@aws-solutions-constructs/aws-lambda-elasticachememcached 2.51.0 → 2.52.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (44) hide show
  1. package/.eslintignore +2 -0
  2. package/.jsii +49 -4
  3. package/integ.config.json +7 -0
  4. package/lib/index.js +1 -1
  5. package/package.json +9 -8
  6. package/test/integ.lammem-existingResources.js +6 -2
  7. package/test/integ.lammem-existingResources.js.snapshot/asset.c1b23d6af38c04acb744bda25a3dc7f4394daea942c67eaff40911a707a3c37a/index.js +8 -0
  8. package/test/integ.lammem-existingResources.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/__entrypoint__.js +1 -0
  9. package/test/integ.lammem-existingResources.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/index.js +1 -0
  10. package/test/integ.lammem-existingResources.js.snapshot/cdk.out +1 -0
  11. package/test/integ.lammem-existingResources.js.snapshot/integ.json +12 -0
  12. package/test/integ.lammem-existingResources.js.snapshot/lammem-existingResources.assets.json +45 -0
  13. package/test/integ.lammem-existingResources.js.snapshot/lammem-existingResources.template.json +720 -0
  14. package/test/integ.lammem-existingResources.js.snapshot/lammemexistingResourcesIntegDefaultTestDeployAssertD269DF67.assets.json +19 -0
  15. package/test/integ.lammem-existingResources.js.snapshot/lammemexistingResourcesIntegDefaultTestDeployAssertD269DF67.template.json +36 -0
  16. package/test/integ.lammem-existingResources.js.snapshot/manifest.json +239 -0
  17. package/test/integ.lammem-existingResources.js.snapshot/tree.json +947 -0
  18. package/test/integ.lammem-newResources.js +6 -2
  19. package/test/integ.lammem-newResources.js.snapshot/asset.c1b23d6af38c04acb744bda25a3dc7f4394daea942c67eaff40911a707a3c37a/index.js +8 -0
  20. package/test/integ.lammem-newResources.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/__entrypoint__.js +1 -0
  21. package/test/integ.lammem-newResources.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/index.js +1 -0
  22. package/test/integ.lammem-newResources.js.snapshot/cdk.out +1 -0
  23. package/test/integ.lammem-newResources.js.snapshot/integ.json +12 -0
  24. package/test/integ.lammem-newResources.js.snapshot/lammem-newResources.assets.json +45 -0
  25. package/test/integ.lammem-newResources.js.snapshot/lammem-newResources.template.json +726 -0
  26. package/test/integ.lammem-newResources.js.snapshot/lammemnewResourcesIntegDefaultTestDeployAssert30C906BF.assets.json +19 -0
  27. package/test/integ.lammem-newResources.js.snapshot/lammemnewResourcesIntegDefaultTestDeployAssert30C906BF.template.json +36 -0
  28. package/test/integ.lammem-newResources.js.snapshot/manifest.json +239 -0
  29. package/test/integ.lammem-newResources.js.snapshot/tree.json +966 -0
  30. package/test/integ.lammem-withClientProps.js +6 -2
  31. package/test/integ.lammem-withClientProps.js.snapshot/asset.c1b23d6af38c04acb744bda25a3dc7f4394daea942c67eaff40911a707a3c37a/index.js +8 -0
  32. package/test/integ.lammem-withClientProps.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/__entrypoint__.js +1 -0
  33. package/test/integ.lammem-withClientProps.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/index.js +1 -0
  34. package/test/integ.lammem-withClientProps.js.snapshot/cdk.out +1 -0
  35. package/test/integ.lammem-withClientProps.js.snapshot/integ.json +12 -0
  36. package/test/integ.lammem-withClientProps.js.snapshot/lammem-withClientProps.assets.json +45 -0
  37. package/test/integ.lammem-withClientProps.js.snapshot/lammem-withClientProps.template.json +726 -0
  38. package/test/integ.lammem-withClientProps.js.snapshot/lammemwithClientPropsIntegDefaultTestDeployAssertDB086BD1.assets.json +19 -0
  39. package/test/integ.lammem-withClientProps.js.snapshot/lammemwithClientPropsIntegDefaultTestDeployAssertDB086BD1.template.json +36 -0
  40. package/test/integ.lammem-withClientProps.js.snapshot/manifest.json +239 -0
  41. package/test/integ.lammem-withClientProps.js.snapshot/tree.json +966 -0
  42. package/test/integ.lammem-existingResources.expected.json +0 -630
  43. package/test/integ.lammem-newResources.expected.json +0 -641
  44. package/test/integ.lammem-withClientProps.expected.json +0 -641
@@ -1,630 +0,0 @@
1
- {
2
- "Description": "Integration Test with existing vpc, Lambda function and cache",
3
- "Resources": {
4
- "Vpc8378EB38": {
5
- "Type": "AWS::EC2::VPC",
6
- "Properties": {
7
- "CidrBlock": "172.168.0.0/16",
8
- "EnableDnsHostnames": true,
9
- "EnableDnsSupport": true,
10
- "InstanceTenancy": "default",
11
- "Tags": [
12
- {
13
- "Key": "Name",
14
- "Value": "lammem-existingResources/Vpc"
15
- }
16
- ]
17
- }
18
- },
19
- "VpcisolatedSubnet1SubnetE62B1B9B": {
20
- "Type": "AWS::EC2::Subnet",
21
- "Properties": {
22
- "AvailabilityZone": "test-region-1a",
23
- "CidrBlock": "172.168.0.0/18",
24
- "MapPublicIpOnLaunch": false,
25
- "Tags": [
26
- {
27
- "Key": "aws-cdk:subnet-name",
28
- "Value": "isolated"
29
- },
30
- {
31
- "Key": "aws-cdk:subnet-type",
32
- "Value": "Isolated"
33
- },
34
- {
35
- "Key": "Name",
36
- "Value": "lammem-existingResources/Vpc/isolatedSubnet1"
37
- }
38
- ],
39
- "VpcId": {
40
- "Ref": "Vpc8378EB38"
41
- }
42
- }
43
- },
44
- "VpcisolatedSubnet1RouteTableE442650B": {
45
- "Type": "AWS::EC2::RouteTable",
46
- "Properties": {
47
- "Tags": [
48
- {
49
- "Key": "Name",
50
- "Value": "lammem-existingResources/Vpc/isolatedSubnet1"
51
- }
52
- ],
53
- "VpcId": {
54
- "Ref": "Vpc8378EB38"
55
- }
56
- }
57
- },
58
- "VpcisolatedSubnet1RouteTableAssociationD259E31A": {
59
- "Type": "AWS::EC2::SubnetRouteTableAssociation",
60
- "Properties": {
61
- "RouteTableId": {
62
- "Ref": "VpcisolatedSubnet1RouteTableE442650B"
63
- },
64
- "SubnetId": {
65
- "Ref": "VpcisolatedSubnet1SubnetE62B1B9B"
66
- }
67
- }
68
- },
69
- "VpcisolatedSubnet2Subnet39217055": {
70
- "Type": "AWS::EC2::Subnet",
71
- "Properties": {
72
- "AvailabilityZone": "test-region-1b",
73
- "CidrBlock": "172.168.64.0/18",
74
- "MapPublicIpOnLaunch": false,
75
- "Tags": [
76
- {
77
- "Key": "aws-cdk:subnet-name",
78
- "Value": "isolated"
79
- },
80
- {
81
- "Key": "aws-cdk:subnet-type",
82
- "Value": "Isolated"
83
- },
84
- {
85
- "Key": "Name",
86
- "Value": "lammem-existingResources/Vpc/isolatedSubnet2"
87
- }
88
- ],
89
- "VpcId": {
90
- "Ref": "Vpc8378EB38"
91
- }
92
- }
93
- },
94
- "VpcisolatedSubnet2RouteTable334F9764": {
95
- "Type": "AWS::EC2::RouteTable",
96
- "Properties": {
97
- "Tags": [
98
- {
99
- "Key": "Name",
100
- "Value": "lammem-existingResources/Vpc/isolatedSubnet2"
101
- }
102
- ],
103
- "VpcId": {
104
- "Ref": "Vpc8378EB38"
105
- }
106
- }
107
- },
108
- "VpcisolatedSubnet2RouteTableAssociation25A4716F": {
109
- "Type": "AWS::EC2::SubnetRouteTableAssociation",
110
- "Properties": {
111
- "RouteTableId": {
112
- "Ref": "VpcisolatedSubnet2RouteTable334F9764"
113
- },
114
- "SubnetId": {
115
- "Ref": "VpcisolatedSubnet2Subnet39217055"
116
- }
117
- }
118
- },
119
- "VpcisolatedSubnet3Subnet44F2537D": {
120
- "Type": "AWS::EC2::Subnet",
121
- "Properties": {
122
- "AvailabilityZone": "test-region-1c",
123
- "CidrBlock": "172.168.128.0/18",
124
- "MapPublicIpOnLaunch": false,
125
- "Tags": [
126
- {
127
- "Key": "aws-cdk:subnet-name",
128
- "Value": "isolated"
129
- },
130
- {
131
- "Key": "aws-cdk:subnet-type",
132
- "Value": "Isolated"
133
- },
134
- {
135
- "Key": "Name",
136
- "Value": "lammem-existingResources/Vpc/isolatedSubnet3"
137
- }
138
- ],
139
- "VpcId": {
140
- "Ref": "Vpc8378EB38"
141
- }
142
- }
143
- },
144
- "VpcisolatedSubnet3RouteTableA2F6BBC0": {
145
- "Type": "AWS::EC2::RouteTable",
146
- "Properties": {
147
- "Tags": [
148
- {
149
- "Key": "Name",
150
- "Value": "lammem-existingResources/Vpc/isolatedSubnet3"
151
- }
152
- ],
153
- "VpcId": {
154
- "Ref": "Vpc8378EB38"
155
- }
156
- }
157
- },
158
- "VpcisolatedSubnet3RouteTableAssociationDC010BEB": {
159
- "Type": "AWS::EC2::SubnetRouteTableAssociation",
160
- "Properties": {
161
- "RouteTableId": {
162
- "Ref": "VpcisolatedSubnet3RouteTableA2F6BBC0"
163
- },
164
- "SubnetId": {
165
- "Ref": "VpcisolatedSubnet3Subnet44F2537D"
166
- }
167
- }
168
- },
169
- "VpcFlowLogIAMRole6A475D41": {
170
- "Type": "AWS::IAM::Role",
171
- "Properties": {
172
- "AssumeRolePolicyDocument": {
173
- "Statement": [
174
- {
175
- "Action": "sts:AssumeRole",
176
- "Effect": "Allow",
177
- "Principal": {
178
- "Service": "vpc-flow-logs.amazonaws.com"
179
- }
180
- }
181
- ],
182
- "Version": "2012-10-17"
183
- },
184
- "Tags": [
185
- {
186
- "Key": "Name",
187
- "Value": "lammem-existingResources/Vpc/FlowLog"
188
- }
189
- ]
190
- }
191
- },
192
- "VpcFlowLogIAMRoleDefaultPolicy406FB995": {
193
- "Type": "AWS::IAM::Policy",
194
- "Properties": {
195
- "PolicyDocument": {
196
- "Statement": [
197
- {
198
- "Action": [
199
- "logs:CreateLogStream",
200
- "logs:PutLogEvents",
201
- "logs:DescribeLogStreams"
202
- ],
203
- "Effect": "Allow",
204
- "Resource": {
205
- "Fn::GetAtt": [
206
- "VpcFlowLogLogGroup7B5C56B9",
207
- "Arn"
208
- ]
209
- }
210
- },
211
- {
212
- "Action": "iam:PassRole",
213
- "Effect": "Allow",
214
- "Resource": {
215
- "Fn::GetAtt": [
216
- "VpcFlowLogIAMRole6A475D41",
217
- "Arn"
218
- ]
219
- }
220
- }
221
- ],
222
- "Version": "2012-10-17"
223
- },
224
- "PolicyName": "VpcFlowLogIAMRoleDefaultPolicy406FB995",
225
- "Roles": [
226
- {
227
- "Ref": "VpcFlowLogIAMRole6A475D41"
228
- }
229
- ]
230
- }
231
- },
232
- "VpcFlowLogLogGroup7B5C56B9": {
233
- "Type": "AWS::Logs::LogGroup",
234
- "Properties": {
235
- "RetentionInDays": 731,
236
- "Tags": [
237
- {
238
- "Key": "Name",
239
- "Value": "lammem-existingResources/Vpc/FlowLog"
240
- }
241
- ]
242
- },
243
- "UpdateReplacePolicy": "Retain",
244
- "DeletionPolicy": "Retain",
245
- "Metadata": {
246
- "cfn_nag": {
247
- "rules_to_suppress": [
248
- {
249
- "id": "W84",
250
- "reason": "By default CloudWatchLogs LogGroups data is encrypted using the CloudWatch server-side encryption keys (AWS Managed Keys)"
251
- }
252
- ]
253
- }
254
- }
255
- },
256
- "VpcFlowLog8FF33A73": {
257
- "Type": "AWS::EC2::FlowLog",
258
- "Properties": {
259
- "DeliverLogsPermissionArn": {
260
- "Fn::GetAtt": [
261
- "VpcFlowLogIAMRole6A475D41",
262
- "Arn"
263
- ]
264
- },
265
- "LogDestinationType": "cloud-watch-logs",
266
- "LogGroupName": {
267
- "Ref": "VpcFlowLogLogGroup7B5C56B9"
268
- },
269
- "ResourceId": {
270
- "Ref": "Vpc8378EB38"
271
- },
272
- "ResourceType": "VPC",
273
- "Tags": [
274
- {
275
- "Key": "Name",
276
- "Value": "lammem-existingResources/Vpc/FlowLog"
277
- }
278
- ],
279
- "TrafficType": "ALL"
280
- }
281
- },
282
- "testsgsecuritygroup89DCF621": {
283
- "Type": "AWS::EC2::SecurityGroup",
284
- "Properties": {
285
- "GroupDescription": "lammem-existingResources/test-sg-security-group",
286
- "SecurityGroupEgress": [
287
- {
288
- "CidrIp": "0.0.0.0/0",
289
- "Description": "Allow all outbound traffic by default",
290
- "IpProtocol": "-1"
291
- }
292
- ],
293
- "VpcId": {
294
- "Ref": "Vpc8378EB38"
295
- }
296
- },
297
- "Metadata": {
298
- "cfn_nag": {
299
- "rules_to_suppress": [
300
- {
301
- "id": "W5",
302
- "reason": "Egress of 0.0.0.0/0 is default and generally considered OK"
303
- },
304
- {
305
- "id": "W40",
306
- "reason": "Egress IPProtocol of -1 is default and generally considered OK"
307
- }
308
- ]
309
- }
310
- }
311
- },
312
- "testfunctionServiceRoleFB85AD63": {
313
- "Type": "AWS::IAM::Role",
314
- "Properties": {
315
- "AssumeRolePolicyDocument": {
316
- "Statement": [
317
- {
318
- "Action": "sts:AssumeRole",
319
- "Effect": "Allow",
320
- "Principal": {
321
- "Service": "lambda.amazonaws.com"
322
- }
323
- }
324
- ],
325
- "Version": "2012-10-17"
326
- },
327
- "ManagedPolicyArns": [
328
- {
329
- "Fn::Join": [
330
- "",
331
- [
332
- "arn:",
333
- {
334
- "Ref": "AWS::Partition"
335
- },
336
- ":iam::aws:policy/service-role/AWSLambdaBasicExecutionRole"
337
- ]
338
- ]
339
- },
340
- {
341
- "Fn::Join": [
342
- "",
343
- [
344
- "arn:",
345
- {
346
- "Ref": "AWS::Partition"
347
- },
348
- ":iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole"
349
- ]
350
- ]
351
- }
352
- ]
353
- },
354
- "DependsOn": [
355
- "VpcisolatedSubnet1RouteTableAssociationD259E31A",
356
- "VpcisolatedSubnet2RouteTableAssociation25A4716F",
357
- "VpcisolatedSubnet3RouteTableAssociationDC010BEB"
358
- ]
359
- },
360
- "testfunction5B23D3B0": {
361
- "Type": "AWS::Lambda::Function",
362
- "Properties": {
363
- "Code": {
364
- "S3Bucket": {
365
- "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
366
- },
367
- "S3Key": "c1b23d6af38c04acb744bda25a3dc7f4394daea942c67eaff40911a707a3c37a.zip"
368
- },
369
- "Environment": {
370
- "Variables": {
371
- "CACHE_ENDPOINT": {
372
- "Fn::Join": [
373
- "",
374
- [
375
- {
376
- "Fn::GetAtt": [
377
- "testcachecluster",
378
- "ConfigurationEndpoint.Address"
379
- ]
380
- },
381
- ":",
382
- {
383
- "Fn::GetAtt": [
384
- "testcachecluster",
385
- "ConfigurationEndpoint.Port"
386
- ]
387
- }
388
- ]
389
- ]
390
- }
391
- }
392
- },
393
- "Handler": "index.handler",
394
- "Role": {
395
- "Fn::GetAtt": [
396
- "testfunctionServiceRoleFB85AD63",
397
- "Arn"
398
- ]
399
- },
400
- "Runtime": "nodejs16.x",
401
- "VpcConfig": {
402
- "SecurityGroupIds": [
403
- {
404
- "Fn::GetAtt": [
405
- "testsgsecuritygroup89DCF621",
406
- "GroupId"
407
- ]
408
- },
409
- {
410
- "Fn::GetAtt": [
411
- "lammemexistingResourceslammemexistingResourcescachesg832A8E40",
412
- "GroupId"
413
- ]
414
- }
415
- ],
416
- "SubnetIds": [
417
- {
418
- "Ref": "VpcisolatedSubnet1SubnetE62B1B9B"
419
- },
420
- {
421
- "Ref": "VpcisolatedSubnet2Subnet39217055"
422
- },
423
- {
424
- "Ref": "VpcisolatedSubnet3Subnet44F2537D"
425
- }
426
- ]
427
- }
428
- },
429
- "DependsOn": [
430
- "testfunctionServiceRoleFB85AD63",
431
- "VpcisolatedSubnet1RouteTableAssociationD259E31A",
432
- "VpcisolatedSubnet2RouteTableAssociation25A4716F",
433
- "VpcisolatedSubnet3RouteTableAssociationDC010BEB"
434
- ],
435
- "Metadata": {
436
- "cfn_nag": {
437
- "rules_to_suppress": [
438
- {
439
- "id": "W58",
440
- "reason": "Test Resource"
441
- },
442
- {
443
- "id": "W92",
444
- "reason": "Test Resource"
445
- }
446
- ]
447
- }
448
- }
449
- },
450
- "ecsubnetgrouptestcache": {
451
- "Type": "AWS::ElastiCache::SubnetGroup",
452
- "Properties": {
453
- "CacheSubnetGroupName": "test-cache-subnet-group",
454
- "Description": "Solutions Constructs generated Cache Subnet Group",
455
- "SubnetIds": [
456
- {
457
- "Ref": "VpcisolatedSubnet1SubnetE62B1B9B"
458
- },
459
- {
460
- "Ref": "VpcisolatedSubnet2Subnet39217055"
461
- },
462
- {
463
- "Ref": "VpcisolatedSubnet3Subnet44F2537D"
464
- }
465
- ]
466
- }
467
- },
468
- "testcachecachesg7265880E": {
469
- "Type": "AWS::EC2::SecurityGroup",
470
- "Properties": {
471
- "GroupDescription": "lammem-existingResources/test-cache-cachesg",
472
- "SecurityGroupEgress": [
473
- {
474
- "CidrIp": "0.0.0.0/0",
475
- "Description": "Allow all outbound traffic by default",
476
- "IpProtocol": "-1"
477
- }
478
- ],
479
- "VpcId": {
480
- "Ref": "Vpc8378EB38"
481
- }
482
- },
483
- "Metadata": {
484
- "cfn_nag": {
485
- "rules_to_suppress": [
486
- {
487
- "id": "W40",
488
- "reason": "Test Resource"
489
- },
490
- {
491
- "id": "W5",
492
- "reason": "Test Resource"
493
- },
494
- {
495
- "id": "W36",
496
- "reason": "Test Resource"
497
- }
498
- ]
499
- }
500
- }
501
- },
502
- "testcachecluster": {
503
- "Type": "AWS::ElastiCache::CacheCluster",
504
- "Properties": {
505
- "AZMode": "cross-az",
506
- "CacheNodeType": "cache.t3.medium",
507
- "CacheSubnetGroupName": "test-cache-subnet-group",
508
- "ClusterName": "test-cache-cdk-cluster",
509
- "Engine": "memcached",
510
- "NumCacheNodes": 2,
511
- "Port": 11222,
512
- "VpcSecurityGroupIds": [
513
- {
514
- "Fn::GetAtt": [
515
- "testcachecachesg7265880E",
516
- "GroupId"
517
- ]
518
- },
519
- {
520
- "Fn::GetAtt": [
521
- "lammemexistingResourceslammemexistingResourcescachesg832A8E40",
522
- "GroupId"
523
- ]
524
- }
525
- ]
526
- },
527
- "DependsOn": [
528
- "ecsubnetgrouptestcache"
529
- ]
530
- },
531
- "lammemexistingResourceslammemexistingResourcescachesg832A8E40": {
532
- "Type": "AWS::EC2::SecurityGroup",
533
- "Properties": {
534
- "GroupDescription": "lammem-existingResources/lammem-existingResources/lammem-existingResources-cachesg",
535
- "SecurityGroupEgress": [
536
- {
537
- "CidrIp": "0.0.0.0/0",
538
- "Description": "Allow all outbound traffic by default",
539
- "IpProtocol": "-1"
540
- }
541
- ],
542
- "VpcId": {
543
- "Ref": "Vpc8378EB38"
544
- }
545
- },
546
- "Metadata": {
547
- "cfn_nag": {
548
- "rules_to_suppress": [
549
- {
550
- "id": "W5",
551
- "reason": "Egress of 0.0.0.0/0 is default and generally considered OK"
552
- },
553
- {
554
- "id": "W40",
555
- "reason": "Egress IPProtocol of -1 is default and generally considered OK"
556
- }
557
- ]
558
- }
559
- }
560
- },
561
- "lammemexistingResourceslammemexistingResourcesingress225EA10E": {
562
- "Type": "AWS::EC2::SecurityGroupIngress",
563
- "Properties": {
564
- "Description": "Self referencing rule to control access to Elasticache memcached cluster",
565
- "FromPort": {
566
- "Fn::GetAtt": [
567
- "testcachecluster",
568
- "ConfigurationEndpoint.Port"
569
- ]
570
- },
571
- "GroupId": {
572
- "Fn::GetAtt": [
573
- "lammemexistingResourceslammemexistingResourcescachesg832A8E40",
574
- "GroupId"
575
- ]
576
- },
577
- "IpProtocol": "TCP",
578
- "SourceSecurityGroupId": {
579
- "Fn::GetAtt": [
580
- "lammemexistingResourceslammemexistingResourcescachesg832A8E40",
581
- "GroupId"
582
- ]
583
- },
584
- "ToPort": {
585
- "Fn::GetAtt": [
586
- "testcachecluster",
587
- "ConfigurationEndpoint.Port"
588
- ]
589
- }
590
- },
591
- "DependsOn": [
592
- "lammemexistingResourceslammemexistingResourcescachesg832A8E40"
593
- ]
594
- }
595
- },
596
- "Parameters": {
597
- "BootstrapVersion": {
598
- "Type": "AWS::SSM::Parameter::Value<String>",
599
- "Default": "/cdk-bootstrap/hnb659fds/version",
600
- "Description": "Version of the CDK Bootstrap resources in this environment, automatically retrieved from SSM Parameter Store. [cdk:skip]"
601
- }
602
- },
603
- "Rules": {
604
- "CheckBootstrapVersion": {
605
- "Assertions": [
606
- {
607
- "Assert": {
608
- "Fn::Not": [
609
- {
610
- "Fn::Contains": [
611
- [
612
- "1",
613
- "2",
614
- "3",
615
- "4",
616
- "5"
617
- ],
618
- {
619
- "Ref": "BootstrapVersion"
620
- }
621
- ]
622
- }
623
- ]
624
- },
625
- "AssertDescription": "CDK bootstrap stack version 6 required. Please run 'cdk bootstrap' with a recent version of the CDK CLI."
626
- }
627
- ]
628
- }
629
- }
630
- }