@@ -188,7 +188,7 @@ Resources:
188
188
"arn:aws:secretsmanager:us-west-2:${AWS::AccountId}:secret:Maven-GPG-Keys-CI-xjAvTM",
189
189
"arn:aws:secretsmanager:us-west-2:${AWS::AccountId}:secret:Maven-GPG-Keys-CI-Credentials-eBrSNB",
190
190
"arn:aws:secretsmanager:us-west-2:${AWS::AccountId}:secret:Github/aws-crypto-tools-ci-bot-AGUB3U",
191
- "arn:aws:secretsmanager:us-west-2:${AWS::AccountId}:secret:Sonatype-Team-Account-0tWvZm ",
191
+ "arn:aws:secretsmanager:us-west-2:${AWS::AccountId}:secret:Sonatype-User-Token-zK61bM ",
192
192
"arn:aws:secretsmanager:us-west-2:${AWS::AccountId}:secret:Maven-GPG-Keys-Release-haLIjZ",
193
193
"arn:aws:secretsmanager:us-west-2:${AWS::AccountId}:secret:Maven-GPG-Keys-Release-Credentials-WgJanS"
194
194
],
@@ -214,7 +214,7 @@ Resources:
214
214
"arn:aws:kms:*:658956600833:alias/*"
215
215
],
216
216
"Action": [
217
- "kms:Encrypt",
217
+ "kms:Encrypt",
218
218
"kms:Decrypt",
219
219
"kms:GenerateDataKey"
220
220
]
@@ -308,25 +308,26 @@ Resources:
308
308
S3ECReleaseTestKMSKeyPolicy :
309
309
Type : ' AWS::IAM::ManagedPolicy'
310
310
Properties :
311
+ ManagedPolicyName : S3EC-Release-Test-KMS-Key-Policy
311
312
PolicyDocument :
312
313
Version : " 2012-10-17"
313
314
Statement :
314
315
- Effect : " Allow"
315
316
Resource :
316
- - Sub! "arn:aws:kms:*:${AWS::AccountId}:key/${S3ECReleaseTestingKMSKeyID}"
317
- - Sub! "arn:aws:kms:*:${AWS::AccountId}:${S3ECReleaseKMSKeyAlias}"
317
+ - !Sub " arn:aws:kms:*:${AWS::AccountId}:key/${S3ECReleaseTestingKMSKeyID}"
318
+ - !Sub " arn:aws:kms:*:${AWS::AccountId}:${S3ECReleaseKMSKeyAlias}"
318
319
Action :
319
320
- " kms:Encrypt"
320
321
- " kms:Decrypt"
321
322
- " kms:GenerateDataKey"
322
323
- " kms:GenerateDataKeyPair"
324
+ # This effect may need to be commented out for a new deployment.
325
+ # There is a relationship between the alternate role,
326
+ # and the Codebuild service role.
327
+ # By turning this into a 2-stage deployment, this simplifies things.
323
328
- Effect : Allow
324
329
Action : sts:AssumeRole
325
- Resource :
326
- Fn::GetAtt : [ S3ECReleaseTestRoleAlternate, Arn ]
327
-
328
-
329
- ManagedPolicyName : S3EC-Release-Test-KMS-Key-Policy
330
+ Resource : !Sub "arn:aws:iam::${AWS::AccountId}:role/service-role/S3EC-Release-test-role-alternate"
330
331
331
332
S3ECReleaseKMSKeyPolicyAlternate :
332
333
Type : ' AWS::IAM::ManagedPolicy'
@@ -360,7 +361,7 @@ Resources:
360
361
Statement :
361
362
- Effect : " Allow"
362
363
Principal :
363
- Service : codebuild.amazonaws.com
364
+ AWS : !GetAtt CodeBuildServiceRoleRelease.Arn
364
365
Action :
365
366
- " sts:AssumeRole"
366
367
Description : >-
0 commit comments