Allow user to add additonal IAM policy #28
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
Add enhancements to issue > #26 (comment)
User: arn:aws:sts::aws-acc-id:assumed-role/irsa-k8s-alb-prod/1744547382731549898 is not authorized to perform: elasticloadbalancing:SetRulePriorities on resource: arn:aws:elasticloadbalancing:ap-south-1:aws-acc-id:listener-rule/app/alb-prod/8db67800d053e98e/cb6e3eb9b0d22f03/d7bf97040d690e46 because no identity-based policy allows the elasticloadbalancing:SetRulePriorities action
to pass into module:
Changes on IAM policies with this PR
Type of change
fix
)feat
)refactor
)test
)style
)ci
)docs
)How Has This Been Tested?
Yes, added a terraform plan in PR description.