source/infrastructure/personalize/step_functions/scheduled_dataset_import.py [56:88]:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                        )
                    )
                )
                .add_catch(
                    FailureFragment(self, notifications).start_state,
                    errors=["States.ALL"],
                    result_path="$.statesError",
                )
                .next(
                    notifications.state(
                        self,
                        "Success",
                        payload=TaskInput.from_object(
                            {"datasetGroup.$": "$[0].datasetGroup.serviceConfig.name"}
                        ),
                    )
                )
            ),
        )
        add_cfn_nag_suppressions(
            self.state_machine.role.node.try_find_child(
                "DefaultPolicy"
            ).node.find_child("Resource"),
            [
                CfnNagSuppression(
                    "W12", "IAM policy for AWS X-Ray requires an allow on *"
                ),
                CfnNagSuppression(
                    "W76",
                    "Large step functions need larger IAM roles to access all managed AWS Lambda functions",
                ),
            ],
        )
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -



source/infrastructure/personalize/step_functions/scheduled_solution_maintenance.py [77:109]:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                        )
                    )
                )
                .add_catch(
                    FailureFragment(self, notifications).start_state,
                    errors=["States.ALL"],
                    result_path="$.statesError",
                )
                .next(
                    notifications.state(
                        self,
                        "Success",
                        payload=TaskInput.from_object(
                            {"datasetGroup.$": "$[0].datasetGroup.serviceConfig.name"}
                        ),
                    )
                )
            ),
        )
        add_cfn_nag_suppressions(
            self.state_machine.role.node.try_find_child(
                "DefaultPolicy"
            ).node.find_child("Resource"),
            [
                CfnNagSuppression(
                    "W12", "IAM policy for AWS X-Ray requires an allow on *"
                ),
                CfnNagSuppression(
                    "W76",
                    "Large step functions need larger IAM roles to access all managed AWS Lambda functions",
                ),
            ],
        )
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -



