@aws-solutions-constructs/aws-eventbridge-lambda 2.95.1 → 2.96.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (28) hide show
  1. package/.jsii +3 -3
  2. package/README.adoc +2 -2
  3. package/lib/index.js +1 -1
  4. package/package.json +3 -3
  5. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/asset.0772ffe05bd3b2e012dc5086ab3b6dd03c8a0268fc1c81326f5e72b0a4c6b51e/index.js +23 -0
  6. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/cdk.out +1 -1
  7. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/evtlam-eventbridge-existing-eventbus.assets.json +10 -8
  8. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/evtlam-eventbridge-existing-eventbus.template.json +2 -2
  9. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/evtlameventbridgeexistingeventbusIntegDefaultTestDeployAssertF331E474.assets.json +3 -2
  10. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/integ.json +3 -2
  11. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/manifest.json +496 -12
  12. package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/tree.json +1 -1
  13. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/asset.0772ffe05bd3b2e012dc5086ab3b6dd03c8a0268fc1c81326f5e72b0a4c6b51e/index.js +23 -0
  14. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/cdk.out +1 -1
  15. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/evtlam-eventbridge-new-eventbus.assets.json +10 -8
  16. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/evtlam-eventbridge-new-eventbus.template.json +2 -2
  17. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/evtlameventbridgeneweventbusIntegDefaultTestDeployAssert45FE6822.assets.json +3 -2
  18. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/integ.json +3 -2
  19. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/manifest.json +496 -12
  20. package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/tree.json +1 -1
  21. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/asset.0772ffe05bd3b2e012dc5086ab3b6dd03c8a0268fc1c81326f5e72b0a4c6b51e/index.js +23 -0
  22. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/cdk.out +1 -1
  23. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/evtlam-eventbridge-no-argument.assets.json +8 -8
  24. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/evtlam-eventbridge-no-argument.template.json +2 -2
  25. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/evtlameventbridgenoargumentIntegDefaultTestDeployAssert5D6CC728.assets.json +1 -1
  26. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/integ.json +2 -2
  27. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/manifest.json +65 -41
  28. package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/tree.json +1 -1
@@ -1 +1 @@
1
- {"version":"tree-0.1","tree":{"id":"App","path":"","children":{"evtlam-eventbridge-new-eventbus":{"id":"evtlam-eventbridge-new-eventbus","path":"evtlam-eventbridge-new-eventbus","children":{"test-eventbridge-lambda":{"id":"test-eventbridge-lambda","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda","children":{"LambdaFunctionServiceRole":{"id":"LambdaFunctionServiceRole","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole","children":{"ImportLambdaFunctionServiceRole":{"id":"ImportLambdaFunctionServiceRole","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole","constructInfo":{"fqn":"aws-cdk-lib.Resource","version":"2.186.0","metadata":["*"]}},"Resource":{"id":"Resource","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Role","aws:cdk:cloudformation:props":{"assumeRolePolicyDocument":{"Statement":[{"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"Service":"lambda.amazonaws.com"}}],"Version":"2012-10-17"},"policies":[{"policyName":"LambdaFunctionServiceRolePolicy","policyDocument":{"Statement":[{"Action":["logs:CreateLogGroup","logs:CreateLogStream","logs:PutLogEvents"],"Effect":"Allow","Resource":{"Fn::Join":["",["arn:",{"Ref":"AWS::Partition"},":logs:",{"Ref":"AWS::Region"},":",{"Ref":"AWS::AccountId"},":log-group:/aws/lambda/*"]]}}],"Version":"2012-10-17"}}]}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnRole","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Role","version":"2.186.0","metadata":[{"assumedBy":{"principalAccount":"*","assumeRoleAction":"*"},"inlinePolicies":"*"},{"attachInlinePolicy":["*"]},{"attachInlinePolicy":["*"]}]}},"LambdaFunction":{"id":"LambdaFunction","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction","children":{"Code":{"id":"Code","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/Code","children":{"Stage":{"id":"Stage","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/Code/Stage","constructInfo":{"fqn":"aws-cdk-lib.AssetStaging","version":"2.186.0"}},"AssetBucket":{"id":"AssetBucket","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/Code/AssetBucket","constructInfo":{"fqn":"aws-cdk-lib.aws_s3.BucketBase","version":"2.186.0","metadata":[]}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_s3_assets.Asset","version":"2.186.0"}},"Resource":{"id":"Resource","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::Lambda::Function","aws:cdk:cloudformation:props":{"code":{"s3Bucket":{"Fn::Sub":"cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"},"s3Key":"3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f.zip"},"environment":{"variables":{"AWS_NODEJS_CONNECTION_REUSE_ENABLED":"1"}},"handler":"index.handler","role":{"Fn::GetAtt":["testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE","Arn"]},"runtime":"nodejs20.x","tracingConfig":{"mode":"Active"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.CfnFunction","version":"2.186.0"}},"inlinePolicyAddedToExecutionRole-0":{"id":"inlinePolicyAddedToExecutionRole-0","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/inlinePolicyAddedToExecutionRole-0","children":{"Resource":{"id":"Resource","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Policy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":["xray:PutTelemetryRecords","xray:PutTraceSegments"],"Effect":"Allow","Resource":"*"}],"Version":"2012-10-17"},"policyName":"testeventbridgelambdaLambdaFunctioninlinePolicyAddedToExecutionRole032228887","roles":[{"Ref":"testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE"}]}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnPolicy","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Policy","version":"2.186.0","metadata":[{"statements":"*"},{"addStatements":[{}]},{"attachToRole":["*"]},{"attachToRole":["*"]}]}},"AwsEventsLambdaInvokePermission-1":{"id":"AwsEventsLambdaInvokePermission-1","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/AwsEventsLambdaInvokePermission-1","attributes":{"aws:cdk:cloudformation:type":"AWS::Lambda::Permission","aws:cdk:cloudformation:props":{"action":"lambda:InvokeFunction","functionName":{"Fn::GetAtt":["testeventbridgelambdaLambdaFunction475423FD","Arn"]},"principal":"events.amazonaws.com","sourceArn":{"Fn::GetAtt":["testeventbridgelambdaEventsRule7DB0954D","Arn"]}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.CfnPermission","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.Function","version":"2.186.0","metadata":[{"role":"*","tracing":"Active","code":"*","runtime":"*","handler":"*"},{"addEnvironment":["*","*",{"removeInEdge":true}]}]}},"test-new-lambda":{"id":"test-new-lambda","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/test-new-lambda","children":{"Resource":{"id":"Resource","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/test-new-lambda/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::Events::EventBus","aws:cdk:cloudformation:props":{"name":"test-new-lambda"}},"constructInfo":{"fqn":"aws-cdk-lib.aws_events.CfnEventBus","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_events.EventBus","version":"2.186.0","metadata":[{}]}},"EventsRule":{"id":"EventsRule","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/EventsRule","children":{"Resource":{"id":"Resource","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/EventsRule/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::Events::Rule","aws:cdk:cloudformation:props":{"eventBusName":{"Ref":"testeventbridgelambdatestnewlambdaA726ECBB"},"eventPattern":{"source":["solutionsconstructs"]},"state":"ENABLED","targets":[{"id":"Target0","arn":{"Fn::GetAtt":["testeventbridgelambdaLambdaFunction475423FD","Arn"]}}]}},"constructInfo":{"fqn":"aws-cdk-lib.aws_events.CfnRule","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_events.Rule","version":"2.186.0","metadata":[{"targets":"*","eventBus":"*","eventPattern":{"source":"*"}},{"addEventPattern":[{"source":"*"}]},{"addTarget":[{}]}]}}},"constructInfo":{"fqn":"@aws-solutions-constructs/aws-eventbridge-lambda.EventbridgeToLambda","version":"2.80.0"}},"Integ":{"id":"Integ","path":"evtlam-eventbridge-new-eventbus/Integ","children":{"DefaultTest":{"id":"DefaultTest","path":"evtlam-eventbridge-new-eventbus/Integ/DefaultTest","children":{"Default":{"id":"Default","path":"evtlam-eventbridge-new-eventbus/Integ/DefaultTest/Default","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}},"DeployAssert":{"id":"DeployAssert","path":"evtlam-eventbridge-new-eventbus/Integ/DefaultTest/DeployAssert","children":{"BootstrapVersion":{"id":"BootstrapVersion","path":"evtlam-eventbridge-new-eventbus/Integ/DefaultTest/DeployAssert/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.186.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"evtlam-eventbridge-new-eventbus/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.186.0"}}},"constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTestCase","version":"2.186.0-alpha.0"}}},"constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTest","version":"2.186.0-alpha.0"}},"BootstrapVersion":{"id":"BootstrapVersion","path":"evtlam-eventbridge-new-eventbus/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.186.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"evtlam-eventbridge-new-eventbus/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.186.0"}},"Tree":{"id":"Tree","path":"Tree","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}}},"constructInfo":{"fqn":"aws-cdk-lib.App","version":"2.186.0"}}}
1
+ {"version":"tree-0.1","tree":{"id":"App","path":"","constructInfo":{"fqn":"aws-cdk-lib.App","version":"2.223.0"},"children":{"evtlam-eventbridge-new-eventbus":{"id":"evtlam-eventbridge-new-eventbus","path":"evtlam-eventbridge-new-eventbus","constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.223.0"},"children":{"test-eventbridge-lambda":{"id":"test-eventbridge-lambda","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda","constructInfo":{"fqn":"@aws-solutions-constructs/aws-eventbridge-lambda.EventbridgeToLambda","version":"2.95.1"},"children":{"LambdaFunctionServiceRole":{"id":"LambdaFunctionServiceRole","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Role","version":"2.223.0","metadata":[{"assumedBy":{"principalAccount":"*","assumeRoleAction":"*"},"inlinePolicies":"*"},{"attachInlinePolicy":["*"]},{"attachInlinePolicy":["*"]}]},"children":{"ImportLambdaFunctionServiceRole":{"id":"ImportLambdaFunctionServiceRole","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole","constructInfo":{"fqn":"aws-cdk-lib.Resource","version":"2.223.0","metadata":["*"]}},"Resource":{"id":"Resource","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnRole","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Role","aws:cdk:cloudformation:props":{"assumeRolePolicyDocument":{"Statement":[{"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"Service":"lambda.amazonaws.com"}}],"Version":"2012-10-17"},"policies":[{"policyName":"LambdaFunctionServiceRolePolicy","policyDocument":{"Statement":[{"Action":["logs:CreateLogGroup","logs:CreateLogStream","logs:PutLogEvents"],"Effect":"Allow","Resource":{"Fn::Join":["",["arn:",{"Ref":"AWS::Partition"},":logs:",{"Ref":"AWS::Region"},":",{"Ref":"AWS::AccountId"},":log-group:/aws/lambda/*"]]}}],"Version":"2012-10-17"}}]}}}}},"LambdaFunction":{"id":"LambdaFunction","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.Function","version":"2.223.0","metadata":[{"role":"*","tracing":"Active","code":"*","runtime":"*","handler":"*"},{"addEnvironment":["*","*",{"removeInEdge":true}]}]},"children":{"Code":{"id":"Code","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/Code","constructInfo":{"fqn":"aws-cdk-lib.aws_s3_assets.Asset","version":"2.223.0"},"children":{"Stage":{"id":"Stage","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/Code/Stage","constructInfo":{"fqn":"aws-cdk-lib.AssetStaging","version":"2.223.0"}},"AssetBucket":{"id":"AssetBucket","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/Code/AssetBucket","constructInfo":{"fqn":"aws-cdk-lib.aws_s3.BucketBase","version":"2.223.0","metadata":[]}}}},"Resource":{"id":"Resource","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.CfnFunction","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::Lambda::Function","aws:cdk:cloudformation:props":{"code":{"s3Bucket":{"Fn::Sub":"cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"},"s3Key":"0772ffe05bd3b2e012dc5086ab3b6dd03c8a0268fc1c81326f5e72b0a4c6b51e.zip"},"environment":{"variables":{"AWS_NODEJS_CONNECTION_REUSE_ENABLED":"1"}},"handler":"index.handler","role":{"Fn::GetAtt":["testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE","Arn"]},"runtime":"nodejs22.x","tracingConfig":{"mode":"Active"}}}},"inlinePolicyAddedToExecutionRole-0":{"id":"inlinePolicyAddedToExecutionRole-0","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/inlinePolicyAddedToExecutionRole-0","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Policy","version":"2.223.0","metadata":[{"statements":"*"},{"addStatements":[{}]},{"attachToRole":["*"]},{"attachToRole":["*"]}]},"children":{"Resource":{"id":"Resource","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnPolicy","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Policy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":["xray:PutTelemetryRecords","xray:PutTraceSegments"],"Effect":"Allow","Resource":"*"}],"Version":"2012-10-17"},"policyName":"testeventbridgelambdaLambdaFunctioninlinePolicyAddedToExecutionRole032228887","roles":[{"Ref":"testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE"}]}}}}},"AwsEventsLambdaInvokePermission-1":{"id":"AwsEventsLambdaInvokePermission-1","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/AwsEventsLambdaInvokePermission-1","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.CfnPermission","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::Lambda::Permission","aws:cdk:cloudformation:props":{"action":"lambda:InvokeFunction","functionName":{"Fn::GetAtt":["testeventbridgelambdaLambdaFunction475423FD","Arn"]},"principal":"events.amazonaws.com","sourceArn":{"Fn::GetAtt":["testeventbridgelambdaEventsRule7DB0954D","Arn"]}}}}}},"test-new-lambda":{"id":"test-new-lambda","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/test-new-lambda","constructInfo":{"fqn":"aws-cdk-lib.aws_events.EventBus","version":"2.223.0","metadata":[{}]},"children":{"Resource":{"id":"Resource","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/test-new-lambda/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_events.CfnEventBus","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::Events::EventBus","aws:cdk:cloudformation:props":{"name":"test-new-lambda"}}}}},"EventsRule":{"id":"EventsRule","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/EventsRule","constructInfo":{"fqn":"aws-cdk-lib.aws_events.Rule","version":"2.223.0","metadata":[{"targets":"*","eventBus":"*","eventPattern":{"source":"*"}},{"addEventPattern":[{"source":"*"}]},{"addTarget":[{}]}]},"children":{"Resource":{"id":"Resource","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/EventsRule/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_events.CfnRule","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::Events::Rule","aws:cdk:cloudformation:props":{"eventBusName":{"Ref":"testeventbridgelambdatestnewlambdaA726ECBB"},"eventPattern":{"source":["solutionsconstructs"]},"state":"ENABLED","targets":[{"id":"Target0","arn":{"Fn::GetAtt":["testeventbridgelambdaLambdaFunction475423FD","Arn"]}}]}}}}}}},"Integ":{"id":"Integ","path":"evtlam-eventbridge-new-eventbus/Integ","constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTest","version":"2.223.0-alpha.0"},"children":{"DefaultTest":{"id":"DefaultTest","path":"evtlam-eventbridge-new-eventbus/Integ/DefaultTest","constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTestCase","version":"2.223.0-alpha.0"},"children":{"Default":{"id":"Default","path":"evtlam-eventbridge-new-eventbus/Integ/DefaultTest/Default","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}},"DeployAssert":{"id":"DeployAssert","path":"evtlam-eventbridge-new-eventbus/Integ/DefaultTest/DeployAssert","constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.223.0"},"children":{"BootstrapVersion":{"id":"BootstrapVersion","path":"evtlam-eventbridge-new-eventbus/Integ/DefaultTest/DeployAssert/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.223.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"evtlam-eventbridge-new-eventbus/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.223.0"}}}}}}}},"BootstrapVersion":{"id":"BootstrapVersion","path":"evtlam-eventbridge-new-eventbus/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.223.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"evtlam-eventbridge-new-eventbus/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.223.0"}}}},"Tree":{"id":"Tree","path":"Tree","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}}}}}
@@ -0,0 +1,23 @@
1
+ /**
2
+ * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
3
+ *
4
+ * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance
5
+ * with the License. A copy of the License is located at
6
+ *
7
+ * http://www.apache.org/licenses/LICENSE-2.0
8
+ *
9
+ * or in the 'license' file accompanying this file. This file is distributed on an 'AS IS' BASIS, WITHOUT WARRANTIES
10
+ * OR CONDITIONS OF ANY KIND, express or implied. See the License for the specific language governing permissions
11
+ * and limitations under the License.
12
+ */
13
+
14
+ console.log('Loading function');
15
+
16
+ exports.handler = async (event, context) => {
17
+ console.log('Received event:', JSON.stringify(event, null, 2));
18
+     return {
19
+       statusCode: 200,
20
+       headers: { 'Content-Type': 'text/plain' },
21
+       body: `Hello from AWS Solutions Constructs! You've hit ${event.path}\n`
22
+     };
23
+ };
@@ -1 +1 @@
1
- {"version":"45.0.0"}
1
+ {"version":"48.0.0"}
@@ -1,30 +1,30 @@
1
1
  {
2
- "version": "45.0.0",
2
+ "version": "48.0.0",
3
3
  "files": {
4
- "3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f": {
4
+ "0772ffe05bd3b2e012dc5086ab3b6dd03c8a0268fc1c81326f5e72b0a4c6b51e": {
5
5
  "displayName": "test-eventbridge-lambda/LambdaFunction/Code",
6
6
  "source": {
7
- "path": "asset.3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f",
7
+ "path": "asset.0772ffe05bd3b2e012dc5086ab3b6dd03c8a0268fc1c81326f5e72b0a4c6b51e",
8
8
  "packaging": "zip"
9
9
  },
10
10
  "destinations": {
11
- "current_account-current_region-7f03e0f4": {
11
+ "current_account-current_region-1a238803": {
12
12
  "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
13
- "objectKey": "3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f.zip",
13
+ "objectKey": "0772ffe05bd3b2e012dc5086ab3b6dd03c8a0268fc1c81326f5e72b0a4c6b51e.zip",
14
14
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
15
15
  }
16
16
  }
17
17
  },
18
- "065fd5a9f3bee5a5abc95c7223c350f13a3eb606c0487ddc33dfdf8baf586ce1": {
18
+ "1d9e914187c2c83ca4a25c019359780f5b866ffc3748333eb44481188ef2fe2c": {
19
19
  "displayName": "evtlam-eventbridge-no-argument Template",
20
20
  "source": {
21
21
  "path": "evtlam-eventbridge-no-argument.template.json",
22
22
  "packaging": "file"
23
23
  },
24
24
  "destinations": {
25
- "current_account-current_region-2a989052": {
25
+ "current_account-current_region-2cd6e1d9": {
26
26
  "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
27
- "objectKey": "065fd5a9f3bee5a5abc95c7223c350f13a3eb606c0487ddc33dfdf8baf586ce1.json",
27
+ "objectKey": "1d9e914187c2c83ca4a25c019359780f5b866ffc3748333eb44481188ef2fe2c.json",
28
28
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
29
29
  }
30
30
  }
@@ -69,7 +69,7 @@
69
69
  "S3Bucket": {
70
70
  "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
71
71
  },
72
- "S3Key": "3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f.zip"
72
+ "S3Key": "0772ffe05bd3b2e012dc5086ab3b6dd03c8a0268fc1c81326f5e72b0a4c6b51e.zip"
73
73
  },
74
74
  "Environment": {
75
75
  "Variables": {
@@ -83,7 +83,7 @@
83
83
  "Arn"
84
84
  ]
85
85
  },
86
- "Runtime": "nodejs20.x",
86
+ "Runtime": "nodejs22.x",
87
87
  "TracingConfig": {
88
88
  "Mode": "Active"
89
89
  }
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "45.0.0",
2
+ "version": "48.0.0",
3
3
  "files": {
4
4
  "21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22": {
5
5
  "displayName": "evtlameventbridgenoargumentIntegDefaultTestDeployAssert5D6CC728 Template",
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "45.0.0",
2
+ "version": "48.0.0",
3
3
  "testCases": {
4
4
  "evtlam-eventbridge-no-argument/Integ/DefaultTest": {
5
5
  "stacks": [
@@ -9,5 +9,5 @@
9
9
  "assertionStackName": "evtlameventbridgenoargumentIntegDefaultTestDeployAssert5D6CC728"
10
10
  }
11
11
  },
12
- "minimumCliVersion": "2.1020.2"
12
+ "minimumCliVersion": "2.1029.2"
13
13
  }
@@ -66,7 +66,7 @@
66
66
  "validateOnSynth": false,
67
67
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
68
68
  "cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
69
- "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/065fd5a9f3bee5a5abc95c7223c350f13a3eb606c0487ddc33dfdf8baf586ce1.json",
69
+ "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/1d9e914187c2c83ca4a25c019359780f5b866ffc3748333eb44481188ef2fe2c.json",
70
70
  "requiresBootstrapStackVersion": 6,
71
71
  "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
72
72
  "additionalDependencies": [
@@ -254,57 +254,48 @@
254
254
  "properties": {
255
255
  "module": "aws-cdk-lib",
256
256
  "flags": {
257
- "@aws-cdk/core:enableStackNameDuplicates": {
257
+ "@aws-cdk/aws-signer:signingProfileNamePassedToCfn": {
258
258
  "recommendedValue": true,
259
- "explanation": "Allow multiple stacks with the same name"
260
- },
261
- "aws-cdk:enableDiffNoFail": {
262
- "recommendedValue": true,
263
- "explanation": "Make `cdk diff` not fail when there are differences"
259
+ "explanation": "Pass signingProfileName to CfnSigningProfile"
264
260
  },
265
261
  "@aws-cdk/core:newStyleStackSynthesis": {
266
262
  "recommendedValue": true,
267
- "explanation": "Switch to new stack synthesis method which enables CI/CD"
263
+ "explanation": "Switch to new stack synthesis method which enables CI/CD",
264
+ "unconfiguredBehavesLike": {
265
+ "v2": true
266
+ }
268
267
  },
269
268
  "@aws-cdk/core:stackRelativeExports": {
270
269
  "recommendedValue": true,
271
- "explanation": "Name exports based on the construct paths relative to the stack, rather than the global construct path"
272
- },
273
- "@aws-cdk/aws-ecr-assets:dockerIgnoreSupport": {
274
- "recommendedValue": true,
275
- "explanation": "DockerImageAsset properly supports `.dockerignore` files by default"
276
- },
277
- "@aws-cdk/aws-secretsmanager:parseOwnedSecretName": {
278
- "recommendedValue": true,
279
- "explanation": "Fix the referencing of SecretsManager names from ARNs"
280
- },
281
- "@aws-cdk/aws-kms:defaultKeyPolicies": {
282
- "recommendedValue": true,
283
- "explanation": "Tighten default KMS key policies"
284
- },
285
- "@aws-cdk/aws-s3:grantWriteWithoutAcl": {
286
- "recommendedValue": true,
287
- "explanation": "Remove `PutObjectAcl` from Bucket.grantWrite"
270
+ "explanation": "Name exports based on the construct paths relative to the stack, rather than the global construct path",
271
+ "unconfiguredBehavesLike": {
272
+ "v2": true
273
+ }
288
274
  },
289
- "@aws-cdk/aws-ecs-patterns:removeDefaultDesiredCount": {
275
+ "@aws-cdk/aws-ecs-patterns:secGroupsDisablesImplicitOpenListener": {
290
276
  "recommendedValue": true,
291
- "explanation": "Do not specify a default DesiredCount for ECS services"
277
+ "explanation": "Disable implicit openListener when custom security groups are provided"
292
278
  },
293
279
  "@aws-cdk/aws-rds:lowercaseDbIdentifier": {
294
280
  "recommendedValue": true,
295
- "explanation": "Force lowercasing of RDS Cluster names in CDK"
281
+ "explanation": "Force lowercasing of RDS Cluster names in CDK",
282
+ "unconfiguredBehavesLike": {
283
+ "v2": true
284
+ }
296
285
  },
297
286
  "@aws-cdk/aws-apigateway:usagePlanKeyOrderInsensitiveId": {
298
287
  "recommendedValue": true,
299
- "explanation": "Allow adding/removing multiple UsagePlanKeys independently"
300
- },
301
- "@aws-cdk/aws-efs:defaultEncryptionAtRest": {
302
- "recommendedValue": true,
303
- "explanation": "Enable this feature flag to have elastic file systems encrypted at rest by default."
288
+ "explanation": "Allow adding/removing multiple UsagePlanKeys independently",
289
+ "unconfiguredBehavesLike": {
290
+ "v2": true
291
+ }
304
292
  },
305
293
  "@aws-cdk/aws-lambda:recognizeVersionProps": {
306
294
  "recommendedValue": true,
307
- "explanation": "Enable this feature flag to opt in to the updated logical id calculation for Lambda Version created using the `fn.currentVersion`."
295
+ "explanation": "Enable this feature flag to opt in to the updated logical id calculation for Lambda Version created using the `fn.currentVersion`.",
296
+ "unconfiguredBehavesLike": {
297
+ "v2": true
298
+ }
308
299
  },
309
300
  "@aws-cdk/aws-lambda:recognizeLayerVersion": {
310
301
  "userValue": true,
@@ -313,7 +304,10 @@
313
304
  },
314
305
  "@aws-cdk/aws-cloudfront:defaultSecurityPolicyTLSv1.2_2021": {
315
306
  "recommendedValue": true,
316
- "explanation": "Enable this feature flag to have cloudfront distributions use the security policy TLSv1.2_2021 by default."
307
+ "explanation": "Enable this feature flag to have cloudfront distributions use the security policy TLSv1.2_2021 by default.",
308
+ "unconfiguredBehavesLike": {
309
+ "v2": true
310
+ }
317
311
  },
318
312
  "@aws-cdk/core:checkSecretUsage": {
319
313
  "userValue": true,
@@ -390,7 +384,7 @@
390
384
  "@aws-cdk/aws-iam:importedRoleStackSafeDefaultPolicyName": {
391
385
  "userValue": true,
392
386
  "recommendedValue": true,
393
- "explanation": "Enable this feature to by default create default policy names for imported roles that depend on the stack the role is in."
387
+ "explanation": "Enable this feature to create default policy names for imported roles that depend on the stack the role is in."
394
388
  },
395
389
  "@aws-cdk/aws-s3:serverAccessLogsUseBucketPolicy": {
396
390
  "userValue": true,
@@ -534,7 +528,10 @@
534
528
  },
535
529
  "@aws-cdk/pipelines:reduceAssetRoleTrustScope": {
536
530
  "recommendedValue": true,
537
- "explanation": "Remove the root account principal from PipelineAssetsFileRole trust policy"
531
+ "explanation": "Remove the root account principal from PipelineAssetsFileRole trust policy",
532
+ "unconfiguredBehavesLike": {
533
+ "v2": true
534
+ }
538
535
  },
539
536
  "@aws-cdk/aws-eks:nodegroupNameAttribute": {
540
537
  "userValue": true,
@@ -563,7 +560,10 @@
563
560
  },
564
561
  "@aws-cdk/aws-stepfunctions-tasks:useNewS3UriParametersForBedrockInvokeModelTask": {
565
562
  "recommendedValue": true,
566
- "explanation": "When enabled, use new props for S3 URI field in task definition of state machine for bedrock invoke model."
563
+ "explanation": "When enabled, use new props for S3 URI field in task definition of state machine for bedrock invoke model.",
564
+ "unconfiguredBehavesLike": {
565
+ "v2": true
566
+ }
567
567
  },
568
568
  "@aws-cdk/core:explicitStackTags": {
569
569
  "userValue": true,
@@ -627,7 +627,10 @@
627
627
  },
628
628
  "@aws-cdk/core:aspectStabilization": {
629
629
  "recommendedValue": true,
630
- "explanation": "When enabled, a stabilization loop will be run when invoking Aspects during synthesis."
630
+ "explanation": "When enabled, a stabilization loop will be run when invoking Aspects during synthesis.",
631
+ "unconfiguredBehavesLike": {
632
+ "v2": true
633
+ }
631
634
  },
632
635
  "@aws-cdk/aws-route53-targets:userPoolDomainNameMethodWithoutCustomResource": {
633
636
  "userValue": true,
@@ -661,7 +664,10 @@
661
664
  },
662
665
  "@aws-cdk/pipelines:reduceStageRoleTrustScope": {
663
666
  "recommendedValue": true,
664
- "explanation": "Remove the root account principal from Stage addActions trust policy"
667
+ "explanation": "Remove the root account principal from Stage addActions trust policy",
668
+ "unconfiguredBehavesLike": {
669
+ "v2": true
670
+ }
665
671
  },
666
672
  "@aws-cdk/aws-events:requireEventBusPolicySid": {
667
673
  "userValue": true,
@@ -684,7 +690,10 @@
684
690
  },
685
691
  "@aws-cdk/pipelines:reduceCrossAccountActionRoleTrustScope": {
686
692
  "recommendedValue": true,
687
- "explanation": "When enabled, scopes down the trust policy for the cross-account action role"
693
+ "explanation": "When enabled, scopes down the trust policy for the cross-account action role",
694
+ "unconfiguredBehavesLike": {
695
+ "v2": true
696
+ }
688
697
  },
689
698
  "@aws-cdk/aws-stepfunctions:useDistributedMapResultWriterV2": {
690
699
  "userValue": true,
@@ -714,6 +723,21 @@
714
723
  "userValue": true,
715
724
  "recommendedValue": true,
716
725
  "explanation": "When enabled, CDK creates and manages loggroup for the lambda function"
726
+ },
727
+ "@aws-cdk/aws-elasticloadbalancingv2:networkLoadBalancerWithSecurityGroupByDefault": {
728
+ "recommendedValue": true,
729
+ "explanation": "When enabled, Network Load Balancer will be created with a security group by default."
730
+ },
731
+ "@aws-cdk/aws-stepfunctions-tasks:httpInvokeDynamicJsonPathEndpoint": {
732
+ "recommendedValue": true,
733
+ "explanation": "When enabled, allows using a dynamic apiEndpoint with JSONPath format in HttpInvoke tasks.",
734
+ "unconfiguredBehavesLike": {
735
+ "v2": true
736
+ }
737
+ },
738
+ "@aws-cdk/aws-ecs-patterns:uniqueTargetGroupId": {
739
+ "recommendedValue": true,
740
+ "explanation": "When enabled, ECS patterns will generate unique target group IDs to prevent conflicts during load balancer replacement"
717
741
  }
718
742
  }
719
743
  }
@@ -1 +1 @@
1
- {"version":"tree-0.1","tree":{"id":"App","path":"","constructInfo":{"fqn":"aws-cdk-lib.App","version":"2.206.0"},"children":{"evtlam-eventbridge-no-argument":{"id":"evtlam-eventbridge-no-argument","path":"evtlam-eventbridge-no-argument","constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.206.0"},"children":{"test-eventbridge-lambda":{"id":"test-eventbridge-lambda","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda","constructInfo":{"fqn":"@aws-solutions-constructs/aws-eventbridge-lambda.EventbridgeToLambda","version":"2.86.0"},"children":{"LambdaFunctionServiceRole":{"id":"LambdaFunctionServiceRole","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunctionServiceRole","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Role","version":"2.206.0","metadata":[{"assumedBy":{"principalAccount":"*","assumeRoleAction":"*"},"inlinePolicies":"*"},{"attachInlinePolicy":["*"]},{"attachInlinePolicy":["*"]}]},"children":{"ImportLambdaFunctionServiceRole":{"id":"ImportLambdaFunctionServiceRole","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole","constructInfo":{"fqn":"aws-cdk-lib.Resource","version":"2.206.0","metadata":["*"]}},"Resource":{"id":"Resource","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunctionServiceRole/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnRole","version":"2.206.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Role","aws:cdk:cloudformation:props":{"assumeRolePolicyDocument":{"Statement":[{"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"Service":"lambda.amazonaws.com"}}],"Version":"2012-10-17"},"policies":[{"policyName":"LambdaFunctionServiceRolePolicy","policyDocument":{"Statement":[{"Action":["logs:CreateLogGroup","logs:CreateLogStream","logs:PutLogEvents"],"Effect":"Allow","Resource":{"Fn::Join":["",["arn:",{"Ref":"AWS::Partition"},":logs:",{"Ref":"AWS::Region"},":",{"Ref":"AWS::AccountId"},":log-group:/aws/lambda/*"]]}}],"Version":"2012-10-17"}}]}}}}},"LambdaFunction":{"id":"LambdaFunction","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.Function","version":"2.206.0","metadata":[{"role":"*","tracing":"Active","code":"*","runtime":"*","handler":"*"},{"addEnvironment":["*","*",{"removeInEdge":true}]}]},"children":{"Code":{"id":"Code","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/Code","constructInfo":{"fqn":"aws-cdk-lib.aws_s3_assets.Asset","version":"2.206.0"},"children":{"Stage":{"id":"Stage","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/Code/Stage","constructInfo":{"fqn":"aws-cdk-lib.AssetStaging","version":"2.206.0"}},"AssetBucket":{"id":"AssetBucket","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/Code/AssetBucket","constructInfo":{"fqn":"aws-cdk-lib.aws_s3.BucketBase","version":"2.206.0","metadata":[]}}}},"Resource":{"id":"Resource","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.CfnFunction","version":"2.206.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::Lambda::Function","aws:cdk:cloudformation:props":{"code":{"s3Bucket":{"Fn::Sub":"cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"},"s3Key":"3a18fd3de4803f72260a058823accffd4f8d69986c6862a23cd86265f6cafa0f.zip"},"environment":{"variables":{"AWS_NODEJS_CONNECTION_REUSE_ENABLED":"1"}},"handler":"index.handler","role":{"Fn::GetAtt":["testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE","Arn"]},"runtime":"nodejs20.x","tracingConfig":{"mode":"Active"}}}},"inlinePolicyAddedToExecutionRole-0":{"id":"inlinePolicyAddedToExecutionRole-0","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/inlinePolicyAddedToExecutionRole-0","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Policy","version":"2.206.0","metadata":[{"statements":"*"},{"addStatements":[{}]},{"attachToRole":["*"]},{"attachToRole":["*"]}]},"children":{"Resource":{"id":"Resource","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnPolicy","version":"2.206.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Policy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":["xray:PutTelemetryRecords","xray:PutTraceSegments"],"Effect":"Allow","Resource":"*"}],"Version":"2012-10-17"},"policyName":"testeventbridgelambdaLambdaFunctioninlinePolicyAddedToExecutionRole032228887","roles":[{"Ref":"testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE"}]}}}}},"AwsEventsLambdaInvokePermission-1":{"id":"AwsEventsLambdaInvokePermission-1","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/AwsEventsLambdaInvokePermission-1","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.CfnPermission","version":"2.206.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::Lambda::Permission","aws:cdk:cloudformation:props":{"action":"lambda:InvokeFunction","functionName":{"Fn::GetAtt":["testeventbridgelambdaLambdaFunction475423FD","Arn"]},"principal":"events.amazonaws.com","sourceArn":{"Fn::GetAtt":["testeventbridgelambdaEventsRule7DB0954D","Arn"]}}}}}},"EventsRule":{"id":"EventsRule","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/EventsRule","constructInfo":{"fqn":"aws-cdk-lib.aws_events.Rule","version":"2.206.0","metadata":[{"targets":"*","eventBus":"*","schedule":"*"},{"addEventPattern":["*"]},{"addTarget":[{}]}]},"children":{"Resource":{"id":"Resource","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/EventsRule/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_events.CfnRule","version":"2.206.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::Events::Rule","aws:cdk:cloudformation:props":{"scheduleExpression":"rate(5 minutes)","state":"ENABLED","targets":[{"id":"Target0","arn":{"Fn::GetAtt":["testeventbridgelambdaLambdaFunction475423FD","Arn"]}}]}}}}}}},"Integ":{"id":"Integ","path":"evtlam-eventbridge-no-argument/Integ","constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTest","version":"2.206.0-alpha.0"},"children":{"DefaultTest":{"id":"DefaultTest","path":"evtlam-eventbridge-no-argument/Integ/DefaultTest","constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTestCase","version":"2.206.0-alpha.0"},"children":{"Default":{"id":"Default","path":"evtlam-eventbridge-no-argument/Integ/DefaultTest/Default","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}},"DeployAssert":{"id":"DeployAssert","path":"evtlam-eventbridge-no-argument/Integ/DefaultTest/DeployAssert","constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.206.0"},"children":{"BootstrapVersion":{"id":"BootstrapVersion","path":"evtlam-eventbridge-no-argument/Integ/DefaultTest/DeployAssert/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.206.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"evtlam-eventbridge-no-argument/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.206.0"}}}}}}}},"BootstrapVersion":{"id":"BootstrapVersion","path":"evtlam-eventbridge-no-argument/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.206.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"evtlam-eventbridge-no-argument/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.206.0"}}}},"Tree":{"id":"Tree","path":"Tree","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}}}}}
1
+ {"version":"tree-0.1","tree":{"id":"App","path":"","constructInfo":{"fqn":"aws-cdk-lib.App","version":"2.223.0"},"children":{"evtlam-eventbridge-no-argument":{"id":"evtlam-eventbridge-no-argument","path":"evtlam-eventbridge-no-argument","constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.223.0"},"children":{"test-eventbridge-lambda":{"id":"test-eventbridge-lambda","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda","constructInfo":{"fqn":"@aws-solutions-constructs/aws-eventbridge-lambda.EventbridgeToLambda","version":"2.95.1"},"children":{"LambdaFunctionServiceRole":{"id":"LambdaFunctionServiceRole","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunctionServiceRole","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Role","version":"2.223.0","metadata":[{"assumedBy":{"principalAccount":"*","assumeRoleAction":"*"},"inlinePolicies":"*"},{"attachInlinePolicy":["*"]},{"attachInlinePolicy":["*"]}]},"children":{"ImportLambdaFunctionServiceRole":{"id":"ImportLambdaFunctionServiceRole","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole","constructInfo":{"fqn":"aws-cdk-lib.Resource","version":"2.223.0","metadata":["*"]}},"Resource":{"id":"Resource","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunctionServiceRole/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnRole","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Role","aws:cdk:cloudformation:props":{"assumeRolePolicyDocument":{"Statement":[{"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"Service":"lambda.amazonaws.com"}}],"Version":"2012-10-17"},"policies":[{"policyName":"LambdaFunctionServiceRolePolicy","policyDocument":{"Statement":[{"Action":["logs:CreateLogGroup","logs:CreateLogStream","logs:PutLogEvents"],"Effect":"Allow","Resource":{"Fn::Join":["",["arn:",{"Ref":"AWS::Partition"},":logs:",{"Ref":"AWS::Region"},":",{"Ref":"AWS::AccountId"},":log-group:/aws/lambda/*"]]}}],"Version":"2012-10-17"}}]}}}}},"LambdaFunction":{"id":"LambdaFunction","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.Function","version":"2.223.0","metadata":[{"role":"*","tracing":"Active","code":"*","runtime":"*","handler":"*"},{"addEnvironment":["*","*",{"removeInEdge":true}]}]},"children":{"Code":{"id":"Code","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/Code","constructInfo":{"fqn":"aws-cdk-lib.aws_s3_assets.Asset","version":"2.223.0"},"children":{"Stage":{"id":"Stage","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/Code/Stage","constructInfo":{"fqn":"aws-cdk-lib.AssetStaging","version":"2.223.0"}},"AssetBucket":{"id":"AssetBucket","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/Code/AssetBucket","constructInfo":{"fqn":"aws-cdk-lib.aws_s3.BucketBase","version":"2.223.0","metadata":[]}}}},"Resource":{"id":"Resource","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.CfnFunction","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::Lambda::Function","aws:cdk:cloudformation:props":{"code":{"s3Bucket":{"Fn::Sub":"cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"},"s3Key":"0772ffe05bd3b2e012dc5086ab3b6dd03c8a0268fc1c81326f5e72b0a4c6b51e.zip"},"environment":{"variables":{"AWS_NODEJS_CONNECTION_REUSE_ENABLED":"1"}},"handler":"index.handler","role":{"Fn::GetAtt":["testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE","Arn"]},"runtime":"nodejs22.x","tracingConfig":{"mode":"Active"}}}},"inlinePolicyAddedToExecutionRole-0":{"id":"inlinePolicyAddedToExecutionRole-0","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/inlinePolicyAddedToExecutionRole-0","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Policy","version":"2.223.0","metadata":[{"statements":"*"},{"addStatements":[{}]},{"attachToRole":["*"]},{"attachToRole":["*"]}]},"children":{"Resource":{"id":"Resource","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnPolicy","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Policy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":["xray:PutTelemetryRecords","xray:PutTraceSegments"],"Effect":"Allow","Resource":"*"}],"Version":"2012-10-17"},"policyName":"testeventbridgelambdaLambdaFunctioninlinePolicyAddedToExecutionRole032228887","roles":[{"Ref":"testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE"}]}}}}},"AwsEventsLambdaInvokePermission-1":{"id":"AwsEventsLambdaInvokePermission-1","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/AwsEventsLambdaInvokePermission-1","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.CfnPermission","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::Lambda::Permission","aws:cdk:cloudformation:props":{"action":"lambda:InvokeFunction","functionName":{"Fn::GetAtt":["testeventbridgelambdaLambdaFunction475423FD","Arn"]},"principal":"events.amazonaws.com","sourceArn":{"Fn::GetAtt":["testeventbridgelambdaEventsRule7DB0954D","Arn"]}}}}}},"EventsRule":{"id":"EventsRule","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/EventsRule","constructInfo":{"fqn":"aws-cdk-lib.aws_events.Rule","version":"2.223.0","metadata":[{"targets":"*","eventBus":"*","schedule":"*"},{"addEventPattern":["*"]},{"addTarget":[{}]}]},"children":{"Resource":{"id":"Resource","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/EventsRule/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_events.CfnRule","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::Events::Rule","aws:cdk:cloudformation:props":{"scheduleExpression":"rate(5 minutes)","state":"ENABLED","targets":[{"id":"Target0","arn":{"Fn::GetAtt":["testeventbridgelambdaLambdaFunction475423FD","Arn"]}}]}}}}}}},"Integ":{"id":"Integ","path":"evtlam-eventbridge-no-argument/Integ","constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTest","version":"2.223.0-alpha.0"},"children":{"DefaultTest":{"id":"DefaultTest","path":"evtlam-eventbridge-no-argument/Integ/DefaultTest","constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTestCase","version":"2.223.0-alpha.0"},"children":{"Default":{"id":"Default","path":"evtlam-eventbridge-no-argument/Integ/DefaultTest/Default","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}},"DeployAssert":{"id":"DeployAssert","path":"evtlam-eventbridge-no-argument/Integ/DefaultTest/DeployAssert","constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.223.0"},"children":{"BootstrapVersion":{"id":"BootstrapVersion","path":"evtlam-eventbridge-no-argument/Integ/DefaultTest/DeployAssert/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.223.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"evtlam-eventbridge-no-argument/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.223.0"}}}}}}}},"BootstrapVersion":{"id":"BootstrapVersion","path":"evtlam-eventbridge-no-argument/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.223.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"evtlam-eventbridge-no-argument/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.223.0"}}}},"Tree":{"id":"Tree","path":"Tree","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}}}}}