Skip to content

Commit f43ba6d

Browse files
authored
fix(GROW-3004): Fix the sid issue (#166)
Signed-off-by: Lei Jin <[email protected]>
1 parent 5ac6f90 commit f43ba6d

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

main.tf

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -273,7 +273,7 @@ data "aws_iam_policy_document" "kms_key_policy" {
273273
version = "2012-10-17"
274274

275275
statement {
276-
sid = "Enable IAM User Permissions"
276+
sid = "EnableIAMUserPermissions"
277277
effect = "Allow"
278278

279279
principals {
@@ -288,7 +288,7 @@ data "aws_iam_policy_document" "kms_key_policy" {
288288
dynamic "statement" {
289289
for_each = (!var.use_existing_cloudtrail && length(var.bucket_sse_key_arn) == 0) || var.sns_topic_encryption_enabled ? [1] : []
290290
content {
291-
sid = "Allow CloudTrail service to encrypt/decrypt"
291+
sid = "AllowCloudTrailServiceToEncryptDecrypt"
292292
effect = "Allow"
293293

294294
principals {
@@ -304,7 +304,7 @@ data "aws_iam_policy_document" "kms_key_policy" {
304304
dynamic "statement" {
305305
for_each = var.use_s3_bucket_notification ? [1] : []
306306
content {
307-
sid = "Allow S3 bucket to encrypt/decrypt"
307+
sid = "AllowS3BucketToEncryptDecrypt"
308308
effect = "Allow"
309309

310310
principals {
@@ -328,7 +328,7 @@ data "aws_iam_policy_document" "kms_key_policy" {
328328
dynamic "statement" {
329329
for_each = (!var.use_existing_cloudtrail && length(var.bucket_sse_key_arn) == 0) ? [1] : []
330330
content {
331-
sid = "Allow CloudTrail to describe key"
331+
sid = "AllowCloudTrailToDescribeKey"
332332
effect = "Allow"
333333

334334
principals {
@@ -344,7 +344,7 @@ data "aws_iam_policy_document" "kms_key_policy" {
344344
dynamic "statement" {
345345
for_each = (var.sns_topic_encryption_enabled && length(var.sns_topic_encryption_key_arn) == 0) ? [1] : []
346346
content {
347-
sid = "Allow SNS service to encrypt/decrypt"
347+
sid = "AllowSNSServiceToEncryptDecrypt"
348348
effect = "Allow"
349349

350350
principals {
@@ -358,7 +358,7 @@ data "aws_iam_policy_document" "kms_key_policy" {
358358
}
359359

360360
statement {
361-
sid = "Allow principals in the account to decrypt log files"
361+
sid = "AllowPrincipalsInTheAccountToDecryptLogFiles"
362362
effect = "Allow"
363363

364364
principals {

0 commit comments

Comments
 (0)