PR #3360 introduced an incorrect IAM policy for log groups

This commit is contained in:
Ryan S. Brown 2017-03-23 09:16:44 -04:00
parent 247132c979
commit b1fdf15398
2 changed files with 10 additions and 10 deletions

View File

@ -80,7 +80,7 @@ module.exports = {
.Statement[0]
.Resource
.push({ 'Fn::Sub': 'arn:aws:logs:${AWS::Region}:${AWS::AccountId}' +
`:log-group:${this.provider.naming.getLogGroupName(functionObject.name)}` });
`:log-group:${this.provider.naming.getLogGroupName(functionObject.name)}:*` });
this.serverless.service.provider.compiledCloudFormationTemplate
.Resources[this.provider.naming.getRoleLogicalId()]
@ -90,7 +90,7 @@ module.exports = {
.Statement[1]
.Resource
.push({ 'Fn::Sub': 'arn:aws:logs:${AWS::Region}:${AWS::AccountId}' +
`:log-group:${this.provider.naming.getLogGroupName(functionObject.name)}:*` });
`:log-group:${this.provider.naming.getLogGroupName(functionObject.name)}:*:*` });
});
if (this.serverless.service.provider.iamRoleStatements) {

View File

@ -96,7 +96,7 @@ describe('#mergeIamTemplates()', () => {
Resource: [
{
'Fn::Sub': 'arn:aws:logs:${AWS::Region}:${AWS::AccountId}:'
+ `log-group:/aws/lambda/${qualifiedFunction}`,
+ `log-group:/aws/lambda/${qualifiedFunction}:*`,
},
],
},
@ -108,7 +108,7 @@ describe('#mergeIamTemplates()', () => {
Resource: [
{
'Fn::Sub': 'arn:aws:logs:${AWS::Region}:${AWS::AccountId}:'
+ `log-group:/aws/lambda/${qualifiedFunction}:*`,
+ `log-group:/aws/lambda/${qualifiedFunction}:*:*`,
},
],
},
@ -292,7 +292,7 @@ describe('#mergeIamTemplates()', () => {
).to.deep.equal([
{
'Fn::Sub': 'arn:aws:logs:${AWS::Region}:${AWS::AccountId}:'
+ `log-group:/aws/lambda/${qualifiedFunction}`,
+ `log-group:/aws/lambda/${qualifiedFunction}:*`,
},
]);
expect(awsDeploy.serverless.service.provider.compiledCloudFormationTemplate
@ -305,7 +305,7 @@ describe('#mergeIamTemplates()', () => {
).to.deep.equal([
{
'Fn::Sub': 'arn:aws:logs:${AWS::Region}:${AWS::AccountId}:'
+ `log-group:/aws/lambda/${qualifiedFunction}:*`,
+ `log-group:/aws/lambda/${qualifiedFunction}:*:*`,
},
]);
});
@ -333,9 +333,9 @@ describe('#mergeIamTemplates()', () => {
).to.deep.equal(
[
{ 'Fn::Sub': 'arn:aws:logs:${AWS::Region}:${AWS::AccountId}:'
+ 'log-group:/aws/lambda/func0' },
+ 'log-group:/aws/lambda/func0:*' },
{ 'Fn::Sub': 'arn:aws:logs:${AWS::Region}:${AWS::AccountId}:'
+ 'log-group:/aws/lambda/func1' },
+ 'log-group:/aws/lambda/func1:*' },
]
);
expect(awsDeploy.serverless.service.provider.compiledCloudFormationTemplate
@ -348,9 +348,9 @@ describe('#mergeIamTemplates()', () => {
).to.deep.equal(
[
{ 'Fn::Sub': 'arn:aws:logs:${AWS::Region}:${AWS::AccountId}:'
+ 'log-group:/aws/lambda/func0:*' },
+ 'log-group:/aws/lambda/func0:*:*' },
{ 'Fn::Sub': 'arn:aws:logs:${AWS::Region}:${AWS::AccountId}:'
+ 'log-group:/aws/lambda/func1:*' },
+ 'log-group:/aws/lambda/func1:*:*' },
]
);
});