Skip to content

Commit 7d44571

Browse files
committed
chore: apply tfutil
1 parent 1bedd2d commit 7d44571

File tree

4 files changed

+11
-10
lines changed

4 files changed

+11
-10
lines changed

README.md

+1
Original file line numberDiff line numberDiff line change
@@ -188,6 +188,7 @@ No modules.
188188
| <a name="input_ecs_task_role_name"></a> [ecs\_task\_role\_name](#input\_ecs\_task\_role\_name) | Name of the ECS Task Role | `string` | `""` | no |
189189
| <a name="input_enable_autoscaling"></a> [enable\_autoscaling](#input\_enable\_autoscaling) | Flag to enable autoscaling for the ECS services | `bool` | `true` | no |
190190
| <a name="input_internal"></a> [internal](#input\_internal) | Flag to determine if the several AWS resources are public (intended for external access, public internet) or private (only intended to be accessed within your AWS VPC or avaiable with other means, a transit gateway for example). | `bool` | `true` | no |
191+
| <a name="input_nbs_auth"></a> [nbs\_auth](#input\_nbs\_auth) | enabled or disabled authentication for the eCR Viewer | `string` | `true` | no |
191192
| <a name="input_owner"></a> [owner](#input\_owner) | Owner of the resources | `string` | `"CDC"` | no |
192193
| <a name="input_phdi_version"></a> [phdi\_version](#input\_phdi\_version) | Version of the PHDI application | `string` | `"v1.6.9"` | no |
193194
| <a name="input_private_subnet_ids"></a> [private\_subnet\_ids](#input\_private\_subnet\_ids) | List of private subnet IDs | `list(string)` | n/a | yes |

_local.tf

+5-5
Original file line numberDiff line numberDiff line change
@@ -9,31 +9,31 @@ locals {
99
registry_username = data.aws_ecr_authorization_token.this.user_name
1010
registry_password = data.aws_ecr_authorization_token.this.password
1111
phdi_repo = "ghcr.io/cdcgov/dibbs-ecr-viewer"
12-
database_url = length(data.aws_secretsmanager_secret_version.postgres_database_url) > 0 ? {
12+
database_url = length(data.aws_secretsmanager_secret_version.postgres_database_url) > 0 ? {
1313
name = "DATABASE_URL",
1414
value = data.aws_secretsmanager_secret_version.postgres_database_url[0].secret_string
15-
} : {
15+
} : {
1616
name = "BLANK_DATABASE_URL",
1717
value = ""
1818
}
1919
sqlserver_user = length(data.aws_secretsmanager_secret_version.sqlserver_user) > 0 ? {
2020
name = "SQL_SERVER_USER",
2121
value = data.aws_secretsmanager_secret_version.sqlserver_user[0].secret_string
22-
} : {
22+
} : {
2323
name = "BLANK_SQL_SERVER_USER",
2424
value = ""
2525
}
2626
sqlserver_password = length(data.aws_secretsmanager_secret_version.sqlserver_password) > 0 ? {
2727
name = "SQL_SERVER_PASSWORD",
2828
value = data.aws_secretsmanager_secret_version.sqlserver_password[0].secret_string
29-
} : {
29+
} : {
3030
name = "BLANK_SQL_SERVER_PASSWORD",
3131
value = ""
3232
}
3333
sqlserver_host = length(data.aws_secretsmanager_secret_version.sqlserver_host) > 0 ? {
3434
name = "SQL_SERVER_HOST",
3535
value = data.aws_secretsmanager_secret_version.sqlserver_host[0].secret_string
36-
} : {
36+
} : {
3737
name = "BLANK_SQL_SERVER_HOST",
3838
value = ""
3939
}

_variable.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,7 @@ variable "tags" {
180180
variable "nbs_auth" {
181181
type = string
182182
description = "enabled or disabled authentication for the eCR Viewer"
183-
default = true
183+
default = true
184184
}
185185

186186
variable "ecr_viewer_auth_pub_key" {

ecs.tf

+4-4
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ resource "aws_ecs_task_definition" "this" {
2424
awslogs-stream-prefix = "ecs"
2525
}
2626
},
27-
essential = true,
27+
essential = true,
2828
mountPoints = [],
2929
portMappings = [
3030
{
@@ -35,8 +35,8 @@ resource "aws_ecs_task_definition" "this" {
3535
}
3636
],
3737
systemControls = [],
38-
volumesFrom = [],
39-
environment = each.value.env_vars,
38+
volumesFrom = [],
39+
environment = each.value.env_vars,
4040
}
4141
])
4242
task_role_arn = each.key == "ecr-viewer" ? aws_iam_role.s3_role_for_ecr_viewer.arn : aws_iam_role.ecs_task.arn
@@ -69,7 +69,7 @@ resource "aws_ecs_service" "this" {
6969
force_new_deployment = true
7070
triggers = {
7171
timestamp = plantimestamp()
72-
version = local.service_data[each.key].app_version
72+
version = local.service_data[each.key].app_version
7373
}
7474

7575
dynamic "load_balancer" {

0 commit comments

Comments
 (0)