From a180d7fcbb02375763d3f98212b9a435635aaf53 Mon Sep 17 00:00:00 2001 From: Barclay Walsh <barclay.walsh@parivedasolutions.com> Date: Wed, 11 Dec 2019 08:35:03 -0600 Subject: [PATCH] Commented out a problem policy creating 409 errors. --- .../Automated/elasticsearch.yml | 34 +++++++++---------- 1 file changed, 17 insertions(+), 17 deletions(-) diff --git a/provider/indexer-aws/CloudFormation/Automated/elasticsearch.yml b/provider/indexer-aws/CloudFormation/Automated/elasticsearch.yml index 076af18e5..83433e3d5 100644 --- a/provider/indexer-aws/CloudFormation/Automated/elasticsearch.yml +++ b/provider/indexer-aws/CloudFormation/Automated/elasticsearch.yml @@ -184,23 +184,23 @@ Resources: SnapshotOptions: AutomatedSnapshotStartHour: "0" AccessPolicies: - - Version: "2012-10-17" - Statement: - - Effect: "Allow" - Principal: - AWS: - - !Sub arn:aws:iam::${AWS::AccountId}:root - - Fn::ImportValue: - !Sub "${Environment}-IndexerServiceIamUserArn" - # TODO: need to create cognito user and identity pool and link it to principal for dynamic creation - - "arn:aws:iam::888733619319:role/Cognito_osduelasticsearchAuth_Role" - Action: - - "es:*" - - 'es:ESHttp*' - - 'cognito-identity:*' - - 'cognito-idp:*' - - 'sts:AssumeRole' - Resource: !Sub arn:aws:es:us-east-1:846973539254:domain/${Environment}-${ElasticsearchDomainName}/* +# - Version: "2012-10-17" +# Statement: +# - Effect: "Allow" +# Principal: +# AWS: +# - !Sub arn:aws:iam::${AWS::AccountId}:root +# - Fn::ImportValue: +# !Sub "${Environment}-IndexerServiceIamUserArn" +# # TODO: need to create cognito user and identity pool and link it to principal for dynamic creation +# - "arn:aws:iam::888733619319:role/Cognito_osduelasticsearchAuth_Role" +# Action: +# - "es:*" +# - 'es:ESHttp*' +# - 'cognito-identity:*' +# - 'cognito-idp:*' +# - 'sts:AssumeRole' +# Resource: !Sub arn:aws:es:us-east-1:846973539254:domain/${Environment}-${ElasticsearchDomainName}/* - "Version": "2012-10-17" "Statement": - "Effect": "Allow" -- GitLab