Skip to content

Commit 4aeabf1

Browse files
Fix: Correcting S3 Permissions for Inventory (#2316)
* rename policy statements * change policy statement attachments * update sids
1 parent d11cd59 commit 4aeabf1

File tree

3 files changed

+15
-12
lines changed

3 files changed

+15
-12
lines changed

terraform/core/10-aws-s3-bucket-policies.tf

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -294,8 +294,8 @@ locals {
294294
}
295295
]
296296

297-
allow_s3_access_to_raw_zone_kms_key = {
298-
sid = "Allow Amazon S3 use of the customer managed key"
297+
allow_s3_kms_generatedatakey_from_raw_zone = {
298+
sid = "Allow Amazon S3 use of the raw zone customer managed key"
299299
effect = "Allow"
300300
principals = {
301301
type = "Service"
@@ -312,8 +312,8 @@ locals {
312312
])
313313
}
314314

315-
allow_s3_access_to_refined_zone_kms_key = {
316-
sid = "Allow Amazon S3 use of the customer managed key"
315+
allow_s3_kms_generatedatakey_from_refined_zone = {
316+
sid = "Allow Amazon S3 use of the refined zone customer managed key"
317317
effect = "Allow"
318318
principals = {
319319
type = "Service"
@@ -330,8 +330,8 @@ locals {
330330
])
331331
}
332332

333-
allow_s3_access_to_trusted_zone_kms_key = {
334-
sid = "Allow Amazon S3 use of the customer managed key"
333+
allow_s3_kms_generatedatakey_from_trusted_zone = {
334+
sid = "Allow Amazon S3 use of the trusted zone customer managed key"
335335
effect = "Allow"
336336
principals = {
337337
type = "Service"
@@ -348,6 +348,7 @@ locals {
348348
])
349349
}
350350

351+
351352
#-----------------------------------------------------------------------------
352353
# Admin Bucket Policies
353354
#-----------------------------------------------------------------------------

terraform/core/10-aws-s3-buckets.tf

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -70,8 +70,7 @@ module "raw_zone" {
7070
] : [],
7171
local.is_preprod_env ? [
7272
local.prod_to_pre_prod_data_sync_access_to_raw_zone_key_statement_for_pre_prod
73-
] : [],
74-
[local.allow_s3_access_to_raw_zone_kms_key]
73+
] : []
7574
)
7675
include_backup_policy_tags = false
7776
}
@@ -96,8 +95,7 @@ module "refined_zone" {
9695
[local.rentsense_refined_zone_key_statement],
9796
local.is_preprod_env ? [
9897
local.prod_to_pre_prod_data_sync_access_to_refined_zone_key_statement_for_pre_prod
99-
] : [],
100-
[local.allow_s3_access_to_refined_zone_kms_key]
98+
] : []
10199
)
102100
include_backup_policy_tags = false
103101
}
@@ -118,8 +116,7 @@ module "trusted_zone" {
118116
bucket_key_policy_statements = concat(
119117
local.is_preprod_env ? [
120118
local.prod_to_pre_prod_data_sync_access_to_trusted_zone_key_statement_for_pre_prod
121-
] : [],
122-
[local.allow_s3_access_to_trusted_zone_kms_key]
119+
] : []
123120
)
124121
include_backup_policy_tags = false
125122
}

terraform/core/10-aws-s3-special-buckets.tf

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -51,5 +51,10 @@ module "admin_bucket" {
5151
bucket_name = "Admin Storage"
5252
bucket_identifier = "admin"
5353
bucket_policy_statements = [local.grant_s3_write_permission_to_admin_bucket]
54+
bucket_key_policy_statements = [
55+
local.allow_s3_kms_generatedatakey_from_raw_zone,
56+
local.allow_s3_kms_generatedatakey_from_refined_zone,
57+
local.allow_s3_kms_generatedatakey_from_trusted_zone
58+
]
5459
include_backup_policy_tags = false
5560
}

0 commit comments

Comments
 (0)