fix(cloudwatch-role): allow log group creation for firehose role #9356
Annotations
2 errors and 1 warning
local-constructs/cloudwatch-to-s3/index.test.ts > CloudWatchToS3 > should create IAM roles with appropriate policies:
lib/local-constructs/cloudwatch-to-s3/index.test.ts#L44
AssertionError: expected [ PolicyStatement{ …(12) }, …(1) ] to deeply equal ArrayContaining{…}
- Expected
+ Received
- ArrayContaining [
- ObjectContaining {
- "actions": Array [
+ Array [
+ Object {
+ "Action": Array [
"s3:PutObject",
"s3:PutObjectAcl",
],
- "resources": Array [
- "${Token[TOKEN.28]}/*",
- ],
+ "Effect": "Allow",
+ "Resource": "${Token[TOKEN.28]}/*",
},
- ObjectContaining {
- "actions": Array [
+ Object {
+ "Action": Array [
"logs:PutLogEvents",
- ],
- "resources": Array [
- "arn:aws:logs:${Token[AWS.Region.7]}:${Token[AWS.AccountId.3]}:log-group:/aws/kinesisfirehose/*",
+ "logs:CreateLogGroup",
],
+ "Effect": "Allow",
+ "Resource": "arn:aws:logs:${Token[AWS.Region.7]}:${Token[AWS.AccountId.3]}:log-group:/aws/kinesisfirehose/*",
},
]
❯ local-constructs/cloudwatch-to-s3/index.test.ts:44:24
|
test
Process completed with exit code 1.
|
e2e
No files were found with the provided path: test/e2e/playwright-report/index.html. No artifacts will be uploaded.
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
aws-resources-fix-cloudwatch-log-group
|
11.4 KB |
|