Socket
Socket
Sign inDemoInstall

@aws-cdk/cloud-assembly-schema

Package Overview
Dependencies
2
Maintainers
5
Versions
444
Alerts
File Explorer

Advanced tools

Install Socket

Detect and block malicious and high-risk dependencies

Install

@aws-cdk/cloud-assembly-schema


Version published
Maintainers
5
Install size
396 kB
Created

Package description

What is @aws-cdk/cloud-assembly-schema?

@aws-cdk/cloud-assembly-schema is a package that defines the schema for AWS Cloud Development Kit (CDK) cloud assemblies. It provides a set of TypeScript interfaces and JSON schemas that describe the structure of the cloud assembly, which is the output of the CDK synthesis process. This package is essential for tools and libraries that need to interact with or manipulate CDK cloud assemblies.

What are @aws-cdk/cloud-assembly-schema's main functionalities?

Cloud Assembly Schema Definition

Defines the schema for a cloud assembly, including the version and artifacts. This schema is used to validate the structure of a cloud assembly JSON file.

{"type":"object","properties":{"version":{"type":"string"},"artifacts":{"type":"object","additionalProperties":{"$ref":"#/definitions/Artifact"}}},"required":["version","artifacts"],"definitions":{"Artifact":{"type":"object","properties":{"type":{"type":"string"},"properties":{"type":"object"}},"required":["type"]}}}

Artifact Type Definitions

Defines the schema for different types of artifacts, such as CloudFormation stacks and CDK assets. This schema is used to validate the structure of artifact definitions within a cloud assembly.

{"type":"object","properties":{"type":{"type":"string","enum":["aws:cloudformation:stack","aws:cdk:asset"]},"properties":{"type":"object","properties":{"templateFile":{"type":"string"},"parameters":{"type":"object","additionalProperties":{"type":"string"}}},"required":["templateFile"]}},"required":["type","properties"]}

Other packages similar to @aws-cdk/cloud-assembly-schema

Changelog

Source

1.60.0 (2020-08-19)

⚠ BREAKING CHANGES TO EXPERIMENTAL FEATURES

  • cloudfront: Distribution: .domains must be specified if certificate is provided.
  • appsync: appsync.addXxxDataSource name and description props are now optional and in an DataSourceOptions interface.
  • appsync: the props name and description in addXxxDataSource have been moved into new props options of type DataSourceOptions
  • appsync: DataSourceOptions.name defaults to id
  • appsync: DataSourceOptions.description defaults to undefined

Features

Bug Fixes

  • apigateway: access log format does not allow tokens (#9769) (a7c5c75), closes #9687
  • build: Prereq check - support paths with spaces. (9ca1d02), closes #9749
  • cfn-include: handle numbers expressed as strings in templates (#9525) (e9a4102), closes #9524
  • cli: "fancy" progress reporting not disabled on all CI systems (#9516) (97ef371), closes #8696 #8893
  • cli: CLI does not use regional endpoints (#9835) (34450b0), closes #9223
  • cli: stack monitor reads complete stack history every 5 seconds (#9795) (cace51a), closes #9470
  • cli: SynthUtils is not used (#9836) (9f1007e)
  • cloudformation-diff: DependsOn singleton arrays aren't equal to string values (#9814) (49cdb47)
  • cloudfront: all origin access identities have identical names (#9829) (ca79188), closes #9580
  • cloudfront: Distribution ignores webAclId (#9828) (366c781), closes #9635 #9824
  • cloudfront: Update Suported Security Protocol enum and set TLS_V1_2_2019 as a default version (#9738) (f6c25ad), closes #9212
  • codebuild: fails on using PR Events together with FILE_PATH filters in a FilterGroup (#9725) (fdaf6bc), closes #8867
  • codepipeline: Service Catalog action generated incorrect file path (#9773) (286ff50), closes #9767
  • eks: AMI changes in managed SSM store param causes rolling update of ASG (#9746) (44f7753), closes #7273
  • elbv2: NLB Target Group does not inherit protocol (#9331) (#9651) (171ab59)
  • lambda: compute platform missing for autocreated profiling group (#9716) (a8f4c9f)
  • lambda-nodejs: cannot bundle when entry file is named index.ts (#9724) (bb90fbe), closes #9709
  • lambda-nodejs: NodejsFunction construct incompatible with lambda@edge (#9562) (dfe2c5c), closes #9328 #9453
  • lambda-python: install rsync if necessary (#9763) (6edb6e6), closes #9704 #9349 #9582

Readme

Source

Cloud Assembly Schema


cdk-constructs: Stable


This module is part of the AWS Cloud Development Kit project.

Cloud Assembly

The Cloud Assembly is the output of the synthesis operation. It is produced as part of the cdk synth command, or the app.synth() method invocation.

Its essentially a set of files and directories, one of which is the manifest.json file. It defines the set of instructions that are needed in order to deploy the assembly directory.

For example, when cdk deploy is executed, the CLI reads this file and performs its instructions:

  • Build container images.
  • Upload assets.
  • Deploy CloudFormation templates.

Therefore, the assembly is how the CDK class library and CDK CLI (or any other consumer) communicate. To ensure compatibility between the assembly and its consumers, we treat the manifest file as a well defined, versioned schema.

Schema

This module contains the typescript structs that comprise the manifest.json file, as well as the generated json-schema.

Versioning

The schema version is specified in the cloud-assembly.version.json file, under the version property. It follows semantic versioning, but with a small twist.

When we add instructions to the assembly, they are reflected in the manifest file and the json-schema accordingly. Every such instruction, is crucial for ensuring the correct deployment behavior. This means that to properly deploy a cloud assembly, consumers must be aware of every such instruction modification.

For this reason, every change to the schema, even though it might not strictly break validation of the json-schema format, is considered major version bump.

How to consume

If you'd like to consume the schema file in order to do validations on manifest.json files, simply download it from this repo and run it against standard json-schema validators, such as jsonschema.

Consumers must take into account the major version of the schema they are consuming. They should reject cloud assemblies with a major version that is higher than what they expect. While schema validation might pass on such assemblies, the deployment integrity cannot be guaranteed because some instructions will be ignored.

For example, if your consumer was built when the schema version was 2.0.0, you should reject deploying cloud assemblies with a manifest version of 3.0.0.

Contributing

See Contribution Guide

Keywords

FAQs

Last updated on 20 Aug 2020

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap

Packages

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc