@@ -24,7 +24,7 @@ module "create-token-lambda" {
2424 name = " TokenRequestHandler"
2525 handler = " handlers.token_handler.lambda_handler"
2626 iam_role_policy_documents = [
27- aws_iam_policy . ssm_policy_token . policy ,
27+ aws_iam_policy . ssm_access_policy . policy ,
2828 module . auth_session_dynamodb_table . dynamodb_read_policy_document ,
2929 module . auth_session_dynamodb_table . dynamodb_write_policy_document ,
3030 module . auth_state_dynamodb_table . dynamodb_read_policy_document ,
@@ -50,7 +50,7 @@ module "create-token-lambda" {
5050 }
5151 depends_on = [
5252 aws_api_gateway_rest_api . ndr_doc_store_api ,
53- aws_iam_policy . ssm_policy_token ,
53+ aws_iam_policy . ssm_access_policy ,
5454 module . auth_session_dynamodb_table ,
5555 module . auth_state_dynamodb_table ,
5656 module . create-token-gateway ,
@@ -103,25 +103,6 @@ module "create_token-alarm_topic" {
103103 depends_on = [module . create-token-lambda , module . sns_encryption_key ]
104104}
105105
106- resource "aws_iam_policy" "ssm_policy_token" {
107- name = " ${ terraform . workspace } _ssm_token_private_policy"
108- policy = jsonencode ({
109- Version = " 2012-10-17" ,
110- Statement = [
111- {
112- Effect = " Allow" ,
113- Action = [
114- " ssm:GetParameter" ,
115- " ssm:GetParameters" ,
116- " ssm:GetParametersByPath"
117- ],
118- Resource = [
119- " arn:aws:ssm:*:*:parameter/*" ,
120- ]
121- }
122- ]
123- })
124- }
125106
126107resource "aws_iam_role_policy_attachment" "policy_audit_token_lambda" {
127108 count = local. is_sandbox ? 0 : 1
0 commit comments