Open petergilchrist opened 5 months ago
thanks for reporting this, last time I tried this it worked pretty well, but it's been a while and some things may have changed.
Did you by any chance figure it out since?
Hi there .. thanks for replying. I did my best but I am not technically savvy enough to figure it ou. It has to literally be 1 line in the IAM permissioning .. it looks like a great module / feature so I am hoping someone finds a solution!
Peter
On Sat, 8 Jun 2024 at 6:36 AM, Cristian Magherusan-Stanciu < @.***> wrote:
thanks for reporting this, last time I tried this it worked pretty well, but it's been a while and some things may have changed.
Did you by any chance figure it out since?
— Reply to this email directly, view it on GitHub https://github.com/LeanerCloud/terraform-aws-email-files-dropped-in-s3/issues/2#issuecomment-2155509907, or unsubscribe https://github.com/notifications/unsubscribe-auth/AXLU4CUURYYP7SZE7RSGPFLZGIKUVAVCNFSM6AAAAABIVS2BDCVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDCNJVGUYDSOJQG4 . You are receiving this because you authored the thread.Message ID: <LeanerCloud/terraform-aws-email-files-dropped-in-s3/issues/2/2155509907@ github.com>
Hi there .. very nice module I believe .. I am close to getting it live but when I hit terraform apply I get this error
aws_iam_role.lambda: Creating... ╷ │ Error: creating IAM Role (lambda_role): adding inline policy (lambda_policy): operation error IAM: PutRolePolicy, https response error StatusCode: 400, RequestID: 574f2322-a25a-4cf0-912a-864ce17f150c, MalformedPolicyDocument: Resource must be in ARN format or "*". │ │ with aws_iam_role.lambda, │ on main.tf line 55, in resource "aws_iam_role" "lambda": │ 55: resource "aws_iam_role" "lambda" {