Skip to content

Commit cff6e1a

Browse files
authored
Merge pull request #5137 from segmentio/fix-entire-role-account-in-aws-policy
[STRATCONN-2814]: Fix role policies for AWS destinations
2 parents f4b58c1 + d3c237c commit cff6e1a

File tree

4 files changed

+9
-9
lines changed

4 files changed

+9
-9
lines changed

src/connections/destinations/catalog/amazon-kinesis-firehose/index.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -144,7 +144,7 @@ To attach multiple sources to your IAM role:
144144
{
145145
"Effect": "Allow",
146146
"Principal": {
147-
"AWS": "arn:aws:iam::595280932656:root"
147+
"AWS": "arn:aws:iam::595280932656:role/customer-firehose-access"
148148
},
149149
"Action": "sts:AssumeRole",
150150
"Condition": {
@@ -166,7 +166,7 @@ To attach multiple sources to your IAM role:
166166
{
167167
"Effect": "Allow",
168168
"Principal": {
169-
"AWS": "arn:aws:iam::595280932656:root"
169+
"AWS": "arn:aws:iam::595280932656:role/customer-firehose-access"
170170
},
171171
"Action": "sts:AssumeRole",
172172
"Condition": {
@@ -198,7 +198,7 @@ To set this value for a Secret ID:
198198
{
199199
"Effect": "Allow",
200200
"Principal": {
201-
"AWS": "arn:aws:iam::595280932656:root"
201+
"AWS": "arn:aws:iam::595280932656:role/customer-firehose-access"
202202
},
203203
"Action": "sts:AssumeRole",
204204
"Condition": {

src/connections/destinations/catalog/amazon-kinesis/index.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -155,7 +155,7 @@ To attach multiple sources to your IAM role:
155155
{
156156
"Effect": "Allow",
157157
"Principal": {
158-
"AWS": "arn:aws:iam::595280932656:root"
158+
"AWS": "arn:aws:iam::595280932656:role/customer-kinesis-access"
159159
},
160160
"Action": "sts:AssumeRole",
161161
"Condition": {
@@ -175,7 +175,7 @@ To attach multiple sources to your IAM role:
175175
{
176176
"Effect": "Allow",
177177
"Principal": {
178-
"AWS": "arn:aws:iam::595280932656:root"
178+
"AWS": "arn:aws:iam::595280932656:role/customer-kinesis-access"
179179
},
180180
"Action": "sts:AssumeRole",
181181
"Condition": {
@@ -228,7 +228,7 @@ If you have many sources using Kinesis that it's impractical to attach all of th
228228
{
229229
"Effect": "Allow",
230230
"Principal": {
231-
"AWS": "arn:aws:iam::595280932656:root"
231+
"AWS": "arn:aws:iam::595280932656:role/customer-kinesis-access"
232232
},
233233
"Action": "sts:AssumeRole",
234234
"Condition": {

src/connections/destinations/catalog/amazon-lambda/index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ To create an IAM role:
146146
![A screenshot of the AWS IAM home summary, with the Trust relationships tab selected.](images/LambdaTrustRelationship.png)
147147

148148
7. Copy and paste the following code into your trust relationship. You should replace `<your-source-id>` with either the Source ID of the attached Segment source (the default) or the External ID set in your AWS Lambda destination settings.
149-
* `arn:aws:iam::595280932656:root` refers to Segment's AWS Account, and is what allows Segment's Destination to access the role to invoke your Lambda.
149+
* `arn:aws:iam::595280932656:role/customer-lambda-prod-destination-access` refers to Segment's AWS Account, and is what allows Segment's Destination to access the role to invoke your Lambda.
150150

151151
> note ""
152152
> **Note**: Source ID can be found by navigating to **Settings > API Keys** from your Segment source homepage.
@@ -158,7 +158,7 @@ To create an IAM role:
158158
{
159159
"Effect": "Allow",
160160
"Principal": {
161-
"AWS": "arn:aws:iam::595280932656:root"
161+
"AWS": "arn:aws:iam::595280932656:role/customer-lambda-prod-destination-access"
162162
},
163163
"Action": "sts:AssumeRole",
164164
"Condition": {

src/connections/destinations/catalog/amazon-personalize/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -691,7 +691,7 @@ To create an IAM role:
691691
{
692692
"Effect": "Allow",
693693
"Principal": {
694-
"AWS": "arn:aws:iam::595280932656:root"
694+
"AWS": "arn:aws:iam::595280932656:role/customer-personalize-prod-destination-access"
695695
},
696696
"Action": "sts:AssumeRole",
697697
"Condition": {

0 commit comments

Comments
 (0)