-
Notifications
You must be signed in to change notification settings - Fork 31
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: create KMS key decryption policy for S3 #216
feat: create KMS key decryption policy for S3 #216
Conversation
c8ecdea
to
0c6907d
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hey @alexandermarston, looks good, just 2 small things:
- If you can add the variable to the README file
- In order to release a new version we require the PR title to start with feat: <title>, and the commit messages to also be in the formate of feat: . You can see more information about it here
Thanks for the feedback. I was wondering if it actually makes more sense to just always create the kms:decrypt policy for * resources when S3 is the backend, rather than a specific KMS key ARN. WDYT? |
We prefer to limit the amount of wild cards that we use in the module to avoid security issues, a lot of time we are requested to remove wild cards from the code, so unfortunately, I think that we should leave it as is right now |
Got ya. I've made the changes you've requested. |
@alexandermarston I have approved the PR, but I just noticed that not all of the Commits have verified signatures, so I can't merge the PR at the moment, if you could sign the unsigned commits please. |
88995d9
to
d70e46a
Compare
Sorry - forgot to resign all of the commit history. It should be sorted now. |
🎉 This PR is included in version 2.8.0 🎉 The release is available on GitHub release Your semantic-release bot 📦🚀 |
Description
s3_bucket_kms_arn
variable, to dynamically create the inline policy required for decrypting objects using a KMS Key.How Has This Been Tested?
Tested locally.
Omitting the variable results in no changes, including the variable results in a new addition to the policy statement.
Checklist: