diff --git a/aws_sra_examples/solutions/account/account_alternate_contacts/lambda/src/app.py b/aws_sra_examples/solutions/account/account_alternate_contacts/lambda/src/app.py index a60c324c..095c2b97 100644 --- a/aws_sra_examples/solutions/account/account_alternate_contacts/lambda/src/app.py +++ b/aws_sra_examples/solutions/account/account_alternate_contacts/lambda/src/app.py @@ -316,7 +316,7 @@ def local_testing(aws_account: AccountTypeDef, params: dict) -> None: process_alternate_contacts(account_client, aws_account, params) -def process_accounts(event: Union[CloudFormationCustomResourceEvent, dict], params: dict) -> None: +def process_accounts(event: Union[CloudFormationCustomResourceEvent, dict], params: dict) -> None: # noqa: U100 """Process Accounts and Create SNS Messages for each account for solution deployment. Args: @@ -339,7 +339,7 @@ def process_accounts(event: Union[CloudFormationCustomResourceEvent, dict], para process_sns_message_batches(sns_messages, params["SNS_TOPIC_ARN"]) -def process_account(event: dict, aws_account_id: str, params: dict) -> None: +def process_account(event: dict, aws_account_id: str, params: dict) -> None: # noqa: U100 """Process Account and Create SNS Message for account for solution deployment. Args: @@ -359,20 +359,18 @@ def process_account(event: dict, aws_account_id: str, params: dict) -> None: publish_sns_message(sns_message, "Account Alternate Contacts", params["SNS_TOPIC_ARN"]) -def process_event(event: dict) -> None: +def process_event(event: dict) -> None: # noqa: U100 """Process Event. Args: event: event data """ - event_info = {"Event": event} - LOGGER.info(event_info) params = get_validated_parameters({}) process_accounts(event, params) -def process_event_sns(event: dict) -> None: +def process_event_sns(event: dict) -> None: # noqa: U100 """Process SNS event. Args: @@ -392,14 +390,12 @@ def process_event_sns(event: dict) -> None: process_alternate_contacts(account_client, aws_account, params) -def process_event_organizations(event: dict) -> None: +def process_event_organizations(event: dict) -> None: # noqa: U100 """Process Event from AWS Organizations. Args: event: event data """ - event_info = {"Event": event} - LOGGER.info(event_info) params = get_validated_parameters({}) if event["detail"]["eventName"] == "TagResource" and params["EXCLUDE_ACCOUNT_TAGS"]: @@ -418,7 +414,7 @@ def process_event_organizations(event: dict) -> None: LOGGER.info("Organization event does not match expected values.") -def process_event_lifecycle(event: dict) -> None: +def process_event_lifecycle(event: dict) -> None: # noqa: U100 """Process Lifecycle Event from AWS Control Tower. Args: @@ -427,8 +423,6 @@ def process_event_lifecycle(event: dict) -> None: Raises: ValueError: Control Tower Lifecycle Event not 'createManagedAccountStatus' or 'updateManagedAccountStatus' """ - event_info = {"Event": event} - LOGGER.info(event_info) params = get_validated_parameters({}) aws_account_id = "" @@ -455,9 +449,6 @@ def process_event_cloudformation(event: CloudFormationCustomResourceEvent, conte Returns: AWS CloudFormation physical resource id """ - event_info = {"Event": event} - LOGGER.info(event_info) - if event["RequestType"] in ["Create", "Update"]: params = get_validated_parameters({"RequestType": event["RequestType"]}) process_accounts(event, params) @@ -588,7 +579,7 @@ def get_validated_parameters(event: dict) -> dict: return params -def orchestrator(event: dict, context: Any) -> None: +def orchestrator(event: dict, context: Any) -> None: # noqa: U100 """Orchestration of Events. Args: @@ -607,7 +598,7 @@ def orchestrator(event: dict, context: Any) -> None: process_event(event) -def lambda_handler(event: dict, context: Any) -> None: +def lambda_handler(event: dict, context: Any) -> None: # noqa: U100 """Lambda Handler. Args: @@ -619,8 +610,6 @@ def lambda_handler(event: dict, context: Any) -> None: """ LOGGER.info("....Lambda Handler Started....") try: - event_info = {"Event": event} - LOGGER.info(event_info) orchestrator(event, context) except Exception: LOGGER.exception(UNEXPECTED) diff --git a/aws_sra_examples/solutions/ami_bakery/ami_bakery_org/lambda/src/app.py b/aws_sra_examples/solutions/ami_bakery/ami_bakery_org/lambda/src/app.py index 506ece29..0933f3f1 100644 --- a/aws_sra_examples/solutions/ami_bakery/ami_bakery_org/lambda/src/app.py +++ b/aws_sra_examples/solutions/ami_bakery/ami_bakery_org/lambda/src/app.py @@ -299,7 +299,7 @@ def delete(event: Dict[str, Any], context: Context) -> None: # noqa: U100 iam.delete_role(session, params["CODEPIPELINE_ROLE_NAME"]) -def lambda_handler(event: Dict[str, Any], context: Context) -> None: +def lambda_handler(event: Dict[str, Any], context: Context) -> None: # noqa: U100 """Lambda Handler. Args: diff --git a/aws_sra_examples/solutions/cloudtrail/cloudtrail_org/lambda/src/app.py b/aws_sra_examples/solutions/cloudtrail/cloudtrail_org/lambda/src/app.py index e2001533..41cd9a54 100644 --- a/aws_sra_examples/solutions/cloudtrail/cloudtrail_org/lambda/src/app.py +++ b/aws_sra_examples/solutions/cloudtrail/cloudtrail_org/lambda/src/app.py @@ -313,7 +313,7 @@ def process_create_update(params: dict) -> None: @helper.create @helper.update @helper.delete -def process_event(event: CloudFormationCustomResourceEvent, context: Context) -> str: +def process_event(event: CloudFormationCustomResourceEvent, context: Context) -> str: # noqa: U100 """Process CloudFormation Event. Creates, updates, and deletes a CloudTrail with the provided parameters. Args: @@ -323,8 +323,6 @@ def process_event(event: CloudFormationCustomResourceEvent, context: Context) -> Returns: AWS CloudFormation physical resource id """ - event_info = {"Event": event} - LOGGER.info(event_info) LOGGER.debug(f"{context}") params = get_validated_parameters(event) @@ -342,7 +340,7 @@ def process_event(event: CloudFormationCustomResourceEvent, context: Context) -> return f"{params['CLOUDTRAIL_NAME']}-CloudTrail" -def lambda_handler(event: CloudFormationCustomResourceEvent, context: Context) -> None: +def lambda_handler(event: CloudFormationCustomResourceEvent, context: Context) -> None: # noqa: U100 """Lambda Handler. Args: @@ -360,7 +358,7 @@ def lambda_handler(event: CloudFormationCustomResourceEvent, context: Context) - raise ValueError(f"Unexpected error executing Lambda function. Review CloudWatch logs '{context.log_group_name}' for details.") from None -def terraform_handler(event: CloudFormationCustomResourceEvent, context: Context) -> None: +def terraform_handler(event: CloudFormationCustomResourceEvent, context: Context) -> None: # noqa: U100 """Lambda Handler. Args: diff --git a/aws_sra_examples/solutions/common/common_prerequisites/lambda/src/app.py b/aws_sra_examples/solutions/common/common_prerequisites/lambda/src/app.py index bc3faa76..bfe90775 100644 --- a/aws_sra_examples/solutions/common/common_prerequisites/lambda/src/app.py +++ b/aws_sra_examples/solutions/common/common_prerequisites/lambda/src/app.py @@ -444,8 +444,6 @@ def create_update_event(event: CloudFormationCustomResourceEvent, context: Conte Returns: AWS CloudFormation physical resource id """ - event_info = {"Event": event} - LOGGER.info(event_info) params = get_validated_parameters(event) tags: Sequence[TagTypeDef] = [{"Key": params["TAG_KEY"], "Value": params["TAG_VALUE"]}] @@ -473,13 +471,11 @@ def delete_event(event: CloudFormationCustomResourceEvent, context: Context) -> event: event data context: runtime information """ - event_info = {"Event": event} - LOGGER.info(event_info) LOGGER.info("SRA SSM Parameters are being retained.") # delete_ssm_parameters_in_regions(get_enabled_regions()) # noqa: E800 -def lambda_handler(event: CloudFormationCustomResourceEvent, context: Context) -> None: +def lambda_handler(event: CloudFormationCustomResourceEvent, context: Context) -> None: # noqa: U100 """Lambda Handler. Args: diff --git a/aws_sra_examples/solutions/common/common_register_delegated_administrator/lambda/src/app.py b/aws_sra_examples/solutions/common/common_register_delegated_administrator/lambda/src/app.py index f7cc4659..7057f8e0 100644 --- a/aws_sra_examples/solutions/common/common_register_delegated_administrator/lambda/src/app.py +++ b/aws_sra_examples/solutions/common/common_register_delegated_administrator/lambda/src/app.py @@ -265,7 +265,7 @@ def lambda_handler( raise ValueError(f"Unexpected error executing Lambda function. Review CloudWatch logs '{context.log_group_name}' for details.") from None -def terraform_handler(event: dict, context: Context) -> None: +def terraform_handler(event: dict, context: Context) -> None: # noqa: U100 """Lambda Handler. Args: @@ -276,8 +276,6 @@ def terraform_handler(event: dict, context: Context) -> None: ValueError: Unexpected error executing Lambda function """ LOGGER.info("....Lambda Handler Started....") - event_info = {"Event": event} - LOGGER.info(event_info) try: request_type = event["RequestType"] diff --git a/aws_sra_examples/solutions/config/config_management_account/lambda/src/app.py b/aws_sra_examples/solutions/config/config_management_account/lambda/src/app.py index 8d7e622f..a43c2137 100644 --- a/aws_sra_examples/solutions/config/config_management_account/lambda/src/app.py +++ b/aws_sra_examples/solutions/config/config_management_account/lambda/src/app.py @@ -161,7 +161,7 @@ def get_validated_parameters(event: CloudFormationCustomResourceEvent) -> dict: @helper.create @helper.update @helper.delete -def process_event(event: CloudFormationCustomResourceEvent, context: Context) -> str: +def process_event(event: CloudFormationCustomResourceEvent, context: Context) -> str: # noqa: U100 """Process Event from AWS CloudFormation. Args: @@ -171,8 +171,6 @@ def process_event(event: CloudFormationCustomResourceEvent, context: Context) -> Returns: AWS CloudFormation physical resource id """ - event_info = {"Event": event} - LOGGER.info(event_info) params = get_validated_parameters(event) management_account: str = context.invoked_function_arn.split(":")[4] @@ -189,7 +187,7 @@ def process_event(event: CloudFormationCustomResourceEvent, context: Context) -> return f"{params['AUDIT_ACCOUNT_ID']}-{params['AGGREGATOR_NAME']}" -def lambda_handler(event: CloudFormationCustomResourceEvent, context: Context) -> None: +def lambda_handler(event: CloudFormationCustomResourceEvent, context: Context) -> None: # noqa: U100 """Lambda Handler. Args: diff --git a/aws_sra_examples/solutions/config/config_org/lambda/src/app.py b/aws_sra_examples/solutions/config/config_org/lambda/src/app.py index 65fef0a0..19677d2c 100644 --- a/aws_sra_examples/solutions/config/config_org/lambda/src/app.py +++ b/aws_sra_examples/solutions/config/config_org/lambda/src/app.py @@ -68,14 +68,12 @@ def process_add_update_event(params: dict, regions: list, accounts: list) -> Non LOGGER.info("...ADD_UPDATE_NO_EVENT") -def process_event(event: dict) -> None: +def process_event(event: dict) -> None: # noqa: U100 """Process Event. Args: event: event data """ - event_info = {"Event": event} - LOGGER.info(event_info) params = get_validated_parameters({"RequestType": "Update"}) accounts = common.get_active_organization_accounts() @@ -111,14 +109,12 @@ def process_account(aws_account_id: str, params: dict) -> None: config.set_delivery_channel(aws_account_id, region, params["CONFIGURATION_ROLE_NAME"], delivery_channel) -def process_event_organizations(event: dict) -> None: +def process_event_organizations(event: dict) -> None: # noqa: U100 """Process Event from AWS Organizations. Args: event: event data """ - event_info = {"Event": event} - LOGGER.info(event_info) params = get_validated_parameters({}) if event["detail"]["eventName"] == "AcceptHandshake" and event["detail"]["responseElements"]["handshake"]["state"] == "ACCEPTED": @@ -432,7 +428,7 @@ def process_sns_message_batches(sns_messages: list, sns_topic_arn_fanout: str) - publish_sns_message_batch(batch, sns_topic_arn_fanout) -def process_event_sns(event: dict) -> None: +def process_event_sns(event: dict) -> None: # noqa: U100 """Process SNS event to complete the setup process. Args: @@ -481,9 +477,6 @@ def process_event_cloudformation(event: CloudFormationCustomResourceEvent, conte Returns: AWS CloudFormation physical resource id """ - event_info = {"Event": event} - LOGGER.info(event_info) - params = get_validated_parameters({"RequestType": event["RequestType"]}) accounts = common.get_active_organization_accounts() regions = common.get_enabled_regions(params["ENABLED_REGIONS"], params["CONTROL_TOWER_REGIONS_ONLY"] == "true") @@ -502,7 +495,7 @@ def process_event_cloudformation(event: CloudFormationCustomResourceEvent, conte return "SRA-CONFIG-ORG" -def orchestrator(event: Dict[str, Any], context: Any) -> None: +def orchestrator(event: Dict[str, Any], context: Any) -> None: # noqa: U100 """Orchestration. Args: @@ -520,7 +513,7 @@ def orchestrator(event: Dict[str, Any], context: Any) -> None: process_event(event) -def lambda_handler(event: Dict[str, Any], context: Any) -> None: +def lambda_handler(event: Dict[str, Any], context: Any) -> None: # noqa: U100 """Lambda Handler. Args: @@ -533,8 +526,6 @@ def lambda_handler(event: Dict[str, Any], context: Any) -> None: LOGGER.info("....Lambda Handler Started....") boto3_version = boto3.__version__ LOGGER.info(f"boto3 version: {boto3_version}") - event_info = {"Event": event} - LOGGER.info(event_info) try: orchestrator(event, context) except Exception: diff --git a/aws_sra_examples/solutions/detective/detective_org/lambda/src/app.py b/aws_sra_examples/solutions/detective/detective_org/lambda/src/app.py index 00ec81d3..d18f0100 100644 --- a/aws_sra_examples/solutions/detective/detective_org/lambda/src/app.py +++ b/aws_sra_examples/solutions/detective/detective_org/lambda/src/app.py @@ -66,14 +66,12 @@ def process_add_update_event(params: dict, regions: list, accounts: list) -> Non LOGGER.info("...ADD_UPDATE_NO_EVENT") -def process_event(event: dict) -> None: +def process_event(event: dict) -> None: # noqa: U100 """Process Event. Args: event: event data """ - event_info = {"Event": event} - LOGGER.info(event_info) params = get_validated_parameters({"RequestType": "Update"}) excluded_accounts: list = [params["DELEGATED_ADMIN_ACCOUNT_ID"]] @@ -366,9 +364,6 @@ def process_event_cloudformation(event: CloudFormationCustomResourceEvent, conte Returns: AWS CloudFormation physical resource id """ - event_info = {"Event": event} - LOGGER.info(event_info) - params = get_validated_parameters({"RequestType": event["RequestType"]}) excluded_accounts: list = [params["DELEGATED_ADMIN_ACCOUNT_ID"]] accounts = common.get_active_organization_accounts(excluded_accounts) @@ -384,7 +379,7 @@ def process_event_cloudformation(event: CloudFormationCustomResourceEvent, conte return f"sra-detective-org-{params['DELEGATED_ADMIN_ACCOUNT_ID']}" -def orchestrator(event: Dict[str, Any], context: Any) -> None: +def orchestrator(event: Dict[str, Any], context: Any) -> None: # noqa: U100 """Orchestration. Args: @@ -399,7 +394,7 @@ def orchestrator(event: Dict[str, Any], context: Any) -> None: process_event(event) -def lambda_handler(event: Dict[str, Any], context: Any) -> None: +def lambda_handler(event: Dict[str, Any], context: Any) -> None: # noqa: U100 """Lambda Handler. Args: @@ -412,8 +407,6 @@ def lambda_handler(event: Dict[str, Any], context: Any) -> None: LOGGER.info("....Lambda Handler Started....") boto3_version = boto3.__version__ LOGGER.info(f"boto3 version: {boto3_version}") - event_info = {"Event": event} - LOGGER.info(event_info) try: orchestrator(event, context) except Exception: diff --git a/aws_sra_examples/solutions/ec2/ec2_default_ebs_encryption/lambda/src/app.py b/aws_sra_examples/solutions/ec2/ec2_default_ebs_encryption/lambda/src/app.py index a392561a..5a273a3b 100644 --- a/aws_sra_examples/solutions/ec2/ec2_default_ebs_encryption/lambda/src/app.py +++ b/aws_sra_examples/solutions/ec2/ec2_default_ebs_encryption/lambda/src/app.py @@ -297,7 +297,7 @@ def local_testing(aws_account: AccountTypeDef, params: dict) -> None: process_enable_ebs_encryption_by_default(account_session, aws_account["Id"], regions) -def process_accounts(event: Union[CloudFormationCustomResourceEvent, dict], params: dict) -> None: +def process_accounts(event: Union[CloudFormationCustomResourceEvent, dict], params: dict) -> None: # noqa: U100 """Process Accounts and Create SNS Messages for each account for solution deployment. Args: @@ -319,7 +319,7 @@ def process_accounts(event: Union[CloudFormationCustomResourceEvent, dict], para process_sns_message_batches(sns_messages, params["SNS_TOPIC_ARN"]) -def process_account(event: dict, aws_account_id: str, params: dict) -> None: +def process_account(event: dict, aws_account_id: str, params: dict) -> None: # noqa: U100 """Process Account and Create SNS Message for solution deployment. Args: @@ -339,20 +339,18 @@ def process_account(event: dict, aws_account_id: str, params: dict) -> None: publish_sns_message(sns_message, "EC2 Default EBS Encryption", params["SNS_TOPIC_ARN"]) -def process_event(event: dict) -> None: +def process_event(event: dict) -> None: # noqa: U100 """Process Event. Args: event: event data """ - event_info = {"Event": event} - LOGGER.info(event_info) params = get_validated_parameters({}) process_accounts(event, params) -def process_event_sns(event: dict) -> None: +def process_event_sns(event: dict) -> None: # noqa: U100 """Process SNS event. Args: @@ -373,14 +371,12 @@ def process_event_sns(event: dict) -> None: process_enable_ebs_encryption_by_default(account_session, aws_account["Id"], regions) -def process_event_organizations(event: dict) -> None: +def process_event_organizations(event: dict) -> None: # noqa: U100 """Process Event from AWS Organizations. Args: event: event data """ - event_info = {"Event": event} - LOGGER.info(event_info) params = get_validated_parameters({}) if event["detail"]["eventName"] == "TagResource" and params["EXCLUDE_ACCOUNT_TAGS"]: @@ -399,7 +395,7 @@ def process_event_organizations(event: dict) -> None: LOGGER.info("Organization event does not match expected values.") -def process_event_lifecycle(event: dict) -> None: +def process_event_lifecycle(event: dict) -> None: # noqa: U100 """Process Lifecycle Event from AWS Control Tower. Args: @@ -408,8 +404,6 @@ def process_event_lifecycle(event: dict) -> None: Raises: ValueError: Control Tower Lifecycle Event not 'createManagedAccountStatus' or 'updateManagedAccountStatus' """ - event_info = {"Event": event} - LOGGER.info(event_info) params = get_validated_parameters({}) aws_account_id = "" @@ -436,9 +430,6 @@ def process_event_cloudformation(event: CloudFormationCustomResourceEvent, conte Returns: AWS CloudFormation physical resource id """ - event_info = {"Event": event} - LOGGER.info(event_info) - if event["RequestType"] in ["Create", "Update"]: params = get_validated_parameters({"RequestType": event["RequestType"]}) process_accounts(event, params) @@ -551,7 +542,7 @@ def get_validated_parameters(event: dict) -> dict: return params -def orchestrator(event: dict, context: Any) -> None: +def orchestrator(event: dict, context: Any) -> None: # noqa: U100 """Orchestration of Events. Args: @@ -570,7 +561,7 @@ def orchestrator(event: dict, context: Any) -> None: process_event(event) -def lambda_handler(event: dict, context: Any) -> None: +def lambda_handler(event: dict, context: Any) -> None: # noqa: U100 """Lambda Handler. Args: @@ -582,8 +573,6 @@ def lambda_handler(event: dict, context: Any) -> None: """ LOGGER.info("....Lambda Handler Started....") try: - event_info = {"Event": event} - LOGGER.info(event_info) orchestrator(event, context) except Exception: LOGGER.exception(UNEXPECTED) diff --git a/aws_sra_examples/solutions/firewall_manager/firewall_manager_org/lambda/src/app.py b/aws_sra_examples/solutions/firewall_manager/firewall_manager_org/lambda/src/app.py index 256d275d..aa11ec0d 100644 --- a/aws_sra_examples/solutions/firewall_manager/firewall_manager_org/lambda/src/app.py +++ b/aws_sra_examples/solutions/firewall_manager/firewall_manager_org/lambda/src/app.py @@ -188,8 +188,6 @@ def process_event(event: CloudFormationCustomResourceEvent, context: Context) -> Raises: botocore.exceptions.ClientError: Client error """ - event_info = {"Event": event} - LOGGER.info(event_info) params = get_validated_parameters(event) if params["action"] == "Add": diff --git a/aws_sra_examples/solutions/genai/bedrock_guardrails/lambda/src/app.py b/aws_sra_examples/solutions/genai/bedrock_guardrails/lambda/src/app.py index 46abd774..15c89a09 100644 --- a/aws_sra_examples/solutions/genai/bedrock_guardrails/lambda/src/app.py +++ b/aws_sra_examples/solutions/genai/bedrock_guardrails/lambda/src/app.py @@ -169,7 +169,7 @@ def load_kms_key_policies() -> dict: sqs = sra_sqs.SRASQS() -def get_resource_parameters(event: dict) -> None: +def get_resource_parameters(event: dict) -> None: # noqa: U100 """Get resource parameters from event. Args: @@ -820,7 +820,7 @@ def delete_guardrails(account: str, region: str, guardrail_name: str) -> None: DRY_RUN_DATA[f"Bedrock-guardrail-{account}_{region}"] = f"DRY_RUN: Delete Bedrock guardrail {guardrail_name}" -def create_event(event: dict, context: Any) -> str: +def create_event(event: dict, context: Any) -> str: # noqa: U100 """Create event. Args: @@ -838,8 +838,6 @@ def create_event(event: dict, context: Any) -> str: DRY_RUN_DATA = {} LIVE_RUN_DATA = {} - event_info = {"Event": event} - LOGGER.info(event_info) LOGGER.info(f"CFN_RESPONSE_DATA START: {CFN_RESPONSE_DATA}") # Deploy state table deploy_state_table() @@ -904,7 +902,7 @@ def create_event(event: dict, context: Any) -> str: return CFN_RESOURCE_ID -def update_event(event: dict, context: Any) -> str: +def update_event(event: dict, context: Any) -> str: # noqa: U100 """Update event. Args: diff --git a/aws_sra_examples/solutions/genai/bedrock_org/lambda/rules/sra_bedrock_check_eval_job_bucket/app.py b/aws_sra_examples/solutions/genai/bedrock_org/lambda/rules/sra_bedrock_check_eval_job_bucket/app.py index aed334a0..1641e4fa 100644 --- a/aws_sra_examples/solutions/genai/bedrock_org/lambda/rules/sra_bedrock_check_eval_job_bucket/app.py +++ b/aws_sra_examples/solutions/genai/bedrock_org/lambda/rules/sra_bedrock_check_eval_job_bucket/app.py @@ -165,7 +165,7 @@ def build_evaluation(compliance_type: str, annotation: str) -> Any: return {"ComplianceType": compliance_type, "Annotation": annotation, "OrderingTimestamp": datetime.now().isoformat()} -def lambda_handler(event: dict, context: Any) -> None: +def lambda_handler(event: dict, context: Any) -> None: # noqa: U100 """Lambda handler. Args: diff --git a/aws_sra_examples/solutions/genai/bedrock_org/lambda/src/app.py b/aws_sra_examples/solutions/genai/bedrock_org/lambda/src/app.py index 3483b08b..d7bb30bc 100644 --- a/aws_sra_examples/solutions/genai/bedrock_org/lambda/src/app.py +++ b/aws_sra_examples/solutions/genai/bedrock_org/lambda/src/app.py @@ -232,7 +232,7 @@ def load_sra_cloudwatch_dashboard() -> dict: cloudwatch.SOLUTION_NAME = SOLUTION_NAME -def get_resource_parameters(event: dict) -> None: +def get_resource_parameters(event: dict) -> None: # noqa: U100 """Get resource parameters from event. Args: @@ -1313,7 +1313,7 @@ def deploy_central_cloudwatch_observability(event: dict) -> None: # noqa: CCR00 add_state_table_record("oam", "implemented", "oam link", "link", oam_link_arn, bedrock_account, bedrock_region, "oam_link") -def deploy_cloudwatch_dashboard(event: dict) -> None: +def deploy_cloudwatch_dashboard(event: dict) -> None: # noqa: U100 """Deploy CloudWatch dashboard. Args: @@ -1395,7 +1395,7 @@ def remove_cloudwatch_dashboard() -> None: remove_state_table_record(f"arn:aws:cloudwatch::{ssm_params.SRA_SECURITY_ACCT}:dashboard/{SOLUTION_NAME}") -def create_event(event: dict, context: Any) -> str: +def create_event(event: dict, context: Any) -> str: # noqa: U100 """Create event. Args: @@ -1413,8 +1413,6 @@ def create_event(event: dict, context: Any) -> str: DRY_RUN_DATA = {} LIVE_RUN_DATA = {} - event_info = {"Event": event} - LOGGER.info(event_info) LOGGER.info(f"CFN_RESPONSE_DATA START: {CFN_RESPONSE_DATA}") # Deploy state table deploy_state_table() @@ -1487,7 +1485,7 @@ def create_event(event: dict, context: Any) -> str: return CFN_RESOURCE_ID -def update_event(event: dict, context: Any) -> str: +def update_event(event: dict, context: Any) -> str: # noqa: U100 """Update event. Args: @@ -1943,7 +1941,7 @@ def create_sns_messages( DRY_RUN_DATA["SNSFanout"] = "DRY_RUN: Published SNS messages for regional fanout configuration. More dry run data in subsequent log streams." -def process_sns_records(event: dict) -> None: +def process_sns_records(event: dict) -> None: # noqa: U100 """Process SNS records. Args: diff --git a/aws_sra_examples/solutions/guardduty/guardduty_org/lambda/src/app.py b/aws_sra_examples/solutions/guardduty/guardduty_org/lambda/src/app.py index 56ad168b..5c32b2f4 100644 --- a/aws_sra_examples/solutions/guardduty/guardduty_org/lambda/src/app.py +++ b/aws_sra_examples/solutions/guardduty/guardduty_org/lambda/src/app.py @@ -260,7 +260,7 @@ def process_sns_records(records: list) -> None: @helper.create @helper.update @helper.delete -def process_cloudformation_event(event: CloudFormationCustomResourceEvent, context: Context) -> str: +def process_cloudformation_event(event: CloudFormationCustomResourceEvent, context: Context) -> str: # noqa: U100 """Process Event from AWS CloudFormation. Args: @@ -289,7 +289,7 @@ def process_cloudformation_event(event: CloudFormationCustomResourceEvent, conte return f"sra-guardduty-{params['DELEGATED_ADMIN_ACCOUNT_ID']}" -def lambda_handler(event: Dict[str, Any], context: Context) -> None: +def lambda_handler(event: Dict[str, Any], context: Context) -> None: # noqa: U100 """Lambda Handler. Args: @@ -300,8 +300,6 @@ def lambda_handler(event: Dict[str, Any], context: Context) -> None: ValueError: Unexpected error executing Lambda function """ LOGGER.info("....Lambda Handler Started....") - event_info = {"Event": event} - LOGGER.info(event_info) try: if "Records" not in event and "RequestType" not in event and ("source" not in event and event["source"] != "aws.controltower"): raise ValueError( @@ -316,7 +314,7 @@ def lambda_handler(event: Dict[str, Any], context: Context) -> None: raise ValueError(f"Unexpected error executing Lambda function. Review CloudWatch logs '{context.log_group_name}' for details.") from None -def terraform_handler(event: Dict[str, Any], context: Context) -> None: +def terraform_handler(event: Dict[str, Any], context: Context) -> None: # noqa: U100 """Lambda Handler. Args: @@ -327,8 +325,6 @@ def terraform_handler(event: Dict[str, Any], context: Context) -> None: ValueError: Unexpected error executing Lambda function """ LOGGER.info("....Lambda Handler Started....") - event_info = {"Event": event} - LOGGER.info(event_info) try: if "Records" not in event and "RequestType" not in event and ("source" not in event and event["source"] != "aws.controltower"): raise ValueError( diff --git a/aws_sra_examples/solutions/iam/iam_password_policy/lambda/src/app.py b/aws_sra_examples/solutions/iam/iam_password_policy/lambda/src/app.py index 0fb8f471..4afb5a5d 100644 --- a/aws_sra_examples/solutions/iam/iam_password_policy/lambda/src/app.py +++ b/aws_sra_examples/solutions/iam/iam_password_policy/lambda/src/app.py @@ -106,7 +106,7 @@ def get_validated_parameters(event: CloudFormationCustomResourceEvent) -> dict: @helper.create @helper.update @helper.delete -def process_cloudformation_event(event: CloudFormationCustomResourceEvent, context: Context) -> str: +def process_cloudformation_event(event: CloudFormationCustomResourceEvent, context: Context) -> str: # noqa: U100 """Process CloudFormation Event. Creates and updates the password policy with the provided parameters. Args: @@ -116,8 +116,6 @@ def process_cloudformation_event(event: CloudFormationCustomResourceEvent, conte Returns: AWS CloudFormation physical resource id """ - event_info = {"Event": event} - LOGGER.info(event_info) LOGGER.debug(f"{context}") params = get_validated_parameters(event) @@ -141,7 +139,7 @@ def process_cloudformation_event(event: CloudFormationCustomResourceEvent, conte ) -def lambda_handler(event: CloudFormationCustomResourceEvent, context: Context) -> None: +def lambda_handler(event: CloudFormationCustomResourceEvent, context: Context) -> None: # noqa: U100 """Lambda Handler. Args: diff --git a/aws_sra_examples/solutions/inspector/inspector_org/lambda/src/app.py b/aws_sra_examples/solutions/inspector/inspector_org/lambda/src/app.py index d12107af..1a30d751 100644 --- a/aws_sra_examples/solutions/inspector/inspector_org/lambda/src/app.py +++ b/aws_sra_examples/solutions/inspector/inspector_org/lambda/src/app.py @@ -75,14 +75,12 @@ def process_add_update_event(params: dict, regions: list, accounts: list) -> Non LOGGER.info("...ADD_UPDATE_NO_EVENT") -def process_event(event: dict) -> None: +def process_event(event: dict) -> None: # noqa: U100 """Process Event. Args: event: event data """ - event_info = {"Event": event} - LOGGER.info(event_info) params = get_validated_parameters({"RequestType": "Update"}) excluded_accounts: list = [params["DELEGATED_ADMIN_ACCOUNT_ID"]] @@ -443,9 +441,6 @@ def process_event_cloudformation(event: CloudFormationCustomResourceEvent, conte Returns: AWS CloudFormation physical resource id """ - event_info = {"Event": event} - LOGGER.info(event_info) - params = get_validated_parameters({"RequestType": event["RequestType"]}) excluded_accounts: list = [params["DELEGATED_ADMIN_ACCOUNT_ID"]] accounts = common.get_active_organization_accounts(excluded_accounts) @@ -517,7 +512,7 @@ def process_sns_message_batches(sns_messages: list, sns_topic_arn: str) -> None: publish_sns_message_batch(batch, sns_topic_arn) -def process_event_sns(event: dict) -> None: +def process_event_sns(event: dict) -> None: # noqa: U100 """Process SNS event to complete the setup process. Args: @@ -543,7 +538,7 @@ def process_event_sns(event: dict) -> None: ) -def orchestrator(event: Dict[str, Any], context: Any) -> None: +def orchestrator(event: Dict[str, Any], context: Any) -> None: # noqa: U100 """Orchestration. Args: @@ -565,7 +560,7 @@ def orchestrator(event: Dict[str, Any], context: Any) -> None: process_event(event) -def lambda_handler(event: Dict[str, Any], context: Any) -> None: +def lambda_handler(event: Dict[str, Any], context: Any) -> None: # noqa: U100 """Lambda Handler. Args: @@ -578,8 +573,6 @@ def lambda_handler(event: Dict[str, Any], context: Any) -> None: LOGGER.info("....Lambda Handler Started....") boto3_version = boto3.__version__ LOGGER.info(f"boto3 version: {boto3_version}") - event_info = {"Event": event} - LOGGER.info(event_info) try: orchestrator(event, context) except Exception: diff --git a/aws_sra_examples/solutions/macie/macie_org/lambda/src/app.py b/aws_sra_examples/solutions/macie/macie_org/lambda/src/app.py index c51d432e..71d210a4 100644 --- a/aws_sra_examples/solutions/macie/macie_org/lambda/src/app.py +++ b/aws_sra_examples/solutions/macie/macie_org/lambda/src/app.py @@ -169,7 +169,7 @@ def process_sns_records(records: list) -> None: @helper.create @helper.update @helper.delete -def process_cloudformation_event(event: CloudFormationCustomResourceEvent, context: Context) -> str: +def process_cloudformation_event(event: CloudFormationCustomResourceEvent, context: Context) -> str: # noqa: U100 """Process Event from AWS CloudFormation. Args: @@ -195,7 +195,7 @@ def process_cloudformation_event(event: CloudFormationCustomResourceEvent, conte return f"sra-macie-{params['DELEGATED_ADMIN_ACCOUNT_ID']}" -def lambda_handler(event: Dict[str, Any], context: Context) -> None: +def lambda_handler(event: Dict[str, Any], context: Context) -> None: # noqa: U100 """Lambda Handler. Args: @@ -206,8 +206,6 @@ def lambda_handler(event: Dict[str, Any], context: Context) -> None: ValueError: Unexpected error executing Lambda function """ LOGGER.info("....Lambda Handler Started....") - event_info = {"Event": event} - LOGGER.info(event_info) try: if "Records" not in event and "RequestType" not in event and ("source" not in event and event["source"] != "aws.controltower"): raise ValueError( @@ -222,7 +220,7 @@ def lambda_handler(event: Dict[str, Any], context: Context) -> None: raise ValueError(f"Unexpected error executing Lambda function. Review CloudWatch logs '{context.log_group_name}' for details.") from None -def terraform_handler(event: Dict[str, Any], context: Context) -> None: +def terraform_handler(event: Dict[str, Any], context: Context) -> None: # noqa: U100 """Lambda Handler. Args: @@ -233,8 +231,6 @@ def terraform_handler(event: Dict[str, Any], context: Context) -> None: ValueError: Unexpected error executing Lambda function """ LOGGER.info("....Terraform Lambda Handler Started....") - event_info = {"Event": event} - LOGGER.info(event_info) try: if "Records" not in event and "RequestType" not in event and ("source" not in event and event["source"] != "aws.controltower"): raise ValueError( diff --git a/aws_sra_examples/solutions/patch_mgmt/patch_mgmt_org/lambda/src/app.py b/aws_sra_examples/solutions/patch_mgmt/patch_mgmt_org/lambda/src/app.py index d56ae666..5e4a41c1 100644 --- a/aws_sra_examples/solutions/patch_mgmt/patch_mgmt_org/lambda/src/app.py +++ b/aws_sra_examples/solutions/patch_mgmt/patch_mgmt_org/lambda/src/app.py @@ -796,7 +796,7 @@ def get_validated_parameters(event: Dict[str, Any]) -> dict: # noqa: CCR001, CF @helper.create @helper.update -def process_cloudformation_event(event: CloudFormationCustomResourceEvent, context: Context) -> str: +def process_cloudformation_event(event: CloudFormationCustomResourceEvent, context: Context) -> str: # noqa: U100 """Process Event from AWS CloudFormation. Args: @@ -836,7 +836,7 @@ def process_cloudformation_event(event: CloudFormationCustomResourceEvent, conte @helper.delete -def process_cloudformation_delete_event(event: CloudFormationCustomResourceEvent, context: Context) -> str: +def process_cloudformation_delete_event(event: CloudFormationCustomResourceEvent, context: Context) -> str: # noqa: U100 """Process delete event from AWS CloudFormation. Args: @@ -860,14 +860,12 @@ def process_cloudformation_delete_event(event: CloudFormationCustomResourceEvent return f"sra-patch_mgmt-{account_id}" -def process_event(event: dict) -> None: +def process_event(event: dict) -> None: # noqa: U100 """Process Event. Args: event: event data """ - event_info = {"Event": event} - LOGGER.info(event_info) params = get_validated_parameters({"RequestType": "Update", "ResourceProperties": os.environ}) regions = common.get_enabled_regions(params["ENABLED_REGIONS"], params["CONTROL_TOWER_REGIONS_ONLY"] == "true") @@ -876,14 +874,12 @@ def process_event(event: dict) -> None: check_and_update_maintenance_window(params, regions, account) -def process_event_organizations(event: dict) -> None: +def process_event_organizations(event: dict) -> None: # noqa: U100 """Process Event from AWS Organizations. Args: event: event data """ - event_info = {"Event": event} - LOGGER.info(event_info) params = get_validated_parameters({"RequestType": "Create", "ResourceProperties": os.environ}) regions = common.get_enabled_regions(params["ENABLED_REGIONS"], params["CONTROL_TOWER_REGIONS_ONLY"] == "true") @@ -900,7 +896,7 @@ def process_event_organizations(event: dict) -> None: LOGGER.info("Organization event does not match expected values.") -def orchestrator(event: Dict[str, Any], context: Any) -> None: +def orchestrator(event: Dict[str, Any], context: Any) -> None: # noqa: U100 """Orchestration. Args: @@ -917,7 +913,7 @@ def orchestrator(event: Dict[str, Any], context: Any) -> None: process_event(event) -def lambda_handler(event: Dict[str, Any], context: Context) -> None: +def lambda_handler(event: Dict[str, Any], context: Context) -> None: # noqa: U100 """Lambda Handler. Args: @@ -933,8 +929,6 @@ def lambda_handler(event: Dict[str, Any], context: Context) -> None: LOGGER.info("....Lambda Handler Started....") boto3_version = boto3.__version__ LOGGER.info(f"boto3 version: {boto3_version}") - event_info = {"Event": event} - LOGGER.info(event_info) try: orchestrator(event, context) except Exception: diff --git a/aws_sra_examples/solutions/s3/s3_block_account_public_access/lambda/src/app.py b/aws_sra_examples/solutions/s3/s3_block_account_public_access/lambda/src/app.py index 7dc3b0ac..565282ba 100644 --- a/aws_sra_examples/solutions/s3/s3_block_account_public_access/lambda/src/app.py +++ b/aws_sra_examples/solutions/s3/s3_block_account_public_access/lambda/src/app.py @@ -284,7 +284,7 @@ def local_testing(aws_account: AccountTypeDef, params: dict) -> None: process_put_account_public_access_block(s3_client, aws_account, params) -def process_accounts(event: Union[CloudFormationCustomResourceEvent, dict], params: dict) -> None: +def process_accounts(event: Union[CloudFormationCustomResourceEvent, dict], params: dict) -> None: # noqa: U100 """Process Accounts and Create SNS Messages for each account for solution deployment. Args: @@ -307,7 +307,7 @@ def process_accounts(event: Union[CloudFormationCustomResourceEvent, dict], para process_sns_message_batches(sns_messages, params["SNS_TOPIC_ARN"]) -def process_account(event: dict, aws_account_id: str, params: dict) -> None: +def process_account(event: dict, aws_account_id: str, params: dict) -> None: # noqa: U100 """Process Account and Create SNS Message for solution deployment. Args: @@ -327,20 +327,18 @@ def process_account(event: dict, aws_account_id: str, params: dict) -> None: publish_sns_message(sns_message, "S3 Block Account Public Access", params["SNS_TOPIC_ARN"]) -def process_event(event: dict) -> None: +def process_event(event: dict) -> None: # noqa: U100 """Process Event. Args: event: event data """ - event_info = {"Event": event} - LOGGER.info(event_info) params = get_validated_parameters({}) process_accounts(event, params) -def process_event_sns(event: dict) -> None: +def process_event_sns(event: dict) -> None: # noqa: U100 """Process SNS event. Args: @@ -360,14 +358,12 @@ def process_event_sns(event: dict) -> None: process_put_account_public_access_block(s3_client, aws_account, params) -def process_event_organizations(event: dict) -> None: +def process_event_organizations(event: dict) -> None: # noqa: U100 """Process Event from AWS Organizations. Args: event: event data """ - event_info = {"Event": event} - LOGGER.info(event_info) params = get_validated_parameters({}) if event["detail"]["eventName"] == "TagResource" and params["EXCLUDE_ACCOUNT_TAGS"]: @@ -386,7 +382,7 @@ def process_event_organizations(event: dict) -> None: LOGGER.info("Organization event does not match expected values.") -def process_event_lifecycle(event: dict) -> None: +def process_event_lifecycle(event: dict) -> None: # noqa: U100 """Process Lifecycle Event from AWS Control Tower. Args: @@ -395,8 +391,6 @@ def process_event_lifecycle(event: dict) -> None: Raises: ValueError: Control Tower Lifecycle Event not 'createManagedAccountStatus' or 'updateManagedAccountStatus' """ - event_info = {"Event": event} - LOGGER.info(event_info) params = get_validated_parameters({}) aws_account_id = "" @@ -423,9 +417,6 @@ def process_event_cloudformation(event: CloudFormationCustomResourceEvent, conte Returns: AWS CloudFormation physical resource id """ - event_info = {"Event": event} - LOGGER.info(event_info) - if event["RequestType"] in ["Create", "Update"]: params = get_validated_parameters({"RequestType": event["RequestType"]}) process_accounts(event, params) @@ -545,7 +536,7 @@ def get_validated_parameters(event: dict) -> dict: return params -def orchestrator(event: dict, context: Any) -> None: +def orchestrator(event: dict, context: Any) -> None: # noqa: U100 """Orchestration of Events. Args: @@ -564,7 +555,7 @@ def orchestrator(event: dict, context: Any) -> None: process_event(event) -def lambda_handler(event: dict, context: Any) -> None: +def lambda_handler(event: dict, context: Any) -> None: # noqa: U100 """Lambda Handler. Args: @@ -576,8 +567,6 @@ def lambda_handler(event: dict, context: Any) -> None: """ LOGGER.info("....Lambda Handler Started....") try: - event_info = {"Event": event} - LOGGER.info(event_info) orchestrator(event, context) except Exception: LOGGER.exception(UNEXPECTED) diff --git a/aws_sra_examples/solutions/security_lake/security_lake_org/lambda/src/app.py b/aws_sra_examples/solutions/security_lake/security_lake_org/lambda/src/app.py index 9559214a..a795fd96 100644 --- a/aws_sra_examples/solutions/security_lake/security_lake_org/lambda/src/app.py +++ b/aws_sra_examples/solutions/security_lake/security_lake_org/lambda/src/app.py @@ -139,14 +139,12 @@ def process_delete_event(params: dict, regions: list, accounts: dict) -> None: LOGGER.info("...DELETE_NO_EVENT") -def process_event(event: dict) -> None: +def process_event(event: dict) -> None: # noqa: U100 """Process Event. Args: event: event data """ - event_info = {"Event": event} - LOGGER.info(event_info) params = get_validated_parameters({"RequestType": "Update"}) accounts = common.get_active_organization_accounts() regions = common.get_enabled_regions(params["ENABLED_REGIONS"], params["CONTROL_TOWER_REGIONS_ONLY"] == "true") @@ -632,7 +630,7 @@ def disable_security_lake(params: dict, regions: list, accounts: dict) -> None: security_lake.delete_aws_log_source(sl_client, regions, source, all_accounts, params["SOURCE_VERSION"]) -def orchestrator(event: dict[str, Any], context: Any) -> None: +def orchestrator(event: dict[str, Any], context: Any) -> None: # noqa: U100 """Orchestration. Args: @@ -647,7 +645,7 @@ def orchestrator(event: dict[str, Any], context: Any) -> None: process_event(event) -def lambda_handler(event: dict[str, Any], context: Any) -> None: +def lambda_handler(event: dict[str, Any], context: Any) -> None: # noqa: U100 """Lambda Handler. Args: @@ -680,8 +678,6 @@ def process_event_cloudformation(event: CloudFormationCustomResourceEvent, conte Returns: AWS CloudFormation physical resource id """ - event_info = {"Event": event} - LOGGER.info(event_info) params = get_validated_parameters({"RequestType": event["RequestType"]}) accounts = common.get_active_organization_accounts() regions = common.get_enabled_regions(params["ENABLED_REGIONS"], params["CONTROL_TOWER_REGIONS_ONLY"]) diff --git a/aws_sra_examples/solutions/securityhub/securityhub_org/lambda/src/app.py b/aws_sra_examples/solutions/securityhub/securityhub_org/lambda/src/app.py index 6e175a3d..2ff2dfe2 100644 --- a/aws_sra_examples/solutions/securityhub/securityhub_org/lambda/src/app.py +++ b/aws_sra_examples/solutions/securityhub/securityhub_org/lambda/src/app.py @@ -123,7 +123,7 @@ def process_sns_message_batches(sns_messages: list, sns_topic_arn: str) -> None: publish_sns_message_batch(batch, sns_topic_arn) -def process_event_sns(event: dict) -> None: +def process_event_sns(event: dict) -> None: # noqa: U100 """Process SNS event. Args: @@ -145,7 +145,7 @@ def process_event_sns(event: dict) -> None: securityhub.disable_securityhub(message["AccountId"], params["CONFIGURATION_ROLE_NAME"], message["Regions"]) -def process_event_lifecycle(event: Dict[str, Any]) -> str: +def process_event_lifecycle(event: Dict[str, Any]) -> str: # noqa: U100 """Process Lifecycle Event. Args: @@ -235,14 +235,12 @@ def process_add_update_event(params: dict) -> str: return "ADD_UPDATE_COMPLETE" -def process_event(event: dict) -> None: +def process_event(event: dict) -> None: # noqa: U100 """Process Event. Args: event: event data """ - event_info = {"Event": event} - LOGGER.info(event_info) params = get_validated_parameters({"RequestType": "Update"}) process_add_update_event(params) @@ -340,14 +338,12 @@ def deregister_delegated_administrator(delegated_admin_account_id: str, service_ LOGGER.info(f"Account ({delegated_admin_account_id}) is not a registered delegated administrator: {error}") -def process_event_organizations(event: dict) -> None: +def process_event_organizations(event: dict) -> None: # noqa: U100 """Process Event from AWS Organizations. Args: event: event data """ - event_info = {"Event": event} - LOGGER.info(event_info) params = get_validated_parameters({}) regions = common.get_enabled_regions(params["ENABLED_REGIONS"], params["CONTROL_TOWER_REGIONS_ONLY"] == "true") @@ -382,9 +378,6 @@ def process_event_cloudformation(event: CloudFormationCustomResourceEvent, conte Returns: AWS CloudFormation physical resource id """ - event_info = {"Event": event} - LOGGER.info(event_info) - params = get_validated_parameters({"RequestType": event["RequestType"]}) if params["action"] in ["Add", "Update"]: @@ -399,7 +392,7 @@ def process_event_cloudformation(event: CloudFormationCustomResourceEvent, conte return f"sra-securityhub-org-{params['DELEGATED_ADMIN_ACCOUNT_ID']}" -def orchestrator(event: Dict[str, Any], context: Any) -> None: +def orchestrator(event: Dict[str, Any], context: Any) -> None: # noqa: U100 """Orchestration. Args: @@ -418,7 +411,7 @@ def orchestrator(event: Dict[str, Any], context: Any) -> None: process_event(event) -def lambda_handler(event: Dict[str, Any], context: Any) -> None: +def lambda_handler(event: Dict[str, Any], context: Any) -> None: # noqa: U100 """Lambda Handler. Args: @@ -429,8 +422,6 @@ def lambda_handler(event: Dict[str, Any], context: Any) -> None: ValueError: Unexpected error executing Lambda function """ LOGGER.info("....Lambda Handler Started....") - event_info = {"Event": event} - LOGGER.info(event_info) try: orchestrator(event, context) except Exception: @@ -438,7 +429,7 @@ def lambda_handler(event: Dict[str, Any], context: Any) -> None: raise ValueError(f"Unexpected error executing Lambda function. Review CloudWatch logs '{context.log_group_name}' for details.") from None -def terraform_handler(event: Dict[str, Any], context: Context) -> None: +def terraform_handler(event: Dict[str, Any], context: Context) -> None: # noqa: U100 """Lambda Handler. Args: @@ -449,8 +440,6 @@ def terraform_handler(event: Dict[str, Any], context: Context) -> None: ValueError: Unexpected error executing Lambda function """ LOGGER.info("....Lambda Handler Started....") - event_info = {"Event": event} - LOGGER.info(event_info) try: if "Records" not in event and "RequestType" not in event and ("source" not in event and event["source"] != "aws.controltower"): raise ValueError( diff --git a/aws_sra_examples/solutions/shield_advanced/shield_advanced/lambda/src/app.py b/aws_sra_examples/solutions/shield_advanced/shield_advanced/lambda/src/app.py index 6f115fc8..34eccd85 100644 --- a/aws_sra_examples/solutions/shield_advanced/shield_advanced/lambda/src/app.py +++ b/aws_sra_examples/solutions/shield_advanced/shield_advanced/lambda/src/app.py @@ -69,14 +69,12 @@ def process_add_update_event(params: dict, accounts: list) -> None: LOGGER.info("...ADD_UPDATE_NO_EVENT") -def process_event(event: dict) -> None: +def process_event(event: dict) -> None: # noqa: U100 """Process Event. Args: event: event data """ - event_info = {"Event": event} - LOGGER.info(event_info) params = get_validated_parameters({"RequestType": event["RequestType"]}) excluded_accounts: list = [] @@ -605,9 +603,6 @@ def process_event_cloudformation(event: CloudFormationCustomResourceEvent, conte Returns: AWS CloudFormation physical resource id """ - event_info = {"Event": event} - LOGGER.info(event_info) - params = get_validated_parameters({"RequestType": event["RequestType"]}) excluded_accounts: list = [] accounts = common.get_active_organization_accounts(excluded_accounts) @@ -622,7 +617,7 @@ def process_event_cloudformation(event: CloudFormationCustomResourceEvent, conte return f"sra-shield-advanced-{params['DELEGATED_ADMIN_ACCOUNT_ID']}" -def orchestrator(event: Dict[str, Any], context: Any) -> None: +def orchestrator(event: Dict[str, Any], context: Any) -> None: # noqa: U100 """Orchestration. Args: @@ -637,7 +632,7 @@ def orchestrator(event: Dict[str, Any], context: Any) -> None: process_event(event) -def lambda_handler(event: Dict[str, Any], context: Any) -> None: +def lambda_handler(event: Dict[str, Any], context: Any) -> None: # noqa: U100 """Lambda Handler. Args: @@ -650,8 +645,6 @@ def lambda_handler(event: Dict[str, Any], context: Any) -> None: LOGGER.info("....Lambda Handler Started....") boto3_version = boto3.__version__ LOGGER.info(f"boto3 version: {boto3_version}") - event_info = {"Event": event} - LOGGER.info(event_info) try: orchestrator(event, context) except Exception as ex: