " arn:aws:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole"
217217}
218218
@@ -227,14 +227,14 @@ resource "aws_lambda_permission" "default" {
227227 count = local. enabled ? 1 : 0
228228 statement_id = " AllowExecutionFromCloudWatch"
229229 action = " lambda:InvokeFunction"
230- function_name = join (" " , aws_lambda_function. default . * . arn )
230+ function_name = join (" " , aws_lambda_function. default [ * ] . arn )
231231 principal = " events.amazonaws.com"
232- source_arn = join (" " , aws_cloudwatch_event_rule. default . * . arn )
232+ source_arn = join (" " , aws_cloudwatch_event_rule. default [ * ] . arn )
233233}
234234
235235resource "aws_cloudwatch_event_target" "default" {
236236 count = local. enabled ? 1 : 0
237237 target_id = local. function_name
238- rule = join (" " , aws_cloudwatch_event_rule. default . * . name )
239- arn = join (" " , aws_lambda_function. default . * . arn )
238+ rule = join (" " , aws_cloudwatch_event_rule. default [ * ] . name )
239+ arn = join (" " , aws_lambda_function. default [ * ] . arn )
240240}
0 commit comments