Skip to content

Commit

Permalink
Adding in role paths for new account management roles (#523)
Browse files Browse the repository at this point in the history
  • Loading branch information
StewartW authored Sep 5, 2022
1 parent 4b0c5ae commit a86296d
Showing 1 changed file with 16 additions and 10 deletions.
26 changes: 16 additions & 10 deletions src/template.yml
Original file line number Diff line number Diff line change
Expand Up @@ -254,7 +254,7 @@ Resources:
Service:
- states.amazonaws.com
Action: "sts:AssumeRole"
Path: "/"
Path: "/aws-deployment-framework/account-management/"
Policies:
- PolicyName: "adf-state-machine-role-policy"
PolicyDocument:
Expand Down Expand Up @@ -333,7 +333,7 @@ Resources:
Service:
- lambda.amazonaws.com
Action: "sts:AssumeRole"
Path: "/"
Path: "/aws-deployment-framework/account-management/"
Policies:
- PolicyName: "adf-lambda-create-account-alias-policy"
PolicyDocument:
Expand Down Expand Up @@ -377,7 +377,7 @@ Resources:
Service:
- lambda.amazonaws.com
Action: "sts:AssumeRole"
Path: "/"
Path: "/aws-deployment-framework/account-management/"
Policies:
- PolicyName: "adf-lambda-tag-resource-policy"
PolicyDocument:
Expand Down Expand Up @@ -439,7 +439,7 @@ Resources:
Service:
- lambda.amazonaws.com
Action: "sts:AssumeRole"
Path: "/"
Path: "/aws-deployment-framework/account-management/"
Policies:
- PolicyName: "adf-lambda-policy-move-ou"
PolicyDocument:
Expand Down Expand Up @@ -488,7 +488,7 @@ Resources:
Service:
- lambda.amazonaws.com
Action: "sts:AssumeRole"
Path: "/"
Path: "/aws-deployment-framework/account-management/"

DeleteDefaultVPCFunction:
Type: 'AWS::Serverless::Function'
Expand Down Expand Up @@ -523,7 +523,7 @@ Resources:
Service:
- lambda.amazonaws.com
Action: "sts:AssumeRole"
Path: "/"
Path: "/aws-deployment-framework/account-management/"

CreateAccountFunction:
Type: 'AWS::Serverless::Function'
Expand Down Expand Up @@ -557,7 +557,7 @@ Resources:
Service:
- lambda.amazonaws.com
Action: "sts:AssumeRole"
Path: "/"
Path: "/aws-deployment-framework/account-management/"
Policies:
- PolicyName: "adf-lambda-create-account-policy"
PolicyDocument:
Expand Down Expand Up @@ -600,7 +600,7 @@ Resources:
Service:
- lambda.amazonaws.com
Action: "sts:AssumeRole"
Path: "/"
Path: "/aws-deployment-framework/account-management/"
Policies:
- PolicyName: "adf-lambda-support-access-policy"
PolicyDocument:
Expand Down Expand Up @@ -1410,7 +1410,7 @@ Resources:
- lambda.amazonaws.com
- states.amazonaws.com
Action: "sts:AssumeRole"
Path: "/"
Path: "/aws-deployment-framework/account-bootstrapping/"
Policies:
- PolicyName: "adf-state-machine-role-policy"
PolicyDocument:
Expand All @@ -1420,7 +1420,13 @@ Resources:
Action:
- "lambda:InvokeFunction"
- "states:StartExecution"
Resource: "*"
Resource:
- !GetAtt DetermineEventFunction.Arn
- !GetAtt CrossAccountExecuteFunction.Arn
- !GetAtt MovedToRootActionFunction.Arn
- !GetAtt StackWaiterFunction.Arn
- !GetAtt RoleStackDeploymentFunction.Arn
- !GetAtt UpdateResourcePoliciesFunction.Arn

AccountBootstrappingStateMachine:
Type: "AWS::StepFunctions::StateMachine"
Expand Down

0 comments on commit a86296d

Please sign in to comment.