Skip to content

Commit a3b4ad3

Browse files
authored
Merge branch 'main' into feature/ELI-707-enforce-codeowners
2 parents 5d53b24 + ae39c9e commit a3b4ad3

3 files changed

Lines changed: 16 additions & 5 deletions

File tree

.github/workflows/cicd-3-test-deploy.yaml

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -66,6 +66,17 @@ jobs:
6666
with:
6767
terraform_version: ${{ needs.metadata.outputs.terraform_version }}
6868

69+
- name: "Configure AWS Credentials (IAM Bootstrap Role)"
70+
uses: aws-actions/configure-aws-credentials@v6
71+
with:
72+
role-to-assume: arn:aws:iam::${{ secrets.AWS_ACCOUNT_ID }}:role/service-roles/github-actions-iam-bootstrap-role
73+
aws-region: eu-west-2
74+
75+
- name: "Deploy IAM roles (iams-developer-roles stack)"
76+
working-directory: ./infrastructure
77+
run: |
78+
make terraform env=test stack=iams-developer-roles tf-command=apply workspace=default
79+
6980
- name: "Configure AWS Credentials"
7081
uses: aws-actions/configure-aws-credentials@v6
7182
with:

infrastructure/stacks/api-layer/s3_buckets.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ module "s3_dq_metrics_bucket" {
6060

6161
module "s3_cloudtrail_bucket" {
6262
source = "../../modules/s3"
63-
bucket_name = "eli-cloudwatch-logs"
63+
bucket_name = "eli-cloudwatch"
6464
environment = var.environment
6565
project_name = var.project_name
6666
stack_name = local.stack_name

infrastructure/stacks/iams-developer-roles/github_actions_policies.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -235,10 +235,10 @@ resource "aws_iam_policy" "s3_management" {
235235
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-dq-metrics/*",
236236
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-dq-metrics-access-logs",
237237
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-dq-metrics-access-logs/*",
238-
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-eli-cloudwatch-logs",
239-
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-eli-cloudwatch-logs/*",
240-
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-eli-cloudwatch-logs-access-logs",
241-
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-eli-cloudwatch-logs-access-logs/*",
238+
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-eli-cloudwatch",
239+
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-eli-cloudwatch/*",
240+
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-eli-cloudwatch-access-logs",
241+
"arn:aws:s3:::*eligibility-signposting-api-${var.environment}-eli-cloudwatch-access-logs/*",
242242
]
243243
}
244244
]

0 commit comments

Comments
 (0)