@aws-solutions-constructs/aws-lambda-kinesisstreams 2.94.0 → 2.95.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (33) hide show
  1. package/.jsii +31 -5
  2. package/lib/index.js +1 -1
  3. package/package.json +6 -6
  4. package/test/integ.lamkin-existingVpc.js.snapshot/asset.7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200/__entrypoint__.js +1 -0
  5. package/test/integ.lamkin-existingVpc.js.snapshot/asset.7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200/index.js +1 -0
  6. package/test/integ.lamkin-existingVpc.js.snapshot/asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf/index.mjs +15 -0
  7. package/test/integ.lamkin-existingVpc.js.snapshot/cdk.out +1 -1
  8. package/test/integ.lamkin-existingVpc.js.snapshot/integ.json +2 -2
  9. package/test/integ.lamkin-existingVpc.js.snapshot/lamkin-existingVpc.assets.json +4 -4
  10. package/test/integ.lamkin-existingVpc.js.snapshot/lamkin-existingVpc.template.json +0 -10
  11. package/test/integ.lamkin-existingVpc.js.snapshot/lamkinexistingVpcIntegDefaultTestDeployAssertB97E47BA.assets.json +1 -1
  12. package/test/integ.lamkin-existingVpc.js.snapshot/manifest.json +71 -61
  13. package/test/integ.lamkin-existingVpc.js.snapshot/tree.json +1 -1
  14. package/test/integ.lamkin-newVpc.js.snapshot/asset.7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200/__entrypoint__.js +1 -0
  15. package/test/integ.lamkin-newVpc.js.snapshot/asset.7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200/index.js +1 -0
  16. package/test/integ.lamkin-newVpc.js.snapshot/asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf/index.mjs +15 -0
  17. package/test/integ.lamkin-newVpc.js.snapshot/cdk.out +1 -1
  18. package/test/integ.lamkin-newVpc.js.snapshot/integ.json +2 -2
  19. package/test/integ.lamkin-newVpc.js.snapshot/lamkin-newVpc.assets.json +4 -4
  20. package/test/integ.lamkin-newVpc.js.snapshot/lamkin-newVpc.template.json +0 -10
  21. package/test/integ.lamkin-newVpc.js.snapshot/lamkinnewVpcIntegDefaultTestDeployAssert16AC3D59.assets.json +1 -1
  22. package/test/integ.lamkin-newVpc.js.snapshot/manifest.json +71 -61
  23. package/test/integ.lamkin-newVpc.js.snapshot/tree.json +1 -1
  24. package/test/integ.lamkin-newVpcFromProps.js.snapshot/asset.7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200/__entrypoint__.js +1 -0
  25. package/test/integ.lamkin-newVpcFromProps.js.snapshot/asset.7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200/index.js +1 -0
  26. package/test/integ.lamkin-newVpcFromProps.js.snapshot/asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf/index.mjs +15 -0
  27. package/test/integ.lamkin-newVpcFromProps.js.snapshot/cdk.out +1 -1
  28. package/test/integ.lamkin-newVpcFromProps.js.snapshot/integ.json +2 -2
  29. package/test/integ.lamkin-newVpcFromProps.js.snapshot/lamkin-newVpcFromProps.assets.json +4 -4
  30. package/test/integ.lamkin-newVpcFromProps.js.snapshot/lamkin-newVpcFromProps.template.json +0 -10
  31. package/test/integ.lamkin-newVpcFromProps.js.snapshot/lamkinnewVpcFromPropsIntegDefaultTestDeployAssert95FE0487.assets.json +1 -1
  32. package/test/integ.lamkin-newVpcFromProps.js.snapshot/manifest.json +71 -61
  33. package/test/integ.lamkin-newVpcFromProps.js.snapshot/tree.json +1 -1
package/.jsii CHANGED
@@ -8,8 +8,8 @@
8
8
  "url": "https://aws.amazon.com"
9
9
  },
10
10
  "dependencies": {
11
- "@aws-solutions-constructs/core": "2.94.0",
12
- "aws-cdk-lib": "^2.219.0",
11
+ "@aws-solutions-constructs/core": "2.95.1",
12
+ "aws-cdk-lib": "^2.223.0",
13
13
  "constructs": "^10.0.0"
14
14
  },
15
15
  "dependencyClosure": {
@@ -3242,6 +3242,19 @@
3242
3242
  }
3243
3243
  }
3244
3244
  },
3245
+ "aws-cdk-lib.aws_rtbfabric": {
3246
+ "targets": {
3247
+ "dotnet": {
3248
+ "package": "Amazon.CDK.AWS.RTBFabric"
3249
+ },
3250
+ "java": {
3251
+ "package": "software.amazon.awscdk.services.rtbfabric"
3252
+ },
3253
+ "python": {
3254
+ "module": "aws_cdk.aws_rtbfabric"
3255
+ }
3256
+ }
3257
+ },
3245
3258
  "aws-cdk-lib.aws_rum": {
3246
3259
  "targets": {
3247
3260
  "dotnet": {
@@ -3359,6 +3372,19 @@
3359
3372
  }
3360
3373
  }
3361
3374
  },
3375
+ "aws-cdk-lib.aws_s3vectors": {
3376
+ "targets": {
3377
+ "dotnet": {
3378
+ "package": "Amazon.CDK.AWS.S3Vectors"
3379
+ },
3380
+ "java": {
3381
+ "package": "software.amazon.awscdk.services.s3vectors"
3382
+ },
3383
+ "python": {
3384
+ "module": "aws_cdk.aws_s3vectors"
3385
+ }
3386
+ }
3387
+ },
3362
3388
  "aws-cdk-lib.aws_sagemaker": {
3363
3389
  "targets": {
3364
3390
  "dotnet": {
@@ -4104,7 +4130,7 @@
4104
4130
  },
4105
4131
  "description": "CDK constructs for defining an interaction between an AWS Lambda Function and an Amazon Kinesis Data Stream.",
4106
4132
  "homepage": "https://github.com/awslabs/aws-solutions-constructs.git",
4107
- "jsiiVersion": "5.7.22 (build 1cfeabd)",
4133
+ "jsiiVersion": "5.9.8 (build 3d2e131)",
4108
4134
  "keywords": [
4109
4135
  "aws",
4110
4136
  "cdk",
@@ -4435,6 +4461,6 @@
4435
4461
  "symbolId": "lib/index:LambdaToKinesisStreamsProps"
4436
4462
  }
4437
4463
  },
4438
- "version": "2.94.0",
4439
- "fingerprint": "oyUsU39xHUeupCORTbrslQhVYxHZPQWJtAh1/OtRPho="
4464
+ "version": "2.95.1",
4465
+ "fingerprint": "ri6OrVJbBEE/Mlm7PSArkoOR07YIV1IVB0ZJjTwZg3w="
4440
4466
  }
package/lib/index.js CHANGED
@@ -62,5 +62,5 @@ class LambdaToKinesisStreams extends constructs_1.Construct {
62
62
  }
63
63
  exports.LambdaToKinesisStreams = LambdaToKinesisStreams;
64
64
  _a = JSII_RTTI_SYMBOL_1;
65
- LambdaToKinesisStreams[_a] = { fqn: "@aws-solutions-constructs/aws-lambda-kinesisstreams.LambdaToKinesisStreams", version: "2.94.0" };
65
+ LambdaToKinesisStreams[_a] = { fqn: "@aws-solutions-constructs/aws-lambda-kinesisstreams.LambdaToKinesisStreams", version: "2.95.1" };
66
66
  //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["index.ts"],"names":[],"mappings":";;;;;AAgBA,2DAA2D;AAC3D,wFAAwF;AACxF,2CAAuC;AA4DvC;;GAEG;AACH,MAAa,sBAAuB,SAAQ,sBAAS;IAMjD;;;;;;;OAOG;IACH,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAkC;QAC1E,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,QAAQ,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC;QAC9B,QAAQ,CAAC,gBAAgB,CAAC,KAAK,CAAC,CAAC;QACjC,QAAQ,CAAC,uBAAuB,CAAC,KAAK,CAAC,CAAC;QAExC,gBAAgB;QAChB,IAAI,KAAK,CAAC,SAAS,IAAI,KAAK,CAAC,WAAW,EAAE,CAAC;YACzC,IAAI,CAAC,GAAG,GAAG,QAAQ,CAAC,QAAQ,CAAC,KAAK,EAAE;gBAClC,eAAe,EAAE,QAAQ,CAAC,uBAAuB,EAAE;gBACnD,WAAW,EAAE,KAAK,CAAC,WAAW;gBAC9B,YAAY,EAAE,KAAK,CAAC,QAAQ;gBAC5B,iBAAiB,EAAE;oBACjB,kBAAkB,EAAE,IAAI;oBACxB,gBAAgB,EAAE,IAAI;iBACvB;aACF,CAAC,CAAC;YAEH,QAAQ,CAAC,qBAAqB,CAAC,KAAK,EAAE,IAAI,CAAC,GAAG,EAAE,QAAQ,CAAC,oBAAoB,CAAC,eAAe,CAAC,CAAC;QACjG,CAAC;QAED,4BAA4B;QAC5B,IAAI,CAAC,cAAc,GAAG,QAAQ,CAAC,mBAAmB,CAAC,IAAI,EAAE;YACvD,iBAAiB,EAAE,KAAK,CAAC,iBAAiB;YAC1C,mBAAmB,EAAE,KAAK,CAAC,mBAAmB;YAC9C,GAAG,EAAE,IAAI,CAAC,GAAG;SACd,CAAC,CAAC;QAEH,2BAA2B;QAC3B,IAAI,CAAC,aAAa,GAAG,QAAQ,CAAC,kBAAkB,CAAC,IAAI,EAAE;YACrD,iBAAiB,EAAE,KAAK,CAAC,iBAAiB;YAC1C,kBAAkB,EAAE,KAAK,CAAC,kBAAkB;SAC7C,CAAC,CAAC;QAEH,kDAAkD;QAClD,MAAM,iCAAiC,GAAG,KAAK,CAAC,6BAA6B,IAAI,yBAAyB,CAAC;QAC3G,IAAI,CAAC,cAAc,CAAC,cAAc,CAAC,iCAAiC,EAAE,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,CAAC;QAErG,sEAAsE;QACtE,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,IAAI,CAAC,cAAc,CAAC,cAAc,CAAC,CAAC;QAElE,2GAA2G;QAC3G,IAAI,CAAC,aAAa,CAAC,aAAa,EAAE,KAAK,CAAC,IAAI,CAAC,cAAc,CAAC,cAAc,EACxE,aAAa,EACb,sBAAsB,CACvB,CAAC;QAEF,IAAI,KAAK,CAAC,sBAAsB,KAAK,SAAS,IAAI,KAAK,CAAC,sBAAsB,EAAE,CAAC;YAC/E,qDAAqD;YACrD,IAAI,CAAC,gBAAgB,GAAG,QAAQ,CAAC,0BAA0B,CAAC,IAAI,CAAC,CAAC;QACpE,CAAC;IACH,CAAC;;AAjEL,wDAkEC","sourcesContent":["/**\n *  Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n *\n *  Licensed under the Apache License, Version 2.0 (the \"License\"). You may not use this file except in compliance\n *  with the License. A copy of the License is located at\n *\n *      http://www.apache.org/licenses/LICENSE-2.0\n *\n *  or in the 'license' file accompanying this file. This file is distributed on an 'AS IS' BASIS, WITHOUT WARRANTIES\n *  OR CONDITIONS OF ANY KIND, express or implied. See the License for the specific language governing permissions\n *  and limitations under the License.\n */\n\n// Imports\nimport * as lambda from 'aws-cdk-lib/aws-lambda';\nimport * as kinesis from 'aws-cdk-lib/aws-kinesis';\nimport * as defaults from '@aws-solutions-constructs/core';\n// Note: To ensure CDKv2 compatibility, keep the import statement for Construct separate\nimport { Construct } from 'constructs';\nimport * as cloudwatch from 'aws-cdk-lib/aws-cloudwatch';\nimport * as ec2 from \"aws-cdk-lib/aws-ec2\";\n\n/**\n * The properties for the LambdaToKinesisStreams class.\n */\nexport interface LambdaToKinesisStreamsProps {\n    /**\n     * Existing instance of Lambda Function object, providing both this and `lambdaFunctionProps` will cause an error.\n     *\n     * @default - None\n     */\n    readonly existingLambdaObj?: lambda.Function;\n    /**\n     * User provided props to override the default props for the Lambda function.\n     *\n     * @default - Default props are used.\n     */\n    readonly lambdaFunctionProps?: lambda.FunctionProps;\n    /**\n     * Existing instance of Kinesis Stream, providing both this and `kinesisStreamProps` will cause an error.\n     *\n     * @default - None\n     */\n    readonly existingStreamObj?: kinesis.Stream;\n    /**\n     * Optional user-provided props to override the default props for the Kinesis stream.\n     *\n     * @default - Default props are used.\n     */\n    readonly kinesisStreamProps?: kinesis.StreamProps;\n    /**\n     * Whether to create recommended CloudWatch alarms for the Kinesis Stream\n     *\n     * @default - Alarms are created\n     */\n    readonly createCloudWatchAlarms?: boolean;\n    /**\n     * An existing VPC for the construct to use (construct will NOT create a new VPC in this case)\n     */\n    readonly existingVpc?: ec2.IVpc;\n    /**\n     *  Properties to override default properties if deployVpc is true\n     */\n    readonly vpcProps?: ec2.VpcProps;\n    /**\n     * Whether to deploy a new VPC\n     *\n     * @default - false\n     */\n    readonly deployVpc?: boolean;\n    /**\n     * Optional Name to override the Lambda Function default environment variable name that holds the Kinesis Data Stream name value\n     *\n     * @default - KINESIS_DATASTREAM_NAME\n     */\n    readonly streamEnvironmentVariableName?: string;\n}\n\n/**\n * @summary The LambdaToKinesisStream class.\n */\nexport class LambdaToKinesisStreams extends Construct {\n    public readonly vpc?: ec2.IVpc;\n    public readonly kinesisStream: kinesis.Stream;\n    public readonly lambdaFunction: lambda.Function;\n    public readonly cloudwatchAlarms?: cloudwatch.Alarm[];\n\n    /**\n     * @summary Constructs a new instance of the KinesisStreamsToLambda class.\n     * @param {cdk.App} scope - represents the scope for all the resources.\n     * @param {string} id - this is a a scope-unique id.\n     * @param {LambdaToKinesisStreamsProps} props - user provided props for the construct\n     * @since 0.8.0\n     * @access public\n     */\n    constructor(scope: Construct, id: string, props: LambdaToKinesisStreamsProps) {\n      super(scope, id);\n      defaults.CheckVpcProps(props);\n      defaults.CheckLambdaProps(props);\n      defaults.CheckKinesisStreamProps(props);\n\n      // Setup the VPC\n      if (props.deployVpc || props.existingVpc) {\n        this.vpc = defaults.buildVpc(scope, {\n          defaultVpcProps: defaults.DefaultIsolatedVpcProps(),\n          existingVpc: props.existingVpc,\n          userVpcProps: props.vpcProps,\n          constructVpcProps: {\n            enableDnsHostnames: true,\n            enableDnsSupport: true,\n          },\n        });\n\n        defaults.AddAwsServiceEndpoint(scope, this.vpc, defaults.ServiceEndpointTypes.KINESIS_STREAMS);\n      }\n\n      // Setup the Lambda function\n      this.lambdaFunction = defaults.buildLambdaFunction(this, {\n        existingLambdaObj: props.existingLambdaObj,\n        lambdaFunctionProps: props.lambdaFunctionProps,\n        vpc: this.vpc\n      });\n\n      // Setup the Kinesis Stream\n      this.kinesisStream = defaults.buildKinesisStream(this, {\n        existingStreamObj: props.existingStreamObj,\n        kinesisStreamProps: props.kinesisStreamProps\n      });\n\n      // Configure Lambda Function environment variables\n      const streamNameEnvironmentVariableName = props.streamEnvironmentVariableName || 'KINESIS_DATASTREAM_NAME';\n      this.lambdaFunction.addEnvironment(streamNameEnvironmentVariableName, this.kinesisStream.streamName);\n\n      // Grant the Lambda Function permission to write to the Kinesis Stream\n      this.kinesisStream.grantWrite(this.lambdaFunction.grantPrincipal);\n\n      // Grant the Lambda Function permission to use the stream's encryption key so it can publish messages to it\n      this.kinesisStream.encryptionKey?.grant(this.lambdaFunction.grantPrincipal,\n        'kms:Decrypt',\n        'kms:GenerateDataKey*',\n      );\n\n      if (props.createCloudWatchAlarms === undefined || props.createCloudWatchAlarms) {\n        // Deploy best practices CW Alarms for Kinesis Stream\n        this.cloudwatchAlarms = defaults.buildKinesisStreamCWAlarms(this);\n      }\n    }\n}"]}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@aws-solutions-constructs/aws-lambda-kinesisstreams",
3
- "version": "2.94.0",
3
+ "version": "2.95.1",
4
4
  "description": "CDK constructs for defining an interaction between an AWS Lambda Function and an Amazon Kinesis Data Stream.",
5
5
  "main": "lib/index.js",
6
6
  "types": "lib/index.d.ts",
@@ -55,14 +55,14 @@
55
55
  }
56
56
  },
57
57
  "dependencies": {
58
- "@aws-solutions-constructs/core": "2.94.0",
58
+ "@aws-solutions-constructs/core": "2.95.1",
59
59
  "constructs": "^10.0.0"
60
60
  },
61
61
  "devDependencies": {
62
- "@aws-cdk/integ-tests-alpha": "2.219.0-alpha.0",
62
+ "@aws-cdk/integ-tests-alpha": "2.223.0-alpha.0",
63
63
  "@types/node": "^10.3.0",
64
64
  "constructs": "^10.0.0",
65
- "aws-cdk-lib": "2.219.0"
65
+ "aws-cdk-lib": "2.223.0"
66
66
  },
67
67
  "jest": {
68
68
  "moduleFileExtensions": [
@@ -79,9 +79,9 @@
79
79
  ]
80
80
  },
81
81
  "peerDependencies": {
82
- "@aws-solutions-constructs/core": "2.94.0",
82
+ "@aws-solutions-constructs/core": "2.95.1",
83
83
  "constructs": "^10.0.0",
84
- "aws-cdk-lib": "^2.219.0"
84
+ "aws-cdk-lib": "^2.223.0"
85
85
  },
86
86
  "keywords": [
87
87
  "aws",
@@ -0,0 +1 @@
1
+ "use strict";Object.defineProperty(exports,"__esModule",{value:!0}),exports.external=void 0,exports.handler=handler,exports.withRetries=withRetries;const https=require("https"),url=require("url");exports.external={sendHttpRequest:defaultSendHttpRequest,log:defaultLog,includeStackTraces:!0,userHandlerIndex:"./index"};const CREATE_FAILED_PHYSICAL_ID_MARKER="AWSCDK::CustomResourceProviderFramework::CREATE_FAILED",MISSING_PHYSICAL_ID_MARKER="AWSCDK::CustomResourceProviderFramework::MISSING_PHYSICAL_ID";async function handler(event,context){const sanitizedEvent={...event,ResponseURL:"..."};if(exports.external.log(JSON.stringify(sanitizedEvent,void 0,2)),event.RequestType==="Delete"&&event.PhysicalResourceId===CREATE_FAILED_PHYSICAL_ID_MARKER){exports.external.log("ignoring DELETE event caused by a failed CREATE event"),await submitResponse("SUCCESS",event);return}try{const userHandler=require(exports.external.userHandlerIndex).handler,result=await userHandler(sanitizedEvent,context),responseEvent=renderResponse(event,result);await submitResponse("SUCCESS",responseEvent)}catch(e){const resp={...event,Reason:exports.external.includeStackTraces?e.stack:e.message};resp.PhysicalResourceId||(event.RequestType==="Create"?(exports.external.log("CREATE failed, responding with a marker physical resource id so that the subsequent DELETE will be ignored"),resp.PhysicalResourceId=CREATE_FAILED_PHYSICAL_ID_MARKER):exports.external.log(`ERROR: Malformed event. "PhysicalResourceId" is required: ${JSON.stringify(event)}`)),await submitResponse("FAILED",resp)}}function renderResponse(cfnRequest,handlerResponse={}){const physicalResourceId=handlerResponse.PhysicalResourceId??cfnRequest.PhysicalResourceId??cfnRequest.RequestId;if(cfnRequest.RequestType==="Delete"&&physicalResourceId!==cfnRequest.PhysicalResourceId)throw new Error(`DELETE: cannot change the physical resource ID from "${cfnRequest.PhysicalResourceId}" to "${handlerResponse.PhysicalResourceId}" during deletion`);return{...cfnRequest,...handlerResponse,PhysicalResourceId:physicalResourceId}}async function submitResponse(status,event){const json={Status:status,Reason:event.Reason??status,StackId:event.StackId,RequestId:event.RequestId,PhysicalResourceId:event.PhysicalResourceId||MISSING_PHYSICAL_ID_MARKER,LogicalResourceId:event.LogicalResourceId,NoEcho:event.NoEcho,Data:event.Data},parsedUrl=url.parse(event.ResponseURL),loggingSafeUrl=`${parsedUrl.protocol}//${parsedUrl.hostname}/${parsedUrl.pathname}?***`;exports.external.log("submit response to cloudformation",loggingSafeUrl,json);const responseBody=JSON.stringify(json),req={hostname:parsedUrl.hostname,path:parsedUrl.path,method:"PUT",headers:{"content-type":"","content-length":Buffer.byteLength(responseBody,"utf8")}};await withRetries({attempts:5,sleep:1e3},exports.external.sendHttpRequest)(req,responseBody)}async function defaultSendHttpRequest(options,requestBody){return new Promise((resolve,reject)=>{try{const request=https.request(options,response=>{response.resume(),!response.statusCode||response.statusCode>=400?reject(new Error(`Unsuccessful HTTP response: ${response.statusCode}`)):resolve()});request.on("error",reject),request.write(requestBody),request.end()}catch(e){reject(e)}})}function defaultLog(fmt,...params){console.log(fmt,...params)}function withRetries(options,fn){return async(...xs)=>{let attempts=options.attempts,ms=options.sleep;for(;;)try{return await fn(...xs)}catch(e){if(attempts--<=0)throw e;await sleep(Math.floor(Math.random()*ms)),ms*=2}}}async function sleep(ms){return new Promise(ok=>setTimeout(ok,ms))}
@@ -0,0 +1 @@
1
+ "use strict";var I=Object.create,t=Object.defineProperty,y=Object.getOwnPropertyDescriptor,P=Object.getOwnPropertyNames,g=Object.getPrototypeOf,l=Object.prototype.hasOwnProperty,G=(r,e)=>{for(var o in e)t(r,o,{get:e[o],enumerable:!0})},n=(r,e,o,i)=>{if(e&&typeof e=="object"||typeof e=="function")for(let s of P(e))!l.call(r,s)&&s!==o&&t(r,s,{get:()=>e[s],enumerable:!(i=y(e,s))||i.enumerable});return r},R=(r,e,o)=>(o=r!=null?I(g(r)):{},n(e||!r||!r.__esModule?t(o,"default",{value:r,enumerable:!0}):o,r)),S=r=>n(t({},"__esModule",{value:!0}),r),k={};G(k,{handler:()=>f}),module.exports=S(k);var a=R(require("@aws-sdk/client-ec2")),u=new a.EC2({});function c(r,e){return{GroupId:r,IpPermissions:[{UserIdGroupPairs:[{GroupId:r,UserId:e}],IpProtocol:"-1"}]}}function d(r){return{GroupId:r,IpPermissions:[{IpRanges:[{CidrIp:"0.0.0.0/0"}],IpProtocol:"-1"}]}}async function f(r){let e=r.ResourceProperties.DefaultSecurityGroupId,o=r.ResourceProperties.Account;switch(r.RequestType){case"Create":return p(e,o);case"Update":return h(r);case"Delete":return m(e,o)}}async function h(r){let e=r.OldResourceProperties.DefaultSecurityGroupId,o=r.ResourceProperties.DefaultSecurityGroupId;e!==o&&(await m(e,r.ResourceProperties.Account),await p(o,r.ResourceProperties.Account))}async function p(r,e){try{await u.revokeSecurityGroupEgress(d(r))}catch(o){if(o.name!=="InvalidPermission.NotFound")throw o}try{await u.revokeSecurityGroupIngress(c(r,e))}catch(o){if(o.name!=="InvalidPermission.NotFound")throw o}}async function m(r,e){await u.authorizeSecurityGroupIngress(c(r,e)),await u.authorizeSecurityGroupEgress(d(r))}
@@ -0,0 +1,15 @@
1
+ import { KinesisClient, PutRecordCommand } from "@aws-sdk/client-kinesis";
2
+
3
+ const kinesis = new KinesisClient({ region: process.env.REGION });
4
+ const streamName = process.env.KINESIS_DATASTREAM_NAME;
5
+
6
+ export const handler = async(event) => {
7
+
8
+ const result = await kinesis.send(new PutRecordCommand({
9
+ StreamName: streamName,
10
+ Data: Buffer.from('hello from solutions constructs'),
11
+ PartitionKey: '1'
12
+ }));
13
+
14
+ console.log(JSON.stringify(result));
15
+ };
@@ -1 +1 @@
1
- {"version":"45.0.0"}
1
+ {"version":"48.0.0"}
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "45.0.0",
2
+ "version": "48.0.0",
3
3
  "testCases": {
4
4
  "lamkin-existingVpc/Integ/DefaultTest": {
5
5
  "stacks": [
@@ -9,5 +9,5 @@
9
9
  "assertionStackName": "lamkinexistingVpcIntegDefaultTestDeployAssertB97E47BA"
10
10
  }
11
11
  },
12
- "minimumCliVersion": "2.1020.2"
12
+ "minimumCliVersion": "2.1029.2"
13
13
  }
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "45.0.0",
2
+ "version": "48.0.0",
3
3
  "files": {
4
4
  "7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200": {
5
5
  "displayName": "lamkin-existingVpc/Custom::VpcRestrictDefaultSGCustomResourceProvider Code",
@@ -29,16 +29,16 @@
29
29
  }
30
30
  }
31
31
  },
32
- "7b7f516ff81d441c47a09ceb2be5cbbc5791c8adbea28f13c426eb021e10fbbc": {
32
+ "3feb1d161f8a47e5920e3ee615458ac1138f163efa4047eb8e7d413f8b74672a": {
33
33
  "displayName": "lamkin-existingVpc Template",
34
34
  "source": {
35
35
  "path": "lamkin-existingVpc.template.json",
36
36
  "packaging": "file"
37
37
  },
38
38
  "destinations": {
39
- "current_account-current_region-1c41c6f1": {
39
+ "current_account-current_region-c9d97f0d": {
40
40
  "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
41
- "objectKey": "7b7f516ff81d441c47a09ceb2be5cbbc5791c8adbea28f13c426eb021e10fbbc.json",
41
+ "objectKey": "3feb1d161f8a47e5920e3ee615458ac1138f163efa4047eb8e7d413f8b74672a.json",
42
42
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
43
43
  }
44
44
  }
@@ -474,16 +474,6 @@
474
474
  "Arn"
475
475
  ]
476
476
  }
477
- },
478
- {
479
- "Action": "iam:PassRole",
480
- "Effect": "Allow",
481
- "Resource": {
482
- "Fn::GetAtt": [
483
- "VpcFlowLogIAMRole6A475D41",
484
- "Arn"
485
- ]
486
- }
487
477
  }
488
478
  ],
489
479
  "Version": "2012-10-17"
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "45.0.0",
2
+ "version": "48.0.0",
3
3
  "files": {
4
4
  "21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22": {
5
5
  "displayName": "lamkinexistingVpcIntegDefaultTestDeployAssertB97E47BA Template",
@@ -66,7 +66,7 @@
66
66
  "validateOnSynth": false,
67
67
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
68
68
  "cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
69
- "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/7b7f516ff81d441c47a09ceb2be5cbbc5791c8adbea28f13c426eb021e10fbbc.json",
69
+ "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/3feb1d161f8a47e5920e3ee615458ac1138f163efa4047eb8e7d413f8b74672a.json",
70
70
  "requiresBootstrapStackVersion": 6,
71
71
  "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
72
72
  "additionalDependencies": [
@@ -408,14 +408,6 @@
408
408
  "*"
409
409
  ]
410
410
  }
411
- },
412
- {
413
- "type": "aws:cdk:analytics:method",
414
- "data": {
415
- "addToPrincipalPolicy": [
416
- {}
417
- ]
418
- }
419
411
  }
420
412
  ],
421
413
  "/lamkin-existingVpc/Vpc/FlowLog/IAMRole/ImportIAMRole": [
@@ -451,14 +443,6 @@
451
443
  ]
452
444
  }
453
445
  },
454
- {
455
- "type": "aws:cdk:analytics:method",
456
- "data": {
457
- "addStatements": [
458
- {}
459
- ]
460
- }
461
- },
462
446
  {
463
447
  "type": "aws:cdk:analytics:method",
464
448
  "data": {
@@ -498,9 +482,9 @@
498
482
  "data": {
499
483
  "vpc": "*",
500
484
  "service": {
501
- "privateDnsDefault": true,
502
485
  "name": "*",
503
- "port": "*"
486
+ "port": "*",
487
+ "privateDnsDefault": true
504
488
  },
505
489
  "securityGroups": [
506
490
  "*"
@@ -771,7 +755,8 @@
771
755
  "type": "aws:cdk:analytics:construct",
772
756
  "data": {
773
757
  "metric": {
774
- "warnings": "*"
758
+ "warnings": "*",
759
+ "warningsV2": "*"
775
760
  },
776
761
  "threshold": "*",
777
762
  "evaluationPeriods": "*",
@@ -791,7 +776,8 @@
791
776
  "type": "aws:cdk:analytics:construct",
792
777
  "data": {
793
778
  "metric": {
794
- "warnings": "*"
779
+ "warnings": "*",
780
+ "warningsV2": "*"
795
781
  },
796
782
  "threshold": "*",
797
783
  "evaluationPeriods": "*",
@@ -877,57 +863,48 @@
877
863
  "properties": {
878
864
  "module": "aws-cdk-lib",
879
865
  "flags": {
880
- "@aws-cdk/core:enableStackNameDuplicates": {
881
- "recommendedValue": true,
882
- "explanation": "Allow multiple stacks with the same name"
883
- },
884
- "aws-cdk:enableDiffNoFail": {
866
+ "@aws-cdk/aws-signer:signingProfileNamePassedToCfn": {
885
867
  "recommendedValue": true,
886
- "explanation": "Make `cdk diff` not fail when there are differences"
868
+ "explanation": "Pass signingProfileName to CfnSigningProfile"
887
869
  },
888
870
  "@aws-cdk/core:newStyleStackSynthesis": {
889
871
  "recommendedValue": true,
890
- "explanation": "Switch to new stack synthesis method which enables CI/CD"
872
+ "explanation": "Switch to new stack synthesis method which enables CI/CD",
873
+ "unconfiguredBehavesLike": {
874
+ "v2": true
875
+ }
891
876
  },
892
877
  "@aws-cdk/core:stackRelativeExports": {
893
878
  "recommendedValue": true,
894
- "explanation": "Name exports based on the construct paths relative to the stack, rather than the global construct path"
895
- },
896
- "@aws-cdk/aws-ecr-assets:dockerIgnoreSupport": {
897
- "recommendedValue": true,
898
- "explanation": "DockerImageAsset properly supports `.dockerignore` files by default"
899
- },
900
- "@aws-cdk/aws-secretsmanager:parseOwnedSecretName": {
901
- "recommendedValue": true,
902
- "explanation": "Fix the referencing of SecretsManager names from ARNs"
903
- },
904
- "@aws-cdk/aws-kms:defaultKeyPolicies": {
905
- "recommendedValue": true,
906
- "explanation": "Tighten default KMS key policies"
907
- },
908
- "@aws-cdk/aws-s3:grantWriteWithoutAcl": {
909
- "recommendedValue": true,
910
- "explanation": "Remove `PutObjectAcl` from Bucket.grantWrite"
879
+ "explanation": "Name exports based on the construct paths relative to the stack, rather than the global construct path",
880
+ "unconfiguredBehavesLike": {
881
+ "v2": true
882
+ }
911
883
  },
912
- "@aws-cdk/aws-ecs-patterns:removeDefaultDesiredCount": {
884
+ "@aws-cdk/aws-ecs-patterns:secGroupsDisablesImplicitOpenListener": {
913
885
  "recommendedValue": true,
914
- "explanation": "Do not specify a default DesiredCount for ECS services"
886
+ "explanation": "Disable implicit openListener when custom security groups are provided"
915
887
  },
916
888
  "@aws-cdk/aws-rds:lowercaseDbIdentifier": {
917
889
  "recommendedValue": true,
918
- "explanation": "Force lowercasing of RDS Cluster names in CDK"
890
+ "explanation": "Force lowercasing of RDS Cluster names in CDK",
891
+ "unconfiguredBehavesLike": {
892
+ "v2": true
893
+ }
919
894
  },
920
895
  "@aws-cdk/aws-apigateway:usagePlanKeyOrderInsensitiveId": {
921
896
  "recommendedValue": true,
922
- "explanation": "Allow adding/removing multiple UsagePlanKeys independently"
923
- },
924
- "@aws-cdk/aws-efs:defaultEncryptionAtRest": {
925
- "recommendedValue": true,
926
- "explanation": "Enable this feature flag to have elastic file systems encrypted at rest by default."
897
+ "explanation": "Allow adding/removing multiple UsagePlanKeys independently",
898
+ "unconfiguredBehavesLike": {
899
+ "v2": true
900
+ }
927
901
  },
928
902
  "@aws-cdk/aws-lambda:recognizeVersionProps": {
929
903
  "recommendedValue": true,
930
- "explanation": "Enable this feature flag to opt in to the updated logical id calculation for Lambda Version created using the `fn.currentVersion`."
904
+ "explanation": "Enable this feature flag to opt in to the updated logical id calculation for Lambda Version created using the `fn.currentVersion`.",
905
+ "unconfiguredBehavesLike": {
906
+ "v2": true
907
+ }
931
908
  },
932
909
  "@aws-cdk/aws-lambda:recognizeLayerVersion": {
933
910
  "userValue": true,
@@ -936,7 +913,10 @@
936
913
  },
937
914
  "@aws-cdk/aws-cloudfront:defaultSecurityPolicyTLSv1.2_2021": {
938
915
  "recommendedValue": true,
939
- "explanation": "Enable this feature flag to have cloudfront distributions use the security policy TLSv1.2_2021 by default."
916
+ "explanation": "Enable this feature flag to have cloudfront distributions use the security policy TLSv1.2_2021 by default.",
917
+ "unconfiguredBehavesLike": {
918
+ "v2": true
919
+ }
940
920
  },
941
921
  "@aws-cdk/core:checkSecretUsage": {
942
922
  "userValue": true,
@@ -1013,7 +993,7 @@
1013
993
  "@aws-cdk/aws-iam:importedRoleStackSafeDefaultPolicyName": {
1014
994
  "userValue": true,
1015
995
  "recommendedValue": true,
1016
- "explanation": "Enable this feature to by default create default policy names for imported roles that depend on the stack the role is in."
996
+ "explanation": "Enable this feature to create default policy names for imported roles that depend on the stack the role is in."
1017
997
  },
1018
998
  "@aws-cdk/aws-s3:serverAccessLogsUseBucketPolicy": {
1019
999
  "userValue": true,
@@ -1157,7 +1137,10 @@
1157
1137
  },
1158
1138
  "@aws-cdk/pipelines:reduceAssetRoleTrustScope": {
1159
1139
  "recommendedValue": true,
1160
- "explanation": "Remove the root account principal from PipelineAssetsFileRole trust policy"
1140
+ "explanation": "Remove the root account principal from PipelineAssetsFileRole trust policy",
1141
+ "unconfiguredBehavesLike": {
1142
+ "v2": true
1143
+ }
1161
1144
  },
1162
1145
  "@aws-cdk/aws-eks:nodegroupNameAttribute": {
1163
1146
  "userValue": true,
@@ -1186,7 +1169,10 @@
1186
1169
  },
1187
1170
  "@aws-cdk/aws-stepfunctions-tasks:useNewS3UriParametersForBedrockInvokeModelTask": {
1188
1171
  "recommendedValue": true,
1189
- "explanation": "When enabled, use new props for S3 URI field in task definition of state machine for bedrock invoke model."
1172
+ "explanation": "When enabled, use new props for S3 URI field in task definition of state machine for bedrock invoke model.",
1173
+ "unconfiguredBehavesLike": {
1174
+ "v2": true
1175
+ }
1190
1176
  },
1191
1177
  "@aws-cdk/core:explicitStackTags": {
1192
1178
  "userValue": true,
@@ -1250,7 +1236,10 @@
1250
1236
  },
1251
1237
  "@aws-cdk/core:aspectStabilization": {
1252
1238
  "recommendedValue": true,
1253
- "explanation": "When enabled, a stabilization loop will be run when invoking Aspects during synthesis."
1239
+ "explanation": "When enabled, a stabilization loop will be run when invoking Aspects during synthesis.",
1240
+ "unconfiguredBehavesLike": {
1241
+ "v2": true
1242
+ }
1254
1243
  },
1255
1244
  "@aws-cdk/aws-route53-targets:userPoolDomainNameMethodWithoutCustomResource": {
1256
1245
  "userValue": true,
@@ -1284,7 +1273,10 @@
1284
1273
  },
1285
1274
  "@aws-cdk/pipelines:reduceStageRoleTrustScope": {
1286
1275
  "recommendedValue": true,
1287
- "explanation": "Remove the root account principal from Stage addActions trust policy"
1276
+ "explanation": "Remove the root account principal from Stage addActions trust policy",
1277
+ "unconfiguredBehavesLike": {
1278
+ "v2": true
1279
+ }
1288
1280
  },
1289
1281
  "@aws-cdk/aws-events:requireEventBusPolicySid": {
1290
1282
  "userValue": true,
@@ -1307,7 +1299,10 @@
1307
1299
  },
1308
1300
  "@aws-cdk/pipelines:reduceCrossAccountActionRoleTrustScope": {
1309
1301
  "recommendedValue": true,
1310
- "explanation": "When enabled, scopes down the trust policy for the cross-account action role"
1302
+ "explanation": "When enabled, scopes down the trust policy for the cross-account action role",
1303
+ "unconfiguredBehavesLike": {
1304
+ "v2": true
1305
+ }
1311
1306
  },
1312
1307
  "@aws-cdk/aws-stepfunctions:useDistributedMapResultWriterV2": {
1313
1308
  "userValue": true,
@@ -1337,6 +1332,21 @@
1337
1332
  "userValue": true,
1338
1333
  "recommendedValue": true,
1339
1334
  "explanation": "When enabled, CDK creates and manages loggroup for the lambda function"
1335
+ },
1336
+ "@aws-cdk/aws-elasticloadbalancingv2:networkLoadBalancerWithSecurityGroupByDefault": {
1337
+ "recommendedValue": true,
1338
+ "explanation": "When enabled, Network Load Balancer will be created with a security group by default."
1339
+ },
1340
+ "@aws-cdk/aws-stepfunctions-tasks:httpInvokeDynamicJsonPathEndpoint": {
1341
+ "recommendedValue": true,
1342
+ "explanation": "When enabled, allows using a dynamic apiEndpoint with JSONPath format in HttpInvoke tasks.",
1343
+ "unconfiguredBehavesLike": {
1344
+ "v2": true
1345
+ }
1346
+ },
1347
+ "@aws-cdk/aws-ecs-patterns:uniqueTargetGroupId": {
1348
+ "recommendedValue": true,
1349
+ "explanation": "When enabled, ECS patterns will generate unique target group IDs to prevent conflicts during load balancer replacement"
1340
1350
  }
1341
1351
  }
1342
1352
  }