@mapbox/cloudfriend 9.1.1 → 9.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.nyc_output/2b544c0b-2830-4ad0-97cd-8e661710b0bb.json +1 -0
- package/.nyc_output/65e58b48-bf1c-412d-8dd4-d7b564b12d76.json +1 -0
- package/.nyc_output/processinfo/2b544c0b-2830-4ad0-97cd-8e661710b0bb.json +1 -0
- package/.nyc_output/processinfo/65e58b48-bf1c-412d-8dd4-d7b564b12d76.json +1 -0
- package/.nyc_output/processinfo/index.json +1 -1
- package/changelog.md +4 -0
- package/lib/shortcuts/api.md +1 -0
- package/lib/shortcuts/lambda.js +4 -2
- package/package.json +1 -1
- package/test/fixtures/shortcuts/event-lambda-custom-eventbus.json +1 -1
- package/test/fixtures/shortcuts/event-lambda-defaults.json +4 -2
- package/test/fixtures/shortcuts/event-lambda-full.json +4 -2
- package/test/fixtures/shortcuts/hookshot-github-compatible-legacy-node-runtimes.json +2 -2
- package/test/fixtures/shortcuts/hookshot-github-secret-ref.json +9 -5
- package/test/fixtures/shortcuts/hookshot-github-secret-string.json +9 -5
- package/test/fixtures/shortcuts/hookshot-github.json +9 -5
- package/test/fixtures/shortcuts/hookshot-passthrough-access-log-format.json +9 -5
- package/test/fixtures/shortcuts/hookshot-passthrough-alarms.json +9 -5
- package/test/fixtures/shortcuts/hookshot-passthrough-compatible-legacy-node-runtimes.json +2 -2
- package/test/fixtures/shortcuts/hookshot-passthrough-enhanced-logging.json +9 -5
- package/test/fixtures/shortcuts/hookshot-passthrough-full-blown-logging.json +9 -5
- package/test/fixtures/shortcuts/hookshot-passthrough-logging.json +9 -5
- package/test/fixtures/shortcuts/hookshot-passthrough.json +9 -5
- package/test/fixtures/shortcuts/lambda-defaults.json +4 -2
- package/test/fixtures/shortcuts/lambda-docker.json +4 -2
- package/test/fixtures/shortcuts/lambda-full.json +4 -2
- package/test/fixtures/shortcuts/lambda-provided-role.json +4 -2
- package/test/fixtures/shortcuts/lambda-zipfile.json +4 -2
- package/test/fixtures/shortcuts/log-subscription-lambda-defaults.json +4 -2
- package/test/fixtures/shortcuts/log-subscription-lambda-no-defaults.json +4 -2
- package/test/fixtures/shortcuts/queue-lambda-zero.json +4 -2
- package/test/fixtures/shortcuts/queue-lambda.json +4 -2
- package/test/fixtures/shortcuts/scheduled-lambda-defaults.json +4 -2
- package/test/fixtures/shortcuts/scheduled-lambda-full.json +4 -2
- package/test/fixtures/shortcuts/stream-lambda-defaults.json +4 -2
- package/test/fixtures/shortcuts/stream-lambda-no-defaults.json +4 -2
- package/test/shortcuts.test.js +16 -0
- package/.idea/cloudfriend.iml +0 -9
- package/.idea/copilot.data.migration.ask2agent.xml +0 -6
- package/.idea/inspectionProfiles/Project_Default.xml +0 -6
- package/.idea/misc.xml +0 -6
- package/.idea/modules.xml +0 -8
- package/.idea/vcs.xml +0 -6
- package/.nyc_output/b6e4581b-e7fc-423e-9c50-3d23e5008df1.json +0 -1
- package/.nyc_output/f18b3f27-0357-4d4c-873b-fe236737f0d0.json +0 -1
- package/.nyc_output/processinfo/b6e4581b-e7fc-423e-9c50-3d23e5008df1.json +0 -1
- package/.nyc_output/processinfo/f18b3f27-0357-4d4c-873b-fe236737f0d0.json +0 -1
package/lib/shortcuts/lambda.js
CHANGED
|
@@ -49,6 +49,7 @@ const ServiceRole = require('./service-role');
|
|
|
49
49
|
* @param {Array<String>} [options.OKActions=undefined] - See [AWS documentation](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cw-alarm.html#cfn-cloudwatch-alarms-okactions).
|
|
50
50
|
* @param {Number} [options.LogRetentionInDays=14] - How long to retain CloudWatch logs for this Lambda function. See [AWS Documentation](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-logs-loggroup.html) for allowed values.
|
|
51
51
|
* @param {String} [options.LogPolicyDeletionPolicy='Delete'] - DeletionPolicy on the IAM Policy resource used to access Logs. See [AWS Documentation](https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-attribute-deletionpolicy.html) for allowed values.
|
|
52
|
+
* @param {String} [options.LogPolicyName='${stack-name}-${logical-name}-lambda-log-access'] - The name of the IAM Policy used to access CloudWatch Logs.
|
|
52
53
|
* @example
|
|
53
54
|
* const cf = require('@mapbox/cloudfriend');
|
|
54
55
|
*
|
|
@@ -109,7 +110,8 @@ class Lambda {
|
|
|
109
110
|
ExtendedStatistic,
|
|
110
111
|
OKActions,
|
|
111
112
|
LogRetentionInDays = 14,
|
|
112
|
-
LogPolicyDeletionPolicy = 'Delete'
|
|
113
|
+
LogPolicyDeletionPolicy = 'Delete',
|
|
114
|
+
LogPolicyName = { 'Fn::Sub': `\${AWS::StackName}-${LogicalName}-lambda-log-access` }
|
|
113
115
|
} = options;
|
|
114
116
|
|
|
115
117
|
if (options.EvaluationPeriods < Math.ceil(Timeout / Period))
|
|
@@ -205,7 +207,7 @@ class Lambda {
|
|
|
205
207
|
DependsOn: (RoleArn) ? undefined : `${LogicalName}Role`,
|
|
206
208
|
DeletionPolicy: LogPolicyDeletionPolicy,
|
|
207
209
|
Properties: {
|
|
208
|
-
PolicyName:
|
|
210
|
+
PolicyName: LogPolicyName,
|
|
209
211
|
Roles: [roleName],
|
|
210
212
|
PolicyDocument: {
|
|
211
213
|
Version: '2012-10-17',
|
package/package.json
CHANGED
|
@@ -88,7 +88,9 @@
|
|
|
88
88
|
"DependsOn": "MyLambdaRole",
|
|
89
89
|
"DeletionPolicy": "Delete",
|
|
90
90
|
"Properties": {
|
|
91
|
-
"PolicyName":
|
|
91
|
+
"PolicyName": {
|
|
92
|
+
"Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
|
|
93
|
+
},
|
|
92
94
|
"Roles": [
|
|
93
95
|
{
|
|
94
96
|
"Ref": "MyLambdaRole"
|
|
@@ -197,4 +199,4 @@
|
|
|
197
199
|
}
|
|
198
200
|
},
|
|
199
201
|
"Outputs": {}
|
|
200
|
-
}
|
|
202
|
+
}
|
|
@@ -88,7 +88,9 @@
|
|
|
88
88
|
"DependsOn": "MyLambdaRole",
|
|
89
89
|
"DeletionPolicy": "Delete",
|
|
90
90
|
"Properties": {
|
|
91
|
-
"PolicyName":
|
|
91
|
+
"PolicyName": {
|
|
92
|
+
"Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
|
|
93
|
+
},
|
|
92
94
|
"Roles": [
|
|
93
95
|
{
|
|
94
96
|
"Ref": "MyLambdaRole"
|
|
@@ -197,4 +199,4 @@
|
|
|
197
199
|
}
|
|
198
200
|
},
|
|
199
201
|
"Outputs": {}
|
|
200
|
-
}
|
|
202
|
+
}
|
|
@@ -226,7 +226,7 @@
|
|
|
226
226
|
"DependsOn": "PassFunctionRole",
|
|
227
227
|
"DeletionPolicy": "Delete",
|
|
228
228
|
"Properties": {
|
|
229
|
-
"PolicyName": "PassFunction-lambda-log-access",
|
|
229
|
+
"PolicyName": { "Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access" },
|
|
230
230
|
"Roles": [
|
|
231
231
|
{
|
|
232
232
|
"Ref": "PassFunctionRole"
|
|
@@ -368,7 +368,7 @@
|
|
|
368
368
|
"DependsOn": "DestinationRole",
|
|
369
369
|
"DeletionPolicy": "Delete",
|
|
370
370
|
"Properties": {
|
|
371
|
-
"PolicyName": "Destination-lambda-log-access",
|
|
371
|
+
"PolicyName": { "Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access" },
|
|
372
372
|
"Roles": [
|
|
373
373
|
{
|
|
374
374
|
"Ref": "DestinationRole"
|
|
@@ -28,7 +28,7 @@
|
|
|
28
28
|
"Type": "AWS::ApiGateway::Stage",
|
|
29
29
|
"Properties": {
|
|
30
30
|
"DeploymentId": {
|
|
31
|
-
"Ref": "
|
|
31
|
+
"Ref": "PassDeployment6d7d2c50"
|
|
32
32
|
},
|
|
33
33
|
"StageName": "hookshot",
|
|
34
34
|
"RestApiId": {
|
|
@@ -47,7 +47,7 @@
|
|
|
47
47
|
]
|
|
48
48
|
}
|
|
49
49
|
},
|
|
50
|
-
"
|
|
50
|
+
"PassDeployment6d7d2c50": {
|
|
51
51
|
"Type": "AWS::ApiGateway::Deployment",
|
|
52
52
|
"DependsOn": "PassMethod",
|
|
53
53
|
"Properties": {
|
|
@@ -232,7 +232,9 @@
|
|
|
232
232
|
"DependsOn": "PassFunctionRole",
|
|
233
233
|
"DeletionPolicy": "Delete",
|
|
234
234
|
"Properties": {
|
|
235
|
-
"PolicyName":
|
|
235
|
+
"PolicyName": {
|
|
236
|
+
"Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access"
|
|
237
|
+
},
|
|
236
238
|
"Roles": [
|
|
237
239
|
{
|
|
238
240
|
"Ref": "PassFunctionRole"
|
|
@@ -374,7 +376,9 @@
|
|
|
374
376
|
"DependsOn": "DestinationRole",
|
|
375
377
|
"DeletionPolicy": "Delete",
|
|
376
378
|
"Properties": {
|
|
377
|
-
"PolicyName":
|
|
379
|
+
"PolicyName": {
|
|
380
|
+
"Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access"
|
|
381
|
+
},
|
|
378
382
|
"Roles": [
|
|
379
383
|
{
|
|
380
384
|
"Ref": "DestinationRole"
|
|
@@ -430,4 +434,4 @@
|
|
|
430
434
|
}
|
|
431
435
|
}
|
|
432
436
|
}
|
|
433
|
-
}
|
|
437
|
+
}
|
|
@@ -24,7 +24,7 @@
|
|
|
24
24
|
"Type": "AWS::ApiGateway::Stage",
|
|
25
25
|
"Properties": {
|
|
26
26
|
"DeploymentId": {
|
|
27
|
-
"Ref": "
|
|
27
|
+
"Ref": "PassDeployment6d7d2c50"
|
|
28
28
|
},
|
|
29
29
|
"StageName": "hookshot",
|
|
30
30
|
"RestApiId": {
|
|
@@ -43,7 +43,7 @@
|
|
|
43
43
|
]
|
|
44
44
|
}
|
|
45
45
|
},
|
|
46
|
-
"
|
|
46
|
+
"PassDeployment6d7d2c50": {
|
|
47
47
|
"Type": "AWS::ApiGateway::Deployment",
|
|
48
48
|
"DependsOn": "PassMethod",
|
|
49
49
|
"Properties": {
|
|
@@ -226,7 +226,9 @@
|
|
|
226
226
|
"DependsOn": "PassFunctionRole",
|
|
227
227
|
"DeletionPolicy": "Delete",
|
|
228
228
|
"Properties": {
|
|
229
|
-
"PolicyName":
|
|
229
|
+
"PolicyName": {
|
|
230
|
+
"Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access"
|
|
231
|
+
},
|
|
230
232
|
"Roles": [
|
|
231
233
|
{
|
|
232
234
|
"Ref": "PassFunctionRole"
|
|
@@ -368,7 +370,9 @@
|
|
|
368
370
|
"DependsOn": "DestinationRole",
|
|
369
371
|
"DeletionPolicy": "Delete",
|
|
370
372
|
"Properties": {
|
|
371
|
-
"PolicyName":
|
|
373
|
+
"PolicyName": {
|
|
374
|
+
"Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access"
|
|
375
|
+
},
|
|
372
376
|
"Roles": [
|
|
373
377
|
{
|
|
374
378
|
"Ref": "DestinationRole"
|
|
@@ -422,4 +426,4 @@
|
|
|
422
426
|
"Value": "abc123"
|
|
423
427
|
}
|
|
424
428
|
}
|
|
425
|
-
}
|
|
429
|
+
}
|
|
@@ -24,7 +24,7 @@
|
|
|
24
24
|
"Type": "AWS::ApiGateway::Stage",
|
|
25
25
|
"Properties": {
|
|
26
26
|
"DeploymentId": {
|
|
27
|
-
"Ref": "
|
|
27
|
+
"Ref": "PassDeployment6d7d2c50"
|
|
28
28
|
},
|
|
29
29
|
"StageName": "hookshot",
|
|
30
30
|
"RestApiId": {
|
|
@@ -43,7 +43,7 @@
|
|
|
43
43
|
]
|
|
44
44
|
}
|
|
45
45
|
},
|
|
46
|
-
"
|
|
46
|
+
"PassDeployment6d7d2c50": {
|
|
47
47
|
"Type": "AWS::ApiGateway::Deployment",
|
|
48
48
|
"DependsOn": "PassMethod",
|
|
49
49
|
"Properties": {
|
|
@@ -234,7 +234,9 @@
|
|
|
234
234
|
"DependsOn": "PassFunctionRole",
|
|
235
235
|
"DeletionPolicy": "Delete",
|
|
236
236
|
"Properties": {
|
|
237
|
-
"PolicyName":
|
|
237
|
+
"PolicyName": {
|
|
238
|
+
"Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access"
|
|
239
|
+
},
|
|
238
240
|
"Roles": [
|
|
239
241
|
{
|
|
240
242
|
"Ref": "PassFunctionRole"
|
|
@@ -376,7 +378,9 @@
|
|
|
376
378
|
"DependsOn": "DestinationRole",
|
|
377
379
|
"DeletionPolicy": "Delete",
|
|
378
380
|
"Properties": {
|
|
379
|
-
"PolicyName":
|
|
381
|
+
"PolicyName": {
|
|
382
|
+
"Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access"
|
|
383
|
+
},
|
|
380
384
|
"Roles": [
|
|
381
385
|
{
|
|
382
386
|
"Ref": "DestinationRole"
|
|
@@ -432,4 +436,4 @@
|
|
|
432
436
|
}
|
|
433
437
|
}
|
|
434
438
|
}
|
|
435
|
-
}
|
|
439
|
+
}
|
|
@@ -24,7 +24,7 @@
|
|
|
24
24
|
"Type": "AWS::ApiGateway::Stage",
|
|
25
25
|
"Properties": {
|
|
26
26
|
"DeploymentId": {
|
|
27
|
-
"Ref": "
|
|
27
|
+
"Ref": "PassDeployment6d7d2c50"
|
|
28
28
|
},
|
|
29
29
|
"StageName": "hookshot",
|
|
30
30
|
"RestApiId": {
|
|
@@ -52,7 +52,7 @@
|
|
|
52
52
|
}
|
|
53
53
|
}
|
|
54
54
|
},
|
|
55
|
-
"
|
|
55
|
+
"PassDeployment6d7d2c50": {
|
|
56
56
|
"Type": "AWS::ApiGateway::Deployment",
|
|
57
57
|
"DependsOn": "PassMethod",
|
|
58
58
|
"Properties": {
|
|
@@ -230,7 +230,9 @@
|
|
|
230
230
|
"DependsOn": "PassFunctionRole",
|
|
231
231
|
"DeletionPolicy": "Delete",
|
|
232
232
|
"Properties": {
|
|
233
|
-
"PolicyName":
|
|
233
|
+
"PolicyName": {
|
|
234
|
+
"Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access"
|
|
235
|
+
},
|
|
234
236
|
"Roles": [
|
|
235
237
|
{
|
|
236
238
|
"Ref": "PassFunctionRole"
|
|
@@ -372,7 +374,9 @@
|
|
|
372
374
|
"DependsOn": "DestinationRole",
|
|
373
375
|
"DeletionPolicy": "Delete",
|
|
374
376
|
"Properties": {
|
|
375
|
-
"PolicyName":
|
|
377
|
+
"PolicyName": {
|
|
378
|
+
"Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access"
|
|
379
|
+
},
|
|
376
380
|
"Roles": [
|
|
377
381
|
{
|
|
378
382
|
"Ref": "DestinationRole"
|
|
@@ -428,4 +432,4 @@
|
|
|
428
432
|
}
|
|
429
433
|
}
|
|
430
434
|
}
|
|
431
|
-
}
|
|
435
|
+
}
|
|
@@ -24,7 +24,7 @@
|
|
|
24
24
|
"Type": "AWS::ApiGateway::Stage",
|
|
25
25
|
"Properties": {
|
|
26
26
|
"DeploymentId": {
|
|
27
|
-
"Ref": "
|
|
27
|
+
"Ref": "PassDeployment6d7d2c50"
|
|
28
28
|
},
|
|
29
29
|
"StageName": "hookshot",
|
|
30
30
|
"RestApiId": {
|
|
@@ -43,7 +43,7 @@
|
|
|
43
43
|
]
|
|
44
44
|
}
|
|
45
45
|
},
|
|
46
|
-
"
|
|
46
|
+
"PassDeployment6d7d2c50": {
|
|
47
47
|
"Type": "AWS::ApiGateway::Deployment",
|
|
48
48
|
"DependsOn": "PassMethod",
|
|
49
49
|
"Properties": {
|
|
@@ -214,7 +214,9 @@
|
|
|
214
214
|
"DependsOn": "PassFunctionRole",
|
|
215
215
|
"DeletionPolicy": "Delete",
|
|
216
216
|
"Properties": {
|
|
217
|
-
"PolicyName":
|
|
217
|
+
"PolicyName": {
|
|
218
|
+
"Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access"
|
|
219
|
+
},
|
|
218
220
|
"Roles": [
|
|
219
221
|
{
|
|
220
222
|
"Ref": "PassFunctionRole"
|
|
@@ -356,7 +358,9 @@
|
|
|
356
358
|
"DependsOn": "DestinationRole",
|
|
357
359
|
"DeletionPolicy": "Delete",
|
|
358
360
|
"Properties": {
|
|
359
|
-
"PolicyName":
|
|
361
|
+
"PolicyName": {
|
|
362
|
+
"Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access"
|
|
363
|
+
},
|
|
360
364
|
"Roles": [
|
|
361
365
|
{
|
|
362
366
|
"Ref": "DestinationRole"
|
|
@@ -412,4 +416,4 @@
|
|
|
412
416
|
}
|
|
413
417
|
}
|
|
414
418
|
}
|
|
415
|
-
}
|
|
419
|
+
}
|
|
@@ -212,7 +212,7 @@
|
|
|
212
212
|
"DependsOn": "PassFunctionRole",
|
|
213
213
|
"DeletionPolicy": "Delete",
|
|
214
214
|
"Properties": {
|
|
215
|
-
"PolicyName": "PassFunction-lambda-log-access",
|
|
215
|
+
"PolicyName": { "Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access" },
|
|
216
216
|
"Roles": [
|
|
217
217
|
{
|
|
218
218
|
"Ref": "PassFunctionRole"
|
|
@@ -354,7 +354,7 @@
|
|
|
354
354
|
"DependsOn": "DestinationRole",
|
|
355
355
|
"DeletionPolicy": "Delete",
|
|
356
356
|
"Properties": {
|
|
357
|
-
"PolicyName": "Destination-lambda-log-access",
|
|
357
|
+
"PolicyName": { "Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access" },
|
|
358
358
|
"Roles": [
|
|
359
359
|
{
|
|
360
360
|
"Ref": "DestinationRole"
|
|
@@ -24,7 +24,7 @@
|
|
|
24
24
|
"Type": "AWS::ApiGateway::Stage",
|
|
25
25
|
"Properties": {
|
|
26
26
|
"DeploymentId": {
|
|
27
|
-
"Ref": "
|
|
27
|
+
"Ref": "PassDeployment6d7d2c50"
|
|
28
28
|
},
|
|
29
29
|
"StageName": "hookshot",
|
|
30
30
|
"RestApiId": {
|
|
@@ -43,7 +43,7 @@
|
|
|
43
43
|
]
|
|
44
44
|
}
|
|
45
45
|
},
|
|
46
|
-
"
|
|
46
|
+
"PassDeployment6d7d2c50": {
|
|
47
47
|
"Type": "AWS::ApiGateway::Deployment",
|
|
48
48
|
"DependsOn": "PassMethod",
|
|
49
49
|
"Properties": {
|
|
@@ -212,7 +212,9 @@
|
|
|
212
212
|
"DependsOn": "PassFunctionRole",
|
|
213
213
|
"DeletionPolicy": "Delete",
|
|
214
214
|
"Properties": {
|
|
215
|
-
"PolicyName":
|
|
215
|
+
"PolicyName": {
|
|
216
|
+
"Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access"
|
|
217
|
+
},
|
|
216
218
|
"Roles": [
|
|
217
219
|
{
|
|
218
220
|
"Ref": "PassFunctionRole"
|
|
@@ -354,7 +356,9 @@
|
|
|
354
356
|
"DependsOn": "DestinationRole",
|
|
355
357
|
"DeletionPolicy": "Delete",
|
|
356
358
|
"Properties": {
|
|
357
|
-
"PolicyName":
|
|
359
|
+
"PolicyName": {
|
|
360
|
+
"Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access"
|
|
361
|
+
},
|
|
358
362
|
"Roles": [
|
|
359
363
|
{
|
|
360
364
|
"Ref": "DestinationRole"
|
|
@@ -410,4 +414,4 @@
|
|
|
410
414
|
}
|
|
411
415
|
}
|
|
412
416
|
}
|
|
413
|
-
}
|
|
417
|
+
}
|
|
@@ -24,7 +24,7 @@
|
|
|
24
24
|
"Type": "AWS::ApiGateway::Stage",
|
|
25
25
|
"Properties": {
|
|
26
26
|
"DeploymentId": {
|
|
27
|
-
"Ref": "
|
|
27
|
+
"Ref": "PassDeployment6d7d2c50"
|
|
28
28
|
},
|
|
29
29
|
"StageName": "hookshot",
|
|
30
30
|
"RestApiId": {
|
|
@@ -43,7 +43,7 @@
|
|
|
43
43
|
]
|
|
44
44
|
}
|
|
45
45
|
},
|
|
46
|
-
"
|
|
46
|
+
"PassDeployment6d7d2c50": {
|
|
47
47
|
"Type": "AWS::ApiGateway::Deployment",
|
|
48
48
|
"DependsOn": "PassMethod",
|
|
49
49
|
"Properties": {
|
|
@@ -212,7 +212,9 @@
|
|
|
212
212
|
"DependsOn": "PassFunctionRole",
|
|
213
213
|
"DeletionPolicy": "Delete",
|
|
214
214
|
"Properties": {
|
|
215
|
-
"PolicyName":
|
|
215
|
+
"PolicyName": {
|
|
216
|
+
"Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access"
|
|
217
|
+
},
|
|
216
218
|
"Roles": [
|
|
217
219
|
{
|
|
218
220
|
"Ref": "PassFunctionRole"
|
|
@@ -354,7 +356,9 @@
|
|
|
354
356
|
"DependsOn": "DestinationRole",
|
|
355
357
|
"DeletionPolicy": "Delete",
|
|
356
358
|
"Properties": {
|
|
357
|
-
"PolicyName":
|
|
359
|
+
"PolicyName": {
|
|
360
|
+
"Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access"
|
|
361
|
+
},
|
|
358
362
|
"Roles": [
|
|
359
363
|
{
|
|
360
364
|
"Ref": "DestinationRole"
|
|
@@ -410,4 +414,4 @@
|
|
|
410
414
|
}
|
|
411
415
|
}
|
|
412
416
|
}
|
|
413
|
-
}
|
|
417
|
+
}
|
|
@@ -24,7 +24,7 @@
|
|
|
24
24
|
"Type": "AWS::ApiGateway::Stage",
|
|
25
25
|
"Properties": {
|
|
26
26
|
"DeploymentId": {
|
|
27
|
-
"Ref": "
|
|
27
|
+
"Ref": "PassDeployment6d7d2c50"
|
|
28
28
|
},
|
|
29
29
|
"StageName": "hookshot",
|
|
30
30
|
"RestApiId": {
|
|
@@ -43,7 +43,7 @@
|
|
|
43
43
|
]
|
|
44
44
|
}
|
|
45
45
|
},
|
|
46
|
-
"
|
|
46
|
+
"PassDeployment6d7d2c50": {
|
|
47
47
|
"Type": "AWS::ApiGateway::Deployment",
|
|
48
48
|
"DependsOn": "PassMethod",
|
|
49
49
|
"Properties": {
|
|
@@ -212,7 +212,9 @@
|
|
|
212
212
|
"DependsOn": "PassFunctionRole",
|
|
213
213
|
"DeletionPolicy": "Delete",
|
|
214
214
|
"Properties": {
|
|
215
|
-
"PolicyName":
|
|
215
|
+
"PolicyName": {
|
|
216
|
+
"Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access"
|
|
217
|
+
},
|
|
216
218
|
"Roles": [
|
|
217
219
|
{
|
|
218
220
|
"Ref": "PassFunctionRole"
|
|
@@ -354,7 +356,9 @@
|
|
|
354
356
|
"DependsOn": "DestinationRole",
|
|
355
357
|
"DeletionPolicy": "Delete",
|
|
356
358
|
"Properties": {
|
|
357
|
-
"PolicyName":
|
|
359
|
+
"PolicyName": {
|
|
360
|
+
"Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access"
|
|
361
|
+
},
|
|
358
362
|
"Roles": [
|
|
359
363
|
{
|
|
360
364
|
"Ref": "DestinationRole"
|
|
@@ -410,4 +414,4 @@
|
|
|
410
414
|
}
|
|
411
415
|
}
|
|
412
416
|
}
|
|
413
|
-
}
|
|
417
|
+
}
|
|
@@ -24,7 +24,7 @@
|
|
|
24
24
|
"Type": "AWS::ApiGateway::Stage",
|
|
25
25
|
"Properties": {
|
|
26
26
|
"DeploymentId": {
|
|
27
|
-
"Ref": "
|
|
27
|
+
"Ref": "PassDeployment6d7d2c50"
|
|
28
28
|
},
|
|
29
29
|
"StageName": "hookshot",
|
|
30
30
|
"RestApiId": {
|
|
@@ -43,7 +43,7 @@
|
|
|
43
43
|
]
|
|
44
44
|
}
|
|
45
45
|
},
|
|
46
|
-
"
|
|
46
|
+
"PassDeployment6d7d2c50": {
|
|
47
47
|
"Type": "AWS::ApiGateway::Deployment",
|
|
48
48
|
"DependsOn": "PassMethod",
|
|
49
49
|
"Properties": {
|
|
@@ -212,7 +212,9 @@
|
|
|
212
212
|
"DependsOn": "PassFunctionRole",
|
|
213
213
|
"DeletionPolicy": "Delete",
|
|
214
214
|
"Properties": {
|
|
215
|
-
"PolicyName":
|
|
215
|
+
"PolicyName": {
|
|
216
|
+
"Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access"
|
|
217
|
+
},
|
|
216
218
|
"Roles": [
|
|
217
219
|
{
|
|
218
220
|
"Ref": "PassFunctionRole"
|
|
@@ -354,7 +356,9 @@
|
|
|
354
356
|
"DependsOn": "DestinationRole",
|
|
355
357
|
"DeletionPolicy": "Delete",
|
|
356
358
|
"Properties": {
|
|
357
|
-
"PolicyName":
|
|
359
|
+
"PolicyName": {
|
|
360
|
+
"Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access"
|
|
361
|
+
},
|
|
358
362
|
"Roles": [
|
|
359
363
|
{
|
|
360
364
|
"Ref": "DestinationRole"
|
|
@@ -410,4 +414,4 @@
|
|
|
410
414
|
}
|
|
411
415
|
}
|
|
412
416
|
}
|
|
413
|
-
}
|
|
417
|
+
}
|
|
@@ -88,7 +88,9 @@
|
|
|
88
88
|
"DependsOn": "MyLambdaRole",
|
|
89
89
|
"DeletionPolicy": "Delete",
|
|
90
90
|
"Properties": {
|
|
91
|
-
"PolicyName":
|
|
91
|
+
"PolicyName": {
|
|
92
|
+
"Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
|
|
93
|
+
},
|
|
92
94
|
"Roles": [
|
|
93
95
|
{
|
|
94
96
|
"Ref": "MyLambdaRole"
|
|
@@ -131,4 +133,4 @@
|
|
|
131
133
|
}
|
|
132
134
|
},
|
|
133
135
|
"Outputs": {}
|
|
134
|
-
}
|
|
136
|
+
}
|
|
@@ -86,7 +86,9 @@
|
|
|
86
86
|
"DependsOn": "MyLambdaRole",
|
|
87
87
|
"DeletionPolicy": "Delete",
|
|
88
88
|
"Properties": {
|
|
89
|
-
"PolicyName":
|
|
89
|
+
"PolicyName": {
|
|
90
|
+
"Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
|
|
91
|
+
},
|
|
90
92
|
"Roles": [
|
|
91
93
|
{
|
|
92
94
|
"Ref": "MyLambdaRole"
|
|
@@ -129,4 +131,4 @@
|
|
|
129
131
|
}
|
|
130
132
|
},
|
|
131
133
|
"Outputs": {}
|
|
132
|
-
}
|
|
134
|
+
}
|
|
@@ -122,7 +122,9 @@
|
|
|
122
122
|
"DependsOn": "MyLambdaRole",
|
|
123
123
|
"DeletionPolicy": "Delete",
|
|
124
124
|
"Properties": {
|
|
125
|
-
"PolicyName":
|
|
125
|
+
"PolicyName": {
|
|
126
|
+
"Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
|
|
127
|
+
},
|
|
126
128
|
"Roles": [
|
|
127
129
|
{
|
|
128
130
|
"Ref": "MyLambdaRole"
|
|
@@ -181,4 +183,4 @@
|
|
|
181
183
|
}
|
|
182
184
|
},
|
|
183
185
|
"Outputs": {}
|
|
184
|
-
}
|
|
186
|
+
}
|
|
@@ -87,7 +87,9 @@
|
|
|
87
87
|
"Type": "AWS::IAM::Policy",
|
|
88
88
|
"DeletionPolicy": "Delete",
|
|
89
89
|
"Properties": {
|
|
90
|
-
"PolicyName":
|
|
90
|
+
"PolicyName": {
|
|
91
|
+
"Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
|
|
92
|
+
},
|
|
91
93
|
"Roles": [
|
|
92
94
|
{
|
|
93
95
|
"Fn::Select": [
|
|
@@ -131,4 +133,4 @@
|
|
|
131
133
|
}
|
|
132
134
|
},
|
|
133
135
|
"Outputs": {}
|
|
134
|
-
}
|
|
136
|
+
}
|
|
@@ -87,7 +87,9 @@
|
|
|
87
87
|
"DependsOn": "MyLambdaRole",
|
|
88
88
|
"DeletionPolicy": "Delete",
|
|
89
89
|
"Properties": {
|
|
90
|
-
"PolicyName":
|
|
90
|
+
"PolicyName": {
|
|
91
|
+
"Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
|
|
92
|
+
},
|
|
91
93
|
"Roles": [
|
|
92
94
|
{
|
|
93
95
|
"Ref": "MyLambdaRole"
|
|
@@ -130,4 +132,4 @@
|
|
|
130
132
|
}
|
|
131
133
|
},
|
|
132
134
|
"Outputs": {}
|
|
133
|
-
}
|
|
135
|
+
}
|
|
@@ -88,7 +88,9 @@
|
|
|
88
88
|
"DependsOn": "MyLambdaRole",
|
|
89
89
|
"DeletionPolicy": "Delete",
|
|
90
90
|
"Properties": {
|
|
91
|
-
"PolicyName":
|
|
91
|
+
"PolicyName": {
|
|
92
|
+
"Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
|
|
93
|
+
},
|
|
92
94
|
"Roles": [
|
|
93
95
|
{
|
|
94
96
|
"Ref": "MyLambdaRole"
|
|
@@ -167,4 +169,4 @@
|
|
|
167
169
|
}
|
|
168
170
|
},
|
|
169
171
|
"Outputs": {}
|
|
170
|
-
}
|
|
172
|
+
}
|
|
@@ -88,7 +88,9 @@
|
|
|
88
88
|
"DependsOn": "MyLambdaRole",
|
|
89
89
|
"DeletionPolicy": "Delete",
|
|
90
90
|
"Properties": {
|
|
91
|
-
"PolicyName":
|
|
91
|
+
"PolicyName": {
|
|
92
|
+
"Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
|
|
93
|
+
},
|
|
92
94
|
"Roles": [
|
|
93
95
|
{
|
|
94
96
|
"Ref": "MyLambdaRole"
|
|
@@ -167,4 +169,4 @@
|
|
|
167
169
|
}
|
|
168
170
|
},
|
|
169
171
|
"Outputs": {}
|
|
170
|
-
}
|
|
172
|
+
}
|
|
@@ -89,7 +89,9 @@
|
|
|
89
89
|
"DependsOn": "MyLambdaRole",
|
|
90
90
|
"DeletionPolicy": "Delete",
|
|
91
91
|
"Properties": {
|
|
92
|
-
"PolicyName":
|
|
92
|
+
"PolicyName": {
|
|
93
|
+
"Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
|
|
94
|
+
},
|
|
93
95
|
"Roles": [
|
|
94
96
|
{
|
|
95
97
|
"Ref": "MyLambdaRole"
|
|
@@ -172,4 +174,4 @@
|
|
|
172
174
|
}
|
|
173
175
|
},
|
|
174
176
|
"Outputs": {}
|
|
175
|
-
}
|
|
177
|
+
}
|