Skip to content

Commit 830ea37

Browse files
[ndr-297] linting
1 parent e6d8413 commit 830ea37

File tree

1 file changed

+27
-27
lines changed

1 file changed

+27
-27
lines changed

pre_core/iam_github_dev.tf

Lines changed: 27 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -47,9 +47,9 @@ resource "aws_iam_role" "github_role_dev" {
4747
# INLINE POLICIES
4848

4949
resource "aws_iam_role_policy" "cloudtrail_dev" {
50-
count = local.is_sandbox_or_dev ? 1 : 0
51-
role = aws_iam_role.github_role_dev[0].id
52-
name = "cloudtrail"
50+
count = local.is_sandbox_or_dev ? 1 : 0
51+
role = aws_iam_role.github_role_dev[0].id
52+
name = "cloudtrail"
5353
policy = jsonencode(
5454
{
5555
Statement = [
@@ -81,9 +81,9 @@ resource "aws_iam_role_policy" "cloudtrail_dev" {
8181
}
8282

8383
resource "aws_iam_role_policy" "cloudwatch_logs_policy_dev" {
84-
count = local.is_sandbox_or_dev ? 1 : 0
85-
role = aws_iam_role.github_role_dev[0].id
86-
name = "cloudwatch_logs_policy"
84+
count = local.is_sandbox_or_dev ? 1 : 0
85+
role = aws_iam_role.github_role_dev[0].id
86+
name = "cloudwatch_logs_policy"
8787
policy = jsonencode(
8888
{
8989
Statement = [
@@ -123,9 +123,9 @@ resource "aws_iam_role_policy" "cloudwatch_logs_policy_dev" {
123123
}
124124

125125
resource "aws_iam_role_policy" "ecs_policy_dev" {
126-
count = local.is_sandbox_or_dev ? 1 : 0
127-
role = aws_iam_role.github_role_dev[0].id
128-
name = "ecs_policy"
126+
count = local.is_sandbox_or_dev ? 1 : 0
127+
role = aws_iam_role.github_role_dev[0].id
128+
name = "ecs_policy"
129129
policy = jsonencode(
130130
{
131131
Statement = [
@@ -145,9 +145,9 @@ resource "aws_iam_role_policy" "ecs_policy_dev" {
145145
}
146146

147147
resource "aws_iam_role_policy" "github_actions_waf_override_dev" {
148-
count = local.is_sandbox_or_dev ? 1 : 0
149-
role = aws_iam_role.github_role_dev[0].id
150-
name = "github_actions_waf_override"
148+
count = local.is_sandbox_or_dev ? 1 : 0
149+
role = aws_iam_role.github_role_dev[0].id
150+
name = "github_actions_waf_override"
151151
policy = jsonencode(
152152
{
153153
Statement = [
@@ -163,9 +163,9 @@ resource "aws_iam_role_policy" "github_actions_waf_override_dev" {
163163
}
164164

165165
resource "aws_iam_role_policy" "lambda_layer_policy_dev" {
166-
count = local.is_sandbox_or_dev ? 1 : 0
167-
role = aws_iam_role.github_role_dev[0].id
168-
name = "lambda_layer_policy"
166+
count = local.is_sandbox_or_dev ? 1 : 0
167+
role = aws_iam_role.github_role_dev[0].id
168+
name = "lambda_layer_policy"
169169
policy = jsonencode(
170170
{
171171
Statement = [
@@ -191,9 +191,9 @@ resource "aws_iam_role_policy" "lambda_layer_policy_dev" {
191191
}
192192

193193
resource "aws_iam_role_policy" "rum_policy_dev" {
194-
count = local.is_sandbox_or_dev ? 1 : 0
195-
role = aws_iam_role.github_role_dev[0].id
196-
name = "rum_policy"
194+
count = local.is_sandbox_or_dev ? 1 : 0
195+
role = aws_iam_role.github_role_dev[0].id
196+
name = "rum_policy"
197197
policy = jsonencode(
198198
{
199199
Statement = [
@@ -253,9 +253,9 @@ resource "aws_iam_role_policy" "rum_policy_dev" {
253253
}
254254

255255
resource "aws_iam_role_policy" "step_functions_dev" {
256-
count = local.is_sandbox_or_dev ? 1 : 0
257-
role = aws_iam_role.github_role_dev[0].id
258-
name = "step_functions"
256+
count = local.is_sandbox_or_dev ? 1 : 0
257+
role = aws_iam_role.github_role_dev[0].id
258+
name = "step_functions"
259259
policy = jsonencode(
260260
{
261261
Statement = [
@@ -279,9 +279,9 @@ resource "aws_iam_role_policy" "step_functions_dev" {
279279
}
280280

281281
resource "aws_iam_role_policy" "github_terraform_tagging_policy_dev" {
282-
count = local.is_sandbox_or_dev ? 1 : 0
283-
role = aws_iam_role.github_role_dev[0].id
284-
name = "github_terraform_tagging_policy"
282+
count = local.is_sandbox_or_dev ? 1 : 0
283+
role = aws_iam_role.github_role_dev[0].id
284+
name = "github_terraform_tagging_policy"
285285
policy = jsonencode(
286286
{
287287
Statement = [
@@ -388,13 +388,13 @@ resource "aws_iam_role_policy" "github_terraform_tagging_policy_dev" {
388388
# ATTACHED POLICIES
389389

390390
resource "aws_iam_role_policy_attachment" "ReadOnlyAccess_dev" {
391-
count = local.is_sandbox_or_dev ? 1 : 0
391+
count = local.is_sandbox_or_dev ? 1 : 0
392392
role = aws_iam_role.github_role_dev[0].name
393393
policy_arn = "arn:aws:iam::aws:policy/ReadOnlyAccess"
394394
}
395395

396396
resource "aws_iam_role_policy_attachment" "github_actions_terraform_full_dev" {
397-
count = local.is_sandbox_or_dev ? 1 : 0
397+
count = local.is_sandbox_or_dev ? 1 : 0
398398
role = aws_iam_role.github_role_dev[0].name
399399
policy_arn = aws_iam_policy.github_actions_terraform_full_dev[0].arn
400400
}
@@ -656,7 +656,7 @@ resource "aws_iam_policy" "github_actions_terraform_full_dev" {
656656

657657

658658
resource "aws_iam_role_policy_attachment" "github_actions_extended_dev" {
659-
count = local.is_sandbox_or_dev ? 1 : 0
659+
count = local.is_sandbox_or_dev ? 1 : 0
660660
role = aws_iam_role.github_role_dev[0].name
661661
policy_arn = aws_iam_policy.github_actions_extended_dev[0].arn
662662
}

0 commit comments

Comments
 (0)