@aws-solutions-constructs/aws-cloudfront-apigateway-lambda 2.80.0 → 2.81.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (31) hide show
  1. package/.jsii +44 -5
  2. package/lib/index.js +1 -1
  3. package/package.json +8 -8
  4. package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/cdk.out +1 -1
  5. package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/cftaplam-customCloudfrontLoggingBucket.assets.json +3 -3
  6. package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/cftaplam-customCloudfrontLoggingBucket.template.json +24 -35
  7. package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/cftaplamcustomCloudfrontLoggingBucketIntegDefaultTestDeployAssert35A683E0.assets.json +1 -1
  8. package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/integ.json +1 -1
  9. package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/manifest.json +47 -43
  10. package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/tree.json +1 -2002
  11. package/test/integ.cftaplam-no-arguments.js.snapshot/cdk.out +1 -1
  12. package/test/integ.cftaplam-no-arguments.js.snapshot/cftaplam-no-arguments.assets.json +3 -3
  13. package/test/integ.cftaplam-no-arguments.js.snapshot/cftaplam-no-arguments.template.json +24 -35
  14. package/test/integ.cftaplam-no-arguments.js.snapshot/cftaplamnoargumentsIntegDefaultTestDeployAssertACC32F59.assets.json +1 -1
  15. package/test/integ.cftaplam-no-arguments.js.snapshot/integ.json +1 -1
  16. package/test/integ.cftaplam-no-arguments.js.snapshot/manifest.json +47 -43
  17. package/test/integ.cftaplam-no-arguments.js.snapshot/tree.json +1 -2002
  18. package/test/integ.cftaplam-no-usage-plan.js.snapshot/cdk.out +1 -1
  19. package/test/integ.cftaplam-no-usage-plan.js.snapshot/cftaplam-no-usage-plan.assets.json +3 -3
  20. package/test/integ.cftaplam-no-usage-plan.js.snapshot/cftaplam-no-usage-plan.template.json +24 -35
  21. package/test/integ.cftaplam-no-usage-plan.js.snapshot/cftaplamnousageplanIntegDefaultTestDeployAssertABA4F4C5.assets.json +1 -1
  22. package/test/integ.cftaplam-no-usage-plan.js.snapshot/integ.json +1 -1
  23. package/test/integ.cftaplam-no-usage-plan.js.snapshot/manifest.json +44 -41
  24. package/test/integ.cftaplam-no-usage-plan.js.snapshot/tree.json +1 -1959
  25. package/test/integ.cftaplam-override-behavior.js.snapshot/cdk.out +1 -1
  26. package/test/integ.cftaplam-override-behavior.js.snapshot/cftaplam-override-behavior.assets.json +3 -3
  27. package/test/integ.cftaplam-override-behavior.js.snapshot/cftaplam-override-behavior.template.json +24 -35
  28. package/test/integ.cftaplam-override-behavior.js.snapshot/cftaplamoverridebehaviorIntegDefaultTestDeployAssert3DC30427.assets.json +1 -1
  29. package/test/integ.cftaplam-override-behavior.js.snapshot/integ.json +1 -1
  30. package/test/integ.cftaplam-override-behavior.js.snapshot/manifest.json +47 -43
  31. package/test/integ.cftaplam-override-behavior.js.snapshot/tree.json +1 -2117
@@ -1 +1 @@
1
- {"version":"39.0.0"}
1
+ {"version":"40.0.0"}
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "39.0.0",
2
+ "version": "40.0.0",
3
3
  "files": {
4
4
  "3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f": {
5
5
  "source": {
@@ -27,7 +27,7 @@
27
27
  }
28
28
  }
29
29
  },
30
- "7ba4ead4a813aec7f115ea462c78a63199726657619e290c645c42a26e4ead25": {
30
+ "8bb8062d1158e548d5038f9c21c0c869d2f537f51945be1e927061bd581f23bc": {
31
31
  "source": {
32
32
  "path": "cftaplam-override-behavior.template.json",
33
33
  "packaging": "file"
@@ -35,7 +35,7 @@
35
35
  "destinations": {
36
36
  "current_account-current_region": {
37
37
  "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
38
- "objectKey": "7ba4ead4a813aec7f115ea462c78a63199726657619e290c645c42a26e4ead25.json",
38
+ "objectKey": "8bb8062d1158e548d5038f9c21c0c869d2f537f51945be1e927061bd581f23bc.json",
39
39
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
40
40
  }
41
41
  }
@@ -283,40 +283,6 @@
283
283
  }
284
284
  }
285
285
  },
286
- "cfapilambdaoverrideLambdaFunctionServiceRoleDefaultPolicy1A3D9202": {
287
- "Type": "AWS::IAM::Policy",
288
- "Properties": {
289
- "PolicyDocument": {
290
- "Statement": [
291
- {
292
- "Action": [
293
- "xray:PutTelemetryRecords",
294
- "xray:PutTraceSegments"
295
- ],
296
- "Effect": "Allow",
297
- "Resource": "*"
298
- }
299
- ],
300
- "Version": "2012-10-17"
301
- },
302
- "PolicyName": "cfapilambdaoverrideLambdaFunctionServiceRoleDefaultPolicy1A3D9202",
303
- "Roles": [
304
- {
305
- "Ref": "cfapilambdaoverrideLambdaFunctionServiceRole4B1A4043"
306
- }
307
- ]
308
- },
309
- "Metadata": {
310
- "cfn_nag": {
311
- "rules_to_suppress": [
312
- {
313
- "id": "W12",
314
- "reason": "Lambda needs the following minimum required permissions to send trace data to X-Ray and access ENIs in a VPC."
315
- }
316
- ]
317
- }
318
- }
319
- },
320
286
  "cfapilambdaoverrideLambdaFunction74CE466F": {
321
287
  "Type": "AWS::Lambda::Function",
322
288
  "Properties": {
@@ -344,7 +310,6 @@
344
310
  }
345
311
  },
346
312
  "DependsOn": [
347
- "cfapilambdaoverrideLambdaFunctionServiceRoleDefaultPolicy1A3D9202",
348
313
  "cfapilambdaoverrideLambdaFunctionServiceRole4B1A4043"
349
314
  ],
350
315
  "Metadata": {
@@ -366,6 +331,30 @@
366
331
  }
367
332
  }
368
333
  },
334
+ "cfapilambdaoverrideLambdaFunctioninlinePolicyAddedToExecutionRole0248615B6": {
335
+ "Type": "AWS::IAM::Policy",
336
+ "Properties": {
337
+ "PolicyDocument": {
338
+ "Statement": [
339
+ {
340
+ "Action": [
341
+ "xray:PutTelemetryRecords",
342
+ "xray:PutTraceSegments"
343
+ ],
344
+ "Effect": "Allow",
345
+ "Resource": "*"
346
+ }
347
+ ],
348
+ "Version": "2012-10-17"
349
+ },
350
+ "PolicyName": "cfapilambdaoverrideLambdaFunctioninlinePolicyAddedToExecutionRole0248615B6",
351
+ "Roles": [
352
+ {
353
+ "Ref": "cfapilambdaoverrideLambdaFunctionServiceRole4B1A4043"
354
+ }
355
+ ]
356
+ }
357
+ },
369
358
  "cfapilambdaoverrideApiAccessLogGroup2665068D": {
370
359
  "Type": "AWS::Logs::LogGroup",
371
360
  "UpdateReplacePolicy": "Retain",
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "39.0.0",
2
+ "version": "40.0.0",
3
3
  "files": {
4
4
  "21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22": {
5
5
  "source": {
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "39.0.0",
2
+ "version": "40.0.0",
3
3
  "testCases": {
4
4
  "cftaplam-override-behavior/Integ/DefaultTest": {
5
5
  "stacks": [
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "40.0.0",
2
+ "version": "42.0.0",
3
3
  "artifacts": {
4
4
  "cftaplamoverridebehaviorIntegDefaultTestDeployAssert3DC30427.assets": {
5
5
  "type": "cdk:asset-manifest",
@@ -66,7 +66,7 @@
66
66
  "validateOnSynth": false,
67
67
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
68
68
  "cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
69
- "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/7ba4ead4a813aec7f115ea462c78a63199726657619e290c645c42a26e4ead25.json",
69
+ "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/8bb8062d1158e548d5038f9c21c0c869d2f537f51945be1e927061bd581f23bc.json",
70
70
  "requiresBootstrapStackVersion": 6,
71
71
  "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
72
72
  "additionalDependencies": [
@@ -189,14 +189,6 @@
189
189
  "inlinePolicies": "*"
190
190
  }
191
191
  },
192
- {
193
- "type": "aws:cdk:analytics:method",
194
- "data": {
195
- "addToPrincipalPolicy": [
196
- {}
197
- ]
198
- }
199
- },
200
192
  {
201
193
  "type": "aws:cdk:analytics:method",
202
194
  "data": {
@@ -226,25 +218,41 @@
226
218
  "data": "cfapilambdaoverrideLambdaFunctionServiceRole4B1A4043"
227
219
  }
228
220
  ],
229
- "/cftaplam-override-behavior/cf-api-lambda-override/LambdaFunctionServiceRole/DefaultPolicy": [
221
+ "/cftaplam-override-behavior/cf-api-lambda-override/LambdaFunction": [
230
222
  {
231
223
  "type": "aws:cdk:analytics:construct",
232
- "data": "*"
224
+ "data": {
225
+ "role": "*",
226
+ "tracing": "Active",
227
+ "code": "*",
228
+ "runtime": "*",
229
+ "handler": "*"
230
+ }
233
231
  },
234
232
  {
235
233
  "type": "aws:cdk:analytics:method",
236
234
  "data": {
237
- "attachToRole": [
238
- "*"
235
+ "addEnvironment": [
236
+ "*",
237
+ "*",
238
+ {
239
+ "removeInEdge": true
240
+ }
239
241
  ]
240
242
  }
241
- },
243
+ }
244
+ ],
245
+ "/cftaplam-override-behavior/cf-api-lambda-override/LambdaFunction/Resource": [
242
246
  {
243
- "type": "aws:cdk:analytics:method",
247
+ "type": "aws:cdk:logicalId",
248
+ "data": "cfapilambdaoverrideLambdaFunction74CE466F"
249
+ }
250
+ ],
251
+ "/cftaplam-override-behavior/cf-api-lambda-override/LambdaFunction/inlinePolicyAddedToExecutionRole-0": [
252
+ {
253
+ "type": "aws:cdk:analytics:construct",
244
254
  "data": {
245
- "attachToRole": [
246
- "*"
247
- ]
255
+ "statements": "*"
248
256
  }
249
257
  },
250
258
  {
@@ -254,42 +262,28 @@
254
262
  {}
255
263
  ]
256
264
  }
257
- }
258
- ],
259
- "/cftaplam-override-behavior/cf-api-lambda-override/LambdaFunctionServiceRole/DefaultPolicy/Resource": [
260
- {
261
- "type": "aws:cdk:logicalId",
262
- "data": "cfapilambdaoverrideLambdaFunctionServiceRoleDefaultPolicy1A3D9202"
263
- }
264
- ],
265
- "/cftaplam-override-behavior/cf-api-lambda-override/LambdaFunction": [
265
+ },
266
266
  {
267
- "type": "aws:cdk:analytics:construct",
267
+ "type": "aws:cdk:analytics:method",
268
268
  "data": {
269
- "role": "*",
270
- "tracing": "Active",
271
- "code": "*",
272
- "runtime": "*",
273
- "handler": "*"
269
+ "attachToRole": [
270
+ "*"
271
+ ]
274
272
  }
275
273
  },
276
274
  {
277
275
  "type": "aws:cdk:analytics:method",
278
276
  "data": {
279
- "addEnvironment": [
280
- "*",
281
- "*",
282
- {
283
- "removeInEdge": true
284
- }
277
+ "attachToRole": [
278
+ "*"
285
279
  ]
286
280
  }
287
281
  }
288
282
  ],
289
- "/cftaplam-override-behavior/cf-api-lambda-override/LambdaFunction/Resource": [
283
+ "/cftaplam-override-behavior/cf-api-lambda-override/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource": [
290
284
  {
291
285
  "type": "aws:cdk:logicalId",
292
- "data": "cfapilambdaoverrideLambdaFunction74CE466F"
286
+ "data": "cfapilambdaoverrideLambdaFunctioninlinePolicyAddedToExecutionRole0248615B6"
293
287
  }
294
288
  ],
295
289
  "/cftaplam-override-behavior/cf-api-lambda-override/ApiAccessLogGroup": [
@@ -749,6 +743,15 @@
749
743
  "type": "aws:cdk:logicalId",
750
744
  "data": "CheckBootstrapVersion"
751
745
  }
746
+ ],
747
+ "cfapilambdaoverrideLambdaFunctionServiceRoleDefaultPolicy1A3D9202": [
748
+ {
749
+ "type": "aws:cdk:logicalId",
750
+ "data": "cfapilambdaoverrideLambdaFunctionServiceRoleDefaultPolicy1A3D9202",
751
+ "trace": [
752
+ "!!DESTRUCTIVE_CHANGES: WILL_DESTROY"
753
+ ]
754
+ }
752
755
  ]
753
756
  },
754
757
  "displayName": "cftaplam-override-behavior"
@@ -759,5 +762,6 @@
759
762
  "file": "tree.json"
760
763
  }
761
764
  }
762
- }
765
+ },
766
+ "minimumCliVersion": "2.1006.0"
763
767
  }