File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change @@ -203,7 +203,8 @@ jobs:
203203 TF_VAR_SPLUNK_HEC_TOKEN : ${{ secrets.SPLUNK_HEC_TOKEN }}
204204 TF_VAR_SPLUNK_HEC_ENDPOINT : ${{ secrets.SPLUNK_HEC_ENDPOINT }}
205205 TF_VAR_OPERATOR_EMAILS : ${{ vars.SECRET_ROTATION_OPERATOR_EMAILS }}
206- TF_VAR_PROXYGEN_PRIVATE_KEY : ${{ secrets.PROXYGEN_PRIVATE_KEY_PROD }}
206+ TF_VAR_PROXYGEN_PRIVATE_KEY_PTL : ${{ secrets.PROXYGEN_PRIVATE_KEY_PTL }}
207+ TF_VAR_PROXYGEN_PRIVATE_KEY_PROD : ${{ secrets.PROXYGEN_PRIVATE_KEY_PROD }}
207208
208209 working-directory : ./infrastructure
209210 shell : bash
Original file line number Diff line number Diff line change @@ -103,7 +103,8 @@ jobs:
103103 TF_VAR_SPLUNK_HEC_TOKEN : ${{ secrets.SPLUNK_HEC_TOKEN }}
104104 TF_VAR_SPLUNK_HEC_ENDPOINT : ${{ secrets.SPLUNK_HEC_ENDPOINT }}
105105 TF_VAR_OPERATOR_EMAILS : ${{ vars.SECRET_ROTATION_OPERATOR_EMAILS }}
106- TF_VAR_PROXYGEN_PRIVATE_KEY : ${{ secrets.PROXYGEN_PRIVATE_KEY_PROD }}
106+ TF_VAR_PROXYGEN_PRIVATE_KEY_PTL : ${{ secrets.PROXYGEN_PRIVATE_KEY_PTL }}
107+ TF_VAR_PROXYGEN_PRIVATE_KEY_PROD : ${{ secrets.PROXYGEN_PRIVATE_KEY_PROD }}
107108
108109 run : |
109110 mkdir -p ./build
Original file line number Diff line number Diff line change 9090 TF_VAR_SPLUNK_HEC_TOKEN : ${{ secrets.SPLUNK_HEC_TOKEN }}
9191 TF_VAR_SPLUNK_HEC_ENDPOINT : ${{ secrets.SPLUNK_HEC_ENDPOINT }}
9292 TF_VAR_OPERATOR_EMAILS : ${{ vars.SECRET_ROTATION_OPERATOR_EMAILS }}
93- TF_VAR_PROXYGEN_PRIVATE_KEY : ${{ secrets.PROXYGEN_PRIVATE_KEY_PROD }}
93+ TF_VAR_PROXYGEN_PRIVATE_KEY_PTL : ${{ secrets.PROXYGEN_PRIVATE_KEY_PTL }}
94+ TF_VAR_PROXYGEN_PRIVATE_KEY_PROD : ${{ secrets.PROXYGEN_PRIVATE_KEY_PROD }}
9495
9596 run : |
9697 mkdir -p ./build
Original file line number Diff line number Diff line change @@ -237,7 +237,8 @@ jobs:
237237 TF_VAR_SPLUNK_HEC_TOKEN : ${{ secrets.SPLUNK_HEC_TOKEN }}
238238 TF_VAR_SPLUNK_HEC_ENDPOINT : ${{ secrets.SPLUNK_HEC_ENDPOINT }}
239239 TF_VAR_OPERATOR_EMAILS : ${{ vars.SECRET_ROTATION_OPERATOR_EMAILS }}
240- TF_VAR_PROXYGEN_PRIVATE_KEY : ${{ secrets.PROXYGEN_PRIVATE_KEY_PROD }}
240+ TF_VAR_PROXYGEN_PRIVATE_KEY_PTL : ${{ secrets.PROXYGEN_PRIVATE_KEY_PTL }}
241+ TF_VAR_PROXYGEN_PRIVATE_KEY_PROD : ${{ secrets.PROXYGEN_PRIVATE_KEY_PROD }}
241242
242243 run : |
243244 mkdir -p ./build
Original file line number Diff line number Diff line change @@ -400,6 +400,7 @@ resource "aws_iam_policy" "api_infrastructure" {
400400 " ssm:ListTagsForResource" ,
401401 " ssm:PutParameter" ,
402402 " ssm:AddTagsToResource" ,
403+ " ssm:DeleteParameter" ,
403404
404405 # acm
405406 " acm:ListTagsForCertificate" ,
@@ -457,6 +458,8 @@ resource "aws_iam_policy" "api_infrastructure" {
457458 " arn:aws:logs:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :log-group:NHSDAudit_trail_log_group*" ,
458459 " arn:aws:ssm:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :parameter/${ var . environment } /*" ,
459460 " arn:aws:ssm:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :parameter/splunk/*" ,
461+ " arn:aws:ssm:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :parameter/ptl/*" ,
462+ " arn:aws:ssm:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :parameter/prod/*" ,
460463 " arn:aws:acm:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :certificate/*" ,
461464 " arn:aws:events:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :rule/cloudwatch-alarm-state-change-to-splunk*" ,
462465 " arn:aws:wafv2:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :regional/webacl/*" ,
Original file line number Diff line number Diff line change @@ -193,6 +193,7 @@ data "aws_iam_policy_document" "permissions_boundary" {
193193 " ssm:ListTagsForResource" ,
194194 " ssm:PutParameter" ,
195195 " ssm:AddTagsToResource" ,
196+ " ssm:DeleteParameter" ,
196197
197198 # WAFv2 - web application firewall management
198199 " wafv2:CreateWebACL" ,
Original file line number Diff line number Diff line change 11resource "aws_ssm_parameter" "proxygen_private_key" {
2- count = var. environment == " dev" ? 1 : 0
3- name = " /${ var . environment } /proxygen/private_key"
4- type = " SecureString"
2+ for_each = var. environment == " dev" ? {
3+ ptl = { path = " /ptl/proxygen/private_key" , value = var.PROXYGEN_PRIVATE_KEY_PTL }
4+ prod = { path = " /prod/proxygen/private_key" , value = var.PROXYGEN_PRIVATE_KEY_PROD }
5+ } : {}
6+
7+ name = each. value . path
8+ type = " SecureString"
59 key_id = aws_kms_key. networking_ssm_key . id
6- value = var. PROXYGEN_PRIVATE_KEY
10+ value = each. value . value
11+
712 tier = " Advanced"
813
914 tags = {
Original file line number Diff line number Diff line change @@ -13,8 +13,13 @@ variable "API_PRIVATE_KEY_CERT" {
1313 description = " The private key for the signed Client Certificate"
1414 sensitive = true
1515}
16- variable "PROXYGEN_PRIVATE_KEY " {
16+ variable "PROXYGEN_PRIVATE_KEY_PTL " {
1717 type = string
18- description = " The private key for Proxygen authentication"
18+ description = " The private key for Proxygen `PTL` environment authentication"
19+ sensitive = true
20+ }
21+ variable "PROXYGEN_PRIVATE_KEY_PROD" {
22+ type = string
23+ description = " The private key for Proxygen `Prod` environment authentication"
1924 sensitive = true
2025}
You can’t perform that action at this time.
0 commit comments