Skip to content

Commit bb47fcd

Browse files
kinesis permission for github actions (#209)
* updated manual-terraform apply * added kinesis roles to github actions * increased timeout minutes * dependency for kinesis firehose * s3 cmk key depends on bucket * redundant variable removed
1 parent 54a8cb1 commit bb47fcd

File tree

7 files changed

+21
-7
lines changed

7 files changed

+21
-7
lines changed

.github/workflows/manual-terraform-apply.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,8 @@ jobs:
1717
id-token: write
1818
contents: read
1919

20+
timeout-minutes: 30
21+
2022
steps:
2123
- name: "Setup Terraform"
2224
uses: hashicorp/setup-terraform@v3

infrastructure/modules/kinesis_firehose/kinesis_firehose_delivery_stream.tf

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ resource "aws_kinesis_firehose_delivery_stream" "eligibility_audit_firehose_deli
33
destination = "extended_s3"
44

55
extended_s3_configuration {
6-
role_arn = var.audit_firehose_role_arn
6+
role_arn = var.audit_firehose_role.arn
77
bucket_arn = var.s3_audit_bucket_arn
88

99
buffering_size = 1
@@ -25,5 +25,10 @@ resource "aws_kinesis_firehose_delivery_stream" "eligibility_audit_firehose_deli
2525
key_type = "CUSTOMER_MANAGED_CMK"
2626
}
2727

28+
depends_on = [
29+
aws_kms_key.firehose_cmk,
30+
var.audit_firehose_role
31+
]
32+
2833
tags = var.tags
2934
}

infrastructure/modules/kinesis_firehose/kms.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ data "aws_iam_policy_document" "firehose_kms_key_policy" {
6767
effect = "Allow"
6868
principals {
6969
type = "AWS"
70-
identifiers = [var.audit_firehose_role_arn]
70+
identifiers = [var.audit_firehose_role.arn]
7171
}
7272
actions = ["kms:*"]
7373
resources = [aws_kms_key.firehose_cmk.arn]

infrastructure/modules/kinesis_firehose/variables.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,9 @@ variable "audit_firehose_delivery_stream_name" {
33
type = string
44
}
55

6-
variable "audit_firehose_role_arn" {
7-
description = "audit firehose role arn"
8-
type = string
6+
variable "audit_firehose_role" {
7+
description = "audit firehose role"
8+
type = any
99
}
1010

1111
variable "s3_audit_bucket_arn" {

infrastructure/modules/s3/kms.tf

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,11 @@ resource "aws_kms_key" "storage_bucket_cmk" {
33
deletion_window_in_days = 14
44
is_enabled = true
55
enable_key_rotation = true
6+
7+
depends_on = [
8+
aws_s3_bucket.storage_bucket
9+
]
10+
611
}
712

813
resource "aws_kms_alias" "storage_bucket_cmk" {

infrastructure/stacks/api-layer/kinesis_firehose.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
module "eligibility_audit_firehose_delivery_stream" {
22
source = "../../modules/kinesis_firehose"
33
audit_firehose_delivery_stream_name = "audit_stream_to_s3"
4-
audit_firehose_role_arn = aws_iam_role.eligibility_audit_firehose_role.arn
4+
audit_firehose_role = aws_iam_role.eligibility_audit_firehose_role
55
s3_audit_bucket_arn = module.s3_audit_bucket.storage_bucket_arn
66
environment = local.environment
77
stack_name = local.stack_name

infrastructure/stacks/iams-developer-roles/github_actions_policies.tf

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -456,7 +456,9 @@ resource "aws_iam_policy" "firehose_readonly" {
456456
"firehose:PutRecordBatch",
457457
"firehose:TagDeliveryStream",
458458
"firehose:ListTagsForDeliveryStream",
459-
"firehose:UntagDeliveryStream"
459+
"firehose:UntagDeliveryStream",
460+
"firehose:StartDeliveryStreamEncryption",
461+
"firehose:StopDeliveryStreamEncryption"
460462
]
461463
Resource = "arn:aws:firehose:${var.default_aws_region}:${data.aws_caller_identity.current.account_id}:deliverystream/eligibility-signposting-api*"
462464
}

0 commit comments

Comments
 (0)