@aws-solutions-constructs/aws-lambda-sns 2.95.1 → 2.97.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (25) hide show
  1. package/.jsii +4395 -60
  2. package/README.adoc +10 -9
  3. package/lib/index.d.ts +4 -4
  4. package/lib/index.js +2 -2
  5. package/package.json +6 -6
  6. package/test/integ.lamsns-deployFunction.js.snapshot/asset.4085f2fc7cce70548a05ffc5162591a6b42f88398292e9c4b2739feed32a1640/index.js +21 -0
  7. package/test/integ.lamsns-deployFunction.js.snapshot/cdk.out +1 -1
  8. package/test/integ.lamsns-deployFunction.js.snapshot/integ.json +2 -2
  9. package/test/integ.lamsns-deployFunction.js.snapshot/lamsns-deployFunction.assets.json +8 -8
  10. package/test/integ.lamsns-deployFunction.js.snapshot/lamsns-deployFunction.template.json +2 -2
  11. package/test/integ.lamsns-deployFunction.js.snapshot/lamsnsdeployFunctionIntegDefaultTestDeployAssert36FE5D09.assets.json +1 -1
  12. package/test/integ.lamsns-deployFunction.js.snapshot/manifest.json +65 -41
  13. package/test/integ.lamsns-deployFunction.js.snapshot/tree.json +1 -1
  14. package/test/integ.lamsns-deployFunctionWithVpc.js.snapshot/lamsns-deployFunctionWithVpc.assets.json +3 -3
  15. package/test/integ.lamsns-deployFunctionWithVpc.js.snapshot/lamsns-deployFunctionWithVpc.template.json +1 -1
  16. package/test/integ.lamsns-deployFunctionWithVpc.js.snapshot/manifest.json +1 -1
  17. package/test/integ.lamsns-deployFunctionWithVpc.js.snapshot/tree.json +1 -1
  18. package/test/integ.lamsns-existingFunction.js.snapshot/asset.4085f2fc7cce70548a05ffc5162591a6b42f88398292e9c4b2739feed32a1640/index.js +21 -0
  19. package/test/integ.lamsns-existingFunction.js.snapshot/cdk.out +1 -1
  20. package/test/integ.lamsns-existingFunction.js.snapshot/integ.json +2 -2
  21. package/test/integ.lamsns-existingFunction.js.snapshot/lamsns-existingFunction.assets.json +8 -8
  22. package/test/integ.lamsns-existingFunction.js.snapshot/lamsns-existingFunction.template.json +2 -2
  23. package/test/integ.lamsns-existingFunction.js.snapshot/lamsnsexistingFunctionIntegDefaultTestDeployAssert733AE3CB.assets.json +1 -1
  24. package/test/integ.lamsns-existingFunction.js.snapshot/manifest.json +65 -41
  25. package/test/integ.lamsns-existingFunction.js.snapshot/tree.json +1 -1
package/README.adoc CHANGED
@@ -48,7 +48,7 @@ import * as lambda from 'aws-cdk-lib/aws-lambda';
48
48
 
49
49
  new LambdaToSns(this, 'test-lambda-sns', {
50
50
  lambdaFunctionProps: {
51
- runtime: lambda.Runtime.NODEJS_20_X,
51
+ runtime: lambda.Runtime.NODEJS_22_X,
52
52
  handler: 'index.handler',
53
53
  code: lambda.Code.fromAsset(`lambda`)
54
54
  }
@@ -90,7 +90,7 @@ import software.amazon.awsconstructs.services.lambdasns.*;
90
90
 
91
91
  new LambdaToSns(this, "test-lambda-sns-stack", new LambdaToSnsProps.Builder()
92
92
  .lambdaFunctionProps(new FunctionProps.Builder()
93
- .runtime(Runtime.NODEJS_20_X)
93
+ .runtime(Runtime.NODEJS_22_X)
94
94
  .code(Code.fromAsset("lambda"))
95
95
  .handler("index.handler")
96
96
  .build())
@@ -105,23 +105,20 @@ new LambdaToSns(this, "test-lambda-sns-stack", new LambdaToSnsProps.Builder()
105
105
  |*Name* |*Type* |*Description*
106
106
  |existingLambdaObj?
107
107
  |https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_lambda.Function.html[`lambda.Function`]
108
- |Existing instance of Lambda Function object, providing both this and
108
+ |Optional - instance of an existing Lambda Function object, providing both this and
109
109
  `lambdaFunctionProps` will cause an error.
110
110
 
111
111
  |lambdaFunctionProps?
112
112
  |https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_lambda.FunctionProps.html[`lambda.FunctionProps`]
113
- |User provided props to override the default props for the Lambda
114
- function.
113
+ |Optional - user provided props to override the default props for the Lambda function. Providing both this and `existingLambdaObj` is an error.
115
114
 
116
115
  |existingTopicObj?
117
116
  |https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_lambda.Function.html[`sns.Topic`]
118
- |Existing instance of SNS Topic object, providing both this and
119
- `topicProps` will cause an error.
117
+ |Optional - existing instance of SNS topic object, providing both this and `topicProps` will cause an error.
120
118
 
121
119
  |topicProps?
122
120
  |https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_sns.TopicProps.html[`sns.TopicProps`]
123
- |Optional user provided properties to override the default properties
124
- for the SNS topic.
121
+ |Optional - user provided properties to override the default properties for the SNS topic. Providing both this and `existingTopicObj` is an error.
125
122
 
126
123
  |existingVpc?
127
124
  |https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_ec2.IVpc.html[`ec2.IVpc`]
@@ -218,6 +215,10 @@ and higher functions)
218
215
 
219
216
  image::aws-lambda-sns.png["Diagram showing the Lambda function, SNS topic and IAM role created by the construct",scaledwidth=100%]
220
217
 
218
+ == Example Lambda Function Implementation
219
+
220
+ While Solutions Constructs does not publish code for the Lambda function to call SNS, here are many examples: https://github.com/awsdocs/aws-doc-sdk-examples/tree/main/javascriptv3/example_code/sns/actions['example']. (these examples are in JavaScript, but examples in other languages can also be found at this site)
221
+
221
222
  // github block
222
223
 
223
224
  '''''
package/lib/index.d.ts CHANGED
@@ -20,25 +20,25 @@ import * as ec2 from "aws-cdk-lib/aws-ec2";
20
20
  */
21
21
  export interface LambdaToSnsProps {
22
22
  /**
23
- * Existing instance of Lambda Function object, providing both this and `lambdaFunctionProps` will cause an error.
23
+ * Optional - instance of an existing Lambda Function object, providing both this and `lambdaFunctionProps` will cause an error.
24
24
  *
25
25
  * @default - None
26
26
  */
27
27
  readonly existingLambdaObj?: lambda.Function;
28
28
  /**
29
- * User provided props to override the default props for the Lambda function.
29
+ * Optional - user provided props to override the default props for the Lambda function. Providing both this and `existingLambdaObj` is an error.
30
30
  *
31
31
  * @default - Default properties are used.
32
32
  */
33
33
  readonly lambdaFunctionProps?: lambda.FunctionProps;
34
34
  /**
35
- * Existing instance of SNS Topic object, providing both this and topicProps will cause an error..
35
+ * Optional - existing instance of SNS topic object, providing both this and `topicProps` will cause an error.
36
36
  *
37
37
  * @default - Default props are used
38
38
  */
39
39
  readonly existingTopicObj?: sns.Topic;
40
40
  /**
41
- * Optional user provided properties to override the default properties for the SNS topic.
41
+ * Optional - user provided properties to override the default properties for the SNS topic. Providing both this and `existingTopicObj` is an error.
42
42
  *
43
43
  * @default - Default properties are used.
44
44
  */
package/lib/index.js CHANGED
@@ -61,5 +61,5 @@ class LambdaToSns extends constructs_1.Construct {
61
61
  }
62
62
  exports.LambdaToSns = LambdaToSns;
63
63
  _a = JSII_RTTI_SYMBOL_1;
64
- LambdaToSns[_a] = { fqn: "@aws-solutions-constructs/aws-lambda-sns.LambdaToSns", version: "2.95.1" };
65
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["index.ts"],"names":[],"mappings":";;;;;AAiBA,2DAA2D;AAC3D,wFAAwF;AACxF,2CAAuC;AA8EvC;;GAEG;AACH,MAAa,WAAY,SAAQ,sBAAS;IAKtC;;;;;;;OAOG;IACH,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAuB;QAC/D,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,QAAQ,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC;QAC9B,QAAQ,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC;QAC9B,QAAQ,CAAC,gBAAgB,CAAC,KAAK,CAAC,CAAC;QAEjC,IAAI,KAAK,CAAC,SAAS,IAAI,KAAK,CAAC,WAAW,EAAE,CAAC;YACzC,IAAI,CAAC,GAAG,GAAG,QAAQ,CAAC,QAAQ,CAAC,KAAK,EAAE;gBAClC,eAAe,EAAE,QAAQ,CAAC,uBAAuB,EAAE;gBACnD,WAAW,EAAE,KAAK,CAAC,WAAW;gBAC9B,YAAY,EAAE,KAAK,CAAC,QAAQ;gBAC5B,iBAAiB,EAAE;oBACjB,kBAAkB,EAAE,IAAI;oBACxB,gBAAgB,EAAE,IAAI;iBACvB;aACF,CAAC,CAAC;YAEH,QAAQ,CAAC,qBAAqB,CAAC,KAAK,EAAE,IAAI,CAAC,GAAG,EAAE,QAAQ,CAAC,oBAAoB,CAAC,GAAG,CAAC,CAAC;QACrF,CAAC;QAED,4BAA4B;QAC5B,IAAI,CAAC,cAAc,GAAG,QAAQ,CAAC,mBAAmB,CAAC,IAAI,EAAE;YACvD,iBAAiB,EAAE,KAAK,CAAC,iBAAiB;YAC1C,mBAAmB,EAAE,KAAK,CAAC,mBAAmB;YAC9C,GAAG,EAAE,IAAI,CAAC,GAAG;SACd,CAAC,CAAC;QAEH,sBAAsB;QACtB,MAAM,kBAAkB,GAAG,QAAQ,CAAC,UAAU,CAAC,IAAI,EAAE,EAAE,EAAE;YACvD,gBAAgB,EAAE,KAAK,CAAC,gBAAgB;YACxC,UAAU,EAAE,KAAK,CAAC,UAAU;YAC5B,sCAAsC,EAAE,KAAK,CAAC,sCAAsC;YACpF,aAAa,EAAE,KAAK,CAAC,aAAa;YAClC,kBAAkB,EAAE,KAAK,CAAC,kBAAkB;SAC7C,CAAC,CAAC;QAEH,IAAI,CAAC,QAAQ,GAAG,kBAAkB,CAAC,KAAK,CAAC;QACzC,kCAAkC;QAClC,MAAM,+BAA+B,GAAG,KAAK,CAAC,+BAA+B,IAAI,eAAe,CAAC;QACjG,IAAI,CAAC,cAAc,CAAC,cAAc,CAAC,+BAA+B,EAAE,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;QAC5F,MAAM,gCAAgC,GAAG,KAAK,CAAC,gCAAgC,IAAI,gBAAgB,CAAC;QACpG,IAAI,CAAC,cAAc,CAAC,cAAc,CAAC,gCAAgC,EAAE,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC,CAAC;QAE9F,6CAA6C;QAC7C,IAAI,CAAC,QAAQ,CAAC,YAAY,CAAC,IAAI,CAAC,cAAc,CAAC,cAAc,CAAC,CAAC;IACjE,CAAC;;AA1DL,kCA2DC","sourcesContent":["/**\n *  Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n *\n *  Licensed under the Apache License, Version 2.0 (the \"License\"). You may not use this file except in compliance\n *  with the License. A copy of the License is located at\n *\n *      http://www.apache.org/licenses/LICENSE-2.0\n *\n *  or in the 'license' file accompanying this file. This file is distributed on an 'AS IS' BASIS, WITHOUT WARRANTIES\n *  OR CONDITIONS OF ANY KIND, express or implied. See the License for the specific language governing permissions\n *  and limitations under the License.\n */\n\n// Imports\nimport * as lambda from 'aws-cdk-lib/aws-lambda';\nimport * as kms from 'aws-cdk-lib/aws-kms';\nimport * as sns from 'aws-cdk-lib/aws-sns';\nimport * as defaults from '@aws-solutions-constructs/core';\n// Note: To ensure CDKv2 compatibility, keep the import statement for Construct separate\nimport { Construct } from 'constructs';\nimport * as ec2 from \"aws-cdk-lib/aws-ec2\";\n\n/**\n * @summary The properties for the LambdaToSns class.\n */\nexport interface LambdaToSnsProps {\n  /**\n   * Existing instance of Lambda Function object, providing both this and `lambdaFunctionProps` will cause an error.\n   *\n   * @default - None\n   */\n  readonly existingLambdaObj?: lambda.Function;\n  /**\n   * User provided props to override the default props for the Lambda function.\n   *\n   * @default - Default properties are used.\n   */\n  readonly lambdaFunctionProps?: lambda.FunctionProps;\n  /**\n   * Existing instance of SNS Topic object, providing both this and topicProps will cause an error..\n   *\n   * @default - Default props are used\n   */\n  readonly existingTopicObj?: sns.Topic;\n  /**\n   * Optional user provided properties to override the default properties for the SNS topic.\n   *\n   * @default - Default properties are used.\n   */\n  readonly topicProps?: sns.TopicProps;\n  /**\n   * An existing VPC for the construct to use (construct will NOT create a new VPC in this case)\n   */\n  readonly existingVpc?: ec2.IVpc;\n  /**\n   * Properties to override default properties if deployVpc is true\n   */\n  readonly vpcProps?: ec2.VpcProps;\n  /**\n   * Whether to deploy a new VPC\n   *\n   * @default - false\n   */\n  readonly deployVpc?: boolean;\n  /**\n   * Optional Name for the Lambda function environment variable set to the arn of the Topic.\n   *\n   * @default - SNS_TOPIC_ARN\n   */\n  readonly topicArnEnvironmentVariableName?: string;\n  /**\n   * Optional Name for the Lambda function environment variable set to the name of the Topic.\n   *\n   * @default - SNS_TOPIC_NAME\n   */\n  readonly topicNameEnvironmentVariableName?: string;\n  /**\n   * If no key is provided, this flag determines whether the SNS Topic is encrypted with a new CMK or an AWS managed key.\n   * This flag is ignored if any of the following are defined: topicProps.masterKey, encryptionKey or encryptionKeyProps.\n   *\n   * @default - False if topicProps.masterKey, encryptionKey, and encryptionKeyProps are all undefined.\n   */\n  readonly enableEncryptionWithCustomerManagedKey?: boolean;\n  /**\n   * An optional, imported encryption key to encrypt the SNS Topic with.\n   *\n   * @default - None\n   */\n  readonly encryptionKey?: kms.Key;\n  /**\n   * Optional user provided properties to override the default properties for the KMS encryption key used to encrypt the SNS Topic with.\n   *\n   * @default - None\n   */\n  readonly encryptionKeyProps?: kms.KeyProps;\n}\n\n/**\n * @summary The LambdaToSns class.\n */\nexport class LambdaToSns extends Construct {\n    public readonly lambdaFunction: lambda.Function;\n    public readonly snsTopic: sns.Topic;\n    public readonly vpc?: ec2.IVpc;\n\n    /**\n     * @summary Constructs a new instance of the LambdaToSns class.\n     * @param {cdk.App} scope - represents the scope for all the resources.\n     * @param {string} id - this is a a scope-unique id.\n     * @param {LambdaToSnsProps} props - user provided props for the construct.\n     * @since 0.8.0\n     * @access public\n     */\n    constructor(scope: Construct, id: string, props: LambdaToSnsProps) {\n      super(scope, id);\n      defaults.CheckSnsProps(props);\n      defaults.CheckVpcProps(props);\n      defaults.CheckLambdaProps(props);\n\n      if (props.deployVpc || props.existingVpc) {\n        this.vpc = defaults.buildVpc(scope, {\n          defaultVpcProps: defaults.DefaultIsolatedVpcProps(),\n          existingVpc: props.existingVpc,\n          userVpcProps: props.vpcProps,\n          constructVpcProps: {\n            enableDnsHostnames: true,\n            enableDnsSupport: true,\n          },\n        });\n\n        defaults.AddAwsServiceEndpoint(scope, this.vpc, defaults.ServiceEndpointTypes.SNS);\n      }\n\n      // Setup the Lambda function\n      this.lambdaFunction = defaults.buildLambdaFunction(this, {\n        existingLambdaObj: props.existingLambdaObj,\n        lambdaFunctionProps: props.lambdaFunctionProps,\n        vpc: this.vpc,\n      });\n\n      // Setup the SNS topic\n      const buildTopicResponse = defaults.buildTopic(this, id, {\n        existingTopicObj: props.existingTopicObj,\n        topicProps: props.topicProps,\n        enableEncryptionWithCustomerManagedKey: props.enableEncryptionWithCustomerManagedKey,\n        encryptionKey: props.encryptionKey,\n        encryptionKeyProps: props.encryptionKeyProps\n      });\n\n      this.snsTopic = buildTopicResponse.topic;\n      // Configure environment variables\n      const topicArnEnvironmentVariableName = props.topicArnEnvironmentVariableName || 'SNS_TOPIC_ARN';\n      this.lambdaFunction.addEnvironment(topicArnEnvironmentVariableName, this.snsTopic.topicArn);\n      const topicNameEnvironmentVariableName = props.topicNameEnvironmentVariableName || 'SNS_TOPIC_NAME';\n      this.lambdaFunction.addEnvironment(topicNameEnvironmentVariableName, this.snsTopic.topicName);\n\n      // Add publishing permissions to the function\n      this.snsTopic.grantPublish(this.lambdaFunction.grantPrincipal);\n    }\n}"]}
64
+ LambdaToSns[_a] = { fqn: "@aws-solutions-constructs/aws-lambda-sns.LambdaToSns", version: "2.97.0" };
65
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["index.ts"],"names":[],"mappings":";;;;;AAiBA,2DAA2D;AAC3D,wFAAwF;AACxF,2CAAuC;AA8EvC;;GAEG;AACH,MAAa,WAAY,SAAQ,sBAAS;IAKtC;;;;;;;OAOG;IACH,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAuB;QAC/D,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,QAAQ,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC;QAC9B,QAAQ,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC;QAC9B,QAAQ,CAAC,gBAAgB,CAAC,KAAK,CAAC,CAAC;QAEjC,IAAI,KAAK,CAAC,SAAS,IAAI,KAAK,CAAC,WAAW,EAAE,CAAC;YACzC,IAAI,CAAC,GAAG,GAAG,QAAQ,CAAC,QAAQ,CAAC,KAAK,EAAE;gBAClC,eAAe,EAAE,QAAQ,CAAC,uBAAuB,EAAE;gBACnD,WAAW,EAAE,KAAK,CAAC,WAAW;gBAC9B,YAAY,EAAE,KAAK,CAAC,QAAQ;gBAC5B,iBAAiB,EAAE;oBACjB,kBAAkB,EAAE,IAAI;oBACxB,gBAAgB,EAAE,IAAI;iBACvB;aACF,CAAC,CAAC;YAEH,QAAQ,CAAC,qBAAqB,CAAC,KAAK,EAAE,IAAI,CAAC,GAAG,EAAE,QAAQ,CAAC,oBAAoB,CAAC,GAAG,CAAC,CAAC;QACrF,CAAC;QAED,4BAA4B;QAC5B,IAAI,CAAC,cAAc,GAAG,QAAQ,CAAC,mBAAmB,CAAC,IAAI,EAAE;YACvD,iBAAiB,EAAE,KAAK,CAAC,iBAAiB;YAC1C,mBAAmB,EAAE,KAAK,CAAC,mBAAmB;YAC9C,GAAG,EAAE,IAAI,CAAC,GAAG;SACd,CAAC,CAAC;QAEH,sBAAsB;QACtB,MAAM,kBAAkB,GAAG,QAAQ,CAAC,UAAU,CAAC,IAAI,EAAE,EAAE,EAAE;YACvD,gBAAgB,EAAE,KAAK,CAAC,gBAAgB;YACxC,UAAU,EAAE,KAAK,CAAC,UAAU;YAC5B,sCAAsC,EAAE,KAAK,CAAC,sCAAsC;YACpF,aAAa,EAAE,KAAK,CAAC,aAAa;YAClC,kBAAkB,EAAE,KAAK,CAAC,kBAAkB;SAC7C,CAAC,CAAC;QAEH,IAAI,CAAC,QAAQ,GAAG,kBAAkB,CAAC,KAAK,CAAC;QACzC,kCAAkC;QAClC,MAAM,+BAA+B,GAAG,KAAK,CAAC,+BAA+B,IAAI,eAAe,CAAC;QACjG,IAAI,CAAC,cAAc,CAAC,cAAc,CAAC,+BAA+B,EAAE,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;QAC5F,MAAM,gCAAgC,GAAG,KAAK,CAAC,gCAAgC,IAAI,gBAAgB,CAAC;QACpG,IAAI,CAAC,cAAc,CAAC,cAAc,CAAC,gCAAgC,EAAE,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC,CAAC;QAE9F,6CAA6C;QAC7C,IAAI,CAAC,QAAQ,CAAC,YAAY,CAAC,IAAI,CAAC,cAAc,CAAC,cAAc,CAAC,CAAC;IACjE,CAAC;;AA1DL,kCA2DC","sourcesContent":["/**\n *  Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n *\n *  Licensed under the Apache License, Version 2.0 (the \"License\"). You may not use this file except in compliance\n *  with the License. A copy of the License is located at\n *\n *      http://www.apache.org/licenses/LICENSE-2.0\n *\n *  or in the 'license' file accompanying this file. This file is distributed on an 'AS IS' BASIS, WITHOUT WARRANTIES\n *  OR CONDITIONS OF ANY KIND, express or implied. See the License for the specific language governing permissions\n *  and limitations under the License.\n */\n\n// Imports\nimport * as lambda from 'aws-cdk-lib/aws-lambda';\nimport * as kms from 'aws-cdk-lib/aws-kms';\nimport * as sns from 'aws-cdk-lib/aws-sns';\nimport * as defaults from '@aws-solutions-constructs/core';\n// Note: To ensure CDKv2 compatibility, keep the import statement for Construct separate\nimport { Construct } from 'constructs';\nimport * as ec2 from \"aws-cdk-lib/aws-ec2\";\n\n/**\n * @summary The properties for the LambdaToSns class.\n */\nexport interface LambdaToSnsProps {\n  /**\n   * Optional - instance of an existing Lambda Function object, providing both this and `lambdaFunctionProps` will cause an error.\n   *\n   * @default - None\n   */\n  readonly existingLambdaObj?: lambda.Function;\n  /**\n   * Optional - user provided props to override the default props for the Lambda function. Providing both this and `existingLambdaObj` is an error.\n   *\n   * @default - Default properties are used.\n   */\n  readonly lambdaFunctionProps?: lambda.FunctionProps;\n  /**\n   * Optional - existing instance of SNS topic object, providing both this and `topicProps` will cause an error.\n   *\n   * @default - Default props are used\n   */\n  readonly existingTopicObj?: sns.Topic;\n  /**\n   * Optional - user provided properties to override the default properties for the SNS topic. Providing both this and `existingTopicObj` is an error.\n   *\n   * @default - Default properties are used.\n   */\n  readonly topicProps?: sns.TopicProps;\n  /**\n   * An existing VPC for the construct to use (construct will NOT create a new VPC in this case)\n   */\n  readonly existingVpc?: ec2.IVpc;\n  /**\n   * Properties to override default properties if deployVpc is true\n   */\n  readonly vpcProps?: ec2.VpcProps;\n  /**\n   * Whether to deploy a new VPC\n   *\n   * @default - false\n   */\n  readonly deployVpc?: boolean;\n  /**\n   * Optional Name for the Lambda function environment variable set to the arn of the Topic.\n   *\n   * @default - SNS_TOPIC_ARN\n   */\n  readonly topicArnEnvironmentVariableName?: string;\n  /**\n   * Optional Name for the Lambda function environment variable set to the name of the Topic.\n   *\n   * @default - SNS_TOPIC_NAME\n   */\n  readonly topicNameEnvironmentVariableName?: string;\n  /**\n   * If no key is provided, this flag determines whether the SNS Topic is encrypted with a new CMK or an AWS managed key.\n   * This flag is ignored if any of the following are defined: topicProps.masterKey, encryptionKey or encryptionKeyProps.\n   *\n   * @default - False if topicProps.masterKey, encryptionKey, and encryptionKeyProps are all undefined.\n   */\n  readonly enableEncryptionWithCustomerManagedKey?: boolean;\n  /**\n   * An optional, imported encryption key to encrypt the SNS Topic with.\n   *\n   * @default - None\n   */\n  readonly encryptionKey?: kms.Key;\n  /**\n   * Optional user provided properties to override the default properties for the KMS encryption key used to encrypt the SNS Topic with.\n   *\n   * @default - None\n   */\n  readonly encryptionKeyProps?: kms.KeyProps;\n}\n\n/**\n * @summary The LambdaToSns class.\n */\nexport class LambdaToSns extends Construct {\n    public readonly lambdaFunction: lambda.Function;\n    public readonly snsTopic: sns.Topic;\n    public readonly vpc?: ec2.IVpc;\n\n    /**\n     * @summary Constructs a new instance of the LambdaToSns class.\n     * @param {cdk.App} scope - represents the scope for all the resources.\n     * @param {string} id - this is a a scope-unique id.\n     * @param {LambdaToSnsProps} props - user provided props for the construct.\n     * @since 0.8.0\n     * @access public\n     */\n    constructor(scope: Construct, id: string, props: LambdaToSnsProps) {\n      super(scope, id);\n      defaults.CheckSnsProps(props);\n      defaults.CheckVpcProps(props);\n      defaults.CheckLambdaProps(props);\n\n      if (props.deployVpc || props.existingVpc) {\n        this.vpc = defaults.buildVpc(scope, {\n          defaultVpcProps: defaults.DefaultIsolatedVpcProps(),\n          existingVpc: props.existingVpc,\n          userVpcProps: props.vpcProps,\n          constructVpcProps: {\n            enableDnsHostnames: true,\n            enableDnsSupport: true,\n          },\n        });\n\n        defaults.AddAwsServiceEndpoint(scope, this.vpc, defaults.ServiceEndpointTypes.SNS);\n      }\n\n      // Setup the Lambda function\n      this.lambdaFunction = defaults.buildLambdaFunction(this, {\n        existingLambdaObj: props.existingLambdaObj,\n        lambdaFunctionProps: props.lambdaFunctionProps,\n        vpc: this.vpc,\n      });\n\n      // Setup the SNS topic\n      const buildTopicResponse = defaults.buildTopic(this, id, {\n        existingTopicObj: props.existingTopicObj,\n        topicProps: props.topicProps,\n        enableEncryptionWithCustomerManagedKey: props.enableEncryptionWithCustomerManagedKey,\n        encryptionKey: props.encryptionKey,\n        encryptionKeyProps: props.encryptionKeyProps\n      });\n\n      this.snsTopic = buildTopicResponse.topic;\n      // Configure environment variables\n      const topicArnEnvironmentVariableName = props.topicArnEnvironmentVariableName || 'SNS_TOPIC_ARN';\n      this.lambdaFunction.addEnvironment(topicArnEnvironmentVariableName, this.snsTopic.topicArn);\n      const topicNameEnvironmentVariableName = props.topicNameEnvironmentVariableName || 'SNS_TOPIC_NAME';\n      this.lambdaFunction.addEnvironment(topicNameEnvironmentVariableName, this.snsTopic.topicName);\n\n      // Add publishing permissions to the function\n      this.snsTopic.grantPublish(this.lambdaFunction.grantPrincipal);\n    }\n}"]}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@aws-solutions-constructs/aws-lambda-sns",
3
- "version": "2.95.1",
3
+ "version": "2.97.0",
4
4
  "description": "CDK constructs for defining an interaction between an AWS Lambda function and an Amazon SNS topic.",
5
5
  "main": "lib/index.js",
6
6
  "types": "lib/index.d.ts",
@@ -55,14 +55,14 @@
55
55
  }
56
56
  },
57
57
  "dependencies": {
58
- "@aws-solutions-constructs/core": "2.95.1",
58
+ "@aws-solutions-constructs/core": "2.97.0",
59
59
  "constructs": "^10.0.0"
60
60
  },
61
61
  "devDependencies": {
62
- "@aws-cdk/integ-tests-alpha": "2.223.0-alpha.0",
62
+ "@aws-cdk/integ-tests-alpha": "2.233.0-alpha.0",
63
63
  "@types/node": "^10.3.0",
64
64
  "constructs": "^10.0.0",
65
- "aws-cdk-lib": "2.223.0"
65
+ "aws-cdk-lib": "2.233.0"
66
66
  },
67
67
  "jest": {
68
68
  "moduleFileExtensions": [
@@ -79,9 +79,9 @@
79
79
  ]
80
80
  },
81
81
  "peerDependencies": {
82
- "@aws-solutions-constructs/core": "2.95.1",
82
+ "@aws-solutions-constructs/core": "2.97.0",
83
83
  "constructs": "^10.0.0",
84
- "aws-cdk-lib": "^2.223.0"
84
+ "aws-cdk-lib": "^2.233.0"
85
85
  },
86
86
  "keywords": [
87
87
  "aws",
@@ -0,0 +1,21 @@
1
+ /**
2
+ * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
3
+ *
4
+ * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance
5
+ * with the License. A copy of the License is located at
6
+ *
7
+ * http://www.apache.org/licenses/LICENSE-2.0
8
+ *
9
+ * or in the 'license' file accompanying this file. This file is distributed on an 'AS IS' BASIS, WITHOUT WARRANTIES
10
+ * OR CONDITIONS OF ANY KIND, express or implied. See the License for the specific language governing permissions
11
+ * and limitations under the License.
12
+ */
13
+
14
+ exports.handler = async (event, context) => {
15
+ console.log('Received event:', JSON.stringify(event, null, 2));
16
+     return {
17
+       statusCode: 200,
18
+       headers: { 'Content-Type': 'text/plain' },
19
+       body: `Hello from AWS Solutions Constructs! You've hit ${event.path}\n`
20
+     };
21
+ };
@@ -1 +1 @@
1
- {"version":"45.0.0"}
1
+ {"version":"48.0.0"}
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "45.0.0",
2
+ "version": "48.0.0",
3
3
  "testCases": {
4
4
  "lamsns-deployFunction/Integ/DefaultTest": {
5
5
  "stacks": [
@@ -9,5 +9,5 @@
9
9
  "assertionStackName": "lamsnsdeployFunctionIntegDefaultTestDeployAssert36FE5D09"
10
10
  }
11
11
  },
12
- "minimumCliVersion": "2.1020.2"
12
+ "minimumCliVersion": "2.1029.2"
13
13
  }
@@ -1,30 +1,30 @@
1
1
  {
2
- "version": "45.0.0",
2
+ "version": "48.0.0",
3
3
  "files": {
4
- "0904d3723480fed2daf7885caa427b930881caae6879d1e6b0d395020173ef6f": {
4
+ "4085f2fc7cce70548a05ffc5162591a6b42f88398292e9c4b2739feed32a1640": {
5
5
  "displayName": "test-lambda-sns/LambdaFunction/Code",
6
6
  "source": {
7
- "path": "asset.0904d3723480fed2daf7885caa427b930881caae6879d1e6b0d395020173ef6f",
7
+ "path": "asset.4085f2fc7cce70548a05ffc5162591a6b42f88398292e9c4b2739feed32a1640",
8
8
  "packaging": "zip"
9
9
  },
10
10
  "destinations": {
11
- "current_account-current_region-86d36d19": {
11
+ "current_account-current_region-9a75cf4c": {
12
12
  "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
13
- "objectKey": "0904d3723480fed2daf7885caa427b930881caae6879d1e6b0d395020173ef6f.zip",
13
+ "objectKey": "4085f2fc7cce70548a05ffc5162591a6b42f88398292e9c4b2739feed32a1640.zip",
14
14
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
15
15
  }
16
16
  }
17
17
  },
18
- "04d2b35bd0a00b9ed7527435892abc66a3ebd581d4efde3bf874fd3282550e8a": {
18
+ "8884492db6810ff50f1ee1448dc700ec7dff0e32bca1337890ec6de0cf4c1625": {
19
19
  "displayName": "lamsns-deployFunction Template",
20
20
  "source": {
21
21
  "path": "lamsns-deployFunction.template.json",
22
22
  "packaging": "file"
23
23
  },
24
24
  "destinations": {
25
- "current_account-current_region-389b3f14": {
25
+ "current_account-current_region-c6e82a47": {
26
26
  "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
27
- "objectKey": "04d2b35bd0a00b9ed7527435892abc66a3ebd581d4efde3bf874fd3282550e8a.json",
27
+ "objectKey": "8884492db6810ff50f1ee1448dc700ec7dff0e32bca1337890ec6de0cf4c1625.json",
28
28
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
29
29
  }
30
30
  }
@@ -125,7 +125,7 @@
125
125
  "S3Bucket": {
126
126
  "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
127
127
  },
128
- "S3Key": "0904d3723480fed2daf7885caa427b930881caae6879d1e6b0d395020173ef6f.zip"
128
+ "S3Key": "4085f2fc7cce70548a05ffc5162591a6b42f88398292e9c4b2739feed32a1640.zip"
129
129
  },
130
130
  "Environment": {
131
131
  "Variables": {
@@ -148,7 +148,7 @@
148
148
  "Arn"
149
149
  ]
150
150
  },
151
- "Runtime": "nodejs20.x",
151
+ "Runtime": "nodejs22.x",
152
152
  "TracingConfig": {
153
153
  "Mode": "Active"
154
154
  }
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "45.0.0",
2
+ "version": "48.0.0",
3
3
  "files": {
4
4
  "21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22": {
5
5
  "displayName": "lamsnsdeployFunctionIntegDefaultTestDeployAssert36FE5D09 Template",
@@ -66,7 +66,7 @@
66
66
  "validateOnSynth": false,
67
67
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
68
68
  "cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
69
- "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/04d2b35bd0a00b9ed7527435892abc66a3ebd581d4efde3bf874fd3282550e8a.json",
69
+ "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/8884492db6810ff50f1ee1448dc700ec7dff0e32bca1337890ec6de0cf4c1625.json",
70
70
  "requiresBootstrapStackVersion": 6,
71
71
  "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
72
72
  "additionalDependencies": [
@@ -340,57 +340,48 @@
340
340
  "properties": {
341
341
  "module": "aws-cdk-lib",
342
342
  "flags": {
343
- "@aws-cdk/core:enableStackNameDuplicates": {
343
+ "@aws-cdk/aws-signer:signingProfileNamePassedToCfn": {
344
344
  "recommendedValue": true,
345
- "explanation": "Allow multiple stacks with the same name"
346
- },
347
- "aws-cdk:enableDiffNoFail": {
348
- "recommendedValue": true,
349
- "explanation": "Make `cdk diff` not fail when there are differences"
345
+ "explanation": "Pass signingProfileName to CfnSigningProfile"
350
346
  },
351
347
  "@aws-cdk/core:newStyleStackSynthesis": {
352
348
  "recommendedValue": true,
353
- "explanation": "Switch to new stack synthesis method which enables CI/CD"
349
+ "explanation": "Switch to new stack synthesis method which enables CI/CD",
350
+ "unconfiguredBehavesLike": {
351
+ "v2": true
352
+ }
354
353
  },
355
354
  "@aws-cdk/core:stackRelativeExports": {
356
355
  "recommendedValue": true,
357
- "explanation": "Name exports based on the construct paths relative to the stack, rather than the global construct path"
358
- },
359
- "@aws-cdk/aws-ecr-assets:dockerIgnoreSupport": {
360
- "recommendedValue": true,
361
- "explanation": "DockerImageAsset properly supports `.dockerignore` files by default"
362
- },
363
- "@aws-cdk/aws-secretsmanager:parseOwnedSecretName": {
364
- "recommendedValue": true,
365
- "explanation": "Fix the referencing of SecretsManager names from ARNs"
366
- },
367
- "@aws-cdk/aws-kms:defaultKeyPolicies": {
368
- "recommendedValue": true,
369
- "explanation": "Tighten default KMS key policies"
370
- },
371
- "@aws-cdk/aws-s3:grantWriteWithoutAcl": {
372
- "recommendedValue": true,
373
- "explanation": "Remove `PutObjectAcl` from Bucket.grantWrite"
356
+ "explanation": "Name exports based on the construct paths relative to the stack, rather than the global construct path",
357
+ "unconfiguredBehavesLike": {
358
+ "v2": true
359
+ }
374
360
  },
375
- "@aws-cdk/aws-ecs-patterns:removeDefaultDesiredCount": {
361
+ "@aws-cdk/aws-ecs-patterns:secGroupsDisablesImplicitOpenListener": {
376
362
  "recommendedValue": true,
377
- "explanation": "Do not specify a default DesiredCount for ECS services"
363
+ "explanation": "Disable implicit openListener when custom security groups are provided"
378
364
  },
379
365
  "@aws-cdk/aws-rds:lowercaseDbIdentifier": {
380
366
  "recommendedValue": true,
381
- "explanation": "Force lowercasing of RDS Cluster names in CDK"
367
+ "explanation": "Force lowercasing of RDS Cluster names in CDK",
368
+ "unconfiguredBehavesLike": {
369
+ "v2": true
370
+ }
382
371
  },
383
372
  "@aws-cdk/aws-apigateway:usagePlanKeyOrderInsensitiveId": {
384
373
  "recommendedValue": true,
385
- "explanation": "Allow adding/removing multiple UsagePlanKeys independently"
386
- },
387
- "@aws-cdk/aws-efs:defaultEncryptionAtRest": {
388
- "recommendedValue": true,
389
- "explanation": "Enable this feature flag to have elastic file systems encrypted at rest by default."
374
+ "explanation": "Allow adding/removing multiple UsagePlanKeys independently",
375
+ "unconfiguredBehavesLike": {
376
+ "v2": true
377
+ }
390
378
  },
391
379
  "@aws-cdk/aws-lambda:recognizeVersionProps": {
392
380
  "recommendedValue": true,
393
- "explanation": "Enable this feature flag to opt in to the updated logical id calculation for Lambda Version created using the `fn.currentVersion`."
381
+ "explanation": "Enable this feature flag to opt in to the updated logical id calculation for Lambda Version created using the `fn.currentVersion`.",
382
+ "unconfiguredBehavesLike": {
383
+ "v2": true
384
+ }
394
385
  },
395
386
  "@aws-cdk/aws-lambda:recognizeLayerVersion": {
396
387
  "userValue": true,
@@ -399,7 +390,10 @@
399
390
  },
400
391
  "@aws-cdk/aws-cloudfront:defaultSecurityPolicyTLSv1.2_2021": {
401
392
  "recommendedValue": true,
402
- "explanation": "Enable this feature flag to have cloudfront distributions use the security policy TLSv1.2_2021 by default."
393
+ "explanation": "Enable this feature flag to have cloudfront distributions use the security policy TLSv1.2_2021 by default.",
394
+ "unconfiguredBehavesLike": {
395
+ "v2": true
396
+ }
403
397
  },
404
398
  "@aws-cdk/core:checkSecretUsage": {
405
399
  "userValue": true,
@@ -476,7 +470,7 @@
476
470
  "@aws-cdk/aws-iam:importedRoleStackSafeDefaultPolicyName": {
477
471
  "userValue": true,
478
472
  "recommendedValue": true,
479
- "explanation": "Enable this feature to by default create default policy names for imported roles that depend on the stack the role is in."
473
+ "explanation": "Enable this feature to create default policy names for imported roles that depend on the stack the role is in."
480
474
  },
481
475
  "@aws-cdk/aws-s3:serverAccessLogsUseBucketPolicy": {
482
476
  "userValue": true,
@@ -620,7 +614,10 @@
620
614
  },
621
615
  "@aws-cdk/pipelines:reduceAssetRoleTrustScope": {
622
616
  "recommendedValue": true,
623
- "explanation": "Remove the root account principal from PipelineAssetsFileRole trust policy"
617
+ "explanation": "Remove the root account principal from PipelineAssetsFileRole trust policy",
618
+ "unconfiguredBehavesLike": {
619
+ "v2": true
620
+ }
624
621
  },
625
622
  "@aws-cdk/aws-eks:nodegroupNameAttribute": {
626
623
  "userValue": true,
@@ -649,7 +646,10 @@
649
646
  },
650
647
  "@aws-cdk/aws-stepfunctions-tasks:useNewS3UriParametersForBedrockInvokeModelTask": {
651
648
  "recommendedValue": true,
652
- "explanation": "When enabled, use new props for S3 URI field in task definition of state machine for bedrock invoke model."
649
+ "explanation": "When enabled, use new props for S3 URI field in task definition of state machine for bedrock invoke model.",
650
+ "unconfiguredBehavesLike": {
651
+ "v2": true
652
+ }
653
653
  },
654
654
  "@aws-cdk/core:explicitStackTags": {
655
655
  "userValue": true,
@@ -713,7 +713,10 @@
713
713
  },
714
714
  "@aws-cdk/core:aspectStabilization": {
715
715
  "recommendedValue": true,
716
- "explanation": "When enabled, a stabilization loop will be run when invoking Aspects during synthesis."
716
+ "explanation": "When enabled, a stabilization loop will be run when invoking Aspects during synthesis.",
717
+ "unconfiguredBehavesLike": {
718
+ "v2": true
719
+ }
717
720
  },
718
721
  "@aws-cdk/aws-route53-targets:userPoolDomainNameMethodWithoutCustomResource": {
719
722
  "userValue": true,
@@ -747,7 +750,10 @@
747
750
  },
748
751
  "@aws-cdk/pipelines:reduceStageRoleTrustScope": {
749
752
  "recommendedValue": true,
750
- "explanation": "Remove the root account principal from Stage addActions trust policy"
753
+ "explanation": "Remove the root account principal from Stage addActions trust policy",
754
+ "unconfiguredBehavesLike": {
755
+ "v2": true
756
+ }
751
757
  },
752
758
  "@aws-cdk/aws-events:requireEventBusPolicySid": {
753
759
  "userValue": true,
@@ -770,7 +776,10 @@
770
776
  },
771
777
  "@aws-cdk/pipelines:reduceCrossAccountActionRoleTrustScope": {
772
778
  "recommendedValue": true,
773
- "explanation": "When enabled, scopes down the trust policy for the cross-account action role"
779
+ "explanation": "When enabled, scopes down the trust policy for the cross-account action role",
780
+ "unconfiguredBehavesLike": {
781
+ "v2": true
782
+ }
774
783
  },
775
784
  "@aws-cdk/aws-stepfunctions:useDistributedMapResultWriterV2": {
776
785
  "userValue": true,
@@ -800,6 +809,21 @@
800
809
  "userValue": true,
801
810
  "recommendedValue": true,
802
811
  "explanation": "When enabled, CDK creates and manages loggroup for the lambda function"
812
+ },
813
+ "@aws-cdk/aws-elasticloadbalancingv2:networkLoadBalancerWithSecurityGroupByDefault": {
814
+ "recommendedValue": true,
815
+ "explanation": "When enabled, Network Load Balancer will be created with a security group by default."
816
+ },
817
+ "@aws-cdk/aws-stepfunctions-tasks:httpInvokeDynamicJsonPathEndpoint": {
818
+ "recommendedValue": true,
819
+ "explanation": "When enabled, allows using a dynamic apiEndpoint with JSONPath format in HttpInvoke tasks.",
820
+ "unconfiguredBehavesLike": {
821
+ "v2": true
822
+ }
823
+ },
824
+ "@aws-cdk/aws-ecs-patterns:uniqueTargetGroupId": {
825
+ "recommendedValue": true,
826
+ "explanation": "When enabled, ECS patterns will generate unique target group IDs to prevent conflicts during load balancer replacement"
803
827
  }
804
828
  }
805
829
  }
@@ -1 +1 @@
1
- {"version":"tree-0.1","tree":{"id":"App","path":"","constructInfo":{"fqn":"aws-cdk-lib.App","version":"2.206.0"},"children":{"lamsns-deployFunction":{"id":"lamsns-deployFunction","path":"lamsns-deployFunction","constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.206.0"},"children":{"test-lambda-sns":{"id":"test-lambda-sns","path":"lamsns-deployFunction/test-lambda-sns","constructInfo":{"fqn":"@aws-solutions-constructs/aws-lambda-sns.LambdaToSns","version":"2.86.0"},"children":{"LambdaFunctionServiceRole":{"id":"LambdaFunctionServiceRole","path":"lamsns-deployFunction/test-lambda-sns/LambdaFunctionServiceRole","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Role","version":"2.206.0","metadata":[{"assumedBy":{"principalAccount":"*","assumeRoleAction":"*"},"inlinePolicies":"*"},{"attachInlinePolicy":["*"]},{"attachInlinePolicy":["*"]},{"addToPrincipalPolicy":[{}]},{"attachInlinePolicy":["*"]},{"attachInlinePolicy":["*"]},{"addToPrincipalPolicy":[{}]}]},"children":{"ImportLambdaFunctionServiceRole":{"id":"ImportLambdaFunctionServiceRole","path":"lamsns-deployFunction/test-lambda-sns/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole","constructInfo":{"fqn":"aws-cdk-lib.Resource","version":"2.206.0","metadata":["*"]}},"Resource":{"id":"Resource","path":"lamsns-deployFunction/test-lambda-sns/LambdaFunctionServiceRole/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnRole","version":"2.206.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Role","aws:cdk:cloudformation:props":{"assumeRolePolicyDocument":{"Statement":[{"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"Service":"lambda.amazonaws.com"}}],"Version":"2012-10-17"},"policies":[{"policyName":"LambdaFunctionServiceRolePolicy","policyDocument":{"Statement":[{"Action":["logs:CreateLogGroup","logs:CreateLogStream","logs:PutLogEvents"],"Effect":"Allow","Resource":{"Fn::Join":["",["arn:",{"Ref":"AWS::Partition"},":logs:",{"Ref":"AWS::Region"},":",{"Ref":"AWS::AccountId"},":log-group:/aws/lambda/*"]]}}],"Version":"2012-10-17"}}]}}},"DefaultPolicy":{"id":"DefaultPolicy","path":"lamsns-deployFunction/test-lambda-sns/LambdaFunctionServiceRole/DefaultPolicy","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Policy","version":"2.206.0","metadata":["*",{"attachToRole":["*"]},{"attachToRole":["*"]},{"addStatements":[{}]},{"addStatements":[{}]}]},"children":{"Resource":{"id":"Resource","path":"lamsns-deployFunction/test-lambda-sns/LambdaFunctionServiceRole/DefaultPolicy/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnPolicy","version":"2.206.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Policy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":"sns:Publish","Effect":"Allow","Resource":{"Ref":"testlambdasnsSnsTopic57DFED98"}},{"Action":["kms:Decrypt","kms:GenerateDataKey*"],"Condition":{"ForAnyValue:StringEquals":{"kms:ResourceAliases":"alias/aws/sns"}},"Effect":"Allow","Resource":{"Fn::Join":["",["arn:",{"Ref":"AWS::Partition"},":kms:",{"Ref":"AWS::Region"},":",{"Ref":"AWS::AccountId"},":key/*"]]}}],"Version":"2012-10-17"},"policyName":"testlambdasnsLambdaFunctionServiceRoleDefaultPolicyBB1D55CB","roles":[{"Ref":"testlambdasnsLambdaFunctionServiceRole9C412F74"}]}}}}}}},"LambdaFunction":{"id":"LambdaFunction","path":"lamsns-deployFunction/test-lambda-sns/LambdaFunction","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.Function","version":"2.206.0","metadata":[{"role":"*","tracing":"Active","runtime":"*","handler":"*","code":"*"},{"addEnvironment":["*","*",{"removeInEdge":true}]},{"addEnvironment":["*","*"]},{"addEnvironment":["*","*"]}]},"children":{"Code":{"id":"Code","path":"lamsns-deployFunction/test-lambda-sns/LambdaFunction/Code","constructInfo":{"fqn":"aws-cdk-lib.aws_s3_assets.Asset","version":"2.206.0"},"children":{"Stage":{"id":"Stage","path":"lamsns-deployFunction/test-lambda-sns/LambdaFunction/Code/Stage","constructInfo":{"fqn":"aws-cdk-lib.AssetStaging","version":"2.206.0"}},"AssetBucket":{"id":"AssetBucket","path":"lamsns-deployFunction/test-lambda-sns/LambdaFunction/Code/AssetBucket","constructInfo":{"fqn":"aws-cdk-lib.aws_s3.BucketBase","version":"2.206.0","metadata":[]}}}},"Resource":{"id":"Resource","path":"lamsns-deployFunction/test-lambda-sns/LambdaFunction/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.CfnFunction","version":"2.206.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::Lambda::Function","aws:cdk:cloudformation:props":{"code":{"s3Bucket":{"Fn::Sub":"cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"},"s3Key":"0904d3723480fed2daf7885caa427b930881caae6879d1e6b0d395020173ef6f.zip"},"environment":{"variables":{"AWS_NODEJS_CONNECTION_REUSE_ENABLED":"1","SNS_TOPIC_ARN":{"Ref":"testlambdasnsSnsTopic57DFED98"},"SNS_TOPIC_NAME":{"Fn::GetAtt":["testlambdasnsSnsTopic57DFED98","TopicName"]}}},"handler":"index.handler","role":{"Fn::GetAtt":["testlambdasnsLambdaFunctionServiceRole9C412F74","Arn"]},"runtime":"nodejs20.x","tracingConfig":{"mode":"Active"}}}},"inlinePolicyAddedToExecutionRole-0":{"id":"inlinePolicyAddedToExecutionRole-0","path":"lamsns-deployFunction/test-lambda-sns/LambdaFunction/inlinePolicyAddedToExecutionRole-0","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Policy","version":"2.206.0","metadata":[{"statements":"*"},{"addStatements":[{}]},{"attachToRole":["*"]},{"attachToRole":["*"]}]},"children":{"Resource":{"id":"Resource","path":"lamsns-deployFunction/test-lambda-sns/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnPolicy","version":"2.206.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Policy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":["xray:PutTelemetryRecords","xray:PutTraceSegments"],"Effect":"Allow","Resource":"*"}],"Version":"2012-10-17"},"policyName":"testlambdasnsLambdaFunctioninlinePolicyAddedToExecutionRole05A095F20","roles":[{"Ref":"testlambdasnsLambdaFunctionServiceRole9C412F74"}]}}}}}}},"aws-managed-key":{"id":"aws-managed-key","path":"lamsns-deployFunction/test-lambda-sns/aws-managed-key","constructInfo":{"fqn":"aws-cdk-lib.Resource","version":"2.206.0","metadata":[]}},"SnsTopic":{"id":"SnsTopic","path":"lamsns-deployFunction/test-lambda-sns/SnsTopic","constructInfo":{"fqn":"aws-cdk-lib.aws_sns.Topic","version":"2.206.0","metadata":[{"masterKey":"*"}]},"children":{"Resource":{"id":"Resource","path":"lamsns-deployFunction/test-lambda-sns/SnsTopic/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_sns.CfnTopic","version":"2.206.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::SNS::Topic","aws:cdk:cloudformation:props":{"kmsMasterKeyId":{"Fn::Join":["",["arn:",{"Ref":"AWS::Partition"},":kms:",{"Ref":"AWS::Region"},":",{"Ref":"AWS::AccountId"},":alias/aws/sns"]]}}}},"Policy":{"id":"Policy","path":"lamsns-deployFunction/test-lambda-sns/SnsTopic/Policy","constructInfo":{"fqn":"aws-cdk-lib.aws_sns.TopicPolicy","version":"2.206.0","metadata":[{"topics":["*"]}]},"children":{"Resource":{"id":"Resource","path":"lamsns-deployFunction/test-lambda-sns/SnsTopic/Policy/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_sns.CfnTopicPolicy","version":"2.206.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::SNS::TopicPolicy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":["SNS:AddPermission","SNS:DeleteTopic","SNS:GetTopicAttributes","SNS:ListSubscriptionsByTopic","SNS:Publish","SNS:Receive","SNS:RemovePermission","SNS:SetTopicAttributes","SNS:Subscribe"],"Condition":{"StringEquals":{"AWS:SourceOwner":{"Ref":"AWS::AccountId"}}},"Effect":"Allow","Principal":{"AWS":{"Fn::Join":["",["arn:",{"Ref":"AWS::Partition"},":iam::",{"Ref":"AWS::AccountId"},":root"]]}},"Resource":{"Ref":"testlambdasnsSnsTopic57DFED98"},"Sid":"TopicOwnerOnlyAccess"},{"Action":["SNS:AddPermission","SNS:DeleteTopic","SNS:GetTopicAttributes","SNS:ListSubscriptionsByTopic","SNS:Publish","SNS:Receive","SNS:RemovePermission","SNS:SetTopicAttributes","SNS:Subscribe"],"Condition":{"Bool":{"aws:SecureTransport":"false"}},"Effect":"Deny","Principal":{"AWS":"*"},"Resource":{"Ref":"testlambdasnsSnsTopic57DFED98"},"Sid":"HttpsOnly"}],"Version":"2012-10-17"},"topics":[{"Ref":"testlambdasnsSnsTopic57DFED98"}]}}}}}}}}},"Integ":{"id":"Integ","path":"lamsns-deployFunction/Integ","constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTest","version":"2.206.0-alpha.0"},"children":{"DefaultTest":{"id":"DefaultTest","path":"lamsns-deployFunction/Integ/DefaultTest","constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTestCase","version":"2.206.0-alpha.0"},"children":{"Default":{"id":"Default","path":"lamsns-deployFunction/Integ/DefaultTest/Default","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}},"DeployAssert":{"id":"DeployAssert","path":"lamsns-deployFunction/Integ/DefaultTest/DeployAssert","constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.206.0"},"children":{"BootstrapVersion":{"id":"BootstrapVersion","path":"lamsns-deployFunction/Integ/DefaultTest/DeployAssert/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.206.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"lamsns-deployFunction/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.206.0"}}}}}}}},"BootstrapVersion":{"id":"BootstrapVersion","path":"lamsns-deployFunction/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.206.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"lamsns-deployFunction/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.206.0"}}}},"Tree":{"id":"Tree","path":"Tree","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}}}}}
1
+ {"version":"tree-0.1","tree":{"id":"App","path":"","constructInfo":{"fqn":"aws-cdk-lib.App","version":"2.223.0"},"children":{"lamsns-deployFunction":{"id":"lamsns-deployFunction","path":"lamsns-deployFunction","constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.223.0"},"children":{"test-lambda-sns":{"id":"test-lambda-sns","path":"lamsns-deployFunction/test-lambda-sns","constructInfo":{"fqn":"@aws-solutions-constructs/aws-lambda-sns.LambdaToSns","version":"2.95.1"},"children":{"LambdaFunctionServiceRole":{"id":"LambdaFunctionServiceRole","path":"lamsns-deployFunction/test-lambda-sns/LambdaFunctionServiceRole","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Role","version":"2.223.0","metadata":[{"assumedBy":{"principalAccount":"*","assumeRoleAction":"*"},"inlinePolicies":"*"},{"attachInlinePolicy":["*"]},{"attachInlinePolicy":["*"]},{"addToPrincipalPolicy":[{}]},{"attachInlinePolicy":["*"]},{"attachInlinePolicy":["*"]},{"addToPrincipalPolicy":[{}]}]},"children":{"ImportLambdaFunctionServiceRole":{"id":"ImportLambdaFunctionServiceRole","path":"lamsns-deployFunction/test-lambda-sns/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole","constructInfo":{"fqn":"aws-cdk-lib.Resource","version":"2.223.0","metadata":["*"]}},"Resource":{"id":"Resource","path":"lamsns-deployFunction/test-lambda-sns/LambdaFunctionServiceRole/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnRole","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Role","aws:cdk:cloudformation:props":{"assumeRolePolicyDocument":{"Statement":[{"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"Service":"lambda.amazonaws.com"}}],"Version":"2012-10-17"},"policies":[{"policyName":"LambdaFunctionServiceRolePolicy","policyDocument":{"Statement":[{"Action":["logs:CreateLogGroup","logs:CreateLogStream","logs:PutLogEvents"],"Effect":"Allow","Resource":{"Fn::Join":["",["arn:",{"Ref":"AWS::Partition"},":logs:",{"Ref":"AWS::Region"},":",{"Ref":"AWS::AccountId"},":log-group:/aws/lambda/*"]]}}],"Version":"2012-10-17"}}]}}},"DefaultPolicy":{"id":"DefaultPolicy","path":"lamsns-deployFunction/test-lambda-sns/LambdaFunctionServiceRole/DefaultPolicy","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Policy","version":"2.223.0","metadata":["*",{"attachToRole":["*"]},{"attachToRole":["*"]},{"addStatements":[{}]},{"addStatements":[{}]}]},"children":{"Resource":{"id":"Resource","path":"lamsns-deployFunction/test-lambda-sns/LambdaFunctionServiceRole/DefaultPolicy/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnPolicy","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Policy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":"sns:Publish","Effect":"Allow","Resource":{"Ref":"testlambdasnsSnsTopic57DFED98"}},{"Action":["kms:Decrypt","kms:GenerateDataKey*"],"Condition":{"ForAnyValue:StringEquals":{"kms:ResourceAliases":"alias/aws/sns"}},"Effect":"Allow","Resource":{"Fn::Join":["",["arn:",{"Ref":"AWS::Partition"},":kms:",{"Ref":"AWS::Region"},":",{"Ref":"AWS::AccountId"},":key/*"]]}}],"Version":"2012-10-17"},"policyName":"testlambdasnsLambdaFunctionServiceRoleDefaultPolicyBB1D55CB","roles":[{"Ref":"testlambdasnsLambdaFunctionServiceRole9C412F74"}]}}}}}}},"LambdaFunction":{"id":"LambdaFunction","path":"lamsns-deployFunction/test-lambda-sns/LambdaFunction","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.Function","version":"2.223.0","metadata":[{"role":"*","tracing":"Active","runtime":"*","handler":"*","code":"*"},{"addEnvironment":["*","*",{"removeInEdge":true}]},{"addEnvironment":["*","*"]},{"addEnvironment":["*","*"]}]},"children":{"Code":{"id":"Code","path":"lamsns-deployFunction/test-lambda-sns/LambdaFunction/Code","constructInfo":{"fqn":"aws-cdk-lib.aws_s3_assets.Asset","version":"2.223.0"},"children":{"Stage":{"id":"Stage","path":"lamsns-deployFunction/test-lambda-sns/LambdaFunction/Code/Stage","constructInfo":{"fqn":"aws-cdk-lib.AssetStaging","version":"2.223.0"}},"AssetBucket":{"id":"AssetBucket","path":"lamsns-deployFunction/test-lambda-sns/LambdaFunction/Code/AssetBucket","constructInfo":{"fqn":"aws-cdk-lib.aws_s3.BucketBase","version":"2.223.0","metadata":[]}}}},"Resource":{"id":"Resource","path":"lamsns-deployFunction/test-lambda-sns/LambdaFunction/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.CfnFunction","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::Lambda::Function","aws:cdk:cloudformation:props":{"code":{"s3Bucket":{"Fn::Sub":"cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"},"s3Key":"4085f2fc7cce70548a05ffc5162591a6b42f88398292e9c4b2739feed32a1640.zip"},"environment":{"variables":{"AWS_NODEJS_CONNECTION_REUSE_ENABLED":"1","SNS_TOPIC_ARN":{"Ref":"testlambdasnsSnsTopic57DFED98"},"SNS_TOPIC_NAME":{"Fn::GetAtt":["testlambdasnsSnsTopic57DFED98","TopicName"]}}},"handler":"index.handler","role":{"Fn::GetAtt":["testlambdasnsLambdaFunctionServiceRole9C412F74","Arn"]},"runtime":"nodejs22.x","tracingConfig":{"mode":"Active"}}}},"inlinePolicyAddedToExecutionRole-0":{"id":"inlinePolicyAddedToExecutionRole-0","path":"lamsns-deployFunction/test-lambda-sns/LambdaFunction/inlinePolicyAddedToExecutionRole-0","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Policy","version":"2.223.0","metadata":[{"statements":"*"},{"addStatements":[{}]},{"attachToRole":["*"]},{"attachToRole":["*"]}]},"children":{"Resource":{"id":"Resource","path":"lamsns-deployFunction/test-lambda-sns/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnPolicy","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Policy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":["xray:PutTelemetryRecords","xray:PutTraceSegments"],"Effect":"Allow","Resource":"*"}],"Version":"2012-10-17"},"policyName":"testlambdasnsLambdaFunctioninlinePolicyAddedToExecutionRole05A095F20","roles":[{"Ref":"testlambdasnsLambdaFunctionServiceRole9C412F74"}]}}}}}}},"aws-managed-key":{"id":"aws-managed-key","path":"lamsns-deployFunction/test-lambda-sns/aws-managed-key","constructInfo":{"fqn":"aws-cdk-lib.Resource","version":"2.223.0","metadata":[]}},"SnsTopic":{"id":"SnsTopic","path":"lamsns-deployFunction/test-lambda-sns/SnsTopic","constructInfo":{"fqn":"aws-cdk-lib.aws_sns.Topic","version":"2.223.0","metadata":[{"masterKey":"*"}]},"children":{"Resource":{"id":"Resource","path":"lamsns-deployFunction/test-lambda-sns/SnsTopic/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_sns.CfnTopic","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::SNS::Topic","aws:cdk:cloudformation:props":{"kmsMasterKeyId":{"Fn::Join":["",["arn:",{"Ref":"AWS::Partition"},":kms:",{"Ref":"AWS::Region"},":",{"Ref":"AWS::AccountId"},":alias/aws/sns"]]}}}},"Policy":{"id":"Policy","path":"lamsns-deployFunction/test-lambda-sns/SnsTopic/Policy","constructInfo":{"fqn":"aws-cdk-lib.aws_sns.TopicPolicy","version":"2.223.0","metadata":[{"topics":["*"]}]},"children":{"Resource":{"id":"Resource","path":"lamsns-deployFunction/test-lambda-sns/SnsTopic/Policy/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_sns.CfnTopicPolicy","version":"2.223.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::SNS::TopicPolicy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":["SNS:AddPermission","SNS:DeleteTopic","SNS:GetTopicAttributes","SNS:ListSubscriptionsByTopic","SNS:Publish","SNS:Receive","SNS:RemovePermission","SNS:SetTopicAttributes","SNS:Subscribe"],"Condition":{"StringEquals":{"AWS:SourceOwner":{"Ref":"AWS::AccountId"}}},"Effect":"Allow","Principal":{"AWS":{"Fn::Join":["",["arn:",{"Ref":"AWS::Partition"},":iam::",{"Ref":"AWS::AccountId"},":root"]]}},"Resource":{"Ref":"testlambdasnsSnsTopic57DFED98"},"Sid":"TopicOwnerOnlyAccess"},{"Action":["SNS:AddPermission","SNS:DeleteTopic","SNS:GetTopicAttributes","SNS:ListSubscriptionsByTopic","SNS:Publish","SNS:Receive","SNS:RemovePermission","SNS:SetTopicAttributes","SNS:Subscribe"],"Condition":{"Bool":{"aws:SecureTransport":"false"}},"Effect":"Deny","Principal":{"AWS":"*"},"Resource":{"Ref":"testlambdasnsSnsTopic57DFED98"},"Sid":"HttpsOnly"}],"Version":"2012-10-17"},"topics":[{"Ref":"testlambdasnsSnsTopic57DFED98"}]}}}}}}}}},"Integ":{"id":"Integ","path":"lamsns-deployFunction/Integ","constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTest","version":"2.223.0-alpha.0"},"children":{"DefaultTest":{"id":"DefaultTest","path":"lamsns-deployFunction/Integ/DefaultTest","constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTestCase","version":"2.223.0-alpha.0"},"children":{"Default":{"id":"Default","path":"lamsns-deployFunction/Integ/DefaultTest/Default","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}},"DeployAssert":{"id":"DeployAssert","path":"lamsns-deployFunction/Integ/DefaultTest/DeployAssert","constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.223.0"},"children":{"BootstrapVersion":{"id":"BootstrapVersion","path":"lamsns-deployFunction/Integ/DefaultTest/DeployAssert/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.223.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"lamsns-deployFunction/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.223.0"}}}}}}}},"BootstrapVersion":{"id":"BootstrapVersion","path":"lamsns-deployFunction/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.223.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"lamsns-deployFunction/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.223.0"}}}},"Tree":{"id":"Tree","path":"Tree","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}}}}}
@@ -29,16 +29,16 @@
29
29
  }
30
30
  }
31
31
  },
32
- "12bd769eb2a6c8b37252664bfb902a155fb4915c82b8b4fb25ce4882cc5a3592": {
32
+ "a91a2ebd507b10bee04b74cc0f23aac472b3571a076cf18572ef9e2c5f632981": {
33
33
  "displayName": "lamsns-deployFunctionWithVpc Template",
34
34
  "source": {
35
35
  "path": "lamsns-deployFunctionWithVpc.template.json",
36
36
  "packaging": "file"
37
37
  },
38
38
  "destinations": {
39
- "current_account-current_region-21b23063": {
39
+ "current_account-current_region-2774b7aa": {
40
40
  "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
41
- "objectKey": "12bd769eb2a6c8b37252664bfb902a155fb4915c82b8b4fb25ce4882cc5a3592.json",
41
+ "objectKey": "a91a2ebd507b10bee04b74cc0f23aac472b3571a076cf18572ef9e2c5f632981.json",
42
42
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
43
43
  }
44
44
  }
@@ -199,7 +199,7 @@
199
199
  "Arn"
200
200
  ]
201
201
  },
202
- "Runtime": "nodejs20.x",
202
+ "Runtime": "nodejs22.x",
203
203
  "TracingConfig": {
204
204
  "Mode": "Active"
205
205
  },
@@ -66,7 +66,7 @@
66
66
  "validateOnSynth": false,
67
67
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
68
68
  "cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
69
- "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/12bd769eb2a6c8b37252664bfb902a155fb4915c82b8b4fb25ce4882cc5a3592.json",
69
+ "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/a91a2ebd507b10bee04b74cc0f23aac472b3571a076cf18572ef9e2c5f632981.json",
70
70
  "requiresBootstrapStackVersion": 6,
71
71
  "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
72
72
  "additionalDependencies": [