Skip to content

Commit d2140fe

Browse files
tf Lambda name prefix-ed by workspace
* terraform code cleanup * lambda name fix for workspace
1 parent 00a5bf6 commit d2140fe

File tree

6 files changed

+7
-15
lines changed

6 files changed

+7
-15
lines changed

infrastructure/modules/lambda/lambda.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,8 @@ resource "aws_lambda_function" "eligibility_signposting_lambda" {
1515
environment {
1616
variables = {
1717
PERSON_TABLE_NAME = var.eligibility_status_table_name,
18-
RULES_BUCKET_NAME = var.eligibility_rules_bucket_name,
19-
ENV = var.environment
18+
RULES_BUCKET_NAME = var.eligibility_rules_bucket_name,
19+
ENV = var.environment
2020
}
2121
}
2222
vpc_config {

infrastructure/modules/s3/kms.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
resource "aws_kms_key" "storage_bucket_cmk" {
2-
description = "${var.bucket_name} Master Key"
2+
description = "${terraform.workspace == "default" ? "" : "${terraform.workspace}-"}${var.bucket_name} Master Key"
33
deletion_window_in_days = 14
44
is_enabled = true
55
enable_key_rotation = true
66
}
77

88
resource "aws_kms_alias" "storage_bucket_cmk" {
9-
name = "alias/${var.project_name}-${var.bucket_name}-cmk"
9+
name = "alias/${terraform.workspace == "default" ? "" : "${terraform.workspace}-"}${var.bucket_name}-cmk"
1010
target_key_id = aws_kms_key.storage_bucket_cmk.key_id
1111
}

infrastructure/stacks/_shared/default_variables.tf

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,3 @@ variable "default_aws_region" {
1515
description = "Default AWS region"
1616
type = string
1717
}
18-
19-
variable "iam_owner_workspace" {
20-
description = "The workspace that owns and creates the IAM role"
21-
type = string
22-
default = "default"
23-
}

infrastructure/stacks/_shared/locals.tf

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,4 @@ locals {
3939
role_arn_prod = "arn:aws:iam::232116723729:role/db-system-worker"
4040

4141
selected_role_arn = var.environment == "prod" ? local.role_arn_prod : local.role_arn_pre
42-
43-
is_iam_owner = terraform.workspace == var.iam_owner_workspace
4442
}

infrastructure/stacks/api-layer/iam_roles.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,14 +28,14 @@ data "aws_iam_policy_document" "dps_assume_role" {
2828

2929

3030
resource "aws_iam_role" "eligibility_lambda_role" {
31-
name = "eligibility_lambda-role"
31+
name = "eligibility_lambda-role${terraform.workspace == "default" ? "" : "-${terraform.workspace}"}"
3232
assume_role_policy = data.aws_iam_policy_document.lambda_assume_role.json
3333
permissions_boundary = data.aws_iam_policy.permissions_boundary.arn
3434
}
3535

3636

3737
resource "aws_iam_role" "write_access_role" {
38-
name = "external-write-role"
38+
name = "external-write-role-${terraform.workspace == "default" ? "" : "-${terraform.workspace}"}"
3939
assume_role_policy = data.aws_iam_policy_document.dps_assume_role.json
4040
permissions_boundary = data.aws_iam_policy.permissions_boundary.arn
4141
}

infrastructure/stacks/api-layer/lambda.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ module "eligibility_signposting_lambda_function" {
1515
eligibility_lambda_role_arn = aws_iam_role.eligibility_lambda_role.arn
1616
workspace = local.workspace
1717
environment = var.environment
18-
lambda_func_name = "eligibility_signposting_api"
18+
lambda_func_name = "${terraform.workspace == "default" ? "" : "${terraform.workspace}-"}eligibility_signposting_api"
1919
security_group_ids = [data.aws_security_group.main_sg.id]
2020
vpc_intra_subnets = [for v in data.aws_subnet.private_subnets : v.id]
2121
file_name = "../../../dist/lambda.zip"

0 commit comments

Comments
 (0)