Skip to content

Commit 4b33821

Browse files
VIA-615 AJ/AS Provide appropriate permissions to get secrets in cache hydrator
1 parent b7ee4ed commit 4b33821

File tree

2 files changed

+2
-13
lines changed

2 files changed

+2
-13
lines changed

infrastructure/modules/deploy_app/policies/server-lambda-iam-policy.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,6 @@
11
{
22
"Version": "2012-10-17",
33
"Statement": [
4-
{
5-
"Effect": "Allow",
6-
"Action": ["kms:Decrypt"],
7-
"Resource": "arn:aws:kms:${region}:${account_id}:alias/aws/ssm"
8-
},
94
{
105
"Effect": "Allow",
116
"Action": ["s3:ListBucket", "s3:GetObject"],

infrastructure/modules/deploy_lambda/policies/cache-lambda-iam-role-policy.json

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,8 @@
33
"Statement": [
44
{
55
"Effect": "Allow",
6-
"Action": ["kms:Decrypt"],
7-
"Resource": "arn:aws:kms:${region}:${account_id}:alias/aws/ssm"
8-
},
9-
10-
{
11-
"Effect": "Allow",
12-
"Action": ["ssm:GetParameter"],
13-
"Resource": "arn:aws:ssm:${region}:${account_id}:parameter/${prefix}/*"
6+
"Action": ["secretsmanager:GetSecretValue"],
7+
"Resource": "arn:aws:secretsmanager:${region}:${account_id}:secret:/vita/*"
148
},
159

1610
{

0 commit comments

Comments
 (0)