Skip to content

Commit 58a54f2

Browse files
Merge branch 'main' into ELI-623
2 parents bc9aa0f + 12f4e1f commit 58a54f2

7 files changed

Lines changed: 13 additions & 6 deletions

File tree

.github/workflows/base-deploy.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -203,6 +203,7 @@ jobs:
203203
TF_VAR_SPLUNK_HEC_TOKEN: ${{ secrets.SPLUNK_HEC_TOKEN }}
204204
TF_VAR_SPLUNK_HEC_ENDPOINT: ${{ secrets.SPLUNK_HEC_ENDPOINT }}
205205
TF_VAR_OPERATOR_EMAILS: ${{ vars.SECRET_ROTATION_OPERATOR_EMAILS }}
206+
TF_VAR_PROXYGEN_PRIVATE_KEY: ${{ secrets.PROXYGEN_PRIVATE_KEY_PROD }}
206207

207208
working-directory: ./infrastructure
208209
shell: bash

.github/workflows/cicd-2-publish.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -103,6 +103,7 @@ jobs:
103103
TF_VAR_SPLUNK_HEC_TOKEN: ${{ secrets.SPLUNK_HEC_TOKEN }}
104104
TF_VAR_SPLUNK_HEC_ENDPOINT: ${{ secrets.SPLUNK_HEC_ENDPOINT }}
105105
TF_VAR_OPERATOR_EMAILS: ${{ vars.SECRET_ROTATION_OPERATOR_EMAILS }}
106+
TF_VAR_PROXYGEN_PRIVATE_KEY: ${{ secrets.PROXYGEN_PRIVATE_KEY_PROD }}
106107

107108
run: |
108109
mkdir -p ./build

.github/workflows/cicd-3-test-deploy.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -90,6 +90,7 @@ jobs:
9090
TF_VAR_SPLUNK_HEC_TOKEN: ${{ secrets.SPLUNK_HEC_TOKEN }}
9191
TF_VAR_SPLUNK_HEC_ENDPOINT: ${{ secrets.SPLUNK_HEC_ENDPOINT }}
9292
TF_VAR_OPERATOR_EMAILS: ${{ vars.SECRET_ROTATION_OPERATOR_EMAILS }}
93+
TF_VAR_PROXYGEN_PRIVATE_KEY: ${{ secrets.PROXYGEN_PRIVATE_KEY_PROD }}
9394

9495
run: |
9596
mkdir -p ./build

.github/workflows/release-candidate.yml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -237,6 +237,8 @@ jobs:
237237
TF_VAR_SPLUNK_HEC_TOKEN: ${{ secrets.SPLUNK_HEC_TOKEN }}
238238
TF_VAR_SPLUNK_HEC_ENDPOINT: ${{ secrets.SPLUNK_HEC_ENDPOINT }}
239239
TF_VAR_OPERATOR_EMAILS: ${{ vars.SECRET_ROTATION_OPERATOR_EMAILS }}
240+
TF_VAR_PROXYGEN_PRIVATE_KEY: ${{ secrets.PROXYGEN_PRIVATE_KEY_PROD }}
241+
240242
run: |
241243
mkdir -p ./build
242244
echo "🚀 Deploying ${{ needs.validate.outputs.dev_tag }} to TEST"
@@ -353,8 +355,9 @@ jobs:
353355
id: release
354356
env:
355357
DEV_TAG: ${{ needs.validate.outputs.dev_tag }}
356-
RELEASE_TYPE: ${{ inputs.release_type }}
358+
INPUT_RELEASE_TYPE: ${{ inputs.release_type }}
357359
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
360+
ENVIRONMENT: preprod
358361
run: |
359362
pip install requests
360363
python scripts/workflow/tag_and_release.py

infrastructure/stacks/api-layer/s3_buckets.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ module "s3_rules_bucket" {
99

1010
module "s3_consumer_mappings_bucket" {
1111
source = "../../modules/s3"
12-
bucket_name = "eli-consumer-map"
12+
bucket_name = "consumer-map"
1313
environment = var.environment
1414
project_name = var.project_name
1515
stack_name = local.stack_name

infrastructure/stacks/iams-developer-roles/github_actions_policies.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -209,16 +209,16 @@ resource "aws_iam_policy" "s3_management" {
209209
Resource = [
210210
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-eli-rules",
211211
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-eli-rules/*",
212-
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-eli-consumer-map",
213-
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-eli-consumer-map/*",
212+
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-consumer-map",
213+
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-consumer-map/*",
214214
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-eli-audit",
215215
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-eli-audit/*",
216216
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-eli-rules-access-logs",
217217
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-eli-rules-access-logs/*",
218218
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-eli-audit-access-logs",
219219
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-eli-audit-access-logs/*",
220-
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-eli-consumer-map-access-logs",
221-
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-eli-consumer-map-access-logs/*",
220+
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-consumer-map-access-logs",
221+
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-consumer-map-access-logs/*",
222222
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-truststore",
223223
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-truststore/*",
224224
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-truststore-access-logs",

infrastructure/stacks/networking/ssm.tf

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
resource "aws_ssm_parameter" "proxygen_private_key" {
2+
count = var.environment == "dev" ? 1 : 0
23
name = "/${var.environment}/proxygen/private_key"
34
type = "SecureString"
45
key_id = aws_kms_key.networking_ssm_key.id

0 commit comments

Comments
 (0)