// Jest Snapshot v1, https://goo.gl/fbAQLP exports[`Global Roles Stack 1`] = ` { "Conditions": { "EncryptedLogGroup": { "Fn::And": [ { "Condition": "isNotGovCloud", }, { "Fn::Equals": [ { "Ref": "ReuseOrchestratorLogGroup", }, "no", ], }, ], }, "UnencryptedLogGroup": { "Fn::And": [ { "Fn::Not": [ { "Condition": "isNotGovCloud", }, ], }, { "Fn::Equals": [ { "Ref": "ReuseOrchestratorLogGroup", }, "no", ], }, ], }, "isNotGovCloud": { "Fn::Not": [ { "Fn::Equals": [ { "Ref": "AWS::Partition", }, "aws-us-gov", ], }, ], }, }, "Description": "test;", "Parameters": { "KmsKeyArn": { "Description": "ARN of the KMS key to use to encrypt log data.", "Type": "String", }, "ReuseOrchestratorLogGroup": { "AllowedValues": [ "yes", "no", ], "Default": "no", "Description": "Reuse existing Orchestrator Log Group? Choose "yes" if the log group already exists, else "no"", "Type": "String", }, }, "Resources": { "OrchestratorLogsEFDFFA92": { "Condition": "UnencryptedLogGroup", "DeletionPolicy": "Retain", "Metadata": { "cfn_nag": { "rules_to_suppress": [ { "id": "W84", "reason": "KmsKeyId is not supported in GovCloud.", }, ], }, }, "Properties": { "LogGroupName": "TestLogGroup", "RetentionInDays": 365, }, "Type": "AWS::Logs::LogGroup", "UpdateReplacePolicy": "Retain", }, "OrchestratorLogsEncrypted072D6E38": { "Condition": "EncryptedLogGroup", "DeletionPolicy": "Retain", "Properties": { "KmsKeyId": { "Ref": "KmsKeyArn", }, "LogGroupName": "TestLogGroup", "RetentionInDays": 365, }, "Type": "AWS::Logs::LogGroup", "UpdateReplacePolicy": "Retain", }, }, } `;