diff --git a/samtranslator/model/iam.py b/samtranslator/model/iam.py index fe39be962..b1653a26e 100644 --- a/samtranslator/model/iam.py +++ b/samtranslator/model/iam.py @@ -1,5 +1,5 @@ from samtranslator.model import PropertyType, Resource -from samtranslator.model.types import is_type, is_str +from samtranslator.model.types import is_type, is_str, list_of from samtranslator.model.intrinsics import ref, fnGetAtt @@ -10,7 +10,8 @@ class IAMRole(Resource): 'ManagedPolicyArns': PropertyType(False, is_type(list)), 'Path': PropertyType(False, is_str()), 'Policies': PropertyType(False, is_type(list)), - 'PermissionsBoundary': PropertyType(False, is_str()) + 'PermissionsBoundary': PropertyType(False, is_str()), + 'Tags': PropertyType(False, list_of(is_type(dict))), } runtime_attrs = { diff --git a/samtranslator/model/sam_resources.py b/samtranslator/model/sam_resources.py index 79423b539..a4a371784 100644 --- a/samtranslator/model/sam_resources.py +++ b/samtranslator/model/sam_resources.py @@ -269,6 +269,7 @@ def _construct_role(self, managed_policy_map): execution_role.ManagedPolicyArns = list(managed_policy_arns) execution_role.Policies = policy_documents or None execution_role.PermissionsBoundary = self.PermissionsBoundary + execution_role.Tags = self._construct_tag_list(self.Tags) return execution_role diff --git a/tests/translator/output/alexa_skill.json b/tests/translator/output/alexa_skill.json index 1888b5a14..310f2347d 100644 --- a/tests/translator/output/alexa_skill.json +++ b/tests/translator/output/alexa_skill.json @@ -7,7 +7,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/alexa_skill_with_skill_id.json b/tests/translator/output/alexa_skill_with_skill_id.json index b630d62f7..0522d21dd 100644 --- a/tests/translator/output/alexa_skill_with_skill_id.json +++ b/tests/translator/output/alexa_skill_with_skill_id.json @@ -7,8 +7,14 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], - "AssumeRolePolicyDocument": { + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], + "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ { diff --git a/tests/translator/output/all_policy_templates.json b/tests/translator/output/all_policy_templates.json index ba1fd00f4..350ba3b4e 100644 --- a/tests/translator/output/all_policy_templates.json +++ b/tests/translator/output/all_policy_templates.json @@ -29,6 +29,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "Policies": [ { "PolicyName": "KitchenSinkFunctionRolePolicy0", diff --git a/tests/translator/output/api_cache.json b/tests/translator/output/api_cache.json index 1f6594d95..aacef0fb5 100644 --- a/tests/translator/output/api_cache.json +++ b/tests/translator/output/api_cache.json @@ -5,7 +5,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_endpoint_configuration.json b/tests/translator/output/api_endpoint_configuration.json index 0edf41ecd..c3c291be1 100644 --- a/tests/translator/output/api_endpoint_configuration.json +++ b/tests/translator/output/api_endpoint_configuration.json @@ -33,7 +33,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_request_model.json b/tests/translator/output/api_request_model.json index ecca5ff5e..0c76e6ab3 100644 --- a/tests/translator/output/api_request_model.json +++ b/tests/translator/output/api_request_model.json @@ -5,7 +5,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_request_model_openapi_3.json b/tests/translator/output/api_request_model_openapi_3.json index d26fac709..b0cb087e9 100644 --- a/tests/translator/output/api_request_model_openapi_3.json +++ b/tests/translator/output/api_request_model_openapi_3.json @@ -5,7 +5,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_access_log_setting.json b/tests/translator/output/api_with_access_log_setting.json index 29a1fe735..b95be5f4c 100644 --- a/tests/translator/output/api_with_access_log_setting.json +++ b/tests/translator/output/api_with_access_log_setting.json @@ -29,6 +29,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_apikey_default_override.json b/tests/translator/output/api_with_apikey_default_override.json index aa6c0f919..1e519e626 100644 --- a/tests/translator/output/api_with_apikey_default_override.json +++ b/tests/translator/output/api_with_apikey_default_override.json @@ -159,8 +159,14 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], - "AssumeRolePolicyDocument": { + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], + "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ { @@ -183,8 +189,14 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], - "AssumeRolePolicyDocument": { + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], + "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ { @@ -207,8 +219,14 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], - "AssumeRolePolicyDocument": { + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], + "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ { diff --git a/tests/translator/output/api_with_apikey_required.json b/tests/translator/output/api_with_apikey_required.json index 909af947a..7e51acae3 100644 --- a/tests/translator/output/api_with_apikey_required.json +++ b/tests/translator/output/api_with_apikey_required.json @@ -5,7 +5,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_apikey_required_openapi_3.json b/tests/translator/output/api_with_apikey_required_openapi_3.json index 8a8c57f8e..23702dced 100644 --- a/tests/translator/output/api_with_apikey_required_openapi_3.json +++ b/tests/translator/output/api_with_apikey_required_openapi_3.json @@ -5,7 +5,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_auth_all_maximum.json b/tests/translator/output/api_with_auth_all_maximum.json index f0dbdd1f4..58a97705c 100644 --- a/tests/translator/output/api_with_auth_all_maximum.json +++ b/tests/translator/output/api_with_auth_all_maximum.json @@ -88,7 +88,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_auth_all_maximum_openapi_3.json b/tests/translator/output/api_with_auth_all_maximum_openapi_3.json index 6d3b9baf7..a0d453fe0 100644 --- a/tests/translator/output/api_with_auth_all_maximum_openapi_3.json +++ b/tests/translator/output/api_with_auth_all_maximum_openapi_3.json @@ -88,7 +88,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_auth_all_minimum.json b/tests/translator/output/api_with_auth_all_minimum.json index 28e5dc822..f85c0a024 100644 --- a/tests/translator/output/api_with_auth_all_minimum.json +++ b/tests/translator/output/api_with_auth_all_minimum.json @@ -125,7 +125,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -368,7 +374,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_auth_all_minimum_openapi.json b/tests/translator/output/api_with_auth_all_minimum_openapi.json index 750d534f0..e8c2bf109 100644 --- a/tests/translator/output/api_with_auth_all_minimum_openapi.json +++ b/tests/translator/output/api_with_auth_all_minimum_openapi.json @@ -117,7 +117,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -351,7 +357,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_auth_and_conditions_all_max.json b/tests/translator/output/api_with_auth_and_conditions_all_max.json index d5f946aa9..2a4195970 100644 --- a/tests/translator/output/api_with_auth_and_conditions_all_max.json +++ b/tests/translator/output/api_with_auth_and_conditions_all_max.json @@ -392,7 +392,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -534,7 +540,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_auth_no_default.json b/tests/translator/output/api_with_auth_no_default.json index 4c5342089..1e9687946 100644 --- a/tests/translator/output/api_with_auth_no_default.json +++ b/tests/translator/output/api_with_auth_no_default.json @@ -110,7 +110,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -358,7 +364,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_aws_account_blacklist.json b/tests/translator/output/api_with_aws_account_blacklist.json index 1202e8818..950c46174 100644 --- a/tests/translator/output/api_with_aws_account_blacklist.json +++ b/tests/translator/output/api_with_aws_account_blacklist.json @@ -49,7 +49,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_aws_account_whitelist.json b/tests/translator/output/api_with_aws_account_whitelist.json index 4cb4209e2..e6a91af8b 100644 --- a/tests/translator/output/api_with_aws_account_whitelist.json +++ b/tests/translator/output/api_with_aws_account_whitelist.json @@ -49,7 +49,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_aws_iam_auth_overrides.json b/tests/translator/output/api_with_aws_iam_auth_overrides.json index b814e4069..28486d175 100644 --- a/tests/translator/output/api_with_aws_iam_auth_overrides.json +++ b/tests/translator/output/api_with_aws_iam_auth_overrides.json @@ -86,7 +86,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -274,7 +280,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -342,7 +354,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -366,7 +384,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -519,7 +543,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -543,7 +573,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -567,7 +603,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -591,7 +633,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -852,7 +900,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_basic_custom_domain.json b/tests/translator/output/api_with_basic_custom_domain.json index 708cfa50d..562dbaaa4 100644 --- a/tests/translator/output/api_with_basic_custom_domain.json +++ b/tests/translator/output/api_with_basic_custom_domain.json @@ -173,7 +173,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_basic_custom_domain_intrinsics.json b/tests/translator/output/api_with_basic_custom_domain_intrinsics.json index 4b7879e7d..d72b92bcd 100644 --- a/tests/translator/output/api_with_basic_custom_domain_intrinsics.json +++ b/tests/translator/output/api_with_basic_custom_domain_intrinsics.json @@ -122,7 +122,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_binary_media_types.json b/tests/translator/output/api_with_binary_media_types.json index 2b10bb70c..28489d636 100644 --- a/tests/translator/output/api_with_binary_media_types.json +++ b/tests/translator/output/api_with_binary_media_types.json @@ -34,7 +34,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_canary_setting.json b/tests/translator/output/api_with_canary_setting.json index e870f6bbb..cd7fc482c 100644 --- a/tests/translator/output/api_with_canary_setting.json +++ b/tests/translator/output/api_with_canary_setting.json @@ -29,6 +29,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_cors.json b/tests/translator/output/api_with_cors.json index 2e8475067..1477d79ac 100644 --- a/tests/translator/output/api_with_cors.json +++ b/tests/translator/output/api_with_cors.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -209,7 +215,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -255,7 +267,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_cors_and_auth_no_preflight_auth.json b/tests/translator/output/api_with_cors_and_auth_no_preflight_auth.json index 3e39eb8a4..b1610a0fd 100644 --- a/tests/translator/output/api_with_cors_and_auth_no_preflight_auth.json +++ b/tests/translator/output/api_with_cors_and_auth_no_preflight_auth.json @@ -128,7 +128,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -252,7 +258,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_cors_and_auth_preflight_auth.json b/tests/translator/output/api_with_cors_and_auth_preflight_auth.json index 466c04620..949504cb0 100644 --- a/tests/translator/output/api_with_cors_and_auth_preflight_auth.json +++ b/tests/translator/output/api_with_cors_and_auth_preflight_auth.json @@ -133,7 +133,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -257,7 +263,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_cors_and_conditions_no_definitionbody.json b/tests/translator/output/api_with_cors_and_conditions_no_definitionbody.json index 44adface0..bbec68ab8 100644 --- a/tests/translator/output/api_with_cors_and_conditions_no_definitionbody.json +++ b/tests/translator/output/api_with_cors_and_conditions_no_definitionbody.json @@ -38,7 +38,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -249,7 +255,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_cors_and_only_credentials_false.json b/tests/translator/output/api_with_cors_and_only_credentials_false.json index fe7a5f402..80753a903 100644 --- a/tests/translator/output/api_with_cors_and_only_credentials_false.json +++ b/tests/translator/output/api_with_cors_and_only_credentials_false.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_cors_and_only_headers.json b/tests/translator/output/api_with_cors_and_only_headers.json index 5659aac16..6ad468688 100644 --- a/tests/translator/output/api_with_cors_and_only_headers.json +++ b/tests/translator/output/api_with_cors_and_only_headers.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_cors_and_only_maxage.json b/tests/translator/output/api_with_cors_and_only_maxage.json index a19fcdfdb..26c2a83e2 100644 --- a/tests/translator/output/api_with_cors_and_only_maxage.json +++ b/tests/translator/output/api_with_cors_and_only_maxage.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_cors_and_only_methods.json b/tests/translator/output/api_with_cors_and_only_methods.json index 485c59589..3d91a1029 100644 --- a/tests/translator/output/api_with_cors_and_only_methods.json +++ b/tests/translator/output/api_with_cors_and_only_methods.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_cors_and_only_origins.json b/tests/translator/output/api_with_cors_and_only_origins.json index 33894124e..562600ab1 100644 --- a/tests/translator/output/api_with_cors_and_only_origins.json +++ b/tests/translator/output/api_with_cors_and_only_origins.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_cors_no_definitionbody.json b/tests/translator/output/api_with_cors_no_definitionbody.json index 17e266a95..c83d697d8 100644 --- a/tests/translator/output/api_with_cors_no_definitionbody.json +++ b/tests/translator/output/api_with_cors_no_definitionbody.json @@ -28,6 +28,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [{ diff --git a/tests/translator/output/api_with_cors_openapi_3.json b/tests/translator/output/api_with_cors_openapi_3.json index addceb247..1311ee899 100644 --- a/tests/translator/output/api_with_cors_openapi_3.json +++ b/tests/translator/output/api_with_cors_openapi_3.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -209,7 +215,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -257,7 +269,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_custom_domain_route53.json b/tests/translator/output/api_with_custom_domain_route53.json index fca043de3..5681337dd 100644 --- a/tests/translator/output/api_with_custom_domain_route53.json +++ b/tests/translator/output/api_with_custom_domain_route53.json @@ -189,7 +189,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_default_aws_iam_auth.json b/tests/translator/output/api_with_default_aws_iam_auth.json index 7df93f7fc..53b534a46 100644 --- a/tests/translator/output/api_with_default_aws_iam_auth.json +++ b/tests/translator/output/api_with_default_aws_iam_auth.json @@ -284,6 +284,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_default_aws_iam_auth_and_no_auth_route.json b/tests/translator/output/api_with_default_aws_iam_auth_and_no_auth_route.json index 8f7e2bacc..2982334df 100644 --- a/tests/translator/output/api_with_default_aws_iam_auth_and_no_auth_route.json +++ b/tests/translator/output/api_with_default_aws_iam_auth_and_no_auth_route.json @@ -150,6 +150,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_gateway_responses.json b/tests/translator/output/api_with_gateway_responses.json index cbf4e3fc4..bb010a7a0 100644 --- a/tests/translator/output/api_with_gateway_responses.json +++ b/tests/translator/output/api_with_gateway_responses.json @@ -29,6 +29,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_gateway_responses_all.json b/tests/translator/output/api_with_gateway_responses_all.json index 151dc86b2..e9eb1bb50 100644 --- a/tests/translator/output/api_with_gateway_responses_all.json +++ b/tests/translator/output/api_with_gateway_responses_all.json @@ -29,6 +29,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_gateway_responses_all_openapi_3.json b/tests/translator/output/api_with_gateway_responses_all_openapi_3.json index a26edfad6..20f76ec2b 100644 --- a/tests/translator/output/api_with_gateway_responses_all_openapi_3.json +++ b/tests/translator/output/api_with_gateway_responses_all_openapi_3.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_gateway_responses_implicit.json b/tests/translator/output/api_with_gateway_responses_implicit.json index 7a38699dc..a071d97d9 100644 --- a/tests/translator/output/api_with_gateway_responses_implicit.json +++ b/tests/translator/output/api_with_gateway_responses_implicit.json @@ -39,6 +39,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_gateway_responses_minimal.json b/tests/translator/output/api_with_gateway_responses_minimal.json index 9280a2c73..d718af9bc 100644 --- a/tests/translator/output/api_with_gateway_responses_minimal.json +++ b/tests/translator/output/api_with_gateway_responses_minimal.json @@ -29,6 +29,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_gateway_responses_string_status_code.json b/tests/translator/output/api_with_gateway_responses_string_status_code.json index cbf4e3fc4..bb010a7a0 100644 --- a/tests/translator/output/api_with_gateway_responses_string_status_code.json +++ b/tests/translator/output/api_with_gateway_responses_string_status_code.json @@ -29,6 +29,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_incompatible_stage_name.json b/tests/translator/output/api_with_incompatible_stage_name.json index 0e5165c9b..dd3abd9f8 100644 --- a/tests/translator/output/api_with_incompatible_stage_name.json +++ b/tests/translator/output/api_with_incompatible_stage_name.json @@ -75,7 +75,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -253,7 +259,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_ip_range_blacklist.json b/tests/translator/output/api_with_ip_range_blacklist.json index 062ca60ea..0b300f3fd 100644 --- a/tests/translator/output/api_with_ip_range_blacklist.json +++ b/tests/translator/output/api_with_ip_range_blacklist.json @@ -49,7 +49,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_ip_range_whitelist.json b/tests/translator/output/api_with_ip_range_whitelist.json index 375edb5df..988db3598 100644 --- a/tests/translator/output/api_with_ip_range_whitelist.json +++ b/tests/translator/output/api_with_ip_range_whitelist.json @@ -49,7 +49,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_method_aws_iam_auth.json b/tests/translator/output/api_with_method_aws_iam_auth.json index cbf6c36c8..b0bb424c1 100644 --- a/tests/translator/output/api_with_method_aws_iam_auth.json +++ b/tests/translator/output/api_with_method_aws_iam_auth.json @@ -188,6 +188,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_method_settings.json b/tests/translator/output/api_with_method_settings.json index da43cf30b..ff59ac592 100644 --- a/tests/translator/output/api_with_method_settings.json +++ b/tests/translator/output/api_with_method_settings.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_minimum_compression_size.json b/tests/translator/output/api_with_minimum_compression_size.json index 95c22b8f7..a22c045aa 100644 --- a/tests/translator/output/api_with_minimum_compression_size.json +++ b/tests/translator/output/api_with_minimum_compression_size.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_open_api_version.json b/tests/translator/output/api_with_open_api_version.json index 07784a30a..4d1df1631 100644 --- a/tests/translator/output/api_with_open_api_version.json +++ b/tests/translator/output/api_with_open_api_version.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_open_api_version_2.json b/tests/translator/output/api_with_open_api_version_2.json index fe7c09aec..fdba0c231 100644 --- a/tests/translator/output/api_with_open_api_version_2.json +++ b/tests/translator/output/api_with_open_api_version_2.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_openapi_definition_body_no_flag.json b/tests/translator/output/api_with_openapi_definition_body_no_flag.json index 186712d1e..0133f7db8 100644 --- a/tests/translator/output/api_with_openapi_definition_body_no_flag.json +++ b/tests/translator/output/api_with_openapi_definition_body_no_flag.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_path_parameters.json b/tests/translator/output/api_with_path_parameters.json index 4f03ba4a1..7e6fdffc8 100644 --- a/tests/translator/output/api_with_path_parameters.json +++ b/tests/translator/output/api_with_path_parameters.json @@ -6,6 +6,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_resource_policy.json b/tests/translator/output/api_with_resource_policy.json index bc747d621..1ccda5929 100644 --- a/tests/translator/output/api_with_resource_policy.json +++ b/tests/translator/output/api_with_resource_policy.json @@ -89,7 +89,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_resource_policy_global.json b/tests/translator/output/api_with_resource_policy_global.json index fa907c1b2..189ebefd4 100644 --- a/tests/translator/output/api_with_resource_policy_global.json +++ b/tests/translator/output/api_with_resource_policy_global.json @@ -79,7 +79,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_resource_policy_global_implicit.json b/tests/translator/output/api_with_resource_policy_global_implicit.json index 20b49c897..c2cdcc35e 100644 --- a/tests/translator/output/api_with_resource_policy_global_implicit.json +++ b/tests/translator/output/api_with_resource_policy_global_implicit.json @@ -26,7 +26,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_resource_refs.json b/tests/translator/output/api_with_resource_refs.json index 412a7856a..87218b223 100644 --- a/tests/translator/output/api_with_resource_refs.json +++ b/tests/translator/output/api_with_resource_refs.json @@ -115,7 +115,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_source_vpc_blacklist.json b/tests/translator/output/api_with_source_vpc_blacklist.json index 643e87fc0..a3b1005f8 100644 --- a/tests/translator/output/api_with_source_vpc_blacklist.json +++ b/tests/translator/output/api_with_source_vpc_blacklist.json @@ -49,7 +49,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_source_vpc_whitelist.json b/tests/translator/output/api_with_source_vpc_whitelist.json index a71b0a401..32e2a29e8 100644 --- a/tests/translator/output/api_with_source_vpc_whitelist.json +++ b/tests/translator/output/api_with_source_vpc_whitelist.json @@ -107,7 +107,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_swagger_and_openapi_with_auth.json b/tests/translator/output/api_with_swagger_and_openapi_with_auth.json index 099891345..d7b9cf7fc 100644 --- a/tests/translator/output/api_with_swagger_and_openapi_with_auth.json +++ b/tests/translator/output/api_with_swagger_and_openapi_with_auth.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/api_with_xray_tracing.json b/tests/translator/output/api_with_xray_tracing.json index e0ba32313..3de167b01 100644 --- a/tests/translator/output/api_with_xray_tracing.json +++ b/tests/translator/output/api_with_xray_tracing.json @@ -6,6 +6,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/alexa_skill.json b/tests/translator/output/aws-cn/alexa_skill.json index 411fa36ac..048ebf3a9 100644 --- a/tests/translator/output/aws-cn/alexa_skill.json +++ b/tests/translator/output/aws-cn/alexa_skill.json @@ -7,7 +7,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/alexa_skill_with_skill_id.json b/tests/translator/output/aws-cn/alexa_skill_with_skill_id.json index 5a85f36d1..b867b140e 100644 --- a/tests/translator/output/aws-cn/alexa_skill_with_skill_id.json +++ b/tests/translator/output/aws-cn/alexa_skill_with_skill_id.json @@ -7,7 +7,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/all_policy_templates.json b/tests/translator/output/aws-cn/all_policy_templates.json index 36123aedf..86324d206 100644 --- a/tests/translator/output/aws-cn/all_policy_templates.json +++ b/tests/translator/output/aws-cn/all_policy_templates.json @@ -29,6 +29,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "Policies": [ { "PolicyName": "KitchenSinkFunctionRolePolicy0", diff --git a/tests/translator/output/aws-cn/api_cache.json b/tests/translator/output/aws-cn/api_cache.json index 6a019a53f..2fd3292d1 100644 --- a/tests/translator/output/aws-cn/api_cache.json +++ b/tests/translator/output/aws-cn/api_cache.json @@ -5,7 +5,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_endpoint_configuration.json b/tests/translator/output/aws-cn/api_endpoint_configuration.json index d529e6a18..2ed7aa632 100644 --- a/tests/translator/output/aws-cn/api_endpoint_configuration.json +++ b/tests/translator/output/aws-cn/api_endpoint_configuration.json @@ -33,7 +33,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_request_model.json b/tests/translator/output/aws-cn/api_request_model.json index 5a823b048..7e186e26a 100644 --- a/tests/translator/output/aws-cn/api_request_model.json +++ b/tests/translator/output/aws-cn/api_request_model.json @@ -5,7 +5,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_request_model_openapi_3.json b/tests/translator/output/aws-cn/api_request_model_openapi_3.json index ac3da74ae..50d11b684 100644 --- a/tests/translator/output/aws-cn/api_request_model_openapi_3.json +++ b/tests/translator/output/aws-cn/api_request_model_openapi_3.json @@ -14,7 +14,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_access_log_setting.json b/tests/translator/output/aws-cn/api_with_access_log_setting.json index 2d9b289f5..1b321ac58 100644 --- a/tests/translator/output/aws-cn/api_with_access_log_setting.json +++ b/tests/translator/output/aws-cn/api_with_access_log_setting.json @@ -29,6 +29,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_apikey_default_override.json b/tests/translator/output/aws-cn/api_with_apikey_default_override.json index 0670bf696..6eca06e76 100644 --- a/tests/translator/output/aws-cn/api_with_apikey_default_override.json +++ b/tests/translator/output/aws-cn/api_with_apikey_default_override.json @@ -160,6 +160,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -184,6 +190,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -208,6 +220,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_apikey_required.json b/tests/translator/output/aws-cn/api_with_apikey_required.json index 808101d53..c5771123f 100644 --- a/tests/translator/output/aws-cn/api_with_apikey_required.json +++ b/tests/translator/output/aws-cn/api_with_apikey_required.json @@ -6,6 +6,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_apikey_required_openapi_3.json b/tests/translator/output/aws-cn/api_with_apikey_required_openapi_3.json index 3afff3f2e..41d76730d 100644 --- a/tests/translator/output/aws-cn/api_with_apikey_required_openapi_3.json +++ b/tests/translator/output/aws-cn/api_with_apikey_required_openapi_3.json @@ -5,7 +5,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_auth_all_maximum.json b/tests/translator/output/aws-cn/api_with_auth_all_maximum.json index f3a9ab69f..737ad5491 100644 --- a/tests/translator/output/aws-cn/api_with_auth_all_maximum.json +++ b/tests/translator/output/aws-cn/api_with_auth_all_maximum.json @@ -88,7 +88,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_auth_all_maximum_openapi_3.json b/tests/translator/output/aws-cn/api_with_auth_all_maximum_openapi_3.json index 9fd3d2575..25ea170b4 100644 --- a/tests/translator/output/aws-cn/api_with_auth_all_maximum_openapi_3.json +++ b/tests/translator/output/aws-cn/api_with_auth_all_maximum_openapi_3.json @@ -88,7 +88,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_auth_all_minimum.json b/tests/translator/output/aws-cn/api_with_auth_all_minimum.json index 3719ad7bf..3cddd2da4 100644 --- a/tests/translator/output/aws-cn/api_with_auth_all_minimum.json +++ b/tests/translator/output/aws-cn/api_with_auth_all_minimum.json @@ -123,7 +123,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -384,7 +390,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_auth_all_minimum_openapi.json b/tests/translator/output/aws-cn/api_with_auth_all_minimum_openapi.json index 4f4aead6a..2a446b8a4 100644 --- a/tests/translator/output/aws-cn/api_with_auth_all_minimum_openapi.json +++ b/tests/translator/output/aws-cn/api_with_auth_all_minimum_openapi.json @@ -134,7 +134,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -385,7 +391,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_auth_and_conditions_all_max.json b/tests/translator/output/aws-cn/api_with_auth_and_conditions_all_max.json index 008680cb0..9003795a9 100644 --- a/tests/translator/output/aws-cn/api_with_auth_and_conditions_all_max.json +++ b/tests/translator/output/aws-cn/api_with_auth_and_conditions_all_max.json @@ -410,7 +410,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -518,7 +524,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_auth_no_default.json b/tests/translator/output/aws-cn/api_with_auth_no_default.json index 37e88ac07..e4a208af6 100644 --- a/tests/translator/output/aws-cn/api_with_auth_no_default.json +++ b/tests/translator/output/aws-cn/api_with_auth_no_default.json @@ -149,7 +149,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -374,7 +380,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_aws_account_blacklist.json b/tests/translator/output/aws-cn/api_with_aws_account_blacklist.json index bd01c1e50..db2f74cf5 100644 --- a/tests/translator/output/aws-cn/api_with_aws_account_blacklist.json +++ b/tests/translator/output/aws-cn/api_with_aws_account_blacklist.json @@ -39,7 +39,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_aws_account_whitelist.json b/tests/translator/output/aws-cn/api_with_aws_account_whitelist.json index 9cec5b40f..a4e8e547d 100644 --- a/tests/translator/output/aws-cn/api_with_aws_account_whitelist.json +++ b/tests/translator/output/aws-cn/api_with_aws_account_whitelist.json @@ -49,7 +49,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_aws_iam_auth_overrides.json b/tests/translator/output/aws-cn/api_with_aws_iam_auth_overrides.json index 0040da8f7..bcaeae6fb 100644 --- a/tests/translator/output/aws-cn/api_with_aws_iam_auth_overrides.json +++ b/tests/translator/output/aws-cn/api_with_aws_iam_auth_overrides.json @@ -96,7 +96,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -302,7 +308,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -370,7 +382,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -394,7 +412,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -527,7 +551,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -551,7 +581,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -575,7 +611,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -599,7 +641,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -868,7 +916,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_basic_custom_domain.json b/tests/translator/output/aws-cn/api_with_basic_custom_domain.json index 889f4512a..81da54f16 100644 --- a/tests/translator/output/aws-cn/api_with_basic_custom_domain.json +++ b/tests/translator/output/aws-cn/api_with_basic_custom_domain.json @@ -182,7 +182,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_basic_custom_domain_intrinsics.json b/tests/translator/output/aws-cn/api_with_basic_custom_domain_intrinsics.json index f3efb6492..efc52f960 100644 --- a/tests/translator/output/aws-cn/api_with_basic_custom_domain_intrinsics.json +++ b/tests/translator/output/aws-cn/api_with_basic_custom_domain_intrinsics.json @@ -118,7 +118,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_binary_media_types.json b/tests/translator/output/aws-cn/api_with_binary_media_types.json index 255484837..8857f0850 100644 --- a/tests/translator/output/aws-cn/api_with_binary_media_types.json +++ b/tests/translator/output/aws-cn/api_with_binary_media_types.json @@ -34,7 +34,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_canary_setting.json b/tests/translator/output/aws-cn/api_with_canary_setting.json index ef48c720a..5ad2d2dd2 100644 --- a/tests/translator/output/aws-cn/api_with_canary_setting.json +++ b/tests/translator/output/aws-cn/api_with_canary_setting.json @@ -29,6 +29,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_cors.json b/tests/translator/output/aws-cn/api_with_cors.json index 391f49226..a935eed3c 100644 --- a/tests/translator/output/aws-cn/api_with_cors.json +++ b/tests/translator/output/aws-cn/api_with_cors.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -217,7 +223,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -265,7 +277,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_cors_and_auth_no_preflight_auth.json b/tests/translator/output/aws-cn/api_with_cors_and_auth_no_preflight_auth.json index 3426626b9..f98f3150c 100644 --- a/tests/translator/output/aws-cn/api_with_cors_and_auth_no_preflight_auth.json +++ b/tests/translator/output/aws-cn/api_with_cors_and_auth_no_preflight_auth.json @@ -136,7 +136,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -260,7 +266,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_cors_and_auth_preflight_auth.json b/tests/translator/output/aws-cn/api_with_cors_and_auth_preflight_auth.json index d64b3aeec..b2a41de86 100644 --- a/tests/translator/output/aws-cn/api_with_cors_and_auth_preflight_auth.json +++ b/tests/translator/output/aws-cn/api_with_cors_and_auth_preflight_auth.json @@ -131,7 +131,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -265,7 +271,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_cors_and_conditions_no_definitionbody.json b/tests/translator/output/aws-cn/api_with_cors_and_conditions_no_definitionbody.json index eb8f777b7..1e0ba11af 100644 --- a/tests/translator/output/aws-cn/api_with_cors_and_conditions_no_definitionbody.json +++ b/tests/translator/output/aws-cn/api_with_cors_and_conditions_no_definitionbody.json @@ -38,7 +38,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -245,7 +251,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_cors_and_only_credentials_false.json b/tests/translator/output/aws-cn/api_with_cors_and_only_credentials_false.json index f486d5215..ebb5b8c5f 100644 --- a/tests/translator/output/aws-cn/api_with_cors_and_only_credentials_false.json +++ b/tests/translator/output/aws-cn/api_with_cors_and_only_credentials_false.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_cors_and_only_headers.json b/tests/translator/output/aws-cn/api_with_cors_and_only_headers.json index 4fd81be39..b004e3148 100644 --- a/tests/translator/output/aws-cn/api_with_cors_and_only_headers.json +++ b/tests/translator/output/aws-cn/api_with_cors_and_only_headers.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_cors_and_only_maxage.json b/tests/translator/output/aws-cn/api_with_cors_and_only_maxage.json index 5a033f269..7bd440a88 100644 --- a/tests/translator/output/aws-cn/api_with_cors_and_only_maxage.json +++ b/tests/translator/output/aws-cn/api_with_cors_and_only_maxage.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_cors_and_only_methods.json b/tests/translator/output/aws-cn/api_with_cors_and_only_methods.json index a52a9552d..d8f6d5cb7 100644 --- a/tests/translator/output/aws-cn/api_with_cors_and_only_methods.json +++ b/tests/translator/output/aws-cn/api_with_cors_and_only_methods.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_cors_and_only_origins.json b/tests/translator/output/aws-cn/api_with_cors_and_only_origins.json index 46d7155d7..1251634be 100644 --- a/tests/translator/output/aws-cn/api_with_cors_and_only_origins.json +++ b/tests/translator/output/aws-cn/api_with_cors_and_only_origins.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_cors_no_definitionbody.json b/tests/translator/output/aws-cn/api_with_cors_no_definitionbody.json index a4b02d02b..34a15e34b 100644 --- a/tests/translator/output/aws-cn/api_with_cors_no_definitionbody.json +++ b/tests/translator/output/aws-cn/api_with_cors_no_definitionbody.json @@ -28,6 +28,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [{ diff --git a/tests/translator/output/aws-cn/api_with_cors_openapi_3.json b/tests/translator/output/aws-cn/api_with_cors_openapi_3.json index 99a5d51f4..c7567ce1c 100644 --- a/tests/translator/output/aws-cn/api_with_cors_openapi_3.json +++ b/tests/translator/output/aws-cn/api_with_cors_openapi_3.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -226,7 +232,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -274,7 +286,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_custom_domain_route53.json b/tests/translator/output/aws-cn/api_with_custom_domain_route53.json index 30113d4e3..9bb60c267 100644 --- a/tests/translator/output/aws-cn/api_with_custom_domain_route53.json +++ b/tests/translator/output/aws-cn/api_with_custom_domain_route53.json @@ -189,7 +189,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_default_aws_iam_auth.json b/tests/translator/output/aws-cn/api_with_default_aws_iam_auth.json index 521250949..2331bbbce 100644 --- a/tests/translator/output/aws-cn/api_with_default_aws_iam_auth.json +++ b/tests/translator/output/aws-cn/api_with_default_aws_iam_auth.json @@ -308,6 +308,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_default_aws_iam_auth_and_no_auth_route.json b/tests/translator/output/aws-cn/api_with_default_aws_iam_auth_and_no_auth_route.json index 35361d058..e53268e7e 100644 --- a/tests/translator/output/aws-cn/api_with_default_aws_iam_auth_and_no_auth_route.json +++ b/tests/translator/output/aws-cn/api_with_default_aws_iam_auth_and_no_auth_route.json @@ -158,6 +158,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_gateway_responses.json b/tests/translator/output/aws-cn/api_with_gateway_responses.json index 411d44ac7..0ea9bfbbd 100644 --- a/tests/translator/output/aws-cn/api_with_gateway_responses.json +++ b/tests/translator/output/aws-cn/api_with_gateway_responses.json @@ -39,6 +39,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_gateway_responses_all.json b/tests/translator/output/aws-cn/api_with_gateway_responses_all.json index 8625ec045..b745e747b 100644 --- a/tests/translator/output/aws-cn/api_with_gateway_responses_all.json +++ b/tests/translator/output/aws-cn/api_with_gateway_responses_all.json @@ -29,6 +29,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_gateway_responses_all_openapi_3.json b/tests/translator/output/aws-cn/api_with_gateway_responses_all_openapi_3.json index e73dd8b5b..b62253392 100644 --- a/tests/translator/output/aws-cn/api_with_gateway_responses_all_openapi_3.json +++ b/tests/translator/output/aws-cn/api_with_gateway_responses_all_openapi_3.json @@ -37,7 +37,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_gateway_responses_implicit.json b/tests/translator/output/aws-cn/api_with_gateway_responses_implicit.json index ba3b9c371..94e588ef1 100644 --- a/tests/translator/output/aws-cn/api_with_gateway_responses_implicit.json +++ b/tests/translator/output/aws-cn/api_with_gateway_responses_implicit.json @@ -29,6 +29,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_gateway_responses_minimal.json b/tests/translator/output/aws-cn/api_with_gateway_responses_minimal.json index 53db31ad4..6f0c26697 100644 --- a/tests/translator/output/aws-cn/api_with_gateway_responses_minimal.json +++ b/tests/translator/output/aws-cn/api_with_gateway_responses_minimal.json @@ -29,6 +29,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_gateway_responses_string_status_code.json b/tests/translator/output/aws-cn/api_with_gateway_responses_string_status_code.json index 411d44ac7..0ea9bfbbd 100644 --- a/tests/translator/output/aws-cn/api_with_gateway_responses_string_status_code.json +++ b/tests/translator/output/aws-cn/api_with_gateway_responses_string_status_code.json @@ -39,6 +39,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_incompatible_stage_name.json b/tests/translator/output/aws-cn/api_with_incompatible_stage_name.json index 15910d3ed..e3e7f7d5b 100644 --- a/tests/translator/output/aws-cn/api_with_incompatible_stage_name.json +++ b/tests/translator/output/aws-cn/api_with_incompatible_stage_name.json @@ -73,7 +73,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -269,7 +275,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_ip_range_blacklist.json b/tests/translator/output/aws-cn/api_with_ip_range_blacklist.json index 64c3cbada..a37880e0b 100644 --- a/tests/translator/output/aws-cn/api_with_ip_range_blacklist.json +++ b/tests/translator/output/aws-cn/api_with_ip_range_blacklist.json @@ -49,7 +49,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_ip_range_whitelist.json b/tests/translator/output/aws-cn/api_with_ip_range_whitelist.json index 38fee31e5..e077e80b6 100644 --- a/tests/translator/output/aws-cn/api_with_ip_range_whitelist.json +++ b/tests/translator/output/aws-cn/api_with_ip_range_whitelist.json @@ -49,7 +49,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_method_aws_iam_auth.json b/tests/translator/output/aws-cn/api_with_method_aws_iam_auth.json index a1a556dc8..113fdc052 100644 --- a/tests/translator/output/aws-cn/api_with_method_aws_iam_auth.json +++ b/tests/translator/output/aws-cn/api_with_method_aws_iam_auth.json @@ -196,6 +196,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_method_settings.json b/tests/translator/output/aws-cn/api_with_method_settings.json index 9b5395099..7cc7fb0e3 100644 --- a/tests/translator/output/aws-cn/api_with_method_settings.json +++ b/tests/translator/output/aws-cn/api_with_method_settings.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_minimum_compression_size.json b/tests/translator/output/aws-cn/api_with_minimum_compression_size.json index a34749654..7fe0ff33c 100644 --- a/tests/translator/output/aws-cn/api_with_minimum_compression_size.json +++ b/tests/translator/output/aws-cn/api_with_minimum_compression_size.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_open_api_version.json b/tests/translator/output/aws-cn/api_with_open_api_version.json index 2cc5e8243..f0545c7fc 100644 --- a/tests/translator/output/aws-cn/api_with_open_api_version.json +++ b/tests/translator/output/aws-cn/api_with_open_api_version.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_open_api_version_2.json b/tests/translator/output/aws-cn/api_with_open_api_version_2.json index 2ac4180c1..705f1a573 100644 --- a/tests/translator/output/aws-cn/api_with_open_api_version_2.json +++ b/tests/translator/output/aws-cn/api_with_open_api_version_2.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_openapi_definition_body_no_flag.json b/tests/translator/output/aws-cn/api_with_openapi_definition_body_no_flag.json index 661be5592..aadee8fb2 100644 --- a/tests/translator/output/aws-cn/api_with_openapi_definition_body_no_flag.json +++ b/tests/translator/output/aws-cn/api_with_openapi_definition_body_no_flag.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_path_parameters.json b/tests/translator/output/aws-cn/api_with_path_parameters.json index 530ed5e18..8d33aa064 100644 --- a/tests/translator/output/aws-cn/api_with_path_parameters.json +++ b/tests/translator/output/aws-cn/api_with_path_parameters.json @@ -6,6 +6,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_resource_policy.json b/tests/translator/output/aws-cn/api_with_resource_policy.json index 79effdaf5..fa584dcf8 100644 --- a/tests/translator/output/aws-cn/api_with_resource_policy.json +++ b/tests/translator/output/aws-cn/api_with_resource_policy.json @@ -87,7 +87,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_resource_policy_global.json b/tests/translator/output/aws-cn/api_with_resource_policy_global.json index 2f756e0c4..462ac0a30 100644 --- a/tests/translator/output/aws-cn/api_with_resource_policy_global.json +++ b/tests/translator/output/aws-cn/api_with_resource_policy_global.json @@ -79,7 +79,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_resource_policy_global_implicit.json b/tests/translator/output/aws-cn/api_with_resource_policy_global_implicit.json index 2c7e13e90..12cf8cb8a 100644 --- a/tests/translator/output/aws-cn/api_with_resource_policy_global_implicit.json +++ b/tests/translator/output/aws-cn/api_with_resource_policy_global_implicit.json @@ -26,7 +26,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_resource_refs.json b/tests/translator/output/aws-cn/api_with_resource_refs.json index 5ac04d491..444f60141 100644 --- a/tests/translator/output/aws-cn/api_with_resource_refs.json +++ b/tests/translator/output/aws-cn/api_with_resource_refs.json @@ -115,7 +115,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_source_vpc_blacklist.json b/tests/translator/output/aws-cn/api_with_source_vpc_blacklist.json index eb6b17b7e..4494493b8 100644 --- a/tests/translator/output/aws-cn/api_with_source_vpc_blacklist.json +++ b/tests/translator/output/aws-cn/api_with_source_vpc_blacklist.json @@ -49,7 +49,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_source_vpc_whitelist.json b/tests/translator/output/aws-cn/api_with_source_vpc_whitelist.json index 9637ff9fc..07712739b 100644 --- a/tests/translator/output/aws-cn/api_with_source_vpc_whitelist.json +++ b/tests/translator/output/aws-cn/api_with_source_vpc_whitelist.json @@ -115,7 +115,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_swagger_and_openapi_with_auth.json b/tests/translator/output/aws-cn/api_with_swagger_and_openapi_with_auth.json index 23e8fc751..9125219b5 100644 --- a/tests/translator/output/aws-cn/api_with_swagger_and_openapi_with_auth.json +++ b/tests/translator/output/aws-cn/api_with_swagger_and_openapi_with_auth.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/api_with_xray_tracing.json b/tests/translator/output/aws-cn/api_with_xray_tracing.json index c68bdcc9e..44bd6903b 100644 --- a/tests/translator/output/aws-cn/api_with_xray_tracing.json +++ b/tests/translator/output/aws-cn/api_with_xray_tracing.json @@ -6,6 +6,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/basic_function.json b/tests/translator/output/aws-cn/basic_function.json index d96a640f0..33857a45d 100644 --- a/tests/translator/output/aws-cn/basic_function.json +++ b/tests/translator/output/aws-cn/basic_function.json @@ -40,7 +40,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -133,7 +139,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -259,9 +271,15 @@ "Type": "AWS::IAM::Role", "Properties": { "ManagedPolicyArns": [ - "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", + "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-cn:iam::aws:policy/AmazonDynamoDBFullAccess" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -284,9 +302,15 @@ "Type": "AWS::IAM::Role", "Properties": { "ManagedPolicyArns": [ - "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", + "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-cn:iam::aws:policy/AWSXrayWriteOnlyAccess" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -309,9 +333,15 @@ "Type": "AWS::IAM::Role", "Properties": { "ManagedPolicyArns": [ - "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", + "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-cn:iam::aws:policy/AWSXrayWriteOnlyAccess" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -384,7 +414,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "Policies": [ { "PolicyName": "FunctionWithPolicyDocumentRolePolicy0", diff --git a/tests/translator/output/aws-cn/basic_function_with_tags.json b/tests/translator/output/aws-cn/basic_function_with_tags.json index c3bd6c0ea..b509783b4 100644 --- a/tests/translator/output/aws-cn/basic_function_with_tags.json +++ b/tests/translator/output/aws-cn/basic_function_with_tags.json @@ -12,7 +12,32 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + }, + { + "Value": "TagValue1", + "Key": "TagKey1" + }, + { + "Value": "", + "Key": "TagKey2" + }, + { + "Value": { + "Ref": "TagValueParam" + }, + "Key": "TagKey3" + }, + { + "Value": "123", + "Key": "TagKey4" + } + ], + "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/cloudwatch_logs_with_ref.json b/tests/translator/output/aws-cn/cloudwatch_logs_with_ref.json index 37e03b4b0..350f35f27 100644 --- a/tests/translator/output/aws-cn/cloudwatch_logs_with_ref.json +++ b/tests/translator/output/aws-cn/cloudwatch_logs_with_ref.json @@ -61,6 +61,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/cloudwatchevent.json b/tests/translator/output/aws-cn/cloudwatchevent.json index a4d9169f4..a8c2feb5a 100644 --- a/tests/translator/output/aws-cn/cloudwatchevent.json +++ b/tests/translator/output/aws-cn/cloudwatchevent.json @@ -5,7 +5,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -133,7 +139,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/cloudwatchevent_schedule_properties.json b/tests/translator/output/aws-cn/cloudwatchevent_schedule_properties.json index c947e4bc2..6f75ca22d 100644 --- a/tests/translator/output/aws-cn/cloudwatchevent_schedule_properties.json +++ b/tests/translator/output/aws-cn/cloudwatchevent_schedule_properties.json @@ -5,7 +5,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -132,7 +138,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/cloudwatchlog.json b/tests/translator/output/aws-cn/cloudwatchlog.json index 0cb97f5aa..89fac59ae 100644 --- a/tests/translator/output/aws-cn/cloudwatchlog.json +++ b/tests/translator/output/aws-cn/cloudwatchlog.json @@ -46,6 +46,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/cognito_userpool_with_event.json b/tests/translator/output/aws-cn/cognito_userpool_with_event.json index 552490cb1..c7b514c16 100644 --- a/tests/translator/output/aws-cn/cognito_userpool_with_event.json +++ b/tests/translator/output/aws-cn/cognito_userpool_with_event.json @@ -54,6 +54,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/depends_on.json b/tests/translator/output/aws-cn/depends_on.json index ea1248314..c5c0a7ad6 100644 --- a/tests/translator/output/aws-cn/depends_on.json +++ b/tests/translator/output/aws-cn/depends_on.json @@ -116,6 +116,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/explicit_api.json b/tests/translator/output/aws-cn/explicit_api.json index a51413cd7..2b40e4464 100644 --- a/tests/translator/output/aws-cn/explicit_api.json +++ b/tests/translator/output/aws-cn/explicit_api.json @@ -63,7 +63,14 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-cn:iam::aws:policy/AmazonDynamoDBReadOnlyAccess" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], + "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/explicit_api_openapi_3.json b/tests/translator/output/aws-cn/explicit_api_openapi_3.json index 2ad679e76..76fd80b9a 100644 --- a/tests/translator/output/aws-cn/explicit_api_openapi_3.json +++ b/tests/translator/output/aws-cn/explicit_api_openapi_3.json @@ -72,7 +72,14 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-cn:iam::aws:policy/AmazonDynamoDBReadOnlyAccess" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], + "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/explicit_api_with_invalid_events_config.json b/tests/translator/output/aws-cn/explicit_api_with_invalid_events_config.json index 4bba9eab8..cea2fb8f2 100644 --- a/tests/translator/output/aws-cn/explicit_api_with_invalid_events_config.json +++ b/tests/translator/output/aws-cn/explicit_api_with_invalid_events_config.json @@ -105,7 +105,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/function_concurrency.json b/tests/translator/output/aws-cn/function_concurrency.json index 9ef9d8c98..c7cdb002b 100644 --- a/tests/translator/output/aws-cn/function_concurrency.json +++ b/tests/translator/output/aws-cn/function_concurrency.json @@ -11,6 +11,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -56,6 +62,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/function_event_conditions.json b/tests/translator/output/aws-cn/function_event_conditions.json index 36e58e6a6..62522bc66 100644 --- a/tests/translator/output/aws-cn/function_event_conditions.json +++ b/tests/translator/output/aws-cn/function_event_conditions.json @@ -206,7 +206,13 @@ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaKinesisExecutionRole", "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaDynamoDBExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -320,6 +326,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/function_managed_inline_policy.json b/tests/translator/output/aws-cn/function_managed_inline_policy.json index 3e7979c7d..af76c7621 100644 --- a/tests/translator/output/aws-cn/function_managed_inline_policy.json +++ b/tests/translator/output/aws-cn/function_managed_inline_policy.json @@ -40,7 +40,13 @@ "Ref": "SomeManagedPolicyArn" }, "arn:aws:iam::123456789012:policy/CustomerCreatedManagedPolicy" - ], + ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "Policies": [ { "PolicyName": "FunctionRolePolicy0", diff --git a/tests/translator/output/aws-cn/function_with_alias.json b/tests/translator/output/aws-cn/function_with_alias.json index a64da6577..cf8953e96 100644 --- a/tests/translator/output/aws-cn/function_with_alias.json +++ b/tests/translator/output/aws-cn/function_with_alias.json @@ -53,7 +53,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/function_with_alias_and_event_sources.json b/tests/translator/output/aws-cn/function_with_alias_and_event_sources.json index 789094a82..0d29ad2ea 100644 --- a/tests/translator/output/aws-cn/function_with_alias_and_event_sources.json +++ b/tests/translator/output/aws-cn/function_with_alias_and_event_sources.json @@ -252,7 +252,13 @@ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaKinesisExecutionRole", "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaDynamoDBExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/function_with_alias_intrinsics.json b/tests/translator/output/aws-cn/function_with_alias_intrinsics.json index 7ddf65168..3fff52854 100644 --- a/tests/translator/output/aws-cn/function_with_alias_intrinsics.json +++ b/tests/translator/output/aws-cn/function_with_alias_intrinsics.json @@ -58,7 +58,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/function_with_batch_window.json b/tests/translator/output/aws-cn/function_with_batch_window.json index ae15765cd..6bb376137 100644 --- a/tests/translator/output/aws-cn/function_with_batch_window.json +++ b/tests/translator/output/aws-cn/function_with_batch_window.json @@ -32,6 +32,12 @@ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaDynamoDBExecutionRole", "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaKinesisExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/function_with_condition.json b/tests/translator/output/aws-cn/function_with_condition.json index 4f2d5ccb7..4fbd2abf8 100644 --- a/tests/translator/output/aws-cn/function_with_condition.json +++ b/tests/translator/output/aws-cn/function_with_condition.json @@ -37,7 +37,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/function_with_conditional_managed_policy.json b/tests/translator/output/aws-cn/function_with_conditional_managed_policy.json index f01435330..a71779ff9 100644 --- a/tests/translator/output/aws-cn/function_with_conditional_managed_policy.json +++ b/tests/translator/output/aws-cn/function_with_conditional_managed_policy.json @@ -49,6 +49,12 @@ ] } ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/function_with_conditional_managed_policy_and_ref_no_value.json b/tests/translator/output/aws-cn/function_with_conditional_managed_policy_and_ref_no_value.json index bcd345bf3..794ee731d 100644 --- a/tests/translator/output/aws-cn/function_with_conditional_managed_policy_and_ref_no_value.json +++ b/tests/translator/output/aws-cn/function_with_conditional_managed_policy_and_ref_no_value.json @@ -49,6 +49,12 @@ ] } ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/function_with_conditional_policy_template.json b/tests/translator/output/aws-cn/function_with_conditional_policy_template.json index 6cb4ad3aa..9dc9f720a 100644 --- a/tests/translator/output/aws-cn/function_with_conditional_policy_template.json +++ b/tests/translator/output/aws-cn/function_with_conditional_policy_template.json @@ -38,6 +38,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "Policies": [ { "Fn::If": [ diff --git a/tests/translator/output/aws-cn/function_with_conditional_policy_template_and_ref_no_value.json b/tests/translator/output/aws-cn/function_with_conditional_policy_template_and_ref_no_value.json index 39be617ed..109cf4819 100644 --- a/tests/translator/output/aws-cn/function_with_conditional_policy_template_and_ref_no_value.json +++ b/tests/translator/output/aws-cn/function_with_conditional_policy_template_and_ref_no_value.json @@ -38,6 +38,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "Policies": [ { "Fn::If": [ diff --git a/tests/translator/output/aws-cn/function_with_custom_codedeploy_deployment_preference.json b/tests/translator/output/aws-cn/function_with_custom_codedeploy_deployment_preference.json index e3a9f705d..f3d5e0510 100644 --- a/tests/translator/output/aws-cn/function_with_custom_codedeploy_deployment_preference.json +++ b/tests/translator/output/aws-cn/function_with_custom_codedeploy_deployment_preference.json @@ -441,7 +441,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -465,7 +471,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -529,7 +541,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -610,7 +628,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -707,7 +731,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -756,7 +786,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -841,7 +877,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/function_with_custom_conditional_codedeploy_deployment_preference.json b/tests/translator/output/aws-cn/function_with_custom_conditional_codedeploy_deployment_preference.json index e78aeb5bf..1ee190cd8 100644 --- a/tests/translator/output/aws-cn/function_with_custom_conditional_codedeploy_deployment_preference.json +++ b/tests/translator/output/aws-cn/function_with_custom_conditional_codedeploy_deployment_preference.json @@ -36,7 +36,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/function_with_deployment_and_custom_role.json b/tests/translator/output/aws-cn/function_with_deployment_and_custom_role.json index fccf8a8a2..03a936a6d 100644 --- a/tests/translator/output/aws-cn/function_with_deployment_and_custom_role.json +++ b/tests/translator/output/aws-cn/function_with_deployment_and_custom_role.json @@ -51,7 +51,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/function_with_deployment_no_service_role.json b/tests/translator/output/aws-cn/function_with_deployment_no_service_role.json index 9ffb7820e..65d6a4483 100644 --- a/tests/translator/output/aws-cn/function_with_deployment_no_service_role.json +++ b/tests/translator/output/aws-cn/function_with_deployment_no_service_role.json @@ -59,7 +59,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -92,7 +98,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/function_with_deployment_preference.json b/tests/translator/output/aws-cn/function_with_deployment_preference.json index d61057286..f6271fdb0 100644 --- a/tests/translator/output/aws-cn/function_with_deployment_preference.json +++ b/tests/translator/output/aws-cn/function_with_deployment_preference.json @@ -39,7 +39,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/function_with_deployment_preference_all_parameters.json b/tests/translator/output/aws-cn/function_with_deployment_preference_all_parameters.json index 9472e991c..5831375ba 100644 --- a/tests/translator/output/aws-cn/function_with_deployment_preference_all_parameters.json +++ b/tests/translator/output/aws-cn/function_with_deployment_preference_all_parameters.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -52,7 +58,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -247,7 +259,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/function_with_deployment_preference_multiple_combinations.json b/tests/translator/output/aws-cn/function_with_deployment_preference_multiple_combinations.json index 6fed70de7..7c9543aa5 100644 --- a/tests/translator/output/aws-cn/function_with_deployment_preference_multiple_combinations.json +++ b/tests/translator/output/aws-cn/function_with_deployment_preference_multiple_combinations.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -75,7 +81,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -188,7 +200,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -212,7 +230,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -364,7 +388,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/function_with_disabled_deployment_preference.json b/tests/translator/output/aws-cn/function_with_disabled_deployment_preference.json index 588842ae2..80337bcd2 100644 --- a/tests/translator/output/aws-cn/function_with_disabled_deployment_preference.json +++ b/tests/translator/output/aws-cn/function_with_disabled_deployment_preference.json @@ -52,7 +52,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/function_with_dlq.json b/tests/translator/output/aws-cn/function_with_dlq.json index 4d1bd64f1..3c006a0af 100644 --- a/tests/translator/output/aws-cn/function_with_dlq.json +++ b/tests/translator/output/aws-cn/function_with_dlq.json @@ -6,6 +6,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "Policies": [ { "PolicyName": "DeadLetterQueuePolicy", @@ -45,6 +51,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "Policies": [ { "PolicyName": "DeadLetterQueuePolicy", diff --git a/tests/translator/output/aws-cn/function_with_global_layers.json b/tests/translator/output/aws-cn/function_with_global_layers.json index a958c11d8..e0fcdb520 100644 --- a/tests/translator/output/aws-cn/function_with_global_layers.json +++ b/tests/translator/output/aws-cn/function_with_global_layers.json @@ -6,6 +6,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/function_with_kmskeyarn.json b/tests/translator/output/aws-cn/function_with_kmskeyarn.json index 4d7cc9061..c26fd2506 100644 --- a/tests/translator/output/aws-cn/function_with_kmskeyarn.json +++ b/tests/translator/output/aws-cn/function_with_kmskeyarn.json @@ -6,6 +6,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -30,6 +36,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/function_with_layers.json b/tests/translator/output/aws-cn/function_with_layers.json index 3f349ecfe..7c2004acf 100644 --- a/tests/translator/output/aws-cn/function_with_layers.json +++ b/tests/translator/output/aws-cn/function_with_layers.json @@ -70,7 +70,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -94,7 +100,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -175,7 +187,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -199,7 +217,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/function_with_many_layers.json b/tests/translator/output/aws-cn/function_with_many_layers.json index d95a35d8e..2bff7ff8f 100644 --- a/tests/translator/output/aws-cn/function_with_many_layers.json +++ b/tests/translator/output/aws-cn/function_with_many_layers.json @@ -16,7 +16,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/function_with_permissions_boundary.json b/tests/translator/output/aws-cn/function_with_permissions_boundary.json index 1adb21c16..b71af4f7b 100644 --- a/tests/translator/output/aws-cn/function_with_permissions_boundary.json +++ b/tests/translator/output/aws-cn/function_with_permissions_boundary.json @@ -5,7 +5,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "PermissionsBoundary": "arn:aws:1234:iam:boundary/CustomerCreatedPermissionsBoundary", "AssumeRolePolicyDocument": { "Version": "2012-10-17", diff --git a/tests/translator/output/aws-cn/function_with_policy_templates.json b/tests/translator/output/aws-cn/function_with_policy_templates.json index a8b0a453a..d6e45817e 100644 --- a/tests/translator/output/aws-cn/function_with_policy_templates.json +++ b/tests/translator/output/aws-cn/function_with_policy_templates.json @@ -57,6 +57,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "Policies": [ { "PolicyName": "OnePolicyTemplateRolePolicy0", @@ -116,6 +122,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "Policies": [ { "PolicyName": "MultiplePolicyTemplatesRolePolicy0", @@ -214,6 +226,12 @@ "arn:aws-cn:iam::aws:policy/AmazonDynamoDBFullAccess", "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "Policies": [ { "PolicyName": "AllCombinationsRolePolicy0", diff --git a/tests/translator/output/aws-cn/function_with_request_parameters.json b/tests/translator/output/aws-cn/function_with_request_parameters.json index 720233309..a8d967912 100644 --- a/tests/translator/output/aws-cn/function_with_request_parameters.json +++ b/tests/translator/output/aws-cn/function_with_request_parameters.json @@ -29,6 +29,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -63,6 +69,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/function_with_resource_refs.json b/tests/translator/output/aws-cn/function_with_resource_refs.json index 566193806..89ab2a671 100644 --- a/tests/translator/output/aws-cn/function_with_resource_refs.json +++ b/tests/translator/output/aws-cn/function_with_resource_refs.json @@ -79,7 +79,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -126,7 +132,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/function_with_sns_event_source_all_parameters.json b/tests/translator/output/aws-cn/function_with_sns_event_source_all_parameters.json index cac15164c..645a946a0 100644 --- a/tests/translator/output/aws-cn/function_with_sns_event_source_all_parameters.json +++ b/tests/translator/output/aws-cn/function_with_sns_event_source_all_parameters.json @@ -54,6 +54,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/global_handle_path_level_parameter.json b/tests/translator/output/aws-cn/global_handle_path_level_parameter.json index 66a652eb3..c9213e54b 100644 --- a/tests/translator/output/aws-cn/global_handle_path_level_parameter.json +++ b/tests/translator/output/aws-cn/global_handle_path_level_parameter.json @@ -29,6 +29,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/globals_for_api.json b/tests/translator/output/aws-cn/globals_for_api.json index 16a461142..1256b5474 100644 --- a/tests/translator/output/aws-cn/globals_for_api.json +++ b/tests/translator/output/aws-cn/globals_for_api.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/globals_for_function.json b/tests/translator/output/aws-cn/globals_for_function.json index 68cb93e88..59bd1987a 100644 --- a/tests/translator/output/aws-cn/globals_for_function.json +++ b/tests/translator/output/aws-cn/globals_for_function.json @@ -6,7 +6,21 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-cn:iam::aws:policy/AWSXrayWriteOnlyAccess" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + }, + { + "Value": "newvalue1", + "Key": "newtag1" + }, + { + "Value": "value1", + "Key": "tag1" + } + ], "PermissionsBoundary": "arn:aws:1234:iam:boundary/OverridePermissionsBoundary", "AssumeRolePolicyDocument": { "Version": "2012-10-17", @@ -93,7 +107,17 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-cn:iam::aws:policy/AWSXrayWriteOnlyAccess" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + }, + { + "Value": "value1", + "Key": "tag1" + } + ], "PermissionsBoundary": "arn:aws:1234:iam:boundary/CustomerCreatedPermissionsBoundary", "AssumeRolePolicyDocument": { "Version": "2012-10-17", diff --git a/tests/translator/output/aws-cn/implicit_and_explicit_api_with_conditions.json b/tests/translator/output/aws-cn/implicit_and_explicit_api_with_conditions.json index 5b58421bc..4e6dbf082 100644 --- a/tests/translator/output/aws-cn/implicit_and_explicit_api_with_conditions.json +++ b/tests/translator/output/aws-cn/implicit_and_explicit_api_with_conditions.json @@ -68,6 +68,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -154,6 +160,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -423,6 +435,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -545,6 +563,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/implicit_api.json b/tests/translator/output/aws-cn/implicit_api.json index d34fa9a5c..21209fd40 100644 --- a/tests/translator/output/aws-cn/implicit_api.json +++ b/tests/translator/output/aws-cn/implicit_api.json @@ -6,7 +6,13 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-cn:iam::aws:policy/AmazonDynamoDBFullAccess" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -108,7 +114,13 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-cn:iam::aws:policy/AmazonDynamoDBReadOnlyAccess" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/implicit_api_with_auth_and_conditions_max.json b/tests/translator/output/aws-cn/implicit_api_with_auth_and_conditions_max.json index 62289044f..2f43d74db 100644 --- a/tests/translator/output/aws-cn/implicit_api_with_auth_and_conditions_max.json +++ b/tests/translator/output/aws-cn/implicit_api_with_auth_and_conditions_max.json @@ -216,6 +216,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -241,6 +247,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -266,6 +278,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -315,6 +333,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -381,6 +405,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -512,6 +542,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/implicit_api_with_many_conditions.json b/tests/translator/output/aws-cn/implicit_api_with_many_conditions.json index 76ea25af7..754d1ea46 100644 --- a/tests/translator/output/aws-cn/implicit_api_with_many_conditions.json +++ b/tests/translator/output/aws-cn/implicit_api_with_many_conditions.json @@ -164,6 +164,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -239,6 +245,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -535,6 +547,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -582,6 +600,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -651,6 +675,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -676,6 +706,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -726,6 +762,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -823,6 +865,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -848,6 +896,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -873,6 +927,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -898,6 +958,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/implicit_api_with_serverless_rest_api_resource.json b/tests/translator/output/aws-cn/implicit_api_with_serverless_rest_api_resource.json index d34fa9a5c..eb153fbf6 100644 --- a/tests/translator/output/aws-cn/implicit_api_with_serverless_rest_api_resource.json +++ b/tests/translator/output/aws-cn/implicit_api_with_serverless_rest_api_resource.json @@ -6,7 +6,13 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-cn:iam::aws:policy/AmazonDynamoDBFullAccess" - ], + ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -108,7 +114,13 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-cn:iam::aws:policy/AmazonDynamoDBReadOnlyAccess" - ], + ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/intrinsic_functions.json b/tests/translator/output/aws-cn/intrinsic_functions.json index a246c1597..78737ae78 100644 --- a/tests/translator/output/aws-cn/intrinsic_functions.json +++ b/tests/translator/output/aws-cn/intrinsic_functions.json @@ -169,7 +169,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "Policies": [ { "PolicyName": "DeadLetterQueuePolicy", @@ -269,7 +275,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -294,7 +306,13 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaDynamoDBExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -448,7 +466,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "Policies": [ { "PolicyName": "DeadLetterQueuePolicy", diff --git a/tests/translator/output/aws-cn/iot_rule.json b/tests/translator/output/aws-cn/iot_rule.json index 64464c74e..fa16969a4 100644 --- a/tests/translator/output/aws-cn/iot_rule.json +++ b/tests/translator/output/aws-cn/iot_rule.json @@ -122,7 +122,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/layers_all_properties.json b/tests/translator/output/aws-cn/layers_all_properties.json index 4cebed47b..3520acb5b 100644 --- a/tests/translator/output/aws-cn/layers_all_properties.json +++ b/tests/translator/output/aws-cn/layers_all_properties.json @@ -91,7 +91,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/no_implicit_api_with_serverless_rest_api_resource.json b/tests/translator/output/aws-cn/no_implicit_api_with_serverless_rest_api_resource.json index 68e16942b..583c346ee 100644 --- a/tests/translator/output/aws-cn/no_implicit_api_with_serverless_rest_api_resource.json +++ b/tests/translator/output/aws-cn/no_implicit_api_with_serverless_rest_api_resource.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -65,7 +71,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -112,7 +124,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/s3.json b/tests/translator/output/aws-cn/s3.json index 36ed3e969..c23456f98 100644 --- a/tests/translator/output/aws-cn/s3.json +++ b/tests/translator/output/aws-cn/s3.json @@ -24,7 +24,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/s3_create_remove.json b/tests/translator/output/aws-cn/s3_create_remove.json index e71f2d1fd..2d4941f57 100644 --- a/tests/translator/output/aws-cn/s3_create_remove.json +++ b/tests/translator/output/aws-cn/s3_create_remove.json @@ -41,7 +41,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/s3_existing_lambda_notification_configuration.json b/tests/translator/output/aws-cn/s3_existing_lambda_notification_configuration.json index 36ed3e969..c23456f98 100644 --- a/tests/translator/output/aws-cn/s3_existing_lambda_notification_configuration.json +++ b/tests/translator/output/aws-cn/s3_existing_lambda_notification_configuration.json @@ -24,7 +24,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/s3_existing_other_notification_configuration.json b/tests/translator/output/aws-cn/s3_existing_other_notification_configuration.json index c8e2fe1fd..945b98dd2 100644 --- a/tests/translator/output/aws-cn/s3_existing_other_notification_configuration.json +++ b/tests/translator/output/aws-cn/s3_existing_other_notification_configuration.json @@ -32,7 +32,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/s3_filter.json b/tests/translator/output/aws-cn/s3_filter.json index 3c3e03dfe..74e934eb4 100644 --- a/tests/translator/output/aws-cn/s3_filter.json +++ b/tests/translator/output/aws-cn/s3_filter.json @@ -34,7 +34,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/s3_multiple_events_same_bucket.json b/tests/translator/output/aws-cn/s3_multiple_events_same_bucket.json index 43b4e3a00..7c3565c4b 100644 --- a/tests/translator/output/aws-cn/s3_multiple_events_same_bucket.json +++ b/tests/translator/output/aws-cn/s3_multiple_events_same_bucket.json @@ -5,7 +5,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/s3_multiple_functions.json b/tests/translator/output/aws-cn/s3_multiple_functions.json index de4c96d18..5c273d727 100644 --- a/tests/translator/output/aws-cn/s3_multiple_functions.json +++ b/tests/translator/output/aws-cn/s3_multiple_functions.json @@ -6,6 +6,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -80,6 +86,12 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/s3_with_condition.json b/tests/translator/output/aws-cn/s3_with_condition.json index 6b8e7f8d9..769c396f1 100644 --- a/tests/translator/output/aws-cn/s3_with_condition.json +++ b/tests/translator/output/aws-cn/s3_with_condition.json @@ -53,7 +53,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/s3_with_dependsOn.json b/tests/translator/output/aws-cn/s3_with_dependsOn.json index adb9b129f..0d950b379 100644 --- a/tests/translator/output/aws-cn/s3_with_dependsOn.json +++ b/tests/translator/output/aws-cn/s3_with_dependsOn.json @@ -30,7 +30,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/sns.json b/tests/translator/output/aws-cn/sns.json index 231217f58..06a701566 100644 --- a/tests/translator/output/aws-cn/sns.json +++ b/tests/translator/output/aws-cn/sns.json @@ -8,7 +8,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/sns_existing_other_subscription.json b/tests/translator/output/aws-cn/sns_existing_other_subscription.json index bae375bc3..09ca5669f 100644 --- a/tests/translator/output/aws-cn/sns_existing_other_subscription.json +++ b/tests/translator/output/aws-cn/sns_existing_other_subscription.json @@ -16,7 +16,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/sns_sqs.json b/tests/translator/output/aws-cn/sns_sqs.json index 6aaaacf62..87afe98b0 100644 --- a/tests/translator/output/aws-cn/sns_sqs.json +++ b/tests/translator/output/aws-cn/sns_sqs.json @@ -74,7 +74,13 @@ "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaSQSQueueExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/sns_topic_outside_template.json b/tests/translator/output/aws-cn/sns_topic_outside_template.json index 5ef957d25..f503d2e4a 100644 --- a/tests/translator/output/aws-cn/sns_topic_outside_template.json +++ b/tests/translator/output/aws-cn/sns_topic_outside_template.json @@ -25,7 +25,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-cn/sqs.json b/tests/translator/output/aws-cn/sqs.json index b74b0623e..cad7b2248 100644 --- a/tests/translator/output/aws-cn/sqs.json +++ b/tests/translator/output/aws-cn/sqs.json @@ -7,6 +7,12 @@ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaSQSQueueExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [{ diff --git a/tests/translator/output/aws-cn/streams.json b/tests/translator/output/aws-cn/streams.json index 6e29b6bb4..fd19ed8f7 100644 --- a/tests/translator/output/aws-cn/streams.json +++ b/tests/translator/output/aws-cn/streams.json @@ -60,6 +60,12 @@ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaDynamoDBExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [{ @@ -95,6 +101,12 @@ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaKinesisExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [{ diff --git a/tests/translator/output/aws-us-gov/alexa_skill.json b/tests/translator/output/aws-us-gov/alexa_skill.json index 5fe8c8cdd..59c8ca779 100644 --- a/tests/translator/output/aws-us-gov/alexa_skill.json +++ b/tests/translator/output/aws-us-gov/alexa_skill.json @@ -7,7 +7,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/alexa_skill_with_skill_id.json b/tests/translator/output/aws-us-gov/alexa_skill_with_skill_id.json index 659f83c42..4feb3d89b 100644 --- a/tests/translator/output/aws-us-gov/alexa_skill_with_skill_id.json +++ b/tests/translator/output/aws-us-gov/alexa_skill_with_skill_id.json @@ -7,8 +7,14 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], - "AssumeRolePolicyDocument": { + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], + "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ { diff --git a/tests/translator/output/aws-us-gov/all_policy_templates.json b/tests/translator/output/aws-us-gov/all_policy_templates.json index 256e76cc7..d2a3d265f 100644 --- a/tests/translator/output/aws-us-gov/all_policy_templates.json +++ b/tests/translator/output/aws-us-gov/all_policy_templates.json @@ -29,6 +29,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "Policies": [ { "PolicyName": "KitchenSinkFunctionRolePolicy0", diff --git a/tests/translator/output/aws-us-gov/api_cache.json b/tests/translator/output/aws-us-gov/api_cache.json index 52af7238c..6821189ff 100644 --- a/tests/translator/output/aws-us-gov/api_cache.json +++ b/tests/translator/output/aws-us-gov/api_cache.json @@ -5,7 +5,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_endpoint_configuration.json b/tests/translator/output/aws-us-gov/api_endpoint_configuration.json index 067fc009d..ed665a2cd 100644 --- a/tests/translator/output/aws-us-gov/api_endpoint_configuration.json +++ b/tests/translator/output/aws-us-gov/api_endpoint_configuration.json @@ -33,7 +33,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_request_model.json b/tests/translator/output/aws-us-gov/api_request_model.json index a99dc03ad..6b54cb7e8 100644 --- a/tests/translator/output/aws-us-gov/api_request_model.json +++ b/tests/translator/output/aws-us-gov/api_request_model.json @@ -5,7 +5,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_request_model_openapi_3.json b/tests/translator/output/aws-us-gov/api_request_model_openapi_3.json index 5c9aba6db..02c9ff1c6 100644 --- a/tests/translator/output/aws-us-gov/api_request_model_openapi_3.json +++ b/tests/translator/output/aws-us-gov/api_request_model_openapi_3.json @@ -6,6 +6,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_access_log_setting.json b/tests/translator/output/aws-us-gov/api_with_access_log_setting.json index bd3f69d05..8726754fe 100644 --- a/tests/translator/output/aws-us-gov/api_with_access_log_setting.json +++ b/tests/translator/output/aws-us-gov/api_with_access_log_setting.json @@ -29,6 +29,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_apikey_default_override.json b/tests/translator/output/aws-us-gov/api_with_apikey_default_override.json index 14b24ba9a..cdaff1a49 100644 --- a/tests/translator/output/aws-us-gov/api_with_apikey_default_override.json +++ b/tests/translator/output/aws-us-gov/api_with_apikey_default_override.json @@ -160,6 +160,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -184,6 +190,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -208,6 +220,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_apikey_required.json b/tests/translator/output/aws-us-gov/api_with_apikey_required.json index 311640f53..092bfe65c 100644 --- a/tests/translator/output/aws-us-gov/api_with_apikey_required.json +++ b/tests/translator/output/aws-us-gov/api_with_apikey_required.json @@ -6,6 +6,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_apikey_required_openapi_3.json b/tests/translator/output/aws-us-gov/api_with_apikey_required_openapi_3.json index 2b081c12d..8410f422a 100644 --- a/tests/translator/output/aws-us-gov/api_with_apikey_required_openapi_3.json +++ b/tests/translator/output/aws-us-gov/api_with_apikey_required_openapi_3.json @@ -5,7 +5,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_auth_all_maximum.json b/tests/translator/output/aws-us-gov/api_with_auth_all_maximum.json index 17f8d4454..4a8e7b8af 100644 --- a/tests/translator/output/aws-us-gov/api_with_auth_all_maximum.json +++ b/tests/translator/output/aws-us-gov/api_with_auth_all_maximum.json @@ -98,7 +98,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_auth_all_maximum_openapi_3.json b/tests/translator/output/aws-us-gov/api_with_auth_all_maximum_openapi_3.json index 51a647589..07e15acea 100644 --- a/tests/translator/output/aws-us-gov/api_with_auth_all_maximum_openapi_3.json +++ b/tests/translator/output/aws-us-gov/api_with_auth_all_maximum_openapi_3.json @@ -88,7 +88,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_auth_all_minimum.json b/tests/translator/output/aws-us-gov/api_with_auth_all_minimum.json index 9db122986..517fe47d7 100644 --- a/tests/translator/output/aws-us-gov/api_with_auth_all_minimum.json +++ b/tests/translator/output/aws-us-gov/api_with_auth_all_minimum.json @@ -133,7 +133,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -374,7 +380,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_auth_all_minimum_openapi.json b/tests/translator/output/aws-us-gov/api_with_auth_all_minimum_openapi.json index f2829ec88..2839351ee 100644 --- a/tests/translator/output/aws-us-gov/api_with_auth_all_minimum_openapi.json +++ b/tests/translator/output/aws-us-gov/api_with_auth_all_minimum_openapi.json @@ -152,7 +152,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -385,7 +391,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_auth_and_conditions_all_max.json b/tests/translator/output/aws-us-gov/api_with_auth_and_conditions_all_max.json index 622bb3742..7ce6e4098 100644 --- a/tests/translator/output/aws-us-gov/api_with_auth_and_conditions_all_max.json +++ b/tests/translator/output/aws-us-gov/api_with_auth_and_conditions_all_max.json @@ -410,7 +410,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -518,7 +524,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_auth_no_default.json b/tests/translator/output/aws-us-gov/api_with_auth_no_default.json index 168867aa7..e3157a808 100644 --- a/tests/translator/output/aws-us-gov/api_with_auth_no_default.json +++ b/tests/translator/output/aws-us-gov/api_with_auth_no_default.json @@ -118,7 +118,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -364,7 +370,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_aws_account_blacklist.json b/tests/translator/output/aws-us-gov/api_with_aws_account_blacklist.json index bd70a3966..fb87aea53 100644 --- a/tests/translator/output/aws-us-gov/api_with_aws_account_blacklist.json +++ b/tests/translator/output/aws-us-gov/api_with_aws_account_blacklist.json @@ -49,7 +49,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_aws_account_whitelist.json b/tests/translator/output/aws-us-gov/api_with_aws_account_whitelist.json index 24d6b9af0..ca4f00b17 100644 --- a/tests/translator/output/aws-us-gov/api_with_aws_account_whitelist.json +++ b/tests/translator/output/aws-us-gov/api_with_aws_account_whitelist.json @@ -49,7 +49,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_aws_iam_auth_overrides.json b/tests/translator/output/aws-us-gov/api_with_aws_iam_auth_overrides.json index 08bd46b1e..82d742b18 100644 --- a/tests/translator/output/aws-us-gov/api_with_aws_iam_auth_overrides.json +++ b/tests/translator/output/aws-us-gov/api_with_aws_iam_auth_overrides.json @@ -86,7 +86,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -292,7 +298,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -360,7 +372,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -384,7 +402,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -517,7 +541,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -541,7 +571,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -565,7 +601,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -589,7 +631,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -868,7 +916,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_basic_custom_domain.json b/tests/translator/output/aws-us-gov/api_with_basic_custom_domain.json index 2ba58f4ad..f01713aa1 100644 --- a/tests/translator/output/aws-us-gov/api_with_basic_custom_domain.json +++ b/tests/translator/output/aws-us-gov/api_with_basic_custom_domain.json @@ -173,7 +173,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_basic_custom_domain_intrinsics.json b/tests/translator/output/aws-us-gov/api_with_basic_custom_domain_intrinsics.json index 217a89290..49f1e07ca 100644 --- a/tests/translator/output/aws-us-gov/api_with_basic_custom_domain_intrinsics.json +++ b/tests/translator/output/aws-us-gov/api_with_basic_custom_domain_intrinsics.json @@ -107,7 +107,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_binary_media_types.json b/tests/translator/output/aws-us-gov/api_with_binary_media_types.json index 729397a81..b28ae6c7c 100644 --- a/tests/translator/output/aws-us-gov/api_with_binary_media_types.json +++ b/tests/translator/output/aws-us-gov/api_with_binary_media_types.json @@ -34,7 +34,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_canary_setting.json b/tests/translator/output/aws-us-gov/api_with_canary_setting.json index 3c137093d..d34fc26c6 100644 --- a/tests/translator/output/aws-us-gov/api_with_canary_setting.json +++ b/tests/translator/output/aws-us-gov/api_with_canary_setting.json @@ -29,6 +29,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_cors.json b/tests/translator/output/aws-us-gov/api_with_cors.json index 1b697129b..a1112019f 100644 --- a/tests/translator/output/aws-us-gov/api_with_cors.json +++ b/tests/translator/output/aws-us-gov/api_with_cors.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -227,7 +233,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -275,7 +287,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_cors_and_auth_no_preflight_auth.json b/tests/translator/output/aws-us-gov/api_with_cors_and_auth_no_preflight_auth.json index 6445a45e9..0c3b97025 100644 --- a/tests/translator/output/aws-us-gov/api_with_cors_and_auth_no_preflight_auth.json +++ b/tests/translator/output/aws-us-gov/api_with_cors_and_auth_no_preflight_auth.json @@ -126,7 +126,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -260,7 +266,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_cors_and_auth_preflight_auth.json b/tests/translator/output/aws-us-gov/api_with_cors_and_auth_preflight_auth.json index 36efb85f2..f427119c8 100644 --- a/tests/translator/output/aws-us-gov/api_with_cors_and_auth_preflight_auth.json +++ b/tests/translator/output/aws-us-gov/api_with_cors_and_auth_preflight_auth.json @@ -131,7 +131,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -253,7 +259,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_cors_and_conditions_no_definitionbody.json b/tests/translator/output/aws-us-gov/api_with_cors_and_conditions_no_definitionbody.json index 1f251eb60..da7fa9fd5 100644 --- a/tests/translator/output/aws-us-gov/api_with_cors_and_conditions_no_definitionbody.json +++ b/tests/translator/output/aws-us-gov/api_with_cors_and_conditions_no_definitionbody.json @@ -38,7 +38,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -257,7 +263,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_cors_and_only_credentials_false.json b/tests/translator/output/aws-us-gov/api_with_cors_and_only_credentials_false.json index 61b81d0e0..58b33731c 100644 --- a/tests/translator/output/aws-us-gov/api_with_cors_and_only_credentials_false.json +++ b/tests/translator/output/aws-us-gov/api_with_cors_and_only_credentials_false.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_cors_and_only_headers.json b/tests/translator/output/aws-us-gov/api_with_cors_and_only_headers.json index 55b6dae2b..93c1c9e02 100644 --- a/tests/translator/output/aws-us-gov/api_with_cors_and_only_headers.json +++ b/tests/translator/output/aws-us-gov/api_with_cors_and_only_headers.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_cors_and_only_maxage.json b/tests/translator/output/aws-us-gov/api_with_cors_and_only_maxage.json index e1d3268bf..abf967150 100644 --- a/tests/translator/output/aws-us-gov/api_with_cors_and_only_maxage.json +++ b/tests/translator/output/aws-us-gov/api_with_cors_and_only_maxage.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_cors_and_only_methods.json b/tests/translator/output/aws-us-gov/api_with_cors_and_only_methods.json index 0092ba6bc..2e14e27b5 100644 --- a/tests/translator/output/aws-us-gov/api_with_cors_and_only_methods.json +++ b/tests/translator/output/aws-us-gov/api_with_cors_and_only_methods.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_cors_and_only_origins.json b/tests/translator/output/aws-us-gov/api_with_cors_and_only_origins.json index 63e57916b..9e0795755 100644 --- a/tests/translator/output/aws-us-gov/api_with_cors_and_only_origins.json +++ b/tests/translator/output/aws-us-gov/api_with_cors_and_only_origins.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_cors_no_definitionbody.json b/tests/translator/output/aws-us-gov/api_with_cors_no_definitionbody.json index ebc37e092..b76948749 100644 --- a/tests/translator/output/aws-us-gov/api_with_cors_no_definitionbody.json +++ b/tests/translator/output/aws-us-gov/api_with_cors_no_definitionbody.json @@ -28,6 +28,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [{ diff --git a/tests/translator/output/aws-us-gov/api_with_cors_openapi_3.json b/tests/translator/output/aws-us-gov/api_with_cors_openapi_3.json index dfc5dc6d3..98328269b 100644 --- a/tests/translator/output/aws-us-gov/api_with_cors_openapi_3.json +++ b/tests/translator/output/aws-us-gov/api_with_cors_openapi_3.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -217,7 +223,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -265,7 +277,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_custom_domain_route53.json b/tests/translator/output/aws-us-gov/api_with_custom_domain_route53.json index 860a1a2bf..0ce6f4635 100644 --- a/tests/translator/output/aws-us-gov/api_with_custom_domain_route53.json +++ b/tests/translator/output/aws-us-gov/api_with_custom_domain_route53.json @@ -189,7 +189,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_default_aws_iam_auth.json b/tests/translator/output/aws-us-gov/api_with_default_aws_iam_auth.json index d5b72bdb3..d9adae120 100644 --- a/tests/translator/output/aws-us-gov/api_with_default_aws_iam_auth.json +++ b/tests/translator/output/aws-us-gov/api_with_default_aws_iam_auth.json @@ -308,6 +308,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_default_aws_iam_auth_and_no_auth_route.json b/tests/translator/output/aws-us-gov/api_with_default_aws_iam_auth_and_no_auth_route.json index 499a3832f..d81ac7f17 100644 --- a/tests/translator/output/aws-us-gov/api_with_default_aws_iam_auth_and_no_auth_route.json +++ b/tests/translator/output/aws-us-gov/api_with_default_aws_iam_auth_and_no_auth_route.json @@ -158,6 +158,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_gateway_responses.json b/tests/translator/output/aws-us-gov/api_with_gateway_responses.json index eb975d45e..e16a96b55 100644 --- a/tests/translator/output/aws-us-gov/api_with_gateway_responses.json +++ b/tests/translator/output/aws-us-gov/api_with_gateway_responses.json @@ -39,6 +39,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_gateway_responses_all.json b/tests/translator/output/aws-us-gov/api_with_gateway_responses_all.json index 0105852ba..c0a582899 100644 --- a/tests/translator/output/aws-us-gov/api_with_gateway_responses_all.json +++ b/tests/translator/output/aws-us-gov/api_with_gateway_responses_all.json @@ -39,6 +39,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_gateway_responses_all_openapi_3.json b/tests/translator/output/aws-us-gov/api_with_gateway_responses_all_openapi_3.json index e41c0b3b7..21be03589 100644 --- a/tests/translator/output/aws-us-gov/api_with_gateway_responses_all_openapi_3.json +++ b/tests/translator/output/aws-us-gov/api_with_gateway_responses_all_openapi_3.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_gateway_responses_implicit.json b/tests/translator/output/aws-us-gov/api_with_gateway_responses_implicit.json index de439a2aa..99c384555 100644 --- a/tests/translator/output/aws-us-gov/api_with_gateway_responses_implicit.json +++ b/tests/translator/output/aws-us-gov/api_with_gateway_responses_implicit.json @@ -29,6 +29,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_gateway_responses_minimal.json b/tests/translator/output/aws-us-gov/api_with_gateway_responses_minimal.json index 52370d99a..71eefd4db 100644 --- a/tests/translator/output/aws-us-gov/api_with_gateway_responses_minimal.json +++ b/tests/translator/output/aws-us-gov/api_with_gateway_responses_minimal.json @@ -29,6 +29,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_gateway_responses_string_status_code.json b/tests/translator/output/aws-us-gov/api_with_gateway_responses_string_status_code.json index eb975d45e..e16a96b55 100644 --- a/tests/translator/output/aws-us-gov/api_with_gateway_responses_string_status_code.json +++ b/tests/translator/output/aws-us-gov/api_with_gateway_responses_string_status_code.json @@ -39,6 +39,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_incompatible_stage_name.json b/tests/translator/output/aws-us-gov/api_with_incompatible_stage_name.json index 5ffa7f92c..6352d5cc5 100644 --- a/tests/translator/output/aws-us-gov/api_with_incompatible_stage_name.json +++ b/tests/translator/output/aws-us-gov/api_with_incompatible_stage_name.json @@ -73,7 +73,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -269,7 +275,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_ip_range_blacklist.json b/tests/translator/output/aws-us-gov/api_with_ip_range_blacklist.json index 7834b03fe..c4b462c98 100644 --- a/tests/translator/output/aws-us-gov/api_with_ip_range_blacklist.json +++ b/tests/translator/output/aws-us-gov/api_with_ip_range_blacklist.json @@ -49,7 +49,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_ip_range_whitelist.json b/tests/translator/output/aws-us-gov/api_with_ip_range_whitelist.json index 111af1426..c0428615d 100644 --- a/tests/translator/output/aws-us-gov/api_with_ip_range_whitelist.json +++ b/tests/translator/output/aws-us-gov/api_with_ip_range_whitelist.json @@ -49,7 +49,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_method_aws_iam_auth.json b/tests/translator/output/aws-us-gov/api_with_method_aws_iam_auth.json index 0efd815a3..e28c4cf7d 100644 --- a/tests/translator/output/aws-us-gov/api_with_method_aws_iam_auth.json +++ b/tests/translator/output/aws-us-gov/api_with_method_aws_iam_auth.json @@ -196,6 +196,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_method_settings.json b/tests/translator/output/aws-us-gov/api_with_method_settings.json index 7ce1291b2..0acbaac41 100644 --- a/tests/translator/output/aws-us-gov/api_with_method_settings.json +++ b/tests/translator/output/aws-us-gov/api_with_method_settings.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_minimum_compression_size.json b/tests/translator/output/aws-us-gov/api_with_minimum_compression_size.json index e79924396..b02b0cafa 100644 --- a/tests/translator/output/aws-us-gov/api_with_minimum_compression_size.json +++ b/tests/translator/output/aws-us-gov/api_with_minimum_compression_size.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_open_api_version.json b/tests/translator/output/aws-us-gov/api_with_open_api_version.json index fc4c3c2cc..b6fd6e628 100644 --- a/tests/translator/output/aws-us-gov/api_with_open_api_version.json +++ b/tests/translator/output/aws-us-gov/api_with_open_api_version.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_open_api_version_2.json b/tests/translator/output/aws-us-gov/api_with_open_api_version_2.json index 520c537d2..cca6716f6 100644 --- a/tests/translator/output/aws-us-gov/api_with_open_api_version_2.json +++ b/tests/translator/output/aws-us-gov/api_with_open_api_version_2.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_openapi_definition_body_no_flag.json b/tests/translator/output/aws-us-gov/api_with_openapi_definition_body_no_flag.json index ff7cd8a26..65a0e5e8d 100644 --- a/tests/translator/output/aws-us-gov/api_with_openapi_definition_body_no_flag.json +++ b/tests/translator/output/aws-us-gov/api_with_openapi_definition_body_no_flag.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_path_parameters.json b/tests/translator/output/aws-us-gov/api_with_path_parameters.json index c0fe04bdd..4d8c8dffc 100644 --- a/tests/translator/output/aws-us-gov/api_with_path_parameters.json +++ b/tests/translator/output/aws-us-gov/api_with_path_parameters.json @@ -6,6 +6,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_resource_policy.json b/tests/translator/output/aws-us-gov/api_with_resource_policy.json index 5a25e8153..d1e8eec09 100644 --- a/tests/translator/output/aws-us-gov/api_with_resource_policy.json +++ b/tests/translator/output/aws-us-gov/api_with_resource_policy.json @@ -97,7 +97,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_resource_policy_global.json b/tests/translator/output/aws-us-gov/api_with_resource_policy_global.json index ee863bb51..6b50357d7 100644 --- a/tests/translator/output/aws-us-gov/api_with_resource_policy_global.json +++ b/tests/translator/output/aws-us-gov/api_with_resource_policy_global.json @@ -79,7 +79,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_resource_policy_global_implicit.json b/tests/translator/output/aws-us-gov/api_with_resource_policy_global_implicit.json index 7b72c912a..1fdfdc8dc 100644 --- a/tests/translator/output/aws-us-gov/api_with_resource_policy_global_implicit.json +++ b/tests/translator/output/aws-us-gov/api_with_resource_policy_global_implicit.json @@ -26,7 +26,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_resource_refs.json b/tests/translator/output/aws-us-gov/api_with_resource_refs.json index cda8e4cf1..f3a20075f 100644 --- a/tests/translator/output/aws-us-gov/api_with_resource_refs.json +++ b/tests/translator/output/aws-us-gov/api_with_resource_refs.json @@ -115,7 +115,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_source_vpc_blacklist.json b/tests/translator/output/aws-us-gov/api_with_source_vpc_blacklist.json index 62edf8feb..da773e426 100644 --- a/tests/translator/output/aws-us-gov/api_with_source_vpc_blacklist.json +++ b/tests/translator/output/aws-us-gov/api_with_source_vpc_blacklist.json @@ -49,7 +49,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_source_vpc_whitelist.json b/tests/translator/output/aws-us-gov/api_with_source_vpc_whitelist.json index 0f16c0ac6..caf3a86db 100644 --- a/tests/translator/output/aws-us-gov/api_with_source_vpc_whitelist.json +++ b/tests/translator/output/aws-us-gov/api_with_source_vpc_whitelist.json @@ -115,7 +115,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_swagger_and_openapi_with_auth.json b/tests/translator/output/aws-us-gov/api_with_swagger_and_openapi_with_auth.json index a9116497b..d7e94ea64 100644 --- a/tests/translator/output/aws-us-gov/api_with_swagger_and_openapi_with_auth.json +++ b/tests/translator/output/aws-us-gov/api_with_swagger_and_openapi_with_auth.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/api_with_xray_tracing.json b/tests/translator/output/aws-us-gov/api_with_xray_tracing.json index 9d5f890ad..583e52207 100644 --- a/tests/translator/output/aws-us-gov/api_with_xray_tracing.json +++ b/tests/translator/output/aws-us-gov/api_with_xray_tracing.json @@ -6,6 +6,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/basic_function.json b/tests/translator/output/aws-us-gov/basic_function.json index b386270b2..649009382 100644 --- a/tests/translator/output/aws-us-gov/basic_function.json +++ b/tests/translator/output/aws-us-gov/basic_function.json @@ -40,7 +40,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -133,7 +139,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -200,7 +212,7 @@ "VpcConfig": { "SubnetIds": [ "subnet-9d4a7b6c", - "subnet-65ea5f08", + "subnet-65ea5f08", { "Ref": "SomeParameter" }, @@ -261,7 +273,13 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-us-gov:iam::aws:policy/AmazonDynamoDBFullAccess" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -286,7 +304,13 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-us-gov:iam::aws:policy/AWSXrayWriteOnlyAccess" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -311,7 +335,13 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-us-gov:iam::aws:policy/AWSXrayWriteOnlyAccess" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -384,7 +414,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "Policies": [ { "PolicyName": "FunctionWithPolicyDocumentRolePolicy0", diff --git a/tests/translator/output/aws-us-gov/basic_function_with_tags.json b/tests/translator/output/aws-us-gov/basic_function_with_tags.json index c7e48394b..211818e8c 100644 --- a/tests/translator/output/aws-us-gov/basic_function_with_tags.json +++ b/tests/translator/output/aws-us-gov/basic_function_with_tags.json @@ -12,7 +12,31 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + }, + { + "Value": "TagValue1", + "Key": "TagKey1" + }, + { + "Value": "", + "Key": "TagKey2" + }, + { + "Value": { + "Ref": "TagValueParam" + }, + "Key": "TagKey3" + }, + { + "Value": "123", + "Key": "TagKey4" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/cloudwatch_logs_with_ref.json b/tests/translator/output/aws-us-gov/cloudwatch_logs_with_ref.json index 3ed0f3a64..1bb0be81b 100644 --- a/tests/translator/output/aws-us-gov/cloudwatch_logs_with_ref.json +++ b/tests/translator/output/aws-us-gov/cloudwatch_logs_with_ref.json @@ -61,6 +61,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/cloudwatchevent.json b/tests/translator/output/aws-us-gov/cloudwatchevent.json index 62456632f..10e5b8285 100644 --- a/tests/translator/output/aws-us-gov/cloudwatchevent.json +++ b/tests/translator/output/aws-us-gov/cloudwatchevent.json @@ -5,7 +5,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -133,7 +139,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/cloudwatchevent_schedule_properties.json b/tests/translator/output/aws-us-gov/cloudwatchevent_schedule_properties.json index 3913b5c72..19695157c 100644 --- a/tests/translator/output/aws-us-gov/cloudwatchevent_schedule_properties.json +++ b/tests/translator/output/aws-us-gov/cloudwatchevent_schedule_properties.json @@ -5,7 +5,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -132,7 +138,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/cloudwatchlog.json b/tests/translator/output/aws-us-gov/cloudwatchlog.json index 771ae0f3e..ab3706a09 100644 --- a/tests/translator/output/aws-us-gov/cloudwatchlog.json +++ b/tests/translator/output/aws-us-gov/cloudwatchlog.json @@ -46,6 +46,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/cognito_userpool_with_event.json b/tests/translator/output/aws-us-gov/cognito_userpool_with_event.json index 803c0162f..3d6f0e4e5 100644 --- a/tests/translator/output/aws-us-gov/cognito_userpool_with_event.json +++ b/tests/translator/output/aws-us-gov/cognito_userpool_with_event.json @@ -54,6 +54,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/depends_on.json b/tests/translator/output/aws-us-gov/depends_on.json index c8278cded..9126e365e 100644 --- a/tests/translator/output/aws-us-gov/depends_on.json +++ b/tests/translator/output/aws-us-gov/depends_on.json @@ -116,6 +116,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/explicit_api.json b/tests/translator/output/aws-us-gov/explicit_api.json index 04f02c380..e32531df7 100644 --- a/tests/translator/output/aws-us-gov/explicit_api.json +++ b/tests/translator/output/aws-us-gov/explicit_api.json @@ -63,7 +63,14 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-us-gov:iam::aws:policy/AmazonDynamoDBReadOnlyAccess" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], + "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/explicit_api_openapi_3.json b/tests/translator/output/aws-us-gov/explicit_api_openapi_3.json index ba9645a77..31e9b3807 100644 --- a/tests/translator/output/aws-us-gov/explicit_api_openapi_3.json +++ b/tests/translator/output/aws-us-gov/explicit_api_openapi_3.json @@ -72,7 +72,14 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-us-gov:iam::aws:policy/AmazonDynamoDBReadOnlyAccess" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], + "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/explicit_api_with_invalid_events_config.json b/tests/translator/output/aws-us-gov/explicit_api_with_invalid_events_config.json index e0a9d1abc..3a9136e6d 100644 --- a/tests/translator/output/aws-us-gov/explicit_api_with_invalid_events_config.json +++ b/tests/translator/output/aws-us-gov/explicit_api_with_invalid_events_config.json @@ -105,7 +105,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/function_concurrency.json b/tests/translator/output/aws-us-gov/function_concurrency.json index 04b33c8a5..9eb5d9f57 100644 --- a/tests/translator/output/aws-us-gov/function_concurrency.json +++ b/tests/translator/output/aws-us-gov/function_concurrency.json @@ -11,6 +11,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -56,6 +62,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/function_event_conditions.json b/tests/translator/output/aws-us-gov/function_event_conditions.json index c5873e96e..cb1b9e7e2 100644 --- a/tests/translator/output/aws-us-gov/function_event_conditions.json +++ b/tests/translator/output/aws-us-gov/function_event_conditions.json @@ -206,7 +206,13 @@ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaKinesisExecutionRole", "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaDynamoDBExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -320,6 +326,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/function_managed_inline_policy.json b/tests/translator/output/aws-us-gov/function_managed_inline_policy.json index 57f79af68..ffbf7809d 100644 --- a/tests/translator/output/aws-us-gov/function_managed_inline_policy.json +++ b/tests/translator/output/aws-us-gov/function_managed_inline_policy.json @@ -40,7 +40,13 @@ "Ref": "SomeManagedPolicyArn" }, "arn:aws:iam::123456789012:policy/CustomerCreatedManagedPolicy" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "Policies": [ { "PolicyName": "FunctionRolePolicy0", diff --git a/tests/translator/output/aws-us-gov/function_with_alias.json b/tests/translator/output/aws-us-gov/function_with_alias.json index f1dc1e6c4..aae104be5 100644 --- a/tests/translator/output/aws-us-gov/function_with_alias.json +++ b/tests/translator/output/aws-us-gov/function_with_alias.json @@ -53,7 +53,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/function_with_alias_and_event_sources.json b/tests/translator/output/aws-us-gov/function_with_alias_and_event_sources.json index 52a8585a9..307283967 100644 --- a/tests/translator/output/aws-us-gov/function_with_alias_and_event_sources.json +++ b/tests/translator/output/aws-us-gov/function_with_alias_and_event_sources.json @@ -262,7 +262,13 @@ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaKinesisExecutionRole", "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaDynamoDBExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/function_with_alias_intrinsics.json b/tests/translator/output/aws-us-gov/function_with_alias_intrinsics.json index 9c5fb5b89..6844f0abb 100644 --- a/tests/translator/output/aws-us-gov/function_with_alias_intrinsics.json +++ b/tests/translator/output/aws-us-gov/function_with_alias_intrinsics.json @@ -58,7 +58,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/function_with_batch_window.json b/tests/translator/output/aws-us-gov/function_with_batch_window.json index 5dda34c67..c24eb1865 100644 --- a/tests/translator/output/aws-us-gov/function_with_batch_window.json +++ b/tests/translator/output/aws-us-gov/function_with_batch_window.json @@ -32,6 +32,12 @@ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaDynamoDBExecutionRole", "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaKinesisExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/function_with_condition.json b/tests/translator/output/aws-us-gov/function_with_condition.json index b6acc14f8..55fc68469 100644 --- a/tests/translator/output/aws-us-gov/function_with_condition.json +++ b/tests/translator/output/aws-us-gov/function_with_condition.json @@ -37,7 +37,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/function_with_conditional_managed_policy.json b/tests/translator/output/aws-us-gov/function_with_conditional_managed_policy.json index 859c85a8a..e2a0e8c5f 100644 --- a/tests/translator/output/aws-us-gov/function_with_conditional_managed_policy.json +++ b/tests/translator/output/aws-us-gov/function_with_conditional_managed_policy.json @@ -49,6 +49,12 @@ ] } ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/function_with_conditional_managed_policy_and_ref_no_value.json b/tests/translator/output/aws-us-gov/function_with_conditional_managed_policy_and_ref_no_value.json index ddcf43ff1..da893a16c 100644 --- a/tests/translator/output/aws-us-gov/function_with_conditional_managed_policy_and_ref_no_value.json +++ b/tests/translator/output/aws-us-gov/function_with_conditional_managed_policy_and_ref_no_value.json @@ -49,6 +49,12 @@ ] } ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/function_with_conditional_policy_template.json b/tests/translator/output/aws-us-gov/function_with_conditional_policy_template.json index 7a9e12b89..18e2f7216 100644 --- a/tests/translator/output/aws-us-gov/function_with_conditional_policy_template.json +++ b/tests/translator/output/aws-us-gov/function_with_conditional_policy_template.json @@ -38,6 +38,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "Policies": [ { "Fn::If": [ diff --git a/tests/translator/output/aws-us-gov/function_with_conditional_policy_template_and_ref_no_value.json b/tests/translator/output/aws-us-gov/function_with_conditional_policy_template_and_ref_no_value.json index f3d43297c..08c9629f1 100644 --- a/tests/translator/output/aws-us-gov/function_with_conditional_policy_template_and_ref_no_value.json +++ b/tests/translator/output/aws-us-gov/function_with_conditional_policy_template_and_ref_no_value.json @@ -38,6 +38,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "Policies": [ { "Fn::If": [ diff --git a/tests/translator/output/aws-us-gov/function_with_custom_codedeploy_deployment_preference.json b/tests/translator/output/aws-us-gov/function_with_custom_codedeploy_deployment_preference.json index 168fb53b4..f601b9622 100644 --- a/tests/translator/output/aws-us-gov/function_with_custom_codedeploy_deployment_preference.json +++ b/tests/translator/output/aws-us-gov/function_with_custom_codedeploy_deployment_preference.json @@ -441,7 +441,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -465,7 +471,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -529,7 +541,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -610,7 +628,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -707,7 +731,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -756,7 +786,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -841,7 +877,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/function_with_custom_conditional_codedeploy_deployment_preference.json b/tests/translator/output/aws-us-gov/function_with_custom_conditional_codedeploy_deployment_preference.json index c2da9a1fd..672bcb4ee 100644 --- a/tests/translator/output/aws-us-gov/function_with_custom_conditional_codedeploy_deployment_preference.json +++ b/tests/translator/output/aws-us-gov/function_with_custom_conditional_codedeploy_deployment_preference.json @@ -36,7 +36,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/function_with_deployment_and_custom_role.json b/tests/translator/output/aws-us-gov/function_with_deployment_and_custom_role.json index 802967b9a..68a538606 100644 --- a/tests/translator/output/aws-us-gov/function_with_deployment_and_custom_role.json +++ b/tests/translator/output/aws-us-gov/function_with_deployment_and_custom_role.json @@ -51,7 +51,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/function_with_deployment_no_service_role.json b/tests/translator/output/aws-us-gov/function_with_deployment_no_service_role.json index 94d09316b..ca6cf4a1e 100644 --- a/tests/translator/output/aws-us-gov/function_with_deployment_no_service_role.json +++ b/tests/translator/output/aws-us-gov/function_with_deployment_no_service_role.json @@ -59,7 +59,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -92,7 +98,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/function_with_deployment_preference.json b/tests/translator/output/aws-us-gov/function_with_deployment_preference.json index a16ba0a1d..acdb1a394 100644 --- a/tests/translator/output/aws-us-gov/function_with_deployment_preference.json +++ b/tests/translator/output/aws-us-gov/function_with_deployment_preference.json @@ -39,7 +39,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/function_with_deployment_preference_all_parameters.json b/tests/translator/output/aws-us-gov/function_with_deployment_preference_all_parameters.json index 1323d7c7c..a5a742b3c 100644 --- a/tests/translator/output/aws-us-gov/function_with_deployment_preference_all_parameters.json +++ b/tests/translator/output/aws-us-gov/function_with_deployment_preference_all_parameters.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -52,7 +58,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -247,7 +259,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/function_with_deployment_preference_multiple_combinations.json b/tests/translator/output/aws-us-gov/function_with_deployment_preference_multiple_combinations.json index ab1cdabb4..2ad3524ec 100644 --- a/tests/translator/output/aws-us-gov/function_with_deployment_preference_multiple_combinations.json +++ b/tests/translator/output/aws-us-gov/function_with_deployment_preference_multiple_combinations.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -75,7 +81,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -188,7 +200,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -212,7 +230,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -364,7 +388,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/function_with_disabled_deployment_preference.json b/tests/translator/output/aws-us-gov/function_with_disabled_deployment_preference.json index 6dadd4080..6057dd5f9 100644 --- a/tests/translator/output/aws-us-gov/function_with_disabled_deployment_preference.json +++ b/tests/translator/output/aws-us-gov/function_with_disabled_deployment_preference.json @@ -52,7 +52,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/function_with_dlq.json b/tests/translator/output/aws-us-gov/function_with_dlq.json index a21890ffe..d72373ef2 100644 --- a/tests/translator/output/aws-us-gov/function_with_dlq.json +++ b/tests/translator/output/aws-us-gov/function_with_dlq.json @@ -6,6 +6,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "Policies": [ { "PolicyName": "DeadLetterQueuePolicy", @@ -45,6 +51,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "Policies": [ { "PolicyName": "DeadLetterQueuePolicy", diff --git a/tests/translator/output/aws-us-gov/function_with_global_layers.json b/tests/translator/output/aws-us-gov/function_with_global_layers.json index 7f9fea7e8..58bd6af51 100644 --- a/tests/translator/output/aws-us-gov/function_with_global_layers.json +++ b/tests/translator/output/aws-us-gov/function_with_global_layers.json @@ -6,6 +6,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/function_with_kmskeyarn.json b/tests/translator/output/aws-us-gov/function_with_kmskeyarn.json index 2cf8eefbf..7ff51981f 100644 --- a/tests/translator/output/aws-us-gov/function_with_kmskeyarn.json +++ b/tests/translator/output/aws-us-gov/function_with_kmskeyarn.json @@ -6,6 +6,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -30,6 +36,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/function_with_layers.json b/tests/translator/output/aws-us-gov/function_with_layers.json index ecc80c5f7..9197f869c 100644 --- a/tests/translator/output/aws-us-gov/function_with_layers.json +++ b/tests/translator/output/aws-us-gov/function_with_layers.json @@ -70,7 +70,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -94,7 +100,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -175,7 +187,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -199,7 +217,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/function_with_many_layers.json b/tests/translator/output/aws-us-gov/function_with_many_layers.json index f6c15275a..15389c0a6 100644 --- a/tests/translator/output/aws-us-gov/function_with_many_layers.json +++ b/tests/translator/output/aws-us-gov/function_with_many_layers.json @@ -16,7 +16,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/function_with_permissions_boundary.json b/tests/translator/output/aws-us-gov/function_with_permissions_boundary.json index 510988482..f4914ac7c 100644 --- a/tests/translator/output/aws-us-gov/function_with_permissions_boundary.json +++ b/tests/translator/output/aws-us-gov/function_with_permissions_boundary.json @@ -5,7 +5,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "PermissionsBoundary": "arn:aws:1234:iam:boundary/CustomerCreatedPermissionsBoundary", "AssumeRolePolicyDocument": { "Version": "2012-10-17", diff --git a/tests/translator/output/aws-us-gov/function_with_policy_templates.json b/tests/translator/output/aws-us-gov/function_with_policy_templates.json index 72a70fb6b..4ae24a6d4 100644 --- a/tests/translator/output/aws-us-gov/function_with_policy_templates.json +++ b/tests/translator/output/aws-us-gov/function_with_policy_templates.json @@ -57,6 +57,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "Policies": [ { "PolicyName": "OnePolicyTemplateRolePolicy0", @@ -116,6 +122,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "Policies": [ { "PolicyName": "MultiplePolicyTemplatesRolePolicy0", @@ -214,6 +226,12 @@ "arn:aws-us-gov:iam::aws:policy/AmazonDynamoDBFullAccess", "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "Policies": [ { "PolicyName": "AllCombinationsRolePolicy0", diff --git a/tests/translator/output/aws-us-gov/function_with_request_parameters.json b/tests/translator/output/aws-us-gov/function_with_request_parameters.json index 45eed3c15..79b9bee80 100644 --- a/tests/translator/output/aws-us-gov/function_with_request_parameters.json +++ b/tests/translator/output/aws-us-gov/function_with_request_parameters.json @@ -29,6 +29,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -73,6 +79,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/function_with_resource_refs.json b/tests/translator/output/aws-us-gov/function_with_resource_refs.json index ab8c74611..b54893054 100644 --- a/tests/translator/output/aws-us-gov/function_with_resource_refs.json +++ b/tests/translator/output/aws-us-gov/function_with_resource_refs.json @@ -79,7 +79,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -126,7 +132,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/function_with_sns_event_source_all_parameters.json b/tests/translator/output/aws-us-gov/function_with_sns_event_source_all_parameters.json index 5ebf5d48e..f2706dd50 100644 --- a/tests/translator/output/aws-us-gov/function_with_sns_event_source_all_parameters.json +++ b/tests/translator/output/aws-us-gov/function_with_sns_event_source_all_parameters.json @@ -54,6 +54,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/global_handle_path_level_parameter.json b/tests/translator/output/aws-us-gov/global_handle_path_level_parameter.json index 8704aee60..5d940ce78 100644 --- a/tests/translator/output/aws-us-gov/global_handle_path_level_parameter.json +++ b/tests/translator/output/aws-us-gov/global_handle_path_level_parameter.json @@ -29,6 +29,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/globals_for_api.json b/tests/translator/output/aws-us-gov/globals_for_api.json index 3b05d0e4f..19ed0761f 100644 --- a/tests/translator/output/aws-us-gov/globals_for_api.json +++ b/tests/translator/output/aws-us-gov/globals_for_api.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/globals_for_function.json b/tests/translator/output/aws-us-gov/globals_for_function.json index e087c7180..01488e250 100644 --- a/tests/translator/output/aws-us-gov/globals_for_function.json +++ b/tests/translator/output/aws-us-gov/globals_for_function.json @@ -7,7 +7,21 @@ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-us-gov:iam::aws:policy/AWSXrayWriteOnlyAccess" ], - "PermissionsBoundary": "arn:aws:1234:iam:boundary/OverridePermissionsBoundary", + "PermissionsBoundary": "arn:aws:1234:iam:boundary/OverridePermissionsBoundary", + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + }, + { + "Value": "newvalue1", + "Key": "newtag1" + }, + { + "Value": "value1", + "Key": "tag1" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -94,7 +108,17 @@ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-us-gov:iam::aws:policy/AWSXrayWriteOnlyAccess" ], - "PermissionsBoundary": "arn:aws:1234:iam:boundary/CustomerCreatedPermissionsBoundary", + "PermissionsBoundary": "arn:aws:1234:iam:boundary/CustomerCreatedPermissionsBoundary", + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + }, + { + "Value": "value1", + "Key": "tag1" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/implicit_and_explicit_api_with_conditions.json b/tests/translator/output/aws-us-gov/implicit_and_explicit_api_with_conditions.json index b80a66d71..6899b2b40 100644 --- a/tests/translator/output/aws-us-gov/implicit_and_explicit_api_with_conditions.json +++ b/tests/translator/output/aws-us-gov/implicit_and_explicit_api_with_conditions.json @@ -68,6 +68,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -143,6 +149,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -423,6 +435,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -545,6 +563,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/implicit_api.json b/tests/translator/output/aws-us-gov/implicit_api.json index 8aca6a728..4d9623e44 100644 --- a/tests/translator/output/aws-us-gov/implicit_api.json +++ b/tests/translator/output/aws-us-gov/implicit_api.json @@ -6,7 +6,14 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-us-gov:iam::aws:policy/AmazonDynamoDBFullAccess" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], + "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -118,7 +125,14 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-us-gov:iam::aws:policy/AmazonDynamoDBReadOnlyAccess" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], + "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/implicit_api_with_auth_and_conditions_max.json b/tests/translator/output/aws-us-gov/implicit_api_with_auth_and_conditions_max.json index af123ff01..2673ef10c 100644 --- a/tests/translator/output/aws-us-gov/implicit_api_with_auth_and_conditions_max.json +++ b/tests/translator/output/aws-us-gov/implicit_api_with_auth_and_conditions_max.json @@ -215,7 +215,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -240,7 +246,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -265,7 +277,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -314,7 +332,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -380,7 +404,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -511,7 +541,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/implicit_api_with_many_conditions.json b/tests/translator/output/aws-us-gov/implicit_api_with_many_conditions.json index c3582f44b..f13084843 100644 --- a/tests/translator/output/aws-us-gov/implicit_api_with_many_conditions.json +++ b/tests/translator/output/aws-us-gov/implicit_api_with_many_conditions.json @@ -164,6 +164,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -239,6 +245,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -524,6 +536,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -571,6 +589,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -640,6 +664,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -665,6 +695,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -715,6 +751,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -823,6 +865,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -848,6 +896,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -873,6 +927,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -898,6 +958,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/implicit_api_with_serverless_rest_api_resource.json b/tests/translator/output/aws-us-gov/implicit_api_with_serverless_rest_api_resource.json index 2a14f8c6f..450fa61a0 100644 --- a/tests/translator/output/aws-us-gov/implicit_api_with_serverless_rest_api_resource.json +++ b/tests/translator/output/aws-us-gov/implicit_api_with_serverless_rest_api_resource.json @@ -6,7 +6,13 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-us-gov:iam::aws:policy/AmazonDynamoDBFullAccess" - ], + ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -118,7 +124,13 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-us-gov:iam::aws:policy/AmazonDynamoDBReadOnlyAccess" - ], + ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/intrinsic_functions.json b/tests/translator/output/aws-us-gov/intrinsic_functions.json index b300c4503..956ddadb4 100644 --- a/tests/translator/output/aws-us-gov/intrinsic_functions.json +++ b/tests/translator/output/aws-us-gov/intrinsic_functions.json @@ -169,7 +169,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "Policies": [ { "PolicyName": "DeadLetterQueuePolicy", @@ -269,7 +275,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -294,7 +306,13 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaDynamoDBExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -448,7 +466,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "Policies": [ { "PolicyName": "DeadLetterQueuePolicy", diff --git a/tests/translator/output/aws-us-gov/iot_rule.json b/tests/translator/output/aws-us-gov/iot_rule.json index 808c2c04e..d9b7332b7 100644 --- a/tests/translator/output/aws-us-gov/iot_rule.json +++ b/tests/translator/output/aws-us-gov/iot_rule.json @@ -122,7 +122,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/layers_all_properties.json b/tests/translator/output/aws-us-gov/layers_all_properties.json index 0a625c83a..066c5eaab 100644 --- a/tests/translator/output/aws-us-gov/layers_all_properties.json +++ b/tests/translator/output/aws-us-gov/layers_all_properties.json @@ -91,7 +91,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/no_implicit_api_with_serverless_rest_api_resource.json b/tests/translator/output/aws-us-gov/no_implicit_api_with_serverless_rest_api_resource.json index ffbb87e6b..fc543060b 100644 --- a/tests/translator/output/aws-us-gov/no_implicit_api_with_serverless_rest_api_resource.json +++ b/tests/translator/output/aws-us-gov/no_implicit_api_with_serverless_rest_api_resource.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -65,7 +71,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -112,7 +124,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/s3.json b/tests/translator/output/aws-us-gov/s3.json index 8cf54f93b..b08f483e3 100644 --- a/tests/translator/output/aws-us-gov/s3.json +++ b/tests/translator/output/aws-us-gov/s3.json @@ -24,7 +24,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/s3_create_remove.json b/tests/translator/output/aws-us-gov/s3_create_remove.json index dc4a017c8..6dc2bd4ad 100644 --- a/tests/translator/output/aws-us-gov/s3_create_remove.json +++ b/tests/translator/output/aws-us-gov/s3_create_remove.json @@ -41,7 +41,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/s3_existing_lambda_notification_configuration.json b/tests/translator/output/aws-us-gov/s3_existing_lambda_notification_configuration.json index 8cf54f93b..b08f483e3 100644 --- a/tests/translator/output/aws-us-gov/s3_existing_lambda_notification_configuration.json +++ b/tests/translator/output/aws-us-gov/s3_existing_lambda_notification_configuration.json @@ -24,7 +24,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/s3_existing_other_notification_configuration.json b/tests/translator/output/aws-us-gov/s3_existing_other_notification_configuration.json index b0f782d57..97e470547 100644 --- a/tests/translator/output/aws-us-gov/s3_existing_other_notification_configuration.json +++ b/tests/translator/output/aws-us-gov/s3_existing_other_notification_configuration.json @@ -32,7 +32,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/s3_filter.json b/tests/translator/output/aws-us-gov/s3_filter.json index c1671e165..e8e1a5ea3 100644 --- a/tests/translator/output/aws-us-gov/s3_filter.json +++ b/tests/translator/output/aws-us-gov/s3_filter.json @@ -34,7 +34,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/s3_multiple_events_same_bucket.json b/tests/translator/output/aws-us-gov/s3_multiple_events_same_bucket.json index 30da757ed..3dc653ff7 100644 --- a/tests/translator/output/aws-us-gov/s3_multiple_events_same_bucket.json +++ b/tests/translator/output/aws-us-gov/s3_multiple_events_same_bucket.json @@ -5,7 +5,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/s3_multiple_functions.json b/tests/translator/output/aws-us-gov/s3_multiple_functions.json index 7dd7f0f97..80f8cf594 100644 --- a/tests/translator/output/aws-us-gov/s3_multiple_functions.json +++ b/tests/translator/output/aws-us-gov/s3_multiple_functions.json @@ -6,6 +6,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -80,6 +86,12 @@ "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/s3_with_condition.json b/tests/translator/output/aws-us-gov/s3_with_condition.json index 1604f0aff..27519c08d 100644 --- a/tests/translator/output/aws-us-gov/s3_with_condition.json +++ b/tests/translator/output/aws-us-gov/s3_with_condition.json @@ -53,7 +53,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/s3_with_dependsOn.json b/tests/translator/output/aws-us-gov/s3_with_dependsOn.json index 2a4f26dd8..273e27d23 100644 --- a/tests/translator/output/aws-us-gov/s3_with_dependsOn.json +++ b/tests/translator/output/aws-us-gov/s3_with_dependsOn.json @@ -30,7 +30,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/sns.json b/tests/translator/output/aws-us-gov/sns.json index bf953f46d..7f2a449f2 100644 --- a/tests/translator/output/aws-us-gov/sns.json +++ b/tests/translator/output/aws-us-gov/sns.json @@ -8,7 +8,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/sns_existing_other_subscription.json b/tests/translator/output/aws-us-gov/sns_existing_other_subscription.json index 595466b0e..f829f2a78 100644 --- a/tests/translator/output/aws-us-gov/sns_existing_other_subscription.json +++ b/tests/translator/output/aws-us-gov/sns_existing_other_subscription.json @@ -16,7 +16,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/sns_sqs.json b/tests/translator/output/aws-us-gov/sns_sqs.json index c42490f03..81d2b1b33 100644 --- a/tests/translator/output/aws-us-gov/sns_sqs.json +++ b/tests/translator/output/aws-us-gov/sns_sqs.json @@ -75,6 +75,12 @@ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaSQSQueueExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/sns_topic_outside_template.json b/tests/translator/output/aws-us-gov/sns_topic_outside_template.json index f7108a390..7e499f203 100644 --- a/tests/translator/output/aws-us-gov/sns_topic_outside_template.json +++ b/tests/translator/output/aws-us-gov/sns_topic_outside_template.json @@ -25,7 +25,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/aws-us-gov/sqs.json b/tests/translator/output/aws-us-gov/sqs.json index 2c2fc9f8f..0d80717ab 100644 --- a/tests/translator/output/aws-us-gov/sqs.json +++ b/tests/translator/output/aws-us-gov/sqs.json @@ -7,6 +7,12 @@ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaSQSQueueExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [{ diff --git a/tests/translator/output/aws-us-gov/streams.json b/tests/translator/output/aws-us-gov/streams.json index d0bd19577..c239a1f0e 100644 --- a/tests/translator/output/aws-us-gov/streams.json +++ b/tests/translator/output/aws-us-gov/streams.json @@ -60,6 +60,12 @@ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaDynamoDBExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [{ @@ -95,6 +101,12 @@ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaKinesisExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [{ diff --git a/tests/translator/output/basic_function.json b/tests/translator/output/basic_function.json index c1bd1e19c..8b1e210f4 100644 --- a/tests/translator/output/basic_function.json +++ b/tests/translator/output/basic_function.json @@ -40,7 +40,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -133,7 +139,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -261,7 +273,13 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws:iam::aws:policy/AmazonDynamoDBFullAccess" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -286,7 +304,13 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws:iam::aws:policy/AWSXrayWriteOnlyAccess" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -311,7 +335,13 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws:iam::aws:policy/AWSXrayWriteOnlyAccess" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -384,7 +414,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "Policies": [ { "PolicyName": "FunctionWithPolicyDocumentRolePolicy0", diff --git a/tests/translator/output/basic_function_with_tags.json b/tests/translator/output/basic_function_with_tags.json index dffbcbb81..79f189bd6 100644 --- a/tests/translator/output/basic_function_with_tags.json +++ b/tests/translator/output/basic_function_with_tags.json @@ -12,7 +12,31 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + }, + { + "Value": "TagValue1", + "Key": "TagKey1" + }, + { + "Value": "", + "Key": "TagKey2" + }, + { + "Value": { + "Ref": "TagValueParam" + }, + "Key": "TagKey3" + }, + { + "Value": "123", + "Key": "TagKey4" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/cloudwatch_logs_with_ref.json b/tests/translator/output/cloudwatch_logs_with_ref.json index 15f559751..6307954dd 100644 --- a/tests/translator/output/cloudwatch_logs_with_ref.json +++ b/tests/translator/output/cloudwatch_logs_with_ref.json @@ -61,6 +61,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/cloudwatchevent.json b/tests/translator/output/cloudwatchevent.json index 0def3b60a..f566b680b 100644 --- a/tests/translator/output/cloudwatchevent.json +++ b/tests/translator/output/cloudwatchevent.json @@ -5,7 +5,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -133,7 +139,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/cloudwatchevent_schedule_properties.json b/tests/translator/output/cloudwatchevent_schedule_properties.json index 5737fa5e6..06901ff02 100644 --- a/tests/translator/output/cloudwatchevent_schedule_properties.json +++ b/tests/translator/output/cloudwatchevent_schedule_properties.json @@ -5,7 +5,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -132,7 +138,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/cloudwatchlog.json b/tests/translator/output/cloudwatchlog.json index 7e4ab33cf..de22a43aa 100644 --- a/tests/translator/output/cloudwatchlog.json +++ b/tests/translator/output/cloudwatchlog.json @@ -46,6 +46,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/cognito_userpool_with_event.json b/tests/translator/output/cognito_userpool_with_event.json index fe3d29336..d0b001e48 100644 --- a/tests/translator/output/cognito_userpool_with_event.json +++ b/tests/translator/output/cognito_userpool_with_event.json @@ -54,6 +54,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/depends_on.json b/tests/translator/output/depends_on.json index ecc23cf6d..4b1ef3342 100644 --- a/tests/translator/output/depends_on.json +++ b/tests/translator/output/depends_on.json @@ -108,6 +108,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/explicit_api.json b/tests/translator/output/explicit_api.json index f3e698917..7c2a9fdaa 100644 --- a/tests/translator/output/explicit_api.json +++ b/tests/translator/output/explicit_api.json @@ -63,7 +63,14 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws:iam::aws:policy/AmazonDynamoDBReadOnlyAccess" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], + "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/explicit_api_openapi_3.json b/tests/translator/output/explicit_api_openapi_3.json index 9b8031396..b0e2b9d2d 100644 --- a/tests/translator/output/explicit_api_openapi_3.json +++ b/tests/translator/output/explicit_api_openapi_3.json @@ -72,7 +72,14 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws:iam::aws:policy/AmazonDynamoDBReadOnlyAccess" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], + "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/explicit_api_with_invalid_events_config.json b/tests/translator/output/explicit_api_with_invalid_events_config.json index 3222d2538..8acbf9aa4 100644 --- a/tests/translator/output/explicit_api_with_invalid_events_config.json +++ b/tests/translator/output/explicit_api_with_invalid_events_config.json @@ -97,7 +97,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/function_concurrency.json b/tests/translator/output/function_concurrency.json index 11bd89375..afd5f36c7 100644 --- a/tests/translator/output/function_concurrency.json +++ b/tests/translator/output/function_concurrency.json @@ -11,6 +11,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -56,6 +62,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/function_event_conditions.json b/tests/translator/output/function_event_conditions.json index a86f8ff3b..8de5fff08 100644 --- a/tests/translator/output/function_event_conditions.json +++ b/tests/translator/output/function_event_conditions.json @@ -206,7 +206,13 @@ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws:iam::aws:policy/service-role/AWSLambdaKinesisExecutionRole", "arn:aws:iam::aws:policy/service-role/AWSLambdaDynamoDBExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -320,6 +326,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/function_managed_inline_policy.json b/tests/translator/output/function_managed_inline_policy.json index 15911c5b7..a05542ae8 100644 --- a/tests/translator/output/function_managed_inline_policy.json +++ b/tests/translator/output/function_managed_inline_policy.json @@ -40,7 +40,13 @@ "Ref": "SomeManagedPolicyArn" }, "arn:aws:iam::123456789012:policy/CustomerCreatedManagedPolicy" - ], + ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "Policies": [ { "PolicyName": "FunctionRolePolicy0", diff --git a/tests/translator/output/function_with_alias.json b/tests/translator/output/function_with_alias.json index 16231d245..306c5b387 100644 --- a/tests/translator/output/function_with_alias.json +++ b/tests/translator/output/function_with_alias.json @@ -53,7 +53,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/function_with_alias_and_event_sources.json b/tests/translator/output/function_with_alias_and_event_sources.json index d9cb33bf0..c5755d9a1 100644 --- a/tests/translator/output/function_with_alias_and_event_sources.json +++ b/tests/translator/output/function_with_alias_and_event_sources.json @@ -254,7 +254,13 @@ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws:iam::aws:policy/service-role/AWSLambdaKinesisExecutionRole", "arn:aws:iam::aws:policy/service-role/AWSLambdaDynamoDBExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/function_with_alias_intrinsics.json b/tests/translator/output/function_with_alias_intrinsics.json index b343d8075..507f8af00 100644 --- a/tests/translator/output/function_with_alias_intrinsics.json +++ b/tests/translator/output/function_with_alias_intrinsics.json @@ -58,7 +58,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/function_with_batch_window.json b/tests/translator/output/function_with_batch_window.json index 1e6e928f0..cbdd42860 100644 --- a/tests/translator/output/function_with_batch_window.json +++ b/tests/translator/output/function_with_batch_window.json @@ -32,6 +32,12 @@ "arn:aws:iam::aws:policy/service-role/AWSLambdaDynamoDBExecutionRole", "arn:aws:iam::aws:policy/service-role/AWSLambdaKinesisExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/function_with_condition.json b/tests/translator/output/function_with_condition.json index a73a16074..25e902d7b 100644 --- a/tests/translator/output/function_with_condition.json +++ b/tests/translator/output/function_with_condition.json @@ -37,7 +37,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/function_with_conditional_managed_policy.json b/tests/translator/output/function_with_conditional_managed_policy.json index a7aacc283..db41f277c 100644 --- a/tests/translator/output/function_with_conditional_managed_policy.json +++ b/tests/translator/output/function_with_conditional_managed_policy.json @@ -49,6 +49,12 @@ ] } ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/function_with_conditional_managed_policy_and_ref_no_value.json b/tests/translator/output/function_with_conditional_managed_policy_and_ref_no_value.json index 056fd49c5..2d64091de 100644 --- a/tests/translator/output/function_with_conditional_managed_policy_and_ref_no_value.json +++ b/tests/translator/output/function_with_conditional_managed_policy_and_ref_no_value.json @@ -49,6 +49,12 @@ ] } ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/function_with_conditional_policy_template.json b/tests/translator/output/function_with_conditional_policy_template.json index dd145ce75..9bcd6123e 100644 --- a/tests/translator/output/function_with_conditional_policy_template.json +++ b/tests/translator/output/function_with_conditional_policy_template.json @@ -38,6 +38,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "Policies": [ { "Fn::If": [ diff --git a/tests/translator/output/function_with_conditional_policy_template_and_ref_no_value.json b/tests/translator/output/function_with_conditional_policy_template_and_ref_no_value.json index 2d6b987c2..40262859a 100644 --- a/tests/translator/output/function_with_conditional_policy_template_and_ref_no_value.json +++ b/tests/translator/output/function_with_conditional_policy_template_and_ref_no_value.json @@ -38,6 +38,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "Policies": [ { "Fn::If": [ diff --git a/tests/translator/output/function_with_custom_codedeploy_deployment_preference.json b/tests/translator/output/function_with_custom_codedeploy_deployment_preference.json index 8f628b9b1..7f9d9822d 100644 --- a/tests/translator/output/function_with_custom_codedeploy_deployment_preference.json +++ b/tests/translator/output/function_with_custom_codedeploy_deployment_preference.json @@ -441,7 +441,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -465,7 +471,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -529,7 +541,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -610,7 +628,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -707,7 +731,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -756,7 +786,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -841,7 +877,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/function_with_custom_conditional_codedeploy_deployment_preference.json b/tests/translator/output/function_with_custom_conditional_codedeploy_deployment_preference.json index 413b8913d..455194683 100644 --- a/tests/translator/output/function_with_custom_conditional_codedeploy_deployment_preference.json +++ b/tests/translator/output/function_with_custom_conditional_codedeploy_deployment_preference.json @@ -36,7 +36,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/function_with_deployment_and_custom_role.json b/tests/translator/output/function_with_deployment_and_custom_role.json index 7a2dd87c9..8ec847d9d 100644 --- a/tests/translator/output/function_with_deployment_and_custom_role.json +++ b/tests/translator/output/function_with_deployment_and_custom_role.json @@ -51,7 +51,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/function_with_deployment_no_service_role.json b/tests/translator/output/function_with_deployment_no_service_role.json index 706cf02e0..ef9ed4aa6 100644 --- a/tests/translator/output/function_with_deployment_no_service_role.json +++ b/tests/translator/output/function_with_deployment_no_service_role.json @@ -59,7 +59,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -92,7 +98,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/function_with_deployment_preference.json b/tests/translator/output/function_with_deployment_preference.json index 75ba69524..7748bac1a 100644 --- a/tests/translator/output/function_with_deployment_preference.json +++ b/tests/translator/output/function_with_deployment_preference.json @@ -39,7 +39,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/function_with_deployment_preference_all_parameters.json b/tests/translator/output/function_with_deployment_preference_all_parameters.json index b8a44e7ff..39d2f962f 100644 --- a/tests/translator/output/function_with_deployment_preference_all_parameters.json +++ b/tests/translator/output/function_with_deployment_preference_all_parameters.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -52,7 +58,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -247,7 +259,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/function_with_deployment_preference_multiple_combinations.json b/tests/translator/output/function_with_deployment_preference_multiple_combinations.json index 774d48121..2ac095373 100644 --- a/tests/translator/output/function_with_deployment_preference_multiple_combinations.json +++ b/tests/translator/output/function_with_deployment_preference_multiple_combinations.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -75,7 +81,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -188,7 +200,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -212,7 +230,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -364,7 +388,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/function_with_disabled_deployment_preference.json b/tests/translator/output/function_with_disabled_deployment_preference.json index e4ac30b6c..47834b6e8 100644 --- a/tests/translator/output/function_with_disabled_deployment_preference.json +++ b/tests/translator/output/function_with_disabled_deployment_preference.json @@ -52,7 +52,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/function_with_dlq.json b/tests/translator/output/function_with_dlq.json index 33ed79e22..599656cd9 100644 --- a/tests/translator/output/function_with_dlq.json +++ b/tests/translator/output/function_with_dlq.json @@ -6,6 +6,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "Policies": [ { "PolicyName": "DeadLetterQueuePolicy", @@ -45,6 +51,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "Policies": [ { "PolicyName": "DeadLetterQueuePolicy", diff --git a/tests/translator/output/function_with_global_layers.json b/tests/translator/output/function_with_global_layers.json index 745ddd0cc..b40dcd644 100644 --- a/tests/translator/output/function_with_global_layers.json +++ b/tests/translator/output/function_with_global_layers.json @@ -6,6 +6,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/function_with_kmskeyarn.json b/tests/translator/output/function_with_kmskeyarn.json index ea75c4696..ef7a69f6c 100644 --- a/tests/translator/output/function_with_kmskeyarn.json +++ b/tests/translator/output/function_with_kmskeyarn.json @@ -6,6 +6,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -30,6 +36,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/function_with_layers.json b/tests/translator/output/function_with_layers.json index a6b6e357a..9d660ef49 100644 --- a/tests/translator/output/function_with_layers.json +++ b/tests/translator/output/function_with_layers.json @@ -70,7 +70,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -94,7 +100,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -175,7 +187,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -199,7 +217,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/function_with_many_layers.json b/tests/translator/output/function_with_many_layers.json index 885be8351..96e64d886 100644 --- a/tests/translator/output/function_with_many_layers.json +++ b/tests/translator/output/function_with_many_layers.json @@ -16,7 +16,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/function_with_permissions_boundary.json b/tests/translator/output/function_with_permissions_boundary.json index ecd3a1e0b..9e77b8781 100644 --- a/tests/translator/output/function_with_permissions_boundary.json +++ b/tests/translator/output/function_with_permissions_boundary.json @@ -5,7 +5,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "PermissionsBoundary": "arn:aws:1234:iam:boundary/CustomerCreatedPermissionsBoundary", "AssumeRolePolicyDocument": { "Version": "2012-10-17", diff --git a/tests/translator/output/function_with_policy_templates.json b/tests/translator/output/function_with_policy_templates.json index c59ef2801..05c9057cb 100644 --- a/tests/translator/output/function_with_policy_templates.json +++ b/tests/translator/output/function_with_policy_templates.json @@ -57,6 +57,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "Policies": [ { "PolicyName": "OnePolicyTemplateRolePolicy0", @@ -116,6 +122,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "Policies": [ { "PolicyName": "MultiplePolicyTemplatesRolePolicy0", @@ -214,6 +226,12 @@ "arn:aws:iam::aws:policy/AmazonDynamoDBFullAccess", "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "Policies": [ { "PolicyName": "AllCombinationsRolePolicy0", diff --git a/tests/translator/output/function_with_request_parameters.json b/tests/translator/output/function_with_request_parameters.json index 77dc1f50c..80a7bc46c 100644 --- a/tests/translator/output/function_with_request_parameters.json +++ b/tests/translator/output/function_with_request_parameters.json @@ -29,6 +29,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -63,6 +69,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/function_with_resource_refs.json b/tests/translator/output/function_with_resource_refs.json index e583d2819..d331af50a 100644 --- a/tests/translator/output/function_with_resource_refs.json +++ b/tests/translator/output/function_with_resource_refs.json @@ -79,7 +79,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -126,7 +132,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/function_with_sns_event_source_all_parameters.json b/tests/translator/output/function_with_sns_event_source_all_parameters.json index 698eb0055..24ea11a44 100644 --- a/tests/translator/output/function_with_sns_event_source_all_parameters.json +++ b/tests/translator/output/function_with_sns_event_source_all_parameters.json @@ -54,6 +54,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/global_handle_path_level_parameter.json b/tests/translator/output/global_handle_path_level_parameter.json index 030a9087f..9b81329c5 100644 --- a/tests/translator/output/global_handle_path_level_parameter.json +++ b/tests/translator/output/global_handle_path_level_parameter.json @@ -29,6 +29,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/globals_for_api.json b/tests/translator/output/globals_for_api.json index 0e4af028e..8edff26cd 100644 --- a/tests/translator/output/globals_for_api.json +++ b/tests/translator/output/globals_for_api.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/globals_for_function.json b/tests/translator/output/globals_for_function.json index 0cf77bc37..4c48fba38 100644 --- a/tests/translator/output/globals_for_function.json +++ b/tests/translator/output/globals_for_function.json @@ -7,7 +7,21 @@ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws:iam::aws:policy/AWSXrayWriteOnlyAccess" ], - "PermissionsBoundary": "arn:aws:1234:iam:boundary/OverridePermissionsBoundary", + "PermissionsBoundary": "arn:aws:1234:iam:boundary/OverridePermissionsBoundary", + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + }, + { + "Value": "newvalue1", + "Key": "newtag1" + }, + { + "Value": "value1", + "Key": "tag1" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -94,7 +108,17 @@ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws:iam::aws:policy/AWSXrayWriteOnlyAccess" ], - "PermissionsBoundary": "arn:aws:1234:iam:boundary/CustomerCreatedPermissionsBoundary", + "PermissionsBoundary": "arn:aws:1234:iam:boundary/CustomerCreatedPermissionsBoundary", + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + }, + { + "Value": "value1", + "Key": "tag1" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/implicit_and_explicit_api_with_conditions.json b/tests/translator/output/implicit_and_explicit_api_with_conditions.json index 85353572d..ab1bee6cf 100644 --- a/tests/translator/output/implicit_and_explicit_api_with_conditions.json +++ b/tests/translator/output/implicit_and_explicit_api_with_conditions.json @@ -68,6 +68,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -212,6 +218,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -405,6 +417,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -529,6 +547,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/implicit_api.json b/tests/translator/output/implicit_api.json index 5d5930ec5..6d4648698 100644 --- a/tests/translator/output/implicit_api.json +++ b/tests/translator/output/implicit_api.json @@ -6,7 +6,14 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws:iam::aws:policy/AmazonDynamoDBFullAccess" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], + "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -108,7 +115,14 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws:iam::aws:policy/AmazonDynamoDBReadOnlyAccess" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], + "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/implicit_api_with_auth_and_conditions_max.json b/tests/translator/output/implicit_api_with_auth_and_conditions_max.json index 3eb8f6e89..1336f01ba 100644 --- a/tests/translator/output/implicit_api_with_auth_and_conditions_max.json +++ b/tests/translator/output/implicit_api_with_auth_and_conditions_max.json @@ -216,6 +216,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -241,6 +247,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -277,6 +289,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -326,6 +344,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -392,6 +416,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -523,6 +553,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/implicit_api_with_many_conditions.json b/tests/translator/output/implicit_api_with_many_conditions.json index 20043628d..dbfd31912 100644 --- a/tests/translator/output/implicit_api_with_many_conditions.json +++ b/tests/translator/output/implicit_api_with_many_conditions.json @@ -164,6 +164,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -239,6 +245,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -535,6 +547,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -582,6 +600,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -651,6 +675,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -676,6 +706,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -726,6 +762,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -823,6 +865,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -848,6 +896,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -873,6 +927,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -898,6 +958,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/implicit_api_with_serverless_rest_api_resource.json b/tests/translator/output/implicit_api_with_serverless_rest_api_resource.json index 5d5930ec5..14d978aac 100644 --- a/tests/translator/output/implicit_api_with_serverless_rest_api_resource.json +++ b/tests/translator/output/implicit_api_with_serverless_rest_api_resource.json @@ -6,7 +6,13 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws:iam::aws:policy/AmazonDynamoDBFullAccess" - ], + ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -108,7 +114,13 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws:iam::aws:policy/AmazonDynamoDBReadOnlyAccess" - ], + ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/intrinsic_functions.json b/tests/translator/output/intrinsic_functions.json index 84ed45c37..20431af84 100644 --- a/tests/translator/output/intrinsic_functions.json +++ b/tests/translator/output/intrinsic_functions.json @@ -153,7 +153,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "Policies": [ { "PolicyName": "DeadLetterQueuePolicy", @@ -253,7 +259,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -278,7 +290,13 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws:iam::aws:policy/service-role/AWSLambdaDynamoDBExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -432,7 +450,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Key": "lambda:createdBy", + "Value": "SAM" + } + ], "Policies": [ { "PolicyName": "DeadLetterQueuePolicy", diff --git a/tests/translator/output/iot_rule.json b/tests/translator/output/iot_rule.json index b8e26cd31..abc96ccd9 100644 --- a/tests/translator/output/iot_rule.json +++ b/tests/translator/output/iot_rule.json @@ -122,7 +122,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/layers_all_properties.json b/tests/translator/output/layers_all_properties.json index 2cb5221e0..a99809489 100644 --- a/tests/translator/output/layers_all_properties.json +++ b/tests/translator/output/layers_all_properties.json @@ -91,7 +91,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/no_implicit_api_with_serverless_rest_api_resource.json b/tests/translator/output/no_implicit_api_with_serverless_rest_api_resource.json index 1ffbb945e..61b19f173 100644 --- a/tests/translator/output/no_implicit_api_with_serverless_rest_api_resource.json +++ b/tests/translator/output/no_implicit_api_with_serverless_rest_api_resource.json @@ -28,7 +28,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -65,7 +71,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -112,7 +124,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/s3.json b/tests/translator/output/s3.json index 29eb96901..6dd93d448 100644 --- a/tests/translator/output/s3.json +++ b/tests/translator/output/s3.json @@ -24,7 +24,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/s3_create_remove.json b/tests/translator/output/s3_create_remove.json index 353a44a83..bcf2970f9 100644 --- a/tests/translator/output/s3_create_remove.json +++ b/tests/translator/output/s3_create_remove.json @@ -41,7 +41,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/s3_existing_lambda_notification_configuration.json b/tests/translator/output/s3_existing_lambda_notification_configuration.json index 29eb96901..6dd93d448 100644 --- a/tests/translator/output/s3_existing_lambda_notification_configuration.json +++ b/tests/translator/output/s3_existing_lambda_notification_configuration.json @@ -24,7 +24,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/s3_existing_other_notification_configuration.json b/tests/translator/output/s3_existing_other_notification_configuration.json index 447f0a8f6..ed9e939b3 100644 --- a/tests/translator/output/s3_existing_other_notification_configuration.json +++ b/tests/translator/output/s3_existing_other_notification_configuration.json @@ -32,7 +32,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/s3_filter.json b/tests/translator/output/s3_filter.json index bcb5f7911..7586def7f 100644 --- a/tests/translator/output/s3_filter.json +++ b/tests/translator/output/s3_filter.json @@ -34,7 +34,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/s3_multiple_events_same_bucket.json b/tests/translator/output/s3_multiple_events_same_bucket.json index b340b677c..3e8c5d636 100644 --- a/tests/translator/output/s3_multiple_events_same_bucket.json +++ b/tests/translator/output/s3_multiple_events_same_bucket.json @@ -5,7 +5,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/s3_multiple_functions.json b/tests/translator/output/s3_multiple_functions.json index 9ede10c74..6a2f0fbc8 100644 --- a/tests/translator/output/s3_multiple_functions.json +++ b/tests/translator/output/s3_multiple_functions.json @@ -6,6 +6,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ @@ -80,6 +86,12 @@ "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/s3_with_condition.json b/tests/translator/output/s3_with_condition.json index b2397cc3a..9a837a2cb 100644 --- a/tests/translator/output/s3_with_condition.json +++ b/tests/translator/output/s3_with_condition.json @@ -53,7 +53,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/s3_with_dependsOn.json b/tests/translator/output/s3_with_dependsOn.json index 2a6829752..d0c1b8842 100644 --- a/tests/translator/output/s3_with_dependsOn.json +++ b/tests/translator/output/s3_with_dependsOn.json @@ -30,7 +30,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/sns.json b/tests/translator/output/sns.json index 6b96af407..153dff2b7 100644 --- a/tests/translator/output/sns.json +++ b/tests/translator/output/sns.json @@ -8,7 +8,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/sns_existing_other_subscription.json b/tests/translator/output/sns_existing_other_subscription.json index 9fdb5b49b..a59e32b48 100644 --- a/tests/translator/output/sns_existing_other_subscription.json +++ b/tests/translator/output/sns_existing_other_subscription.json @@ -16,7 +16,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/sns_sqs.json b/tests/translator/output/sns_sqs.json index 79e641b77..ad7d75473 100644 --- a/tests/translator/output/sns_sqs.json +++ b/tests/translator/output/sns_sqs.json @@ -75,6 +75,12 @@ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws:iam::aws:policy/service-role/AWSLambdaSQSQueueExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/sns_topic_outside_template.json b/tests/translator/output/sns_topic_outside_template.json index 1c4f4831d..dfaab1440 100644 --- a/tests/translator/output/sns_topic_outside_template.json +++ b/tests/translator/output/sns_topic_outside_template.json @@ -25,7 +25,13 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" - ], + ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [ diff --git a/tests/translator/output/sqs.json b/tests/translator/output/sqs.json index 0b1da5f6e..36bcdb1aa 100644 --- a/tests/translator/output/sqs.json +++ b/tests/translator/output/sqs.json @@ -7,6 +7,12 @@ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws:iam::aws:policy/service-role/AWSLambdaSQSQueueExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [{ diff --git a/tests/translator/output/streams.json b/tests/translator/output/streams.json index c9e791063..3b54cd853 100644 --- a/tests/translator/output/streams.json +++ b/tests/translator/output/streams.json @@ -60,6 +60,12 @@ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws:iam::aws:policy/service-role/AWSLambdaDynamoDBExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [{ @@ -95,6 +101,12 @@ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", "arn:aws:iam::aws:policy/service-role/AWSLambdaKinesisExecutionRole" ], + "Tags": [ + { + "Value": "SAM", + "Key": "lambda:createdBy" + } + ], "AssumeRolePolicyDocument": { "Version": "2012-10-17", "Statement": [{ diff --git a/versions/2016-10-31.md b/versions/2016-10-31.md index d00a6959c..0f5c8dec9 100644 --- a/versions/2016-10-31.md +++ b/versions/2016-10-31.md @@ -121,7 +121,7 @@ PermissionsBoundary | `string` | ARN of a permissions boundary to use for this f Environment | [Function environment object](#environment-object) | Configuration for the runtime environment. VpcConfig | [VPC config object](http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-lambda-function-vpcconfig.html) | Configuration to enable this function to access private resources within your VPC. Events | Map of `string` to [Event source object](#event-source-object) | A map (string to [Event source object](#event-source-object)) that defines the events that trigger this function. Keys are limited to alphanumeric characters. -Tags | Map of `string` to `string` | A map (string to string) that specifies the tags to be added to this function. Keys and values are limited to alphanumeric characters. Keys can be 1 to 127 Unicode characters in length and cannot be prefixed with `aws:`. Values can be 1 to 255 Unicode characters in length. When the stack is created, SAM will automatically add a `lambda:createdBy:SAM` tag to this Lambda function. +Tags | Map of `string` to `string` | A map (string to string) that specifies the tags to be added to this function. Keys and values are limited to alphanumeric characters. Keys can be 1 to 127 Unicode characters in length and cannot be prefixed with `aws:`. Values can be 1 to 255 Unicode characters in length. When the stack is created, SAM will automatically add a `lambda:createdBy:SAM` tag to this Lambda function. Tags will also be applied to default roles generated by the function. Tracing | `string` | String that specifies the function's [X-Ray tracing mode](http://docs.aws.amazon.com/lambda/latest/dg/lambda-x-ray.html). Accepted values are `Active` and `PassThrough` KmsKeyArn | `string` | The Amazon Resource Name (ARN) of an AWS Key Management Service (AWS KMS) key that Lambda uses to encrypt and decrypt your function's environment variables. DeadLetterQueue | `map` | [DeadLetterQueue Object](#deadletterqueue-object) | Configures SNS topic or SQS queue where Lambda sends events that it can't process.