Skip to content

Commit d42d450

Browse files
committed
fix:update integ test
1 parent 40134a8 commit d42d450

File tree

7 files changed

+35
-323
lines changed

7 files changed

+35
-323
lines changed

packages/@aws-cdk-testing/framework-integ/test/aws-rds/test/integ.option-group.js.snapshot/asset.a1acfc2b5f4f6b183fd2bb9863f486bc5edef6a357b355a070d9a0e502df418c/__entrypoint__.js

Lines changed: 0 additions & 155 deletions
This file was deleted.

packages/@aws-cdk-testing/framework-integ/test/aws-rds/test/integ.option-group.js.snapshot/asset.a1acfc2b5f4f6b183fd2bb9863f486bc5edef6a357b355a070d9a0e502df418c/index.js

Lines changed: 0 additions & 1 deletion
This file was deleted.

packages/@aws-cdk-testing/framework-integ/test/aws-rds/test/integ.option-group.js.snapshot/aws-rds-option-group.assets.json

Lines changed: 3 additions & 17 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

packages/@aws-cdk-testing/framework-integ/test/aws-rds/test/integ.option-group.js.snapshot/aws-rds-option-group.template.json

Lines changed: 0 additions & 116 deletions
Original file line numberDiff line numberDiff line change
@@ -391,122 +391,6 @@
391391
}
392392
}
393393
},
394-
"VPCRestrictDefaultSecurityGroupCustomResource59474679": {
395-
"Type": "Custom::VpcRestrictDefaultSG",
396-
"Properties": {
397-
"ServiceToken": {
398-
"Fn::GetAtt": [
399-
"CustomVpcRestrictDefaultSGCustomResourceProviderHandlerDC833E5E",
400-
"Arn"
401-
]
402-
},
403-
"DefaultSecurityGroupId": {
404-
"Fn::GetAtt": [
405-
"VPCB9E5F0B4",
406-
"DefaultSecurityGroup"
407-
]
408-
},
409-
"Account": {
410-
"Ref": "AWS::AccountId"
411-
}
412-
},
413-
"UpdateReplacePolicy": "Delete",
414-
"DeletionPolicy": "Delete"
415-
},
416-
"CustomVpcRestrictDefaultSGCustomResourceProviderRole26592FE0": {
417-
"Type": "AWS::IAM::Role",
418-
"Properties": {
419-
"AssumeRolePolicyDocument": {
420-
"Version": "2012-10-17",
421-
"Statement": [
422-
{
423-
"Action": "sts:AssumeRole",
424-
"Effect": "Allow",
425-
"Principal": {
426-
"Service": "lambda.amazonaws.com"
427-
}
428-
}
429-
]
430-
},
431-
"ManagedPolicyArns": [
432-
{
433-
"Fn::Sub": "arn:${AWS::Partition}:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole"
434-
}
435-
],
436-
"Policies": [
437-
{
438-
"PolicyName": "Inline",
439-
"PolicyDocument": {
440-
"Version": "2012-10-17",
441-
"Statement": [
442-
{
443-
"Effect": "Allow",
444-
"Action": [
445-
"ec2:AuthorizeSecurityGroupIngress",
446-
"ec2:AuthorizeSecurityGroupEgress",
447-
"ec2:RevokeSecurityGroupIngress",
448-
"ec2:RevokeSecurityGroupEgress"
449-
],
450-
"Resource": [
451-
{
452-
"Fn::Join": [
453-
"",
454-
[
455-
"arn:",
456-
{
457-
"Ref": "AWS::Partition"
458-
},
459-
":ec2:",
460-
{
461-
"Ref": "AWS::Region"
462-
},
463-
":",
464-
{
465-
"Ref": "AWS::AccountId"
466-
},
467-
":security-group/",
468-
{
469-
"Fn::GetAtt": [
470-
"VPCB9E5F0B4",
471-
"DefaultSecurityGroup"
472-
]
473-
}
474-
]
475-
]
476-
}
477-
]
478-
}
479-
]
480-
}
481-
}
482-
]
483-
}
484-
},
485-
"CustomVpcRestrictDefaultSGCustomResourceProviderHandlerDC833E5E": {
486-
"Type": "AWS::Lambda::Function",
487-
"Properties": {
488-
"Code": {
489-
"S3Bucket": {
490-
"Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
491-
},
492-
"S3Key": "a1acfc2b5f4f6b183fd2bb9863f486bc5edef6a357b355a070d9a0e502df418c.zip"
493-
},
494-
"Timeout": 900,
495-
"MemorySize": 128,
496-
"Handler": "__entrypoint__.handler",
497-
"Role": {
498-
"Fn::GetAtt": [
499-
"CustomVpcRestrictDefaultSGCustomResourceProviderRole26592FE0",
500-
"Arn"
501-
]
502-
},
503-
"Runtime": "nodejs22.x",
504-
"Description": "Lambda function for removing all inbound/outbound rules from the VPC default security group"
505-
},
506-
"DependsOn": [
507-
"CustomVpcRestrictDefaultSGCustomResourceProviderRole26592FE0"
508-
]
509-
},
510394
"OptionGroupSecurityGroupOEM7E39FD8C": {
511395
"Type": "AWS::EC2::SecurityGroup",
512396
"Properties": {

0 commit comments

Comments
 (0)