@@ -21,16 +21,14 @@ locals {
2121 short_prefix = " ${ var . project_short_name } -${ local . env } "
2222 batch_prefix = " immunisation-batch-${ local . env } "
2323 config_env = local. environment == " prod" ? " prod" : " dev"
24- config_bucket_env = local. environment == " prod" ? " prod" : " internal-dev"
2524
2625 root_domain = " ${ local . config_env } .vds.platform.nhs.uk"
2726 project_domain_name = data. aws_route53_zone . project_zone . name
2827 service_domain_name = " ${ local . env } .${ local . project_domain_name } "
2928
30- # For now, only create the config bucket in internal-dev and prod as we only have one Redis instance per account.
31- create_config_bucket = local. environment == local. config_bucket_env
32- config_bucket_arn = local. create_config_bucket ? aws_s3_bucket. batch_config_bucket [0 ]. arn : data. aws_s3_bucket . existing_config_bucket [0 ]. arn
33- config_bucket_name = local. create_config_bucket ? aws_s3_bucket. batch_config_bucket [0 ]. bucket : data. aws_s3_bucket . existing_config_bucket [0 ]. bucket
29+ config_bucket_arn = aws_s3_bucket. batch_config_bucket . arn
30+ config_bucket_name = aws_s3_bucket. batch_config_bucket . bucket
31+
3432
3533 # Public subnet - The subnet has a direct route to an internet gateway. Resources in a public subnet can access the public internet.
3634 # public_subnet_ids = [for k, v in data.aws_route.internet_traffic_route_by_subnet : k if length(v.gateway_id) > 0]
@@ -88,13 +86,6 @@ data "aws_security_group" "existing_securitygroup" {
8886 }
8987}
9088
91- data "aws_s3_bucket" "existing_config_bucket" {
92- # For now, look up the internal-dev bucket during int, ref and PR branch deploys.
93- count = local. create_config_bucket ? 0 : 1
94-
95- bucket = " imms-${ local . config_bucket_env } -supplier-config"
96- }
97-
9889data "aws_kms_key" "existing_lambda_encryption_key" {
9990 key_id = " alias/imms-batch-lambda-env-encryption"
10091}
0 commit comments