Skip to content

Commit 3c29abc

Browse files
Replace deprecated AWS managed policy for codedeploy (#116)
After March 1, 2021, the AWS managed policies AWSLambdaReadOnlyAccess and AWSLambdaFullAccess will be deprecated and can no longer be attached to new IAM users. AWS Lambda has introduced a new AWS managed policy. The AWSLambda_FullAccess policy grants full access to Lambda, Lambda console features, and other related AWS services. This policy was created by scoping down the previous policy AWSLambdaFullAccess. fixes #115
1 parent 3ee442a commit 3c29abc

13 files changed

+16
-16
lines changed

fixtures/1.output.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -515,7 +515,7 @@
515515
"Properties": {
516516
"ManagedPolicyArns": [
517517
"arn:aws:iam::aws:policy/service-role/AWSCodeDeployRoleForLambdaLimited",
518-
"arn:aws:iam::aws:policy/AWSLambdaFullAccess"
518+
"arn:aws:iam::aws:policy/AWSLambda_FullAccess"
519519
],
520520
"AssumeRolePolicyDocument": {
521521
"Version": "2012-10-17",

fixtures/10.output.v2-websocket.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -829,7 +829,7 @@
829829
"Properties": {
830830
"ManagedPolicyArns": [
831831
"arn:aws:iam::aws:policy/service-role/AWSCodeDeployRoleForLambdaLimited",
832-
"arn:aws:iam::aws:policy/AWSLambdaFullAccess"
832+
"arn:aws:iam::aws:policy/AWSLambda_FullAccess"
833833
],
834834
"AssumeRolePolicyDocument": {
835835
"Version": "2012-10-17",

fixtures/11.output.v2-websocket-authorizer.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -926,7 +926,7 @@
926926
"Properties": {
927927
"ManagedPolicyArns": [
928928
"arn:aws:iam::aws:policy/service-role/AWSCodeDeployRoleForLambdaLimited",
929-
"arn:aws:iam::aws:policy/AWSLambdaFullAccess"
929+
"arn:aws:iam::aws:policy/AWSLambda_FullAccess"
930930
],
931931
"AssumeRolePolicyDocument": {
932932
"Version": "2012-10-17",

fixtures/12.output-with-permissions-boundary.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -504,7 +504,7 @@
504504
"Properties": {
505505
"ManagedPolicyArns": [
506506
"arn:aws:iam::aws:policy/service-role/AWSCodeDeployRoleForLambdaLimited",
507-
"arn:aws:iam::aws:policy/AWSLambdaFullAccess"
507+
"arn:aws:iam::aws:policy/AWSLambda_FullAccess"
508508
],
509509
"AssumeRolePolicyDocument": {
510510
"Version": "2012-10-17",

fixtures/13.output.multiple-function-hooks.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -290,7 +290,7 @@
290290
"Properties": {
291291
"ManagedPolicyArns": [
292292
"arn:aws:iam::aws:policy/service-role/AWSCodeDeployRoleForLambdaLimited",
293-
"arn:aws:iam::aws:policy/AWSLambdaFullAccess"
293+
"arn:aws:iam::aws:policy/AWSLambda_FullAccess"
294294
],
295295
"AssumeRolePolicyDocument": {
296296
"Version": "2012-10-17",

fixtures/2.output.without-hooks.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -371,7 +371,7 @@
371371
"Properties": {
372372
"ManagedPolicyArns": [
373373
"arn:aws:iam::aws:policy/service-role/AWSCodeDeployRoleForLambdaLimited",
374-
"arn:aws:iam::aws:policy/AWSLambdaFullAccess"
374+
"arn:aws:iam::aws:policy/AWSLambda_FullAccess"
375375
],
376376
"AssumeRolePolicyDocument": {
377377
"Version": "2012-10-17",

fixtures/5.output.with-trigger.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -515,7 +515,7 @@
515515
"Properties": {
516516
"ManagedPolicyArns": [
517517
"arn:aws:iam::aws:policy/service-role/AWSCodeDeployRoleForLambdaLimited",
518-
"arn:aws:iam::aws:policy/AWSLambdaFullAccess",
518+
"arn:aws:iam::aws:policy/AWSLambda_FullAccess",
519519
"arn:aws:iam::aws:policy/AmazonSNSFullAccess"
520520
],
521521
"AssumeRolePolicyDocument": {

fixtures/6.output.cloudwatch-events-trigger.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -314,7 +314,7 @@
314314
"Properties": {
315315
"ManagedPolicyArns": [
316316
"arn:aws:iam::aws:policy/service-role/AWSCodeDeployRoleForLambdaLimited",
317-
"arn:aws:iam::aws:policy/AWSLambdaFullAccess"
317+
"arn:aws:iam::aws:policy/AWSLambda_FullAccess"
318318
],
319319
"AssumeRolePolicyDocument": {
320320
"Version": "2012-10-17",

fixtures/7.output.cloudwatch-logs-trigger.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -307,7 +307,7 @@
307307
"Properties": {
308308
"ManagedPolicyArns": [
309309
"arn:aws:iam::aws:policy/service-role/AWSCodeDeployRoleForLambdaLimited",
310-
"arn:aws:iam::aws:policy/AWSLambdaFullAccess"
310+
"arn:aws:iam::aws:policy/AWSLambda_FullAccess"
311311
],
312312
"AssumeRolePolicyDocument": {
313313
"Version": "2012-10-17",

fixtures/8.output.sns-subscriptions-trigger.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -244,7 +244,7 @@
244244
"Properties": {
245245
"ManagedPolicyArns": [
246246
"arn:aws:iam::aws:policy/service-role/AWSCodeDeployRoleForLambdaLimited",
247-
"arn:aws:iam::aws:policy/AWSLambdaFullAccess"
247+
"arn:aws:iam::aws:policy/AWSLambda_FullAccess"
248248
],
249249
"AssumeRolePolicyDocument": {
250250
"Version": "2012-10-17",

0 commit comments

Comments
 (0)