Skip to content

Commit 18d0278

Browse files
committed
corrected merge conflict
1 parent ba179ba commit 18d0278

File tree

2 files changed

+4
-62
lines changed

2 files changed

+4
-62
lines changed

terraform/main.tf

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -97,6 +97,10 @@ data "aws_kms_key" "existing_kinesis_encryption_key" {
9797
key_id = "alias/imms-batch-kinesis-stream-encryption"
9898
}
9999

100+
data "aws_kms_key" "existing_id_sync_sqs_encryption_key" {
101+
key_id = "alias/imms-event-id-sync-encryption"
102+
}
103+
100104
data "aws_kms_key" "mesh_s3_encryption_key" {
101105
key_id = "alias/local-immunisation-mesh"
102106
}

terraform/variables.tf

Lines changed: 0 additions & 62 deletions
Original file line numberDiff line numberDiff line change
@@ -59,65 +59,3 @@ locals {
5959
# Private subnet - The subnet does not have a direct route to an internet gateway. Resources in a private subnet require a NAT device to access the public internet.
6060
private_subnet_ids = [for k, v in data.aws_route.internet_traffic_route_by_subnet : k if length(v.nat_gateway_id) > 0]
6161
}
62-
63-
check "private_subnets" {
64-
assert {
65-
condition = length(local.private_subnet_ids) > 0
66-
error_message = "No private subnets with internet access found in VPC ${data.aws_vpc.default.id}"
67-
}
68-
}
69-
70-
data "aws_vpc" "default" {
71-
default = true
72-
}
73-
74-
data "aws_subnets" "all" {
75-
filter {
76-
name = "vpc-id"
77-
values = [data.aws_vpc.default.id]
78-
}
79-
}
80-
81-
data "aws_route_table" "route_table_by_subnet" {
82-
for_each = toset(data.aws_subnets.all.ids)
83-
84-
subnet_id = each.value
85-
}
86-
87-
data "aws_route" "internet_traffic_route_by_subnet" {
88-
for_each = data.aws_route_table.route_table_by_subnet
89-
90-
route_table_id = each.value.id
91-
destination_cidr_block = "0.0.0.0/0"
92-
}
93-
94-
data "aws_kms_key" "existing_s3_encryption_key" {
95-
key_id = "alias/imms-batch-s3-shared-key"
96-
}
97-
98-
data "aws_kms_key" "existing_dynamo_encryption_key" {
99-
key_id = "alias/imms-event-dynamodb-encryption"
100-
}
101-
102-
data "aws_elasticache_cluster" "existing_redis" {
103-
cluster_id = "immunisation-redis-cluster"
104-
}
105-
106-
data "aws_security_group" "existing_securitygroup" {
107-
filter {
108-
name = "group-name"
109-
values = ["immunisation-security-group"]
110-
}
111-
}
112-
113-
data "aws_kms_key" "existing_lambda_encryption_key" {
114-
key_id = "alias/imms-batch-lambda-env-encryption"
115-
}
116-
117-
data "aws_kms_key" "existing_kinesis_encryption_key" {
118-
key_id = "alias/imms-batch-kinesis-stream-encryption"
119-
}
120-
121-
data "aws_kms_key" "existing_id_sync_sqs_encryption_key" {
122-
key_id = "alias/imms-event-id-sync-encryption"
123-
}

0 commit comments

Comments
 (0)