-
Notifications
You must be signed in to change notification settings - Fork 2
Feature/eli 702 code signing #647
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from 8 commits
310a7fb
792890d
d4ea35b
be899fa
b1d0132
4ea14ef
e1514c2
4ac3721
2937e94
22d3d19
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -18,7 +18,7 @@ module "eligibility_signposting_lambda_function" { | |
| environment = var.environment | ||
| runtime = "python3.13" | ||
| lambda_func_name = "${terraform.workspace == "default" ? "" : "${terraform.workspace}-"}eligibility_signposting_api" | ||
| security_group_ids = [data.aws_security_group.main_sg.id] | ||
| security_group_ids = [data.aws_security_group.main_sg.id] | ||
| vpc_intra_subnets = [for v in data.aws_subnet.private_subnets : v.id] | ||
| file_name = "../../../dist/lambda.zip" | ||
| handler = "eligibility_signposting_api.app.lambda_handler" | ||
|
|
@@ -33,6 +33,7 @@ module "eligibility_signposting_lambda_function" { | |
| stack_name = local.stack_name | ||
| provisioned_concurrency_count = 5 | ||
| api_domain_name = local.api_domain_name | ||
| environments_with_signing = ["test", "preprod"] | ||
| } | ||
|
Comment on lines
33
to
37
|
||
|
|
||
|
|
||
|
|
@@ -69,7 +70,7 @@ resource "aws_lambda_function" "create_secret_lambda" { | |
| variables = { SECRET_NAME = module.secrets_manager.aws_hashing_secret_name } | ||
| } | ||
| vpc_config { | ||
| subnet_ids = [for s in data.aws_subnet.private_subnets : s.id] | ||
| subnet_ids = [for s in data.aws_subnet.private_subnets : s.id] | ||
| security_group_ids = [data.aws_security_group.main_sg.id] | ||
| } | ||
| } | ||
|
|
@@ -98,7 +99,7 @@ resource "aws_lambda_function" "promote_secret_lambda" { | |
| variables = { SECRET_NAME = module.secrets_manager.aws_hashing_secret_name } | ||
| } | ||
| vpc_config { | ||
| subnet_ids = [for s in data.aws_subnet.private_subnets : s.id] | ||
| subnet_ids = [for s in data.aws_subnet.private_subnets : s.id] | ||
| security_group_ids = [data.aws_security_group.main_sg.id] | ||
| } | ||
| } | ||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
code_signing_config_arnis conditionally set based onenvironments_with_signing, but the code signing config created by this module usesuntrusted_artifact_on_deployment = "Enforce". With the current stack passingpreprodintoenvironments_with_signing, this will enforce signing in preprod too, which conflicts with the PR description (“sign but do not enforce”). A common approach is to either (a) only attach the config in enforced environments, or (b) make the signing policy configurable per environment (e.g., Warn vs Enforce).There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I decided to enforce preprod at the same time as this PR, as the pre-requisite step of deploying the signing infrastructure has already been done