@aws-solutions-constructs/aws-cloudfront-apigateway-lambda 2.80.0 → 2.81.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (31) hide show
  1. package/.jsii +44 -5
  2. package/lib/index.js +1 -1
  3. package/package.json +8 -8
  4. package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/cdk.out +1 -1
  5. package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/cftaplam-customCloudfrontLoggingBucket.assets.json +3 -3
  6. package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/cftaplam-customCloudfrontLoggingBucket.template.json +24 -35
  7. package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/cftaplamcustomCloudfrontLoggingBucketIntegDefaultTestDeployAssert35A683E0.assets.json +1 -1
  8. package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/integ.json +1 -1
  9. package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/manifest.json +47 -43
  10. package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/tree.json +1 -2002
  11. package/test/integ.cftaplam-no-arguments.js.snapshot/cdk.out +1 -1
  12. package/test/integ.cftaplam-no-arguments.js.snapshot/cftaplam-no-arguments.assets.json +3 -3
  13. package/test/integ.cftaplam-no-arguments.js.snapshot/cftaplam-no-arguments.template.json +24 -35
  14. package/test/integ.cftaplam-no-arguments.js.snapshot/cftaplamnoargumentsIntegDefaultTestDeployAssertACC32F59.assets.json +1 -1
  15. package/test/integ.cftaplam-no-arguments.js.snapshot/integ.json +1 -1
  16. package/test/integ.cftaplam-no-arguments.js.snapshot/manifest.json +47 -43
  17. package/test/integ.cftaplam-no-arguments.js.snapshot/tree.json +1 -2002
  18. package/test/integ.cftaplam-no-usage-plan.js.snapshot/cdk.out +1 -1
  19. package/test/integ.cftaplam-no-usage-plan.js.snapshot/cftaplam-no-usage-plan.assets.json +3 -3
  20. package/test/integ.cftaplam-no-usage-plan.js.snapshot/cftaplam-no-usage-plan.template.json +24 -35
  21. package/test/integ.cftaplam-no-usage-plan.js.snapshot/cftaplamnousageplanIntegDefaultTestDeployAssertABA4F4C5.assets.json +1 -1
  22. package/test/integ.cftaplam-no-usage-plan.js.snapshot/integ.json +1 -1
  23. package/test/integ.cftaplam-no-usage-plan.js.snapshot/manifest.json +44 -41
  24. package/test/integ.cftaplam-no-usage-plan.js.snapshot/tree.json +1 -1959
  25. package/test/integ.cftaplam-override-behavior.js.snapshot/cdk.out +1 -1
  26. package/test/integ.cftaplam-override-behavior.js.snapshot/cftaplam-override-behavior.assets.json +3 -3
  27. package/test/integ.cftaplam-override-behavior.js.snapshot/cftaplam-override-behavior.template.json +24 -35
  28. package/test/integ.cftaplam-override-behavior.js.snapshot/cftaplamoverridebehaviorIntegDefaultTestDeployAssert3DC30427.assets.json +1 -1
  29. package/test/integ.cftaplam-override-behavior.js.snapshot/integ.json +1 -1
  30. package/test/integ.cftaplam-override-behavior.js.snapshot/manifest.json +47 -43
  31. package/test/integ.cftaplam-override-behavior.js.snapshot/tree.json +1 -2117
@@ -1 +1 @@
1
- {"version":"39.0.0"}
1
+ {"version":"40.0.0"}
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "39.0.0",
2
+ "version": "40.0.0",
3
3
  "files": {
4
4
  "3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f": {
5
5
  "source": {
@@ -27,7 +27,7 @@
27
27
  }
28
28
  }
29
29
  },
30
- "84980b12f40e0433c323df6a8e9ddd4b976d677707b220ace86738c5be903883": {
30
+ "7df9e12538d0b0731b350b862b5b0f431802deac8db86e07c2abaf7034bb666b": {
31
31
  "source": {
32
32
  "path": "cftaplam-no-usage-plan.template.json",
33
33
  "packaging": "file"
@@ -35,7 +35,7 @@
35
35
  "destinations": {
36
36
  "current_account-current_region": {
37
37
  "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
38
- "objectKey": "84980b12f40e0433c323df6a8e9ddd4b976d677707b220ace86738c5be903883.json",
38
+ "objectKey": "7df9e12538d0b0731b350b862b5b0f431802deac8db86e07c2abaf7034bb666b.json",
39
39
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
40
40
  }
41
41
  }
@@ -235,40 +235,6 @@
235
235
  }
236
236
  }
237
237
  },
238
- "testcloudfrontapigatewaylambdaLambdaFunctionServiceRoleDefaultPolicyDB7FF8EB": {
239
- "Type": "AWS::IAM::Policy",
240
- "Properties": {
241
- "PolicyDocument": {
242
- "Statement": [
243
- {
244
- "Action": [
245
- "xray:PutTelemetryRecords",
246
- "xray:PutTraceSegments"
247
- ],
248
- "Effect": "Allow",
249
- "Resource": "*"
250
- }
251
- ],
252
- "Version": "2012-10-17"
253
- },
254
- "PolicyName": "testcloudfrontapigatewaylambdaLambdaFunctionServiceRoleDefaultPolicyDB7FF8EB",
255
- "Roles": [
256
- {
257
- "Ref": "testcloudfrontapigatewaylambdaLambdaFunctionServiceRoleCB74590F"
258
- }
259
- ]
260
- },
261
- "Metadata": {
262
- "cfn_nag": {
263
- "rules_to_suppress": [
264
- {
265
- "id": "W12",
266
- "reason": "Lambda needs the following minimum required permissions to send trace data to X-Ray and access ENIs in a VPC."
267
- }
268
- ]
269
- }
270
- }
271
- },
272
238
  "testcloudfrontapigatewaylambdaLambdaFunction17A55E65": {
273
239
  "Type": "AWS::Lambda::Function",
274
240
  "Properties": {
@@ -296,7 +262,6 @@
296
262
  }
297
263
  },
298
264
  "DependsOn": [
299
- "testcloudfrontapigatewaylambdaLambdaFunctionServiceRoleDefaultPolicyDB7FF8EB",
300
265
  "testcloudfrontapigatewaylambdaLambdaFunctionServiceRoleCB74590F"
301
266
  ],
302
267
  "Metadata": {
@@ -318,6 +283,30 @@
318
283
  }
319
284
  }
320
285
  },
286
+ "testcloudfrontapigatewaylambdaLambdaFunctioninlinePolicyAddedToExecutionRole010F5D55C": {
287
+ "Type": "AWS::IAM::Policy",
288
+ "Properties": {
289
+ "PolicyDocument": {
290
+ "Statement": [
291
+ {
292
+ "Action": [
293
+ "xray:PutTelemetryRecords",
294
+ "xray:PutTraceSegments"
295
+ ],
296
+ "Effect": "Allow",
297
+ "Resource": "*"
298
+ }
299
+ ],
300
+ "Version": "2012-10-17"
301
+ },
302
+ "PolicyName": "testcloudfrontapigatewaylambdaLambdaFunctioninlinePolicyAddedToExecutionRole010F5D55C",
303
+ "Roles": [
304
+ {
305
+ "Ref": "testcloudfrontapigatewaylambdaLambdaFunctionServiceRoleCB74590F"
306
+ }
307
+ ]
308
+ }
309
+ },
321
310
  "testcloudfrontapigatewaylambdaApiAccessLogGroup97EB2E40": {
322
311
  "Type": "AWS::Logs::LogGroup",
323
312
  "UpdateReplacePolicy": "Retain",
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "39.0.0",
2
+ "version": "40.0.0",
3
3
  "files": {
4
4
  "21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22": {
5
5
  "source": {
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "39.0.0",
2
+ "version": "40.0.0",
3
3
  "testCases": {
4
4
  "cftaplam-no-usage-plan/Integ/DefaultTest": {
5
5
  "stacks": [
@@ -66,7 +66,7 @@
66
66
  "validateOnSynth": false,
67
67
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
68
68
  "cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
69
- "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/84980b12f40e0433c323df6a8e9ddd4b976d677707b220ace86738c5be903883.json",
69
+ "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/7df9e12538d0b0731b350b862b5b0f431802deac8db86e07c2abaf7034bb666b.json",
70
70
  "requiresBootstrapStackVersion": 6,
71
71
  "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
72
72
  "additionalDependencies": [
@@ -155,14 +155,6 @@
155
155
  "inlinePolicies": "*"
156
156
  }
157
157
  },
158
- {
159
- "type": "aws:cdk:analytics:method",
160
- "data": {
161
- "addToPrincipalPolicy": [
162
- {}
163
- ]
164
- }
165
- },
166
158
  {
167
159
  "type": "aws:cdk:analytics:method",
168
160
  "data": {
@@ -192,25 +184,41 @@
192
184
  "data": "testcloudfrontapigatewaylambdaLambdaFunctionServiceRoleCB74590F"
193
185
  }
194
186
  ],
195
- "/cftaplam-no-usage-plan/test-cloudfront-apigateway-lambda/LambdaFunctionServiceRole/DefaultPolicy": [
187
+ "/cftaplam-no-usage-plan/test-cloudfront-apigateway-lambda/LambdaFunction": [
196
188
  {
197
189
  "type": "aws:cdk:analytics:construct",
198
- "data": "*"
190
+ "data": {
191
+ "role": "*",
192
+ "tracing": "Active",
193
+ "code": "*",
194
+ "runtime": "*",
195
+ "handler": "*"
196
+ }
199
197
  },
200
198
  {
201
199
  "type": "aws:cdk:analytics:method",
202
200
  "data": {
203
- "attachToRole": [
204
- "*"
201
+ "addEnvironment": [
202
+ "*",
203
+ "*",
204
+ {
205
+ "removeInEdge": true
206
+ }
205
207
  ]
206
208
  }
207
- },
209
+ }
210
+ ],
211
+ "/cftaplam-no-usage-plan/test-cloudfront-apigateway-lambda/LambdaFunction/Resource": [
208
212
  {
209
- "type": "aws:cdk:analytics:method",
213
+ "type": "aws:cdk:logicalId",
214
+ "data": "testcloudfrontapigatewaylambdaLambdaFunction17A55E65"
215
+ }
216
+ ],
217
+ "/cftaplam-no-usage-plan/test-cloudfront-apigateway-lambda/LambdaFunction/inlinePolicyAddedToExecutionRole-0": [
218
+ {
219
+ "type": "aws:cdk:analytics:construct",
210
220
  "data": {
211
- "attachToRole": [
212
- "*"
213
- ]
221
+ "statements": "*"
214
222
  }
215
223
  },
216
224
  {
@@ -220,42 +228,28 @@
220
228
  {}
221
229
  ]
222
230
  }
223
- }
224
- ],
225
- "/cftaplam-no-usage-plan/test-cloudfront-apigateway-lambda/LambdaFunctionServiceRole/DefaultPolicy/Resource": [
226
- {
227
- "type": "aws:cdk:logicalId",
228
- "data": "testcloudfrontapigatewaylambdaLambdaFunctionServiceRoleDefaultPolicyDB7FF8EB"
229
- }
230
- ],
231
- "/cftaplam-no-usage-plan/test-cloudfront-apigateway-lambda/LambdaFunction": [
231
+ },
232
232
  {
233
- "type": "aws:cdk:analytics:construct",
233
+ "type": "aws:cdk:analytics:method",
234
234
  "data": {
235
- "role": "*",
236
- "tracing": "Active",
237
- "code": "*",
238
- "runtime": "*",
239
- "handler": "*"
235
+ "attachToRole": [
236
+ "*"
237
+ ]
240
238
  }
241
239
  },
242
240
  {
243
241
  "type": "aws:cdk:analytics:method",
244
242
  "data": {
245
- "addEnvironment": [
246
- "*",
247
- "*",
248
- {
249
- "removeInEdge": true
250
- }
243
+ "attachToRole": [
244
+ "*"
251
245
  ]
252
246
  }
253
247
  }
254
248
  ],
255
- "/cftaplam-no-usage-plan/test-cloudfront-apigateway-lambda/LambdaFunction/Resource": [
249
+ "/cftaplam-no-usage-plan/test-cloudfront-apigateway-lambda/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource": [
256
250
  {
257
251
  "type": "aws:cdk:logicalId",
258
- "data": "testcloudfrontapigatewaylambdaLambdaFunction17A55E65"
252
+ "data": "testcloudfrontapigatewaylambdaLambdaFunctioninlinePolicyAddedToExecutionRole010F5D55C"
259
253
  }
260
254
  ],
261
255
  "/cftaplam-no-usage-plan/test-cloudfront-apigateway-lambda/ApiAccessLogGroup": [
@@ -686,6 +680,15 @@
686
680
  "type": "aws:cdk:logicalId",
687
681
  "data": "CheckBootstrapVersion"
688
682
  }
683
+ ],
684
+ "testcloudfrontapigatewaylambdaLambdaFunctionServiceRoleDefaultPolicyDB7FF8EB": [
685
+ {
686
+ "type": "aws:cdk:logicalId",
687
+ "data": "testcloudfrontapigatewaylambdaLambdaFunctionServiceRoleDefaultPolicyDB7FF8EB",
688
+ "trace": [
689
+ "!!DESTRUCTIVE_CHANGES: WILL_DESTROY"
690
+ ]
691
+ }
689
692
  ]
690
693
  },
691
694
  "displayName": "cftaplam-no-usage-plan"