Skip to content

Commit 2d5d7a0

Browse files
keetonianjlhood
authored andcommitted
fix: update policy used for xray tracing (#1405)
1 parent 4bed4ff commit 2d5d7a0

File tree

7 files changed

+13
-13
lines changed

7 files changed

+13
-13
lines changed

samtranslator/model/sam_resources.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -427,7 +427,7 @@ def _construct_role(self, managed_policy_map, event_invoke_policies):
427427

428428
managed_policy_arns = [ArnGenerator.generate_aws_managed_policy_arn("service-role/AWSLambdaBasicExecutionRole")]
429429
if self.Tracing:
430-
managed_policy_arns.append(ArnGenerator.generate_aws_managed_policy_arn("AWSXrayWriteOnlyAccess"))
430+
managed_policy_arns.append(ArnGenerator.generate_aws_managed_policy_arn("AWSXRayDaemonWriteAccess"))
431431
if self.VpcConfig:
432432
managed_policy_arns.append(
433433
ArnGenerator.generate_aws_managed_policy_arn("service-role/AWSLambdaVPCAccessExecutionRole")

tests/translator/output/aws-cn/basic_function.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -303,7 +303,7 @@
303303
"Properties": {
304304
"ManagedPolicyArns": [
305305
"arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole",
306-
"arn:aws-cn:iam::aws:policy/AWSXrayWriteOnlyAccess"
306+
"arn:aws-cn:iam::aws:policy/AWSXRayDaemonWriteAccess"
307307
],
308308
"Tags": [
309309
{
@@ -334,7 +334,7 @@
334334
"Properties": {
335335
"ManagedPolicyArns": [
336336
"arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole",
337-
"arn:aws-cn:iam::aws:policy/AWSXrayWriteOnlyAccess"
337+
"arn:aws-cn:iam::aws:policy/AWSXRayDaemonWriteAccess"
338338
],
339339
"Tags": [
340340
{

tests/translator/output/aws-cn/globals_for_function.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
"Properties": {
66
"ManagedPolicyArns": [
77
"arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole",
8-
"arn:aws-cn:iam::aws:policy/AWSXrayWriteOnlyAccess",
8+
"arn:aws-cn:iam::aws:policy/AWSXRayDaemonWriteAccess",
99
"arn:aws-cn:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole"
1010
],
1111
"Tags": [
@@ -107,7 +107,7 @@
107107
"Properties": {
108108
"ManagedPolicyArns": [
109109
"arn:aws-cn:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole",
110-
"arn:aws-cn:iam::aws:policy/AWSXrayWriteOnlyAccess",
110+
"arn:aws-cn:iam::aws:policy/AWSXRayDaemonWriteAccess",
111111
"arn:aws-cn:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole"
112112
],
113113
"Tags": [

tests/translator/output/aws-us-gov/basic_function.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -303,7 +303,7 @@
303303
"Properties": {
304304
"ManagedPolicyArns": [
305305
"arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole",
306-
"arn:aws-us-gov:iam::aws:policy/AWSXrayWriteOnlyAccess"
306+
"arn:aws-us-gov:iam::aws:policy/AWSXRayDaemonWriteAccess"
307307
],
308308
"Tags": [
309309
{
@@ -334,7 +334,7 @@
334334
"Properties": {
335335
"ManagedPolicyArns": [
336336
"arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole",
337-
"arn:aws-us-gov:iam::aws:policy/AWSXrayWriteOnlyAccess"
337+
"arn:aws-us-gov:iam::aws:policy/AWSXRayDaemonWriteAccess"
338338
],
339339
"Tags": [
340340
{

tests/translator/output/aws-us-gov/globals_for_function.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
"Properties": {
66
"ManagedPolicyArns": [
77
"arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole",
8-
"arn:aws-us-gov:iam::aws:policy/AWSXrayWriteOnlyAccess",
8+
"arn:aws-us-gov:iam::aws:policy/AWSXRayDaemonWriteAccess",
99
"arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole"
1010
],
1111
"PermissionsBoundary": "arn:aws:1234:iam:boundary/OverridePermissionsBoundary",
@@ -107,7 +107,7 @@
107107
"Properties": {
108108
"ManagedPolicyArns": [
109109
"arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole",
110-
"arn:aws-us-gov:iam::aws:policy/AWSXrayWriteOnlyAccess",
110+
"arn:aws-us-gov:iam::aws:policy/AWSXRayDaemonWriteAccess",
111111
"arn:aws-us-gov:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole"
112112
],
113113
"PermissionsBoundary": "arn:aws:1234:iam:boundary/CustomerCreatedPermissionsBoundary",

tests/translator/output/basic_function.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -303,7 +303,7 @@
303303
"Properties": {
304304
"ManagedPolicyArns": [
305305
"arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole",
306-
"arn:aws:iam::aws:policy/AWSXrayWriteOnlyAccess"
306+
"arn:aws:iam::aws:policy/AWSXRayDaemonWriteAccess"
307307
],
308308
"Tags": [
309309
{
@@ -334,7 +334,7 @@
334334
"Properties": {
335335
"ManagedPolicyArns": [
336336
"arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole",
337-
"arn:aws:iam::aws:policy/AWSXrayWriteOnlyAccess"
337+
"arn:aws:iam::aws:policy/AWSXRayDaemonWriteAccess"
338338
],
339339
"Tags": [
340340
{

tests/translator/output/globals_for_function.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
"Properties": {
66
"ManagedPolicyArns": [
77
"arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole",
8-
"arn:aws:iam::aws:policy/AWSXrayWriteOnlyAccess",
8+
"arn:aws:iam::aws:policy/AWSXRayDaemonWriteAccess",
99
"arn:aws:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole"
1010
],
1111
"PermissionsBoundary": "arn:aws:1234:iam:boundary/OverridePermissionsBoundary",
@@ -107,7 +107,7 @@
107107
"Properties": {
108108
"ManagedPolicyArns": [
109109
"arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole",
110-
"arn:aws:iam::aws:policy/AWSXrayWriteOnlyAccess",
110+
"arn:aws:iam::aws:policy/AWSXRayDaemonWriteAccess",
111111
"arn:aws:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole"
112112
],
113113
"PermissionsBoundary": "arn:aws:1234:iam:boundary/CustomerCreatedPermissionsBoundary",

0 commit comments

Comments
 (0)