@aws-solutions-constructs/aws-lambda-kinesisstreams 2.51.0 → 2.52.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (99) hide show
  1. package/.eslintignore +2 -0
  2. package/.jsii +49 -4
  3. package/integ.config.json +7 -0
  4. package/lib/index.js +1 -1
  5. package/package.json +9 -8
  6. package/test/integ.lamkin-existingLambda.js +5 -2
  7. package/test/integ.lamkin-existingLambda.js.snapshot/asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf/index.mjs +15 -0
  8. package/test/integ.lamkin-existingLambda.js.snapshot/cdk.out +1 -0
  9. package/test/integ.lamkin-existingLambda.js.snapshot/integ.json +12 -0
  10. package/test/integ.lamkin-existingLambda.js.snapshot/lamkin-existingLambda.assets.json +32 -0
  11. package/test/integ.lamkin-existingLambda.js.snapshot/lamkin-existingLambda.template.json +229 -0
  12. package/test/integ.lamkin-existingLambda.js.snapshot/lamkinexistingLambdaIntegDefaultTestDeployAssertD62E9419.assets.json +19 -0
  13. package/test/integ.lamkin-existingLambda.js.snapshot/lamkinexistingLambdaIntegDefaultTestDeployAssertD62E9419.template.json +36 -0
  14. package/test/integ.lamkin-existingLambda.js.snapshot/manifest.json +143 -0
  15. package/test/integ.lamkin-existingLambda.js.snapshot/tree.json +412 -0
  16. package/test/integ.lamkin-existingStream.js +5 -2
  17. package/test/integ.lamkin-existingStream.js.snapshot/asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf/index.mjs +15 -0
  18. package/test/integ.lamkin-existingStream.js.snapshot/cdk.out +1 -0
  19. package/test/integ.lamkin-existingStream.js.snapshot/integ.json +12 -0
  20. package/test/integ.lamkin-existingStream.js.snapshot/lamkin-existingStream.assets.json +32 -0
  21. package/test/integ.lamkin-existingStream.js.snapshot/lamkin-existingStream.template.json +231 -0
  22. package/test/integ.lamkin-existingStream.js.snapshot/lamkinexistingStreamIntegDefaultTestDeployAssert2681B9A2.assets.json +19 -0
  23. package/test/integ.lamkin-existingStream.js.snapshot/lamkinexistingStreamIntegDefaultTestDeployAssert2681B9A2.template.json +36 -0
  24. package/test/integ.lamkin-existingStream.js.snapshot/manifest.json +143 -0
  25. package/test/integ.lamkin-existingStream.js.snapshot/tree.json +414 -0
  26. package/test/integ.lamkin-existingStreamWithCmk.js +5 -2
  27. package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf/index.mjs +15 -0
  28. package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/cdk.out +1 -0
  29. package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/integ.json +12 -0
  30. package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/lamkin-existingStreamWithCmk.assets.json +32 -0
  31. package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/lamkin-existingStreamWithCmk.template.json +285 -0
  32. package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/lamkinexistingStreamWithCmkIntegDefaultTestDeployAssert6EDF4045.assets.json +19 -0
  33. package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/lamkinexistingStreamWithCmkIntegDefaultTestDeployAssert6EDF4045.template.json +36 -0
  34. package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/manifest.json +149 -0
  35. package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/tree.json +484 -0
  36. package/test/integ.lamkin-existingVpc.js +6 -2
  37. package/test/integ.lamkin-existingVpc.js.snapshot/asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf/index.mjs +15 -0
  38. package/test/integ.lamkin-existingVpc.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/__entrypoint__.js +1 -0
  39. package/test/integ.lamkin-existingVpc.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/index.js +1 -0
  40. package/test/integ.lamkin-existingVpc.js.snapshot/cdk.out +1 -0
  41. package/test/integ.lamkin-existingVpc.js.snapshot/integ.json +12 -0
  42. package/test/integ.lamkin-existingVpc.js.snapshot/lamkin-existingVpc.assets.json +45 -0
  43. package/test/integ.lamkin-existingVpc.js.snapshot/lamkin-existingVpc.template.json +1040 -0
  44. package/test/integ.lamkin-existingVpc.js.snapshot/lamkinexistingVpcIntegDefaultTestDeployAssertB97E47BA.assets.json +19 -0
  45. package/test/integ.lamkin-existingVpc.js.snapshot/lamkinexistingVpcIntegDefaultTestDeployAssertB97E47BA.template.json +36 -0
  46. package/test/integ.lamkin-existingVpc.js.snapshot/manifest.json +341 -0
  47. package/test/integ.lamkin-existingVpc.js.snapshot/tree.json +1463 -0
  48. package/test/integ.lamkin-newStreamFromProps.js +5 -2
  49. package/test/integ.lamkin-newStreamFromProps.js.snapshot/asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf/index.mjs +15 -0
  50. package/test/integ.lamkin-newStreamFromProps.js.snapshot/cdk.out +1 -0
  51. package/test/integ.lamkin-newStreamFromProps.js.snapshot/integ.json +12 -0
  52. package/test/integ.lamkin-newStreamFromProps.js.snapshot/lamkin-newStreamFromProps.assets.json +32 -0
  53. package/test/integ.lamkin-newStreamFromProps.js.snapshot/lamkin-newStreamFromProps.template.json +231 -0
  54. package/test/integ.lamkin-newStreamFromProps.js.snapshot/lamkinnewStreamFromPropsIntegDefaultTestDeployAssertC2946F34.assets.json +19 -0
  55. package/test/integ.lamkin-newStreamFromProps.js.snapshot/lamkinnewStreamFromPropsIntegDefaultTestDeployAssertC2946F34.template.json +36 -0
  56. package/test/integ.lamkin-newStreamFromProps.js.snapshot/manifest.json +143 -0
  57. package/test/integ.lamkin-newStreamFromProps.js.snapshot/tree.json +414 -0
  58. package/test/integ.lamkin-newVpc.js +6 -2
  59. package/test/integ.lamkin-newVpc.js.snapshot/asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf/index.mjs +15 -0
  60. package/test/integ.lamkin-newVpc.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/__entrypoint__.js +1 -0
  61. package/test/integ.lamkin-newVpc.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/index.js +1 -0
  62. package/test/integ.lamkin-newVpc.js.snapshot/cdk.out +1 -0
  63. package/test/integ.lamkin-newVpc.js.snapshot/integ.json +12 -0
  64. package/test/integ.lamkin-newVpc.js.snapshot/lamkin-newVpc.assets.json +45 -0
  65. package/test/integ.lamkin-newVpc.js.snapshot/lamkin-newVpc.template.json +756 -0
  66. package/test/integ.lamkin-newVpc.js.snapshot/lamkinnewVpcIntegDefaultTestDeployAssert16AC3D59.assets.json +19 -0
  67. package/test/integ.lamkin-newVpc.js.snapshot/lamkinnewVpcIntegDefaultTestDeployAssert16AC3D59.template.json +36 -0
  68. package/test/integ.lamkin-newVpc.js.snapshot/manifest.json +245 -0
  69. package/test/integ.lamkin-newVpc.js.snapshot/tree.json +1051 -0
  70. package/test/integ.lamkin-newVpcFromProps.js +6 -2
  71. package/test/integ.lamkin-newVpcFromProps.js.snapshot/asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf/index.mjs +15 -0
  72. package/test/integ.lamkin-newVpcFromProps.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/__entrypoint__.js +1 -0
  73. package/test/integ.lamkin-newVpcFromProps.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/index.js +1 -0
  74. package/test/integ.lamkin-newVpcFromProps.js.snapshot/cdk.out +1 -0
  75. package/test/integ.lamkin-newVpcFromProps.js.snapshot/integ.json +12 -0
  76. package/test/integ.lamkin-newVpcFromProps.js.snapshot/lamkin-newVpcFromProps.assets.json +45 -0
  77. package/test/integ.lamkin-newVpcFromProps.js.snapshot/lamkin-newVpcFromProps.template.json +692 -0
  78. package/test/integ.lamkin-newVpcFromProps.js.snapshot/lamkinnewVpcFromPropsIntegDefaultTestDeployAssert95FE0487.assets.json +19 -0
  79. package/test/integ.lamkin-newVpcFromProps.js.snapshot/lamkinnewVpcFromPropsIntegDefaultTestDeployAssert95FE0487.template.json +36 -0
  80. package/test/integ.lamkin-newVpcFromProps.js.snapshot/manifest.json +227 -0
  81. package/test/integ.lamkin-newVpcFromProps.js.snapshot/tree.json +946 -0
  82. package/test/integ.lamkin-noArguments.js +5 -2
  83. package/test/integ.lamkin-noArguments.js.snapshot/asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf/index.mjs +15 -0
  84. package/test/integ.lamkin-noArguments.js.snapshot/cdk.out +1 -0
  85. package/test/integ.lamkin-noArguments.js.snapshot/integ.json +12 -0
  86. package/test/integ.lamkin-noArguments.js.snapshot/lamkin-noArguments.assets.json +32 -0
  87. package/test/integ.lamkin-noArguments.js.snapshot/lamkin-noArguments.template.json +229 -0
  88. package/test/integ.lamkin-noArguments.js.snapshot/lamkinnoArgumentsIntegDefaultTestDeployAssertC0CED4B2.assets.json +19 -0
  89. package/test/integ.lamkin-noArguments.js.snapshot/lamkinnoArgumentsIntegDefaultTestDeployAssertC0CED4B2.template.json +36 -0
  90. package/test/integ.lamkin-noArguments.js.snapshot/manifest.json +143 -0
  91. package/test/integ.lamkin-noArguments.js.snapshot/tree.json +412 -0
  92. package/test/integ.lamkin-existingLambda.expected.json +0 -229
  93. package/test/integ.lamkin-existingStream.expected.json +0 -231
  94. package/test/integ.lamkin-existingStreamWithCmk.expected.json +0 -297
  95. package/test/integ.lamkin-existingVpc.expected.json +0 -1065
  96. package/test/integ.lamkin-newStreamFromProps.expected.json +0 -231
  97. package/test/integ.lamkin-newVpc.expected.json +0 -671
  98. package/test/integ.lamkin-newVpcFromProps.expected.json +0 -557
  99. package/test/integ.lamkin-noArguments.expected.json +0 -229
@@ -1,1065 +0,0 @@
1
- {
2
- "Resources": {
3
- "Vpc8378EB38": {
4
- "Type": "AWS::EC2::VPC",
5
- "Properties": {
6
- "CidrBlock": "10.0.0.0/16",
7
- "EnableDnsHostnames": true,
8
- "EnableDnsSupport": true,
9
- "InstanceTenancy": "default",
10
- "Tags": [
11
- {
12
- "Key": "Name",
13
- "Value": "lamkin-existingVpc/Vpc"
14
- }
15
- ]
16
- }
17
- },
18
- "VpcPublicSubnet1Subnet5C2D37C4": {
19
- "Type": "AWS::EC2::Subnet",
20
- "Properties": {
21
- "AvailabilityZone": "test-region-1a",
22
- "CidrBlock": "10.0.0.0/19",
23
- "MapPublicIpOnLaunch": true,
24
- "Tags": [
25
- {
26
- "Key": "aws-cdk:subnet-name",
27
- "Value": "Public"
28
- },
29
- {
30
- "Key": "aws-cdk:subnet-type",
31
- "Value": "Public"
32
- },
33
- {
34
- "Key": "Name",
35
- "Value": "lamkin-existingVpc/Vpc/PublicSubnet1"
36
- }
37
- ],
38
- "VpcId": {
39
- "Ref": "Vpc8378EB38"
40
- }
41
- },
42
- "Metadata": {
43
- "cfn_nag": {
44
- "rules_to_suppress": [
45
- {
46
- "id": "W33",
47
- "reason": "Allow Public Subnets to have MapPublicIpOnLaunch set to true"
48
- }
49
- ]
50
- }
51
- }
52
- },
53
- "VpcPublicSubnet1RouteTable6C95E38E": {
54
- "Type": "AWS::EC2::RouteTable",
55
- "Properties": {
56
- "Tags": [
57
- {
58
- "Key": "Name",
59
- "Value": "lamkin-existingVpc/Vpc/PublicSubnet1"
60
- }
61
- ],
62
- "VpcId": {
63
- "Ref": "Vpc8378EB38"
64
- }
65
- }
66
- },
67
- "VpcPublicSubnet1RouteTableAssociation97140677": {
68
- "Type": "AWS::EC2::SubnetRouteTableAssociation",
69
- "Properties": {
70
- "RouteTableId": {
71
- "Ref": "VpcPublicSubnet1RouteTable6C95E38E"
72
- },
73
- "SubnetId": {
74
- "Ref": "VpcPublicSubnet1Subnet5C2D37C4"
75
- }
76
- }
77
- },
78
- "VpcPublicSubnet1DefaultRoute3DA9E72A": {
79
- "Type": "AWS::EC2::Route",
80
- "Properties": {
81
- "DestinationCidrBlock": "0.0.0.0/0",
82
- "GatewayId": {
83
- "Ref": "VpcIGWD7BA715C"
84
- },
85
- "RouteTableId": {
86
- "Ref": "VpcPublicSubnet1RouteTable6C95E38E"
87
- }
88
- },
89
- "DependsOn": [
90
- "VpcVPCGWBF912B6E"
91
- ]
92
- },
93
- "VpcPublicSubnet1EIPD7E02669": {
94
- "Type": "AWS::EC2::EIP",
95
- "Properties": {
96
- "Domain": "vpc",
97
- "Tags": [
98
- {
99
- "Key": "Name",
100
- "Value": "lamkin-existingVpc/Vpc/PublicSubnet1"
101
- }
102
- ]
103
- }
104
- },
105
- "VpcPublicSubnet1NATGateway4D7517AA": {
106
- "Type": "AWS::EC2::NatGateway",
107
- "Properties": {
108
- "AllocationId": {
109
- "Fn::GetAtt": [
110
- "VpcPublicSubnet1EIPD7E02669",
111
- "AllocationId"
112
- ]
113
- },
114
- "SubnetId": {
115
- "Ref": "VpcPublicSubnet1Subnet5C2D37C4"
116
- },
117
- "Tags": [
118
- {
119
- "Key": "Name",
120
- "Value": "lamkin-existingVpc/Vpc/PublicSubnet1"
121
- }
122
- ]
123
- },
124
- "DependsOn": [
125
- "VpcPublicSubnet1DefaultRoute3DA9E72A",
126
- "VpcPublicSubnet1RouteTableAssociation97140677"
127
- ]
128
- },
129
- "VpcPublicSubnet2Subnet691E08A3": {
130
- "Type": "AWS::EC2::Subnet",
131
- "Properties": {
132
- "AvailabilityZone": "test-region-1b",
133
- "CidrBlock": "10.0.32.0/19",
134
- "MapPublicIpOnLaunch": true,
135
- "Tags": [
136
- {
137
- "Key": "aws-cdk:subnet-name",
138
- "Value": "Public"
139
- },
140
- {
141
- "Key": "aws-cdk:subnet-type",
142
- "Value": "Public"
143
- },
144
- {
145
- "Key": "Name",
146
- "Value": "lamkin-existingVpc/Vpc/PublicSubnet2"
147
- }
148
- ],
149
- "VpcId": {
150
- "Ref": "Vpc8378EB38"
151
- }
152
- },
153
- "Metadata": {
154
- "cfn_nag": {
155
- "rules_to_suppress": [
156
- {
157
- "id": "W33",
158
- "reason": "Allow Public Subnets to have MapPublicIpOnLaunch set to true"
159
- }
160
- ]
161
- }
162
- }
163
- },
164
- "VpcPublicSubnet2RouteTable94F7E489": {
165
- "Type": "AWS::EC2::RouteTable",
166
- "Properties": {
167
- "Tags": [
168
- {
169
- "Key": "Name",
170
- "Value": "lamkin-existingVpc/Vpc/PublicSubnet2"
171
- }
172
- ],
173
- "VpcId": {
174
- "Ref": "Vpc8378EB38"
175
- }
176
- }
177
- },
178
- "VpcPublicSubnet2RouteTableAssociationDD5762D8": {
179
- "Type": "AWS::EC2::SubnetRouteTableAssociation",
180
- "Properties": {
181
- "RouteTableId": {
182
- "Ref": "VpcPublicSubnet2RouteTable94F7E489"
183
- },
184
- "SubnetId": {
185
- "Ref": "VpcPublicSubnet2Subnet691E08A3"
186
- }
187
- }
188
- },
189
- "VpcPublicSubnet2DefaultRoute97F91067": {
190
- "Type": "AWS::EC2::Route",
191
- "Properties": {
192
- "DestinationCidrBlock": "0.0.0.0/0",
193
- "GatewayId": {
194
- "Ref": "VpcIGWD7BA715C"
195
- },
196
- "RouteTableId": {
197
- "Ref": "VpcPublicSubnet2RouteTable94F7E489"
198
- }
199
- },
200
- "DependsOn": [
201
- "VpcVPCGWBF912B6E"
202
- ]
203
- },
204
- "VpcPublicSubnet2EIP3C605A87": {
205
- "Type": "AWS::EC2::EIP",
206
- "Properties": {
207
- "Domain": "vpc",
208
- "Tags": [
209
- {
210
- "Key": "Name",
211
- "Value": "lamkin-existingVpc/Vpc/PublicSubnet2"
212
- }
213
- ]
214
- }
215
- },
216
- "VpcPublicSubnet2NATGateway9182C01D": {
217
- "Type": "AWS::EC2::NatGateway",
218
- "Properties": {
219
- "AllocationId": {
220
- "Fn::GetAtt": [
221
- "VpcPublicSubnet2EIP3C605A87",
222
- "AllocationId"
223
- ]
224
- },
225
- "SubnetId": {
226
- "Ref": "VpcPublicSubnet2Subnet691E08A3"
227
- },
228
- "Tags": [
229
- {
230
- "Key": "Name",
231
- "Value": "lamkin-existingVpc/Vpc/PublicSubnet2"
232
- }
233
- ]
234
- },
235
- "DependsOn": [
236
- "VpcPublicSubnet2DefaultRoute97F91067",
237
- "VpcPublicSubnet2RouteTableAssociationDD5762D8"
238
- ]
239
- },
240
- "VpcPublicSubnet3SubnetBE12F0B6": {
241
- "Type": "AWS::EC2::Subnet",
242
- "Properties": {
243
- "AvailabilityZone": "test-region-1c",
244
- "CidrBlock": "10.0.64.0/19",
245
- "MapPublicIpOnLaunch": true,
246
- "Tags": [
247
- {
248
- "Key": "aws-cdk:subnet-name",
249
- "Value": "Public"
250
- },
251
- {
252
- "Key": "aws-cdk:subnet-type",
253
- "Value": "Public"
254
- },
255
- {
256
- "Key": "Name",
257
- "Value": "lamkin-existingVpc/Vpc/PublicSubnet3"
258
- }
259
- ],
260
- "VpcId": {
261
- "Ref": "Vpc8378EB38"
262
- }
263
- },
264
- "Metadata": {
265
- "cfn_nag": {
266
- "rules_to_suppress": [
267
- {
268
- "id": "W33",
269
- "reason": "Allow Public Subnets to have MapPublicIpOnLaunch set to true"
270
- }
271
- ]
272
- }
273
- }
274
- },
275
- "VpcPublicSubnet3RouteTable93458DBB": {
276
- "Type": "AWS::EC2::RouteTable",
277
- "Properties": {
278
- "Tags": [
279
- {
280
- "Key": "Name",
281
- "Value": "lamkin-existingVpc/Vpc/PublicSubnet3"
282
- }
283
- ],
284
- "VpcId": {
285
- "Ref": "Vpc8378EB38"
286
- }
287
- }
288
- },
289
- "VpcPublicSubnet3RouteTableAssociation1F1EDF02": {
290
- "Type": "AWS::EC2::SubnetRouteTableAssociation",
291
- "Properties": {
292
- "RouteTableId": {
293
- "Ref": "VpcPublicSubnet3RouteTable93458DBB"
294
- },
295
- "SubnetId": {
296
- "Ref": "VpcPublicSubnet3SubnetBE12F0B6"
297
- }
298
- }
299
- },
300
- "VpcPublicSubnet3DefaultRoute4697774F": {
301
- "Type": "AWS::EC2::Route",
302
- "Properties": {
303
- "DestinationCidrBlock": "0.0.0.0/0",
304
- "GatewayId": {
305
- "Ref": "VpcIGWD7BA715C"
306
- },
307
- "RouteTableId": {
308
- "Ref": "VpcPublicSubnet3RouteTable93458DBB"
309
- }
310
- },
311
- "DependsOn": [
312
- "VpcVPCGWBF912B6E"
313
- ]
314
- },
315
- "VpcPublicSubnet3EIP3A666A23": {
316
- "Type": "AWS::EC2::EIP",
317
- "Properties": {
318
- "Domain": "vpc",
319
- "Tags": [
320
- {
321
- "Key": "Name",
322
- "Value": "lamkin-existingVpc/Vpc/PublicSubnet3"
323
- }
324
- ]
325
- }
326
- },
327
- "VpcPublicSubnet3NATGateway7640CD1D": {
328
- "Type": "AWS::EC2::NatGateway",
329
- "Properties": {
330
- "AllocationId": {
331
- "Fn::GetAtt": [
332
- "VpcPublicSubnet3EIP3A666A23",
333
- "AllocationId"
334
- ]
335
- },
336
- "SubnetId": {
337
- "Ref": "VpcPublicSubnet3SubnetBE12F0B6"
338
- },
339
- "Tags": [
340
- {
341
- "Key": "Name",
342
- "Value": "lamkin-existingVpc/Vpc/PublicSubnet3"
343
- }
344
- ]
345
- },
346
- "DependsOn": [
347
- "VpcPublicSubnet3DefaultRoute4697774F",
348
- "VpcPublicSubnet3RouteTableAssociation1F1EDF02"
349
- ]
350
- },
351
- "VpcPrivateSubnet1Subnet536B997A": {
352
- "Type": "AWS::EC2::Subnet",
353
- "Properties": {
354
- "AvailabilityZone": "test-region-1a",
355
- "CidrBlock": "10.0.96.0/19",
356
- "MapPublicIpOnLaunch": false,
357
- "Tags": [
358
- {
359
- "Key": "aws-cdk:subnet-name",
360
- "Value": "Private"
361
- },
362
- {
363
- "Key": "aws-cdk:subnet-type",
364
- "Value": "Private"
365
- },
366
- {
367
- "Key": "Name",
368
- "Value": "lamkin-existingVpc/Vpc/PrivateSubnet1"
369
- }
370
- ],
371
- "VpcId": {
372
- "Ref": "Vpc8378EB38"
373
- }
374
- }
375
- },
376
- "VpcPrivateSubnet1RouteTableB2C5B500": {
377
- "Type": "AWS::EC2::RouteTable",
378
- "Properties": {
379
- "Tags": [
380
- {
381
- "Key": "Name",
382
- "Value": "lamkin-existingVpc/Vpc/PrivateSubnet1"
383
- }
384
- ],
385
- "VpcId": {
386
- "Ref": "Vpc8378EB38"
387
- }
388
- }
389
- },
390
- "VpcPrivateSubnet1RouteTableAssociation70C59FA6": {
391
- "Type": "AWS::EC2::SubnetRouteTableAssociation",
392
- "Properties": {
393
- "RouteTableId": {
394
- "Ref": "VpcPrivateSubnet1RouteTableB2C5B500"
395
- },
396
- "SubnetId": {
397
- "Ref": "VpcPrivateSubnet1Subnet536B997A"
398
- }
399
- }
400
- },
401
- "VpcPrivateSubnet1DefaultRouteBE02A9ED": {
402
- "Type": "AWS::EC2::Route",
403
- "Properties": {
404
- "DestinationCidrBlock": "0.0.0.0/0",
405
- "NatGatewayId": {
406
- "Ref": "VpcPublicSubnet1NATGateway4D7517AA"
407
- },
408
- "RouteTableId": {
409
- "Ref": "VpcPrivateSubnet1RouteTableB2C5B500"
410
- }
411
- }
412
- },
413
- "VpcPrivateSubnet2Subnet3788AAA1": {
414
- "Type": "AWS::EC2::Subnet",
415
- "Properties": {
416
- "AvailabilityZone": "test-region-1b",
417
- "CidrBlock": "10.0.128.0/19",
418
- "MapPublicIpOnLaunch": false,
419
- "Tags": [
420
- {
421
- "Key": "aws-cdk:subnet-name",
422
- "Value": "Private"
423
- },
424
- {
425
- "Key": "aws-cdk:subnet-type",
426
- "Value": "Private"
427
- },
428
- {
429
- "Key": "Name",
430
- "Value": "lamkin-existingVpc/Vpc/PrivateSubnet2"
431
- }
432
- ],
433
- "VpcId": {
434
- "Ref": "Vpc8378EB38"
435
- }
436
- }
437
- },
438
- "VpcPrivateSubnet2RouteTableA678073B": {
439
- "Type": "AWS::EC2::RouteTable",
440
- "Properties": {
441
- "Tags": [
442
- {
443
- "Key": "Name",
444
- "Value": "lamkin-existingVpc/Vpc/PrivateSubnet2"
445
- }
446
- ],
447
- "VpcId": {
448
- "Ref": "Vpc8378EB38"
449
- }
450
- }
451
- },
452
- "VpcPrivateSubnet2RouteTableAssociationA89CAD56": {
453
- "Type": "AWS::EC2::SubnetRouteTableAssociation",
454
- "Properties": {
455
- "RouteTableId": {
456
- "Ref": "VpcPrivateSubnet2RouteTableA678073B"
457
- },
458
- "SubnetId": {
459
- "Ref": "VpcPrivateSubnet2Subnet3788AAA1"
460
- }
461
- }
462
- },
463
- "VpcPrivateSubnet2DefaultRoute060D2087": {
464
- "Type": "AWS::EC2::Route",
465
- "Properties": {
466
- "DestinationCidrBlock": "0.0.0.0/0",
467
- "NatGatewayId": {
468
- "Ref": "VpcPublicSubnet2NATGateway9182C01D"
469
- },
470
- "RouteTableId": {
471
- "Ref": "VpcPrivateSubnet2RouteTableA678073B"
472
- }
473
- }
474
- },
475
- "VpcPrivateSubnet3SubnetF258B56E": {
476
- "Type": "AWS::EC2::Subnet",
477
- "Properties": {
478
- "AvailabilityZone": "test-region-1c",
479
- "CidrBlock": "10.0.160.0/19",
480
- "MapPublicIpOnLaunch": false,
481
- "Tags": [
482
- {
483
- "Key": "aws-cdk:subnet-name",
484
- "Value": "Private"
485
- },
486
- {
487
- "Key": "aws-cdk:subnet-type",
488
- "Value": "Private"
489
- },
490
- {
491
- "Key": "Name",
492
- "Value": "lamkin-existingVpc/Vpc/PrivateSubnet3"
493
- }
494
- ],
495
- "VpcId": {
496
- "Ref": "Vpc8378EB38"
497
- }
498
- }
499
- },
500
- "VpcPrivateSubnet3RouteTableD98824C7": {
501
- "Type": "AWS::EC2::RouteTable",
502
- "Properties": {
503
- "Tags": [
504
- {
505
- "Key": "Name",
506
- "Value": "lamkin-existingVpc/Vpc/PrivateSubnet3"
507
- }
508
- ],
509
- "VpcId": {
510
- "Ref": "Vpc8378EB38"
511
- }
512
- }
513
- },
514
- "VpcPrivateSubnet3RouteTableAssociation16BDDC43": {
515
- "Type": "AWS::EC2::SubnetRouteTableAssociation",
516
- "Properties": {
517
- "RouteTableId": {
518
- "Ref": "VpcPrivateSubnet3RouteTableD98824C7"
519
- },
520
- "SubnetId": {
521
- "Ref": "VpcPrivateSubnet3SubnetF258B56E"
522
- }
523
- }
524
- },
525
- "VpcPrivateSubnet3DefaultRoute94B74F0D": {
526
- "Type": "AWS::EC2::Route",
527
- "Properties": {
528
- "DestinationCidrBlock": "0.0.0.0/0",
529
- "NatGatewayId": {
530
- "Ref": "VpcPublicSubnet3NATGateway7640CD1D"
531
- },
532
- "RouteTableId": {
533
- "Ref": "VpcPrivateSubnet3RouteTableD98824C7"
534
- }
535
- }
536
- },
537
- "VpcIGWD7BA715C": {
538
- "Type": "AWS::EC2::InternetGateway",
539
- "Properties": {
540
- "Tags": [
541
- {
542
- "Key": "Name",
543
- "Value": "lamkin-existingVpc/Vpc"
544
- }
545
- ]
546
- }
547
- },
548
- "VpcVPCGWBF912B6E": {
549
- "Type": "AWS::EC2::VPCGatewayAttachment",
550
- "Properties": {
551
- "InternetGatewayId": {
552
- "Ref": "VpcIGWD7BA715C"
553
- },
554
- "VpcId": {
555
- "Ref": "Vpc8378EB38"
556
- }
557
- }
558
- },
559
- "VpcFlowLogIAMRole6A475D41": {
560
- "Type": "AWS::IAM::Role",
561
- "Properties": {
562
- "AssumeRolePolicyDocument": {
563
- "Statement": [
564
- {
565
- "Action": "sts:AssumeRole",
566
- "Effect": "Allow",
567
- "Principal": {
568
- "Service": "vpc-flow-logs.amazonaws.com"
569
- }
570
- }
571
- ],
572
- "Version": "2012-10-17"
573
- },
574
- "Tags": [
575
- {
576
- "Key": "Name",
577
- "Value": "lamkin-existingVpc/Vpc/FlowLog"
578
- }
579
- ]
580
- }
581
- },
582
- "VpcFlowLogIAMRoleDefaultPolicy406FB995": {
583
- "Type": "AWS::IAM::Policy",
584
- "Properties": {
585
- "PolicyDocument": {
586
- "Statement": [
587
- {
588
- "Action": [
589
- "logs:CreateLogStream",
590
- "logs:PutLogEvents",
591
- "logs:DescribeLogStreams"
592
- ],
593
- "Effect": "Allow",
594
- "Resource": {
595
- "Fn::GetAtt": [
596
- "VpcFlowLogLogGroup7B5C56B9",
597
- "Arn"
598
- ]
599
- }
600
- },
601
- {
602
- "Action": "iam:PassRole",
603
- "Effect": "Allow",
604
- "Resource": {
605
- "Fn::GetAtt": [
606
- "VpcFlowLogIAMRole6A475D41",
607
- "Arn"
608
- ]
609
- }
610
- }
611
- ],
612
- "Version": "2012-10-17"
613
- },
614
- "PolicyName": "VpcFlowLogIAMRoleDefaultPolicy406FB995",
615
- "Roles": [
616
- {
617
- "Ref": "VpcFlowLogIAMRole6A475D41"
618
- }
619
- ]
620
- }
621
- },
622
- "VpcFlowLogLogGroup7B5C56B9": {
623
- "Type": "AWS::Logs::LogGroup",
624
- "Properties": {
625
- "RetentionInDays": 731,
626
- "Tags": [
627
- {
628
- "Key": "Name",
629
- "Value": "lamkin-existingVpc/Vpc/FlowLog"
630
- }
631
- ]
632
- },
633
- "UpdateReplacePolicy": "Retain",
634
- "DeletionPolicy": "Retain",
635
- "Metadata": {
636
- "cfn_nag": {
637
- "rules_to_suppress": [
638
- {
639
- "id": "W84",
640
- "reason": "By default CloudWatchLogs LogGroups data is encrypted using the CloudWatch server-side encryption keys (AWS Managed Keys)"
641
- }
642
- ]
643
- }
644
- }
645
- },
646
- "VpcFlowLog8FF33A73": {
647
- "Type": "AWS::EC2::FlowLog",
648
- "Properties": {
649
- "DeliverLogsPermissionArn": {
650
- "Fn::GetAtt": [
651
- "VpcFlowLogIAMRole6A475D41",
652
- "Arn"
653
- ]
654
- },
655
- "LogDestinationType": "cloud-watch-logs",
656
- "LogGroupName": {
657
- "Ref": "VpcFlowLogLogGroup7B5C56B9"
658
- },
659
- "ResourceId": {
660
- "Ref": "Vpc8378EB38"
661
- },
662
- "ResourceType": "VPC",
663
- "Tags": [
664
- {
665
- "Key": "Name",
666
- "Value": "lamkin-existingVpc/Vpc/FlowLog"
667
- }
668
- ],
669
- "TrafficType": "ALL"
670
- }
671
- },
672
- "VpcKINESISSTREAMSC07D91B5": {
673
- "Type": "AWS::EC2::VPCEndpoint",
674
- "Properties": {
675
- "PrivateDnsEnabled": true,
676
- "SecurityGroupIds": [
677
- {
678
- "Fn::GetAtt": [
679
- "lamkinexistingVpcKINESISSTREAMSsecuritygroupC307369A",
680
- "GroupId"
681
- ]
682
- }
683
- ],
684
- "ServiceName": {
685
- "Fn::Join": [
686
- "",
687
- [
688
- "com.amazonaws.",
689
- {
690
- "Ref": "AWS::Region"
691
- },
692
- ".kinesis-streams"
693
- ]
694
- ]
695
- },
696
- "SubnetIds": [
697
- {
698
- "Ref": "VpcPrivateSubnet1Subnet536B997A"
699
- },
700
- {
701
- "Ref": "VpcPrivateSubnet2Subnet3788AAA1"
702
- },
703
- {
704
- "Ref": "VpcPrivateSubnet3SubnetF258B56E"
705
- }
706
- ],
707
- "VpcEndpointType": "Interface",
708
- "VpcId": {
709
- "Ref": "Vpc8378EB38"
710
- }
711
- }
712
- },
713
- "testlambdakinesisstreamsLambdaFunctionServiceRole95206CF3": {
714
- "Type": "AWS::IAM::Role",
715
- "Properties": {
716
- "AssumeRolePolicyDocument": {
717
- "Statement": [
718
- {
719
- "Action": "sts:AssumeRole",
720
- "Effect": "Allow",
721
- "Principal": {
722
- "Service": "lambda.amazonaws.com"
723
- }
724
- }
725
- ],
726
- "Version": "2012-10-17"
727
- },
728
- "Policies": [
729
- {
730
- "PolicyDocument": {
731
- "Statement": [
732
- {
733
- "Action": [
734
- "logs:CreateLogGroup",
735
- "logs:CreateLogStream",
736
- "logs:PutLogEvents"
737
- ],
738
- "Effect": "Allow",
739
- "Resource": {
740
- "Fn::Join": [
741
- "",
742
- [
743
- "arn:",
744
- {
745
- "Ref": "AWS::Partition"
746
- },
747
- ":logs:",
748
- {
749
- "Ref": "AWS::Region"
750
- },
751
- ":",
752
- {
753
- "Ref": "AWS::AccountId"
754
- },
755
- ":log-group:/aws/lambda/*"
756
- ]
757
- ]
758
- }
759
- }
760
- ],
761
- "Version": "2012-10-17"
762
- },
763
- "PolicyName": "LambdaFunctionServiceRolePolicy"
764
- }
765
- ]
766
- }
767
- },
768
- "testlambdakinesisstreamsLambdaFunctionServiceRoleDefaultPolicyED972043": {
769
- "Type": "AWS::IAM::Policy",
770
- "Properties": {
771
- "PolicyDocument": {
772
- "Statement": [
773
- {
774
- "Action": [
775
- "ec2:CreateNetworkInterface",
776
- "ec2:DescribeNetworkInterfaces",
777
- "ec2:DeleteNetworkInterface",
778
- "ec2:AssignPrivateIpAddresses",
779
- "ec2:UnassignPrivateIpAddresses"
780
- ],
781
- "Effect": "Allow",
782
- "Resource": "*"
783
- },
784
- {
785
- "Action": [
786
- "xray:PutTraceSegments",
787
- "xray:PutTelemetryRecords"
788
- ],
789
- "Effect": "Allow",
790
- "Resource": "*"
791
- },
792
- {
793
- "Action": [
794
- "kinesis:ListShards",
795
- "kinesis:PutRecord",
796
- "kinesis:PutRecords"
797
- ],
798
- "Effect": "Allow",
799
- "Resource": {
800
- "Fn::GetAtt": [
801
- "testlambdakinesisstreamsKinesisStream11A82116",
802
- "Arn"
803
- ]
804
- }
805
- }
806
- ],
807
- "Version": "2012-10-17"
808
- },
809
- "PolicyName": "testlambdakinesisstreamsLambdaFunctionServiceRoleDefaultPolicyED972043",
810
- "Roles": [
811
- {
812
- "Ref": "testlambdakinesisstreamsLambdaFunctionServiceRole95206CF3"
813
- }
814
- ]
815
- },
816
- "Metadata": {
817
- "cfn_nag": {
818
- "rules_to_suppress": [
819
- {
820
- "id": "W12",
821
- "reason": "Lambda needs the following minimum required permissions to send trace data to X-Ray and access ENIs in a VPC."
822
- }
823
- ]
824
- }
825
- }
826
- },
827
- "testlambdakinesisstreamsReplaceDefaultSecurityGroupsecuritygroupFB22266C": {
828
- "Type": "AWS::EC2::SecurityGroup",
829
- "Properties": {
830
- "GroupDescription": "lamkin-existingVpc/test-lambda-kinesisstreams/ReplaceDefaultSecurityGroup-security-group",
831
- "SecurityGroupEgress": [
832
- {
833
- "CidrIp": "0.0.0.0/0",
834
- "Description": "Allow all outbound traffic by default",
835
- "IpProtocol": "-1"
836
- }
837
- ],
838
- "VpcId": {
839
- "Ref": "Vpc8378EB38"
840
- }
841
- },
842
- "Metadata": {
843
- "cfn_nag": {
844
- "rules_to_suppress": [
845
- {
846
- "id": "W5",
847
- "reason": "Egress of 0.0.0.0/0 is default and generally considered OK"
848
- },
849
- {
850
- "id": "W40",
851
- "reason": "Egress IPProtocol of -1 is default and generally considered OK"
852
- }
853
- ]
854
- }
855
- }
856
- },
857
- "testlambdakinesisstreamsLambdaFunction4348B6E4": {
858
- "Type": "AWS::Lambda::Function",
859
- "Properties": {
860
- "Code": {
861
- "S3Bucket": {
862
- "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
863
- },
864
- "S3Key": "c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf.zip"
865
- },
866
- "Environment": {
867
- "Variables": {
868
- "KINESIS_DATASTREAM_NAME": {
869
- "Ref": "testlambdakinesisstreamsKinesisStream11A82116"
870
- }
871
- }
872
- },
873
- "Handler": "index.handler",
874
- "Role": {
875
- "Fn::GetAtt": [
876
- "testlambdakinesisstreamsLambdaFunctionServiceRole95206CF3",
877
- "Arn"
878
- ]
879
- },
880
- "Runtime": "nodejs18.x",
881
- "TracingConfig": {
882
- "Mode": "Active"
883
- },
884
- "VpcConfig": {
885
- "SecurityGroupIds": [
886
- {
887
- "Fn::GetAtt": [
888
- "testlambdakinesisstreamsReplaceDefaultSecurityGroupsecuritygroupFB22266C",
889
- "GroupId"
890
- ]
891
- }
892
- ],
893
- "SubnetIds": [
894
- {
895
- "Ref": "VpcPrivateSubnet1Subnet536B997A"
896
- },
897
- {
898
- "Ref": "VpcPrivateSubnet2Subnet3788AAA1"
899
- },
900
- {
901
- "Ref": "VpcPrivateSubnet3SubnetF258B56E"
902
- }
903
- ]
904
- }
905
- },
906
- "DependsOn": [
907
- "testlambdakinesisstreamsLambdaFunctionServiceRoleDefaultPolicyED972043",
908
- "testlambdakinesisstreamsLambdaFunctionServiceRole95206CF3",
909
- "VpcPrivateSubnet1DefaultRouteBE02A9ED",
910
- "VpcPrivateSubnet1RouteTableAssociation70C59FA6",
911
- "VpcPrivateSubnet2DefaultRoute060D2087",
912
- "VpcPrivateSubnet2RouteTableAssociationA89CAD56",
913
- "VpcPrivateSubnet3DefaultRoute94B74F0D",
914
- "VpcPrivateSubnet3RouteTableAssociation16BDDC43"
915
- ],
916
- "Metadata": {
917
- "cfn_nag": {
918
- "rules_to_suppress": [
919
- {
920
- "id": "W58",
921
- "reason": "Lambda functions has the required permission to write CloudWatch Logs. It uses custom policy instead of arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole with tighter permissions."
922
- },
923
- {
924
- "id": "W89",
925
- "reason": "This is not a rule for the general case, just for specific use cases/industries"
926
- },
927
- {
928
- "id": "W92",
929
- "reason": "Impossible for us to define the correct concurrency for clients"
930
- }
931
- ]
932
- }
933
- }
934
- },
935
- "testlambdakinesisstreamsKinesisStream11A82116": {
936
- "Type": "AWS::Kinesis::Stream",
937
- "Properties": {
938
- "RetentionPeriodHours": 24,
939
- "ShardCount": 1,
940
- "StreamEncryption": {
941
- "EncryptionType": "KMS",
942
- "KeyId": "alias/aws/kinesis"
943
- }
944
- }
945
- },
946
- "testlambdakinesisstreamsKinesisStreamGetRecordsIteratorAgeAlarmC4A0FF00": {
947
- "Type": "AWS::CloudWatch::Alarm",
948
- "Properties": {
949
- "AlarmDescription": "Consumer Record Processing Falling Behind, there is risk for data loss due to record expiration.",
950
- "ComparisonOperator": "GreaterThanOrEqualToThreshold",
951
- "EvaluationPeriods": 1,
952
- "MetricName": "GetRecords.IteratorAgeMilliseconds",
953
- "Namespace": "AWS/Kinesis",
954
- "Period": 300,
955
- "Statistic": "Maximum",
956
- "Threshold": 43200000
957
- }
958
- },
959
- "testlambdakinesisstreamsKinesisStreamReadProvisionedThroughputExceededAlarm9732E188": {
960
- "Type": "AWS::CloudWatch::Alarm",
961
- "Properties": {
962
- "AlarmDescription": "Consumer Application is Reading at a Slower Rate Than Expected.",
963
- "ComparisonOperator": "GreaterThanThreshold",
964
- "EvaluationPeriods": 1,
965
- "MetricName": "ReadProvisionedThroughputExceeded",
966
- "Namespace": "AWS/Kinesis",
967
- "Period": 300,
968
- "Statistic": "Average",
969
- "Threshold": 0
970
- }
971
- },
972
- "lamkinexistingVpcKINESISSTREAMSsecuritygroupC307369A": {
973
- "Type": "AWS::EC2::SecurityGroup",
974
- "Properties": {
975
- "GroupDescription": "lamkin-existingVpc/lamkin-existingVpc-KINESIS_STREAMS-security-group",
976
- "SecurityGroupEgress": [
977
- {
978
- "CidrIp": "0.0.0.0/0",
979
- "Description": "Allow all outbound traffic by default",
980
- "IpProtocol": "-1"
981
- }
982
- ],
983
- "SecurityGroupIngress": [
984
- {
985
- "CidrIp": {
986
- "Fn::GetAtt": [
987
- "Vpc8378EB38",
988
- "CidrBlock"
989
- ]
990
- },
991
- "Description": {
992
- "Fn::Join": [
993
- "",
994
- [
995
- "from ",
996
- {
997
- "Fn::GetAtt": [
998
- "Vpc8378EB38",
999
- "CidrBlock"
1000
- ]
1001
- },
1002
- ":443"
1003
- ]
1004
- ]
1005
- },
1006
- "FromPort": 443,
1007
- "IpProtocol": "tcp",
1008
- "ToPort": 443
1009
- }
1010
- ],
1011
- "VpcId": {
1012
- "Ref": "Vpc8378EB38"
1013
- }
1014
- },
1015
- "Metadata": {
1016
- "cfn_nag": {
1017
- "rules_to_suppress": [
1018
- {
1019
- "id": "W5",
1020
- "reason": "Egress of 0.0.0.0/0 is default and generally considered OK"
1021
- },
1022
- {
1023
- "id": "W40",
1024
- "reason": "Egress IPProtocol of -1 is default and generally considered OK"
1025
- }
1026
- ]
1027
- }
1028
- }
1029
- }
1030
- },
1031
- "Parameters": {
1032
- "BootstrapVersion": {
1033
- "Type": "AWS::SSM::Parameter::Value<String>",
1034
- "Default": "/cdk-bootstrap/hnb659fds/version",
1035
- "Description": "Version of the CDK Bootstrap resources in this environment, automatically retrieved from SSM Parameter Store. [cdk:skip]"
1036
- }
1037
- },
1038
- "Rules": {
1039
- "CheckBootstrapVersion": {
1040
- "Assertions": [
1041
- {
1042
- "Assert": {
1043
- "Fn::Not": [
1044
- {
1045
- "Fn::Contains": [
1046
- [
1047
- "1",
1048
- "2",
1049
- "3",
1050
- "4",
1051
- "5"
1052
- ],
1053
- {
1054
- "Ref": "BootstrapVersion"
1055
- }
1056
- ]
1057
- }
1058
- ]
1059
- },
1060
- "AssertDescription": "CDK bootstrap stack version 6 required. Please run 'cdk bootstrap' with a recent version of the CDK CLI."
1061
- }
1062
- ]
1063
- }
1064
- }
1065
- }