File tree Expand file tree Collapse file tree 1 file changed +17
-4
lines changed
modules/iam-role-for-service-accounts-eks Expand file tree Collapse file tree 1 file changed +17
-4
lines changed Original file line number Diff line number Diff line change @@ -501,21 +501,34 @@ data "aws_iam_policy_document" "external_secrets" {
501
501
}
502
502
503
503
statement {
504
- actions = [
505
- " kms:Decrypt"
506
- ]
504
+ actions = [" kms:Decrypt" ]
507
505
resources = var. external_secrets_kms_key_arns
508
506
}
509
507
510
508
dynamic "statement" {
511
509
for_each = var. external_secrets_secrets_manager_create_permission ? [1 ] : []
512
510
content {
513
511
actions = [
514
- " secretsmanager:CreateSecret"
512
+ " secretsmanager:CreateSecret" ,
513
+ " secretsmanager:PutSecretValue" ,
514
+ " secretsmanager:TagResource" ,
515
515
]
516
516
resources = var. external_secrets_secrets_manager_arns
517
517
}
518
518
}
519
+
520
+ dynamic "statement" {
521
+ for_each = var. external_secrets_secrets_manager_create_permission ? [1 ] : []
522
+ content {
523
+ actions = [" secretsmanager:DeleteSecret" ]
524
+ resources = var. external_secrets_secrets_manager_arns
525
+ condition {
526
+ test = " StringEquals"
527
+ variable = " secretsmanager:ResourceTag/managed-by"
528
+ values = [" external-secrets" ]
529
+ }
530
+ }
531
+ }
519
532
}
520
533
521
534
resource "aws_iam_policy" "external_secrets" {
You can’t perform that action at this time.
0 commit comments