Skip to content

Commit aceac3c

Browse files
CCM-8752 Replace inline policies with attached policies (#334)
1 parent 694871f commit aceac3c

File tree

4 files changed

+20
-13
lines changed

4 files changed

+20
-13
lines changed

.github/workflows/cicd-1-pull-request.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -36,9 +36,9 @@ jobs:
3636
echo "build_datetime=$datetime" >> $GITHUB_OUTPUT
3737
echo "build_timestamp=$(date --date=$datetime -u +'%Y%m%d%H%M%S')" >> $GITHUB_OUTPUT
3838
echo "build_epoch=$(date --date=$datetime -u +'%s')" >> $GITHUB_OUTPUT
39-
echo "nodejs_version=$(grep "^nodejs " .tool-versions | cut -f2 -d' ')" >> $GITHUB_OUTPUT
40-
echo "python_version=$(grep "^python " .tool-versions | cut -f2 -d' ')" >> $GITHUB_OUTPUT
41-
echo "terraform_version=$(grep "^terraform " .tool-versions | cut -f2 -d' ')" >> $GITHUB_OUTPUT
39+
echo "nodejs_version=$(grep "^nodejs\s" .tool-versions | cut -f2 -d' ')" >> $GITHUB_OUTPUT
40+
echo "python_version=$(grep "^python\s" .tool-versions | cut -f2 -d' ')" >> $GITHUB_OUTPUT
41+
echo "terraform_version=$(grep "^terraform\s" .tool-versions | cut -f2 -d' ')" >> $GITHUB_OUTPUT
4242
echo "version=$(head -n 1 .version 2> /dev/null || echo unknown)" >> $GITHUB_OUTPUT
4343
- name: "Check if pull request exists for this branch"
4444
id: pr_exists

infrastructure/terraform/components/app/iam_role_amplify.tf

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,11 @@ resource "aws_iam_role_policy_attachment" "amplify_amplify" {
2626
policy_arn = aws_iam_policy.amplify.arn
2727
}
2828

29+
resource "aws_iam_role_policy_attachment" "amplify_execution" {
30+
role = aws_iam_role.amplify.name
31+
policy_arn = aws_iam_policy.amplify.arn
32+
}
33+
2934
resource "aws_iam_policy" "amplify" {
3035
name = "${local.csi}-amplify"
3136
description = "Amplify "

infrastructure/terraform/modules/backend-api/iam_role_api_gateway_execution_role.tf

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,15 +7,18 @@ resource "aws_iam_role" "api_gateway_execution_role" {
77
resource "aws_iam_role_policy_attachment" "cloudwatch_logs" {
88
role = aws_iam_role.api_gateway_execution_role.name
99
policy_arn = "arn:aws:iam::aws:policy/service-role/AmazonAPIGatewayPushToCloudWatchLogs"
10-
1110
}
1211

13-
resource "aws_iam_role_policy" "api_gateway_execution_policy" {
14-
role = aws_iam_role.api_gateway_execution_role.name
12+
resource "aws_iam_policy" "api_gateway_execution_policy" {
1513
name = "${local.csi}-apig-execution-policy"
1614
policy = data.aws_iam_policy_document.api_gateway_execution_policy.json
1715
}
1816

17+
resource "aws_iam_role_policy_attachment" "api_gateway_execution" {
18+
role = aws_iam_role.api_gateway_execution_role.name
19+
policy_arn = aws_iam_policy.api_gateway_execution_policy.arn
20+
}
21+
1922
data "aws_iam_policy_document" "api_gateway_service_trust_policy" {
2023
statement {
2124
sid = "ApiGatewayAssumeRole"
@@ -35,7 +38,6 @@ data "aws_iam_policy_document" "api_gateway_service_trust_policy" {
3538
}
3639
}
3740

38-
3941
data "aws_iam_policy_document" "api_gateway_execution_policy" {
4042
statement {
4143
sid = "AllowInvokeLambda"

infrastructure/terraform/modules/lambda-function/iam_role_lambda_execution_role.tf

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,19 @@
1-
# TODO: CCM-8418
2-
# tfsec:ignore:aws-iam-no-policy-wildcards
31
resource "aws_iam_role" "lambda_execution_role" {
42
name = var.function_name
53
description = "IAM Role for Lambda function ${var.function_name}"
64
assume_role_policy = data.aws_iam_policy_document.lambda_service_trust_policy.json
75
}
86

9-
resource "aws_iam_role_policy" "lambda_execution_policy" {
10-
role = aws_iam_role.lambda_execution_role.name
7+
resource "aws_iam_policy" "lambda_execution_policy" {
118
name = "${var.function_name}-execution-policy"
129
policy = data.aws_iam_policy_document.lambda_execution_policy.json
1310
}
1411

15-
# TODO: CCM-8418
16-
# tfsec:ignore:aws-iam-no-policy-wildcards
12+
resource "aws_iam_role_policy_attachment" "lambda_execution" {
13+
role = aws_iam_role.lambda_execution_role.name
14+
policy_arn = aws_iam_policy.lambda_execution_policy.arn
15+
}
16+
1717
data "aws_iam_policy_document" "lambda_service_trust_policy" {
1818
statement {
1919
sid = "LambdaAssumeRole"

0 commit comments

Comments
 (0)