@aws-solutions-constructs/aws-eventbridge-lambda 2.51.0 → 2.52.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (38) hide show
  1. package/.eslintignore +2 -0
  2. package/.jsii +49 -4
  3. package/integ.config.json +7 -0
  4. package/lib/index.js +1 -1
  5. package/package.json +9 -8
  6. package/test/integ.evtlam-eventbridge-existing-eventbus.js +5 -2
  7. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/asset.42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c/index.js +10 -0
  8. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/cdk.out +1 -0
  9. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/evtlam-eventbridge-existing-eventbus.assets.json +32 -0
  10. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/evtlam-eventbridge-existing-eventbus.template.json +226 -0
  11. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/evtlameventbridgeexistingeventbusIntegDefaultTestDeployAssertF331E474.assets.json +19 -0
  12. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/evtlameventbridgeexistingeventbusIntegDefaultTestDeployAssertF331E474.template.json +36 -0
  13. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/integ.json +12 -0
  14. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/manifest.json +143 -0
  15. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/tree.json +399 -0
  16. package/test/integ.evtlam-eventbridge-new-eventbus.js +5 -2
  17. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/asset.42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c/index.js +10 -0
  18. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/cdk.out +1 -0
  19. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/evtlam-eventbridge-new-eventbus.assets.json +32 -0
  20. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/evtlam-eventbridge-new-eventbus.template.json +226 -0
  21. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/evtlameventbridgeneweventbusIntegDefaultTestDeployAssert45FE6822.assets.json +19 -0
  22. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/evtlameventbridgeneweventbusIntegDefaultTestDeployAssert45FE6822.template.json +36 -0
  23. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/integ.json +12 -0
  24. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/manifest.json +143 -0
  25. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/tree.json +399 -0
  26. package/test/integ.evtlam-eventbridge-no-argument.js +5 -2
  27. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/asset.42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c/index.js +10 -0
  28. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/cdk.out +1 -0
  29. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/evtlam-eventbridge-no-argument.assets.json +32 -0
  30. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/evtlam-eventbridge-no-argument.template.json +213 -0
  31. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/evtlameventbridgenoargumentIntegDefaultTestDeployAssert5D6CC728.assets.json +19 -0
  32. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/evtlameventbridgenoargumentIntegDefaultTestDeployAssert5D6CC728.template.json +36 -0
  33. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/integ.json +12 -0
  34. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/manifest.json +137 -0
  35. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/tree.json +368 -0
  36. package/test/integ.evtlam-eventbridge-existing-eventbus.expected.json +0 -226
  37. package/test/integ.evtlam-eventbridge-new-eventbus.expected.json +0 -226
  38. package/test/integ.evtlam-eventbridge-no-argument.expected.json +0 -213
@@ -0,0 +1,226 @@
1
+ {
2
+ "Resources": {
3
+ "testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE": {
4
+ "Type": "AWS::IAM::Role",
5
+ "Properties": {
6
+ "AssumeRolePolicyDocument": {
7
+ "Statement": [
8
+ {
9
+ "Action": "sts:AssumeRole",
10
+ "Effect": "Allow",
11
+ "Principal": {
12
+ "Service": "lambda.amazonaws.com"
13
+ }
14
+ }
15
+ ],
16
+ "Version": "2012-10-17"
17
+ },
18
+ "Policies": [
19
+ {
20
+ "PolicyDocument": {
21
+ "Statement": [
22
+ {
23
+ "Action": [
24
+ "logs:CreateLogGroup",
25
+ "logs:CreateLogStream",
26
+ "logs:PutLogEvents"
27
+ ],
28
+ "Effect": "Allow",
29
+ "Resource": {
30
+ "Fn::Join": [
31
+ "",
32
+ [
33
+ "arn:",
34
+ {
35
+ "Ref": "AWS::Partition"
36
+ },
37
+ ":logs:",
38
+ {
39
+ "Ref": "AWS::Region"
40
+ },
41
+ ":",
42
+ {
43
+ "Ref": "AWS::AccountId"
44
+ },
45
+ ":log-group:/aws/lambda/*"
46
+ ]
47
+ ]
48
+ }
49
+ }
50
+ ],
51
+ "Version": "2012-10-17"
52
+ },
53
+ "PolicyName": "LambdaFunctionServiceRolePolicy"
54
+ }
55
+ ]
56
+ }
57
+ },
58
+ "testeventbridgelambdaLambdaFunctionServiceRoleDefaultPolicyB0C15F1B": {
59
+ "Type": "AWS::IAM::Policy",
60
+ "Properties": {
61
+ "PolicyDocument": {
62
+ "Statement": [
63
+ {
64
+ "Action": [
65
+ "xray:PutTelemetryRecords",
66
+ "xray:PutTraceSegments"
67
+ ],
68
+ "Effect": "Allow",
69
+ "Resource": "*"
70
+ }
71
+ ],
72
+ "Version": "2012-10-17"
73
+ },
74
+ "PolicyName": "testeventbridgelambdaLambdaFunctionServiceRoleDefaultPolicyB0C15F1B",
75
+ "Roles": [
76
+ {
77
+ "Ref": "testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE"
78
+ }
79
+ ]
80
+ },
81
+ "Metadata": {
82
+ "cfn_nag": {
83
+ "rules_to_suppress": [
84
+ {
85
+ "id": "W12",
86
+ "reason": "Lambda needs the following minimum required permissions to send trace data to X-Ray and access ENIs in a VPC."
87
+ }
88
+ ]
89
+ }
90
+ }
91
+ },
92
+ "testeventbridgelambdaLambdaFunction475423FD": {
93
+ "Type": "AWS::Lambda::Function",
94
+ "Properties": {
95
+ "Code": {
96
+ "S3Bucket": {
97
+ "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
98
+ },
99
+ "S3Key": "42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c.zip"
100
+ },
101
+ "Environment": {
102
+ "Variables": {
103
+ "AWS_NODEJS_CONNECTION_REUSE_ENABLED": "1"
104
+ }
105
+ },
106
+ "Handler": "index.handler",
107
+ "Role": {
108
+ "Fn::GetAtt": [
109
+ "testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE",
110
+ "Arn"
111
+ ]
112
+ },
113
+ "Runtime": "nodejs16.x",
114
+ "TracingConfig": {
115
+ "Mode": "Active"
116
+ }
117
+ },
118
+ "DependsOn": [
119
+ "testeventbridgelambdaLambdaFunctionServiceRoleDefaultPolicyB0C15F1B",
120
+ "testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE"
121
+ ],
122
+ "Metadata": {
123
+ "cfn_nag": {
124
+ "rules_to_suppress": [
125
+ {
126
+ "id": "W58",
127
+ "reason": "Lambda functions has the required permission to write CloudWatch Logs. It uses custom policy instead of arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole with tighter permissions."
128
+ },
129
+ {
130
+ "id": "W89",
131
+ "reason": "This is not a rule for the general case, just for specific use cases/industries"
132
+ },
133
+ {
134
+ "id": "W92",
135
+ "reason": "Impossible for us to define the correct concurrency for clients"
136
+ }
137
+ ]
138
+ }
139
+ }
140
+ },
141
+ "testeventbridgelambdaLambdaFunctionAwsEventsLambdaInvokePermission1C8A95062": {
142
+ "Type": "AWS::Lambda::Permission",
143
+ "Properties": {
144
+ "Action": "lambda:InvokeFunction",
145
+ "FunctionName": {
146
+ "Fn::GetAtt": [
147
+ "testeventbridgelambdaLambdaFunction475423FD",
148
+ "Arn"
149
+ ]
150
+ },
151
+ "Principal": "events.amazonaws.com",
152
+ "SourceArn": {
153
+ "Fn::GetAtt": [
154
+ "testeventbridgelambdaEventsRule7DB0954D",
155
+ "Arn"
156
+ ]
157
+ }
158
+ }
159
+ },
160
+ "testeventbridgelambdatestnewlambdaA726ECBB": {
161
+ "Type": "AWS::Events::EventBus",
162
+ "Properties": {
163
+ "Name": "test-new-lambda"
164
+ }
165
+ },
166
+ "testeventbridgelambdaEventsRule7DB0954D": {
167
+ "Type": "AWS::Events::Rule",
168
+ "Properties": {
169
+ "EventBusName": {
170
+ "Ref": "testeventbridgelambdatestnewlambdaA726ECBB"
171
+ },
172
+ "EventPattern": {
173
+ "source": [
174
+ "solutionsconstructs"
175
+ ]
176
+ },
177
+ "State": "ENABLED",
178
+ "Targets": [
179
+ {
180
+ "Arn": {
181
+ "Fn::GetAtt": [
182
+ "testeventbridgelambdaLambdaFunction475423FD",
183
+ "Arn"
184
+ ]
185
+ },
186
+ "Id": "Target0"
187
+ }
188
+ ]
189
+ }
190
+ }
191
+ },
192
+ "Parameters": {
193
+ "BootstrapVersion": {
194
+ "Type": "AWS::SSM::Parameter::Value<String>",
195
+ "Default": "/cdk-bootstrap/hnb659fds/version",
196
+ "Description": "Version of the CDK Bootstrap resources in this environment, automatically retrieved from SSM Parameter Store. [cdk:skip]"
197
+ }
198
+ },
199
+ "Rules": {
200
+ "CheckBootstrapVersion": {
201
+ "Assertions": [
202
+ {
203
+ "Assert": {
204
+ "Fn::Not": [
205
+ {
206
+ "Fn::Contains": [
207
+ [
208
+ "1",
209
+ "2",
210
+ "3",
211
+ "4",
212
+ "5"
213
+ ],
214
+ {
215
+ "Ref": "BootstrapVersion"
216
+ }
217
+ ]
218
+ }
219
+ ]
220
+ },
221
+ "AssertDescription": "CDK bootstrap stack version 6 required. Please run 'cdk bootstrap' with a recent version of the CDK CLI."
222
+ }
223
+ ]
224
+ }
225
+ }
226
+ }
@@ -0,0 +1,19 @@
1
+ {
2
+ "version": "36.0.0",
3
+ "files": {
4
+ "21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22": {
5
+ "source": {
6
+ "path": "evtlameventbridgeneweventbusIntegDefaultTestDeployAssert45FE6822.template.json",
7
+ "packaging": "file"
8
+ },
9
+ "destinations": {
10
+ "current_account-current_region": {
11
+ "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
12
+ "objectKey": "21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22.json",
13
+ "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
14
+ }
15
+ }
16
+ }
17
+ },
18
+ "dockerImages": {}
19
+ }
@@ -0,0 +1,36 @@
1
+ {
2
+ "Parameters": {
3
+ "BootstrapVersion": {
4
+ "Type": "AWS::SSM::Parameter::Value<String>",
5
+ "Default": "/cdk-bootstrap/hnb659fds/version",
6
+ "Description": "Version of the CDK Bootstrap resources in this environment, automatically retrieved from SSM Parameter Store. [cdk:skip]"
7
+ }
8
+ },
9
+ "Rules": {
10
+ "CheckBootstrapVersion": {
11
+ "Assertions": [
12
+ {
13
+ "Assert": {
14
+ "Fn::Not": [
15
+ {
16
+ "Fn::Contains": [
17
+ [
18
+ "1",
19
+ "2",
20
+ "3",
21
+ "4",
22
+ "5"
23
+ ],
24
+ {
25
+ "Ref": "BootstrapVersion"
26
+ }
27
+ ]
28
+ }
29
+ ]
30
+ },
31
+ "AssertDescription": "CDK bootstrap stack version 6 required. Please run 'cdk bootstrap' with a recent version of the CDK CLI."
32
+ }
33
+ ]
34
+ }
35
+ }
36
+ }
@@ -0,0 +1,12 @@
1
+ {
2
+ "version": "36.0.0",
3
+ "testCases": {
4
+ "evtlam-eventbridge-new-eventbus/Integ/DefaultTest": {
5
+ "stacks": [
6
+ "evtlam-eventbridge-new-eventbus"
7
+ ],
8
+ "assertionStack": "evtlam-eventbridge-new-eventbus/Integ/DefaultTest/DeployAssert",
9
+ "assertionStackName": "evtlameventbridgeneweventbusIntegDefaultTestDeployAssert45FE6822"
10
+ }
11
+ }
12
+ }
@@ -0,0 +1,143 @@
1
+ {
2
+ "version": "36.0.0",
3
+ "artifacts": {
4
+ "evtlameventbridgeneweventbusIntegDefaultTestDeployAssert45FE6822.assets": {
5
+ "type": "cdk:asset-manifest",
6
+ "properties": {
7
+ "file": "evtlameventbridgeneweventbusIntegDefaultTestDeployAssert45FE6822.assets.json",
8
+ "requiresBootstrapStackVersion": 6,
9
+ "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version"
10
+ }
11
+ },
12
+ "evtlameventbridgeneweventbusIntegDefaultTestDeployAssert45FE6822": {
13
+ "type": "aws:cloudformation:stack",
14
+ "environment": "aws://unknown-account/unknown-region",
15
+ "properties": {
16
+ "templateFile": "evtlameventbridgeneweventbusIntegDefaultTestDeployAssert45FE6822.template.json",
17
+ "terminationProtection": false,
18
+ "validateOnSynth": false,
19
+ "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
20
+ "cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
21
+ "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22.json",
22
+ "requiresBootstrapStackVersion": 6,
23
+ "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
24
+ "additionalDependencies": [
25
+ "evtlameventbridgeneweventbusIntegDefaultTestDeployAssert45FE6822.assets"
26
+ ],
27
+ "lookupRole": {
28
+ "arn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-lookup-role-${AWS::AccountId}-${AWS::Region}",
29
+ "requiresBootstrapStackVersion": 8,
30
+ "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version"
31
+ }
32
+ },
33
+ "dependencies": [
34
+ "evtlameventbridgeneweventbusIntegDefaultTestDeployAssert45FE6822.assets"
35
+ ],
36
+ "metadata": {
37
+ "/evtlam-eventbridge-new-eventbus/Integ/DefaultTest/DeployAssert/BootstrapVersion": [
38
+ {
39
+ "type": "aws:cdk:logicalId",
40
+ "data": "BootstrapVersion"
41
+ }
42
+ ],
43
+ "/evtlam-eventbridge-new-eventbus/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion": [
44
+ {
45
+ "type": "aws:cdk:logicalId",
46
+ "data": "CheckBootstrapVersion"
47
+ }
48
+ ]
49
+ },
50
+ "displayName": "evtlam-eventbridge-new-eventbus/Integ/DefaultTest/DeployAssert"
51
+ },
52
+ "evtlam-eventbridge-new-eventbus.assets": {
53
+ "type": "cdk:asset-manifest",
54
+ "properties": {
55
+ "file": "evtlam-eventbridge-new-eventbus.assets.json",
56
+ "requiresBootstrapStackVersion": 6,
57
+ "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version"
58
+ }
59
+ },
60
+ "evtlam-eventbridge-new-eventbus": {
61
+ "type": "aws:cloudformation:stack",
62
+ "environment": "aws://unknown-account/unknown-region",
63
+ "properties": {
64
+ "templateFile": "evtlam-eventbridge-new-eventbus.template.json",
65
+ "terminationProtection": false,
66
+ "validateOnSynth": false,
67
+ "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
68
+ "cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
69
+ "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/22232c3094695e64d7c3cb4a5dfbd7cb670519c1eed726e91c304dc85d41251e.json",
70
+ "requiresBootstrapStackVersion": 6,
71
+ "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
72
+ "additionalDependencies": [
73
+ "evtlam-eventbridge-new-eventbus.assets"
74
+ ],
75
+ "lookupRole": {
76
+ "arn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-lookup-role-${AWS::AccountId}-${AWS::Region}",
77
+ "requiresBootstrapStackVersion": 8,
78
+ "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version"
79
+ }
80
+ },
81
+ "dependencies": [
82
+ "evtlam-eventbridge-new-eventbus.assets"
83
+ ],
84
+ "metadata": {
85
+ "/evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/Resource": [
86
+ {
87
+ "type": "aws:cdk:logicalId",
88
+ "data": "testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE"
89
+ }
90
+ ],
91
+ "/evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/DefaultPolicy/Resource": [
92
+ {
93
+ "type": "aws:cdk:logicalId",
94
+ "data": "testeventbridgelambdaLambdaFunctionServiceRoleDefaultPolicyB0C15F1B"
95
+ }
96
+ ],
97
+ "/evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/Resource": [
98
+ {
99
+ "type": "aws:cdk:logicalId",
100
+ "data": "testeventbridgelambdaLambdaFunction475423FD"
101
+ }
102
+ ],
103
+ "/evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/AwsEventsLambdaInvokePermission-1": [
104
+ {
105
+ "type": "aws:cdk:logicalId",
106
+ "data": "testeventbridgelambdaLambdaFunctionAwsEventsLambdaInvokePermission1C8A95062"
107
+ }
108
+ ],
109
+ "/evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/test-new-lambda/Resource": [
110
+ {
111
+ "type": "aws:cdk:logicalId",
112
+ "data": "testeventbridgelambdatestnewlambdaA726ECBB"
113
+ }
114
+ ],
115
+ "/evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/EventsRule/Resource": [
116
+ {
117
+ "type": "aws:cdk:logicalId",
118
+ "data": "testeventbridgelambdaEventsRule7DB0954D"
119
+ }
120
+ ],
121
+ "/evtlam-eventbridge-new-eventbus/BootstrapVersion": [
122
+ {
123
+ "type": "aws:cdk:logicalId",
124
+ "data": "BootstrapVersion"
125
+ }
126
+ ],
127
+ "/evtlam-eventbridge-new-eventbus/CheckBootstrapVersion": [
128
+ {
129
+ "type": "aws:cdk:logicalId",
130
+ "data": "CheckBootstrapVersion"
131
+ }
132
+ ]
133
+ },
134
+ "displayName": "evtlam-eventbridge-new-eventbus"
135
+ },
136
+ "Tree": {
137
+ "type": "cdk:tree",
138
+ "properties": {
139
+ "file": "tree.json"
140
+ }
141
+ }
142
+ }
143
+ }