Skip to content
This repository was archived by the owner on Apr 18, 2020. It is now read-only.

Commit 2bd685b

Browse files
committed
Fixed module paths
1 parent 561b7e9 commit 2bd685b

File tree

3 files changed

+18
-18
lines changed

3 files changed

+18
-18
lines changed

data/lambda/package.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
2-
"name": "terraform-aws-github-ci-aws-lambda",
2+
"name": "terraform-aws-github-ci-data-lambda",
33
"version": "0.0.0",
44
"description": "A GitHub CI server using AWS CodeBuild",
55
"keywords": [],

modules/status/main.tf

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@
2424

2525
# data.template_file.lambda_iam_policy.rendered
2626
data "template_file" "lambda_iam_policy" {
27-
template = "${file("${path.root}/data/iam/policies/lambda.json")}"
27+
template = "${file("${path.module}/../../data/iam/policies/lambda.json")}"
2828

2929
vars {
3030
bucket = "${var.bucket}"
@@ -37,25 +37,25 @@ data "template_file" "lambda_iam_policy" {
3737

3838
# aws_iam_role.lambda
3939
resource "aws_iam_role" "lambda" {
40-
name = "${var.namespace}-lambda-cloudwatch"
40+
name = "${var.namespace}-lambda-status"
4141
path = "/${var.namespace}/lambda/"
4242

4343
assume_role_policy = "${
44-
file("${path.root}/data/iam/policies/assume-role/lambda.json")
44+
file("${path.module}/../../data/iam/policies/assume-role/lambda.json")
4545
}"
4646
}
4747

4848
# aws_iam_policy.lambda
4949
resource "aws_iam_policy" "lambda" {
50-
name = "${var.namespace}-lambda-cloudwatch"
50+
name = "${var.namespace}-lambda-status"
5151
path = "/${var.namespace}/lambda/"
5252

5353
policy = "${data.template_file.lambda_iam_policy.rendered}"
5454
}
5555

5656
# aws_iam_policy_attachment.lambda
5757
resource "aws_iam_policy_attachment" "lambda" {
58-
name = "${var.namespace}-lambda-cloudwatch"
58+
name = "${var.namespace}-lambda-status"
5959

6060
policy_arn = "${aws_iam_policy.lambda.arn}"
6161
roles = ["${aws_iam_role.lambda.id}"]
@@ -70,7 +70,7 @@ resource "aws_cloudwatch_event_rule" "_" {
7070
name = "${var.namespace}-status"
7171

7272
event_pattern = "${
73-
file("${path.root}/data/cloudwatch/rules/codebuild.json")
73+
file("${path.module}/../../data/cloudwatch/rules/codebuild.json")
7474
}"
7575
}
7676

@@ -89,12 +89,12 @@ resource "aws_lambda_function" "_" {
8989
function_name = "${var.namespace}-status"
9090
role = "${aws_iam_role.lambda.arn}"
9191
runtime = "nodejs6.10"
92-
filename = "${path.root}/data/lambda/dist/status.zip"
92+
filename = "${path.module}/../../data/lambda/dist/status.zip"
9393
handler = "index.default"
9494
timeout = 10
9595

9696
source_code_hash = "${
97-
base64sha256(file("${path.root}/data/lambda/dist/status.zip"))
97+
base64sha256(file("${path.module}/../../data/lambda/dist/status.zip"))
9898
}"
9999

100100
environment {

modules/webhook/main.tf

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ data "aws_region" "_" {
3838

3939
# data.template_file.lambda_iam_policy.rendered
4040
data "template_file" "lambda_iam_policy" {
41-
template = "${file("${path.root}/data/iam/policies/lambda.json")}"
41+
template = "${file("${path.module}/../../data/iam/policies/lambda.json")}"
4242

4343
vars {
4444
bucket = "${var.bucket}"
@@ -47,7 +47,7 @@ data "template_file" "lambda_iam_policy" {
4747

4848
# data.template_file.webhook_iam_policy.rendered
4949
data "template_file" "webhook_iam_policy" {
50-
template = "${file("${path.root}/data/iam/policies/webhook.json")}"
50+
template = "${file("${path.module}/../../data/iam/policies/webhook.json")}"
5151

5252
vars {
5353
topic = "${aws_sns_topic._.arn}"
@@ -60,25 +60,25 @@ data "template_file" "webhook_iam_policy" {
6060

6161
# aws_iam_role.lambda
6262
resource "aws_iam_role" "lambda" {
63-
name = "${var.namespace}-lambda-sns"
63+
name = "${var.namespace}-lambda-webhook"
6464
path = "/${var.namespace}/lambda/"
6565

6666
assume_role_policy = "${
67-
file("${path.root}/data/iam/policies/assume-role/lambda.json")
67+
file("${path.module}/../../data/iam/policies/assume-role/lambda.json")
6868
}"
6969
}
7070

7171
# aws_iam_policy.lambda
7272
resource "aws_iam_policy" "lambda" {
73-
name = "${var.namespace}-lambda-sns"
73+
name = "${var.namespace}-lambda-webhook"
7474
path = "/${var.namespace}/lambda/"
7575

7676
policy = "${data.template_file.lambda_iam_policy.rendered}"
7777
}
7878

7979
# aws_iam_policy_attachment.lambda
8080
resource "aws_iam_policy_attachment" "lambda" {
81-
name = "${var.namespace}-lambda-sns"
81+
name = "${var.namespace}-lambda-webhook"
8282

8383
policy_arn = "${aws_iam_policy.lambda.arn}"
8484
roles = ["${aws_iam_role.lambda.id}"]
@@ -89,7 +89,7 @@ resource "aws_iam_policy_attachment" "lambda" {
8989
# aws_iam_user._
9090
resource "aws_iam_user" "_" {
9191
name = "${var.namespace}-webhook"
92-
path = "/${var.namespace}/sns/"
92+
path = "/${var.namespace}/"
9393
}
9494

9595
# aws_iam_access_key._
@@ -130,12 +130,12 @@ resource "aws_lambda_function" "_" {
130130
function_name = "${var.namespace}-webhook"
131131
role = "${aws_iam_role.lambda.arn}"
132132
runtime = "nodejs6.10"
133-
filename = "${path.root}/data/lambda/dist/webhook.zip"
133+
filename = "${path.module}/../../data/lambda/dist/webhook.zip"
134134
handler = "index.default"
135135
timeout = 10
136136

137137
source_code_hash = "${
138-
base64sha256(file("${path.root}/data/lambda/dist/webhook.zip"))
138+
base64sha256(file("${path.module}/../../data/lambda/dist/webhook.zip"))
139139
}"
140140

141141
environment {

0 commit comments

Comments
 (0)