File tree Expand file tree Collapse file tree 4 files changed +20
-13
lines changed
Expand file tree Collapse file tree 4 files changed +20
-13
lines changed Original file line number Diff line number Diff line change 3636 echo "build_datetime=$datetime" >> $GITHUB_OUTPUT
3737 echo "build_timestamp=$(date --date=$datetime -u +'%Y%m%d%H%M%S')" >> $GITHUB_OUTPUT
3838 echo "build_epoch=$(date --date=$datetime -u +'%s')" >> $GITHUB_OUTPUT
39- echo "nodejs_version=$(grep "^nodejs " .tool-versions | cut -f2 -d' ')" >> $GITHUB_OUTPUT
40- echo "python_version=$(grep "^python " .tool-versions | cut -f2 -d' ')" >> $GITHUB_OUTPUT
41- echo "terraform_version=$(grep "^terraform " .tool-versions | cut -f2 -d' ')" >> $GITHUB_OUTPUT
39+ echo "nodejs_version=$(grep "^nodejs\s " .tool-versions | cut -f2 -d' ')" >> $GITHUB_OUTPUT
40+ echo "python_version=$(grep "^python\s " .tool-versions | cut -f2 -d' ')" >> $GITHUB_OUTPUT
41+ echo "terraform_version=$(grep "^terraform\s " .tool-versions | cut -f2 -d' ')" >> $GITHUB_OUTPUT
4242 echo "version=$(head -n 1 .version 2> /dev/null || echo unknown)" >> $GITHUB_OUTPUT
4343 - name : " Check if pull request exists for this branch"
4444 id : pr_exists
Original file line number Diff line number Diff line change @@ -26,6 +26,11 @@ resource "aws_iam_role_policy_attachment" "amplify_amplify" {
2626 policy_arn = aws_iam_policy. amplify . arn
2727}
2828
29+ resource "aws_iam_role_policy_attachment" "amplify_execution" {
30+ role = aws_iam_role. amplify . name
31+ policy_arn = aws_iam_policy. amplify . arn
32+ }
33+
2934resource "aws_iam_policy" "amplify" {
3035 name = " ${ local . csi } -amplify"
3136 description = " Amplify "
Original file line number Diff line number Diff line change @@ -7,15 +7,18 @@ resource "aws_iam_role" "api_gateway_execution_role" {
77resource "aws_iam_role_policy_attachment" "cloudwatch_logs" {
88 role = aws_iam_role. api_gateway_execution_role . name
99 policy_arn = " arn:aws:iam::aws:policy/service-role/AmazonAPIGatewayPushToCloudWatchLogs"
10-
1110}
1211
13- resource "aws_iam_role_policy" "api_gateway_execution_policy" {
14- role = aws_iam_role. api_gateway_execution_role . name
12+ resource "aws_iam_policy" "api_gateway_execution_policy" {
1513 name = " ${ local . csi } -apig-execution-policy"
1614 policy = data. aws_iam_policy_document . api_gateway_execution_policy . json
1715}
1816
17+ resource "aws_iam_role_policy_attachment" "api_gateway_execution" {
18+ role = aws_iam_role. api_gateway_execution_role . name
19+ policy_arn = aws_iam_policy. api_gateway_execution_policy . arn
20+ }
21+
1922data "aws_iam_policy_document" "api_gateway_service_trust_policy" {
2023 statement {
2124 sid = " ApiGatewayAssumeRole"
@@ -35,7 +38,6 @@ data "aws_iam_policy_document" "api_gateway_service_trust_policy" {
3538 }
3639}
3740
38-
3941data "aws_iam_policy_document" "api_gateway_execution_policy" {
4042 statement {
4143 sid = " AllowInvokeLambda"
Original file line number Diff line number Diff line change 1- # TODO: CCM-8418
2- # tfsec:ignore:aws-iam-no-policy-wildcards
31resource "aws_iam_role" "lambda_execution_role" {
42 name = var. function_name
53 description = " IAM Role for Lambda function ${ var . function_name } "
64 assume_role_policy = data. aws_iam_policy_document . lambda_service_trust_policy . json
75}
86
9- resource "aws_iam_role_policy" "lambda_execution_policy" {
10- role = aws_iam_role. lambda_execution_role . name
7+ resource "aws_iam_policy" "lambda_execution_policy" {
118 name = " ${ var . function_name } -execution-policy"
129 policy = data. aws_iam_policy_document . lambda_execution_policy . json
1310}
1411
15- # TODO: CCM-8418
16- # tfsec:ignore:aws-iam-no-policy-wildcards
12+ resource "aws_iam_role_policy_attachment" "lambda_execution" {
13+ role = aws_iam_role. lambda_execution_role . name
14+ policy_arn = aws_iam_policy. lambda_execution_policy . arn
15+ }
16+
1717data "aws_iam_policy_document" "lambda_service_trust_policy" {
1818 statement {
1919 sid = " LambdaAssumeRole"
You can’t perform that action at this time.
0 commit comments