|
1 | 1 | { |
2 | 2 | "app": "npx ts-node --prefer-ts-exts index.ts", |
3 | | - "watch": { |
4 | | - "include": [ |
5 | | - "**" |
6 | | - ], |
7 | | - "exclude": [ |
8 | | - "README.md", |
9 | | - "cdk*.json", |
10 | | - "**/*.d.ts", |
11 | | - "**/*.js", |
12 | | - "tsconfig.json", |
13 | | - "package*.json", |
14 | | - "yarn.lock", |
15 | | - "node_modules", |
16 | | - "test" |
17 | | - ] |
18 | | - }, |
19 | 3 | "context": { |
20 | | - "@aws-cdk/aws-lambda:recognizeLayerVersion": true, |
21 | | - "@aws-cdk/core:checkSecretUsage": true, |
22 | | - "@aws-cdk/core:target-partitions": [ |
23 | | - "aws", |
24 | | - "aws-cn" |
25 | | - ], |
26 | | - "@aws-cdk-containers/ecs-service-extensions:enableDefaultLogDriver": true, |
27 | | - "@aws-cdk/aws-ec2:uniqueImdsv2TemplateName": true, |
28 | | - "@aws-cdk/aws-ecs:arnFormatIncludesClusterName": true, |
29 | | - "@aws-cdk/aws-iam:minimizePolicies": true, |
30 | | - "@aws-cdk/core:validateSnapshotRemovalPolicy": true, |
31 | | - "@aws-cdk/aws-codepipeline:crossAccountKeyAliasStackSafeResourceName": true, |
32 | | - "@aws-cdk/aws-s3:createDefaultLoggingPolicy": true, |
33 | | - "@aws-cdk/aws-sns-subscriptions:restrictSqsDescryption": true, |
34 | | - "@aws-cdk/aws-apigateway:disableCloudWatchRole": true, |
35 | | - "@aws-cdk/core:enablePartitionLiterals": true, |
36 | | - "@aws-cdk/aws-events:eventsTargetQueueSameAccount": true, |
37 | | - "@aws-cdk/aws-ecs:disableExplicitDeploymentControllerForCircuitBreaker": true, |
38 | | - "@aws-cdk/aws-iam:importedRoleStackSafeDefaultPolicyName": true, |
39 | | - "@aws-cdk/aws-s3:serverAccessLogsUseBucketPolicy": true, |
40 | | - "@aws-cdk/aws-route53-patters:useCertificate": true, |
41 | | - "@aws-cdk/customresources:installLatestAwsSdkDefault": false, |
42 | | - "@aws-cdk/aws-rds:databaseProxyUniqueResourceName": true, |
43 | | - "@aws-cdk/aws-codedeploy:removeAlarmsFromDeploymentGroup": true, |
44 | | - "@aws-cdk/aws-apigateway:authorizerChangeDeploymentLogicalId": true, |
45 | | - "@aws-cdk/aws-ec2:launchTemplateDefaultUserData": true, |
46 | | - "@aws-cdk/aws-secretsmanager:useAttachedSecretResourcePolicyForSecretTargetAttachments": true, |
47 | | - "@aws-cdk/aws-redshift:columnId": true, |
48 | | - "@aws-cdk/aws-stepfunctions-tasks:enableEmrServicePolicyV2": true, |
49 | | - "@aws-cdk/aws-ec2:restrictDefaultSecurityGroup": true, |
50 | | - "@aws-cdk/aws-apigateway:requestValidatorUniqueId": true, |
51 | | - "@aws-cdk/aws-kms:aliasNameRef": true, |
52 | | - "@aws-cdk/aws-autoscaling:generateLaunchTemplateInsteadOfLaunchConfig": true, |
53 | | - "@aws-cdk/core:includePrefixInUniqueNameGeneration": true, |
54 | | - "@aws-cdk/aws-efs:denyAnonymousAccess": true, |
55 | | - "@aws-cdk/aws-opensearchservice:enableOpensearchMultiAzWithStandby": true, |
56 | | - "@aws-cdk/aws-lambda-nodejs:useLatestRuntimeVersion": true, |
57 | | - "@aws-cdk/aws-efs:mountTargetOrderInsensitiveLogicalId": true, |
58 | | - "@aws-cdk/aws-rds:auroraClusterChangeScopeOfInstanceParameterGroupWithEachParameters": true, |
59 | | - "@aws-cdk/aws-appsync:useArnForSourceApiAssociationIdentifier": true, |
60 | | - "@aws-cdk/aws-rds:preventRenderingDeprecatedCredentials": true, |
61 | | - "@aws-cdk/aws-codepipeline-actions:useNewDefaultBranchForCodeCommitSource": true, |
62 | | - "@aws-cdk/aws-cloudwatch-actions:changeLambdaPermissionLogicalIdForLambdaAction": true, |
63 | | - "@aws-cdk/aws-codepipeline:crossAccountKeysDefaultValueToFalse": true, |
64 | | - "@aws-cdk/aws-codepipeline:defaultPipelineTypeToV2": true, |
65 | | - "@aws-cdk/aws-kms:reduceCrossAccountRegionPolicyScope": true, |
66 | | - "@aws-cdk/aws-eks:nodegroupNameAttribute": true, |
67 | | - "@aws-cdk/aws-ec2:ebsDefaultGp3Volume": true, |
68 | | - "@aws-cdk/aws-ecs:removeDefaultDeploymentAlarm": true, |
69 | | - "@aws-cdk/custom-resources:logApiResponseDataPropertyTrueDefault": false, |
70 | | - "@aws-cdk/aws-s3:keepNotificationInImportedBucket": false, |
71 | | - "@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature": false, |
72 | | - "@aws-cdk/aws-ecs:disableEcsImdsBlocking": true, |
73 | | - "@aws-cdk/aws-ecs:reduceEc2FargateCloudWatchPermissions": true, |
74 | | - "@aws-cdk/aws-dynamodb:resourcePolicyPerReplica": true, |
75 | | - "@aws-cdk/aws-ec2:ec2SumTImeoutEnabled": true, |
76 | | - "@aws-cdk/aws-appsync:appSyncGraphQLAPIScopeLambdaPermission": true, |
77 | | - "@aws-cdk/aws-rds:setCorrectValueForDatabaseInstanceReadReplicaInstanceResourceId": true, |
78 | | - "@aws-cdk/core:cfnIncludeRejectComplexResourceUpdateCreatePolicyIntrinsics": true, |
79 | | - "@aws-cdk/aws-lambda-nodejs:sdkV3ExcludeSmithyPackages": true, |
80 | | - "@aws-cdk/aws-stepfunctions-tasks:fixRunEcsTaskPolicy": true, |
81 | | - "@aws-cdk/aws-ec2:bastionHostUseAmazonLinux2023ByDefault": true, |
82 | | - "@aws-cdk/aws-route53-targets:userPoolDomainNameMethodWithoutCustomResource": true, |
83 | | - "@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault": true, |
84 | | - "@aws-cdk/aws-iam:oidcRejectUnauthorizedConnections": true, |
85 | | - "@aws-cdk/core:enableAdditionalMetadataCollection": true, |
86 | | - "@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": true, |
87 | | - "@aws-cdk/aws-s3:setUniqueReplicationRoleName": true, |
88 | | - "@aws-cdk/aws-events:requireEventBusPolicySid": true |
| 4 | + "appName": "eventbridge-mesh", |
| 5 | + "region": "us-east-1", |
| 6 | + "producerAccountId": "111111111111", |
| 7 | + "consumerAccountId": "222222222222" |
89 | 8 | } |
90 | 9 | } |
0 commit comments