11# IAM Role for EventBridge Pipe
22resource "aws_iam_role" "mns_outbound_events_eb_pipe" {
3- name = " ${ local . resource_scope } -mns-outbound -eventbridge-pipe-role"
3+ name = " ${ var . mns_publisher_resource_name_prefix } -eventbridge-pipe-role"
44 assume_role_policy = jsonencode ({
55 Version = " 2012-10-17"
66 Statement = [
@@ -33,15 +33,15 @@ resource "aws_iam_role_policy" "mns_outbound_events_eb_pipe_source_policy" {
3333 " dynamodb:GetShardIterator" ,
3434 " dynamodb:ListStreams"
3535 ],
36- " Resource" : aws_dynamodb_table.delta - dynamodb - table.stream_arn
36+ " Resource" : var.ddb_delta_stream_arn
3737 },
3838 {
3939 " Effect" : " Allow" ,
4040 " Action" : [
4141 " kms:Decrypt" ,
4242 " kms:GenerateDataKey"
4343 ],
44- " Resource" : data.aws_kms_key.existing_dynamo_encryption_key.arn
44+ " Resource" : var.dynamo_kms_encryption_key_arn
4545 },
4646 ]
4747 })
@@ -79,15 +79,15 @@ resource "aws_iam_role_policy" "mns_outbound_events_eb_pipe_cw_log_policy" {
7979 " logs:PutLogEvents"
8080 ],
8181 Resource = [
82- " arn:aws:logs:${ var . aws_region } :${ var . immunisation_account_id } :log-group:/aws/vendedlogs/pipes/${ local . resource_scope } -mns-outbound-event -pipe-logs:*" ,
82+ " arn:aws:logs:${ var . aws_region } :${ var . immunisation_account_id } :log-group:/aws/vendedlogs/pipes/${ var . mns_publisher_resource_name_prefix } -pipe-logs:*" ,
8383 ]
8484 },
8585 ]
8686 })
8787}
8888
8989resource "aws_cloudwatch_log_group" "mns_outbound_events_eb_pipe" {
90- name = " /aws/vendedlogs/pipes/${ local . resource_scope } -mns-outbound-event -pipe-logs"
90+ name = " /aws/vendedlogs/pipes/${ var . mns_publisher_resource_name_prefix } -pipe-logs"
9191 retention_in_days = 30
9292}
9393
@@ -97,9 +97,9 @@ resource "aws_pipes_pipe" "mns_outbound_events" {
9797 aws_iam_role_policy . mns_outbound_events_eb_pipe_target_policy ,
9898 aws_iam_role_policy . mns_outbound_events_eb_pipe_cw_log_policy ,
9999 ]
100- name = " ${ local . resource_scope } -mns-outbound-events "
100+ name = " ${ var . mns_publisher_resource_name_prefix } -pipe "
101101 role_arn = aws_iam_role. mns_outbound_events_eb_pipe . arn
102- source = aws_dynamodb_table . delta-dynamodb-table . stream_arn
102+ source = var . ddb_delta_stream_arn
103103 target = aws_sqs_queue. mns_outbound_events . arn
104104
105105 source_parameters {
@@ -112,7 +112,7 @@ resource "aws_pipes_pipe" "mns_outbound_events" {
112112 include_execution_data = [" ALL" ]
113113 level = " ERROR"
114114 cloudwatch_logs_log_destination {
115- log_group_arn = aws_cloudwatch_log_group. pipe_log_group . arn
115+ log_group_arn = aws_cloudwatch_log_group. mns_outbound_events_eb_pipe . arn
116116 }
117117 }
118118}
0 commit comments