Skip to content

fix(cloudwatch-role): allow log group creation for firehose role #1603

fix(cloudwatch-role): allow log group creation for firehose role

fix(cloudwatch-role): allow log group creation for firehose role #1603

Triggered via pull request January 22, 2025 22:26
Status Failure
Total duration 3m 47s
Artifacts

pr-coverage-annotation.yml

on: pull_request
coverage-report
3m 37s
coverage-report
Fit to window
Zoom out
Zoom in

Annotations

2 errors and 1 warning
local-constructs/cloudwatch-to-s3/index.test.ts > CloudWatchToS3 > should create IAM roles with appropriate policies: lib/local-constructs/cloudwatch-to-s3/index.test.ts#L44
AssertionError: expected [ PolicyStatement{ …(12) }, …(1) ] to deeply equal ArrayContaining{…} - Expected + Received - ArrayContaining [ - ObjectContaining { - "actions": Array [ + Array [ + Object { + "Action": Array [ "s3:PutObject", "s3:PutObjectAcl", ], - "resources": Array [ - "${Token[TOKEN.29]}/*", - ], + "Effect": "Allow", + "Resource": "${Token[TOKEN.29]}/*", }, - ObjectContaining { - "actions": Array [ + Object { + "Action": Array [ "logs:PutLogEvents", - ], - "resources": Array [ - "arn:aws:logs:${Token[AWS.Region.8]}:${Token[AWS.AccountId.4]}:log-group:/aws/kinesisfirehose/*", + "logs:CreateLogGroup", ], + "Effect": "Allow", + "Resource": "arn:aws:logs:${Token[AWS.Region.8]}:${Token[AWS.AccountId.4]}:log-group:/aws/kinesisfirehose/*", }, ] ❯ local-constructs/cloudwatch-to-s3/index.test.ts:44:24
coverage-report
Process completed with exit code 1.
coverage-report
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636