Skip to content

Commit 7c09013

Browse files
authored
ELI-597: Adds permissions for github role (#542)
1 parent 438eeab commit 7c09013

1 file changed

Lines changed: 9 additions & 2 deletions

File tree

infrastructure/stacks/iams-developer-roles/github_actions_policies.tf

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -269,7 +269,9 @@ resource "aws_iam_policy" "api_infrastructure" {
269269
"logs:CreateLogDelivery",
270270
"logs:DeleteLogDelivery",
271271
# IAM service-linked role for WAF logging
272-
"iam:CreateServiceLinkedRole"
272+
"iam:CreateServiceLinkedRole",
273+
# IAM to list tags
274+
"logs:ListTagsForResource"
273275

274276
],
275277
Resource = "*"
@@ -569,7 +571,11 @@ resource "aws_iam_policy" "iam_management" {
569571
# Eventbridge to firehose role
570572
"arn:aws:iam::*:role/*-eventbridge-to-firehose-role*",
571573
# Firehose splunk role
572-
"arn:aws:iam::*:role/splunk-firehose-role"
574+
"arn:aws:iam::*:role/splunk-firehose-role",
575+
# Eventbridge invoke step functions role
576+
"arn:aws:iam::*:role/eventbridge_invoke_sfn_role",
577+
"arn:aws:iam::*:role/secret_rotation_lambda_role",
578+
"arn:aws:iam::*:role/secret_rotation_workflow_role"
573579
]
574580
}
575581
]
@@ -696,6 +702,7 @@ resource "aws_iam_policy" "cloudwatch_management" {
696702
"arn:aws:cloudwatch:${var.default_aws_region}:${data.aws_caller_identity.current.account_id}:alarm:*",
697703
"arn:aws:cloudwatch::${data.aws_caller_identity.current.account_id}:dashboard/Demand_And_Capacity_*",
698704
"arn:aws:sns:${var.default_aws_region}:${data.aws_caller_identity.current.account_id}:cloudwatch-security-alarms*",
705+
"arn:aws:sns:${var.default_aws_region}:${data.aws_caller_identity.current.account_id}:secret-rotation-notifications*",
699706
"arn:aws:logs:${var.default_aws_region}:${data.aws_caller_identity.current.account_id}:log-group:/aws/apigateway/default-eligibility-signposting-api*",
700707
]
701708
}

0 commit comments

Comments
 (0)