@aws-solutions-constructs/aws-eventbridge-lambda 2.95.1 → 2.96.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +3 -3
- package/README.adoc +2 -2
- package/lib/index.js +1 -1
- package/package.json +3 -3
- package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/asset.0772ffe05bd3b2e012dc5086ab3b6dd03c8a0268fc1c81326f5e72b0a4c6b51e/index.js +23 -0
- package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/cdk.out +1 -1
- package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/evtlam-eventbridge-existing-eventbus.assets.json +10 -8
- package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/evtlam-eventbridge-existing-eventbus.template.json +2 -2
- package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/evtlameventbridgeexistingeventbusIntegDefaultTestDeployAssertF331E474.assets.json +3 -2
- package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/integ.json +3 -2
- package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/manifest.json +496 -12
- package/test/integ.evtlam-eventbridge-existing-eventbus.js.snapshot/tree.json +1 -1
- package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/asset.0772ffe05bd3b2e012dc5086ab3b6dd03c8a0268fc1c81326f5e72b0a4c6b51e/index.js +23 -0
- package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/cdk.out +1 -1
- package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/evtlam-eventbridge-new-eventbus.assets.json +10 -8
- package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/evtlam-eventbridge-new-eventbus.template.json +2 -2
- package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/evtlameventbridgeneweventbusIntegDefaultTestDeployAssert45FE6822.assets.json +3 -2
- package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/integ.json +3 -2
- package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/manifest.json +496 -12
- package/test/integ.evtlam-eventbridge-new-eventbus.js.snapshot/tree.json +1 -1
- package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/asset.0772ffe05bd3b2e012dc5086ab3b6dd03c8a0268fc1c81326f5e72b0a4c6b51e/index.js +23 -0
- package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/cdk.out +1 -1
- package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/evtlam-eventbridge-no-argument.assets.json +8 -8
- package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/evtlam-eventbridge-no-argument.template.json +2 -2
- package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/evtlameventbridgenoargumentIntegDefaultTestDeployAssert5D6CC728.assets.json +1 -1
- package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/integ.json +2 -2
- package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/manifest.json +65 -41
- package/test/integ.evtlam-eventbridge-no-argument.js.snapshot/tree.json +1 -1
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":"tree-0.1","tree":{"id":"App","path":"","children":{"evtlam-eventbridge-new-eventbus":{"id":"evtlam-eventbridge-new-eventbus","path":"evtlam-eventbridge-new-eventbus","children":{"test-eventbridge-lambda":{"id":"test-eventbridge-lambda","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda","children":{"LambdaFunctionServiceRole":{"id":"LambdaFunctionServiceRole","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole","children":{"ImportLambdaFunctionServiceRole":{"id":"ImportLambdaFunctionServiceRole","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole","constructInfo":{"fqn":"aws-cdk-lib.Resource","version":"2.
|
|
1
|
+
{"version":"tree-0.1","tree":{"id":"App","path":"","constructInfo":{"fqn":"aws-cdk-lib.App","version":"2.223.0"},"children":{"evtlam-eventbridge-new-eventbus":{"id":"evtlam-eventbridge-new-eventbus","path":"evtlam-eventbridge-new-eventbus","constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.223.0"},"children":{"test-eventbridge-lambda":{"id":"test-eventbridge-lambda","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda","constructInfo":{"fqn":"@aws-solutions-constructs/aws-eventbridge-lambda.EventbridgeToLambda","version":"2.95.1"},"children":{"LambdaFunctionServiceRole":{"id":"LambdaFunctionServiceRole","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Role","version":"2.223.0","metadata":[{"assumedBy":{"principalAccount":"*","assumeRoleAction":"*"},"inlinePolicies":"*"},{"attachInlinePolicy":["*"]},{"attachInlinePolicy":["*"]}]},"children":{"ImportLambdaFunctionServiceRole":{"id":"ImportLambdaFunctionServiceRole","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole","constructInfo":{"fqn":"aws-cdk-lib.Resource","version":"2.223.0","metadata":["*"]}},"Resource":{"id":"Resource","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunctionServiceRole/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnRole","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Role","aws:cdk:cloudformation:props":{"assumeRolePolicyDocument":{"Statement":[{"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"Service":"lambda.amazonaws.com"}}],"Version":"2012-10-17"},"policies":[{"policyName":"LambdaFunctionServiceRolePolicy","policyDocument":{"Statement":[{"Action":["logs:CreateLogGroup","logs:CreateLogStream","logs:PutLogEvents"],"Effect":"Allow","Resource":{"Fn::Join":["",["arn:",{"Ref":"AWS::Partition"},":logs:",{"Ref":"AWS::Region"},":",{"Ref":"AWS::AccountId"},":log-group:/aws/lambda/*"]]}}],"Version":"2012-10-17"}}]}}}}},"LambdaFunction":{"id":"LambdaFunction","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.Function","version":"2.223.0","metadata":[{"role":"*","tracing":"Active","code":"*","runtime":"*","handler":"*"},{"addEnvironment":["*","*",{"removeInEdge":true}]}]},"children":{"Code":{"id":"Code","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/Code","constructInfo":{"fqn":"aws-cdk-lib.aws_s3_assets.Asset","version":"2.223.0"},"children":{"Stage":{"id":"Stage","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/Code/Stage","constructInfo":{"fqn":"aws-cdk-lib.AssetStaging","version":"2.223.0"}},"AssetBucket":{"id":"AssetBucket","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/Code/AssetBucket","constructInfo":{"fqn":"aws-cdk-lib.aws_s3.BucketBase","version":"2.223.0","metadata":[]}}}},"Resource":{"id":"Resource","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.CfnFunction","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::Lambda::Function","aws:cdk:cloudformation:props":{"code":{"s3Bucket":{"Fn::Sub":"cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"},"s3Key":"0772ffe05bd3b2e012dc5086ab3b6dd03c8a0268fc1c81326f5e72b0a4c6b51e.zip"},"environment":{"variables":{"AWS_NODEJS_CONNECTION_REUSE_ENABLED":"1"}},"handler":"index.handler","role":{"Fn::GetAtt":["testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE","Arn"]},"runtime":"nodejs22.x","tracingConfig":{"mode":"Active"}}}},"inlinePolicyAddedToExecutionRole-0":{"id":"inlinePolicyAddedToExecutionRole-0","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/inlinePolicyAddedToExecutionRole-0","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Policy","version":"2.223.0","metadata":[{"statements":"*"},{"addStatements":[{}]},{"attachToRole":["*"]},{"attachToRole":["*"]}]},"children":{"Resource":{"id":"Resource","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnPolicy","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Policy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":["xray:PutTelemetryRecords","xray:PutTraceSegments"],"Effect":"Allow","Resource":"*"}],"Version":"2012-10-17"},"policyName":"testeventbridgelambdaLambdaFunctioninlinePolicyAddedToExecutionRole032228887","roles":[{"Ref":"testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE"}]}}}}},"AwsEventsLambdaInvokePermission-1":{"id":"AwsEventsLambdaInvokePermission-1","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/LambdaFunction/AwsEventsLambdaInvokePermission-1","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.CfnPermission","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::Lambda::Permission","aws:cdk:cloudformation:props":{"action":"lambda:InvokeFunction","functionName":{"Fn::GetAtt":["testeventbridgelambdaLambdaFunction475423FD","Arn"]},"principal":"events.amazonaws.com","sourceArn":{"Fn::GetAtt":["testeventbridgelambdaEventsRule7DB0954D","Arn"]}}}}}},"test-new-lambda":{"id":"test-new-lambda","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/test-new-lambda","constructInfo":{"fqn":"aws-cdk-lib.aws_events.EventBus","version":"2.223.0","metadata":[{}]},"children":{"Resource":{"id":"Resource","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/test-new-lambda/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_events.CfnEventBus","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::Events::EventBus","aws:cdk:cloudformation:props":{"name":"test-new-lambda"}}}}},"EventsRule":{"id":"EventsRule","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/EventsRule","constructInfo":{"fqn":"aws-cdk-lib.aws_events.Rule","version":"2.223.0","metadata":[{"targets":"*","eventBus":"*","eventPattern":{"source":"*"}},{"addEventPattern":[{"source":"*"}]},{"addTarget":[{}]}]},"children":{"Resource":{"id":"Resource","path":"evtlam-eventbridge-new-eventbus/test-eventbridge-lambda/EventsRule/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_events.CfnRule","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::Events::Rule","aws:cdk:cloudformation:props":{"eventBusName":{"Ref":"testeventbridgelambdatestnewlambdaA726ECBB"},"eventPattern":{"source":["solutionsconstructs"]},"state":"ENABLED","targets":[{"id":"Target0","arn":{"Fn::GetAtt":["testeventbridgelambdaLambdaFunction475423FD","Arn"]}}]}}}}}}},"Integ":{"id":"Integ","path":"evtlam-eventbridge-new-eventbus/Integ","constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTest","version":"2.223.0-alpha.0"},"children":{"DefaultTest":{"id":"DefaultTest","path":"evtlam-eventbridge-new-eventbus/Integ/DefaultTest","constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTestCase","version":"2.223.0-alpha.0"},"children":{"Default":{"id":"Default","path":"evtlam-eventbridge-new-eventbus/Integ/DefaultTest/Default","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}},"DeployAssert":{"id":"DeployAssert","path":"evtlam-eventbridge-new-eventbus/Integ/DefaultTest/DeployAssert","constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.223.0"},"children":{"BootstrapVersion":{"id":"BootstrapVersion","path":"evtlam-eventbridge-new-eventbus/Integ/DefaultTest/DeployAssert/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.223.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"evtlam-eventbridge-new-eventbus/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.223.0"}}}}}}}},"BootstrapVersion":{"id":"BootstrapVersion","path":"evtlam-eventbridge-new-eventbus/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.223.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"evtlam-eventbridge-new-eventbus/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.223.0"}}}},"Tree":{"id":"Tree","path":"Tree","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}}}}}
|
|
@@ -0,0 +1,23 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
|
3
|
+
*
|
|
4
|
+
* Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance
|
|
5
|
+
* with the License. A copy of the License is located at
|
|
6
|
+
*
|
|
7
|
+
* http://www.apache.org/licenses/LICENSE-2.0
|
|
8
|
+
*
|
|
9
|
+
* or in the 'license' file accompanying this file. This file is distributed on an 'AS IS' BASIS, WITHOUT WARRANTIES
|
|
10
|
+
* OR CONDITIONS OF ANY KIND, express or implied. See the License for the specific language governing permissions
|
|
11
|
+
* and limitations under the License.
|
|
12
|
+
*/
|
|
13
|
+
|
|
14
|
+
console.log('Loading function');
|
|
15
|
+
|
|
16
|
+
exports.handler = async (event, context) => {
|
|
17
|
+
console.log('Received event:', JSON.stringify(event, null, 2));
|
|
18
|
+
return {
|
|
19
|
+
statusCode: 200,
|
|
20
|
+
headers: { 'Content-Type': 'text/plain' },
|
|
21
|
+
body: `Hello from AWS Solutions Constructs! You've hit ${event.path}\n`
|
|
22
|
+
};
|
|
23
|
+
};
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":"
|
|
1
|
+
{"version":"48.0.0"}
|
|
@@ -1,30 +1,30 @@
|
|
|
1
1
|
{
|
|
2
|
-
"version": "
|
|
2
|
+
"version": "48.0.0",
|
|
3
3
|
"files": {
|
|
4
|
-
"
|
|
4
|
+
"0772ffe05bd3b2e012dc5086ab3b6dd03c8a0268fc1c81326f5e72b0a4c6b51e": {
|
|
5
5
|
"displayName": "test-eventbridge-lambda/LambdaFunction/Code",
|
|
6
6
|
"source": {
|
|
7
|
-
"path": "asset.
|
|
7
|
+
"path": "asset.0772ffe05bd3b2e012dc5086ab3b6dd03c8a0268fc1c81326f5e72b0a4c6b51e",
|
|
8
8
|
"packaging": "zip"
|
|
9
9
|
},
|
|
10
10
|
"destinations": {
|
|
11
|
-
"current_account-current_region-
|
|
11
|
+
"current_account-current_region-1a238803": {
|
|
12
12
|
"bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
|
|
13
|
-
"objectKey": "
|
|
13
|
+
"objectKey": "0772ffe05bd3b2e012dc5086ab3b6dd03c8a0268fc1c81326f5e72b0a4c6b51e.zip",
|
|
14
14
|
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
|
|
15
15
|
}
|
|
16
16
|
}
|
|
17
17
|
},
|
|
18
|
-
"
|
|
18
|
+
"1d9e914187c2c83ca4a25c019359780f5b866ffc3748333eb44481188ef2fe2c": {
|
|
19
19
|
"displayName": "evtlam-eventbridge-no-argument Template",
|
|
20
20
|
"source": {
|
|
21
21
|
"path": "evtlam-eventbridge-no-argument.template.json",
|
|
22
22
|
"packaging": "file"
|
|
23
23
|
},
|
|
24
24
|
"destinations": {
|
|
25
|
-
"current_account-current_region-
|
|
25
|
+
"current_account-current_region-2cd6e1d9": {
|
|
26
26
|
"bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
|
|
27
|
-
"objectKey": "
|
|
27
|
+
"objectKey": "1d9e914187c2c83ca4a25c019359780f5b866ffc3748333eb44481188ef2fe2c.json",
|
|
28
28
|
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
|
|
29
29
|
}
|
|
30
30
|
}
|
|
@@ -69,7 +69,7 @@
|
|
|
69
69
|
"S3Bucket": {
|
|
70
70
|
"Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
|
|
71
71
|
},
|
|
72
|
-
"S3Key": "
|
|
72
|
+
"S3Key": "0772ffe05bd3b2e012dc5086ab3b6dd03c8a0268fc1c81326f5e72b0a4c6b51e.zip"
|
|
73
73
|
},
|
|
74
74
|
"Environment": {
|
|
75
75
|
"Variables": {
|
|
@@ -83,7 +83,7 @@
|
|
|
83
83
|
"Arn"
|
|
84
84
|
]
|
|
85
85
|
},
|
|
86
|
-
"Runtime": "
|
|
86
|
+
"Runtime": "nodejs22.x",
|
|
87
87
|
"TracingConfig": {
|
|
88
88
|
"Mode": "Active"
|
|
89
89
|
}
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
{
|
|
2
|
-
"version": "
|
|
2
|
+
"version": "48.0.0",
|
|
3
3
|
"testCases": {
|
|
4
4
|
"evtlam-eventbridge-no-argument/Integ/DefaultTest": {
|
|
5
5
|
"stacks": [
|
|
@@ -9,5 +9,5 @@
|
|
|
9
9
|
"assertionStackName": "evtlameventbridgenoargumentIntegDefaultTestDeployAssert5D6CC728"
|
|
10
10
|
}
|
|
11
11
|
},
|
|
12
|
-
"minimumCliVersion": "2.
|
|
12
|
+
"minimumCliVersion": "2.1029.2"
|
|
13
13
|
}
|
|
@@ -66,7 +66,7 @@
|
|
|
66
66
|
"validateOnSynth": false,
|
|
67
67
|
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
|
|
68
68
|
"cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
|
|
69
|
-
"stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/
|
|
69
|
+
"stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/1d9e914187c2c83ca4a25c019359780f5b866ffc3748333eb44481188ef2fe2c.json",
|
|
70
70
|
"requiresBootstrapStackVersion": 6,
|
|
71
71
|
"bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
|
|
72
72
|
"additionalDependencies": [
|
|
@@ -254,57 +254,48 @@
|
|
|
254
254
|
"properties": {
|
|
255
255
|
"module": "aws-cdk-lib",
|
|
256
256
|
"flags": {
|
|
257
|
-
"@aws-cdk/
|
|
257
|
+
"@aws-cdk/aws-signer:signingProfileNamePassedToCfn": {
|
|
258
258
|
"recommendedValue": true,
|
|
259
|
-
"explanation": "
|
|
260
|
-
},
|
|
261
|
-
"aws-cdk:enableDiffNoFail": {
|
|
262
|
-
"recommendedValue": true,
|
|
263
|
-
"explanation": "Make `cdk diff` not fail when there are differences"
|
|
259
|
+
"explanation": "Pass signingProfileName to CfnSigningProfile"
|
|
264
260
|
},
|
|
265
261
|
"@aws-cdk/core:newStyleStackSynthesis": {
|
|
266
262
|
"recommendedValue": true,
|
|
267
|
-
"explanation": "Switch to new stack synthesis method which enables CI/CD"
|
|
263
|
+
"explanation": "Switch to new stack synthesis method which enables CI/CD",
|
|
264
|
+
"unconfiguredBehavesLike": {
|
|
265
|
+
"v2": true
|
|
266
|
+
}
|
|
268
267
|
},
|
|
269
268
|
"@aws-cdk/core:stackRelativeExports": {
|
|
270
269
|
"recommendedValue": true,
|
|
271
|
-
"explanation": "Name exports based on the construct paths relative to the stack, rather than the global construct path"
|
|
272
|
-
|
|
273
|
-
|
|
274
|
-
|
|
275
|
-
"explanation": "DockerImageAsset properly supports `.dockerignore` files by default"
|
|
276
|
-
},
|
|
277
|
-
"@aws-cdk/aws-secretsmanager:parseOwnedSecretName": {
|
|
278
|
-
"recommendedValue": true,
|
|
279
|
-
"explanation": "Fix the referencing of SecretsManager names from ARNs"
|
|
280
|
-
},
|
|
281
|
-
"@aws-cdk/aws-kms:defaultKeyPolicies": {
|
|
282
|
-
"recommendedValue": true,
|
|
283
|
-
"explanation": "Tighten default KMS key policies"
|
|
284
|
-
},
|
|
285
|
-
"@aws-cdk/aws-s3:grantWriteWithoutAcl": {
|
|
286
|
-
"recommendedValue": true,
|
|
287
|
-
"explanation": "Remove `PutObjectAcl` from Bucket.grantWrite"
|
|
270
|
+
"explanation": "Name exports based on the construct paths relative to the stack, rather than the global construct path",
|
|
271
|
+
"unconfiguredBehavesLike": {
|
|
272
|
+
"v2": true
|
|
273
|
+
}
|
|
288
274
|
},
|
|
289
|
-
"@aws-cdk/aws-ecs-patterns:
|
|
275
|
+
"@aws-cdk/aws-ecs-patterns:secGroupsDisablesImplicitOpenListener": {
|
|
290
276
|
"recommendedValue": true,
|
|
291
|
-
"explanation": "
|
|
277
|
+
"explanation": "Disable implicit openListener when custom security groups are provided"
|
|
292
278
|
},
|
|
293
279
|
"@aws-cdk/aws-rds:lowercaseDbIdentifier": {
|
|
294
280
|
"recommendedValue": true,
|
|
295
|
-
"explanation": "Force lowercasing of RDS Cluster names in CDK"
|
|
281
|
+
"explanation": "Force lowercasing of RDS Cluster names in CDK",
|
|
282
|
+
"unconfiguredBehavesLike": {
|
|
283
|
+
"v2": true
|
|
284
|
+
}
|
|
296
285
|
},
|
|
297
286
|
"@aws-cdk/aws-apigateway:usagePlanKeyOrderInsensitiveId": {
|
|
298
287
|
"recommendedValue": true,
|
|
299
|
-
"explanation": "Allow adding/removing multiple UsagePlanKeys independently"
|
|
300
|
-
|
|
301
|
-
|
|
302
|
-
|
|
303
|
-
"explanation": "Enable this feature flag to have elastic file systems encrypted at rest by default."
|
|
288
|
+
"explanation": "Allow adding/removing multiple UsagePlanKeys independently",
|
|
289
|
+
"unconfiguredBehavesLike": {
|
|
290
|
+
"v2": true
|
|
291
|
+
}
|
|
304
292
|
},
|
|
305
293
|
"@aws-cdk/aws-lambda:recognizeVersionProps": {
|
|
306
294
|
"recommendedValue": true,
|
|
307
|
-
"explanation": "Enable this feature flag to opt in to the updated logical id calculation for Lambda Version created using the `fn.currentVersion`."
|
|
295
|
+
"explanation": "Enable this feature flag to opt in to the updated logical id calculation for Lambda Version created using the `fn.currentVersion`.",
|
|
296
|
+
"unconfiguredBehavesLike": {
|
|
297
|
+
"v2": true
|
|
298
|
+
}
|
|
308
299
|
},
|
|
309
300
|
"@aws-cdk/aws-lambda:recognizeLayerVersion": {
|
|
310
301
|
"userValue": true,
|
|
@@ -313,7 +304,10 @@
|
|
|
313
304
|
},
|
|
314
305
|
"@aws-cdk/aws-cloudfront:defaultSecurityPolicyTLSv1.2_2021": {
|
|
315
306
|
"recommendedValue": true,
|
|
316
|
-
"explanation": "Enable this feature flag to have cloudfront distributions use the security policy TLSv1.2_2021 by default."
|
|
307
|
+
"explanation": "Enable this feature flag to have cloudfront distributions use the security policy TLSv1.2_2021 by default.",
|
|
308
|
+
"unconfiguredBehavesLike": {
|
|
309
|
+
"v2": true
|
|
310
|
+
}
|
|
317
311
|
},
|
|
318
312
|
"@aws-cdk/core:checkSecretUsage": {
|
|
319
313
|
"userValue": true,
|
|
@@ -390,7 +384,7 @@
|
|
|
390
384
|
"@aws-cdk/aws-iam:importedRoleStackSafeDefaultPolicyName": {
|
|
391
385
|
"userValue": true,
|
|
392
386
|
"recommendedValue": true,
|
|
393
|
-
"explanation": "Enable this feature to
|
|
387
|
+
"explanation": "Enable this feature to create default policy names for imported roles that depend on the stack the role is in."
|
|
394
388
|
},
|
|
395
389
|
"@aws-cdk/aws-s3:serverAccessLogsUseBucketPolicy": {
|
|
396
390
|
"userValue": true,
|
|
@@ -534,7 +528,10 @@
|
|
|
534
528
|
},
|
|
535
529
|
"@aws-cdk/pipelines:reduceAssetRoleTrustScope": {
|
|
536
530
|
"recommendedValue": true,
|
|
537
|
-
"explanation": "Remove the root account principal from PipelineAssetsFileRole trust policy"
|
|
531
|
+
"explanation": "Remove the root account principal from PipelineAssetsFileRole trust policy",
|
|
532
|
+
"unconfiguredBehavesLike": {
|
|
533
|
+
"v2": true
|
|
534
|
+
}
|
|
538
535
|
},
|
|
539
536
|
"@aws-cdk/aws-eks:nodegroupNameAttribute": {
|
|
540
537
|
"userValue": true,
|
|
@@ -563,7 +560,10 @@
|
|
|
563
560
|
},
|
|
564
561
|
"@aws-cdk/aws-stepfunctions-tasks:useNewS3UriParametersForBedrockInvokeModelTask": {
|
|
565
562
|
"recommendedValue": true,
|
|
566
|
-
"explanation": "When enabled, use new props for S3 URI field in task definition of state machine for bedrock invoke model."
|
|
563
|
+
"explanation": "When enabled, use new props for S3 URI field in task definition of state machine for bedrock invoke model.",
|
|
564
|
+
"unconfiguredBehavesLike": {
|
|
565
|
+
"v2": true
|
|
566
|
+
}
|
|
567
567
|
},
|
|
568
568
|
"@aws-cdk/core:explicitStackTags": {
|
|
569
569
|
"userValue": true,
|
|
@@ -627,7 +627,10 @@
|
|
|
627
627
|
},
|
|
628
628
|
"@aws-cdk/core:aspectStabilization": {
|
|
629
629
|
"recommendedValue": true,
|
|
630
|
-
"explanation": "When enabled, a stabilization loop will be run when invoking Aspects during synthesis."
|
|
630
|
+
"explanation": "When enabled, a stabilization loop will be run when invoking Aspects during synthesis.",
|
|
631
|
+
"unconfiguredBehavesLike": {
|
|
632
|
+
"v2": true
|
|
633
|
+
}
|
|
631
634
|
},
|
|
632
635
|
"@aws-cdk/aws-route53-targets:userPoolDomainNameMethodWithoutCustomResource": {
|
|
633
636
|
"userValue": true,
|
|
@@ -661,7 +664,10 @@
|
|
|
661
664
|
},
|
|
662
665
|
"@aws-cdk/pipelines:reduceStageRoleTrustScope": {
|
|
663
666
|
"recommendedValue": true,
|
|
664
|
-
"explanation": "Remove the root account principal from Stage addActions trust policy"
|
|
667
|
+
"explanation": "Remove the root account principal from Stage addActions trust policy",
|
|
668
|
+
"unconfiguredBehavesLike": {
|
|
669
|
+
"v2": true
|
|
670
|
+
}
|
|
665
671
|
},
|
|
666
672
|
"@aws-cdk/aws-events:requireEventBusPolicySid": {
|
|
667
673
|
"userValue": true,
|
|
@@ -684,7 +690,10 @@
|
|
|
684
690
|
},
|
|
685
691
|
"@aws-cdk/pipelines:reduceCrossAccountActionRoleTrustScope": {
|
|
686
692
|
"recommendedValue": true,
|
|
687
|
-
"explanation": "When enabled, scopes down the trust policy for the cross-account action role"
|
|
693
|
+
"explanation": "When enabled, scopes down the trust policy for the cross-account action role",
|
|
694
|
+
"unconfiguredBehavesLike": {
|
|
695
|
+
"v2": true
|
|
696
|
+
}
|
|
688
697
|
},
|
|
689
698
|
"@aws-cdk/aws-stepfunctions:useDistributedMapResultWriterV2": {
|
|
690
699
|
"userValue": true,
|
|
@@ -714,6 +723,21 @@
|
|
|
714
723
|
"userValue": true,
|
|
715
724
|
"recommendedValue": true,
|
|
716
725
|
"explanation": "When enabled, CDK creates and manages loggroup for the lambda function"
|
|
726
|
+
},
|
|
727
|
+
"@aws-cdk/aws-elasticloadbalancingv2:networkLoadBalancerWithSecurityGroupByDefault": {
|
|
728
|
+
"recommendedValue": true,
|
|
729
|
+
"explanation": "When enabled, Network Load Balancer will be created with a security group by default."
|
|
730
|
+
},
|
|
731
|
+
"@aws-cdk/aws-stepfunctions-tasks:httpInvokeDynamicJsonPathEndpoint": {
|
|
732
|
+
"recommendedValue": true,
|
|
733
|
+
"explanation": "When enabled, allows using a dynamic apiEndpoint with JSONPath format in HttpInvoke tasks.",
|
|
734
|
+
"unconfiguredBehavesLike": {
|
|
735
|
+
"v2": true
|
|
736
|
+
}
|
|
737
|
+
},
|
|
738
|
+
"@aws-cdk/aws-ecs-patterns:uniqueTargetGroupId": {
|
|
739
|
+
"recommendedValue": true,
|
|
740
|
+
"explanation": "When enabled, ECS patterns will generate unique target group IDs to prevent conflicts during load balancer replacement"
|
|
717
741
|
}
|
|
718
742
|
}
|
|
719
743
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":"tree-0.1","tree":{"id":"App","path":"","constructInfo":{"fqn":"aws-cdk-lib.App","version":"2.
|
|
1
|
+
{"version":"tree-0.1","tree":{"id":"App","path":"","constructInfo":{"fqn":"aws-cdk-lib.App","version":"2.223.0"},"children":{"evtlam-eventbridge-no-argument":{"id":"evtlam-eventbridge-no-argument","path":"evtlam-eventbridge-no-argument","constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.223.0"},"children":{"test-eventbridge-lambda":{"id":"test-eventbridge-lambda","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda","constructInfo":{"fqn":"@aws-solutions-constructs/aws-eventbridge-lambda.EventbridgeToLambda","version":"2.95.1"},"children":{"LambdaFunctionServiceRole":{"id":"LambdaFunctionServiceRole","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunctionServiceRole","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Role","version":"2.223.0","metadata":[{"assumedBy":{"principalAccount":"*","assumeRoleAction":"*"},"inlinePolicies":"*"},{"attachInlinePolicy":["*"]},{"attachInlinePolicy":["*"]}]},"children":{"ImportLambdaFunctionServiceRole":{"id":"ImportLambdaFunctionServiceRole","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole","constructInfo":{"fqn":"aws-cdk-lib.Resource","version":"2.223.0","metadata":["*"]}},"Resource":{"id":"Resource","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunctionServiceRole/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnRole","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Role","aws:cdk:cloudformation:props":{"assumeRolePolicyDocument":{"Statement":[{"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"Service":"lambda.amazonaws.com"}}],"Version":"2012-10-17"},"policies":[{"policyName":"LambdaFunctionServiceRolePolicy","policyDocument":{"Statement":[{"Action":["logs:CreateLogGroup","logs:CreateLogStream","logs:PutLogEvents"],"Effect":"Allow","Resource":{"Fn::Join":["",["arn:",{"Ref":"AWS::Partition"},":logs:",{"Ref":"AWS::Region"},":",{"Ref":"AWS::AccountId"},":log-group:/aws/lambda/*"]]}}],"Version":"2012-10-17"}}]}}}}},"LambdaFunction":{"id":"LambdaFunction","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.Function","version":"2.223.0","metadata":[{"role":"*","tracing":"Active","code":"*","runtime":"*","handler":"*"},{"addEnvironment":["*","*",{"removeInEdge":true}]}]},"children":{"Code":{"id":"Code","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/Code","constructInfo":{"fqn":"aws-cdk-lib.aws_s3_assets.Asset","version":"2.223.0"},"children":{"Stage":{"id":"Stage","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/Code/Stage","constructInfo":{"fqn":"aws-cdk-lib.AssetStaging","version":"2.223.0"}},"AssetBucket":{"id":"AssetBucket","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/Code/AssetBucket","constructInfo":{"fqn":"aws-cdk-lib.aws_s3.BucketBase","version":"2.223.0","metadata":[]}}}},"Resource":{"id":"Resource","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.CfnFunction","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::Lambda::Function","aws:cdk:cloudformation:props":{"code":{"s3Bucket":{"Fn::Sub":"cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"},"s3Key":"0772ffe05bd3b2e012dc5086ab3b6dd03c8a0268fc1c81326f5e72b0a4c6b51e.zip"},"environment":{"variables":{"AWS_NODEJS_CONNECTION_REUSE_ENABLED":"1"}},"handler":"index.handler","role":{"Fn::GetAtt":["testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE","Arn"]},"runtime":"nodejs22.x","tracingConfig":{"mode":"Active"}}}},"inlinePolicyAddedToExecutionRole-0":{"id":"inlinePolicyAddedToExecutionRole-0","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/inlinePolicyAddedToExecutionRole-0","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Policy","version":"2.223.0","metadata":[{"statements":"*"},{"addStatements":[{}]},{"attachToRole":["*"]},{"attachToRole":["*"]}]},"children":{"Resource":{"id":"Resource","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnPolicy","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Policy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":["xray:PutTelemetryRecords","xray:PutTraceSegments"],"Effect":"Allow","Resource":"*"}],"Version":"2012-10-17"},"policyName":"testeventbridgelambdaLambdaFunctioninlinePolicyAddedToExecutionRole032228887","roles":[{"Ref":"testeventbridgelambdaLambdaFunctionServiceRole6D02CEEE"}]}}}}},"AwsEventsLambdaInvokePermission-1":{"id":"AwsEventsLambdaInvokePermission-1","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/LambdaFunction/AwsEventsLambdaInvokePermission-1","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.CfnPermission","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::Lambda::Permission","aws:cdk:cloudformation:props":{"action":"lambda:InvokeFunction","functionName":{"Fn::GetAtt":["testeventbridgelambdaLambdaFunction475423FD","Arn"]},"principal":"events.amazonaws.com","sourceArn":{"Fn::GetAtt":["testeventbridgelambdaEventsRule7DB0954D","Arn"]}}}}}},"EventsRule":{"id":"EventsRule","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/EventsRule","constructInfo":{"fqn":"aws-cdk-lib.aws_events.Rule","version":"2.223.0","metadata":[{"targets":"*","eventBus":"*","schedule":"*"},{"addEventPattern":["*"]},{"addTarget":[{}]}]},"children":{"Resource":{"id":"Resource","path":"evtlam-eventbridge-no-argument/test-eventbridge-lambda/EventsRule/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_events.CfnRule","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::Events::Rule","aws:cdk:cloudformation:props":{"scheduleExpression":"rate(5 minutes)","state":"ENABLED","targets":[{"id":"Target0","arn":{"Fn::GetAtt":["testeventbridgelambdaLambdaFunction475423FD","Arn"]}}]}}}}}}},"Integ":{"id":"Integ","path":"evtlam-eventbridge-no-argument/Integ","constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTest","version":"2.223.0-alpha.0"},"children":{"DefaultTest":{"id":"DefaultTest","path":"evtlam-eventbridge-no-argument/Integ/DefaultTest","constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTestCase","version":"2.223.0-alpha.0"},"children":{"Default":{"id":"Default","path":"evtlam-eventbridge-no-argument/Integ/DefaultTest/Default","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}},"DeployAssert":{"id":"DeployAssert","path":"evtlam-eventbridge-no-argument/Integ/DefaultTest/DeployAssert","constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.223.0"},"children":{"BootstrapVersion":{"id":"BootstrapVersion","path":"evtlam-eventbridge-no-argument/Integ/DefaultTest/DeployAssert/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.223.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"evtlam-eventbridge-no-argument/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.223.0"}}}}}}}},"BootstrapVersion":{"id":"BootstrapVersion","path":"evtlam-eventbridge-no-argument/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.223.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"evtlam-eventbridge-no-argument/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.223.0"}}}},"Tree":{"id":"Tree","path":"Tree","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}}}}}
|