@@ -38,35 +38,22 @@ data "aws_iam_policy_document" "lambda_assume_role_policy" {
3838 }
3939}
4040
41- resource "aws_iam_policy " "lambda_logging" {
42- name = " ${ var . environment } -lamda-logging-policy-syncer"
43- description = " Lambda logging policy "
41+ resource "aws_iam_role_policy " "lambda_logging" {
42+ name = " ${ var . environment } -lamda-logging-policy-syncer"
43+ role = aws_iam_role . syncer_lambda . id
4444
4545 policy = templatefile (" ${ path . module } /policies/lambda-cloudwatch.json" , {})
4646}
4747
48-
49- resource "aws_iam_policy_attachment" "syncer_logging" {
50- name = " ${ var . environment } -logging"
51- roles = [aws_iam_role . syncer_lambda . name ]
52- policy_arn = aws_iam_policy. lambda_logging . arn
53- }
54-
55- resource "aws_iam_policy" "syncer" {
56- name = " ${ var . environment } -lamda-syncer-s3-policy"
57- description = " Lambda syncer policy"
48+ resource "aws_iam_role_policy" "syncer" {
49+ name = " ${ var . environment } -lamda-syncer-s3-policy"
50+ role = aws_iam_role. syncer_lambda . id
5851
5952 policy = templatefile (" ${ path . module } /policies/lambda-syncer.json" , {
6053 s3_resource_arn = " ${ aws_s3_bucket . action_dist . arn } /${ local . action_runner_distribution_object_key } "
6154 })
6255}
6356
64- resource "aws_iam_policy_attachment" "syncer" {
65- name = " ${ var . environment } -syncer"
66- roles = [aws_iam_role . syncer_lambda . name ]
67- policy_arn = aws_iam_policy. syncer . arn
68- }
69-
7057resource "aws_cloudwatch_event_rule" "syncer" {
7158 schedule_expression = var. lambda_schedule_expression
7259 tags = var. tags
0 commit comments