@@ -477,6 +477,9 @@ Conditions:
477
477
UseSpecifiedSecretsBucket :
478
478
!Not [ !Equals [ !Ref SecretsBucket, "" ] ]
479
479
480
+ HasSecretsBucket :
481
+ !Or [ !Condition CreateSecretsBucket, !Condition UseSpecifiedSecretsBucket ]
482
+
480
483
UseSpecifiedAvailabilityZones :
481
484
!Not [ !Equals [ !Join [ "", !Ref AvailabilityZones ], "" ] ]
482
485
@@ -778,9 +781,9 @@ Resources:
778
781
Value : !Ref CostAllocationTagValue
779
782
- !Ref " AWS::NoValue"
780
783
781
- ManagedSecretsBucketPolicy :
784
+ SecretsBucketPolicy :
782
785
Type : AWS::IAM::Policy
783
- Condition : CreateSecretsBucket
786
+ Condition : HasSecretsBucket
784
787
Properties :
785
788
PolicyName : SecretsBucketPolicy
786
789
PolicyDocument :
@@ -790,25 +793,12 @@ Resources:
790
793
- s3:Get*
791
794
- s3:List*
792
795
Resource :
793
- - !Sub " arn:aws:s3:::${ManagedSecretsBucket}/*"
794
- - !Sub " arn:aws:s3:::${ManagedSecretsBucket}"
795
- Roles :
796
- - !Ref IAMRole
797
-
798
- UnmanagedSecretsBucketPolicy :
799
- Type : AWS::IAM::Policy
800
- Condition : UseSpecifiedSecretsBucket
801
- Properties :
802
- PolicyName : SecretsBucketPolicy
803
- PolicyDocument :
804
- Statement :
805
- - Effect : Allow
806
- Action :
807
- - s3:Get*
808
- - s3:List*
809
- Resource :
810
- - !Sub " arn:aws:s3:::${SecretsBucket}/*"
811
- - !Sub " arn:aws:s3:::${SecretsBucket}"
796
+ - !Sub
797
+ - " arn:aws:s3:::${Bucket}/*"
798
+ - Bucket : !If [ CreateSecretsBucket, !Ref ManagedSecretsBucket, !Ref SecretsBucket ]
799
+ - !Sub
800
+ - " arn:aws:s3:::${Bucket}"
801
+ - Bucket : !If [ CreateSecretsBucket, !Ref ManagedSecretsBucket, !Ref SecretsBucket ]
812
802
Roles :
813
803
- !Ref IAMRole
814
804
0 commit comments