Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

GitHub Actions Code Formatter workflow #3753

Merged
merged 1 commit into from
Oct 23, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions terraform/environments/apex/modules/codebuild/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -117,8 +117,8 @@ data "template_file" "s3_resource_bucket_policy" {
template = file("${path.module}/s3_bucket_policy.json.tpl")

vars = {
account_id = var.account_id,
s3_resource_name = aws_s3_bucket.codebuild_resources.id,
account_id = var.account_id,
s3_resource_name = aws_s3_bucket.codebuild_resources.id,
codebuild_role_name = aws_iam_role.codebuild_s3.id
}
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ locals {
monitoring = true
vpc_security_group_ids = ["data-db"]
tags = {
backup-plan = "daily-and-weekly"
backup-plan = "daily-and-weekly"
instance-scheduling = "skip-scheduling"
}
})
Expand Down Expand Up @@ -75,11 +75,11 @@ locals {
}

tags = {
description = "PP CSR DB server"
ami = "base_ol_8_5"
os-type = "Linux"
component = "test"
server-type = "csr-db"
description = "PP CSR DB server"
ami = "base_ol_8_5"
os-type = "Linux"
component = "test"
server-type = "csr-db"
}
}

Expand All @@ -96,7 +96,7 @@ locals {
monitoring = true
vpc_security_group_ids = ["domain", "app", "jumpserver"]
tags = {
backup-plan = "daily-and-weekly"
backup-plan = "daily-and-weekly"
instance-scheduling = "skip-scheduling"
}
})
Expand Down Expand Up @@ -131,7 +131,7 @@ locals {
monitoring = true
vpc_security_group_ids = ["migration-web-sg", "domain-controller"]
tags = {
backup-plan = "daily-and-weekly"
backup-plan = "daily-and-weekly"
instance-scheduling = "skip-scheduling"
}
})
Expand Down Expand Up @@ -160,7 +160,7 @@ locals {
monitoring = true
vpc_security_group_ids = ["migration-web-sg", "domain-controller"]
tags = {
backup-plan = "daily-and-weekly"
backup-plan = "daily-and-weekly"
instance-scheduling = "skip-scheduling"
}
})
Expand Down Expand Up @@ -189,7 +189,7 @@ locals {
monitoring = true
vpc_security_group_ids = ["migration-web-sg", "domain-controller"]
tags = {
backup-plan = "daily-and-weekly"
backup-plan = "daily-and-weekly"
instance-scheduling = "skip-scheduling"
}
})
Expand Down Expand Up @@ -220,7 +220,7 @@ locals {
monitoring = true
vpc_security_group_ids = ["domain", "web", "jumpserver"]
tags = {
backup-plan = "daily-and-weekly"
backup-plan = "daily-and-weekly"
instance-scheduling = "skip-scheduling"
}
})
Expand Down
6 changes: 3 additions & 3 deletions terraform/environments/data-platform/cloudtrail.tf
Original file line number Diff line number Diff line change
@@ -1,14 +1,14 @@
# a cloudtrail trail to save log files for putObject S3 events in the landing and data
# buckets
resource "aws_cloudtrail" "data_s3_put_objects" {
name = "data_platform_s3_putobject_trail_${local.environment}"
s3_bucket_name = module.logs_s3_bucket.bucket.id
name = "data_platform_s3_putobject_trail_${local.environment}"
s3_bucket_name = module.logs_s3_bucket.bucket.id

# this is needed if monitoring services without a specific region. Don't need for s3
include_global_service_events = false

# enabling this would allow detection of modified log files
enable_log_file_validation = false
enable_log_file_validation = false
advanced_event_selector {
name = "Log PutObject events for landing and data S3 buckets"

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,28 +3,21 @@
"title": "Data Product Table Schema",
"description": "Specification for MoJ Data Platform Data Product tables schemas for registering tables in the glue catalog",
"type": "object",
"required": [
"tableDescription",
"columns"
],
"required": ["tableDescription", "columns"],
"definitions": {
"additional_col_properties": {
"required": [
"name",
"type",
"description"
],
"required": ["name", "type", "description"],
"properties": {
"name": {
"type": "string",
"description": "The name of a column within your data.",
"pattern": "^[a-z0-9_]+$",
"maxLength": 128
},
"description": {
"type": "string",
"description": "A description of the column that will feed the data catalogue."
}
"name": {
"type": "string",
"description": "The name of a column within your data.",
"pattern": "^[a-z0-9_]+$",
"maxLength": 128
},
"description": {
"type": "string",
"description": "A description of the column that will feed the data catalogue."
}
},
"additionalProperties": true
},
Expand Down
14 changes: 7 additions & 7 deletions terraform/environments/data-platform/glue.tf
Original file line number Diff line number Diff line change
@@ -1,17 +1,17 @@
# creates database and tables in the glue catalogue for data as a product logs.
# Meaning logs are queryable via Athena.
resource "aws_glue_catalog_database" "data_product_logs" {
name = "daap_logs"
name = "daap_logs"
}

resource "aws_glue_catalog_table" "lambdas" {
name = "lambdas"
database_name = aws_glue_catalog_database.data_product_logs.name
table_type = "EXTERNAL_TABLE"
table_type = "EXTERNAL_TABLE"

parameters = {
EXTERNAL = "TRUE"
comment = "table for logs from the python daap lambda functions"
EXTERNAL = "TRUE"
comment = "table for logs from the python daap lambda functions"

}

Expand Down Expand Up @@ -75,9 +75,9 @@ resource "aws_glue_catalog_table" "s3_objects" {
table_type = "EXTERNAL_TABLE"

parameters = {
EXTERNAL = "TRUE"
classification = "cloudtrail"
comment = "CloudTrail table for logs from the data and landing data buckets"
EXTERNAL = "TRUE"
classification = "cloudtrail"
comment = "CloudTrail table for logs from the data and landing data buckets"

}

Expand Down
6 changes: 3 additions & 3 deletions terraform/environments/data-platform/iam.tf
Original file line number Diff line number Diff line change
Expand Up @@ -436,7 +436,7 @@ data "aws_iam_policy_document" "logs_s3_bucket_policy_document" {
resources = [
"${module.logs_s3_bucket.bucket.arn}/AWSLogs/${data.aws_caller_identity.current.account_id}/*"
]

condition {
test = "StringEquals"
variable = "s3:x-amz-acl"
Expand All @@ -449,7 +449,7 @@ data "aws_iam_policy_document" "logs_s3_bucket_policy_document" {
test = "StringEquals"
variable = "aws:SourceArn"

values = [aws_cloudtrail.data_s3_put_objects.arn]
values = [aws_cloudtrail.data_s3_put_objects.arn]
}
}

Expand All @@ -472,7 +472,7 @@ data "aws_iam_policy_document" "logs_s3_bucket_policy_document" {
test = "StringEquals"
variable = "aws:SourceArn"

values = [aws_cloudtrail.data_s3_put_objects.arn]
values = [aws_cloudtrail.data_s3_put_objects.arn]
}
}

Expand Down
8 changes: 4 additions & 4 deletions terraform/environments/oasys/locals.tf
Original file line number Diff line number Diff line change
Expand Up @@ -220,11 +220,11 @@ locals {
cloudwatch_metric_alarms = {}
user_data_cloud_init = module.baseline_presets.ec2_instance.user_data_cloud_init.ssm_agent_ansible_no_tags
autoscaling_schedules = module.baseline_presets.ec2_autoscaling_schedules.working_hours
autoscaling_group = merge(module.baseline_presets.ec2_autoscaling_group.default, {
desired_capacity = 2
max_size = 2
autoscaling_group = merge(module.baseline_presets.ec2_autoscaling_group.default, {
desired_capacity = 2
max_size = 2
})
lb_target_groups = {}
lb_target_groups = {}
tags = {
backup = "false" # opt out of mod platform default backup plan
component = "bip"
Expand Down
6 changes: 3 additions & 3 deletions terraform/environments/oasys/locals_secrets.tf
Original file line number Diff line number Diff line change
Expand Up @@ -10,14 +10,14 @@ locals {
"arn:aws:iam::${module.environment.account_id}:role/ec2-database-*"
]


secret_policy_write_db = {
effect = "Allow"
actions = [
"secretsmanager:PutSecretValue",
]
principals = {
type = "AWS"
type = "AWS"
identifiers = [
"arn:aws:iam::${module.environment.account_id}:role/ec2-database-*"
]
Expand All @@ -30,7 +30,7 @@ locals {
"secretsmanager:GetSecretValue",
]
principals = {
type = "AWS"
type = "AWS"
identifiers = [
"arn:aws:iam::${module.environment.account_id}:role/ec2-database-*"
]
Expand Down
22 changes: 11 additions & 11 deletions terraform/environments/oasys/locals_test.tf
Original file line number Diff line number Diff line change
Expand Up @@ -43,17 +43,17 @@ locals {
"/oracle/database/T2ONRSYS" = local.secretsmanager_secrets_db
"/oracle/database/T2ONRAUD" = local.secretsmanager_secrets_db
"/oracle/database/T2ONRBDS" = local.secretsmanager_secrets_db

"/database/t1/T1OASYS" = {
secrets = {
apex_listenerpassword = {}
apex_listenerpassword = {}
apex_public_userpassword = {}
apex_rest_publicpassword = {}
}
}
"/database/t2/T2OASYS" = {
secrets = {
apex_listenerpassword = {}
apex_listenerpassword = {}
apex_public_userpassword = {}
apex_rest_publicpassword = {}
}
Expand All @@ -75,20 +75,20 @@ locals {
}
"/weblogic/test-oasys-bip-b" = {
secrets = {
admin_password = {}
admin_username = {}
admin_password = {}
admin_username = {}
biplatformpassword = {}
db_username = {}
mdspassword = {}
syspassword = {}
db_username = {}
mdspassword = {}
syspassword = {}
}
}
"" = {
postfix = ""
secrets = {
account_ids = {}
ec2-user_pem = {}
environment_management_arn = {}
account_ids = {}
ec2-user_pem = {}
environment_management_arn = {}
modernisation_platform_account_id = {}
}
}
Expand Down
2 changes: 1 addition & 1 deletion terraform/environments/oasys/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -83,5 +83,5 @@ module "baseline" {
s3_buckets = merge(local.baseline_s3_buckets, module.baseline_presets.s3_buckets, lookup(local.environment_config, "baseline_s3_buckets", {}))
security_groups = local.baseline_security_groups
ssm_parameters = merge(module.baseline_presets.ssm_parameters, lookup(local.environment_config, "baseline_ssm_parameters", {}))
secretsmanager_secrets = merge(local.baseline_secretsmanager_secrets, lookup(local.environment_config, "baseline_secretsmanager_secrets", {}))
secretsmanager_secrets = merge(local.baseline_secretsmanager_secrets, lookup(local.environment_config, "baseline_secretsmanager_secrets", {}))
}
2 changes: 1 addition & 1 deletion terraform/environments/ppud/instances.tf
Original file line number Diff line number Diff line change
Expand Up @@ -143,7 +143,7 @@ resource "aws_instance" "s609693lo6vw110" {
}

tags = {
Name = "s609693lo6vw110"
Name = "s609693lo6vw110"
patch_group = "dev_win_patch"
backup = true
}
Expand Down
2 changes: 1 addition & 1 deletion terraform/environments/tipstaff/ecs.tf
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ resource "aws_ecs_cluster" "tipstaff_cluster" {
}

resource "aws_cloudwatch_log_group" "deployment_logs" {
name = "/aws/events/deploymentLogs"
name = "/aws/events/deploymentLogs"
retention_in_days = "7"
}

Expand Down
8 changes: 4 additions & 4 deletions terraform/environments/tipstaff/providers.tf
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
provider "aws" {
region = "eu-west-2"
# access_key = jsondecode(data.aws_secretsmanager_secret_version.get_tactical_products_rds_credentials.secret_string)["ACCESS_KEY"]
# secret_key = jsondecode(data.aws_secretsmanager_secret_version.get_tactical_products_rds_credentials.secret_string)["SECRET_KEY"]
alias = "tacticalproducts"
region = "eu-west-2"
# access_key = jsondecode(data.aws_secretsmanager_secret_version.get_tactical_products_rds_credentials.secret_string)["ACCESS_KEY"]
# secret_key = jsondecode(data.aws_secretsmanager_secret_version.get_tactical_products_rds_credentials.secret_string)["SECRET_KEY"]
alias = "tacticalproducts"
}

data "github_ip_ranges" "github_actions_ips" {}
Loading