Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
698 changes: 353 additions & 345 deletions atlantis.yaml

Large diffs are not rendered by default.

12 changes: 12 additions & 0 deletions terraform/ecr/dg-id/ap-northeast-2/backend.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
terraform {
required_version = ">= 1.0.0"

backend "s3" {
bucket = "dg-id-apnortheast2-tfstate"
key = "provisioning/terraform/ecr/dg-id/ap-northeast-2/terraform.tfstate"
region = "ap-northeast-2"
encrypt = true
dynamodb_table = "terraform-lock-table"
}
}

Original file line number Diff line number Diff line change
@@ -1,12 +1,12 @@
resource "aws_ecr_repository" "sample" {
name = "sample"
resource "aws_ecr_repository" "demo" {
name = "demo"
image_scanning_configuration {
scan_on_push = true
}
image_tag_mutability = "IMMUTABLE"
}
resource "aws_ecr_repository_policy" "sample" {
repository = aws_ecr_repository.sample.name
resource "aws_ecr_repository_policy" "demo" {
repository = aws_ecr_repository.demo.name
policy = jsonencode({
"Version" : "2008-10-17",
"Statement" : [
Expand Down
File renamed without changes.
12 changes: 0 additions & 12 deletions terraform/ecr/zerone-id/ap-northeast-2/backend.tf

This file was deleted.

Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ provider "aws" {
}

resource "aws_s3_bucket" "tfstate" {
bucket = "zerone-id-apnortheast2-tfstate"
bucket = "dg-id-apnortheast2-tfstate"
}

resource "aws_s3_bucket_versioning" "versioning" {
Expand Down
166 changes: 0 additions & 166 deletions terraform/init/zerone-id/terraform.tfstate

This file was deleted.

50 changes: 25 additions & 25 deletions terraform/variables/var_global.tf
Original file line number Diff line number Diff line change
Expand Up @@ -13,10 +13,10 @@ variable "atlantis_user" {
# Add all account ID to here
variable "account_id" {
default = {
id = "066346343248"
art-id = "816736805842"
datadog = "464622532012"
sumologic = "926226587429"
id = "545009828941"
# art-id = "816736805842"
# datadog = "464622532012"
# sumologic = "926226587429"
}
}

Expand All @@ -26,24 +26,24 @@ variable "remote_state" {
default = {
vpc = {
tmcd_apnortheast2 = {
bucket = "zerone-id-apnortheast2-tfstate"
bucket = "dg-id-apnortheast2-tfstate"
key = "provisioning/terraform/vpc/tmcd_apnortheast2/terraform.tfstate"
region = "ap-northeast-2"
}
}
iam = {
zerone-id = {
bucket = "zerone-id-apnortheast2-tfstate"
key = "provisioning/terraform/iam/zerone-id/terraform.tfstate"
dg-id = {
bucket = "dg-id-apnortheast2-tfstate"
key = "provisioning/terraform/iam/dg-id/terraform.tfstate"
region = "ap-northeast-2"
}
}

kms = {
zerone-id = {
dg-id = {
apne2 = {
bucket = "zerone-id-apnortheast2-tfstate"
key = "provisioning/terraform/kms/zerone-id/ap-northeast-2/terraform.tfstate"
bucket = "dg-id-apnortheast2-tfstate"
key = "provisioning/terraform/kms/dg-id/ap-northeast-2/terraform.tfstate"
region = "ap-northeast-2"
}
}
Expand All @@ -52,62 +52,62 @@ variable "remote_state" {
ecs = {
nginx = {
tmcdapne2 = {
bucket = "zerone-id-apnortheast2-tfstate"
bucket = "dg-id-apnortheast2-tfstate"
key = "provisioning/terraform/ecs/nginx/tmcd_apnortheast2/terraform.tfstate"
region = "ap-northeast-2"
}
}
demo = {
tmcdapne2 = {
bucket = "zerone-id-apnortheast2-tfstate"
bucket = "dg-id-apnortheast2-tfstate"
key = "provisioning/terraform/ecs/demo/tmcd_apnortheast2/terraform.tfstate"
region = "ap-northeast-2"
}
}
}

security_group = {
zerone-id = {
dg-id = {
tmcdapne2 = {
bucket = "zerone-id-apnortheast2-tfstate"
key = "provisioning/terraform/securitygroup/zerone-id/tmcd_apnortheast2/terraform.tfstate"
bucket = "dg-id-apnortheast2-tfstate"
key = "provisioning/terraform/securitygroup/dg-id/tmcd_apnortheast2/terraform.tfstate"
region = "ap-northeast-2"
}
}
}

codedeploy = {
zerone-id = {
dg-id = {
apne2 = {
bucket = "zerone-id-apnortheast2-tfstate"
bucket = "dg-id-apnortheast2-tfstate"
key = "provisioning/terraform/codedeploy/ap-northeast-2/terraform.tfstate"
region = "ap-northeast-2"
}
}
}

secretsmanager = {
zerone-id = {
dg-id = {
apne2 = {
bucket = "zerone-id-apnortheast2-tfstate"
key = "provisioning/terraform/secretsmanager/zerone-id/ap-northeast-2/terraform.tfstate"
bucket = "dg-id-apnortheast2-tfstate"
key = "provisioning/terraform/secretsmanager/dg-id/ap-northeast-2/terraform.tfstate"
region = "ap-northeast-2"
}
}
}

eks = {
tmcdapne2-nhwy = {
bucket = "zerone-id-apnortheast2-tfstate"
bucket = "dg-id-apnortheast2-tfstate"
key = "provisioning/terraform/eks/tmcd_apnortheast2/tmcdapne2-nhwy/terraform.tfstate"
region = "ap-northeast-2"
}
}

s3 = {
zerone-id = {
bucket = "zerone-id-apnortheast2-tfstate"
key = "provisioning/terraform/s3/zerone-id/terraform.tfstate"
dg-id = {
bucket = "dg-id-apnortheast2-tfstate"
key = "provisioning/terraform/s3/dg-id/terraform.tfstate"
region = "ap-northeast-2"
}
}
Expand Down