@@ -163,6 +163,42 @@ resource "aws_iam_policy" "service-discovery-access" {
163163 })
164164}
165165
166+ resource "aws_iam_policy" "deploy-bot-lambda-access" {
167+ name = " DeployBot_LambdaAccess"
168+ path = " /"
169+ description = " Allow Lambda access for deploy-bot"
170+
171+ policy = jsonencode ({
172+ Version = " 2012-10-17"
173+ Statement = [
174+ {
175+ Effect = " Allow"
176+ Action = [
177+ " lambda:AddPermission" ,
178+ " lambda:GetPolicy" ,
179+ " lambda:GetFunction" ,
180+ " lambda:ListFunctions" ,
181+ " lambda:ListVersionsByFunction" ,
182+ " lambda:GetFunctionConfiguration" ,
183+ " lambda:GetFunctionCodeSigningConfig" ,
184+ " lambda:UpdateFunctionCode" ,
185+ " lambda:UpdateFunctionConfiguration" ,
186+ " lambda:PublishVersion" ,
187+ " lambda:CreateFunction" ,
188+ " lambda:DeleteFunction" ,
189+ " lambda:TagResource" ,
190+ " lambda:UntagResource" ,
191+ " iam:ListRolePolicies" ,
192+ " iam:GetRolePolicy" ,
193+ " iam:GetRole" ,
194+ " iam:PassRole"
195+ ]
196+ Resource = " *"
197+ }
198+ ]
199+ })
200+ }
201+
166202resource "aws_iam_group_policy_attachment" "deploy-bot-ecs-access" {
167203 group = aws_iam_group. deploy-bot-deploy-access . name
168204 policy_arn = " arn:aws:iam::aws:policy/AmazonECS_FullAccess"
@@ -192,3 +228,8 @@ resource "aws_iam_group_policy_attachment" "service-discovery-access" {
192228 group = aws_iam_group. deploy-bot-deploy-access . name
193229 policy_arn = aws_iam_policy. service-discovery-access . arn
194230}
231+
232+ resource "aws_iam_group_policy_attachment" "deploy-bot-lambda-access" {
233+ group = aws_iam_group. deploy-bot-deploy-access . name
234+ policy_arn = aws_iam_policy. deploy-bot-lambda-access . arn
235+ }
0 commit comments