@aws-solutions-constructs/aws-cloudfront-apigateway-lambda 2.95.1 → 2.97.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (42) hide show
  1. package/.jsii +4392 -58
  2. package/README.adoc +2 -2
  3. package/lib/index.d.ts +1 -1
  4. package/lib/index.js +2 -2
  5. package/package.json +8 -8
  6. package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/asset.0772ffe05bd3b2e012dc5086ab3b6dd03c8a0268fc1c81326f5e72b0a4c6b51e/index.js +23 -0
  7. package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/asset.faa95a81ae7d7373f3e1f242268f904eb748d8d0fdd306e8a6fe515a1905a7d6/index.js +1 -0
  8. package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/cdk.out +1 -1
  9. package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/cftaplam-customCloudfrontLoggingBucket.assets.json +8 -8
  10. package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/cftaplam-customCloudfrontLoggingBucket.template.json +4 -4
  11. package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/cftaplamcustomCloudfrontLoggingBucketIntegDefaultTestDeployAssert35A683E0.assets.json +1 -1
  12. package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/integ.json +2 -2
  13. package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/manifest.json +65 -41
  14. package/test/integ.cftaplam-customCloudfrontLoggingBucket.js.snapshot/tree.json +1 -1
  15. package/test/integ.cftaplam-no-arguments.js.snapshot/asset.0772ffe05bd3b2e012dc5086ab3b6dd03c8a0268fc1c81326f5e72b0a4c6b51e/index.js +23 -0
  16. package/test/integ.cftaplam-no-arguments.js.snapshot/asset.faa95a81ae7d7373f3e1f242268f904eb748d8d0fdd306e8a6fe515a1905a7d6/index.js +1 -0
  17. package/test/integ.cftaplam-no-arguments.js.snapshot/cdk.out +1 -1
  18. package/test/integ.cftaplam-no-arguments.js.snapshot/cftaplam-no-arguments.assets.json +8 -8
  19. package/test/integ.cftaplam-no-arguments.js.snapshot/cftaplam-no-arguments.template.json +4 -4
  20. package/test/integ.cftaplam-no-arguments.js.snapshot/cftaplamnoargumentsIntegDefaultTestDeployAssertACC32F59.assets.json +1 -1
  21. package/test/integ.cftaplam-no-arguments.js.snapshot/integ.json +2 -2
  22. package/test/integ.cftaplam-no-arguments.js.snapshot/manifest.json +65 -41
  23. package/test/integ.cftaplam-no-arguments.js.snapshot/tree.json +1 -1
  24. package/test/integ.cftaplam-no-usage-plan.js.snapshot/asset.0772ffe05bd3b2e012dc5086ab3b6dd03c8a0268fc1c81326f5e72b0a4c6b51e/index.js +23 -0
  25. package/test/integ.cftaplam-no-usage-plan.js.snapshot/asset.faa95a81ae7d7373f3e1f242268f904eb748d8d0fdd306e8a6fe515a1905a7d6/index.js +1 -0
  26. package/test/integ.cftaplam-no-usage-plan.js.snapshot/cdk.out +1 -1
  27. package/test/integ.cftaplam-no-usage-plan.js.snapshot/cftaplam-no-usage-plan.assets.json +8 -8
  28. package/test/integ.cftaplam-no-usage-plan.js.snapshot/cftaplam-no-usage-plan.template.json +4 -4
  29. package/test/integ.cftaplam-no-usage-plan.js.snapshot/cftaplamnousageplanIntegDefaultTestDeployAssertABA4F4C5.assets.json +1 -1
  30. package/test/integ.cftaplam-no-usage-plan.js.snapshot/integ.json +2 -2
  31. package/test/integ.cftaplam-no-usage-plan.js.snapshot/manifest.json +65 -41
  32. package/test/integ.cftaplam-no-usage-plan.js.snapshot/tree.json +1 -1
  33. package/test/integ.cftaplam-override-behavior.js.snapshot/asset.0772ffe05bd3b2e012dc5086ab3b6dd03c8a0268fc1c81326f5e72b0a4c6b51e/index.js +23 -0
  34. package/test/integ.cftaplam-override-behavior.js.snapshot/asset.faa95a81ae7d7373f3e1f242268f904eb748d8d0fdd306e8a6fe515a1905a7d6/index.js +1 -0
  35. package/test/integ.cftaplam-override-behavior.js.snapshot/cdk.out +1 -1
  36. package/test/integ.cftaplam-override-behavior.js.snapshot/cftaplam-override-behavior.assets.json +8 -8
  37. package/test/integ.cftaplam-override-behavior.js.snapshot/cftaplam-override-behavior.template.json +4 -4
  38. package/test/integ.cftaplam-override-behavior.js.snapshot/cftaplamoverridebehaviorIntegDefaultTestDeployAssert3DC30427.assets.json +1 -1
  39. package/test/integ.cftaplam-override-behavior.js.snapshot/integ.json +2 -2
  40. package/test/integ.cftaplam-override-behavior.js.snapshot/manifest.json +65 -41
  41. package/test/integ.cftaplam-override-behavior.js.snapshot/tree.json +1 -1
  42. package/test/test.cloudfront-apigateway-lambda.test.js +2 -2
package/README.adoc CHANGED
@@ -52,7 +52,7 @@ import * as lambda from 'aws-cdk-lib/aws-lambda';
52
52
  new CloudFrontToApiGatewayToLambda(this, 'test-cloudfront-apigateway-lambda', {
53
53
  lambdaFunctionProps: {
54
54
  code: lambda.Code.fromAsset(`lambda`),
55
- runtime: lambda.Runtime.NODEJS_20_X,
55
+ runtime: lambda.Runtime.NODEJS_22_X,
56
56
  handler: 'index.handler'
57
57
  },
58
58
  apiGatewayProps: {
@@ -109,7 +109,7 @@ import software.amazon.awsconstructs.services.cloudfrontapigatewaylambda.CloudFr
109
109
 
110
110
  new CloudFrontToApiGatewayToLambda(this, "ApiGatewayToLambdaPattern", new CloudFrontToApiGatewayToLambdaProps.Builder()
111
111
  .lambdaFunctionProps(new FunctionProps.Builder()
112
- .runtime(Runtime.NODEJS_20_X) // execution environment
112
+ .runtime(Runtime.NODEJS_22_X) // execution environment
113
113
  .code(Code.fromAsset("lambda")) // code loaded from the `lambda` directory (under root, next to `src`)
114
114
  .handler("hello.handler") // file is `hello`, function is `handler`
115
115
  .build())
package/lib/index.d.ts CHANGED
@@ -28,7 +28,7 @@ export interface CloudFrontToApiGatewayToLambdaProps {
28
28
  */
29
29
  readonly existingLambdaObj?: lambda.Function;
30
30
  /**
31
- * Optional user provided props to override the default props for the Lambda function.
31
+ * Optional - user provided props to override the default props for the Lambda function. Providing both this and `existingLambdaObj` is an error.
32
32
  *
33
33
  * @default - Default props are used
34
34
  */
package/lib/index.js CHANGED
@@ -57,5 +57,5 @@ class CloudFrontToApiGatewayToLambda extends constructs_1.Construct {
57
57
  }
58
58
  exports.CloudFrontToApiGatewayToLambda = CloudFrontToApiGatewayToLambda;
59
59
  _a = JSII_RTTI_SYMBOL_1;
60
- CloudFrontToApiGatewayToLambda[_a] = { fqn: "@aws-solutions-constructs/aws-cloudfront-apigateway-lambda.CloudFrontToApiGatewayToLambda", version: "2.95.1" };
61
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["index.ts"],"names":[],"mappings":";;;;;AAmBA,2DAA2D;AAC3D,wFAAwF;AACxF,2CAAuC;AACvC,mGAA6F;AA2E7F,MAAa,8BAA+B,SAAQ,sBAAS;IAS3D;;;;;;;OAOG;IACH,YAAY,KAAgB,EAAE,EAAU,EAAE,KAA0C;QAClF,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,QAAQ,CAAC,gBAAgB,CAAC,KAAK,CAAC,CAAC;QACjC,QAAQ,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC;QAE9B,mFAAmF;QACnF,IAAI,CAAC,KAAK,CAAC,eAAe,EAAE,oBAAoB,EAAE,iBAAiB,EAAE,CAAC;YACpE,QAAQ,CAAC,YAAY,CAAC;;4IAEgH,CAAC,CAAC;YACxI,MAAM,IAAI,KAAK,CAAC,+FAA+F,CAAC,CAAC;QACnH,CAAC;aAAM,IAAI,KAAK,CAAC,eAAe,CAAC,oBAAoB,CAAC,iBAAiB,KAAK,SAAS,EAAE,CAAC;YACtF,MAAM,IAAI,KAAK,CAAC,qGAAqG,CAAC,CAAC;QACzH,CAAC;QAED,wEAAwE;QACxE,2DAA2D;QAC3D,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC,iDAAiD,EAAE,IAAI,CAAC,CAAC;QAE9E,IAAI,CAAC,cAAc,GAAG,QAAQ,CAAC,mBAAmB,CAAC,IAAI,EAAE;YACvD,iBAAiB,EAAE,KAAK,CAAC,iBAAiB;YAC1C,mBAAmB,EAAE,KAAK,CAAC,mBAAmB;SAC/C,CAAC,CAAC;QAEH,4EAA4E;QAC5E,6EAA6E;QAC7E,MAAM,6BAA6B,GAAG,QAAQ,CAAC,qBAAqB,CAAC,IAAI,EACvE,IAAI,CAAC,cAAc,EACnB,KAAK,CAAC,eAAe,EACrB,KAAK,CAAC,aAAa,EACnB,KAAK,CAAC,eAAe,EACrB,KAAK,CAAC,CAAC;QACT,IAAI,CAAC,UAAU,GAAG,6BAA6B,CAAC,GAAG,CAAC;QACpD,IAAI,CAAC,wBAAwB,GAAG,6BAA6B,CAAC,IAAI,CAAC;QACnE,IAAI,CAAC,kBAAkB,GAAG,6BAA6B,CAAC,KAAK,CAAC;QAE9D,MAAM,aAAa,GAA2B,IAAI,kDAAsB,CAAC,IAAI,EAAE,wBAAwB,EAAE;YACvG,qBAAqB,EAAE,IAAI,CAAC,UAAU;YACtC,2BAA2B,EAAE,KAAK,CAAC,2BAA2B;YAC9D,yBAAyB,EAAE,KAAK,CAAC,yBAAyB;YAC1D,4BAA4B,EAAE,KAAK,CAAC,4BAA4B;YAChE,0BAA0B,EAAE,KAAK,CAAC,0BAA0B;SAC7D,CAAC,CAAC;QAEH,IAAI,CAAC,yBAAyB,GAAG,aAAa,CAAC,yBAAyB,CAAC;QACzE,IAAI,CAAC,kBAAkB,GAAG,aAAa,CAAC,kBAAkB,CAAC;QAC3D,IAAI,CAAC,uBAAuB,GAAG,aAAa,CAAC,uBAAuB,CAAC;IACvE,CAAC;;AAhEH,wEAiEC","sourcesContent":["/**\n *  Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n *\n *  Licensed under the Apache License, Version 2.0 (the \"License\"). You may not use this file except in compliance\n *  with the License. A copy of the License is located at\n *\n *      http://www.apache.org/licenses/LICENSE-2.0\n *\n *  or in the 'license' file accompanying this file. This file is distributed on an 'AS IS' BASIS, WITHOUT WARRANTIES\n *  OR CONDITIONS OF ANY KIND, express or implied. See the License for the specific language governing permissions\n *  and limitations under the License.\n */\n\nimport * as api from 'aws-cdk-lib/aws-apigateway';\nimport * as lambda from 'aws-cdk-lib/aws-lambda';\nimport * as cloudfront from 'aws-cdk-lib/aws-cloudfront';\nimport * as logs from 'aws-cdk-lib/aws-logs';\nimport * as s3 from 'aws-cdk-lib/aws-s3';\nimport * as iam from 'aws-cdk-lib/aws-iam';\nimport * as defaults from '@aws-solutions-constructs/core';\n// Note: To ensure CDKv2 compatibility, keep the import statement for Construct separate\nimport { Construct } from 'constructs';\nimport { CloudFrontToApiGateway } from '@aws-solutions-constructs/aws-cloudfront-apigateway';\n\n/**\n * @summary The properties for the CloudFrontToApiGatewayToLambda Construct\n */\nexport interface CloudFrontToApiGatewayToLambdaProps {\n  /**\n   * Existing instance of Lambda Function object, providing both this and `lambdaFunctionProps` will cause an error.\n   *\n   * @default - None\n   */\n  readonly existingLambdaObj?: lambda.Function,\n  /**\n   * Optional user provided props to override the default props for the Lambda function.\n   *\n   * @default - Default props are used\n   */\n  readonly lambdaFunctionProps?: lambda.FunctionProps\n  /**\n   * User provided props to override the default props for the API Gateway. As of release\n   * 2.48.0, clients must include this property with defaultMethodOptions: { authorizationType: string } specified.\n   * See Issue1043 in the github repo https://github.com/awslabs/aws-solutions-constructs/issues/1043\n   *\n   * @default - defaultMethodOptions/authorizationType is required, for other, unspecified values the\n   * default props are used\n   */\n  readonly apiGatewayProps: api.LambdaRestApiProps | any\n  /**\n   * Whether to create a Usage Plan attached to the API. Must be true if\n   * apiGatewayProps.defaultMethodOptions.apiKeyRequired is true\n   *\n   * @default - true (to match legacy behavior)\n   */\n  readonly createUsagePlan?: boolean\n  /**\n   * Optional user provided props to override the default props\n   *\n   * @default - Default props are used\n   */\n  readonly cloudFrontDistributionProps?: cloudfront.DistributionProps | any,\n  /**\n   * Optional user provided props to turn on/off the automatic injection of best practice HTTP\n   * security headers in all responses from cloudfront.\n   * Turning this on will inject default headers and is mutually exclusive with passing custom security headers\n   * via the responseHeadersPolicyProps parameter.\n   *\n   * @default - true\n   */\n  readonly insertHttpSecurityHeaders?: boolean,\n  /**\n   * Optional user provided configuration that cloudfront applies to all http responses.\n   * Can be used to pass a custom ResponseSecurityHeadersBehavior, ResponseCustomHeadersBehavior or\n   * ResponseHeadersCorsBehavior to the cloudfront distribution.\n   *\n   * Passing a custom ResponseSecurityHeadersBehavior is mutually exclusive with turning on the default security headers\n   * via `insertHttpSecurityHeaders` prop. Will throw an error if both `insertHttpSecurityHeaders` is set to `true`\n   * and ResponseSecurityHeadersBehavior is passed.\n   *\n   * @default - undefined\n   */\n  readonly responseHeadersPolicyProps?: cloudfront.ResponseHeadersPolicyProps\n  /**\n   * Optional user provided props to override the default props for the CloudWatchLogs LogGroup.\n   *\n   * @default - Default props are used\n   */\n  readonly logGroupProps?: logs.LogGroupProps\n  /**\n   * Optional user provided props to override the default props for the CloudFront Logging Bucket.\n   *\n   * @default - Default props are used\n   */\n   readonly cloudFrontLoggingBucketProps?: s3.BucketProps\n}\n\nexport class CloudFrontToApiGatewayToLambda extends Construct {\n  public readonly cloudFrontWebDistribution: cloudfront.Distribution;\n  public readonly cloudFrontFunction?: cloudfront.Function;\n  public readonly cloudFrontLoggingBucket?: s3.Bucket;\n  public readonly apiGateway: api.RestApi;\n  public readonly apiGatewayCloudWatchRole?: iam.Role;\n  public readonly apiGatewayLogGroup: logs.LogGroup;\n  public readonly lambdaFunction: lambda.Function;\n\n  /**\n   * @summary Constructs a new instance of the CloudFrontToApiGatewayToLambda class.\n   * @param {Construct} scope - represents the scope for all the resources.\n   * @param {string} id - this is a a scope-unique id.\n   * @param {CloudFrontToApiGatewayToLambdaProps} props - user provided props for the construct\n   * @since 0.8.0\n   * @access public\n   */\n  constructor(scope: Construct, id: string, props: CloudFrontToApiGatewayToLambdaProps) {\n    super(scope, id);\n    defaults.CheckLambdaProps(props);\n    defaults.CheckApiProps(props);\n\n    // CheckCloudFrontProps() is called by internal aws-cloudfront-apigateway construct\n    if (!props.apiGatewayProps?.defaultMethodOptions?.authorizationType) {\n      defaults.printWarning('As of v2.48.0, apiGatewayProps.defaultMethodOptions.authorizationType is\\\n      required. To update your instantiation call, add the following to your CloudFrontToApiGatewayToLambdaProps argument\\\n      \\n\\napiGatewayProps: { defaultMethodOptions: { authorizationType: api.AuthorizationType.NONE }},\\n\\nSee Issue1043 for an explanation.');\n      throw new Error('As of v2.48.0, an explicit authorization type is required for CloudFront/API Gateway patterns');\n    } else if (props.apiGatewayProps.defaultMethodOptions.authorizationType === \"AWS_IAM\") {\n      throw new Error('Amazon API Gateway Rest APIs integrated with Amazon CloudFront do not support AWS_IAM authorization');\n    }\n\n    // All our tests are based upon this behavior being on, so we're setting\n    // context here rather than assuming the client will set it\n    this.node.setContext(\"@aws-cdk/aws-s3:serverAccessLogsUseBucketPolicy\", true);\n\n    this.lambdaFunction = defaults.buildLambdaFunction(this, {\n      existingLambdaObj: props.existingLambdaObj,\n      lambdaFunctionProps: props.lambdaFunctionProps\n    });\n\n    // We can't default to IAM authentication with a CloudFront distribution, so\n    // we'll instruct core to not use any default auth to avoid override warnings\n    const regionalLambdaRestApiResponse = defaults.RegionalLambdaRestApi(this,\n      this.lambdaFunction,\n      props.apiGatewayProps,\n      props.logGroupProps,\n      props.createUsagePlan,\n      false);\n    this.apiGateway = regionalLambdaRestApiResponse.api;\n    this.apiGatewayCloudWatchRole = regionalLambdaRestApiResponse.role;\n    this.apiGatewayLogGroup = regionalLambdaRestApiResponse.group;\n\n    const apiCloudfront: CloudFrontToApiGateway = new CloudFrontToApiGateway(this, 'CloudFrontToApiGateway', {\n      existingApiGatewayObj: this.apiGateway,\n      cloudFrontDistributionProps: props.cloudFrontDistributionProps,\n      insertHttpSecurityHeaders: props.insertHttpSecurityHeaders,\n      cloudFrontLoggingBucketProps: props.cloudFrontLoggingBucketProps,\n      responseHeadersPolicyProps: props.responseHeadersPolicyProps\n    });\n\n    this.cloudFrontWebDistribution = apiCloudfront.cloudFrontWebDistribution;\n    this.cloudFrontFunction = apiCloudfront.cloudFrontFunction;\n    this.cloudFrontLoggingBucket = apiCloudfront.cloudFrontLoggingBucket;\n  }\n}\n"]}
60
+ CloudFrontToApiGatewayToLambda[_a] = { fqn: "@aws-solutions-constructs/aws-cloudfront-apigateway-lambda.CloudFrontToApiGatewayToLambda", version: "2.97.0" };
61
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["index.ts"],"names":[],"mappings":";;;;;AAmBA,2DAA2D;AAC3D,wFAAwF;AACxF,2CAAuC;AACvC,mGAA6F;AA2E7F,MAAa,8BAA+B,SAAQ,sBAAS;IAS3D;;;;;;;OAOG;IACH,YAAY,KAAgB,EAAE,EAAU,EAAE,KAA0C;QAClF,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,QAAQ,CAAC,gBAAgB,CAAC,KAAK,CAAC,CAAC;QACjC,QAAQ,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC;QAE9B,mFAAmF;QACnF,IAAI,CAAC,KAAK,CAAC,eAAe,EAAE,oBAAoB,EAAE,iBAAiB,EAAE,CAAC;YACpE,QAAQ,CAAC,YAAY,CAAC;;4IAEgH,CAAC,CAAC;YACxI,MAAM,IAAI,KAAK,CAAC,+FAA+F,CAAC,CAAC;QACnH,CAAC;aAAM,IAAI,KAAK,CAAC,eAAe,CAAC,oBAAoB,CAAC,iBAAiB,KAAK,SAAS,EAAE,CAAC;YACtF,MAAM,IAAI,KAAK,CAAC,qGAAqG,CAAC,CAAC;QACzH,CAAC;QAED,wEAAwE;QACxE,2DAA2D;QAC3D,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC,iDAAiD,EAAE,IAAI,CAAC,CAAC;QAE9E,IAAI,CAAC,cAAc,GAAG,QAAQ,CAAC,mBAAmB,CAAC,IAAI,EAAE;YACvD,iBAAiB,EAAE,KAAK,CAAC,iBAAiB;YAC1C,mBAAmB,EAAE,KAAK,CAAC,mBAAmB;SAC/C,CAAC,CAAC;QAEH,4EAA4E;QAC5E,6EAA6E;QAC7E,MAAM,6BAA6B,GAAG,QAAQ,CAAC,qBAAqB,CAAC,IAAI,EACvE,IAAI,CAAC,cAAc,EACnB,KAAK,CAAC,eAAe,EACrB,KAAK,CAAC,aAAa,EACnB,KAAK,CAAC,eAAe,EACrB,KAAK,CAAC,CAAC;QACT,IAAI,CAAC,UAAU,GAAG,6BAA6B,CAAC,GAAG,CAAC;QACpD,IAAI,CAAC,wBAAwB,GAAG,6BAA6B,CAAC,IAAI,CAAC;QACnE,IAAI,CAAC,kBAAkB,GAAG,6BAA6B,CAAC,KAAK,CAAC;QAE9D,MAAM,aAAa,GAA2B,IAAI,kDAAsB,CAAC,IAAI,EAAE,wBAAwB,EAAE;YACvG,qBAAqB,EAAE,IAAI,CAAC,UAAU;YACtC,2BAA2B,EAAE,KAAK,CAAC,2BAA2B;YAC9D,yBAAyB,EAAE,KAAK,CAAC,yBAAyB;YAC1D,4BAA4B,EAAE,KAAK,CAAC,4BAA4B;YAChE,0BAA0B,EAAE,KAAK,CAAC,0BAA0B;SAC7D,CAAC,CAAC;QAEH,IAAI,CAAC,yBAAyB,GAAG,aAAa,CAAC,yBAAyB,CAAC;QACzE,IAAI,CAAC,kBAAkB,GAAG,aAAa,CAAC,kBAAkB,CAAC;QAC3D,IAAI,CAAC,uBAAuB,GAAG,aAAa,CAAC,uBAAuB,CAAC;IACvE,CAAC;;AAhEH,wEAiEC","sourcesContent":["/**\n *  Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n *\n *  Licensed under the Apache License, Version 2.0 (the \"License\"). You may not use this file except in compliance\n *  with the License. A copy of the License is located at\n *\n *      http://www.apache.org/licenses/LICENSE-2.0\n *\n *  or in the 'license' file accompanying this file. This file is distributed on an 'AS IS' BASIS, WITHOUT WARRANTIES\n *  OR CONDITIONS OF ANY KIND, express or implied. See the License for the specific language governing permissions\n *  and limitations under the License.\n */\n\nimport * as api from 'aws-cdk-lib/aws-apigateway';\nimport * as lambda from 'aws-cdk-lib/aws-lambda';\nimport * as cloudfront from 'aws-cdk-lib/aws-cloudfront';\nimport * as logs from 'aws-cdk-lib/aws-logs';\nimport * as s3 from 'aws-cdk-lib/aws-s3';\nimport * as iam from 'aws-cdk-lib/aws-iam';\nimport * as defaults from '@aws-solutions-constructs/core';\n// Note: To ensure CDKv2 compatibility, keep the import statement for Construct separate\nimport { Construct } from 'constructs';\nimport { CloudFrontToApiGateway } from '@aws-solutions-constructs/aws-cloudfront-apigateway';\n\n/**\n * @summary The properties for the CloudFrontToApiGatewayToLambda Construct\n */\nexport interface CloudFrontToApiGatewayToLambdaProps {\n  /**\n   * Existing instance of Lambda Function object, providing both this and `lambdaFunctionProps` will cause an error.\n   *\n   * @default - None\n   */\n  readonly existingLambdaObj?: lambda.Function,\n  /**\n   * Optional - user provided props to override the default props for the Lambda function. Providing both this and `existingLambdaObj` is an error.\n   *\n   * @default - Default props are used\n   */\n  readonly lambdaFunctionProps?: lambda.FunctionProps\n  /**\n   * User provided props to override the default props for the API Gateway. As of release\n   * 2.48.0, clients must include this property with defaultMethodOptions: { authorizationType: string } specified.\n   * See Issue1043 in the github repo https://github.com/awslabs/aws-solutions-constructs/issues/1043\n   *\n   * @default - defaultMethodOptions/authorizationType is required, for other, unspecified values the\n   * default props are used\n   */\n  readonly apiGatewayProps: api.LambdaRestApiProps | any\n  /**\n   * Whether to create a Usage Plan attached to the API. Must be true if\n   * apiGatewayProps.defaultMethodOptions.apiKeyRequired is true\n   *\n   * @default - true (to match legacy behavior)\n   */\n  readonly createUsagePlan?: boolean\n  /**\n   * Optional user provided props to override the default props\n   *\n   * @default - Default props are used\n   */\n  readonly cloudFrontDistributionProps?: cloudfront.DistributionProps | any,\n  /**\n   * Optional user provided props to turn on/off the automatic injection of best practice HTTP\n   * security headers in all responses from cloudfront.\n   * Turning this on will inject default headers and is mutually exclusive with passing custom security headers\n   * via the responseHeadersPolicyProps parameter.\n   *\n   * @default - true\n   */\n  readonly insertHttpSecurityHeaders?: boolean,\n  /**\n   * Optional user provided configuration that cloudfront applies to all http responses.\n   * Can be used to pass a custom ResponseSecurityHeadersBehavior, ResponseCustomHeadersBehavior or\n   * ResponseHeadersCorsBehavior to the cloudfront distribution.\n   *\n   * Passing a custom ResponseSecurityHeadersBehavior is mutually exclusive with turning on the default security headers\n   * via `insertHttpSecurityHeaders` prop. Will throw an error if both `insertHttpSecurityHeaders` is set to `true`\n   * and ResponseSecurityHeadersBehavior is passed.\n   *\n   * @default - undefined\n   */\n  readonly responseHeadersPolicyProps?: cloudfront.ResponseHeadersPolicyProps\n  /**\n   * Optional user provided props to override the default props for the CloudWatchLogs LogGroup.\n   *\n   * @default - Default props are used\n   */\n  readonly logGroupProps?: logs.LogGroupProps\n  /**\n   * Optional user provided props to override the default props for the CloudFront Logging Bucket.\n   *\n   * @default - Default props are used\n   */\n   readonly cloudFrontLoggingBucketProps?: s3.BucketProps\n}\n\nexport class CloudFrontToApiGatewayToLambda extends Construct {\n  public readonly cloudFrontWebDistribution: cloudfront.Distribution;\n  public readonly cloudFrontFunction?: cloudfront.Function;\n  public readonly cloudFrontLoggingBucket?: s3.Bucket;\n  public readonly apiGateway: api.RestApi;\n  public readonly apiGatewayCloudWatchRole?: iam.Role;\n  public readonly apiGatewayLogGroup: logs.LogGroup;\n  public readonly lambdaFunction: lambda.Function;\n\n  /**\n   * @summary Constructs a new instance of the CloudFrontToApiGatewayToLambda class.\n   * @param {Construct} scope - represents the scope for all the resources.\n   * @param {string} id - this is a a scope-unique id.\n   * @param {CloudFrontToApiGatewayToLambdaProps} props - user provided props for the construct\n   * @since 0.8.0\n   * @access public\n   */\n  constructor(scope: Construct, id: string, props: CloudFrontToApiGatewayToLambdaProps) {\n    super(scope, id);\n    defaults.CheckLambdaProps(props);\n    defaults.CheckApiProps(props);\n\n    // CheckCloudFrontProps() is called by internal aws-cloudfront-apigateway construct\n    if (!props.apiGatewayProps?.defaultMethodOptions?.authorizationType) {\n      defaults.printWarning('As of v2.48.0, apiGatewayProps.defaultMethodOptions.authorizationType is\\\n      required. To update your instantiation call, add the following to your CloudFrontToApiGatewayToLambdaProps argument\\\n      \\n\\napiGatewayProps: { defaultMethodOptions: { authorizationType: api.AuthorizationType.NONE }},\\n\\nSee Issue1043 for an explanation.');\n      throw new Error('As of v2.48.0, an explicit authorization type is required for CloudFront/API Gateway patterns');\n    } else if (props.apiGatewayProps.defaultMethodOptions.authorizationType === \"AWS_IAM\") {\n      throw new Error('Amazon API Gateway Rest APIs integrated with Amazon CloudFront do not support AWS_IAM authorization');\n    }\n\n    // All our tests are based upon this behavior being on, so we're setting\n    // context here rather than assuming the client will set it\n    this.node.setContext(\"@aws-cdk/aws-s3:serverAccessLogsUseBucketPolicy\", true);\n\n    this.lambdaFunction = defaults.buildLambdaFunction(this, {\n      existingLambdaObj: props.existingLambdaObj,\n      lambdaFunctionProps: props.lambdaFunctionProps\n    });\n\n    // We can't default to IAM authentication with a CloudFront distribution, so\n    // we'll instruct core to not use any default auth to avoid override warnings\n    const regionalLambdaRestApiResponse = defaults.RegionalLambdaRestApi(this,\n      this.lambdaFunction,\n      props.apiGatewayProps,\n      props.logGroupProps,\n      props.createUsagePlan,\n      false);\n    this.apiGateway = regionalLambdaRestApiResponse.api;\n    this.apiGatewayCloudWatchRole = regionalLambdaRestApiResponse.role;\n    this.apiGatewayLogGroup = regionalLambdaRestApiResponse.group;\n\n    const apiCloudfront: CloudFrontToApiGateway = new CloudFrontToApiGateway(this, 'CloudFrontToApiGateway', {\n      existingApiGatewayObj: this.apiGateway,\n      cloudFrontDistributionProps: props.cloudFrontDistributionProps,\n      insertHttpSecurityHeaders: props.insertHttpSecurityHeaders,\n      cloudFrontLoggingBucketProps: props.cloudFrontLoggingBucketProps,\n      responseHeadersPolicyProps: props.responseHeadersPolicyProps\n    });\n\n    this.cloudFrontWebDistribution = apiCloudfront.cloudFrontWebDistribution;\n    this.cloudFrontFunction = apiCloudfront.cloudFrontFunction;\n    this.cloudFrontLoggingBucket = apiCloudfront.cloudFrontLoggingBucket;\n  }\n}\n"]}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@aws-solutions-constructs/aws-cloudfront-apigateway-lambda",
3
- "version": "2.95.1",
3
+ "version": "2.97.0",
4
4
  "description": "CDK Constructs for AWS Cloudfront to AWS API Gateway to AWS Lambda integration.",
5
5
  "main": "lib/index.js",
6
6
  "types": "lib/index.d.ts",
@@ -55,16 +55,16 @@
55
55
  }
56
56
  },
57
57
  "dependencies": {
58
- "@aws-solutions-constructs/aws-cloudfront-apigateway": "2.95.1",
59
- "@aws-solutions-constructs/core": "2.95.1",
58
+ "@aws-solutions-constructs/aws-cloudfront-apigateway": "2.97.0",
59
+ "@aws-solutions-constructs/core": "2.97.0",
60
60
  "constructs": "^10.0.0"
61
61
  },
62
62
  "devDependencies": {
63
- "@aws-cdk/integ-tests-alpha": "2.223.0-alpha.0",
63
+ "@aws-cdk/integ-tests-alpha": "2.233.0-alpha.0",
64
64
  "@types/jest": "^27.4.0",
65
65
  "@types/node": "^10.3.0",
66
66
  "constructs": "^10.0.0",
67
- "aws-cdk-lib": "2.223.0"
67
+ "aws-cdk-lib": "2.233.0"
68
68
  },
69
69
  "jest": {
70
70
  "moduleFileExtensions": [
@@ -81,10 +81,10 @@
81
81
  ]
82
82
  },
83
83
  "peerDependencies": {
84
- "@aws-solutions-constructs/core": "2.95.1",
85
- "@aws-solutions-constructs/aws-cloudfront-apigateway": "2.95.1",
84
+ "@aws-solutions-constructs/core": "2.97.0",
85
+ "@aws-solutions-constructs/aws-cloudfront-apigateway": "2.97.0",
86
86
  "constructs": "^10.0.0",
87
- "aws-cdk-lib": "^2.223.0"
87
+ "aws-cdk-lib": "^2.233.0"
88
88
  },
89
89
  "keywords": [
90
90
  "aws",
@@ -0,0 +1,23 @@
1
+ /**
2
+ * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
3
+ *
4
+ * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance
5
+ * with the License. A copy of the License is located at
6
+ *
7
+ * http://www.apache.org/licenses/LICENSE-2.0
8
+ *
9
+ * or in the 'license' file accompanying this file. This file is distributed on an 'AS IS' BASIS, WITHOUT WARRANTIES
10
+ * OR CONDITIONS OF ANY KIND, express or implied. See the License for the specific language governing permissions
11
+ * and limitations under the License.
12
+ */
13
+
14
+ console.log('Loading function');
15
+
16
+ exports.handler = async (event, context) => {
17
+ console.log('Received event:', JSON.stringify(event, null, 2));
18
+     return {
19
+       statusCode: 200,
20
+       headers: { 'Content-Type': 'text/plain' },
21
+       body: `Hello from AWS Solutions Constructs! You've hit ${event.path}\n`
22
+     };
23
+ };
@@ -0,0 +1 @@
1
+ "use strict";var f=Object.create,i=Object.defineProperty,I=Object.getOwnPropertyDescriptor,C=Object.getOwnPropertyNames,w=Object.getPrototypeOf,P=Object.prototype.hasOwnProperty,A=(t,e)=>{for(var o in e)i(t,o,{get:e[o],enumerable:!0})},d=(t,e,o,r)=>{if(e&&typeof e=="object"||typeof e=="function")for(let s of C(e))!P.call(t,s)&&s!==o&&i(t,s,{get:()=>e[s],enumerable:!(r=I(e,s))||r.enumerable});return t},l=(t,e,o)=>(o=t!=null?f(w(t)):{},d(e||!t||!t.__esModule?i(o,"default",{value:t,enumerable:!0}):o,t)),B=t=>d(i({},"__esModule",{value:!0}),t),q={};A(q,{autoDeleteHandler:()=>S,handler:()=>H}),module.exports=B(q);var h=require("@aws-sdk/client-s3"),y=l(require("https")),m=l(require("url")),a={sendHttpRequest:D,log:T,includeStackTraces:!0,userHandlerIndex:"./index"},p="AWSCDK::CustomResourceProviderFramework::CREATE_FAILED",L="AWSCDK::CustomResourceProviderFramework::MISSING_PHYSICAL_ID";function R(t){return async(e,o)=>{let r={...e,ResponseURL:"..."};if(a.log(JSON.stringify(r,void 0,2)),e.RequestType==="Delete"&&e.PhysicalResourceId===p){a.log("ignoring DELETE event caused by a failed CREATE event"),await u("SUCCESS",e);return}try{let s=await t(r,o),n=k(e,s);await u("SUCCESS",n)}catch(s){let n={...e,Reason:a.includeStackTraces?s.stack:s.message};n.PhysicalResourceId||(e.RequestType==="Create"?(a.log("CREATE failed, responding with a marker physical resource id so that the subsequent DELETE will be ignored"),n.PhysicalResourceId=p):a.log(`ERROR: Malformed event. "PhysicalResourceId" is required: ${JSON.stringify(e)}`)),await u("FAILED",n)}}}function k(t,e={}){let o=e.PhysicalResourceId??t.PhysicalResourceId??t.RequestId;if(t.RequestType==="Delete"&&o!==t.PhysicalResourceId)throw new Error(`DELETE: cannot change the physical resource ID from "${t.PhysicalResourceId}" to "${e.PhysicalResourceId}" during deletion`);return{...t,...e,PhysicalResourceId:o}}async function u(t,e){let o={Status:t,Reason:e.Reason??t,StackId:e.StackId,RequestId:e.RequestId,PhysicalResourceId:e.PhysicalResourceId||L,LogicalResourceId:e.LogicalResourceId,NoEcho:e.NoEcho,Data:e.Data},r=m.parse(e.ResponseURL),s=`${r.protocol}//${r.hostname}/${r.pathname}?***`;a.log("submit response to cloudformation",s,o);let n=JSON.stringify(o),E={hostname:r.hostname,path:r.path,method:"PUT",headers:{"content-type":"","content-length":Buffer.byteLength(n,"utf8")}};await O({attempts:5,sleep:1e3},a.sendHttpRequest)(E,n)}async function D(t,e){return new Promise((o,r)=>{try{let s=y.request(t,n=>{n.resume(),!n.statusCode||n.statusCode>=400?r(new Error(`Unsuccessful HTTP response: ${n.statusCode}`)):o()});s.on("error",r),s.write(e),s.end()}catch(s){r(s)}})}function T(t,...e){console.log(t,...e)}function O(t,e){return async(...o)=>{let r=t.attempts,s=t.sleep;for(;;)try{return await e(...o)}catch(n){if(r--<=0)throw n;await b(Math.floor(Math.random()*s)),s*=2}}}async function b(t){return new Promise(e=>setTimeout(e,t))}var g="aws-cdk:auto-delete-objects",x=JSON.stringify({Version:"2012-10-17",Statement:[]}),c=new h.S3({}),H=R(S);async function S(t){switch(t.RequestType){case"Create":return;case"Update":return{PhysicalResourceId:(await F(t)).PhysicalResourceId};case"Delete":return N(t.ResourceProperties?.BucketName)}}async function F(t){let e=t,o=e.OldResourceProperties?.BucketName;return{PhysicalResourceId:e.ResourceProperties?.BucketName??o}}async function _(t){try{let e=(await c.getBucketPolicy({Bucket:t}))?.Policy??x,o=JSON.parse(e);o.Statement.push({Principal:"*",Effect:"Deny",Action:["s3:PutObject"],Resource:[`arn:aws:s3:::${t}/*`]}),await c.putBucketPolicy({Bucket:t,Policy:JSON.stringify(o)})}catch(e){if(e.name==="NoSuchBucket")throw e;console.log(`Could not set new object deny policy on bucket '${t}' prior to deletion.`)}}async function U(t){let e;do{e=await c.listObjectVersions({Bucket:t});let o=[...e.Versions??[],...e.DeleteMarkers??[]];if(o.length===0)return;let r=o.map(s=>({Key:s.Key,VersionId:s.VersionId}));await c.deleteObjects({Bucket:t,Delete:{Objects:r}})}while(e?.IsTruncated)}async function N(t){if(!t)throw new Error("No BucketName was provided.");try{if(!await W(t)){console.log(`Bucket does not have '${g}' tag, skipping cleaning.`);return}await _(t),await U(t)}catch(e){if(e.name==="NoSuchBucket"){console.log(`Bucket '${t}' does not exist.`);return}throw e}}async function W(t){return(await c.getBucketTagging({Bucket:t})).TagSet?.some(o=>o.Key===g&&o.Value==="true")}
@@ -1 +1 @@
1
- {"version":"45.0.0"}
1
+ {"version":"48.0.0"}
@@ -1,16 +1,16 @@
1
1
  {
2
- "version": "45.0.0",
2
+ "version": "48.0.0",
3
3
  "files": {
4
- "3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f": {
4
+ "0772ffe05bd3b2e012dc5086ab3b6dd03c8a0268fc1c81326f5e72b0a4c6b51e": {
5
5
  "displayName": "cftaplam-customCloudfrontLoggingBucket-authorizerAuthFunction/Code",
6
6
  "source": {
7
- "path": "asset.3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f",
7
+ "path": "asset.0772ffe05bd3b2e012dc5086ab3b6dd03c8a0268fc1c81326f5e72b0a4c6b51e",
8
8
  "packaging": "zip"
9
9
  },
10
10
  "destinations": {
11
- "current_account-current_region-7f03e0f4": {
11
+ "current_account-current_region-1a238803": {
12
12
  "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
13
- "objectKey": "3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f.zip",
13
+ "objectKey": "0772ffe05bd3b2e012dc5086ab3b6dd03c8a0268fc1c81326f5e72b0a4c6b51e.zip",
14
14
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
15
15
  }
16
16
  }
@@ -29,16 +29,16 @@
29
29
  }
30
30
  }
31
31
  },
32
- "538cf76188992868036513a790fb4d2494c8d4aa9667db10ea43da6a11e92f9e": {
32
+ "6c6309f3099f0198c3896bb74b614bf6ccb54a69ea6dd4d33505d8ba8cf2e575": {
33
33
  "displayName": "cftaplam-customCloudfrontLoggingBucket Template",
34
34
  "source": {
35
35
  "path": "cftaplam-customCloudfrontLoggingBucket.template.json",
36
36
  "packaging": "file"
37
37
  },
38
38
  "destinations": {
39
- "current_account-current_region-e7568c9d": {
39
+ "current_account-current_region-fcc6f56f": {
40
40
  "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
41
- "objectKey": "538cf76188992868036513a790fb4d2494c8d4aa9667db10ea43da6a11e92f9e.json",
41
+ "objectKey": "6c6309f3099f0198c3896bb74b614bf6ccb54a69ea6dd4d33505d8ba8cf2e575.json",
42
42
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
43
43
  }
44
44
  }
@@ -39,7 +39,7 @@
39
39
  "S3Bucket": {
40
40
  "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
41
41
  },
42
- "S3Key": "3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f.zip"
42
+ "S3Key": "0772ffe05bd3b2e012dc5086ab3b6dd03c8a0268fc1c81326f5e72b0a4c6b51e.zip"
43
43
  },
44
44
  "Handler": ".handler",
45
45
  "Role": {
@@ -48,7 +48,7 @@
48
48
  "Arn"
49
49
  ]
50
50
  },
51
- "Runtime": "nodejs20.x"
51
+ "Runtime": "nodejs22.x"
52
52
  },
53
53
  "DependsOn": [
54
54
  "cftaplamcustomCloudfrontLoggingBucketauthorizerAuthFunctionServiceRole00AAA44C"
@@ -242,7 +242,7 @@
242
242
  "S3Bucket": {
243
243
  "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
244
244
  },
245
- "S3Key": "3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f.zip"
245
+ "S3Key": "0772ffe05bd3b2e012dc5086ab3b6dd03c8a0268fc1c81326f5e72b0a4c6b51e.zip"
246
246
  },
247
247
  "Environment": {
248
248
  "Variables": {
@@ -256,7 +256,7 @@
256
256
  "Arn"
257
257
  ]
258
258
  },
259
- "Runtime": "nodejs20.x",
259
+ "Runtime": "nodejs22.x",
260
260
  "TracingConfig": {
261
261
  "Mode": "Active"
262
262
  }
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "45.0.0",
2
+ "version": "48.0.0",
3
3
  "files": {
4
4
  "21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22": {
5
5
  "displayName": "cftaplamcustomCloudfrontLoggingBucketIntegDefaultTestDeployAssert35A683E0 Template",
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "45.0.0",
2
+ "version": "48.0.0",
3
3
  "testCases": {
4
4
  "cftaplam-customCloudfrontLoggingBucket/Integ/DefaultTest": {
5
5
  "stacks": [
@@ -9,5 +9,5 @@
9
9
  "assertionStackName": "cftaplamcustomCloudfrontLoggingBucketIntegDefaultTestDeployAssert35A683E0"
10
10
  }
11
11
  },
12
- "minimumCliVersion": "2.1020.2"
12
+ "minimumCliVersion": "2.1029.2"
13
13
  }
@@ -66,7 +66,7 @@
66
66
  "validateOnSynth": false,
67
67
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
68
68
  "cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
69
- "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/538cf76188992868036513a790fb4d2494c8d4aa9667db10ea43da6a11e92f9e.json",
69
+ "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/6c6309f3099f0198c3896bb74b614bf6ccb54a69ea6dd4d33505d8ba8cf2e575.json",
70
70
  "requiresBootstrapStackVersion": 6,
71
71
  "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
72
72
  "additionalDependencies": [
@@ -707,57 +707,48 @@
707
707
  "properties": {
708
708
  "module": "aws-cdk-lib",
709
709
  "flags": {
710
- "@aws-cdk/core:enableStackNameDuplicates": {
710
+ "@aws-cdk/aws-signer:signingProfileNamePassedToCfn": {
711
711
  "recommendedValue": true,
712
- "explanation": "Allow multiple stacks with the same name"
713
- },
714
- "aws-cdk:enableDiffNoFail": {
715
- "recommendedValue": true,
716
- "explanation": "Make `cdk diff` not fail when there are differences"
712
+ "explanation": "Pass signingProfileName to CfnSigningProfile"
717
713
  },
718
714
  "@aws-cdk/core:newStyleStackSynthesis": {
719
715
  "recommendedValue": true,
720
- "explanation": "Switch to new stack synthesis method which enables CI/CD"
716
+ "explanation": "Switch to new stack synthesis method which enables CI/CD",
717
+ "unconfiguredBehavesLike": {
718
+ "v2": true
719
+ }
721
720
  },
722
721
  "@aws-cdk/core:stackRelativeExports": {
723
722
  "recommendedValue": true,
724
- "explanation": "Name exports based on the construct paths relative to the stack, rather than the global construct path"
725
- },
726
- "@aws-cdk/aws-ecr-assets:dockerIgnoreSupport": {
727
- "recommendedValue": true,
728
- "explanation": "DockerImageAsset properly supports `.dockerignore` files by default"
729
- },
730
- "@aws-cdk/aws-secretsmanager:parseOwnedSecretName": {
731
- "recommendedValue": true,
732
- "explanation": "Fix the referencing of SecretsManager names from ARNs"
733
- },
734
- "@aws-cdk/aws-kms:defaultKeyPolicies": {
735
- "recommendedValue": true,
736
- "explanation": "Tighten default KMS key policies"
737
- },
738
- "@aws-cdk/aws-s3:grantWriteWithoutAcl": {
739
- "recommendedValue": true,
740
- "explanation": "Remove `PutObjectAcl` from Bucket.grantWrite"
723
+ "explanation": "Name exports based on the construct paths relative to the stack, rather than the global construct path",
724
+ "unconfiguredBehavesLike": {
725
+ "v2": true
726
+ }
741
727
  },
742
- "@aws-cdk/aws-ecs-patterns:removeDefaultDesiredCount": {
728
+ "@aws-cdk/aws-ecs-patterns:secGroupsDisablesImplicitOpenListener": {
743
729
  "recommendedValue": true,
744
- "explanation": "Do not specify a default DesiredCount for ECS services"
730
+ "explanation": "Disable implicit openListener when custom security groups are provided"
745
731
  },
746
732
  "@aws-cdk/aws-rds:lowercaseDbIdentifier": {
747
733
  "recommendedValue": true,
748
- "explanation": "Force lowercasing of RDS Cluster names in CDK"
734
+ "explanation": "Force lowercasing of RDS Cluster names in CDK",
735
+ "unconfiguredBehavesLike": {
736
+ "v2": true
737
+ }
749
738
  },
750
739
  "@aws-cdk/aws-apigateway:usagePlanKeyOrderInsensitiveId": {
751
740
  "recommendedValue": true,
752
- "explanation": "Allow adding/removing multiple UsagePlanKeys independently"
753
- },
754
- "@aws-cdk/aws-efs:defaultEncryptionAtRest": {
755
- "recommendedValue": true,
756
- "explanation": "Enable this feature flag to have elastic file systems encrypted at rest by default."
741
+ "explanation": "Allow adding/removing multiple UsagePlanKeys independently",
742
+ "unconfiguredBehavesLike": {
743
+ "v2": true
744
+ }
757
745
  },
758
746
  "@aws-cdk/aws-lambda:recognizeVersionProps": {
759
747
  "recommendedValue": true,
760
- "explanation": "Enable this feature flag to opt in to the updated logical id calculation for Lambda Version created using the `fn.currentVersion`."
748
+ "explanation": "Enable this feature flag to opt in to the updated logical id calculation for Lambda Version created using the `fn.currentVersion`.",
749
+ "unconfiguredBehavesLike": {
750
+ "v2": true
751
+ }
761
752
  },
762
753
  "@aws-cdk/aws-lambda:recognizeLayerVersion": {
763
754
  "userValue": true,
@@ -766,7 +757,10 @@
766
757
  },
767
758
  "@aws-cdk/aws-cloudfront:defaultSecurityPolicyTLSv1.2_2021": {
768
759
  "recommendedValue": true,
769
- "explanation": "Enable this feature flag to have cloudfront distributions use the security policy TLSv1.2_2021 by default."
760
+ "explanation": "Enable this feature flag to have cloudfront distributions use the security policy TLSv1.2_2021 by default.",
761
+ "unconfiguredBehavesLike": {
762
+ "v2": true
763
+ }
770
764
  },
771
765
  "@aws-cdk/core:checkSecretUsage": {
772
766
  "userValue": true,
@@ -843,7 +837,7 @@
843
837
  "@aws-cdk/aws-iam:importedRoleStackSafeDefaultPolicyName": {
844
838
  "userValue": true,
845
839
  "recommendedValue": true,
846
- "explanation": "Enable this feature to by default create default policy names for imported roles that depend on the stack the role is in."
840
+ "explanation": "Enable this feature to create default policy names for imported roles that depend on the stack the role is in."
847
841
  },
848
842
  "@aws-cdk/aws-s3:serverAccessLogsUseBucketPolicy": {
849
843
  "userValue": true,
@@ -987,7 +981,10 @@
987
981
  },
988
982
  "@aws-cdk/pipelines:reduceAssetRoleTrustScope": {
989
983
  "recommendedValue": true,
990
- "explanation": "Remove the root account principal from PipelineAssetsFileRole trust policy"
984
+ "explanation": "Remove the root account principal from PipelineAssetsFileRole trust policy",
985
+ "unconfiguredBehavesLike": {
986
+ "v2": true
987
+ }
991
988
  },
992
989
  "@aws-cdk/aws-eks:nodegroupNameAttribute": {
993
990
  "userValue": true,
@@ -1016,7 +1013,10 @@
1016
1013
  },
1017
1014
  "@aws-cdk/aws-stepfunctions-tasks:useNewS3UriParametersForBedrockInvokeModelTask": {
1018
1015
  "recommendedValue": true,
1019
- "explanation": "When enabled, use new props for S3 URI field in task definition of state machine for bedrock invoke model."
1016
+ "explanation": "When enabled, use new props for S3 URI field in task definition of state machine for bedrock invoke model.",
1017
+ "unconfiguredBehavesLike": {
1018
+ "v2": true
1019
+ }
1020
1020
  },
1021
1021
  "@aws-cdk/core:explicitStackTags": {
1022
1022
  "userValue": true,
@@ -1080,7 +1080,10 @@
1080
1080
  },
1081
1081
  "@aws-cdk/core:aspectStabilization": {
1082
1082
  "recommendedValue": true,
1083
- "explanation": "When enabled, a stabilization loop will be run when invoking Aspects during synthesis."
1083
+ "explanation": "When enabled, a stabilization loop will be run when invoking Aspects during synthesis.",
1084
+ "unconfiguredBehavesLike": {
1085
+ "v2": true
1086
+ }
1084
1087
  },
1085
1088
  "@aws-cdk/aws-route53-targets:userPoolDomainNameMethodWithoutCustomResource": {
1086
1089
  "userValue": true,
@@ -1114,7 +1117,10 @@
1114
1117
  },
1115
1118
  "@aws-cdk/pipelines:reduceStageRoleTrustScope": {
1116
1119
  "recommendedValue": true,
1117
- "explanation": "Remove the root account principal from Stage addActions trust policy"
1120
+ "explanation": "Remove the root account principal from Stage addActions trust policy",
1121
+ "unconfiguredBehavesLike": {
1122
+ "v2": true
1123
+ }
1118
1124
  },
1119
1125
  "@aws-cdk/aws-events:requireEventBusPolicySid": {
1120
1126
  "userValue": true,
@@ -1137,7 +1143,10 @@
1137
1143
  },
1138
1144
  "@aws-cdk/pipelines:reduceCrossAccountActionRoleTrustScope": {
1139
1145
  "recommendedValue": true,
1140
- "explanation": "When enabled, scopes down the trust policy for the cross-account action role"
1146
+ "explanation": "When enabled, scopes down the trust policy for the cross-account action role",
1147
+ "unconfiguredBehavesLike": {
1148
+ "v2": true
1149
+ }
1141
1150
  },
1142
1151
  "@aws-cdk/aws-stepfunctions:useDistributedMapResultWriterV2": {
1143
1152
  "userValue": true,
@@ -1167,6 +1176,21 @@
1167
1176
  "userValue": true,
1168
1177
  "recommendedValue": true,
1169
1178
  "explanation": "When enabled, CDK creates and manages loggroup for the lambda function"
1179
+ },
1180
+ "@aws-cdk/aws-elasticloadbalancingv2:networkLoadBalancerWithSecurityGroupByDefault": {
1181
+ "recommendedValue": true,
1182
+ "explanation": "When enabled, Network Load Balancer will be created with a security group by default."
1183
+ },
1184
+ "@aws-cdk/aws-stepfunctions-tasks:httpInvokeDynamicJsonPathEndpoint": {
1185
+ "recommendedValue": true,
1186
+ "explanation": "When enabled, allows using a dynamic apiEndpoint with JSONPath format in HttpInvoke tasks.",
1187
+ "unconfiguredBehavesLike": {
1188
+ "v2": true
1189
+ }
1190
+ },
1191
+ "@aws-cdk/aws-ecs-patterns:uniqueTargetGroupId": {
1192
+ "recommendedValue": true,
1193
+ "explanation": "When enabled, ECS patterns will generate unique target group IDs to prevent conflicts during load balancer replacement"
1170
1194
  }
1171
1195
  }
1172
1196
  }