@mapbox/cloudfriend 9.2.0-0 → 9.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.nyc_output/2b544c0b-2830-4ad0-97cd-8e661710b0bb.json +1 -0
- package/.nyc_output/65e58b48-bf1c-412d-8dd4-d7b564b12d76.json +1 -0
- package/.nyc_output/processinfo/{e1868cff-0dd0-46eb-866d-70c3b666dae8.json → 2b544c0b-2830-4ad0-97cd-8e661710b0bb.json} +1 -1
- package/.nyc_output/processinfo/{0030e99c-2d96-4ac6-a2b2-bffd93da01bc.json → 65e58b48-bf1c-412d-8dd4-d7b564b12d76.json} +1 -1
- package/.nyc_output/processinfo/index.json +1 -1
- package/changelog.md +4 -0
- package/lib/shortcuts/api.md +1 -0
- package/lib/shortcuts/lambda.js +4 -2
- package/package.json +1 -1
- package/test/fixtures/shortcuts/event-lambda-defaults.json +4 -2
- package/test/fixtures/shortcuts/event-lambda-full.json +4 -2
- package/test/fixtures/shortcuts/hookshot-github-secret-ref.json +9 -5
- package/test/fixtures/shortcuts/hookshot-github-secret-string.json +9 -5
- package/test/fixtures/shortcuts/hookshot-github.json +9 -5
- package/test/fixtures/shortcuts/hookshot-passthrough-access-log-format.json +9 -5
- package/test/fixtures/shortcuts/hookshot-passthrough-alarms.json +9 -5
- package/test/fixtures/shortcuts/hookshot-passthrough-enhanced-logging.json +9 -5
- package/test/fixtures/shortcuts/hookshot-passthrough-full-blown-logging.json +9 -5
- package/test/fixtures/shortcuts/hookshot-passthrough-logging.json +9 -5
- package/test/fixtures/shortcuts/hookshot-passthrough.json +9 -5
- package/test/fixtures/shortcuts/lambda-defaults.json +4 -2
- package/test/fixtures/shortcuts/lambda-docker.json +4 -2
- package/test/fixtures/shortcuts/lambda-full.json +4 -2
- package/test/fixtures/shortcuts/lambda-provided-role.json +4 -2
- package/test/fixtures/shortcuts/lambda-zipfile.json +4 -2
- package/test/fixtures/shortcuts/log-subscription-lambda-defaults.json +4 -2
- package/test/fixtures/shortcuts/log-subscription-lambda-no-defaults.json +4 -2
- package/test/fixtures/shortcuts/queue-lambda-zero.json +4 -2
- package/test/fixtures/shortcuts/queue-lambda.json +4 -2
- package/test/fixtures/shortcuts/scheduled-lambda-defaults.json +4 -2
- package/test/fixtures/shortcuts/scheduled-lambda-full.json +4 -2
- package/test/fixtures/shortcuts/stream-lambda-defaults.json +4 -2
- package/test/fixtures/shortcuts/stream-lambda-no-defaults.json +4 -2
- package/test/shortcuts.test.js +16 -0
- package/.nyc_output/0030e99c-2d96-4ac6-a2b2-bffd93da01bc.json +0 -1
- package/.nyc_output/e1868cff-0dd0-46eb-866d-70c3b666dae8.json +0 -1
package/lib/shortcuts/api.md
CHANGED
|
@@ -425,6 +425,7 @@ Log Group, a Role, an Alarm on function errors, and the Lambda Function itself.
|
|
|
425
425
|
| [options.OKActions] | <code>Array.<String></code> | | See [AWS documentation](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cw-alarm.html#cfn-cloudwatch-alarms-okactions). |
|
|
426
426
|
| [options.LogRetentionInDays] | <code>Number</code> | <code>14</code> | How long to retain CloudWatch logs for this Lambda function. See [AWS Documentation](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-logs-loggroup.html) for allowed values. |
|
|
427
427
|
| [options.LogPolicyDeletionPolicy] | <code>String</code> | <code>'Delete'</code> | DeletionPolicy on the IAM Policy resource used to access Logs. See [AWS Documentation](https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-attribute-deletionpolicy.html) for allowed values. |
|
|
428
|
+
| [options.LogPolicyName] | <code>String</code> | <code>'${stack-name}-${logical-name}-lambda-log-access'</code> | The name of the IAM Policy used to access CloudWatch Logs. |
|
|
428
429
|
|
|
429
430
|
**Example**
|
|
430
431
|
```js
|
package/lib/shortcuts/lambda.js
CHANGED
|
@@ -49,6 +49,7 @@ const ServiceRole = require('./service-role');
|
|
|
49
49
|
* @param {Array<String>} [options.OKActions=undefined] - See [AWS documentation](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cw-alarm.html#cfn-cloudwatch-alarms-okactions).
|
|
50
50
|
* @param {Number} [options.LogRetentionInDays=14] - How long to retain CloudWatch logs for this Lambda function. See [AWS Documentation](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-logs-loggroup.html) for allowed values.
|
|
51
51
|
* @param {String} [options.LogPolicyDeletionPolicy='Delete'] - DeletionPolicy on the IAM Policy resource used to access Logs. See [AWS Documentation](https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-attribute-deletionpolicy.html) for allowed values.
|
|
52
|
+
* @param {String} [options.LogPolicyName='${stack-name}-${logical-name}-lambda-log-access'] - The name of the IAM Policy used to access CloudWatch Logs.
|
|
52
53
|
* @example
|
|
53
54
|
* const cf = require('@mapbox/cloudfriend');
|
|
54
55
|
*
|
|
@@ -109,7 +110,8 @@ class Lambda {
|
|
|
109
110
|
ExtendedStatistic,
|
|
110
111
|
OKActions,
|
|
111
112
|
LogRetentionInDays = 14,
|
|
112
|
-
LogPolicyDeletionPolicy = 'Delete'
|
|
113
|
+
LogPolicyDeletionPolicy = 'Delete',
|
|
114
|
+
LogPolicyName = { 'Fn::Sub': `\${AWS::StackName}-${LogicalName}-lambda-log-access` }
|
|
113
115
|
} = options;
|
|
114
116
|
|
|
115
117
|
if (options.EvaluationPeriods < Math.ceil(Timeout / Period))
|
|
@@ -205,7 +207,7 @@ class Lambda {
|
|
|
205
207
|
DependsOn: (RoleArn) ? undefined : `${LogicalName}Role`,
|
|
206
208
|
DeletionPolicy: LogPolicyDeletionPolicy,
|
|
207
209
|
Properties: {
|
|
208
|
-
PolicyName:
|
|
210
|
+
PolicyName: LogPolicyName,
|
|
209
211
|
Roles: [roleName],
|
|
210
212
|
PolicyDocument: {
|
|
211
213
|
Version: '2012-10-17',
|
package/package.json
CHANGED
|
@@ -88,7 +88,9 @@
|
|
|
88
88
|
"DependsOn": "MyLambdaRole",
|
|
89
89
|
"DeletionPolicy": "Delete",
|
|
90
90
|
"Properties": {
|
|
91
|
-
"PolicyName": {
|
|
91
|
+
"PolicyName": {
|
|
92
|
+
"Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
|
|
93
|
+
},
|
|
92
94
|
"Roles": [
|
|
93
95
|
{
|
|
94
96
|
"Ref": "MyLambdaRole"
|
|
@@ -197,4 +199,4 @@
|
|
|
197
199
|
}
|
|
198
200
|
},
|
|
199
201
|
"Outputs": {}
|
|
200
|
-
}
|
|
202
|
+
}
|
|
@@ -88,7 +88,9 @@
|
|
|
88
88
|
"DependsOn": "MyLambdaRole",
|
|
89
89
|
"DeletionPolicy": "Delete",
|
|
90
90
|
"Properties": {
|
|
91
|
-
"PolicyName": {
|
|
91
|
+
"PolicyName": {
|
|
92
|
+
"Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
|
|
93
|
+
},
|
|
92
94
|
"Roles": [
|
|
93
95
|
{
|
|
94
96
|
"Ref": "MyLambdaRole"
|
|
@@ -197,4 +199,4 @@
|
|
|
197
199
|
}
|
|
198
200
|
},
|
|
199
201
|
"Outputs": {}
|
|
200
|
-
}
|
|
202
|
+
}
|
|
@@ -28,7 +28,7 @@
|
|
|
28
28
|
"Type": "AWS::ApiGateway::Stage",
|
|
29
29
|
"Properties": {
|
|
30
30
|
"DeploymentId": {
|
|
31
|
-
"Ref": "
|
|
31
|
+
"Ref": "PassDeployment6d7d2c50"
|
|
32
32
|
},
|
|
33
33
|
"StageName": "hookshot",
|
|
34
34
|
"RestApiId": {
|
|
@@ -47,7 +47,7 @@
|
|
|
47
47
|
]
|
|
48
48
|
}
|
|
49
49
|
},
|
|
50
|
-
"
|
|
50
|
+
"PassDeployment6d7d2c50": {
|
|
51
51
|
"Type": "AWS::ApiGateway::Deployment",
|
|
52
52
|
"DependsOn": "PassMethod",
|
|
53
53
|
"Properties": {
|
|
@@ -232,7 +232,9 @@
|
|
|
232
232
|
"DependsOn": "PassFunctionRole",
|
|
233
233
|
"DeletionPolicy": "Delete",
|
|
234
234
|
"Properties": {
|
|
235
|
-
"PolicyName": {
|
|
235
|
+
"PolicyName": {
|
|
236
|
+
"Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access"
|
|
237
|
+
},
|
|
236
238
|
"Roles": [
|
|
237
239
|
{
|
|
238
240
|
"Ref": "PassFunctionRole"
|
|
@@ -374,7 +376,9 @@
|
|
|
374
376
|
"DependsOn": "DestinationRole",
|
|
375
377
|
"DeletionPolicy": "Delete",
|
|
376
378
|
"Properties": {
|
|
377
|
-
"PolicyName": {
|
|
379
|
+
"PolicyName": {
|
|
380
|
+
"Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access"
|
|
381
|
+
},
|
|
378
382
|
"Roles": [
|
|
379
383
|
{
|
|
380
384
|
"Ref": "DestinationRole"
|
|
@@ -430,4 +434,4 @@
|
|
|
430
434
|
}
|
|
431
435
|
}
|
|
432
436
|
}
|
|
433
|
-
}
|
|
437
|
+
}
|
|
@@ -24,7 +24,7 @@
|
|
|
24
24
|
"Type": "AWS::ApiGateway::Stage",
|
|
25
25
|
"Properties": {
|
|
26
26
|
"DeploymentId": {
|
|
27
|
-
"Ref": "
|
|
27
|
+
"Ref": "PassDeployment6d7d2c50"
|
|
28
28
|
},
|
|
29
29
|
"StageName": "hookshot",
|
|
30
30
|
"RestApiId": {
|
|
@@ -43,7 +43,7 @@
|
|
|
43
43
|
]
|
|
44
44
|
}
|
|
45
45
|
},
|
|
46
|
-
"
|
|
46
|
+
"PassDeployment6d7d2c50": {
|
|
47
47
|
"Type": "AWS::ApiGateway::Deployment",
|
|
48
48
|
"DependsOn": "PassMethod",
|
|
49
49
|
"Properties": {
|
|
@@ -226,7 +226,9 @@
|
|
|
226
226
|
"DependsOn": "PassFunctionRole",
|
|
227
227
|
"DeletionPolicy": "Delete",
|
|
228
228
|
"Properties": {
|
|
229
|
-
"PolicyName": {
|
|
229
|
+
"PolicyName": {
|
|
230
|
+
"Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access"
|
|
231
|
+
},
|
|
230
232
|
"Roles": [
|
|
231
233
|
{
|
|
232
234
|
"Ref": "PassFunctionRole"
|
|
@@ -368,7 +370,9 @@
|
|
|
368
370
|
"DependsOn": "DestinationRole",
|
|
369
371
|
"DeletionPolicy": "Delete",
|
|
370
372
|
"Properties": {
|
|
371
|
-
"PolicyName": {
|
|
373
|
+
"PolicyName": {
|
|
374
|
+
"Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access"
|
|
375
|
+
},
|
|
372
376
|
"Roles": [
|
|
373
377
|
{
|
|
374
378
|
"Ref": "DestinationRole"
|
|
@@ -422,4 +426,4 @@
|
|
|
422
426
|
"Value": "abc123"
|
|
423
427
|
}
|
|
424
428
|
}
|
|
425
|
-
}
|
|
429
|
+
}
|
|
@@ -24,7 +24,7 @@
|
|
|
24
24
|
"Type": "AWS::ApiGateway::Stage",
|
|
25
25
|
"Properties": {
|
|
26
26
|
"DeploymentId": {
|
|
27
|
-
"Ref": "
|
|
27
|
+
"Ref": "PassDeployment6d7d2c50"
|
|
28
28
|
},
|
|
29
29
|
"StageName": "hookshot",
|
|
30
30
|
"RestApiId": {
|
|
@@ -43,7 +43,7 @@
|
|
|
43
43
|
]
|
|
44
44
|
}
|
|
45
45
|
},
|
|
46
|
-
"
|
|
46
|
+
"PassDeployment6d7d2c50": {
|
|
47
47
|
"Type": "AWS::ApiGateway::Deployment",
|
|
48
48
|
"DependsOn": "PassMethod",
|
|
49
49
|
"Properties": {
|
|
@@ -234,7 +234,9 @@
|
|
|
234
234
|
"DependsOn": "PassFunctionRole",
|
|
235
235
|
"DeletionPolicy": "Delete",
|
|
236
236
|
"Properties": {
|
|
237
|
-
"PolicyName": {
|
|
237
|
+
"PolicyName": {
|
|
238
|
+
"Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access"
|
|
239
|
+
},
|
|
238
240
|
"Roles": [
|
|
239
241
|
{
|
|
240
242
|
"Ref": "PassFunctionRole"
|
|
@@ -376,7 +378,9 @@
|
|
|
376
378
|
"DependsOn": "DestinationRole",
|
|
377
379
|
"DeletionPolicy": "Delete",
|
|
378
380
|
"Properties": {
|
|
379
|
-
"PolicyName": {
|
|
381
|
+
"PolicyName": {
|
|
382
|
+
"Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access"
|
|
383
|
+
},
|
|
380
384
|
"Roles": [
|
|
381
385
|
{
|
|
382
386
|
"Ref": "DestinationRole"
|
|
@@ -432,4 +436,4 @@
|
|
|
432
436
|
}
|
|
433
437
|
}
|
|
434
438
|
}
|
|
435
|
-
}
|
|
439
|
+
}
|
|
@@ -24,7 +24,7 @@
|
|
|
24
24
|
"Type": "AWS::ApiGateway::Stage",
|
|
25
25
|
"Properties": {
|
|
26
26
|
"DeploymentId": {
|
|
27
|
-
"Ref": "
|
|
27
|
+
"Ref": "PassDeployment6d7d2c50"
|
|
28
28
|
},
|
|
29
29
|
"StageName": "hookshot",
|
|
30
30
|
"RestApiId": {
|
|
@@ -52,7 +52,7 @@
|
|
|
52
52
|
}
|
|
53
53
|
}
|
|
54
54
|
},
|
|
55
|
-
"
|
|
55
|
+
"PassDeployment6d7d2c50": {
|
|
56
56
|
"Type": "AWS::ApiGateway::Deployment",
|
|
57
57
|
"DependsOn": "PassMethod",
|
|
58
58
|
"Properties": {
|
|
@@ -230,7 +230,9 @@
|
|
|
230
230
|
"DependsOn": "PassFunctionRole",
|
|
231
231
|
"DeletionPolicy": "Delete",
|
|
232
232
|
"Properties": {
|
|
233
|
-
"PolicyName": {
|
|
233
|
+
"PolicyName": {
|
|
234
|
+
"Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access"
|
|
235
|
+
},
|
|
234
236
|
"Roles": [
|
|
235
237
|
{
|
|
236
238
|
"Ref": "PassFunctionRole"
|
|
@@ -372,7 +374,9 @@
|
|
|
372
374
|
"DependsOn": "DestinationRole",
|
|
373
375
|
"DeletionPolicy": "Delete",
|
|
374
376
|
"Properties": {
|
|
375
|
-
"PolicyName": {
|
|
377
|
+
"PolicyName": {
|
|
378
|
+
"Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access"
|
|
379
|
+
},
|
|
376
380
|
"Roles": [
|
|
377
381
|
{
|
|
378
382
|
"Ref": "DestinationRole"
|
|
@@ -428,4 +432,4 @@
|
|
|
428
432
|
}
|
|
429
433
|
}
|
|
430
434
|
}
|
|
431
|
-
}
|
|
435
|
+
}
|
|
@@ -24,7 +24,7 @@
|
|
|
24
24
|
"Type": "AWS::ApiGateway::Stage",
|
|
25
25
|
"Properties": {
|
|
26
26
|
"DeploymentId": {
|
|
27
|
-
"Ref": "
|
|
27
|
+
"Ref": "PassDeployment6d7d2c50"
|
|
28
28
|
},
|
|
29
29
|
"StageName": "hookshot",
|
|
30
30
|
"RestApiId": {
|
|
@@ -43,7 +43,7 @@
|
|
|
43
43
|
]
|
|
44
44
|
}
|
|
45
45
|
},
|
|
46
|
-
"
|
|
46
|
+
"PassDeployment6d7d2c50": {
|
|
47
47
|
"Type": "AWS::ApiGateway::Deployment",
|
|
48
48
|
"DependsOn": "PassMethod",
|
|
49
49
|
"Properties": {
|
|
@@ -214,7 +214,9 @@
|
|
|
214
214
|
"DependsOn": "PassFunctionRole",
|
|
215
215
|
"DeletionPolicy": "Delete",
|
|
216
216
|
"Properties": {
|
|
217
|
-
"PolicyName": {
|
|
217
|
+
"PolicyName": {
|
|
218
|
+
"Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access"
|
|
219
|
+
},
|
|
218
220
|
"Roles": [
|
|
219
221
|
{
|
|
220
222
|
"Ref": "PassFunctionRole"
|
|
@@ -356,7 +358,9 @@
|
|
|
356
358
|
"DependsOn": "DestinationRole",
|
|
357
359
|
"DeletionPolicy": "Delete",
|
|
358
360
|
"Properties": {
|
|
359
|
-
"PolicyName": {
|
|
361
|
+
"PolicyName": {
|
|
362
|
+
"Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access"
|
|
363
|
+
},
|
|
360
364
|
"Roles": [
|
|
361
365
|
{
|
|
362
366
|
"Ref": "DestinationRole"
|
|
@@ -412,4 +416,4 @@
|
|
|
412
416
|
}
|
|
413
417
|
}
|
|
414
418
|
}
|
|
415
|
-
}
|
|
419
|
+
}
|
|
@@ -24,7 +24,7 @@
|
|
|
24
24
|
"Type": "AWS::ApiGateway::Stage",
|
|
25
25
|
"Properties": {
|
|
26
26
|
"DeploymentId": {
|
|
27
|
-
"Ref": "
|
|
27
|
+
"Ref": "PassDeployment6d7d2c50"
|
|
28
28
|
},
|
|
29
29
|
"StageName": "hookshot",
|
|
30
30
|
"RestApiId": {
|
|
@@ -43,7 +43,7 @@
|
|
|
43
43
|
]
|
|
44
44
|
}
|
|
45
45
|
},
|
|
46
|
-
"
|
|
46
|
+
"PassDeployment6d7d2c50": {
|
|
47
47
|
"Type": "AWS::ApiGateway::Deployment",
|
|
48
48
|
"DependsOn": "PassMethod",
|
|
49
49
|
"Properties": {
|
|
@@ -212,7 +212,9 @@
|
|
|
212
212
|
"DependsOn": "PassFunctionRole",
|
|
213
213
|
"DeletionPolicy": "Delete",
|
|
214
214
|
"Properties": {
|
|
215
|
-
"PolicyName": {
|
|
215
|
+
"PolicyName": {
|
|
216
|
+
"Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access"
|
|
217
|
+
},
|
|
216
218
|
"Roles": [
|
|
217
219
|
{
|
|
218
220
|
"Ref": "PassFunctionRole"
|
|
@@ -354,7 +356,9 @@
|
|
|
354
356
|
"DependsOn": "DestinationRole",
|
|
355
357
|
"DeletionPolicy": "Delete",
|
|
356
358
|
"Properties": {
|
|
357
|
-
"PolicyName": {
|
|
359
|
+
"PolicyName": {
|
|
360
|
+
"Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access"
|
|
361
|
+
},
|
|
358
362
|
"Roles": [
|
|
359
363
|
{
|
|
360
364
|
"Ref": "DestinationRole"
|
|
@@ -410,4 +414,4 @@
|
|
|
410
414
|
}
|
|
411
415
|
}
|
|
412
416
|
}
|
|
413
|
-
}
|
|
417
|
+
}
|
|
@@ -24,7 +24,7 @@
|
|
|
24
24
|
"Type": "AWS::ApiGateway::Stage",
|
|
25
25
|
"Properties": {
|
|
26
26
|
"DeploymentId": {
|
|
27
|
-
"Ref": "
|
|
27
|
+
"Ref": "PassDeployment6d7d2c50"
|
|
28
28
|
},
|
|
29
29
|
"StageName": "hookshot",
|
|
30
30
|
"RestApiId": {
|
|
@@ -43,7 +43,7 @@
|
|
|
43
43
|
]
|
|
44
44
|
}
|
|
45
45
|
},
|
|
46
|
-
"
|
|
46
|
+
"PassDeployment6d7d2c50": {
|
|
47
47
|
"Type": "AWS::ApiGateway::Deployment",
|
|
48
48
|
"DependsOn": "PassMethod",
|
|
49
49
|
"Properties": {
|
|
@@ -212,7 +212,9 @@
|
|
|
212
212
|
"DependsOn": "PassFunctionRole",
|
|
213
213
|
"DeletionPolicy": "Delete",
|
|
214
214
|
"Properties": {
|
|
215
|
-
"PolicyName": {
|
|
215
|
+
"PolicyName": {
|
|
216
|
+
"Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access"
|
|
217
|
+
},
|
|
216
218
|
"Roles": [
|
|
217
219
|
{
|
|
218
220
|
"Ref": "PassFunctionRole"
|
|
@@ -354,7 +356,9 @@
|
|
|
354
356
|
"DependsOn": "DestinationRole",
|
|
355
357
|
"DeletionPolicy": "Delete",
|
|
356
358
|
"Properties": {
|
|
357
|
-
"PolicyName": {
|
|
359
|
+
"PolicyName": {
|
|
360
|
+
"Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access"
|
|
361
|
+
},
|
|
358
362
|
"Roles": [
|
|
359
363
|
{
|
|
360
364
|
"Ref": "DestinationRole"
|
|
@@ -410,4 +414,4 @@
|
|
|
410
414
|
}
|
|
411
415
|
}
|
|
412
416
|
}
|
|
413
|
-
}
|
|
417
|
+
}
|
|
@@ -24,7 +24,7 @@
|
|
|
24
24
|
"Type": "AWS::ApiGateway::Stage",
|
|
25
25
|
"Properties": {
|
|
26
26
|
"DeploymentId": {
|
|
27
|
-
"Ref": "
|
|
27
|
+
"Ref": "PassDeployment6d7d2c50"
|
|
28
28
|
},
|
|
29
29
|
"StageName": "hookshot",
|
|
30
30
|
"RestApiId": {
|
|
@@ -43,7 +43,7 @@
|
|
|
43
43
|
]
|
|
44
44
|
}
|
|
45
45
|
},
|
|
46
|
-
"
|
|
46
|
+
"PassDeployment6d7d2c50": {
|
|
47
47
|
"Type": "AWS::ApiGateway::Deployment",
|
|
48
48
|
"DependsOn": "PassMethod",
|
|
49
49
|
"Properties": {
|
|
@@ -212,7 +212,9 @@
|
|
|
212
212
|
"DependsOn": "PassFunctionRole",
|
|
213
213
|
"DeletionPolicy": "Delete",
|
|
214
214
|
"Properties": {
|
|
215
|
-
"PolicyName": {
|
|
215
|
+
"PolicyName": {
|
|
216
|
+
"Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access"
|
|
217
|
+
},
|
|
216
218
|
"Roles": [
|
|
217
219
|
{
|
|
218
220
|
"Ref": "PassFunctionRole"
|
|
@@ -354,7 +356,9 @@
|
|
|
354
356
|
"DependsOn": "DestinationRole",
|
|
355
357
|
"DeletionPolicy": "Delete",
|
|
356
358
|
"Properties": {
|
|
357
|
-
"PolicyName": {
|
|
359
|
+
"PolicyName": {
|
|
360
|
+
"Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access"
|
|
361
|
+
},
|
|
358
362
|
"Roles": [
|
|
359
363
|
{
|
|
360
364
|
"Ref": "DestinationRole"
|
|
@@ -410,4 +414,4 @@
|
|
|
410
414
|
}
|
|
411
415
|
}
|
|
412
416
|
}
|
|
413
|
-
}
|
|
417
|
+
}
|
|
@@ -24,7 +24,7 @@
|
|
|
24
24
|
"Type": "AWS::ApiGateway::Stage",
|
|
25
25
|
"Properties": {
|
|
26
26
|
"DeploymentId": {
|
|
27
|
-
"Ref": "
|
|
27
|
+
"Ref": "PassDeployment6d7d2c50"
|
|
28
28
|
},
|
|
29
29
|
"StageName": "hookshot",
|
|
30
30
|
"RestApiId": {
|
|
@@ -43,7 +43,7 @@
|
|
|
43
43
|
]
|
|
44
44
|
}
|
|
45
45
|
},
|
|
46
|
-
"
|
|
46
|
+
"PassDeployment6d7d2c50": {
|
|
47
47
|
"Type": "AWS::ApiGateway::Deployment",
|
|
48
48
|
"DependsOn": "PassMethod",
|
|
49
49
|
"Properties": {
|
|
@@ -212,7 +212,9 @@
|
|
|
212
212
|
"DependsOn": "PassFunctionRole",
|
|
213
213
|
"DeletionPolicy": "Delete",
|
|
214
214
|
"Properties": {
|
|
215
|
-
"PolicyName": {
|
|
215
|
+
"PolicyName": {
|
|
216
|
+
"Fn::Sub": "${AWS::StackName}-PassFunction-lambda-log-access"
|
|
217
|
+
},
|
|
216
218
|
"Roles": [
|
|
217
219
|
{
|
|
218
220
|
"Ref": "PassFunctionRole"
|
|
@@ -354,7 +356,9 @@
|
|
|
354
356
|
"DependsOn": "DestinationRole",
|
|
355
357
|
"DeletionPolicy": "Delete",
|
|
356
358
|
"Properties": {
|
|
357
|
-
"PolicyName": {
|
|
359
|
+
"PolicyName": {
|
|
360
|
+
"Fn::Sub": "${AWS::StackName}-Destination-lambda-log-access"
|
|
361
|
+
},
|
|
358
362
|
"Roles": [
|
|
359
363
|
{
|
|
360
364
|
"Ref": "DestinationRole"
|
|
@@ -410,4 +414,4 @@
|
|
|
410
414
|
}
|
|
411
415
|
}
|
|
412
416
|
}
|
|
413
|
-
}
|
|
417
|
+
}
|
|
@@ -88,7 +88,9 @@
|
|
|
88
88
|
"DependsOn": "MyLambdaRole",
|
|
89
89
|
"DeletionPolicy": "Delete",
|
|
90
90
|
"Properties": {
|
|
91
|
-
"PolicyName": {
|
|
91
|
+
"PolicyName": {
|
|
92
|
+
"Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
|
|
93
|
+
},
|
|
92
94
|
"Roles": [
|
|
93
95
|
{
|
|
94
96
|
"Ref": "MyLambdaRole"
|
|
@@ -131,4 +133,4 @@
|
|
|
131
133
|
}
|
|
132
134
|
},
|
|
133
135
|
"Outputs": {}
|
|
134
|
-
}
|
|
136
|
+
}
|
|
@@ -86,7 +86,9 @@
|
|
|
86
86
|
"DependsOn": "MyLambdaRole",
|
|
87
87
|
"DeletionPolicy": "Delete",
|
|
88
88
|
"Properties": {
|
|
89
|
-
"PolicyName": {
|
|
89
|
+
"PolicyName": {
|
|
90
|
+
"Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
|
|
91
|
+
},
|
|
90
92
|
"Roles": [
|
|
91
93
|
{
|
|
92
94
|
"Ref": "MyLambdaRole"
|
|
@@ -129,4 +131,4 @@
|
|
|
129
131
|
}
|
|
130
132
|
},
|
|
131
133
|
"Outputs": {}
|
|
132
|
-
}
|
|
134
|
+
}
|
|
@@ -122,7 +122,9 @@
|
|
|
122
122
|
"DependsOn": "MyLambdaRole",
|
|
123
123
|
"DeletionPolicy": "Delete",
|
|
124
124
|
"Properties": {
|
|
125
|
-
"PolicyName": {
|
|
125
|
+
"PolicyName": {
|
|
126
|
+
"Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
|
|
127
|
+
},
|
|
126
128
|
"Roles": [
|
|
127
129
|
{
|
|
128
130
|
"Ref": "MyLambdaRole"
|
|
@@ -181,4 +183,4 @@
|
|
|
181
183
|
}
|
|
182
184
|
},
|
|
183
185
|
"Outputs": {}
|
|
184
|
-
}
|
|
186
|
+
}
|
|
@@ -87,7 +87,9 @@
|
|
|
87
87
|
"Type": "AWS::IAM::Policy",
|
|
88
88
|
"DeletionPolicy": "Delete",
|
|
89
89
|
"Properties": {
|
|
90
|
-
"PolicyName": {
|
|
90
|
+
"PolicyName": {
|
|
91
|
+
"Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
|
|
92
|
+
},
|
|
91
93
|
"Roles": [
|
|
92
94
|
{
|
|
93
95
|
"Fn::Select": [
|
|
@@ -131,4 +133,4 @@
|
|
|
131
133
|
}
|
|
132
134
|
},
|
|
133
135
|
"Outputs": {}
|
|
134
|
-
}
|
|
136
|
+
}
|
|
@@ -87,7 +87,9 @@
|
|
|
87
87
|
"DependsOn": "MyLambdaRole",
|
|
88
88
|
"DeletionPolicy": "Delete",
|
|
89
89
|
"Properties": {
|
|
90
|
-
"PolicyName": {
|
|
90
|
+
"PolicyName": {
|
|
91
|
+
"Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
|
|
92
|
+
},
|
|
91
93
|
"Roles": [
|
|
92
94
|
{
|
|
93
95
|
"Ref": "MyLambdaRole"
|
|
@@ -130,4 +132,4 @@
|
|
|
130
132
|
}
|
|
131
133
|
},
|
|
132
134
|
"Outputs": {}
|
|
133
|
-
}
|
|
135
|
+
}
|
|
@@ -88,7 +88,9 @@
|
|
|
88
88
|
"DependsOn": "MyLambdaRole",
|
|
89
89
|
"DeletionPolicy": "Delete",
|
|
90
90
|
"Properties": {
|
|
91
|
-
"PolicyName": {
|
|
91
|
+
"PolicyName": {
|
|
92
|
+
"Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
|
|
93
|
+
},
|
|
92
94
|
"Roles": [
|
|
93
95
|
{
|
|
94
96
|
"Ref": "MyLambdaRole"
|
|
@@ -167,4 +169,4 @@
|
|
|
167
169
|
}
|
|
168
170
|
},
|
|
169
171
|
"Outputs": {}
|
|
170
|
-
}
|
|
172
|
+
}
|
|
@@ -88,7 +88,9 @@
|
|
|
88
88
|
"DependsOn": "MyLambdaRole",
|
|
89
89
|
"DeletionPolicy": "Delete",
|
|
90
90
|
"Properties": {
|
|
91
|
-
"PolicyName": {
|
|
91
|
+
"PolicyName": {
|
|
92
|
+
"Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
|
|
93
|
+
},
|
|
92
94
|
"Roles": [
|
|
93
95
|
{
|
|
94
96
|
"Ref": "MyLambdaRole"
|
|
@@ -167,4 +169,4 @@
|
|
|
167
169
|
}
|
|
168
170
|
},
|
|
169
171
|
"Outputs": {}
|
|
170
|
-
}
|
|
172
|
+
}
|
|
@@ -89,7 +89,9 @@
|
|
|
89
89
|
"DependsOn": "MyLambdaRole",
|
|
90
90
|
"DeletionPolicy": "Delete",
|
|
91
91
|
"Properties": {
|
|
92
|
-
"PolicyName": {
|
|
92
|
+
"PolicyName": {
|
|
93
|
+
"Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
|
|
94
|
+
},
|
|
93
95
|
"Roles": [
|
|
94
96
|
{
|
|
95
97
|
"Ref": "MyLambdaRole"
|
|
@@ -172,4 +174,4 @@
|
|
|
172
174
|
}
|
|
173
175
|
},
|
|
174
176
|
"Outputs": {}
|
|
175
|
-
}
|
|
177
|
+
}
|
|
@@ -89,7 +89,9 @@
|
|
|
89
89
|
"DependsOn": "MyLambdaRole",
|
|
90
90
|
"DeletionPolicy": "Delete",
|
|
91
91
|
"Properties": {
|
|
92
|
-
"PolicyName": {
|
|
92
|
+
"PolicyName": {
|
|
93
|
+
"Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
|
|
94
|
+
},
|
|
93
95
|
"Roles": [
|
|
94
96
|
{
|
|
95
97
|
"Ref": "MyLambdaRole"
|
|
@@ -172,4 +174,4 @@
|
|
|
172
174
|
}
|
|
173
175
|
},
|
|
174
176
|
"Outputs": {}
|
|
175
|
-
}
|
|
177
|
+
}
|
|
@@ -88,7 +88,9 @@
|
|
|
88
88
|
"DependsOn": "MyLambdaRole",
|
|
89
89
|
"DeletionPolicy": "Delete",
|
|
90
90
|
"Properties": {
|
|
91
|
-
"PolicyName": {
|
|
91
|
+
"PolicyName": {
|
|
92
|
+
"Fn::Sub": "${AWS::StackName}-MyLambda-lambda-log-access"
|
|
93
|
+
},
|
|
92
94
|
"Roles": [
|
|
93
95
|
{
|
|
94
96
|
"Ref": "MyLambdaRole"
|
|
@@ -206,4 +208,4 @@
|
|
|
206
208
|
}
|
|
207
209
|
},
|
|
208
210
|
"Outputs": {}
|
|
209
|
-
}
|
|
211
|
+
}
|