@@ -78,31 +78,6 @@ data "aws_iam_policy_document" "GhaSponsorDeploy" {
7878 resources = [" arn:aws:ecs:us-west-2:${ data . aws_caller_identity . current . account_id } :service/*/sponsor-*" ]
7979 }
8080
81- # AppRunner permissions (only when AppRunner is enabled)
82- dynamic "statement" {
83- for_each = var. enable_app ? [1 ] : []
84- content {
85- effect = " Allow"
86- actions = [
87- " apprunner:DescribeService" ,
88- " apprunner:UpdateService" ,
89- " apprunner:ListOperations" ,
90- " apprunner:ListTagsForResource" ,
91- ]
92- resources = [
93- aws_apprunner_service . main [0 ]. arn ,
94- ]
95- }
96- }
97-
98- statement {
99- effect = " Allow"
100- actions = [
101- " apprunner:ListServices" ,
102- ]
103- resources = [" *" ]
104- }
105-
10681 statement {
10782 effect = " Allow"
10883 actions = [
@@ -117,13 +92,10 @@ data "aws_iam_policy_document" "GhaSponsorDeploy" {
11792 actions = [
11893 " iam:PassRole" ,
11994 ]
120- resources = concat (
121- [
122- aws_iam_role . SponsorApp . arn ,
123- " arn:aws:iam::${ data . aws_caller_identity . current . account_id } :role/EcsExecSponsorApp" ,
124- ],
125- var. enable_app ? [aws_iam_role . app-runner-access [0 ]. arn ] : []
126- )
95+ resources = [
96+ aws_iam_role . SponsorApp . arn ,
97+ " arn:aws:iam::${ data . aws_caller_identity . current . account_id } :role/EcsExecSponsorApp" ,
98+ ]
12799 }
128100
129101 statement {
@@ -165,10 +137,7 @@ data "aws_iam_policy_document" "GhaSponsorDeploy" {
165137 " iam:ListRolePolicies" ,
166138 " iam:ListAttachedRolePolicies" ,
167139 ]
168- resources = concat (
169- [aws_iam_role . SponsorApp . arn ],
170- var. enable_app ? [aws_iam_role . app-runner-access [0 ]. arn ] : []
171- )
140+ resources = [aws_iam_role . SponsorApp . arn ]
172141 }
173142
174143 statement {
0 commit comments