This repository was archived by the owner on Jan 16, 2025. It is now read-only.
File tree 7 files changed +43
-13
lines changed
7 files changed +43
-13
lines changed Original file line number Diff line number Diff line change @@ -24,6 +24,7 @@ No modules.
24
24
| ------| ------|
25
25
| [ aws_cloudwatch_log_group.webhook] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_group ) | resource |
26
26
| [ aws_iam_role.webhook_lambda] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role ) | resource |
27
+ | [ aws_iam_role_policy.webhook_kms] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy ) | resource |
27
28
| [ aws_iam_role_policy.webhook_logging] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy ) | resource |
28
29
| [ aws_iam_role_policy.webhook_sqs] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy ) | resource |
29
30
| [ aws_iam_role_policy.webhook_ssm] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy ) | resource |
Original file line number Diff line number Diff line change @@ -117,7 +117,15 @@ resource "aws_iam_role_policy" "webhook_sqs" {
117
117
118
118
policy = templatefile (" ${ path . module } /../policies/lambda-publish-sqs-policy.json" , {
119
119
sqs_resource_arns = jsonencode (var. config . sqs_job_queues_arns )
120
- kms_key_arn = var.config.kms_key_arn != null ? var.config.kms_key_arn : " "
120
+ })
121
+ }
122
+
123
+ resource "aws_iam_role_policy" "webhook_kms" {
124
+ name = " kms-policy"
125
+ role = aws_iam_role. webhook_lambda . name
126
+
127
+ policy = templatefile (" ${ path . module } /../policies/lambda-kms.json" , {
128
+ kms_key_arn = var.config.kms_key_arn != null ? var.config.kms_key_arn : " arn:${ var . config . aws_partition } :kms:::CMK_NOT_IN_USE"
121
129
})
122
130
}
123
131
@@ -128,7 +136,6 @@ resource "aws_iam_role_policy" "webhook_workflow_job_sqs" {
128
136
129
137
policy = templatefile (" ${ path . module } /../policies/lambda-publish-sqs-policy.json" , {
130
138
sqs_resource_arns = jsonencode ([var . config . sqs_workflow_job_queue . arn ])
131
- kms_key_arn = var.config.kms_key_arn != null ? var.config.kms_key_arn : " "
132
139
})
133
140
}
134
141
Original file line number Diff line number Diff line change @@ -30,11 +30,13 @@ No modules.
30
30
| [ aws_cloudwatch_log_group.webhook] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_group ) | resource |
31
31
| [ aws_iam_role.dispatcher_lambda] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role ) | resource |
32
32
| [ aws_iam_role.webhook_lambda] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role ) | resource |
33
+ | [ aws_iam_role_policy.dispatcher_kms] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy ) | resource |
33
34
| [ aws_iam_role_policy.dispatcher_logging] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy ) | resource |
34
35
| [ aws_iam_role_policy.dispatcher_sqs] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy ) | resource |
35
36
| [ aws_iam_role_policy.dispatcher_ssm] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy ) | resource |
36
37
| [ aws_iam_role_policy.dispatcher_xray] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy ) | resource |
37
38
| [ aws_iam_role_policy.webhook_eventbridge] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy ) | resource |
39
+ | [ aws_iam_role_policy.webhook_kms] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy ) | resource |
38
40
| [ aws_iam_role_policy.webhook_logging] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy ) | resource |
39
41
| [ aws_iam_role_policy.webhook_ssm] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy ) | resource |
40
42
| [ aws_iam_role_policy.xray] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy ) | resource |
Original file line number Diff line number Diff line change @@ -116,7 +116,15 @@ resource "aws_iam_role_policy" "dispatcher_sqs" {
116
116
117
117
policy = templatefile (" ${ path . module } /../policies/lambda-publish-sqs-policy.json" , {
118
118
sqs_resource_arns = jsonencode (var. config . sqs_job_queues_arns )
119
- kms_key_arn = var.config.kms_key_arn != null ? var.config.kms_key_arn : " "
119
+ })
120
+ }
121
+
122
+ resource "aws_iam_role_policy" "dispatcher_kms" {
123
+ name = " kms-policy"
124
+ role = aws_iam_role. webhook_lambda . name
125
+
126
+ policy = templatefile (" ${ path . module } /../policies/lambda-kms.json" , {
127
+ kms_key_arn = var.config.kms_key_arn != null ? var.config.kms_key_arn : " arn:${ var . config . aws_partition } :kms:::CMK_NOT_IN_USE"
120
128
})
121
129
}
122
130
Original file line number Diff line number Diff line change @@ -127,6 +127,15 @@ resource "aws_iam_role_policy" "webhook_ssm" {
127
127
})
128
128
}
129
129
130
+ resource "aws_iam_role_policy" "webhook_kms" {
131
+ name = " kms-policy"
132
+ role = aws_iam_role. webhook_lambda . name
133
+
134
+ policy = templatefile (" ${ path . module } /../policies/lambda-kms.json" , {
135
+ kms_key_arn = var.config.kms_key_arn != null ? var.config.kms_key_arn : " arn:${ var . config . aws_partition } :kms:::CMK_NOT_IN_USE"
136
+ })
137
+ }
138
+
130
139
resource "aws_iam_role_policy" "xray" {
131
140
count = var. config . tracing_config . mode != null ? 1 : 0
132
141
name = " xray-policy"
Original file line number Diff line number Diff line change
1
+ {
2
+ "Version" : " 2012-10-17" ,
3
+ "Statement" : [
4
+ {
5
+ "Effect" : " Allow" ,
6
+ "Action" : [
7
+ " kms:Decrypt" ,
8
+ " kms:GenerateDataKey"
9
+ ],
10
+ "Resource" : " ${kms_key_arn}"
11
+ }
12
+ ]
13
+ }
Original file line number Diff line number Diff line change 5
5
"Effect" : " Allow" ,
6
6
"Action" : [" sqs:SendMessage" , " sqs:GetQueueAttributes" ],
7
7
"Resource" : ${sqs_resource_arns }
8
- %{ if kms_key_arn != "" ~}
9
- },
10
- {
11
- "Effect" : " Allow" ,
12
- "Action" : [
13
- " kms:Decrypt" ,
14
- " kms:GenerateDataKey"
15
- ],
16
- "Resource" : " ${kms_key_arn}"
17
- %{ endif ~ }
18
8
}
19
9
]
20
10
}
You can’t perform that action at this time.
0 commit comments