diff --git a/terraform/account/terraform.tf b/terraform/account/terraform.tf index 7fb44bf8c3..65007ae85e 100644 --- a/terraform/account/terraform.tf +++ b/terraform/account/terraform.tf @@ -2,13 +2,11 @@ terraform { required_version = "<= 1.6.3" backend "s3" { - bucket = "opg.terraform.state" - key = "opg-use-my-lpa-shared/terraform.tfstate" - encrypt = true - region = "eu-west-1" - assume_role { - role_arn = "arn:aws:iam::311462405659:role/opg-use-an-lpa-ci" - } + bucket = "opg.terraform.state" + key = "opg-use-my-lpa-shared/terraform.tfstate" + encrypt = true + region = "eu-west-1" + role_arn = "arn:aws:iam::311462405659:role/opg-use-an-lpa-ci" dynamodb_table = "remote_lock" } diff --git a/terraform/environment/terraform.tf b/terraform/environment/terraform.tf index 235d1c4696..4ab5e14e30 100644 --- a/terraform/environment/terraform.tf +++ b/terraform/environment/terraform.tf @@ -2,13 +2,11 @@ terraform { required_version = "<= 1.6.3" backend "s3" { - bucket = "opg.terraform.state" - key = "opg-use-my-lpa-environment/terraform.tfstate" - encrypt = true - region = "eu-west-1" - assume_role { - role_arn = "arn:aws:iam::311462405659:role/opg-use-an-lpa-ci" - } + bucket = "opg.terraform.state" + key = "opg-use-my-lpa-environment/terraform.tfstate" + encrypt = true + region = "eu-west-1" + role_arn = "arn:aws:iam::311462405659:role/opg-use-an-lpa-ci" dynamodb_table = "remote_lock" }