@aws-solutions-constructs/aws-lambda-kinesisstreams 2.98.0 → 2.100.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +36 -9
- package/README.adoc +1 -1
- package/lib/index.js +1 -1
- package/package.json +6 -7
- package/test/integ.lamkin-existingLambda.js +2 -2
- package/test/integ.lamkin-existingLambda.js.snapshot/cdk.out +1 -1
- package/test/integ.lamkin-existingLambda.js.snapshot/integ.json +2 -2
- package/test/integ.lamkin-existingLambda.js.snapshot/lamkin-existingLambda.assets.json +4 -18
- package/test/integ.lamkin-existingLambda.js.snapshot/lamkin-existingLambda.template.json +1 -4
- package/test/integ.lamkin-existingLambda.js.snapshot/lamkinexistingLambdaIntegDefaultTestDeployAssertD62E9419.assets.json +1 -1
- package/test/integ.lamkin-existingLambda.js.snapshot/manifest.json +23 -19
- package/test/integ.lamkin-existingLambda.js.snapshot/tree.json +1 -1
- package/test/integ.lamkin-existingStream.js +2 -2
- package/test/integ.lamkin-existingStream.js.snapshot/cdk.out +1 -1
- package/test/integ.lamkin-existingStream.js.snapshot/integ.json +2 -2
- package/test/integ.lamkin-existingStream.js.snapshot/lamkin-existingStream.assets.json +4 -18
- package/test/integ.lamkin-existingStream.js.snapshot/lamkin-existingStream.template.json +1 -4
- package/test/integ.lamkin-existingStream.js.snapshot/lamkinexistingStreamIntegDefaultTestDeployAssert2681B9A2.assets.json +1 -1
- package/test/integ.lamkin-existingStream.js.snapshot/manifest.json +23 -19
- package/test/integ.lamkin-existingStream.js.snapshot/tree.json +1 -1
- package/test/integ.lamkin-existingStreamWithCmk.js +2 -2
- package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/cdk.out +1 -1
- package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/integ.json +2 -2
- package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/lamkin-existingStreamWithCmk.assets.json +4 -18
- package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/lamkin-existingStreamWithCmk.template.json +1 -4
- package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/lamkinexistingStreamWithCmkIntegDefaultTestDeployAssert6EDF4045.assets.json +1 -1
- package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/manifest.json +23 -19
- package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/tree.json +1 -1
- package/test/integ.lamkin-existingVpc.js +2 -2
- package/test/integ.lamkin-existingVpc.js.snapshot/cdk.out +1 -1
- package/test/integ.lamkin-existingVpc.js.snapshot/integ.json +2 -2
- package/test/integ.lamkin-existingVpc.js.snapshot/lamkin-existingVpc.assets.json +4 -18
- package/test/integ.lamkin-existingVpc.js.snapshot/lamkin-existingVpc.template.json +1 -4
- package/test/integ.lamkin-existingVpc.js.snapshot/lamkinexistingVpcIntegDefaultTestDeployAssertB97E47BA.assets.json +1 -1
- package/test/integ.lamkin-existingVpc.js.snapshot/manifest.json +23 -25
- package/test/integ.lamkin-existingVpc.js.snapshot/tree.json +1 -1
- package/test/integ.lamkin-newStreamFromProps.js +2 -2
- package/test/integ.lamkin-newStreamFromProps.js.snapshot/cdk.out +1 -1
- package/test/integ.lamkin-newStreamFromProps.js.snapshot/integ.json +2 -2
- package/test/integ.lamkin-newStreamFromProps.js.snapshot/lamkin-newStreamFromProps.assets.json +4 -18
- package/test/integ.lamkin-newStreamFromProps.js.snapshot/lamkin-newStreamFromProps.template.json +1 -4
- package/test/integ.lamkin-newStreamFromProps.js.snapshot/lamkinnewStreamFromPropsIntegDefaultTestDeployAssertC2946F34.assets.json +1 -1
- package/test/integ.lamkin-newStreamFromProps.js.snapshot/manifest.json +23 -19
- package/test/integ.lamkin-newStreamFromProps.js.snapshot/tree.json +1 -1
- package/test/integ.lamkin-newVpc.js +2 -2
- package/test/integ.lamkin-newVpc.js.snapshot/cdk.out +1 -1
- package/test/integ.lamkin-newVpc.js.snapshot/integ.json +2 -2
- package/test/integ.lamkin-newVpc.js.snapshot/lamkin-newVpc.assets.json +4 -18
- package/test/integ.lamkin-newVpc.js.snapshot/lamkin-newVpc.template.json +1 -4
- package/test/integ.lamkin-newVpc.js.snapshot/lamkinnewVpcIntegDefaultTestDeployAssert16AC3D59.assets.json +1 -1
- package/test/integ.lamkin-newVpc.js.snapshot/manifest.json +23 -25
- package/test/integ.lamkin-newVpc.js.snapshot/tree.json +1 -1
- package/test/integ.lamkin-newVpcFromProps.js +2 -2
- package/test/integ.lamkin-newVpcFromProps.js.snapshot/cdk.out +1 -1
- package/test/integ.lamkin-newVpcFromProps.js.snapshot/integ.json +2 -2
- package/test/integ.lamkin-newVpcFromProps.js.snapshot/lamkin-newVpcFromProps.assets.json +4 -18
- package/test/integ.lamkin-newVpcFromProps.js.snapshot/lamkin-newVpcFromProps.template.json +1 -4
- package/test/integ.lamkin-newVpcFromProps.js.snapshot/lamkinnewVpcFromPropsIntegDefaultTestDeployAssert95FE0487.assets.json +1 -1
- package/test/integ.lamkin-newVpcFromProps.js.snapshot/manifest.json +23 -25
- package/test/integ.lamkin-newVpcFromProps.js.snapshot/tree.json +1 -1
- package/test/integ.lamkin-noArguments.js +2 -2
- package/test/integ.lamkin-noArguments.js.snapshot/cdk.out +1 -1
- package/test/integ.lamkin-noArguments.js.snapshot/integ.json +2 -2
- package/test/integ.lamkin-noArguments.js.snapshot/lamkin-noArguments.assets.json +4 -18
- package/test/integ.lamkin-noArguments.js.snapshot/lamkin-noArguments.template.json +1 -4
- package/test/integ.lamkin-noArguments.js.snapshot/lamkinnoArgumentsIntegDefaultTestDeployAssertC0CED4B2.assets.json +1 -1
- package/test/integ.lamkin-noArguments.js.snapshot/manifest.json +23 -19
- package/test/integ.lamkin-noArguments.js.snapshot/tree.json +1 -1
- package/test/lambda-kinesisstream.test.js +5 -5
- package/test/integ.lamkin-existingLambda.js.snapshot/asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf/index.mjs +0 -15
- package/test/integ.lamkin-existingStream.js.snapshot/asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf/index.mjs +0 -15
- package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf/index.mjs +0 -15
- package/test/integ.lamkin-existingVpc.js.snapshot/asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf/index.mjs +0 -15
- package/test/integ.lamkin-newStreamFromProps.js.snapshot/asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf/index.mjs +0 -15
- package/test/integ.lamkin-newVpc.js.snapshot/asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf/index.mjs +0 -15
- package/test/integ.lamkin-newVpcFromProps.js.snapshot/asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf/index.mjs +0 -15
- package/test/integ.lamkin-noArguments.js.snapshot/asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf/index.mjs +0 -15
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
{
|
|
2
|
-
"version": "
|
|
2
|
+
"version": "52.0.0",
|
|
3
3
|
"artifacts": {
|
|
4
4
|
"lamkinexistingStreamIntegDefaultTestDeployAssert2681B9A2.assets": {
|
|
5
5
|
"type": "cdk:asset-manifest",
|
|
@@ -66,7 +66,7 @@
|
|
|
66
66
|
"validateOnSynth": false,
|
|
67
67
|
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
|
|
68
68
|
"cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
|
|
69
|
-
"stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/
|
|
69
|
+
"stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/25ababb3f692e073a5c95a86108f4da3a65dcb1539e97ea3068f4cf842e960fe.json",
|
|
70
70
|
"requiresBootstrapStackVersion": 6,
|
|
71
71
|
"bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
|
|
72
72
|
"additionalDependencies": [
|
|
@@ -149,12 +149,6 @@
|
|
|
149
149
|
}
|
|
150
150
|
}
|
|
151
151
|
],
|
|
152
|
-
"/lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole": [
|
|
153
|
-
{
|
|
154
|
-
"type": "aws:cdk:analytics:construct",
|
|
155
|
-
"data": "*"
|
|
156
|
-
}
|
|
157
|
-
],
|
|
158
152
|
"/lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunctionServiceRole/Resource": [
|
|
159
153
|
{
|
|
160
154
|
"type": "aws:cdk:logicalId",
|
|
@@ -343,6 +337,7 @@
|
|
|
343
337
|
"module": "aws-cdk-lib",
|
|
344
338
|
"flags": {
|
|
345
339
|
"@aws-cdk/aws-signer:signingProfileNamePassedToCfn": {
|
|
340
|
+
"userValue": true,
|
|
346
341
|
"recommendedValue": true,
|
|
347
342
|
"explanation": "Pass signingProfileName to CfnSigningProfile"
|
|
348
343
|
},
|
|
@@ -361,6 +356,7 @@
|
|
|
361
356
|
}
|
|
362
357
|
},
|
|
363
358
|
"@aws-cdk/aws-ecs-patterns:secGroupsDisablesImplicitOpenListener": {
|
|
359
|
+
"userValue": true,
|
|
364
360
|
"recommendedValue": true,
|
|
365
361
|
"explanation": "Disable implicit openListener when custom security groups are provided"
|
|
366
362
|
},
|
|
@@ -626,6 +622,10 @@
|
|
|
626
622
|
"recommendedValue": true,
|
|
627
623
|
"explanation": "When enabled, nodegroupName attribute of the provisioned EKS NodeGroup will not have the cluster name prefix."
|
|
628
624
|
},
|
|
625
|
+
"@aws-cdk/aws-eks:useNativeOidcProvider": {
|
|
626
|
+
"recommendedValue": true,
|
|
627
|
+
"explanation": "When enabled, EKS V2 clusters will use the native OIDC provider resource AWS::IAM::OIDCProvider instead of creating the OIDCProvider with a custom resource (iam.OpenIDConnectProvider)."
|
|
628
|
+
},
|
|
629
629
|
"@aws-cdk/aws-ec2:ebsDefaultGp3Volume": {
|
|
630
630
|
"userValue": true,
|
|
631
631
|
"recommendedValue": true,
|
|
@@ -658,16 +658,6 @@
|
|
|
658
658
|
"recommendedValue": true,
|
|
659
659
|
"explanation": "When enabled, stack tags need to be assigned explicitly on a Stack."
|
|
660
660
|
},
|
|
661
|
-
"@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature": {
|
|
662
|
-
"userValue": false,
|
|
663
|
-
"recommendedValue": false,
|
|
664
|
-
"explanation": "When set to true along with canContainersAccessInstanceRole=false in ECS cluster, new updated commands will be added to UserData to block container accessing IMDS. **Applicable to Linux only. IMPORTANT: See [details.](#aws-cdkaws-ecsenableImdsBlockingDeprecatedFeature)**"
|
|
665
|
-
},
|
|
666
|
-
"@aws-cdk/aws-ecs:disableEcsImdsBlocking": {
|
|
667
|
-
"userValue": true,
|
|
668
|
-
"recommendedValue": true,
|
|
669
|
-
"explanation": "When set to true, CDK synth will throw exception if canContainersAccessInstanceRole is false. **IMPORTANT: See [details.](#aws-cdkaws-ecsdisableEcsImdsBlocking)**"
|
|
670
|
-
},
|
|
671
661
|
"@aws-cdk/aws-ecs:reduceEc2FargateCloudWatchPermissions": {
|
|
672
662
|
"userValue": true,
|
|
673
663
|
"recommendedValue": true,
|
|
@@ -813,6 +803,7 @@
|
|
|
813
803
|
"explanation": "When enabled, CDK creates and manages loggroup for the lambda function"
|
|
814
804
|
},
|
|
815
805
|
"@aws-cdk/aws-elasticloadbalancingv2:networkLoadBalancerWithSecurityGroupByDefault": {
|
|
806
|
+
"userValue": true,
|
|
816
807
|
"recommendedValue": true,
|
|
817
808
|
"explanation": "When enabled, Network Load Balancer will be created with a security group by default."
|
|
818
809
|
},
|
|
@@ -824,12 +815,25 @@
|
|
|
824
815
|
}
|
|
825
816
|
},
|
|
826
817
|
"@aws-cdk/aws-ecs-patterns:uniqueTargetGroupId": {
|
|
818
|
+
"userValue": true,
|
|
827
819
|
"recommendedValue": true,
|
|
828
820
|
"explanation": "When enabled, ECS patterns will generate unique target group IDs to prevent conflicts during load balancer replacement"
|
|
821
|
+
},
|
|
822
|
+
"@aws-cdk/aws-route53-patterns:useDistribution": {
|
|
823
|
+
"userValue": true,
|
|
824
|
+
"recommendedValue": true,
|
|
825
|
+
"explanation": "Use the `Distribution` resource instead of `CloudFrontWebDistribution`"
|
|
826
|
+
},
|
|
827
|
+
"@aws-cdk/core:automaticL1Traits": {
|
|
828
|
+
"recommendedValue": true,
|
|
829
|
+
"explanation": "Automatically use the default L1 traits for L1 constructs`",
|
|
830
|
+
"unconfiguredBehavesLike": {
|
|
831
|
+
"v2": true
|
|
832
|
+
}
|
|
829
833
|
}
|
|
830
834
|
}
|
|
831
835
|
}
|
|
832
836
|
}
|
|
833
837
|
},
|
|
834
|
-
"minimumCliVersion": "2.
|
|
838
|
+
"minimumCliVersion": "2.1106.1"
|
|
835
839
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":"tree-0.1","tree":{"id":"App","path":"","constructInfo":{"fqn":"aws-cdk-lib.App","version":"2.223.0"},"children":{"lamkin-existingStream":{"id":"lamkin-existingStream","path":"lamkin-existingStream","constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.223.0"},"children":{"test-stream":{"id":"test-stream","path":"lamkin-existingStream/test-stream","constructInfo":{"fqn":"aws-cdk-lib.aws_kinesis.Stream","version":"2.223.0","metadata":[{"streamMode":"ON_DEMAND","encryption":"MANAGED"}]},"children":{"Resource":{"id":"Resource","path":"lamkin-existingStream/test-stream/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_kinesis.CfnStream","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::Kinesis::Stream","aws:cdk:cloudformation:props":{"retentionPeriodHours":24,"streamEncryption":{"encryptionType":"KMS","keyId":"alias/aws/kinesis"},"streamModeDetails":{"streamMode":"ON_DEMAND"}}}}}},"test-lambda-kinesisstreams":{"id":"test-lambda-kinesisstreams","path":"lamkin-existingStream/test-lambda-kinesisstreams","constructInfo":{"fqn":"@aws-solutions-constructs/aws-lambda-kinesisstreams.LambdaToKinesisStreams","version":"2.95.1"},"children":{"LambdaFunctionServiceRole":{"id":"LambdaFunctionServiceRole","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunctionServiceRole","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Role","version":"2.223.0","metadata":[{"assumedBy":{"principalAccount":"*","assumeRoleAction":"*"},"inlinePolicies":"*"},{"attachInlinePolicy":["*"]},{"attachInlinePolicy":["*"]},{"addToPrincipalPolicy":[{}]},{"attachInlinePolicy":["*"]},{"attachInlinePolicy":["*"]}]},"children":{"ImportLambdaFunctionServiceRole":{"id":"ImportLambdaFunctionServiceRole","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole","constructInfo":{"fqn":"aws-cdk-lib.Resource","version":"2.223.0","metadata":["*"]}},"Resource":{"id":"Resource","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunctionServiceRole/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnRole","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Role","aws:cdk:cloudformation:props":{"assumeRolePolicyDocument":{"Statement":[{"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"Service":"lambda.amazonaws.com"}}],"Version":"2012-10-17"},"policies":[{"policyName":"LambdaFunctionServiceRolePolicy","policyDocument":{"Statement":[{"Action":["logs:CreateLogGroup","logs:CreateLogStream","logs:PutLogEvents"],"Effect":"Allow","Resource":{"Fn::Join":["",["arn:",{"Ref":"AWS::Partition"},":logs:",{"Ref":"AWS::Region"},":",{"Ref":"AWS::AccountId"},":log-group:/aws/lambda/*"]]}}],"Version":"2012-10-17"}}]}}},"DefaultPolicy":{"id":"DefaultPolicy","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunctionServiceRole/DefaultPolicy","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Policy","version":"2.223.0","metadata":["*",{"attachToRole":["*"]},{"attachToRole":["*"]},{"addStatements":[{}]}]},"children":{"Resource":{"id":"Resource","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunctionServiceRole/DefaultPolicy/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnPolicy","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Policy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":["kinesis:ListShards","kinesis:PutRecord","kinesis:PutRecords"],"Effect":"Allow","Resource":{"Fn::GetAtt":["teststream04374A09","Arn"]}}],"Version":"2012-10-17"},"policyName":"testlambdakinesisstreamsLambdaFunctionServiceRoleDefaultPolicyED972043","roles":[{"Ref":"testlambdakinesisstreamsLambdaFunctionServiceRole95206CF3"}]}}}}}}},"LambdaFunction":{"id":"LambdaFunction","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunction","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.Function","version":"2.223.0","metadata":[{"role":"*","tracing":"Active","code":"*","runtime":"*","handler":"*"},{"addEnvironment":["*","*",{"removeInEdge":true}]},{"addEnvironment":["*","*"]}]},"children":{"Code":{"id":"Code","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunction/Code","constructInfo":{"fqn":"aws-cdk-lib.aws_s3_assets.Asset","version":"2.223.0"},"children":{"Stage":{"id":"Stage","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunction/Code/Stage","constructInfo":{"fqn":"aws-cdk-lib.AssetStaging","version":"2.223.0"}},"AssetBucket":{"id":"AssetBucket","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunction/Code/AssetBucket","constructInfo":{"fqn":"aws-cdk-lib.aws_s3.BucketBase","version":"2.223.0","metadata":[]}}}},"Resource":{"id":"Resource","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunction/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.CfnFunction","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::Lambda::Function","aws:cdk:cloudformation:props":{"code":{"s3Bucket":{"Fn::Sub":"cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"},"s3Key":"c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf.zip"},"environment":{"variables":{"AWS_NODEJS_CONNECTION_REUSE_ENABLED":"1","KINESIS_DATASTREAM_NAME":{"Ref":"teststream04374A09"}}},"handler":"index.handler","role":{"Fn::GetAtt":["testlambdakinesisstreamsLambdaFunctionServiceRole95206CF3","Arn"]},"runtime":"nodejs22.x","tracingConfig":{"mode":"Active"}}}},"inlinePolicyAddedToExecutionRole-0":{"id":"inlinePolicyAddedToExecutionRole-0","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunction/inlinePolicyAddedToExecutionRole-0","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Policy","version":"2.223.0","metadata":[{"statements":"*"},{"addStatements":[{}]},{"attachToRole":["*"]},{"attachToRole":["*"]}]},"children":{"Resource":{"id":"Resource","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnPolicy","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Policy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":["xray:PutTelemetryRecords","xray:PutTraceSegments"],"Effect":"Allow","Resource":"*"}],"Version":"2012-10-17"},"policyName":"testlambdakinesisstreamsLambdaFunctioninlinePolicyAddedToExecutionRole022FB8950","roles":[{"Ref":"testlambdakinesisstreamsLambdaFunctionServiceRole95206CF3"}]}}}}}}},"KinesisStreamGetRecordsIteratorAgeAlarm":{"id":"KinesisStreamGetRecordsIteratorAgeAlarm","path":"lamkin-existingStream/test-lambda-kinesisstreams/KinesisStreamGetRecordsIteratorAgeAlarm","constructInfo":{"fqn":"aws-cdk-lib.aws_cloudwatch.Alarm","version":"2.223.0","metadata":[{"metric":{"warnings":"*","warningsV2":"*"},"threshold":"*","evaluationPeriods":"*","comparisonOperator":"*","alarmDescription":"*"}]},"children":{"Resource":{"id":"Resource","path":"lamkin-existingStream/test-lambda-kinesisstreams/KinesisStreamGetRecordsIteratorAgeAlarm/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_cloudwatch.CfnAlarm","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::CloudWatch::Alarm","aws:cdk:cloudformation:props":{"alarmDescription":"Consumer Record Processing Falling Behind, there is risk for data loss due to record expiration.","comparisonOperator":"GreaterThanOrEqualToThreshold","evaluationPeriods":1,"metricName":"GetRecords.IteratorAgeMilliseconds","namespace":"AWS/Kinesis","period":300,"statistic":"Maximum","threshold":43200000}}}}},"KinesisStreamReadProvisionedThroughputExceededAlarm":{"id":"KinesisStreamReadProvisionedThroughputExceededAlarm","path":"lamkin-existingStream/test-lambda-kinesisstreams/KinesisStreamReadProvisionedThroughputExceededAlarm","constructInfo":{"fqn":"aws-cdk-lib.aws_cloudwatch.Alarm","version":"2.223.0","metadata":[{"metric":{"warnings":"*","warningsV2":"*"},"threshold":"*","evaluationPeriods":"*","comparisonOperator":"*","alarmDescription":"*"}]},"children":{"Resource":{"id":"Resource","path":"lamkin-existingStream/test-lambda-kinesisstreams/KinesisStreamReadProvisionedThroughputExceededAlarm/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_cloudwatch.CfnAlarm","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::CloudWatch::Alarm","aws:cdk:cloudformation:props":{"alarmDescription":"Consumer Application is Reading at a Slower Rate Than Expected.","comparisonOperator":"GreaterThanThreshold","evaluationPeriods":1,"metricName":"ReadProvisionedThroughputExceeded","namespace":"AWS/Kinesis","period":300,"statistic":"Average","threshold":0}}}}}}},"Integ":{"id":"Integ","path":"lamkin-existingStream/Integ","constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTest","version":"2.223.0-alpha.0"},"children":{"DefaultTest":{"id":"DefaultTest","path":"lamkin-existingStream/Integ/DefaultTest","constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTestCase","version":"2.223.0-alpha.0"},"children":{"Default":{"id":"Default","path":"lamkin-existingStream/Integ/DefaultTest/Default","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}},"DeployAssert":{"id":"DeployAssert","path":"lamkin-existingStream/Integ/DefaultTest/DeployAssert","constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.223.0"},"children":{"BootstrapVersion":{"id":"BootstrapVersion","path":"lamkin-existingStream/Integ/DefaultTest/DeployAssert/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.223.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"lamkin-existingStream/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.223.0"}}}}}}}},"BootstrapVersion":{"id":"BootstrapVersion","path":"lamkin-existingStream/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.223.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"lamkin-existingStream/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.223.0"}}}},"Tree":{"id":"Tree","path":"Tree","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}}}}}
|
|
1
|
+
{"version":"tree-0.1","tree":{"id":"App","path":"","constructInfo":{"fqn":"aws-cdk-lib.App","version":"2.239.0"},"children":{"lamkin-existingStream":{"id":"lamkin-existingStream","path":"lamkin-existingStream","constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.239.0"},"children":{"test-stream":{"id":"test-stream","path":"lamkin-existingStream/test-stream","constructInfo":{"fqn":"aws-cdk-lib.aws_kinesis.Stream","version":"2.239.0"},"children":{"Resource":{"id":"Resource","path":"lamkin-existingStream/test-stream/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_kinesis.CfnStream","version":"2.239.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::Kinesis::Stream","aws:cdk:cloudformation:props":{"retentionPeriodHours":24,"streamEncryption":{"encryptionType":"KMS","keyId":"alias/aws/kinesis"},"streamModeDetails":{"streamMode":"ON_DEMAND"}}}}}},"test-lambda-kinesisstreams":{"id":"test-lambda-kinesisstreams","path":"lamkin-existingStream/test-lambda-kinesisstreams","constructInfo":{"fqn":"@aws-solutions-constructs/aws-lambda-kinesisstreams.LambdaToKinesisStreams","version":"2.99.0"},"children":{"LambdaFunctionServiceRole":{"id":"LambdaFunctionServiceRole","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunctionServiceRole","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Role","version":"2.239.0"},"children":{"Resource":{"id":"Resource","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunctionServiceRole/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnRole","version":"2.239.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Role","aws:cdk:cloudformation:props":{"assumeRolePolicyDocument":{"Statement":[{"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"Service":"lambda.amazonaws.com"}}],"Version":"2012-10-17"},"policies":[{"policyName":"LambdaFunctionServiceRolePolicy","policyDocument":{"Statement":[{"Action":["logs:CreateLogGroup","logs:CreateLogStream","logs:PutLogEvents"],"Effect":"Allow","Resource":{"Fn::Join":["",["arn:",{"Ref":"AWS::Partition"},":logs:",{"Ref":"AWS::Region"},":",{"Ref":"AWS::AccountId"},":log-group:/aws/lambda/*"]]}}],"Version":"2012-10-17"}}]}}},"DefaultPolicy":{"id":"DefaultPolicy","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunctionServiceRole/DefaultPolicy","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Policy","version":"2.239.0"},"children":{"Resource":{"id":"Resource","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunctionServiceRole/DefaultPolicy/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnPolicy","version":"2.239.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Policy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":["kinesis:ListShards","kinesis:PutRecord","kinesis:PutRecords"],"Effect":"Allow","Resource":{"Fn::GetAtt":["teststream04374A09","Arn"]}}],"Version":"2012-10-17"},"policyName":"testlambdakinesisstreamsLambdaFunctionServiceRoleDefaultPolicyED972043","roles":[{"Ref":"testlambdakinesisstreamsLambdaFunctionServiceRole95206CF3"}]}}}}}}},"LambdaFunction":{"id":"LambdaFunction","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunction","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.Function","version":"2.239.0"},"children":{"Resource":{"id":"Resource","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunction/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.CfnFunction","version":"2.239.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::Lambda::Function","aws:cdk:cloudformation:props":{"code":{"zipFile":"exports.handler = async (event) => { console.log(event); return {statusCode: 200, body: \"\"}; }"},"environment":{"variables":{"AWS_NODEJS_CONNECTION_REUSE_ENABLED":"1","KINESIS_DATASTREAM_NAME":{"Ref":"teststream04374A09"}}},"handler":"index.handler","role":{"Fn::GetAtt":["testlambdakinesisstreamsLambdaFunctionServiceRole95206CF3","Arn"]},"runtime":"nodejs22.x","tracingConfig":{"mode":"Active"}}}},"inlinePolicyAddedToExecutionRole-0":{"id":"inlinePolicyAddedToExecutionRole-0","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunction/inlinePolicyAddedToExecutionRole-0","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Policy","version":"2.239.0"},"children":{"Resource":{"id":"Resource","path":"lamkin-existingStream/test-lambda-kinesisstreams/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnPolicy","version":"2.239.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Policy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":["xray:PutTelemetryRecords","xray:PutTraceSegments"],"Effect":"Allow","Resource":"*"}],"Version":"2012-10-17"},"policyName":"testlambdakinesisstreamsLambdaFunctioninlinePolicyAddedToExecutionRole022FB8950","roles":[{"Ref":"testlambdakinesisstreamsLambdaFunctionServiceRole95206CF3"}]}}}}}}},"KinesisStreamGetRecordsIteratorAgeAlarm":{"id":"KinesisStreamGetRecordsIteratorAgeAlarm","path":"lamkin-existingStream/test-lambda-kinesisstreams/KinesisStreamGetRecordsIteratorAgeAlarm","constructInfo":{"fqn":"aws-cdk-lib.aws_cloudwatch.Alarm","version":"2.239.0"},"children":{"Resource":{"id":"Resource","path":"lamkin-existingStream/test-lambda-kinesisstreams/KinesisStreamGetRecordsIteratorAgeAlarm/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_cloudwatch.CfnAlarm","version":"2.239.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::CloudWatch::Alarm","aws:cdk:cloudformation:props":{"alarmDescription":"Consumer Record Processing Falling Behind, there is risk for data loss due to record expiration.","comparisonOperator":"GreaterThanOrEqualToThreshold","evaluationPeriods":1,"metricName":"GetRecords.IteratorAgeMilliseconds","namespace":"AWS/Kinesis","period":300,"statistic":"Maximum","threshold":43200000}}}}},"KinesisStreamReadProvisionedThroughputExceededAlarm":{"id":"KinesisStreamReadProvisionedThroughputExceededAlarm","path":"lamkin-existingStream/test-lambda-kinesisstreams/KinesisStreamReadProvisionedThroughputExceededAlarm","constructInfo":{"fqn":"aws-cdk-lib.aws_cloudwatch.Alarm","version":"2.239.0"},"children":{"Resource":{"id":"Resource","path":"lamkin-existingStream/test-lambda-kinesisstreams/KinesisStreamReadProvisionedThroughputExceededAlarm/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_cloudwatch.CfnAlarm","version":"2.239.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::CloudWatch::Alarm","aws:cdk:cloudformation:props":{"alarmDescription":"Consumer Application is Reading at a Slower Rate Than Expected.","comparisonOperator":"GreaterThanThreshold","evaluationPeriods":1,"metricName":"ReadProvisionedThroughputExceeded","namespace":"AWS/Kinesis","period":300,"statistic":"Average","threshold":0}}}}}}},"Integ":{"id":"Integ","path":"lamkin-existingStream/Integ","constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTest","version":"2.239.0-alpha.0"},"children":{"DefaultTest":{"id":"DefaultTest","path":"lamkin-existingStream/Integ/DefaultTest","constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTestCase","version":"2.239.0-alpha.0"},"children":{"Default":{"id":"Default","path":"lamkin-existingStream/Integ/DefaultTest/Default","constructInfo":{"fqn":"constructs.Construct","version":"10.5.1"}},"DeployAssert":{"id":"DeployAssert","path":"lamkin-existingStream/Integ/DefaultTest/DeployAssert","constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.239.0"},"children":{"BootstrapVersion":{"id":"BootstrapVersion","path":"lamkin-existingStream/Integ/DefaultTest/DeployAssert/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.239.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"lamkin-existingStream/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.239.0"}}}}}}}},"BootstrapVersion":{"id":"BootstrapVersion","path":"lamkin-existingStream/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.239.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"lamkin-existingStream/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.239.0"}}}},"Tree":{"id":"Tree","path":"Tree","constructInfo":{"fqn":"constructs.Construct","version":"10.5.1"}}}}}
|
|
@@ -31,7 +31,7 @@ const existingStreamObj = new kinesis.Stream(stack, 'test-stream', {
|
|
|
31
31
|
});
|
|
32
32
|
new lib_1.LambdaToKinesisStreams(stack, 'test-lambda-kinesisstreams', {
|
|
33
33
|
lambdaFunctionProps: {
|
|
34
|
-
code: lambda.
|
|
34
|
+
code: new lambda.InlineCode('exports.handler = async (event) => { console.log(event); return {statusCode: 200, body: ""}; }'),
|
|
35
35
|
runtime: defaults.COMMERCIAL_REGION_LAMBDA_NODE_RUNTIME,
|
|
36
36
|
handler: 'index.handler'
|
|
37
37
|
},
|
|
@@ -40,4 +40,4 @@ new lib_1.LambdaToKinesisStreams(stack, 'test-lambda-kinesisstreams', {
|
|
|
40
40
|
new integ_tests_alpha_1.IntegTest(stack, 'Integ', { testCases: [
|
|
41
41
|
stack
|
|
42
42
|
] });
|
|
43
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
43
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW50ZWcubGFta2luLWV4aXN0aW5nU3RyZWFtV2l0aENtay5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbImludGVnLmxhbWtpbi1leGlzdGluZ1N0cmVhbVdpdGhDbWsudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IjtBQUFBOzs7Ozs7Ozs7OztHQVdHOztBQUVILDZDQUF5QztBQUN6QyxnQ0FBZ0Q7QUFDaEQseURBQW1HO0FBQ25HLGtFQUF1RDtBQUN2RCxtREFBbUQ7QUFDbkQsMkNBQTJDO0FBQzNDLGlEQUFpRDtBQUNqRCwyREFBMkQ7QUFFM0QsTUFBTSxHQUFHLEdBQUcsSUFBSSxpQkFBRyxFQUFFLENBQUM7QUFDdEIsTUFBTSxLQUFLLEdBQUcsSUFBSSxtQkFBSyxDQUFDLEdBQUcsRUFBRSxJQUFBLDZCQUFzQixFQUFDLFVBQVUsQ0FBQyxDQUFDLENBQUM7QUFDakUsSUFBQSxnQ0FBeUIsRUFBQyxLQUFLLENBQUMsQ0FBQztBQUVqQyxNQUFNLGFBQWEsR0FBRyxJQUFJLEdBQUcsQ0FBQyxHQUFHLENBQUMsS0FBSyxFQUFFLFVBQVUsRUFBRTtJQUNuRCxpQkFBaUIsRUFBRSxJQUFJO0NBQ3hCLENBQUMsQ0FBQztBQUVILE1BQU0saUJBQWlCLEdBQUcsSUFBSSxPQUFPLENBQUMsTUFBTSxDQUFDLEtBQUssRUFBRSxhQUFhLEVBQUU7SUFDakUsYUFBYTtDQUNkLENBQUMsQ0FBQztBQUVILElBQUksNEJBQXNCLENBQUMsS0FBSyxFQUFFLDRCQUE0QixFQUFFO0lBQzlELG1CQUFtQixFQUFFO1FBQ25CLElBQUksRUFBRSxJQUFJLE1BQU0sQ0FBQyxVQUFVLENBQUMsZ0dBQWdHLENBQUM7UUFDN0gsT0FBTyxFQUFFLFFBQVEsQ0FBQyxxQ0FBcUM7UUFDdkQsT0FBTyxFQUFFLGVBQWU7S0FDekI7SUFDRCxpQkFBaUI7Q0FDbEIsQ0FBQyxDQUFDO0FBRUgsSUFBSSw2QkFBUyxDQUFDLEtBQUssRUFBRSxPQUFPLEVBQUUsRUFBRSxTQUFTLEVBQUU7UUFDekMsS0FBSztLQUNOLEVBQUUsQ0FBQyxDQUFDIiwic291cmNlc0NvbnRlbnQiOlsiLyoqXG4gKiAgQ29weXJpZ2h0IEFtYXpvbi5jb20sIEluYy4gb3IgaXRzIGFmZmlsaWF0ZXMuIEFsbCBSaWdodHMgUmVzZXJ2ZWQuXG4gKlxuICogIExpY2Vuc2VkIHVuZGVyIHRoZSBBcGFjaGUgTGljZW5zZSwgVmVyc2lvbiAyLjAgKHRoZSBcIkxpY2Vuc2VcIikuIFlvdSBtYXkgbm90IHVzZSB0aGlzIGZpbGUgZXhjZXB0IGluIGNvbXBsaWFuY2VcbiAqICB3aXRoIHRoZSBMaWNlbnNlLiBBIGNvcHkgb2YgdGhlIExpY2Vuc2UgaXMgbG9jYXRlZCBhdFxuICpcbiAqICAgICAgaHR0cDovL3d3dy5hcGFjaGUub3JnL2xpY2Vuc2VzL0xJQ0VOU0UtMi4wXG4gKlxuICogIG9yIGluIHRoZSAnbGljZW5zZScgZmlsZSBhY2NvbXBhbnlpbmcgdGhpcyBmaWxlLiBUaGlzIGZpbGUgaXMgZGlzdHJpYnV0ZWQgb24gYW4gJ0FTIElTJyBCQVNJUywgV0lUSE9VVCBXQVJSQU5USUVTXG4gKiAgT1IgQ09ORElUSU9OUyBPRiBBTlkgS0lORCwgZXhwcmVzcyBvciBpbXBsaWVkLiBTZWUgdGhlIExpY2Vuc2UgZm9yIHRoZSBzcGVjaWZpYyBsYW5ndWFnZSBnb3Zlcm5pbmcgcGVybWlzc2lvbnNcbiAqICBhbmQgbGltaXRhdGlvbnMgdW5kZXIgdGhlIExpY2Vuc2UuXG4gKi9cblxuaW1wb3J0IHsgQXBwLCBTdGFjayB9IGZyb20gXCJhd3MtY2RrLWxpYlwiO1xuaW1wb3J0IHsgTGFtYmRhVG9LaW5lc2lzU3RyZWFtcyB9IGZyb20gXCIuLi9saWJcIjtcbmltcG9ydCB7IGdlbmVyYXRlSW50ZWdTdGFja05hbWUsIFNldENvbnNpc3RlbnRGZWF0dXJlRmxhZ3MgfSBmcm9tICdAYXdzLXNvbHV0aW9ucy1jb25zdHJ1Y3RzL2NvcmUnO1xuaW1wb3J0IHsgSW50ZWdUZXN0IH0gZnJvbSAnQGF3cy1jZGsvaW50ZWctdGVzdHMtYWxwaGEnO1xuaW1wb3J0ICogYXMga2luZXNpcyBmcm9tICdhd3MtY2RrLWxpYi9hd3Mta2luZXNpcyc7XG5pbXBvcnQgKiBhcyBrbXMgZnJvbSAnYXdzLWNkay1saWIvYXdzLWttcyc7XG5pbXBvcnQgKiBhcyBsYW1iZGEgZnJvbSAnYXdzLWNkay1saWIvYXdzLWxhbWJkYSc7XG5pbXBvcnQgKiBhcyBkZWZhdWx0cyBmcm9tIFwiQGF3cy1zb2x1dGlvbnMtY29uc3RydWN0cy9jb3JlXCI7XG5cbmNvbnN0IGFwcCA9IG5ldyBBcHAoKTtcbmNvbnN0IHN0YWNrID0gbmV3IFN0YWNrKGFwcCwgZ2VuZXJhdGVJbnRlZ1N0YWNrTmFtZShfX2ZpbGVuYW1lKSk7XG5TZXRDb25zaXN0ZW50RmVhdHVyZUZsYWdzKHN0YWNrKTtcblxuY29uc3QgZW5jcnlwdGlvbktleSA9IG5ldyBrbXMuS2V5KHN0YWNrLCAndGVzdC1rZXknLCB7XG4gIGVuYWJsZUtleVJvdGF0aW9uOiB0cnVlXG59KTtcblxuY29uc3QgZXhpc3RpbmdTdHJlYW1PYmogPSBuZXcga2luZXNpcy5TdHJlYW0oc3RhY2ssICd0ZXN0LXN0cmVhbScsIHtcbiAgZW5jcnlwdGlvbktleVxufSk7XG5cbm5ldyBMYW1iZGFUb0tpbmVzaXNTdHJlYW1zKHN0YWNrLCAndGVzdC1sYW1iZGEta2luZXNpc3N0cmVhbXMnLCB7XG4gIGxhbWJkYUZ1bmN0aW9uUHJvcHM6IHtcbiAgICBjb2RlOiBuZXcgbGFtYmRhLklubGluZUNvZGUoJ2V4cG9ydHMuaGFuZGxlciA9IGFzeW5jIChldmVudCkgPT4geyBjb25zb2xlLmxvZyhldmVudCk7IHJldHVybiB7c3RhdHVzQ29kZTogMjAwLCBib2R5OiBcIlwifTsgfScpLFxuICAgIHJ1bnRpbWU6IGRlZmF1bHRzLkNPTU1FUkNJQUxfUkVHSU9OX0xBTUJEQV9OT0RFX1JVTlRJTUUsXG4gICAgaGFuZGxlcjogJ2luZGV4LmhhbmRsZXInXG4gIH0sXG4gIGV4aXN0aW5nU3RyZWFtT2JqXG59KTtcblxubmV3IEludGVnVGVzdChzdGFjaywgJ0ludGVnJywgeyB0ZXN0Q2FzZXM6IFtcbiAgc3RhY2tcbl0gfSk7XG4iXX0=
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":"
|
|
1
|
+
{"version":"50.0.0"}
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
{
|
|
2
|
-
"version": "
|
|
2
|
+
"version": "50.0.0",
|
|
3
3
|
"testCases": {
|
|
4
4
|
"lamkin-existingStreamWithCmk/Integ/DefaultTest": {
|
|
5
5
|
"stacks": [
|
|
@@ -9,5 +9,5 @@
|
|
|
9
9
|
"assertionStackName": "lamkinexistingStreamWithCmkIntegDefaultTestDeployAssert6EDF4045"
|
|
10
10
|
}
|
|
11
11
|
},
|
|
12
|
-
"minimumCliVersion": "2.
|
|
12
|
+
"minimumCliVersion": "2.1105.0"
|
|
13
13
|
}
|
package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/lamkin-existingStreamWithCmk.assets.json
CHANGED
|
@@ -1,30 +1,16 @@
|
|
|
1
1
|
{
|
|
2
|
-
"version": "
|
|
2
|
+
"version": "50.0.0",
|
|
3
3
|
"files": {
|
|
4
|
-
"
|
|
5
|
-
"displayName": "test-lambda-kinesisstreams/LambdaFunction/Code",
|
|
6
|
-
"source": {
|
|
7
|
-
"path": "asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf",
|
|
8
|
-
"packaging": "zip"
|
|
9
|
-
},
|
|
10
|
-
"destinations": {
|
|
11
|
-
"current_account-current_region-0b4831fe": {
|
|
12
|
-
"bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
|
|
13
|
-
"objectKey": "c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf.zip",
|
|
14
|
-
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
|
|
15
|
-
}
|
|
16
|
-
}
|
|
17
|
-
},
|
|
18
|
-
"762a0789d2e04378d1186c9b607f701aecdf7dad351854619ca2a5727a3ae79c": {
|
|
4
|
+
"4b0abdbd458dfdb36c40ee0fdd3aa8ce8645b298a5e260de3c18952fb25938d5": {
|
|
19
5
|
"displayName": "lamkin-existingStreamWithCmk Template",
|
|
20
6
|
"source": {
|
|
21
7
|
"path": "lamkin-existingStreamWithCmk.template.json",
|
|
22
8
|
"packaging": "file"
|
|
23
9
|
},
|
|
24
10
|
"destinations": {
|
|
25
|
-
"current_account-current_region-
|
|
11
|
+
"current_account-current_region-167a6ff2": {
|
|
26
12
|
"bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
|
|
27
|
-
"objectKey": "
|
|
13
|
+
"objectKey": "4b0abdbd458dfdb36c40ee0fdd3aa8ce8645b298a5e260de3c18952fb25938d5.json",
|
|
28
14
|
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
|
|
29
15
|
}
|
|
30
16
|
}
|
|
@@ -165,10 +165,7 @@
|
|
|
165
165
|
"Type": "AWS::Lambda::Function",
|
|
166
166
|
"Properties": {
|
|
167
167
|
"Code": {
|
|
168
|
-
"
|
|
169
|
-
"Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
|
|
170
|
-
},
|
|
171
|
-
"S3Key": "c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf.zip"
|
|
168
|
+
"ZipFile": "exports.handler = async (event) => { console.log(event); return {statusCode: 200, body: \"\"}; }"
|
|
172
169
|
},
|
|
173
170
|
"Environment": {
|
|
174
171
|
"Variables": {
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
{
|
|
2
|
-
"version": "
|
|
2
|
+
"version": "52.0.0",
|
|
3
3
|
"artifacts": {
|
|
4
4
|
"lamkinexistingStreamWithCmkIntegDefaultTestDeployAssert6EDF4045.assets": {
|
|
5
5
|
"type": "cdk:asset-manifest",
|
|
@@ -66,7 +66,7 @@
|
|
|
66
66
|
"validateOnSynth": false,
|
|
67
67
|
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
|
|
68
68
|
"cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
|
|
69
|
-
"stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/
|
|
69
|
+
"stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/4b0abdbd458dfdb36c40ee0fdd3aa8ce8645b298a5e260de3c18952fb25938d5.json",
|
|
70
70
|
"requiresBootstrapStackVersion": 6,
|
|
71
71
|
"bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
|
|
72
72
|
"additionalDependencies": [
|
|
@@ -178,12 +178,6 @@
|
|
|
178
178
|
}
|
|
179
179
|
}
|
|
180
180
|
],
|
|
181
|
-
"/lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole": [
|
|
182
|
-
{
|
|
183
|
-
"type": "aws:cdk:analytics:construct",
|
|
184
|
-
"data": "*"
|
|
185
|
-
}
|
|
186
|
-
],
|
|
187
181
|
"/lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/LambdaFunctionServiceRole/Resource": [
|
|
188
182
|
{
|
|
189
183
|
"type": "aws:cdk:logicalId",
|
|
@@ -388,6 +382,7 @@
|
|
|
388
382
|
"module": "aws-cdk-lib",
|
|
389
383
|
"flags": {
|
|
390
384
|
"@aws-cdk/aws-signer:signingProfileNamePassedToCfn": {
|
|
385
|
+
"userValue": true,
|
|
391
386
|
"recommendedValue": true,
|
|
392
387
|
"explanation": "Pass signingProfileName to CfnSigningProfile"
|
|
393
388
|
},
|
|
@@ -406,6 +401,7 @@
|
|
|
406
401
|
}
|
|
407
402
|
},
|
|
408
403
|
"@aws-cdk/aws-ecs-patterns:secGroupsDisablesImplicitOpenListener": {
|
|
404
|
+
"userValue": true,
|
|
409
405
|
"recommendedValue": true,
|
|
410
406
|
"explanation": "Disable implicit openListener when custom security groups are provided"
|
|
411
407
|
},
|
|
@@ -671,6 +667,10 @@
|
|
|
671
667
|
"recommendedValue": true,
|
|
672
668
|
"explanation": "When enabled, nodegroupName attribute of the provisioned EKS NodeGroup will not have the cluster name prefix."
|
|
673
669
|
},
|
|
670
|
+
"@aws-cdk/aws-eks:useNativeOidcProvider": {
|
|
671
|
+
"recommendedValue": true,
|
|
672
|
+
"explanation": "When enabled, EKS V2 clusters will use the native OIDC provider resource AWS::IAM::OIDCProvider instead of creating the OIDCProvider with a custom resource (iam.OpenIDConnectProvider)."
|
|
673
|
+
},
|
|
674
674
|
"@aws-cdk/aws-ec2:ebsDefaultGp3Volume": {
|
|
675
675
|
"userValue": true,
|
|
676
676
|
"recommendedValue": true,
|
|
@@ -703,16 +703,6 @@
|
|
|
703
703
|
"recommendedValue": true,
|
|
704
704
|
"explanation": "When enabled, stack tags need to be assigned explicitly on a Stack."
|
|
705
705
|
},
|
|
706
|
-
"@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature": {
|
|
707
|
-
"userValue": false,
|
|
708
|
-
"recommendedValue": false,
|
|
709
|
-
"explanation": "When set to true along with canContainersAccessInstanceRole=false in ECS cluster, new updated commands will be added to UserData to block container accessing IMDS. **Applicable to Linux only. IMPORTANT: See [details.](#aws-cdkaws-ecsenableImdsBlockingDeprecatedFeature)**"
|
|
710
|
-
},
|
|
711
|
-
"@aws-cdk/aws-ecs:disableEcsImdsBlocking": {
|
|
712
|
-
"userValue": true,
|
|
713
|
-
"recommendedValue": true,
|
|
714
|
-
"explanation": "When set to true, CDK synth will throw exception if canContainersAccessInstanceRole is false. **IMPORTANT: See [details.](#aws-cdkaws-ecsdisableEcsImdsBlocking)**"
|
|
715
|
-
},
|
|
716
706
|
"@aws-cdk/aws-ecs:reduceEc2FargateCloudWatchPermissions": {
|
|
717
707
|
"userValue": true,
|
|
718
708
|
"recommendedValue": true,
|
|
@@ -858,6 +848,7 @@
|
|
|
858
848
|
"explanation": "When enabled, CDK creates and manages loggroup for the lambda function"
|
|
859
849
|
},
|
|
860
850
|
"@aws-cdk/aws-elasticloadbalancingv2:networkLoadBalancerWithSecurityGroupByDefault": {
|
|
851
|
+
"userValue": true,
|
|
861
852
|
"recommendedValue": true,
|
|
862
853
|
"explanation": "When enabled, Network Load Balancer will be created with a security group by default."
|
|
863
854
|
},
|
|
@@ -869,12 +860,25 @@
|
|
|
869
860
|
}
|
|
870
861
|
},
|
|
871
862
|
"@aws-cdk/aws-ecs-patterns:uniqueTargetGroupId": {
|
|
863
|
+
"userValue": true,
|
|
872
864
|
"recommendedValue": true,
|
|
873
865
|
"explanation": "When enabled, ECS patterns will generate unique target group IDs to prevent conflicts during load balancer replacement"
|
|
866
|
+
},
|
|
867
|
+
"@aws-cdk/aws-route53-patterns:useDistribution": {
|
|
868
|
+
"userValue": true,
|
|
869
|
+
"recommendedValue": true,
|
|
870
|
+
"explanation": "Use the `Distribution` resource instead of `CloudFrontWebDistribution`"
|
|
871
|
+
},
|
|
872
|
+
"@aws-cdk/core:automaticL1Traits": {
|
|
873
|
+
"recommendedValue": true,
|
|
874
|
+
"explanation": "Automatically use the default L1 traits for L1 constructs`",
|
|
875
|
+
"unconfiguredBehavesLike": {
|
|
876
|
+
"v2": true
|
|
877
|
+
}
|
|
874
878
|
}
|
|
875
879
|
}
|
|
876
880
|
}
|
|
877
881
|
}
|
|
878
882
|
},
|
|
879
|
-
"minimumCliVersion": "2.
|
|
883
|
+
"minimumCliVersion": "2.1106.1"
|
|
880
884
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":"tree-0.1","tree":{"id":"App","path":"","constructInfo":{"fqn":"aws-cdk-lib.App","version":"2.223.0"},"children":{"lamkin-existingStreamWithCmk":{"id":"lamkin-existingStreamWithCmk","path":"lamkin-existingStreamWithCmk","constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.223.0"},"children":{"test-key":{"id":"test-key","path":"lamkin-existingStreamWithCmk/test-key","constructInfo":{"fqn":"aws-cdk-lib.aws_kms.Key","version":"2.223.0","metadata":[{"enableKeyRotation":true}]},"children":{"Resource":{"id":"Resource","path":"lamkin-existingStreamWithCmk/test-key/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_kms.CfnKey","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::KMS::Key","aws:cdk:cloudformation:props":{"enableKeyRotation":true,"keyPolicy":{"Statement":[{"Action":"kms:*","Effect":"Allow","Principal":{"AWS":{"Fn::Join":["",["arn:",{"Ref":"AWS::Partition"},":iam::",{"Ref":"AWS::AccountId"},":root"]]}},"Resource":"*"}],"Version":"2012-10-17"}}}}}},"test-stream":{"id":"test-stream","path":"lamkin-existingStreamWithCmk/test-stream","constructInfo":{"fqn":"aws-cdk-lib.aws_kinesis.Stream","version":"2.223.0","metadata":[{"encryptionKey":"*"}]},"children":{"Resource":{"id":"Resource","path":"lamkin-existingStreamWithCmk/test-stream/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_kinesis.CfnStream","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::Kinesis::Stream","aws:cdk:cloudformation:props":{"retentionPeriodHours":24,"shardCount":1,"streamEncryption":{"encryptionType":"KMS","keyId":{"Fn::GetAtt":["testkey784D0285","Arn"]}}}}}}},"test-lambda-kinesisstreams":{"id":"test-lambda-kinesisstreams","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams","constructInfo":{"fqn":"@aws-solutions-constructs/aws-lambda-kinesisstreams.LambdaToKinesisStreams","version":"2.95.1"},"children":{"LambdaFunctionServiceRole":{"id":"LambdaFunctionServiceRole","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/LambdaFunctionServiceRole","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Role","version":"2.223.0","metadata":[{"assumedBy":{"principalAccount":"*","assumeRoleAction":"*"},"inlinePolicies":"*"},{"attachInlinePolicy":["*"]},{"attachInlinePolicy":["*"]},{"addToPrincipalPolicy":[{}]},{"attachInlinePolicy":["*"]},{"attachInlinePolicy":["*"]},{"addToPrincipalPolicy":[{}]},{"addToPrincipalPolicy":[{}]}]},"children":{"ImportLambdaFunctionServiceRole":{"id":"ImportLambdaFunctionServiceRole","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole","constructInfo":{"fqn":"aws-cdk-lib.Resource","version":"2.223.0","metadata":["*"]}},"Resource":{"id":"Resource","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/LambdaFunctionServiceRole/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnRole","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Role","aws:cdk:cloudformation:props":{"assumeRolePolicyDocument":{"Statement":[{"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"Service":"lambda.amazonaws.com"}}],"Version":"2012-10-17"},"policies":[{"policyName":"LambdaFunctionServiceRolePolicy","policyDocument":{"Statement":[{"Action":["logs:CreateLogGroup","logs:CreateLogStream","logs:PutLogEvents"],"Effect":"Allow","Resource":{"Fn::Join":["",["arn:",{"Ref":"AWS::Partition"},":logs:",{"Ref":"AWS::Region"},":",{"Ref":"AWS::AccountId"},":log-group:/aws/lambda/*"]]}}],"Version":"2012-10-17"}}]}}},"DefaultPolicy":{"id":"DefaultPolicy","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/LambdaFunctionServiceRole/DefaultPolicy","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Policy","version":"2.223.0","metadata":["*",{"attachToRole":["*"]},{"attachToRole":["*"]},{"addStatements":[{}]},{"addStatements":[{}]},{"addStatements":[{}]}]},"children":{"Resource":{"id":"Resource","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/LambdaFunctionServiceRole/DefaultPolicy/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnPolicy","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Policy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":["kinesis:ListShards","kinesis:PutRecord","kinesis:PutRecords"],"Effect":"Allow","Resource":{"Fn::GetAtt":["teststream04374A09","Arn"]}},{"Action":["kms:Decrypt","kms:Encrypt","kms:GenerateDataKey*","kms:ReEncrypt*"],"Effect":"Allow","Resource":{"Fn::GetAtt":["testkey784D0285","Arn"]}}],"Version":"2012-10-17"},"policyName":"testlambdakinesisstreamsLambdaFunctionServiceRoleDefaultPolicyED972043","roles":[{"Ref":"testlambdakinesisstreamsLambdaFunctionServiceRole95206CF3"}]}}}}}}},"LambdaFunction":{"id":"LambdaFunction","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/LambdaFunction","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.Function","version":"2.223.0","metadata":[{"role":"*","tracing":"Active","code":"*","runtime":"*","handler":"*"},{"addEnvironment":["*","*",{"removeInEdge":true}]},{"addEnvironment":["*","*"]}]},"children":{"Code":{"id":"Code","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/LambdaFunction/Code","constructInfo":{"fqn":"aws-cdk-lib.aws_s3_assets.Asset","version":"2.223.0"},"children":{"Stage":{"id":"Stage","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/LambdaFunction/Code/Stage","constructInfo":{"fqn":"aws-cdk-lib.AssetStaging","version":"2.223.0"}},"AssetBucket":{"id":"AssetBucket","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/LambdaFunction/Code/AssetBucket","constructInfo":{"fqn":"aws-cdk-lib.aws_s3.BucketBase","version":"2.223.0","metadata":[]}}}},"Resource":{"id":"Resource","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/LambdaFunction/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.CfnFunction","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::Lambda::Function","aws:cdk:cloudformation:props":{"code":{"s3Bucket":{"Fn::Sub":"cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"},"s3Key":"c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf.zip"},"environment":{"variables":{"AWS_NODEJS_CONNECTION_REUSE_ENABLED":"1","KINESIS_DATASTREAM_NAME":{"Ref":"teststream04374A09"}}},"handler":"index.handler","role":{"Fn::GetAtt":["testlambdakinesisstreamsLambdaFunctionServiceRole95206CF3","Arn"]},"runtime":"nodejs22.x","tracingConfig":{"mode":"Active"}}}},"inlinePolicyAddedToExecutionRole-0":{"id":"inlinePolicyAddedToExecutionRole-0","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/LambdaFunction/inlinePolicyAddedToExecutionRole-0","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Policy","version":"2.223.0","metadata":[{"statements":"*"},{"addStatements":[{}]},{"attachToRole":["*"]},{"attachToRole":["*"]}]},"children":{"Resource":{"id":"Resource","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnPolicy","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Policy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":["xray:PutTelemetryRecords","xray:PutTraceSegments"],"Effect":"Allow","Resource":"*"}],"Version":"2012-10-17"},"policyName":"testlambdakinesisstreamsLambdaFunctioninlinePolicyAddedToExecutionRole022FB8950","roles":[{"Ref":"testlambdakinesisstreamsLambdaFunctionServiceRole95206CF3"}]}}}}}}},"KinesisStreamGetRecordsIteratorAgeAlarm":{"id":"KinesisStreamGetRecordsIteratorAgeAlarm","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/KinesisStreamGetRecordsIteratorAgeAlarm","constructInfo":{"fqn":"aws-cdk-lib.aws_cloudwatch.Alarm","version":"2.223.0","metadata":[{"metric":{"warnings":"*","warningsV2":"*"},"threshold":"*","evaluationPeriods":"*","comparisonOperator":"*","alarmDescription":"*"}]},"children":{"Resource":{"id":"Resource","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/KinesisStreamGetRecordsIteratorAgeAlarm/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_cloudwatch.CfnAlarm","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::CloudWatch::Alarm","aws:cdk:cloudformation:props":{"alarmDescription":"Consumer Record Processing Falling Behind, there is risk for data loss due to record expiration.","comparisonOperator":"GreaterThanOrEqualToThreshold","evaluationPeriods":1,"metricName":"GetRecords.IteratorAgeMilliseconds","namespace":"AWS/Kinesis","period":300,"statistic":"Maximum","threshold":43200000}}}}},"KinesisStreamReadProvisionedThroughputExceededAlarm":{"id":"KinesisStreamReadProvisionedThroughputExceededAlarm","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/KinesisStreamReadProvisionedThroughputExceededAlarm","constructInfo":{"fqn":"aws-cdk-lib.aws_cloudwatch.Alarm","version":"2.223.0","metadata":[{"metric":{"warnings":"*","warningsV2":"*"},"threshold":"*","evaluationPeriods":"*","comparisonOperator":"*","alarmDescription":"*"}]},"children":{"Resource":{"id":"Resource","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/KinesisStreamReadProvisionedThroughputExceededAlarm/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_cloudwatch.CfnAlarm","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::CloudWatch::Alarm","aws:cdk:cloudformation:props":{"alarmDescription":"Consumer Application is Reading at a Slower Rate Than Expected.","comparisonOperator":"GreaterThanThreshold","evaluationPeriods":1,"metricName":"ReadProvisionedThroughputExceeded","namespace":"AWS/Kinesis","period":300,"statistic":"Average","threshold":0}}}}}}},"Integ":{"id":"Integ","path":"lamkin-existingStreamWithCmk/Integ","constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTest","version":"2.223.0-alpha.0"},"children":{"DefaultTest":{"id":"DefaultTest","path":"lamkin-existingStreamWithCmk/Integ/DefaultTest","constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTestCase","version":"2.223.0-alpha.0"},"children":{"Default":{"id":"Default","path":"lamkin-existingStreamWithCmk/Integ/DefaultTest/Default","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}},"DeployAssert":{"id":"DeployAssert","path":"lamkin-existingStreamWithCmk/Integ/DefaultTest/DeployAssert","constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.223.0"},"children":{"BootstrapVersion":{"id":"BootstrapVersion","path":"lamkin-existingStreamWithCmk/Integ/DefaultTest/DeployAssert/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.223.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"lamkin-existingStreamWithCmk/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.223.0"}}}}}}}},"BootstrapVersion":{"id":"BootstrapVersion","path":"lamkin-existingStreamWithCmk/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.223.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"lamkin-existingStreamWithCmk/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.223.0"}}}},"Tree":{"id":"Tree","path":"Tree","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}}}}}
|
|
1
|
+
{"version":"tree-0.1","tree":{"id":"App","path":"","constructInfo":{"fqn":"aws-cdk-lib.App","version":"2.239.0"},"children":{"lamkin-existingStreamWithCmk":{"id":"lamkin-existingStreamWithCmk","path":"lamkin-existingStreamWithCmk","constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.239.0"},"children":{"test-key":{"id":"test-key","path":"lamkin-existingStreamWithCmk/test-key","constructInfo":{"fqn":"aws-cdk-lib.aws_kms.Key","version":"2.239.0"},"children":{"Resource":{"id":"Resource","path":"lamkin-existingStreamWithCmk/test-key/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_kms.CfnKey","version":"2.239.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::KMS::Key","aws:cdk:cloudformation:props":{"enableKeyRotation":true,"keyPolicy":{"Statement":[{"Action":"kms:*","Effect":"Allow","Principal":{"AWS":{"Fn::Join":["",["arn:",{"Ref":"AWS::Partition"},":iam::",{"Ref":"AWS::AccountId"},":root"]]}},"Resource":"*"}],"Version":"2012-10-17"}}}}}},"test-stream":{"id":"test-stream","path":"lamkin-existingStreamWithCmk/test-stream","constructInfo":{"fqn":"aws-cdk-lib.aws_kinesis.Stream","version":"2.239.0"},"children":{"Resource":{"id":"Resource","path":"lamkin-existingStreamWithCmk/test-stream/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_kinesis.CfnStream","version":"2.239.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::Kinesis::Stream","aws:cdk:cloudformation:props":{"retentionPeriodHours":24,"shardCount":1,"streamEncryption":{"encryptionType":"KMS","keyId":{"Fn::GetAtt":["testkey784D0285","Arn"]}}}}}}},"test-lambda-kinesisstreams":{"id":"test-lambda-kinesisstreams","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams","constructInfo":{"fqn":"@aws-solutions-constructs/aws-lambda-kinesisstreams.LambdaToKinesisStreams","version":"2.99.0"},"children":{"LambdaFunctionServiceRole":{"id":"LambdaFunctionServiceRole","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/LambdaFunctionServiceRole","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Role","version":"2.239.0"},"children":{"Resource":{"id":"Resource","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/LambdaFunctionServiceRole/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnRole","version":"2.239.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Role","aws:cdk:cloudformation:props":{"assumeRolePolicyDocument":{"Statement":[{"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"Service":"lambda.amazonaws.com"}}],"Version":"2012-10-17"},"policies":[{"policyName":"LambdaFunctionServiceRolePolicy","policyDocument":{"Statement":[{"Action":["logs:CreateLogGroup","logs:CreateLogStream","logs:PutLogEvents"],"Effect":"Allow","Resource":{"Fn::Join":["",["arn:",{"Ref":"AWS::Partition"},":logs:",{"Ref":"AWS::Region"},":",{"Ref":"AWS::AccountId"},":log-group:/aws/lambda/*"]]}}],"Version":"2012-10-17"}}]}}},"DefaultPolicy":{"id":"DefaultPolicy","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/LambdaFunctionServiceRole/DefaultPolicy","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Policy","version":"2.239.0"},"children":{"Resource":{"id":"Resource","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/LambdaFunctionServiceRole/DefaultPolicy/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnPolicy","version":"2.239.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Policy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":["kinesis:ListShards","kinesis:PutRecord","kinesis:PutRecords"],"Effect":"Allow","Resource":{"Fn::GetAtt":["teststream04374A09","Arn"]}},{"Action":["kms:Decrypt","kms:Encrypt","kms:GenerateDataKey*","kms:ReEncrypt*"],"Effect":"Allow","Resource":{"Fn::GetAtt":["testkey784D0285","Arn"]}}],"Version":"2012-10-17"},"policyName":"testlambdakinesisstreamsLambdaFunctionServiceRoleDefaultPolicyED972043","roles":[{"Ref":"testlambdakinesisstreamsLambdaFunctionServiceRole95206CF3"}]}}}}}}},"LambdaFunction":{"id":"LambdaFunction","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/LambdaFunction","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.Function","version":"2.239.0"},"children":{"Resource":{"id":"Resource","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/LambdaFunction/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.CfnFunction","version":"2.239.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::Lambda::Function","aws:cdk:cloudformation:props":{"code":{"zipFile":"exports.handler = async (event) => { console.log(event); return {statusCode: 200, body: \"\"}; }"},"environment":{"variables":{"AWS_NODEJS_CONNECTION_REUSE_ENABLED":"1","KINESIS_DATASTREAM_NAME":{"Ref":"teststream04374A09"}}},"handler":"index.handler","role":{"Fn::GetAtt":["testlambdakinesisstreamsLambdaFunctionServiceRole95206CF3","Arn"]},"runtime":"nodejs22.x","tracingConfig":{"mode":"Active"}}}},"inlinePolicyAddedToExecutionRole-0":{"id":"inlinePolicyAddedToExecutionRole-0","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/LambdaFunction/inlinePolicyAddedToExecutionRole-0","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Policy","version":"2.239.0"},"children":{"Resource":{"id":"Resource","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnPolicy","version":"2.239.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Policy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":["xray:PutTelemetryRecords","xray:PutTraceSegments"],"Effect":"Allow","Resource":"*"}],"Version":"2012-10-17"},"policyName":"testlambdakinesisstreamsLambdaFunctioninlinePolicyAddedToExecutionRole022FB8950","roles":[{"Ref":"testlambdakinesisstreamsLambdaFunctionServiceRole95206CF3"}]}}}}}}},"KinesisStreamGetRecordsIteratorAgeAlarm":{"id":"KinesisStreamGetRecordsIteratorAgeAlarm","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/KinesisStreamGetRecordsIteratorAgeAlarm","constructInfo":{"fqn":"aws-cdk-lib.aws_cloudwatch.Alarm","version":"2.239.0"},"children":{"Resource":{"id":"Resource","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/KinesisStreamGetRecordsIteratorAgeAlarm/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_cloudwatch.CfnAlarm","version":"2.239.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::CloudWatch::Alarm","aws:cdk:cloudformation:props":{"alarmDescription":"Consumer Record Processing Falling Behind, there is risk for data loss due to record expiration.","comparisonOperator":"GreaterThanOrEqualToThreshold","evaluationPeriods":1,"metricName":"GetRecords.IteratorAgeMilliseconds","namespace":"AWS/Kinesis","period":300,"statistic":"Maximum","threshold":43200000}}}}},"KinesisStreamReadProvisionedThroughputExceededAlarm":{"id":"KinesisStreamReadProvisionedThroughputExceededAlarm","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/KinesisStreamReadProvisionedThroughputExceededAlarm","constructInfo":{"fqn":"aws-cdk-lib.aws_cloudwatch.Alarm","version":"2.239.0"},"children":{"Resource":{"id":"Resource","path":"lamkin-existingStreamWithCmk/test-lambda-kinesisstreams/KinesisStreamReadProvisionedThroughputExceededAlarm/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_cloudwatch.CfnAlarm","version":"2.239.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::CloudWatch::Alarm","aws:cdk:cloudformation:props":{"alarmDescription":"Consumer Application is Reading at a Slower Rate Than Expected.","comparisonOperator":"GreaterThanThreshold","evaluationPeriods":1,"metricName":"ReadProvisionedThroughputExceeded","namespace":"AWS/Kinesis","period":300,"statistic":"Average","threshold":0}}}}}}},"Integ":{"id":"Integ","path":"lamkin-existingStreamWithCmk/Integ","constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTest","version":"2.239.0-alpha.0"},"children":{"DefaultTest":{"id":"DefaultTest","path":"lamkin-existingStreamWithCmk/Integ/DefaultTest","constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTestCase","version":"2.239.0-alpha.0"},"children":{"Default":{"id":"Default","path":"lamkin-existingStreamWithCmk/Integ/DefaultTest/Default","constructInfo":{"fqn":"constructs.Construct","version":"10.5.1"}},"DeployAssert":{"id":"DeployAssert","path":"lamkin-existingStreamWithCmk/Integ/DefaultTest/DeployAssert","constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.239.0"},"children":{"BootstrapVersion":{"id":"BootstrapVersion","path":"lamkin-existingStreamWithCmk/Integ/DefaultTest/DeployAssert/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.239.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"lamkin-existingStreamWithCmk/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.239.0"}}}}}}}},"BootstrapVersion":{"id":"BootstrapVersion","path":"lamkin-existingStreamWithCmk/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.239.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"lamkin-existingStreamWithCmk/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.239.0"}}}},"Tree":{"id":"Tree","path":"Tree","constructInfo":{"fqn":"constructs.Construct","version":"10.5.1"}}}}}
|
|
@@ -26,7 +26,7 @@ const existingVpc = (0, core_1.buildVpc)(stack, {
|
|
|
26
26
|
});
|
|
27
27
|
new lib_1.LambdaToKinesisStreams(stack, 'test-lambda-kinesisstreams', {
|
|
28
28
|
lambdaFunctionProps: {
|
|
29
|
-
code: lambda.
|
|
29
|
+
code: new lambda.InlineCode('exports.handler = async (event) => { console.log(event); return {statusCode: 200, body: ""}; }'),
|
|
30
30
|
runtime: defaults.COMMERCIAL_REGION_LAMBDA_NODE_RUNTIME,
|
|
31
31
|
handler: 'index.handler'
|
|
32
32
|
},
|
|
@@ -36,4 +36,4 @@ new lib_1.LambdaToKinesisStreams(stack, 'test-lambda-kinesisstreams', {
|
|
|
36
36
|
new integ_tests_alpha_1.IntegTest(stack, 'Integ', { testCases: [
|
|
37
37
|
stack
|
|
38
38
|
] });
|
|
39
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
39
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":"
|
|
1
|
+
{"version":"50.0.0"}
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
{
|
|
2
|
-
"version": "
|
|
2
|
+
"version": "50.0.0",
|
|
3
3
|
"testCases": {
|
|
4
4
|
"lamkin-existingVpc/Integ/DefaultTest": {
|
|
5
5
|
"stacks": [
|
|
@@ -9,5 +9,5 @@
|
|
|
9
9
|
"assertionStackName": "lamkinexistingVpcIntegDefaultTestDeployAssertB97E47BA"
|
|
10
10
|
}
|
|
11
11
|
},
|
|
12
|
-
"minimumCliVersion": "2.
|
|
12
|
+
"minimumCliVersion": "2.1105.0"
|
|
13
13
|
}
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
{
|
|
2
|
-
"version": "
|
|
2
|
+
"version": "50.0.0",
|
|
3
3
|
"files": {
|
|
4
4
|
"7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200": {
|
|
5
5
|
"displayName": "lamkin-existingVpc/Custom::VpcRestrictDefaultSGCustomResourceProvider Code",
|
|
@@ -15,30 +15,16 @@
|
|
|
15
15
|
}
|
|
16
16
|
}
|
|
17
17
|
},
|
|
18
|
-
"
|
|
19
|
-
"displayName": "test-lambda-kinesisstreams/LambdaFunction/Code",
|
|
20
|
-
"source": {
|
|
21
|
-
"path": "asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf",
|
|
22
|
-
"packaging": "zip"
|
|
23
|
-
},
|
|
24
|
-
"destinations": {
|
|
25
|
-
"current_account-current_region-0b4831fe": {
|
|
26
|
-
"bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
|
|
27
|
-
"objectKey": "c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf.zip",
|
|
28
|
-
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
|
|
29
|
-
}
|
|
30
|
-
}
|
|
31
|
-
},
|
|
32
|
-
"a028d684d9eb5589cb1480c1ffb6bba7bacc3760ac64e2c6f1da0dd61045d01f": {
|
|
18
|
+
"1221c716bbb44a62362233d9c2555738c993c5dee3ea70535151123f4d9dd47a": {
|
|
33
19
|
"displayName": "lamkin-existingVpc Template",
|
|
34
20
|
"source": {
|
|
35
21
|
"path": "lamkin-existingVpc.template.json",
|
|
36
22
|
"packaging": "file"
|
|
37
23
|
},
|
|
38
24
|
"destinations": {
|
|
39
|
-
"current_account-current_region-
|
|
25
|
+
"current_account-current_region-7ae083df": {
|
|
40
26
|
"bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
|
|
41
|
-
"objectKey": "
|
|
27
|
+
"objectKey": "1221c716bbb44a62362233d9c2555738c993c5dee3ea70535151123f4d9dd47a.json",
|
|
42
28
|
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
|
|
43
29
|
}
|
|
44
30
|
}
|
|
@@ -844,10 +844,7 @@
|
|
|
844
844
|
"Type": "AWS::Lambda::Function",
|
|
845
845
|
"Properties": {
|
|
846
846
|
"Code": {
|
|
847
|
-
"
|
|
848
|
-
"Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
|
|
849
|
-
},
|
|
850
|
-
"S3Key": "c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf.zip"
|
|
847
|
+
"ZipFile": "exports.handler = async (event) => { console.log(event); return {statusCode: 200, body: \"\"}; }"
|
|
851
848
|
},
|
|
852
849
|
"Environment": {
|
|
853
850
|
"Variables": {
|