konokenj.cdk-api-mcp-server 0.64.0__py3-none-any.whl → 0.66.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of konokenj.cdk-api-mcp-server might be problematic. Click here for more details.
- cdk_api_mcp_server/__about__.py +1 -1
- cdk_api_mcp_server/resources/aws-cdk/constructs/@aws-cdk/aws-elasticache-alpha/README.md +2 -0
- cdk_api_mcp_server/resources/aws-cdk/constructs/@aws-cdk/aws-imagebuilder-alpha/README.md +20 -20
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-cloudwatch-actions/integ.lambda-alarm-action.ts +0 -1
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-codebuild/README.md +1 -1
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-codebuild/{integ.project-macos-fleet.ts → integ.project-macos-fleet-base14.ts} +2 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-codebuild/integ.project-macos-fleet-base15.ts +62 -0
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.app-mesh-proxy-config.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.capacity-provider-managed-draining.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.capacity-provider.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.clb-host-nw.ts +9 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.cloudmap-container-port.ts +9 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.cluster-amazonlinux2-neuron-ami.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.cluster-imported.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.cluster-windows-server-ami.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.cluster.amazonlinux2023-ami.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.default-capacity-provider.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.deployment-alarms.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.enable-execute-command.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.environment-file.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.exec-command.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.firelens-s3-config.ts +8 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.graviton.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.lb-awsvpc-nw.ts +9 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.lb-bridge-nw.ts +9 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.managedinstances-capacity-provider.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.managedinstances-no-default-capacity-provider.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.placement-constraint-default-empty.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.placement-strategies.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.pseudo-terminal.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.sd-awsvpc-nw.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.sd-bridge-nw.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.spot-drain.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.swap-parameters.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.task-definition-placement-constraints.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs-patterns/integ.alb-ecs-service-command-entry-point.ts +12 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs-patterns/integ.application-load-balanced-ecs-service.ts +13 -3
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs-patterns/integ.healthchecks-multiple-application-load-balanced-ecs-service.ts +15 -3
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs-patterns/integ.healthchecks-multiple-network-load-balanced-ecs-service.ts +8 -3
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs-patterns/integ.multiple-application-load-balanced-ecs-service-idle-timeout.ts +12 -4
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs-patterns/integ.multiple-application-load-balanced-ecs-service.ts +10 -4
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs-patterns/integ.network-load-balanced-ecs-service.ts +7 -3
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs-patterns/integ.scheduled-ecs-task.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs-patterns/integ.tls-network-load-balanced-ecs-service.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-events-targets/README.md +46 -0
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-events-targets/integ.event-ec2-task.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-events-targets/integ.events.ts +0 -1
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-events-targets/integ.sqs-event-rule-target.ts +37 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-lambda/integ.lambda-adot.ts +0 -1
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-lambda/integ.lambda-insights-mapping.ts +0 -1
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-lambda/integ.runtimes.ts +8 -0
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-lambda-event-sources/integ.kinesiswithdlq.ts +0 -1
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-lambda-event-sources/integ.s3-onfailuire-destination.ts +0 -1
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-route53-patterns/README.md +6 -0
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-route53-patterns/integ.hosted-redirect-same-region.ts +15 -6
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-route53-patterns/integ.hosted-redirect.ts +15 -6
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-s3-notifications/integ.bucket-notifications.ts +0 -1
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-sns-subscriptions/integ.sns-lambda-cross-region.ts +0 -1
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-sns-subscriptions/integ.sns-lambda.ts +0 -1
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-stepfunctions-tasks/integ.ec2-run-task-ref-definition.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-stepfunctions-tasks/integ.ec2-run-task.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-stepfunctions-tasks/integ.ec2-task.ts +0 -2
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/cx-api/FEATURE_FLAGS.md +21 -48
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/cx-api/README.md +0 -42
- cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/pipelines/integ.pipeline-with-variables.ts +13 -0
- {konokenj_cdk_api_mcp_server-0.64.0.dist-info → konokenj_cdk_api_mcp_server-0.66.0.dist-info}/METADATA +2 -2
- {konokenj_cdk_api_mcp_server-0.64.0.dist-info → konokenj_cdk_api_mcp_server-0.66.0.dist-info}/RECORD +70 -69
- {konokenj_cdk_api_mcp_server-0.64.0.dist-info → konokenj_cdk_api_mcp_server-0.66.0.dist-info}/WHEEL +0 -0
- {konokenj_cdk_api_mcp_server-0.64.0.dist-info → konokenj_cdk_api_mcp_server-0.66.0.dist-info}/entry_points.txt +0 -0
- {konokenj_cdk_api_mcp_server-0.64.0.dist-info → konokenj_cdk_api_mcp_server-0.66.0.dist-info}/licenses/LICENSE.txt +0 -0
cdk_api_mcp_server/__about__.py
CHANGED
|
@@ -305,6 +305,8 @@ const user = new elasticache.NoPasswordUser(this, 'User', {
|
|
|
305
305
|
});
|
|
306
306
|
```
|
|
307
307
|
|
|
308
|
+
> NOTE: `NoPasswordUser` is only available for Redis Cache.
|
|
309
|
+
|
|
308
310
|
### Default user
|
|
309
311
|
|
|
310
312
|
ElastiCache automatically creates a default user with both a user ID and username set to `default`. This default user cannot be modified or deleted. The user is created as a no password authentication user.
|
|
@@ -199,8 +199,8 @@ Use AWS-managed workflows for common pipeline phases:
|
|
|
199
199
|
const workflowPipeline = new imagebuilder.ImagePipeline(this, 'WorkflowPipeline', {
|
|
200
200
|
recipe: exampleImageRecipe,
|
|
201
201
|
workflows: [
|
|
202
|
-
{ workflow: imagebuilder.
|
|
203
|
-
{ workflow: imagebuilder.
|
|
202
|
+
{ workflow: imagebuilder.AmazonManagedWorkflow.buildImage(this, 'BuildWorkflow') },
|
|
203
|
+
{ workflow: imagebuilder.AmazonManagedWorkflow.testImage(this, 'TestWorkflow') }
|
|
204
204
|
]
|
|
205
205
|
});
|
|
206
206
|
```
|
|
@@ -211,9 +211,9 @@ For container pipelines, use container-specific workflows:
|
|
|
211
211
|
const containerWorkflowPipeline = new imagebuilder.ImagePipeline(this, 'ContainerWorkflowPipeline', {
|
|
212
212
|
recipe: exampleContainerRecipe,
|
|
213
213
|
workflows: [
|
|
214
|
-
{ workflow: imagebuilder.
|
|
215
|
-
{ workflow: imagebuilder.
|
|
216
|
-
{ workflow: imagebuilder.
|
|
214
|
+
{ workflow: imagebuilder.AmazonManagedWorkflow.buildContainer(this, 'BuildContainer') },
|
|
215
|
+
{ workflow: imagebuilder.AmazonManagedWorkflow.testContainer(this, 'TestContainer') },
|
|
216
|
+
{ workflow: imagebuilder.AmazonManagedWorkflow.distributeContainer(this, 'DistributeContainer') }
|
|
217
217
|
]
|
|
218
218
|
});
|
|
219
219
|
```
|
|
@@ -430,8 +430,8 @@ Use workflows for custom build, test, and distribution processes:
|
|
|
430
430
|
const imageWithWorkflows = new imagebuilder.Image(this, 'ImageWithWorkflows', {
|
|
431
431
|
recipe: exampleImageRecipe,
|
|
432
432
|
workflows: [
|
|
433
|
-
{ workflow: imagebuilder.
|
|
434
|
-
{ workflow: imagebuilder.
|
|
433
|
+
{ workflow: imagebuilder.AmazonManagedWorkflow.buildImage(this, 'BuildWorkflow') },
|
|
434
|
+
{ workflow: imagebuilder.AmazonManagedWorkflow.testImage(this, 'TestWorkflow') }
|
|
435
435
|
]
|
|
436
436
|
});
|
|
437
437
|
```
|
|
@@ -603,12 +603,12 @@ const imageRecipe = new imagebuilder.ImageRecipe(this, 'AmazonManagedImageRecipe
|
|
|
603
603
|
),
|
|
604
604
|
components: [
|
|
605
605
|
{
|
|
606
|
-
component: imagebuilder.
|
|
606
|
+
component: imagebuilder.AmazonManagedComponent.updateOs(this, 'UpdateOS', {
|
|
607
607
|
platform: imagebuilder.Platform.LINUX
|
|
608
608
|
})
|
|
609
609
|
},
|
|
610
610
|
{
|
|
611
|
-
component: imagebuilder.
|
|
611
|
+
component: imagebuilder.AmazonManagedComponent.awsCliV2(this, 'AwsCli', {
|
|
612
612
|
platform: imagebuilder.Platform.LINUX
|
|
613
613
|
})
|
|
614
614
|
}
|
|
@@ -790,19 +790,19 @@ const containerRecipe = new imagebuilder.ContainerRecipe(this, 'ComponentContain
|
|
|
790
790
|
Use pre-built AWS components:
|
|
791
791
|
|
|
792
792
|
```ts
|
|
793
|
-
const containerRecipe = new imagebuilder.ContainerRecipe(this, '
|
|
793
|
+
const containerRecipe = new imagebuilder.ContainerRecipe(this, 'AmazonManagedContainerRecipe', {
|
|
794
794
|
baseImage: imagebuilder.BaseContainerImage.fromDockerHub('amazonlinux', 'latest'),
|
|
795
795
|
targetRepository: imagebuilder.Repository.fromEcr(
|
|
796
796
|
ecr.Repository.fromRepositoryName(this, 'Repository', 'my-container-repo')
|
|
797
797
|
),
|
|
798
798
|
components: [
|
|
799
799
|
{
|
|
800
|
-
component: imagebuilder.
|
|
800
|
+
component: imagebuilder.AmazonManagedComponent.updateOs(this, 'UpdateOS', {
|
|
801
801
|
platform: imagebuilder.Platform.LINUX
|
|
802
802
|
})
|
|
803
803
|
},
|
|
804
804
|
{
|
|
805
|
-
component: imagebuilder.
|
|
805
|
+
component: imagebuilder.AmazonManagedComponent.awsCliV2(this, 'AwsCli', {
|
|
806
806
|
platform: imagebuilder.Platform.LINUX
|
|
807
807
|
})
|
|
808
808
|
}
|
|
@@ -1070,17 +1070,17 @@ AWS provides a collection of managed components for common tasks:
|
|
|
1070
1070
|
|
|
1071
1071
|
```ts
|
|
1072
1072
|
// Install AWS CLI v2
|
|
1073
|
-
const awsCliComponent = imagebuilder.
|
|
1073
|
+
const awsCliComponent = imagebuilder.AmazonManagedComponent.awsCliV2(this, 'AwsCli', {
|
|
1074
1074
|
platform: imagebuilder.Platform.LINUX
|
|
1075
1075
|
});
|
|
1076
1076
|
|
|
1077
1077
|
// Update the operating system
|
|
1078
|
-
const updateComponent = imagebuilder.
|
|
1078
|
+
const updateComponent = imagebuilder.AmazonManagedComponent.updateOs(this, 'UpdateOS', {
|
|
1079
1079
|
platform: imagebuilder.Platform.LINUX
|
|
1080
1080
|
});
|
|
1081
1081
|
|
|
1082
1082
|
// Reference any AWS-managed component by name
|
|
1083
|
-
const customAwsComponent = imagebuilder.
|
|
1083
|
+
const customAwsComponent = imagebuilder.AmazonManagedComponent.fromAmazonManagedComponentName(
|
|
1084
1084
|
this,
|
|
1085
1085
|
'CloudWatchAgent',
|
|
1086
1086
|
'amazon-cloudwatch-agent-linux'
|
|
@@ -1517,15 +1517,15 @@ AWS provides a collection of workflows for common scenarios:
|
|
|
1517
1517
|
|
|
1518
1518
|
```ts
|
|
1519
1519
|
// Build workflows
|
|
1520
|
-
const buildImageWorkflow = imagebuilder.
|
|
1521
|
-
const buildContainerWorkflow = imagebuilder.
|
|
1520
|
+
const buildImageWorkflow = imagebuilder.AmazonManagedWorkflow.buildImage(this, 'BuildImage');
|
|
1521
|
+
const buildContainerWorkflow = imagebuilder.AmazonManagedWorkflow.buildContainer(this, 'BuildContainer');
|
|
1522
1522
|
|
|
1523
1523
|
// Test workflows
|
|
1524
|
-
const testImageWorkflow = imagebuilder.
|
|
1525
|
-
const testContainerWorkflow = imagebuilder.
|
|
1524
|
+
const testImageWorkflow = imagebuilder.AmazonManagedWorkflow.testImage(this, 'TestImage');
|
|
1525
|
+
const testContainerWorkflow = imagebuilder.AmazonManagedWorkflow.testContainer(this, 'TestContainer');
|
|
1526
1526
|
|
|
1527
1527
|
// Distribution workflows
|
|
1528
|
-
const distributeContainerWorkflow = imagebuilder.
|
|
1528
|
+
const distributeContainerWorkflow = imagebuilder.AmazonManagedWorkflow.distributeContainer(this, 'DistributeContainer');
|
|
1529
1529
|
```
|
|
1530
1530
|
|
|
1531
1531
|
### Lifecycle Policy
|
|
@@ -91,7 +91,6 @@ new integ.IntegTest(appWithFeatureFlag, 'LambdaAlarmActionIntegrationTestWithFea
|
|
|
91
91
|
});
|
|
92
92
|
appWithFeatureFlag.synth();
|
|
93
93
|
|
|
94
|
-
/* eslint-disable no-console */
|
|
95
94
|
function handler(event: any, _context: any, callback: any) {
|
|
96
95
|
console.log(JSON.stringify(event, undefined, 2));
|
|
97
96
|
return callback();
|
|
@@ -394,7 +394,7 @@ is available for specifying Lambda-compatible images.
|
|
|
394
394
|
You can specify one of the predefined Windows/Linux images by using one
|
|
395
395
|
of the constants such as `WindowsBuildImage.WIN_SERVER_CORE_2019_BASE`,
|
|
396
396
|
`WindowsBuildImage.WINDOWS_BASE_2_0`, `LinuxBuildImage.STANDARD_2_0`,
|
|
397
|
-
`LinuxBuildImage.AMAZON_LINUX_2_5`, `MacBuildImage.BASE_14`, `LinuxArmBuildImage.AMAZON_LINUX_2_ARM`,
|
|
397
|
+
`LinuxBuildImage.AMAZON_LINUX_2_5`, `MacBuildImage.BASE_14`, `MacBuildImage.BASE_15`, `LinuxArmBuildImage.AMAZON_LINUX_2_ARM`,
|
|
398
398
|
`LinuxLambdaBuildImage.AMAZON_LINUX_2_NODE_18` or `LinuxArmLambdaBuildImage.AMAZON_LINUX_2_NODE_18`.
|
|
399
399
|
|
|
400
400
|
Alternatively, you can specify a custom image using one of the static methods on
|
|
@@ -14,10 +14,10 @@ import * as codebuild from 'aws-cdk-lib/aws-codebuild';
|
|
|
14
14
|
*/
|
|
15
15
|
|
|
16
16
|
const app = new cdk.App();
|
|
17
|
-
const stack = new cdk.Stack(app, 'aws-cdk-project-macos');
|
|
17
|
+
const stack = new cdk.Stack(app, 'aws-cdk-project-macos-base14');
|
|
18
18
|
|
|
19
19
|
const fleet = new codebuild.Fleet(stack, 'MacOsFleet', {
|
|
20
|
-
fleetName: '
|
|
20
|
+
fleetName: 'MacOsFleet14',
|
|
21
21
|
baseCapacity: 1,
|
|
22
22
|
computeType: codebuild.FleetComputeType.MEDIUM,
|
|
23
23
|
environmentType: codebuild.EnvironmentType.MAC_ARM,
|
|
@@ -0,0 +1,62 @@
|
|
|
1
|
+
import * as cdk from 'aws-cdk-lib';
|
|
2
|
+
import * as integ from '@aws-cdk/integ-tests-alpha';
|
|
3
|
+
import * as codebuild from 'aws-cdk-lib/aws-codebuild';
|
|
4
|
+
/**
|
|
5
|
+
* Deployment notice:
|
|
6
|
+
*
|
|
7
|
+
* The fleet allocation might take >10 minutes to complete,
|
|
8
|
+
* which can cause the integ test to timeout and fail.
|
|
9
|
+
*
|
|
10
|
+
* You can try deploying to a different region, or
|
|
11
|
+
* or Deploying the stack without integ tests first, with the --no-clean flag,
|
|
12
|
+
* waiting for the fleet allocation to reach its capacity,
|
|
13
|
+
* and then running the integ test was the workaround used.
|
|
14
|
+
*/
|
|
15
|
+
|
|
16
|
+
const app = new cdk.App();
|
|
17
|
+
const stack = new cdk.Stack(app, 'aws-cdk-project-macos-base15');
|
|
18
|
+
|
|
19
|
+
const fleet = new codebuild.Fleet(stack, 'MacOsFleet', {
|
|
20
|
+
fleetName: 'MacOsFleet15',
|
|
21
|
+
baseCapacity: 1,
|
|
22
|
+
computeType: codebuild.FleetComputeType.MEDIUM,
|
|
23
|
+
environmentType: codebuild.EnvironmentType.MAC_ARM,
|
|
24
|
+
});
|
|
25
|
+
|
|
26
|
+
const project = new codebuild.Project(stack, 'MacOsProject', {
|
|
27
|
+
buildSpec: codebuild.BuildSpec.fromObject({
|
|
28
|
+
version: '0.2',
|
|
29
|
+
phases: {
|
|
30
|
+
build: { commands: ['echo "Nothing to do!"'] },
|
|
31
|
+
},
|
|
32
|
+
}),
|
|
33
|
+
environment: {
|
|
34
|
+
fleet,
|
|
35
|
+
buildImage: codebuild.MacBuildImage.BASE_15,
|
|
36
|
+
computeType: codebuild.ComputeType.MEDIUM,
|
|
37
|
+
},
|
|
38
|
+
});
|
|
39
|
+
|
|
40
|
+
const test = new integ.IntegTest(app, 'MacOsProjectIntegTest', {
|
|
41
|
+
testCases: [stack],
|
|
42
|
+
});
|
|
43
|
+
|
|
44
|
+
const listFleets = test.assertions.awsApiCall('Codebuild', 'listFleets');
|
|
45
|
+
listFleets.expect(integ.ExpectedResult.objectLike({
|
|
46
|
+
fleets: integ.Match.arrayWith([fleet.fleetArn]),
|
|
47
|
+
}));
|
|
48
|
+
|
|
49
|
+
const startBuild = test.assertions.awsApiCall('Codebuild', 'startBuild', { projectName: project.projectName });
|
|
50
|
+
|
|
51
|
+
// Describe the build and wait for the status to be successful
|
|
52
|
+
test.assertions.awsApiCall('CodeBuild', 'batchGetBuilds', {
|
|
53
|
+
ids: [startBuild.getAttString('build.id')],
|
|
54
|
+
}).assertAtPath(
|
|
55
|
+
'builds.0.buildStatus',
|
|
56
|
+
integ.ExpectedResult.stringLikeRegexp('SUCCEEDED'),
|
|
57
|
+
).waitForAssertions({
|
|
58
|
+
totalTimeout: cdk.Duration.minutes(10), // Spin up time for Mac can be slow
|
|
59
|
+
interval: cdk.Duration.seconds(30),
|
|
60
|
+
});
|
|
61
|
+
|
|
62
|
+
app.synth();
|
cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.app-mesh-proxy-config.ts
CHANGED
|
@@ -5,8 +5,6 @@ import * as ecs from 'aws-cdk-lib/aws-ecs';
|
|
|
5
5
|
const app = new cdk.App({
|
|
6
6
|
postCliContext: {
|
|
7
7
|
'@aws-cdk/aws-lambda:useCdkManagedLogGroup': false,
|
|
8
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': false,
|
|
9
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
10
8
|
'@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy': false,
|
|
11
9
|
},
|
|
12
10
|
});
|
|
@@ -7,8 +7,6 @@ import * as integ from '@aws-cdk/integ-tests-alpha';
|
|
|
7
7
|
const app = new cdk.App({
|
|
8
8
|
postCliContext: {
|
|
9
9
|
'@aws-cdk/aws-ecs:removeDefaultDeploymentAlarm': true,
|
|
10
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': false,
|
|
11
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
12
10
|
},
|
|
13
11
|
});
|
|
14
12
|
const stack = new cdk.Stack(app, 'integ-ec2-capacity-provider-managed-draining');
|
cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.capacity-provider.ts
CHANGED
|
@@ -6,8 +6,6 @@ import * as ecs from 'aws-cdk-lib/aws-ecs';
|
|
|
6
6
|
const app = new cdk.App({
|
|
7
7
|
postCliContext: {
|
|
8
8
|
'@aws-cdk/aws-lambda:useCdkManagedLogGroup': false,
|
|
9
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': false,
|
|
10
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
11
9
|
'@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy': false,
|
|
12
10
|
},
|
|
13
11
|
});
|
|
@@ -2,12 +2,11 @@ import * as ec2 from 'aws-cdk-lib/aws-ec2';
|
|
|
2
2
|
import * as elb from 'aws-cdk-lib/aws-elasticloadbalancing';
|
|
3
3
|
import * as cdk from 'aws-cdk-lib';
|
|
4
4
|
import * as ecs from 'aws-cdk-lib/aws-ecs';
|
|
5
|
+
import { CfnResource } from 'aws-cdk-lib';
|
|
5
6
|
|
|
6
7
|
const app = new cdk.App({
|
|
7
8
|
postCliContext: {
|
|
8
9
|
'@aws-cdk/aws-lambda:useCdkManagedLogGroup': false,
|
|
9
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': false,
|
|
10
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
11
10
|
'@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy': false,
|
|
12
11
|
},
|
|
13
12
|
});
|
|
@@ -45,6 +44,14 @@ const lb = new elb.LoadBalancer(stack, 'LB', { vpc });
|
|
|
45
44
|
lb.addListener({ externalPort: 80 });
|
|
46
45
|
lb.addTarget(service);
|
|
47
46
|
|
|
47
|
+
// Suppress security guardian rule for CLB default behavior
|
|
48
|
+
lb.connections.securityGroups.forEach(sg => {
|
|
49
|
+
const cfnSg = sg.node.defaultChild as CfnResource;
|
|
50
|
+
cfnSg.addMetadata('guard', {
|
|
51
|
+
SuppressedRules: ['EC2_NO_OPEN_SECURITY_GROUPS'],
|
|
52
|
+
});
|
|
53
|
+
});
|
|
54
|
+
|
|
48
55
|
new cdk.CfnOutput(stack, 'LoadBalancerDNS', { value: lb.loadBalancerDnsName });
|
|
49
56
|
|
|
50
57
|
app.synth();
|
cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.cloudmap-container-port.ts
CHANGED
|
@@ -2,12 +2,11 @@ import * as ec2 from 'aws-cdk-lib/aws-ec2';
|
|
|
2
2
|
import * as cloudmap from 'aws-cdk-lib/aws-servicediscovery';
|
|
3
3
|
import * as cdk from 'aws-cdk-lib';
|
|
4
4
|
import * as ecs from 'aws-cdk-lib/aws-ecs';
|
|
5
|
+
import { CfnResource } from 'aws-cdk-lib';
|
|
5
6
|
|
|
6
7
|
const app = new cdk.App({
|
|
7
8
|
postCliContext: {
|
|
8
9
|
'@aws-cdk/aws-lambda:useCdkManagedLogGroup': false,
|
|
9
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': false,
|
|
10
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
11
10
|
'@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy': false,
|
|
12
11
|
},
|
|
13
12
|
});
|
|
@@ -33,6 +32,14 @@ const capacity = cluster.addCapacity('capacity', {
|
|
|
33
32
|
});
|
|
34
33
|
capacity.connections.allowFromAnyIpv4(ec2.Port.tcpRange(32768, 61000));
|
|
35
34
|
|
|
35
|
+
// Suppress security guardian rule for intentional test setup
|
|
36
|
+
capacity.connections.securityGroups.forEach(sg => {
|
|
37
|
+
const cfnSg = sg.node.defaultChild as CfnResource;
|
|
38
|
+
cfnSg.addMetadata('guard', {
|
|
39
|
+
SuppressedRules: ['EC2_NO_OPEN_SECURITY_GROUPS'],
|
|
40
|
+
});
|
|
41
|
+
});
|
|
42
|
+
|
|
36
43
|
cluster.addDefaultCloudMapNamespace({ name: 'aws-ecs-integ' });
|
|
37
44
|
|
|
38
45
|
const taskDefinition = new ecs.Ec2TaskDefinition(stack, 'TaskDef', {});
|
|
@@ -7,8 +7,6 @@ import * as integ from '@aws-cdk/integ-tests-alpha';
|
|
|
7
7
|
const app = new cdk.App({
|
|
8
8
|
postCliContext: {
|
|
9
9
|
'@aws-cdk/aws-lambda:useCdkManagedLogGroup': false,
|
|
10
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': false,
|
|
11
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
12
10
|
'@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy': false,
|
|
13
11
|
},
|
|
14
12
|
});
|
cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.cluster-imported.ts
CHANGED
|
@@ -7,8 +7,6 @@ import * as integ from '@aws-cdk/integ-tests-alpha';
|
|
|
7
7
|
const app = new cdk.App({
|
|
8
8
|
postCliContext: {
|
|
9
9
|
'@aws-cdk/aws-lambda:useCdkManagedLogGroup': false,
|
|
10
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': false,
|
|
11
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
12
10
|
'@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy': false,
|
|
13
11
|
},
|
|
14
12
|
});
|
|
@@ -8,8 +8,6 @@ import * as integ from '@aws-cdk/integ-tests-alpha';
|
|
|
8
8
|
const app = new cdk.App({
|
|
9
9
|
postCliContext: {
|
|
10
10
|
'@aws-cdk/aws-lambda:useCdkManagedLogGroup': false,
|
|
11
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': false,
|
|
12
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
13
11
|
'@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy': false,
|
|
14
12
|
},
|
|
15
13
|
});
|
|
@@ -8,8 +8,6 @@ import * as iam from 'aws-cdk-lib/aws-iam';
|
|
|
8
8
|
const app = new cdk.App({
|
|
9
9
|
postCliContext: {
|
|
10
10
|
'@aws-cdk/aws-lambda:useCdkManagedLogGroup': false,
|
|
11
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': true,
|
|
12
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
13
11
|
'@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy': false,
|
|
14
12
|
},
|
|
15
13
|
});
|
|
@@ -7,8 +7,6 @@ import * as ecs from 'aws-cdk-lib/aws-ecs';
|
|
|
7
7
|
const app = new cdk.App({
|
|
8
8
|
postCliContext: {
|
|
9
9
|
'@aws-cdk/aws-lambda:useCdkManagedLogGroup': false,
|
|
10
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': false,
|
|
11
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
12
10
|
'@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy': false,
|
|
13
11
|
},
|
|
14
12
|
});
|
cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.deployment-alarms.ts
CHANGED
|
@@ -8,8 +8,6 @@ import * as ecs from 'aws-cdk-lib/aws-ecs';
|
|
|
8
8
|
const app = new cdk.App({
|
|
9
9
|
postCliContext: {
|
|
10
10
|
'@aws-cdk/aws-lambda:useCdkManagedLogGroup': false,
|
|
11
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': false,
|
|
12
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
13
11
|
'@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy': false,
|
|
14
12
|
},
|
|
15
13
|
});
|
cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.enable-execute-command.ts
CHANGED
|
@@ -10,8 +10,6 @@ const app = new cdk.App({
|
|
|
10
10
|
postCliContext: {
|
|
11
11
|
'@aws-cdk/aws-lambda:useCdkManagedLogGroup': false,
|
|
12
12
|
'@aws-cdk/aws-ecs:reduceEc2FargateCloudWatchPermissions': true,
|
|
13
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': false,
|
|
14
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
15
13
|
'@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy': false,
|
|
16
14
|
},
|
|
17
15
|
});
|
cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.environment-file.ts
CHANGED
|
@@ -10,8 +10,6 @@ import { IntegTest } from '@aws-cdk/integ-tests-alpha';
|
|
|
10
10
|
const app = new cdk.App({
|
|
11
11
|
postCliContext: {
|
|
12
12
|
'@aws-cdk/aws-lambda:useCdkManagedLogGroup': false,
|
|
13
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': false,
|
|
14
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
15
13
|
'@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy': false,
|
|
16
14
|
},
|
|
17
15
|
});
|
|
@@ -8,8 +8,6 @@ import * as ecs from 'aws-cdk-lib/aws-ecs';
|
|
|
8
8
|
const app = new cdk.App({
|
|
9
9
|
postCliContext: {
|
|
10
10
|
'@aws-cdk/aws-lambda:useCdkManagedLogGroup': false,
|
|
11
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': false,
|
|
12
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
13
11
|
'@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy': false,
|
|
14
12
|
},
|
|
15
13
|
});
|
cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.firelens-s3-config.ts
CHANGED
|
@@ -3,12 +3,11 @@ import * as ec2 from 'aws-cdk-lib/aws-ec2';
|
|
|
3
3
|
import * as s3_assets from 'aws-cdk-lib/aws-s3-assets';
|
|
4
4
|
import * as cdk from 'aws-cdk-lib';
|
|
5
5
|
import * as ecs from 'aws-cdk-lib/aws-ecs';
|
|
6
|
+
import { CfnResource } from 'aws-cdk-lib';
|
|
6
7
|
|
|
7
8
|
const app = new cdk.App({
|
|
8
9
|
postCliContext: {
|
|
9
10
|
'@aws-cdk/aws-lambda:useCdkManagedLogGroup': false,
|
|
10
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': false,
|
|
11
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
12
11
|
'@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy': false,
|
|
13
12
|
},
|
|
14
13
|
});
|
|
@@ -69,6 +68,13 @@ container.addPortMappings({
|
|
|
69
68
|
// Create a security group that allows tcp @ port 80
|
|
70
69
|
const securityGroup = new ec2.SecurityGroup(stack, 'websvc-sg', { vpc });
|
|
71
70
|
securityGroup.addIngressRule(ec2.Peer.anyIpv4(), ec2.Port.tcp(80));
|
|
71
|
+
|
|
72
|
+
// Suppress security guardian rule for intentional test setup
|
|
73
|
+
const cfnSecurityGroup = securityGroup.node.defaultChild as CfnResource;
|
|
74
|
+
cfnSecurityGroup.addMetadata('guard', {
|
|
75
|
+
SuppressedRules: ['EC2_NO_OPEN_SECURITY_GROUPS'],
|
|
76
|
+
});
|
|
77
|
+
|
|
72
78
|
new ecs.Ec2Service(stack, 'Service', {
|
|
73
79
|
cluster,
|
|
74
80
|
taskDefinition,
|
|
@@ -5,8 +5,6 @@ import * as ecs from 'aws-cdk-lib/aws-ecs';
|
|
|
5
5
|
const app = new cdk.App({
|
|
6
6
|
postCliContext: {
|
|
7
7
|
'@aws-cdk/aws-lambda:useCdkManagedLogGroup': false,
|
|
8
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': false,
|
|
9
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
10
8
|
'@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy': false,
|
|
11
9
|
},
|
|
12
10
|
});
|
|
@@ -2,12 +2,11 @@ import * as ec2 from 'aws-cdk-lib/aws-ec2';
|
|
|
2
2
|
import * as elbv2 from 'aws-cdk-lib/aws-elasticloadbalancingv2';
|
|
3
3
|
import * as cdk from 'aws-cdk-lib';
|
|
4
4
|
import * as ecs from 'aws-cdk-lib/aws-ecs';
|
|
5
|
+
import { CfnResource } from 'aws-cdk-lib';
|
|
5
6
|
|
|
6
7
|
const app = new cdk.App({
|
|
7
8
|
postCliContext: {
|
|
8
9
|
'@aws-cdk/aws-lambda:useCdkManagedLogGroup': false,
|
|
9
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': false,
|
|
10
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
11
10
|
'@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy': false,
|
|
12
11
|
},
|
|
13
12
|
});
|
|
@@ -49,6 +48,14 @@ listener.addTargets('ECS', {
|
|
|
49
48
|
targets: [service],
|
|
50
49
|
});
|
|
51
50
|
|
|
51
|
+
// Suppress security guardian rule for ALB default behavior (open: true)
|
|
52
|
+
lb.connections.securityGroups.forEach(sg => {
|
|
53
|
+
const cfnSg = sg.node.defaultChild as CfnResource;
|
|
54
|
+
cfnSg.addMetadata('guard', {
|
|
55
|
+
SuppressedRules: ['EC2_NO_OPEN_SECURITY_GROUPS'],
|
|
56
|
+
});
|
|
57
|
+
});
|
|
58
|
+
|
|
52
59
|
new cdk.CfnOutput(stack, 'LoadBalancerDNS', { value: lb.loadBalancerDnsName });
|
|
53
60
|
|
|
54
61
|
app.synth();
|
|
@@ -3,12 +3,11 @@ import * as ec2 from 'aws-cdk-lib/aws-ec2';
|
|
|
3
3
|
import * as elbv2 from 'aws-cdk-lib/aws-elasticloadbalancingv2';
|
|
4
4
|
import * as cdk from 'aws-cdk-lib';
|
|
5
5
|
import * as ecs from 'aws-cdk-lib/aws-ecs';
|
|
6
|
+
import { CfnResource } from 'aws-cdk-lib';
|
|
6
7
|
|
|
7
8
|
const app = new cdk.App({
|
|
8
9
|
postCliContext: {
|
|
9
10
|
'@aws-cdk/aws-lambda:useCdkManagedLogGroup': false,
|
|
10
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': false,
|
|
11
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
12
11
|
'@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy': false,
|
|
13
12
|
},
|
|
14
13
|
});
|
|
@@ -49,6 +48,14 @@ listener.addTargets('ECS', {
|
|
|
49
48
|
targets: [service],
|
|
50
49
|
});
|
|
51
50
|
|
|
51
|
+
// Suppress security guardian rule for ALB default behavior (open: true)
|
|
52
|
+
lb.connections.securityGroups.forEach(sg => {
|
|
53
|
+
const cfnSg = sg.node.defaultChild as CfnResource;
|
|
54
|
+
cfnSg.addMetadata('guard', {
|
|
55
|
+
SuppressedRules: ['EC2_NO_OPEN_SECURITY_GROUPS'],
|
|
56
|
+
});
|
|
57
|
+
});
|
|
58
|
+
|
|
52
59
|
new cdk.CfnOutput(stack, 'LoadBalancerDNS', { value: lb.loadBalancerDnsName });
|
|
53
60
|
|
|
54
61
|
app.synth();
|
|
@@ -7,8 +7,6 @@ import * as integ from '@aws-cdk/integ-tests-alpha';
|
|
|
7
7
|
const app = new cdk.App({
|
|
8
8
|
postCliContext: {
|
|
9
9
|
'@aws-cdk/aws-ecs:removeDefaultDeploymentAlarm': true,
|
|
10
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': false,
|
|
11
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
12
10
|
},
|
|
13
11
|
});
|
|
14
12
|
const stack = new cdk.Stack(app, 'integ-managedinstances-capacity-provider');
|
|
@@ -7,8 +7,6 @@ import * as integ from '@aws-cdk/integ-tests-alpha';
|
|
|
7
7
|
const app = new cdk.App({
|
|
8
8
|
postCliContext: {
|
|
9
9
|
'@aws-cdk/aws-ecs:removeDefaultDeploymentAlarm': true,
|
|
10
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': false,
|
|
11
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
12
10
|
},
|
|
13
11
|
});
|
|
14
12
|
const stack = new cdk.Stack(app, 'integ-managedinstances-no-default-capacity-provider');
|
|
@@ -7,8 +7,6 @@ import { IntegTest } from '@aws-cdk/integ-tests-alpha';
|
|
|
7
7
|
const app = new cdk.App({
|
|
8
8
|
postCliContext: {
|
|
9
9
|
'@aws-cdk/aws-lambda:useCdkManagedLogGroup': false,
|
|
10
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': false,
|
|
11
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
12
10
|
'@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy': false,
|
|
13
11
|
},
|
|
14
12
|
});
|
cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.placement-strategies.ts
CHANGED
|
@@ -7,8 +7,6 @@ import * as integ from '@aws-cdk/integ-tests-alpha';
|
|
|
7
7
|
const app = new cdk.App({
|
|
8
8
|
postCliContext: {
|
|
9
9
|
'@aws-cdk/aws-lambda:useCdkManagedLogGroup': false,
|
|
10
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': false,
|
|
11
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
12
10
|
'@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy': false,
|
|
13
11
|
},
|
|
14
12
|
});
|
cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.pseudo-terminal.ts
CHANGED
|
@@ -6,8 +6,6 @@ import * as ecs from 'aws-cdk-lib/aws-ecs';
|
|
|
6
6
|
const app = new cdk.App({
|
|
7
7
|
postCliContext: {
|
|
8
8
|
'@aws-cdk/aws-lambda:useCdkManagedLogGroup': false,
|
|
9
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': false,
|
|
10
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
11
9
|
'@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy': false,
|
|
12
10
|
},
|
|
13
11
|
});
|
|
@@ -5,8 +5,6 @@ import * as ecs from 'aws-cdk-lib/aws-ecs';
|
|
|
5
5
|
const app = new cdk.App({
|
|
6
6
|
postCliContext: {
|
|
7
7
|
'@aws-cdk/aws-lambda:useCdkManagedLogGroup': false,
|
|
8
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': false,
|
|
9
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
10
8
|
'@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy': false,
|
|
11
9
|
},
|
|
12
10
|
});
|
|
@@ -5,8 +5,6 @@ import * as ecs from 'aws-cdk-lib/aws-ecs';
|
|
|
5
5
|
const app = new cdk.App({
|
|
6
6
|
postCliContext: {
|
|
7
7
|
'@aws-cdk/aws-lambda:useCdkManagedLogGroup': false,
|
|
8
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': false,
|
|
9
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
10
8
|
'@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy': false,
|
|
11
9
|
},
|
|
12
10
|
});
|
|
@@ -5,8 +5,6 @@ import * as ecs from 'aws-cdk-lib/aws-ecs';
|
|
|
5
5
|
const app = new cdk.App({
|
|
6
6
|
postCliContext: {
|
|
7
7
|
'@aws-cdk/aws-lambda:useCdkManagedLogGroup': false,
|
|
8
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': false,
|
|
9
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
10
8
|
'@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy': false,
|
|
11
9
|
},
|
|
12
10
|
});
|
cdk_api_mcp_server/resources/aws-cdk/constructs/aws-cdk-lib/aws-ecs/integ.swap-parameters.ts
CHANGED
|
@@ -7,8 +7,6 @@ import { LinuxParameters } from 'aws-cdk-lib/aws-ecs';
|
|
|
7
7
|
const app = new cdk.App({
|
|
8
8
|
postCliContext: {
|
|
9
9
|
'@aws-cdk/aws-lambda:useCdkManagedLogGroup': false,
|
|
10
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': false,
|
|
11
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
12
10
|
'@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy': false,
|
|
13
11
|
},
|
|
14
12
|
});
|
|
@@ -6,8 +6,6 @@ import { IntegTest } from '@aws-cdk/integ-tests-alpha';
|
|
|
6
6
|
const app = new cdk.App({
|
|
7
7
|
postCliContext: {
|
|
8
8
|
'@aws-cdk/aws-lambda:useCdkManagedLogGroup': false,
|
|
9
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': false,
|
|
10
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
11
9
|
'@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy': false,
|
|
12
10
|
},
|
|
13
11
|
});
|
|
@@ -8,8 +8,6 @@ import * as ecsPatterns from 'aws-cdk-lib/aws-ecs-patterns';
|
|
|
8
8
|
const app = new cdk.App({
|
|
9
9
|
postCliContext: {
|
|
10
10
|
'@aws-cdk/aws-ecs:removeDefaultDeploymentAlarm': true,
|
|
11
|
-
'@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature': false,
|
|
12
|
-
'@aws-cdk/aws-ecs:disableEcsImdsBlocking': false,
|
|
13
11
|
},
|
|
14
12
|
});
|
|
15
13
|
const stack = new cdk.Stack(app, 'aws-ecs-integ-alb-ec2-cmd-entrypoint');
|
|
@@ -22,6 +20,11 @@ const securityGroup = new ec2.SecurityGroup(stack, 'SecurityGroup', {
|
|
|
22
20
|
allowAllOutbound: true,
|
|
23
21
|
});
|
|
24
22
|
securityGroup.addIngressRule(ec2.Peer.anyIpv4(), ec2.Port.tcpRange(32768, 65535));
|
|
23
|
+
// Suppress security guardian rule - intentionally allowing public access for load balancer testing
|
|
24
|
+
const cfnSecurityGroup = securityGroup.node.defaultChild as cdk.CfnResource;
|
|
25
|
+
cfnSecurityGroup.addMetadata('guard', {
|
|
26
|
+
SuppressedRules: ['EC2_NO_OPEN_SECURITY_GROUPS'],
|
|
27
|
+
});
|
|
25
28
|
|
|
26
29
|
const provider = new ecs.AsgCapacityProvider(stack, 'CapacityProvier', {
|
|
27
30
|
autoScalingGroup: new autoscaling.AutoScalingGroup(
|
|
@@ -61,6 +64,13 @@ const applicationLoadBalancedEc2Service = new ecsPatterns.ApplicationLoadBalance
|
|
|
61
64
|
},
|
|
62
65
|
);
|
|
63
66
|
applicationLoadBalancedEc2Service.loadBalancer.connections.addSecurityGroup(securityGroup);
|
|
67
|
+
// Suppress security guardian rule - load balancer intentionally needs public access for testing
|
|
68
|
+
applicationLoadBalancedEc2Service.loadBalancer.connections.securityGroups.forEach(sg => {
|
|
69
|
+
const cfnSg = sg.node.defaultChild as cdk.CfnResource;
|
|
70
|
+
cfnSg.addMetadata('guard', {
|
|
71
|
+
SuppressedRules: ['EC2_NO_OPEN_SECURITY_GROUPS'],
|
|
72
|
+
});
|
|
73
|
+
});
|
|
64
74
|
|
|
65
75
|
new integ.IntegTest(app, 'AlbEc2ServiceWithCommandAndEntryPoint', {
|
|
66
76
|
testCases: [stack],
|