@mapbox/cloudfriend 9.0.0 → 9.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (39) hide show
  1. package/.nyc_output/707126b3-2f53-4d41-a20a-01cd1efb76bf.json +1 -0
  2. package/.nyc_output/8b157b6a-c35a-4929-a883-aa76d210c92a.json +1 -0
  3. package/.nyc_output/processinfo/707126b3-2f53-4d41-a20a-01cd1efb76bf.json +1 -0
  4. package/.nyc_output/processinfo/8b157b6a-c35a-4929-a883-aa76d210c92a.json +1 -0
  5. package/.nyc_output/processinfo/index.json +1 -1
  6. package/changelog.md +7 -3
  7. package/lib/shortcuts/lambda.js +1 -1
  8. package/package.json +1 -1
  9. package/test/fixtures/shortcuts/event-lambda-custom-eventbus.json +1 -1
  10. package/test/fixtures/shortcuts/event-lambda-defaults.json +1 -1
  11. package/test/fixtures/shortcuts/event-lambda-full.json +1 -1
  12. package/test/fixtures/shortcuts/hookshot-github-compatible-legacy-node-runtimes.json +3 -3
  13. package/test/fixtures/shortcuts/hookshot-github-secret-ref.json +2 -2
  14. package/test/fixtures/shortcuts/hookshot-github-secret-string.json +2 -2
  15. package/test/fixtures/shortcuts/hookshot-github.json +2 -2
  16. package/test/fixtures/shortcuts/hookshot-passthrough-access-log-format.json +2 -2
  17. package/test/fixtures/shortcuts/hookshot-passthrough-alarms.json +2 -2
  18. package/test/fixtures/shortcuts/hookshot-passthrough-compatible-legacy-node-runtimes.json +3 -3
  19. package/test/fixtures/shortcuts/hookshot-passthrough-enhanced-logging.json +2 -2
  20. package/test/fixtures/shortcuts/hookshot-passthrough-full-blown-logging.json +2 -2
  21. package/test/fixtures/shortcuts/hookshot-passthrough-logging.json +2 -2
  22. package/test/fixtures/shortcuts/hookshot-passthrough.json +2 -2
  23. package/test/fixtures/shortcuts/lambda-defaults.json +1 -1
  24. package/test/fixtures/shortcuts/lambda-docker.json +1 -1
  25. package/test/fixtures/shortcuts/lambda-full.json +1 -1
  26. package/test/fixtures/shortcuts/lambda-provided-role.json +1 -1
  27. package/test/fixtures/shortcuts/lambda-zipfile.json +1 -1
  28. package/test/fixtures/shortcuts/log-subscription-lambda-defaults.json +1 -1
  29. package/test/fixtures/shortcuts/log-subscription-lambda-no-defaults.json +1 -1
  30. package/test/fixtures/shortcuts/queue-lambda-zero.json +1 -1
  31. package/test/fixtures/shortcuts/queue-lambda.json +1 -1
  32. package/test/fixtures/shortcuts/scheduled-lambda-defaults.json +1 -1
  33. package/test/fixtures/shortcuts/scheduled-lambda-full.json +1 -1
  34. package/test/fixtures/shortcuts/stream-lambda-defaults.json +1 -1
  35. package/test/fixtures/shortcuts/stream-lambda-no-defaults.json +1 -1
  36. package/.nyc_output/0030e99c-2d96-4ac6-a2b2-bffd93da01bc.json +0 -1
  37. package/.nyc_output/e1868cff-0dd0-46eb-866d-70c3b666dae8.json +0 -1
  38. package/.nyc_output/processinfo/0030e99c-2d96-4ac6-a2b2-bffd93da01bc.json +0 -1
  39. package/.nyc_output/processinfo/e1868cff-0dd0-46eb-866d-70c3b666dae8.json +0 -1
@@ -203,7 +203,7 @@ class Lambda {
203
203
  Condition,
204
204
  DependsOn: (RoleArn) ? undefined : `${LogicalName}Role`,
205
205
  Properties: {
206
- PolicyName: 'lambda-log-access',
206
+ PolicyName: `${LogicalName}-lambda-log-access`,
207
207
  Roles: [roleName],
208
208
  PolicyDocument: {
209
209
  Version: '2012-10-17',
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@mapbox/cloudfriend",
3
- "version": "9.0.0",
3
+ "version": "9.1.0",
4
4
  "description": "Helper functions for assembling CloudFormation templates in JavaScript",
5
5
  "main": "index.js",
6
6
  "engines": {
@@ -87,7 +87,7 @@
87
87
  "Type": "AWS::IAM::Policy",
88
88
  "DependsOn": "MyLambdaRole",
89
89
  "Properties": {
90
- "PolicyName": "lambda-log-access",
90
+ "PolicyName": "MyLambda-lambda-log-access",
91
91
  "Roles": [
92
92
  {
93
93
  "Ref": "MyLambdaRole"
@@ -87,7 +87,7 @@
87
87
  "Type": "AWS::IAM::Policy",
88
88
  "DependsOn": "MyLambdaRole",
89
89
  "Properties": {
90
- "PolicyName": "lambda-log-access",
90
+ "PolicyName": "MyLambda-lambda-log-access",
91
91
  "Roles": [
92
92
  {
93
93
  "Ref": "MyLambdaRole"
@@ -87,7 +87,7 @@
87
87
  "Type": "AWS::IAM::Policy",
88
88
  "DependsOn": "MyLambdaRole",
89
89
  "Properties": {
90
- "PolicyName": "lambda-log-access",
90
+ "PolicyName": "MyLambda-lambda-log-access",
91
91
  "Roles": [
92
92
  {
93
93
  "Ref": "MyLambdaRole"
@@ -175,7 +175,7 @@
175
175
  },
176
176
  "Handler": "index.lambda",
177
177
  "MemorySize": 128,
178
- "Runtime": "nodejs16.x",
178
+ "Runtime": "nodejs22.x",
179
179
  "Timeout": 30,
180
180
  "Role": {
181
181
  "Fn::GetAtt": [
@@ -225,7 +225,7 @@
225
225
  "Type": "AWS::IAM::Policy",
226
226
  "DependsOn": "PassFunctionRole",
227
227
  "Properties": {
228
- "PolicyName": "lambda-log-access",
228
+ "PolicyName": "PassFunction-lambda-log-access",
229
229
  "Roles": [
230
230
  {
231
231
  "Ref": "PassFunctionRole"
@@ -366,7 +366,7 @@
366
366
  "Type": "AWS::IAM::Policy",
367
367
  "DependsOn": "DestinationRole",
368
368
  "Properties": {
369
- "PolicyName": "lambda-log-access",
369
+ "PolicyName": "Destination-lambda-log-access",
370
370
  "Roles": [
371
371
  {
372
372
  "Ref": "DestinationRole"
@@ -231,7 +231,7 @@
231
231
  "Type": "AWS::IAM::Policy",
232
232
  "DependsOn": "PassFunctionRole",
233
233
  "Properties": {
234
- "PolicyName": "lambda-log-access",
234
+ "PolicyName": "PassFunction-lambda-log-access",
235
235
  "Roles": [
236
236
  {
237
237
  "Ref": "PassFunctionRole"
@@ -372,7 +372,7 @@
372
372
  "Type": "AWS::IAM::Policy",
373
373
  "DependsOn": "DestinationRole",
374
374
  "Properties": {
375
- "PolicyName": "lambda-log-access",
375
+ "PolicyName": "Destination-lambda-log-access",
376
376
  "Roles": [
377
377
  {
378
378
  "Ref": "DestinationRole"
@@ -225,7 +225,7 @@
225
225
  "Type": "AWS::IAM::Policy",
226
226
  "DependsOn": "PassFunctionRole",
227
227
  "Properties": {
228
- "PolicyName": "lambda-log-access",
228
+ "PolicyName": "PassFunction-lambda-log-access",
229
229
  "Roles": [
230
230
  {
231
231
  "Ref": "PassFunctionRole"
@@ -366,7 +366,7 @@
366
366
  "Type": "AWS::IAM::Policy",
367
367
  "DependsOn": "DestinationRole",
368
368
  "Properties": {
369
- "PolicyName": "lambda-log-access",
369
+ "PolicyName": "Destination-lambda-log-access",
370
370
  "Roles": [
371
371
  {
372
372
  "Ref": "DestinationRole"
@@ -233,7 +233,7 @@
233
233
  "Type": "AWS::IAM::Policy",
234
234
  "DependsOn": "PassFunctionRole",
235
235
  "Properties": {
236
- "PolicyName": "lambda-log-access",
236
+ "PolicyName": "PassFunction-lambda-log-access",
237
237
  "Roles": [
238
238
  {
239
239
  "Ref": "PassFunctionRole"
@@ -374,7 +374,7 @@
374
374
  "Type": "AWS::IAM::Policy",
375
375
  "DependsOn": "DestinationRole",
376
376
  "Properties": {
377
- "PolicyName": "lambda-log-access",
377
+ "PolicyName": "Destination-lambda-log-access",
378
378
  "Roles": [
379
379
  {
380
380
  "Ref": "DestinationRole"
@@ -229,7 +229,7 @@
229
229
  "Type": "AWS::IAM::Policy",
230
230
  "DependsOn": "PassFunctionRole",
231
231
  "Properties": {
232
- "PolicyName": "lambda-log-access",
232
+ "PolicyName": "PassFunction-lambda-log-access",
233
233
  "Roles": [
234
234
  {
235
235
  "Ref": "PassFunctionRole"
@@ -370,7 +370,7 @@
370
370
  "Type": "AWS::IAM::Policy",
371
371
  "DependsOn": "DestinationRole",
372
372
  "Properties": {
373
- "PolicyName": "lambda-log-access",
373
+ "PolicyName": "Destination-lambda-log-access",
374
374
  "Roles": [
375
375
  {
376
376
  "Ref": "DestinationRole"
@@ -213,7 +213,7 @@
213
213
  "Type": "AWS::IAM::Policy",
214
214
  "DependsOn": "PassFunctionRole",
215
215
  "Properties": {
216
- "PolicyName": "lambda-log-access",
216
+ "PolicyName": "PassFunction-lambda-log-access",
217
217
  "Roles": [
218
218
  {
219
219
  "Ref": "PassFunctionRole"
@@ -354,7 +354,7 @@
354
354
  "Type": "AWS::IAM::Policy",
355
355
  "DependsOn": "DestinationRole",
356
356
  "Properties": {
357
- "PolicyName": "lambda-log-access",
357
+ "PolicyName": "Destination-lambda-log-access",
358
358
  "Roles": [
359
359
  {
360
360
  "Ref": "DestinationRole"
@@ -161,7 +161,7 @@
161
161
  },
162
162
  "Handler": "index.lambda",
163
163
  "MemorySize": 128,
164
- "Runtime": "nodejs16.x",
164
+ "Runtime": "nodejs22.x",
165
165
  "Timeout": 30,
166
166
  "Role": {
167
167
  "Fn::GetAtt": [
@@ -211,7 +211,7 @@
211
211
  "Type": "AWS::IAM::Policy",
212
212
  "DependsOn": "PassFunctionRole",
213
213
  "Properties": {
214
- "PolicyName": "lambda-log-access",
214
+ "PolicyName": "PassFunction-lambda-log-access",
215
215
  "Roles": [
216
216
  {
217
217
  "Ref": "PassFunctionRole"
@@ -352,7 +352,7 @@
352
352
  "Type": "AWS::IAM::Policy",
353
353
  "DependsOn": "DestinationRole",
354
354
  "Properties": {
355
- "PolicyName": "lambda-log-access",
355
+ "PolicyName": "Destination-lambda-log-access",
356
356
  "Roles": [
357
357
  {
358
358
  "Ref": "DestinationRole"
@@ -211,7 +211,7 @@
211
211
  "Type": "AWS::IAM::Policy",
212
212
  "DependsOn": "PassFunctionRole",
213
213
  "Properties": {
214
- "PolicyName": "lambda-log-access",
214
+ "PolicyName": "PassFunction-lambda-log-access",
215
215
  "Roles": [
216
216
  {
217
217
  "Ref": "PassFunctionRole"
@@ -352,7 +352,7 @@
352
352
  "Type": "AWS::IAM::Policy",
353
353
  "DependsOn": "DestinationRole",
354
354
  "Properties": {
355
- "PolicyName": "lambda-log-access",
355
+ "PolicyName": "Destination-lambda-log-access",
356
356
  "Roles": [
357
357
  {
358
358
  "Ref": "DestinationRole"
@@ -211,7 +211,7 @@
211
211
  "Type": "AWS::IAM::Policy",
212
212
  "DependsOn": "PassFunctionRole",
213
213
  "Properties": {
214
- "PolicyName": "lambda-log-access",
214
+ "PolicyName": "PassFunction-lambda-log-access",
215
215
  "Roles": [
216
216
  {
217
217
  "Ref": "PassFunctionRole"
@@ -352,7 +352,7 @@
352
352
  "Type": "AWS::IAM::Policy",
353
353
  "DependsOn": "DestinationRole",
354
354
  "Properties": {
355
- "PolicyName": "lambda-log-access",
355
+ "PolicyName": "Destination-lambda-log-access",
356
356
  "Roles": [
357
357
  {
358
358
  "Ref": "DestinationRole"
@@ -211,7 +211,7 @@
211
211
  "Type": "AWS::IAM::Policy",
212
212
  "DependsOn": "PassFunctionRole",
213
213
  "Properties": {
214
- "PolicyName": "lambda-log-access",
214
+ "PolicyName": "PassFunction-lambda-log-access",
215
215
  "Roles": [
216
216
  {
217
217
  "Ref": "PassFunctionRole"
@@ -352,7 +352,7 @@
352
352
  "Type": "AWS::IAM::Policy",
353
353
  "DependsOn": "DestinationRole",
354
354
  "Properties": {
355
- "PolicyName": "lambda-log-access",
355
+ "PolicyName": "Destination-lambda-log-access",
356
356
  "Roles": [
357
357
  {
358
358
  "Ref": "DestinationRole"
@@ -211,7 +211,7 @@
211
211
  "Type": "AWS::IAM::Policy",
212
212
  "DependsOn": "PassFunctionRole",
213
213
  "Properties": {
214
- "PolicyName": "lambda-log-access",
214
+ "PolicyName": "PassFunction-lambda-log-access",
215
215
  "Roles": [
216
216
  {
217
217
  "Ref": "PassFunctionRole"
@@ -352,7 +352,7 @@
352
352
  "Type": "AWS::IAM::Policy",
353
353
  "DependsOn": "DestinationRole",
354
354
  "Properties": {
355
- "PolicyName": "lambda-log-access",
355
+ "PolicyName": "Destination-lambda-log-access",
356
356
  "Roles": [
357
357
  {
358
358
  "Ref": "DestinationRole"
@@ -87,7 +87,7 @@
87
87
  "Type": "AWS::IAM::Policy",
88
88
  "DependsOn": "MyLambdaRole",
89
89
  "Properties": {
90
- "PolicyName": "lambda-log-access",
90
+ "PolicyName": "MyLambda-lambda-log-access",
91
91
  "Roles": [
92
92
  {
93
93
  "Ref": "MyLambdaRole"
@@ -85,7 +85,7 @@
85
85
  "Type": "AWS::IAM::Policy",
86
86
  "DependsOn": "MyLambdaRole",
87
87
  "Properties": {
88
- "PolicyName": "lambda-log-access",
88
+ "PolicyName": "MyLambda-lambda-log-access",
89
89
  "Roles": [
90
90
  {
91
91
  "Ref": "MyLambdaRole"
@@ -121,7 +121,7 @@
121
121
  "Condition": "Always",
122
122
  "DependsOn": "MyLambdaRole",
123
123
  "Properties": {
124
- "PolicyName": "lambda-log-access",
124
+ "PolicyName": "MyLambda-lambda-log-access",
125
125
  "Roles": [
126
126
  {
127
127
  "Ref": "MyLambdaRole"
@@ -86,7 +86,7 @@
86
86
  "MyLambdaLogPolicy": {
87
87
  "Type": "AWS::IAM::Policy",
88
88
  "Properties": {
89
- "PolicyName": "lambda-log-access",
89
+ "PolicyName": "MyLambda-lambda-log-access",
90
90
  "Roles": [
91
91
  {
92
92
  "Fn::Select": [
@@ -86,7 +86,7 @@
86
86
  "Type": "AWS::IAM::Policy",
87
87
  "DependsOn": "MyLambdaRole",
88
88
  "Properties": {
89
- "PolicyName": "lambda-log-access",
89
+ "PolicyName": "MyLambda-lambda-log-access",
90
90
  "Roles": [
91
91
  {
92
92
  "Ref": "MyLambdaRole"
@@ -87,7 +87,7 @@
87
87
  "Type": "AWS::IAM::Policy",
88
88
  "DependsOn": "MyLambdaRole",
89
89
  "Properties": {
90
- "PolicyName": "lambda-log-access",
90
+ "PolicyName": "MyLambda-lambda-log-access",
91
91
  "Roles": [
92
92
  {
93
93
  "Ref": "MyLambdaRole"
@@ -87,7 +87,7 @@
87
87
  "Type": "AWS::IAM::Policy",
88
88
  "DependsOn": "MyLambdaRole",
89
89
  "Properties": {
90
- "PolicyName": "lambda-log-access",
90
+ "PolicyName": "MyLambda-lambda-log-access",
91
91
  "Roles": [
92
92
  {
93
93
  "Ref": "MyLambdaRole"
@@ -88,7 +88,7 @@
88
88
  "Type": "AWS::IAM::Policy",
89
89
  "DependsOn": "MyLambdaRole",
90
90
  "Properties": {
91
- "PolicyName": "lambda-log-access",
91
+ "PolicyName": "MyLambda-lambda-log-access",
92
92
  "Roles": [
93
93
  {
94
94
  "Ref": "MyLambdaRole"
@@ -88,7 +88,7 @@
88
88
  "Type": "AWS::IAM::Policy",
89
89
  "DependsOn": "MyLambdaRole",
90
90
  "Properties": {
91
- "PolicyName": "lambda-log-access",
91
+ "PolicyName": "MyLambda-lambda-log-access",
92
92
  "Roles": [
93
93
  {
94
94
  "Ref": "MyLambdaRole"
@@ -87,7 +87,7 @@
87
87
  "Type": "AWS::IAM::Policy",
88
88
  "DependsOn": "MyLambdaRole",
89
89
  "Properties": {
90
- "PolicyName": "lambda-log-access",
90
+ "PolicyName": "MyLambda-lambda-log-access",
91
91
  "Roles": [
92
92
  {
93
93
  "Ref": "MyLambdaRole"
@@ -87,7 +87,7 @@
87
87
  "Type": "AWS::IAM::Policy",
88
88
  "DependsOn": "MyLambdaRole",
89
89
  "Properties": {
90
- "PolicyName": "lambda-log-access",
90
+ "PolicyName": "MyLambda-lambda-log-access",
91
91
  "Roles": [
92
92
  {
93
93
  "Ref": "MyLambdaRole"
@@ -87,7 +87,7 @@
87
87
  "Type": "AWS::IAM::Policy",
88
88
  "DependsOn": "MyLambdaRole",
89
89
  "Properties": {
90
- "PolicyName": "lambda-log-access",
90
+ "PolicyName": "MyLambda-lambda-log-access",
91
91
  "Roles": [
92
92
  {
93
93
  "Ref": "MyLambdaRole"
@@ -87,7 +87,7 @@
87
87
  "Type": "AWS::IAM::Policy",
88
88
  "DependsOn": "MyLambdaRole",
89
89
  "Properties": {
90
- "PolicyName": "lambda-log-access",
90
+ "PolicyName": "MyLambda-lambda-log-access",
91
91
  "Roles": [
92
92
  {
93
93
  "Ref": "MyLambdaRole"