@@ -552,8 +552,8 @@ Resources:
552
552
Service :
553
553
- lambda.amazonaws.com
554
554
ManagedPolicyArns :
555
- - arn:aws: iam::aws:policy/service-role/AWSLambdaBasicExecutionRole
556
- - arn:aws: iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole
555
+ - !Sub " arn:${AWS::Partition}: iam::aws:policy/service-role/AWSLambdaBasicExecutionRole"
556
+ - !Sub " arn:${AWS::Partition}: iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole"
557
557
PermissionsBoundary : !If
558
558
- SetPermissionsBoundary
559
559
- !Ref PermissionsBoundaryArn
@@ -574,7 +574,7 @@ Resources:
574
574
- !If
575
575
- CreateS3Bucket
576
576
- !Sub " ${ForwarderBucket.Arn}/*"
577
- - !Sub " arn:aws :s3:::${DdForwarderExistingBucketName}/*"
577
+ - !Sub " arn:${AWS::Partition} :s3:::${DdForwarderExistingBucketName}/*"
578
578
Effect : Allow
579
579
- !Ref AWS::NoValue
580
580
- !If
@@ -587,7 +587,7 @@ Resources:
587
587
- !If
588
588
- CreateS3Bucket
589
589
- !GetAtt ForwarderBucket.Arn
590
- - !Sub " arn:aws :s3:::${DdForwarderExistingBucketName}"
590
+ - !Sub " arn:${AWS::Partition} :s3:::${DdForwarderExistingBucketName}"
591
591
Condition :
592
592
StringLike :
593
593
s3:prefix :
@@ -661,7 +661,7 @@ Resources:
661
661
- " logs.amazonaws.com.cn"
662
662
- " logs.amazonaws.com"
663
663
SourceAccount : !Ref "AWS::AccountId"
664
- SourceArn : !Sub "arn:aws :logs:${AWS::Region}:${AWS::AccountId}:log-group:*:*"
664
+ SourceArn : !Sub "arn:${AWS::Partition} :logs:${AWS::Region}:${AWS::AccountId}:log-group:*:*"
665
665
S3Permission :
666
666
Type : AWS::Lambda::Permission
667
667
Properties :
@@ -772,7 +772,7 @@ Resources:
772
772
Description : Copies Datadog Forwarder zip to the destination S3 bucket
773
773
Handler : index.handler
774
774
Runtime : python3.11
775
- Timeout : 300
775
+ Timeout : 600
776
776
Code :
777
777
ZipFile : |
778
778
import json
@@ -859,8 +859,8 @@ Resources:
859
859
Service :
860
860
- lambda.amazonaws.com
861
861
ManagedPolicyArns :
862
- - arn:aws: iam::aws:policy/service-role/AWSLambdaBasicExecutionRole
863
- - arn:aws: iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole
862
+ - !Sub " arn:${AWS::Partition}: iam::aws:policy/service-role/AWSLambdaBasicExecutionRole"
863
+ - !Sub " arn:${AWS::Partition}: iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole"
864
864
PermissionsBoundary : !If
865
865
- SetPermissionsBoundary
866
866
- !Ref PermissionsBoundaryArn
@@ -878,15 +878,15 @@ Resources:
878
878
- !If
879
879
- CreateS3Bucket
880
880
- !Sub " ${ForwarderBucket.Arn}/*"
881
- - !Sub " arn:aws :s3:::${DdForwarderExistingBucketName}/*"
881
+ - !Sub " arn:${AWS::Partition} :s3:::${DdForwarderExistingBucketName}/*"
882
882
- Effect : Allow
883
883
Action :
884
884
- s3:ListBucket
885
885
Resource :
886
886
- !If
887
887
- CreateS3Bucket
888
888
- !GetAtt " ForwarderBucket.Arn"
889
- - !Sub " arn:aws :s3:::${DdForwarderExistingBucketName}"
889
+ - !Sub " arn:${AWS::Partition} :s3:::${DdForwarderExistingBucketName}"
890
890
- !If
891
891
- SetS3SourceZip
892
892
- Effect : Allow
0 commit comments