@@ -8,18 +8,18 @@ resource "aws_iam_role" "iam_role" {
8
8
name = " ${ local . namespace } -tf-assume-role"
9
9
10
10
assume_role_policy = <<- EOF
11
- {
12
- "Version": "2021 -10-17",
13
- "Statement": [
14
- {
15
- "Action": "sts:AssumeRole",
16
- "Principal": {
17
- "AWS": ${ jsonencode (local. principal_arns )}
18
- },
19
- "Effect": "Allow"
20
- }
21
- ]
22
- }
11
+ {
12
+ "Version": "2012 -10-17",
13
+ "Statement": [
14
+ {
15
+ "Action": "sts:AssumeRole",
16
+ "Principal": {
17
+ "AWS": ${ jsonencode (local. principal_arns )}
18
+ },
19
+ "Effect": "Allow"
20
+ }
21
+ ]
22
+ }
23
23
EOF
24
24
25
25
tags = {
@@ -32,13 +32,15 @@ data "aws_iam_policy_document" "policy_doc" {
32
32
actions = [
33
33
" s3:ListBucket" ,
34
34
]
35
+
35
36
resources = [
36
37
aws_s3_bucket . s3_bucket . arn
37
38
]
38
39
}
39
40
40
41
statement {
41
- actions = [" s3.GetObject" , " s3:PutObject" , " s3:DeleteObject" ]
42
+ actions = [" s3:GetObject" , " s3:PutObject" , " s3:DeleteObject" ]
43
+
42
44
resources = [
43
45
" ${ aws_s3_bucket . s3_bucket . arn } /*" ,
44
46
]
@@ -52,15 +54,23 @@ data "aws_iam_policy_document" "policy_doc" {
52
54
]
53
55
resources = [aws_dynamodb_table . dynamodb_table . arn ]
54
56
}
57
+
58
+ statement {
59
+ actions = [
60
+ " kms:Decrypt" ,
61
+ " kms:GenerateDataKey"
62
+ ]
63
+ resources = [aws_kms_key . kms_key . arn ]
64
+ }
55
65
}
56
66
57
67
resource "aws_iam_policy" "iam_policy" {
58
- name = " ${ local . namespace } -tf-policy"
59
- path = " /"
68
+ name = " ${ local . namespace } -tf-policy"
69
+ path = " /"
60
70
policy = data. aws_iam_policy_document . policy_doc . json
61
71
}
62
72
63
73
resource "aws_iam_role_policy_attachment" "policy_attach" {
64
- role = aws_iam_role. iam_role . name
74
+ role = aws_iam_role. iam_role . name
65
75
policy_arn = aws_iam_policy. iam_policy . arn
66
- }
76
+ }
0 commit comments