@@ -95,9 +95,7 @@ Resources:
95
95
- !Ref SecretsManagerPolicyRelease
96
96
- !Ref ParameterStorePolicy
97
97
- !Ref S3ECReleaseTestKMSKeyPolicy
98
- - !Ref S3ECReleaseTestKMSKeyPolicyTestVectors
99
98
- !Ref S3ECReleaseS3BucketPolicy
100
- - !Ref S3ECReleaseS3BucketPolicyTestVectors
101
99
- " arn:aws:iam::aws:policy/AWSCodeArtifactReadOnlyAccess"
102
100
- " arn:aws:iam::aws:policy/AWSCodeArtifactAdminAccess"
103
101
@@ -297,29 +295,6 @@ Resources:
297
295
AliasName : alias/S3EC-Release-Testing-KMS-Key
298
296
TargetKeyId : !Ref S3ECReleaseTestingKMSKeyID
299
297
300
- S3ECReleaseKMSKeyPolicyTestVectors :
301
- Type : ' AWS::IAM::ManagedPolicy'
302
- Properties :
303
- PolicyDocument : !Sub |
304
- {
305
- "Version": "2012-10-17",
306
- "Statement": [
307
- {
308
- "Effect": "Allow",
309
- "Resource": [
310
- "arn:aws:kms:*:${AWS::AccountId}:key/${S3ECReleaseKMSKeyIDTestVectors}",
311
- "arn:aws:kms:*:${AWS::AccountId}:${S3ECReleaseKMSKeyAliasTestVectors}"
312
- ],
313
- "Action": [
314
- "kms:Decrypt",
315
- "kms:GenerateDataKey",
316
- "kms:GenerateDataKeyPair"
317
- ]
318
- }
319
- ]
320
- }
321
- ManagedPolicyName : S3EC-Release-KMS-Key-Policy-TestVectors
322
-
323
298
S3ECReleaseTestS3BucketTestVectors :
324
299
Type : ' AWS::S3::Bucket'
325
300
Properties :
@@ -330,26 +305,6 @@ Resources:
330
305
IgnorePublicAcls : false
331
306
RestrictPublicBuckets : false
332
307
333
- S3ECReleaseS3BucketPolicyTestVectors :
334
- Type : ' AWS::IAM::ManagedPolicy'
335
- Properties :
336
- ManagedPolicyName : S3EC-Release-S3-Bucket-Policy-testvectors
337
- PolicyDocument :
338
- Version : 2012-10-17
339
- Statement :
340
- - Effect : Allow
341
- Action :
342
- - ' s3:ListBucket'
343
- Resource :
344
- - !GetAtt S3ECReleaseTestS3BucketTestVectors.Arn
345
- - Effect : Allow
346
- Action :
347
- - ' s3:PutObject'
348
- - ' s3:GetObject'
349
- - ' s3:DeleteObject'
350
- Resource :
351
- - !Join [ "", [ !GetAtt S3ECReleaseTestS3BucketTestVectors.Arn, '/*'] ]
352
-
353
308
S3ECReleaseTestS3Bucket :
354
309
Type : ' AWS::S3::Bucket'
355
310
Properties :
@@ -379,6 +334,12 @@ Resources:
379
334
- ' s3:DeleteObject'
380
335
Resource :
381
336
- !Join [ "", [ !GetAtt S3ECReleaseTestS3Bucket.Arn, '/*' ] ]
337
+ - !Join [ "", [ !GetAtt S3ECReleaseTestS3BucketTestVectors.Arn, '/*'] ]
338
+ - Effect : Allow
339
+ Action :
340
+ - ' s3:ListBucket'
341
+ Resource :
342
+ - !GetAtt S3ECReleaseTestS3BucketTestVectors.Arn
382
343
383
344
S3ECReleaseTestS3BucketAlternate :
384
345
Type : ' AWS::S3::Bucket'
@@ -433,6 +394,14 @@ Resources:
433
394
- Effect : Allow
434
395
Action : sts:AssumeRole
435
396
Resource : !Sub "arn:aws:iam::${AWS::AccountId}:role/service-role/S3EC-Release-test-role-alternate"
397
+ - Effect : Allow
398
+ Action :
399
+ - " kms:Decrypt"
400
+ - " kms:GenerateDataKey"
401
+ - " kms:GenerateDataKeyPair"
402
+ Resource :
403
+ - !Sub " arn:aws:kms:*:${AWS::AccountId}:key/${S3ECReleaseKMSKeyIDTestVectors}"
404
+ - !Sub " arn:aws:kms:*:${AWS::AccountId}:${S3ECReleaseKMSKeyAliasTestVectors}"
436
405
437
406
S3ECReleaseKMSKeyPolicyAlternate :
438
407
Type : ' AWS::IAM::ManagedPolicy'
0 commit comments