diff --git a/examples/2016-10-31/policy_templates/all_policy_templates.yaml b/examples/2016-10-31/policy_templates/all_policy_templates.yaml index ced335d421..e7875577b8 100644 --- a/examples/2016-10-31/policy_templates/all_policy_templates.yaml +++ b/examples/2016-10-31/policy_templates/all_policy_templates.yaml @@ -107,3 +107,6 @@ Resources: - TextractDetectAnalyzePolicy: {} - TextractGetResultPolicy: {} + + - EventBridgePutEventsPolicy: + EventBusName: name diff --git a/samtranslator/policy_templates_data/policy_templates.json b/samtranslator/policy_templates_data/policy_templates.json index 95e9f66a11..4b21e3063f 100644 --- a/samtranslator/policy_templates_data/policy_templates.json +++ b/samtranslator/policy_templates_data/policy_templates.json @@ -1904,6 +1904,32 @@ } ] } + }, + "EventBridgePutEventsPolicy": { + "Description": "Gives permissions to send events to EventBridge", + "Parameters": { + "EventBusName": { + "Description": "Name of the EventBridge EventBus" + } + }, + "Definition": { + "Statement": [ + { + "Effect": "Allow", + "Action": "events:PutEvents", + "Resource": { + "Fn::Sub": [ + "arn:${AWS::Partition}:events:${AWS::Region}:${AWS::AccountId}:event-bus/${eventBusName}", + { + "eventBusName": { + "Ref": "EventBusName" + } + } + ] + } + } + ] + } } } } diff --git a/tests/translator/input/all_policy_templates.yaml b/tests/translator/input/all_policy_templates.yaml index cab96b6b93..9038a3048a 100644 --- a/tests/translator/input/all_policy_templates.yaml +++ b/tests/translator/input/all_policy_templates.yaml @@ -159,3 +159,6 @@ Resources: - AthenaQueryPolicy: WorkGroupName: name + + - EventBridgePutEventsPolicy: + EventBusName: name diff --git a/tests/translator/output/all_policy_templates.json b/tests/translator/output/all_policy_templates.json index 7ec44c72df..7c6a7d2a7c 100644 --- a/tests/translator/output/all_policy_templates.json +++ b/tests/translator/output/all_policy_templates.json @@ -1485,6 +1485,25 @@ } ] } + }, + { + "PolicyName": "KitchenSinkFunctionRolePolicy55", + "PolicyDocument": { + "Statement": [ + { + "Action": "events:PutEvents", + "Resource": { + "Fn::Sub": [ + "arn:${AWS::Partition}:events:${AWS::Region}:${AWS::AccountId}:event-bus/${eventBusName}", + { + "eventBusName": "name" + } + ] + }, + "Effect": "Allow" + } + ] + } } ], "Tags": [ diff --git a/tests/translator/output/aws-cn/all_policy_templates.json b/tests/translator/output/aws-cn/all_policy_templates.json index 07e1b6785c..f682ecd81d 100644 --- a/tests/translator/output/aws-cn/all_policy_templates.json +++ b/tests/translator/output/aws-cn/all_policy_templates.json @@ -1485,6 +1485,25 @@ } ] } + }, + { + "PolicyName": "KitchenSinkFunctionRolePolicy55", + "PolicyDocument": { + "Statement": [ + { + "Action": "events:PutEvents", + "Resource": { + "Fn::Sub": [ + "arn:${AWS::Partition}:events:${AWS::Region}:${AWS::AccountId}:event-bus/${eventBusName}", + { + "eventBusName": "name" + } + ] + }, + "Effect": "Allow" + } + ] + } } ], "Tags": [ diff --git a/tests/translator/output/aws-us-gov/all_policy_templates.json b/tests/translator/output/aws-us-gov/all_policy_templates.json index 105c4a3732..77a7d97d22 100644 --- a/tests/translator/output/aws-us-gov/all_policy_templates.json +++ b/tests/translator/output/aws-us-gov/all_policy_templates.json @@ -1485,6 +1485,25 @@ } ] } + }, + { + "PolicyName": "KitchenSinkFunctionRolePolicy55", + "PolicyDocument": { + "Statement": [ + { + "Action": "events:PutEvents", + "Resource": { + "Fn::Sub": [ + "arn:${AWS::Partition}:events:${AWS::Region}:${AWS::AccountId}:event-bus/${eventBusName}", + { + "eventBusName": "name" + } + ] + }, + "Effect": "Allow" + } + ] + } } ], "Tags": [