From fc9ed4709dd86ac67328e01f00e5bc2b3188469a Mon Sep 17 00:00:00 2001 From: Keeton Hodgson Date: Tue, 21 Jan 2020 10:39:14 -0800 Subject: [PATCH] fix: update policy used for xray tracing --- samtranslator/model/sam_resources.py | 2 +- tests/translator/output/aws-cn/basic_function.json | 4 ++-- tests/translator/output/aws-cn/globals_for_function.json | 4 ++-- tests/translator/output/aws-us-gov/basic_function.json | 4 ++-- tests/translator/output/aws-us-gov/globals_for_function.json | 4 ++-- tests/translator/output/basic_function.json | 4 ++-- tests/translator/output/globals_for_function.json | 4 ++-- 7 files changed, 13 insertions(+), 13 deletions(-) diff --git a/samtranslator/model/sam_resources.py b/samtranslator/model/sam_resources.py index 27744a7374..38bb45d7a5 100644 --- a/samtranslator/model/sam_resources.py +++ b/samtranslator/model/sam_resources.py @@ -423,7 +423,7 @@ def _construct_role(self, managed_policy_map, event_invoke_policies): managed_policy_arns = [ArnGenerator.generate_aws_managed_policy_arn("service-role/AWSLambdaBasicExecutionRole")] if self.Tracing: - managed_policy_arns.append(ArnGenerator.generate_aws_managed_policy_arn("AWSXrayWriteOnlyAccess")) + managed_policy_arns.append(ArnGenerator.generate_aws_managed_policy_arn("AWSXRayDaemonWriteAccess")) if self.VpcConfig: managed_policy_arns.append( ArnGenerator.generate_aws_managed_policy_arn("service-role/AWSLambdaVPCAccessExecutionRole") diff --git a/tests/translator/output/aws-cn/basic_function.json b/tests/translator/output/aws-cn/basic_function.json index 33857a45d8..f3d2b18916 100644 --- a/tests/translator/output/aws-cn/basic_function.json +++ b/tests/translator/output/aws-cn/basic_function.json @@ -303,7 +303,7 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", - "arn:aws-cn:iam::aws:policy/AWSXrayWriteOnlyAccess" + "arn:aws-cn:iam::aws:policy/AWSXRayDaemonWriteAccess" ], "Tags": [ { @@ -334,7 +334,7 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", - "arn:aws-cn:iam::aws:policy/AWSXrayWriteOnlyAccess" + "arn:aws-cn:iam::aws:policy/AWSXRayDaemonWriteAccess" ], "Tags": [ { diff --git a/tests/translator/output/aws-cn/globals_for_function.json b/tests/translator/output/aws-cn/globals_for_function.json index 0724bd4e87..1559424a9f 100644 --- a/tests/translator/output/aws-cn/globals_for_function.json +++ b/tests/translator/output/aws-cn/globals_for_function.json @@ -5,7 +5,7 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", - "arn:aws-cn:iam::aws:policy/AWSXrayWriteOnlyAccess", + "arn:aws-cn:iam::aws:policy/AWSXRayDaemonWriteAccess", "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole" ], "Tags": [ @@ -107,7 +107,7 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", - "arn:aws-cn:iam::aws:policy/AWSXrayWriteOnlyAccess", + "arn:aws-cn:iam::aws:policy/AWSXRayDaemonWriteAccess", "arn:aws-cn:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole" ], "Tags": [ diff --git a/tests/translator/output/aws-us-gov/basic_function.json b/tests/translator/output/aws-us-gov/basic_function.json index 649009382a..ad22b6c2b2 100644 --- a/tests/translator/output/aws-us-gov/basic_function.json +++ b/tests/translator/output/aws-us-gov/basic_function.json @@ -303,7 +303,7 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", - "arn:aws-us-gov:iam::aws:policy/AWSXrayWriteOnlyAccess" + "arn:aws-us-gov:iam::aws:policy/AWSXRayDaemonWriteAccess" ], "Tags": [ { @@ -334,7 +334,7 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", - "arn:aws-us-gov:iam::aws:policy/AWSXrayWriteOnlyAccess" + "arn:aws-us-gov:iam::aws:policy/AWSXRayDaemonWriteAccess" ], "Tags": [ { diff --git a/tests/translator/output/aws-us-gov/globals_for_function.json b/tests/translator/output/aws-us-gov/globals_for_function.json index e436c5079c..4170d86bc3 100644 --- a/tests/translator/output/aws-us-gov/globals_for_function.json +++ b/tests/translator/output/aws-us-gov/globals_for_function.json @@ -5,7 +5,7 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", - "arn:aws-us-gov:iam::aws:policy/AWSXrayWriteOnlyAccess", + "arn:aws-us-gov:iam::aws:policy/AWSXRayDaemonWriteAccess", "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole" ], "PermissionsBoundary": "arn:aws:1234:iam:boundary/OverridePermissionsBoundary", @@ -107,7 +107,7 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", - "arn:aws-us-gov:iam::aws:policy/AWSXrayWriteOnlyAccess", + "arn:aws-us-gov:iam::aws:policy/AWSXRayDaemonWriteAccess", "arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole" ], "PermissionsBoundary": "arn:aws:1234:iam:boundary/CustomerCreatedPermissionsBoundary", diff --git a/tests/translator/output/basic_function.json b/tests/translator/output/basic_function.json index 8b1e210f44..f7c2deae6e 100644 --- a/tests/translator/output/basic_function.json +++ b/tests/translator/output/basic_function.json @@ -303,7 +303,7 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", - "arn:aws:iam::aws:policy/AWSXrayWriteOnlyAccess" + "arn:aws:iam::aws:policy/AWSXRayDaemonWriteAccess" ], "Tags": [ { @@ -334,7 +334,7 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", - "arn:aws:iam::aws:policy/AWSXrayWriteOnlyAccess" + "arn:aws:iam::aws:policy/AWSXRayDaemonWriteAccess" ], "Tags": [ { diff --git a/tests/translator/output/globals_for_function.json b/tests/translator/output/globals_for_function.json index 0ad54729b0..4557c0e91f 100644 --- a/tests/translator/output/globals_for_function.json +++ b/tests/translator/output/globals_for_function.json @@ -5,7 +5,7 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", - "arn:aws:iam::aws:policy/AWSXrayWriteOnlyAccess", + "arn:aws:iam::aws:policy/AWSXRayDaemonWriteAccess", "arn:aws:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole" ], "PermissionsBoundary": "arn:aws:1234:iam:boundary/OverridePermissionsBoundary", @@ -107,7 +107,7 @@ "Properties": { "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", - "arn:aws:iam::aws:policy/AWSXrayWriteOnlyAccess", + "arn:aws:iam::aws:policy/AWSXRayDaemonWriteAccess", "arn:aws:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole" ], "PermissionsBoundary": "arn:aws:1234:iam:boundary/CustomerCreatedPermissionsBoundary",