@aws-solutions-constructs/aws-eventbridge-lambda 2.80.0 → 2.82.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (30) hide show
  1. package/.jsii +43 -4
  2. package/lib/index.js +1 -1
  3. package/package.json +6 -6
  4. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/asset.3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f/index.js +23 -0
  5. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/cdk.out +1 -1
  6. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/evtlam-eventbridge-existing-eventbus.assets.json +6 -6
  7. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/evtlam-eventbridge-existing-eventbus.template.json +25 -36
  8. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/evtlameventbridgeexistingeventbusIntegDefaultTestDeployAssertF331E474.assets.json +1 -1
  9. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/integ.json +1 -1
  10. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/manifest.json +142 -6
  11. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/tree.json +1 -399
  12. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/asset.3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f/index.js +23 -0
  13. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/cdk.out +1 -1
  14. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/evtlam-eventbridge-new-eventbus.assets.json +6 -6
  15. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/evtlam-eventbridge-new-eventbus.template.json +25 -36
  16. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/evtlameventbridgeneweventbusIntegDefaultTestDeployAssert45FE6822.assets.json +1 -1
  17. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/integ.json +1 -1
  18. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/manifest.json +142 -6
  19. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/tree.json +1 -399
  20. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/asset.3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f/index.js +23 -0
  21. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/cdk.out +1 -1
  22. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/evtlam-eventbridge-no-argument.assets.json +6 -6
  23. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/evtlam-eventbridge-no-argument.template.json +25 -36
  24. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/evtlameventbridgenoargumentIntegDefaultTestDeployAssert5D6CC728.assets.json +1 -1
  25. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/integ.json +1 -1
  26. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/manifest.json +132 -6
  27. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/tree.json +1 -368
  28. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/asset.42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c/index.js +0 -10
  29. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/asset.42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c/index.js +0 -10
  30. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/asset.42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c/index.js +0 -10
@@ -1,20 +1,20 @@
1
1
  {
2
- "version": "36.0.0",
2
+ "version": "40.0.0",
3
3
  "files": {
4
- "42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c": {
4
+ "3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f": {
5
5
  "source": {
6
- "path": "asset.42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c",
6
+ "path": "asset.3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f",
7
7
  "packaging": "zip"
8
8
  },
9
9
  "destinations": {
10
10
  "current_account-current_region": {
11
11
  "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
12
- "objectKey": "42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c.zip",
12
+ "objectKey": "3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f.zip",
13
13
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
14
14
  }
15
15
  }
16
16
  },
17
- "e6553289aca4296f719a4e77d264e0f565861fc1077b8054fe433e74d4c495b9": {
17
+ "3bddfe0beefb0ed605a6c8ce6629ba80a1fd695b3d2a68d51bbb35049ec8299c": {
18
18
  "source": {
19
19
  "path": "evtlam-eventbridge-no-argument.template.json",
20
20
  "packaging": "file"
@@ -22,7 +22,7 @@
22
22
  "destinations": {
23
23
  "current_account-current_region": {
24
24
  "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
25
- "objectKey": "e6553289aca4296f719a4e77d264e0f565861fc1077b8054fe433e74d4c495b9.json",
25
+ "objectKey": "3bddfe0beefb0ed605a6c8ce6629ba80a1fd695b3d2a68d51bbb35049ec8299c.json",
26
26
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
27
27
  }
28
28
  }
@@ -62,40 +62,6 @@
62
62
  }
63
63
  }
64
64
  },
65
- "testeventbridgelambdaLambdaFunctionServiceRoleDefaultPolicyB0C15F1B": {
66
- "Type": "AWS::IAM::Policy",
67
- "Properties": {
68
- "PolicyDocument": {
69
- "Statement": [
70
- {
71
- "Action": [
72
- "xray:PutTelemetryRecords",
73
- "xray:PutTraceSegments"
74
- ],
75
- "Effect": "Allow",
76
- "Resource": "*"
77
- }
78
- ],
79
- "Version": "2012-10-17"
80
- },
81
- "PolicyName": "testeventbridgelambdaLambdaFunctionServiceRoleDefaultPolicyB0C15F1B",
82
- "Roles": [
83
- {
84
- "Ref": "testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE"
85
- }
86
- ]
87
- },
88
- "Metadata": {
89
- "cfn_nag": {
90
- "rules_to_suppress": [
91
- {
92
- "id": "W12",
93
- "reason": "Lambda needs the following minimum required permissions to send trace data to X-Ray and access ENIs in a VPC."
94
- }
95
- ]
96
- }
97
- }
98
- },
99
65
  "testeventbridgelambdaLambdaFunction475423FD": {
100
66
  "Type": "AWS::Lambda::Function",
101
67
  "Properties": {
@@ -103,7 +69,7 @@
103
69
  "S3Bucket": {
104
70
  "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
105
71
  },
106
- "S3Key": "42a35bbf0dec9ef0ac5b0dde87e71a1b8929e8d2d178dd09ccfb2c928ec0198c.zip"
72
+ "S3Key": "3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f.zip"
107
73
  },
108
74
  "Environment": {
109
75
  "Variables": {
@@ -123,7 +89,6 @@
123
89
  }
124
90
  },
125
91
  "DependsOn": [
126
- "testeventbridgelambdaLambdaFunctionServiceRoleDefaultPolicyB0C15F1B",
127
92
  "testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE"
128
93
  ],
129
94
  "Metadata": {
@@ -145,6 +110,30 @@
145
110
  }
146
111
  }
147
112
  },
113
+ "testeventbridgelambdaLambdaFunctioninlinePolicyAddedToExecutionRole032228887": {
114
+ "Type": "AWS::IAM::Policy",
115
+ "Properties": {
116
+ "PolicyDocument": {
117
+ "Statement": [
118
+ {
119
+ "Action": [
120
+ "xray:PutTelemetryRecords",
121
+ "xray:PutTraceSegments"
122
+ ],
123
+ "Effect": "Allow",
124
+ "Resource": "*"
125
+ }
126
+ ],
127
+ "Version": "2012-10-17"
128
+ },
129
+ "PolicyName": "testeventbridgelambdaLambdaFunctioninlinePolicyAddedToExecutionRole032228887",
130
+ "Roles": [
131
+ {
132
+ "Ref": "testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE"
133
+ }
134
+ ]
135
+ }
136
+ },
148
137
  "testeventbridgelambdaLambdaFunctionAwsEventsLambdaInvokePermission1C8A95062": {
149
138
  "Type": "AWS::Lambda::Permission",
150
139
  "Properties": {
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "36.0.0",
2
+ "version": "40.0.0",
3
3
  "files": {
4
4
  "21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22": {
5
5
  "source": {
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "36.0.0",
2
+ "version": "40.0.0",
3
3
  "testCases": {
4
4
  "evtlam-eventbridge-no-argument/Integ/DefaultTest": {
5
5
  "stacks": [
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "36.0.0",
2
+ "version": "42.0.0",
3
3
  "artifacts": {
4
4
  "evtlameventbridgenoargumentIntegDefaultTestDeployAssert5D6CC728.assets": {
5
5
  "type": "cdk:asset-manifest",
@@ -66,7 +66,7 @@
66
66
  "validateOnSynth": false,
67
67
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
68
68
  "cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
69
- "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/e6553289aca4296f719a4e77d264e0f565861fc1077b8054fe433e74d4c495b9.json",
69
+ "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/3bddfe0beefb0ed605a6c8ce6629ba80a1fd695b3d2a68d51bbb35049ec8299c.json",
70
70
  "requiresBootstrapStackVersion": 6,
71
71
  "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
72
72
  "additionalDependencies": [
@@ -82,16 +82,68 @@
82
82
  "evtlam-eventbridge-no-argument.assets"
83
83
  ],
84
84
  "metadata": {
85
+ "/evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunctionServiceRole": [
86
+ {
87
+ "type": "aws:cdk:analytics:construct",
88
+ "data": {
89
+ "assumedBy": {
90
+ "principalAccount": "*",
91
+ "assumeRoleAction": "*"
92
+ },
93
+ "inlinePolicies": "*"
94
+ }
95
+ },
96
+ {
97
+ "type": "aws:cdk:analytics:method",
98
+ "data": {
99
+ "attachInlinePolicy": [
100
+ "*"
101
+ ]
102
+ }
103
+ },
104
+ {
105
+ "type": "aws:cdk:analytics:method",
106
+ "data": {
107
+ "attachInlinePolicy": [
108
+ "*"
109
+ ]
110
+ }
111
+ }
112
+ ],
113
+ "/evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole": [
114
+ {
115
+ "type": "aws:cdk:analytics:construct",
116
+ "data": "*"
117
+ }
118
+ ],
85
119
  "/evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunctionServiceRole/Resource": [
86
120
  {
87
121
  "type": "aws:cdk:logicalId",
88
122
  "data": "testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE"
89
123
  }
90
124
  ],
91
- "/evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunctionServiceRole/DefaultPolicy/Resource": [
125
+ "/evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction": [
92
126
  {
93
- "type": "aws:cdk:logicalId",
94
- "data": "testeventbridgelambdaLambdaFunctionServiceRoleDefaultPolicyB0C15F1B"
127
+ "type": "aws:cdk:analytics:construct",
128
+ "data": {
129
+ "role": "*",
130
+ "tracing": "Active",
131
+ "code": "*",
132
+ "runtime": "*",
133
+ "handler": "*"
134
+ }
135
+ },
136
+ {
137
+ "type": "aws:cdk:analytics:method",
138
+ "data": {
139
+ "addEnvironment": [
140
+ "*",
141
+ "*",
142
+ {
143
+ "removeInEdge": true
144
+ }
145
+ ]
146
+ }
95
147
  }
96
148
  ],
97
149
  "/evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/Resource": [
@@ -100,12 +152,76 @@
100
152
  "data": "testeventbridgelambdaLambdaFunction475423FD"
101
153
  }
102
154
  ],
155
+ "/evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/inlinePolicyAddedToExecutionRole-0": [
156
+ {
157
+ "type": "aws:cdk:analytics:construct",
158
+ "data": {
159
+ "statements": "*"
160
+ }
161
+ },
162
+ {
163
+ "type": "aws:cdk:analytics:method",
164
+ "data": {
165
+ "addStatements": [
166
+ {}
167
+ ]
168
+ }
169
+ },
170
+ {
171
+ "type": "aws:cdk:analytics:method",
172
+ "data": {
173
+ "attachToRole": [
174
+ "*"
175
+ ]
176
+ }
177
+ },
178
+ {
179
+ "type": "aws:cdk:analytics:method",
180
+ "data": {
181
+ "attachToRole": [
182
+ "*"
183
+ ]
184
+ }
185
+ }
186
+ ],
187
+ "/evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource": [
188
+ {
189
+ "type": "aws:cdk:logicalId",
190
+ "data": "testeventbridgelambdaLambdaFunctioninlinePolicyAddedToExecutionRole032228887"
191
+ }
192
+ ],
103
193
  "/evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/AwsEventsLambdaInvokePermission-1": [
104
194
  {
105
195
  "type": "aws:cdk:logicalId",
106
196
  "data": "testeventbridgelambdaLambdaFunctionAwsEventsLambdaInvokePermission1C8A95062"
107
197
  }
108
198
  ],
199
+ "/evtlam-eventbridge-no-argument/test-eventbridge-lambda/EventsRule": [
200
+ {
201
+ "type": "aws:cdk:analytics:construct",
202
+ "data": {
203
+ "targets": "*",
204
+ "eventBus": "*",
205
+ "schedule": "*"
206
+ }
207
+ },
208
+ {
209
+ "type": "aws:cdk:analytics:method",
210
+ "data": {
211
+ "addEventPattern": [
212
+ "*"
213
+ ]
214
+ }
215
+ },
216
+ {
217
+ "type": "aws:cdk:analytics:method",
218
+ "data": {
219
+ "addTarget": [
220
+ {}
221
+ ]
222
+ }
223
+ }
224
+ ],
109
225
  "/evtlam-eventbridge-no-argument/test-eventbridge-lambda/EventsRule/Resource": [
110
226
  {
111
227
  "type": "aws:cdk:logicalId",
@@ -123,6 +239,15 @@
123
239
  "type": "aws:cdk:logicalId",
124
240
  "data": "CheckBootstrapVersion"
125
241
  }
242
+ ],
243
+ "testeventbridgelambdaLambdaFunctionServiceRoleDefaultPolicyB0C15F1B": [
244
+ {
245
+ "type": "aws:cdk:logicalId",
246
+ "data": "testeventbridgelambdaLambdaFunctionServiceRoleDefaultPolicyB0C15F1B",
247
+ "trace": [
248
+ "!!DESTRUCTIVE_CHANGES: WILL_DESTROY"
249
+ ]
250
+ }
126
251
  ]
127
252
  },
128
253
  "displayName": "evtlam-eventbridge-no-argument"
@@ -133,5 +258,6 @@
133
258
  "file": "tree.json"
134
259
  }
135
260
  }
136
- }
261
+ },
262
+ "minimumCliVersion": "2.1006.0"
137
263
  }