Skip to content

Commit

Permalink
Merge pull request #325 from ministryofjustice/feature/nd174-secrets-…
Browse files Browse the repository at this point in the history
…accessible-in-plain-text

configured vpc endpoint to be always on, previously depended on bastions being enabled
  • Loading branch information
asifamirat00 authored May 30, 2024
2 parents 7d79add + 222c626 commit f38be34
Showing 1 changed file with 3 additions and 2 deletions.
5 changes: 3 additions & 2 deletions modules/vpc/endpoints.tf
Original file line number Diff line number Diff line change
Expand Up @@ -27,10 +27,9 @@ resource "aws_vpc_endpoint" "s3" {
tags = var.tags
}

// endpoints required for session manager
// enpoint required for bastions and ecs task get ssm parameters

resource "aws_vpc_endpoint" "ssm" {
count = var.ssm_session_manager_endpoints ? 1 : 0
vpc_id = module.vpc.vpc_id
subnet_ids = module.vpc.public_subnets
service_name = "com.amazonaws.${var.region}.ssm"
Expand All @@ -41,6 +40,8 @@ resource "aws_vpc_endpoint" "ssm" {
depends_on = [aws_security_group.endpoints]
}

// endpoints required for bastions session manager

resource "aws_vpc_endpoint" "ssmmessages" {
count = var.ssm_session_manager_endpoints ? 1 : 0
vpc_id = module.vpc.vpc_id
Expand Down

0 comments on commit f38be34

Please sign in to comment.