Skip to content

Commit 2eea40c

Browse files
committed
NRL-853 use different tags for S3 an dynamodb resources
1 parent 179eeb9 commit 2eea40c

File tree

4 files changed

+16
-19
lines changed

4 files changed

+16
-19
lines changed

terraform/account-wide-infrastructure/dev/aws-backups.tf

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ variable "destination_vault_arn" {
99
default = ""
1010
}
1111

12-
#data "aws_arn" "destination_vault_arn" {
13-
# arn = var.destination_vault_arn
14-
#}
12+
data "aws_arn" "destination_vault_arn" {
13+
arn = var.destination_vault_arn
14+
}
1515

1616
data "aws_secretsmanager_secret" "backup-account-secret" {
1717
name = "nhsd-nrlf--dev--test-backup-account-id"
@@ -138,11 +138,11 @@ module "source" {
138138
source = "../modules/backup-source"
139139

140140
backup_copy_vault_account_id = local.destination_account_id
141-
# backup_copy_vault_arn = data.aws_arn.destination_vault_arn.arn
142-
environment_name = local.environment_name
143-
bootstrap_kms_key_arn = aws_kms_key.backup_notifications.arn
144-
project_name = local.project_name
145-
reports_bucket = aws_s3_bucket.backup_reports.bucket
141+
backup_copy_vault_arn = data.aws_arn.destination_vault_arn.arn
142+
environment_name = local.environment_name
143+
bootstrap_kms_key_arn = aws_kms_key.backup_notifications.arn
144+
project_name = local.project_name
145+
reports_bucket = aws_s3_bucket.backup_reports.bucket
146146
#terraform_role_arn = data.aws_caller_identity.current.arn
147147
terraform_role_arn = "arn:aws:iam::${var.assume_account}:role/${var.assume_role}"
148148

@@ -164,7 +164,7 @@ module "source" {
164164
"schedule" : "cron(0 0 * * ? *)"
165165
}
166166
],
167-
"selection_tag" : "NHSE-Enable-Backup"
167+
"selection_tag" : "NHSE-Enable-S3-Backup"
168168
}
169169

170170
backup_plan_config_dynamodb = {
@@ -184,6 +184,6 @@ module "source" {
184184
"schedule" : "cron(0 0 * * ? *)"
185185
}
186186
],
187-
"selection_tag" : "NHSE-Enable-Backup"
187+
"selection_tag" : "NHSE-Enable-DDB-Backup"
188188
}
189189
}

terraform/account-wide-infrastructure/modules/permissions-store-bucket/s3.tf

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,10 @@ resource "aws_s3_bucket" "authorization-store" {
22
bucket = "${var.name_prefix}-authorization-store"
33
force_destroy = var.enable_bucket_force_destroy
44

5-
tags = var.enable_backups ? {
6-
Name = "authorization store"
7-
Environment = "${var.name_prefix}"
8-
NHSE-Enable-Backup = "true"
9-
} : {
10-
Name = "authorization store"
11-
Environment = "${var.name_prefix}"
5+
tags = {
6+
Name = "authorization store"
7+
Environment = "${var.name_prefix}"
8+
NHSE-Enable-S3-Backup = "${var.enable_backups}"
129
}
1310
}
1411

terraform/account-wide-infrastructure/modules/pointers-table/dynamodb.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,5 +52,5 @@ resource "aws_dynamodb_table" "pointers" {
5252
enabled = var.enable_pitr
5353
}
5454

55-
tags = var.enable_backups ? { NHSE-Enable-Backup = "true" } : {}
55+
tags = { NHSE-Enable-DDB-Backup = "${var.enable_backups}" }
5656
}

terraform/account-wide-infrastructure/modules/truststore-bucket/s3.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
resource "aws_s3_bucket" "api_truststore" {
22
bucket = "${var.name_prefix}-api-truststore"
33
force_destroy = var.enable_bucket_force_destroy
4-
tags = var.enable_backups ? { NHSE-Enable-Backup = "true" } : {}
4+
tags = { NHSE-Enable-S3-Backup = "${var.enable_backups}" }
55
}
66

77
resource "aws_s3_bucket_policy" "api_truststore_bucket_policy" {

0 commit comments

Comments
 (0)