// Jest Snapshot v1, https://goo.gl/fbAQLP exports[`adding cfn suppressing rules to lambda 1`] = ` { "Resources": { "ServiceRole": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "lambda.amazonaws.com", }, }, ], "Version": "2012-10-17", }, "Path": "/", "Policies": [ { "PolicyDocument": { "Statement": [ { "Action": [ "logs:CreateLogGroup", "logs:CreateLogStream", "logs:PutLogEvents", ], "Effect": "Allow", "Resource": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":logs:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":log-group:/aws/lambda/*", ], ], }, "Sid": "CreateCWLogs", }, ], "Version": "2012-10-17", }, "PolicyName": "LambdaPolicyName", }, ], }, "Type": "AWS::IAM::Role", }, "testFunction483F4CBE": { "DependsOn": [ "ServiceRole", ], "Metadata": { "cfn_nag": { "rules_to_suppress": [ { "id": "W58", "reason": "Lambda has the required permission to write CloudWatch Logs through a custom policy.", }, { "id": "W89", "reason": "There is no need to deploy this Lambda to a VPC.", }, { "id": "W92", "reason": "There is no need for Reserved Concurrency.", }, ], }, }, "Properties": { "Code": { "ZipFile": "exports.handler = (event, context, callback) => {}", }, "Handler": "index.handler", "Role": { "Fn::GetAtt": [ "ServiceRole", "Arn", ], }, "Runtime": "nodejs16.x", }, "Type": "AWS::Lambda::Function", }, }, } `;