Conversation
| } | ||
|
|
||
| # TODO - remove and use the key we manage in this Terraform workspace | ||
| data "aws_kms_key" "existing_lambda_env_encryption" { |
There was a problem hiding this comment.
Seemed safest to add this in, but I'm not actually sure it's even used. The Lambda functions all seem to use the default KMS key for env var encryption.
| source_arn = "arn:aws:s3:::local-immunisation-mesh" | ||
| } | ||
|
|
||
| # TODO - This is scoped to the bucket, so is overwritten by each deployment |
There was a problem hiding this comment.
Create ticket for this
| retention_in_days = 30 | ||
| } | ||
|
|
||
| # TODO - This is global, so is overwritten by each deployment - move to infra Terraform? |
There was a problem hiding this comment.
Create ticket for this
| project_domain_name = data.aws_route53_zone.project_zone.name | ||
| service_domain_name = "${local.env}.${local.project_domain_name}" | ||
|
|
||
| # For now, only create the config bucket in internal-dev and prod as we only have one Redis instance per account. |
There was a problem hiding this comment.
Create ticket for a better fix - if we didn't use a whole Redis instance for config, we could have one bucket per instance of the API
…orm. Add missing BatchGetItem permission for testing in non-prod.
4fe3286 to
1773d5f
Compare
|
Generally looks really good. Sonar reported some security hotspots maybe it's worth looking into those or resolving them later. Also the docker provider is pinned to 3.0.2 in main.tf in both infra and terraform folders. Might be the cause of the issues we are seeing with debendabot
|
|



Summary
Main changes:
dynamodb:BatchGetItempermission to delta access role in non-prod environmentsterraform fmtBefore merging, we'll need to import various resources into Terraform state:
Reviews Required
Review Checklist
ℹ️ This section is to be filled in by the reviewer.