@aws-solutions-constructs/aws-fargate-opensearch 2.94.0 → 2.95.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (21) hide show
  1. package/.jsii +31 -5
  2. package/lib/index.js +1 -1
  3. package/package.json +6 -6
  4. package/test/integ.faropn-existing-resources.js.snapshot/asset.7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200/__entrypoint__.js +1 -0
  5. package/test/integ.faropn-existing-resources.js.snapshot/asset.7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200/index.js +1 -0
  6. package/test/integ.faropn-existing-resources.js.snapshot/cdk.out +1 -1
  7. package/test/integ.faropn-existing-resources.js.snapshot/faropn-existing-resources.assets.json +4 -4
  8. package/test/integ.faropn-existing-resources.js.snapshot/faropn-existing-resources.template.json +0 -10
  9. package/test/integ.faropn-existing-resources.js.snapshot/faropnexistingresourcesIntegDefaultTestDeployAssert753D5E58.assets.json +1 -1
  10. package/test/integ.faropn-existing-resources.js.snapshot/integ.json +2 -2
  11. package/test/integ.faropn-existing-resources.js.snapshot/manifest.json +87 -70
  12. package/test/integ.faropn-existing-resources.js.snapshot/tree.json +1 -1
  13. package/test/integ.faropn-new-resources.js.snapshot/asset.7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200/__entrypoint__.js +1 -0
  14. package/test/integ.faropn-new-resources.js.snapshot/asset.7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200/index.js +1 -0
  15. package/test/integ.faropn-new-resources.js.snapshot/cdk.out +1 -1
  16. package/test/integ.faropn-new-resources.js.snapshot/faropn-new-resources.assets.json +4 -4
  17. package/test/integ.faropn-new-resources.js.snapshot/faropn-new-resources.template.json +0 -10
  18. package/test/integ.faropn-new-resources.js.snapshot/faropnnewresourcesIntegDefaultTestDeployAssert740558EF.assets.json +1 -1
  19. package/test/integ.faropn-new-resources.js.snapshot/integ.json +2 -2
  20. package/test/integ.faropn-new-resources.js.snapshot/manifest.json +87 -70
  21. package/test/integ.faropn-new-resources.js.snapshot/tree.json +1 -1
package/.jsii CHANGED
@@ -8,8 +8,8 @@
8
8
  "url": "https://aws.amazon.com"
9
9
  },
10
10
  "dependencies": {
11
- "@aws-solutions-constructs/core": "2.94.0",
12
- "aws-cdk-lib": "^2.219.0",
11
+ "@aws-solutions-constructs/core": "2.95.0",
12
+ "aws-cdk-lib": "^2.223.0",
13
13
  "constructs": "^10.0.0"
14
14
  },
15
15
  "dependencyClosure": {
@@ -3242,6 +3242,19 @@
3242
3242
  }
3243
3243
  }
3244
3244
  },
3245
+ "aws-cdk-lib.aws_rtbfabric": {
3246
+ "targets": {
3247
+ "dotnet": {
3248
+ "package": "Amazon.CDK.AWS.RTBFabric"
3249
+ },
3250
+ "java": {
3251
+ "package": "software.amazon.awscdk.services.rtbfabric"
3252
+ },
3253
+ "python": {
3254
+ "module": "aws_cdk.aws_rtbfabric"
3255
+ }
3256
+ }
3257
+ },
3245
3258
  "aws-cdk-lib.aws_rum": {
3246
3259
  "targets": {
3247
3260
  "dotnet": {
@@ -3359,6 +3372,19 @@
3359
3372
  }
3360
3373
  }
3361
3374
  },
3375
+ "aws-cdk-lib.aws_s3vectors": {
3376
+ "targets": {
3377
+ "dotnet": {
3378
+ "package": "Amazon.CDK.AWS.S3Vectors"
3379
+ },
3380
+ "java": {
3381
+ "package": "software.amazon.awscdk.services.s3vectors"
3382
+ },
3383
+ "python": {
3384
+ "module": "aws_cdk.aws_s3vectors"
3385
+ }
3386
+ }
3387
+ },
3362
3388
  "aws-cdk-lib.aws_sagemaker": {
3363
3389
  "targets": {
3364
3390
  "dotnet": {
@@ -4104,7 +4130,7 @@
4104
4130
  },
4105
4131
  "description": "CDK Constructs for AWS Fargate to Amazon OpenSearch Service",
4106
4132
  "homepage": "https://github.com/awslabs/aws-solutions-constructs.git",
4107
- "jsiiVersion": "5.7.22 (build 1cfeabd)",
4133
+ "jsiiVersion": "5.9.8 (build 3d2e131)",
4108
4134
  "keywords": [
4109
4135
  "aws",
4110
4136
  "cdk",
@@ -4575,6 +4601,6 @@
4575
4601
  "symbolId": "lib/index:FargateToOpenSearchProps"
4576
4602
  }
4577
4603
  },
4578
- "version": "2.94.0",
4579
- "fingerprint": "TfGFTp8mYY5iOT6pe1Tw7su4TvKA1FIFNB3wDC3zhlA="
4604
+ "version": "2.95.0",
4605
+ "fingerprint": "eFxkF/8zINKxhhZ7mR6Run04t7rweti83zHKEI2OIFs="
4580
4606
  }
package/lib/index.js CHANGED
@@ -77,5 +77,5 @@ class FargateToOpenSearch extends constructs_1.Construct {
77
77
  }
78
78
  exports.FargateToOpenSearch = FargateToOpenSearch;
79
79
  _a = JSII_RTTI_SYMBOL_1;
80
- FargateToOpenSearch[_a] = { fqn: "@aws-solutions-constructs/aws-fargate-opensearch.FargateToOpenSearch", version: "2.94.0" };
80
+ FargateToOpenSearch[_a] = { fqn: "@aws-solutions-constructs/aws-fargate-opensearch.FargateToOpenSearch", version: "2.95.0" };
81
81
  //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["index.ts"],"names":[],"mappings":";;;;;AAAA;;;;;;;;;;;GAWG;AAEH,2DAA2D;AAO3D,wFAAwF;AACxF,2CAAuC;AAiHvC,MAAa,mBAAoB,SAAQ,sBAAS;IAWhD,YAAY,KAAgB,EAAE,EAAU,EAAE,KAA+B;QACvE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,QAAQ,CAAC,iBAAiB,CAAC,KAAK,CAAC,CAAC;QAClC,QAAQ,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC;QAC9B,QAAQ,CAAC,oBAAoB,CAAC,KAAK,CAAC,CAAC;QAErC,IAAI,CAAC,GAAG,GAAG,QAAQ,CAAC,QAAQ,CAAC,KAAK,EAAE;YAClC,WAAW,EAAE,KAAK,CAAC,WAAW;YAC9B,eAAe,EAAE,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,QAAQ,CAAC,4BAA4B,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,uBAAuB,EAAE;YAC/G,YAAY,EAAE,KAAK,CAAC,QAAQ;YAC5B,iBAAiB,EAAE,EAAE,kBAAkB,EAAE,IAAI,EAAE,gBAAgB,EAAE,IAAI,EAAE;SACxE,CAAC,CAAC;QAEH,IAAI,KAAK,CAAC,4BAA4B,EAAE,CAAC;YACvC,IAAI,CAAC,OAAO,GAAG,KAAK,CAAC,4BAA4B,CAAC;YAClD,4DAA4D;YAC5D,IAAI,CAAC,SAAS,GAAG,KAAK,CAAC,iCAAkC,CAAC;QAC5D,CAAC;aAAM,CAAC;YACN,MAAM,4BAA4B,GAAG,QAAQ,CAAC,oBAAoB,CAAC,KAAK,EAAE,EAAE,EAAE;gBAC5E,YAAY,EAAE,IAAI,CAAC,GAAG;gBACtB,kBAAkB,EAAE,KAAK,CAAC,YAAY;gBACtC,gBAAgB,EAAE,KAAK,CAAC,gBAAgB;gBACxC,eAAe,EAAE,KAAK,CAAC,eAAe;gBACtC,gCAAgC,EAAE,KAAK,CAAC,0BAA0B;gBAClE,8BAA8B,EAAE,KAAK,CAAC,wBAAwB;gBAC9D,yBAAyB,EAAE,KAAK,CAAC,mBAAmB;aACrD,CAAC,CAAC;YACH,IAAI,CAAC,OAAO,GAAG,4BAA4B,CAAC,OAAO,CAAC;YACpD,IAAI,CAAC,SAAS,GAAG,4BAA4B,CAAC,mBAAmB,CAAC;QACpE,CAAC;QAED,IAAI,qBAA+B,CAAC;QAEpC,CAAC,IAAI,CAAC,QAAQ,EAAE,IAAI,CAAC,cAAc,EAAE,IAAI,CAAC,YAAY,EAAE,qBAAqB,CAAC;YAC5E,QAAQ,CAAC,4BAA4B,CAAC,IAAI,EAAE,KAAK,CAAC,iBAAiB,IAAI,KAAK,CAAC,oBAAoB,CAAC,CAAC;QAErG,IAAI,gBAAgB,CAAC;QAErB,IAAI,IAAI,CAAC,GAAG,EAAE,CAAC;YACb,gBAAgB,GAAG,QAAQ,CAAC,6BAA6B,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QAC1E,CAAC;QAED,MAAM,oBAAoB,GAAkC;YAC1D,QAAQ,EAAE,IAAI,CAAC,QAAQ;YACvB,YAAY,EAAE,IAAI,CAAC,YAAY;YAC/B,wBAAwB,EAAE,qBAAqB,CAAC,OAAO;YACvD,GAAG,EAAE,IAAI,CAAC,GAAG;YACb,oBAAoB,EAAE,KAAK,CAAC,oBAAoB;YAChD,iBAAiB,EAAE,KAAK,CAAC,qBAAqB;YAC9C,gBAAgB;SACjB,CAAC;QAEF,MAAM,uBAAuB,GAAG,QAAQ,CAAC,eAAe,CAAC,IAAI,EAAE,oBAAoB,CAAC,CAAC;QACrF,IAAI,CAAC,gBAAgB,GAAG,uBAAuB,CAAC,MAAM,CAAC;QACvD,IAAI,CAAC,cAAc,GAAG,uBAAuB,CAAC,IAAI,CAAC;QAEnD,IAAI,KAAK,CAAC,sBAAsB,KAAK,SAAS,IAAI,KAAK,CAAC,sBAAsB,EAAE,CAAC;YAC/E,IAAI,CAAC,gBAAgB,GAAG,QAAQ,CAAC,uBAAuB,CAAC,IAAI,CAAC,CAAC;QACjE,CAAC;QAED,4BAA4B;QAC5B,MAAM,qCAAqC,GAAG,KAAK,CAAC,qCAAqC,IAAI,iBAAiB,CAAC;QAC/G,IAAI,CAAC,SAAS,CAAC,cAAc,CAAC,qCAAqC,EAAE,IAAI,CAAC,gBAAgB,CAAC,kBAAkB,CAAC,CAAC;IAEjH,CAAC;;AA3EH,kDA4EC","sourcesContent":["/**\n *  Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n *\n *  Licensed under the Apache License, Version 2.0 (the \"License\"). You may not use this file except in compliance\n *  with the License. A copy of the License is located at\n *\n *      http://www.apache.org/licenses/LICENSE-2.0\n *\n *  or in the 'license' file accompanying this file. This file is distributed on an 'AS IS' BASIS, WITHOUT WARRANTIES\n *  OR CONDITIONS OF ANY KIND, express or implied. See the License for the specific language governing permissions\n *  and limitations under the License.\n */\n\nimport * as defaults from \"@aws-solutions-constructs/core\";\nimport * as ecs from \"aws-cdk-lib/aws-ecs\";\nimport * as iam from \"aws-cdk-lib/aws-iam\";\nimport * as cognito from 'aws-cdk-lib/aws-cognito';\nimport * as ec2 from \"aws-cdk-lib/aws-ec2\";\nimport * as cloudwatch from 'aws-cdk-lib/aws-cloudwatch';\nimport * as opensearch from \"aws-cdk-lib/aws-opensearchservice\";\n// Note: To ensure CDKv2 compatibility, keep the import statement for Construct separate\nimport { Construct } from \"constructs\";\n\nexport interface FargateToOpenSearchProps {\n  /**\n   * Optional custom properties for a VPC the construct will create. This VPC will\n   * be used by the new Fargate service the construct creates (that's\n   * why targetGroupProps can't include a VPC). Providing\n   * both this and existingVpc is an error.\n   *\n   * @default - none\n   */\n  readonly vpcProps?: ec2.VpcProps;\n  /**\n   * An existing VPC in which to deploy the construct. Providing both this and\n   * vpcProps is an error. If the client provides an existing Fargate service,\n   * this value must be the VPC where the service is running.\n   *\n   * @default - none\n   */\n  readonly existingVpc?: ec2.IVpc;\n  /**\n   * Whether the construct is deploying a private or public API. This has implications for the VPC deployed\n   * by this construct.\n   */\n  readonly publicApi: boolean;\n  /**\n   * Optional properties to create a new ECS cluster\n   */\n  readonly clusterProps?: ecs.ClusterProps;\n  /**\n   * The arn of an ECR Repository containing the image to use\n   * to generate the containers\n   *\n   * format:\n   *   arn:aws:ecr:[region]:[account number]:repository/[Repository Name]\n   */\n  readonly ecrRepositoryArn?: string;\n  /**\n   * The version of the image to use from the repository\n   *\n   * @default - 'latest'\n   */\n  readonly ecrImageVersion?: string;\n  /*\n   * Optional props to define the container created for the Fargate Service\n   *\n   * defaults - fargate-defaults.ts\n   */\n  readonly containerDefinitionProps?: ecs.ContainerDefinitionProps | any;\n  /*\n   * Optional props to define the Fargate Task Definition for this construct\n   *\n   * defaults - fargate-defaults.ts\n   */\n  readonly fargateTaskDefinitionProps?: ecs.FargateTaskDefinitionProps | any;\n  /**\n   * Optional values to override default Fargate Task definition properties\n   * (fargate-defaults.ts). The construct will default to launching the service\n   * is the most isolated subnets available (precedence: Isolated, Private and\n   * Public). Override those and other defaults here.\n   *\n   * defaults - fargate-defaults.ts\n   */\n  readonly fargateServiceProps?: ecs.FargateServiceProps | any;\n  /**\n   * A Fargate Service already instantiated (probably by another Solutions Construct). If\n   * this is specified, then no props defining a new service can be provided, including:\n   * existingImageObject, ecrImageVersion, containerDefinitionProps, fargateTaskDefinitionProps,\n   * ecrRepositoryArn, fargateServiceProps, clusterProps, existingClusterInterface. If this value\n   * is provided, then existingContainerDefinitionObject must be provided as well.\n   *\n   * @default - none\n   */\n  readonly existingFargateServiceObject?: ecs.FargateService;\n  /*\n   * A container definition already instantiated as part of a Fargate service. This must\n   * be the container in the existingFargateServiceObject.\n   *\n   * @default - None\n   */\n  readonly existingContainerDefinitionObject?: ecs.ContainerDefinition;\n  /**\n   * Optional user provided props to override the default props for the OpenSearch Service.\n   *\n   * @default - Default props are used\n   */\n  readonly openSearchDomainProps?: opensearch.CfnDomainProps;\n  /**\n   * Domain name for the OpenSearch Service.\n   *\n   * @default - None\n   */\n  readonly openSearchDomainName: string;\n  /**\n   * Optional Amazon Cognito domain name. If omitted the Amazon Cognito domain will default to the OpenSearch Service domain name.\n   *\n   * @default - the OpenSearch Service domain name\n   */\n  readonly cognitoDomainName?: string;\n  /**\n   * Whether to create recommended CloudWatch alarms\n   *\n   * @default - Alarms are created\n   */\n  readonly createCloudWatchAlarms?: boolean;\n  /**\n   * Optional Name for the container environment variable set to the domain endpoint.\n   *\n   * @default - DOMAIN_ENDPOINT\n   */\n  readonly domainEndpointEnvironmentVariableName?: string;\n}\n\nexport class FargateToOpenSearch extends Construct {\n  public readonly vpc: ec2.IVpc;\n  public readonly service: ecs.FargateService;\n  public readonly container: ecs.ContainerDefinition;\n  public readonly userPool: cognito.UserPool;\n  public readonly userPoolClient: cognito.UserPoolClient;\n  public readonly identityPool: cognito.CfnIdentityPool;\n  public readonly openSearchDomain: opensearch.CfnDomain;\n  public readonly openSearchRole: iam.Role;\n  public readonly cloudWatchAlarms?: cloudwatch.Alarm[];\n\n  constructor(scope: Construct, id: string, props: FargateToOpenSearchProps) {\n    super(scope, id);\n    defaults.CheckFargateProps(props);\n    defaults.CheckVpcProps(props);\n    defaults.CheckOpenSearchProps(props);\n\n    this.vpc = defaults.buildVpc(scope, {\n      existingVpc: props.existingVpc,\n      defaultVpcProps: props.publicApi ? defaults.DefaultPublicPrivateVpcProps() : defaults.DefaultIsolatedVpcProps(),\n      userVpcProps: props.vpcProps,\n      constructVpcProps: { enableDnsHostnames: true, enableDnsSupport: true }\n    });\n\n    if (props.existingFargateServiceObject) {\n      this.service = props.existingFargateServiceObject;\n      // CheckFargateProps confirms that the container is provided\n      this.container = props.existingContainerDefinitionObject!;\n    } else {\n      const createFargateServiceResponse = defaults.CreateFargateService(scope, id, {\n        constructVpc: this.vpc,\n        clientClusterProps: props.clusterProps,\n        ecrRepositoryArn: props.ecrRepositoryArn,\n        ecrImageVersion: props.ecrImageVersion,\n        clientFargateTaskDefinitionProps: props.fargateTaskDefinitionProps,\n        clientContainerDefinitionProps: props.containerDefinitionProps,\n        clientFargateServiceProps: props.fargateServiceProps\n      });\n      this.service = createFargateServiceResponse.service;\n      this.container = createFargateServiceResponse.containerDefinition;\n    }\n\n    let cognitoAuthorizedRole: iam.Role;\n\n    [this.userPool, this.userPoolClient, this.identityPool, cognitoAuthorizedRole] =\n      defaults.buildCognitoForSearchService(this, props.cognitoDomainName ?? props.openSearchDomainName);\n\n    let securityGroupIds;\n\n    if (this.vpc) {\n      securityGroupIds = defaults.getServiceVpcSecurityGroupIds(this.service);\n    }\n\n    const buildOpenSearchProps: defaults.BuildOpenSearchProps = {\n      userpool: this.userPool,\n      identitypool: this.identityPool,\n      cognitoAuthorizedRoleARN: cognitoAuthorizedRole.roleArn,\n      vpc: this.vpc,\n      openSearchDomainName: props.openSearchDomainName,\n      clientDomainProps: props.openSearchDomainProps,\n      securityGroupIds\n    };\n\n    const buildOpenSearchResponse = defaults.buildOpenSearch(this, buildOpenSearchProps);\n    this.openSearchDomain = buildOpenSearchResponse.domain;\n    this.openSearchRole = buildOpenSearchResponse.role;\n\n    if (props.createCloudWatchAlarms === undefined || props.createCloudWatchAlarms) {\n      this.cloudWatchAlarms = defaults.buildOpenSearchCWAlarms(this);\n    }\n\n    // Add environment variables\n    const domainEndpointEnvironmentVariableName = props.domainEndpointEnvironmentVariableName || 'DOMAIN_ENDPOINT';\n    this.container.addEnvironment(domainEndpointEnvironmentVariableName, this.openSearchDomain.attrDomainEndpoint);\n\n  }\n}\n"]}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@aws-solutions-constructs/aws-fargate-opensearch",
3
- "version": "2.94.0",
3
+ "version": "2.95.0",
4
4
  "description": "CDK Constructs for AWS Fargate to Amazon OpenSearch Service",
5
5
  "main": "lib/index.js",
6
6
  "types": "lib/index.d.ts",
@@ -55,14 +55,14 @@
55
55
  }
56
56
  },
57
57
  "dependencies": {
58
- "@aws-solutions-constructs/core": "2.94.0",
58
+ "@aws-solutions-constructs/core": "2.95.0",
59
59
  "constructs": "^10.0.0"
60
60
  },
61
61
  "devDependencies": {
62
- "@aws-cdk/integ-tests-alpha": "2.219.0-alpha.0",
62
+ "@aws-cdk/integ-tests-alpha": "2.223.0-alpha.0",
63
63
  "@types/node": "^10.3.0",
64
64
  "constructs": "^10.0.0",
65
- "aws-cdk-lib": "2.219.0"
65
+ "aws-cdk-lib": "2.223.0"
66
66
  },
67
67
  "jest": {
68
68
  "moduleFileExtensions": [
@@ -79,9 +79,9 @@
79
79
  ]
80
80
  },
81
81
  "peerDependencies": {
82
- "@aws-solutions-constructs/core": "2.94.0",
82
+ "@aws-solutions-constructs/core": "2.95.0",
83
83
  "constructs": "^10.0.0",
84
- "aws-cdk-lib": "^2.219.0"
84
+ "aws-cdk-lib": "^2.223.0"
85
85
  },
86
86
  "keywords": [
87
87
  "aws",
@@ -0,0 +1 @@
1
+ "use strict";Object.defineProperty(exports,"__esModule",{value:!0}),exports.external=void 0,exports.handler=handler,exports.withRetries=withRetries;const https=require("https"),url=require("url");exports.external={sendHttpRequest:defaultSendHttpRequest,log:defaultLog,includeStackTraces:!0,userHandlerIndex:"./index"};const CREATE_FAILED_PHYSICAL_ID_MARKER="AWSCDK::CustomResourceProviderFramework::CREATE_FAILED",MISSING_PHYSICAL_ID_MARKER="AWSCDK::CustomResourceProviderFramework::MISSING_PHYSICAL_ID";async function handler(event,context){const sanitizedEvent={...event,ResponseURL:"..."};if(exports.external.log(JSON.stringify(sanitizedEvent,void 0,2)),event.RequestType==="Delete"&&event.PhysicalResourceId===CREATE_FAILED_PHYSICAL_ID_MARKER){exports.external.log("ignoring DELETE event caused by a failed CREATE event"),await submitResponse("SUCCESS",event);return}try{const userHandler=require(exports.external.userHandlerIndex).handler,result=await userHandler(sanitizedEvent,context),responseEvent=renderResponse(event,result);await submitResponse("SUCCESS",responseEvent)}catch(e){const resp={...event,Reason:exports.external.includeStackTraces?e.stack:e.message};resp.PhysicalResourceId||(event.RequestType==="Create"?(exports.external.log("CREATE failed, responding with a marker physical resource id so that the subsequent DELETE will be ignored"),resp.PhysicalResourceId=CREATE_FAILED_PHYSICAL_ID_MARKER):exports.external.log(`ERROR: Malformed event. "PhysicalResourceId" is required: ${JSON.stringify(event)}`)),await submitResponse("FAILED",resp)}}function renderResponse(cfnRequest,handlerResponse={}){const physicalResourceId=handlerResponse.PhysicalResourceId??cfnRequest.PhysicalResourceId??cfnRequest.RequestId;if(cfnRequest.RequestType==="Delete"&&physicalResourceId!==cfnRequest.PhysicalResourceId)throw new Error(`DELETE: cannot change the physical resource ID from "${cfnRequest.PhysicalResourceId}" to "${handlerResponse.PhysicalResourceId}" during deletion`);return{...cfnRequest,...handlerResponse,PhysicalResourceId:physicalResourceId}}async function submitResponse(status,event){const json={Status:status,Reason:event.Reason??status,StackId:event.StackId,RequestId:event.RequestId,PhysicalResourceId:event.PhysicalResourceId||MISSING_PHYSICAL_ID_MARKER,LogicalResourceId:event.LogicalResourceId,NoEcho:event.NoEcho,Data:event.Data},parsedUrl=url.parse(event.ResponseURL),loggingSafeUrl=`${parsedUrl.protocol}//${parsedUrl.hostname}/${parsedUrl.pathname}?***`;exports.external.log("submit response to cloudformation",loggingSafeUrl,json);const responseBody=JSON.stringify(json),req={hostname:parsedUrl.hostname,path:parsedUrl.path,method:"PUT",headers:{"content-type":"","content-length":Buffer.byteLength(responseBody,"utf8")}};await withRetries({attempts:5,sleep:1e3},exports.external.sendHttpRequest)(req,responseBody)}async function defaultSendHttpRequest(options,requestBody){return new Promise((resolve,reject)=>{try{const request=https.request(options,response=>{response.resume(),!response.statusCode||response.statusCode>=400?reject(new Error(`Unsuccessful HTTP response: ${response.statusCode}`)):resolve()});request.on("error",reject),request.write(requestBody),request.end()}catch(e){reject(e)}})}function defaultLog(fmt,...params){console.log(fmt,...params)}function withRetries(options,fn){return async(...xs)=>{let attempts=options.attempts,ms=options.sleep;for(;;)try{return await fn(...xs)}catch(e){if(attempts--<=0)throw e;await sleep(Math.floor(Math.random()*ms)),ms*=2}}}async function sleep(ms){return new Promise(ok=>setTimeout(ok,ms))}
@@ -0,0 +1 @@
1
+ "use strict";var I=Object.create,t=Object.defineProperty,y=Object.getOwnPropertyDescriptor,P=Object.getOwnPropertyNames,g=Object.getPrototypeOf,l=Object.prototype.hasOwnProperty,G=(r,e)=>{for(var o in e)t(r,o,{get:e[o],enumerable:!0})},n=(r,e,o,i)=>{if(e&&typeof e=="object"||typeof e=="function")for(let s of P(e))!l.call(r,s)&&s!==o&&t(r,s,{get:()=>e[s],enumerable:!(i=y(e,s))||i.enumerable});return r},R=(r,e,o)=>(o=r!=null?I(g(r)):{},n(e||!r||!r.__esModule?t(o,"default",{value:r,enumerable:!0}):o,r)),S=r=>n(t({},"__esModule",{value:!0}),r),k={};G(k,{handler:()=>f}),module.exports=S(k);var a=R(require("@aws-sdk/client-ec2")),u=new a.EC2({});function c(r,e){return{GroupId:r,IpPermissions:[{UserIdGroupPairs:[{GroupId:r,UserId:e}],IpProtocol:"-1"}]}}function d(r){return{GroupId:r,IpPermissions:[{IpRanges:[{CidrIp:"0.0.0.0/0"}],IpProtocol:"-1"}]}}async function f(r){let e=r.ResourceProperties.DefaultSecurityGroupId,o=r.ResourceProperties.Account;switch(r.RequestType){case"Create":return p(e,o);case"Update":return h(r);case"Delete":return m(e,o)}}async function h(r){let e=r.OldResourceProperties.DefaultSecurityGroupId,o=r.ResourceProperties.DefaultSecurityGroupId;e!==o&&(await m(e,r.ResourceProperties.Account),await p(o,r.ResourceProperties.Account))}async function p(r,e){try{await u.revokeSecurityGroupEgress(d(r))}catch(o){if(o.name!=="InvalidPermission.NotFound")throw o}try{await u.revokeSecurityGroupIngress(c(r,e))}catch(o){if(o.name!=="InvalidPermission.NotFound")throw o}}async function m(r,e){await u.authorizeSecurityGroupIngress(c(r,e)),await u.authorizeSecurityGroupEgress(d(r))}
@@ -1 +1 @@
1
- {"version":"45.0.0"}
1
+ {"version":"48.0.0"}
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "45.0.0",
2
+ "version": "48.0.0",
3
3
  "files": {
4
4
  "7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200": {
5
5
  "displayName": "faropn-existing-resources/Custom::VpcRestrictDefaultSGCustomResourceProvider Code",
@@ -16,16 +16,16 @@
16
16
  }
17
17
  }
18
18
  },
19
- "9c1018d27dea54758372438e53e73f7a0d080a77e5bb42de1a953bf666eb78ff": {
19
+ "dddb8b08d1a7de25fb579e4537cfe2bc50853fbbf7eb3e9eb548d8610d27c8e2": {
20
20
  "displayName": "faropn-existing-resources Template",
21
21
  "source": {
22
22
  "path": "faropn-existing-resources.template.json",
23
23
  "packaging": "file"
24
24
  },
25
25
  "destinations": {
26
- "current_account-us-east-1-e2a6bd2d": {
26
+ "current_account-us-east-1-942ccb88": {
27
27
  "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-us-east-1",
28
- "objectKey": "9c1018d27dea54758372438e53e73f7a0d080a77e5bb42de1a953bf666eb78ff.json",
28
+ "objectKey": "dddb8b08d1a7de25fb579e4537cfe2bc50853fbbf7eb3e9eb548d8610d27c8e2.json",
29
29
  "region": "us-east-1",
30
30
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-us-east-1"
31
31
  }
@@ -475,16 +475,6 @@
475
475
  "Arn"
476
476
  ]
477
477
  }
478
- },
479
- {
480
- "Action": "iam:PassRole",
481
- "Effect": "Allow",
482
- "Resource": {
483
- "Fn::GetAtt": [
484
- "VpcFlowLogIAMRole6A475D41",
485
- "Arn"
486
- ]
487
- }
488
478
  }
489
479
  ],
490
480
  "Version": "2012-10-17"
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "45.0.0",
2
+ "version": "48.0.0",
3
3
  "files": {
4
4
  "21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22": {
5
5
  "displayName": "faropnexistingresourcesIntegDefaultTestDeployAssert753D5E58 Template",
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "45.0.0",
2
+ "version": "48.0.0",
3
3
  "testCases": {
4
4
  "faropn-existing-resources/Integ/DefaultTest": {
5
5
  "stacks": [
@@ -9,5 +9,5 @@
9
9
  "assertionStackName": "faropnexistingresourcesIntegDefaultTestDeployAssert753D5E58"
10
10
  }
11
11
  },
12
- "minimumCliVersion": "2.1020.2"
12
+ "minimumCliVersion": "2.1029.2"
13
13
  }
@@ -66,7 +66,7 @@
66
66
  "validateOnSynth": false,
67
67
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-us-east-1",
68
68
  "cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-us-east-1",
69
- "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-us-east-1/9c1018d27dea54758372438e53e73f7a0d080a77e5bb42de1a953bf666eb78ff.json",
69
+ "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-us-east-1/dddb8b08d1a7de25fb579e4537cfe2bc50853fbbf7eb3e9eb548d8610d27c8e2.json",
70
70
  "requiresBootstrapStackVersion": 6,
71
71
  "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
72
72
  "additionalDependencies": [
@@ -412,14 +412,6 @@
412
412
  "*"
413
413
  ]
414
414
  }
415
- },
416
- {
417
- "type": "aws:cdk:analytics:method",
418
- "data": {
419
- "addToPrincipalPolicy": [
420
- {}
421
- ]
422
- }
423
415
  }
424
416
  ],
425
417
  "/faropn-existing-resources/Vpc/FlowLog/IAMRole/ImportIAMRole": [
@@ -455,14 +447,6 @@
455
447
  ]
456
448
  }
457
449
  },
458
- {
459
- "type": "aws:cdk:analytics:method",
460
- "data": {
461
- "addStatements": [
462
- {}
463
- ]
464
- }
465
- },
466
450
  {
467
451
  "type": "aws:cdk:analytics:method",
468
452
  "data": {
@@ -502,9 +486,9 @@
502
486
  "data": {
503
487
  "vpc": "*",
504
488
  "service": {
505
- "privateDnsDefault": true,
506
489
  "name": "*",
507
- "port": "*"
490
+ "port": "*",
491
+ "privateDnsDefault": true
508
492
  },
509
493
  "securityGroups": [
510
494
  "*"
@@ -524,9 +508,9 @@
524
508
  "data": {
525
509
  "vpc": "*",
526
510
  "service": {
527
- "privateDnsDefault": true,
528
511
  "name": "*",
529
- "port": "*"
512
+ "port": "*",
513
+ "privateDnsDefault": true
530
514
  },
531
515
  "securityGroups": [
532
516
  "*"
@@ -907,7 +891,8 @@
907
891
  "type": "aws:cdk:analytics:construct",
908
892
  "data": {
909
893
  "metric": {
910
- "warnings": "*"
894
+ "warnings": "*",
895
+ "warningsV2": "*"
911
896
  },
912
897
  "threshold": "*",
913
898
  "evaluationPeriods": "*",
@@ -927,7 +912,8 @@
927
912
  "type": "aws:cdk:analytics:construct",
928
913
  "data": {
929
914
  "metric": {
930
- "warnings": "*"
915
+ "warnings": "*",
916
+ "warningsV2": "*"
931
917
  },
932
918
  "threshold": "*",
933
919
  "evaluationPeriods": "*",
@@ -947,7 +933,8 @@
947
933
  "type": "aws:cdk:analytics:construct",
948
934
  "data": {
949
935
  "metric": {
950
- "warnings": "*"
936
+ "warnings": "*",
937
+ "warningsV2": "*"
951
938
  },
952
939
  "threshold": "*",
953
940
  "evaluationPeriods": "*",
@@ -967,7 +954,8 @@
967
954
  "type": "aws:cdk:analytics:construct",
968
955
  "data": {
969
956
  "metric": {
970
- "warnings": "*"
957
+ "warnings": "*",
958
+ "warningsV2": "*"
971
959
  },
972
960
  "threshold": "*",
973
961
  "evaluationPeriods": "*",
@@ -987,7 +975,8 @@
987
975
  "type": "aws:cdk:analytics:construct",
988
976
  "data": {
989
977
  "metric": {
990
- "warnings": "*"
978
+ "warnings": "*",
979
+ "warningsV2": "*"
991
980
  },
992
981
  "threshold": "*",
993
982
  "evaluationPeriods": "*",
@@ -1007,7 +996,8 @@
1007
996
  "type": "aws:cdk:analytics:construct",
1008
997
  "data": {
1009
998
  "metric": {
1010
- "warnings": "*"
999
+ "warnings": "*",
1000
+ "warningsV2": "*"
1011
1001
  },
1012
1002
  "threshold": "*",
1013
1003
  "evaluationPeriods": "*",
@@ -1027,7 +1017,8 @@
1027
1017
  "type": "aws:cdk:analytics:construct",
1028
1018
  "data": {
1029
1019
  "metric": {
1030
- "warnings": "*"
1020
+ "warnings": "*",
1021
+ "warningsV2": "*"
1031
1022
  },
1032
1023
  "threshold": "*",
1033
1024
  "evaluationPeriods": "*",
@@ -1047,7 +1038,8 @@
1047
1038
  "type": "aws:cdk:analytics:construct",
1048
1039
  "data": {
1049
1040
  "metric": {
1050
- "warnings": "*"
1041
+ "warnings": "*",
1042
+ "warningsV2": "*"
1051
1043
  },
1052
1044
  "threshold": "*",
1053
1045
  "evaluationPeriods": "*",
@@ -1067,7 +1059,8 @@
1067
1059
  "type": "aws:cdk:analytics:construct",
1068
1060
  "data": {
1069
1061
  "metric": {
1070
- "warnings": "*"
1062
+ "warnings": "*",
1063
+ "warningsV2": "*"
1071
1064
  },
1072
1065
  "threshold": "*",
1073
1066
  "evaluationPeriods": "*",
@@ -1108,57 +1101,48 @@
1108
1101
  "properties": {
1109
1102
  "module": "aws-cdk-lib",
1110
1103
  "flags": {
1111
- "@aws-cdk/core:enableStackNameDuplicates": {
1112
- "recommendedValue": true,
1113
- "explanation": "Allow multiple stacks with the same name"
1114
- },
1115
- "aws-cdk:enableDiffNoFail": {
1104
+ "@aws-cdk/aws-signer:signingProfileNamePassedToCfn": {
1116
1105
  "recommendedValue": true,
1117
- "explanation": "Make `cdk diff` not fail when there are differences"
1106
+ "explanation": "Pass signingProfileName to CfnSigningProfile"
1118
1107
  },
1119
1108
  "@aws-cdk/core:newStyleStackSynthesis": {
1120
1109
  "recommendedValue": true,
1121
- "explanation": "Switch to new stack synthesis method which enables CI/CD"
1110
+ "explanation": "Switch to new stack synthesis method which enables CI/CD",
1111
+ "unconfiguredBehavesLike": {
1112
+ "v2": true
1113
+ }
1122
1114
  },
1123
1115
  "@aws-cdk/core:stackRelativeExports": {
1124
1116
  "recommendedValue": true,
1125
- "explanation": "Name exports based on the construct paths relative to the stack, rather than the global construct path"
1126
- },
1127
- "@aws-cdk/aws-ecr-assets:dockerIgnoreSupport": {
1128
- "recommendedValue": true,
1129
- "explanation": "DockerImageAsset properly supports `.dockerignore` files by default"
1130
- },
1131
- "@aws-cdk/aws-secretsmanager:parseOwnedSecretName": {
1132
- "recommendedValue": true,
1133
- "explanation": "Fix the referencing of SecretsManager names from ARNs"
1134
- },
1135
- "@aws-cdk/aws-kms:defaultKeyPolicies": {
1136
- "recommendedValue": true,
1137
- "explanation": "Tighten default KMS key policies"
1138
- },
1139
- "@aws-cdk/aws-s3:grantWriteWithoutAcl": {
1140
- "recommendedValue": true,
1141
- "explanation": "Remove `PutObjectAcl` from Bucket.grantWrite"
1117
+ "explanation": "Name exports based on the construct paths relative to the stack, rather than the global construct path",
1118
+ "unconfiguredBehavesLike": {
1119
+ "v2": true
1120
+ }
1142
1121
  },
1143
- "@aws-cdk/aws-ecs-patterns:removeDefaultDesiredCount": {
1122
+ "@aws-cdk/aws-ecs-patterns:secGroupsDisablesImplicitOpenListener": {
1144
1123
  "recommendedValue": true,
1145
- "explanation": "Do not specify a default DesiredCount for ECS services"
1124
+ "explanation": "Disable implicit openListener when custom security groups are provided"
1146
1125
  },
1147
1126
  "@aws-cdk/aws-rds:lowercaseDbIdentifier": {
1148
1127
  "recommendedValue": true,
1149
- "explanation": "Force lowercasing of RDS Cluster names in CDK"
1128
+ "explanation": "Force lowercasing of RDS Cluster names in CDK",
1129
+ "unconfiguredBehavesLike": {
1130
+ "v2": true
1131
+ }
1150
1132
  },
1151
1133
  "@aws-cdk/aws-apigateway:usagePlanKeyOrderInsensitiveId": {
1152
1134
  "recommendedValue": true,
1153
- "explanation": "Allow adding/removing multiple UsagePlanKeys independently"
1154
- },
1155
- "@aws-cdk/aws-efs:defaultEncryptionAtRest": {
1156
- "recommendedValue": true,
1157
- "explanation": "Enable this feature flag to have elastic file systems encrypted at rest by default."
1135
+ "explanation": "Allow adding/removing multiple UsagePlanKeys independently",
1136
+ "unconfiguredBehavesLike": {
1137
+ "v2": true
1138
+ }
1158
1139
  },
1159
1140
  "@aws-cdk/aws-lambda:recognizeVersionProps": {
1160
1141
  "recommendedValue": true,
1161
- "explanation": "Enable this feature flag to opt in to the updated logical id calculation for Lambda Version created using the `fn.currentVersion`."
1142
+ "explanation": "Enable this feature flag to opt in to the updated logical id calculation for Lambda Version created using the `fn.currentVersion`.",
1143
+ "unconfiguredBehavesLike": {
1144
+ "v2": true
1145
+ }
1162
1146
  },
1163
1147
  "@aws-cdk/aws-lambda:recognizeLayerVersion": {
1164
1148
  "userValue": true,
@@ -1167,7 +1151,10 @@
1167
1151
  },
1168
1152
  "@aws-cdk/aws-cloudfront:defaultSecurityPolicyTLSv1.2_2021": {
1169
1153
  "recommendedValue": true,
1170
- "explanation": "Enable this feature flag to have cloudfront distributions use the security policy TLSv1.2_2021 by default."
1154
+ "explanation": "Enable this feature flag to have cloudfront distributions use the security policy TLSv1.2_2021 by default.",
1155
+ "unconfiguredBehavesLike": {
1156
+ "v2": true
1157
+ }
1171
1158
  },
1172
1159
  "@aws-cdk/core:checkSecretUsage": {
1173
1160
  "userValue": true,
@@ -1244,7 +1231,7 @@
1244
1231
  "@aws-cdk/aws-iam:importedRoleStackSafeDefaultPolicyName": {
1245
1232
  "userValue": true,
1246
1233
  "recommendedValue": true,
1247
- "explanation": "Enable this feature to by default create default policy names for imported roles that depend on the stack the role is in."
1234
+ "explanation": "Enable this feature to create default policy names for imported roles that depend on the stack the role is in."
1248
1235
  },
1249
1236
  "@aws-cdk/aws-s3:serverAccessLogsUseBucketPolicy": {
1250
1237
  "userValue": true,
@@ -1388,7 +1375,10 @@
1388
1375
  },
1389
1376
  "@aws-cdk/pipelines:reduceAssetRoleTrustScope": {
1390
1377
  "recommendedValue": true,
1391
- "explanation": "Remove the root account principal from PipelineAssetsFileRole trust policy"
1378
+ "explanation": "Remove the root account principal from PipelineAssetsFileRole trust policy",
1379
+ "unconfiguredBehavesLike": {
1380
+ "v2": true
1381
+ }
1392
1382
  },
1393
1383
  "@aws-cdk/aws-eks:nodegroupNameAttribute": {
1394
1384
  "userValue": true,
@@ -1417,7 +1407,10 @@
1417
1407
  },
1418
1408
  "@aws-cdk/aws-stepfunctions-tasks:useNewS3UriParametersForBedrockInvokeModelTask": {
1419
1409
  "recommendedValue": true,
1420
- "explanation": "When enabled, use new props for S3 URI field in task definition of state machine for bedrock invoke model."
1410
+ "explanation": "When enabled, use new props for S3 URI field in task definition of state machine for bedrock invoke model.",
1411
+ "unconfiguredBehavesLike": {
1412
+ "v2": true
1413
+ }
1421
1414
  },
1422
1415
  "@aws-cdk/core:explicitStackTags": {
1423
1416
  "userValue": true,
@@ -1481,7 +1474,10 @@
1481
1474
  },
1482
1475
  "@aws-cdk/core:aspectStabilization": {
1483
1476
  "recommendedValue": true,
1484
- "explanation": "When enabled, a stabilization loop will be run when invoking Aspects during synthesis."
1477
+ "explanation": "When enabled, a stabilization loop will be run when invoking Aspects during synthesis.",
1478
+ "unconfiguredBehavesLike": {
1479
+ "v2": true
1480
+ }
1485
1481
  },
1486
1482
  "@aws-cdk/aws-route53-targets:userPoolDomainNameMethodWithoutCustomResource": {
1487
1483
  "userValue": true,
@@ -1515,7 +1511,10 @@
1515
1511
  },
1516
1512
  "@aws-cdk/pipelines:reduceStageRoleTrustScope": {
1517
1513
  "recommendedValue": true,
1518
- "explanation": "Remove the root account principal from Stage addActions trust policy"
1514
+ "explanation": "Remove the root account principal from Stage addActions trust policy",
1515
+ "unconfiguredBehavesLike": {
1516
+ "v2": true
1517
+ }
1519
1518
  },
1520
1519
  "@aws-cdk/aws-events:requireEventBusPolicySid": {
1521
1520
  "userValue": true,
@@ -1538,7 +1537,10 @@
1538
1537
  },
1539
1538
  "@aws-cdk/pipelines:reduceCrossAccountActionRoleTrustScope": {
1540
1539
  "recommendedValue": true,
1541
- "explanation": "When enabled, scopes down the trust policy for the cross-account action role"
1540
+ "explanation": "When enabled, scopes down the trust policy for the cross-account action role",
1541
+ "unconfiguredBehavesLike": {
1542
+ "v2": true
1543
+ }
1542
1544
  },
1543
1545
  "@aws-cdk/aws-stepfunctions:useDistributedMapResultWriterV2": {
1544
1546
  "userValue": true,
@@ -1568,6 +1570,21 @@
1568
1570
  "userValue": true,
1569
1571
  "recommendedValue": true,
1570
1572
  "explanation": "When enabled, CDK creates and manages loggroup for the lambda function"
1573
+ },
1574
+ "@aws-cdk/aws-elasticloadbalancingv2:networkLoadBalancerWithSecurityGroupByDefault": {
1575
+ "recommendedValue": true,
1576
+ "explanation": "When enabled, Network Load Balancer will be created with a security group by default."
1577
+ },
1578
+ "@aws-cdk/aws-stepfunctions-tasks:httpInvokeDynamicJsonPathEndpoint": {
1579
+ "recommendedValue": true,
1580
+ "explanation": "When enabled, allows using a dynamic apiEndpoint with JSONPath format in HttpInvoke tasks.",
1581
+ "unconfiguredBehavesLike": {
1582
+ "v2": true
1583
+ }
1584
+ },
1585
+ "@aws-cdk/aws-ecs-patterns:uniqueTargetGroupId": {
1586
+ "recommendedValue": true,
1587
+ "explanation": "When enabled, ECS patterns will generate unique target group IDs to prevent conflicts during load balancer replacement"
1571
1588
  }
1572
1589
  }
1573
1590
  }