1- # aws_iam_role.github_role_dev [0]:
2- resource "aws_iam_role" "github_role_dev " {
1+ # aws_iam_role.dev_github_actions [0]:
2+ resource "aws_iam_role" "dev_github_actions " {
33 count = local. is_sandbox_or_dev ? 1 : 0
44 name = " ${ terraform . workspace } -github-actions-role"
5- description = " This role is to provide access for GitHub actions to the development environment. "
5+ description = " This role is to provide access for GitHub Actions to the ${ terraform . workspace } environment. "
66 force_detach_policies = false
77 max_session_duration = 3600
88 name_prefix = null
@@ -48,7 +48,7 @@ resource "aws_iam_role" "github_role_dev" {
4848
4949resource "aws_iam_role_policy" "cloudtrail_dev" {
5050 count = local. is_sandbox_or_dev ? 1 : 0
51- role = aws_iam_role. github_role_dev [0 ]. id
51+ role = aws_iam_role. dev_github_actions [0 ]. id
5252 name = " cloudtrail"
5353 policy = jsonencode (
5454 {
@@ -82,7 +82,7 @@ resource "aws_iam_role_policy" "cloudtrail_dev" {
8282
8383resource "aws_iam_role_policy" "cloudwatch_logs_policy_dev" {
8484 count = local. is_sandbox_or_dev ? 1 : 0
85- role = aws_iam_role. github_role_dev [0 ]. id
85+ role = aws_iam_role. dev_github_actions [0 ]. id
8686 name = " cloudwatch_logs_policy"
8787 policy = jsonencode (
8888 {
@@ -124,7 +124,7 @@ resource "aws_iam_role_policy" "cloudwatch_logs_policy_dev" {
124124
125125resource "aws_iam_role_policy" "ecs_policy_dev" {
126126 count = local. is_sandbox_or_dev ? 1 : 0
127- role = aws_iam_role. github_role_dev [0 ]. id
127+ role = aws_iam_role. dev_github_actions [0 ]. id
128128 name = " ecs_policy"
129129 policy = jsonencode (
130130 {
@@ -146,7 +146,7 @@ resource "aws_iam_role_policy" "ecs_policy_dev" {
146146
147147resource "aws_iam_role_policy" "github_actions_waf_override_dev" {
148148 count = local. is_sandbox_or_dev ? 1 : 0
149- role = aws_iam_role. github_role_dev [0 ]. id
149+ role = aws_iam_role. dev_github_actions [0 ]. id
150150 name = " github_actions_waf_override"
151151 policy = jsonencode (
152152 {
@@ -164,7 +164,7 @@ resource "aws_iam_role_policy" "github_actions_waf_override_dev" {
164164
165165resource "aws_iam_role_policy" "lambda_layer_policy_dev" {
166166 count = local. is_sandbox_or_dev ? 1 : 0
167- role = aws_iam_role. github_role_dev [0 ]. id
167+ role = aws_iam_role. dev_github_actions [0 ]. id
168168 name = " lambda_layer_policy"
169169 policy = jsonencode (
170170 {
@@ -192,7 +192,7 @@ resource "aws_iam_role_policy" "lambda_layer_policy_dev" {
192192
193193resource "aws_iam_role_policy" "rum_policy_dev" {
194194 count = local. is_sandbox_or_dev ? 1 : 0
195- role = aws_iam_role. github_role_dev [0 ]. id
195+ role = aws_iam_role. dev_github_actions [0 ]. id
196196 name = " rum_policy"
197197 policy = jsonencode (
198198 {
@@ -254,7 +254,7 @@ resource "aws_iam_role_policy" "rum_policy_dev" {
254254
255255resource "aws_iam_role_policy" "step_functions_dev" {
256256 count = local. is_sandbox_or_dev ? 1 : 0
257- role = aws_iam_role. github_role_dev [0 ]. id
257+ role = aws_iam_role. dev_github_actions [0 ]. id
258258 name = " step_functions"
259259 policy = jsonencode (
260260 {
@@ -280,7 +280,7 @@ resource "aws_iam_role_policy" "step_functions_dev" {
280280
281281resource "aws_iam_role_policy" "github_terraform_tagging_policy_dev" {
282282 count = local. is_sandbox_or_dev ? 1 : 0
283- role = aws_iam_role. github_role_dev [0 ]. id
283+ role = aws_iam_role. dev_github_actions [0 ]. id
284284 name = " github_terraform_tagging_policy"
285285 policy = jsonencode (
286286 {
@@ -389,13 +389,13 @@ resource "aws_iam_role_policy" "github_terraform_tagging_policy_dev" {
389389
390390resource "aws_iam_role_policy_attachment" "ReadOnlyAccess_dev" {
391391 count = local. is_sandbox_or_dev ? 1 : 0
392- role = aws_iam_role. github_role_dev [0 ]. name
392+ role = aws_iam_role. dev_github_actions [0 ]. name
393393 policy_arn = " arn:aws:iam::aws:policy/ReadOnlyAccess"
394394}
395395
396396resource "aws_iam_role_policy_attachment" "github_actions_terraform_full_dev" {
397397 count = local. is_sandbox_or_dev ? 1 : 0
398- role = aws_iam_role. github_role_dev [0 ]. name
398+ role = aws_iam_role. dev_github_actions [0 ]. name
399399 policy_arn = aws_iam_policy. github_actions_terraform_full_dev [0 ]. arn
400400}
401401
@@ -657,7 +657,7 @@ resource "aws_iam_policy" "github_actions_terraform_full_dev" {
657657
658658resource "aws_iam_role_policy_attachment" "github_actions_extended_dev" {
659659 count = local. is_sandbox_or_dev ? 1 : 0
660- role = aws_iam_role. github_role_dev [0 ]. name
660+ role = aws_iam_role. dev_github_actions [0 ]. name
661661 policy_arn = aws_iam_policy. github_actions_extended_dev [0 ]. arn
662662}
663663
0 commit comments