Skip to content

Commit 315698d

Browse files
committed
Remove platform_feature_enabled input
1 parent 4df7772 commit 315698d

File tree

5 files changed

+38
-47
lines changed

5 files changed

+38
-47
lines changed

buckets.tf

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
module "truefoundry_bucket" {
2-
count = var.platform_feature_enabled ? var.feature_blob_storage_enabled ? 1 : 0 : 0
2+
count = var.feature_blob_storage_enabled ? 1 : 0
33
source = "terraform-aws-modules/s3-bucket/aws"
44
version = "3.15.0"
55

@@ -72,4 +72,4 @@ module "truefoundry_bucket" {
7272
max_age_seconds = 3000
7373
}
7474
]
75-
}
75+
}

iam.tf

+23-23
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
data "aws_iam_policy_document" "truefoundry_platform_feature_s3_policy_document" {
2-
count = var.platform_feature_enabled ? var.feature_blob_storage_enabled ? 1 : 0 : 0
2+
count = var.feature_blob_storage_enabled ? 1 : 0
33
statement {
44
effect = "Allow"
55
actions = [
@@ -14,7 +14,7 @@ data "aws_iam_policy_document" "truefoundry_platform_feature_s3_policy_document"
1414
}
1515

1616
data "aws_iam_policy_document" "truefoundry_platform_feature_parameter_store_policy_document" {
17-
count = var.platform_feature_enabled ? var.feature_parameter_store_enabled ? 1 : 0 : 0
17+
count = var.feature_parameter_store_enabled ? 1 : 0
1818
statement {
1919
effect = "Allow"
2020
actions = [
@@ -32,7 +32,7 @@ data "aws_iam_policy_document" "truefoundry_platform_feature_parameter_store_pol
3232
}
3333

3434
data "aws_iam_policy_document" "truefoundry_platform_feature_secrets_manager_policy_document" {
35-
count = var.platform_feature_enabled ? var.feature_secrets_manager_enabled ? 1 : 0 : 0
35+
count = var.feature_secrets_manager_enabled ? 1 : 0
3636
statement {
3737
effect = "Allow"
3838
actions = [
@@ -51,7 +51,7 @@ data "aws_iam_policy_document" "truefoundry_platform_feature_secrets_manager_pol
5151
}
5252

5353
data "aws_iam_policy_document" "truefoundry_platform_feature_ecr_policy_document" {
54-
count = var.platform_feature_enabled ? var.feature_docker_registry_enabled ? 1 : 0 : 0
54+
count = var.feature_docker_registry_enabled ? 1 : 0
5555
statement {
5656
effect = "Allow"
5757
actions = [
@@ -94,7 +94,7 @@ data "aws_iam_policy_document" "truefoundry_platform_feature_ecr_policy_document
9494
}
9595

9696
data "aws_iam_policy_document" "truefoundry_platform_feature_cluster_integration_policy_document" {
97-
count = var.platform_feature_enabled ? var.feature_cluster_integration_enabled ? 1 : 0 : 0
97+
count = var.feature_cluster_integration_enabled ? 1 : 0
9898
statement {
9999
effect = "Allow"
100100
actions = [
@@ -141,31 +141,31 @@ data "aws_iam_policy_document" "truefoundry_platform_feature_cluster_integration
141141

142142

143143
resource "aws_iam_policy" "truefoundry_platform_feature_s3_policy" {
144-
count = var.platform_feature_enabled ? var.feature_blob_storage_enabled ? 1 : 0 : 0
144+
count = var.feature_blob_storage_enabled ? 1 : 0
145145
name_prefix = "${local.truefoundry_unique_name}-s3-access"
146146
description = "IAM policy for TrueFoundry user for platform features blob storage"
147147
policy = data.aws_iam_policy_document.truefoundry_platform_feature_s3_policy_document[0].json
148148
tags = local.tags
149149
}
150150

151151
resource "aws_iam_policy" "truefoundry_platform_feature_parameter_store_policy" {
152-
count = var.platform_feature_enabled ? var.feature_parameter_store_enabled ? 1 : 0 : 0
152+
count = var.feature_parameter_store_enabled ? 1 : 0
153153
name_prefix = "${local.truefoundry_unique_name}-parameter-store-access"
154154
description = "IAM policy for TrueFoundry user for platform features Secrets manager"
155155
policy = data.aws_iam_policy_document.truefoundry_platform_feature_parameter_store_policy_document[0].json
156156
tags = local.tags
157157
}
158158

159159
resource "aws_iam_policy" "truefoundry_platform_feature_secrets_manager_policy" {
160-
count = var.platform_feature_enabled ? var.feature_secrets_manager_enabled ? 1 : 0 : 0
160+
count = var.feature_secrets_manager_enabled ? 1 : 0
161161
name_prefix = "${local.truefoundry_unique_name}-secrets-manager-access"
162162
description = "IAM policy for TrueFoundry user for platform features Secrets manager"
163163
policy = data.aws_iam_policy_document.truefoundry_platform_feature_secrets_manager_policy_document[0].json
164164
tags = local.tags
165165
}
166166

167167
resource "aws_iam_policy" "truefoundry_platform_feature_ecr_policy" {
168-
count = var.platform_feature_enabled ? var.feature_docker_registry_enabled ? 1 : 0 : 0
168+
count = var.feature_docker_registry_enabled ? 1 : 0
169169
name_prefix = "${local.truefoundry_unique_name}-ecr-access"
170170
description = "IAM policy for TrueFoundry user for platform features docker registry"
171171
policy = data.aws_iam_policy_document.truefoundry_platform_feature_ecr_policy_document[0].json
@@ -174,7 +174,7 @@ resource "aws_iam_policy" "truefoundry_platform_feature_ecr_policy" {
174174

175175

176176
resource "aws_iam_policy" "truefoundry_platform_feature_cluster_integration_policy" {
177-
count = var.platform_feature_enabled ? var.feature_cluster_integration_enabled ? 1 : 0 : 0
177+
count = var.feature_cluster_integration_enabled ? 1 : 0
178178
name_prefix = "${local.truefoundry_unique_name}-cluster-integration-access"
179179
description = "IAM policy for TrueFoundry user for platform features cluster integration"
180180
policy = data.aws_iam_policy_document.truefoundry_platform_feature_cluster_integration_policy_document[0].json
@@ -186,7 +186,7 @@ resource "aws_iam_policy" "truefoundry_platform_feature_cluster_integration_poli
186186
################################################################################
187187

188188
resource "aws_iam_role" "truefoundry_platform_feature_iam_role" {
189-
count = var.platform_feature_enabled ? 1 : 0
189+
count = var.platform_role_enable_override ? 1 : 0
190190
name = var.platform_role_enable_override ? var.platform_role_override_name : null
191191
description = "IAM role for TrueFoundry platform to access S3 bucket, SSM, ECR and EKS"
192192
name_prefix = var.platform_role_enable_override ? null : "${local.truefoundry_unique_name}-iam-role-"
@@ -208,31 +208,31 @@ resource "aws_iam_role" "truefoundry_platform_feature_iam_role" {
208208
}
209209

210210
resource "aws_iam_role_policy_attachment" "truefoundry_platform_s3_policy_attachment" {
211-
count = var.platform_feature_enabled ? var.feature_blob_storage_enabled ? 1 : 0 : 0
211+
count = var.feature_blob_storage_enabled ? 1 : 0
212212
role = aws_iam_role.truefoundry_platform_feature_iam_role[0].name
213213
policy_arn = aws_iam_policy.truefoundry_platform_feature_s3_policy[0].arn
214214
}
215215

216216
resource "aws_iam_role_policy_attachment" "truefoundry_platform_parameter_store_policy_attachment" {
217-
count = var.platform_feature_enabled ? var.feature_parameter_store_enabled ? 1 : 0 : 0
217+
count = var.feature_parameter_store_enabled ? 1 : 0
218218
role = aws_iam_role.truefoundry_platform_feature_iam_role[0].name
219219
policy_arn = aws_iam_policy.truefoundry_platform_feature_parameter_store_policy[0].arn
220220
}
221221

222222
resource "aws_iam_role_policy_attachment" "truefoundry_platform_secrets_manager_policy_attachment" {
223-
count = var.platform_feature_enabled ? var.feature_secrets_manager_enabled ? 1 : 0 : 0
223+
count = var.feature_secrets_manager_enabled ? 1 : 0
224224
role = aws_iam_role.truefoundry_platform_feature_iam_role[0].name
225225
policy_arn = aws_iam_policy.truefoundry_platform_feature_secrets_manager_policy[0].arn
226226
}
227227

228228
resource "aws_iam_role_policy_attachment" "truefoundry_platform_ecr_policy_attachment" {
229-
count = var.platform_feature_enabled ? var.feature_docker_registry_enabled ? 1 : 0 : 0
229+
count = var.feature_docker_registry_enabled ? 1 : 0
230230
role = aws_iam_role.truefoundry_platform_feature_iam_role[0].name
231231
policy_arn = aws_iam_policy.truefoundry_platform_feature_ecr_policy[0].arn
232232
}
233233

234234
resource "aws_iam_role_policy_attachment" "truefoundry_platform_cluster_integration_policy_attachment" {
235-
count = var.platform_feature_enabled ? var.feature_cluster_integration_enabled ? 1 : 0 : 0
235+
count = var.feature_cluster_integration_enabled ? 1 : 0
236236
role = aws_iam_role.truefoundry_platform_feature_iam_role[0].name
237237
policy_arn = aws_iam_policy.truefoundry_platform_feature_cluster_integration_policy[0].arn
238238
}
@@ -242,7 +242,7 @@ resource "aws_iam_role_policy_attachment" "truefoundry_platform_cluster_integrat
242242
# IAM user
243243
################################################################################
244244
resource "aws_iam_user" "truefoundry_platform_user" {
245-
count = var.platform_feature_enabled && var.platform_user_enabled ? 1 : 0
245+
count = var.platform_user_enabled ? 1 : 0
246246

247247
name = var.platform_user_name_override_enabled ? var.platform_user_override_name : "${local.truefoundry_unique_name}-user"
248248
path = "/truefoundry/"
@@ -251,37 +251,37 @@ resource "aws_iam_user" "truefoundry_platform_user" {
251251
}
252252

253253
resource "aws_iam_access_key" "truefoundry_platform_user_keys" {
254-
count = var.platform_feature_enabled && var.platform_user_enabled ? 1 : 0
254+
count = var.platform_user_enabled ? 1 : 0
255255

256256
user = aws_iam_user.truefoundry_platform_user[0].name
257257
}
258258

259259
resource "aws_iam_user_policy_attachment" "truefoundry_platform_user_s3_policy_attachment" {
260-
count = var.platform_feature_enabled ? (var.feature_blob_storage_enabled && var.platform_user_enabled) ? 1 : 0 : 0
260+
count = (var.feature_blob_storage_enabled && var.platform_user_enabled) ? 1 : 0
261261
user = aws_iam_user.truefoundry_platform_user[0].name
262262
policy_arn = aws_iam_policy.truefoundry_platform_feature_s3_policy[0].arn
263263
}
264264

265265
resource "aws_iam_user_policy_attachment" "truefoundry_platform_user_parameter_store_policy_attachment" {
266-
count = var.platform_feature_enabled ? (var.feature_parameter_store_enabled && var.platform_user_enabled) ? 1 : 0 : 0
266+
count = (var.feature_parameter_store_enabled && var.platform_user_enabled) ? 1 : 0
267267
user = aws_iam_user.truefoundry_platform_user[0].name
268268
policy_arn = aws_iam_policy.truefoundry_platform_feature_parameter_store_policy[0].arn
269269
}
270270

271271
resource "aws_iam_user_policy_attachment" "truefoundry_platform_user_secrets_manager_policy_attachment" {
272-
count = var.platform_feature_enabled ? (var.feature_secrets_manager_enabled && var.platform_user_enabled) ? 1 : 0 : 0
272+
count = (var.feature_secrets_manager_enabled && var.platform_user_enabled) ? 1 : 0
273273
user = aws_iam_user.truefoundry_platform_user[0].name
274274
policy_arn = aws_iam_policy.truefoundry_platform_feature_secrets_manager_policy[0].arn
275275
}
276276

277277
resource "aws_iam_user_policy_attachment" "truefoundry_platform_user_ecr_policy_attachment" {
278-
count = var.platform_feature_enabled ? (var.feature_docker_registry_enabled && var.platform_user_enabled) ? 1 : 0 : 0
278+
count = (var.feature_docker_registry_enabled && var.platform_user_enabled) ? 1 : 0
279279
user = aws_iam_user.truefoundry_platform_user[0].name
280280
policy_arn = aws_iam_policy.truefoundry_platform_feature_ecr_policy[0].arn
281281
}
282282

283283
resource "aws_iam_user_policy_attachment" "truefoundry_platform_user_cluster_integration_policy_attachment" {
284-
count = var.platform_feature_enabled ? (var.feature_cluster_integration_enabled && var.platform_user_enabled) ? 1 : 0 : 0
284+
count = (var.feature_cluster_integration_enabled && var.platform_user_enabled) ? 1 : 0
285285
user = aws_iam_user.truefoundry_platform_user[0].name
286286
policy_arn = aws_iam_policy.truefoundry_platform_feature_cluster_integration_policy[0].arn
287287
}

output.tf

+11-16
Original file line numberDiff line numberDiff line change
@@ -5,55 +5,50 @@
55
################################################################################
66
output "platform_iam_role_arn" {
77
description = "The platform IAM role arn"
8-
value = var.platform_feature_enabled ? aws_iam_role.truefoundry_platform_feature_iam_role[0].arn : ""
8+
value = aws_iam_role.truefoundry_platform_feature_iam_role[0].arn
99
}
1010

1111
output "platform_iam_role_assume_role_arns" {
1212
description = "The role arns that can assume the platform IAM role"
13-
value = var.platform_feature_enabled ? var.control_plane_roles : []
13+
value = var.control_plane_roles
1414
}
1515

1616
output "platform_iam_role_policy_arns" {
1717
description = "The platform IAM role policy arns"
1818
value = local.truefoundry_platform_policy_arns
1919
}
2020

21-
output "platform_iam_role_enabled" {
22-
description = "Flag to enable IAM role for the platform. Either this or or `platform_user_enabled` should be enabled"
23-
value = var.platform_feature_enabled
24-
}
25-
2621
################################################################################
2722
# User details
2823
################################################################################
2924

3025
output "platform_user_enabled" {
3126
description = "Flag to enable user for the platform. Either this or `platform_iam_role_enabled` should be enabled"
32-
value = var.platform_feature_enabled && var.platform_user_enabled
27+
value = var.platform_user_enabled
3328
}
3429

3530
output "platform_user_access_key" {
3631
description = "The user access key ID"
37-
value = var.platform_feature_enabled && var.platform_user_enabled ? aws_iam_access_key.truefoundry_platform_user_keys[0].id : ""
32+
value = var.platform_user_enabled ? aws_iam_access_key.truefoundry_platform_user_keys[0].id : ""
3833
}
3934

4035
output "platform_user_secret_key" {
4136
description = "The user secret key"
42-
value = var.platform_feature_enabled && var.platform_user_enabled ? aws_iam_access_key.truefoundry_platform_user_keys[0].secret : ""
37+
value = var.platform_user_enabled ? aws_iam_access_key.truefoundry_platform_user_keys[0].secret : ""
4338
sensitive = true
4439
}
4540

4641
output "platform_user_arn" {
4742
description = "The user IAM resource arn"
48-
value = var.platform_feature_enabled && var.platform_user_enabled ? aws_iam_user.truefoundry_platform_user[0].arn : ""
43+
value = var.platform_user_enabled ? aws_iam_user.truefoundry_platform_user[0].arn : ""
4944
}
5045

5146
################################################################################
5247
# Bucket details
5348
################################################################################
5449
output "platform_bucket_enabled" {
5550
description = "Flag to enable S3 bucket for the platform"
56-
value = var.platform_feature_enabled && var.feature_blob_storage_enabled
51+
value = var.feature_blob_storage_enabled
5752
}
5853

5954
output "platform_bucket_name" {
@@ -71,7 +66,7 @@ output "platform_bucket_arn" {
7166
################################################################################
7267
output "platform_ecr_enabled" {
7368
description = "Flag to enable ECR for the platform"
74-
value = var.platform_feature_enabled && var.feature_docker_registry_enabled
69+
value = var.feature_docker_registry_enabled
7570
}
7671

7772
output "platform_ecr_url" {
@@ -84,21 +79,21 @@ output "platform_ecr_url" {
8479
################################################################################
8580
output "platform_secrets_manager_enabled" {
8681
description = "Flag to enable Secrets Manager for the platform"
87-
value = var.platform_feature_enabled && var.feature_secrets_manager_enabled
82+
value = var.feature_secrets_manager_enabled
8883
}
8984

9085
################################################################################
9186
# Parameter Store details
9287
################################################################################
9388
output "platform_ssm_enabled" {
9489
description = "Flag to enable Parameter Store for the platform"
95-
value = var.platform_feature_enabled && var.feature_parameter_store_enabled
90+
value = var.feature_parameter_store_enabled
9691
}
9792

9893
################################################################################
9994
# Cluster integration details
10095
################################################################################
10196
output "platform_cluster_integration_enabled" {
10297
description = "Flag to enable cluster integration for the platform"
103-
value = var.platform_feature_enabled && var.feature_cluster_integration_enabled
98+
value = var.feature_cluster_integration_enabled
10499
}

upgrade-guide.md

+2
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,8 @@ This guide helps in migration from the old terraform modules to the new one.
1010
- `platform_user_ecr_url` to `platform_ecr_url`
1111
4. The following outputs have been removed;
1212
- `platform_iam_role_name`
13+
5. The following variables have been removed;
14+
- `platform_feature_enabled`
1315

1416
# Upgrade guide to AWS platform features module from 0.2.2 to 0.3.0
1517
1. When upgrading terraform version for platform features ensure that you are running on version `0.2.x` and the platform features is upgraded to the newer 0.3.x version.

variables.tf

-6
Original file line numberDiff line numberDiff line change
@@ -14,12 +14,6 @@ variable "aws_region" {
1414
type = string
1515
}
1616

17-
variable "platform_feature_enabled" {
18-
description = "Enable platform features like docker registry, secrets manager and blob storage"
19-
type = bool
20-
default = true
21-
}
22-
2317
################################################################################
2418
# Cluster
2519
################################################################################

0 commit comments

Comments
 (0)