Skip to content

Commit e5ca841

Browse files
committed
CCM-9051: dedupe more iam policy statements
1 parent 250948b commit e5ca841

File tree

3 files changed

+2
-44
lines changed

3 files changed

+2
-44
lines changed

infrastructure/terraform/modules/backend-api/module_lambda_process_proof.tf

Lines changed: 1 addition & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ data "aws_iam_policy_document" "process_proof" {
6464
}
6565

6666
statement {
67-
sid = "AllowKMSAccessDynamoDB"
67+
sid = "AllowKMSAccess"
6868
effect = "Allow"
6969

7070
actions = [
@@ -80,20 +80,6 @@ data "aws_iam_policy_document" "process_proof" {
8080
]
8181
}
8282

83-
statement {
84-
sid = "AllowKMSAccessSQSDLQ"
85-
effect = "Allow"
86-
87-
actions = [
88-
"kms:Decrypt",
89-
"kms:GenerateDataKey",
90-
]
91-
92-
resources = [
93-
var.kms_key_arn,
94-
]
95-
}
96-
9783
statement {
9884
sid = "AllowS3QuarantineGetObject"
9985
effect = "Allow"

infrastructure/terraform/modules/backend-api/module_lambda_request_proof.tf

Lines changed: 1 addition & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ data "aws_iam_policy_document" "request_proof_lambda_policy" {
6262
}
6363

6464
statement {
65-
sid = "AllowDdbKMSAccess"
65+
sid = "AllowKMSAccess"
6666
effect = "Allow"
6767

6868
actions = [
@@ -77,18 +77,4 @@ data "aws_iam_policy_document" "request_proof_lambda_policy" {
7777
var.kms_key_arn
7878
]
7979
}
80-
81-
statement {
82-
sid = "AllowSqsKMSAccess"
83-
effect = "Allow"
84-
85-
actions = [
86-
"kms:Decrypt",
87-
"kms:GenerateDataKey",
88-
]
89-
90-
resources = [
91-
var.kms_key_arn,
92-
]
93-
}
9480
}

infrastructure/terraform/modules/backend-api/module_lambda_set_letter_file_virus_scan_status_for_upload.tf

Lines changed: 0 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -67,18 +67,4 @@ data "aws_iam_policy_document" "set_file_virus_scan_status_for_upload" {
6767
var.kms_key_arn
6868
]
6969
}
70-
71-
statement {
72-
sid = "AllowKMSAccessSQSDLQ"
73-
effect = "Allow"
74-
75-
actions = [
76-
"kms:Decrypt",
77-
"kms:GenerateDataKey",
78-
]
79-
80-
resources = [
81-
var.kms_key_arn,
82-
]
83-
}
8470
}

0 commit comments

Comments
 (0)