Skip to content

Commit e21e955

Browse files
authored
Merge branch 'master' into VED-714-rearchitect-to-prevent-batch-race-conditions
2 parents 0dd35ff + ef988a0 commit e21e955

File tree

1 file changed

+22
-3
lines changed

1 file changed

+22
-3
lines changed

terraform/dps_role_creation.tf

Lines changed: 22 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
resource "aws_iam_role" "dynamo_s3_access_role" {
2-
name = "${local.short_prefix}-dynamo-s3-access-role"
2+
name = "imms-${local.resource_scope}-dynamo-s3-access-role"
33
assume_role_policy = jsonencode({
44
Version : "2012-10-17",
55
Statement : [
@@ -14,8 +14,8 @@ resource "aws_iam_role" "dynamo_s3_access_role" {
1414
})
1515
}
1616

17-
resource "aws_iam_role_policy" "dynamo_s3_access_policy" {
18-
name = "${local.short_prefix}-dynamo_s3_access-policy"
17+
resource "aws_iam_role_policy" "dynamo_access_policy" {
18+
name = "imms-${local.resource_scope}-dynamo-access-policy"
1919
role = aws_iam_role.dynamo_s3_access_role.id
2020
policy = jsonencode({
2121
Version = "2012-10-17",
@@ -35,3 +35,22 @@ resource "aws_iam_role_policy" "dynamo_s3_access_policy" {
3535
]
3636
})
3737
}
38+
39+
resource "aws_iam_role_policy" "kms_key_access_policy" {
40+
name = "imms-${local.resource_scope}-kms-key-access-policy"
41+
role = aws_iam_role.dynamo_s3_access_role.id
42+
policy = jsonencode({
43+
Version = "2012-10-17",
44+
Statement = [
45+
{
46+
Effect = "Allow",
47+
Action = [
48+
"kms:Decrypt"
49+
],
50+
Resource = [
51+
data.aws_kms_key.existing_dynamo_encryption_key.arn
52+
]
53+
}
54+
]
55+
})
56+
}

0 commit comments

Comments
 (0)