|
@@ -63,6 +63,10 @@ generate "provider" {
|
|
|
path = "provider.tf"
|
|
|
if_exists = "overwrite_terragrunt"
|
|
|
contents = <<EOF
|
|
|
+provider "template" {
|
|
|
+ version = "~> 2.1"
|
|
|
+}
|
|
|
+
|
|
|
provider "aws" {
|
|
|
version = "~> 2.66"
|
|
|
region = "${local.aws_region}"
|
|
@@ -86,16 +90,28 @@ provider "aws" {
|
|
|
alias = "common"
|
|
|
}
|
|
|
|
|
|
-# The "legacy" provider, used mainly for DNS. This is why you have to log into
|
|
|
-# commercial for govcloud plans.
|
|
|
+# The "common-services-commercial" provider is used for public DNS entries
|
|
|
provider "aws" {
|
|
|
region = "us-east-1"
|
|
|
- allowed_account_ids = ["527700175026", "477548533976" ]
|
|
|
+ allowed_account_ids = [ "471284459109" ]
|
|
|
profile = "commercial"
|
|
|
- alias = "legacy"
|
|
|
+ alias = "mdr-common-services-commercial"
|
|
|
+
|
|
|
+ assume_role {
|
|
|
+ role_arn = "arn:aws:iam::471284459109:role/user/mdr_terraformer"
|
|
|
+ session_name = "terraform"
|
|
|
+ }
|
|
|
+}
|
|
|
+
|
|
|
+# The "C2" provider, used for private DNS
|
|
|
+provider "aws" {
|
|
|
+ region = "us-gov-east-1"
|
|
|
+ allowed_account_ids = [ "721817724804", "738800754746" ]
|
|
|
+ profile = "govcloud"
|
|
|
+ alias = "c2"
|
|
|
|
|
|
assume_role {
|
|
|
- role_arn = "arn:aws:iam::${ local.legacy_account }:role/user/mdr_terraformer"
|
|
|
+ role_arn = "arn:aws-us-gov:iam::${ local.environment_vars.locals.c2_accounts["aws-us-gov"] }:role/user/mdr_terraformer"
|
|
|
session_name = "terraform"
|
|
|
}
|
|
|
}
|
|
@@ -103,7 +119,6 @@ EOF
|
|
|
}
|
|
|
|
|
|
# Configure Terragrunt to automatically store tfstate files in an S3 bucket
|
|
|
-# We'll want to reenable this when we have valid settings
|
|
|
remote_state {
|
|
|
backend = "s3"
|
|
|
generate = {
|