Skip to content

Commit 5cfbdfd

Browse files
committed
Now move that IAM role to top-level of stack
1 parent a940d78 commit 5cfbdfd

1 file changed

Lines changed: 16 additions & 16 deletions

File tree

products/products.yaml

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,22 @@ Parameters:
1111
Description: GitHub SHA
1212

1313
Resources:
14+
ServiceCatalogCfnExecIamRole:
15+
Type: AWS::IAM::Role
16+
Properties:
17+
RoleName: !Sub "ServiceCatalogCfnExecIamRole-${AWS::Region}"
18+
Description: "Service Catalog CFN execution role"
19+
AssumeRolePolicyDocument:
20+
Version: 2012-10-17
21+
Statement:
22+
- Effect: Allow
23+
Principal:
24+
Service: servicecatalog.amazonaws.com
25+
Action:
26+
- 'sts:AssumeRole'
27+
ManagedPolicyArns:
28+
- arn:aws:iam::aws:policy/AdministratorAccess
29+
1430
# Portfolios
1531
NetworkingPortfolio:
1632
Type: AWS::ServiceCatalog::Portfolio
@@ -79,19 +95,3 @@ Resources:
7995
PortfolioId: !Ref NetworkingPortfolio
8096
ProductId: !Ref DnsProduct
8197
RoleArn: !GetAtt ServiceCatalogCfnExecIamRole.Arn
82-
83-
ServiceCatalogCfnExecIamRole:
84-
Type: AWS::IAM::Role
85-
Properties:
86-
RoleName: !Sub "ServiceCatalogCfnExecIamRole-${AWS::Region}"
87-
Description: "Service Catalog CFN execution role"
88-
AssumeRolePolicyDocument:
89-
Version: 2012-10-17
90-
Statement:
91-
- Effect: Allow
92-
Principal:
93-
Service: servicecatalog.amazonaws.com
94-
Action:
95-
- 'sts:AssumeRole'
96-
ManagedPolicyArns:
97-
- arn:aws:iam::aws:policy/AdministratorAccess

0 commit comments

Comments
 (0)