Skip to content

Commit

Permalink
chore: revert unintended snapshot changes due to feature flags (#33616)
Browse files Browse the repository at this point in the history
### Reason for this change

#33291

This PR incorrectly updates integration test snapshots without introducing new feature flags. This is causing some issues with local integration test because in local, we expect new feature flag to be default off while in CI, it's expected to be default to true.

### Description of changes

Revert back snapshot changes

### Describe any new or updated permissions being added

N/A

### Description of how you validated changes

Tests pass

### Checklist
- [ ] My code adheres to the [CONTRIBUTING GUIDE](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md) and [DESIGN GUIDELINES](https://github.com/aws/aws-cdk/blob/main/docs/DESIGN_GUIDELINES.md)

----

*By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
  • Loading branch information
GavinZZ authored Feb 28, 2025
1 parent bb4c4d2 commit 8679b89
Show file tree
Hide file tree
Showing 540 changed files with 111,337 additions and 93,650 deletions.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Original file line number Diff line number Diff line change
Expand Up @@ -1030,6 +1030,54 @@
"Vpc1IsolatedSubnet2RouteTableAssociation6394B926"
]
},
"TestFunction0ServiceRoleDefaultPolicy02794024": {
"Type": "AWS::IAM::Policy",
"Properties": {
"PolicyDocument": {
"Statement": [
{
"Action": "execute-api:Invoke",
"Effect": "Allow",
"Resource": {
"Fn::Join": [
"",
[
"arn:",
{
"Ref": "AWS::Partition"
},
":execute-api:",
{
"Ref": "AWS::Region"
},
":",
{
"Ref": "AWS::AccountId"
},
":",
{
"Ref": "ApiF70053CD"
},
"/*/*/*"
]
]
}
}
],
"Version": "2012-10-17"
},
"PolicyName": "TestFunction0ServiceRoleDefaultPolicy02794024",
"Roles": [
{
"Ref": "TestFunction0ServiceRoleD0765191"
}
]
},
"DependsOn": [
"Vpc1IsolatedSubnet1RouteTableAssociation5CB6A296",
"Vpc1IsolatedSubnet2RouteTableAssociation6394B926"
]
},
"TestFunction0SecurityGroup749DC118": {
"Type": "AWS::EC2::SecurityGroup",
"Properties": {
Expand Down Expand Up @@ -1112,59 +1160,12 @@
}
},
"DependsOn": [
"TestFunction0ServiceRoleDefaultPolicy02794024",
"TestFunction0ServiceRoleD0765191",
"Vpc1IsolatedSubnet1RouteTableAssociation5CB6A296",
"Vpc1IsolatedSubnet2RouteTableAssociation6394B926"
]
},
"TestFunction0inlinePolicyAddedToExecutionRole00B5803B5": {
"Type": "AWS::IAM::Policy",
"Properties": {
"PolicyDocument": {
"Statement": [
{
"Action": "execute-api:Invoke",
"Effect": "Allow",
"Resource": {
"Fn::Join": [
"",
[
"arn:",
{
"Ref": "AWS::Partition"
},
":execute-api:",
{
"Ref": "AWS::Region"
},
":",
{
"Ref": "AWS::AccountId"
},
":",
{
"Ref": "ApiF70053CD"
},
"/*/*/*"
]
]
}
}
],
"Version": "2012-10-17"
},
"PolicyName": "TestFunction0inlinePolicyAddedToExecutionRole00B5803B5",
"Roles": [
{
"Ref": "TestFunction0ServiceRoleD0765191"
}
]
},
"DependsOn": [
"Vpc1IsolatedSubnet1RouteTableAssociation5CB6A296",
"Vpc1IsolatedSubnet2RouteTableAssociation6394B926"
]
},
"TestFunction1ServiceRoleFF9BD7F5": {
"Type": "AWS::IAM::Role",
"Properties": {
Expand Down Expand Up @@ -1212,6 +1213,54 @@
"Vpc2IsolatedSubnet2RouteTableAssociation0186F707"
]
},
"TestFunction1ServiceRoleDefaultPolicyEA6A8ACA": {
"Type": "AWS::IAM::Policy",
"Properties": {
"PolicyDocument": {
"Statement": [
{
"Action": "execute-api:Invoke",
"Effect": "Allow",
"Resource": {
"Fn::Join": [
"",
[
"arn:",
{
"Ref": "AWS::Partition"
},
":execute-api:",
{
"Ref": "AWS::Region"
},
":",
{
"Ref": "AWS::AccountId"
},
":",
{
"Ref": "ApiF70053CD"
},
"/*/*/*"
]
]
}
}
],
"Version": "2012-10-17"
},
"PolicyName": "TestFunction1ServiceRoleDefaultPolicyEA6A8ACA",
"Roles": [
{
"Ref": "TestFunction1ServiceRoleFF9BD7F5"
}
]
},
"DependsOn": [
"Vpc2IsolatedSubnet1RouteTableAssociation4E22797D",
"Vpc2IsolatedSubnet2RouteTableAssociation0186F707"
]
},
"TestFunction1SecurityGroup263EDDE5": {
"Type": "AWS::EC2::SecurityGroup",
"Properties": {
Expand Down Expand Up @@ -1294,58 +1343,11 @@
}
},
"DependsOn": [
"TestFunction1ServiceRoleDefaultPolicyEA6A8ACA",
"TestFunction1ServiceRoleFF9BD7F5",
"Vpc2IsolatedSubnet1RouteTableAssociation4E22797D",
"Vpc2IsolatedSubnet2RouteTableAssociation0186F707"
]
},
"TestFunction1inlinePolicyAddedToExecutionRole054C03DAF": {
"Type": "AWS::IAM::Policy",
"Properties": {
"PolicyDocument": {
"Statement": [
{
"Action": "execute-api:Invoke",
"Effect": "Allow",
"Resource": {
"Fn::Join": [
"",
[
"arn:",
{
"Ref": "AWS::Partition"
},
":execute-api:",
{
"Ref": "AWS::Region"
},
":",
{
"Ref": "AWS::AccountId"
},
":",
{
"Ref": "ApiF70053CD"
},
"/*/*/*"
]
]
}
}
],
"Version": "2012-10-17"
},
"PolicyName": "TestFunction1inlinePolicyAddedToExecutionRole054C03DAF",
"Roles": [
{
"Ref": "TestFunction1ServiceRoleFF9BD7F5"
}
]
},
"DependsOn": [
"Vpc2IsolatedSubnet1RouteTableAssociation4E22797D",
"Vpc2IsolatedSubnet2RouteTableAssociation0186F707"
]
}
},
"Outputs": {
Expand Down
Loading

0 comments on commit 8679b89

Please sign in to comment.