We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent eee52b8 commit abaee26Copy full SHA for abaee26
1 file changed
infrastructure/stacks/api-layer/iam_policies.tf
@@ -175,7 +175,7 @@ data "aws_iam_policy_document" "s3_rules_kms_key_policy" {
175
effect = "Allow"
176
principals {
177
type = "AWS"
178
- identifiers = [aws_iam_role.eligibility_lambda_role.arn, aws_iam_role.eligibility_audit_firehose_role.arn]
+ identifiers = [aws_iam_role.eligibility_lambda_role.arn]
179
}
180
actions = ["kms:Decrypt"]
181
resources = ["*"]
@@ -208,7 +208,7 @@ data "aws_iam_policy_document" "s3_audit_kms_key_policy" {
208
209
210
211
- identifiers = [aws_iam_role.eligibility_lambda_role.arn]
+ identifiers = [aws_iam_role.eligibility_lambda_role.arn, aws_iam_role.eligibility_audit_firehose_role.arn]
212
213
actions = [
214
"kms:Decrypt",
0 commit comments