@aws-solutions-constructs/aws-cloudfront-apigateway-lambda 2.80.0 → 2.82.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +44 -5
- package/lib/index.js +1 -1
- package/package.json +8 -8
- package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/cdk.out +1 -1
- package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/cftaplam-customCloudfrontLoggingBucket.assets.json +3 -3
- package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/cftaplam-customCloudfrontLoggingBucket.template.json +24 -35
- package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/cftaplamcustomCloudfrontLoggingBucketIntegDefaultTestDeployAssert35A683E0.assets.json +1 -1
- package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/integ.json +1 -1
- package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/manifest.json +47 -43
- package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/tree.json +1 -2002
- package/test/integ.cftaplam-no-arguments.js.snapshot/cdk.out +1 -1
- package/test/integ.cftaplam-no-arguments.js.snapshot/cftaplam-no-arguments.assets.json +3 -3
- package/test/integ.cftaplam-no-arguments.js.snapshot/cftaplam-no-arguments.template.json +24 -35
- package/test/integ.cftaplam-no-arguments.js.snapshot/cftaplamnoargumentsIntegDefaultTestDeployAssertACC32F59.assets.json +1 -1
- package/test/integ.cftaplam-no-arguments.js.snapshot/integ.json +1 -1
- package/test/integ.cftaplam-no-arguments.js.snapshot/manifest.json +47 -43
- package/test/integ.cftaplam-no-arguments.js.snapshot/tree.json +1 -2002
- package/test/integ.cftaplam-no-usage-plan.js.snapshot/cdk.out +1 -1
- package/test/integ.cftaplam-no-usage-plan.js.snapshot/cftaplam-no-usage-plan.assets.json +3 -3
- package/test/integ.cftaplam-no-usage-plan.js.snapshot/cftaplam-no-usage-plan.template.json +24 -35
- package/test/integ.cftaplam-no-usage-plan.js.snapshot/cftaplamnousageplanIntegDefaultTestDeployAssertABA4F4C5.assets.json +1 -1
- package/test/integ.cftaplam-no-usage-plan.js.snapshot/integ.json +1 -1
- package/test/integ.cftaplam-no-usage-plan.js.snapshot/manifest.json +44 -41
- package/test/integ.cftaplam-no-usage-plan.js.snapshot/tree.json +1 -1959
- package/test/integ.cftaplam-override-behavior.js.snapshot/cdk.out +1 -1
- package/test/integ.cftaplam-override-behavior.js.snapshot/cftaplam-override-behavior.assets.json +3 -3
- package/test/integ.cftaplam-override-behavior.js.snapshot/cftaplam-override-behavior.template.json +24 -35
- package/test/integ.cftaplam-override-behavior.js.snapshot/cftaplamoverridebehaviorIntegDefaultTestDeployAssert3DC30427.assets.json +1 -1
- package/test/integ.cftaplam-override-behavior.js.snapshot/integ.json +1 -1
- package/test/integ.cftaplam-override-behavior.js.snapshot/manifest.json +47 -43
- package/test/integ.cftaplam-override-behavior.js.snapshot/tree.json +1 -2117
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":"
|
|
1
|
+
{"version":"40.0.0"}
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
{
|
|
2
|
-
"version": "
|
|
2
|
+
"version": "40.0.0",
|
|
3
3
|
"files": {
|
|
4
4
|
"3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f": {
|
|
5
5
|
"source": {
|
|
@@ -27,7 +27,7 @@
|
|
|
27
27
|
}
|
|
28
28
|
}
|
|
29
29
|
},
|
|
30
|
-
"
|
|
30
|
+
"7df9e12538d0b0731b350b862b5b0f431802deac8db86e07c2abaf7034bb666b": {
|
|
31
31
|
"source": {
|
|
32
32
|
"path": "cftaplam-no-usage-plan.template.json",
|
|
33
33
|
"packaging": "file"
|
|
@@ -35,7 +35,7 @@
|
|
|
35
35
|
"destinations": {
|
|
36
36
|
"current_account-current_region": {
|
|
37
37
|
"bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
|
|
38
|
-
"objectKey": "
|
|
38
|
+
"objectKey": "7df9e12538d0b0731b350b862b5b0f431802deac8db86e07c2abaf7034bb666b.json",
|
|
39
39
|
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
|
|
40
40
|
}
|
|
41
41
|
}
|
|
@@ -235,40 +235,6 @@
|
|
|
235
235
|
}
|
|
236
236
|
}
|
|
237
237
|
},
|
|
238
|
-
"testcloudfrontapigatewaylambdaLambdaFunctionServiceRoleDefaultPolicyDB7FF8EB": {
|
|
239
|
-
"Type": "AWS::IAM::Policy",
|
|
240
|
-
"Properties": {
|
|
241
|
-
"PolicyDocument": {
|
|
242
|
-
"Statement": [
|
|
243
|
-
{
|
|
244
|
-
"Action": [
|
|
245
|
-
"xray:PutTelemetryRecords",
|
|
246
|
-
"xray:PutTraceSegments"
|
|
247
|
-
],
|
|
248
|
-
"Effect": "Allow",
|
|
249
|
-
"Resource": "*"
|
|
250
|
-
}
|
|
251
|
-
],
|
|
252
|
-
"Version": "2012-10-17"
|
|
253
|
-
},
|
|
254
|
-
"PolicyName": "testcloudfrontapigatewaylambdaLambdaFunctionServiceRoleDefaultPolicyDB7FF8EB",
|
|
255
|
-
"Roles": [
|
|
256
|
-
{
|
|
257
|
-
"Ref": "testcloudfrontapigatewaylambdaLambdaFunctionServiceRoleCB74590F"
|
|
258
|
-
}
|
|
259
|
-
]
|
|
260
|
-
},
|
|
261
|
-
"Metadata": {
|
|
262
|
-
"cfn_nag": {
|
|
263
|
-
"rules_to_suppress": [
|
|
264
|
-
{
|
|
265
|
-
"id": "W12",
|
|
266
|
-
"reason": "Lambda needs the following minimum required permissions to send trace data to X-Ray and access ENIs in a VPC."
|
|
267
|
-
}
|
|
268
|
-
]
|
|
269
|
-
}
|
|
270
|
-
}
|
|
271
|
-
},
|
|
272
238
|
"testcloudfrontapigatewaylambdaLambdaFunction17A55E65": {
|
|
273
239
|
"Type": "AWS::Lambda::Function",
|
|
274
240
|
"Properties": {
|
|
@@ -296,7 +262,6 @@
|
|
|
296
262
|
}
|
|
297
263
|
},
|
|
298
264
|
"DependsOn": [
|
|
299
|
-
"testcloudfrontapigatewaylambdaLambdaFunctionServiceRoleDefaultPolicyDB7FF8EB",
|
|
300
265
|
"testcloudfrontapigatewaylambdaLambdaFunctionServiceRoleCB74590F"
|
|
301
266
|
],
|
|
302
267
|
"Metadata": {
|
|
@@ -318,6 +283,30 @@
|
|
|
318
283
|
}
|
|
319
284
|
}
|
|
320
285
|
},
|
|
286
|
+
"testcloudfrontapigatewaylambdaLambdaFunctioninlinePolicyAddedToExecutionRole010F5D55C": {
|
|
287
|
+
"Type": "AWS::IAM::Policy",
|
|
288
|
+
"Properties": {
|
|
289
|
+
"PolicyDocument": {
|
|
290
|
+
"Statement": [
|
|
291
|
+
{
|
|
292
|
+
"Action": [
|
|
293
|
+
"xray:PutTelemetryRecords",
|
|
294
|
+
"xray:PutTraceSegments"
|
|
295
|
+
],
|
|
296
|
+
"Effect": "Allow",
|
|
297
|
+
"Resource": "*"
|
|
298
|
+
}
|
|
299
|
+
],
|
|
300
|
+
"Version": "2012-10-17"
|
|
301
|
+
},
|
|
302
|
+
"PolicyName": "testcloudfrontapigatewaylambdaLambdaFunctioninlinePolicyAddedToExecutionRole010F5D55C",
|
|
303
|
+
"Roles": [
|
|
304
|
+
{
|
|
305
|
+
"Ref": "testcloudfrontapigatewaylambdaLambdaFunctionServiceRoleCB74590F"
|
|
306
|
+
}
|
|
307
|
+
]
|
|
308
|
+
}
|
|
309
|
+
},
|
|
321
310
|
"testcloudfrontapigatewaylambdaApiAccessLogGroup97EB2E40": {
|
|
322
311
|
"Type": "AWS::Logs::LogGroup",
|
|
323
312
|
"UpdateReplacePolicy": "Retain",
|
|
@@ -66,7 +66,7 @@
|
|
|
66
66
|
"validateOnSynth": false,
|
|
67
67
|
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
|
|
68
68
|
"cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
|
|
69
|
-
"stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/
|
|
69
|
+
"stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/7df9e12538d0b0731b350b862b5b0f431802deac8db86e07c2abaf7034bb666b.json",
|
|
70
70
|
"requiresBootstrapStackVersion": 6,
|
|
71
71
|
"bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
|
|
72
72
|
"additionalDependencies": [
|
|
@@ -155,14 +155,6 @@
|
|
|
155
155
|
"inlinePolicies": "*"
|
|
156
156
|
}
|
|
157
157
|
},
|
|
158
|
-
{
|
|
159
|
-
"type": "aws:cdk:analytics:method",
|
|
160
|
-
"data": {
|
|
161
|
-
"addToPrincipalPolicy": [
|
|
162
|
-
{}
|
|
163
|
-
]
|
|
164
|
-
}
|
|
165
|
-
},
|
|
166
158
|
{
|
|
167
159
|
"type": "aws:cdk:analytics:method",
|
|
168
160
|
"data": {
|
|
@@ -192,25 +184,41 @@
|
|
|
192
184
|
"data": "testcloudfrontapigatewaylambdaLambdaFunctionServiceRoleCB74590F"
|
|
193
185
|
}
|
|
194
186
|
],
|
|
195
|
-
"/cftaplam-no-usage-plan/test-cloudfront-apigateway-lambda/
|
|
187
|
+
"/cftaplam-no-usage-plan/test-cloudfront-apigateway-lambda/LambdaFunction": [
|
|
196
188
|
{
|
|
197
189
|
"type": "aws:cdk:analytics:construct",
|
|
198
|
-
"data":
|
|
190
|
+
"data": {
|
|
191
|
+
"role": "*",
|
|
192
|
+
"tracing": "Active",
|
|
193
|
+
"code": "*",
|
|
194
|
+
"runtime": "*",
|
|
195
|
+
"handler": "*"
|
|
196
|
+
}
|
|
199
197
|
},
|
|
200
198
|
{
|
|
201
199
|
"type": "aws:cdk:analytics:method",
|
|
202
200
|
"data": {
|
|
203
|
-
"
|
|
204
|
-
"*"
|
|
201
|
+
"addEnvironment": [
|
|
202
|
+
"*",
|
|
203
|
+
"*",
|
|
204
|
+
{
|
|
205
|
+
"removeInEdge": true
|
|
206
|
+
}
|
|
205
207
|
]
|
|
206
208
|
}
|
|
207
|
-
}
|
|
209
|
+
}
|
|
210
|
+
],
|
|
211
|
+
"/cftaplam-no-usage-plan/test-cloudfront-apigateway-lambda/LambdaFunction/Resource": [
|
|
208
212
|
{
|
|
209
|
-
"type": "aws:cdk:
|
|
213
|
+
"type": "aws:cdk:logicalId",
|
|
214
|
+
"data": "testcloudfrontapigatewaylambdaLambdaFunction17A55E65"
|
|
215
|
+
}
|
|
216
|
+
],
|
|
217
|
+
"/cftaplam-no-usage-plan/test-cloudfront-apigateway-lambda/LambdaFunction/inlinePolicyAddedToExecutionRole-0": [
|
|
218
|
+
{
|
|
219
|
+
"type": "aws:cdk:analytics:construct",
|
|
210
220
|
"data": {
|
|
211
|
-
"
|
|
212
|
-
"*"
|
|
213
|
-
]
|
|
221
|
+
"statements": "*"
|
|
214
222
|
}
|
|
215
223
|
},
|
|
216
224
|
{
|
|
@@ -220,42 +228,28 @@
|
|
|
220
228
|
{}
|
|
221
229
|
]
|
|
222
230
|
}
|
|
223
|
-
}
|
|
224
|
-
],
|
|
225
|
-
"/cftaplam-no-usage-plan/test-cloudfront-apigateway-lambda/LambdaFunctionServiceRole/DefaultPolicy/Resource": [
|
|
226
|
-
{
|
|
227
|
-
"type": "aws:cdk:logicalId",
|
|
228
|
-
"data": "testcloudfrontapigatewaylambdaLambdaFunctionServiceRoleDefaultPolicyDB7FF8EB"
|
|
229
|
-
}
|
|
230
|
-
],
|
|
231
|
-
"/cftaplam-no-usage-plan/test-cloudfront-apigateway-lambda/LambdaFunction": [
|
|
231
|
+
},
|
|
232
232
|
{
|
|
233
|
-
"type": "aws:cdk:analytics:
|
|
233
|
+
"type": "aws:cdk:analytics:method",
|
|
234
234
|
"data": {
|
|
235
|
-
"
|
|
236
|
-
|
|
237
|
-
|
|
238
|
-
"runtime": "*",
|
|
239
|
-
"handler": "*"
|
|
235
|
+
"attachToRole": [
|
|
236
|
+
"*"
|
|
237
|
+
]
|
|
240
238
|
}
|
|
241
239
|
},
|
|
242
240
|
{
|
|
243
241
|
"type": "aws:cdk:analytics:method",
|
|
244
242
|
"data": {
|
|
245
|
-
"
|
|
246
|
-
"*"
|
|
247
|
-
"*",
|
|
248
|
-
{
|
|
249
|
-
"removeInEdge": true
|
|
250
|
-
}
|
|
243
|
+
"attachToRole": [
|
|
244
|
+
"*"
|
|
251
245
|
]
|
|
252
246
|
}
|
|
253
247
|
}
|
|
254
248
|
],
|
|
255
|
-
"/cftaplam-no-usage-plan/test-cloudfront-apigateway-lambda/LambdaFunction/Resource": [
|
|
249
|
+
"/cftaplam-no-usage-plan/test-cloudfront-apigateway-lambda/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource": [
|
|
256
250
|
{
|
|
257
251
|
"type": "aws:cdk:logicalId",
|
|
258
|
-
"data": "
|
|
252
|
+
"data": "testcloudfrontapigatewaylambdaLambdaFunctioninlinePolicyAddedToExecutionRole010F5D55C"
|
|
259
253
|
}
|
|
260
254
|
],
|
|
261
255
|
"/cftaplam-no-usage-plan/test-cloudfront-apigateway-lambda/ApiAccessLogGroup": [
|
|
@@ -686,6 +680,15 @@
|
|
|
686
680
|
"type": "aws:cdk:logicalId",
|
|
687
681
|
"data": "CheckBootstrapVersion"
|
|
688
682
|
}
|
|
683
|
+
],
|
|
684
|
+
"testcloudfrontapigatewaylambdaLambdaFunctionServiceRoleDefaultPolicyDB7FF8EB": [
|
|
685
|
+
{
|
|
686
|
+
"type": "aws:cdk:logicalId",
|
|
687
|
+
"data": "testcloudfrontapigatewaylambdaLambdaFunctionServiceRoleDefaultPolicyDB7FF8EB",
|
|
688
|
+
"trace": [
|
|
689
|
+
"!!DESTRUCTIVE_CHANGES: WILL_DESTROY"
|
|
690
|
+
]
|
|
691
|
+
}
|
|
689
692
|
]
|
|
690
693
|
},
|
|
691
694
|
"displayName": "cftaplam-no-usage-plan"
|