@@ -47,9 +47,9 @@ resource "aws_iam_role" "github_role_dev" {
4747# INLINE POLICIES
4848
4949resource "aws_iam_role_policy" "cloudtrail_dev" {
50- count = local. is_sandbox_or_dev ? 1 : 0
51- role = aws_iam_role. github_role_dev [0 ]. id
52- name = " cloudtrail"
50+ count = local. is_sandbox_or_dev ? 1 : 0
51+ role = aws_iam_role. github_role_dev [0 ]. id
52+ name = " cloudtrail"
5353 policy = jsonencode (
5454 {
5555 Statement = [
@@ -81,9 +81,9 @@ resource "aws_iam_role_policy" "cloudtrail_dev" {
8181}
8282
8383resource "aws_iam_role_policy" "cloudwatch_logs_policy_dev" {
84- count = local. is_sandbox_or_dev ? 1 : 0
85- role = aws_iam_role. github_role_dev [0 ]. id
86- name = " cloudwatch_logs_policy"
84+ count = local. is_sandbox_or_dev ? 1 : 0
85+ role = aws_iam_role. github_role_dev [0 ]. id
86+ name = " cloudwatch_logs_policy"
8787 policy = jsonencode (
8888 {
8989 Statement = [
@@ -123,9 +123,9 @@ resource "aws_iam_role_policy" "cloudwatch_logs_policy_dev" {
123123}
124124
125125resource "aws_iam_role_policy" "ecs_policy_dev" {
126- count = local. is_sandbox_or_dev ? 1 : 0
127- role = aws_iam_role. github_role_dev [0 ]. id
128- name = " ecs_policy"
126+ count = local. is_sandbox_or_dev ? 1 : 0
127+ role = aws_iam_role. github_role_dev [0 ]. id
128+ name = " ecs_policy"
129129 policy = jsonencode (
130130 {
131131 Statement = [
@@ -145,9 +145,9 @@ resource "aws_iam_role_policy" "ecs_policy_dev" {
145145}
146146
147147resource "aws_iam_role_policy" "github_actions_waf_override_dev" {
148- count = local. is_sandbox_or_dev ? 1 : 0
149- role = aws_iam_role. github_role_dev [0 ]. id
150- name = " github_actions_waf_override"
148+ count = local. is_sandbox_or_dev ? 1 : 0
149+ role = aws_iam_role. github_role_dev [0 ]. id
150+ name = " github_actions_waf_override"
151151 policy = jsonencode (
152152 {
153153 Statement = [
@@ -163,9 +163,9 @@ resource "aws_iam_role_policy" "github_actions_waf_override_dev" {
163163}
164164
165165resource "aws_iam_role_policy" "lambda_layer_policy_dev" {
166- count = local. is_sandbox_or_dev ? 1 : 0
167- role = aws_iam_role. github_role_dev [0 ]. id
168- name = " lambda_layer_policy"
166+ count = local. is_sandbox_or_dev ? 1 : 0
167+ role = aws_iam_role. github_role_dev [0 ]. id
168+ name = " lambda_layer_policy"
169169 policy = jsonencode (
170170 {
171171 Statement = [
@@ -191,9 +191,9 @@ resource "aws_iam_role_policy" "lambda_layer_policy_dev" {
191191}
192192
193193resource "aws_iam_role_policy" "rum_policy_dev" {
194- count = local. is_sandbox_or_dev ? 1 : 0
195- role = aws_iam_role. github_role_dev [0 ]. id
196- name = " rum_policy"
194+ count = local. is_sandbox_or_dev ? 1 : 0
195+ role = aws_iam_role. github_role_dev [0 ]. id
196+ name = " rum_policy"
197197 policy = jsonencode (
198198 {
199199 Statement = [
@@ -253,9 +253,9 @@ resource "aws_iam_role_policy" "rum_policy_dev" {
253253}
254254
255255resource "aws_iam_role_policy" "step_functions_dev" {
256- count = local. is_sandbox_or_dev ? 1 : 0
257- role = aws_iam_role. github_role_dev [0 ]. id
258- name = " step_functions"
256+ count = local. is_sandbox_or_dev ? 1 : 0
257+ role = aws_iam_role. github_role_dev [0 ]. id
258+ name = " step_functions"
259259 policy = jsonencode (
260260 {
261261 Statement = [
@@ -279,9 +279,9 @@ resource "aws_iam_role_policy" "step_functions_dev" {
279279}
280280
281281resource "aws_iam_role_policy" "github_terraform_tagging_policy_dev" {
282- count = local. is_sandbox_or_dev ? 1 : 0
283- role = aws_iam_role. github_role_dev [0 ]. id
284- name = " github_terraform_tagging_policy"
282+ count = local. is_sandbox_or_dev ? 1 : 0
283+ role = aws_iam_role. github_role_dev [0 ]. id
284+ name = " github_terraform_tagging_policy"
285285 policy = jsonencode (
286286 {
287287 Statement = [
@@ -388,13 +388,13 @@ resource "aws_iam_role_policy" "github_terraform_tagging_policy_dev" {
388388# ATTACHED POLICIES
389389
390390resource "aws_iam_role_policy_attachment" "ReadOnlyAccess_dev" {
391- count = local. is_sandbox_or_dev ? 1 : 0
391+ count = local. is_sandbox_or_dev ? 1 : 0
392392 role = aws_iam_role. github_role_dev [0 ]. name
393393 policy_arn = " arn:aws:iam::aws:policy/ReadOnlyAccess"
394394}
395395
396396resource "aws_iam_role_policy_attachment" "github_actions_terraform_full_dev" {
397- count = local. is_sandbox_or_dev ? 1 : 0
397+ count = local. is_sandbox_or_dev ? 1 : 0
398398 role = aws_iam_role. github_role_dev [0 ]. name
399399 policy_arn = aws_iam_policy. github_actions_terraform_full_dev [0 ]. arn
400400}
@@ -656,7 +656,7 @@ resource "aws_iam_policy" "github_actions_terraform_full_dev" {
656656
657657
658658resource "aws_iam_role_policy_attachment" "github_actions_extended_dev" {
659- count = local. is_sandbox_or_dev ? 1 : 0
659+ count = local. is_sandbox_or_dev ? 1 : 0
660660 role = aws_iam_role. github_role_dev [0 ]. name
661661 policy_arn = aws_iam_policy. github_actions_extended_dev [0 ]. arn
662662}
0 commit comments