fix(cloudwatch-role): allow log group creation for firehose role #1603
pr-coverage-annotation.yml
on: pull_request
coverage-report
3m 37s
Annotations
2 errors and 1 warning
local-constructs/cloudwatch-to-s3/index.test.ts > CloudWatchToS3 > should create IAM roles with appropriate policies:
lib/local-constructs/cloudwatch-to-s3/index.test.ts#L44
AssertionError: expected [ PolicyStatement{ …(12) }, …(1) ] to deeply equal ArrayContaining{…}
- Expected
+ Received
- ArrayContaining [
- ObjectContaining {
- "actions": Array [
+ Array [
+ Object {
+ "Action": Array [
"s3:PutObject",
"s3:PutObjectAcl",
],
- "resources": Array [
- "${Token[TOKEN.29]}/*",
- ],
+ "Effect": "Allow",
+ "Resource": "${Token[TOKEN.29]}/*",
},
- ObjectContaining {
- "actions": Array [
+ Object {
+ "Action": Array [
"logs:PutLogEvents",
- ],
- "resources": Array [
- "arn:aws:logs:${Token[AWS.Region.8]}:${Token[AWS.AccountId.4]}:log-group:/aws/kinesisfirehose/*",
+ "logs:CreateLogGroup",
],
+ "Effect": "Allow",
+ "Resource": "arn:aws:logs:${Token[AWS.Region.8]}:${Token[AWS.AccountId.4]}:log-group:/aws/kinesisfirehose/*",
},
]
❯ local-constructs/cloudwatch-to-s3/index.test.ts:44:24
|
coverage-report
Process completed with exit code 1.
|
coverage-report
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
|