Skip to content

Conversation

@steph-torres-nhs
Copy link
Contributor

Overview

Jira ticket: PRMP-911

Description

Removal of ARF reference table and bucket

Context

As ARF is no longer part of the planned journeys, we need to remove any mention / logic of it from the backend / lambdas / tests / infrastructure

Checklist

Tasks for all changes:

  • 1. I have linked this PR to its Jira ticket.
  • 2. I have run git pre-commits.
  • [ ] 3. I have updated relevant documentation.
  • 4. I have considered the cross-team impact (and have PR approval from both Core & Demographics if necessary).
  • 5. I have successfully deployed this change to a sandbox and witnessed it build: Workflow run: 20753551026
  • 6. I have checked the Terraform Plan from this PR against ndr-dev.

@sonarqubecloud
Copy link

sonarqubecloud bot commented Jan 9, 2026

@github-actions
Copy link

github-actions bot commented Jan 9, 2026

Report for environment: ndr-dev

Terraform Initialization ⚙️success

Initialization Output

Initializing the backend...

Successfully configured the backend "s3"! Terraform will automatically
use this backend unless the backend configuration changes.
Initializing modules...
- access-audit-alarm in modules/lambda_alarms
- access-audit-alarm-topic in modules/sns
- access-audit-gateway in modules/gateway
- access-audit-lambda in modules/lambda
- access_audit_dynamodb_table in modules/dynamo_db
- alarm_state_history_table in modules/dynamo_db
- api_endpoint_url_ssm_parameter in modules/ssm_parameter
- auth_session_dynamodb_table in modules/dynamo_db
- auth_state_dynamodb_table in modules/dynamo_db
- authoriser-alarm in modules/lambda_alarms
- authoriser-alarm-topic in modules/sns
- authoriser-lambda in modules/lambda
- back-channel-logout-gateway in modules/gateway
- back_channel_logout_alarm in modules/lambda_alarms
- back_channel_logout_alarm_topic in modules/sns
- back_channel_logout_lambda in modules/lambda
- bulk-upload-alarm in modules/lambda_alarms
- bulk-upload-alarm-topic in modules/sns
- bulk-upload-lambda in modules/lambda
- bulk-upload-metadata-alarm in modules/lambda_alarms
- bulk-upload-metadata-alarm-topic in modules/sns
- bulk-upload-metadata-lambda in modules/lambda
- bulk-upload-metadata-processor-alarm in modules/lambda_alarms
- bulk-upload-metadata-processor-alarm-topic in modules/sns
- bulk-upload-metadata-processor-lambda in modules/lambda
- bulk-upload-report-alarm in modules/lambda_alarms
- bulk-upload-report-alarm-topic in modules/sns
- bulk-upload-report-lambda in modules/lambda
- bulk_upload_contact_lookup_table in modules/dynamo_db
- bulk_upload_metadata_preprocessor_lambda in modules/lambda
- bulk_upload_report_dynamodb_table in modules/dynamo_db
Downloading registry.terraform.io/cloudstoragesec/cloud-storage-security/aws 1.8.10+css9.03.000 for cloud_storage_security...
- cloud_storage_security in .terraform/modules/cloud_storage_security
- cloudfront_edge_dynamodb_table in modules/dynamo_db
- cloudfront_firewall_waf_v2 in modules/firewall_waf_v2
- core_dynamodb_table in modules/dynamo_db
- create-doc-ref-lambda in modules/lambda
- create-token-gateway in modules/gateway
- create-token-lambda in modules/lambda
- create_doc_alarm in modules/lambda_alarms
- create_doc_alarm_topic in modules/sns
- create_token-alarm in modules/lambda_alarms
- create_token-alarm_topic in modules/sns
- data-collection-alarm in modules/lambda_alarms
- data-collection-alarm-topic in modules/sns
- data-collection-lambda in modules/lambda
- delete-doc-ref-gateway in modules/gateway
- delete-doc-ref-lambda in modules/lambda
- delete-document-object-alarm in modules/lambda_alarms
- delete-document-object-alarm-topic in modules/sns
- delete-document-object-lambda in modules/lambda
- delete_doc_alarm in modules/lambda_alarms
- delete_doc_alarm_topic in modules/sns
- document-manifest-job-gateway in modules/gateway
- document-manifest-job-lambda in modules/lambda
- document-status-check-alarm in modules/lambda_alarms
- document-status-check-alarm-topic in modules/sns
- document-status-check-gateway in modules/gateway
- document-status-check-lambda in modules/lambda
- document_manifest_alarm in modules/lambda_alarms
- document_manifest_alarm_topic in modules/sns
- document_reference_gateway in modules/gateway
- document_reference_id_gateway in modules/gateway
- document_review_dlq_alarm_topic in modules/sns
- document_review_processor_lambda in modules/lambda
- document_review_queue in modules/sqs
- document_upload_check_lambda in modules/lambda
- document_upload_review_dynamodb_table in modules/dynamo_db
- edge-presign-lambda in modules/lambda_edge
- edge_presign_alarm in modules/lambda_alarms
- edge_presign_alarm_topic in modules/sns
- feature-flags-gateway in modules/gateway
- feature-flags-lambda in modules/lambda
- feature_flags_alarm in modules/lambda_alarms
- feature_flags_alarm_topic in modules/sns
- fhir_document_reference_gateway in modules/gateway
- fhir_document_reference_mtls_gateway in modules/gateway
- firewall_waf_v2 in modules/firewall_waf_v2
- firewall_waf_v2_api in modules/firewall_waf_v2
- generate-document-manifest-alarm in modules/lambda_alarms
- generate-document-manifest-alarm-topic in modules/sns
- generate-document-manifest-lambda in modules/lambda
- generate-lloyd-george-stitch-alarm in modules/lambda_alarms
- generate-lloyd-george-stitch-alarm-topic in modules/sns
- generate-lloyd-george-stitch-lambda in modules/lambda
- get-doc-fhir-lambda in modules/lambda
- get-doc-ref-alarm in modules/lambda_alarms
- get-doc-ref-alarm-topic in modules/sns
- get-doc-ref-lambda in modules/lambda
- get-report-by-ods-alarm in modules/lambda_alarms
- get-report-by-ods-alarm-topic in modules/sns
- get-report-by-ods-gateway in modules/gateway
- get-report-by-ods-lambda in modules/lambda
- get_document_review_lambda in modules/lambda
- get_document_review_lambda_alarm in modules/lambda_alarms
- get_document_review_lambda_alarm_topic in modules/sns
- global_sqs_age_alarm_topic in modules/sns
- im-alerting-lambda in modules/lambda
- lambda-layer-alerting in modules/lambda_layers
- lambda-layer-core in modules/lambda_layers
- lambda-layer-data in modules/lambda_layers
- lambda-layer-reports in modules/lambda_layers
- lg-bulk-upload-expedite-metadata-queue in modules/sqs
- lloyd-george-stitch-gateway in modules/gateway
- lloyd-george-stitch-lambda in modules/lambda
- lloyd-george-stitch_alarm in modules/lambda_alarms
- lloyd-george-stitch_topic in modules/sns
- lloyd_george_reference_dynamodb_table in modules/dynamo_db
- login_redirect-alarm_topic in modules/sns
- login_redirect_alarm in modules/lambda_alarms
- login_redirect_lambda in modules/lambda
- logout-gateway in modules/gateway
- logout_alarm in modules/lambda_alarms
- logout_alarm_topic in modules/sns
- logout_lambda in modules/lambda
- manage-nrl-pointer-alarm in modules/lambda_alarms
- manage-nrl-pointer-alarm-topic in modules/sns
- manage-nrl-pointer-lambda in modules/lambda
- migration-dynamodb-lambda in modules/lambda
- migration-dynamodb-segment-lambda in modules/lambda
- migration-dynamodb-segment-store in modules/s3
- migration-failed-items-store in modules/s3
- mns-dlq-alarm-topic in modules/sns
- mns-notification-alarm in modules/lambda_alarms
- mns-notification-alarm-topic in modules/sns
- mns-notification-lambda in modules/lambda
- mns_encryption_key in modules/kms
- mtls_api_endpoint_url_ssm_parameter in modules/ssm_parameter
- ndr-app-config in modules/app_config
- ndr-bulk-staging-store in modules/s3
- ndr-docker-ecr-data-collection in modules/ecr
- ndr-docker-ecr-ui in modules/ecr
- ndr-document-pending-review-store in modules/s3
- ndr-ecs-container-port-ssm-parameter in modules/ssm_parameter
- ndr-ecs-fargate-app in modules/ecs
- ndr-ecs-fargate-data-collection in modules/ecs
- ndr-feedback-mailbox in modules/ses
- ndr-lloyd-george-store in modules/s3
- ndr-truststore in modules/s3
- ndr-vpc-ui in modules/vpc
- ndr-zip-request-store in modules/s3
- nhs-oauth-token-generator-alarm in modules/lambda_alarms
- nhs-oauth-token-generator-alarm-topic in modules/sns
- nhs-oauth-token-generator-lambda in modules/lambda
- nrl-dlq-alarm-topic in modules/sns
- patch_document_review_lambda in modules/lambda
- patch_document_review_lambda_alarm in modules/lambda_alarms
- patch_document_review_lambda_alarm_topic in modules/sns
- pdf-stitching-alarm-topic in modules/sns
- pdf-stitching-lambda in modules/lambda
- pdf-stitching-lambda-alarms in modules/lambda_alarms
- pdm-document-store in modules/s3
- pdm_dynamodb_table in modules/dynamo_db
- pdm_encryption_key in modules/kms
- post-document-references-fhir-lambda in modules/lambda
- post_document_review_lambda in modules/lambda
- post_document_review_lambda_alarm in modules/lambda_alarms
- post_document_review_lambda_alarm_topic in modules/sns
- review-document-status-check-alarm-topic in modules/sns
- review-document-status-check-lambda in modules/lambda
- review-document-status-check-lambda-alarm in modules/lambda_alarms
- review_document_gateway in modules/gateway
- review_document_status_gateway in modules/gateway
- review_document_version_gateway in modules/gateway
- route53_fargate_ui in modules/route53
- search-document-references-fhir-lambda in modules/lambda
- search-document-references-gateway in modules/gateway
- search-document-references-lambda in modules/lambda
- search-patient-details-gateway in modules/gateway
- search-patient-details-lambda in modules/lambda
- search_doc_alarm in modules/lambda_alarms
- search_doc_alarm_topic in modules/sns
- search_document_review_lambda in modules/lambda
- search_document_review_lambda_alarm in modules/lambda_alarms
- search_document_review_lambda_alarm_topic in modules/sns
- search_patient_alarm in modules/lambda_alarms
- search_patient_alarm_topic in modules/sns
- send-feedback-alarm in modules/lambda_alarms
- send-feedback-alarm-topic in modules/sns
- send-feedback-gateway in modules/gateway
- send-feedback-lambda in modules/lambda
- sns_encryption_key in modules/kms
- sqs-lg-bulk-upload-invalid-queue in modules/sqs
- sqs-lg-bulk-upload-metadata-queue in modules/sqs
- sqs-mns-notification-queue in modules/sqs
- sqs-nrl-queue in modules/sqs
- sqs-stitching-queue in modules/sqs
- sqs_alarm_lambda_topic in modules/sns
- ssm_param_external_client_cert in modules/ssm_parameter
- ssm_param_external_client_key in modules/ssm_parameter
- ssm_param_mtls_common_names in modules/ssm_parameter
- ssm_param_unauthorised_client_cert in modules/ssm_parameter
- ssm_param_unauthorised_client_key in modules/ssm_parameter
- statistical-report-alarm in modules/lambda_alarms
- statistical-report-alarm-topic in modules/sns
- statistical-report-lambda in modules/lambda
- statistical-reports-store in modules/s3
- statistics_dynamodb_table in modules/dynamo_db
- stitch_metadata_reference_dynamodb_table in modules/dynamo_db
- stitching-dlq-alarm-topic in modules/sns
- toggle-bulk-upload-lambda in modules/lambda
- transfer-key-manager-alarm in modules/lambda_alarms
- transfer-key-manager-alarm-topic in modules/sns
- transfer-key-manager-lambda in modules/lambda
- transfer_family_kill_switch_lambda in modules/lambda
- unstitched_lloyd_george_reference_dynamodb_table in modules/dynamo_db
- update-doc-ref-alarm in modules/lambda_alarms
- update-doc-ref-alarm-topic in modules/sns
- update-doc-ref-lambda in modules/lambda
- update-upload-state-gateway in modules/gateway
- update-upload-state-lambda in modules/lambda
- update_upload_state_alarm in modules/lambda_alarms
- update_upload_state_alarm_topic in modules/sns
- virus_scan_result_alarm in modules/lambda_alarms
- virus_scan_result_alarm_topic in modules/sns
- virus_scan_result_gateway in modules/gateway
- virus_scan_result_lambda in modules/lambda
- zip_store_reference_dynamodb_table in modules/dynamo_db
Initializing provider plugins...
- terraform.io/builtin/terraform is built in to Terraform
- Finding latest version of hashicorp/time...
- Finding hashicorp/aws versions matching ">= 4.0.0, ~> 5.0"...
- Finding hashicorp/awscc versions matching ">= 0.72.1, ~> 1.0"...
- Finding latest version of hashicorp/archive...
- Finding latest version of hashicorp/random...
- Installing hashicorp/awscc v1.68.0...
- Installed hashicorp/awscc v1.68.0 (signed by HashiCorp)
- Installing hashicorp/archive v2.7.1...
- Installed hashicorp/archive v2.7.1 (signed by HashiCorp)
- Installing hashicorp/random v3.7.2...
- Installed hashicorp/random v3.7.2 (signed by HashiCorp)
- Installing hashicorp/time v0.13.1...
- Installed hashicorp/time v0.13.1 (signed by HashiCorp)
- Installing hashicorp/aws v5.100.0...
- Installed hashicorp/aws v5.100.0 (signed by HashiCorp)
Terraform has created a lock file .terraform.lock.hcl to record the provider
selections it made above. Include this file in your version control repository
so that Terraform can guarantee to make the same selections by default when
you run "terraform init" in the future.

Terraform has been successfully initialized!

You may now begin working with Terraform. Try running "terraform plan" to see
any changes that are required for your infrastructure. All Terraform commands
should now work.

If you ever set or change modules or backend configuration for Terraform,
rerun this command to reinitialize your working directory. If you forget, other
commands will detect it and remind you to do so if necessary.

Terraform Validation 🤖success

Validation Output

Success! The configuration is valid.


Terraform Plan 📖success

Show Plan (4 to add, 30 to change, 20 to destroy)


Note: Objects have changed outside of Terraform

Terraform detected the following changes made outside of Terraform since the
last "terraform apply" which may have affected this plan:

  # module.edge-presign-lambda.aws_lambda_function.lambda has changed
  ~ resource "aws_lambda_function" "lambda" {
        id                             = "ndr-dev_EdgePresignLambda"
      ~ qualified_arn                  = "arn:aws:lambda:us-east-1:[REDACTED_AWS_ACCOUNT_ID]:function:ndr-dev_EdgePresignLambda:570" -> "arn:aws:lambda:us-east-1:[REDACTED_AWS_ACCOUNT_ID]:function:ndr-dev_EdgePresignLambda:571"
        tags                           = {}
        # (28 unchanged attributes hidden)

        # (3 unchanged blocks hidden)
    }


Unless you have made equivalent changes to your configuration, or ignored the
relevant attributes using ignore_changes, the following plan may include
actions to undo or respond to these changes.

─────────────────────────────────────────────────────────────────────────────

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  ~ update in-place
  - destroy
-/+ destroy and then create replacement
+/- create replacement and then destroy

Terraform will perform the following actions:

  # aws_api_gateway_deployment.ndr_api_deploy must be replaced
+/- resource "aws_api_gateway_deployment" "ndr_api_deploy" {
      ~ created_date  = "2026-01-09T08:22:49Z" -> (known after apply)
      ~ execution_arn = "arn:aws:execute-api:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:ccy0v3rve9/" -> (known after apply)
      ~ id            = "lk86f1" -> (known after apply)
      ~ invoke_url    = "[REDACTED_API_GATEWAY_URL]" -> (known after apply)
      ~ variables     = {
          - "deployed_at" = "2026-01-09T08:22:48Z"
        } -> (known after apply) # forces replacement
        # (2 unchanged attributes hidden)
    }

  # aws_api_gateway_deployment.ndr_api_deploy_mtls must be replaced
+/- resource "aws_api_gateway_deployment" "ndr_api_deploy_mtls" {
      ~ created_date  = "2026-01-09T08:22:49Z" -> (known after apply)
      ~ execution_arn = "arn:aws:execute-api:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:p9uuab4oyl/" -> (known after apply)
      ~ id            = "n5mbur" -> (known after apply)
      ~ invoke_url    = "[REDACTED_API_GATEWAY_URL]" -> (known after apply)
      ~ variables     = {
          - "deployed_at" = "2026-01-09T08:22:48Z"
        } -> (known after apply) # forces replacement
        # (2 unchanged attributes hidden)
    }

  # aws_api_gateway_stage.ndr_api will be updated in-place
  ~ resource "aws_api_gateway_stage" "ndr_api" {
      ~ deployment_id         = "lk86f1" -> (known after apply)
        id                    = "ags-ccy0v3rve9-dev"
        tags                  = {}
        # (14 unchanged attributes hidden)
    }

  # aws_api_gateway_stage.ndr_api_mtls will be updated in-place
  ~ resource "aws_api_gateway_stage" "ndr_api_mtls" {
      ~ deployment_id         = "n5mbur" -> (known after apply)
        id                    = "ags-p9uuab4oyl-dev"
        tags                  = {}
        # (14 unchanged attributes hidden)
    }

  # aws_backup_selection.s3_continuous_backup must be replaced
-/+ resource "aws_backup_selection" "s3_continuous_backup" {
      ~ id            = "709e64b7-c9ec-45a2-91d5-2613f7ebe6b5" -> (known after apply)
        name          = "ndr-dev_s3_continuous_backup_selection"
      ~ not_resources = [] -> (known after apply)
      ~ resources     = [ # forces replacement
          - "arn:aws:s3:::ndr-dev-ndr-document-store",
            # (3 unchanged elements hidden)
        ]
        # (2 unchanged attributes hidden)

      ~ condition (known after apply)
      - condition {
        }
    }

  # aws_iam_policy.dynamodb_stream_delete_object_policy will be updated in-place
  ~ resource "aws_iam_policy" "dynamodb_stream_delete_object_policy" {
        id               = "arn:aws:iam::[REDACTED_AWS_ACCOUNT_ID]:policy/ndr-dev_dynamodb_stream_to_delete_records_policy"
        name             = "ndr-dev_dynamodb_stream_to_delete_records_policy"
      ~ policy           = jsonencode(
          ~ {
              ~ Statement = [
                  ~ {
                      ~ Resource = [
                            "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_LloydGeorgeReferenceMetadata/stream/2025-01-09T12:19:38.832",
                          - "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata/stream/2025-01-09T12:19:38.812",
                            "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_UnstitchedLloydGeorgeReferenceMetadata/stream/2025-02-28T16:03:45.148",
                        ]
                        # (2 unchanged attributes hidden)
                    },
                ]
                # (1 unchanged attribute hidden)
            }
        )
        tags             = {}
        # (7 unchanged attributes hidden)
    }

  # aws_iam_policy.s3_document_data_policy_put_only will be updated in-place
  ~ resource "aws_iam_policy" "s3_document_data_policy_put_only" {
        id               = "arn:aws:iam::[REDACTED_AWS_ACCOUNT_ID]:policy/ndr-dev_put_document_only_policy"
        name             = "ndr-dev_put_document_only_policy"
      ~ policy           = jsonencode(
          ~ {
              ~ Statement = [
                  ~ {
                      ~ Resource = [
                            "arn:aws:s3:::ndr-dev-staging-bulk-store/*",
                          - "arn:aws:s3:::ndr-dev-ndr-document-store/*",
                        ]
                        # (2 unchanged attributes hidden)
                    },
                ]
                # (1 unchanged attribute hidden)
            }
        )
        tags             = {}
        # (7 unchanged attributes hidden)
    }

  # aws_iam_role_policy_attachment.data_collection_document_reference_dynamodb_table[0] will be destroyed
  # (because aws_iam_role_policy_attachment.data_collection_document_reference_dynamodb_table is not in configuration)
  - resource "aws_iam_role_policy_attachment" "data_collection_document_reference_dynamodb_table" {
      - id         = "ndr-dev_data_collection_task_role-[REDACTED_AWS_ACCOUNT_ID][REDACTED_AWS_ACCOUNT_ID]07" -> null
      - policy_arn = "arn:aws:iam::[REDACTED_AWS_ACCOUNT_ID]:policy/ndr-dev_DocumentReferenceMetadata_policy" -> null
      - role       = "ndr-dev_data_collection_task_role" -> null
    }

  # aws_iam_role_policy_attachment.data_collection_document_store[0] will be destroyed
  # (because aws_iam_role_policy_attachment.data_collection_document_store is not in configuration)
  - resource "aws_iam_role_policy_attachment" "data_collection_document_store" {
      - id         = "ndr-dev_data_collection_task_role-[REDACTED_AWS_ACCOUNT_ID][REDACTED_AWS_ACCOUNT_ID]03" -> null
      - policy_arn = "arn:aws:iam::[REDACTED_AWS_ACCOUNT_ID]:policy/ndr-dev_ndr-document-store_list_object_policy" -> null
      - role       = "ndr-dev_data_collection_task_role" -> null
    }

  # aws_lambda_event_source_mapping.document_reference_dynamodb_stream will be destroyed
  # (because aws_lambda_event_source_mapping.document_reference_dynamodb_stream is not in configuration)
  - resource "aws_lambda_event_source_mapping" "document_reference_dynamodb_stream" {
      - arn                                = "arn:aws:lambda:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:event-source-mapping:619740f6-e73b-4757-865a-3279e23c953d" -> null
      - batch_size                         = 1 -> null
      - bisect_batch_on_function_error     = false -> null
      - enabled                            = true -> null
      - event_source_arn                   = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata/stream/2025-01-09T12:19:38.812" -> null
      - function_arn                       = "arn:aws:lambda:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:function:ndr-dev_DeleteDocumentObjectS3" -> null
      - function_name                      = "arn:aws:lambda:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:function:ndr-dev_DeleteDocumentObjectS3" -> null
      - function_response_types            = [] -> null
      - id                                 = "619740f6-e73b-4757-865a-3279e23c953d" -> null
      - last_modified                      = "2025-07-08T14:51:00Z" -> null
      - last_processing_result             = "OK" -> null
      - maximum_batching_window_in_seconds = 0 -> null
      - maximum_record_age_in_seconds      = -1 -> null
      - maximum_retry_attempts             = -1 -> null
      - parallelization_factor             = 1 -> null
      - queues                             = [] -> null
      - starting_position                  = "LATEST" -> null
      - state                              = "Enabled" -> null
      - state_transition_reason            = "User action" -> null
      - tags                               = {} -> null
      - tags_all                           = {
          - "Environment" = "dev"
          - "Owner"       = "nhse/ndr-team"
          - "Workspace"   = "ndr-dev"
        } -> null
      - topics                             = [] -> null
      - tumbling_window_in_seconds         = 0 -> null
      - uuid                               = "619740f6-e73b-4757-865a-3279e23c953d" -> null
        # (2 unchanged attributes hidden)

      - destination_config {
          - on_failure {}
        }

      - filter_criteria {
          - filter {
              - pattern = jsonencode(
                    {
                      - eventName    = [
                          - "REMOVE",
                        ]
                      - userIdentity = {
                          - principalId = [
                              - "dynamodb.amazonaws.com",
                            ]
                          - type        = [
                              - "Service",
                            ]
                        }
                    }
                ) -> null
            }
        }
    }

  # aws_s3_bucket_lifecycle_configuration.doc-store-lifecycle-rules will be destroyed
  # (because aws_s3_bucket_lifecycle_configuration.doc-store-lifecycle-rules is not in configuration)
  - resource "aws_s3_bucket_lifecycle_configuration" "doc-store-lifecycle-rules" {
      - bucket                                 = "ndr-dev-ndr-document-store" -> null
      - id                                     = "ndr-dev-ndr-document-store" -> null
      - transition_default_minimum_object_size = "all_storage_classes_128K" -> null
        # (1 unchanged attribute hidden)

      - rule {
          - id     = "default-to-intelligent-tiering" -> null
          - status = "Enabled" -> null
            # (1 unchanged attribute hidden)

          - filter {
                # (1 unchanged attribute hidden)
            }

          - transition {
              - days          = 0 -> null
              - storage_class = "INTELLIGENT_TIERING" -> null
            }
        }
    }

  # aws_scheduler_schedule.data_collection_ecs[0] will be updated in-place
  ~ resource "aws_scheduler_schedule" "data_collection_ecs" {
        id                           = "default/ndr-dev_data_collection_ecs[REDACTED_AWS_ACCOUNT_ID][REDACTED_AWS_ACCOUNT_ID]0c"
        name                         = "ndr-dev_data_collection_ecs[REDACTED_AWS_ACCOUNT_ID][REDACTED_AWS_ACCOUNT_ID]0c"
        # (10 unchanged attributes hidden)

      ~ target {
            # (3 unchanged attributes hidden)

          ~ ecs_parameters {
                tags                    = {}
              ~ task_definition_arn     = "arn:aws:ecs:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:task-definition/ndr-dev-task-data-collection" -> (known after apply)
                # (8 unchanged attributes hidden)

                # (1 unchanged block hidden)
            }

            # (1 unchanged block hidden)
        }

        # (1 unchanged block hidden)
    }

  # module.create-doc-ref-lambda.aws_iam_policy.combined_policies will be updated in-place
  ~ resource "aws_iam_policy" "combined_policies" {
        id               = "arn:aws:iam::[REDACTED_AWS_ACCOUNT_ID]:policy/ndr-dev_CreateDocRefLambda_combined_policy"
        name             = "ndr-dev_CreateDocRefLambda_combined_policy"
      ~ policy           = jsonencode(
          ~ {
              ~ Statement = [
                    # (3 unchanged elements hidden)
                    {
                        Action   = [
                            "s3:List*",
                            "s3:Get*",
                        ]
                        Effect   = "Allow"
                        Resource = [
                            "arn:aws:s3:::ndr-dev-lloyd-george-store/*",
                            "arn:aws:s3:::ndr-dev-lloyd-george-store",
                        ]
                    },
                  - {
                      - Action   = [
                          - "s3:List*",
                          - "s3:Get*",
                        ]
                      - Effect   = "Allow"
                      - Resource = [
                          - "arn:aws:s3:::ndr-dev-ndr-document-store/*",
                          - "arn:aws:s3:::ndr-dev-ndr-document-store",
                        ]
                    },
                  - {
                      - Action   = [
                          - "s3:RestoreObject",
                          - "s3:Put*",
                          - "s3:Delete*",
                          - "s3:AbortMultipartUpload",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:s3:::ndr-dev-ndr-document-store/*"
                    },
                  - {
                      - Action   = [
                          - "dynamodb:UpdateItem",
                          - "dynamodb:PutItem",
                          - "dynamodb:DeleteItem",
                          - "dynamodb:BatchWriteItem",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata"
                    },
                  - {
                      - Action   = [
                          - "dynamodb:Scan",
                          - "dynamodb:Query",
                          - "dynamodb:GetItem",
                          - "dynamodb:BatchGetItem",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata"
                    },
                  - {
                      - Action   = "dynamodb:Query"
                      - Effect   = "Allow"
                      - Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata/index/FileLocationsIndex"
                    },
                  - {
                      - Action   = "dynamodb:Query"
                      - Effect   = "Allow"
                      - Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata/index/NhsNumberIndex"
                    },
                    {
                        Action   = [
                            "dynamodb:Scan",
                            "dynamodb:Query",
                            "dynamodb:GetItem",
                            "dynamodb:BatchGetItem",
                        ]
                        Effect   = "Allow"
                        Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_LloydGeorgeStitchJobMetadata"
                    },
                    # (11 unchanged elements hidden)
                ]
                # (1 unchanged attribute hidden)
            }
        )
        tags             = {}
        # (7 unchanged attributes hidden)
    }

  # module.create-doc-ref-lambda.aws_lambda_function.lambda will be updated in-place
  ~ resource "aws_lambda_function" "lambda" {
        id                             = "ndr-dev_CreateDocRefLambda"
        tags                           = {}
        # (29 unchanged attributes hidden)

      ~ environment {
          ~ variables = {
              - "DOCUMENT_STORE_BUCKET_NAME"    = "ndr-dev-ndr-document-store" -> null
              - "DOCUMENT_STORE_DYNAMODB_NAME"  = "ndr-dev_DocumentReferenceMetadata" -> null
                # (9 unchanged elements hidden)
            }
        }

        # (3 unchanged blocks hidden)
    }

  # module.data-collection-lambda.aws_iam_policy.combined_policies will be updated in-place
  ~ resource "aws_iam_policy" "combined_policies" {
        id               = "arn:aws:iam::[REDACTED_AWS_ACCOUNT_ID]:policy/ndr-dev_DataCollectionLambda_combined_policy"
        name             = "ndr-dev_DataCollectionLambda_combined_policy"
      ~ policy           = jsonencode(
          ~ {
              ~ Statement = [
                    # (5 unchanged elements hidden)
                    {
                        Action   = [
                            "s3:RestoreObject",
                            "s3:Put*",
                            "s3:Delete*",
                            "s3:AbortMultipartUpload",
                        ]
                        Effect   = "Allow"
                        Resource = "arn:aws:s3:::ndr-dev-lloyd-george-store/*"
                    },
                  - {
                      - Action   = [
                          - "s3:List*",
                          - "s3:Get*",
                        ]
                      - Effect   = "Allow"
                      - Resource = [
                          - "arn:aws:s3:::ndr-dev-ndr-document-store/*",
                          - "arn:aws:s3:::ndr-dev-ndr-document-store",
                        ]
                    },
                  - {
                      - Action   = [
                          - "s3:RestoreObject",
                          - "s3:Put*",
                          - "s3:Delete*",
                          - "s3:AbortMultipartUpload",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:s3:::ndr-dev-ndr-document-store/*"
                    },
                    {
                        Action   = [
                            "dynamodb:Scan",
                            "dynamodb:Query",
                            "dynamodb:GetItem",
                            "dynamodb:BatchGetItem",
                        ]
                        Effect   = "Allow"
                        Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_LloydGeorgeReferenceMetadata"
                    },
                    # (4 unchanged elements hidden)
                    {
                        Action   = [
                            "dynamodb:UpdateItem",
                            "dynamodb:PutItem",
                            "dynamodb:DeleteItem",
                            "dynamodb:BatchWriteItem",
                        ]
                        Effect   = "Allow"
                        Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_LloydGeorgeReferenceMetadata"
                    },
                  - {
                      - Action   = [
                          - "dynamodb:Scan",
                          - "dynamodb:Query",
                          - "dynamodb:GetItem",
                          - "dynamodb:BatchGetItem",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata"
                    },
                  - {
                      - Action   = "dynamodb:Query"
                      - Effect   = "Allow"
                      - Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata/index/FileLocationsIndex"
                    },
                  - {
                      - Action   = "dynamodb:Query"
                      - Effect   = "Allow"
                      - Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata/index/NhsNumberIndex"
                    },
                  - {
                      - Action   = [
                          - "dynamodb:UpdateItem",
                          - "dynamodb:PutItem",
                          - "dynamodb:DeleteItem",
                          - "dynamodb:BatchWriteItem",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata"
                    },
                    {
                        Action   = [
                            "logs:StartQuery",
                            "logs:GetQueryResults",
                        ]
                        Effect   = "Allow"
                        Resource = [
                            "arn:aws:logs:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:log-group:*",
                        ]
                    },
                    # (1 unchanged element hidden)
                ]
                # (1 unchanged attribute hidden)
            }
        )
        tags             = {}
        # (7 unchanged attributes hidden)
    }

  # module.data-collection-lambda.aws_lambda_function.lambda will be updated in-place
  ~ resource "aws_lambda_function" "lambda" {
        id                             = "ndr-dev_DataCollectionLambda"
        tags                           = {}
        # (29 unchanged attributes hidden)

      ~ environment {
          ~ variables = {
              - "DOCUMENT_STORE_BUCKET_NAME"   = "ndr-dev-ndr-document-store" -> null
              - "DOCUMENT_STORE_DYNAMODB_NAME" = "ndr-dev_DocumentReferenceMetadata" -> null
                # (7 unchanged elements hidden)
            }
        }

        # (3 unchanged blocks hidden)
    }

  # module.delete-doc-ref-lambda.aws_iam_policy.combined_policies will be updated in-place
  ~ resource "aws_iam_policy" "combined_policies" {
        id               = "arn:aws:iam::[REDACTED_AWS_ACCOUNT_ID]:policy/ndr-dev_DeleteDocRefLambda_combined_policy"
        name             = "ndr-dev_DeleteDocRefLambda_combined_policy"
      ~ policy           = jsonencode(
          ~ {
              ~ Statement = [
                  - {
                      - Action   = [
                          - "dynamodb:Scan",
                          - "dynamodb:Query",
                          - "dynamodb:GetItem",
                          - "dynamodb:BatchGetItem",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata"
                    },
                  - {
                      - Action   = "dynamodb:Query"
                      - Effect   = "Allow"
                      - Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata/index/FileLocationsIndex"
                    },
                  - {
                      - Action   = "dynamodb:Query"
                      - Effect   = "Allow"
                      - Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata/index/NhsNumberIndex"
                    },
                  - {
                      - Action   = [
                          - "dynamodb:UpdateItem",
                          - "dynamodb:PutItem",
                          - "dynamodb:DeleteItem",
                          - "dynamodb:BatchWriteItem",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata"
                    },
                  - {
                      - Action   = [
                          - "s3:List*",
                          - "s3:Get*",
                        ]
                      - Effect   = "Allow"
                      - Resource = [
                          - "arn:aws:s3:::ndr-dev-ndr-document-store/*",
                          - "arn:aws:s3:::ndr-dev-ndr-document-store",
                        ]
                    },
                  - {
                      - Action   = [
                          - "s3:RestoreObject",
                          - "s3:Put*",
                          - "s3:Delete*",
                          - "s3:AbortMultipartUpload",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:s3:::ndr-dev-ndr-document-store/*"
                    },
                    {
                        Action   = [
                            "dynamodb:Scan",
                            "dynamodb:Query",
                            "dynamodb:GetItem",
                            "dynamodb:BatchGetItem",
                        ]
                        Effect   = "Allow"
                        Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_LloydGeorgeReferenceMetadata"
                    },
                    # (18 unchanged elements hidden)
                ]
                # (1 unchanged attribute hidden)
            }
        )
        tags             = {}
        # (7 unchanged attributes hidden)
    }

  # module.delete-doc-ref-lambda.aws_lambda_function.lambda will be updated in-place
  ~ resource "aws_lambda_function" "lambda" {
        id                             = "ndr-dev_DeleteDocRefLambda"
        tags                           = {}
        # (29 unchanged attributes hidden)

      ~ environment {
          ~ variables = {
              - "DOCUMENT_STORE_DYNAMODB_NAME"          = "ndr-dev_DocumentReferenceMetadata" -> null
                # (8 unchanged elements hidden)
            }
        }

        # (3 unchanged blocks hidden)
    }

  # module.delete-document-object-lambda.aws_iam_policy.combined_policies will be updated in-place
  ~ resource "aws_iam_policy" "combined_policies" {
        id               = "arn:aws:iam::[REDACTED_AWS_ACCOUNT_ID]:policy/ndr-dev_DeleteDocumentObjectS3_combined_policy"
        name             = "ndr-dev_DeleteDocumentObjectS3_combined_policy"
      ~ policy           = jsonencode(
          ~ {
              ~ Statement = [
                  - {
                      - Action   = [
                          - "dynamodb:Scan",
                          - "dynamodb:Query",
                          - "dynamodb:GetItem",
                          - "dynamodb:BatchGetItem",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata"
                    },
                  - {
                      - Action   = "dynamodb:Query"
                      - Effect   = "Allow"
                      - Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata/index/FileLocationsIndex"
                    },
                  - {
                      - Action   = "dynamodb:Query"
                      - Effect   = "Allow"
                      - Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata/index/NhsNumberIndex"
                    },
                  - {
                      - Action   = [
                          - "dynamodb:UpdateItem",
                          - "dynamodb:PutItem",
                          - "dynamodb:DeleteItem",
                          - "dynamodb:BatchWriteItem",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata"
                    },
                  - {
                      - Action   = [
                          - "s3:List*",
                          - "s3:Get*",
                        ]
                      - Effect   = "Allow"
                      - Resource = [
                          - "arn:aws:s3:::ndr-dev-ndr-document-store/*",
                          - "arn:aws:s3:::ndr-dev-ndr-document-store",
                        ]
                    },
                  - {
                      - Action   = [
                          - "s3:RestoreObject",
                          - "s3:Put*",
                          - "s3:Delete*",
                          - "s3:AbortMultipartUpload",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:s3:::ndr-dev-ndr-document-store/*"
                    },
                    {
                        Action   = [
                            "dynamodb:Scan",
                            "dynamodb:Query",
                            "dynamodb:GetItem",
                            "dynamodb:BatchGetItem",
                        ]
                        Effect   = "Allow"
                        Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_LloydGeorgeReferenceMetadata"
                    },
                    # (7 unchanged elements hidden)
                    {
                        Action   = [
                            "appconfig:StartConfigurationSession",
                            "appconfig:GetLatestConfiguration",
                        ]
                        Effect   = "Allow"
                        Resource = "arn:aws:appconfig:*:*:application/cbe8t8t/environment/w3zulwr/configuration/tsaegbq"
                    },
                  ~ {
                      ~ Resource = [
                            "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_LloydGeorgeReferenceMetadata/stream/2025-01-09T12:19:38.832",
                          - "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata/stream/2025-01-09T12:19:38.812",
                            "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_UnstitchedLloydGeorgeReferenceMetadata/stream/2025-02-28T16:03:45.148",
                        ]
                        # (2 unchanged attributes hidden)
                    },
                    {
                        Action   = [
                            "kms:GenerateDataKey",
                            "kms:Encrypt",
                            "kms:Decrypt",
                        ]
                        Effect   = "Allow"
                        Resource = "arn:aws:kms:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:key/b072a13e-4f4d-4d04-a9e0-d2bb3fbe28aa"
                    },
                ]
                # (1 unchanged attribute hidden)
            }
        )
        tags             = {}
        # (7 unchanged attributes hidden)
    }

  # module.document-manifest-job-lambda.aws_iam_policy.combined_policies will be updated in-place
  ~ resource "aws_iam_policy" "combined_policies" {
        id               = "arn:aws:iam::[REDACTED_AWS_ACCOUNT_ID]:policy/ndr-dev_DocumentManifestJobLambda_combined_policy"
        name             = "ndr-dev_DocumentManifestJobLambda_combined_policy"
      ~ policy           = jsonencode(
          ~ {
              ~ Statement = [
                  - {
                      - Action   = [
                          - "dynamodb:Scan",
                          - "dynamodb:Query",
                          - "dynamodb:GetItem",
                          - "dynamodb:BatchGetItem",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata"
                    },
                  - {
                      - Action   = "dynamodb:Query"
                      - Effect   = "Allow"
                      - Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata/index/FileLocationsIndex"
                    },
                  - {
                      - Action   = "dynamodb:Query"
                      - Effect   = "Allow"
                      - Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata/index/NhsNumberIndex"
                    },
                  - {
                      - Action   = [
                          - "dynamodb:UpdateItem",
                          - "dynamodb:PutItem",
                          - "dynamodb:DeleteItem",
                          - "dynamodb:BatchWriteItem",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata"
                    },
                    {
                        Action   = [
                            "dynamodb:Scan",
                            "dynamodb:Query",
                            "dynamodb:GetItem",
                            "dynamodb:BatchGetItem",
                        ]
                        Effect   = "Allow"
                        Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_LloydGeorgeReferenceMetadata"
                    },
                    # (12 unchanged elements hidden)
                ]
                # (1 unchanged attribute hidden)
            }
        )
        tags             = {}
        # (7 unchanged attributes hidden)
    }

  # module.document-manifest-job-lambda.aws_lambda_function.lambda will be updated in-place
  ~ resource "aws_lambda_function" "lambda" {
        id                             = "ndr-dev_DocumentManifestJobLambda"
        tags                           = {}
        # (29 unchanged attributes hidden)

      ~ environment {
          ~ variables = {
              - "DOCUMENT_STORE_DYNAMODB_NAME" = "ndr-dev_DocumentReferenceMetadata" -> null
                # (8 unchanged elements hidden)
            }
        }

        # (3 unchanged blocks hidden)
    }

  # module.document-status-check-lambda.aws_iam_policy.combined_policies will be updated in-place
  ~ resource "aws_iam_policy" "combined_policies" {
        id               = "arn:aws:iam::[REDACTED_AWS_ACCOUNT_ID]:policy/ndr-dev_DocumentStatusCheckLambda_combined_policy"
        name             = "ndr-dev_DocumentStatusCheckLambda_combined_policy"
      ~ policy           = jsonencode(
          ~ {
              ~ Statement = [
                    # (1 unchanged element hidden)
                    {
                        Action   = [
                            "ssm:GetParameter",
                            "ssm:GetParameters",
                            "ssm:PutParameter",
                        ]
                        Effect   = "Allow"
                        Resource = [
                            "arn:aws:ssm:*:*:parameter/*",
                        ]
                    },
                  - {
                      - Action   = [
                          - "dynamodb:Scan",
                          - "dynamodb:Query",
                          - "dynamodb:GetItem",
                          - "dynamodb:BatchGetItem",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata"
                    },
                  - {
                      - Action   = "dynamodb:Query"
                      - Effect   = "Allow"
                      - Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata/index/FileLocationsIndex"
                    },
                  - {
                      - Action   = "dynamodb:Query"
                      - Effect   = "Allow"
                      - Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata/index/NhsNumberIndex"
                    },
                  - {
                      - Action   = [
                          - "dynamodb:UpdateItem",
                          - "dynamodb:PutItem",
                          - "dynamodb:DeleteItem",
                          - "dynamodb:BatchWriteItem",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata"
                    },
                    {
                        Action   = [
                            "dynamodb:Scan",
                            "dynamodb:Query",
                            "dynamodb:GetItem",
                            "dynamodb:BatchGetItem",
                        ]
                        Effect   = "Allow"
                        Resource = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_LloydGeorgeReferenceMetadata"
                    },
                    # (6 unchanged elements hidden)
                ]
                # (1 unchanged attribute hidden)
            }
        )
        tags             = {}
        # (7 unchanged attributes hidden)
    }

  # module.document-status-check-lambda.aws_lambda_function.lambda will be updated in-place
  ~ resource "aws_lambda_function" "lambda" {
        id                             = "ndr-dev_DocumentStatusCheckLambda"
        tags                           = {}
        # (29 unchanged attributes hidden)

      ~ environment {
          ~ variables = {
              - "DOCUMENT_STORE_DYNAMODB_NAME" = "ndr-dev_DocumentReferenceMetadata" -> null
                # (5 unchanged elements hidden)
            }
        }

        # (3 unchanged blocks hidden)
    }

  # module.document_reference_dynamodb_table.aws_dynamodb_table.ndr_dynamodb_table will be destroyed
  # (because aws_dynamodb_table.ndr_dynamodb_table is not in configuration)
  - resource "aws_dynamodb_table" "ndr_dynamodb_table" {
      - arn                         = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata" -> null
      - billing_mode                = "PAY_PER_REQUEST" -> null
      - deletion_protection_enabled = false -> null
      - hash_key                    = "ID" -> null
      - id                          = "ndr-dev_DocumentReferenceMetadata" -> null
      - name                        = "ndr-dev_DocumentReferenceMetadata" -> null
      - read_capacity               = 0 -> null
      - stream_arn                  = "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata/stream/2025-01-09T12:19:38.812" -> null
      - stream_enabled              = true -> null
      - stream_label                = "2025-01-09T12:19:38.812" -> null
      - stream_view_type            = "OLD_IMAGE" -> null
      - table_class                 = "STANDARD" -> null
      - tags                        = {
          - "Name" = "ndr-dev_DocumentReferenceMetadata"
        } -> null
      - tags_all                    = {
          - "Environment" = "dev"
          - "Name"        = "ndr-dev_DocumentReferenceMetadata"
          - "Owner"       = "nhse/ndr-team"
          - "Workspace"   = "ndr-dev"
        } -> null
      - write_capacity              = 0 -> null

      - attribute {
          - name = "FileLocation" -> null
          - type = "S" -> null
        }
      - attribute {
          - name = "ID" -> null
          - type = "S" -> null
        }
      - attribute {
          - name = "NhsNumber" -> null
          - type = "S" -> null
        }

      - global_secondary_index {
          - hash_key           = "FileLocation" -> null
          - name               = "FileLocationsIndex" -> null
          - non_key_attributes = [] -> null
          - projection_type    = "ALL" -> null
          - read_capacity      = 0 -> null
          - write_capacity     = 0 -> null
            # (1 unchanged attribute hidden)
        }
      - global_secondary_index {
          - hash_key           = "NhsNumber" -> null
          - name               = "NhsNumberIndex" -> null
          - non_key_attributes = [] -> null
          - projection_type    = "ALL" -> null
          - read_capacity      = 0 -> null
          - write_capacity     = 0 -> null
            # (1 unchanged attribute hidden)
        }

      - point_in_time_recovery {
          - enabled                 = true -> null
          - recovery_period_in_days = 35 -> null
        }

      - ttl {
          - attribute_name = "TTL" -> null
          - enabled        = true -> null
        }
    }

  # module.document_reference_dynamodb_table.aws_iam_policy.dynamodb_policy will be destroyed
  # (because aws_iam_policy.dynamodb_policy is not in configuration)
  - resource "aws_iam_policy" "dynamodb_policy" {
      - arn              = "arn:aws:iam::[REDACTED_AWS_ACCOUNT_ID]:policy/ndr-dev_DocumentReferenceMetadata_policy" -> null
      - attachment_count = 1 -> null
      - id               = "arn:aws:iam::[REDACTED_AWS_ACCOUNT_ID]:policy/ndr-dev_DocumentReferenceMetadata_policy" -> null
      - name             = "ndr-dev_DocumentReferenceMetadata_policy" -> null
      - path             = "/" -> null
      - policy           = jsonencode(
            {
              - Statement = [
                  - {
                      - Action   = [
                          - "dynamodb:Query",
                        ]
                      - Effect   = "Allow"
                      - Resource = [
                          - "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata/index/FileLocationsIndex",
                          - "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata/index/NhsNumberIndex",
                        ]
                    },
                  - {
                      - Action   = [
                          - "dynamodb:Query",
                          - "dynamodb:Scan",
                          - "dynamodb:GetItem",
                          - "dynamodb:PutItem",
                          - "dynamodb:UpdateItem",
                          - "dynamodb:DeleteItem",
                          - "dynamodb:BatchWriteItem",
                        ]
                      - Effect   = "Allow"
                      - Resource = [
                          - "arn:aws:dynamodb:eu-west-2:[REDACTED_AWS_ACCOUNT_ID]:table/ndr-dev_DocumentReferenceMetadata",
                        ]
                    },
                ]
              - Version   = "2012-10-17"
            }
        ) -> null
      - policy_id        = "ANPAXYSUA44V4JLATSDCQ" -> null
      - tags             = {} -> null
      - tags_all         = {
          - "Environment" = "dev"
          - "Owner"       = "nhse/ndr-team"
          - "Workspace"   = "ndr-dev"
        } -> null
        # (2 unchanged attributes hidden)
    }

  # module.generate-document-manifest-lambda.aws_iam_policy.combined_policies will be updated in-place
  ~ resource "aws_iam_policy" "combined_policies" {
        id               = "arn:aws:iam::[REDACTED_AWS_ACCOUNT_ID]:policy/ndr-dev_GenerateDocumentManifest_combined_policy"
        name             = "ndr-dev_GenerateDocumentManifest_combined_policy"
      ~ policy           = jsonencode(
          ~ {
              ~ Statement = [
                  - {
                      - Action   = [
                          - "s3:List*",
                          - "s3:Get*",
                        ]
                      - Effect   = "Allow"
                      - Resource = [
                          - "arn:aws:s3:::ndr-dev-ndr-document-store/*",
                          - "arn:aws:s3:::ndr-dev-ndr-document-store",
                        ]
                    },
                  - {
                      - Action   = [
                          - "s3:RestoreObject",
                          - "s3:Put*",
                          - "s3:Delete*",
                          - "s3:AbortMultipartUpload",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:s3:::ndr-dev-ndr-document-store/*"
                    },
                    {
                        Action   = [
                            "s3:List*",
                            "s3:Get*",
                        ]
                        Effect   = "Allow"
                        Resource = [
                            "arn:aws:s3:::ndr-dev-lloyd-george-store/*",
                            "arn:aws:s3:::ndr-dev-lloyd-george-store",
                        ]
                    },
                    # (9 unchanged elements hidden)
                ]
                # (1 unchanged attribute hidden)
            }
        )
        tags             = {}
        # (7 unchanged attributes hidden)
    }

  # module.generate-lloyd-george-stitch-lambda.aws_iam_policy.combined_policies will be updated in-place
  ~ resource "aws_iam_policy" "combined_policies" {
        id               = "arn:aws:iam::[REDACTED_AWS_ACCOUNT_ID]:policy/ndr-dev_GenerateLloydGeorgeStitch_combined_policy"
        name             = "ndr-dev_GenerateLloydGeorgeStitch_combined_policy"
      ~ policy           = jsonencode(
          ~ {
              ~ Statement = [
                  - {
                      - Action   = [
                          - "s3:List*",
                          - "s3:Get*",
                        ]
                      - Effect   = "Allow"
                      - Resource = [
                          - "arn:aws:s3:::ndr-dev-ndr-document-store/*",
                          - "arn:aws:s3:::ndr-dev-ndr-document-store",
                        ]
                    },
                  - {
                      - Action   = [
                          - "s3:RestoreObject",
                          - "s3:Put*",
                          - "s3:Delete*",
                          - "s3:AbortMultipartUpload",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:s3:::ndr-dev-ndr-document-store/*"
                    },
                    {
                        Action   = [
                            "s3:List*",
                            "s3:Get*",
                        ]
                        Effect   = "Allow"
                        Resource = [
                            "arn:aws:s3:::ndr-dev-lloyd-george-store/*",
                            "arn:aws:s3:::ndr-dev-lloyd-george-store",
                        ]
                    },
                    # (13 unchanged elements hidden)
                ]
                # (1 unchanged attribute hidden)
            }
        )
        tags             = {}
        # (7 unchanged attributes hidden)
    }

  # module.ndr-document-store.aws_iam_policy.s3_backup_policy will be destroyed
  # (because aws_iam_policy.s3_backup_policy is not in configuration)
  - resource "aws_iam_policy" "s3_backup_policy" {
      - arn              = "arn:aws:iam::[REDACTED_AWS_ACCOUNT_ID]:policy/terraform-[REDACTED_AWS_ACCOUNT_ID][REDACTED_AWS_ACCOUNT_ID]04" -> null
      - attachment_count = 0 -> null
      - id               = "arn:aws:iam::[REDACTED_AWS_ACCOUNT_ID]:policy/terraform-[REDACTED_AWS_ACCOUNT_ID][REDACTED_AWS_ACCOUNT_ID]04" -> null
      - name             = "terraform-[REDACTED_AWS_ACCOUNT_ID][REDACTED_AWS_ACCOUNT_ID]04" -> null
      - name_prefix      = "terraform-" -> null
      - path             = "/" -> null
      - policy           = jsonencode(
            {
              - Statement = [
                  - {
                      - Action   = [
                          - "s3:GetInventoryConfiguration",
                          - "s3:PutInventoryConfiguration",
                          - "s3:ListBucketVersions",
                          - "s3:ListBucket",
                          - "s3:GetBucketVersioning",
                          - "s3:GetBucketNotification",
                          - "s3:PutBucketNotification",
                          - "s3:GetBucketLocation",
                          - "s3:GetBucketTagging",
                          - "s3:GetBucketAcl",
                        ]
                      - Effect   = "Allow"
                      - Resource = [
                          - "arn:aws:s3:::*",
                        ]
                      - Sid      = "S3BucketBackupPermissions"
                    },
                  - {
                      - Action   = [
                          - "s3:GetObjectAcl",
                          - "s3:GetObject",
                          - "s3:GetObjectVersionTagging",
                          - "s3:GetObjectVersionAcl",
                          - "s3:GetObjectTagging",
                          - "s3:GetObjectVersion",
                        ]
                      - Effect   = "Allow"
                      - Resource = [
                          - "arn:aws:s3:::*/*",
                        ]
                      - Sid      = "S3ObjectBackupPermissions"
                    },
                  - {
                      - Action   = [
                          - "s3:ListAllMyBuckets",
                        ]
                      - Effect   = "Allow"
                      - Resource = [
                          - "*",
                        ]
                      - Sid      = "S3GlobalPermissions"
                    },
                  - {
                      - Action    = [
                          - "kms:Decrypt",
                          - "kms:DescribeKey",
                        ]
                      - Condition = {
                          - StringLike = {
                              - "kms:ViaService" = "s3.*.amazonaws.com"
                            }
                        }
                      - Effect    = "Allow"
                      - Resource  = "*"
                      - Sid       = "KMSBackupPermissions"
                    },
                  - {
                      - Action   = [
                          - "events:DescribeRule",
                          - "events:EnableRule",
                          - "events:PutRule",
                          - "events:DeleteRule",
                          - "events:PutTargets",
                          - "events:RemoveTargets",
                          - "events:ListTargetsByRule",
                          - "events:DisableRule",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:events:*:*:rule/AwsBackupManagedRule*"
                      - Sid      = "EventsPermissions"
                    },
                  - {
                      - Action   = [
                          - "cloudwatch:GetMetricData",
                          - "events:ListRules",
                        ]
                      - Effect   = "Allow"
                      - Resource = "*"
                      - Sid      = "EventsMetricsGlobalPermissions"
                    },
                ]
              - Version   = "2012-10-17"
            }
        ) -> null
      - policy_id        = "ANPAXYSUA44V4QNSLYM5I" -> null
      - tags             = {} -> null
      - tags_all         = {
          - "Environment" = "dev"
          - "Owner"       = "nhse/ndr-team"
          - "Workspace"   = "ndr-dev"
        } -> null
        # (1 unchanged attribute hidden)
    }

  # module.ndr-document-store.aws_iam_policy.s3_document_data_policy will be destroyed
  # (because aws_iam_policy.s3_document_data_policy is not in configuration)
  - resource "aws_iam_policy" "s3_document_data_policy" {
      - arn              = "arn:aws:iam::[REDACTED_AWS_ACCOUNT_ID]:policy/ndr-dev_ndr-document-store_get_document_data_policy" -> null
      - attachment_count = 0 -> null
      - id               = "arn:aws:iam::[REDACTED_AWS_ACCOUNT_ID]:policy/ndr-dev_ndr-document-store_get_document_data_policy" -> null
      - name             = "ndr-dev_ndr-document-store_get_document_data_policy" -> null
      - path             = "/" -> null
      - policy           = jsonencode(
            {
              - Statement = [
                  - {
                      - Action   = [
                          - "s3:GetObject",
                          - "s3:PutObject",
                          - "s3:DeleteObject",
                          - "s3:ListBucketMultipartUploads",
                          - "s3:ListBucketVersions",
                          - "s3:ListBucket",
                          - "s3:DeleteObjectTagging",
                          - "s3:GetObjectRetention",
                          - "s3:DeleteObjectVersion",
                          - "s3:GetObjectVersionTagging",
                          - "s3:GetObjectAttributes",
                          - "s3:RestoreObject",
                          - "s3:PutObjectVersionTagging",
                          - "s3:DeleteObjectVersionTagging",
                          - "s3:GetObjectVersionAttributes",
                          - "s3:GetObjectAcl",
                          - "s3:AbortMultipartUpload",
                          - "s3:GetObjectVersionAcl",
                          - "s3:GetObjectTagging",
                          - "s3:PutObjectTagging",
                          - "s3:GetObjectVersion",
                        ]
                      - Effect   = "Allow"
                      - Resource = [
                          - "arn:aws:s3:::ndr-dev-ndr-document-store/*",
                        ]
                    },
                ]
              - Version   = "2012-10-17"
            }
        ) -> null
      - policy_id        = "ANPAXYSUA44V4W7CRZVTJ" -> null
      - tags             = {} -> null
      - tags_all         = {
          - "Environment" = "dev"
          - "Owner"       = "nhse/ndr-team"
          - "Workspace"   = "ndr-dev"
        } -> null
        # (2 unchanged attributes hidden)
    }

  # module.ndr-document-store.aws_iam_policy.s3_list_object_policy will be destroyed
  # (because aws_iam_policy.s3_list_object_policy is not in configuration)
  - resource "aws_iam_policy" "s3_list_object_policy" {
      - arn              = "arn:aws:iam::[REDACTED_AWS_ACCOUNT_ID]:policy/ndr-dev_ndr-document-store_list_object_policy" -> null
      - attachment_count = 1 -> null
      - id               = "arn:aws:iam::[REDACTED_AWS_ACCOUNT_ID]:policy/ndr-dev_ndr-document-store_list_object_policy" -> null
      - name             = "ndr-dev_ndr-document-store_list_object_policy" -> null
      - path             = "/" -> null
      - policy           = jsonencode(
            {
              - Statement = [
                  - {
                      - Action   = [
                          - "s3:ListBucket",
                        ]
                      - Effect   = "Allow"
                      - Resource = [
                          - "arn:aws:s3:::ndr-dev-ndr-document-store",
                        ]
                    },
                ]
              - Version   = "2012-10-17"
            }
        ) -> null
      - policy_id        = "ANPAXYSUA44V7XKXV4NUS" -> null
      - tags             = {} -> null
      - tags_all         = {
          - "Environment" = "dev"
          - "Owner"       = "nhse/ndr-team"
          - "Workspace"   = "ndr-dev"
        } -> null
        # (2 unchanged attributes hidden)
    }

  # module.ndr-document-store.aws_s3_bucket.bucket will be destroyed
  # (because aws_s3_bucket.bucket is not in configuration)
  - resource "aws_s3_bucket" "bucket" {
      - arn                         = "arn:aws:s3:::ndr-dev-ndr-document-store" -> null
      - bucket                      = "ndr-dev-ndr-document-store" -> null
      - bucket_domain_name          = "ndr-dev-ndr-document-store.s3.amazonaws.com" -> null
      - bucket_regional_domain_name = "ndr-dev-ndr-document-store.s3.eu-west-2.amazonaws.com" -> null
      - force_destroy               = true -> null
      - hosted_zone_id              = "Z3GKZC51ZF0DB4" -> null
      - id                          = "ndr-dev-ndr-document-store" -> null
      - object_lock_enabled         = false -> null
      - policy                      = jsonencode(
            {
              - Statement = [
                  - {
                      - Action    = "s3:*"
                      - Condition = {
                          - Bool = {
                              - "aws:SecureTransport" = "false"
                            }
                        }
                      - Effect    = "Deny"
                      - Principal = {
                          - AWS = "*"
                        }
                      - Resource  = [
                          - "arn:aws:s3:::ndr-dev-ndr-document-store/*",
                          - "arn:aws:s3:::ndr-dev-ndr-document-store",
                        ]
                    },
                ]
              - Version   = "2012-10-17"
            }
        ) -> null
      - region                      = "eu-west-2" -> null
      - request_payer               = "BucketOwner" -> null
      - tags                        = {
          - "Name" = "ndr-dev-ndr-document-store"
        } -> null
      - tags_all                    = {
          - "Environment" = "dev"
          - "Name"        = "ndr-dev-ndr-document-store"
          - "Owner"       = "nhse/ndr-team"
          - "Workspace"   = "ndr-dev"
        } -> null
        # (2 unchanged attributes hidden)

      - cors_rule {
          - allowed_headers = [] -> null
          - allowed_methods = [
              - "GET",
            ] -> null
          - allowed_origins = [
              - "https://ndr-dev.access-request-fulfilment.patient-deductions.nhs.uk",
            ] -> null
          - expose_headers  = [] -> null
          - max_age_seconds = 0 -> null
        }
      - cors_rule {
          - allowed_headers = [
              - "*",
            ] -> null
          - allowed_methods = [
              - "POST",
              - "DELETE",
              - "PUT",
            ] -> null
          - allowed_origins = [
              - "https://ndr-dev.access-request-fulfilment.patient-deductions.nhs.uk",
            ] -> null
          - expose_headers  = [
              - "ETag",
            ] -> null
          - max_age_seconds = 3000 -> null
        }

      - grant {
          - id          = "5eda919b684ff9939ff7b06d9c243fa40eabc7929fd7b8d06d5e70e50dccf6b7" -> null
          - permissions = [
              - "FULL_CONTROL",
            ] -> null
          - type        = "CanonicalUser" -> null
            # (1 unchanged attribute hidden)
        }

      - lifecycle_rule {
          - abort_incomplete_multipart_upload_days = 0 -> null
          - enabled                                = true -> null
          - id                                     = "default-to-intelligent-tiering" -> null
          - tags                                   = {} -> null
            # (1 unchanged attribute hidden)

          - transition {
              - days          = 0 -> null
              - storage_class = "INTELLIGENT_TIERING" -> null
                # (1 unchanged attribute hidden)
            }
        }

      - server_side_encryption_configuration {
          - rule {
              - bucket_key_enabled = false -> null

              - apply_server_side_encryption_by_default {
                  - sse_algorithm     = "AES256" -> null
                    # (1 unchanged attribute hidden)
                }
            }
        }

      - versioning {
          - enabled    = true -> null
          - mfa_delete = false -> null
        }
    }

  # module.ndr-document-store.aws_s3_bucket_acl.bucket_acl will be destroyed
  # (because aws_s3_bucket_acl.bucket_acl is not in configuration)
  - resource "aws_s3_bucket_acl" "bucket_acl" {
      - acl                   = "private" -> null
      - bucket                = "ndr-dev-ndr-document-store" -> null
      - id                    = "ndr-dev-ndr-document-store,private" -> null
        # (1 unchanged attribute hidden)

      - access_control_policy {
          - grant {
              - permission = "FULL_CONTROL" -> null

              - grantee {
                  - id            = "5eda919b684ff9939ff7b06d9c243fa40eabc7929fd7b8d06d5e70e50dccf6b7" -> null
                  - type          = "CanonicalUser" -> null
                    # (3 unchanged attributes hidden)
                }
            }
          - owner {
              - id           = "5eda919b684ff9939ff7b06d9c243fa40eabc7929fd7b8d06d5e70e50dccf6b7" -> null
                # (1 unchanged attribute hidden)
            }
        }
    }

  # module.ndr-document-store.aws_s3_bucket_cors_configuration.document_store_bucket_cors_config[0] will be destroyed
  # (because aws_s3_bucket_cors_configuration.document_store_bucket_cors_config is not in configuration)
  - resource "aws_s3_bucket_cors_configuration" "document_store_bucket_cors_config" {
      - bucket                = "ndr-dev-ndr-document-store" -> null
      - id                    = "ndr-dev-ndr-document-store" -> null
        # (1 unchanged attribute hidden)

      - cors_rule {
          - allowed_headers = [
              - "*",
            ] -> null
          - allowed_methods = [
              - "DELETE",
              - "POST",
              - "PUT",
            ] -> null
          - allowed_origins = [
              - "https://ndr-dev.access-request-fulfilment.patient-deductions.nhs.uk",
            ] -> null
          - expose_headers  = [
              - "ETag",
            ] -> null
            id              = null
          - max_age_seconds = 3000 -> null
        }
      - cors_rule {
          - allowed_headers = [] -> null
          - allowed_methods = [
              - "GET",
            ] -> null
          - allowed_origins = [
              - "https://ndr-dev.access-request-fulfilment.patient-deductions.nhs.uk",
            ] -> null
          - expose_headers  = [] -> null
            id              = null
          - max_age_seconds = 0 -> null
        }
    }

  # module.ndr-document-store.aws_s3_bucket_ownership_controls.s3_bucket_acl_ownership will be destroyed
  # (because aws_s3_bucket_ownership_controls.s3_bucket_acl_ownership is not in configuration)
  - resource "aws_s3_bucket_ownership_controls" "s3_bucket_acl_ownership" {
      - bucket = "ndr-dev-ndr-document-store" -> null
      - id     = "ndr-dev-ndr-document-store" -> null

      - rule {
          - object_ownership = "ObjectWriter" -> null
        }
    }

  # module.ndr-document-store.aws_s3_bucket_policy.bucket_policy will be destroyed
  # (because aws_s3_bucket_policy.bucket_policy is not in configuration)
  - resource "aws_s3_bucket_policy" "bucket_policy" {
      - bucket = "ndr-dev-ndr-document-store" -> null
      - id     = "ndr-dev-ndr-document-store" -> null
      - policy = jsonencode(
            {
              - Statement = [
                  - {
                      - Action    = [
                          - "s3:*",
                        ]
                      - Condition = {
                          - Bool = {
                              - "aws:SecureTransport" = "false"
                            }
                        }
                      - Effect    = "Deny"
                      - Principal = {
                          - AWS = "*"
                        }
                      - Resource  = [
                          - "arn:aws:s3:::ndr-dev-ndr-document-store/*",
                          - "arn:aws:s3:::ndr-dev-ndr-document-store",
                        ]
                    },
                ]
              - Version   = "2012-10-17"
            }
        ) -> null
    }

  # module.ndr-document-store.aws_s3_bucket_public_access_block.bucket will be destroyed
  # (because aws_s3_bucket_public_access_block.bucke
(truncated - see workflow logs for full output)

@steph-torres-nhs steph-torres-nhs marked this pull request as ready for review January 9, 2026 10:38
@steph-torres-nhs steph-torres-nhs requested review from a team as code owners January 9, 2026 10:38
APPCONFIG_ENVIRONMENT = module.ndr-app-config.app_config_environment_id
APPCONFIG_CONFIGURATION = module.ndr-app-config.app_config_configuration_profile_id
DYNAMODB_TABLE_LIST = "[\u0022${terraform.workspace}_${var.docstore_dynamodb_table_name}\u0022, \u0022${terraform.workspace}_${var.lloyd_george_dynamodb_table_name}\u0022]"
DYNAMODB_TABLE_LIST = "[\u0022${terraform.workspace}_${var.lloyd_george_dynamodb_table_name}\u0022]"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we have a ticket to refactor this to use LLOYD_GEORGE_DYNAMODB_NAME env var?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants