@aws-solutions-constructs/aws-eventbridge-lambda 2.50.0 → 2.52.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (38) hide show
  1. package/.eslintignore +2 -0
  2. package/.jsii +50 -5
  3. package/integ.config.json +7 -0
  4. package/lib/index.js +1 -1
  5. package/package.json +12 -11
  6. package/test/integ.evtlam-eventbridge-existing-eventbus.js +5 -2
  7. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/asset.42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c/index.js +10 -0
  8. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/cdk.out +1 -0
  9. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/evtlam-eventbridge-existing-eventbus.assets.json +32 -0
  10. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/evtlam-eventbridge-existing-eventbus.template.json +226 -0
  11. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/evtlameventbridgeexistingeventbusIntegDefaultTestDeployAssertF331E474.assets.json +19 -0
  12. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/evtlameventbridgeexistingeventbusIntegDefaultTestDeployAssertF331E474.template.json +36 -0
  13. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/integ.json +12 -0
  14. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/manifest.json +143 -0
  15. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/tree.json +399 -0
  16. package/test/integ.evtlam-eventbridge-new-eventbus.js +5 -2
  17. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/asset.42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c/index.js +10 -0
  18. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/cdk.out +1 -0
  19. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/evtlam-eventbridge-new-eventbus.assets.json +32 -0
  20. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/evtlam-eventbridge-new-eventbus.template.json +226 -0
  21. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/evtlameventbridgeneweventbusIntegDefaultTestDeployAssert45FE6822.assets.json +19 -0
  22. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/evtlameventbridgeneweventbusIntegDefaultTestDeployAssert45FE6822.template.json +36 -0
  23. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/integ.json +12 -0
  24. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/manifest.json +143 -0
  25. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/tree.json +399 -0
  26. package/test/integ.evtlam-eventbridge-no-argument.js +5 -2
  27. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/asset.42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c/index.js +10 -0
  28. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/cdk.out +1 -0
  29. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/evtlam-eventbridge-no-argument.assets.json +32 -0
  30. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/evtlam-eventbridge-no-argument.template.json +213 -0
  31. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/evtlameventbridgenoargumentIntegDefaultTestDeployAssert5D6CC728.assets.json +19 -0
  32. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/evtlameventbridgenoargumentIntegDefaultTestDeployAssert5D6CC728.template.json +36 -0
  33. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/integ.json +12 -0
  34. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/manifest.json +137 -0
  35. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/tree.json +368 -0
  36. package/test/integ.evtlam-eventbridge-existing-eventbus.expected.json +0 -226
  37. package/test/integ.evtlam-eventbridge-new-eventbus.expected.json +0 -226
  38. package/test/integ.evtlam-eventbridge-no-argument.expected.json +0 -213
@@ -0,0 +1,143 @@
1
+ {
2
+ "version": "36.0.0",
3
+ "artifacts": {
4
+ "evtlameventbridgeexistingeventbusIntegDefaultTestDeployAssertF331E474.assets": {
5
+ "type": "cdk:asset-manifest",
6
+ "properties": {
7
+ "file": "evtlameventbridgeexistingeventbusIntegDefaultTestDeployAssertF331E474.assets.json",
8
+ "requiresBootstrapStackVersion": 6,
9
+ "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version"
10
+ }
11
+ },
12
+ "evtlameventbridgeexistingeventbusIntegDefaultTestDeployAssertF331E474": {
13
+ "type": "aws:cloudformation:stack",
14
+ "environment": "aws://unknown-account/unknown-region",
15
+ "properties": {
16
+ "templateFile": "evtlameventbridgeexistingeventbusIntegDefaultTestDeployAssertF331E474.template.json",
17
+ "terminationProtection": false,
18
+ "validateOnSynth": false,
19
+ "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
20
+ "cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
21
+ "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22.json",
22
+ "requiresBootstrapStackVersion": 6,
23
+ "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
24
+ "additionalDependencies": [
25
+ "evtlameventbridgeexistingeventbusIntegDefaultTestDeployAssertF331E474.assets"
26
+ ],
27
+ "lookupRole": {
28
+ "arn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-lookup-role-${AWS::AccountId}-${AWS::Region}",
29
+ "requiresBootstrapStackVersion": 8,
30
+ "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version"
31
+ }
32
+ },
33
+ "dependencies": [
34
+ "evtlameventbridgeexistingeventbusIntegDefaultTestDeployAssertF331E474.assets"
35
+ ],
36
+ "metadata": {
37
+ "/evtlam-eventbridge-existing-eventbus/Integ/DefaultTest/DeployAssert/BootstrapVersion": [
38
+ {
39
+ "type": "aws:cdk:logicalId",
40
+ "data": "BootstrapVersion"
41
+ }
42
+ ],
43
+ "/evtlam-eventbridge-existing-eventbus/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion": [
44
+ {
45
+ "type": "aws:cdk:logicalId",
46
+ "data": "CheckBootstrapVersion"
47
+ }
48
+ ]
49
+ },
50
+ "displayName": "evtlam-eventbridge-existing-eventbus/Integ/DefaultTest/DeployAssert"
51
+ },
52
+ "evtlam-eventbridge-existing-eventbus.assets": {
53
+ "type": "cdk:asset-manifest",
54
+ "properties": {
55
+ "file": "evtlam-eventbridge-existing-eventbus.assets.json",
56
+ "requiresBootstrapStackVersion": 6,
57
+ "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version"
58
+ }
59
+ },
60
+ "evtlam-eventbridge-existing-eventbus": {
61
+ "type": "aws:cloudformation:stack",
62
+ "environment": "aws://unknown-account/unknown-region",
63
+ "properties": {
64
+ "templateFile": "evtlam-eventbridge-existing-eventbus.template.json",
65
+ "terminationProtection": false,
66
+ "validateOnSynth": false,
67
+ "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
68
+ "cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
69
+ "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/1ee369c1edfc781ec36a2a7f9b31469bdc778252c6b164faf4f616d5d611fa6a.json",
70
+ "requiresBootstrapStackVersion": 6,
71
+ "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
72
+ "additionalDependencies": [
73
+ "evtlam-eventbridge-existing-eventbus.assets"
74
+ ],
75
+ "lookupRole": {
76
+ "arn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-lookup-role-${AWS::AccountId}-${AWS::Region}",
77
+ "requiresBootstrapStackVersion": 8,
78
+ "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version"
79
+ }
80
+ },
81
+ "dependencies": [
82
+ "evtlam-eventbridge-existing-eventbus.assets"
83
+ ],
84
+ "metadata": {
85
+ "/evtlam-eventbridge-existing-eventbus/existing-event-bus/Resource": [
86
+ {
87
+ "type": "aws:cdk:logicalId",
88
+ "data": "existingeventbusA5B80487"
89
+ }
90
+ ],
91
+ "/evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/Resource": [
92
+ {
93
+ "type": "aws:cdk:logicalId",
94
+ "data": "testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE"
95
+ }
96
+ ],
97
+ "/evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/DefaultPolicy/Resource": [
98
+ {
99
+ "type": "aws:cdk:logicalId",
100
+ "data": "testeventbridgelambdaLambdaFunctionServiceRoleDefaultPolicyB0C15F1B"
101
+ }
102
+ ],
103
+ "/evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunction/Resource": [
104
+ {
105
+ "type": "aws:cdk:logicalId",
106
+ "data": "testeventbridgelambdaLambdaFunction475423FD"
107
+ }
108
+ ],
109
+ "/evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunction/AwsEventsLambdaInvokePermission-1": [
110
+ {
111
+ "type": "aws:cdk:logicalId",
112
+ "data": "testeventbridgelambdaLambdaFunctionAwsEventsLambdaInvokePermission1C8A95062"
113
+ }
114
+ ],
115
+ "/evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/EventsRule/Resource": [
116
+ {
117
+ "type": "aws:cdk:logicalId",
118
+ "data": "testeventbridgelambdaEventsRule7DB0954D"
119
+ }
120
+ ],
121
+ "/evtlam-eventbridge-existing-eventbus/BootstrapVersion": [
122
+ {
123
+ "type": "aws:cdk:logicalId",
124
+ "data": "BootstrapVersion"
125
+ }
126
+ ],
127
+ "/evtlam-eventbridge-existing-eventbus/CheckBootstrapVersion": [
128
+ {
129
+ "type": "aws:cdk:logicalId",
130
+ "data": "CheckBootstrapVersion"
131
+ }
132
+ ]
133
+ },
134
+ "displayName": "evtlam-eventbridge-existing-eventbus"
135
+ },
136
+ "Tree": {
137
+ "type": "cdk:tree",
138
+ "properties": {
139
+ "file": "tree.json"
140
+ }
141
+ }
142
+ }
143
+ }
@@ -0,0 +1,399 @@
1
+ {
2
+ "version": "tree-0.1",
3
+ "tree": {
4
+ "id": "App",
5
+ "path": "",
6
+ "children": {
7
+ "evtlam-eventbridge-existing-eventbus": {
8
+ "id": "evtlam-eventbridge-existing-eventbus",
9
+ "path": "evtlam-eventbridge-existing-eventbus",
10
+ "children": {
11
+ "existing-event-bus": {
12
+ "id": "existing-event-bus",
13
+ "path": "evtlam-eventbridge-existing-eventbus/existing-event-bus",
14
+ "children": {
15
+ "Resource": {
16
+ "id": "Resource",
17
+ "path": "evtlam-eventbridge-existing-eventbus/existing-event-bus/Resource",
18
+ "attributes": {
19
+ "aws:cdk:cloudformation:type": "AWS::Events::EventBus",
20
+ "aws:cdk:cloudformation:props": {
21
+ "name": "test-existing-lambda"
22
+ }
23
+ },
24
+ "constructInfo": {
25
+ "fqn": "aws-cdk-lib.aws_events.CfnEventBus",
26
+ "version": "2.118.0"
27
+ }
28
+ }
29
+ },
30
+ "constructInfo": {
31
+ "fqn": "aws-cdk-lib.aws_events.EventBus",
32
+ "version": "2.118.0"
33
+ }
34
+ },
35
+ "test-eventbridge-lambda": {
36
+ "id": "test-eventbridge-lambda",
37
+ "path": "evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda",
38
+ "children": {
39
+ "LambdaFunctionServiceRole": {
40
+ "id": "LambdaFunctionServiceRole",
41
+ "path": "evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole",
42
+ "children": {
43
+ "ImportLambdaFunctionServiceRole": {
44
+ "id": "ImportLambdaFunctionServiceRole",
45
+ "path": "evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole",
46
+ "constructInfo": {
47
+ "fqn": "aws-cdk-lib.Resource",
48
+ "version": "2.118.0"
49
+ }
50
+ },
51
+ "Resource": {
52
+ "id": "Resource",
53
+ "path": "evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/Resource",
54
+ "attributes": {
55
+ "aws:cdk:cloudformation:type": "AWS::IAM::Role",
56
+ "aws:cdk:cloudformation:props": {
57
+ "assumeRolePolicyDocument": {
58
+ "Statement": [
59
+ {
60
+ "Action": "sts:AssumeRole",
61
+ "Effect": "Allow",
62
+ "Principal": {
63
+ "Service": "lambda.amazonaws.com"
64
+ }
65
+ }
66
+ ],
67
+ "Version": "2012-10-17"
68
+ },
69
+ "policies": [
70
+ {
71
+ "policyName": "LambdaFunctionServiceRolePolicy",
72
+ "policyDocument": {
73
+ "Statement": [
74
+ {
75
+ "Action": [
76
+ "logs:CreateLogGroup",
77
+ "logs:CreateLogStream",
78
+ "logs:PutLogEvents"
79
+ ],
80
+ "Effect": "Allow",
81
+ "Resource": {
82
+ "Fn::Join": [
83
+ "",
84
+ [
85
+ "arn:",
86
+ {
87
+ "Ref": "AWS::Partition"
88
+ },
89
+ ":logs:",
90
+ {
91
+ "Ref": "AWS::Region"
92
+ },
93
+ ":",
94
+ {
95
+ "Ref": "AWS::AccountId"
96
+ },
97
+ ":log-group:/aws/lambda/*"
98
+ ]
99
+ ]
100
+ }
101
+ }
102
+ ],
103
+ "Version": "2012-10-17"
104
+ }
105
+ }
106
+ ]
107
+ }
108
+ },
109
+ "constructInfo": {
110
+ "fqn": "aws-cdk-lib.aws_iam.CfnRole",
111
+ "version": "2.118.0"
112
+ }
113
+ },
114
+ "DefaultPolicy": {
115
+ "id": "DefaultPolicy",
116
+ "path": "evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/DefaultPolicy",
117
+ "children": {
118
+ "Resource": {
119
+ "id": "Resource",
120
+ "path": "evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/DefaultPolicy/Resource",
121
+ "attributes": {
122
+ "aws:cdk:cloudformation:type": "AWS::IAM::Policy",
123
+ "aws:cdk:cloudformation:props": {
124
+ "policyDocument": {
125
+ "Statement": [
126
+ {
127
+ "Action": [
128
+ "xray:PutTelemetryRecords",
129
+ "xray:PutTraceSegments"
130
+ ],
131
+ "Effect": "Allow",
132
+ "Resource": "*"
133
+ }
134
+ ],
135
+ "Version": "2012-10-17"
136
+ },
137
+ "policyName": "testeventbridgelambdaLambdaFunctionServiceRoleDefaultPolicyB0C15F1B",
138
+ "roles": [
139
+ {
140
+ "Ref": "testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE"
141
+ }
142
+ ]
143
+ }
144
+ },
145
+ "constructInfo": {
146
+ "fqn": "aws-cdk-lib.aws_iam.CfnPolicy",
147
+ "version": "2.118.0"
148
+ }
149
+ }
150
+ },
151
+ "constructInfo": {
152
+ "fqn": "aws-cdk-lib.aws_iam.Policy",
153
+ "version": "2.118.0"
154
+ }
155
+ }
156
+ },
157
+ "constructInfo": {
158
+ "fqn": "aws-cdk-lib.aws_iam.Role",
159
+ "version": "2.118.0"
160
+ }
161
+ },
162
+ "LambdaFunction": {
163
+ "id": "LambdaFunction",
164
+ "path": "evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunction",
165
+ "children": {
166
+ "Code": {
167
+ "id": "Code",
168
+ "path": "evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunction/Code",
169
+ "children": {
170
+ "Stage": {
171
+ "id": "Stage",
172
+ "path": "evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunction/Code/Stage",
173
+ "constructInfo": {
174
+ "fqn": "aws-cdk-lib.AssetStaging",
175
+ "version": "2.118.0"
176
+ }
177
+ },
178
+ "AssetBucket": {
179
+ "id": "AssetBucket",
180
+ "path": "evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunction/Code/AssetBucket",
181
+ "constructInfo": {
182
+ "fqn": "aws-cdk-lib.aws_s3.BucketBase",
183
+ "version": "2.118.0"
184
+ }
185
+ }
186
+ },
187
+ "constructInfo": {
188
+ "fqn": "aws-cdk-lib.aws_s3_assets.Asset",
189
+ "version": "2.118.0"
190
+ }
191
+ },
192
+ "Resource": {
193
+ "id": "Resource",
194
+ "path": "evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunction/Resource",
195
+ "attributes": {
196
+ "aws:cdk:cloudformation:type": "AWS::Lambda::Function",
197
+ "aws:cdk:cloudformation:props": {
198
+ "code": {
199
+ "s3Bucket": {
200
+ "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
201
+ },
202
+ "s3Key": "42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c.zip"
203
+ },
204
+ "environment": {
205
+ "variables": {
206
+ "AWS_NODEJS_CONNECTION_REUSE_ENABLED": "1"
207
+ }
208
+ },
209
+ "handler": "index.handler",
210
+ "role": {
211
+ "Fn::GetAtt": [
212
+ "testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE",
213
+ "Arn"
214
+ ]
215
+ },
216
+ "runtime": "nodejs16.x",
217
+ "tracingConfig": {
218
+ "mode": "Active"
219
+ }
220
+ }
221
+ },
222
+ "constructInfo": {
223
+ "fqn": "aws-cdk-lib.aws_lambda.CfnFunction",
224
+ "version": "2.118.0"
225
+ }
226
+ },
227
+ "AwsEventsLambdaInvokePermission-1": {
228
+ "id": "AwsEventsLambdaInvokePermission-1",
229
+ "path": "evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunction/AwsEventsLambdaInvokePermission-1",
230
+ "attributes": {
231
+ "aws:cdk:cloudformation:type": "AWS::Lambda::Permission",
232
+ "aws:cdk:cloudformation:props": {
233
+ "action": "lambda:InvokeFunction",
234
+ "functionName": {
235
+ "Fn::GetAtt": [
236
+ "testeventbridgelambdaLambdaFunction475423FD",
237
+ "Arn"
238
+ ]
239
+ },
240
+ "principal": "events.amazonaws.com",
241
+ "sourceArn": {
242
+ "Fn::GetAtt": [
243
+ "testeventbridgelambdaEventsRule7DB0954D",
244
+ "Arn"
245
+ ]
246
+ }
247
+ }
248
+ },
249
+ "constructInfo": {
250
+ "fqn": "aws-cdk-lib.aws_lambda.CfnPermission",
251
+ "version": "2.118.0"
252
+ }
253
+ }
254
+ },
255
+ "constructInfo": {
256
+ "fqn": "aws-cdk-lib.aws_lambda.Function",
257
+ "version": "2.118.0"
258
+ }
259
+ },
260
+ "EventsRule": {
261
+ "id": "EventsRule",
262
+ "path": "evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/EventsRule",
263
+ "children": {
264
+ "Resource": {
265
+ "id": "Resource",
266
+ "path": "evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/EventsRule/Resource",
267
+ "attributes": {
268
+ "aws:cdk:cloudformation:type": "AWS::Events::Rule",
269
+ "aws:cdk:cloudformation:props": {
270
+ "eventBusName": {
271
+ "Ref": "existingeventbusA5B80487"
272
+ },
273
+ "eventPattern": {
274
+ "source": [
275
+ "solutionsconstructs"
276
+ ]
277
+ },
278
+ "state": "ENABLED",
279
+ "targets": [
280
+ {
281
+ "id": "Target0",
282
+ "arn": {
283
+ "Fn::GetAtt": [
284
+ "testeventbridgelambdaLambdaFunction475423FD",
285
+ "Arn"
286
+ ]
287
+ }
288
+ }
289
+ ]
290
+ }
291
+ },
292
+ "constructInfo": {
293
+ "fqn": "aws-cdk-lib.aws_events.CfnRule",
294
+ "version": "2.118.0"
295
+ }
296
+ }
297
+ },
298
+ "constructInfo": {
299
+ "fqn": "aws-cdk-lib.aws_events.Rule",
300
+ "version": "2.118.0"
301
+ }
302
+ }
303
+ },
304
+ "constructInfo": {
305
+ "fqn": "@aws-solutions-constructs/aws-eventbridge-lambda.EventbridgeToLambda",
306
+ "version": "2.50.0"
307
+ }
308
+ },
309
+ "Integ": {
310
+ "id": "Integ",
311
+ "path": "evtlam-eventbridge-existing-eventbus/Integ",
312
+ "children": {
313
+ "DefaultTest": {
314
+ "id": "DefaultTest",
315
+ "path": "evtlam-eventbridge-existing-eventbus/Integ/DefaultTest",
316
+ "children": {
317
+ "Default": {
318
+ "id": "Default",
319
+ "path": "evtlam-eventbridge-existing-eventbus/Integ/DefaultTest/Default",
320
+ "constructInfo": {
321
+ "fqn": "constructs.Construct",
322
+ "version": "10.0.0"
323
+ }
324
+ },
325
+ "DeployAssert": {
326
+ "id": "DeployAssert",
327
+ "path": "evtlam-eventbridge-existing-eventbus/Integ/DefaultTest/DeployAssert",
328
+ "children": {
329
+ "BootstrapVersion": {
330
+ "id": "BootstrapVersion",
331
+ "path": "evtlam-eventbridge-existing-eventbus/Integ/DefaultTest/DeployAssert/BootstrapVersion",
332
+ "constructInfo": {
333
+ "fqn": "aws-cdk-lib.CfnParameter",
334
+ "version": "2.118.0"
335
+ }
336
+ },
337
+ "CheckBootstrapVersion": {
338
+ "id": "CheckBootstrapVersion",
339
+ "path": "evtlam-eventbridge-existing-eventbus/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion",
340
+ "constructInfo": {
341
+ "fqn": "aws-cdk-lib.CfnRule",
342
+ "version": "2.118.0"
343
+ }
344
+ }
345
+ },
346
+ "constructInfo": {
347
+ "fqn": "aws-cdk-lib.Stack",
348
+ "version": "2.118.0"
349
+ }
350
+ }
351
+ },
352
+ "constructInfo": {
353
+ "fqn": "@aws-cdk/integ-tests-alpha.IntegTestCase",
354
+ "version": "2.118.0-alpha.0"
355
+ }
356
+ }
357
+ },
358
+ "constructInfo": {
359
+ "fqn": "@aws-cdk/integ-tests-alpha.IntegTest",
360
+ "version": "2.118.0-alpha.0"
361
+ }
362
+ },
363
+ "BootstrapVersion": {
364
+ "id": "BootstrapVersion",
365
+ "path": "evtlam-eventbridge-existing-eventbus/BootstrapVersion",
366
+ "constructInfo": {
367
+ "fqn": "aws-cdk-lib.CfnParameter",
368
+ "version": "2.118.0"
369
+ }
370
+ },
371
+ "CheckBootstrapVersion": {
372
+ "id": "CheckBootstrapVersion",
373
+ "path": "evtlam-eventbridge-existing-eventbus/CheckBootstrapVersion",
374
+ "constructInfo": {
375
+ "fqn": "aws-cdk-lib.CfnRule",
376
+ "version": "2.118.0"
377
+ }
378
+ }
379
+ },
380
+ "constructInfo": {
381
+ "fqn": "aws-cdk-lib.Stack",
382
+ "version": "2.118.0"
383
+ }
384
+ },
385
+ "Tree": {
386
+ "id": "Tree",
387
+ "path": "Tree",
388
+ "constructInfo": {
389
+ "fqn": "constructs.Construct",
390
+ "version": "10.0.0"
391
+ }
392
+ }
393
+ },
394
+ "constructInfo": {
395
+ "fqn": "aws-cdk-lib.App",
396
+ "version": "2.118.0"
397
+ }
398
+ }
399
+ }
@@ -17,6 +17,7 @@ const aws_cdk_lib_1 = require("aws-cdk-lib");
17
17
  const lib_1 = require("../lib");
18
18
  const lambda = require("aws-cdk-lib/aws-lambda");
19
19
  const core_1 = require("@aws-solutions-constructs/core");
20
+ const integ_tests_alpha_1 = require("@aws-cdk/integ-tests-alpha");
20
21
  const app = new aws_cdk_lib_1.App();
21
22
  const stack = new aws_cdk_lib_1.Stack(app, core_1.generateIntegStackName(__filename));
22
23
  const props = {
@@ -33,5 +34,7 @@ const props = {
33
34
  }
34
35
  };
35
36
  new lib_1.EventbridgeToLambda(stack, 'test-eventbridge-lambda', props);
36
- app.synth();
37
- //# sourceMappingURL=data:application/json;base64,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
37
+ new integ_tests_alpha_1.IntegTest(stack, 'Integ', { testCases: [
38
+ stack
39
+ ] });
40
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,10 @@
1
+ console.log('Loading function');
2
+
3
+ exports.handler = async (event, context) => {
4
+ console.log('Received event:', JSON.stringify(event, null, 2));
5
+     return {
6
+       statusCode: 200,
7
+       headers: { 'Content-Type': 'text/plain' },
8
+       body: `Hello from Project Vesper! You've hit ${event.path}\n`
9
+     };
10
+ };
@@ -0,0 +1 @@
1
+ {"version":"36.0.0"}
@@ -0,0 +1,32 @@
1
+ {
2
+ "version": "36.0.0",
3
+ "files": {
4
+ "42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c": {
5
+ "source": {
6
+ "path": "asset.42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c",
7
+ "packaging": "zip"
8
+ },
9
+ "destinations": {
10
+ "current_account-current_region": {
11
+ "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
12
+ "objectKey": "42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c.zip",
13
+ "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
14
+ }
15
+ }
16
+ },
17
+ "22232c3094695e64d7c3cb4a5dfbd7cb670519c1eed726e91c304dc85d41251e": {
18
+ "source": {
19
+ "path": "evtlam-eventbridge-new-eventbus.template.json",
20
+ "packaging": "file"
21
+ },
22
+ "destinations": {
23
+ "current_account-current_region": {
24
+ "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
25
+ "objectKey": "22232c3094695e64d7c3cb4a5dfbd7cb670519c1eed726e91c304dc85d41251e.json",
26
+ "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
27
+ }
28
+ }
29
+ }
30
+ },
31
+ "dockerImages": {}
32
+ }