@@ -35,7 +35,7 @@ resource "aws_cloudwatch_log_group" "lambda_logs" {
3535
3636data "aws_caller_identity" "current" {}
3737
38- data "aws_iam_policy_document" "admin " {
38+ data "aws_iam_policy_document" "root_kms_access " {
3939 statement {
4040 sid = " AllowRootAccountAccess"
4141 effect = " Allow"
@@ -75,7 +75,7 @@ data "aws_iam_policy_document" "admin" {
7575 }
7676}
7777
78- data "aws_iam_policy_document" "lambda " {
78+ data "aws_iam_policy_document" "lambda_kms_access " {
7979 statement {
8080 effect = " Allow"
8181 actions = [
@@ -89,17 +89,17 @@ data "aws_iam_policy_document" "lambda" {
8989 }
9090}
9191
92- resource "aws_iam_role_policy" "lambda " {
92+ resource "aws_iam_role_policy" "lambda_kms_access " {
9393 name = " lambda_kms_usage"
9494 role = aws_iam_role. lambda_execution_role . id
95- policy = data. aws_iam_policy_document . lambda . json
95+ policy = data. aws_iam_policy_document . lambda_kms_access . json
9696}
9797
9898resource "aws_kms_key" "lambda" {
9999 deletion_window_in_days = var. kms_deletion_window
100100 description = " Custom KMS Key for ${ terraform . workspace } _${ var . name } "
101101 enable_key_rotation = true
102- policy = data. aws_iam_policy_document . admin . json
102+ policy = data. aws_iam_policy_document . admin_kms_access . json
103103}
104104
105105resource "aws_kms_alias" "lambda" {
@@ -146,7 +146,7 @@ resource "aws_iam_role" "lambda_execution_role" {
146146}
147147
148148data "aws_iam_policy_document" "merged_policy" {
149- source_policy_documents = concat (var. iam_role_policy_documents , [data . aws_iam_policy_document . lambda . json ])
149+ source_policy_documents = concat (var. iam_role_policy_documents , [data . aws_iam_policy_document . lambda_kms_access . json ])
150150}
151151
152152resource "aws_iam_policy" "combined_policies" {
0 commit comments