Skip to content

Commit

Permalink
make linter happier
Browse files Browse the repository at this point in the history
  • Loading branch information
iakov-aws committed Nov 5, 2024
1 parent 0f362dd commit 32dcdef
Showing 1 changed file with 10 additions and 10 deletions.
20 changes: 10 additions & 10 deletions cfn-templates/cid-cfn.yml
Original file line number Diff line number Diff line change
Expand Up @@ -342,7 +342,7 @@ Resources:
- lambda.amazonaws.com
Action:
- sts:AssumeRole
PermissionsBoundary: !If [NeedPermissionsBoundary, !Ref PermissionsBoundary, !Ref AWS::NoValue]
PermissionsBoundary: !If [NeedPermissionsBoundary, !Ref PermissionsBoundary, !Ref 'AWS::NoValue']
Policies:
- PolicyName: !Sub 'CidSpiceRefreshExecutionRole${Suffix}'
PolicyDocument:
Expand Down Expand Up @@ -716,7 +716,7 @@ Resources:
WORKGROUP: !If [NeedAthenaWorkgroup, !Ref MyAthenaWorkGroup, '']
CRAWLER: !If [NeedCURTable, !Ref MyGlueCURCrawler, '']
QUICKSIGHT_USER: !Ref QuickSightUser
QUICKSIGHT_ROLE: !If [ NeedQuickSightDataSourceRole, !Ref QuickSightDataSourceRole, !Ref AWS::NoValue ]
QUICKSIGHT_ROLE: !If [ NeedQuickSightDataSourceRole, !Ref QuickSightDataSourceRole, !Ref 'AWS::NoValue' ]
Metadata:
cfn_nag:
rules_to_suppress:
Expand Down Expand Up @@ -762,7 +762,7 @@ Resources:
- iam:DetachRolePolicy
Resource: !Sub "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/${QuickSightDataSourceRole}"
- !Ref 'AWS::NoValue'
PermissionsBoundary: !If [NeedPermissionsBoundary, !Ref PermissionsBoundary, !Ref AWS::NoValue]
PermissionsBoundary: !If [NeedPermissionsBoundary, !Ref PermissionsBoundary, !Ref 'AWS::NoValue']

InitLambdaExecutionRoleWorkGroupPolicy:
Type: AWS::IAM::Policy
Expand Down Expand Up @@ -848,7 +848,7 @@ Resources:
Action:
- sts:AssumeRole
Path: !Ref RolePath
PermissionsBoundary: !If [NeedPermissionsBoundary, !Ref PermissionsBoundary, !Ref AWS::NoValue]
PermissionsBoundary: !If [NeedPermissionsBoundary, !Ref PermissionsBoundary, !Ref 'AWS::NoValue']
Policies:
- PolicyName: AWSCURCrawlerComponentFunction
PolicyDocument:
Expand Down Expand Up @@ -1130,7 +1130,7 @@ Resources:
Action:
- 'sts:AssumeRole'
Path: !Ref RolePath
PermissionsBoundary: !If [NeedPermissionsBoundary, !Ref PermissionsBoundary, !Ref AWS::NoValue]
PermissionsBoundary: !If [NeedPermissionsBoundary, !Ref PermissionsBoundary, !Ref 'AWS::NoValue']
Policies:
- PolicyName: AWSCURCrawlerComponentFunction
PolicyDocument:
Expand Down Expand Up @@ -1214,7 +1214,7 @@ Resources:
- 'sts:AssumeRole'
Path: !Ref RolePath
RoleName: !Sub '${QuickSightDataSourceRoleName}${Suffix}'
PermissionsBoundary: !If [NeedPermissionsBoundary, !Ref PermissionsBoundary, !Ref AWS::NoValue]
PermissionsBoundary: !If [NeedPermissionsBoundary, !Ref PermissionsBoundary, !Ref 'AWS::NoValue']
Policies:
- PolicyName: AthenaAccess
PolicyDocument:
Expand Down Expand Up @@ -1355,14 +1355,14 @@ Resources:
CidAthenaDataSource:
Type: AWS::QuickSight::DataSource
Properties:
AwsAccountId: !Sub '${AWS::AccountId}'
AwsAccountId: !Ref 'AWS::AccountId'
Type: ATHENA
DataSourceId: !Sub 'CID-Athena${Suffix}'
Name: !Sub 'CID-Athena${Suffix}'
DataSourceParameters:
AthenaParameters:
WorkGroup: !If [ NeedAthenaWorkgroup, !Ref MyAthenaWorkGroup, !Ref AthenaWorkgroup ]
RoleArn: !If [ UseQuickSightDataSourceRole, !Sub "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/${QuickSightDataSourceRoleName}", !Ref AWS::NoValue ]
RoleArn: !If [ UseQuickSightDataSourceRole, !Sub "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/${QuickSightDataSourceRoleName}", !Ref 'AWS::NoValue']
Permissions:
- Actions:
- 'quicksight:DescribeDataSource'
Expand All @@ -1387,8 +1387,8 @@ Resources:
- lambda.amazonaws.com
Action:
- sts:AssumeRole
PermissionsBoundary: !If [NeedPermissionsBoundary, !Ref PermissionsBoundary, !Ref AWS::NoValue]
ManagedPolicyArns: !If [UseCUR2, [ !ImportValue cid-DataExports-ReadAccessPolicyARN ] , !Ref AWS::NoValue]
PermissionsBoundary: !If [NeedPermissionsBoundary, !Ref PermissionsBoundary, !Ref 'AWS::NoValue']
ManagedPolicyArns: !If [UseCUR2, [ !ImportValue cid-DataExports-ReadAccessPolicyARN ] , !Ref 'AWS::NoValue']
Policies:
- PolicyName: CidExecPolicy
PolicyDocument:
Expand Down

0 comments on commit 32dcdef

Please sign in to comment.