Skip to content

Commit 7c53da1

Browse files
authored
fix: Replace aws_iam_policy_attachment to aws_iam_role_policy_attachment (#195)
1 parent 05bec45 commit 7c53da1

File tree

2 files changed

+24
-32
lines changed

2 files changed

+24
-32
lines changed

README.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -615,17 +615,17 @@ No modules.
615615
| [aws_iam_policy.logs](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy) | resource |
616616
| [aws_iam_policy.tracing](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy) | resource |
617617
| [aws_iam_policy.vpc](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy) | resource |
618-
| [aws_iam_policy_attachment.additional_inline](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy_attachment) | resource |
619-
| [aws_iam_policy_attachment.additional_json](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy_attachment) | resource |
620-
| [aws_iam_policy_attachment.additional_jsons](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy_attachment) | resource |
621-
| [aws_iam_policy_attachment.async](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy_attachment) | resource |
622-
| [aws_iam_policy_attachment.dead_letter](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy_attachment) | resource |
623-
| [aws_iam_policy_attachment.logs](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy_attachment) | resource |
624-
| [aws_iam_policy_attachment.tracing](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy_attachment) | resource |
625-
| [aws_iam_policy_attachment.vpc](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy_attachment) | resource |
626618
| [aws_iam_role.lambda](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role) | resource |
619+
| [aws_iam_role_policy_attachment.additional_inline](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment) | resource |
620+
| [aws_iam_role_policy_attachment.additional_json](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment) | resource |
621+
| [aws_iam_role_policy_attachment.additional_jsons](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment) | resource |
627622
| [aws_iam_role_policy_attachment.additional_many](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment) | resource |
628623
| [aws_iam_role_policy_attachment.additional_one](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment) | resource |
624+
| [aws_iam_role_policy_attachment.async](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment) | resource |
625+
| [aws_iam_role_policy_attachment.dead_letter](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment) | resource |
626+
| [aws_iam_role_policy_attachment.logs](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment) | resource |
627+
| [aws_iam_role_policy_attachment.tracing](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment) | resource |
628+
| [aws_iam_role_policy_attachment.vpc](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment) | resource |
629629
| [aws_lambda_event_source_mapping.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_event_source_mapping) | resource |
630630
| [aws_lambda_function.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function) | resource |
631631
| [aws_lambda_function_event_invoke_config.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function_event_invoke_config) | resource |

iam.tf

Lines changed: 16 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -101,11 +101,10 @@ resource "aws_iam_policy" "logs" {
101101
tags = var.tags
102102
}
103103

104-
resource "aws_iam_policy_attachment" "logs" {
104+
resource "aws_iam_role_policy_attachment" "logs" {
105105
count = local.create_role && var.attach_cloudwatch_logs_policy ? 1 : 0
106106

107-
name = "${local.role_name}-logs"
108-
roles = [aws_iam_role.lambda[0].name]
107+
role = aws_iam_role.lambda[0].name
109108
policy_arn = aws_iam_policy.logs[0].arn
110109
}
111110

@@ -138,11 +137,10 @@ resource "aws_iam_policy" "dead_letter" {
138137
tags = var.tags
139138
}
140139

141-
resource "aws_iam_policy_attachment" "dead_letter" {
140+
resource "aws_iam_role_policy_attachment" "dead_letter" {
142141
count = local.create_role && var.attach_dead_letter_policy ? 1 : 0
143142

144-
name = "${local.role_name}-dl"
145-
roles = [aws_iam_role.lambda[0].name]
143+
role = aws_iam_role.lambda[0].name
146144
policy_arn = aws_iam_policy.dead_letter[0].arn
147145
}
148146

@@ -165,11 +163,10 @@ resource "aws_iam_policy" "vpc" {
165163
tags = var.tags
166164
}
167165

168-
resource "aws_iam_policy_attachment" "vpc" {
166+
resource "aws_iam_role_policy_attachment" "vpc" {
169167
count = local.create_role && var.attach_network_policy ? 1 : 0
170168

171-
name = "${local.role_name}-vpc"
172-
roles = [aws_iam_role.lambda[0].name]
169+
role = aws_iam_role.lambda[0].name
173170
policy_arn = aws_iam_policy.vpc[0].arn
174171
}
175172

@@ -192,11 +189,10 @@ resource "aws_iam_policy" "tracing" {
192189
tags = var.tags
193190
}
194191

195-
resource "aws_iam_policy_attachment" "tracing" {
192+
resource "aws_iam_role_policy_attachment" "tracing" {
196193
count = local.create_role && var.attach_tracing_policy ? 1 : 0
197194

198-
name = "${local.role_name}-tracing"
199-
roles = [aws_iam_role.lambda[0].name]
195+
role = aws_iam_role.lambda[0].name
200196
policy_arn = aws_iam_policy.tracing[0].arn
201197
}
202198

@@ -229,11 +225,10 @@ resource "aws_iam_policy" "async" {
229225
tags = var.tags
230226
}
231227

232-
resource "aws_iam_policy_attachment" "async" {
228+
resource "aws_iam_role_policy_attachment" "async" {
233229
count = local.create_role && var.attach_async_event_policy ? 1 : 0
234230

235-
name = "${local.role_name}-async"
236-
roles = [aws_iam_role.lambda[0].name]
231+
role = aws_iam_role.lambda[0].name
237232
policy_arn = aws_iam_policy.async[0].arn
238233
}
239234

@@ -249,11 +244,10 @@ resource "aws_iam_policy" "additional_json" {
249244
tags = var.tags
250245
}
251246

252-
resource "aws_iam_policy_attachment" "additional_json" {
247+
resource "aws_iam_role_policy_attachment" "additional_json" {
253248
count = local.create_role && var.attach_policy_json ? 1 : 0
254249

255-
name = local.role_name
256-
roles = [aws_iam_role.lambda[0].name]
250+
role = aws_iam_role.lambda[0].name
257251
policy_arn = aws_iam_policy.additional_json[0].arn
258252
}
259253

@@ -269,11 +263,10 @@ resource "aws_iam_policy" "additional_jsons" {
269263
tags = var.tags
270264
}
271265

272-
resource "aws_iam_policy_attachment" "additional_jsons" {
266+
resource "aws_iam_role_policy_attachment" "additional_jsons" {
273267
count = local.create_role && var.attach_policy_jsons ? var.number_of_policy_jsons : 0
274268

275-
name = "${local.role_name}-${count.index}"
276-
roles = [aws_iam_role.lambda[0].name]
269+
role = aws_iam_role.lambda[0].name
277270
policy_arn = aws_iam_policy.additional_jsons[count.index].arn
278271
}
279272

@@ -353,10 +346,9 @@ resource "aws_iam_policy" "additional_inline" {
353346
tags = var.tags
354347
}
355348

356-
resource "aws_iam_policy_attachment" "additional_inline" {
349+
resource "aws_iam_role_policy_attachment" "additional_inline" {
357350
count = local.create_role && var.attach_policy_statements ? 1 : 0
358351

359-
name = local.role_name
360-
roles = [aws_iam_role.lambda[0].name]
352+
role = aws_iam_role.lambda[0].name
361353
policy_arn = aws_iam_policy.additional_inline[0].arn
362354
}

0 commit comments

Comments
 (0)