Skip to content

Commit 1d61d24

Browse files
nandajavarmaroboquat
authored andcommitted
[terraform] Give AWSS3FullAccess to s3 IAM users
1 parent 57fdeaa commit 1d61d24

File tree

1 file changed

+3
-61
lines changed

1 file changed

+3
-61
lines changed

install/infra/modules/eks/storage.tf

Lines changed: 3 additions & 61 deletions
Original file line numberDiff line numberDiff line change
@@ -21,45 +21,16 @@ resource "aws_s3_bucket_versioning" "storage" {
2121
}
2222
}
2323

24-
data "aws_iam_policy_document" "s3_policy" {
25-
count = var.create_external_storage ? 1 : 0
26-
statement {
27-
actions = [
28-
"s3:PutObject",
29-
"s3:ListMultipartUploadParts",
30-
"s3:GetObject",
31-
"s3:DeleteObject",
32-
"s3:AbortMultipartUpload"
33-
]
34-
resources = ["${aws_s3_bucket.gitpod-storage[count.index].arn}/*"]
35-
effect = "Allow"
36-
}
37-
statement {
38-
actions = ["s3:ListBucket",
39-
"s3:GetBucketLocation",
40-
"s3:ListBucketMultipartUploads"]
41-
resources = [aws_s3_bucket.gitpod-storage[count.index].arn]
42-
effect = "Allow"
43-
}
44-
}
45-
46-
resource "aws_iam_policy" "policy" {
47-
count = var.create_external_storage ? 1 : 0
48-
name = "policy-${var.cluster_name}"
49-
description = "Gitpod ${var.cluster_name} object storage bucket policy"
50-
policy = data.aws_iam_policy_document.s3_policy[0].json
51-
}
52-
5324
resource "aws_iam_user" "bucket_storage" {
5425
count = var.create_external_storage ? 1 : 0
5526
name = "user-${var.cluster_name}"
5627

5728
}
5829

59-
resource "aws_iam_user_policy_attachment" "attachment" {
30+
resource "aws_iam_user_policy_attachment" "full_access_attachment" {
6031
count = var.create_external_storage ? 1 : 0
6132
user = aws_iam_user.bucket_storage[0].name
62-
policy_arn = aws_iam_policy.policy[0].arn
33+
policy_arn = "arn:aws:iam::aws:policy/AmazonS3FullAccess"
6334
}
6435

6536
resource "aws_iam_access_key" "bucket_storage_user" {
@@ -92,35 +63,6 @@ resource "aws_s3_bucket_versioning" "registry" {
9263
}
9364
}
9465

95-
data "aws_iam_policy_document" "s3_policy_registry" {
96-
count = var.create_external_storage_for_registry_backend ? 1 : 0
97-
statement {
98-
actions = [
99-
"s3:PutObject",
100-
"s3:ListMultipartUploadParts",
101-
"s3:GetObject",
102-
"s3:DeleteObject",
103-
"s3:AbortMultipartUpload"
104-
]
105-
resources = ["${aws_s3_bucket.gitpod-registry-backend[count.index].arn}/*"]
106-
effect = "Allow"
107-
}
108-
statement {
109-
actions = ["s3:ListBucket",
110-
"s3:GetBucketLocation",
111-
"s3:ListBucketMultipartUploads"]
112-
resources = [aws_s3_bucket.gitpod-registry-backend[count.index].arn]
113-
effect = "Allow"
114-
}
115-
}
116-
117-
resource "aws_iam_policy" "policy_registry" {
118-
count = var.create_external_storage_for_registry_backend ? 1 : 0
119-
name = "registry-policy-${var.cluster_name}"
120-
description = "Gitpod ${var.cluster_name} registry backend storage bucket policy"
121-
policy = data.aws_iam_policy_document.s3_policy_registry[count.index].json
122-
}
123-
12466
resource "aws_iam_user" "bucket_registry" {
12567
count = var.create_external_storage_for_registry_backend ? 1 : 0
12668
name = "registry-user-${var.cluster_name}"
@@ -130,7 +72,7 @@ resource "aws_iam_user" "bucket_registry" {
13072
resource "aws_iam_user_policy_attachment" "registry_attachment" {
13173
count = var.create_external_storage_for_registry_backend ? 1 : 0
13274
user = aws_iam_user.bucket_registry[count.index].name
133-
policy_arn = aws_iam_policy.policy_registry[count.index].arn
75+
policy_arn = "arn:aws:iam::aws:policy/AmazonS3FullAccess"
13476
}
13577

13678
resource "aws_iam_access_key" "bucket_registry_user" {

0 commit comments

Comments
 (0)