Skip to content

Commit 73e68e5

Browse files
committed
[ELI-619] - adding depends and extending boundry
1 parent 1458214 commit 73e68e5

4 files changed

Lines changed: 12 additions & 2 deletions

File tree

infrastructure/stacks/api-layer/assumed_role_permissions_boundary.tf

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,7 @@ data "aws_iam_policy_document" "assumed_role_permissions_boundary" {
5353
# Kinesis Firehose - Lambda writing audit data
5454
"firehose:PutRecord",
5555
"firehose:PutRecordBatch",
56+
"kinesis:*",
5657

5758
# X-Ray - Lambda tracing
5859
"xray:PutTraceSegments",

infrastructure/stacks/api-layer/iam_policies.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -224,15 +224,15 @@ resource "aws_iam_role_policy" "kinesis_firehose_logs_policy" {
224224
"logs:CreateLogStream",
225225
"logs:PutLogEvents"
226226
],
227-
Resource = "arn:aws:logs:${var.default_aws_region}:${data.aws_caller_identity.current.account_id}:log-group:/aws/kinesisfirehose/${module.eligibility_audit_firehose_delivery_stream.firehose_stream_name}:log-stream:*"
227+
Resource = "arn:aws:logs:${var.default_aws_region}:${data.aws_caller_identity.current.account_id}:log-group:/aws/kinesisfirehose/${local.firehose_stream_name}:log-stream:*"
228228
},
229229
{
230230
Effect = "Allow",
231231
Action = [
232232
"logs:DescribeLogGroups",
233233
"logs:DescribeLogStreams"
234234
],
235-
Resource = "arn:aws:logs:${var.default_aws_region}:${data.aws_caller_identity.current.account_id}:log-group:/aws/kinesisfirehose/${module.eligibility_audit_firehose_delivery_stream.firehose_stream_name}"
235+
Resource = "arn:aws:logs:${var.default_aws_region}:${data.aws_caller_identity.current.account_id}:log-group:/aws/kinesisfirehose/${local.firehose_stream_name}"
236236
}
237237
]
238238
})

infrastructure/stacks/api-layer/kinesis_firehose.tf

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,4 +11,11 @@ module "eligibility_audit_firehose_delivery_stream" {
1111
firehose_cloud_watch_log_stream = aws_cloudwatch_log_stream.firehose_audit_stream.name
1212
eligibility_lambda_role_arn = aws_iam_role.eligibility_lambda_role.arn
1313
kinesis_source_stream_arn = aws_kinesis_stream.kinesis_source_stream.arn
14+
15+
depends_on = [
16+
aws_iam_role_policy.kinesis_firehose_read_policy,
17+
aws_iam_role_policy.firehose_kinesis_source_kms_policy,
18+
aws_iam_role_policy.kinesis_firehose_s3_write_policy,
19+
aws_iam_role_policy.kinesis_firehose_logs_policy,
20+
]
1421
}

infrastructure/stacks/api-layer/locals.tf

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,8 @@ locals {
1010
data.aws_ssm_parameter.mtls_api_ca_cert.value
1111
])
1212

13+
firehose_stream_name = "${terraform.workspace == "default" ? "" : "${terraform.workspace}-"}${var.project_name}-${var.environment}-audit_stream_to_s3"
14+
1315
# Toggle for deploying WAF resources in the current environment
1416
# True when var.environment is contained in var.waf_enabled_environments
1517
waf_enabled = contains(var.waf_enabled_environments, var.environment)

0 commit comments

Comments
 (0)