diff --git a/.github/workflows/cd-prod-target.yml b/.github/workflows/cd-prod-target.yml index c43f661079..9d5f458d7a 100644 --- a/.github/workflows/cd-prod-target.yml +++ b/.github/workflows/cd-prod-target.yml @@ -55,7 +55,7 @@ jobs: - name: Terraform Apply working-directory: ./apps/infra/production/${{ github.event.inputs.terraform_project }} - run: terraform apply plan.out -input=false + run: terraform apply -input=false plan.out deploy-terraform-codedang: name: Deploy Terraform Codedang Project @@ -100,4 +100,4 @@ jobs: - name: Terraform Apply working-directory: ./apps/infra/production/codedang - run: terraform apply plan.out -input=false + run: terraform apply -input=false plan.out diff --git a/.github/workflows/cd-prod.yml b/.github/workflows/cd-prod.yml index 87b25191a1..1fdf8fafc9 100644 --- a/.github/workflows/cd-prod.yml +++ b/.github/workflows/cd-prod.yml @@ -135,4 +135,4 @@ jobs: - name: Terraform Apply working-directory: ./apps/infra/production/codedang - run: terraform apply plan.out -input=false + run: terraform apply -input=false plan.out diff --git a/apps/infra/production/codedang/iam_ecs_instance_role.tf b/apps/infra/production/codedang/iam_ecs_instance_role.tf index d6a3e7e133..b97ab4c3ce 100644 --- a/apps/infra/production/codedang/iam_ecs_instance_role.tf +++ b/apps/infra/production/codedang/iam_ecs_instance_role.tf @@ -11,8 +11,11 @@ data "aws_iam_policy_document" "ec2_assume_role" { resource "aws_iam_role" "ecs_container_instance_role" { name = "Codedang-ECS-Container-Instance-Role" - description = "ECS가 EC2 인스턴스를 등록할 수 있는 권한" assume_role_policy = data.aws_iam_policy_document.ec2_assume_role.json + + tags = { + Description = "ECS가 EC2 인스턴스를 등록할 수 있는 권한" + } } resource "aws_iam_role_policy_attachment" "ecs_container_instance_role" { diff --git a/apps/infra/production/codedang/iam_ecs_task_execution_role.tf b/apps/infra/production/codedang/iam_ecs_task_execution_role.tf index dc2ed4e2f4..d9dfedc644 100644 --- a/apps/infra/production/codedang/iam_ecs_task_execution_role.tf +++ b/apps/infra/production/codedang/iam_ecs_task_execution_role.tf @@ -11,8 +11,11 @@ data "aws_iam_policy_document" "task_assume_role" { resource "aws_iam_role" "ecs_task_execution_role" { name = "Codedang-Api-Task-Execution-Role" - description = "ECS agent가 작업을 실행하고 관리할 때 사용하는 권한" assume_role_policy = data.aws_iam_policy_document.task_assume_role.json + + tags = { + Description = "ECS agent가 작업을 실행하고 관리할 때 사용하는 권한" + } } resource "aws_iam_role_policy_attachment" "ecs_task_execution_role" {