@aws-solutions-constructs/aws-lambda-dynamodb 2.50.0 → 2.52.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (75) hide show
  1. package/.eslintignore +2 -0
  2. package/.jsii +50 -5
  3. package/integ.config.json +7 -0
  4. package/lib/index.js +1 -1
  5. package/package.json +12 -11
  6. package/test/integ.lamddb-add-secondary-index.js +5 -2
  7. package/test/integ.lamddb-add-secondary-index.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +8 -0
  8. package/test/integ.lamddb-add-secondary-index.js.snapshot/cdk.out +1 -0
  9. package/test/integ.lamddb-add-secondary-index.js.snapshot/integ.json +12 -0
  10. package/test/integ.lamddb-add-secondary-index.js.snapshot/lamddb-add-secondary-index.assets.json +32 -0
  11. package/test/integ.lamddb-add-secondary-index.js.snapshot/lamddb-add-secondary-index.template.json +262 -0
  12. package/test/integ.lamddb-add-secondary-index.js.snapshot/lamddbaddsecondaryindexIntegDefaultTestDeployAssert3193B4D9.assets.json +19 -0
  13. package/test/integ.lamddb-add-secondary-index.js.snapshot/lamddbaddsecondaryindexIntegDefaultTestDeployAssert3193B4D9.template.json +36 -0
  14. package/test/integ.lamddb-add-secondary-index.js.snapshot/manifest.json +131 -0
  15. package/test/integ.lamddb-add-secondary-index.js.snapshot/tree.json +415 -0
  16. package/test/integ.lamddb-deployFunctionWithExistingVpc.js +6 -2
  17. package/test/integ.lamddb-deployFunctionWithExistingVpc.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +8 -0
  18. package/test/integ.lamddb-deployFunctionWithExistingVpc.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/__entrypoint__.js +1 -0
  19. package/test/integ.lamddb-deployFunctionWithExistingVpc.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/index.js +1 -0
  20. package/test/integ.lamddb-deployFunctionWithExistingVpc.js.snapshot/cdk.out +1 -0
  21. package/test/integ.lamddb-deployFunctionWithExistingVpc.js.snapshot/integ.json +12 -0
  22. package/test/integ.lamddb-deployFunctionWithExistingVpc.js.snapshot/lamddb-deployFunctionWithExistingVpc.assets.json +45 -0
  23. package/test/integ.lamddb-deployFunctionWithExistingVpc.js.snapshot/lamddb-deployFunctionWithExistingVpc.template.json +984 -0
  24. package/test/integ.lamddb-deployFunctionWithExistingVpc.js.snapshot/lamddbdeployFunctionWithExistingVpcIntegDefaultTestDeployAssertEE08E38E.assets.json +19 -0
  25. package/test/integ.lamddb-deployFunctionWithExistingVpc.js.snapshot/lamddbdeployFunctionWithExistingVpcIntegDefaultTestDeployAssertEE08E38E.template.json +36 -0
  26. package/test/integ.lamddb-deployFunctionWithExistingVpc.js.snapshot/manifest.json +323 -0
  27. package/test/integ.lamddb-deployFunctionWithExistingVpc.js.snapshot/tree.json +1372 -0
  28. package/test/integ.lamddb-deployFunctionWithVpc.js +6 -2
  29. package/test/integ.lamddb-deployFunctionWithVpc.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +8 -0
  30. package/test/integ.lamddb-deployFunctionWithVpc.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/__entrypoint__.js +1 -0
  31. package/test/integ.lamddb-deployFunctionWithVpc.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/index.js +1 -0
  32. package/test/integ.lamddb-deployFunctionWithVpc.js.snapshot/cdk.out +1 -0
  33. package/test/integ.lamddb-deployFunctionWithVpc.js.snapshot/integ.json +12 -0
  34. package/test/integ.lamddb-deployFunctionWithVpc.js.snapshot/lamddb-deployFunctionWithVpc.assets.json +45 -0
  35. package/test/integ.lamddb-deployFunctionWithVpc.js.snapshot/lamddb-deployFunctionWithVpc.template.json +694 -0
  36. package/test/integ.lamddb-deployFunctionWithVpc.js.snapshot/lamddbdeployFunctionWithVpcIntegDefaultTestDeployAssert0AB8275C.assets.json +19 -0
  37. package/test/integ.lamddb-deployFunctionWithVpc.js.snapshot/lamddbdeployFunctionWithVpcIntegDefaultTestDeployAssert0AB8275C.template.json +36 -0
  38. package/test/integ.lamddb-deployFunctionWithVpc.js.snapshot/manifest.json +227 -0
  39. package/test/integ.lamddb-deployFunctionWithVpc.js.snapshot/tree.json +954 -0
  40. package/test/integ.lamddb-no-arguments.js +5 -2
  41. package/test/integ.lamddb-no-arguments.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +8 -0
  42. package/test/integ.lamddb-no-arguments.js.snapshot/cdk.out +1 -0
  43. package/test/integ.lamddb-no-arguments.js.snapshot/integ.json +12 -0
  44. package/test/integ.lamddb-no-arguments.js.snapshot/lamddb-no-arguments.assets.json +32 -0
  45. package/test/integ.lamddb-no-arguments.js.snapshot/lamddb-no-arguments.template.json +233 -0
  46. package/test/integ.lamddb-no-arguments.js.snapshot/lamddbnoargumentsIntegDefaultTestDeployAssert248B75D0.assets.json +19 -0
  47. package/test/integ.lamddb-no-arguments.js.snapshot/lamddbnoargumentsIntegDefaultTestDeployAssert248B75D0.template.json +36 -0
  48. package/test/integ.lamddb-no-arguments.js.snapshot/manifest.json +131 -0
  49. package/test/integ.lamddb-no-arguments.js.snapshot/tree.json +386 -0
  50. package/test/integ.lamddb-set-billing-mode.js +5 -2
  51. package/test/integ.lamddb-set-billing-mode.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +8 -0
  52. package/test/integ.lamddb-set-billing-mode.js.snapshot/cdk.out +1 -0
  53. package/test/integ.lamddb-set-billing-mode.js.snapshot/integ.json +12 -0
  54. package/test/integ.lamddb-set-billing-mode.js.snapshot/lamddb-set-billing-mode.assets.json +32 -0
  55. package/test/integ.lamddb-set-billing-mode.js.snapshot/lamddb-set-billing-mode.template.json +246 -0
  56. package/test/integ.lamddb-set-billing-mode.js.snapshot/lamddbsetbillingmodeIntegDefaultTestDeployAssertDAE32272.assets.json +19 -0
  57. package/test/integ.lamddb-set-billing-mode.js.snapshot/lamddbsetbillingmodeIntegDefaultTestDeployAssertDAE32272.template.json +36 -0
  58. package/test/integ.lamddb-set-billing-mode.js.snapshot/manifest.json +131 -0
  59. package/test/integ.lamddb-set-billing-mode.js.snapshot/tree.json +389 -0
  60. package/test/integ.lamddb-use-existing-func.js +5 -2
  61. package/test/integ.lamddb-use-existing-func.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +8 -0
  62. package/test/integ.lamddb-use-existing-func.js.snapshot/cdk.out +1 -0
  63. package/test/integ.lamddb-use-existing-func.js.snapshot/integ.json +12 -0
  64. package/test/integ.lamddb-use-existing-func.js.snapshot/lamddb-use-existing-func.assets.json +32 -0
  65. package/test/integ.lamddb-use-existing-func.js.snapshot/lamddb-use-existing-func.template.json +233 -0
  66. package/test/integ.lamddb-use-existing-func.js.snapshot/lamddbuseexistingfuncIntegDefaultTestDeployAssert48D284DD.assets.json +19 -0
  67. package/test/integ.lamddb-use-existing-func.js.snapshot/lamddbuseexistingfuncIntegDefaultTestDeployAssert48D284DD.template.json +36 -0
  68. package/test/integ.lamddb-use-existing-func.js.snapshot/manifest.json +131 -0
  69. package/test/integ.lamddb-use-existing-func.js.snapshot/tree.json +386 -0
  70. package/test/integ.lamddb-add-secondary-index.expected.json +0 -262
  71. package/test/integ.lamddb-deployFunctionWithExistingVpc.expected.json +0 -1012
  72. package/test/integ.lamddb-deployFunctionWithVpc.expected.json +0 -609
  73. package/test/integ.lamddb-no-arguments.expected.json +0 -233
  74. package/test/integ.lamddb-set-billing-mode.expected.json +0 -246
  75. package/test/integ.lamddb-use-existing-func.expected.json +0 -233
@@ -1,233 +0,0 @@
1
- {
2
- "Resources": {
3
- "testlambdadynamodbstackLambdaFunctionServiceRole758347A1": {
4
- "Type": "AWS::IAM::Role",
5
- "Properties": {
6
- "AssumeRolePolicyDocument": {
7
- "Statement": [
8
- {
9
- "Action": "sts:AssumeRole",
10
- "Effect": "Allow",
11
- "Principal": {
12
- "Service": "lambda.amazonaws.com"
13
- }
14
- }
15
- ],
16
- "Version": "2012-10-17"
17
- },
18
- "Policies": [
19
- {
20
- "PolicyDocument": {
21
- "Statement": [
22
- {
23
- "Action": [
24
- "logs:CreateLogGroup",
25
- "logs:CreateLogStream",
26
- "logs:PutLogEvents"
27
- ],
28
- "Effect": "Allow",
29
- "Resource": {
30
- "Fn::Join": [
31
- "",
32
- [
33
- "arn:",
34
- {
35
- "Ref": "AWS::Partition"
36
- },
37
- ":logs:",
38
- {
39
- "Ref": "AWS::Region"
40
- },
41
- ":",
42
- {
43
- "Ref": "AWS::AccountId"
44
- },
45
- ":log-group:/aws/lambda/*"
46
- ]
47
- ]
48
- }
49
- }
50
- ],
51
- "Version": "2012-10-17"
52
- },
53
- "PolicyName": "LambdaFunctionServiceRolePolicy"
54
- }
55
- ]
56
- }
57
- },
58
- "testlambdadynamodbstackLambdaFunctionServiceRoleDefaultPolicy547FB7F4": {
59
- "Type": "AWS::IAM::Policy",
60
- "Properties": {
61
- "PolicyDocument": {
62
- "Statement": [
63
- {
64
- "Action": [
65
- "xray:PutTraceSegments",
66
- "xray:PutTelemetryRecords"
67
- ],
68
- "Effect": "Allow",
69
- "Resource": "*"
70
- },
71
- {
72
- "Action": [
73
- "dynamodb:BatchGetItem",
74
- "dynamodb:GetRecords",
75
- "dynamodb:GetShardIterator",
76
- "dynamodb:Query",
77
- "dynamodb:GetItem",
78
- "dynamodb:Scan",
79
- "dynamodb:ConditionCheckItem",
80
- "dynamodb:BatchWriteItem",
81
- "dynamodb:PutItem",
82
- "dynamodb:UpdateItem",
83
- "dynamodb:DeleteItem",
84
- "dynamodb:DescribeTable"
85
- ],
86
- "Effect": "Allow",
87
- "Resource": [
88
- {
89
- "Fn::GetAtt": [
90
- "testlambdadynamodbstackDynamoTable8138E93B",
91
- "Arn"
92
- ]
93
- },
94
- {
95
- "Ref": "AWS::NoValue"
96
- }
97
- ]
98
- }
99
- ],
100
- "Version": "2012-10-17"
101
- },
102
- "PolicyName": "testlambdadynamodbstackLambdaFunctionServiceRoleDefaultPolicy547FB7F4",
103
- "Roles": [
104
- {
105
- "Ref": "testlambdadynamodbstackLambdaFunctionServiceRole758347A1"
106
- }
107
- ]
108
- },
109
- "Metadata": {
110
- "cfn_nag": {
111
- "rules_to_suppress": [
112
- {
113
- "id": "W12",
114
- "reason": "Lambda needs the following minimum required permissions to send trace data to X-Ray and access ENIs in a VPC."
115
- }
116
- ]
117
- }
118
- }
119
- },
120
- "testlambdadynamodbstackLambdaFunction5DDB3E8D": {
121
- "Type": "AWS::Lambda::Function",
122
- "Properties": {
123
- "Code": {
124
- "S3Bucket": {
125
- "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
126
- },
127
- "S3Key": "0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8.zip"
128
- },
129
- "Environment": {
130
- "Variables": {
131
- "AWS_NODEJS_CONNECTION_REUSE_ENABLED": "1",
132
- "DDB_TABLE_NAME": {
133
- "Ref": "testlambdadynamodbstackDynamoTable8138E93B"
134
- }
135
- }
136
- },
137
- "Handler": "index.handler",
138
- "Role": {
139
- "Fn::GetAtt": [
140
- "testlambdadynamodbstackLambdaFunctionServiceRole758347A1",
141
- "Arn"
142
- ]
143
- },
144
- "Runtime": "nodejs16.x",
145
- "TracingConfig": {
146
- "Mode": "Active"
147
- }
148
- },
149
- "DependsOn": [
150
- "testlambdadynamodbstackLambdaFunctionServiceRoleDefaultPolicy547FB7F4",
151
- "testlambdadynamodbstackLambdaFunctionServiceRole758347A1"
152
- ],
153
- "Metadata": {
154
- "cfn_nag": {
155
- "rules_to_suppress": [
156
- {
157
- "id": "W58",
158
- "reason": "Lambda functions has the required permission to write CloudWatch Logs. It uses custom policy instead of arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole with tighter permissions."
159
- },
160
- {
161
- "id": "W89",
162
- "reason": "This is not a rule for the general case, just for specific use cases/industries"
163
- },
164
- {
165
- "id": "W92",
166
- "reason": "Impossible for us to define the correct concurrency for clients"
167
- }
168
- ]
169
- }
170
- }
171
- },
172
- "testlambdadynamodbstackDynamoTable8138E93B": {
173
- "Type": "AWS::DynamoDB::Table",
174
- "Properties": {
175
- "AttributeDefinitions": [
176
- {
177
- "AttributeName": "id",
178
- "AttributeType": "S"
179
- }
180
- ],
181
- "BillingMode": "PAY_PER_REQUEST",
182
- "KeySchema": [
183
- {
184
- "AttributeName": "id",
185
- "KeyType": "HASH"
186
- }
187
- ],
188
- "PointInTimeRecoverySpecification": {
189
- "PointInTimeRecoveryEnabled": true
190
- },
191
- "SSESpecification": {
192
- "SSEEnabled": true
193
- }
194
- },
195
- "UpdateReplacePolicy": "Retain",
196
- "DeletionPolicy": "Retain"
197
- }
198
- },
199
- "Parameters": {
200
- "BootstrapVersion": {
201
- "Type": "AWS::SSM::Parameter::Value<String>",
202
- "Default": "/cdk-bootstrap/hnb659fds/version",
203
- "Description": "Version of the CDK Bootstrap resources in this environment, automatically retrieved from SSM Parameter Store. [cdk:skip]"
204
- }
205
- },
206
- "Rules": {
207
- "CheckBootstrapVersion": {
208
- "Assertions": [
209
- {
210
- "Assert": {
211
- "Fn::Not": [
212
- {
213
- "Fn::Contains": [
214
- [
215
- "1",
216
- "2",
217
- "3",
218
- "4",
219
- "5"
220
- ],
221
- {
222
- "Ref": "BootstrapVersion"
223
- }
224
- ]
225
- }
226
- ]
227
- },
228
- "AssertDescription": "CDK bootstrap stack version 6 required. Please run 'cdk bootstrap' with a recent version of the CDK CLI."
229
- }
230
- ]
231
- }
232
- }
233
- }
@@ -1,246 +0,0 @@
1
- {
2
- "Resources": {
3
- "testlambdadynamodbstackLambdaFunctionServiceRole758347A1": {
4
- "Type": "AWS::IAM::Role",
5
- "Properties": {
6
- "AssumeRolePolicyDocument": {
7
- "Statement": [
8
- {
9
- "Action": "sts:AssumeRole",
10
- "Effect": "Allow",
11
- "Principal": {
12
- "Service": "lambda.amazonaws.com"
13
- }
14
- }
15
- ],
16
- "Version": "2012-10-17"
17
- },
18
- "Policies": [
19
- {
20
- "PolicyDocument": {
21
- "Statement": [
22
- {
23
- "Action": [
24
- "logs:CreateLogGroup",
25
- "logs:CreateLogStream",
26
- "logs:PutLogEvents"
27
- ],
28
- "Effect": "Allow",
29
- "Resource": {
30
- "Fn::Join": [
31
- "",
32
- [
33
- "arn:",
34
- {
35
- "Ref": "AWS::Partition"
36
- },
37
- ":logs:",
38
- {
39
- "Ref": "AWS::Region"
40
- },
41
- ":",
42
- {
43
- "Ref": "AWS::AccountId"
44
- },
45
- ":log-group:/aws/lambda/*"
46
- ]
47
- ]
48
- }
49
- }
50
- ],
51
- "Version": "2012-10-17"
52
- },
53
- "PolicyName": "LambdaFunctionServiceRolePolicy"
54
- }
55
- ]
56
- }
57
- },
58
- "testlambdadynamodbstackLambdaFunctionServiceRoleDefaultPolicy547FB7F4": {
59
- "Type": "AWS::IAM::Policy",
60
- "Properties": {
61
- "PolicyDocument": {
62
- "Statement": [
63
- {
64
- "Action": [
65
- "xray:PutTraceSegments",
66
- "xray:PutTelemetryRecords"
67
- ],
68
- "Effect": "Allow",
69
- "Resource": "*"
70
- },
71
- {
72
- "Action": [
73
- "dynamodb:BatchGetItem",
74
- "dynamodb:GetRecords",
75
- "dynamodb:GetShardIterator",
76
- "dynamodb:Query",
77
- "dynamodb:GetItem",
78
- "dynamodb:Scan",
79
- "dynamodb:ConditionCheckItem",
80
- "dynamodb:BatchWriteItem",
81
- "dynamodb:PutItem",
82
- "dynamodb:UpdateItem",
83
- "dynamodb:DeleteItem",
84
- "dynamodb:DescribeTable"
85
- ],
86
- "Effect": "Allow",
87
- "Resource": [
88
- {
89
- "Fn::GetAtt": [
90
- "testlambdadynamodbstackDynamoTable8138E93B",
91
- "Arn"
92
- ]
93
- },
94
- {
95
- "Ref": "AWS::NoValue"
96
- }
97
- ]
98
- }
99
- ],
100
- "Version": "2012-10-17"
101
- },
102
- "PolicyName": "testlambdadynamodbstackLambdaFunctionServiceRoleDefaultPolicy547FB7F4",
103
- "Roles": [
104
- {
105
- "Ref": "testlambdadynamodbstackLambdaFunctionServiceRole758347A1"
106
- }
107
- ]
108
- },
109
- "Metadata": {
110
- "cfn_nag": {
111
- "rules_to_suppress": [
112
- {
113
- "id": "W12",
114
- "reason": "Lambda needs the following minimum required permissions to send trace data to X-Ray and access ENIs in a VPC."
115
- }
116
- ]
117
- }
118
- }
119
- },
120
- "testlambdadynamodbstackLambdaFunction5DDB3E8D": {
121
- "Type": "AWS::Lambda::Function",
122
- "Properties": {
123
- "Code": {
124
- "S3Bucket": {
125
- "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
126
- },
127
- "S3Key": "0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8.zip"
128
- },
129
- "Environment": {
130
- "Variables": {
131
- "AWS_NODEJS_CONNECTION_REUSE_ENABLED": "1",
132
- "DDB_TABLE_NAME": {
133
- "Ref": "testlambdadynamodbstackDynamoTable8138E93B"
134
- }
135
- }
136
- },
137
- "Handler": "index.handler",
138
- "Role": {
139
- "Fn::GetAtt": [
140
- "testlambdadynamodbstackLambdaFunctionServiceRole758347A1",
141
- "Arn"
142
- ]
143
- },
144
- "Runtime": "nodejs16.x",
145
- "TracingConfig": {
146
- "Mode": "Active"
147
- }
148
- },
149
- "DependsOn": [
150
- "testlambdadynamodbstackLambdaFunctionServiceRoleDefaultPolicy547FB7F4",
151
- "testlambdadynamodbstackLambdaFunctionServiceRole758347A1"
152
- ],
153
- "Metadata": {
154
- "cfn_nag": {
155
- "rules_to_suppress": [
156
- {
157
- "id": "W58",
158
- "reason": "Lambda functions has the required permission to write CloudWatch Logs. It uses custom policy instead of arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole with tighter permissions."
159
- },
160
- {
161
- "id": "W89",
162
- "reason": "This is not a rule for the general case, just for specific use cases/industries"
163
- },
164
- {
165
- "id": "W92",
166
- "reason": "Impossible for us to define the correct concurrency for clients"
167
- }
168
- ]
169
- }
170
- }
171
- },
172
- "testlambdadynamodbstackDynamoTable8138E93B": {
173
- "Type": "AWS::DynamoDB::Table",
174
- "Properties": {
175
- "AttributeDefinitions": [
176
- {
177
- "AttributeName": "id",
178
- "AttributeType": "S"
179
- }
180
- ],
181
- "KeySchema": [
182
- {
183
- "AttributeName": "id",
184
- "KeyType": "HASH"
185
- }
186
- ],
187
- "PointInTimeRecoverySpecification": {
188
- "PointInTimeRecoveryEnabled": true
189
- },
190
- "ProvisionedThroughput": {
191
- "ReadCapacityUnits": 3,
192
- "WriteCapacityUnits": 3
193
- },
194
- "SSESpecification": {
195
- "SSEEnabled": true
196
- }
197
- },
198
- "UpdateReplacePolicy": "Retain",
199
- "DeletionPolicy": "Retain",
200
- "Metadata": {
201
- "cfn_nag": {
202
- "rules_to_suppress": [
203
- {
204
- "id": "W73",
205
- "reason": "PROVISIONED billing mode is a default and is not explicitly applied as a setting."
206
- }
207
- ]
208
- }
209
- }
210
- }
211
- },
212
- "Parameters": {
213
- "BootstrapVersion": {
214
- "Type": "AWS::SSM::Parameter::Value<String>",
215
- "Default": "/cdk-bootstrap/hnb659fds/version",
216
- "Description": "Version of the CDK Bootstrap resources in this environment, automatically retrieved from SSM Parameter Store. [cdk:skip]"
217
- }
218
- },
219
- "Rules": {
220
- "CheckBootstrapVersion": {
221
- "Assertions": [
222
- {
223
- "Assert": {
224
- "Fn::Not": [
225
- {
226
- "Fn::Contains": [
227
- [
228
- "1",
229
- "2",
230
- "3",
231
- "4",
232
- "5"
233
- ],
234
- {
235
- "Ref": "BootstrapVersion"
236
- }
237
- ]
238
- }
239
- ]
240
- },
241
- "AssertDescription": "CDK bootstrap stack version 6 required. Please run 'cdk bootstrap' with a recent version of the CDK CLI."
242
- }
243
- ]
244
- }
245
- }
246
- }