Skip to content

Commit 7fb7ea1

Browse files
committed
[ELI-619] - addressing comments
1 parent dc1d560 commit 7fb7ea1

5 files changed

Lines changed: 21 additions & 34 deletions

File tree

infrastructure/modules/kinesis_firehose/kinesis_firehose_delivery_stream.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ resource "aws_kinesis_firehose_delivery_stream" "eligibility_audit_firehose_deli
2323
log_stream_name = var.firehose_cloud_watch_log_stream
2424
}
2525
}
26-
26+
# Removed server_side_encryption_configuration as it is not supported for kinesis as source
2727
depends_on = [
2828
aws_kms_key.firehose_cmk,
2929
var.kinesis_source_stream_arn,

infrastructure/modules/lambda/lambda.tf

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -20,12 +20,12 @@ resource "aws_lambda_function" "eligibility_signposting_lambda" {
2020
PERSON_TABLE_NAME = var.eligibility_status_table_name,
2121
RULES_BUCKET_NAME = var.eligibility_rules_bucket_name,
2222
CONSUMER_MAPPING_BUCKET_NAME = var.eligibility_consumer_mappings_bucket_name,
23-
KINESIS_AUDIT_STREAM = var.kinesis_audit_stream_name
24-
ENV = var.environment
25-
LOG_LEVEL = var.log_level
26-
ENABLE_XRAY_PATCHING = var.enable_xray_patching
27-
API_DOMAIN_NAME = var.api_domain_name
28-
HASHING_SECRET_NAME = var.hashing_secret_name
23+
KINESIS_AUDIT_STREAM = var.kinesis_audit_stream_name,
24+
ENV = var.environment,
25+
LOG_LEVEL = var.log_level,
26+
ENABLE_XRAY_PATCHING = var.enable_xray_patching,
27+
API_DOMAIN_NAME = var.api_domain_name,
28+
HASHING_SECRET_NAME = var.hashing_secret_name,
2929
}
3030
}
3131

infrastructure/stacks/api-layer/kinesis_data_stream.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ data "aws_iam_policy_document" "kinesis_stream_kms_key_policy" {
7474
condition {
7575
test = "StringEquals"
7676
variable = "kms:ViaService"
77-
values = ["firehose.eu-west-2.amazonaws.com"]
77+
values = ["firehose.${var.default_aws_region}.amazonaws.com"]
7878
}
7979
}
8080
}
Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
module "eligibility_audit_firehose_delivery_stream" {
2-
source = "../../modules/kinesis_firehose"
3-
audit_firehose_delivery_stream_name = "audit_stream_to_s3"
4-
audit_firehose_role = aws_iam_role.eligibility_audit_firehose_role
5-
s3_audit_bucket_arn = module.s3_audit_bucket.storage_bucket_arn
6-
environment = local.environment
7-
stack_name = local.stack_name
8-
workspace = local.workspace
9-
tags = local.tags
10-
firehose_cloud_watch_log_group_name = aws_cloudwatch_log_group.firehose_audit.name
11-
firehose_cloud_watch_log_stream = aws_cloudwatch_log_stream.firehose_audit_stream.name
12-
eligibility_lambda_role_arn = aws_iam_role.eligibility_lambda_role.arn
13-
kinesis_source_stream_arn = aws_kinesis_stream.kinesis_source_stream.arn
2+
source = "../../modules/kinesis_firehose"
3+
audit_firehose_delivery_stream_name = "audit_stream_to_s3"
4+
audit_firehose_role = aws_iam_role.eligibility_audit_firehose_role
5+
s3_audit_bucket_arn = module.s3_audit_bucket.storage_bucket_arn
6+
environment = local.environment
7+
stack_name = local.stack_name
8+
workspace = local.workspace
9+
tags = local.tags
10+
firehose_cloud_watch_log_group_name = aws_cloudwatch_log_group.firehose_audit.name
11+
firehose_cloud_watch_log_stream = aws_cloudwatch_log_stream.firehose_audit_stream.name
12+
eligibility_lambda_role_arn = aws_iam_role.eligibility_lambda_role.arn
13+
kinesis_source_stream_arn = aws_kinesis_stream.kinesis_source_stream.arn
1414
}

infrastructure/stacks/iams-developer-roles/iams_permissions_boundary.tf

Lines changed: 1 addition & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -87,20 +87,7 @@ data "aws_iam_policy_document" "permissions_boundary" {
8787
"firehose:StopDeliveryStreamEncryption",
8888

8989
# Kinesis Stream - audit log streaming
90-
"kinesis:CreateStream",
91-
"kinesis:DeleteStream",
92-
"kinesis:DescribeStream",
93-
"kinesis:ListStreams",
94-
"kinesis:PutRecord",
95-
"kinesis:PutRecords",
96-
"kinesis:TagStream",
97-
"kinesis:ListTagsForStream",
98-
"kinesis:UntagStream",
99-
"kinesis:GetShardIterator",
100-
"kinesis:GetRecords",
101-
"kinesis:ListShards",
102-
"kinesis:SubscribeToShard",
103-
"kinesis:DescribeStreamSummary",
90+
"kinesis:*",
10491

10592
# IAM - specific role and policy management
10693
"iam:GetRole*",

0 commit comments

Comments
 (0)