Brad Poulton %!s(int64=3) %!d(string=hai) anos
pai
achega
288413d109
Modificáronse 2 ficheiros con 7 adicións e 7 borrados
  1. 1 1
      base/threatquotient_lambda/main.tf
  2. 6 6
      base/threatquotient_lambda/s3.tf

+ 1 - 1
base/threatquotient_lambda/main.tf

@@ -40,7 +40,7 @@ resource "aws_lambda_function" "function" {
   description      = "Sync data between ThreatQ and Splunk"
   #filename         = "code.zip"
   #source_code_hash = filebase64sha256("code.zip")
-  s3_bucket        = aws_s3_bucket.bucket.arn
+  s3_bucket        = aws_s3_bucket.bucket
   s3_key           = "code.zip"
   function_name    = "threatq_data_sync"
   role             = aws_iam_role.role.arn

+ 6 - 6
base/threatquotient_lambda/s3.tf

@@ -25,7 +25,12 @@ resource "aws_s3_bucket_public_access_block" "public_access_block" {
   depends_on = [aws_s3_bucket_policy.policy]
 }
 
-data "aws_iam_policy_document" "s3_policy_document" {
+resource "aws_s3_bucket_policy" "policy" {
+  bucket = aws_s3_bucket.bucket.id
+  policy = data.aws_iam_policy_document.policy_document.json
+}
+
+data "aws_iam_policy_document" "policy_document" {
   statement {
     sid = "AllowS3Access"
     actions = [ "s3:GetObject", "s3:GetObjectVersion" ]
@@ -41,11 +46,6 @@ data "aws_iam_policy_document" "s3_policy_document" {
   }
 }
 
-resource "aws_s3_bucket_policy" "policy" {
-  bucket = aws_s3_bucket.bucket.id
-  policy = data.aws_iam_policy_document.s3_policy_document.json
-}
-
 resource "aws_kms_key" "key" {
   description             = "Encryption of lambda code in S3"
   policy                  = data.aws_iam_policy_document.kms_policy_document.json