Skip to content

Commit

Permalink
verify int test
Browse files Browse the repository at this point in the history
  • Loading branch information
msambol committed Dec 11, 2023
1 parent 139148a commit e3c70a7
Show file tree
Hide file tree
Showing 5 changed files with 223 additions and 31 deletions.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,10 @@
"EnableDnsSupport": true,
"InstanceTenancy": "default",
"Tags": [
{
"Key": "for-use-with-amazon-emr-managed-policies",
"Value": "true"
},
{
"Key": "Name",
"Value": "aws-cdk-emr-add-step-runtime-role/Vpc"
Expand Down Expand Up @@ -37,6 +41,10 @@
"Key": "aws-cdk:subnet-type",
"Value": "Public"
},
{
"Key": "for-use-with-amazon-emr-managed-policies",
"Value": "true"
},
{
"Key": "Name",
"Value": "aws-cdk-emr-add-step-runtime-role/Vpc/PublicSubnet1"
Expand All @@ -51,6 +59,10 @@
"Type": "AWS::EC2::RouteTable",
"Properties": {
"Tags": [
{
"Key": "for-use-with-amazon-emr-managed-policies",
"Value": "true"
},
{
"Key": "Name",
"Value": "aws-cdk-emr-add-step-runtime-role/Vpc/PublicSubnet1"
Expand Down Expand Up @@ -92,6 +104,10 @@
"Properties": {
"Domain": "vpc",
"Tags": [
{
"Key": "for-use-with-amazon-emr-managed-policies",
"Value": "true"
},
{
"Key": "Name",
"Value": "aws-cdk-emr-add-step-runtime-role/Vpc/PublicSubnet1"
Expand All @@ -112,6 +128,10 @@
"Ref": "VpcPublicSubnet1Subnet5C2D37C4"
},
"Tags": [
{
"Key": "for-use-with-amazon-emr-managed-policies",
"Value": "true"
},
{
"Key": "Name",
"Value": "aws-cdk-emr-add-step-runtime-role/Vpc/PublicSubnet1"
Expand Down Expand Up @@ -145,6 +165,10 @@
"Key": "aws-cdk:subnet-type",
"Value": "Public"
},
{
"Key": "for-use-with-amazon-emr-managed-policies",
"Value": "true"
},
{
"Key": "Name",
"Value": "aws-cdk-emr-add-step-runtime-role/Vpc/PublicSubnet2"
Expand All @@ -159,6 +183,10 @@
"Type": "AWS::EC2::RouteTable",
"Properties": {
"Tags": [
{
"Key": "for-use-with-amazon-emr-managed-policies",
"Value": "true"
},
{
"Key": "Name",
"Value": "aws-cdk-emr-add-step-runtime-role/Vpc/PublicSubnet2"
Expand Down Expand Up @@ -200,6 +228,10 @@
"Properties": {
"Domain": "vpc",
"Tags": [
{
"Key": "for-use-with-amazon-emr-managed-policies",
"Value": "true"
},
{
"Key": "Name",
"Value": "aws-cdk-emr-add-step-runtime-role/Vpc/PublicSubnet2"
Expand All @@ -220,6 +252,10 @@
"Ref": "VpcPublicSubnet2Subnet691E08A3"
},
"Tags": [
{
"Key": "for-use-with-amazon-emr-managed-policies",
"Value": "true"
},
{
"Key": "Name",
"Value": "aws-cdk-emr-add-step-runtime-role/Vpc/PublicSubnet2"
Expand Down Expand Up @@ -253,6 +289,10 @@
"Key": "aws-cdk:subnet-type",
"Value": "Private"
},
{
"Key": "for-use-with-amazon-emr-managed-policies",
"Value": "true"
},
{
"Key": "Name",
"Value": "aws-cdk-emr-add-step-runtime-role/Vpc/PrivateSubnet1"
Expand All @@ -267,6 +307,10 @@
"Type": "AWS::EC2::RouteTable",
"Properties": {
"Tags": [
{
"Key": "for-use-with-amazon-emr-managed-policies",
"Value": "true"
},
{
"Key": "Name",
"Value": "aws-cdk-emr-add-step-runtime-role/Vpc/PrivateSubnet1"
Expand Down Expand Up @@ -322,6 +366,10 @@
"Key": "aws-cdk:subnet-type",
"Value": "Private"
},
{
"Key": "for-use-with-amazon-emr-managed-policies",
"Value": "true"
},
{
"Key": "Name",
"Value": "aws-cdk-emr-add-step-runtime-role/Vpc/PrivateSubnet2"
Expand All @@ -336,6 +384,10 @@
"Type": "AWS::EC2::RouteTable",
"Properties": {
"Tags": [
{
"Key": "for-use-with-amazon-emr-managed-policies",
"Value": "true"
},
{
"Key": "Name",
"Value": "aws-cdk-emr-add-step-runtime-role/Vpc/PrivateSubnet2"
Expand Down Expand Up @@ -373,6 +425,10 @@
"Type": "AWS::EC2::InternetGateway",
"Properties": {
"Tags": [
{
"Key": "for-use-with-amazon-emr-managed-policies",
"Value": "true"
},
{
"Key": "Name",
"Value": "aws-cdk-emr-add-step-runtime-role/Vpc"
Expand Down Expand Up @@ -441,6 +497,32 @@
]
}
},
"EmrCreateClusterServiceRoleDefaultPolicyA8B4FA32": {
"Type": "AWS::IAM::Policy",
"Properties": {
"PolicyDocument": {
"Statement": [
{
"Action": "iam:PassRole",
"Effect": "Allow",
"Resource": {
"Fn::GetAtt": [
"EmrCreateClusterInstanceRoleC80466F5",
"Arn"
]
}
}
],
"Version": "2012-10-17"
},
"PolicyName": "EmrCreateClusterServiceRoleDefaultPolicyA8B4FA32",
"Roles": [
{
"Ref": "EmrCreateClusterServiceRole5251910D"
}
]
}
},
"EmrCreateClusterInstanceRoleC80466F5": {
"Type": "AWS::IAM::Role",
"Properties": {
Expand Down Expand Up @@ -522,7 +604,7 @@
}
}
},
"SMRole49C19C48": {
"StateMachineRoleB840431D": {
"Type": "AWS::IAM::Role",
"Properties": {
"AssumeRolePolicyDocument": {
Expand All @@ -539,13 +621,14 @@
}
}
},
"SMRoleDefaultPolicy34CA15C7": {
"StateMachineRoleDefaultPolicyDF1E6607": {
"Type": "AWS::IAM::Policy",
"Properties": {
"PolicyDocument": {
"Statement": [
{
"Action": [
"elasticmapreduce:AddTags",
"elasticmapreduce:DescribeCluster",
"elasticmapreduce:RunJobFlow",
"elasticmapreduce:TerminateJobFlows"
Expand Down Expand Up @@ -675,15 +758,15 @@
],
"Version": "2012-10-17"
},
"PolicyName": "SMRoleDefaultPolicy34CA15C7",
"PolicyName": "StateMachineRoleDefaultPolicyDF1E6607",
"Roles": [
{
"Ref": "SMRole49C19C48"
"Ref": "StateMachineRoleB840431D"
}
]
}
},
"SM934E715A": {
"StateMachine2E01A3A5": {
"Type": "AWS::StepFunctions::StateMachine",
"Properties": {
"DefinitionString": {
Expand Down Expand Up @@ -727,14 +810,14 @@
},
"RoleArn": {
"Fn::GetAtt": [
"SMRole49C19C48",
"StateMachineRoleB840431D",
"Arn"
]
}
},
"DependsOn": [
"SMRoleDefaultPolicy34CA15C7",
"SMRole49C19C48"
"StateMachineRoleDefaultPolicyDF1E6607",
"StateMachineRoleB840431D"
],
"UpdateReplacePolicy": "Delete",
"DeletionPolicy": "Delete"
Expand Down

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Loading

0 comments on commit e3c70a7

Please sign in to comment.