@aws-solutions-constructs/aws-fargate-kinesisstreams 2.93.0 → 2.95.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (66) hide show
  1. package/.jsii +57 -5
  2. package/lib/index.js +1 -1
  3. package/package.json +6 -6
  4. package/test/integ.farkin-existingFargateService.js.snapshot/asset.7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200/__entrypoint__.js +1 -0
  5. package/test/integ.farkin-existingFargateService.js.snapshot/asset.7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200/index.js +1 -0
  6. package/test/integ.farkin-existingFargateService.js.snapshot/cdk.out +1 -1
  7. package/test/integ.farkin-existingFargateService.js.snapshot/farkin-existingFargateService.assets.json +4 -4
  8. package/test/integ.farkin-existingFargateService.js.snapshot/farkin-existingFargateService.template.json +0 -10
  9. package/test/integ.farkin-existingFargateService.js.snapshot/farkinexistingFargateServiceIntegDefaultTestDeployAssertF1F4EC2C.assets.json +1 -1
  10. package/test/integ.farkin-existingFargateService.js.snapshot/integ.json +2 -2
  11. package/test/integ.farkin-existingFargateService.js.snapshot/manifest.json +75 -65
  12. package/test/integ.farkin-existingFargateService.js.snapshot/tree.json +1 -1
  13. package/test/integ.farkin-existingStream.js.snapshot/asset.7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200/__entrypoint__.js +1 -0
  14. package/test/integ.farkin-existingStream.js.snapshot/asset.7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200/index.js +1 -0
  15. package/test/integ.farkin-existingStream.js.snapshot/cdk.out +1 -1
  16. package/test/integ.farkin-existingStream.js.snapshot/farkin-existingStream.assets.json +4 -4
  17. package/test/integ.farkin-existingStream.js.snapshot/farkin-existingStream.template.json +0 -10
  18. package/test/integ.farkin-existingStream.js.snapshot/farkinexistingStreamIntegDefaultTestDeployAssert24640A36.assets.json +1 -1
  19. package/test/integ.farkin-existingStream.js.snapshot/integ.json +2 -2
  20. package/test/integ.farkin-existingStream.js.snapshot/manifest.json +75 -65
  21. package/test/integ.farkin-existingStream.js.snapshot/tree.json +1 -1
  22. package/test/integ.farkin-existingVpc.js.snapshot/asset.7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200/__entrypoint__.js +1 -0
  23. package/test/integ.farkin-existingVpc.js.snapshot/asset.7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200/index.js +1 -0
  24. package/test/integ.farkin-existingVpc.js.snapshot/cdk.out +1 -1
  25. package/test/integ.farkin-existingVpc.js.snapshot/farkin-existingVpc.assets.json +4 -4
  26. package/test/integ.farkin-existingVpc.js.snapshot/farkin-existingVpc.template.json +0 -10
  27. package/test/integ.farkin-existingVpc.js.snapshot/farkinexistingVpcIntegDefaultTestDeployAssert8065A04A.assets.json +1 -1
  28. package/test/integ.farkin-existingVpc.js.snapshot/integ.json +2 -2
  29. package/test/integ.farkin-existingVpc.js.snapshot/manifest.json +75 -65
  30. package/test/integ.farkin-existingVpc.js.snapshot/tree.json +1 -1
  31. package/test/integ.farkin-fargateServiceFromProps.js.snapshot/asset.7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200/__entrypoint__.js +1 -0
  32. package/test/integ.farkin-fargateServiceFromProps.js.snapshot/asset.7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200/index.js +1 -0
  33. package/test/integ.farkin-fargateServiceFromProps.js.snapshot/cdk.out +1 -1
  34. package/test/integ.farkin-fargateServiceFromProps.js.snapshot/farkin-fargateServiceFromProps.assets.json +4 -4
  35. package/test/integ.farkin-fargateServiceFromProps.js.snapshot/farkin-fargateServiceFromProps.template.json +0 -10
  36. package/test/integ.farkin-fargateServiceFromProps.js.snapshot/farkinfargateServiceFromPropsIntegDefaultTestDeployAssert5047AEA2.assets.json +1 -1
  37. package/test/integ.farkin-fargateServiceFromProps.js.snapshot/integ.json +2 -2
  38. package/test/integ.farkin-fargateServiceFromProps.js.snapshot/manifest.json +75 -65
  39. package/test/integ.farkin-fargateServiceFromProps.js.snapshot/tree.json +1 -1
  40. package/test/integ.farkin-noArguments.js.snapshot/asset.7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200/__entrypoint__.js +1 -0
  41. package/test/integ.farkin-noArguments.js.snapshot/asset.7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200/index.js +1 -0
  42. package/test/integ.farkin-noArguments.js.snapshot/cdk.out +1 -1
  43. package/test/integ.farkin-noArguments.js.snapshot/farkin-noArguments.assets.json +4 -4
  44. package/test/integ.farkin-noArguments.js.snapshot/farkin-noArguments.template.json +0 -10
  45. package/test/integ.farkin-noArguments.js.snapshot/farkinnoArgumentsIntegDefaultTestDeployAssert5E204AE6.assets.json +1 -1
  46. package/test/integ.farkin-noArguments.js.snapshot/integ.json +2 -2
  47. package/test/integ.farkin-noArguments.js.snapshot/manifest.json +75 -65
  48. package/test/integ.farkin-noArguments.js.snapshot/tree.json +1 -1
  49. package/test/integ.farkin-streamFromProps.js.snapshot/asset.7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200/__entrypoint__.js +1 -0
  50. package/test/integ.farkin-streamFromProps.js.snapshot/asset.7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200/index.js +1 -0
  51. package/test/integ.farkin-streamFromProps.js.snapshot/cdk.out +1 -1
  52. package/test/integ.farkin-streamFromProps.js.snapshot/farkin-streamFromProps.assets.json +4 -4
  53. package/test/integ.farkin-streamFromProps.js.snapshot/farkin-streamFromProps.template.json +0 -10
  54. package/test/integ.farkin-streamFromProps.js.snapshot/farkinstreamFromPropsIntegDefaultTestDeployAssertF891650B.assets.json +1 -1
  55. package/test/integ.farkin-streamFromProps.js.snapshot/integ.json +2 -2
  56. package/test/integ.farkin-streamFromProps.js.snapshot/manifest.json +75 -65
  57. package/test/integ.farkin-streamFromProps.js.snapshot/tree.json +1 -1
  58. package/test/integ.farkin-vpcFromProps.js.snapshot/asset.7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200/__entrypoint__.js +1 -0
  59. package/test/integ.farkin-vpcFromProps.js.snapshot/asset.7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200/index.js +1 -0
  60. package/test/integ.farkin-vpcFromProps.js.snapshot/cdk.out +1 -1
  61. package/test/integ.farkin-vpcFromProps.js.snapshot/farkin-vpcFromProps.assets.json +4 -4
  62. package/test/integ.farkin-vpcFromProps.js.snapshot/farkin-vpcFromProps.template.json +0 -10
  63. package/test/integ.farkin-vpcFromProps.js.snapshot/farkinvpcFromPropsIntegDefaultTestDeployAssert05CE38D4.assets.json +1 -1
  64. package/test/integ.farkin-vpcFromProps.js.snapshot/integ.json +2 -2
  65. package/test/integ.farkin-vpcFromProps.js.snapshot/manifest.json +75 -65
  66. package/test/integ.farkin-vpcFromProps.js.snapshot/tree.json +1 -1
package/.jsii CHANGED
@@ -8,8 +8,8 @@
8
8
  "url": "https://aws.amazon.com"
9
9
  },
10
10
  "dependencies": {
11
- "@aws-solutions-constructs/core": "2.93.0",
12
- "aws-cdk-lib": "^2.214.0",
11
+ "@aws-solutions-constructs/core": "2.95.0",
12
+ "aws-cdk-lib": "^2.223.0",
13
13
  "constructs": "^10.0.0"
14
14
  },
15
15
  "dependencyClosure": {
@@ -628,6 +628,19 @@
628
628
  }
629
629
  }
630
630
  },
631
+ "aws-cdk-lib.aws_bedrockagentcore": {
632
+ "targets": {
633
+ "dotnet": {
634
+ "package": "Amazon.CDK.AWS.BedrockAgentCore"
635
+ },
636
+ "java": {
637
+ "package": "software.amazon.awscdk.services.bedrockagentcore"
638
+ },
639
+ "python": {
640
+ "module": "aws_cdk.aws_bedrockagentcore"
641
+ }
642
+ }
643
+ },
631
644
  "aws-cdk-lib.aws_billingconductor": {
632
645
  "targets": {
633
646
  "dotnet": {
@@ -3229,6 +3242,19 @@
3229
3242
  }
3230
3243
  }
3231
3244
  },
3245
+ "aws-cdk-lib.aws_rtbfabric": {
3246
+ "targets": {
3247
+ "dotnet": {
3248
+ "package": "Amazon.CDK.AWS.RTBFabric"
3249
+ },
3250
+ "java": {
3251
+ "package": "software.amazon.awscdk.services.rtbfabric"
3252
+ },
3253
+ "python": {
3254
+ "module": "aws_cdk.aws_rtbfabric"
3255
+ }
3256
+ }
3257
+ },
3232
3258
  "aws-cdk-lib.aws_rum": {
3233
3259
  "targets": {
3234
3260
  "dotnet": {
@@ -3346,6 +3372,19 @@
3346
3372
  }
3347
3373
  }
3348
3374
  },
3375
+ "aws-cdk-lib.aws_s3vectors": {
3376
+ "targets": {
3377
+ "dotnet": {
3378
+ "package": "Amazon.CDK.AWS.S3Vectors"
3379
+ },
3380
+ "java": {
3381
+ "package": "software.amazon.awscdk.services.s3vectors"
3382
+ },
3383
+ "python": {
3384
+ "module": "aws_cdk.aws_s3vectors"
3385
+ }
3386
+ }
3387
+ },
3349
3388
  "aws-cdk-lib.aws_sagemaker": {
3350
3389
  "targets": {
3351
3390
  "dotnet": {
@@ -3554,6 +3593,19 @@
3554
3593
  }
3555
3594
  }
3556
3595
  },
3596
+ "aws-cdk-lib.aws_smsvoice": {
3597
+ "targets": {
3598
+ "dotnet": {
3599
+ "package": "Amazon.CDK.AWS.SMSVOICE"
3600
+ },
3601
+ "java": {
3602
+ "package": "software.amazon.awscdk.services.smsvoice"
3603
+ },
3604
+ "python": {
3605
+ "module": "aws_cdk.aws_smsvoice"
3606
+ }
3607
+ }
3608
+ },
3557
3609
  "aws-cdk-lib.aws_sns": {
3558
3610
  "targets": {
3559
3611
  "dotnet": {
@@ -4078,7 +4130,7 @@
4078
4130
  },
4079
4131
  "description": "CDK Constructs for AWS Fargate to an Amazon Kinesis Data Stream ",
4080
4132
  "homepage": "https://github.com/awslabs/aws-solutions-constructs.git",
4081
- "jsiiVersion": "5.7.22 (build 1cfeabd)",
4133
+ "jsiiVersion": "5.9.8 (build 3d2e131)",
4082
4134
  "keywords": [
4083
4135
  "aws",
4084
4136
  "cdk",
@@ -4514,6 +4566,6 @@
4514
4566
  "symbolId": "lib/index:FargateToKinesisStreamsProps"
4515
4567
  }
4516
4568
  },
4517
- "version": "2.93.0",
4518
- "fingerprint": "e/ASpIKtK5gRGN4Yoj+/jWLAnm3NB3KMCGZUWpsn5Fo="
4569
+ "version": "2.95.0",
4570
+ "fingerprint": "Ci4rYD9qxNfKA2qZTg2/Jb4K4FGI+AksiZ0APF07n8g="
4519
4571
  }
package/lib/index.js CHANGED
@@ -69,5 +69,5 @@ class FargateToKinesisStreams extends constructs_1.Construct {
69
69
  }
70
70
  exports.FargateToKinesisStreams = FargateToKinesisStreams;
71
71
  _a = JSII_RTTI_SYMBOL_1;
72
- FargateToKinesisStreams[_a] = { fqn: "@aws-solutions-constructs/aws-fargate-kinesisstreams.FargateToKinesisStreams", version: "2.93.0" };
72
+ FargateToKinesisStreams[_a] = { fqn: "@aws-solutions-constructs/aws-fargate-kinesisstreams.FargateToKinesisStreams", version: "2.95.0" };
73
73
  //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["index.ts"],"names":[],"mappings":";;;;;AAkBA,2DAA2D;AAC3D,wFAAwF;AACxF,2CAAuC;AAgHvC;;GAEG;AACH,MAAa,uBAAwB,SAAQ,sBAAS;IAOlD;;;;;;;OAOG;IACH,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAmC;QAC3E,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,QAAQ,CAAC,iBAAiB,CAAC,KAAK,CAAC,CAAC;QAClC,QAAQ,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC;QAC9B,QAAQ,CAAC,uBAAuB,CAAC,KAAK,CAAC,CAAC;QAExC,gBAAgB;QAChB,IAAI,CAAC,GAAG,GAAG,QAAQ,CAAC,QAAQ,CAAC,KAAK,EAAE;YAClC,WAAW,EAAE,KAAK,CAAC,WAAW;YAC9B,eAAe,EAAE,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,QAAQ,CAAC,4BAA4B,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,uBAAuB,EAAE;YAC/G,YAAY,EAAE,KAAK,CAAC,QAAQ;YAC5B,iBAAiB,EAAE,EAAE,kBAAkB,EAAE,IAAI,EAAE,gBAAgB,EAAE,IAAI,EAAE;SACxE,CAAC,CAAC;QAEH,4DAA4D;QAC5D,QAAQ,CAAC,qBAAqB,CAAC,KAAK,EAAE,IAAI,CAAC,GAAG,EAAE,QAAQ,CAAC,oBAAoB,CAAC,eAAe,CAAC,CAAC;QAE/F,4BAA4B;QAC5B,IAAI,KAAK,CAAC,4BAA4B,EAAE,CAAC;YACvC,IAAI,CAAC,OAAO,GAAG,KAAK,CAAC,4BAA4B,CAAC;YAClD,4DAA4D;YAC5D,IAAI,CAAC,SAAS,GAAG,KAAK,CAAC,iCAAkC,CAAC;QAC5D,CAAC;aAAM,CAAC;YACN,MAAM,4BAA4B,GAAG,QAAQ,CAAC,oBAAoB,CAAC,KAAK,EAAE,EAAE,EAAE;gBAC5E,YAAY,EAAG,IAAI,CAAC,GAAG;gBACvB,kBAAkB,EAAE,KAAK,CAAC,YAAY;gBACtC,gBAAgB,EAAE,KAAK,CAAC,gBAAgB;gBACxC,eAAe,EAAE,KAAK,CAAC,eAAe;gBACtC,gCAAgC,EAAE,KAAK,CAAC,0BAA0B;gBAClE,8BAA8B,EAAE,KAAK,CAAC,wBAAwB;gBAC9D,yBAAyB,EAAE,KAAK,CAAC,mBAAmB;aACrD,CAAC,CAAC;YACH,IAAI,CAAC,OAAO,GAAG,4BAA4B,CAAC,OAAO,CAAC;YACpD,IAAI,CAAC,SAAS,GAAG,4BAA4B,CAAC,mBAAmB,CAAC;QACpE,CAAC;QAED,2BAA2B;QAC3B,IAAI,CAAC,aAAa,GAAG,QAAQ,CAAC,kBAAkB,CAAC,IAAI,EAAE;YACrD,iBAAiB,EAAE,KAAK,CAAC,iBAAiB;YAC1C,kBAAkB,EAAE,KAAK,CAAC,kBAAkB;SAC7C,CAAC,CAAC;QAEH,4CAA4C;QAC5C,MAAM,iCAAiC,GAAG,KAAK,CAAC,6BAA6B,IAAI,yBAAyB,CAAC;QAC3G,IAAI,CAAC,SAAS,CAAC,cAAc,CAAC,iCAAiC,EAAE,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,CAAC;QAEhG,sEAAsE;QACtE,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,IAAI,CAAC,OAAO,CAAC,cAAc,CAAC,QAAQ,CAAC,CAAC;QAEpE,qEAAqE;QACrE,IAAI,KAAK,CAAC,sBAAsB,KAAK,SAAS,IAAI,KAAK,CAAC,sBAAsB,EAAE,CAAC;YAC/E,IAAI,CAAC,gBAAgB,GAAG,QAAQ,CAAC,0BAA0B,CAAC,IAAI,CAAC,CAAC;QACpE,CAAC;IACH,CAAC;;AApEL,0DAqEC","sourcesContent":["/**\n *  Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n *\n *  Licensed under the Apache License, Version 2.0 (the \"License\"). You may not use this file except in compliance\n *  with the License. A copy of the License is located at\n *\n *      http://www.apache.org/licenses/LICENSE-2.0\n *\n *  or in the 'license' file accompanying this file. This file is distributed on an 'AS IS' BASIS, WITHOUT WARRANTIES\n *  OR CONDITIONS OF ANY KIND, express or implied. See the License for the specific language governing permissions\n *  and limitations under the License.\n */\n\n// Imports\nimport * as cloudwatch from 'aws-cdk-lib/aws-cloudwatch';\nimport * as ec2 from \"aws-cdk-lib/aws-ec2\";\nimport * as ecs from \"aws-cdk-lib/aws-ecs\";\nimport * as kinesis from 'aws-cdk-lib/aws-kinesis';\nimport * as defaults from '@aws-solutions-constructs/core';\n// Note: To ensure CDKv2 compatibility, keep the import statement for Construct separate\nimport { Construct } from 'constructs';\n\n/**\n * The properties for the FargateToKinesisStreams class.\n */\nexport interface FargateToKinesisStreamsProps {\n  /**\n   * True if the VPC provisioned by this construct should contain Public/Private Subnets,\n   * otherwise False for the VPC to contain Isolated Subnets only.\n   *\n   * Note this property is ignored if an existing VPC is specified in the `existingVpc` property.\n   */\n  readonly publicApi: boolean;\n  /**\n   * Optional custom properties for a new VPC the construct will create. Providing both this and `existingVpc` is an error.\n   *\n   * An Amazon Kinesis Streams Interface Endpoint will be added to this VPC.\n   *\n   * @default - None\n   */\n  readonly vpcProps?: ec2.VpcProps;\n  /**\n   * An existing VPC in which to deploy the Fargate Service. Providing both this and `vpcProps` is an error.\n   * If the client provides an existing Fargate Service in the `existingFargateServiceObject` property,\n   * this value must be the VPC where the service is running.\n   *\n   * An Amazon Kinesis Streams Interface Endpoint will be added to this VPC.\n   *\n   * @default - None\n   */\n  readonly existingVpc?: ec2.IVpc;\n  /**\n   * Optional properties to create a new ECS cluster. To provide an existing cluster, use the cluster attribute of the `fargateServiceProps` property.\n   */\n  readonly clusterProps?: ecs.ClusterProps;\n  /**\n   * The arn of an ECR Repository containing the image to use to generate the containers.\n   *\n   * Either this or the image property of the `containerDefinitionProps` property must be provided.\n   *\n   * format:\n   *   arn:aws:ecr:[region]:[account number]:repository/[Repository Name]\n   */\n  readonly ecrRepositoryArn?: string;\n  /**\n   * The version of the image to use from the repository.\n   *\n   * @default - 'latest'\n   */\n  readonly ecrImageVersion?: string;\n  /*\n   * Optional props to define the container created for the Fargate Service\n   *\n   * defaults - fargate-defaults.ts\n   */\n  readonly containerDefinitionProps?: ecs.ContainerDefinitionProps | any;\n  /*\n   * Optional props to define the Fargate Task Definition for this construct\n   *\n   * defaults - fargate-defaults.ts\n   */\n  readonly fargateTaskDefinitionProps?: ecs.FargateTaskDefinitionProps | any;\n  /**\n   * Optional values to override default Fargate Task definition properties (fargate-defaults.ts).\n   * The construct will default to launching the service is the most isolated subnets available (precedence: Isolated, Private and Public).\n   * Override those and other defaults here.\n   *\n   * defaults - fargate-defaults.ts\n   */\n  readonly fargateServiceProps?: ecs.FargateServiceProps | any;\n  /**\n   * A Fargate Service already instantiated. If this is specified, then no props defining a new service can be provided, including:\n   *  ecrImageVersion, containerDefinitionProps, fargateTaskDefinitionProps, ecrRepositoryArn, fargateServiceProps, clusterProps.\n   *\n   * Note - If this property is set, then the `existingContainerDefinitionObject` property must be set as well.\n   *\n   * @default - None\n   */\n  readonly existingFargateServiceObject?: ecs.FargateService;\n  /*\n   * A container definition already instantiated as part of a Fargate service.\n   * This must be the container used in the `existingFargateServiceObject` property.\n   *\n   * @default - None\n   */\n    readonly existingContainerDefinitionObject?: ecs.ContainerDefinition;\n  /**\n   * Existing instance of Kinesis Stream, providing both this and `kinesisStreamProps` will cause an error.\n   *\n   * @default - None\n   */\n  readonly existingStreamObj?: kinesis.Stream;\n  /**\n   * Optional user-provided props to override the default props for the Kinesis stream.\n   *\n   * @default - Default props are used.\n   */\n  readonly kinesisStreamProps?: kinesis.StreamProps;\n  /**\n   * Whether to create recommended CloudWatch alarms for the Kinesis Stream.\n   *\n   * @default - Alarms are created\n   */\n  readonly createCloudWatchAlarms?: boolean;\n  /**\n   * Optional Name to override the Fargate Service default environment variable name that holds the Kinesis Data Stream name value.\n   *\n   * @default - KINESIS_DATASTREAM_NAME\n   */\n  readonly streamEnvironmentVariableName?: string;\n}\n\n/**\n * @summary The FargateToKinesisStream class.\n */\nexport class FargateToKinesisStreams extends Construct {\n    public readonly vpc?: ec2.IVpc;\n    public readonly service: ecs.FargateService;\n    public readonly container: ecs.ContainerDefinition;\n    public readonly kinesisStream: kinesis.Stream;\n    public readonly cloudwatchAlarms?: cloudwatch.Alarm[];\n\n    /**\n     * @summary Constructs a new instance of the KinesisStreamsToFargate class.\n     * @param {cdk.App} scope - represents the scope for all the resources.\n     * @param {string} id - this is a a scope-unique id.\n     * @param {FargateToKinesisStreamsProps} props - user provided props for the construct\n     * @since 0.8.0\n     * @access public\n     */\n    constructor(scope: Construct, id: string, props: FargateToKinesisStreamsProps) {\n      super(scope, id);\n      defaults.CheckFargateProps(props);\n      defaults.CheckVpcProps(props);\n      defaults.CheckKinesisStreamProps(props);\n\n      // Setup the VPC\n      this.vpc = defaults.buildVpc(scope, {\n        existingVpc: props.existingVpc,\n        defaultVpcProps: props.publicApi ? defaults.DefaultPublicPrivateVpcProps() : defaults.DefaultIsolatedVpcProps(),\n        userVpcProps: props.vpcProps,\n        constructVpcProps: { enableDnsHostnames: true, enableDnsSupport: true }\n      });\n\n      // Add the interface endpoint to the VPC for Kinesis Streams\n      defaults.AddAwsServiceEndpoint(scope, this.vpc, defaults.ServiceEndpointTypes.KINESIS_STREAMS);\n\n      // Setup the Fargate Service\n      if (props.existingFargateServiceObject) {\n        this.service = props.existingFargateServiceObject;\n        // CheckFargateProps confirms that the container is provided\n        this.container = props.existingContainerDefinitionObject!;\n      } else {\n        const createFargateServiceResponse = defaults.CreateFargateService(scope, id, {\n          constructVpc:  this.vpc,\n          clientClusterProps: props.clusterProps,\n          ecrRepositoryArn: props.ecrRepositoryArn,\n          ecrImageVersion: props.ecrImageVersion,\n          clientFargateTaskDefinitionProps: props.fargateTaskDefinitionProps,\n          clientContainerDefinitionProps: props.containerDefinitionProps,\n          clientFargateServiceProps: props.fargateServiceProps\n        });\n        this.service = createFargateServiceResponse.service;\n        this.container = createFargateServiceResponse.containerDefinition;\n      }\n\n      // Setup the Kinesis Stream\n      this.kinesisStream = defaults.buildKinesisStream(this, {\n        existingStreamObj: props.existingStreamObj,\n        kinesisStreamProps: props.kinesisStreamProps\n      });\n\n      // Configure container environment variables\n      const streamNameEnvironmentVariableName = props.streamEnvironmentVariableName || 'KINESIS_DATASTREAM_NAME';\n      this.container.addEnvironment(streamNameEnvironmentVariableName, this.kinesisStream.streamName);\n\n      // Grant the Fargate Service permission to write to the Kinesis Stream\n      this.kinesisStream.grantWrite(this.service.taskDefinition.taskRole);\n\n      // By default, deploy CloudWatch Alarms to monitor the Kinesis Stream\n      if (props.createCloudWatchAlarms === undefined || props.createCloudWatchAlarms) {\n        this.cloudwatchAlarms = defaults.buildKinesisStreamCWAlarms(this);\n      }\n    }\n}"]}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@aws-solutions-constructs/aws-fargate-kinesisstreams",
3
- "version": "2.93.0",
3
+ "version": "2.95.0",
4
4
  "description": "CDK Constructs for AWS Fargate to an Amazon Kinesis Data Stream ",
5
5
  "main": "lib/index.js",
6
6
  "types": "lib/index.d.ts",
@@ -55,14 +55,14 @@
55
55
  }
56
56
  },
57
57
  "dependencies": {
58
- "@aws-solutions-constructs/core": "2.93.0",
58
+ "@aws-solutions-constructs/core": "2.95.0",
59
59
  "constructs": "^10.0.0"
60
60
  },
61
61
  "devDependencies": {
62
- "@aws-cdk/integ-tests-alpha": "2.214.0-alpha.0",
62
+ "@aws-cdk/integ-tests-alpha": "2.223.0-alpha.0",
63
63
  "@types/node": "^10.3.0",
64
64
  "constructs": "^10.0.0",
65
- "aws-cdk-lib": "2.214.0"
65
+ "aws-cdk-lib": "2.223.0"
66
66
  },
67
67
  "jest": {
68
68
  "moduleFileExtensions": [
@@ -79,9 +79,9 @@
79
79
  ]
80
80
  },
81
81
  "peerDependencies": {
82
- "@aws-solutions-constructs/core": "2.93.0",
82
+ "@aws-solutions-constructs/core": "2.95.0",
83
83
  "constructs": "^10.0.0",
84
- "aws-cdk-lib": "^2.214.0"
84
+ "aws-cdk-lib": "^2.223.0"
85
85
  },
86
86
  "keywords": [
87
87
  "aws",
@@ -0,0 +1 @@
1
+ "use strict";Object.defineProperty(exports,"__esModule",{value:!0}),exports.external=void 0,exports.handler=handler,exports.withRetries=withRetries;const https=require("https"),url=require("url");exports.external={sendHttpRequest:defaultSendHttpRequest,log:defaultLog,includeStackTraces:!0,userHandlerIndex:"./index"};const CREATE_FAILED_PHYSICAL_ID_MARKER="AWSCDK::CustomResourceProviderFramework::CREATE_FAILED",MISSING_PHYSICAL_ID_MARKER="AWSCDK::CustomResourceProviderFramework::MISSING_PHYSICAL_ID";async function handler(event,context){const sanitizedEvent={...event,ResponseURL:"..."};if(exports.external.log(JSON.stringify(sanitizedEvent,void 0,2)),event.RequestType==="Delete"&&event.PhysicalResourceId===CREATE_FAILED_PHYSICAL_ID_MARKER){exports.external.log("ignoring DELETE event caused by a failed CREATE event"),await submitResponse("SUCCESS",event);return}try{const userHandler=require(exports.external.userHandlerIndex).handler,result=await userHandler(sanitizedEvent,context),responseEvent=renderResponse(event,result);await submitResponse("SUCCESS",responseEvent)}catch(e){const resp={...event,Reason:exports.external.includeStackTraces?e.stack:e.message};resp.PhysicalResourceId||(event.RequestType==="Create"?(exports.external.log("CREATE failed, responding with a marker physical resource id so that the subsequent DELETE will be ignored"),resp.PhysicalResourceId=CREATE_FAILED_PHYSICAL_ID_MARKER):exports.external.log(`ERROR: Malformed event. "PhysicalResourceId" is required: ${JSON.stringify(event)}`)),await submitResponse("FAILED",resp)}}function renderResponse(cfnRequest,handlerResponse={}){const physicalResourceId=handlerResponse.PhysicalResourceId??cfnRequest.PhysicalResourceId??cfnRequest.RequestId;if(cfnRequest.RequestType==="Delete"&&physicalResourceId!==cfnRequest.PhysicalResourceId)throw new Error(`DELETE: cannot change the physical resource ID from "${cfnRequest.PhysicalResourceId}" to "${handlerResponse.PhysicalResourceId}" during deletion`);return{...cfnRequest,...handlerResponse,PhysicalResourceId:physicalResourceId}}async function submitResponse(status,event){const json={Status:status,Reason:event.Reason??status,StackId:event.StackId,RequestId:event.RequestId,PhysicalResourceId:event.PhysicalResourceId||MISSING_PHYSICAL_ID_MARKER,LogicalResourceId:event.LogicalResourceId,NoEcho:event.NoEcho,Data:event.Data},parsedUrl=url.parse(event.ResponseURL),loggingSafeUrl=`${parsedUrl.protocol}//${parsedUrl.hostname}/${parsedUrl.pathname}?***`;exports.external.log("submit response to cloudformation",loggingSafeUrl,json);const responseBody=JSON.stringify(json),req={hostname:parsedUrl.hostname,path:parsedUrl.path,method:"PUT",headers:{"content-type":"","content-length":Buffer.byteLength(responseBody,"utf8")}};await withRetries({attempts:5,sleep:1e3},exports.external.sendHttpRequest)(req,responseBody)}async function defaultSendHttpRequest(options,requestBody){return new Promise((resolve,reject)=>{try{const request=https.request(options,response=>{response.resume(),!response.statusCode||response.statusCode>=400?reject(new Error(`Unsuccessful HTTP response: ${response.statusCode}`)):resolve()});request.on("error",reject),request.write(requestBody),request.end()}catch(e){reject(e)}})}function defaultLog(fmt,...params){console.log(fmt,...params)}function withRetries(options,fn){return async(...xs)=>{let attempts=options.attempts,ms=options.sleep;for(;;)try{return await fn(...xs)}catch(e){if(attempts--<=0)throw e;await sleep(Math.floor(Math.random()*ms)),ms*=2}}}async function sleep(ms){return new Promise(ok=>setTimeout(ok,ms))}
@@ -0,0 +1 @@
1
+ "use strict";var I=Object.create,t=Object.defineProperty,y=Object.getOwnPropertyDescriptor,P=Object.getOwnPropertyNames,g=Object.getPrototypeOf,l=Object.prototype.hasOwnProperty,G=(r,e)=>{for(var o in e)t(r,o,{get:e[o],enumerable:!0})},n=(r,e,o,i)=>{if(e&&typeof e=="object"||typeof e=="function")for(let s of P(e))!l.call(r,s)&&s!==o&&t(r,s,{get:()=>e[s],enumerable:!(i=y(e,s))||i.enumerable});return r},R=(r,e,o)=>(o=r!=null?I(g(r)):{},n(e||!r||!r.__esModule?t(o,"default",{value:r,enumerable:!0}):o,r)),S=r=>n(t({},"__esModule",{value:!0}),r),k={};G(k,{handler:()=>f}),module.exports=S(k);var a=R(require("@aws-sdk/client-ec2")),u=new a.EC2({});function c(r,e){return{GroupId:r,IpPermissions:[{UserIdGroupPairs:[{GroupId:r,UserId:e}],IpProtocol:"-1"}]}}function d(r){return{GroupId:r,IpPermissions:[{IpRanges:[{CidrIp:"0.0.0.0/0"}],IpProtocol:"-1"}]}}async function f(r){let e=r.ResourceProperties.DefaultSecurityGroupId,o=r.ResourceProperties.Account;switch(r.RequestType){case"Create":return p(e,o);case"Update":return h(r);case"Delete":return m(e,o)}}async function h(r){let e=r.OldResourceProperties.DefaultSecurityGroupId,o=r.ResourceProperties.DefaultSecurityGroupId;e!==o&&(await m(e,r.ResourceProperties.Account),await p(o,r.ResourceProperties.Account))}async function p(r,e){try{await u.revokeSecurityGroupEgress(d(r))}catch(o){if(o.name!=="InvalidPermission.NotFound")throw o}try{await u.revokeSecurityGroupIngress(c(r,e))}catch(o){if(o.name!=="InvalidPermission.NotFound")throw o}}async function m(r,e){await u.authorizeSecurityGroupIngress(c(r,e)),await u.authorizeSecurityGroupEgress(d(r))}
@@ -1 +1 @@
1
- {"version":"45.0.0"}
1
+ {"version":"48.0.0"}
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "45.0.0",
2
+ "version": "48.0.0",
3
3
  "files": {
4
4
  "7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200": {
5
5
  "displayName": "farkin-existingFargateService/Custom::VpcRestrictDefaultSGCustomResourceProvider Code",
@@ -15,16 +15,16 @@
15
15
  }
16
16
  }
17
17
  },
18
- "484abe24b1a4978ccaadc12ba3c5b013d90141d463e23f72e173b6d0dd0587c2": {
18
+ "40fc31f6da3af97457e43e41c87c58be401eea9d648b8cd5ee0e07ab0085cbb3": {
19
19
  "displayName": "farkin-existingFargateService Template",
20
20
  "source": {
21
21
  "path": "farkin-existingFargateService.template.json",
22
22
  "packaging": "file"
23
23
  },
24
24
  "destinations": {
25
- "current_account-current_region-da50d0f9": {
25
+ "current_account-current_region-ba294994": {
26
26
  "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
27
- "objectKey": "484abe24b1a4978ccaadc12ba3c5b013d90141d463e23f72e173b6d0dd0587c2.json",
27
+ "objectKey": "40fc31f6da3af97457e43e41c87c58be401eea9d648b8cd5ee0e07ab0085cbb3.json",
28
28
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
29
29
  }
30
30
  }
@@ -474,16 +474,6 @@
474
474
  "Arn"
475
475
  ]
476
476
  }
477
- },
478
- {
479
- "Action": "iam:PassRole",
480
- "Effect": "Allow",
481
- "Resource": {
482
- "Fn::GetAtt": [
483
- "VpcFlowLogIAMRole6A475D41",
484
- "Arn"
485
- ]
486
- }
487
477
  }
488
478
  ],
489
479
  "Version": "2012-10-17"
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "45.0.0",
2
+ "version": "48.0.0",
3
3
  "files": {
4
4
  "21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22": {
5
5
  "displayName": "farkinexistingFargateServiceIntegDefaultTestDeployAssertF1F4EC2C Template",
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "45.0.0",
2
+ "version": "48.0.0",
3
3
  "testCases": {
4
4
  "farkin-existingFargateService/Integ/DefaultTest": {
5
5
  "stacks": [
@@ -9,5 +9,5 @@
9
9
  "assertionStackName": "farkinexistingFargateServiceIntegDefaultTestDeployAssertF1F4EC2C"
10
10
  }
11
11
  },
12
- "minimumCliVersion": "2.1020.2"
12
+ "minimumCliVersion": "2.1029.2"
13
13
  }
@@ -66,7 +66,7 @@
66
66
  "validateOnSynth": false,
67
67
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
68
68
  "cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
69
- "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/484abe24b1a4978ccaadc12ba3c5b013d90141d463e23f72e173b6d0dd0587c2.json",
69
+ "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/40fc31f6da3af97457e43e41c87c58be401eea9d648b8cd5ee0e07ab0085cbb3.json",
70
70
  "requiresBootstrapStackVersion": 6,
71
71
  "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
72
72
  "additionalDependencies": [
@@ -412,14 +412,6 @@
412
412
  "*"
413
413
  ]
414
414
  }
415
- },
416
- {
417
- "type": "aws:cdk:analytics:method",
418
- "data": {
419
- "addToPrincipalPolicy": [
420
- {}
421
- ]
422
- }
423
415
  }
424
416
  ],
425
417
  "/farkin-existingFargateService/Vpc/FlowLog/IAMRole/ImportIAMRole": [
@@ -455,14 +447,6 @@
455
447
  ]
456
448
  }
457
449
  },
458
- {
459
- "type": "aws:cdk:analytics:method",
460
- "data": {
461
- "addStatements": [
462
- {}
463
- ]
464
- }
465
- },
466
450
  {
467
451
  "type": "aws:cdk:analytics:method",
468
452
  "data": {
@@ -502,9 +486,9 @@
502
486
  "data": {
503
487
  "vpc": "*",
504
488
  "service": {
505
- "privateDnsDefault": true,
506
489
  "name": "*",
507
- "port": "*"
490
+ "port": "*",
491
+ "privateDnsDefault": true
508
492
  },
509
493
  "securityGroups": [
510
494
  "*"
@@ -524,9 +508,9 @@
524
508
  "data": {
525
509
  "vpc": "*",
526
510
  "service": {
527
- "privateDnsDefault": true,
528
511
  "name": "*",
529
- "port": "*"
512
+ "port": "*",
513
+ "privateDnsDefault": true
530
514
  },
531
515
  "securityGroups": [
532
516
  "*"
@@ -563,9 +547,9 @@
563
547
  "data": {
564
548
  "vpc": "*",
565
549
  "service": {
566
- "privateDnsDefault": true,
567
550
  "name": "*",
568
- "port": "*"
551
+ "port": "*",
552
+ "privateDnsDefault": true
569
553
  },
570
554
  "securityGroups": [
571
555
  "*"
@@ -852,7 +836,8 @@
852
836
  "type": "aws:cdk:analytics:construct",
853
837
  "data": {
854
838
  "metric": {
855
- "warnings": "*"
839
+ "warnings": "*",
840
+ "warningsV2": "*"
856
841
  },
857
842
  "threshold": "*",
858
843
  "evaluationPeriods": "*",
@@ -872,7 +857,8 @@
872
857
  "type": "aws:cdk:analytics:construct",
873
858
  "data": {
874
859
  "metric": {
875
- "warnings": "*"
860
+ "warnings": "*",
861
+ "warningsV2": "*"
876
862
  },
877
863
  "threshold": "*",
878
864
  "evaluationPeriods": "*",
@@ -958,57 +944,48 @@
958
944
  "properties": {
959
945
  "module": "aws-cdk-lib",
960
946
  "flags": {
961
- "@aws-cdk/core:enableStackNameDuplicates": {
962
- "recommendedValue": true,
963
- "explanation": "Allow multiple stacks with the same name"
964
- },
965
- "aws-cdk:enableDiffNoFail": {
947
+ "@aws-cdk/aws-signer:signingProfileNamePassedToCfn": {
966
948
  "recommendedValue": true,
967
- "explanation": "Make `cdk diff` not fail when there are differences"
949
+ "explanation": "Pass signingProfileName to CfnSigningProfile"
968
950
  },
969
951
  "@aws-cdk/core:newStyleStackSynthesis": {
970
952
  "recommendedValue": true,
971
- "explanation": "Switch to new stack synthesis method which enables CI/CD"
953
+ "explanation": "Switch to new stack synthesis method which enables CI/CD",
954
+ "unconfiguredBehavesLike": {
955
+ "v2": true
956
+ }
972
957
  },
973
958
  "@aws-cdk/core:stackRelativeExports": {
974
959
  "recommendedValue": true,
975
- "explanation": "Name exports based on the construct paths relative to the stack, rather than the global construct path"
976
- },
977
- "@aws-cdk/aws-ecr-assets:dockerIgnoreSupport": {
978
- "recommendedValue": true,
979
- "explanation": "DockerImageAsset properly supports `.dockerignore` files by default"
980
- },
981
- "@aws-cdk/aws-secretsmanager:parseOwnedSecretName": {
982
- "recommendedValue": true,
983
- "explanation": "Fix the referencing of SecretsManager names from ARNs"
984
- },
985
- "@aws-cdk/aws-kms:defaultKeyPolicies": {
986
- "recommendedValue": true,
987
- "explanation": "Tighten default KMS key policies"
988
- },
989
- "@aws-cdk/aws-s3:grantWriteWithoutAcl": {
990
- "recommendedValue": true,
991
- "explanation": "Remove `PutObjectAcl` from Bucket.grantWrite"
960
+ "explanation": "Name exports based on the construct paths relative to the stack, rather than the global construct path",
961
+ "unconfiguredBehavesLike": {
962
+ "v2": true
963
+ }
992
964
  },
993
- "@aws-cdk/aws-ecs-patterns:removeDefaultDesiredCount": {
965
+ "@aws-cdk/aws-ecs-patterns:secGroupsDisablesImplicitOpenListener": {
994
966
  "recommendedValue": true,
995
- "explanation": "Do not specify a default DesiredCount for ECS services"
967
+ "explanation": "Disable implicit openListener when custom security groups are provided"
996
968
  },
997
969
  "@aws-cdk/aws-rds:lowercaseDbIdentifier": {
998
970
  "recommendedValue": true,
999
- "explanation": "Force lowercasing of RDS Cluster names in CDK"
971
+ "explanation": "Force lowercasing of RDS Cluster names in CDK",
972
+ "unconfiguredBehavesLike": {
973
+ "v2": true
974
+ }
1000
975
  },
1001
976
  "@aws-cdk/aws-apigateway:usagePlanKeyOrderInsensitiveId": {
1002
977
  "recommendedValue": true,
1003
- "explanation": "Allow adding/removing multiple UsagePlanKeys independently"
1004
- },
1005
- "@aws-cdk/aws-efs:defaultEncryptionAtRest": {
1006
- "recommendedValue": true,
1007
- "explanation": "Enable this feature flag to have elastic file systems encrypted at rest by default."
978
+ "explanation": "Allow adding/removing multiple UsagePlanKeys independently",
979
+ "unconfiguredBehavesLike": {
980
+ "v2": true
981
+ }
1008
982
  },
1009
983
  "@aws-cdk/aws-lambda:recognizeVersionProps": {
1010
984
  "recommendedValue": true,
1011
- "explanation": "Enable this feature flag to opt in to the updated logical id calculation for Lambda Version created using the `fn.currentVersion`."
985
+ "explanation": "Enable this feature flag to opt in to the updated logical id calculation for Lambda Version created using the `fn.currentVersion`.",
986
+ "unconfiguredBehavesLike": {
987
+ "v2": true
988
+ }
1012
989
  },
1013
990
  "@aws-cdk/aws-lambda:recognizeLayerVersion": {
1014
991
  "userValue": true,
@@ -1017,7 +994,10 @@
1017
994
  },
1018
995
  "@aws-cdk/aws-cloudfront:defaultSecurityPolicyTLSv1.2_2021": {
1019
996
  "recommendedValue": true,
1020
- "explanation": "Enable this feature flag to have cloudfront distributions use the security policy TLSv1.2_2021 by default."
997
+ "explanation": "Enable this feature flag to have cloudfront distributions use the security policy TLSv1.2_2021 by default.",
998
+ "unconfiguredBehavesLike": {
999
+ "v2": true
1000
+ }
1021
1001
  },
1022
1002
  "@aws-cdk/core:checkSecretUsage": {
1023
1003
  "userValue": true,
@@ -1094,7 +1074,7 @@
1094
1074
  "@aws-cdk/aws-iam:importedRoleStackSafeDefaultPolicyName": {
1095
1075
  "userValue": true,
1096
1076
  "recommendedValue": true,
1097
- "explanation": "Enable this feature to by default create default policy names for imported roles that depend on the stack the role is in."
1077
+ "explanation": "Enable this feature to create default policy names for imported roles that depend on the stack the role is in."
1098
1078
  },
1099
1079
  "@aws-cdk/aws-s3:serverAccessLogsUseBucketPolicy": {
1100
1080
  "userValue": true,
@@ -1238,7 +1218,10 @@
1238
1218
  },
1239
1219
  "@aws-cdk/pipelines:reduceAssetRoleTrustScope": {
1240
1220
  "recommendedValue": true,
1241
- "explanation": "Remove the root account principal from PipelineAssetsFileRole trust policy"
1221
+ "explanation": "Remove the root account principal from PipelineAssetsFileRole trust policy",
1222
+ "unconfiguredBehavesLike": {
1223
+ "v2": true
1224
+ }
1242
1225
  },
1243
1226
  "@aws-cdk/aws-eks:nodegroupNameAttribute": {
1244
1227
  "userValue": true,
@@ -1267,7 +1250,10 @@
1267
1250
  },
1268
1251
  "@aws-cdk/aws-stepfunctions-tasks:useNewS3UriParametersForBedrockInvokeModelTask": {
1269
1252
  "recommendedValue": true,
1270
- "explanation": "When enabled, use new props for S3 URI field in task definition of state machine for bedrock invoke model."
1253
+ "explanation": "When enabled, use new props for S3 URI field in task definition of state machine for bedrock invoke model.",
1254
+ "unconfiguredBehavesLike": {
1255
+ "v2": true
1256
+ }
1271
1257
  },
1272
1258
  "@aws-cdk/core:explicitStackTags": {
1273
1259
  "userValue": true,
@@ -1331,7 +1317,10 @@
1331
1317
  },
1332
1318
  "@aws-cdk/core:aspectStabilization": {
1333
1319
  "recommendedValue": true,
1334
- "explanation": "When enabled, a stabilization loop will be run when invoking Aspects during synthesis."
1320
+ "explanation": "When enabled, a stabilization loop will be run when invoking Aspects during synthesis.",
1321
+ "unconfiguredBehavesLike": {
1322
+ "v2": true
1323
+ }
1335
1324
  },
1336
1325
  "@aws-cdk/aws-route53-targets:userPoolDomainNameMethodWithoutCustomResource": {
1337
1326
  "userValue": true,
@@ -1365,7 +1354,10 @@
1365
1354
  },
1366
1355
  "@aws-cdk/pipelines:reduceStageRoleTrustScope": {
1367
1356
  "recommendedValue": true,
1368
- "explanation": "Remove the root account principal from Stage addActions trust policy"
1357
+ "explanation": "Remove the root account principal from Stage addActions trust policy",
1358
+ "unconfiguredBehavesLike": {
1359
+ "v2": true
1360
+ }
1369
1361
  },
1370
1362
  "@aws-cdk/aws-events:requireEventBusPolicySid": {
1371
1363
  "userValue": true,
@@ -1388,7 +1380,10 @@
1388
1380
  },
1389
1381
  "@aws-cdk/pipelines:reduceCrossAccountActionRoleTrustScope": {
1390
1382
  "recommendedValue": true,
1391
- "explanation": "When enabled, scopes down the trust policy for the cross-account action role"
1383
+ "explanation": "When enabled, scopes down the trust policy for the cross-account action role",
1384
+ "unconfiguredBehavesLike": {
1385
+ "v2": true
1386
+ }
1392
1387
  },
1393
1388
  "@aws-cdk/aws-stepfunctions:useDistributedMapResultWriterV2": {
1394
1389
  "userValue": true,
@@ -1418,6 +1413,21 @@
1418
1413
  "userValue": true,
1419
1414
  "recommendedValue": true,
1420
1415
  "explanation": "When enabled, CDK creates and manages loggroup for the lambda function"
1416
+ },
1417
+ "@aws-cdk/aws-elasticloadbalancingv2:networkLoadBalancerWithSecurityGroupByDefault": {
1418
+ "recommendedValue": true,
1419
+ "explanation": "When enabled, Network Load Balancer will be created with a security group by default."
1420
+ },
1421
+ "@aws-cdk/aws-stepfunctions-tasks:httpInvokeDynamicJsonPathEndpoint": {
1422
+ "recommendedValue": true,
1423
+ "explanation": "When enabled, allows using a dynamic apiEndpoint with JSONPath format in HttpInvoke tasks.",
1424
+ "unconfiguredBehavesLike": {
1425
+ "v2": true
1426
+ }
1427
+ },
1428
+ "@aws-cdk/aws-ecs-patterns:uniqueTargetGroupId": {
1429
+ "recommendedValue": true,
1430
+ "explanation": "When enabled, ECS patterns will generate unique target group IDs to prevent conflicts during load balancer replacement"
1421
1431
  }
1422
1432
  }
1423
1433
  }