@@ -24,17 +24,6 @@ data "aws_caller_identity" "master" {
2424 provider = aws. master
2525}
2626
27- data "terraform_remote_state" "globals" {
28- backend = " s3"
29- workspace = " global"
30- config = {
31- bucket = " ${ var . global_state_bucket } "
32- key = " ${ var . global_state_key } "
33- region = " ${ var . global_state_region } "
34- profile = " ${ var . global_state_profile } "
35- }
36- }
37-
3827resource "aws_kms_alias" "cloudtrail" {
3928 provider = aws. master
4029
@@ -105,7 +94,7 @@ resource "aws_kms_key" "cloudtrail" {
10594 "Action": "kms:GenerateDataKey*",
10695 "Condition": {
10796 "ForAllValues:StringLike": {
108- "kms:EncryptionContext:aws:cloudtrail:arn": ${ jsonencode ([for id in data . terraform_remote_state . globals . outputs . aws_account_ids : join (" " , [" arn:aws:cloudtrail:*:" , id , " :trail/*" ])])}
97+ "kms:EncryptionContext:aws:cloudtrail:arn": ${ jsonencode ([for id in var . account_ids : join (" " , [" arn:aws:cloudtrail:*:" , id , " :trail/*" ])])}
10998 }
11099 },
111100 "Effect": "Allow",
@@ -121,7 +110,7 @@ resource "aws_kms_key" "cloudtrail" {
121110 "Effect": "Allow",
122111 "Principal": {
123112 "AWS": [
124- "arn:aws:iam::${ data . terraform_remote_state . globals . outputs . aws_account_ids . master } :root"
113+ "arn:aws:iam::${ data . aws_caller_identity . master . account_id } :root"
125114 ]
126115 },
127116 "Action": [
@@ -138,7 +127,7 @@ resource "aws_kms_key" "cloudtrail" {
138127 "Effect": "Allow",
139128 "Principal": {
140129 "AWS": [
141- "arn:aws:iam::${ data . terraform_remote_state . globals . outputs . aws_account_ids . master } :root"
130+ "arn:aws:iam::${ data . aws_caller_identity . master . account_id } :root"
142131 ]
143132 },
144133 "Action": [
@@ -165,14 +154,14 @@ resource "aws_kms_key" "s3" {
165154resource "aws_kms_alias" "s3" {
166155 provider = aws. master
167156
168- name = " alias/s3"
157+ name = " alias/s3"
169158 target_key_id = " ${ aws_kms_key . s3 . key_id } "
170159}
171160
172161resource "aws_s3_bucket" "main" {
173162 provider = aws. audit
174163
175- bucket = " s3-${ var . client_name } -cloudtrail"
164+ bucket = " s3-${ var . client_name } -cloudtrail"
176165 force_destroy = true
177166 versioning {
178167 enabled = true
@@ -181,7 +170,7 @@ resource "aws_s3_bucket" "main" {
181170 rule {
182171 apply_server_side_encryption_by_default {
183172 kms_master_key_id = " ${ aws_kms_alias . s3 . arn } "
184- sse_algorithm = " aws:kms"
173+ sse_algorithm = " aws:kms"
185174 }
186175 }
187176 }
0 commit comments