81 lines
4.0 KiB
JSON
81 lines
4.0 KiB
JSON
{
|
|
"app": "npx ts-node --prefer-ts-exts bin/functions.ts",
|
|
"watch": {
|
|
"include": [
|
|
"**"
|
|
],
|
|
"exclude": [
|
|
"README.md",
|
|
"cdk*.json",
|
|
"**/*.d.ts",
|
|
"**/*.js",
|
|
"tsconfig.json",
|
|
"package*.json",
|
|
"yarn.lock",
|
|
"node_modules",
|
|
"test"
|
|
]
|
|
},
|
|
"context": {
|
|
"@aws-cdk/aws-lambda:recognizeLayerVersion": true,
|
|
"@aws-cdk/core:checkSecretUsage": true,
|
|
"@aws-cdk/core:target-partitions": [
|
|
"aws",
|
|
"aws-cn"
|
|
],
|
|
"@aws-cdk-containers/ecs-service-extensions:enableDefaultLogDriver": true,
|
|
"@aws-cdk/aws-ec2:uniqueImdsv2TemplateName": true,
|
|
"@aws-cdk/aws-ecs:arnFormatIncludesClusterName": true,
|
|
"@aws-cdk/aws-iam:minimizePolicies": true,
|
|
"@aws-cdk/core:validateSnapshotRemovalPolicy": true,
|
|
"@aws-cdk/aws-codepipeline:crossAccountKeyAliasStackSafeResourceName": true,
|
|
"@aws-cdk/aws-s3:createDefaultLoggingPolicy": true,
|
|
"@aws-cdk/aws-sns-subscriptions:restrictSqsDescryption": true,
|
|
"@aws-cdk/aws-apigateway:disableCloudWatchRole": true,
|
|
"@aws-cdk/core:enablePartitionLiterals": true,
|
|
"@aws-cdk/aws-events:eventsTargetQueueSameAccount": true,
|
|
"@aws-cdk/aws-ecs:disableExplicitDeploymentControllerForCircuitBreaker": true,
|
|
"@aws-cdk/aws-iam:importedRoleStackSafeDefaultPolicyName": true,
|
|
"@aws-cdk/aws-s3:serverAccessLogsUseBucketPolicy": true,
|
|
"@aws-cdk/aws-route53-patters:useCertificate": true,
|
|
"@aws-cdk/customresources:installLatestAwsSdkDefault": false,
|
|
"@aws-cdk/aws-rds:databaseProxyUniqueResourceName": true,
|
|
"@aws-cdk/aws-codedeploy:removeAlarmsFromDeploymentGroup": true,
|
|
"@aws-cdk/aws-apigateway:authorizerChangeDeploymentLogicalId": true,
|
|
"@aws-cdk/aws-ec2:launchTemplateDefaultUserData": true,
|
|
"@aws-cdk/aws-secretsmanager:useAttachedSecretResourcePolicyForSecretTargetAttachments": true,
|
|
"@aws-cdk/aws-redshift:columnId": true,
|
|
"@aws-cdk/aws-stepfunctions-tasks:enableEmrServicePolicyV2": true,
|
|
"@aws-cdk/aws-ec2:restrictDefaultSecurityGroup": true,
|
|
"@aws-cdk/aws-apigateway:requestValidatorUniqueId": true,
|
|
"@aws-cdk/aws-kms:aliasNameRef": true,
|
|
"@aws-cdk/aws-autoscaling:generateLaunchTemplateInsteadOfLaunchConfig": true,
|
|
"@aws-cdk/core:includePrefixInUniqueNameGeneration": true,
|
|
"@aws-cdk/aws-efs:denyAnonymousAccess": true,
|
|
"@aws-cdk/aws-opensearchservice:enableOpensearchMultiAzWithStandby": true,
|
|
"@aws-cdk/aws-lambda-nodejs:useLatestRuntimeVersion": true,
|
|
"@aws-cdk/aws-efs:mountTargetOrderInsensitiveLogicalId": true,
|
|
"@aws-cdk/aws-rds:auroraClusterChangeScopeOfInstanceParameterGroupWithEachParameters": true,
|
|
"@aws-cdk/aws-appsync:useArnForSourceApiAssociationIdentifier": true,
|
|
"@aws-cdk/aws-rds:preventRenderingDeprecatedCredentials": true,
|
|
"@aws-cdk/aws-codepipeline-actions:useNewDefaultBranchForCodeCommitSource": true,
|
|
"@aws-cdk/aws-cloudwatch-actions:changeLambdaPermissionLogicalIdForLambdaAction": true,
|
|
"@aws-cdk/aws-codepipeline:crossAccountKeysDefaultValueToFalse": true,
|
|
"@aws-cdk/aws-codepipeline:defaultPipelineTypeToV2": true,
|
|
"@aws-cdk/aws-kms:reduceCrossAccountRegionPolicyScope": true,
|
|
"@aws-cdk/aws-eks:nodegroupNameAttribute": true,
|
|
"@aws-cdk/aws-ec2:ebsDefaultGp3Volume": true,
|
|
"@aws-cdk/aws-ecs:removeDefaultDeploymentAlarm": true,
|
|
"@aws-cdk/custom-resources:logApiResponseDataPropertyTrueDefault": false,
|
|
"@aws-cdk/aws-s3:keepNotificationInImportedBucket": false,
|
|
"@aws-cdk/aws-ecs:reduceEc2FargateCloudWatchPermissions": true,
|
|
"@aws-cdk/aws-dynamodb:resourcePolicyPerReplica": true,
|
|
"@aws-cdk/aws-ec2:ec2SumTImeoutEnabled": true,
|
|
"@aws-cdk/aws-appsync:appSyncGraphQLAPIScopeLambdaPermission": true,
|
|
"@aws-cdk/aws-rds:setCorrectValueForDatabaseInstanceReadReplicaInstanceResourceId": true,
|
|
"@aws-cdk/core:cfnIncludeRejectComplexResourceUpdateCreatePolicyIntrinsics": true,
|
|
"@aws-cdk/aws-lambda-nodejs:sdkV3ExcludeSmithyPackages": true,
|
|
"@aws-cdk/aws-stepfunctions-tasks:fixRunEcsTaskPolicy": true
|
|
}
|
|
}
|