@aws-solutions-constructs/aws-lambda-elasticachememcached 1.153.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,622 @@
1
+ {
2
+ "Description": "Integration Test with new resourcesfor aws-lambda-elasticachememcached",
3
+ "Resources": {
4
+ "Vpc8378EB38": {
5
+ "Type": "AWS::EC2::VPC",
6
+ "Properties": {
7
+ "CidrBlock": "172.168.0.0/16",
8
+ "EnableDnsHostnames": true,
9
+ "EnableDnsSupport": true,
10
+ "InstanceTenancy": "default",
11
+ "Tags": [
12
+ {
13
+ "Key": "Name",
14
+ "Value": "existingResources/Vpc"
15
+ }
16
+ ]
17
+ }
18
+ },
19
+ "VpcisolatedSubnet1SubnetE62B1B9B": {
20
+ "Type": "AWS::EC2::Subnet",
21
+ "Properties": {
22
+ "VpcId": {
23
+ "Ref": "Vpc8378EB38"
24
+ },
25
+ "AvailabilityZone": "test-region-1a",
26
+ "CidrBlock": "172.168.0.0/18",
27
+ "MapPublicIpOnLaunch": false,
28
+ "Tags": [
29
+ {
30
+ "Key": "aws-cdk:subnet-name",
31
+ "Value": "isolated"
32
+ },
33
+ {
34
+ "Key": "aws-cdk:subnet-type",
35
+ "Value": "Isolated"
36
+ },
37
+ {
38
+ "Key": "Name",
39
+ "Value": "existingResources/Vpc/isolatedSubnet1"
40
+ }
41
+ ]
42
+ }
43
+ },
44
+ "VpcisolatedSubnet1RouteTableE442650B": {
45
+ "Type": "AWS::EC2::RouteTable",
46
+ "Properties": {
47
+ "VpcId": {
48
+ "Ref": "Vpc8378EB38"
49
+ },
50
+ "Tags": [
51
+ {
52
+ "Key": "Name",
53
+ "Value": "existingResources/Vpc/isolatedSubnet1"
54
+ }
55
+ ]
56
+ }
57
+ },
58
+ "VpcisolatedSubnet1RouteTableAssociationD259E31A": {
59
+ "Type": "AWS::EC2::SubnetRouteTableAssociation",
60
+ "Properties": {
61
+ "RouteTableId": {
62
+ "Ref": "VpcisolatedSubnet1RouteTableE442650B"
63
+ },
64
+ "SubnetId": {
65
+ "Ref": "VpcisolatedSubnet1SubnetE62B1B9B"
66
+ }
67
+ }
68
+ },
69
+ "VpcisolatedSubnet2Subnet39217055": {
70
+ "Type": "AWS::EC2::Subnet",
71
+ "Properties": {
72
+ "VpcId": {
73
+ "Ref": "Vpc8378EB38"
74
+ },
75
+ "AvailabilityZone": "test-region-1b",
76
+ "CidrBlock": "172.168.64.0/18",
77
+ "MapPublicIpOnLaunch": false,
78
+ "Tags": [
79
+ {
80
+ "Key": "aws-cdk:subnet-name",
81
+ "Value": "isolated"
82
+ },
83
+ {
84
+ "Key": "aws-cdk:subnet-type",
85
+ "Value": "Isolated"
86
+ },
87
+ {
88
+ "Key": "Name",
89
+ "Value": "existingResources/Vpc/isolatedSubnet2"
90
+ }
91
+ ]
92
+ }
93
+ },
94
+ "VpcisolatedSubnet2RouteTable334F9764": {
95
+ "Type": "AWS::EC2::RouteTable",
96
+ "Properties": {
97
+ "VpcId": {
98
+ "Ref": "Vpc8378EB38"
99
+ },
100
+ "Tags": [
101
+ {
102
+ "Key": "Name",
103
+ "Value": "existingResources/Vpc/isolatedSubnet2"
104
+ }
105
+ ]
106
+ }
107
+ },
108
+ "VpcisolatedSubnet2RouteTableAssociation25A4716F": {
109
+ "Type": "AWS::EC2::SubnetRouteTableAssociation",
110
+ "Properties": {
111
+ "RouteTableId": {
112
+ "Ref": "VpcisolatedSubnet2RouteTable334F9764"
113
+ },
114
+ "SubnetId": {
115
+ "Ref": "VpcisolatedSubnet2Subnet39217055"
116
+ }
117
+ }
118
+ },
119
+ "VpcisolatedSubnet3Subnet44F2537D": {
120
+ "Type": "AWS::EC2::Subnet",
121
+ "Properties": {
122
+ "VpcId": {
123
+ "Ref": "Vpc8378EB38"
124
+ },
125
+ "AvailabilityZone": "test-region-1c",
126
+ "CidrBlock": "172.168.128.0/18",
127
+ "MapPublicIpOnLaunch": false,
128
+ "Tags": [
129
+ {
130
+ "Key": "aws-cdk:subnet-name",
131
+ "Value": "isolated"
132
+ },
133
+ {
134
+ "Key": "aws-cdk:subnet-type",
135
+ "Value": "Isolated"
136
+ },
137
+ {
138
+ "Key": "Name",
139
+ "Value": "existingResources/Vpc/isolatedSubnet3"
140
+ }
141
+ ]
142
+ }
143
+ },
144
+ "VpcisolatedSubnet3RouteTableA2F6BBC0": {
145
+ "Type": "AWS::EC2::RouteTable",
146
+ "Properties": {
147
+ "VpcId": {
148
+ "Ref": "Vpc8378EB38"
149
+ },
150
+ "Tags": [
151
+ {
152
+ "Key": "Name",
153
+ "Value": "existingResources/Vpc/isolatedSubnet3"
154
+ }
155
+ ]
156
+ }
157
+ },
158
+ "VpcisolatedSubnet3RouteTableAssociationDC010BEB": {
159
+ "Type": "AWS::EC2::SubnetRouteTableAssociation",
160
+ "Properties": {
161
+ "RouteTableId": {
162
+ "Ref": "VpcisolatedSubnet3RouteTableA2F6BBC0"
163
+ },
164
+ "SubnetId": {
165
+ "Ref": "VpcisolatedSubnet3Subnet44F2537D"
166
+ }
167
+ }
168
+ },
169
+ "VpcFlowLogIAMRole6A475D41": {
170
+ "Type": "AWS::IAM::Role",
171
+ "Properties": {
172
+ "AssumeRolePolicyDocument": {
173
+ "Statement": [
174
+ {
175
+ "Action": "sts:AssumeRole",
176
+ "Effect": "Allow",
177
+ "Principal": {
178
+ "Service": "vpc-flow-logs.amazonaws.com"
179
+ }
180
+ }
181
+ ],
182
+ "Version": "2012-10-17"
183
+ },
184
+ "Tags": [
185
+ {
186
+ "Key": "Name",
187
+ "Value": "existingResources/Vpc"
188
+ }
189
+ ]
190
+ }
191
+ },
192
+ "VpcFlowLogIAMRoleDefaultPolicy406FB995": {
193
+ "Type": "AWS::IAM::Policy",
194
+ "Properties": {
195
+ "PolicyDocument": {
196
+ "Statement": [
197
+ {
198
+ "Action": [
199
+ "logs:CreateLogStream",
200
+ "logs:PutLogEvents",
201
+ "logs:DescribeLogStreams"
202
+ ],
203
+ "Effect": "Allow",
204
+ "Resource": {
205
+ "Fn::GetAtt": [
206
+ "VpcFlowLogLogGroup7B5C56B9",
207
+ "Arn"
208
+ ]
209
+ }
210
+ },
211
+ {
212
+ "Action": "iam:PassRole",
213
+ "Effect": "Allow",
214
+ "Resource": {
215
+ "Fn::GetAtt": [
216
+ "VpcFlowLogIAMRole6A475D41",
217
+ "Arn"
218
+ ]
219
+ }
220
+ }
221
+ ],
222
+ "Version": "2012-10-17"
223
+ },
224
+ "PolicyName": "VpcFlowLogIAMRoleDefaultPolicy406FB995",
225
+ "Roles": [
226
+ {
227
+ "Ref": "VpcFlowLogIAMRole6A475D41"
228
+ }
229
+ ]
230
+ }
231
+ },
232
+ "VpcFlowLogLogGroup7B5C56B9": {
233
+ "Type": "AWS::Logs::LogGroup",
234
+ "Properties": {
235
+ "RetentionInDays": 731,
236
+ "Tags": [
237
+ {
238
+ "Key": "Name",
239
+ "Value": "existingResources/Vpc"
240
+ }
241
+ ]
242
+ },
243
+ "UpdateReplacePolicy": "Retain",
244
+ "DeletionPolicy": "Retain",
245
+ "Metadata": {
246
+ "cfn_nag": {
247
+ "rules_to_suppress": [
248
+ {
249
+ "id": "W84",
250
+ "reason": "By default CloudWatchLogs LogGroups data is encrypted using the CloudWatch server-side encryption keys (AWS Managed Keys)"
251
+ }
252
+ ]
253
+ }
254
+ }
255
+ },
256
+ "VpcFlowLog8FF33A73": {
257
+ "Type": "AWS::EC2::FlowLog",
258
+ "Properties": {
259
+ "ResourceId": {
260
+ "Ref": "Vpc8378EB38"
261
+ },
262
+ "ResourceType": "VPC",
263
+ "TrafficType": "ALL",
264
+ "DeliverLogsPermissionArn": {
265
+ "Fn::GetAtt": [
266
+ "VpcFlowLogIAMRole6A475D41",
267
+ "Arn"
268
+ ]
269
+ },
270
+ "LogDestinationType": "cloud-watch-logs",
271
+ "LogGroupName": {
272
+ "Ref": "VpcFlowLogLogGroup7B5C56B9"
273
+ },
274
+ "Tags": [
275
+ {
276
+ "Key": "Name",
277
+ "Value": "existingResources/Vpc"
278
+ }
279
+ ]
280
+ }
281
+ },
282
+ "testsgsecuritygroup89DCF621": {
283
+ "Type": "AWS::EC2::SecurityGroup",
284
+ "Properties": {
285
+ "GroupDescription": "existingResources/test-sg-security-group",
286
+ "SecurityGroupEgress": [
287
+ {
288
+ "CidrIp": "0.0.0.0/0",
289
+ "Description": "Allow all outbound traffic by default",
290
+ "IpProtocol": "-1"
291
+ }
292
+ ],
293
+ "VpcId": {
294
+ "Ref": "Vpc8378EB38"
295
+ }
296
+ },
297
+ "Metadata": {
298
+ "cfn_nag": {
299
+ "rules_to_suppress": [
300
+ {
301
+ "id": "W5",
302
+ "reason": "Egress of 0.0.0.0/0 is default and generally considered OK"
303
+ },
304
+ {
305
+ "id": "W40",
306
+ "reason": "Egress IPProtocol of -1 is default and generally considered OK"
307
+ }
308
+ ]
309
+ }
310
+ }
311
+ },
312
+ "testfunctionServiceRoleFB85AD63": {
313
+ "Type": "AWS::IAM::Role",
314
+ "Properties": {
315
+ "AssumeRolePolicyDocument": {
316
+ "Statement": [
317
+ {
318
+ "Action": "sts:AssumeRole",
319
+ "Effect": "Allow",
320
+ "Principal": {
321
+ "Service": "lambda.amazonaws.com"
322
+ }
323
+ }
324
+ ],
325
+ "Version": "2012-10-17"
326
+ },
327
+ "ManagedPolicyArns": [
328
+ {
329
+ "Fn::Join": [
330
+ "",
331
+ [
332
+ "arn:",
333
+ {
334
+ "Ref": "AWS::Partition"
335
+ },
336
+ ":iam::aws:policy/service-role/AWSLambdaBasicExecutionRole"
337
+ ]
338
+ ]
339
+ },
340
+ {
341
+ "Fn::Join": [
342
+ "",
343
+ [
344
+ "arn:",
345
+ {
346
+ "Ref": "AWS::Partition"
347
+ },
348
+ ":iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole"
349
+ ]
350
+ ]
351
+ }
352
+ ]
353
+ }
354
+ },
355
+ "testfunction5B23D3B0": {
356
+ "Type": "AWS::Lambda::Function",
357
+ "Properties": {
358
+ "Code": {
359
+ "S3Bucket": {
360
+ "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
361
+ },
362
+ "S3Key": "c1b23d6af38c04acb744bda25a3dc7f4394daea942c67eaff40911a707a3c37a.zip"
363
+ },
364
+ "Role": {
365
+ "Fn::GetAtt": [
366
+ "testfunctionServiceRoleFB85AD63",
367
+ "Arn"
368
+ ]
369
+ },
370
+ "Environment": {
371
+ "Variables": {
372
+ "CACHE_ENDPOINT": {
373
+ "Fn::Join": [
374
+ "",
375
+ [
376
+ {
377
+ "Fn::GetAtt": [
378
+ "testcachecluster",
379
+ "ConfigurationEndpoint.Address"
380
+ ]
381
+ },
382
+ ":",
383
+ {
384
+ "Fn::GetAtt": [
385
+ "testcachecluster",
386
+ "ConfigurationEndpoint.Port"
387
+ ]
388
+ }
389
+ ]
390
+ ]
391
+ }
392
+ }
393
+ },
394
+ "Handler": "index.handler",
395
+ "Runtime": "nodejs14.x",
396
+ "VpcConfig": {
397
+ "SecurityGroupIds": [
398
+ {
399
+ "Fn::GetAtt": [
400
+ "testsgsecuritygroup89DCF621",
401
+ "GroupId"
402
+ ]
403
+ },
404
+ {
405
+ "Fn::GetAtt": [
406
+ "testtestcachesg9F6CF9E2",
407
+ "GroupId"
408
+ ]
409
+ }
410
+ ],
411
+ "SubnetIds": [
412
+ {
413
+ "Ref": "VpcisolatedSubnet1SubnetE62B1B9B"
414
+ },
415
+ {
416
+ "Ref": "VpcisolatedSubnet2Subnet39217055"
417
+ },
418
+ {
419
+ "Ref": "VpcisolatedSubnet3Subnet44F2537D"
420
+ }
421
+ ]
422
+ }
423
+ },
424
+ "DependsOn": [
425
+ "testfunctionServiceRoleFB85AD63"
426
+ ],
427
+ "Metadata": {
428
+ "cfn_nag": {
429
+ "rules_to_suppress": [
430
+ {
431
+ "id": "W58",
432
+ "reason": "Test Resource"
433
+ },
434
+ {
435
+ "id": "W92",
436
+ "reason": "Test Resource"
437
+ }
438
+ ]
439
+ }
440
+ }
441
+ },
442
+ "ecsubnetgrouptestcache": {
443
+ "Type": "AWS::ElastiCache::SubnetGroup",
444
+ "Properties": {
445
+ "Description": "Solutions Constructs generated Cache Subnet Group",
446
+ "SubnetIds": [
447
+ {
448
+ "Ref": "VpcisolatedSubnet1SubnetE62B1B9B"
449
+ },
450
+ {
451
+ "Ref": "VpcisolatedSubnet2Subnet39217055"
452
+ },
453
+ {
454
+ "Ref": "VpcisolatedSubnet3Subnet44F2537D"
455
+ }
456
+ ],
457
+ "CacheSubnetGroupName": "test-cache-subnet-group"
458
+ }
459
+ },
460
+ "testcachecachesg7265880E": {
461
+ "Type": "AWS::EC2::SecurityGroup",
462
+ "Properties": {
463
+ "GroupDescription": "existingResources/test-cache-cachesg",
464
+ "SecurityGroupEgress": [
465
+ {
466
+ "CidrIp": "0.0.0.0/0",
467
+ "Description": "Allow all outbound traffic by default",
468
+ "IpProtocol": "-1"
469
+ }
470
+ ],
471
+ "VpcId": {
472
+ "Ref": "Vpc8378EB38"
473
+ }
474
+ },
475
+ "Metadata": {
476
+ "cfn_nag": {
477
+ "rules_to_suppress": [
478
+ {
479
+ "id": "W40",
480
+ "reason": "Test Resource"
481
+ },
482
+ {
483
+ "id": "W5",
484
+ "reason": "Test Resource"
485
+ },
486
+ {
487
+ "id": "W36",
488
+ "reason": "Test Resource"
489
+ }
490
+ ]
491
+ }
492
+ }
493
+ },
494
+ "testcachecluster": {
495
+ "Type": "AWS::ElastiCache::CacheCluster",
496
+ "Properties": {
497
+ "CacheNodeType": "cache.t3.medium",
498
+ "Engine": "memcached",
499
+ "NumCacheNodes": 2,
500
+ "AZMode": "cross-az",
501
+ "CacheSubnetGroupName": "test-cache-subnet-group",
502
+ "ClusterName": "test-cache-cdk-cluster",
503
+ "Port": 11222,
504
+ "VpcSecurityGroupIds": [
505
+ {
506
+ "Fn::GetAtt": [
507
+ "testcachecachesg7265880E",
508
+ "GroupId"
509
+ ]
510
+ },
511
+ {
512
+ "Fn::GetAtt": [
513
+ "testtestcachesg9F6CF9E2",
514
+ "GroupId"
515
+ ]
516
+ }
517
+ ]
518
+ },
519
+ "DependsOn": [
520
+ "ecsubnetgrouptestcache"
521
+ ]
522
+ },
523
+ "testtestcachesg9F6CF9E2": {
524
+ "Type": "AWS::EC2::SecurityGroup",
525
+ "Properties": {
526
+ "GroupDescription": "existingResources/test/test-cachesg",
527
+ "SecurityGroupEgress": [
528
+ {
529
+ "CidrIp": "0.0.0.0/0",
530
+ "Description": "Allow all outbound traffic by default",
531
+ "IpProtocol": "-1"
532
+ }
533
+ ],
534
+ "VpcId": {
535
+ "Ref": "Vpc8378EB38"
536
+ }
537
+ },
538
+ "Metadata": {
539
+ "cfn_nag": {
540
+ "rules_to_suppress": [
541
+ {
542
+ "id": "W5",
543
+ "reason": "Egress of 0.0.0.0/0 is default and generally considered OK"
544
+ },
545
+ {
546
+ "id": "W40",
547
+ "reason": "Egress IPProtocol of -1 is default and generally considered OK"
548
+ }
549
+ ]
550
+ }
551
+ }
552
+ },
553
+ "testtestingress291C0179": {
554
+ "Type": "AWS::EC2::SecurityGroupIngress",
555
+ "Properties": {
556
+ "IpProtocol": "TCP",
557
+ "Description": "Self referencing rule to control access to Elasticache memcached cluster",
558
+ "FromPort": {
559
+ "Fn::GetAtt": [
560
+ "testcachecluster",
561
+ "ConfigurationEndpoint.Port"
562
+ ]
563
+ },
564
+ "GroupId": {
565
+ "Fn::GetAtt": [
566
+ "testtestcachesg9F6CF9E2",
567
+ "GroupId"
568
+ ]
569
+ },
570
+ "SourceSecurityGroupId": {
571
+ "Fn::GetAtt": [
572
+ "testtestcachesg9F6CF9E2",
573
+ "GroupId"
574
+ ]
575
+ },
576
+ "ToPort": {
577
+ "Fn::GetAtt": [
578
+ "testcachecluster",
579
+ "ConfigurationEndpoint.Port"
580
+ ]
581
+ }
582
+ },
583
+ "DependsOn": [
584
+ "testtestcachesg9F6CF9E2"
585
+ ]
586
+ }
587
+ },
588
+ "Parameters": {
589
+ "BootstrapVersion": {
590
+ "Type": "AWS::SSM::Parameter::Value<String>",
591
+ "Default": "/cdk-bootstrap/hnb659fds/version",
592
+ "Description": "Version of the CDK Bootstrap resources in this environment, automatically retrieved from SSM Parameter Store. [cdk:skip]"
593
+ }
594
+ },
595
+ "Rules": {
596
+ "CheckBootstrapVersion": {
597
+ "Assertions": [
598
+ {
599
+ "Assert": {
600
+ "Fn::Not": [
601
+ {
602
+ "Fn::Contains": [
603
+ [
604
+ "1",
605
+ "2",
606
+ "3",
607
+ "4",
608
+ "5"
609
+ ],
610
+ {
611
+ "Ref": "BootstrapVersion"
612
+ }
613
+ ]
614
+ }
615
+ ]
616
+ },
617
+ "AssertDescription": "CDK bootstrap stack version 6 required. Please run 'cdk bootstrap' with a recent version of the CDK CLI."
618
+ }
619
+ ]
620
+ }
621
+ }
622
+ }
@@ -0,0 +1,52 @@
1
+ "use strict";
2
+ /**
3
+ * Copyright 2022 Amazon.com, Inc. or its affiliates. All Rights Reserved.
4
+ *
5
+ * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance
6
+ * with the License. A copy of the License is located at
7
+ *
8
+ * http://www.apache.org/licenses/LICENSE-2.0
9
+ *
10
+ * or in the 'license' file accompanying this file. This file is distributed on an 'AS IS' BASIS, WITHOUT WARRANTIES
11
+ * OR CONDITIONS OF ANY KIND, express or implied. See the License for the specific language governing permissions
12
+ * and limitations under the License.
13
+ */
14
+ Object.defineProperty(exports, "__esModule", { value: true });
15
+ // Imports
16
+ const core_1 = require("@aws-cdk/core");
17
+ const lib_1 = require("../lib");
18
+ const lambda = require("@aws-cdk/aws-lambda");
19
+ // import * as ec2 from '@aws-cdk/aws-ec2';
20
+ const core_2 = require("@aws-solutions-constructs/core");
21
+ // Setup
22
+ const app = new core_1.App();
23
+ const stack = new core_1.Stack(app, core_2.generateIntegStackName(__filename));
24
+ stack.templateOptions.description = 'Integration Test with new resourcesfor aws-lambda-elasticachememcached';
25
+ const testVpc = core_2.getTestVpc(stack, false);
26
+ // const testSG = new ec2.SecurityGroup(stack, 'test-sg', {
27
+ // vpc: testVpc,
28
+ // });
29
+ // addCfnSuppressRules(testSG, [{ id: "W40", reason: "Test Resource" }]);
30
+ // addCfnSuppressRules(testSG, [{ id: "W5", reason: "Test Resource" }]);
31
+ // addCfnSuppressRules(testSG, [{ id: "W36", reason: "Test Resource" }]);
32
+ const testSG = core_2.buildSecurityGroup(stack, 'test-sg', { vpc: testVpc }, [], []);
33
+ const testFunction = new lambda.Function(stack, 'test-function', {
34
+ runtime: lambda.Runtime.NODEJS_14_X,
35
+ handler: 'index.handler',
36
+ code: lambda.Code.fromAsset(`${__dirname}/lambda`),
37
+ vpc: testVpc,
38
+ securityGroups: [testSG],
39
+ });
40
+ core_2.addCfnSuppressRules(testFunction, [{ id: "W58", reason: "Test Resource" }]);
41
+ core_2.addCfnSuppressRules(testFunction, [{ id: "W92", reason: "Test Resource" }]);
42
+ const testCache = core_2.CreateTestCache(stack, 'test-cache', testVpc);
43
+ // Definitions
44
+ const props = {
45
+ existingVpc: testVpc,
46
+ existingLambdaObj: testFunction,
47
+ existingCache: testCache,
48
+ };
49
+ new lib_1.LambdaToElasticachememcached(stack, 'test', props);
50
+ // Synth
51
+ app.synth();
52
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW50ZWcuZXhpc3RpbmdSZXNvdXJjZXMuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyJpbnRlZy5leGlzdGluZ1Jlc291cmNlcy50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiO0FBQUE7Ozs7Ozs7Ozs7O0dBV0c7O0FBRUgsVUFBVTtBQUNWLHdDQUEyQztBQUMzQyxnQ0FBeUY7QUFDekYsOENBQThDO0FBQzlDLDJDQUEyQztBQUMzQyx5REFBOEk7QUFFOUksUUFBUTtBQUNSLE1BQU0sR0FBRyxHQUFHLElBQUksVUFBRyxFQUFFLENBQUM7QUFDdEIsTUFBTSxLQUFLLEdBQUcsSUFBSSxZQUFLLENBQUMsR0FBRyxFQUFFLDZCQUFzQixDQUFDLFVBQVUsQ0FBQyxDQUFDLENBQUM7QUFDakUsS0FBSyxDQUFDLGVBQWUsQ0FBQyxXQUFXLEdBQUcsd0VBQXdFLENBQUM7QUFFN0csTUFBTSxPQUFPLEdBQUcsaUJBQVUsQ0FBQyxLQUFLLEVBQUUsS0FBSyxDQUFDLENBQUM7QUFFekMsMkRBQTJEO0FBQzNELGtCQUFrQjtBQUNsQixNQUFNO0FBQ04seUVBQXlFO0FBQ3pFLHdFQUF3RTtBQUN4RSx5RUFBeUU7QUFDekUsTUFBTSxNQUFNLEdBQUcseUJBQWtCLENBQUMsS0FBSyxFQUFFLFNBQVMsRUFBRSxFQUFFLEdBQUcsRUFBRSxPQUFPLEVBQUUsRUFBRSxFQUFFLEVBQUUsRUFBRSxDQUFDLENBQUM7QUFFOUUsTUFBTSxZQUFZLEdBQUcsSUFBSSxNQUFNLENBQUMsUUFBUSxDQUFDLEtBQUssRUFBRSxlQUFlLEVBQUU7SUFDL0QsT0FBTyxFQUFFLE1BQU0sQ0FBQyxPQUFPLENBQUMsV0FBVztJQUNuQyxPQUFPLEVBQUUsZUFBZTtJQUN4QixJQUFJLEVBQUUsTUFBTSxDQUFDLElBQUksQ0FBQyxTQUFTLENBQUMsR0FBRyxTQUFTLFNBQVMsQ0FBQztJQUNsRCxHQUFHLEVBQUUsT0FBTztJQUNaLGNBQWMsRUFBRSxDQUFDLE1BQU0sQ0FBQztDQUN6QixDQUFDLENBQUM7QUFDSCwwQkFBbUIsQ0FBQyxZQUFZLEVBQUUsQ0FBQyxFQUFFLEVBQUUsRUFBRSxLQUFLLEVBQUUsTUFBTSxFQUFFLGVBQWUsRUFBRSxDQUFDLENBQUMsQ0FBQztBQUM1RSwwQkFBbUIsQ0FBQyxZQUFZLEVBQUUsQ0FBQyxFQUFFLEVBQUUsRUFBRSxLQUFLLEVBQUUsTUFBTSxFQUFFLGVBQWUsRUFBRSxDQUFDLENBQUMsQ0FBQztBQUU1RSxNQUFNLFNBQVMsR0FBRyxzQkFBZSxDQUFDLEtBQUssRUFBRSxZQUFZLEVBQUUsT0FBTyxDQUFDLENBQUM7QUFFaEUsY0FBYztBQUNkLE1BQU0sS0FBSyxHQUFzQztJQUMvQyxXQUFXLEVBQUUsT0FBTztJQUNwQixpQkFBaUIsRUFBRSxZQUFZO0lBQy9CLGFBQWEsRUFBRSxTQUFTO0NBQ3pCLENBQUM7QUFFRixJQUFJLGtDQUE0QixDQUFDLEtBQUssRUFBRSxNQUFNLEVBQUUsS0FBSyxDQUFDLENBQUM7QUFFdkQsUUFBUTtBQUNSLEdBQUcsQ0FBQyxLQUFLLEVBQUUsQ0FBQyIsInNvdXJjZXNDb250ZW50IjpbIi8qKlxuICogIENvcHlyaWdodCAyMDIyIEFtYXpvbi5jb20sIEluYy4gb3IgaXRzIGFmZmlsaWF0ZXMuIEFsbCBSaWdodHMgUmVzZXJ2ZWQuXG4gKlxuICogIExpY2Vuc2VkIHVuZGVyIHRoZSBBcGFjaGUgTGljZW5zZSwgVmVyc2lvbiAyLjAgKHRoZSBcIkxpY2Vuc2VcIikuIFlvdSBtYXkgbm90IHVzZSB0aGlzIGZpbGUgZXhjZXB0IGluIGNvbXBsaWFuY2VcbiAqICB3aXRoIHRoZSBMaWNlbnNlLiBBIGNvcHkgb2YgdGhlIExpY2Vuc2UgaXMgbG9jYXRlZCBhdFxuICpcbiAqICAgICAgaHR0cDovL3d3dy5hcGFjaGUub3JnL2xpY2Vuc2VzL0xJQ0VOU0UtMi4wXG4gKlxuICogIG9yIGluIHRoZSAnbGljZW5zZScgZmlsZSBhY2NvbXBhbnlpbmcgdGhpcyBmaWxlLiBUaGlzIGZpbGUgaXMgZGlzdHJpYnV0ZWQgb24gYW4gJ0FTIElTJyBCQVNJUywgV0lUSE9VVCBXQVJSQU5USUVTXG4gKiAgT1IgQ09ORElUSU9OUyBPRiBBTlkgS0lORCwgZXhwcmVzcyBvciBpbXBsaWVkLiBTZWUgdGhlIExpY2Vuc2UgZm9yIHRoZSBzcGVjaWZpYyBsYW5ndWFnZSBnb3Zlcm5pbmcgcGVybWlzc2lvbnNcbiAqICBhbmQgbGltaXRhdGlvbnMgdW5kZXIgdGhlIExpY2Vuc2UuXG4gKi9cblxuLy8gSW1wb3J0c1xuaW1wb3J0IHsgQXBwLCBTdGFjayB9IGZyb20gXCJAYXdzLWNkay9jb3JlXCI7XG5pbXBvcnQgeyBMYW1iZGFUb0VsYXN0aWNhY2hlbWVtY2FjaGVkLCBMYW1iZGFUb0VsYXN0aWNhY2hlbWVtY2FjaGVkUHJvcHMgfSBmcm9tIFwiLi4vbGliXCI7XG5pbXBvcnQgKiBhcyBsYW1iZGEgZnJvbSAnQGF3cy1jZGsvYXdzLWxhbWJkYSc7XG4vLyBpbXBvcnQgKiBhcyBlYzIgZnJvbSAnQGF3cy1jZGsvYXdzLWVjMic7XG5pbXBvcnQgeyBnZW5lcmF0ZUludGVnU3RhY2tOYW1lLCBnZXRUZXN0VnBjLCBDcmVhdGVUZXN0Q2FjaGUsIGFkZENmblN1cHByZXNzUnVsZXMsIGJ1aWxkU2VjdXJpdHlHcm91cCB9IGZyb20gJ0Bhd3Mtc29sdXRpb25zLWNvbnN0cnVjdHMvY29yZSc7XG5cbi8vIFNldHVwXG5jb25zdCBhcHAgPSBuZXcgQXBwKCk7XG5jb25zdCBzdGFjayA9IG5ldyBTdGFjayhhcHAsIGdlbmVyYXRlSW50ZWdTdGFja05hbWUoX19maWxlbmFtZSkpO1xuc3RhY2sudGVtcGxhdGVPcHRpb25zLmRlc2NyaXB0aW9uID0gJ0ludGVncmF0aW9uIFRlc3Qgd2l0aCBuZXcgcmVzb3VyY2VzZm9yIGF3cy1sYW1iZGEtZWxhc3RpY2FjaGVtZW1jYWNoZWQnO1xuXG5jb25zdCB0ZXN0VnBjID0gZ2V0VGVzdFZwYyhzdGFjaywgZmFsc2UpO1xuXG4vLyBjb25zdCB0ZXN0U0cgPSBuZXcgZWMyLlNlY3VyaXR5R3JvdXAoc3RhY2ssICd0ZXN0LXNnJywge1xuLy8gICB2cGM6IHRlc3RWcGMsXG4vLyB9KTtcbi8vIGFkZENmblN1cHByZXNzUnVsZXModGVzdFNHLCBbeyBpZDogXCJXNDBcIiwgcmVhc29uOiBcIlRlc3QgUmVzb3VyY2VcIiB9XSk7XG4vLyBhZGRDZm5TdXBwcmVzc1J1bGVzKHRlc3RTRywgW3sgaWQ6IFwiVzVcIiwgcmVhc29uOiBcIlRlc3QgUmVzb3VyY2VcIiB9XSk7XG4vLyBhZGRDZm5TdXBwcmVzc1J1bGVzKHRlc3RTRywgW3sgaWQ6IFwiVzM2XCIsIHJlYXNvbjogXCJUZXN0IFJlc291cmNlXCIgfV0pO1xuY29uc3QgdGVzdFNHID0gYnVpbGRTZWN1cml0eUdyb3VwKHN0YWNrLCAndGVzdC1zZycsIHsgdnBjOiB0ZXN0VnBjIH0sIFtdLCBbXSk7XG5cbmNvbnN0IHRlc3RGdW5jdGlvbiA9IG5ldyBsYW1iZGEuRnVuY3Rpb24oc3RhY2ssICd0ZXN0LWZ1bmN0aW9uJywge1xuICBydW50aW1lOiBsYW1iZGEuUnVudGltZS5OT0RFSlNfMTRfWCxcbiAgaGFuZGxlcjogJ2luZGV4LmhhbmRsZXInLFxuICBjb2RlOiBsYW1iZGEuQ29kZS5mcm9tQXNzZXQoYCR7X19kaXJuYW1lfS9sYW1iZGFgKSxcbiAgdnBjOiB0ZXN0VnBjLFxuICBzZWN1cml0eUdyb3VwczogW3Rlc3RTR10sXG59KTtcbmFkZENmblN1cHByZXNzUnVsZXModGVzdEZ1bmN0aW9uLCBbeyBpZDogXCJXNThcIiwgcmVhc29uOiBcIlRlc3QgUmVzb3VyY2VcIiB9XSk7XG5hZGRDZm5TdXBwcmVzc1J1bGVzKHRlc3RGdW5jdGlvbiwgW3sgaWQ6IFwiVzkyXCIsIHJlYXNvbjogXCJUZXN0IFJlc291cmNlXCIgfV0pO1xuXG5jb25zdCB0ZXN0Q2FjaGUgPSBDcmVhdGVUZXN0Q2FjaGUoc3RhY2ssICd0ZXN0LWNhY2hlJywgdGVzdFZwYyk7XG5cbi8vIERlZmluaXRpb25zXG5jb25zdCBwcm9wczogTGFtYmRhVG9FbGFzdGljYWNoZW1lbWNhY2hlZFByb3BzID0ge1xuICBleGlzdGluZ1ZwYzogdGVzdFZwYyxcbiAgZXhpc3RpbmdMYW1iZGFPYmo6IHRlc3RGdW5jdGlvbixcbiAgZXhpc3RpbmdDYWNoZTogdGVzdENhY2hlLFxufTtcblxubmV3IExhbWJkYVRvRWxhc3RpY2FjaGVtZW1jYWNoZWQoc3RhY2ssICd0ZXN0JywgcHJvcHMpO1xuXG4vLyBTeW50aFxuYXBwLnN5bnRoKCk7Il19
@@ -0,0 +1,13 @@
1
+ /**
2
+ * Copyright 2022 Amazon.com, Inc. or its affiliates. All Rights Reserved.
3
+ *
4
+ * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance
5
+ * with the License. A copy of the License is located at
6
+ *
7
+ * http://www.apache.org/licenses/LICENSE-2.0
8
+ *
9
+ * or in the 'license' file accompanying this file. This file is distributed on an 'AS IS' BASIS, WITHOUT WARRANTIES
10
+ * OR CONDITIONS OF ANY KIND, express or implied. See the License for the specific language governing permissions
11
+ * and limitations under the License.
12
+ */
13
+ export {};