Skip to content

Commit 6edc85b

Browse files
committed
chore: update integration test snapshots
1 parent f26ba1c commit 6edc85b

File tree

14 files changed

+507
-123
lines changed

14 files changed

+507
-123
lines changed
Lines changed: 8 additions & 2 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

packages/@aws-cdk/aws-eks-v2-alpha/test/integ.eks-subnet-updates.js.snapshot/asset.8a84a8f465fbe0c48af2c256847ec9abfe095d23781b749728b998315f3ad732.zip

Lines changed: 0 additions & 3 deletions
This file was deleted.

packages/@aws-cdk/aws-eks-v2-alpha/test/integ.eks-subnet-updates.js.snapshot/asset.c49d356cac773d491c5f7ac148995a1181498a8e289429f8612a7f7e3814f535.zip

Lines changed: 3 additions & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

packages/@aws-cdk/aws-eks-v2-alpha/test/integ.eks-subnet-updates.js.snapshot/aws-cdk-eks-cluster-stack.assets.json

Lines changed: 9 additions & 9 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

packages/@aws-cdk/aws-eks-v2-alpha/test/integ.eks-subnet-updates.js.snapshot/aws-cdk-eks-cluster-stack.template.json

Lines changed: 7 additions & 81 deletions
Original file line numberDiff line numberDiff line change
@@ -734,7 +734,7 @@
734734
"S3Bucket": {
735735
"Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
736736
},
737-
"S3Key": "7633376387df35dc59230d4039be5a7b77bfbcb6d38fa9a2c6e53ed61ab00cf0.zip"
737+
"S3Key": "872f17c2bcde7a48a7d2a0dfc5e58a15d25a49c136492a93249a39ce93062069.zip"
738738
},
739739
"Description": "onEvent handler for EKS kubectl resource provider",
740740
"Environment": {
@@ -773,7 +773,7 @@
773773
"S3Bucket": {
774774
"Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
775775
},
776-
"S3Key": "8a84a8f465fbe0c48af2c256847ec9abfe095d23781b749728b998315f3ad732.zip"
776+
"S3Key": "c49d356cac773d491c5f7ac148995a1181498a8e289429f8612a7f7e3814f535.zip"
777777
},
778778
"Description": "/opt/awscli/aws"
779779
}
@@ -805,27 +805,9 @@
805805
":iam::aws:policy/service-role/AWSLambdaBasicExecutionRole"
806806
]
807807
]
808-
},
809-
{
810-
"Fn::Join": [
811-
"",
812-
[
813-
"arn:",
814-
{
815-
"Ref": "AWS::Partition"
816-
},
817-
":iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole"
818-
]
819-
]
820808
}
821809
]
822-
},
823-
"DependsOn": [
824-
"VpcPrivateSubnet1DefaultRouteBE02A9ED",
825-
"VpcPrivateSubnet1RouteTableAssociation70C59FA6",
826-
"VpcPrivateSubnet2DefaultRoute060D2087",
827-
"VpcPrivateSubnet2RouteTableAssociationA89CAD56"
828-
]
810+
}
829811
},
830812
"ClusterKubectlProviderframeworkonEventServiceRoleDefaultPolicyA4F24629": {
831813
"Type": "AWS::IAM::Policy",
@@ -867,35 +849,7 @@
867849
"Ref": "ClusterKubectlProviderframeworkonEventServiceRoleFD0BA8C5"
868850
}
869851
]
870-
},
871-
"DependsOn": [
872-
"VpcPrivateSubnet1DefaultRouteBE02A9ED",
873-
"VpcPrivateSubnet1RouteTableAssociation70C59FA6",
874-
"VpcPrivateSubnet2DefaultRoute060D2087",
875-
"VpcPrivateSubnet2RouteTableAssociationA89CAD56"
876-
]
877-
},
878-
"ClusterKubectlProviderframeworkonEventSecurityGroupE2538617": {
879-
"Type": "AWS::EC2::SecurityGroup",
880-
"Properties": {
881-
"GroupDescription": "Automatic security group for Lambda Function awscdkeksclusterstackClusterKubectlProviderframeworkonEventC550C962",
882-
"SecurityGroupEgress": [
883-
{
884-
"CidrIp": "0.0.0.0/0",
885-
"Description": "Allow all outbound traffic by default",
886-
"IpProtocol": "-1"
887-
}
888-
],
889-
"VpcId": {
890-
"Ref": "Vpc8378EB38"
891-
}
892-
},
893-
"DependsOn": [
894-
"VpcPrivateSubnet1DefaultRouteBE02A9ED",
895-
"VpcPrivateSubnet1RouteTableAssociation70C59FA6",
896-
"VpcPrivateSubnet2DefaultRoute060D2087",
897-
"VpcPrivateSubnet2RouteTableAssociationA89CAD56"
898-
]
852+
}
899853
},
900854
"ClusterKubectlProviderframeworkonEvent68E0CF80": {
901855
"Type": "AWS::Lambda::Function",
@@ -933,33 +887,11 @@
933887
"value"
934888
]
935889
},
936-
"Timeout": 900,
937-
"VpcConfig": {
938-
"SecurityGroupIds": [
939-
{
940-
"Fn::GetAtt": [
941-
"ClusterKubectlProviderframeworkonEventSecurityGroupE2538617",
942-
"GroupId"
943-
]
944-
}
945-
],
946-
"SubnetIds": [
947-
{
948-
"Ref": "VpcPrivateSubnet1Subnet536B997A"
949-
},
950-
{
951-
"Ref": "VpcPrivateSubnet2Subnet3788AAA1"
952-
}
953-
]
954-
}
890+
"Timeout": 900
955891
},
956892
"DependsOn": [
957893
"ClusterKubectlProviderframeworkonEventServiceRoleDefaultPolicyA4F24629",
958-
"ClusterKubectlProviderframeworkonEventServiceRoleFD0BA8C5",
959-
"VpcPrivateSubnet1DefaultRouteBE02A9ED",
960-
"VpcPrivateSubnet1RouteTableAssociation70C59FA6",
961-
"VpcPrivateSubnet2DefaultRoute060D2087",
962-
"VpcPrivateSubnet2RouteTableAssociationA89CAD56"
894+
"ClusterKubectlProviderframeworkonEventServiceRoleFD0BA8C5"
963895
]
964896
},
965897
"ClusterKubectlProviderframeworkonEventinlinePolicyAddedToExecutionRole081AD342A": {
@@ -986,13 +918,7 @@
986918
"Ref": "ClusterKubectlProviderframeworkonEventServiceRoleFD0BA8C5"
987919
}
988920
]
989-
},
990-
"DependsOn": [
991-
"VpcPrivateSubnet1DefaultRouteBE02A9ED",
992-
"VpcPrivateSubnet1RouteTableAssociation70C59FA6",
993-
"VpcPrivateSubnet2DefaultRoute060D2087",
994-
"VpcPrivateSubnet2RouteTableAssociationA89CAD56"
995-
]
921+
}
996922
},
997923
"ClusterClusterAdminRoleAccessF2BFF759": {
998924
"Type": "AWS::EKS::AccessEntry",

packages/@aws-cdk/aws-eks-v2-alpha/test/integ.eks-subnet-updates.js.snapshot/awscdkeksclusterDefaultTestDeployAssertFBF4B356.assets.json

Lines changed: 1 addition & 1 deletion
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

0 commit comments

Comments
 (0)