@@ -38,35 +38,22 @@ data "aws_iam_policy_document" "lambda_assume_role_policy" {
38
38
}
39
39
}
40
40
41
- resource "aws_iam_policy " "lambda_logging" {
42
- name = " ${ var . environment } -lamda-logging-policy-syncer"
43
- description = " Lambda logging policy "
41
+ resource "aws_iam_role_policy " "lambda_logging" {
42
+ name = " ${ var . environment } -lamda-logging-policy-syncer"
43
+ role = aws_iam_role . syncer_lambda . id
44
44
45
45
policy = templatefile (" ${ path . module } /policies/lambda-cloudwatch.json" , {})
46
46
}
47
47
48
-
49
- resource "aws_iam_policy_attachment" "syncer_logging" {
50
- name = " ${ var . environment } -logging"
51
- roles = [aws_iam_role . syncer_lambda . name ]
52
- policy_arn = aws_iam_policy. lambda_logging . arn
53
- }
54
-
55
- resource "aws_iam_policy" "syncer" {
56
- name = " ${ var . environment } -lamda-syncer-s3-policy"
57
- description = " Lambda syncer policy"
48
+ resource "aws_iam_role_policy" "syncer" {
49
+ name = " ${ var . environment } -lamda-syncer-s3-policy"
50
+ role = aws_iam_role. syncer_lambda . id
58
51
59
52
policy = templatefile (" ${ path . module } /policies/lambda-syncer.json" , {
60
53
s3_resource_arn = " ${ aws_s3_bucket . action_dist . arn } /${ local . action_runner_distribution_object_key } "
61
54
})
62
55
}
63
56
64
- resource "aws_iam_policy_attachment" "syncer" {
65
- name = " ${ var . environment } -syncer"
66
- roles = [aws_iam_role . syncer_lambda . name ]
67
- policy_arn = aws_iam_policy. syncer . arn
68
- }
69
-
70
57
resource "aws_cloudwatch_event_rule" "syncer" {
71
58
schedule_expression = var. lambda_schedule_expression
72
59
tags = var. tags
0 commit comments