From f43ba6d517b9ba4b99285ccf0e042d9d29ee800e Mon Sep 17 00:00:00 2001 From: Lei Jin <166442440+leijin-lw@users.noreply.github.com> Date: Thu, 19 Dec 2024 13:00:36 -0800 Subject: [PATCH] fix(GROW-3004): Fix the sid issue (#166) Signed-off-by: Lei Jin --- main.tf | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/main.tf b/main.tf index d72aee3..bd1f8c5 100644 --- a/main.tf +++ b/main.tf @@ -273,7 +273,7 @@ data "aws_iam_policy_document" "kms_key_policy" { version = "2012-10-17" statement { - sid = "Enable IAM User Permissions" + sid = "EnableIAMUserPermissions" effect = "Allow" principals { @@ -288,7 +288,7 @@ data "aws_iam_policy_document" "kms_key_policy" { dynamic "statement" { for_each = (!var.use_existing_cloudtrail && length(var.bucket_sse_key_arn) == 0) || var.sns_topic_encryption_enabled ? [1] : [] content { - sid = "Allow CloudTrail service to encrypt/decrypt" + sid = "AllowCloudTrailServiceToEncryptDecrypt" effect = "Allow" principals { @@ -304,7 +304,7 @@ data "aws_iam_policy_document" "kms_key_policy" { dynamic "statement" { for_each = var.use_s3_bucket_notification ? [1] : [] content { - sid = "Allow S3 bucket to encrypt/decrypt" + sid = "AllowS3BucketToEncryptDecrypt" effect = "Allow" principals { @@ -328,7 +328,7 @@ data "aws_iam_policy_document" "kms_key_policy" { dynamic "statement" { for_each = (!var.use_existing_cloudtrail && length(var.bucket_sse_key_arn) == 0) ? [1] : [] content { - sid = "Allow CloudTrail to describe key" + sid = "AllowCloudTrailToDescribeKey" effect = "Allow" principals { @@ -344,7 +344,7 @@ data "aws_iam_policy_document" "kms_key_policy" { dynamic "statement" { for_each = (var.sns_topic_encryption_enabled && length(var.sns_topic_encryption_key_arn) == 0) ? [1] : [] content { - sid = "Allow SNS service to encrypt/decrypt" + sid = "AllowSNSServiceToEncryptDecrypt" effect = "Allow" principals { @@ -358,7 +358,7 @@ data "aws_iam_policy_document" "kms_key_policy" { } statement { - sid = "Allow principals in the account to decrypt log files" + sid = "AllowPrincipalsInTheAccountToDecryptLogFiles" effect = "Allow" principals {