generated from ministryofjustice/template-repository
-
Notifications
You must be signed in to change notification settings - Fork 20
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #7956 from ministryofjustice/date_2024_09_30
GitHub Actions Code Formatter workflow
- Loading branch information
Showing
17 changed files
with
78 additions
and
78 deletions.
There are no files selected for viewing
72 changes: 36 additions & 36 deletions
72
terraform/environments/delius-core/modules/components/dms/dms_db_target_endpoints.tf
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,44 +1,44 @@ | ||
# In client environments the dms_user_target_endpoint.write_database must be defined | ||
# The endpoint for user (USER_ and PROBATION_AREA_USER) is the Delius primary database. | ||
resource "aws_dms_endpoint" "dms_user_target_endpoint_db" { | ||
count = try(var.dms_config.user_target_endpoint.write_database, null) == null ? 0 : 1 | ||
database_name = var.dms_config.user_target_endpoint.write_database | ||
endpoint_id = "user-data-to-${lower(var.dms_config.user_target_endpoint.write_database)}" | ||
endpoint_type = "target" | ||
engine_name = "oracle" | ||
username = local.dms_audit_username | ||
password = join(",",[jsondecode(data.aws_secretsmanager_secret_version.delius_core_application_passwords.secret_string)[local.dms_audit_username],jsondecode(data.aws_secretsmanager_secret_version.delius_core_application_passwords.secret_string)[local.dms_audit_username]]) | ||
server_name = join(".",[var.oracle_db_server_names["primarydb"],var.account_config.route53_inner_zone_info.name]) | ||
port = local.db_tcps_port | ||
extra_connection_attributes = "UseDirectPathFullLoad=false;ArchivedLogDestId=1;AdditionalArchivedLogDestId=32;asm_server=${join(".",[var.oracle_db_server_names["primarydb"],var.account_config.route53_inner_zone_info.name])}:${local.db_tcps_port}/+ASM;asm_user=${local.dms_audit_username};UseBFile=true;UseLogminerReader=false;" | ||
# We initially use an empty wallet for encryption - a populated wallet will be added by DMS configuration | ||
ssl_mode = "verify-ca" | ||
certificate_arn = aws_dms_certificate.empty_oracle_wallet.certificate_arn | ||
# Ignore subsequent replacement with a valid wallet | ||
# lifecycle { | ||
# ignore_changes = [certificate_arn] | ||
# } | ||
depends_on = [aws_dms_certificate.empty_oracle_wallet] | ||
count = try(var.dms_config.user_target_endpoint.write_database, null) == null ? 0 : 1 | ||
database_name = var.dms_config.user_target_endpoint.write_database | ||
endpoint_id = "user-data-to-${lower(var.dms_config.user_target_endpoint.write_database)}" | ||
endpoint_type = "target" | ||
engine_name = "oracle" | ||
username = local.dms_audit_username | ||
password = join(",", [jsondecode(data.aws_secretsmanager_secret_version.delius_core_application_passwords.secret_string)[local.dms_audit_username], jsondecode(data.aws_secretsmanager_secret_version.delius_core_application_passwords.secret_string)[local.dms_audit_username]]) | ||
server_name = join(".", [var.oracle_db_server_names["primarydb"], var.account_config.route53_inner_zone_info.name]) | ||
port = local.db_tcps_port | ||
extra_connection_attributes = "UseDirectPathFullLoad=false;ArchivedLogDestId=1;AdditionalArchivedLogDestId=32;asm_server=${join(".", [var.oracle_db_server_names["primarydb"], var.account_config.route53_inner_zone_info.name])}:${local.db_tcps_port}/+ASM;asm_user=${local.dms_audit_username};UseBFile=true;UseLogminerReader=false;" | ||
# We initially use an empty wallet for encryption - a populated wallet will be added by DMS configuration | ||
ssl_mode = "verify-ca" | ||
certificate_arn = aws_dms_certificate.empty_oracle_wallet.certificate_arn | ||
# Ignore subsequent replacement with a valid wallet | ||
# lifecycle { | ||
# ignore_changes = [certificate_arn] | ||
# } | ||
depends_on = [aws_dms_certificate.empty_oracle_wallet] | ||
} | ||
|
||
# In repository environments the end point for audit (AUDITED_INTERACTION, BUSINESS_INTERACTION) is the Delius primary database. | ||
resource "aws_dms_endpoint" "dms_audit_target_endpoint_db" { | ||
count = try(var.dms_config.audit_target_endpoint.write_database, null) == null ? 0 : 1 | ||
database_name = var.dms_config.audit_target_endpoint.write_database | ||
endpoint_id = "audit-data-to-${lower(var.dms_config.audit_target_endpoint.write_database)}" | ||
endpoint_type = "target" | ||
engine_name = "oracle" | ||
username = local.dms_audit_username | ||
password = join(",",[jsondecode(data.aws_secretsmanager_secret_version.delius_core_application_passwords.secret_string)[local.dms_audit_username],jsondecode(data.aws_secretsmanager_secret_version.delius_core_application_passwords.secret_string)[local.dms_audit_username]]) | ||
server_name = join(".",[var.oracle_db_server_names["primarydb"],var.account_config.route53_inner_zone_info.name]) | ||
port = local.db_tcps_port | ||
extra_connection_attributes = "UseDirectPathFullLoad=false;ArchivedLogDestId=1;AdditionalArchivedLogDestId=32;asm_server=${join(".",[var.oracle_db_server_names["primarydb"],var.account_config.route53_inner_zone_info.name])}:${local.db_tcps_port}/+ASM;asm_user=${local.dms_audit_username};UseBFile=true;UseLogminerReader=false;" | ||
# We initially use an empty wallet for encryption - a populated wallet will be added by DMS configuration | ||
ssl_mode = "verify-ca" | ||
certificate_arn = aws_dms_certificate.empty_oracle_wallet.certificate_arn | ||
# Ignore subsequent replacement with a valid wallet | ||
# lifecycle { | ||
# ignore_changes = [certificate_arn] | ||
# } | ||
depends_on = [aws_dms_certificate.empty_oracle_wallet] | ||
count = try(var.dms_config.audit_target_endpoint.write_database, null) == null ? 0 : 1 | ||
database_name = var.dms_config.audit_target_endpoint.write_database | ||
endpoint_id = "audit-data-to-${lower(var.dms_config.audit_target_endpoint.write_database)}" | ||
endpoint_type = "target" | ||
engine_name = "oracle" | ||
username = local.dms_audit_username | ||
password = join(",", [jsondecode(data.aws_secretsmanager_secret_version.delius_core_application_passwords.secret_string)[local.dms_audit_username], jsondecode(data.aws_secretsmanager_secret_version.delius_core_application_passwords.secret_string)[local.dms_audit_username]]) | ||
server_name = join(".", [var.oracle_db_server_names["primarydb"], var.account_config.route53_inner_zone_info.name]) | ||
port = local.db_tcps_port | ||
extra_connection_attributes = "UseDirectPathFullLoad=false;ArchivedLogDestId=1;AdditionalArchivedLogDestId=32;asm_server=${join(".", [var.oracle_db_server_names["primarydb"], var.account_config.route53_inner_zone_info.name])}:${local.db_tcps_port}/+ASM;asm_user=${local.dms_audit_username};UseBFile=true;UseLogminerReader=false;" | ||
# We initially use an empty wallet for encryption - a populated wallet will be added by DMS configuration | ||
ssl_mode = "verify-ca" | ||
certificate_arn = aws_dms_certificate.empty_oracle_wallet.certificate_arn | ||
# Ignore subsequent replacement with a valid wallet | ||
# lifecycle { | ||
# ignore_changes = [certificate_arn] | ||
# } | ||
depends_on = [aws_dms_certificate.empty_oracle_wallet] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
4 changes: 2 additions & 2 deletions
4
terraform/environments/digital-prison-reporting/modules/dynamo_tables/main.tf
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2 changes: 1 addition & 1 deletion
2
terraform/environments/digital-prison-reporting/modules/pipeline_trigger/main.tf
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -13,4 +13,4 @@ | |
"mattprice": "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEiltWt3w24iTeybMTXYLNiS8WusBqTw929Q4kMtFwuA" | ||
} | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters