narrow-cpu-35517
01/23/2023, 11:26 PMnew aws.iam.RolePolicyAttachment("awsLambdaExecutePolicyAttachment", {
role: plaidHandlerRole,
policyArn: aws.iam.ManagedPolicies.AWSLambdaExecute
});
new aws.iam.RolePolicyAttachment("plaidSqsRolePolicyAttachment", {
role: plaidHandlerRole,
policyArn: aws.iam.ManagedPolicies.AmazonSQSFullAccess
});
new aws.iam.RolePolicyAttachment("plaidCloudwatchRolePolicyAttachment", {
role: plaidHandlerRole,
policyArn: aws.iam.ManagedPolicies.CloudWatchFullAccess
});
little-cartoon-10569
01/23/2023, 11:52 PMnarrow-cpu-35517
01/24/2023, 11:54 PMconst plaidHandlerRole = new aws.iam.Role("plaid-lambda-hanlder-role", {
name: "plaid-lambda-hanlder-role",
assumeRolePolicy: lambdaStsAssumeRolePolicy
});
const plaidSqsRolePolicyAttachment = new aws.iam.RolePolicyAttachment("plaidSqsRolePolicyAttachment", {
role: plaidHandlerRole,
policyArn: aws.iam.ManagedPolicies.AmazonSQSFullAccess
});
const plaidCloudwatchRolePolicyAttachment = new aws.iam.RolePolicyAttachment("plaidCloudwatchRolePolicyAttachment", {
role: plaidHandlerRole,
policyArn: aws.iam.ManagedPolicies.CloudWatchFullAccess
});
const awsLambdaExecutePolicyAttachment = new aws.iam.RolePolicyAttachment("awsLambdaExecutePolicyAttachment", {
role: plaidHandlerRole,
policyArn: aws.iam.ManagedPolicies.AWSLambdaExecute
});
const lambdaStsAssumeRolePolicy: pulumi.Input<string | aws.iam.PolicyDocument> = {
Version: "2012-10-17",
Statement: [
{
Action: "sts:AssumeRole",
Principal: {
Service: "<http://lambda.amazonaws.com|lambda.amazonaws.com>"
},
Effect: "Allow",
Sid: ""
}
]
};
little-cartoon-10569
01/24/2023, 11:57 PMnarrow-cpu-35517
01/25/2023, 12:25 AM