@@ -98,7 +98,7 @@ CWS_EVENT_POLICY_ARN="$(aws iam list-policies --scope Local 2> /dev/null | jq -c
9898if [ -z $CWS_EVENT_POLICY_ARN ]; then
9999 # Generate CloudWatchEvent Policy file
100100 cat policies/CloudWatchEventsPolicyforCodePipeline.json \
101- | sed " s/CODEPIPELINE_ARN /$CODEPIPELINE_ARN /g" \
101+ | sed " s/CODEPIPELINE-ARN /$CODEPIPELINE_ARN /g" \
102102 > .config/$CWE_CONFIG_FILE
103103
104104 # create codedeploy cache policy
@@ -128,7 +128,7 @@ if [ 'CODECOMMIT' == $REPO_TYPE ]; then
128128
129129 # Generate a CloudWatchEventPattern template file
130130 cat stubs/codecommit_cloudwatch_event_pattern.json \
131- | sed " s/CODECOMMIT_REPO_ARN /$CODECOMMIT_REPO_ARN /g" \
131+ | sed " s/CODECOMMIT-REPO-ARN /$CODECOMMIT_REPO_ARN /g" \
132132 | sed " s/BRANCH/$BRANCH /g" \
133133 > .config/$CLOUDWATCH_EVENT_ROLE_NAME .json
134134
@@ -140,8 +140,8 @@ if [ 'CODECOMMIT' == $REPO_TYPE ]; then
140140
141141 # Generate target information file for cloudwatch event rule
142142 cat stubs/default_cloudwatch_events_rules.json \
143- | sed " s/CODEPIPELINE_ARN /$CODEPIPELINE_ARN /g" \
144- | sed " s/CWS_EVENT_ROLE_ARN /$CWS_EVENT_ROLE_ARN /g" \
143+ | sed " s/CODEPIPELINE-ARN /$CODEPIPELINE_ARN /g" \
144+ | sed " s/CWS-EVENT-ROLE-ARN /$CWS_EVENT_ROLE_ARN /g" \
145145 > .config/$CLOUDWATCH_EVENT_ROLE_TARGET .json
146146
147147 aws events put-targets --rule $CLOUDWATCH_EVENT_ROLE_NAME --targets file://.config/$CLOUDWATCH_EVENT_ROLE_TARGET .json
0 commit comments