@mapbox/cloudfriend 9.1.1 → 9.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (47) hide show
  1. package/.nyc_output/2b544c0b-2830-4ad0-97cd-8e661710b0bb.json +1 -0
  2. package/.nyc_output/65e58b48-bf1c-412d-8dd4-d7b564b12d76.json +1 -0
  3. package/.nyc_output/processinfo/2b544c0b-2830-4ad0-97cd-8e661710b0bb.json +1 -0
  4. package/.nyc_output/processinfo/65e58b48-bf1c-412d-8dd4-d7b564b12d76.json +1 -0
  5. package/.nyc_output/processinfo/index.json +1 -1
  6. package/changelog.md +4 -0
  7. package/lib/shortcuts/api.md +1 -0
  8. package/lib/shortcuts/lambda.js +4 -2
  9. package/package.json +1 -1
  10. package/test/fixtures/shortcuts/event-lambda-custom-eventbus.json +1 -1
  11. package/test/fixtures/shortcuts/event-lambda-defaults.json +4 -2
  12. package/test/fixtures/shortcuts/event-lambda-full.json +4 -2
  13. package/test/fixtures/shortcuts/hookshot-github-compatible-legacy-node-runtimes.json +2 -2
  14. package/test/fixtures/shortcuts/hookshot-github-secret-ref.json +9 -5
  15. package/test/fixtures/shortcuts/hookshot-github-secret-string.json +9 -5
  16. package/test/fixtures/shortcuts/hookshot-github.json +9 -5
  17. package/test/fixtures/shortcuts/hookshot-passthrough-access-log-format.json +9 -5
  18. package/test/fixtures/shortcuts/hookshot-passthrough-alarms.json +9 -5
  19. package/test/fixtures/shortcuts/hookshot-passthrough-compatible-legacy-node-runtimes.json +2 -2
  20. package/test/fixtures/shortcuts/hookshot-passthrough-enhanced-logging.json +9 -5
  21. package/test/fixtures/shortcuts/hookshot-passthrough-full-blown-logging.json +9 -5
  22. package/test/fixtures/shortcuts/hookshot-passthrough-logging.json +9 -5
  23. package/test/fixtures/shortcuts/hookshot-passthrough.json +9 -5
  24. package/test/fixtures/shortcuts/lambda-defaults.json +4 -2
  25. package/test/fixtures/shortcuts/lambda-docker.json +4 -2
  26. package/test/fixtures/shortcuts/lambda-full.json +4 -2
  27. package/test/fixtures/shortcuts/lambda-provided-role.json +4 -2
  28. package/test/fixtures/shortcuts/lambda-zipfile.json +4 -2
  29. package/test/fixtures/shortcuts/log-subscription-lambda-defaults.json +4 -2
  30. package/test/fixtures/shortcuts/log-subscription-lambda-no-defaults.json +4 -2
  31. package/test/fixtures/shortcuts/queue-lambda-zero.json +4 -2
  32. package/test/fixtures/shortcuts/queue-lambda.json +4 -2
  33. package/test/fixtures/shortcuts/scheduled-lambda-defaults.json +4 -2
  34. package/test/fixtures/shortcuts/scheduled-lambda-full.json +4 -2
  35. package/test/fixtures/shortcuts/stream-lambda-defaults.json +4 -2
  36. package/test/fixtures/shortcuts/stream-lambda-no-defaults.json +4 -2
  37. package/test/shortcuts.test.js +16 -0
  38. package/.idea/cloudfriend.iml +0 -9
  39. package/.idea/copilot.data.migration.ask2agent.xml +0 -6
  40. package/.idea/inspectionProfiles/Project_Default.xml +0 -6
  41. package/.idea/misc.xml +0 -6
  42. package/.idea/modules.xml +0 -8
  43. package/.idea/vcs.xml +0 -6
  44. package/.nyc_output/b6e4581b-e7fc-423e-9c50-3d23e5008df1.json +0 -1
  45. package/.nyc_output/f18b3f27-0357-4d4c-873b-fe236737f0d0.json +0 -1
  46. package/.nyc_output/processinfo/b6e4581b-e7fc-423e-9c50-3d23e5008df1.json +0 -1
  47. package/.nyc_output/processinfo/f18b3f27-0357-4d4c-873b-fe236737f0d0.json +0 -1
@@ -49,6 +49,7 @@ const ServiceRole = require('./service-role');
49
49
  * @param {Array<String>} [options.OKActions=undefined] - See [AWS documentation](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cw-alarm.html#cfn-cloudwatch-alarms-okactions).
50
50
  * @param {Number} [options.LogRetentionInDays=14] - How long to retain CloudWatch logs for this Lambda function. See [AWS Documentation](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-logs-loggroup.html) for allowed values.
51
51
  * @param {String} [options.LogPolicyDeletionPolicy='Delete'] - DeletionPolicy on the IAM Policy resource used to access Logs. See [AWS Documentation](https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-attribute-deletionpolicy.html) for allowed values.
52
+ * @param {String} [options.LogPolicyName='${stack-name}-${logical-name}-lambda-log-access'] - The name of the IAM Policy used to access CloudWatch Logs.
52
53
  * @example
53
54
  * const cf = require('@mapbox/cloudfriend');
54
55
  *
@@ -109,7 +110,8 @@ class Lambda {
109
110
  ExtendedStatistic,
110
111
  OKActions,
111
112
  LogRetentionInDays = 14,
112
- LogPolicyDeletionPolicy = 'Delete'
113
+ LogPolicyDeletionPolicy = 'Delete',
114
+ LogPolicyName = { 'Fn::Sub': `\${AWS::StackName}-${LogicalName}-lambda-log-access` }
113
115
  } = options;
114
116
 
115
117
  if (options.EvaluationPeriods < Math.ceil(Timeout / Period))
@@ -205,7 +207,7 @@ class Lambda {
205
207
  DependsOn: (RoleArn) ? undefined : `${LogicalName}Role`,
206
208
  DeletionPolicy: LogPolicyDeletionPolicy,
207
209
  Properties: {
208
- PolicyName: `${LogicalName}-lambda-log-access`,
210
+ PolicyName: LogPolicyName,
209
211
  Roles: [roleName],
210
212
  PolicyDocument: {
211
213
  Version: '2012-10-17',
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@mapbox/cloudfriend",
3
- "version": "9.1.1",
3
+ "version": "9.2.0",
4
4
  "description": "Helper functions for assembling CloudFormation templates in JavaScript",
5
5
  "main": "index.js",
6
6
  "engines": {
@@ -88,7 +88,7 @@
88
88
  "DependsOn": "MyLambdaRole",
89
89
  "DeletionPolicy": "Delete",
90
90
  "Properties": {
91
- "PolicyName": "MyLambda-lambda-log-access",
91
+ "PolicyName": { "Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access" },
92
92
  "Roles": [
93
93
  {
94
94
  "Ref": "MyLambdaRole"
@@ -88,7 +88,9 @@
88
88
  "DependsOn": "MyLambdaRole",
89
89
  "DeletionPolicy": "Delete",
90
90
  "Properties": {
91
- "PolicyName": "MyLambda-lambda-log-access",
91
+ "PolicyName": {
92
+ "Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
93
+ },
92
94
  "Roles": [
93
95
  {
94
96
  "Ref": "MyLambdaRole"
@@ -197,4 +199,4 @@
197
199
  }
198
200
  },
199
201
  "Outputs": {}
200
- }
202
+ }
@@ -88,7 +88,9 @@
88
88
  "DependsOn": "MyLambdaRole",
89
89
  "DeletionPolicy": "Delete",
90
90
  "Properties": {
91
- "PolicyName": "MyLambda-lambda-log-access",
91
+ "PolicyName": {
92
+ "Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
93
+ },
92
94
  "Roles": [
93
95
  {
94
96
  "Ref": "MyLambdaRole"
@@ -197,4 +199,4 @@
197
199
  }
198
200
  },
199
201
  "Outputs": {}
200
- }
202
+ }
@@ -226,7 +226,7 @@
226
226
  "DependsOn": "PassFunctionRole",
227
227
  "DeletionPolicy": "Delete",
228
228
  "Properties": {
229
- "PolicyName": "PassFunction-lambda-log-access",
229
+ "PolicyName": { "Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access" },
230
230
  "Roles": [
231
231
  {
232
232
  "Ref": "PassFunctionRole"
@@ -368,7 +368,7 @@
368
368
  "DependsOn": "DestinationRole",
369
369
  "DeletionPolicy": "Delete",
370
370
  "Properties": {
371
- "PolicyName": "Destination-lambda-log-access",
371
+ "PolicyName": { "Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access" },
372
372
  "Roles": [
373
373
  {
374
374
  "Ref": "DestinationRole"
@@ -28,7 +28,7 @@
28
28
  "Type": "AWS::ApiGateway::Stage",
29
29
  "Properties": {
30
30
  "DeploymentId": {
31
- "Ref": "PassDeploymentbdbc0f16"
31
+ "Ref": "PassDeployment6d7d2c50"
32
32
  },
33
33
  "StageName": "hookshot",
34
34
  "RestApiId": {
@@ -47,7 +47,7 @@
47
47
  ]
48
48
  }
49
49
  },
50
- "PassDeploymentbdbc0f16": {
50
+ "PassDeployment6d7d2c50": {
51
51
  "Type": "AWS::ApiGateway::Deployment",
52
52
  "DependsOn": "PassMethod",
53
53
  "Properties": {
@@ -232,7 +232,9 @@
232
232
  "DependsOn": "PassFunctionRole",
233
233
  "DeletionPolicy": "Delete",
234
234
  "Properties": {
235
- "PolicyName": "PassFunction-lambda-log-access",
235
+ "PolicyName": {
236
+ "Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access"
237
+ },
236
238
  "Roles": [
237
239
  {
238
240
  "Ref": "PassFunctionRole"
@@ -374,7 +376,9 @@
374
376
  "DependsOn": "DestinationRole",
375
377
  "DeletionPolicy": "Delete",
376
378
  "Properties": {
377
- "PolicyName": "Destination-lambda-log-access",
379
+ "PolicyName": {
380
+ "Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access"
381
+ },
378
382
  "Roles": [
379
383
  {
380
384
  "Ref": "DestinationRole"
@@ -430,4 +434,4 @@
430
434
  }
431
435
  }
432
436
  }
433
- }
437
+ }
@@ -24,7 +24,7 @@
24
24
  "Type": "AWS::ApiGateway::Stage",
25
25
  "Properties": {
26
26
  "DeploymentId": {
27
- "Ref": "PassDeploymentbdbc0f16"
27
+ "Ref": "PassDeployment6d7d2c50"
28
28
  },
29
29
  "StageName": "hookshot",
30
30
  "RestApiId": {
@@ -43,7 +43,7 @@
43
43
  ]
44
44
  }
45
45
  },
46
- "PassDeploymentbdbc0f16": {
46
+ "PassDeployment6d7d2c50": {
47
47
  "Type": "AWS::ApiGateway::Deployment",
48
48
  "DependsOn": "PassMethod",
49
49
  "Properties": {
@@ -226,7 +226,9 @@
226
226
  "DependsOn": "PassFunctionRole",
227
227
  "DeletionPolicy": "Delete",
228
228
  "Properties": {
229
- "PolicyName": "PassFunction-lambda-log-access",
229
+ "PolicyName": {
230
+ "Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access"
231
+ },
230
232
  "Roles": [
231
233
  {
232
234
  "Ref": "PassFunctionRole"
@@ -368,7 +370,9 @@
368
370
  "DependsOn": "DestinationRole",
369
371
  "DeletionPolicy": "Delete",
370
372
  "Properties": {
371
- "PolicyName": "Destination-lambda-log-access",
373
+ "PolicyName": {
374
+ "Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access"
375
+ },
372
376
  "Roles": [
373
377
  {
374
378
  "Ref": "DestinationRole"
@@ -422,4 +426,4 @@
422
426
  "Value": "abc123"
423
427
  }
424
428
  }
425
- }
429
+ }
@@ -24,7 +24,7 @@
24
24
  "Type": "AWS::ApiGateway::Stage",
25
25
  "Properties": {
26
26
  "DeploymentId": {
27
- "Ref": "PassDeploymentbdbc0f16"
27
+ "Ref": "PassDeployment6d7d2c50"
28
28
  },
29
29
  "StageName": "hookshot",
30
30
  "RestApiId": {
@@ -43,7 +43,7 @@
43
43
  ]
44
44
  }
45
45
  },
46
- "PassDeploymentbdbc0f16": {
46
+ "PassDeployment6d7d2c50": {
47
47
  "Type": "AWS::ApiGateway::Deployment",
48
48
  "DependsOn": "PassMethod",
49
49
  "Properties": {
@@ -234,7 +234,9 @@
234
234
  "DependsOn": "PassFunctionRole",
235
235
  "DeletionPolicy": "Delete",
236
236
  "Properties": {
237
- "PolicyName": "PassFunction-lambda-log-access",
237
+ "PolicyName": {
238
+ "Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access"
239
+ },
238
240
  "Roles": [
239
241
  {
240
242
  "Ref": "PassFunctionRole"
@@ -376,7 +378,9 @@
376
378
  "DependsOn": "DestinationRole",
377
379
  "DeletionPolicy": "Delete",
378
380
  "Properties": {
379
- "PolicyName": "Destination-lambda-log-access",
381
+ "PolicyName": {
382
+ "Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access"
383
+ },
380
384
  "Roles": [
381
385
  {
382
386
  "Ref": "DestinationRole"
@@ -432,4 +436,4 @@
432
436
  }
433
437
  }
434
438
  }
435
- }
439
+ }
@@ -24,7 +24,7 @@
24
24
  "Type": "AWS::ApiGateway::Stage",
25
25
  "Properties": {
26
26
  "DeploymentId": {
27
- "Ref": "PassDeploymentbdbc0f16"
27
+ "Ref": "PassDeployment6d7d2c50"
28
28
  },
29
29
  "StageName": "hookshot",
30
30
  "RestApiId": {
@@ -52,7 +52,7 @@
52
52
  }
53
53
  }
54
54
  },
55
- "PassDeploymentbdbc0f16": {
55
+ "PassDeployment6d7d2c50": {
56
56
  "Type": "AWS::ApiGateway::Deployment",
57
57
  "DependsOn": "PassMethod",
58
58
  "Properties": {
@@ -230,7 +230,9 @@
230
230
  "DependsOn": "PassFunctionRole",
231
231
  "DeletionPolicy": "Delete",
232
232
  "Properties": {
233
- "PolicyName": "PassFunction-lambda-log-access",
233
+ "PolicyName": {
234
+ "Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access"
235
+ },
234
236
  "Roles": [
235
237
  {
236
238
  "Ref": "PassFunctionRole"
@@ -372,7 +374,9 @@
372
374
  "DependsOn": "DestinationRole",
373
375
  "DeletionPolicy": "Delete",
374
376
  "Properties": {
375
- "PolicyName": "Destination-lambda-log-access",
377
+ "PolicyName": {
378
+ "Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access"
379
+ },
376
380
  "Roles": [
377
381
  {
378
382
  "Ref": "DestinationRole"
@@ -428,4 +432,4 @@
428
432
  }
429
433
  }
430
434
  }
431
- }
435
+ }
@@ -24,7 +24,7 @@
24
24
  "Type": "AWS::ApiGateway::Stage",
25
25
  "Properties": {
26
26
  "DeploymentId": {
27
- "Ref": "PassDeploymentbdbc0f16"
27
+ "Ref": "PassDeployment6d7d2c50"
28
28
  },
29
29
  "StageName": "hookshot",
30
30
  "RestApiId": {
@@ -43,7 +43,7 @@
43
43
  ]
44
44
  }
45
45
  },
46
- "PassDeploymentbdbc0f16": {
46
+ "PassDeployment6d7d2c50": {
47
47
  "Type": "AWS::ApiGateway::Deployment",
48
48
  "DependsOn": "PassMethod",
49
49
  "Properties": {
@@ -214,7 +214,9 @@
214
214
  "DependsOn": "PassFunctionRole",
215
215
  "DeletionPolicy": "Delete",
216
216
  "Properties": {
217
- "PolicyName": "PassFunction-lambda-log-access",
217
+ "PolicyName": {
218
+ "Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access"
219
+ },
218
220
  "Roles": [
219
221
  {
220
222
  "Ref": "PassFunctionRole"
@@ -356,7 +358,9 @@
356
358
  "DependsOn": "DestinationRole",
357
359
  "DeletionPolicy": "Delete",
358
360
  "Properties": {
359
- "PolicyName": "Destination-lambda-log-access",
361
+ "PolicyName": {
362
+ "Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access"
363
+ },
360
364
  "Roles": [
361
365
  {
362
366
  "Ref": "DestinationRole"
@@ -412,4 +416,4 @@
412
416
  }
413
417
  }
414
418
  }
415
- }
419
+ }
@@ -212,7 +212,7 @@
212
212
  "DependsOn": "PassFunctionRole",
213
213
  "DeletionPolicy": "Delete",
214
214
  "Properties": {
215
- "PolicyName": "PassFunction-lambda-log-access",
215
+ "PolicyName": { "Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access" },
216
216
  "Roles": [
217
217
  {
218
218
  "Ref": "PassFunctionRole"
@@ -354,7 +354,7 @@
354
354
  "DependsOn": "DestinationRole",
355
355
  "DeletionPolicy": "Delete",
356
356
  "Properties": {
357
- "PolicyName": "Destination-lambda-log-access",
357
+ "PolicyName": { "Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access" },
358
358
  "Roles": [
359
359
  {
360
360
  "Ref": "DestinationRole"
@@ -24,7 +24,7 @@
24
24
  "Type": "AWS::ApiGateway::Stage",
25
25
  "Properties": {
26
26
  "DeploymentId": {
27
- "Ref": "PassDeploymentbdbc0f16"
27
+ "Ref": "PassDeployment6d7d2c50"
28
28
  },
29
29
  "StageName": "hookshot",
30
30
  "RestApiId": {
@@ -43,7 +43,7 @@
43
43
  ]
44
44
  }
45
45
  },
46
- "PassDeploymentbdbc0f16": {
46
+ "PassDeployment6d7d2c50": {
47
47
  "Type": "AWS::ApiGateway::Deployment",
48
48
  "DependsOn": "PassMethod",
49
49
  "Properties": {
@@ -212,7 +212,9 @@
212
212
  "DependsOn": "PassFunctionRole",
213
213
  "DeletionPolicy": "Delete",
214
214
  "Properties": {
215
- "PolicyName": "PassFunction-lambda-log-access",
215
+ "PolicyName": {
216
+ "Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access"
217
+ },
216
218
  "Roles": [
217
219
  {
218
220
  "Ref": "PassFunctionRole"
@@ -354,7 +356,9 @@
354
356
  "DependsOn": "DestinationRole",
355
357
  "DeletionPolicy": "Delete",
356
358
  "Properties": {
357
- "PolicyName": "Destination-lambda-log-access",
359
+ "PolicyName": {
360
+ "Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access"
361
+ },
358
362
  "Roles": [
359
363
  {
360
364
  "Ref": "DestinationRole"
@@ -410,4 +414,4 @@
410
414
  }
411
415
  }
412
416
  }
413
- }
417
+ }
@@ -24,7 +24,7 @@
24
24
  "Type": "AWS::ApiGateway::Stage",
25
25
  "Properties": {
26
26
  "DeploymentId": {
27
- "Ref": "PassDeploymentbdbc0f16"
27
+ "Ref": "PassDeployment6d7d2c50"
28
28
  },
29
29
  "StageName": "hookshot",
30
30
  "RestApiId": {
@@ -43,7 +43,7 @@
43
43
  ]
44
44
  }
45
45
  },
46
- "PassDeploymentbdbc0f16": {
46
+ "PassDeployment6d7d2c50": {
47
47
  "Type": "AWS::ApiGateway::Deployment",
48
48
  "DependsOn": "PassMethod",
49
49
  "Properties": {
@@ -212,7 +212,9 @@
212
212
  "DependsOn": "PassFunctionRole",
213
213
  "DeletionPolicy": "Delete",
214
214
  "Properties": {
215
- "PolicyName": "PassFunction-lambda-log-access",
215
+ "PolicyName": {
216
+ "Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access"
217
+ },
216
218
  "Roles": [
217
219
  {
218
220
  "Ref": "PassFunctionRole"
@@ -354,7 +356,9 @@
354
356
  "DependsOn": "DestinationRole",
355
357
  "DeletionPolicy": "Delete",
356
358
  "Properties": {
357
- "PolicyName": "Destination-lambda-log-access",
359
+ "PolicyName": {
360
+ "Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access"
361
+ },
358
362
  "Roles": [
359
363
  {
360
364
  "Ref": "DestinationRole"
@@ -410,4 +414,4 @@
410
414
  }
411
415
  }
412
416
  }
413
- }
417
+ }
@@ -24,7 +24,7 @@
24
24
  "Type": "AWS::ApiGateway::Stage",
25
25
  "Properties": {
26
26
  "DeploymentId": {
27
- "Ref": "PassDeploymentbdbc0f16"
27
+ "Ref": "PassDeployment6d7d2c50"
28
28
  },
29
29
  "StageName": "hookshot",
30
30
  "RestApiId": {
@@ -43,7 +43,7 @@
43
43
  ]
44
44
  }
45
45
  },
46
- "PassDeploymentbdbc0f16": {
46
+ "PassDeployment6d7d2c50": {
47
47
  "Type": "AWS::ApiGateway::Deployment",
48
48
  "DependsOn": "PassMethod",
49
49
  "Properties": {
@@ -212,7 +212,9 @@
212
212
  "DependsOn": "PassFunctionRole",
213
213
  "DeletionPolicy": "Delete",
214
214
  "Properties": {
215
- "PolicyName": "PassFunction-lambda-log-access",
215
+ "PolicyName": {
216
+ "Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access"
217
+ },
216
218
  "Roles": [
217
219
  {
218
220
  "Ref": "PassFunctionRole"
@@ -354,7 +356,9 @@
354
356
  "DependsOn": "DestinationRole",
355
357
  "DeletionPolicy": "Delete",
356
358
  "Properties": {
357
- "PolicyName": "Destination-lambda-log-access",
359
+ "PolicyName": {
360
+ "Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access"
361
+ },
358
362
  "Roles": [
359
363
  {
360
364
  "Ref": "DestinationRole"
@@ -410,4 +414,4 @@
410
414
  }
411
415
  }
412
416
  }
413
- }
417
+ }
@@ -24,7 +24,7 @@
24
24
  "Type": "AWS::ApiGateway::Stage",
25
25
  "Properties": {
26
26
  "DeploymentId": {
27
- "Ref": "PassDeploymentbdbc0f16"
27
+ "Ref": "PassDeployment6d7d2c50"
28
28
  },
29
29
  "StageName": "hookshot",
30
30
  "RestApiId": {
@@ -43,7 +43,7 @@
43
43
  ]
44
44
  }
45
45
  },
46
- "PassDeploymentbdbc0f16": {
46
+ "PassDeployment6d7d2c50": {
47
47
  "Type": "AWS::ApiGateway::Deployment",
48
48
  "DependsOn": "PassMethod",
49
49
  "Properties": {
@@ -212,7 +212,9 @@
212
212
  "DependsOn": "PassFunctionRole",
213
213
  "DeletionPolicy": "Delete",
214
214
  "Properties": {
215
- "PolicyName": "PassFunction-lambda-log-access",
215
+ "PolicyName": {
216
+ "Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access"
217
+ },
216
218
  "Roles": [
217
219
  {
218
220
  "Ref": "PassFunctionRole"
@@ -354,7 +356,9 @@
354
356
  "DependsOn": "DestinationRole",
355
357
  "DeletionPolicy": "Delete",
356
358
  "Properties": {
357
- "PolicyName": "Destination-lambda-log-access",
359
+ "PolicyName": {
360
+ "Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access"
361
+ },
358
362
  "Roles": [
359
363
  {
360
364
  "Ref": "DestinationRole"
@@ -410,4 +414,4 @@
410
414
  }
411
415
  }
412
416
  }
413
- }
417
+ }
@@ -88,7 +88,9 @@
88
88
  "DependsOn": "MyLambdaRole",
89
89
  "DeletionPolicy": "Delete",
90
90
  "Properties": {
91
- "PolicyName": "MyLambda-lambda-log-access",
91
+ "PolicyName": {
92
+ "Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
93
+ },
92
94
  "Roles": [
93
95
  {
94
96
  "Ref": "MyLambdaRole"
@@ -131,4 +133,4 @@
131
133
  }
132
134
  },
133
135
  "Outputs": {}
134
- }
136
+ }
@@ -86,7 +86,9 @@
86
86
  "DependsOn": "MyLambdaRole",
87
87
  "DeletionPolicy": "Delete",
88
88
  "Properties": {
89
- "PolicyName": "MyLambda-lambda-log-access",
89
+ "PolicyName": {
90
+ "Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
91
+ },
90
92
  "Roles": [
91
93
  {
92
94
  "Ref": "MyLambdaRole"
@@ -129,4 +131,4 @@
129
131
  }
130
132
  },
131
133
  "Outputs": {}
132
- }
134
+ }
@@ -122,7 +122,9 @@
122
122
  "DependsOn": "MyLambdaRole",
123
123
  "DeletionPolicy": "Delete",
124
124
  "Properties": {
125
- "PolicyName": "MyLambda-lambda-log-access",
125
+ "PolicyName": {
126
+ "Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
127
+ },
126
128
  "Roles": [
127
129
  {
128
130
  "Ref": "MyLambdaRole"
@@ -181,4 +183,4 @@
181
183
  }
182
184
  },
183
185
  "Outputs": {}
184
- }
186
+ }
@@ -87,7 +87,9 @@
87
87
  "Type": "AWS::IAM::Policy",
88
88
  "DeletionPolicy": "Delete",
89
89
  "Properties": {
90
- "PolicyName": "MyLambda-lambda-log-access",
90
+ "PolicyName": {
91
+ "Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
92
+ },
91
93
  "Roles": [
92
94
  {
93
95
  "Fn::Select": [
@@ -131,4 +133,4 @@
131
133
  }
132
134
  },
133
135
  "Outputs": {}
134
- }
136
+ }
@@ -87,7 +87,9 @@
87
87
  "DependsOn": "MyLambdaRole",
88
88
  "DeletionPolicy": "Delete",
89
89
  "Properties": {
90
- "PolicyName": "MyLambda-lambda-log-access",
90
+ "PolicyName": {
91
+ "Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
92
+ },
91
93
  "Roles": [
92
94
  {
93
95
  "Ref": "MyLambdaRole"
@@ -130,4 +132,4 @@
130
132
  }
131
133
  },
132
134
  "Outputs": {}
133
- }
135
+ }
@@ -88,7 +88,9 @@
88
88
  "DependsOn": "MyLambdaRole",
89
89
  "DeletionPolicy": "Delete",
90
90
  "Properties": {
91
- "PolicyName": "MyLambda-lambda-log-access",
91
+ "PolicyName": {
92
+ "Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
93
+ },
92
94
  "Roles": [
93
95
  {
94
96
  "Ref": "MyLambdaRole"
@@ -167,4 +169,4 @@
167
169
  }
168
170
  },
169
171
  "Outputs": {}
170
- }
172
+ }
@@ -88,7 +88,9 @@
88
88
  "DependsOn": "MyLambdaRole",
89
89
  "DeletionPolicy": "Delete",
90
90
  "Properties": {
91
- "PolicyName": "MyLambda-lambda-log-access",
91
+ "PolicyName": {
92
+ "Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
93
+ },
92
94
  "Roles": [
93
95
  {
94
96
  "Ref": "MyLambdaRole"
@@ -167,4 +169,4 @@
167
169
  }
168
170
  },
169
171
  "Outputs": {}
170
- }
172
+ }
@@ -89,7 +89,9 @@
89
89
  "DependsOn": "MyLambdaRole",
90
90
  "DeletionPolicy": "Delete",
91
91
  "Properties": {
92
- "PolicyName": "MyLambda-lambda-log-access",
92
+ "PolicyName": {
93
+ "Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
94
+ },
93
95
  "Roles": [
94
96
  {
95
97
  "Ref": "MyLambdaRole"
@@ -172,4 +174,4 @@
172
174
  }
173
175
  },
174
176
  "Outputs": {}
175
- }
177
+ }