From a180d7fcbb02375763d3f98212b9a435635aaf53 Mon Sep 17 00:00:00 2001
From: Barclay Walsh <barclay.walsh@parivedasolutions.com>
Date: Wed, 11 Dec 2019 08:35:03 -0600
Subject: [PATCH] Commented out a problem policy creating 409 errors.

---
 .../Automated/elasticsearch.yml               | 34 +++++++++----------
 1 file changed, 17 insertions(+), 17 deletions(-)

diff --git a/provider/indexer-aws/CloudFormation/Automated/elasticsearch.yml b/provider/indexer-aws/CloudFormation/Automated/elasticsearch.yml
index 076af18e5..83433e3d5 100644
--- a/provider/indexer-aws/CloudFormation/Automated/elasticsearch.yml
+++ b/provider/indexer-aws/CloudFormation/Automated/elasticsearch.yml
@@ -184,23 +184,23 @@ Resources:
       SnapshotOptions:
         AutomatedSnapshotStartHour: "0"
       AccessPolicies:
-        - Version: "2012-10-17"
-            Statement:
-              - Effect: "Allow"
-                Principal:
-                  AWS:
-                    - !Sub arn:aws:iam::${AWS::AccountId}:root
-                    - Fn::ImportValue:
-                        !Sub "${Environment}-IndexerServiceIamUserArn"
-                      # TODO: need to create cognito user and identity pool and link it to principal for dynamic creation
-                    - "arn:aws:iam::888733619319:role/Cognito_osduelasticsearchAuth_Role"
-                Action:
-                  - "es:*"
-                  - 'es:ESHttp*'
-                  - 'cognito-identity:*'
-                  - 'cognito-idp:*'
-                  - 'sts:AssumeRole'
-                Resource: !Sub arn:aws:es:us-east-1:846973539254:domain/${Environment}-${ElasticsearchDomainName}/*
+#        - Version: "2012-10-17"
+#            Statement:
+#              - Effect: "Allow"
+#                Principal:
+#                  AWS:
+#                    - !Sub arn:aws:iam::${AWS::AccountId}:root
+#                    - Fn::ImportValue:
+#                        !Sub "${Environment}-IndexerServiceIamUserArn"
+#                      # TODO: need to create cognito user and identity pool and link it to principal for dynamic creation
+#                    - "arn:aws:iam::888733619319:role/Cognito_osduelasticsearchAuth_Role"
+#                Action:
+#                  - "es:*"
+#                  - 'es:ESHttp*'
+#                  - 'cognito-identity:*'
+#                  - 'cognito-idp:*'
+#                  - 'sts:AssumeRole'
+#                Resource: !Sub arn:aws:es:us-east-1:846973539254:domain/${Environment}-${ElasticsearchDomainName}/*
         - "Version": "2012-10-17"
           "Statement":
             - "Effect": "Allow"
-- 
GitLab