@@ -15,39 +15,6 @@ resource "aws_iam_role" "ds_stac_browser_profile_role" {
1515 })
1616}
1717
18- # IAM Policy for accessing S3 and SNS in other accounts
19- resource "aws_iam_policy" "ds_stac_browser_role_profile_role_policy" {
20- name = " ${ var . prefix } -ds_stac_browser_role_profile_role_policy"
21- description = " "
22- policy = jsonencode ({
23- Version = " 2012-10-17" ,
24- Statement = [
25- {
26- Effect = " Allow" ,
27- Action = [
28- " ecr:BatchCheckLayerAvailability" ,
29- " ecr:GetDownloadUrlForLayer" ,
30- " ecr:GetAuthorizationToken" ,
31- " ecr:BatchGetImage" ,
32- " ecr:InitiateLayerUpload" ,
33- " ecr:UploadLayerPart" ,
34- " ecr:CompleteLayerUpload" ,
35- " ecr:PutImage" ,
36- " ec2:TerminateInstances"
37- ],
38- " Resource" : " *"
39- },
40-
41- ]
42- })
43- }
44-
45- # Attach policy to the role
46- resource "aws_iam_role_policy_attachment" "ec2_docker_builder_profile_role_policy_attachment" {
47- role = aws_iam_role. ds_stac_browser_profile_role . name
48- policy_arn = aws_iam_policy. ds_stac_browser_role_profile_role_policy . arn
49- }
50-
5118
5219resource "aws_iam_role_policy_attachment" "ds_stac_browser_profile_role_policy_attachment_ssm" {
5320 role = aws_iam_role. ds_stac_browser_profile_role . name
@@ -73,31 +40,6 @@ resource "aws_security_group" "ds_stac_browser_security_group" {
7340 tags = var. tags
7441}
7542
76-
77- resource "aws_vpc_security_group_ingress_rule" "ds_stac_browser_security_group22_128" {
78- security_group_id = aws_security_group. ds_stac_browser_security_group . id
79- cidr_ipv4 = " 128.149.0.0/16"
80- from_port = 22
81- ip_protocol = " tcp"
82- to_port = 22
83- }
84-
85- resource "aws_vpc_security_group_ingress_rule" "ds_stac_browser_security_group_22_137" {
86- security_group_id = aws_security_group. ds_stac_browser_security_group . id
87- cidr_ipv4 = " 137.79.0.0/16"
88- from_port = 22
89- ip_protocol = " tcp"
90- to_port = 22
91- }
92-
93- resource "aws_vpc_security_group_ingress_rule" "ds_stac_browser_security_group_443_128" {
94- security_group_id = aws_security_group. ds_stac_browser_security_group . id
95- cidr_ipv4 = " 128.149.0.0/16"
96- from_port = 8005
97- ip_protocol = " tcp"
98- to_port = 8005
99- }
100-
10143resource "aws_vpc_security_group_ingress_rule" "ds_stac_browser_security_group_443_10" {
10244 security_group_id = aws_security_group. ds_stac_browser_security_group . id
10345 cidr_ipv4 = " 10.52.0.0/16"
@@ -106,22 +48,6 @@ resource "aws_vpc_security_group_ingress_rule" "ds_stac_browser_security_group_4
10648 to_port = 8005
10749}
10850
109- resource "aws_vpc_security_group_ingress_rule" "ds_stac_browser_security_group_443_10_0" {
110- security_group_id = aws_security_group. ds_stac_browser_security_group . id
111- cidr_ipv4 = " 10.0.0.0/16"
112- from_port = 8005
113- ip_protocol = " tcp"
114- to_port = 8005
115- }
116-
117- resource "aws_vpc_security_group_ingress_rule" "ds_stac_browser_security_group_443_137" {
118- security_group_id = aws_security_group. ds_stac_browser_security_group . id
119- cidr_ipv4 = " 137.79.0.0/16"
120- from_port = 8005
121- ip_protocol = " tcp"
122- to_port = 8005
123- }
124-
12551resource "aws_vpc_security_group_egress_rule" "ds_stac_browser_security_group_outb_ipv4" {
12652 security_group_id = aws_security_group. ds_stac_browser_security_group . id
12753 cidr_ipv4 = " 0.0.0.0/0"
0 commit comments