Closed igorjanevski closed 11 months ago
We have https://github.com/terraform-aws-modules/terraform-aws-atlantis/blob/5dedfb1b36fc761c4fec65f88a6b84f230bd914f/main.tf#L402C3-L402C24 which has a default value, but users are encouraged to provide the specific ARNs (or []
if they wish to remove the permission). This maps to the permission in the ECS service module https://github.com/terraform-aws-modules/terraform-aws-ecs/blob/32f1169f8fd2f1beb224a0b0f040d8825eb01c05/modules/service/main.tf#L825-L831
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.
Description
The module is using the ECS module as a source for the ECS resources. It creates ECS task/service role without policy for reading secrets from secrets manager.
The ECS Fargate tasks are failing due to missing permission to read the secrets.
We need the IAM policy in place for this to be functional. Currently we do it by manual edit of the IAM policy but this creates a difference in the TF plan later: