Skip to content

Commit fa74a18

Browse files
fix: Expand Permissions for external-secrets IRSA Policy towards AWS Secrets Manager (#416)
Co-authored-by: Bryant Biggs <[email protected]>
1 parent 75d0659 commit fa74a18

File tree

1 file changed

+17
-4
lines changed

1 file changed

+17
-4
lines changed

modules/iam-role-for-service-accounts-eks/policies.tf

Lines changed: 17 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -501,21 +501,34 @@ data "aws_iam_policy_document" "external_secrets" {
501501
}
502502

503503
statement {
504-
actions = [
505-
"kms:Decrypt"
506-
]
504+
actions = ["kms:Decrypt"]
507505
resources = var.external_secrets_kms_key_arns
508506
}
509507

510508
dynamic "statement" {
511509
for_each = var.external_secrets_secrets_manager_create_permission ? [1] : []
512510
content {
513511
actions = [
514-
"secretsmanager:CreateSecret"
512+
"secretsmanager:CreateSecret",
513+
"secretsmanager:PutSecretValue",
514+
"secretsmanager:TagResource",
515515
]
516516
resources = var.external_secrets_secrets_manager_arns
517517
}
518518
}
519+
520+
dynamic "statement" {
521+
for_each = var.external_secrets_secrets_manager_create_permission ? [1] : []
522+
content {
523+
actions = ["secretsmanager:DeleteSecret"]
524+
resources = var.external_secrets_secrets_manager_arns
525+
condition {
526+
test = "StringEquals"
527+
variable = "secretsmanager:ResourceTag/managed-by"
528+
values = ["external-secrets"]
529+
}
530+
}
531+
}
519532
}
520533

521534
resource "aws_iam_policy" "external_secrets" {

0 commit comments

Comments
 (0)