Skip to content

Commit 4dee504

Browse files
authored
[bugfix] Fix secretsmanager execution role IAM policy in aws-ecs-job (#144)
1 parent 3f3b0f5 commit 4dee504

File tree

2 files changed

+0
-30
lines changed

2 files changed

+0
-30
lines changed

aws-ecs-job-fargate/iam.tf

-15
Original file line numberDiff line numberDiff line change
@@ -27,26 +27,11 @@ resource "aws_iam_role_policy_attachment" "task_execution_role" {
2727
data "aws_iam_policy_document" "registry_secretsmanager" {
2828
count = var.registry_secretsmanager_arn != null ? 1 : 0
2929

30-
statement {
31-
actions = [
32-
"kms:Decrypt",
33-
]
34-
35-
resources = [var.registry_secretsmanager_arn]
36-
}
37-
3830
statement {
3931
actions = [
4032
"secretsmanager:GetSecretValue",
4133
]
4234

43-
# Limit to only current version of the secret
44-
condition {
45-
test = "ForAnyValue:StringEquals"
46-
variable = "secretsmanager:VersionStage"
47-
values = ["AWSCURRENT"]
48-
}
49-
5035
resources = [var.registry_secretsmanager_arn]
5136
}
5237
}

aws-ecs-job/iam.tf

-15
Original file line numberDiff line numberDiff line change
@@ -28,26 +28,11 @@ resource "aws_iam_role_policy_attachment" "task_execution_role" {
2828
data "aws_iam_policy_document" "registry_secretsmanager" {
2929
count = var.registry_secretsmanager_arn != null ? 1 : 0
3030

31-
statement {
32-
actions = [
33-
"kms:Decrypt",
34-
]
35-
36-
resources = [var.registry_secretsmanager_arn]
37-
}
38-
3931
statement {
4032
actions = [
4133
"secretsmanager:GetSecretValue",
4234
]
4335

44-
# Limit to only current version of the secret
45-
condition {
46-
test = "ForAnyValue:StringEquals"
47-
variable = "secretsmanager:VersionStage"
48-
values = ["AWSCURRENT"]
49-
}
50-
5136
resources = [var.registry_secretsmanager_arn]
5237
}
5338
}

0 commit comments

Comments
 (0)