@aws-solutions-constructs/aws-lambda-elasticachememcached 2.50.0 → 2.52.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (44) hide show
  1. package/.eslintignore +2 -0
  2. package/.jsii +50 -5
  3. package/integ.config.json +7 -0
  4. package/lib/index.js +1 -1
  5. package/package.json +12 -11
  6. package/test/integ.lammem-existingResources.js +6 -2
  7. package/test/integ.lammem-existingResources.js.snapshot/asset.c1b23d6af38c04acb744bda25a3dc7f4394daea942c67eaff40911a707a3c37a/index.js +8 -0
  8. package/test/integ.lammem-existingResources.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/__entrypoint__.js +1 -0
  9. package/test/integ.lammem-existingResources.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/index.js +1 -0
  10. package/test/integ.lammem-existingResources.js.snapshot/cdk.out +1 -0
  11. package/test/integ.lammem-existingResources.js.snapshot/integ.json +12 -0
  12. package/test/integ.lammem-existingResources.js.snapshot/lammem-existingResources.assets.json +45 -0
  13. package/test/integ.lammem-existingResources.js.snapshot/lammem-existingResources.template.json +720 -0
  14. package/test/integ.lammem-existingResources.js.snapshot/lammemexistingResourcesIntegDefaultTestDeployAssertD269DF67.assets.json +19 -0
  15. package/test/integ.lammem-existingResources.js.snapshot/lammemexistingResourcesIntegDefaultTestDeployAssertD269DF67.template.json +36 -0
  16. package/test/integ.lammem-existingResources.js.snapshot/manifest.json +239 -0
  17. package/test/integ.lammem-existingResources.js.snapshot/tree.json +947 -0
  18. package/test/integ.lammem-newResources.js +6 -2
  19. package/test/integ.lammem-newResources.js.snapshot/asset.c1b23d6af38c04acb744bda25a3dc7f4394daea942c67eaff40911a707a3c37a/index.js +8 -0
  20. package/test/integ.lammem-newResources.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/__entrypoint__.js +1 -0
  21. package/test/integ.lammem-newResources.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/index.js +1 -0
  22. package/test/integ.lammem-newResources.js.snapshot/cdk.out +1 -0
  23. package/test/integ.lammem-newResources.js.snapshot/integ.json +12 -0
  24. package/test/integ.lammem-newResources.js.snapshot/lammem-newResources.assets.json +45 -0
  25. package/test/integ.lammem-newResources.js.snapshot/lammem-newResources.template.json +726 -0
  26. package/test/integ.lammem-newResources.js.snapshot/lammemnewResourcesIntegDefaultTestDeployAssert30C906BF.assets.json +19 -0
  27. package/test/integ.lammem-newResources.js.snapshot/lammemnewResourcesIntegDefaultTestDeployAssert30C906BF.template.json +36 -0
  28. package/test/integ.lammem-newResources.js.snapshot/manifest.json +239 -0
  29. package/test/integ.lammem-newResources.js.snapshot/tree.json +966 -0
  30. package/test/integ.lammem-withClientProps.js +6 -2
  31. package/test/integ.lammem-withClientProps.js.snapshot/asset.c1b23d6af38c04acb744bda25a3dc7f4394daea942c67eaff40911a707a3c37a/index.js +8 -0
  32. package/test/integ.lammem-withClientProps.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/__entrypoint__.js +1 -0
  33. package/test/integ.lammem-withClientProps.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/index.js +1 -0
  34. package/test/integ.lammem-withClientProps.js.snapshot/cdk.out +1 -0
  35. package/test/integ.lammem-withClientProps.js.snapshot/integ.json +12 -0
  36. package/test/integ.lammem-withClientProps.js.snapshot/lammem-withClientProps.assets.json +45 -0
  37. package/test/integ.lammem-withClientProps.js.snapshot/lammem-withClientProps.template.json +726 -0
  38. package/test/integ.lammem-withClientProps.js.snapshot/lammemwithClientPropsIntegDefaultTestDeployAssertDB086BD1.assets.json +19 -0
  39. package/test/integ.lammem-withClientProps.js.snapshot/lammemwithClientPropsIntegDefaultTestDeployAssertDB086BD1.template.json +36 -0
  40. package/test/integ.lammem-withClientProps.js.snapshot/manifest.json +239 -0
  41. package/test/integ.lammem-withClientProps.js.snapshot/tree.json +966 -0
  42. package/test/integ.lammem-existingResources.expected.json +0 -630
  43. package/test/integ.lammem-newResources.expected.json +0 -641
  44. package/test/integ.lammem-withClientProps.expected.json +0 -641
@@ -1,641 +0,0 @@
1
- {
2
- "Description": "Integration Test with new resourcesfor aws-lambda-elasticachememcached",
3
- "Resources": {
4
- "lammemwithClientPropslammemwithClientPropscachesgF0194DF0": {
5
- "Type": "AWS::EC2::SecurityGroup",
6
- "Properties": {
7
- "GroupDescription": "lammem-withClientProps/lammem-withClientProps/lammem-withClientProps-cachesg",
8
- "SecurityGroupEgress": [
9
- {
10
- "CidrIp": "0.0.0.0/0",
11
- "Description": "Allow all outbound traffic by default",
12
- "IpProtocol": "-1"
13
- }
14
- ],
15
- "VpcId": {
16
- "Ref": "Vpc8378EB38"
17
- }
18
- },
19
- "Metadata": {
20
- "cfn_nag": {
21
- "rules_to_suppress": [
22
- {
23
- "id": "W5",
24
- "reason": "Egress of 0.0.0.0/0 is default and generally considered OK"
25
- },
26
- {
27
- "id": "W40",
28
- "reason": "Egress IPProtocol of -1 is default and generally considered OK"
29
- }
30
- ]
31
- }
32
- }
33
- },
34
- "lammemwithClientPropslammemwithClientPropsingress1B3CE5EB": {
35
- "Type": "AWS::EC2::SecurityGroupIngress",
36
- "Properties": {
37
- "Description": "Self referencing rule to control access to Elasticache memcached cluster",
38
- "FromPort": 11222,
39
- "GroupId": {
40
- "Fn::GetAtt": [
41
- "lammemwithClientPropslammemwithClientPropscachesgF0194DF0",
42
- "GroupId"
43
- ]
44
- },
45
- "IpProtocol": "TCP",
46
- "SourceSecurityGroupId": {
47
- "Fn::GetAtt": [
48
- "lammemwithClientPropslammemwithClientPropscachesgF0194DF0",
49
- "GroupId"
50
- ]
51
- },
52
- "ToPort": 11222
53
- },
54
- "DependsOn": [
55
- "lammemwithClientPropslammemwithClientPropscachesgF0194DF0"
56
- ]
57
- },
58
- "lammemwithClientPropsecsubnetgrouplammemwithClientProps999A3C35": {
59
- "Type": "AWS::ElastiCache::SubnetGroup",
60
- "Properties": {
61
- "CacheSubnetGroupName": "lammem-withClientProps-subnet-group",
62
- "Description": "Solutions Constructs generated Cache Subnet Group",
63
- "SubnetIds": [
64
- {
65
- "Ref": "VpcisolatedSubnet1SubnetE62B1B9B"
66
- },
67
- {
68
- "Ref": "VpcisolatedSubnet2Subnet39217055"
69
- },
70
- {
71
- "Ref": "VpcisolatedSubnet3Subnet44F2537D"
72
- }
73
- ]
74
- }
75
- },
76
- "lammemwithClientPropslammemwithClientPropscluster6611E8C2": {
77
- "Type": "AWS::ElastiCache::CacheCluster",
78
- "Properties": {
79
- "AZMode": "single-az",
80
- "CacheNodeType": "cache.t3.medium",
81
- "CacheSubnetGroupName": "lammem-withClientProps-subnet-group",
82
- "ClusterName": "lammem-withClientProps-cdk-cluster",
83
- "Engine": "memcached",
84
- "NumCacheNodes": 2,
85
- "Port": 11222,
86
- "VpcSecurityGroupIds": [
87
- {
88
- "Fn::GetAtt": [
89
- "lammemwithClientPropslammemwithClientPropscachesgF0194DF0",
90
- "GroupId"
91
- ]
92
- }
93
- ]
94
- },
95
- "DependsOn": [
96
- "lammemwithClientPropsecsubnetgrouplammemwithClientProps999A3C35"
97
- ]
98
- },
99
- "lammemwithClientPropsLambdaFunctionServiceRole4A4D2BF6": {
100
- "Type": "AWS::IAM::Role",
101
- "Properties": {
102
- "AssumeRolePolicyDocument": {
103
- "Statement": [
104
- {
105
- "Action": "sts:AssumeRole",
106
- "Effect": "Allow",
107
- "Principal": {
108
- "Service": "lambda.amazonaws.com"
109
- }
110
- }
111
- ],
112
- "Version": "2012-10-17"
113
- },
114
- "Policies": [
115
- {
116
- "PolicyDocument": {
117
- "Statement": [
118
- {
119
- "Action": [
120
- "logs:CreateLogGroup",
121
- "logs:CreateLogStream",
122
- "logs:PutLogEvents"
123
- ],
124
- "Effect": "Allow",
125
- "Resource": {
126
- "Fn::Join": [
127
- "",
128
- [
129
- "arn:",
130
- {
131
- "Ref": "AWS::Partition"
132
- },
133
- ":logs:",
134
- {
135
- "Ref": "AWS::Region"
136
- },
137
- ":",
138
- {
139
- "Ref": "AWS::AccountId"
140
- },
141
- ":log-group:/aws/lambda/*"
142
- ]
143
- ]
144
- }
145
- }
146
- ],
147
- "Version": "2012-10-17"
148
- },
149
- "PolicyName": "LambdaFunctionServiceRolePolicy"
150
- }
151
- ]
152
- }
153
- },
154
- "lammemwithClientPropsLambdaFunctionServiceRoleDefaultPolicy50E02A22": {
155
- "Type": "AWS::IAM::Policy",
156
- "Properties": {
157
- "PolicyDocument": {
158
- "Statement": [
159
- {
160
- "Action": [
161
- "ec2:CreateNetworkInterface",
162
- "ec2:DescribeNetworkInterfaces",
163
- "ec2:DeleteNetworkInterface",
164
- "ec2:AssignPrivateIpAddresses",
165
- "ec2:UnassignPrivateIpAddresses"
166
- ],
167
- "Effect": "Allow",
168
- "Resource": "*"
169
- },
170
- {
171
- "Action": [
172
- "xray:PutTraceSegments",
173
- "xray:PutTelemetryRecords"
174
- ],
175
- "Effect": "Allow",
176
- "Resource": "*"
177
- }
178
- ],
179
- "Version": "2012-10-17"
180
- },
181
- "PolicyName": "lammemwithClientPropsLambdaFunctionServiceRoleDefaultPolicy50E02A22",
182
- "Roles": [
183
- {
184
- "Ref": "lammemwithClientPropsLambdaFunctionServiceRole4A4D2BF6"
185
- }
186
- ]
187
- },
188
- "Metadata": {
189
- "cfn_nag": {
190
- "rules_to_suppress": [
191
- {
192
- "id": "W12",
193
- "reason": "Lambda needs the following minimum required permissions to send trace data to X-Ray and access ENIs in a VPC."
194
- }
195
- ]
196
- }
197
- }
198
- },
199
- "lammemwithClientPropsReplaceDefaultSecurityGroupsecuritygroup8BCBDD33": {
200
- "Type": "AWS::EC2::SecurityGroup",
201
- "Properties": {
202
- "GroupDescription": "lammem-withClientProps/lammem-withClientProps/ReplaceDefaultSecurityGroup-security-group",
203
- "SecurityGroupEgress": [
204
- {
205
- "CidrIp": "0.0.0.0/0",
206
- "Description": "Allow all outbound traffic by default",
207
- "IpProtocol": "-1"
208
- }
209
- ],
210
- "VpcId": {
211
- "Ref": "Vpc8378EB38"
212
- }
213
- },
214
- "Metadata": {
215
- "cfn_nag": {
216
- "rules_to_suppress": [
217
- {
218
- "id": "W5",
219
- "reason": "Egress of 0.0.0.0/0 is default and generally considered OK"
220
- },
221
- {
222
- "id": "W40",
223
- "reason": "Egress IPProtocol of -1 is default and generally considered OK"
224
- }
225
- ]
226
- }
227
- }
228
- },
229
- "lammemwithClientPropsLambdaFunction28E6BF2F": {
230
- "Type": "AWS::Lambda::Function",
231
- "Properties": {
232
- "Code": {
233
- "S3Bucket": {
234
- "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
235
- },
236
- "S3Key": "c1b23d6af38c04acb744bda25a3dc7f4394daea942c67eaff40911a707a3c37a.zip"
237
- },
238
- "Environment": {
239
- "Variables": {
240
- "AWS_NODEJS_CONNECTION_REUSE_ENABLED": "1",
241
- "CACHE_ENDPOINT": {
242
- "Fn::Join": [
243
- "",
244
- [
245
- {
246
- "Fn::GetAtt": [
247
- "lammemwithClientPropslammemwithClientPropscluster6611E8C2",
248
- "ConfigurationEndpoint.Address"
249
- ]
250
- },
251
- ":",
252
- {
253
- "Fn::GetAtt": [
254
- "lammemwithClientPropslammemwithClientPropscluster6611E8C2",
255
- "ConfigurationEndpoint.Port"
256
- ]
257
- }
258
- ]
259
- ]
260
- }
261
- }
262
- },
263
- "Handler": "index.handler",
264
- "Role": {
265
- "Fn::GetAtt": [
266
- "lammemwithClientPropsLambdaFunctionServiceRole4A4D2BF6",
267
- "Arn"
268
- ]
269
- },
270
- "Runtime": "nodejs16.x",
271
- "TracingConfig": {
272
- "Mode": "Active"
273
- },
274
- "VpcConfig": {
275
- "SecurityGroupIds": [
276
- {
277
- "Fn::GetAtt": [
278
- "lammemwithClientPropslammemwithClientPropscachesgF0194DF0",
279
- "GroupId"
280
- ]
281
- },
282
- {
283
- "Fn::GetAtt": [
284
- "lammemwithClientPropsReplaceDefaultSecurityGroupsecuritygroup8BCBDD33",
285
- "GroupId"
286
- ]
287
- }
288
- ],
289
- "SubnetIds": [
290
- {
291
- "Ref": "VpcisolatedSubnet1SubnetE62B1B9B"
292
- },
293
- {
294
- "Ref": "VpcisolatedSubnet2Subnet39217055"
295
- },
296
- {
297
- "Ref": "VpcisolatedSubnet3Subnet44F2537D"
298
- }
299
- ]
300
- }
301
- },
302
- "DependsOn": [
303
- "lammemwithClientPropsLambdaFunctionServiceRoleDefaultPolicy50E02A22",
304
- "lammemwithClientPropsLambdaFunctionServiceRole4A4D2BF6",
305
- "VpcisolatedSubnet1RouteTableAssociationD259E31A",
306
- "VpcisolatedSubnet2RouteTableAssociation25A4716F",
307
- "VpcisolatedSubnet3RouteTableAssociationDC010BEB"
308
- ],
309
- "Metadata": {
310
- "cfn_nag": {
311
- "rules_to_suppress": [
312
- {
313
- "id": "W58",
314
- "reason": "Lambda functions has the required permission to write CloudWatch Logs. It uses custom policy instead of arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole with tighter permissions."
315
- },
316
- {
317
- "id": "W89",
318
- "reason": "This is not a rule for the general case, just for specific use cases/industries"
319
- },
320
- {
321
- "id": "W92",
322
- "reason": "Impossible for us to define the correct concurrency for clients"
323
- }
324
- ]
325
- }
326
- }
327
- },
328
- "Vpc8378EB38": {
329
- "Type": "AWS::EC2::VPC",
330
- "Properties": {
331
- "CidrBlock": "192.68.0.0/16",
332
- "EnableDnsHostnames": true,
333
- "EnableDnsSupport": true,
334
- "InstanceTenancy": "default",
335
- "Tags": [
336
- {
337
- "Key": "Name",
338
- "Value": "lammem-withClientProps/Vpc"
339
- }
340
- ]
341
- }
342
- },
343
- "VpcisolatedSubnet1SubnetE62B1B9B": {
344
- "Type": "AWS::EC2::Subnet",
345
- "Properties": {
346
- "AvailabilityZone": "test-region-1a",
347
- "CidrBlock": "192.68.0.0/18",
348
- "MapPublicIpOnLaunch": false,
349
- "Tags": [
350
- {
351
- "Key": "aws-cdk:subnet-name",
352
- "Value": "isolated"
353
- },
354
- {
355
- "Key": "aws-cdk:subnet-type",
356
- "Value": "Isolated"
357
- },
358
- {
359
- "Key": "Name",
360
- "Value": "lammem-withClientProps/Vpc/isolatedSubnet1"
361
- }
362
- ],
363
- "VpcId": {
364
- "Ref": "Vpc8378EB38"
365
- }
366
- }
367
- },
368
- "VpcisolatedSubnet1RouteTableE442650B": {
369
- "Type": "AWS::EC2::RouteTable",
370
- "Properties": {
371
- "Tags": [
372
- {
373
- "Key": "Name",
374
- "Value": "lammem-withClientProps/Vpc/isolatedSubnet1"
375
- }
376
- ],
377
- "VpcId": {
378
- "Ref": "Vpc8378EB38"
379
- }
380
- }
381
- },
382
- "VpcisolatedSubnet1RouteTableAssociationD259E31A": {
383
- "Type": "AWS::EC2::SubnetRouteTableAssociation",
384
- "Properties": {
385
- "RouteTableId": {
386
- "Ref": "VpcisolatedSubnet1RouteTableE442650B"
387
- },
388
- "SubnetId": {
389
- "Ref": "VpcisolatedSubnet1SubnetE62B1B9B"
390
- }
391
- }
392
- },
393
- "VpcisolatedSubnet2Subnet39217055": {
394
- "Type": "AWS::EC2::Subnet",
395
- "Properties": {
396
- "AvailabilityZone": "test-region-1b",
397
- "CidrBlock": "192.68.64.0/18",
398
- "MapPublicIpOnLaunch": false,
399
- "Tags": [
400
- {
401
- "Key": "aws-cdk:subnet-name",
402
- "Value": "isolated"
403
- },
404
- {
405
- "Key": "aws-cdk:subnet-type",
406
- "Value": "Isolated"
407
- },
408
- {
409
- "Key": "Name",
410
- "Value": "lammem-withClientProps/Vpc/isolatedSubnet2"
411
- }
412
- ],
413
- "VpcId": {
414
- "Ref": "Vpc8378EB38"
415
- }
416
- }
417
- },
418
- "VpcisolatedSubnet2RouteTable334F9764": {
419
- "Type": "AWS::EC2::RouteTable",
420
- "Properties": {
421
- "Tags": [
422
- {
423
- "Key": "Name",
424
- "Value": "lammem-withClientProps/Vpc/isolatedSubnet2"
425
- }
426
- ],
427
- "VpcId": {
428
- "Ref": "Vpc8378EB38"
429
- }
430
- }
431
- },
432
- "VpcisolatedSubnet2RouteTableAssociation25A4716F": {
433
- "Type": "AWS::EC2::SubnetRouteTableAssociation",
434
- "Properties": {
435
- "RouteTableId": {
436
- "Ref": "VpcisolatedSubnet2RouteTable334F9764"
437
- },
438
- "SubnetId": {
439
- "Ref": "VpcisolatedSubnet2Subnet39217055"
440
- }
441
- }
442
- },
443
- "VpcisolatedSubnet3Subnet44F2537D": {
444
- "Type": "AWS::EC2::Subnet",
445
- "Properties": {
446
- "AvailabilityZone": "test-region-1c",
447
- "CidrBlock": "192.68.128.0/18",
448
- "MapPublicIpOnLaunch": false,
449
- "Tags": [
450
- {
451
- "Key": "aws-cdk:subnet-name",
452
- "Value": "isolated"
453
- },
454
- {
455
- "Key": "aws-cdk:subnet-type",
456
- "Value": "Isolated"
457
- },
458
- {
459
- "Key": "Name",
460
- "Value": "lammem-withClientProps/Vpc/isolatedSubnet3"
461
- }
462
- ],
463
- "VpcId": {
464
- "Ref": "Vpc8378EB38"
465
- }
466
- }
467
- },
468
- "VpcisolatedSubnet3RouteTableA2F6BBC0": {
469
- "Type": "AWS::EC2::RouteTable",
470
- "Properties": {
471
- "Tags": [
472
- {
473
- "Key": "Name",
474
- "Value": "lammem-withClientProps/Vpc/isolatedSubnet3"
475
- }
476
- ],
477
- "VpcId": {
478
- "Ref": "Vpc8378EB38"
479
- }
480
- }
481
- },
482
- "VpcisolatedSubnet3RouteTableAssociationDC010BEB": {
483
- "Type": "AWS::EC2::SubnetRouteTableAssociation",
484
- "Properties": {
485
- "RouteTableId": {
486
- "Ref": "VpcisolatedSubnet3RouteTableA2F6BBC0"
487
- },
488
- "SubnetId": {
489
- "Ref": "VpcisolatedSubnet3Subnet44F2537D"
490
- }
491
- }
492
- },
493
- "VpcFlowLogIAMRole6A475D41": {
494
- "Type": "AWS::IAM::Role",
495
- "Properties": {
496
- "AssumeRolePolicyDocument": {
497
- "Statement": [
498
- {
499
- "Action": "sts:AssumeRole",
500
- "Effect": "Allow",
501
- "Principal": {
502
- "Service": "vpc-flow-logs.amazonaws.com"
503
- }
504
- }
505
- ],
506
- "Version": "2012-10-17"
507
- },
508
- "Tags": [
509
- {
510
- "Key": "Name",
511
- "Value": "lammem-withClientProps/Vpc/FlowLog"
512
- }
513
- ]
514
- }
515
- },
516
- "VpcFlowLogIAMRoleDefaultPolicy406FB995": {
517
- "Type": "AWS::IAM::Policy",
518
- "Properties": {
519
- "PolicyDocument": {
520
- "Statement": [
521
- {
522
- "Action": [
523
- "logs:CreateLogStream",
524
- "logs:PutLogEvents",
525
- "logs:DescribeLogStreams"
526
- ],
527
- "Effect": "Allow",
528
- "Resource": {
529
- "Fn::GetAtt": [
530
- "VpcFlowLogLogGroup7B5C56B9",
531
- "Arn"
532
- ]
533
- }
534
- },
535
- {
536
- "Action": "iam:PassRole",
537
- "Effect": "Allow",
538
- "Resource": {
539
- "Fn::GetAtt": [
540
- "VpcFlowLogIAMRole6A475D41",
541
- "Arn"
542
- ]
543
- }
544
- }
545
- ],
546
- "Version": "2012-10-17"
547
- },
548
- "PolicyName": "VpcFlowLogIAMRoleDefaultPolicy406FB995",
549
- "Roles": [
550
- {
551
- "Ref": "VpcFlowLogIAMRole6A475D41"
552
- }
553
- ]
554
- }
555
- },
556
- "VpcFlowLogLogGroup7B5C56B9": {
557
- "Type": "AWS::Logs::LogGroup",
558
- "Properties": {
559
- "RetentionInDays": 731,
560
- "Tags": [
561
- {
562
- "Key": "Name",
563
- "Value": "lammem-withClientProps/Vpc/FlowLog"
564
- }
565
- ]
566
- },
567
- "UpdateReplacePolicy": "Retain",
568
- "DeletionPolicy": "Retain",
569
- "Metadata": {
570
- "cfn_nag": {
571
- "rules_to_suppress": [
572
- {
573
- "id": "W84",
574
- "reason": "By default CloudWatchLogs LogGroups data is encrypted using the CloudWatch server-side encryption keys (AWS Managed Keys)"
575
- }
576
- ]
577
- }
578
- }
579
- },
580
- "VpcFlowLog8FF33A73": {
581
- "Type": "AWS::EC2::FlowLog",
582
- "Properties": {
583
- "DeliverLogsPermissionArn": {
584
- "Fn::GetAtt": [
585
- "VpcFlowLogIAMRole6A475D41",
586
- "Arn"
587
- ]
588
- },
589
- "LogDestinationType": "cloud-watch-logs",
590
- "LogGroupName": {
591
- "Ref": "VpcFlowLogLogGroup7B5C56B9"
592
- },
593
- "ResourceId": {
594
- "Ref": "Vpc8378EB38"
595
- },
596
- "ResourceType": "VPC",
597
- "Tags": [
598
- {
599
- "Key": "Name",
600
- "Value": "lammem-withClientProps/Vpc/FlowLog"
601
- }
602
- ],
603
- "TrafficType": "ALL"
604
- }
605
- }
606
- },
607
- "Parameters": {
608
- "BootstrapVersion": {
609
- "Type": "AWS::SSM::Parameter::Value<String>",
610
- "Default": "/cdk-bootstrap/hnb659fds/version",
611
- "Description": "Version of the CDK Bootstrap resources in this environment, automatically retrieved from SSM Parameter Store. [cdk:skip]"
612
- }
613
- },
614
- "Rules": {
615
- "CheckBootstrapVersion": {
616
- "Assertions": [
617
- {
618
- "Assert": {
619
- "Fn::Not": [
620
- {
621
- "Fn::Contains": [
622
- [
623
- "1",
624
- "2",
625
- "3",
626
- "4",
627
- "5"
628
- ],
629
- {
630
- "Ref": "BootstrapVersion"
631
- }
632
- ]
633
- }
634
- ]
635
- },
636
- "AssertDescription": "CDK bootstrap stack version 6 required. Please run 'cdk bootstrap' with a recent version of the CDK CLI."
637
- }
638
- ]
639
- }
640
- }
641
- }