Skip to content

Commit bc45863

Browse files
author
Marco Jahn
committed
added missing cdk.json
1 parent bad6024 commit bc45863

File tree

1 file changed

+83
-0
lines changed
  • cloudfront-keyvaluestore-apigw-routing-cdk

1 file changed

+83
-0
lines changed
Lines changed: 83 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,83 @@
1+
{
2+
"app": "npx ts-node --prefer-ts-exts bin/cloudfront-keyvaluestore-apigw-routing-cdk.ts",
3+
"watch": {
4+
"include": ["**"],
5+
"exclude": [
6+
"README.md",
7+
"cdk*.json",
8+
"**/*.d.ts",
9+
"**/*.js",
10+
"tsconfig.json",
11+
"package*.json",
12+
"yarn.lock",
13+
"node_modules",
14+
"test"
15+
]
16+
},
17+
"context": {
18+
"@aws-cdk/aws-lambda:recognizeLayerVersion": true,
19+
"@aws-cdk/core:checkSecretUsage": true,
20+
"@aws-cdk/core:target-partitions": ["aws", "aws-cn"],
21+
"@aws-cdk-containers/ecs-service-extensions:enableDefaultLogDriver": true,
22+
"@aws-cdk/aws-ec2:uniqueImdsv2TemplateName": true,
23+
"@aws-cdk/aws-ecs:arnFormatIncludesClusterName": true,
24+
"@aws-cdk/aws-iam:minimizePolicies": true,
25+
"@aws-cdk/core:validateSnapshotRemovalPolicy": true,
26+
"@aws-cdk/aws-codepipeline:crossAccountKeyAliasStackSafeResourceName": true,
27+
"@aws-cdk/aws-s3:createDefaultLoggingPolicy": true,
28+
"@aws-cdk/aws-sns-subscriptions:restrictSqsDescryption": true,
29+
"@aws-cdk/aws-apigateway:disableCloudWatchRole": true,
30+
"@aws-cdk/core:enablePartitionLiterals": true,
31+
"@aws-cdk/aws-events:eventsTargetQueueSameAccount": true,
32+
"@aws-cdk/aws-ecs:disableExplicitDeploymentControllerForCircuitBreaker": true,
33+
"@aws-cdk/aws-iam:importedRoleStackSafeDefaultPolicyName": true,
34+
"@aws-cdk/aws-s3:serverAccessLogsUseBucketPolicy": true,
35+
"@aws-cdk/aws-route53-patters:useCertificate": true,
36+
"@aws-cdk/customresources:installLatestAwsSdkDefault": false,
37+
"@aws-cdk/aws-rds:databaseProxyUniqueResourceName": true,
38+
"@aws-cdk/aws-codedeploy:removeAlarmsFromDeploymentGroup": true,
39+
"@aws-cdk/aws-apigateway:authorizerChangeDeploymentLogicalId": true,
40+
"@aws-cdk/aws-ec2:launchTemplateDefaultUserData": true,
41+
"@aws-cdk/aws-secretsmanager:useAttachedSecretResourcePolicyForSecretTargetAttachments": true,
42+
"@aws-cdk/aws-redshift:columnId": true,
43+
"@aws-cdk/aws-stepfunctions-tasks:enableEmrServicePolicyV2": true,
44+
"@aws-cdk/aws-ec2:restrictDefaultSecurityGroup": true,
45+
"@aws-cdk/aws-apigateway:requestValidatorUniqueId": true,
46+
"@aws-cdk/aws-kms:aliasNameRef": true,
47+
"@aws-cdk/aws-autoscaling:generateLaunchTemplateInsteadOfLaunchConfig": true,
48+
"@aws-cdk/core:includePrefixInUniqueNameGeneration": true,
49+
"@aws-cdk/aws-efs:denyAnonymousAccess": true,
50+
"@aws-cdk/aws-opensearchservice:enableOpensearchMultiAzWithStandby": true,
51+
"@aws-cdk/aws-lambda-nodejs:useLatestRuntimeVersion": true,
52+
"@aws-cdk/aws-efs:mountTargetOrderInsensitiveLogicalId": true,
53+
"@aws-cdk/aws-rds:auroraClusterChangeScopeOfInstanceParameterGroupWithEachParameters": true,
54+
"@aws-cdk/aws-appsync:useArnForSourceApiAssociationIdentifier": true,
55+
"@aws-cdk/aws-rds:preventRenderingDeprecatedCredentials": true,
56+
"@aws-cdk/aws-codepipeline-actions:useNewDefaultBranchForCodeCommitSource": true,
57+
"@aws-cdk/aws-cloudwatch-actions:changeLambdaPermissionLogicalIdForLambdaAction": true,
58+
"@aws-cdk/aws-codepipeline:crossAccountKeysDefaultValueToFalse": true,
59+
"@aws-cdk/aws-codepipeline:defaultPipelineTypeToV2": true,
60+
"@aws-cdk/aws-kms:reduceCrossAccountRegionPolicyScope": true,
61+
"@aws-cdk/aws-eks:nodegroupNameAttribute": true,
62+
"@aws-cdk/aws-ec2:ebsDefaultGp3Volume": true,
63+
"@aws-cdk/aws-ecs:removeDefaultDeploymentAlarm": true,
64+
"@aws-cdk/custom-resources:logApiResponseDataPropertyTrueDefault": false,
65+
"@aws-cdk/aws-s3:keepNotificationInImportedBucket": false,
66+
"@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature": false,
67+
"@aws-cdk/aws-ecs:disableEcsImdsBlocking": true,
68+
"@aws-cdk/aws-ecs:reduceEc2FargateCloudWatchPermissions": true,
69+
"@aws-cdk/aws-dynamodb:resourcePolicyPerReplica": true,
70+
"@aws-cdk/aws-ec2:ec2SumTImeoutEnabled": true,
71+
"@aws-cdk/aws-appsync:appSyncGraphQLAPIScopeLambdaPermission": true,
72+
"@aws-cdk/aws-rds:setCorrectValueForDatabaseInstanceReadReplicaInstanceResourceId": true,
73+
"@aws-cdk/core:cfnIncludeRejectComplexResourceUpdateCreatePolicyIntrinsics": true,
74+
"@aws-cdk/aws-lambda-nodejs:sdkV3ExcludeSmithyPackages": true,
75+
"@aws-cdk/aws-stepfunctions-tasks:fixRunEcsTaskPolicy": true,
76+
"@aws-cdk/aws-ec2:bastionHostUseAmazonLinux2023ByDefault": true,
77+
"@aws-cdk/aws-route53-targets:userPoolDomainNameMethodWithoutCustomResource": true,
78+
"@aws-cdk/aws-elasticloadbalancingV2:albDualstackWithoutPublicIpv4SecurityGroupRulesDefault": true,
79+
"@aws-cdk/aws-iam:oidcRejectUnauthorizedConnections": true,
80+
"@aws-cdk/core:enableAdditionalMetadataCollection": true,
81+
"@aws-cdk/aws-lambda:createNewPoliciesWithAddToRolePolicy": true
82+
}
83+
}

0 commit comments

Comments
 (0)