* add cloudfront * modify: healthcheck disable * modify: health check option * modify nodejsbuild * add nodejs version * endpoint configuration * set axios url * remote console.log VITE_PROXY_TARGET * create alb stack * add alb to origin * alb build success * remote baseURL setting * add redirect * change responseHttpStatus to 200 * modify output and readme * modify architecture * add health check path route to cloudfront routing * modified: c9 env name in deploy langflow section * modified : package dependency for pymysql * modified: deploy procedure * modified: deploy procedure (ja) --------- Co-authored-by: nsxshota <nsxshota@amazon.co.jp> Co-authored-by: ymkazuki <ymkazuki@amazon.co.jp> Co-authored-by: Shota Nakamoto <53632932+nsy0328@users.noreply.github.com>
58 lines
2.3 KiB
JSON
58 lines
2.3 KiB
JSON
{
|
|
"app": "npx ts-node --prefer-ts-exts bin/cdk.ts",
|
|
"watch": {
|
|
"include": [
|
|
"**"
|
|
],
|
|
"exclude": [
|
|
"README.md",
|
|
"cdk*.json",
|
|
"**/*.d.ts",
|
|
"**/*.js",
|
|
"tsconfig.json",
|
|
"package*.json",
|
|
"yarn.lock",
|
|
"node_modules",
|
|
"test"
|
|
]
|
|
},
|
|
"context": {
|
|
"ragEnabled": false,
|
|
"kendraIndexArn": null,
|
|
"@aws-cdk/aws-lambda:recognizeLayerVersion": true,
|
|
"@aws-cdk/core:checkSecretUsage": true,
|
|
"@aws-cdk/core:target-partitions": [
|
|
"aws",
|
|
"aws-cn"
|
|
],
|
|
"@aws-cdk-containers/ecs-service-extensions:enableDefaultLogDriver": true,
|
|
"@aws-cdk/aws-ec2:uniqueImdsv2TemplateName": true,
|
|
"@aws-cdk/aws-ecs:arnFormatIncludesClusterName": true,
|
|
"@aws-cdk/aws-iam:minimizePolicies": true,
|
|
"@aws-cdk/core:validateSnapshotRemovalPolicy": true,
|
|
"@aws-cdk/aws-codepipeline:crossAccountKeyAliasStackSafeResourceName": true,
|
|
"@aws-cdk/aws-s3:createDefaultLoggingPolicy": true,
|
|
"@aws-cdk/aws-sns-subscriptions:restrictSqsDescryption": true,
|
|
"@aws-cdk/aws-apigateway:disableCloudWatchRole": true,
|
|
"@aws-cdk/core:enablePartitionLiterals": true,
|
|
"@aws-cdk/aws-events:eventsTargetQueueSameAccount": true,
|
|
"@aws-cdk/aws-iam:standardizedServicePrincipals": true,
|
|
"@aws-cdk/aws-ecs:disableExplicitDeploymentControllerForCircuitBreaker": true,
|
|
"@aws-cdk/aws-iam:importedRoleStackSafeDefaultPolicyName": true,
|
|
"@aws-cdk/aws-s3:serverAccessLogsUseBucketPolicy": true,
|
|
"@aws-cdk/aws-route53-patters:useCertificate": true,
|
|
"@aws-cdk/customresources:installLatestAwsSdkDefault": false,
|
|
"@aws-cdk/aws-rds:databaseProxyUniqueResourceName": true,
|
|
"@aws-cdk/aws-codedeploy:removeAlarmsFromDeploymentGroup": true,
|
|
"@aws-cdk/aws-apigateway:authorizerChangeDeploymentLogicalId": true,
|
|
"@aws-cdk/aws-ec2:launchTemplateDefaultUserData": true,
|
|
"@aws-cdk/aws-secretsmanager:useAttachedSecretResourcePolicyForSecretTargetAttachments": true,
|
|
"@aws-cdk/aws-redshift:columnId": true,
|
|
"@aws-cdk/aws-stepfunctions-tasks:enableEmrServicePolicyV2": true,
|
|
"@aws-cdk/aws-ec2:restrictDefaultSecurityGroup": true,
|
|
"@aws-cdk/aws-apigateway:requestValidatorUniqueId": true,
|
|
"@aws-cdk/aws-kms:aliasNameRef": true,
|
|
"@aws-cdk/core:includePrefixInUniqueNameGeneration": true
|
|
}
|
|
}
|