@aws-solutions-constructs/aws-eventbridge-lambda 2.80.0 → 2.81.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (30) hide show
  1. package/.jsii +43 -4
  2. package/lib/index.js +1 -1
  3. package/package.json +6 -6
  4. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/asset.3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f/index.js +23 -0
  5. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/cdk.out +1 -1
  6. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/evtlam-eventbridge-existing-eventbus.assets.json +6 -6
  7. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/evtlam-eventbridge-existing-eventbus.template.json +25 -36
  8. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/evtlameventbridgeexistingeventbusIntegDefaultTestDeployAssertF331E474.assets.json +1 -1
  9. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/integ.json +1 -1
  10. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/manifest.json +142 -6
  11. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/tree.json +1 -399
  12. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/asset.3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f/index.js +23 -0
  13. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/cdk.out +1 -1
  14. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/evtlam-eventbridge-new-eventbus.assets.json +6 -6
  15. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/evtlam-eventbridge-new-eventbus.template.json +25 -36
  16. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/evtlameventbridgeneweventbusIntegDefaultTestDeployAssert45FE6822.assets.json +1 -1
  17. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/integ.json +1 -1
  18. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/manifest.json +142 -6
  19. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/tree.json +1 -399
  20. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/asset.3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f/index.js +23 -0
  21. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/cdk.out +1 -1
  22. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/evtlam-eventbridge-no-argument.assets.json +6 -6
  23. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/evtlam-eventbridge-no-argument.template.json +25 -36
  24. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/evtlameventbridgenoargumentIntegDefaultTestDeployAssert5D6CC728.assets.json +1 -1
  25. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/integ.json +1 -1
  26. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/manifest.json +132 -6
  27. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/tree.json +1 -368
  28. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/asset.42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c/index.js +0 -10
  29. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/asset.42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c/index.js +0 -10
  30. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/asset.42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c/index.js +0 -10
@@ -1,399 +1 @@
1
- {
2
- "version": "tree-0.1",
3
- "tree": {
4
- "id": "App",
5
- "path": "",
6
- "children": {
7
- "evtlam-eventbridge-existing-eventbus": {
8
- "id": "evtlam-eventbridge-existing-eventbus",
9
- "path": "evtlam-eventbridge-existing-eventbus",
10
- "children": {
11
- "existing-event-bus": {
12
- "id": "existing-event-bus",
13
- "path": "evtlam-eventbridge-existing-eventbus/existing-event-bus",
14
- "children": {
15
- "Resource": {
16
- "id": "Resource",
17
- "path": "evtlam-eventbridge-existing-eventbus/existing-event-bus/Resource",
18
- "attributes": {
19
- "aws:cdk:cloudformation:type": "AWS::Events::EventBus",
20
- "aws:cdk:cloudformation:props": {
21
- "name": "test-existing-lambda"
22
- }
23
- },
24
- "constructInfo": {
25
- "fqn": "aws-cdk-lib.aws_events.CfnEventBus",
26
- "version": "2.150.0"
27
- }
28
- }
29
- },
30
- "constructInfo": {
31
- "fqn": "aws-cdk-lib.aws_events.EventBus",
32
- "version": "2.150.0"
33
- }
34
- },
35
- "test-eventbridge-lambda": {
36
- "id": "test-eventbridge-lambda",
37
- "path": "evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda",
38
- "children": {
39
- "LambdaFunctionServiceRole": {
40
- "id": "LambdaFunctionServiceRole",
41
- "path": "evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole",
42
- "children": {
43
- "ImportLambdaFunctionServiceRole": {
44
- "id": "ImportLambdaFunctionServiceRole",
45
- "path": "evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole",
46
- "constructInfo": {
47
- "fqn": "aws-cdk-lib.Resource",
48
- "version": "2.150.0"
49
- }
50
- },
51
- "Resource": {
52
- "id": "Resource",
53
- "path": "evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/Resource",
54
- "attributes": {
55
- "aws:cdk:cloudformation:type": "AWS::IAM::Role",
56
- "aws:cdk:cloudformation:props": {
57
- "assumeRolePolicyDocument": {
58
- "Statement": [
59
- {
60
- "Action": "sts:AssumeRole",
61
- "Effect": "Allow",
62
- "Principal": {
63
- "Service": "lambda.amazonaws.com"
64
- }
65
- }
66
- ],
67
- "Version": "2012-10-17"
68
- },
69
- "policies": [
70
- {
71
- "policyName": "LambdaFunctionServiceRolePolicy",
72
- "policyDocument": {
73
- "Statement": [
74
- {
75
- "Action": [
76
- "logs:CreateLogGroup",
77
- "logs:CreateLogStream",
78
- "logs:PutLogEvents"
79
- ],
80
- "Effect": "Allow",
81
- "Resource": {
82
- "Fn::Join": [
83
- "",
84
- [
85
- "arn:",
86
- {
87
- "Ref": "AWS::Partition"
88
- },
89
- ":logs:",
90
- {
91
- "Ref": "AWS::Region"
92
- },
93
- ":",
94
- {
95
- "Ref": "AWS::AccountId"
96
- },
97
- ":log-group:/aws/lambda/*"
98
- ]
99
- ]
100
- }
101
- }
102
- ],
103
- "Version": "2012-10-17"
104
- }
105
- }
106
- ]
107
- }
108
- },
109
- "constructInfo": {
110
- "fqn": "aws-cdk-lib.aws_iam.CfnRole",
111
- "version": "2.150.0"
112
- }
113
- },
114
- "DefaultPolicy": {
115
- "id": "DefaultPolicy",
116
- "path": "evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/DefaultPolicy",
117
- "children": {
118
- "Resource": {
119
- "id": "Resource",
120
- "path": "evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/DefaultPolicy/Resource",
121
- "attributes": {
122
- "aws:cdk:cloudformation:type": "AWS::IAM::Policy",
123
- "aws:cdk:cloudformation:props": {
124
- "policyDocument": {
125
- "Statement": [
126
- {
127
- "Action": [
128
- "xray:PutTelemetryRecords",
129
- "xray:PutTraceSegments"
130
- ],
131
- "Effect": "Allow",
132
- "Resource": "*"
133
- }
134
- ],
135
- "Version": "2012-10-17"
136
- },
137
- "policyName": "testeventbridgelambdaLambdaFunctionServiceRoleDefaultPolicyB0C15F1B",
138
- "roles": [
139
- {
140
- "Ref": "testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE"
141
- }
142
- ]
143
- }
144
- },
145
- "constructInfo": {
146
- "fqn": "aws-cdk-lib.aws_iam.CfnPolicy",
147
- "version": "2.150.0"
148
- }
149
- }
150
- },
151
- "constructInfo": {
152
- "fqn": "aws-cdk-lib.aws_iam.Policy",
153
- "version": "2.150.0"
154
- }
155
- }
156
- },
157
- "constructInfo": {
158
- "fqn": "aws-cdk-lib.aws_iam.Role",
159
- "version": "2.150.0"
160
- }
161
- },
162
- "LambdaFunction": {
163
- "id": "LambdaFunction",
164
- "path": "evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunction",
165
- "children": {
166
- "Code": {
167
- "id": "Code",
168
- "path": "evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunction/Code",
169
- "children": {
170
- "Stage": {
171
- "id": "Stage",
172
- "path": "evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunction/Code/Stage",
173
- "constructInfo": {
174
- "fqn": "aws-cdk-lib.AssetStaging",
175
- "version": "2.150.0"
176
- }
177
- },
178
- "AssetBucket": {
179
- "id": "AssetBucket",
180
- "path": "evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunction/Code/AssetBucket",
181
- "constructInfo": {
182
- "fqn": "aws-cdk-lib.aws_s3.BucketBase",
183
- "version": "2.150.0"
184
- }
185
- }
186
- },
187
- "constructInfo": {
188
- "fqn": "aws-cdk-lib.aws_s3_assets.Asset",
189
- "version": "2.150.0"
190
- }
191
- },
192
- "Resource": {
193
- "id": "Resource",
194
- "path": "evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunction/Resource",
195
- "attributes": {
196
- "aws:cdk:cloudformation:type": "AWS::Lambda::Function",
197
- "aws:cdk:cloudformation:props": {
198
- "code": {
199
- "s3Bucket": {
200
- "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
201
- },
202
- "s3Key": "42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c.zip"
203
- },
204
- "environment": {
205
- "variables": {
206
- "AWS_NODEJS_CONNECTION_REUSE_ENABLED": "1"
207
- }
208
- },
209
- "handler": "index.handler",
210
- "role": {
211
- "Fn::GetAtt": [
212
- "testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE",
213
- "Arn"
214
- ]
215
- },
216
- "runtime": "nodejs20.x",
217
- "tracingConfig": {
218
- "mode": "Active"
219
- }
220
- }
221
- },
222
- "constructInfo": {
223
- "fqn": "aws-cdk-lib.aws_lambda.CfnFunction",
224
- "version": "2.150.0"
225
- }
226
- },
227
- "AwsEventsLambdaInvokePermission-1": {
228
- "id": "AwsEventsLambdaInvokePermission-1",
229
- "path": "evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunction/AwsEventsLambdaInvokePermission-1",
230
- "attributes": {
231
- "aws:cdk:cloudformation:type": "AWS::Lambda::Permission",
232
- "aws:cdk:cloudformation:props": {
233
- "action": "lambda:InvokeFunction",
234
- "functionName": {
235
- "Fn::GetAtt": [
236
- "testeventbridgelambdaLambdaFunction475423FD",
237
- "Arn"
238
- ]
239
- },
240
- "principal": "events.amazonaws.com",
241
- "sourceArn": {
242
- "Fn::GetAtt": [
243
- "testeventbridgelambdaEventsRule7DB0954D",
244
- "Arn"
245
- ]
246
- }
247
- }
248
- },
249
- "constructInfo": {
250
- "fqn": "aws-cdk-lib.aws_lambda.CfnPermission",
251
- "version": "2.150.0"
252
- }
253
- }
254
- },
255
- "constructInfo": {
256
- "fqn": "aws-cdk-lib.aws_lambda.Function",
257
- "version": "2.150.0"
258
- }
259
- },
260
- "EventsRule": {
261
- "id": "EventsRule",
262
- "path": "evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/EventsRule",
263
- "children": {
264
- "Resource": {
265
- "id": "Resource",
266
- "path": "evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/EventsRule/Resource",
267
- "attributes": {
268
- "aws:cdk:cloudformation:type": "AWS::Events::Rule",
269
- "aws:cdk:cloudformation:props": {
270
- "eventBusName": {
271
- "Ref": "existingeventbusA5B80487"
272
- },
273
- "eventPattern": {
274
- "source": [
275
- "solutionsconstructs"
276
- ]
277
- },
278
- "state": "ENABLED",
279
- "targets": [
280
- {
281
- "id": "Target0",
282
- "arn": {
283
- "Fn::GetAtt": [
284
- "testeventbridgelambdaLambdaFunction475423FD",
285
- "Arn"
286
- ]
287
- }
288
- }
289
- ]
290
- }
291
- },
292
- "constructInfo": {
293
- "fqn": "aws-cdk-lib.aws_events.CfnRule",
294
- "version": "2.150.0"
295
- }
296
- }
297
- },
298
- "constructInfo": {
299
- "fqn": "aws-cdk-lib.aws_events.Rule",
300
- "version": "2.150.0"
301
- }
302
- }
303
- },
304
- "constructInfo": {
305
- "fqn": "@aws-solutions-constructs/aws-eventbridge-lambda.EventbridgeToLambda",
306
- "version": "2.63.0"
307
- }
308
- },
309
- "Integ": {
310
- "id": "Integ",
311
- "path": "evtlam-eventbridge-existing-eventbus/Integ",
312
- "children": {
313
- "DefaultTest": {
314
- "id": "DefaultTest",
315
- "path": "evtlam-eventbridge-existing-eventbus/Integ/DefaultTest",
316
- "children": {
317
- "Default": {
318
- "id": "Default",
319
- "path": "evtlam-eventbridge-existing-eventbus/Integ/DefaultTest/Default",
320
- "constructInfo": {
321
- "fqn": "constructs.Construct",
322
- "version": "10.3.0"
323
- }
324
- },
325
- "DeployAssert": {
326
- "id": "DeployAssert",
327
- "path": "evtlam-eventbridge-existing-eventbus/Integ/DefaultTest/DeployAssert",
328
- "children": {
329
- "BootstrapVersion": {
330
- "id": "BootstrapVersion",
331
- "path": "evtlam-eventbridge-existing-eventbus/Integ/DefaultTest/DeployAssert/BootstrapVersion",
332
- "constructInfo": {
333
- "fqn": "aws-cdk-lib.CfnParameter",
334
- "version": "2.150.0"
335
- }
336
- },
337
- "CheckBootstrapVersion": {
338
- "id": "CheckBootstrapVersion",
339
- "path": "evtlam-eventbridge-existing-eventbus/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion",
340
- "constructInfo": {
341
- "fqn": "aws-cdk-lib.CfnRule",
342
- "version": "2.150.0"
343
- }
344
- }
345
- },
346
- "constructInfo": {
347
- "fqn": "aws-cdk-lib.Stack",
348
- "version": "2.150.0"
349
- }
350
- }
351
- },
352
- "constructInfo": {
353
- "fqn": "@aws-cdk/integ-tests-alpha.IntegTestCase",
354
- "version": "2.150.0-alpha.0"
355
- }
356
- }
357
- },
358
- "constructInfo": {
359
- "fqn": "@aws-cdk/integ-tests-alpha.IntegTest",
360
- "version": "2.150.0-alpha.0"
361
- }
362
- },
363
- "BootstrapVersion": {
364
- "id": "BootstrapVersion",
365
- "path": "evtlam-eventbridge-existing-eventbus/BootstrapVersion",
366
- "constructInfo": {
367
- "fqn": "aws-cdk-lib.CfnParameter",
368
- "version": "2.150.0"
369
- }
370
- },
371
- "CheckBootstrapVersion": {
372
- "id": "CheckBootstrapVersion",
373
- "path": "evtlam-eventbridge-existing-eventbus/CheckBootstrapVersion",
374
- "constructInfo": {
375
- "fqn": "aws-cdk-lib.CfnRule",
376
- "version": "2.150.0"
377
- }
378
- }
379
- },
380
- "constructInfo": {
381
- "fqn": "aws-cdk-lib.Stack",
382
- "version": "2.150.0"
383
- }
384
- },
385
- "Tree": {
386
- "id": "Tree",
387
- "path": "Tree",
388
- "constructInfo": {
389
- "fqn": "constructs.Construct",
390
- "version": "10.3.0"
391
- }
392
- }
393
- },
394
- "constructInfo": {
395
- "fqn": "aws-cdk-lib.App",
396
- "version": "2.150.0"
397
- }
398
- }
399
- }
1
+ {"version":"tree-0.1","tree":{"id":"App","path":"","children":{"evtlam-eventbridge-existing-eventbus":{"id":"evtlam-eventbridge-existing-eventbus","path":"evtlam-eventbridge-existing-eventbus","children":{"existing-event-bus":{"id":"existing-event-bus","path":"evtlam-eventbridge-existing-eventbus/existing-event-bus","children":{"Resource":{"id":"Resource","path":"evtlam-eventbridge-existing-eventbus/existing-event-bus/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::Events::EventBus","aws:cdk:cloudformation:props":{"name":"test-existing-lambda"}},"constructInfo":{"fqn":"aws-cdk-lib.aws_events.CfnEventBus","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_events.EventBus","version":"2.186.0","metadata":[{}]}},"test-eventbridge-lambda":{"id":"test-eventbridge-lambda","path":"evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda","children":{"LambdaFunctionServiceRole":{"id":"LambdaFunctionServiceRole","path":"evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole","children":{"ImportLambdaFunctionServiceRole":{"id":"ImportLambdaFunctionServiceRole","path":"evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole","constructInfo":{"fqn":"aws-cdk-lib.Resource","version":"2.186.0","metadata":["*"]}},"Resource":{"id":"Resource","path":"evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Role","aws:cdk:cloudformation:props":{"assumeRolePolicyDocument":{"Statement":[{"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"Service":"lambda.amazonaws.com"}}],"Version":"2012-10-17"},"policies":[{"policyName":"LambdaFunctionServiceRolePolicy","policyDocument":{"Statement":[{"Action":["logs:CreateLogGroup","logs:CreateLogStream","logs:PutLogEvents"],"Effect":"Allow","Resource":{"Fn::Join":["",["arn:",{"Ref":"AWS::Partition"},":logs:",{"Ref":"AWS::Region"},":",{"Ref":"AWS::AccountId"},":log-group:/aws/lambda/*"]]}}],"Version":"2012-10-17"}}]}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnRole","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Role","version":"2.186.0","metadata":[{"assumedBy":{"principalAccount":"*","assumeRoleAction":"*"},"inlinePolicies":"*"},{"attachInlinePolicy":["*"]},{"attachInlinePolicy":["*"]}]}},"LambdaFunction":{"id":"LambdaFunction","path":"evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunction","children":{"Code":{"id":"Code","path":"evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunction/Code","children":{"Stage":{"id":"Stage","path":"evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunction/Code/Stage","constructInfo":{"fqn":"aws-cdk-lib.AssetStaging","version":"2.186.0"}},"AssetBucket":{"id":"AssetBucket","path":"evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunction/Code/AssetBucket","constructInfo":{"fqn":"aws-cdk-lib.aws_s3.BucketBase","version":"2.186.0","metadata":[]}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_s3_assets.Asset","version":"2.186.0"}},"Resource":{"id":"Resource","path":"evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunction/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::Lambda::Function","aws:cdk:cloudformation:props":{"code":{"s3Bucket":{"Fn::Sub":"cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"},"s3Key":"3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f.zip"},"environment":{"variables":{"AWS_NODEJS_CONNECTION_REUSE_ENABLED":"1"}},"handler":"index.handler","role":{"Fn::GetAtt":["testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE","Arn"]},"runtime":"nodejs20.x","tracingConfig":{"mode":"Active"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.CfnFunction","version":"2.186.0"}},"inlinePolicyAddedToExecutionRole-0":{"id":"inlinePolicyAddedToExecutionRole-0","path":"evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunction/inlinePolicyAddedToExecutionRole-0","children":{"Resource":{"id":"Resource","path":"evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Policy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":["xray:PutTelemetryRecords","xray:PutTraceSegments"],"Effect":"Allow","Resource":"*"}],"Version":"2012-10-17"},"policyName":"testeventbridgelambdaLambdaFunctioninlinePolicyAddedToExecutionRole032228887","roles":[{"Ref":"testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE"}]}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnPolicy","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Policy","version":"2.186.0","metadata":[{"statements":"*"},{"addStatements":[{}]},{"attachToRole":["*"]},{"attachToRole":["*"]}]}},"AwsEventsLambdaInvokePermission-1":{"id":"AwsEventsLambdaInvokePermission-1","path":"evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/LambdaFunction/AwsEventsLambdaInvokePermission-1","attributes":{"aws:cdk:cloudformation:type":"AWS::Lambda::Permission","aws:cdk:cloudformation:props":{"action":"lambda:InvokeFunction","functionName":{"Fn::GetAtt":["testeventbridgelambdaLambdaFunction475423FD","Arn"]},"principal":"events.amazonaws.com","sourceArn":{"Fn::GetAtt":["testeventbridgelambdaEventsRule7DB0954D","Arn"]}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.CfnPermission","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.Function","version":"2.186.0","metadata":[{"role":"*","tracing":"Active","code":"*","runtime":"*","handler":"*"},{"addEnvironment":["*","*",{"removeInEdge":true}]}]}},"EventsRule":{"id":"EventsRule","path":"evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/EventsRule","children":{"Resource":{"id":"Resource","path":"evtlam-eventbridge-existing-eventbus/test-eventbridge-lambda/EventsRule/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::Events::Rule","aws:cdk:cloudformation:props":{"eventBusName":{"Ref":"existingeventbusA5B80487"},"eventPattern":{"source":["solutionsconstructs"]},"state":"ENABLED","targets":[{"id":"Target0","arn":{"Fn::GetAtt":["testeventbridgelambdaLambdaFunction475423FD","Arn"]}}]}},"constructInfo":{"fqn":"aws-cdk-lib.aws_events.CfnRule","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_events.Rule","version":"2.186.0","metadata":[{"targets":"*","eventBus":"*","eventPattern":{"source":"*"}},{"addEventPattern":[{"source":"*"}]},{"addTarget":[{}]}]}}},"constructInfo":{"fqn":"@aws-solutions-constructs/aws-eventbridge-lambda.EventbridgeToLambda","version":"2.80.0"}},"Integ":{"id":"Integ","path":"evtlam-eventbridge-existing-eventbus/Integ","children":{"DefaultTest":{"id":"DefaultTest","path":"evtlam-eventbridge-existing-eventbus/Integ/DefaultTest","children":{"Default":{"id":"Default","path":"evtlam-eventbridge-existing-eventbus/Integ/DefaultTest/Default","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}},"DeployAssert":{"id":"DeployAssert","path":"evtlam-eventbridge-existing-eventbus/Integ/DefaultTest/DeployAssert","children":{"BootstrapVersion":{"id":"BootstrapVersion","path":"evtlam-eventbridge-existing-eventbus/Integ/DefaultTest/DeployAssert/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.186.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"evtlam-eventbridge-existing-eventbus/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.186.0"}}},"constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTestCase","version":"2.186.0-alpha.0"}}},"constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTest","version":"2.186.0-alpha.0"}},"BootstrapVersion":{"id":"BootstrapVersion","path":"evtlam-eventbridge-existing-eventbus/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.186.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"evtlam-eventbridge-existing-eventbus/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.186.0"}},"Tree":{"id":"Tree","path":"Tree","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}}},"constructInfo":{"fqn":"aws-cdk-lib.App","version":"2.186.0"}}}
@@ -0,0 +1,23 @@
1
+ /**
2
+ * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
3
+ *
4
+ * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance
5
+ * with the License. A copy of the License is located at
6
+ *
7
+ * http://www.apache.org/licenses/LICENSE-2.0
8
+ *
9
+ * or in the 'license' file accompanying this file. This file is distributed on an 'AS IS' BASIS, WITHOUT WARRANTIES
10
+ * OR CONDITIONS OF ANY KIND, express or implied. See the License for the specific language governing permissions
11
+ * and limitations under the License.
12
+ */
13
+
14
+ console.log('Loading function');
15
+
16
+ exports.handler = async (event, context) => {
17
+ console.log('Received event:', JSON.stringify(event, null, 2));
18
+     return {
19
+       statusCode: 200,
20
+       headers: { 'Content-Type': 'text/plain' },
21
+       body: `Hello from Project Vesper! You've hit ${event.path}\n`
22
+     };
23
+ };
@@ -1 +1 @@
1
- {"version":"36.0.0"}
1
+ {"version":"40.0.0"}
@@ -1,20 +1,20 @@
1
1
  {
2
- "version": "36.0.0",
2
+ "version": "40.0.0",
3
3
  "files": {
4
- "42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c": {
4
+ "3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f": {
5
5
  "source": {
6
- "path": "asset.42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c",
6
+ "path": "asset.3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f",
7
7
  "packaging": "zip"
8
8
  },
9
9
  "destinations": {
10
10
  "current_account-current_region": {
11
11
  "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
12
- "objectKey": "42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c.zip",
12
+ "objectKey": "3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f.zip",
13
13
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
14
14
  }
15
15
  }
16
16
  },
17
- "28814b1e80d35461272ea5a7cc47158959c3fc73a5ae7ed3a2b1ed49bf7d84e1": {
17
+ "27d76740c058fa3d684bc5524c55ad4338b8e7cf9f3744d96450316d4d153705": {
18
18
  "source": {
19
19
  "path": "evtlam-eventbridge-new-eventbus.template.json",
20
20
  "packaging": "file"
@@ -22,7 +22,7 @@
22
22
  "destinations": {
23
23
  "current_account-current_region": {
24
24
  "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
25
- "objectKey": "28814b1e80d35461272ea5a7cc47158959c3fc73a5ae7ed3a2b1ed49bf7d84e1.json",
25
+ "objectKey": "27d76740c058fa3d684bc5524c55ad4338b8e7cf9f3744d96450316d4d153705.json",
26
26
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
27
27
  }
28
28
  }
@@ -62,40 +62,6 @@
62
62
  }
63
63
  }
64
64
  },
65
- "testeventbridgelambdaLambdaFunctionServiceRoleDefaultPolicyB0C15F1B": {
66
- "Type": "AWS::IAM::Policy",
67
- "Properties": {
68
- "PolicyDocument": {
69
- "Statement": [
70
- {
71
- "Action": [
72
- "xray:PutTelemetryRecords",
73
- "xray:PutTraceSegments"
74
- ],
75
- "Effect": "Allow",
76
- "Resource": "*"
77
- }
78
- ],
79
- "Version": "2012-10-17"
80
- },
81
- "PolicyName": "testeventbridgelambdaLambdaFunctionServiceRoleDefaultPolicyB0C15F1B",
82
- "Roles": [
83
- {
84
- "Ref": "testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE"
85
- }
86
- ]
87
- },
88
- "Metadata": {
89
- "cfn_nag": {
90
- "rules_to_suppress": [
91
- {
92
- "id": "W12",
93
- "reason": "Lambda needs the following minimum required permissions to send trace data to X-Ray and access ENIs in a VPC."
94
- }
95
- ]
96
- }
97
- }
98
- },
99
65
  "testeventbridgelambdaLambdaFunction475423FD": {
100
66
  "Type": "AWS::Lambda::Function",
101
67
  "Properties": {
@@ -103,7 +69,7 @@
103
69
  "S3Bucket": {
104
70
  "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
105
71
  },
106
- "S3Key": "42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c.zip"
72
+ "S3Key": "3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f.zip"
107
73
  },
108
74
  "Environment": {
109
75
  "Variables": {
@@ -123,7 +89,6 @@
123
89
  }
124
90
  },
125
91
  "DependsOn": [
126
- "testeventbridgelambdaLambdaFunctionServiceRoleDefaultPolicyB0C15F1B",
127
92
  "testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE"
128
93
  ],
129
94
  "Metadata": {
@@ -145,6 +110,30 @@
145
110
  }
146
111
  }
147
112
  },
113
+ "testeventbridgelambdaLambdaFunctioninlinePolicyAddedToExecutionRole032228887": {
114
+ "Type": "AWS::IAM::Policy",
115
+ "Properties": {
116
+ "PolicyDocument": {
117
+ "Statement": [
118
+ {
119
+ "Action": [
120
+ "xray:PutTelemetryRecords",
121
+ "xray:PutTraceSegments"
122
+ ],
123
+ "Effect": "Allow",
124
+ "Resource": "*"
125
+ }
126
+ ],
127
+ "Version": "2012-10-17"
128
+ },
129
+ "PolicyName": "testeventbridgelambdaLambdaFunctioninlinePolicyAddedToExecutionRole032228887",
130
+ "Roles": [
131
+ {
132
+ "Ref": "testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE"
133
+ }
134
+ ]
135
+ }
136
+ },
148
137
  "testeventbridgelambdaLambdaFunctionAwsEventsLambdaInvokePermission1C8A95062": {
149
138
  "Type": "AWS::Lambda::Permission",
150
139
  "Properties": {
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "36.0.0",
2
+ "version": "40.0.0",
3
3
  "files": {
4
4
  "21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22": {
5
5
  "source": {
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "36.0.0",
2
+ "version": "40.0.0",
3
3
  "testCases": {
4
4
  "evtlam-eventbridge-new-eventbus/Integ/DefaultTest": {
5
5
  "stacks": [