Skip to content

Commit 6b84e80

Browse files
committed
chore: update integration test snapshots
1 parent 1cd545c commit 6b84e80

File tree

4 files changed

+481
-103
lines changed

4 files changed

+481
-103
lines changed

packages/@aws-cdk/aws-eks-v2-alpha/test/integ.eks-subnet-updates.js.snapshot/aws-cdk-eks-cluster-stack.assets.json

Lines changed: 2 additions & 2 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

packages/@aws-cdk/aws-eks-v2-alpha/test/integ.eks-subnet-updates.js.snapshot/aws-cdk-eks-cluster-stack.template.json

Lines changed: 5 additions & 79 deletions
Original file line numberDiff line numberDiff line change
@@ -805,27 +805,9 @@
805805
":iam::aws:policy/service-role/AWSLambdaBasicExecutionRole"
806806
]
807807
]
808-
},
809-
{
810-
"Fn::Join": [
811-
"",
812-
[
813-
"arn:",
814-
{
815-
"Ref": "AWS::Partition"
816-
},
817-
":iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole"
818-
]
819-
]
820808
}
821809
]
822-
},
823-
"DependsOn": [
824-
"VpcPrivateSubnet1DefaultRouteBE02A9ED",
825-
"VpcPrivateSubnet1RouteTableAssociation70C59FA6",
826-
"VpcPrivateSubnet2DefaultRoute060D2087",
827-
"VpcPrivateSubnet2RouteTableAssociationA89CAD56"
828-
]
810+
}
829811
},
830812
"ClusterKubectlProviderframeworkonEventServiceRoleDefaultPolicyA4F24629": {
831813
"Type": "AWS::IAM::Policy",
@@ -867,35 +849,7 @@
867849
"Ref": "ClusterKubectlProviderframeworkonEventServiceRoleFD0BA8C5"
868850
}
869851
]
870-
},
871-
"DependsOn": [
872-
"VpcPrivateSubnet1DefaultRouteBE02A9ED",
873-
"VpcPrivateSubnet1RouteTableAssociation70C59FA6",
874-
"VpcPrivateSubnet2DefaultRoute060D2087",
875-
"VpcPrivateSubnet2RouteTableAssociationA89CAD56"
876-
]
877-
},
878-
"ClusterKubectlProviderframeworkonEventSecurityGroupE2538617": {
879-
"Type": "AWS::EC2::SecurityGroup",
880-
"Properties": {
881-
"GroupDescription": "Automatic security group for Lambda Function awscdkeksclusterstackClusterKubectlProviderframeworkonEventC550C962",
882-
"SecurityGroupEgress": [
883-
{
884-
"CidrIp": "0.0.0.0/0",
885-
"Description": "Allow all outbound traffic by default",
886-
"IpProtocol": "-1"
887-
}
888-
],
889-
"VpcId": {
890-
"Ref": "Vpc8378EB38"
891-
}
892-
},
893-
"DependsOn": [
894-
"VpcPrivateSubnet1DefaultRouteBE02A9ED",
895-
"VpcPrivateSubnet1RouteTableAssociation70C59FA6",
896-
"VpcPrivateSubnet2DefaultRoute060D2087",
897-
"VpcPrivateSubnet2RouteTableAssociationA89CAD56"
898-
]
852+
}
899853
},
900854
"ClusterKubectlProviderframeworkonEvent68E0CF80": {
901855
"Type": "AWS::Lambda::Function",
@@ -933,33 +887,11 @@
933887
"value"
934888
]
935889
},
936-
"Timeout": 900,
937-
"VpcConfig": {
938-
"SecurityGroupIds": [
939-
{
940-
"Fn::GetAtt": [
941-
"ClusterKubectlProviderframeworkonEventSecurityGroupE2538617",
942-
"GroupId"
943-
]
944-
}
945-
],
946-
"SubnetIds": [
947-
{
948-
"Ref": "VpcPrivateSubnet1Subnet536B997A"
949-
},
950-
{
951-
"Ref": "VpcPrivateSubnet2Subnet3788AAA1"
952-
}
953-
]
954-
}
890+
"Timeout": 900
955891
},
956892
"DependsOn": [
957893
"ClusterKubectlProviderframeworkonEventServiceRoleDefaultPolicyA4F24629",
958-
"ClusterKubectlProviderframeworkonEventServiceRoleFD0BA8C5",
959-
"VpcPrivateSubnet1DefaultRouteBE02A9ED",
960-
"VpcPrivateSubnet1RouteTableAssociation70C59FA6",
961-
"VpcPrivateSubnet2DefaultRoute060D2087",
962-
"VpcPrivateSubnet2RouteTableAssociationA89CAD56"
894+
"ClusterKubectlProviderframeworkonEventServiceRoleFD0BA8C5"
963895
]
964896
},
965897
"ClusterKubectlProviderframeworkonEventinlinePolicyAddedToExecutionRole081AD342A": {
@@ -986,13 +918,7 @@
986918
"Ref": "ClusterKubectlProviderframeworkonEventServiceRoleFD0BA8C5"
987919
}
988920
]
989-
},
990-
"DependsOn": [
991-
"VpcPrivateSubnet1DefaultRouteBE02A9ED",
992-
"VpcPrivateSubnet1RouteTableAssociation70C59FA6",
993-
"VpcPrivateSubnet2DefaultRoute060D2087",
994-
"VpcPrivateSubnet2RouteTableAssociationA89CAD56"
995-
]
921+
}
996922
},
997923
"ClusterClusterAdminRoleAccessF2BFF759": {
998924
"Type": "AWS::EKS::AccessEntry",

0 commit comments

Comments
 (0)