Skip to content

Commit ace1cbc

Browse files
committed
CCM-9868: Adding subfilter to lambda module
1 parent 3139938 commit ace1cbc

24 files changed

+61
-59
lines changed

infrastructure/terraform/components/app/module_backend_api.tf

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,10 +18,10 @@ module "backend_api" {
1818

1919
enable_backup = var.destination_vault_arn != null ? true : false
2020

21-
enable_letters = var.enable_letters
22-
enable_proofing = var.enable_proofing
23-
letter_suppliers = var.letter_suppliers
24-
destination_arn = "arn:aws:logs:${var.region}:${var.observability_account_id}:destination:nhs-notify-main-acct-firehose-logs"
25-
subscription_role_arn = local.acct.log_subscription_role_arn
21+
enable_letters = var.enable_letters
22+
enable_proofing = var.enable_proofing
23+
letter_suppliers = var.letter_suppliers
24+
cloudwatch_log_destination_arn = "arn:aws:logs:${var.region}:${var.observability_account_id}:destination:nhs-notify-main-acct-firehose-logs"
25+
log_subscription_role_arn = local.acct.log_subscription_role_arn
2626

2727
}

infrastructure/terraform/modules/backend-api/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,10 +10,10 @@ No requirements.
1010
| Name | Description | Type | Default | Required |
1111
|------|-------------|------|---------|:--------:|
1212
| <a name="input_aws_account_id"></a> [aws\_account\_id](#input\_aws\_account\_id) | The AWS Account ID (numeric) | `string` | n/a | yes |
13+
| <a name="input_cloudwatch_log_destination_arn"></a> [cloudwatch\_log\_destination\_arn](#input\_cloudwatch\_log\_destination\_arn) | Destination ARN to use for the log subscription filter | `string` | `""` | no |
1314
| <a name="input_cognito_config"></a> [cognito\_config](#input\_cognito\_config) | Cognito config | <pre>object({<br/> USER_POOL_ID : string,<br/> USER_POOL_CLIENT_ID : string<br/> })</pre> | n/a | yes |
1415
| <a name="input_component"></a> [component](#input\_component) | The variable encapsulating the name of this component | `string` | n/a | yes |
1516
| <a name="input_csi"></a> [csi](#input\_csi) | CSI from the parent component | `string` | n/a | yes |
16-
| <a name="input_destination_arn"></a> [destination\_arn](#input\_destination\_arn) | The Observability Destination ARN | `string` | n/a | yes |
1717
| <a name="input_dynamodb_kms_key_arn"></a> [dynamodb\_kms\_key\_arn](#input\_dynamodb\_kms\_key\_arn) | KMS Key ARN for encrypting DynamoDB data. If not given, a key will be created. | `string` | `""` | no |
1818
| <a name="input_enable_backup"></a> [enable\_backup](#input\_enable\_backup) | Enable Backups for the DynamoDB table? | `bool` | `true` | no |
1919
| <a name="input_enable_letters"></a> [enable\_letters](#input\_enable\_letters) | Enable letters feature flag | `bool` | n/a | yes |
@@ -23,11 +23,11 @@ No requirements.
2323
| <a name="input_kms_key_arn"></a> [kms\_key\_arn](#input\_kms\_key\_arn) | KMS Key ARN | `string` | n/a | yes |
2424
| <a name="input_letter_suppliers"></a> [letter\_suppliers](#input\_letter\_suppliers) | Letter suppliers enabled in the environment | <pre>map(object({<br/> enable_polling = bool<br/> default_supplier = optional(bool)<br/> }))</pre> | n/a | yes |
2525
| <a name="input_log_retention_in_days"></a> [log\_retention\_in\_days](#input\_log\_retention\_in\_days) | The retention period in days for the Cloudwatch Logs events to be retained, default of 0 is indefinite | `number` | `0` | no |
26+
| <a name="input_log_subscription_role_arn"></a> [log\_subscription\_role\_arn](#input\_log\_subscription\_role\_arn) | The ARN of the IAM role to use for the log subscription filter | `string` | `""` | no |
2627
| <a name="input_module"></a> [module](#input\_module) | The variable encapsulating the name of this module | `string` | `"api"` | no |
2728
| <a name="input_parent_acct_environment"></a> [parent\_acct\_environment](#input\_parent\_acct\_environment) | Name of the environment responsible for the acct resources used | `string` | n/a | yes |
2829
| <a name="input_project"></a> [project](#input\_project) | The name of the tfscaffold project | `string` | n/a | yes |
2930
| <a name="input_region"></a> [region](#input\_region) | The AWS Region | `string` | n/a | yes |
30-
| <a name="input_subscription_role_arn"></a> [subscription\_role\_arn](#input\_subscription\_role\_arn) | The cloudwatch subscription role ARN | `string` | n/a | yes |
3131
## Modules
3232

3333
| Name | Source | Version |

infrastructure/terraform/modules/backend-api/cloudwatch_log_group_api_gateway_access.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,6 @@ resource "aws_cloudwatch_log_subscription_filter" "api_gateway_access" {
77
name = replace(aws_cloudwatch_log_group.api_gateway_access.name, "/", "-")
88
log_group_name = aws_cloudwatch_log_group.api_gateway_access.name
99
filter_pattern = ""
10-
destination_arn = var.destination_arn
11-
role_arn = var.subscription_role_arn
10+
destination_arn = var.cloudwatch_log_destination_arn
11+
role_arn = var.log_subscription_role_arn
1212
}

infrastructure/terraform/modules/backend-api/cloudwatch_log_group_api_gateway_execution.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,6 @@ resource "aws_cloudwatch_log_subscription_filter" "api_gateway_execution" {
1010
name = replace(aws_cloudwatch_log_group.api_gateway_execution.name, "/", "-")
1111
log_group_name = aws_cloudwatch_log_group.api_gateway_execution.name
1212
filter_pattern = ""
13-
destination_arn = var.destination_arn
14-
role_arn = var.subscription_role_arn
13+
destination_arn = var.cloudwatch_log_destination_arn
14+
role_arn = var.log_subscription_role_arn
1515
}

infrastructure/terraform/modules/backend-api/module_authorizer_lambda.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,8 @@ module "authorizer_lambda" {
1919
USER_POOL_ID = var.cognito_config["USER_POOL_ID"],
2020
USER_POOL_CLIENT_ID = var.cognito_config["USER_POOL_CLIENT_ID"],
2121
}
22-
destination_arn = var.destination_arn
23-
subscription_role_arn = var.subscription_role_arn
22+
cloudwatch_log_destination_arn = var.cloudwatch_log_destination_arn
23+
log_subscription_role_arn = var.log_subscription_role_arn
2424
}
2525

2626
module "authorizer_build" {

infrastructure/terraform/modules/backend-api/module_create_letter_template_lambda.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,8 +16,8 @@ module "create_letter_template_lambda" {
1616
environment_variables = local.backend_lambda_environment_variables
1717

1818
execution_role_policy_document = data.aws_iam_policy_document.create_letter_template_lambda_policy.json
19-
destination_arn = var.destination_arn
20-
subscription_role_arn = var.subscription_role_arn
19+
cloudwatch_log_destination_arn = var.cloudwatch_log_destination_arn
20+
log_subscription_role_arn = var.log_subscription_role_arn
2121
}
2222

2323
data "aws_iam_policy_document" "create_letter_template_lambda_policy" {

infrastructure/terraform/modules/backend-api/module_create_template_lambda.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,8 @@ module "create_template_lambda" {
1515
environment_variables = local.backend_lambda_environment_variables
1616

1717
execution_role_policy_document = data.aws_iam_policy_document.create_template_lambda_policy.json
18-
destination_arn = var.destination_arn
19-
subscription_role_arn = var.subscription_role_arn
18+
cloudwatch_log_destination_arn = var.cloudwatch_log_destination_arn
19+
log_subscription_role_arn = var.log_subscription_role_arn
2020
}
2121

2222
data "aws_iam_policy_document" "create_template_lambda_policy" {

infrastructure/terraform/modules/backend-api/module_delete_template_lambda.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,8 @@ module "delete_template_lambda" {
1515
environment_variables = local.backend_lambda_environment_variables
1616

1717
execution_role_policy_document = data.aws_iam_policy_document.delete_template_lambda_policy.json
18-
destination_arn = var.destination_arn
19-
subscription_role_arn = var.subscription_role_arn
18+
cloudwatch_log_destination_arn = var.cloudwatch_log_destination_arn
19+
log_subscription_role_arn = var.log_subscription_role_arn
2020
}
2121

2222
data "aws_iam_policy_document" "delete_template_lambda_policy" {

infrastructure/terraform/modules/backend-api/module_get_template_lambda.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,8 @@ module "get_template_lambda" {
1515
environment_variables = local.backend_lambda_environment_variables
1616

1717
execution_role_policy_document = data.aws_iam_policy_document.get_template_lambda_policy.json
18-
destination_arn = var.destination_arn
19-
subscription_role_arn = var.subscription_role_arn
18+
cloudwatch_log_destination_arn = var.cloudwatch_log_destination_arn
19+
log_subscription_role_arn = var.log_subscription_role_arn
2020
}
2121

2222
data "aws_iam_policy_document" "get_template_lambda_policy" {

infrastructure/terraform/modules/backend-api/module_lambda_copy_scanned_object_to_internal.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,9 @@ module "lambda_copy_scanned_object_to_internal" {
1010
log_retention_in_days = var.log_retention_in_days
1111
source_code_hash = module.build_template_lambda.zips[local.backend_lambda_entrypoints.copy_scanned_object_to_internal].base64sha256
1212

13-
environment_variables = local.backend_lambda_environment_variables
14-
destination_arn = var.destination_arn
15-
subscription_role_arn = var.subscription_role_arn
13+
environment_variables = local.backend_lambda_environment_variables
14+
cloudwatch_log_destination_arn = var.cloudwatch_log_destination_arn
15+
log_subscription_role_arn = var.log_subscription_role_arn
1616
}
1717

1818
data "aws_iam_policy_document" "copy_scanned_object_to_internal" {

0 commit comments

Comments
 (0)