Skip to content

Commit 25d4928

Browse files
Update storage module configuration for Bedrock service principal access
1 parent 55d1167 commit 25d4928

File tree

3 files changed

+13
-16
lines changed

3 files changed

+13
-16
lines changed

infra/app-flask/service/document_data_extraction.tf

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -33,23 +33,23 @@ module "dde_input_bucket" {
3333
aws = aws.dde
3434
}
3535

36-
count = local.document_data_extraction_config != null ? 1 : 0
37-
source = "../../modules/storage"
38-
name = "${local.prefix}${local.document_data_extraction_config.input_bucket_name}"
39-
is_temporary = local.is_temporary
40-
use_aws_managed_encryption = true
36+
count = local.document_data_extraction_config != null ? 1 : 0
37+
source = "../../modules/storage"
38+
name = "${local.prefix}${local.document_data_extraction_config.input_bucket_name}"
39+
is_temporary = local.is_temporary
40+
service_principals_with_access = ["bedrock.amazonaws.com"]
4141
}
4242

4343
module "dde_output_bucket" {
4444
providers = {
4545
aws = aws.dde
4646
}
4747

48-
count = local.document_data_extraction_config != null ? 1 : 0
49-
source = "../../modules/storage"
50-
name = "${local.prefix}${local.document_data_extraction_config.output_bucket_name}"
51-
is_temporary = local.is_temporary
52-
use_aws_managed_encryption = true
48+
count = local.document_data_extraction_config != null ? 1 : 0
49+
source = "../../modules/storage"
50+
name = "${local.prefix}${local.document_data_extraction_config.output_bucket_name}"
51+
is_temporary = local.is_temporary
52+
service_principals_with_access = ["bedrock.amazonaws.com"]
5353
}
5454

5555
module "dde" {

infra/modules/storage/encryption.tf

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -50,8 +50,6 @@ data "aws_iam_policy_document" "kms_key_policy" {
5050
}
5151

5252
resource "aws_kms_key" "storage" {
53-
count = var.use_aws_managed_encryption ? 0 : 1
54-
5553
description = "KMS key for bucket ${var.name}"
5654
# The waiting period, specified in number of days. After the waiting period ends, AWS KMS deletes the KMS key.
5755
deletion_window_in_days = "10"
@@ -65,9 +63,9 @@ resource "aws_s3_bucket_server_side_encryption_configuration" "storage" {
6563
bucket = aws_s3_bucket.storage.id
6664
rule {
6765
apply_server_side_encryption_by_default {
68-
kms_master_key_id = var.use_aws_managed_encryption ? null : aws_kms_key.storage[0].arn
69-
sse_algorithm = var.use_aws_managed_encryption ? "AES256" : "aws:kms"
66+
kms_master_key_id = aws_kms_key.storage.arn
67+
sse_algorithm = "aws:kms"
7068
}
71-
bucket_key_enabled = var.use_aws_managed_encryption ? null : true
69+
bucket_key_enabled = true
7270
}
7371
}

infra/modules/storage/main.tf

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,5 +9,4 @@ resource "aws_s3_bucket" "storage" {
99
# checkov:skip=CKV_AWS_144:Cross region replication not required by default
1010
# checkov:skip=CKV2_AWS_62:S3 bucket does not need notifications enabled
1111
# checkov:skip=CKV_AWS_21:Bucket versioning is not needed
12-
# checkov:skip=CKV_AWS_145:AWS-managed encryption (AES256) used when use_aws_managed_encryption=true
1312
}

0 commit comments

Comments
 (0)