@aws-solutions-constructs/aws-lambda-kinesisstreams 2.79.1 → 2.81.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (59) hide show
  1. package/.jsii +43 -43
  2. package/lib/index.js +1 -1
  3. package/package.json +6 -6
  4. package/test/integ.lamkin-existingLambda.js.snapshot/cdk.out +1 -1
  5. package/test/integ.lamkin-existingLambda.js.snapshot/integ.json +1 -1
  6. package/test/integ.lamkin-existingLambda.js.snapshot/lamkin-existingLambda.assets.json +3 -3
  7. package/test/integ.lamkin-existingLambda.js.snapshot/lamkin-existingLambda.template.json +24 -18
  8. package/test/integ.lamkin-existingLambda.js.snapshot/lamkinexistingLambdaIntegDefaultTestDeployAssertD62E9419.assets.json +1 -1
  9. package/test/integ.lamkin-existingLambda.js.snapshot/manifest.json +199 -3
  10. package/test/integ.lamkin-existingLambda.js.snapshot/tree.json +1 -413
  11. package/test/integ.lamkin-existingStream.js.snapshot/cdk.out +1 -1
  12. package/test/integ.lamkin-existingStream.js.snapshot/integ.json +1 -1
  13. package/test/integ.lamkin-existingStream.js.snapshot/lamkin-existingStream.assets.json +3 -3
  14. package/test/integ.lamkin-existingStream.js.snapshot/lamkin-existingStream.template.json +24 -18
  15. package/test/integ.lamkin-existingStream.js.snapshot/lamkinexistingStreamIntegDefaultTestDeployAssert2681B9A2.assets.json +1 -1
  16. package/test/integ.lamkin-existingStream.js.snapshot/manifest.json +200 -3
  17. package/test/integ.lamkin-existingStream.js.snapshot/tree.json +1 -415
  18. package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/cdk.out +1 -1
  19. package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/integ.json +1 -1
  20. package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/lamkin-existingStreamWithCmk.assets.json +3 -3
  21. package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/lamkin-existingStreamWithCmk.template.json +24 -18
  22. package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/lamkinexistingStreamWithCmkIntegDefaultTestDeployAssert6EDF4045.assets.json +1 -1
  23. package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/manifest.json +239 -3
  24. package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/tree.json +1 -485
  25. package/test/integ.lamkin-existingVpc.js.snapshot/cdk.out +1 -1
  26. package/test/integ.lamkin-existingVpc.js.snapshot/integ.json +1 -1
  27. package/test/integ.lamkin-existingVpc.js.snapshot/lamkin-existingVpc.assets.json +3 -3
  28. package/test/integ.lamkin-existingVpc.js.snapshot/lamkin-existingVpc.template.json +35 -7
  29. package/test/integ.lamkin-existingVpc.js.snapshot/lamkinexistingVpcIntegDefaultTestDeployAssertB97E47BA.assets.json +1 -1
  30. package/test/integ.lamkin-existingVpc.js.snapshot/manifest.json +533 -3
  31. package/test/integ.lamkin-existingVpc.js.snapshot/tree.json +1 -1478
  32. package/test/integ.lamkin-newStreamFromProps.js.snapshot/cdk.out +1 -1
  33. package/test/integ.lamkin-newStreamFromProps.js.snapshot/integ.json +1 -1
  34. package/test/integ.lamkin-newStreamFromProps.js.snapshot/lamkin-newStreamFromProps.assets.json +3 -3
  35. package/test/integ.lamkin-newStreamFromProps.js.snapshot/lamkin-newStreamFromProps.template.json +24 -18
  36. package/test/integ.lamkin-newStreamFromProps.js.snapshot/lamkinnewStreamFromPropsIntegDefaultTestDeployAssertC2946F34.assets.json +1 -1
  37. package/test/integ.lamkin-newStreamFromProps.js.snapshot/manifest.json +200 -3
  38. package/test/integ.lamkin-newStreamFromProps.js.snapshot/tree.json +1 -415
  39. package/test/integ.lamkin-newVpc.js.snapshot/cdk.out +1 -1
  40. package/test/integ.lamkin-newVpc.js.snapshot/integ.json +1 -1
  41. package/test/integ.lamkin-newVpc.js.snapshot/lamkin-newVpc.assets.json +3 -3
  42. package/test/integ.lamkin-newVpc.js.snapshot/lamkin-newVpc.template.json +33 -7
  43. package/test/integ.lamkin-newVpc.js.snapshot/lamkinnewVpcIntegDefaultTestDeployAssert16AC3D59.assets.json +1 -1
  44. package/test/integ.lamkin-newVpc.js.snapshot/manifest.json +464 -3
  45. package/test/integ.lamkin-newVpc.js.snapshot/tree.json +1 -1066
  46. package/test/integ.lamkin-newVpcFromProps.js.snapshot/cdk.out +1 -1
  47. package/test/integ.lamkin-newVpcFromProps.js.snapshot/integ.json +1 -1
  48. package/test/integ.lamkin-newVpcFromProps.js.snapshot/lamkin-newVpcFromProps.assets.json +3 -3
  49. package/test/integ.lamkin-newVpcFromProps.js.snapshot/lamkin-newVpcFromProps.template.json +32 -7
  50. package/test/integ.lamkin-newVpcFromProps.js.snapshot/lamkinnewVpcFromPropsIntegDefaultTestDeployAssert95FE0487.assets.json +1 -1
  51. package/test/integ.lamkin-newVpcFromProps.js.snapshot/manifest.json +441 -3
  52. package/test/integ.lamkin-newVpcFromProps.js.snapshot/tree.json +1 -961
  53. package/test/integ.lamkin-noArguments.js.snapshot/cdk.out +1 -1
  54. package/test/integ.lamkin-noArguments.js.snapshot/integ.json +1 -1
  55. package/test/integ.lamkin-noArguments.js.snapshot/lamkin-noArguments.assets.json +3 -3
  56. package/test/integ.lamkin-noArguments.js.snapshot/lamkin-noArguments.template.json +24 -18
  57. package/test/integ.lamkin-noArguments.js.snapshot/lamkinnoArgumentsIntegDefaultTestDeployAssertC0CED4B2.assets.json +1 -1
  58. package/test/integ.lamkin-noArguments.js.snapshot/manifest.json +199 -3
  59. package/test/integ.lamkin-noArguments.js.snapshot/tree.json +1 -413
@@ -1,415 +1 @@
1
- {
2
- "version": "tree-0.1",
3
- "tree": {
4
- "id": "App",
5
- "path": "",
6
- "children": {
7
- "lamkin-existingStream": {
8
- "id": "lamkin-existingStream",
9
- "path": "lamkin-existingStream",
10
- "children": {
11
- "test-stream": {
12
- "id": "test-stream",
13
- "path": "lamkin-existingStream/test-stream",
14
- "children": {
15
- "Resource": {
16
- "id": "Resource",
17
- "path": "lamkin-existingStream/test-stream/Resource",
18
- "attributes": {
19
- "aws:cdk:cloudformation:type": "AWS::Kinesis::Stream",
20
- "aws:cdk:cloudformation:props": {
21
- "retentionPeriodHours": 24,
22
- "streamEncryption": {
23
- "encryptionType": "KMS",
24
- "keyId": "alias/aws/kinesis"
25
- },
26
- "streamModeDetails": {
27
- "streamMode": "ON_DEMAND"
28
- }
29
- }
30
- },
31
- "constructInfo": {
32
- "fqn": "aws-cdk-lib.aws_kinesis.CfnStream",
33
- "version": "2.150.0"
34
- }
35
- }
36
- },
37
- "constructInfo": {
38
- "fqn": "aws-cdk-lib.aws_kinesis.Stream",
39
- "version": "2.150.0"
40
- }
41
- },
42
- "test-lambda-kinesisstreams": {
43
- "id": "test-lambda-kinesisstreams",
44
- "path": "lamkin-existingStream/test-lambda-kinesisstreams",
45
- "children": {
46
- "LambdaFunctionServiceRole": {
47
- "id": "LambdaFunctionServiceRole",
48
- "path": "lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunctionServiceRole",
49
- "children": {
50
- "ImportLambdaFunctionServiceRole": {
51
- "id": "ImportLambdaFunctionServiceRole",
52
- "path": "lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole",
53
- "constructInfo": {
54
- "fqn": "aws-cdk-lib.Resource",
55
- "version": "2.150.0"
56
- }
57
- },
58
- "Resource": {
59
- "id": "Resource",
60
- "path": "lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunctionServiceRole/Resource",
61
- "attributes": {
62
- "aws:cdk:cloudformation:type": "AWS::IAM::Role",
63
- "aws:cdk:cloudformation:props": {
64
- "assumeRolePolicyDocument": {
65
- "Statement": [
66
- {
67
- "Action": "sts:AssumeRole",
68
- "Effect": "Allow",
69
- "Principal": {
70
- "Service": "lambda.amazonaws.com"
71
- }
72
- }
73
- ],
74
- "Version": "2012-10-17"
75
- },
76
- "policies": [
77
- {
78
- "policyName": "LambdaFunctionServiceRolePolicy",
79
- "policyDocument": {
80
- "Statement": [
81
- {
82
- "Action": [
83
- "logs:CreateLogGroup",
84
- "logs:CreateLogStream",
85
- "logs:PutLogEvents"
86
- ],
87
- "Effect": "Allow",
88
- "Resource": {
89
- "Fn::Join": [
90
- "",
91
- [
92
- "arn:",
93
- {
94
- "Ref": "AWS::Partition"
95
- },
96
- ":logs:",
97
- {
98
- "Ref": "AWS::Region"
99
- },
100
- ":",
101
- {
102
- "Ref": "AWS::AccountId"
103
- },
104
- ":log-group:/aws/lambda/*"
105
- ]
106
- ]
107
- }
108
- }
109
- ],
110
- "Version": "2012-10-17"
111
- }
112
- }
113
- ]
114
- }
115
- },
116
- "constructInfo": {
117
- "fqn": "aws-cdk-lib.aws_iam.CfnRole",
118
- "version": "2.150.0"
119
- }
120
- },
121
- "DefaultPolicy": {
122
- "id": "DefaultPolicy",
123
- "path": "lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunctionServiceRole/DefaultPolicy",
124
- "children": {
125
- "Resource": {
126
- "id": "Resource",
127
- "path": "lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunctionServiceRole/DefaultPolicy/Resource",
128
- "attributes": {
129
- "aws:cdk:cloudformation:type": "AWS::IAM::Policy",
130
- "aws:cdk:cloudformation:props": {
131
- "policyDocument": {
132
- "Statement": [
133
- {
134
- "Action": [
135
- "xray:PutTelemetryRecords",
136
- "xray:PutTraceSegments"
137
- ],
138
- "Effect": "Allow",
139
- "Resource": "*"
140
- },
141
- {
142
- "Action": [
143
- "kinesis:ListShards",
144
- "kinesis:PutRecord",
145
- "kinesis:PutRecords"
146
- ],
147
- "Effect": "Allow",
148
- "Resource": {
149
- "Fn::GetAtt": [
150
- "teststream04374A09",
151
- "Arn"
152
- ]
153
- }
154
- }
155
- ],
156
- "Version": "2012-10-17"
157
- },
158
- "policyName": "testlambdakinesisstreamsLambdaFunctionServiceRoleDefaultPolicyED972043",
159
- "roles": [
160
- {
161
- "Ref": "testlambdakinesisstreamsLambdaFunctionServiceRole95206CF3"
162
- }
163
- ]
164
- }
165
- },
166
- "constructInfo": {
167
- "fqn": "aws-cdk-lib.aws_iam.CfnPolicy",
168
- "version": "2.150.0"
169
- }
170
- }
171
- },
172
- "constructInfo": {
173
- "fqn": "aws-cdk-lib.aws_iam.Policy",
174
- "version": "2.150.0"
175
- }
176
- }
177
- },
178
- "constructInfo": {
179
- "fqn": "aws-cdk-lib.aws_iam.Role",
180
- "version": "2.150.0"
181
- }
182
- },
183
- "LambdaFunction": {
184
- "id": "LambdaFunction",
185
- "path": "lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunction",
186
- "children": {
187
- "Code": {
188
- "id": "Code",
189
- "path": "lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunction/Code",
190
- "children": {
191
- "Stage": {
192
- "id": "Stage",
193
- "path": "lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunction/Code/Stage",
194
- "constructInfo": {
195
- "fqn": "aws-cdk-lib.AssetStaging",
196
- "version": "2.150.0"
197
- }
198
- },
199
- "AssetBucket": {
200
- "id": "AssetBucket",
201
- "path": "lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunction/Code/AssetBucket",
202
- "constructInfo": {
203
- "fqn": "aws-cdk-lib.aws_s3.BucketBase",
204
- "version": "2.150.0"
205
- }
206
- }
207
- },
208
- "constructInfo": {
209
- "fqn": "aws-cdk-lib.aws_s3_assets.Asset",
210
- "version": "2.150.0"
211
- }
212
- },
213
- "Resource": {
214
- "id": "Resource",
215
- "path": "lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunction/Resource",
216
- "attributes": {
217
- "aws:cdk:cloudformation:type": "AWS::Lambda::Function",
218
- "aws:cdk:cloudformation:props": {
219
- "code": {
220
- "s3Bucket": {
221
- "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
222
- },
223
- "s3Key": "c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf.zip"
224
- },
225
- "environment": {
226
- "variables": {
227
- "AWS_NODEJS_CONNECTION_REUSE_ENABLED": "1",
228
- "KINESIS_DATASTREAM_NAME": {
229
- "Ref": "teststream04374A09"
230
- }
231
- }
232
- },
233
- "handler": "index.handler",
234
- "role": {
235
- "Fn::GetAtt": [
236
- "testlambdakinesisstreamsLambdaFunctionServiceRole95206CF3",
237
- "Arn"
238
- ]
239
- },
240
- "runtime": "nodejs20.x",
241
- "tracingConfig": {
242
- "mode": "Active"
243
- }
244
- }
245
- },
246
- "constructInfo": {
247
- "fqn": "aws-cdk-lib.aws_lambda.CfnFunction",
248
- "version": "2.150.0"
249
- }
250
- }
251
- },
252
- "constructInfo": {
253
- "fqn": "aws-cdk-lib.aws_lambda.Function",
254
- "version": "2.150.0"
255
- }
256
- },
257
- "KinesisStreamGetRecordsIteratorAgeAlarm": {
258
- "id": "KinesisStreamGetRecordsIteratorAgeAlarm",
259
- "path": "lamkin-existingStream/test-lambda-kinesisstreams/KinesisStreamGetRecordsIteratorAgeAlarm",
260
- "children": {
261
- "Resource": {
262
- "id": "Resource",
263
- "path": "lamkin-existingStream/test-lambda-kinesisstreams/KinesisStreamGetRecordsIteratorAgeAlarm/Resource",
264
- "attributes": {
265
- "aws:cdk:cloudformation:type": "AWS::CloudWatch::Alarm",
266
- "aws:cdk:cloudformation:props": {
267
- "alarmDescription": "Consumer Record Processing Falling Behind, there is risk for data loss due to record expiration.",
268
- "comparisonOperator": "GreaterThanOrEqualToThreshold",
269
- "evaluationPeriods": 1,
270
- "metricName": "GetRecords.IteratorAgeMilliseconds",
271
- "namespace": "AWS/Kinesis",
272
- "period": 300,
273
- "statistic": "Maximum",
274
- "threshold": 43200000
275
- }
276
- },
277
- "constructInfo": {
278
- "fqn": "aws-cdk-lib.aws_cloudwatch.CfnAlarm",
279
- "version": "2.150.0"
280
- }
281
- }
282
- },
283
- "constructInfo": {
284
- "fqn": "aws-cdk-lib.aws_cloudwatch.Alarm",
285
- "version": "2.150.0"
286
- }
287
- },
288
- "KinesisStreamReadProvisionedThroughputExceededAlarm": {
289
- "id": "KinesisStreamReadProvisionedThroughputExceededAlarm",
290
- "path": "lamkin-existingStream/test-lambda-kinesisstreams/KinesisStreamReadProvisionedThroughputExceededAlarm",
291
- "children": {
292
- "Resource": {
293
- "id": "Resource",
294
- "path": "lamkin-existingStream/test-lambda-kinesisstreams/KinesisStreamReadProvisionedThroughputExceededAlarm/Resource",
295
- "attributes": {
296
- "aws:cdk:cloudformation:type": "AWS::CloudWatch::Alarm",
297
- "aws:cdk:cloudformation:props": {
298
- "alarmDescription": "Consumer Application is Reading at a Slower Rate Than Expected.",
299
- "comparisonOperator": "GreaterThanThreshold",
300
- "evaluationPeriods": 1,
301
- "metricName": "ReadProvisionedThroughputExceeded",
302
- "namespace": "AWS/Kinesis",
303
- "period": 300,
304
- "statistic": "Average",
305
- "threshold": 0
306
- }
307
- },
308
- "constructInfo": {
309
- "fqn": "aws-cdk-lib.aws_cloudwatch.CfnAlarm",
310
- "version": "2.150.0"
311
- }
312
- }
313
- },
314
- "constructInfo": {
315
- "fqn": "aws-cdk-lib.aws_cloudwatch.Alarm",
316
- "version": "2.150.0"
317
- }
318
- }
319
- },
320
- "constructInfo": {
321
- "fqn": "@aws-solutions-constructs/aws-lambda-kinesisstreams.LambdaToKinesisStreams",
322
- "version": "2.63.0"
323
- }
324
- },
325
- "Integ": {
326
- "id": "Integ",
327
- "path": "lamkin-existingStream/Integ",
328
- "children": {
329
- "DefaultTest": {
330
- "id": "DefaultTest",
331
- "path": "lamkin-existingStream/Integ/DefaultTest",
332
- "children": {
333
- "Default": {
334
- "id": "Default",
335
- "path": "lamkin-existingStream/Integ/DefaultTest/Default",
336
- "constructInfo": {
337
- "fqn": "constructs.Construct",
338
- "version": "10.3.0"
339
- }
340
- },
341
- "DeployAssert": {
342
- "id": "DeployAssert",
343
- "path": "lamkin-existingStream/Integ/DefaultTest/DeployAssert",
344
- "children": {
345
- "BootstrapVersion": {
346
- "id": "BootstrapVersion",
347
- "path": "lamkin-existingStream/Integ/DefaultTest/DeployAssert/BootstrapVersion",
348
- "constructInfo": {
349
- "fqn": "aws-cdk-lib.CfnParameter",
350
- "version": "2.150.0"
351
- }
352
- },
353
- "CheckBootstrapVersion": {
354
- "id": "CheckBootstrapVersion",
355
- "path": "lamkin-existingStream/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion",
356
- "constructInfo": {
357
- "fqn": "aws-cdk-lib.CfnRule",
358
- "version": "2.150.0"
359
- }
360
- }
361
- },
362
- "constructInfo": {
363
- "fqn": "aws-cdk-lib.Stack",
364
- "version": "2.150.0"
365
- }
366
- }
367
- },
368
- "constructInfo": {
369
- "fqn": "@aws-cdk/integ-tests-alpha.IntegTestCase",
370
- "version": "2.150.0-alpha.0"
371
- }
372
- }
373
- },
374
- "constructInfo": {
375
- "fqn": "@aws-cdk/integ-tests-alpha.IntegTest",
376
- "version": "2.150.0-alpha.0"
377
- }
378
- },
379
- "BootstrapVersion": {
380
- "id": "BootstrapVersion",
381
- "path": "lamkin-existingStream/BootstrapVersion",
382
- "constructInfo": {
383
- "fqn": "aws-cdk-lib.CfnParameter",
384
- "version": "2.150.0"
385
- }
386
- },
387
- "CheckBootstrapVersion": {
388
- "id": "CheckBootstrapVersion",
389
- "path": "lamkin-existingStream/CheckBootstrapVersion",
390
- "constructInfo": {
391
- "fqn": "aws-cdk-lib.CfnRule",
392
- "version": "2.150.0"
393
- }
394
- }
395
- },
396
- "constructInfo": {
397
- "fqn": "aws-cdk-lib.Stack",
398
- "version": "2.150.0"
399
- }
400
- },
401
- "Tree": {
402
- "id": "Tree",
403
- "path": "Tree",
404
- "constructInfo": {
405
- "fqn": "constructs.Construct",
406
- "version": "10.3.0"
407
- }
408
- }
409
- },
410
- "constructInfo": {
411
- "fqn": "aws-cdk-lib.App",
412
- "version": "2.150.0"
413
- }
414
- }
415
- }
1
+ {"version":"tree-0.1","tree":{"id":"App","path":"","children":{"lamkin-existingStream":{"id":"lamkin-existingStream","path":"lamkin-existingStream","children":{"test-stream":{"id":"test-stream","path":"lamkin-existingStream/test-stream","children":{"Resource":{"id":"Resource","path":"lamkin-existingStream/test-stream/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::Kinesis::Stream","aws:cdk:cloudformation:props":{"retentionPeriodHours":24,"streamEncryption":{"encryptionType":"KMS","keyId":"alias/aws/kinesis"},"streamModeDetails":{"streamMode":"ON_DEMAND"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_kinesis.CfnStream","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_kinesis.Stream","version":"2.186.0","metadata":[{"streamMode":"ON_DEMAND","encryption":"MANAGED"}]}},"test-lambda-kinesisstreams":{"id":"test-lambda-kinesisstreams","path":"lamkin-existingStream/test-lambda-kinesisstreams","children":{"LambdaFunctionServiceRole":{"id":"LambdaFunctionServiceRole","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunctionServiceRole","children":{"ImportLambdaFunctionServiceRole":{"id":"ImportLambdaFunctionServiceRole","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole","constructInfo":{"fqn":"aws-cdk-lib.Resource","version":"2.186.0","metadata":["*"]}},"Resource":{"id":"Resource","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunctionServiceRole/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Role","aws:cdk:cloudformation:props":{"assumeRolePolicyDocument":{"Statement":[{"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"Service":"lambda.amazonaws.com"}}],"Version":"2012-10-17"},"policies":[{"policyName":"LambdaFunctionServiceRolePolicy","policyDocument":{"Statement":[{"Action":["logs:CreateLogGroup","logs:CreateLogStream","logs:PutLogEvents"],"Effect":"Allow","Resource":{"Fn::Join":["",["arn:",{"Ref":"AWS::Partition"},":logs:",{"Ref":"AWS::Region"},":",{"Ref":"AWS::AccountId"},":log-group:/aws/lambda/*"]]}}],"Version":"2012-10-17"}}]}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnRole","version":"2.186.0"}},"DefaultPolicy":{"id":"DefaultPolicy","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunctionServiceRole/DefaultPolicy","children":{"Resource":{"id":"Resource","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunctionServiceRole/DefaultPolicy/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Policy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":["kinesis:ListShards","kinesis:PutRecord","kinesis:PutRecords"],"Effect":"Allow","Resource":{"Fn::GetAtt":["teststream04374A09","Arn"]}}],"Version":"2012-10-17"},"policyName":"testlambdakinesisstreamsLambdaFunctionServiceRoleDefaultPolicyED972043","roles":[{"Ref":"testlambdakinesisstreamsLambdaFunctionServiceRole95206CF3"}]}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnPolicy","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Policy","version":"2.186.0","metadata":["*",{"attachToRole":["*"]},{"attachToRole":["*"]},{"addStatements":[{}]}]}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Role","version":"2.186.0","metadata":[{"assumedBy":{"principalAccount":"*","assumeRoleAction":"*"},"inlinePolicies":"*"},{"attachInlinePolicy":["*"]},{"attachInlinePolicy":["*"]},{"addToPrincipalPolicy":[{}]},{"attachInlinePolicy":["*"]},{"attachInlinePolicy":["*"]}]}},"LambdaFunction":{"id":"LambdaFunction","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunction","children":{"Code":{"id":"Code","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunction/Code","children":{"Stage":{"id":"Stage","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunction/Code/Stage","constructInfo":{"fqn":"aws-cdk-lib.AssetStaging","version":"2.186.0"}},"AssetBucket":{"id":"AssetBucket","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunction/Code/AssetBucket","constructInfo":{"fqn":"aws-cdk-lib.aws_s3.BucketBase","version":"2.186.0","metadata":[]}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_s3_assets.Asset","version":"2.186.0"}},"Resource":{"id":"Resource","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunction/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::Lambda::Function","aws:cdk:cloudformation:props":{"code":{"s3Bucket":{"Fn::Sub":"cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"},"s3Key":"c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf.zip"},"environment":{"variables":{"AWS_NODEJS_CONNECTION_REUSE_ENABLED":"1","KINESIS_DATASTREAM_NAME":{"Ref":"teststream04374A09"}}},"handler":"index.handler","role":{"Fn::GetAtt":["testlambdakinesisstreamsLambdaFunctionServiceRole95206CF3","Arn"]},"runtime":"nodejs20.x","tracingConfig":{"mode":"Active"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.CfnFunction","version":"2.186.0"}},"inlinePolicyAddedToExecutionRole-0":{"id":"inlinePolicyAddedToExecutionRole-0","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunction/inlinePolicyAddedToExecutionRole-0","children":{"Resource":{"id":"Resource","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Policy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":["xray:PutTelemetryRecords","xray:PutTraceSegments"],"Effect":"Allow","Resource":"*"}],"Version":"2012-10-17"},"policyName":"testlambdakinesisstreamsLambdaFunctioninlinePolicyAddedToExecutionRole022FB8950","roles":[{"Ref":"testlambdakinesisstreamsLambdaFunctionServiceRole95206CF3"}]}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnPolicy","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Policy","version":"2.186.0","metadata":[{"statements":"*"},{"addStatements":[{}]},{"attachToRole":["*"]},{"attachToRole":["*"]}]}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.Function","version":"2.186.0","metadata":[{"role":"*","tracing":"Active","code":"*","runtime":"*","handler":"*"},{"addEnvironment":["*","*",{"removeInEdge":true}]},{"addEnvironment":["*","*"]}]}},"KinesisStreamGetRecordsIteratorAgeAlarm":{"id":"KinesisStreamGetRecordsIteratorAgeAlarm","path":"lamkin-existingStream/test-lambda-kinesisstreams/KinesisStreamGetRecordsIteratorAgeAlarm","children":{"Resource":{"id":"Resource","path":"lamkin-existingStream/test-lambda-kinesisstreams/KinesisStreamGetRecordsIteratorAgeAlarm/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::CloudWatch::Alarm","aws:cdk:cloudformation:props":{"alarmDescription":"Consumer Record Processing Falling Behind, there is risk for data loss due to record expiration.","comparisonOperator":"GreaterThanOrEqualToThreshold","evaluationPeriods":1,"metricName":"GetRecords.IteratorAgeMilliseconds","namespace":"AWS/Kinesis","period":300,"statistic":"Maximum","threshold":43200000}},"constructInfo":{"fqn":"aws-cdk-lib.aws_cloudwatch.CfnAlarm","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_cloudwatch.Alarm","version":"2.186.0","metadata":[{"metric":{"warnings":"*"},"threshold":"*","evaluationPeriods":"*","comparisonOperator":"*","alarmDescription":"*"}]}},"KinesisStreamReadProvisionedThroughputExceededAlarm":{"id":"KinesisStreamReadProvisionedThroughputExceededAlarm","path":"lamkin-existingStream/test-lambda-kinesisstreams/KinesisStreamReadProvisionedThroughputExceededAlarm","children":{"Resource":{"id":"Resource","path":"lamkin-existingStream/test-lambda-kinesisstreams/KinesisStreamReadProvisionedThroughputExceededAlarm/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::CloudWatch::Alarm","aws:cdk:cloudformation:props":{"alarmDescription":"Consumer Application is Reading at a Slower Rate Than Expected.","comparisonOperator":"GreaterThanThreshold","evaluationPeriods":1,"metricName":"ReadProvisionedThroughputExceeded","namespace":"AWS/Kinesis","period":300,"statistic":"Average","threshold":0}},"constructInfo":{"fqn":"aws-cdk-lib.aws_cloudwatch.CfnAlarm","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_cloudwatch.Alarm","version":"2.186.0","metadata":[{"metric":{"warnings":"*"},"threshold":"*","evaluationPeriods":"*","comparisonOperator":"*","alarmDescription":"*"}]}}},"constructInfo":{"fqn":"@aws-solutions-constructs/aws-lambda-kinesisstreams.LambdaToKinesisStreams","version":"2.80.0"}},"Integ":{"id":"Integ","path":"lamkin-existingStream/Integ","children":{"DefaultTest":{"id":"DefaultTest","path":"lamkin-existingStream/Integ/DefaultTest","children":{"Default":{"id":"Default","path":"lamkin-existingStream/Integ/DefaultTest/Default","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}},"DeployAssert":{"id":"DeployAssert","path":"lamkin-existingStream/Integ/DefaultTest/DeployAssert","children":{"BootstrapVersion":{"id":"BootstrapVersion","path":"lamkin-existingStream/Integ/DefaultTest/DeployAssert/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.186.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"lamkin-existingStream/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.186.0"}}},"constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTestCase","version":"2.186.0-alpha.0"}}},"constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTest","version":"2.186.0-alpha.0"}},"BootstrapVersion":{"id":"BootstrapVersion","path":"lamkin-existingStream/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.186.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"lamkin-existingStream/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.186.0"}},"Tree":{"id":"Tree","path":"Tree","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}}},"constructInfo":{"fqn":"aws-cdk-lib.App","version":"2.186.0"}}}
@@ -1 +1 @@
1
- {"version":"36.0.0"}
1
+ {"version":"40.0.0"}
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "36.0.0",
2
+ "version": "40.0.0",
3
3
  "testCases": {
4
4
  "lamkin-existingStreamWithCmk/Integ/DefaultTest": {
5
5
  "stacks": [
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "36.0.0",
2
+ "version": "40.0.0",
3
3
  "files": {
4
4
  "c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf": {
5
5
  "source": {
@@ -14,7 +14,7 @@
14
14
  }
15
15
  }
16
16
  },
17
- "6d90293707a3c193c47a9d4e92762b18fe153f6e8abbb5ce97cfc846b7ff8445": {
17
+ "f1ef3feb41c583900d3b9c1ffe571ea541fe856314fec0d8f564e329d486b81a": {
18
18
  "source": {
19
19
  "path": "lamkin-existingStreamWithCmk.template.json",
20
20
  "packaging": "file"
@@ -22,7 +22,7 @@
22
22
  "destinations": {
23
23
  "current_account-current_region": {
24
24
  "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
25
- "objectKey": "6d90293707a3c193c47a9d4e92762b18fe153f6e8abbb5ce97cfc846b7ff8445.json",
25
+ "objectKey": "f1ef3feb41c583900d3b9c1ffe571ea541fe856314fec0d8f564e329d486b81a.json",
26
26
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
27
27
  }
28
28
  }
@@ -121,14 +121,6 @@
121
121
  "Properties": {
122
122
  "PolicyDocument": {
123
123
  "Statement": [
124
- {
125
- "Action": [
126
- "xray:PutTelemetryRecords",
127
- "xray:PutTraceSegments"
128
- ],
129
- "Effect": "Allow",
130
- "Resource": "*"
131
- },
132
124
  {
133
125
  "Action": [
134
126
  "kinesis:ListShards",
@@ -167,16 +159,6 @@
167
159
  "Ref": "testlambdakinesisstreamsLambdaFunctionServiceRole95206CF3"
168
160
  }
169
161
  ]
170
- },
171
- "Metadata": {
172
- "cfn_nag": {
173
- "rules_to_suppress": [
174
- {
175
- "id": "W12",
176
- "reason": "Lambda needs the following minimum required permissions to send trace data to X-Ray and access ENIs in a VPC."
177
- }
178
- ]
179
- }
180
162
  }
181
163
  },
182
164
  "testlambdakinesisstreamsLambdaFunction4348B6E4": {
@@ -231,6 +213,30 @@
231
213
  }
232
214
  }
233
215
  },
216
+ "testlambdakinesisstreamsLambdaFunctioninlinePolicyAddedToExecutionRole022FB8950": {
217
+ "Type": "AWS::IAM::Policy",
218
+ "Properties": {
219
+ "PolicyDocument": {
220
+ "Statement": [
221
+ {
222
+ "Action": [
223
+ "xray:PutTelemetryRecords",
224
+ "xray:PutTraceSegments"
225
+ ],
226
+ "Effect": "Allow",
227
+ "Resource": "*"
228
+ }
229
+ ],
230
+ "Version": "2012-10-17"
231
+ },
232
+ "PolicyName": "testlambdakinesisstreamsLambdaFunctioninlinePolicyAddedToExecutionRole022FB8950",
233
+ "Roles": [
234
+ {
235
+ "Ref": "testlambdakinesisstreamsLambdaFunctionServiceRole95206CF3"
236
+ }
237
+ ]
238
+ }
239
+ },
234
240
  "testlambdakinesisstreamsKinesisStreamGetRecordsIteratorAgeAlarmC4A0FF00": {
235
241
  "Type": "AWS::CloudWatch::Alarm",
236
242
  "Properties": {
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "36.0.0",
2
+ "version": "40.0.0",
3
3
  "files": {
4
4
  "21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22": {
5
5
  "source": {