@aws-solutions-constructs/aws-eventbridge-lambda 2.80.0 → 2.81.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (30) hide show
  1. package/.jsii +43 -4
  2. package/lib/index.js +1 -1
  3. package/package.json +6 -6
  4. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/asset.3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f/index.js +23 -0
  5. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/cdk.out +1 -1
  6. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/evtlam-eventbridge-existing-eventbus.assets.json +6 -6
  7. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/evtlam-eventbridge-existing-eventbus.template.json +25 -36
  8. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/evtlameventbridgeexistingeventbusIntegDefaultTestDeployAssertF331E474.assets.json +1 -1
  9. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/integ.json +1 -1
  10. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/manifest.json +142 -6
  11. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/tree.json +1 -399
  12. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/asset.3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f/index.js +23 -0
  13. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/cdk.out +1 -1
  14. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/evtlam-eventbridge-new-eventbus.assets.json +6 -6
  15. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/evtlam-eventbridge-new-eventbus.template.json +25 -36
  16. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/evtlameventbridgeneweventbusIntegDefaultTestDeployAssert45FE6822.assets.json +1 -1
  17. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/integ.json +1 -1
  18. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/manifest.json +142 -6
  19. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/tree.json +1 -399
  20. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/asset.3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f/index.js +23 -0
  21. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/cdk.out +1 -1
  22. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/evtlam-eventbridge-no-argument.assets.json +6 -6
  23. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/evtlam-eventbridge-no-argument.template.json +25 -36
  24. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/evtlameventbridgenoargumentIntegDefaultTestDeployAssert5D6CC728.assets.json +1 -1
  25. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/integ.json +1 -1
  26. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/manifest.json +132 -6
  27. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/tree.json +1 -368
  28. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/asset.42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c/index.js +0 -10
  29. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/asset.42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c/index.js +0 -10
  30. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/asset.42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c/index.js +0 -10
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "36.0.0",
2
+ "version": "42.0.0",
3
3
  "artifacts": {
4
4
  "evtlameventbridgeneweventbusIntegDefaultTestDeployAssert45FE6822.assets": {
5
5
  "type": "cdk:asset-manifest",
@@ -66,7 +66,7 @@
66
66
  "validateOnSynth": false,
67
67
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
68
68
  "cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
69
- "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/28814b1e80d35461272ea5a7cc47158959c3fc73a5ae7ed3a2b1ed49bf7d84e1.json",
69
+ "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/27d76740c058fa3d684bc5524c55ad4338b8e7cf9f3744d96450316d4d153705.json",
70
70
  "requiresBootstrapStackVersion": 6,
71
71
  "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
72
72
  "additionalDependencies": [
@@ -82,16 +82,68 @@
82
82
  "evtlam-eventbridge-new-eventbus.assets"
83
83
  ],
84
84
  "metadata": {
85
+ "/evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole": [
86
+ {
87
+ "type": "aws:cdk:analytics:construct",
88
+ "data": {
89
+ "assumedBy": {
90
+ "principalAccount": "*",
91
+ "assumeRoleAction": "*"
92
+ },
93
+ "inlinePolicies": "*"
94
+ }
95
+ },
96
+ {
97
+ "type": "aws:cdk:analytics:method",
98
+ "data": {
99
+ "attachInlinePolicy": [
100
+ "*"
101
+ ]
102
+ }
103
+ },
104
+ {
105
+ "type": "aws:cdk:analytics:method",
106
+ "data": {
107
+ "attachInlinePolicy": [
108
+ "*"
109
+ ]
110
+ }
111
+ }
112
+ ],
113
+ "/evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole": [
114
+ {
115
+ "type": "aws:cdk:analytics:construct",
116
+ "data": "*"
117
+ }
118
+ ],
85
119
  "/evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/Resource": [
86
120
  {
87
121
  "type": "aws:cdk:logicalId",
88
122
  "data": "testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE"
89
123
  }
90
124
  ],
91
- "/evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/DefaultPolicy/Resource": [
125
+ "/evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction": [
92
126
  {
93
- "type": "aws:cdk:logicalId",
94
- "data": "testeventbridgelambdaLambdaFunctionServiceRoleDefaultPolicyB0C15F1B"
127
+ "type": "aws:cdk:analytics:construct",
128
+ "data": {
129
+ "role": "*",
130
+ "tracing": "Active",
131
+ "code": "*",
132
+ "runtime": "*",
133
+ "handler": "*"
134
+ }
135
+ },
136
+ {
137
+ "type": "aws:cdk:analytics:method",
138
+ "data": {
139
+ "addEnvironment": [
140
+ "*",
141
+ "*",
142
+ {
143
+ "removeInEdge": true
144
+ }
145
+ ]
146
+ }
95
147
  }
96
148
  ],
97
149
  "/evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/Resource": [
@@ -100,18 +152,92 @@
100
152
  "data": "testeventbridgelambdaLambdaFunction475423FD"
101
153
  }
102
154
  ],
155
+ "/evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/inlinePolicyAddedToExecutionRole-0": [
156
+ {
157
+ "type": "aws:cdk:analytics:construct",
158
+ "data": {
159
+ "statements": "*"
160
+ }
161
+ },
162
+ {
163
+ "type": "aws:cdk:analytics:method",
164
+ "data": {
165
+ "addStatements": [
166
+ {}
167
+ ]
168
+ }
169
+ },
170
+ {
171
+ "type": "aws:cdk:analytics:method",
172
+ "data": {
173
+ "attachToRole": [
174
+ "*"
175
+ ]
176
+ }
177
+ },
178
+ {
179
+ "type": "aws:cdk:analytics:method",
180
+ "data": {
181
+ "attachToRole": [
182
+ "*"
183
+ ]
184
+ }
185
+ }
186
+ ],
187
+ "/evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource": [
188
+ {
189
+ "type": "aws:cdk:logicalId",
190
+ "data": "testeventbridgelambdaLambdaFunctioninlinePolicyAddedToExecutionRole032228887"
191
+ }
192
+ ],
103
193
  "/evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/AwsEventsLambdaInvokePermission-1": [
104
194
  {
105
195
  "type": "aws:cdk:logicalId",
106
196
  "data": "testeventbridgelambdaLambdaFunctionAwsEventsLambdaInvokePermission1C8A95062"
107
197
  }
108
198
  ],
199
+ "/evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/test-new-lambda": [
200
+ {
201
+ "type": "aws:cdk:analytics:construct",
202
+ "data": {}
203
+ }
204
+ ],
109
205
  "/evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/test-new-lambda/Resource": [
110
206
  {
111
207
  "type": "aws:cdk:logicalId",
112
208
  "data": "testeventbridgelambdatestnewlambdaA726ECBB"
113
209
  }
114
210
  ],
211
+ "/evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/EventsRule": [
212
+ {
213
+ "type": "aws:cdk:analytics:construct",
214
+ "data": {
215
+ "targets": "*",
216
+ "eventBus": "*",
217
+ "eventPattern": {
218
+ "source": "*"
219
+ }
220
+ }
221
+ },
222
+ {
223
+ "type": "aws:cdk:analytics:method",
224
+ "data": {
225
+ "addEventPattern": [
226
+ {
227
+ "source": "*"
228
+ }
229
+ ]
230
+ }
231
+ },
232
+ {
233
+ "type": "aws:cdk:analytics:method",
234
+ "data": {
235
+ "addTarget": [
236
+ {}
237
+ ]
238
+ }
239
+ }
240
+ ],
115
241
  "/evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/EventsRule/Resource": [
116
242
  {
117
243
  "type": "aws:cdk:logicalId",
@@ -129,6 +255,15 @@
129
255
  "type": "aws:cdk:logicalId",
130
256
  "data": "CheckBootstrapVersion"
131
257
  }
258
+ ],
259
+ "testeventbridgelambdaLambdaFunctionServiceRoleDefaultPolicyB0C15F1B": [
260
+ {
261
+ "type": "aws:cdk:logicalId",
262
+ "data": "testeventbridgelambdaLambdaFunctionServiceRoleDefaultPolicyB0C15F1B",
263
+ "trace": [
264
+ "!!DESTRUCTIVE_CHANGES: WILL_DESTROY"
265
+ ]
266
+ }
132
267
  ]
133
268
  },
134
269
  "displayName": "evtlam-eventbridge-new-eventbus"
@@ -139,5 +274,6 @@
139
274
  "file": "tree.json"
140
275
  }
141
276
  }
142
- }
277
+ },
278
+ "minimumCliVersion": "2.1006.0"
143
279
  }
@@ -1,399 +1 @@
1
- {
2
- "version": "tree-0.1",
3
- "tree": {
4
- "id": "App",
5
- "path": "",
6
- "children": {
7
- "evtlam-eventbridge-new-eventbus": {
8
- "id": "evtlam-eventbridge-new-eventbus",
9
- "path": "evtlam-eventbridge-new-eventbus",
10
- "children": {
11
- "test-eventbridge-lambda": {
12
- "id": "test-eventbridge-lambda",
13
- "path": "evtlam-eventbridge-new-eventbus/test-eventbridge-lambda",
14
- "children": {
15
- "LambdaFunctionServiceRole": {
16
- "id": "LambdaFunctionServiceRole",
17
- "path": "evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole",
18
- "children": {
19
- "ImportLambdaFunctionServiceRole": {
20
- "id": "ImportLambdaFunctionServiceRole",
21
- "path": "evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole",
22
- "constructInfo": {
23
- "fqn": "aws-cdk-lib.Resource",
24
- "version": "2.150.0"
25
- }
26
- },
27
- "Resource": {
28
- "id": "Resource",
29
- "path": "evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/Resource",
30
- "attributes": {
31
- "aws:cdk:cloudformation:type": "AWS::IAM::Role",
32
- "aws:cdk:cloudformation:props": {
33
- "assumeRolePolicyDocument": {
34
- "Statement": [
35
- {
36
- "Action": "sts:AssumeRole",
37
- "Effect": "Allow",
38
- "Principal": {
39
- "Service": "lambda.amazonaws.com"
40
- }
41
- }
42
- ],
43
- "Version": "2012-10-17"
44
- },
45
- "policies": [
46
- {
47
- "policyName": "LambdaFunctionServiceRolePolicy",
48
- "policyDocument": {
49
- "Statement": [
50
- {
51
- "Action": [
52
- "logs:CreateLogGroup",
53
- "logs:CreateLogStream",
54
- "logs:PutLogEvents"
55
- ],
56
- "Effect": "Allow",
57
- "Resource": {
58
- "Fn::Join": [
59
- "",
60
- [
61
- "arn:",
62
- {
63
- "Ref": "AWS::Partition"
64
- },
65
- ":logs:",
66
- {
67
- "Ref": "AWS::Region"
68
- },
69
- ":",
70
- {
71
- "Ref": "AWS::AccountId"
72
- },
73
- ":log-group:/aws/lambda/*"
74
- ]
75
- ]
76
- }
77
- }
78
- ],
79
- "Version": "2012-10-17"
80
- }
81
- }
82
- ]
83
- }
84
- },
85
- "constructInfo": {
86
- "fqn": "aws-cdk-lib.aws_iam.CfnRole",
87
- "version": "2.150.0"
88
- }
89
- },
90
- "DefaultPolicy": {
91
- "id": "DefaultPolicy",
92
- "path": "evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/DefaultPolicy",
93
- "children": {
94
- "Resource": {
95
- "id": "Resource",
96
- "path": "evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/DefaultPolicy/Resource",
97
- "attributes": {
98
- "aws:cdk:cloudformation:type": "AWS::IAM::Policy",
99
- "aws:cdk:cloudformation:props": {
100
- "policyDocument": {
101
- "Statement": [
102
- {
103
- "Action": [
104
- "xray:PutTelemetryRecords",
105
- "xray:PutTraceSegments"
106
- ],
107
- "Effect": "Allow",
108
- "Resource": "*"
109
- }
110
- ],
111
- "Version": "2012-10-17"
112
- },
113
- "policyName": "testeventbridgelambdaLambdaFunctionServiceRoleDefaultPolicyB0C15F1B",
114
- "roles": [
115
- {
116
- "Ref": "testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE"
117
- }
118
- ]
119
- }
120
- },
121
- "constructInfo": {
122
- "fqn": "aws-cdk-lib.aws_iam.CfnPolicy",
123
- "version": "2.150.0"
124
- }
125
- }
126
- },
127
- "constructInfo": {
128
- "fqn": "aws-cdk-lib.aws_iam.Policy",
129
- "version": "2.150.0"
130
- }
131
- }
132
- },
133
- "constructInfo": {
134
- "fqn": "aws-cdk-lib.aws_iam.Role",
135
- "version": "2.150.0"
136
- }
137
- },
138
- "LambdaFunction": {
139
- "id": "LambdaFunction",
140
- "path": "evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction",
141
- "children": {
142
- "Code": {
143
- "id": "Code",
144
- "path": "evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/Code",
145
- "children": {
146
- "Stage": {
147
- "id": "Stage",
148
- "path": "evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/Code/Stage",
149
- "constructInfo": {
150
- "fqn": "aws-cdk-lib.AssetStaging",
151
- "version": "2.150.0"
152
- }
153
- },
154
- "AssetBucket": {
155
- "id": "AssetBucket",
156
- "path": "evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/Code/AssetBucket",
157
- "constructInfo": {
158
- "fqn": "aws-cdk-lib.aws_s3.BucketBase",
159
- "version": "2.150.0"
160
- }
161
- }
162
- },
163
- "constructInfo": {
164
- "fqn": "aws-cdk-lib.aws_s3_assets.Asset",
165
- "version": "2.150.0"
166
- }
167
- },
168
- "Resource": {
169
- "id": "Resource",
170
- "path": "evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/Resource",
171
- "attributes": {
172
- "aws:cdk:cloudformation:type": "AWS::Lambda::Function",
173
- "aws:cdk:cloudformation:props": {
174
- "code": {
175
- "s3Bucket": {
176
- "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
177
- },
178
- "s3Key": "42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c.zip"
179
- },
180
- "environment": {
181
- "variables": {
182
- "AWS_NODEJS_CONNECTION_REUSE_ENABLED": "1"
183
- }
184
- },
185
- "handler": "index.handler",
186
- "role": {
187
- "Fn::GetAtt": [
188
- "testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE",
189
- "Arn"
190
- ]
191
- },
192
- "runtime": "nodejs20.x",
193
- "tracingConfig": {
194
- "mode": "Active"
195
- }
196
- }
197
- },
198
- "constructInfo": {
199
- "fqn": "aws-cdk-lib.aws_lambda.CfnFunction",
200
- "version": "2.150.0"
201
- }
202
- },
203
- "AwsEventsLambdaInvokePermission-1": {
204
- "id": "AwsEventsLambdaInvokePermission-1",
205
- "path": "evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/AwsEventsLambdaInvokePermission-1",
206
- "attributes": {
207
- "aws:cdk:cloudformation:type": "AWS::Lambda::Permission",
208
- "aws:cdk:cloudformation:props": {
209
- "action": "lambda:InvokeFunction",
210
- "functionName": {
211
- "Fn::GetAtt": [
212
- "testeventbridgelambdaLambdaFunction475423FD",
213
- "Arn"
214
- ]
215
- },
216
- "principal": "events.amazonaws.com",
217
- "sourceArn": {
218
- "Fn::GetAtt": [
219
- "testeventbridgelambdaEventsRule7DB0954D",
220
- "Arn"
221
- ]
222
- }
223
- }
224
- },
225
- "constructInfo": {
226
- "fqn": "aws-cdk-lib.aws_lambda.CfnPermission",
227
- "version": "2.150.0"
228
- }
229
- }
230
- },
231
- "constructInfo": {
232
- "fqn": "aws-cdk-lib.aws_lambda.Function",
233
- "version": "2.150.0"
234
- }
235
- },
236
- "test-new-lambda": {
237
- "id": "test-new-lambda",
238
- "path": "evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/test-new-lambda",
239
- "children": {
240
- "Resource": {
241
- "id": "Resource",
242
- "path": "evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/test-new-lambda/Resource",
243
- "attributes": {
244
- "aws:cdk:cloudformation:type": "AWS::Events::EventBus",
245
- "aws:cdk:cloudformation:props": {
246
- "name": "test-new-lambda"
247
- }
248
- },
249
- "constructInfo": {
250
- "fqn": "aws-cdk-lib.aws_events.CfnEventBus",
251
- "version": "2.150.0"
252
- }
253
- }
254
- },
255
- "constructInfo": {
256
- "fqn": "aws-cdk-lib.aws_events.EventBus",
257
- "version": "2.150.0"
258
- }
259
- },
260
- "EventsRule": {
261
- "id": "EventsRule",
262
- "path": "evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/EventsRule",
263
- "children": {
264
- "Resource": {
265
- "id": "Resource",
266
- "path": "evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/EventsRule/Resource",
267
- "attributes": {
268
- "aws:cdk:cloudformation:type": "AWS::Events::Rule",
269
- "aws:cdk:cloudformation:props": {
270
- "eventBusName": {
271
- "Ref": "testeventbridgelambdatestnewlambdaA726ECBB"
272
- },
273
- "eventPattern": {
274
- "source": [
275
- "solutionsconstructs"
276
- ]
277
- },
278
- "state": "ENABLED",
279
- "targets": [
280
- {
281
- "id": "Target0",
282
- "arn": {
283
- "Fn::GetAtt": [
284
- "testeventbridgelambdaLambdaFunction475423FD",
285
- "Arn"
286
- ]
287
- }
288
- }
289
- ]
290
- }
291
- },
292
- "constructInfo": {
293
- "fqn": "aws-cdk-lib.aws_events.CfnRule",
294
- "version": "2.150.0"
295
- }
296
- }
297
- },
298
- "constructInfo": {
299
- "fqn": "aws-cdk-lib.aws_events.Rule",
300
- "version": "2.150.0"
301
- }
302
- }
303
- },
304
- "constructInfo": {
305
- "fqn": "@aws-solutions-constructs/aws-eventbridge-lambda.EventbridgeToLambda",
306
- "version": "2.63.0"
307
- }
308
- },
309
- "Integ": {
310
- "id": "Integ",
311
- "path": "evtlam-eventbridge-new-eventbus/Integ",
312
- "children": {
313
- "DefaultTest": {
314
- "id": "DefaultTest",
315
- "path": "evtlam-eventbridge-new-eventbus/Integ/DefaultTest",
316
- "children": {
317
- "Default": {
318
- "id": "Default",
319
- "path": "evtlam-eventbridge-new-eventbus/Integ/DefaultTest/Default",
320
- "constructInfo": {
321
- "fqn": "constructs.Construct",
322
- "version": "10.3.0"
323
- }
324
- },
325
- "DeployAssert": {
326
- "id": "DeployAssert",
327
- "path": "evtlam-eventbridge-new-eventbus/Integ/DefaultTest/DeployAssert",
328
- "children": {
329
- "BootstrapVersion": {
330
- "id": "BootstrapVersion",
331
- "path": "evtlam-eventbridge-new-eventbus/Integ/DefaultTest/DeployAssert/BootstrapVersion",
332
- "constructInfo": {
333
- "fqn": "aws-cdk-lib.CfnParameter",
334
- "version": "2.150.0"
335
- }
336
- },
337
- "CheckBootstrapVersion": {
338
- "id": "CheckBootstrapVersion",
339
- "path": "evtlam-eventbridge-new-eventbus/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion",
340
- "constructInfo": {
341
- "fqn": "aws-cdk-lib.CfnRule",
342
- "version": "2.150.0"
343
- }
344
- }
345
- },
346
- "constructInfo": {
347
- "fqn": "aws-cdk-lib.Stack",
348
- "version": "2.150.0"
349
- }
350
- }
351
- },
352
- "constructInfo": {
353
- "fqn": "@aws-cdk/integ-tests-alpha.IntegTestCase",
354
- "version": "2.150.0-alpha.0"
355
- }
356
- }
357
- },
358
- "constructInfo": {
359
- "fqn": "@aws-cdk/integ-tests-alpha.IntegTest",
360
- "version": "2.150.0-alpha.0"
361
- }
362
- },
363
- "BootstrapVersion": {
364
- "id": "BootstrapVersion",
365
- "path": "evtlam-eventbridge-new-eventbus/BootstrapVersion",
366
- "constructInfo": {
367
- "fqn": "aws-cdk-lib.CfnParameter",
368
- "version": "2.150.0"
369
- }
370
- },
371
- "CheckBootstrapVersion": {
372
- "id": "CheckBootstrapVersion",
373
- "path": "evtlam-eventbridge-new-eventbus/CheckBootstrapVersion",
374
- "constructInfo": {
375
- "fqn": "aws-cdk-lib.CfnRule",
376
- "version": "2.150.0"
377
- }
378
- }
379
- },
380
- "constructInfo": {
381
- "fqn": "aws-cdk-lib.Stack",
382
- "version": "2.150.0"
383
- }
384
- },
385
- "Tree": {
386
- "id": "Tree",
387
- "path": "Tree",
388
- "constructInfo": {
389
- "fqn": "constructs.Construct",
390
- "version": "10.3.0"
391
- }
392
- }
393
- },
394
- "constructInfo": {
395
- "fqn": "aws-cdk-lib.App",
396
- "version": "2.150.0"
397
- }
398
- }
399
- }
1
+ {"version":"tree-0.1","tree":{"id":"App","path":"","children":{"evtlam-eventbridge-new-eventbus":{"id":"evtlam-eventbridge-new-eventbus","path":"evtlam-eventbridge-new-eventbus","children":{"test-eventbridge-lambda":{"id":"test-eventbridge-lambda","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda","children":{"LambdaFunctionServiceRole":{"id":"LambdaFunctionServiceRole","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole","children":{"ImportLambdaFunctionServiceRole":{"id":"ImportLambdaFunctionServiceRole","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole","constructInfo":{"fqn":"aws-cdk-lib.Resource","version":"2.186.0","metadata":["*"]}},"Resource":{"id":"Resource","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Role","aws:cdk:cloudformation:props":{"assumeRolePolicyDocument":{"Statement":[{"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"Service":"lambda.amazonaws.com"}}],"Version":"2012-10-17"},"policies":[{"policyName":"LambdaFunctionServiceRolePolicy","policyDocument":{"Statement":[{"Action":["logs:CreateLogGroup","logs:CreateLogStream","logs:PutLogEvents"],"Effect":"Allow","Resource":{"Fn::Join":["",["arn:",{"Ref":"AWS::Partition"},":logs:",{"Ref":"AWS::Region"},":",{"Ref":"AWS::AccountId"},":log-group:/aws/lambda/*"]]}}],"Version":"2012-10-17"}}]}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnRole","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Role","version":"2.186.0","metadata":[{"assumedBy":{"principalAccount":"*","assumeRoleAction":"*"},"inlinePolicies":"*"},{"attachInlinePolicy":["*"]},{"attachInlinePolicy":["*"]}]}},"LambdaFunction":{"id":"LambdaFunction","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction","children":{"Code":{"id":"Code","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/Code","children":{"Stage":{"id":"Stage","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/Code/Stage","constructInfo":{"fqn":"aws-cdk-lib.AssetStaging","version":"2.186.0"}},"AssetBucket":{"id":"AssetBucket","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/Code/AssetBucket","constructInfo":{"fqn":"aws-cdk-lib.aws_s3.BucketBase","version":"2.186.0","metadata":[]}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_s3_assets.Asset","version":"2.186.0"}},"Resource":{"id":"Resource","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::Lambda::Function","aws:cdk:cloudformation:props":{"code":{"s3Bucket":{"Fn::Sub":"cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"},"s3Key":"3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f.zip"},"environment":{"variables":{"AWS_NODEJS_CONNECTION_REUSE_ENABLED":"1"}},"handler":"index.handler","role":{"Fn::GetAtt":["testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE","Arn"]},"runtime":"nodejs20.x","tracingConfig":{"mode":"Active"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.CfnFunction","version":"2.186.0"}},"inlinePolicyAddedToExecutionRole-0":{"id":"inlinePolicyAddedToExecutionRole-0","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/inlinePolicyAddedToExecutionRole-0","children":{"Resource":{"id":"Resource","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Policy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":["xray:PutTelemetryRecords","xray:PutTraceSegments"],"Effect":"Allow","Resource":"*"}],"Version":"2012-10-17"},"policyName":"testeventbridgelambdaLambdaFunctioninlinePolicyAddedToExecutionRole032228887","roles":[{"Ref":"testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE"}]}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnPolicy","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Policy","version":"2.186.0","metadata":[{"statements":"*"},{"addStatements":[{}]},{"attachToRole":["*"]},{"attachToRole":["*"]}]}},"AwsEventsLambdaInvokePermission-1":{"id":"AwsEventsLambdaInvokePermission-1","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/AwsEventsLambdaInvokePermission-1","attributes":{"aws:cdk:cloudformation:type":"AWS::Lambda::Permission","aws:cdk:cloudformation:props":{"action":"lambda:InvokeFunction","functionName":{"Fn::GetAtt":["testeventbridgelambdaLambdaFunction475423FD","Arn"]},"principal":"events.amazonaws.com","sourceArn":{"Fn::GetAtt":["testeventbridgelambdaEventsRule7DB0954D","Arn"]}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.CfnPermission","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.Function","version":"2.186.0","metadata":[{"role":"*","tracing":"Active","code":"*","runtime":"*","handler":"*"},{"addEnvironment":["*","*",{"removeInEdge":true}]}]}},"test-new-lambda":{"id":"test-new-lambda","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/test-new-lambda","children":{"Resource":{"id":"Resource","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/test-new-lambda/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::Events::EventBus","aws:cdk:cloudformation:props":{"name":"test-new-lambda"}},"constructInfo":{"fqn":"aws-cdk-lib.aws_events.CfnEventBus","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_events.EventBus","version":"2.186.0","metadata":[{}]}},"EventsRule":{"id":"EventsRule","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/EventsRule","children":{"Resource":{"id":"Resource","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/EventsRule/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::Events::Rule","aws:cdk:cloudformation:props":{"eventBusName":{"Ref":"testeventbridgelambdatestnewlambdaA726ECBB"},"eventPattern":{"source":["solutionsconstructs"]},"state":"ENABLED","targets":[{"id":"Target0","arn":{"Fn::GetAtt":["testeventbridgelambdaLambdaFunction475423FD","Arn"]}}]}},"constructInfo":{"fqn":"aws-cdk-lib.aws_events.CfnRule","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_events.Rule","version":"2.186.0","metadata":[{"targets":"*","eventBus":"*","eventPattern":{"source":"*"}},{"addEventPattern":[{"source":"*"}]},{"addTarget":[{}]}]}}},"constructInfo":{"fqn":"@aws-solutions-constructs/aws-eventbridge-lambda.EventbridgeToLambda","version":"2.80.0"}},"Integ":{"id":"Integ","path":"evtlam-eventbridge-new-eventbus/Integ","children":{"DefaultTest":{"id":"DefaultTest","path":"evtlam-eventbridge-new-eventbus/Integ/DefaultTest","children":{"Default":{"id":"Default","path":"evtlam-eventbridge-new-eventbus/Integ/DefaultTest/Default","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}},"DeployAssert":{"id":"DeployAssert","path":"evtlam-eventbridge-new-eventbus/Integ/DefaultTest/DeployAssert","children":{"BootstrapVersion":{"id":"BootstrapVersion","path":"evtlam-eventbridge-new-eventbus/Integ/DefaultTest/DeployAssert/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.186.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"evtlam-eventbridge-new-eventbus/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.186.0"}}},"constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTestCase","version":"2.186.0-alpha.0"}}},"constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTest","version":"2.186.0-alpha.0"}},"BootstrapVersion":{"id":"BootstrapVersion","path":"evtlam-eventbridge-new-eventbus/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.186.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"evtlam-eventbridge-new-eventbus/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.186.0"}},"Tree":{"id":"Tree","path":"Tree","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}}},"constructInfo":{"fqn":"aws-cdk-lib.App","version":"2.186.0"}}}
@@ -0,0 +1,23 @@
1
+ /**
2
+ * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
3
+ *
4
+ * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance
5
+ * with the License. A copy of the License is located at
6
+ *
7
+ * http://www.apache.org/licenses/LICENSE-2.0
8
+ *
9
+ * or in the 'license' file accompanying this file. This file is distributed on an 'AS IS' BASIS, WITHOUT WARRANTIES
10
+ * OR CONDITIONS OF ANY KIND, express or implied. See the License for the specific language governing permissions
11
+ * and limitations under the License.
12
+ */
13
+
14
+ console.log('Loading function');
15
+
16
+ exports.handler = async (event, context) => {
17
+ console.log('Received event:', JSON.stringify(event, null, 2));
18
+     return {
19
+       statusCode: 200,
20
+       headers: { 'Content-Type': 'text/plain' },
21
+       body: `Hello from Project Vesper! You've hit ${event.path}\n`
22
+     };
23
+ };
@@ -1 +1 @@
1
- {"version":"36.0.0"}
1
+ {"version":"40.0.0"}