From 4ef496f2b9e809c26f86fa48fd7dfae49e2f4743 Mon Sep 17 00:00:00 2001 From: leej3 Date: Wed, 15 Jan 2025 09:50:52 +0000 Subject: [PATCH] align tf/actions role name --- .github/workflows/terraform.yml | 2 +- terraform/modules/iam/main.tf | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/.github/workflows/terraform.yml b/.github/workflows/terraform.yml index 9d98594..ad7e8d6 100644 --- a/.github/workflows/terraform.yml +++ b/.github/workflows/terraform.yml @@ -41,7 +41,7 @@ jobs: - name: Configure AWS Credentials uses: aws-actions/configure-aws-credentials@v4 with: - role-to-assume: arn:aws:iam::${{ secrets.AWS_ACCOUNT_ID }}:role/github-actions-role-shared + role-to-assume: arn:aws:iam::${{ secrets.AWS_ACCOUNT_ID }}:role/github-actions-role-etl aws-region: ${{ secrets.AWS_REGION }} audience: sts.amazonaws.com diff --git a/terraform/modules/iam/main.tf b/terraform/modules/iam/main.tf index 47a44b8..7995736 100644 --- a/terraform/modules/iam/main.tf +++ b/terraform/modules/iam/main.tf @@ -47,7 +47,7 @@ resource "aws_iam_policy" "cd" { } resource "aws_iam_role" "cd" { - name = "${var.cd_iam_role_policy_name}-dsst-${var.environment}" + name = "github-actions-role-etl" assume_role_policy = templatefile("${path.module}/policies/assume-role.json.tftpl", { AWS_ACCOUNT_ID = var.AWS_ACCOUNT_ID