11# aws_iam_role.prod_github_actions[0]:
22resource "aws_iam_role" "prod_github_actions" {
3- count = local. is_development ? 1 : 0
3+ count = local. is_prod ? 1 : 0
44 name = " ${ terraform . workspace } -github-actions-role"
55 description = " This role is to provide access for GitHub Actions to the ${ terraform . workspace } environment."
66 force_detach_policies = false
@@ -39,7 +39,7 @@ resource "aws_iam_role" "prod_github_actions" {
3939# INLINE POLICIES
4040
4141resource "aws_iam_role_policy" "CloudWatchLogsPolicy_prod" {
42- count = local. is_development ? 1 : 0
42+ count = local. is_prod ? 1 : 0
4343 role = aws_iam_role. prod_github_actions [0 ]. id
4444 name = " CloudWatchLogsPolicy"
4545 policy = jsonencode (
@@ -69,7 +69,7 @@ resource "aws_iam_role_policy" "CloudWatchLogsPolicy_prod" {
6969}
7070
7171resource "aws_iam_role_policy" "CloudWatchRumPolicy_prod" {
72- count = local. is_development ? 1 : 0
72+ count = local. is_prod ? 1 : 0
7373 role = aws_iam_role. prod_github_actions [0 ]. id
7474 name = " CloudWatchRumPolicy"
7575 policy = jsonencode (
@@ -131,7 +131,7 @@ resource "aws_iam_role_policy" "CloudWatchRumPolicy_prod" {
131131}
132132
133133resource "aws_iam_role_policy" "GithubCloudfrontPolicy_prod" {
134- count = local. is_development ? 1 : 0
134+ count = local. is_prod ? 1 : 0
135135 role = aws_iam_role. prod_github_actions [0 ]. id
136136 name = " GithubCloudfrontPolicy"
137137 policy = jsonencode (
@@ -167,7 +167,7 @@ resource "aws_iam_role_policy" "GithubCloudfrontPolicy_prod" {
167167}
168168
169169resource "aws_iam_role_policy" "GithubECSPolicy_prod" {
170- count = local. is_development ? 1 : 0
170+ count = local. is_prod ? 1 : 0
171171 role = aws_iam_role. prod_github_actions [0 ]. id
172172 name = " GithubECSPolicy"
173173 policy = jsonencode (
@@ -186,7 +186,7 @@ resource "aws_iam_role_policy" "GithubECSPolicy_prod" {
186186}
187187
188188resource "aws_iam_role_policy" "GithubSchedulerPolicy_prod" {
189- count = local. is_development ? 1 : 0
189+ count = local. is_prod ? 1 : 0
190190 role = aws_iam_role. prod_github_actions [0 ]. id
191191 name = " GithubSchedulerPolicy"
192192 policy = jsonencode (
@@ -208,7 +208,7 @@ resource "aws_iam_role_policy" "GithubSchedulerPolicy_prod" {
208208}
209209
210210resource "aws_iam_role_policy" "acm_prod" {
211- count = local. is_development ? 1 : 0
211+ count = local. is_prod ? 1 : 0
212212 role = aws_iam_role. prod_github_actions [0 ]. id
213213 name = " acm"
214214 policy = jsonencode (
@@ -230,7 +230,7 @@ resource "aws_iam_role_policy" "acm_prod" {
230230}
231231
232232resource "aws_iam_role_policy" "ecr_policy_prod" {
233- count = local. is_development ? 1 : 0
233+ count = local. is_prod ? 1 : 0
234234 role = aws_iam_role. prod_github_actions [0 ]. id
235235 name = " ecr_policy"
236236 policy = jsonencode (
@@ -259,7 +259,7 @@ resource "aws_iam_role_policy" "ecr_policy_prod" {
259259}
260260
261261resource "aws_iam_role_policy" "github_extended_policy_virus_scanner_prod" {
262- count = local. is_development ? 1 : 0
262+ count = local. is_prod ? 1 : 0
263263 role = aws_iam_role. prod_github_actions [0 ]. id
264264 name = " github-extended-policy-virus-scanner"
265265 policy = jsonencode (
@@ -294,7 +294,7 @@ resource "aws_iam_role_policy" "github_extended_policy_virus_scanner_prod" {
294294}
295295
296296resource "aws_iam_role_policy" "lambda_prod" {
297- count = local. is_development ? 1 : 0
297+ count = local. is_prod ? 1 : 0
298298 role = aws_iam_role. prod_github_actions [0 ]. id
299299 name = " lambda"
300300 policy = jsonencode (
@@ -330,7 +330,7 @@ resource "aws_iam_role_policy" "lambda_prod" {
330330}
331331
332332resource "aws_iam_role_policy" "mtls_gateway_prod" {
333- count = local. is_development ? 1 : 0
333+ count = local. is_prod ? 1 : 0
334334 role = aws_iam_role. prod_github_actions [0 ]. id
335335 name = " mtls-gateway"
336336 policy = jsonencode (
@@ -398,7 +398,7 @@ resource "aws_iam_role_policy" "mtls_gateway_prod" {
398398}
399399
400400resource "aws_iam_role_policy" "resource_tagging_prod" {
401- count = local. is_development ? 1 : 0
401+ count = local. is_prod ? 1 : 0
402402 role = aws_iam_role. prod_github_actions [0 ]. id
403403 name = " resource_tagging"
404404 policy = jsonencode (
@@ -535,7 +535,7 @@ resource "aws_iam_role_policy" "resource_tagging_prod" {
535535}
536536
537537resource "aws_iam_role_policy" "step_functions_prod" {
538- count = local. is_development ? 1 : 0
538+ count = local. is_prod ? 1 : 0
539539 role = aws_iam_role. prod_github_actions [0 ]. id
540540 name = " step_functions"
541541 policy = jsonencode (
@@ -564,20 +564,20 @@ resource "aws_iam_role_policy" "step_functions_prod" {
564564# ATTACHED POLICIES
565565
566566resource "aws_iam_role_policy_attachment" "ReadOnlyAccess_prod" {
567- count = local. is_development ? 1 : 0
567+ count = local. is_prod ? 1 : 0
568568 role = aws_iam_role. prod_github_actions [0 ]. name
569569 policy_arn = " arn:aws:iam::aws:policy/ReadOnlyAccess"
570570}
571571
572572resource "aws_iam_role_policy_attachment" "GitHubAllAccess_prod" {
573- count = local. is_development ? 1 : 0
573+ count = local. is_prod ? 1 : 0
574574 role = aws_iam_role. prod_github_actions [0 ]. name
575575 policy_arn = aws_iam_policy. GitHubAllAccess_prod [0 ]. arn
576576}
577577
578578# aws_iam_policy.GitHubAllAccess_prod[0]:
579579resource "aws_iam_policy" "GitHubAllAccess_prod" {
580- count = local. is_development ? 1 : 0
580+ count = local. is_prod ? 1 : 0
581581 description = " Access for Github Workflows"
582582 name = " ${ terraform . workspace } -GitHubAllAccess"
583583 name_prefix = null
@@ -830,14 +830,14 @@ resource "aws_iam_policy" "GitHubAllAccess_prod" {
830830}
831831
832832resource "aws_iam_role_policy_attachment" "ecs_policy_prod" {
833- count = local. is_development ? 1 : 0
833+ count = local. is_prod ? 1 : 0
834834 role = aws_iam_role. prod_github_actions [0 ]. name
835835 policy_arn = aws_iam_policy. ecs_policy_prod [0 ]. arn
836836}
837837
838838# aws_iam_policy.ecs_policy_prod[0]:
839839resource "aws_iam_policy" "ecs_policy_prod" {
840- count = local. is_development ? 1 : 0
840+ count = local. is_prod ? 1 : 0
841841 description = null
842842 name = " ${ terraform . workspace } -ecs_policy"
843843 name_prefix = null
@@ -862,14 +862,14 @@ resource "aws_iam_policy" "ecs_policy_prod" {
862862}
863863
864864resource "aws_iam_role_policy_attachment" "github_extension_1_prod" {
865- count = local. is_development ? 1 : 0
865+ count = local. is_prod ? 1 : 0
866866 role = aws_iam_role. prod_github_actions [0 ]. name
867867 policy_arn = aws_iam_policy. github_extension_1_prod [0 ]. arn
868868}
869869
870870# aws_iam_policy.github_extension_1_prod[0]:
871871resource "aws_iam_policy" "github_extension_1_prod" {
872- count = local. is_development ? 1 : 0
872+ count = local. is_prod ? 1 : 0
873873 description = null
874874 name = " ${ terraform . workspace } -github-extension-1"
875875 name_prefix = null
@@ -1012,14 +1012,14 @@ resource "aws_iam_policy" "github_extension_1_prod" {
10121012}
10131013
10141014resource "aws_iam_role_policy_attachment" "scheduler_policy_prod" {
1015- count = local. is_development ? 1 : 0
1015+ count = local. is_prod ? 1 : 0
10161016 role = aws_iam_role. prod_github_actions [0 ]. name
10171017 policy_arn = aws_iam_policy. scheduler_policy_prod [0 ]. arn
10181018}
10191019
10201020# aws_iam_policy.scheduler_policy_prod[0]:
10211021resource "aws_iam_policy" "scheduler_policy_prod" {
1022- count = local. is_development ? 1 : 0
1022+ count = local. is_prod ? 1 : 0
10231023 description = null
10241024 name = " ${ terraform . workspace } -scheduler_policy"
10251025 name_prefix = null
0 commit comments