@@ -193,7 +193,7 @@ resource "aws_lambda_function" "mns_publisher_lambda" {
193193 variables = {
194194 SPLUNK_FIREHOSE_NAME = var.splunk_firehose_stream_name
195195 IMMUNIZATION_ENV = var.resource_scope,
196- IMMUNIZATION_BASE_PATH = var.sub_environment
196+ IMMUNIZATION_BASE_PATH = var.imms_base_path
197197 PDS_ENV = var.pds_environment
198198 MNS_ENV = var.mns_environment
199199 }
@@ -207,6 +207,30 @@ resource "aws_lambda_function" "mns_publisher_lambda" {
207207 ]
208208}
209209
210+
211+ data "aws_iam_policy_document" "mns_publisher_secrets_policy_document" {
212+ source_policy_documents = [
213+ templatefile (" ${ local . policy_path } /secret_manager.json" , {
214+ " account_id" : data.aws_caller_identity.current.account_id,
215+ " pds_environment" : var.pds_environment
216+ }),
217+ ]
218+ }
219+
220+ resource "aws_iam_policy" "mns_publisher_lambda_secrets_policy" {
221+ name = " ${ local . mns_publisher_lambda_name } -secrets-policy"
222+ description = " Allow Lambda to access Secrets Manager"
223+ policy = data. aws_iam_policy_document . mns_publisher_secrets_policy_document . json
224+ }
225+
226+
227+ # Attach the secrets/dynamodb access policy to the Lambda role
228+ resource "aws_iam_role_policy_attachment" "mns_publisher_lambda_secrets_policy_attachment" {
229+ role = aws_iam_role. mns_publisher_lambda_exec_role . name
230+ policy_arn = aws_iam_policy. mns_publish_lambda_secrets_policy . arn
231+ }
232+
233+
210234resource "aws_cloudwatch_log_group" "mns_publisher_lambda_log_group" {
211235 name = " /aws/lambda/${ local . mns_publisher_lambda_name } "
212236 retention_in_days = 30
0 commit comments