Skip to content

Conversation

@steph-torres-nhs
Copy link
Contributor

No description provided.

@steph-torres-nhs steph-torres-nhs changed the title [PRM-366] Create a cron jobs to produce summaries around Degrade events [PRM-366-2] amend typo in principle degrades daily summary schedule Jul 9, 2025
@github-actions
Copy link

github-actions bot commented Jul 9, 2025

Report for degrades-dashboards on environment: dev

Terraform Format and Style 🖌success

Format Output


Terraform Initialization ⚙️success

Initialization Output

Initializing the backend...

Successfully configured the backend "s3"! Terraform will automatically
use this backend unless the backend configuration changes.
Initializing provider plugins...
- Finding hashicorp/aws versions matching "~> 5.0"...
- Installing hashicorp/aws v5.100.0...
- Installed hashicorp/aws v5.100.0 (signed by HashiCorp)
Terraform has created a lock file .terraform.lock.hcl to record the provider
selections it made above. Include this file in your version control repository
so that Terraform can guarantee to make the same selections by default when
you run "terraform init" in the future.

Terraform has been successfully initialized!

You may now begin working with Terraform. Try running "terraform plan" to see
any changes that are required for your infrastructure. All Terraform commands
should now work.

If you ever set or change modules or backend configuration for Terraform,
rerun this command to reinitialize your working directory. If you forget, other
commands will detect it and remind you to do so if necessary.

Terraform Validation 🤖success

Validation Output

Success! The configuration is valid.


Terraform Plan 📖success

Show Plan (5 to add, 3 to change, 4 to destroy)


Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create
  ~ update in-place
  - destroy
-/+ destroy and then create replacement

Terraform will perform the following actions:

  # aws_iam_policy.degrades_message_table_access must be replaced
-/+ resource "aws_iam_policy" "degrades_message_table_access" {
      ~ arn              = "arn:aws:iam::343515223843:policy/degrades_table_access_policy" -> (known after apply)
      ~ attachment_count = 0 -> (known after apply)
      ~ id               = "arn:aws:iam::343515223843:policy/degrades_table_access_policy" -> (known after apply)
      ~ name             = "degrades_table_access_policy" -> "degrades_message_table_access_policy" # forces replacement
      + name_prefix      = (known after apply)
      ~ policy_id        = "ANPAU76Y2K4R6NRC3YHSG" -> (known after apply)
      - tags             = {} -> null
      ~ tags_all         = {} -> (known after apply)
        # (3 unchanged attributes hidden)
    }

  # aws_iam_policy.lambda_layer will be updated in-place
  ~ resource "aws_iam_policy" "lambda_layer" {
        id               = "arn:aws:iam::343515223843:policy/lambda_layer_policy"
        name             = "lambda_layer_policy"
      ~ policy           = jsonencode(
            {
              - Statement = [
                  - {
                      - Action   = [
                          - "lambda:GetLayerVersion",
                          - "lambda:ListLayerVersions",
                          - "lambda:ListLayers",
                        ]
                      - Effect   = "Allow"
                      - Resource = [
                          - "arn:aws:lambda:eu-west-2:343515223843:layer:dev_degrades_lambda_layer:5:*",
                        ]
                    },
                ]
              - Version   = "2012-10-17"
            }
        ) -> (known after apply)
        tags             = {}
        # (7 unchanged attributes hidden)
    }

  # aws_iam_policy.read_registrations_mi_events will be destroyed
  # (because aws_iam_policy.read_registrations_mi_events is not in configuration)
  - resource "aws_iam_policy" "read_registrations_mi_events" {
      - arn              = "arn:aws:iam::343515223843:policy/dev-degrades_api_dashboards_lambda" -> null
      - attachment_count = 0 -> null
      - id               = "arn:aws:iam::343515223843:policy/dev-degrades_api_dashboards_lambda" -> null
      - name             = "dev-degrades_api_dashboards_lambda" -> null
      - path             = "/" -> null
      - policy           = jsonencode(
            {
              - Statement = [
                  - {
                      - Action   = [
                          - "s3:List*",
                          - "s3:Get*",
                          - "s3:Describe*",
                          - "s3-object-lambda:List*",
                          - "s3-object-lambda:Get*",
                        ]
                      - Effect   = "Allow"
                      - Resource = [
                          - "arn:aws:s3:::prm-gp-registrations-mi-events-dev/*",
                          - "arn:aws:s3:::prm-gp-registrations-mi-events-dev",
                        ]
                    },
                ]
              - Version   = "2012-10-17"
            }
        ) -> null
      - policy_id        = "ANPAU76Y2K4RUMCDIWQOM" -> null
      - tags             = {} -> null
      - tags_all         = {} -> null
        # (2 unchanged attributes hidden)
    }

  # aws_iam_role.degrades_api_lambda_role will be destroyed
  # (because aws_iam_role.degrades_api_lambda_role is not in configuration)
  - resource "aws_iam_role" "degrades_api_lambda_role" {
      - arn                   = "arn:aws:iam::343515223843:role/dev_degrades_api_lambda_role" -> null
      - assume_role_policy    = jsonencode(
            {
              - Statement = [
                  - {
                      - Action    = "sts:AssumeRole"
                      - Effect    = "Allow"
                      - Principal = {
                          - Service = "lambda.amazonaws.com"
                        }
                    },
                ]
              - Version   = "2012-10-17"
            }
        ) -> null
      - create_date           = "2025-06-19T13:50:13Z" -> null
      - force_detach_policies = false -> null
      - id                    = "dev_degrades_api_lambda_role" -> null
      - managed_policy_arns   = [] -> null
      - max_session_duration  = 3600 -> null
      - name                  = "dev_degrades_api_lambda_role" -> null
      - path                  = "/" -> null
      - tags                  = {} -> null
      - tags_all              = {} -> null
      - unique_id             = "AROAU76Y2K4RZ4AXUAPA3" -> null
        # (3 unchanged attributes hidden)
    }

  # aws_iam_role_policy_attachment.degrades_daily_summary_degrades_message_table_access will be created
  + resource "aws_iam_role_policy_attachment" "degrades_daily_summary_degrades_message_table_access" {
      + id         = (known after apply)
      + policy_arn = (known after apply)
      + role       = "degrades_daily_summary_lambda_role"
    }

  # aws_iam_role_policy_attachment.degrades_message_receiver_lambda_dynamodb will be created
  + resource "aws_iam_role_policy_attachment" "degrades_message_receiver_lambda_dynamodb" {
      + id         = (known after apply)
      + policy_arn = (known after apply)
      + role       = "degrades_message_receiver_lambda_role"
    }

  # aws_lambda_function.degrades_daily_summary will be updated in-place
  ~ resource "aws_lambda_function" "degrades_daily_summary" {
        id                             = "dev_degrades_daily_summary_lambda"
      ~ last_modified                  = "2025-07-09T10:13:12.843+0000" -> (known after apply)
      ~ source_code_hash               = "hEM4fswN+i/XKc+7HSt20E6bZgbnQSrIr/qy+COUYSY=" -> "E6rna3gRVunvSCa+kP7v2qlQD4JnuTrxFMjpfPCoHgQ="
        tags                           = {}
        # (27 unchanged attributes hidden)

        # (3 unchanged blocks hidden)
    }

  # aws_lambda_function.degrades_message_receiver will be updated in-place
  ~ resource "aws_lambda_function" "degrades_message_receiver" {
        id                             = "dev_degrades_message_receiver_lambda"
      ~ last_modified                  = "2025-07-09T10:13:21.000+0000" -> (known after apply)
      ~ layers                         = [
          - "arn:aws:lambda:eu-west-2:343515223843:layer:dev_degrades_lambda_layer:5",
        ] -> (known after apply)
      ~ source_code_hash               = "ppD5KIx1JeSMVKXe8N8h5o2QAHyzkNOWFZNkcNErNMU=" -> "NdJ/MwE6NKTFZs4NvJfhcPxI2xivOT8BNFgGXmTTOE0="
        tags                           = {}
        # (26 unchanged attributes hidden)

        # (4 unchanged blocks hidden)
    }

  # aws_lambda_layer_version.degrades must be replaced
-/+ resource "aws_lambda_layer_version" "degrades" {
      ~ arn                         = "arn:aws:lambda:eu-west-2:343515223843:layer:dev_degrades_lambda_layer:5" -> (known after apply)
      ~ code_sha256                 = "Asj0GHmHDhHPHdNEs8erE0/y2QwYjFBbSrbbYNz8DTo=" -> (known after apply)
      ~ created_date                = "2025-07-09T10:13:15.476+0000" -> (known after apply)
      ~ id                          = "arn:aws:lambda:eu-west-2:343515223843:layer:dev_degrades_lambda_layer:5" -> (known after apply)
      ~ layer_arn                   = "arn:aws:lambda:eu-west-2:343515223843:layer:dev_degrades_lambda_layer" -> (known after apply)
      + signing_job_arn             = (known after apply)
      + signing_profile_version_arn = (known after apply)
      ~ source_code_hash            = "Asj0GHmHDhHPHdNEs8erE0/y2QwYjFBbSrbbYNz8DTo=" -> "YcXAZ00Xi8C+D3i4r/loNPqTmFPMlefoeO6mUi+k15M=" # forces replacement
      ~ source_code_size            = 28382299 -> (known after apply)
      ~ version                     = "5" -> (known after apply)
        # (7 unchanged attributes hidden)
    }

  # aws_lambda_permission.degrades_daily_summary_schedule will be created
  + resource "aws_lambda_permission" "degrades_daily_summary_schedule" {
      + action              = "lambda:InvokeFunction"
      + function_name       = "dev_degrades_daily_summary_lambda"
      + id                  = (known after apply)
      + principal           = "events.amazonaws.com"
      + source_arn          = "arn:aws:events:eu-west-2:343515223843:rule/dev_degrades_daily_summary_lambda_schedule"
      + statement_id        = (known after apply)
      + statement_id_prefix = (known after apply)
    }

Plan: 5 to add, 3 to change, 4 to destroy.

@AndyFlintNHS AndyFlintNHS merged commit 605b8d7 into main Jul 9, 2025
6 checks passed
@AndyFlintNHS AndyFlintNHS deleted the PMR-366 branch July 9, 2025 10:47
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants