File tree Expand file tree Collapse file tree 6 files changed +7
-15
lines changed
Expand file tree Collapse file tree 6 files changed +7
-15
lines changed Original file line number Diff line number Diff line change @@ -15,8 +15,8 @@ resource "aws_lambda_function" "eligibility_signposting_lambda" {
1515 environment {
1616 variables = {
1717 PERSON_TABLE_NAME = var.eligibility_status_table_name,
18- RULES_BUCKET_NAME = var.eligibility_rules_bucket_name,
19- ENV = var.environment
18+ RULES_BUCKET_NAME = var.eligibility_rules_bucket_name,
19+ ENV = var.environment
2020 }
2121 }
2222 vpc_config {
Original file line number Diff line number Diff line change 11resource "aws_kms_key" "storage_bucket_cmk" {
2- description = " ${ var . bucket_name } Master Key"
2+ description = " ${ terraform . workspace == " default " ? " " : " ${ terraform . workspace } - " } ${ var . bucket_name } Master Key"
33 deletion_window_in_days = 14
44 is_enabled = true
55 enable_key_rotation = true
66}
77
88resource "aws_kms_alias" "storage_bucket_cmk" {
9- name = " alias/${ var . project_name } - ${ var . bucket_name } -cmk"
9+ name = " alias/${ terraform . workspace == " default " ? " " : " ${ terraform . workspace } - " } ${ var . bucket_name } -cmk"
1010 target_key_id = aws_kms_key. storage_bucket_cmk . key_id
1111}
Original file line number Diff line number Diff line change @@ -15,9 +15,3 @@ variable "default_aws_region" {
1515 description = " Default AWS region"
1616 type = string
1717}
18-
19- variable "iam_owner_workspace" {
20- description = " The workspace that owns and creates the IAM role"
21- type = string
22- default = " default"
23- }
Original file line number Diff line number Diff line change @@ -39,6 +39,4 @@ locals {
3939 role_arn_prod = " arn:aws:iam::232116723729:role/db-system-worker"
4040
4141 selected_role_arn = var. environment == " prod" ? local. role_arn_prod : local. role_arn_pre
42-
43- is_iam_owner = terraform. workspace == var. iam_owner_workspace
4442}
Original file line number Diff line number Diff line change @@ -28,14 +28,14 @@ data "aws_iam_policy_document" "dps_assume_role" {
2828
2929
3030resource "aws_iam_role" "eligibility_lambda_role" {
31- name = " eligibility_lambda-role"
31+ name = " eligibility_lambda-role${ terraform . workspace == " default " ? " " : " - ${ terraform . workspace } " } "
3232 assume_role_policy = data. aws_iam_policy_document . lambda_assume_role . json
3333 permissions_boundary = data. aws_iam_policy . permissions_boundary . arn
3434}
3535
3636
3737resource "aws_iam_role" "write_access_role" {
38- name = " external-write-role"
38+ name = " external-write-role- ${ terraform . workspace == " default " ? " " : " - ${ terraform . workspace } " } "
3939 assume_role_policy = data. aws_iam_policy_document . dps_assume_role . json
4040 permissions_boundary = data. aws_iam_policy . permissions_boundary . arn
4141}
Original file line number Diff line number Diff line change @@ -15,7 +15,7 @@ module "eligibility_signposting_lambda_function" {
1515 eligibility_lambda_role_arn = aws_iam_role. eligibility_lambda_role . arn
1616 workspace = local. workspace
1717 environment = var. environment
18- lambda_func_name = " eligibility_signposting_api"
18+ lambda_func_name = " ${ terraform . workspace == " default " ? " " : " ${ terraform . workspace } - " } eligibility_signposting_api"
1919 security_group_ids = [data . aws_security_group . main_sg . id ]
2020 vpc_intra_subnets = [for v in data . aws_subnet . private_subnets : v . id ]
2121 file_name = " ../../../dist/lambda.zip"
You can’t perform that action at this time.
0 commit comments