@aws-solutions-constructs/aws-eventbridge-lambda 2.50.0 → 2.52.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (38) hide show
  1. package/.eslintignore +2 -0
  2. package/.jsii +50 -5
  3. package/integ.config.json +7 -0
  4. package/lib/index.js +1 -1
  5. package/package.json +12 -11
  6. package/test/integ.evtlam-eventbridge-existing-eventbus.js +5 -2
  7. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/asset.42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c/index.js +10 -0
  8. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/cdk.out +1 -0
  9. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/evtlam-eventbridge-existing-eventbus.assets.json +32 -0
  10. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/evtlam-eventbridge-existing-eventbus.template.json +226 -0
  11. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/evtlameventbridgeexistingeventbusIntegDefaultTestDeployAssertF331E474.assets.json +19 -0
  12. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/evtlameventbridgeexistingeventbusIntegDefaultTestDeployAssertF331E474.template.json +36 -0
  13. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/integ.json +12 -0
  14. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/manifest.json +143 -0
  15. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/tree.json +399 -0
  16. package/test/integ.evtlam-eventbridge-new-eventbus.js +5 -2
  17. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/asset.42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c/index.js +10 -0
  18. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/cdk.out +1 -0
  19. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/evtlam-eventbridge-new-eventbus.assets.json +32 -0
  20. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/evtlam-eventbridge-new-eventbus.template.json +226 -0
  21. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/evtlameventbridgeneweventbusIntegDefaultTestDeployAssert45FE6822.assets.json +19 -0
  22. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/evtlameventbridgeneweventbusIntegDefaultTestDeployAssert45FE6822.template.json +36 -0
  23. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/integ.json +12 -0
  24. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/manifest.json +143 -0
  25. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/tree.json +399 -0
  26. package/test/integ.evtlam-eventbridge-no-argument.js +5 -2
  27. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/asset.42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c/index.js +10 -0
  28. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/cdk.out +1 -0
  29. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/evtlam-eventbridge-no-argument.assets.json +32 -0
  30. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/evtlam-eventbridge-no-argument.template.json +213 -0
  31. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/evtlameventbridgenoargumentIntegDefaultTestDeployAssert5D6CC728.assets.json +19 -0
  32. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/evtlameventbridgenoargumentIntegDefaultTestDeployAssert5D6CC728.template.json +36 -0
  33. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/integ.json +12 -0
  34. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/manifest.json +137 -0
  35. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/tree.json +368 -0
  36. package/test/integ.evtlam-eventbridge-existing-eventbus.expected.json +0 -226
  37. package/test/integ.evtlam-eventbridge-new-eventbus.expected.json +0 -226
  38. package/test/integ.evtlam-eventbridge-no-argument.expected.json +0 -213
@@ -0,0 +1,368 @@
1
+ {
2
+ "version": "tree-0.1",
3
+ "tree": {
4
+ "id": "App",
5
+ "path": "",
6
+ "children": {
7
+ "evtlam-eventbridge-no-argument": {
8
+ "id": "evtlam-eventbridge-no-argument",
9
+ "path": "evtlam-eventbridge-no-argument",
10
+ "children": {
11
+ "test-eventbridge-lambda": {
12
+ "id": "test-eventbridge-lambda",
13
+ "path": "evtlam-eventbridge-no-argument/test-eventbridge-lambda",
14
+ "children": {
15
+ "LambdaFunctionServiceRole": {
16
+ "id": "LambdaFunctionServiceRole",
17
+ "path": "evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunctionServiceRole",
18
+ "children": {
19
+ "ImportLambdaFunctionServiceRole": {
20
+ "id": "ImportLambdaFunctionServiceRole",
21
+ "path": "evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole",
22
+ "constructInfo": {
23
+ "fqn": "aws-cdk-lib.Resource",
24
+ "version": "2.118.0"
25
+ }
26
+ },
27
+ "Resource": {
28
+ "id": "Resource",
29
+ "path": "evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunctionServiceRole/Resource",
30
+ "attributes": {
31
+ "aws:cdk:cloudformation:type": "AWS::IAM::Role",
32
+ "aws:cdk:cloudformation:props": {
33
+ "assumeRolePolicyDocument": {
34
+ "Statement": [
35
+ {
36
+ "Action": "sts:AssumeRole",
37
+ "Effect": "Allow",
38
+ "Principal": {
39
+ "Service": "lambda.amazonaws.com"
40
+ }
41
+ }
42
+ ],
43
+ "Version": "2012-10-17"
44
+ },
45
+ "policies": [
46
+ {
47
+ "policyName": "LambdaFunctionServiceRolePolicy",
48
+ "policyDocument": {
49
+ "Statement": [
50
+ {
51
+ "Action": [
52
+ "logs:CreateLogGroup",
53
+ "logs:CreateLogStream",
54
+ "logs:PutLogEvents"
55
+ ],
56
+ "Effect": "Allow",
57
+ "Resource": {
58
+ "Fn::Join": [
59
+ "",
60
+ [
61
+ "arn:",
62
+ {
63
+ "Ref": "AWS::Partition"
64
+ },
65
+ ":logs:",
66
+ {
67
+ "Ref": "AWS::Region"
68
+ },
69
+ ":",
70
+ {
71
+ "Ref": "AWS::AccountId"
72
+ },
73
+ ":log-group:/aws/lambda/*"
74
+ ]
75
+ ]
76
+ }
77
+ }
78
+ ],
79
+ "Version": "2012-10-17"
80
+ }
81
+ }
82
+ ]
83
+ }
84
+ },
85
+ "constructInfo": {
86
+ "fqn": "aws-cdk-lib.aws_iam.CfnRole",
87
+ "version": "2.118.0"
88
+ }
89
+ },
90
+ "DefaultPolicy": {
91
+ "id": "DefaultPolicy",
92
+ "path": "evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunctionServiceRole/DefaultPolicy",
93
+ "children": {
94
+ "Resource": {
95
+ "id": "Resource",
96
+ "path": "evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunctionServiceRole/DefaultPolicy/Resource",
97
+ "attributes": {
98
+ "aws:cdk:cloudformation:type": "AWS::IAM::Policy",
99
+ "aws:cdk:cloudformation:props": {
100
+ "policyDocument": {
101
+ "Statement": [
102
+ {
103
+ "Action": [
104
+ "xray:PutTelemetryRecords",
105
+ "xray:PutTraceSegments"
106
+ ],
107
+ "Effect": "Allow",
108
+ "Resource": "*"
109
+ }
110
+ ],
111
+ "Version": "2012-10-17"
112
+ },
113
+ "policyName": "testeventbridgelambdaLambdaFunctionServiceRoleDefaultPolicyB0C15F1B",
114
+ "roles": [
115
+ {
116
+ "Ref": "testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE"
117
+ }
118
+ ]
119
+ }
120
+ },
121
+ "constructInfo": {
122
+ "fqn": "aws-cdk-lib.aws_iam.CfnPolicy",
123
+ "version": "2.118.0"
124
+ }
125
+ }
126
+ },
127
+ "constructInfo": {
128
+ "fqn": "aws-cdk-lib.aws_iam.Policy",
129
+ "version": "2.118.0"
130
+ }
131
+ }
132
+ },
133
+ "constructInfo": {
134
+ "fqn": "aws-cdk-lib.aws_iam.Role",
135
+ "version": "2.118.0"
136
+ }
137
+ },
138
+ "LambdaFunction": {
139
+ "id": "LambdaFunction",
140
+ "path": "evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction",
141
+ "children": {
142
+ "Code": {
143
+ "id": "Code",
144
+ "path": "evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/Code",
145
+ "children": {
146
+ "Stage": {
147
+ "id": "Stage",
148
+ "path": "evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/Code/Stage",
149
+ "constructInfo": {
150
+ "fqn": "aws-cdk-lib.AssetStaging",
151
+ "version": "2.118.0"
152
+ }
153
+ },
154
+ "AssetBucket": {
155
+ "id": "AssetBucket",
156
+ "path": "evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/Code/AssetBucket",
157
+ "constructInfo": {
158
+ "fqn": "aws-cdk-lib.aws_s3.BucketBase",
159
+ "version": "2.118.0"
160
+ }
161
+ }
162
+ },
163
+ "constructInfo": {
164
+ "fqn": "aws-cdk-lib.aws_s3_assets.Asset",
165
+ "version": "2.118.0"
166
+ }
167
+ },
168
+ "Resource": {
169
+ "id": "Resource",
170
+ "path": "evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/Resource",
171
+ "attributes": {
172
+ "aws:cdk:cloudformation:type": "AWS::Lambda::Function",
173
+ "aws:cdk:cloudformation:props": {
174
+ "code": {
175
+ "s3Bucket": {
176
+ "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
177
+ },
178
+ "s3Key": "42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c.zip"
179
+ },
180
+ "environment": {
181
+ "variables": {
182
+ "AWS_NODEJS_CONNECTION_REUSE_ENABLED": "1"
183
+ }
184
+ },
185
+ "handler": "index.handler",
186
+ "role": {
187
+ "Fn::GetAtt": [
188
+ "testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE",
189
+ "Arn"
190
+ ]
191
+ },
192
+ "runtime": "nodejs16.x",
193
+ "tracingConfig": {
194
+ "mode": "Active"
195
+ }
196
+ }
197
+ },
198
+ "constructInfo": {
199
+ "fqn": "aws-cdk-lib.aws_lambda.CfnFunction",
200
+ "version": "2.118.0"
201
+ }
202
+ },
203
+ "AwsEventsLambdaInvokePermission-1": {
204
+ "id": "AwsEventsLambdaInvokePermission-1",
205
+ "path": "evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/AwsEventsLambdaInvokePermission-1",
206
+ "attributes": {
207
+ "aws:cdk:cloudformation:type": "AWS::Lambda::Permission",
208
+ "aws:cdk:cloudformation:props": {
209
+ "action": "lambda:InvokeFunction",
210
+ "functionName": {
211
+ "Fn::GetAtt": [
212
+ "testeventbridgelambdaLambdaFunction475423FD",
213
+ "Arn"
214
+ ]
215
+ },
216
+ "principal": "events.amazonaws.com",
217
+ "sourceArn": {
218
+ "Fn::GetAtt": [
219
+ "testeventbridgelambdaEventsRule7DB0954D",
220
+ "Arn"
221
+ ]
222
+ }
223
+ }
224
+ },
225
+ "constructInfo": {
226
+ "fqn": "aws-cdk-lib.aws_lambda.CfnPermission",
227
+ "version": "2.118.0"
228
+ }
229
+ }
230
+ },
231
+ "constructInfo": {
232
+ "fqn": "aws-cdk-lib.aws_lambda.Function",
233
+ "version": "2.118.0"
234
+ }
235
+ },
236
+ "EventsRule": {
237
+ "id": "EventsRule",
238
+ "path": "evtlam-eventbridge-no-argument/test-eventbridge-lambda/EventsRule",
239
+ "children": {
240
+ "Resource": {
241
+ "id": "Resource",
242
+ "path": "evtlam-eventbridge-no-argument/test-eventbridge-lambda/EventsRule/Resource",
243
+ "attributes": {
244
+ "aws:cdk:cloudformation:type": "AWS::Events::Rule",
245
+ "aws:cdk:cloudformation:props": {
246
+ "scheduleExpression": "rate(5 minutes)",
247
+ "state": "ENABLED",
248
+ "targets": [
249
+ {
250
+ "id": "Target0",
251
+ "arn": {
252
+ "Fn::GetAtt": [
253
+ "testeventbridgelambdaLambdaFunction475423FD",
254
+ "Arn"
255
+ ]
256
+ }
257
+ }
258
+ ]
259
+ }
260
+ },
261
+ "constructInfo": {
262
+ "fqn": "aws-cdk-lib.aws_events.CfnRule",
263
+ "version": "2.118.0"
264
+ }
265
+ }
266
+ },
267
+ "constructInfo": {
268
+ "fqn": "aws-cdk-lib.aws_events.Rule",
269
+ "version": "2.118.0"
270
+ }
271
+ }
272
+ },
273
+ "constructInfo": {
274
+ "fqn": "@aws-solutions-constructs/aws-eventbridge-lambda.EventbridgeToLambda",
275
+ "version": "2.50.0"
276
+ }
277
+ },
278
+ "Integ": {
279
+ "id": "Integ",
280
+ "path": "evtlam-eventbridge-no-argument/Integ",
281
+ "children": {
282
+ "DefaultTest": {
283
+ "id": "DefaultTest",
284
+ "path": "evtlam-eventbridge-no-argument/Integ/DefaultTest",
285
+ "children": {
286
+ "Default": {
287
+ "id": "Default",
288
+ "path": "evtlam-eventbridge-no-argument/Integ/DefaultTest/Default",
289
+ "constructInfo": {
290
+ "fqn": "constructs.Construct",
291
+ "version": "10.0.0"
292
+ }
293
+ },
294
+ "DeployAssert": {
295
+ "id": "DeployAssert",
296
+ "path": "evtlam-eventbridge-no-argument/Integ/DefaultTest/DeployAssert",
297
+ "children": {
298
+ "BootstrapVersion": {
299
+ "id": "BootstrapVersion",
300
+ "path": "evtlam-eventbridge-no-argument/Integ/DefaultTest/DeployAssert/BootstrapVersion",
301
+ "constructInfo": {
302
+ "fqn": "aws-cdk-lib.CfnParameter",
303
+ "version": "2.118.0"
304
+ }
305
+ },
306
+ "CheckBootstrapVersion": {
307
+ "id": "CheckBootstrapVersion",
308
+ "path": "evtlam-eventbridge-no-argument/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion",
309
+ "constructInfo": {
310
+ "fqn": "aws-cdk-lib.CfnRule",
311
+ "version": "2.118.0"
312
+ }
313
+ }
314
+ },
315
+ "constructInfo": {
316
+ "fqn": "aws-cdk-lib.Stack",
317
+ "version": "2.118.0"
318
+ }
319
+ }
320
+ },
321
+ "constructInfo": {
322
+ "fqn": "@aws-cdk/integ-tests-alpha.IntegTestCase",
323
+ "version": "2.118.0-alpha.0"
324
+ }
325
+ }
326
+ },
327
+ "constructInfo": {
328
+ "fqn": "@aws-cdk/integ-tests-alpha.IntegTest",
329
+ "version": "2.118.0-alpha.0"
330
+ }
331
+ },
332
+ "BootstrapVersion": {
333
+ "id": "BootstrapVersion",
334
+ "path": "evtlam-eventbridge-no-argument/BootstrapVersion",
335
+ "constructInfo": {
336
+ "fqn": "aws-cdk-lib.CfnParameter",
337
+ "version": "2.118.0"
338
+ }
339
+ },
340
+ "CheckBootstrapVersion": {
341
+ "id": "CheckBootstrapVersion",
342
+ "path": "evtlam-eventbridge-no-argument/CheckBootstrapVersion",
343
+ "constructInfo": {
344
+ "fqn": "aws-cdk-lib.CfnRule",
345
+ "version": "2.118.0"
346
+ }
347
+ }
348
+ },
349
+ "constructInfo": {
350
+ "fqn": "aws-cdk-lib.Stack",
351
+ "version": "2.118.0"
352
+ }
353
+ },
354
+ "Tree": {
355
+ "id": "Tree",
356
+ "path": "Tree",
357
+ "constructInfo": {
358
+ "fqn": "constructs.Construct",
359
+ "version": "10.0.0"
360
+ }
361
+ }
362
+ },
363
+ "constructInfo": {
364
+ "fqn": "aws-cdk-lib.App",
365
+ "version": "2.118.0"
366
+ }
367
+ }
368
+ }
@@ -1,226 +0,0 @@
1
- {
2
- "Resources": {
3
- "existingeventbusA5B80487": {
4
- "Type": "AWS::Events::EventBus",
5
- "Properties": {
6
- "Name": "test-existing-lambda"
7
- }
8
- },
9
- "testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE": {
10
- "Type": "AWS::IAM::Role",
11
- "Properties": {
12
- "AssumeRolePolicyDocument": {
13
- "Statement": [
14
- {
15
- "Action": "sts:AssumeRole",
16
- "Effect": "Allow",
17
- "Principal": {
18
- "Service": "lambda.amazonaws.com"
19
- }
20
- }
21
- ],
22
- "Version": "2012-10-17"
23
- },
24
- "Policies": [
25
- {
26
- "PolicyDocument": {
27
- "Statement": [
28
- {
29
- "Action": [
30
- "logs:CreateLogGroup",
31
- "logs:CreateLogStream",
32
- "logs:PutLogEvents"
33
- ],
34
- "Effect": "Allow",
35
- "Resource": {
36
- "Fn::Join": [
37
- "",
38
- [
39
- "arn:",
40
- {
41
- "Ref": "AWS::Partition"
42
- },
43
- ":logs:",
44
- {
45
- "Ref": "AWS::Region"
46
- },
47
- ":",
48
- {
49
- "Ref": "AWS::AccountId"
50
- },
51
- ":log-group:/aws/lambda/*"
52
- ]
53
- ]
54
- }
55
- }
56
- ],
57
- "Version": "2012-10-17"
58
- },
59
- "PolicyName": "LambdaFunctionServiceRolePolicy"
60
- }
61
- ]
62
- }
63
- },
64
- "testeventbridgelambdaLambdaFunctionServiceRoleDefaultPolicyB0C15F1B": {
65
- "Type": "AWS::IAM::Policy",
66
- "Properties": {
67
- "PolicyDocument": {
68
- "Statement": [
69
- {
70
- "Action": [
71
- "xray:PutTraceSegments",
72
- "xray:PutTelemetryRecords"
73
- ],
74
- "Effect": "Allow",
75
- "Resource": "*"
76
- }
77
- ],
78
- "Version": "2012-10-17"
79
- },
80
- "PolicyName": "testeventbridgelambdaLambdaFunctionServiceRoleDefaultPolicyB0C15F1B",
81
- "Roles": [
82
- {
83
- "Ref": "testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE"
84
- }
85
- ]
86
- },
87
- "Metadata": {
88
- "cfn_nag": {
89
- "rules_to_suppress": [
90
- {
91
- "id": "W12",
92
- "reason": "Lambda needs the following minimum required permissions to send trace data to X-Ray and access ENIs in a VPC."
93
- }
94
- ]
95
- }
96
- }
97
- },
98
- "testeventbridgelambdaLambdaFunction475423FD": {
99
- "Type": "AWS::Lambda::Function",
100
- "Properties": {
101
- "Code": {
102
- "S3Bucket": {
103
- "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
104
- },
105
- "S3Key": "42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c.zip"
106
- },
107
- "Environment": {
108
- "Variables": {
109
- "AWS_NODEJS_CONNECTION_REUSE_ENABLED": "1"
110
- }
111
- },
112
- "Handler": "index.handler",
113
- "Role": {
114
- "Fn::GetAtt": [
115
- "testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE",
116
- "Arn"
117
- ]
118
- },
119
- "Runtime": "nodejs16.x",
120
- "TracingConfig": {
121
- "Mode": "Active"
122
- }
123
- },
124
- "DependsOn": [
125
- "testeventbridgelambdaLambdaFunctionServiceRoleDefaultPolicyB0C15F1B",
126
- "testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE"
127
- ],
128
- "Metadata": {
129
- "cfn_nag": {
130
- "rules_to_suppress": [
131
- {
132
- "id": "W58",
133
- "reason": "Lambda functions has the required permission to write CloudWatch Logs. It uses custom policy instead of arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole with tighter permissions."
134
- },
135
- {
136
- "id": "W89",
137
- "reason": "This is not a rule for the general case, just for specific use cases/industries"
138
- },
139
- {
140
- "id": "W92",
141
- "reason": "Impossible for us to define the correct concurrency for clients"
142
- }
143
- ]
144
- }
145
- }
146
- },
147
- "testeventbridgelambdaLambdaFunctionAwsEventsLambdaInvokePermission1C8A95062": {
148
- "Type": "AWS::Lambda::Permission",
149
- "Properties": {
150
- "Action": "lambda:InvokeFunction",
151
- "FunctionName": {
152
- "Fn::GetAtt": [
153
- "testeventbridgelambdaLambdaFunction475423FD",
154
- "Arn"
155
- ]
156
- },
157
- "Principal": "events.amazonaws.com",
158
- "SourceArn": {
159
- "Fn::GetAtt": [
160
- "testeventbridgelambdaEventsRule7DB0954D",
161
- "Arn"
162
- ]
163
- }
164
- }
165
- },
166
- "testeventbridgelambdaEventsRule7DB0954D": {
167
- "Type": "AWS::Events::Rule",
168
- "Properties": {
169
- "EventBusName": {
170
- "Ref": "existingeventbusA5B80487"
171
- },
172
- "EventPattern": {
173
- "source": [
174
- "solutionsconstructs"
175
- ]
176
- },
177
- "State": "ENABLED",
178
- "Targets": [
179
- {
180
- "Arn": {
181
- "Fn::GetAtt": [
182
- "testeventbridgelambdaLambdaFunction475423FD",
183
- "Arn"
184
- ]
185
- },
186
- "Id": "Target0"
187
- }
188
- ]
189
- }
190
- }
191
- },
192
- "Parameters": {
193
- "BootstrapVersion": {
194
- "Type": "AWS::SSM::Parameter::Value<String>",
195
- "Default": "/cdk-bootstrap/hnb659fds/version",
196
- "Description": "Version of the CDK Bootstrap resources in this environment, automatically retrieved from SSM Parameter Store. [cdk:skip]"
197
- }
198
- },
199
- "Rules": {
200
- "CheckBootstrapVersion": {
201
- "Assertions": [
202
- {
203
- "Assert": {
204
- "Fn::Not": [
205
- {
206
- "Fn::Contains": [
207
- [
208
- "1",
209
- "2",
210
- "3",
211
- "4",
212
- "5"
213
- ],
214
- {
215
- "Ref": "BootstrapVersion"
216
- }
217
- ]
218
- }
219
- ]
220
- },
221
- "AssertDescription": "CDK bootstrap stack version 6 required. Please run 'cdk bootstrap' with a recent version of the CDK CLI."
222
- }
223
- ]
224
- }
225
- }
226
- }