diff --git a/test/fixtures/shortcuts/hookshot-github-secret-ref.json b/test/fixtures/shortcuts/hookshot-github-secret-ref.json index 29dd2ac..09f9685 100644 --- a/test/fixtures/shortcuts/hookshot-github-secret-ref.json +++ b/test/fixtures/shortcuts/hookshot-github-secret-ref.json @@ -28,7 +28,7 @@ "Type": "AWS::ApiGateway::Stage", "Properties": { "DeploymentId": { - "Ref": "PassDeploymentd18750cb" + "Ref": "PassDeployment73cfb54f" }, "StageName": "hookshot", "RestApiId": { @@ -47,7 +47,7 @@ ] } }, - "PassDeploymentd18750cb": { + "PassDeployment73cfb54f": { "Type": "AWS::ApiGateway::Deployment", "DependsOn": "PassMethod", "Properties": { diff --git a/test/fixtures/shortcuts/hookshot-github-secret-string.json b/test/fixtures/shortcuts/hookshot-github-secret-string.json index 8edab93..8660f8d 100644 --- a/test/fixtures/shortcuts/hookshot-github-secret-string.json +++ b/test/fixtures/shortcuts/hookshot-github-secret-string.json @@ -24,7 +24,7 @@ "Type": "AWS::ApiGateway::Stage", "Properties": { "DeploymentId": { - "Ref": "PassDeploymentd18750cb" + "Ref": "PassDeployment73cfb54f" }, "StageName": "hookshot", "RestApiId": { @@ -43,7 +43,7 @@ ] } }, - "PassDeploymentd18750cb": { + "PassDeployment73cfb54f": { "Type": "AWS::ApiGateway::Deployment", "DependsOn": "PassMethod", "Properties": { diff --git a/test/fixtures/shortcuts/hookshot-github.json b/test/fixtures/shortcuts/hookshot-github.json index 5f6daeb..1a49b47 100644 --- a/test/fixtures/shortcuts/hookshot-github.json +++ b/test/fixtures/shortcuts/hookshot-github.json @@ -24,7 +24,7 @@ "Type": "AWS::ApiGateway::Stage", "Properties": { "DeploymentId": { - "Ref": "PassDeploymentd18750cb" + "Ref": "PassDeployment73cfb54f" }, "StageName": "hookshot", "RestApiId": { @@ -43,7 +43,7 @@ ] } }, - "PassDeploymentd18750cb": { + "PassDeployment73cfb54f": { "Type": "AWS::ApiGateway::Deployment", "DependsOn": "PassMethod", "Properties": { diff --git a/test/fixtures/shortcuts/hookshot-passthrough-access-log-format.json b/test/fixtures/shortcuts/hookshot-passthrough-access-log-format.json index 90efd20..001d2ac 100644 --- a/test/fixtures/shortcuts/hookshot-passthrough-access-log-format.json +++ b/test/fixtures/shortcuts/hookshot-passthrough-access-log-format.json @@ -24,7 +24,7 @@ "Type": "AWS::ApiGateway::Stage", "Properties": { "DeploymentId": { - "Ref": "PassDeploymentd18750cb" + "Ref": "PassDeployment73cfb54f" }, "StageName": "hookshot", "RestApiId": { @@ -52,7 +52,7 @@ } } }, - "PassDeploymentd18750cb": { + "PassDeployment73cfb54f": { "Type": "AWS::ApiGateway::Deployment", "DependsOn": "PassMethod", "Properties": { diff --git a/test/fixtures/shortcuts/hookshot-passthrough-alarms.json b/test/fixtures/shortcuts/hookshot-passthrough-alarms.json index 001249e..dab4667 100644 --- a/test/fixtures/shortcuts/hookshot-passthrough-alarms.json +++ b/test/fixtures/shortcuts/hookshot-passthrough-alarms.json @@ -24,7 +24,7 @@ "Type": "AWS::ApiGateway::Stage", "Properties": { "DeploymentId": { - "Ref": "PassDeploymentd18750cb" + "Ref": "PassDeployment73cfb54f" }, "StageName": "hookshot", "RestApiId": { @@ -43,7 +43,7 @@ ] } }, - "PassDeploymentd18750cb": { + "PassDeployment73cfb54f": { "Type": "AWS::ApiGateway::Deployment", "DependsOn": "PassMethod", "Properties": { diff --git a/test/fixtures/shortcuts/hookshot-passthrough-enhanced-logging.json b/test/fixtures/shortcuts/hookshot-passthrough-enhanced-logging.json index 282884d..c2dffb9 100644 --- a/test/fixtures/shortcuts/hookshot-passthrough-enhanced-logging.json +++ b/test/fixtures/shortcuts/hookshot-passthrough-enhanced-logging.json @@ -24,7 +24,7 @@ "Type": "AWS::ApiGateway::Stage", "Properties": { "DeploymentId": { - "Ref": "PassDeploymentd18750cb" + "Ref": "PassDeployment73cfb54f" }, "StageName": "hookshot", "RestApiId": { @@ -43,7 +43,7 @@ ] } }, - "PassDeploymentd18750cb": { + "PassDeployment73cfb54f": { "Type": "AWS::ApiGateway::Deployment", "DependsOn": "PassMethod", "Properties": { diff --git a/test/fixtures/shortcuts/hookshot-passthrough-full-blown-logging.json b/test/fixtures/shortcuts/hookshot-passthrough-full-blown-logging.json index 00b7098..ca465f5 100644 --- a/test/fixtures/shortcuts/hookshot-passthrough-full-blown-logging.json +++ b/test/fixtures/shortcuts/hookshot-passthrough-full-blown-logging.json @@ -24,7 +24,7 @@ "Type": "AWS::ApiGateway::Stage", "Properties": { "DeploymentId": { - "Ref": "PassDeploymentd18750cb" + "Ref": "PassDeployment73cfb54f" }, "StageName": "hookshot", "RestApiId": { @@ -43,7 +43,7 @@ ] } }, - "PassDeploymentd18750cb": { + "PassDeployment73cfb54f": { "Type": "AWS::ApiGateway::Deployment", "DependsOn": "PassMethod", "Properties": { diff --git a/test/fixtures/shortcuts/hookshot-passthrough-logging.json b/test/fixtures/shortcuts/hookshot-passthrough-logging.json index 1fe88eb..1b64205 100644 --- a/test/fixtures/shortcuts/hookshot-passthrough-logging.json +++ b/test/fixtures/shortcuts/hookshot-passthrough-logging.json @@ -24,7 +24,7 @@ "Type": "AWS::ApiGateway::Stage", "Properties": { "DeploymentId": { - "Ref": "PassDeploymentd18750cb" + "Ref": "PassDeployment73cfb54f" }, "StageName": "hookshot", "RestApiId": { @@ -43,7 +43,7 @@ ] } }, - "PassDeploymentd18750cb": { + "PassDeployment73cfb54f": { "Type": "AWS::ApiGateway::Deployment", "DependsOn": "PassMethod", "Properties": { diff --git a/test/fixtures/shortcuts/hookshot-passthrough.json b/test/fixtures/shortcuts/hookshot-passthrough.json index bde1d5c..d6285b4 100644 --- a/test/fixtures/shortcuts/hookshot-passthrough.json +++ b/test/fixtures/shortcuts/hookshot-passthrough.json @@ -24,7 +24,7 @@ "Type": "AWS::ApiGateway::Stage", "Properties": { "DeploymentId": { - "Ref": "PassDeploymentd18750cb" + "Ref": "PassDeployment73cfb54f" }, "StageName": "hookshot", "RestApiId": { @@ -43,7 +43,7 @@ ] } }, - "PassDeploymentd18750cb": { + "PassDeployment73cfb54f": { "Type": "AWS::ApiGateway::Deployment", "DependsOn": "PassMethod", "Properties": { diff --git a/test/fixtures/shortcuts/scheduled-lambda-custom-eventbus.json b/test/fixtures/shortcuts/scheduled-lambda-custom-eventbus.json deleted file mode 100644 index 15bf996..0000000 --- a/test/fixtures/shortcuts/scheduled-lambda-custom-eventbus.json +++ /dev/null @@ -1,188 +0,0 @@ -{ - "AWSTemplateFormatVersion": "2010-09-09", - "Metadata": {}, - "Parameters": {}, - "Rules": {}, - "Mappings": {}, - "Conditions": {}, - "Resources": { - "MyLambdaLogs": { - "Type": "AWS::Logs::LogGroup", - "Properties": { - "LogGroupName": { - "Fn::Sub": [ - "/aws/lambda/${name}", - { - "name": { - "Fn::Sub": "${AWS::StackName}-MyLambda" - } - } - ] - }, - "RetentionInDays": 14 - } - }, - "MyLambda": { - "Type": "AWS::Lambda::Function", - "Properties": { - "Code": { - "S3Bucket": "my-code-bucket", - "S3Key": "path/to/code.zip" - }, - "Description": { - "Fn::Sub": "MyLambda in the ${AWS::StackName} stack" - }, - "FunctionName": { - "Fn::Sub": "${AWS::StackName}-MyLambda" - }, - "Handler": "index.handler", - "MemorySize": 128, - "Runtime": "nodejs18.x", - "Timeout": 300, - "Role": { - "Fn::GetAtt": [ - "MyLambdaRole", - "Arn" - ] - } - } - }, - "MyLambdaErrorAlarm": { - "Type": "AWS::CloudWatch::Alarm", - "Properties": { - "AlarmName": { - "Fn::Sub": "${AWS::StackName}-MyLambda-Errors-${AWS::Region}" - }, - "AlarmDescription": { - "Fn::Sub": [ - "Error alarm for ${name} lambda function in ${AWS::StackName} stack", - { - "name": { - "Fn::Sub": "${AWS::StackName}-MyLambda" - } - } - ] - }, - "AlarmActions": [], - "Period": 60, - "EvaluationPeriods": 5, - "DatapointsToAlarm": 1, - "Statistic": "Sum", - "Threshold": 0, - "ComparisonOperator": "GreaterThanThreshold", - "TreatMissingData": "notBreaching", - "Namespace": "AWS/Lambda", - "Dimensions": [ - { - "Name": "FunctionName", - "Value": { - "Ref": "MyLambda" - } - } - ], - "MetricName": "Errors" - } - }, - "MyLambdaLogPolicy": { - "Type": "AWS::IAM::Policy", - "DependsOn": "MyLambdaRole", - "Properties": { - "PolicyName": "lambda-log-access", - "Roles": [ - { - "Ref": "MyLambdaRole" - } - ], - "PolicyDocument": { - "Version": "2012-10-17", - "Statement": [ - { - "Effect": "Allow", - "Action": "logs:*", - "Resource": { - "Fn::GetAtt": [ - "MyLambdaLogs", - "Arn" - ] - } - } - ] - } - } - }, - "MyLambdaRole": { - "Type": "AWS::IAM::Role", - "Properties": { - "AssumeRolePolicyDocument": { - "Statement": [ - { - "Effect": "Allow", - "Action": "sts:AssumeRole", - "Principal": { - "Service": { - "Fn::Sub": "lambda.amazonaws.com" - } - } - } - ] - } - } - }, - "MyLambdaSchedule": { - "Type": "AWS::Events::Rule", - "Properties": { - "Name": { - "Fn::Sub": "${AWS::StackName}-MyLambda" - }, - "Description": { - "Fn::Sub": [ - "Schedule for ${function} in ${AWS::StackName} stack", - { - "function": { - "Fn::Sub": "${AWS::StackName}-MyLambda" - } - } - ] - }, - "State": "DISABLED", - "ScheduleExpression": "rate(1 hour)", - "Targets": [ - { - "Id": { - "Fn::Sub": "${AWS::StackName}-MyLambda" - }, - "Arn": { - "Fn::GetAtt": [ - "MyLambda", - "Arn" - ] - } - } - ], - "EventBusName": "my-cool-eventbus" - } - }, - "MyLambdaPermission": { - "Type": "AWS::Lambda::Permission", - "Properties": { - "Action": "lambda:InvokeFunction", - "FunctionName": { - "Fn::GetAtt": [ - "MyLambda", - "Arn" - ] - }, - "Principal": { - "Fn::Sub": "events.${AWS::URLSuffix}" - }, - "SourceArn": { - "Fn::GetAtt": [ - "MyLambdaSchedule", - "Arn" - ] - } - } - } - }, - "Outputs": {} -} \ No newline at end of file