Page MenuHomePhorge

D12462.1768815331.diff
No OneTemporary

Size
1 KB
Referenced Files
None
Subscribers
None

D12462.1768815331.diff

diff --git a/services/terraform/remote/aws_iam.tf b/services/terraform/remote/aws_iam.tf
--- a/services/terraform/remote/aws_iam.tf
+++ b/services/terraform/remote/aws_iam.tf
@@ -213,12 +213,27 @@
resource "aws_iam_role" "search_index_lambda" {
name = "search_index_lambda"
assume_role_policy = data.aws_iam_policy_document.assume_identity_search_role.json
+}
- managed_policy_arns = [
- aws_iam_policy.manage_cloudwatch_logs.arn,
- aws_iam_policy.manage_network_interface.arn,
- aws_iam_policy.read_identity_users_stream.arn,
- ]
+resource "aws_iam_role_policy_attachment" "AWSLambdaVPCAccessExecutionRole" {
+ role = aws_iam_role.search_index_lambda.name
+ policy_arn = "arn:aws:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole"
+}
+
+resource "aws_iam_role_policy_attachment" "manage_cloudwatch_logs" {
+ role = aws_iam_role.search_index_lambda.name
+ policy_arn = aws_iam_policy.manage_cloudwatch_logs.arn
+
+}
+
+resource "aws_iam_role_policy_attachment" "manage_network_interface" {
+ role = aws_iam_role.search_index_lambda.name
+ policy_arn = aws_iam_policy.manage_network_interface.arn
+}
+
+resource "aws_iam_role_policy_attachment" "read_identity_users_stream" {
+ role = aws_iam_role.search_index_lambda.name
+ policy_arn = aws_iam_policy.read_identity_users_stream.arn
}
data "aws_iam_policy_document" "read_identity_users_stream" {
@@ -290,11 +305,6 @@
}
-resource "aws_iam_role_policy_attachment" "AWSLambdaVPCAccessExecutionRole" {
- role = aws_iam_role.search_index_lambda.name
- policy_arn = "arn:aws:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole"
-}
-
data "aws_iam_policy_document" "opensearch_domain_access" {
statement {
effect = "Allow"

File Metadata

Mime Type
text/plain
Expires
Mon, Jan 19, 9:35 AM (15 h, 48 m)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
5955670
Default Alt Text
D12462.1768815331.diff (1 KB)

Event Timeline