@aws-solutions-constructs/aws-lambda-secretsmanager 2.51.0 → 2.52.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (53) hide show
  1. package/.eslintignore +2 -0
  2. package/.jsii +49 -4
  3. package/integ.config.json +7 -0
  4. package/lib/index.js +1 -1
  5. package/package.json +9 -8
  6. package/test/integ.lamsec-deployFunction.js +5 -2
  7. package/test/integ.lamsec-deployFunction.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +8 -0
  8. package/test/integ.lamsec-deployFunction.js.snapshot/cdk.out +1 -0
  9. package/test/integ.lamsec-deployFunction.js.snapshot/integ.json +12 -0
  10. package/test/integ.lamsec-deployFunction.js.snapshot/lamsec-deployFunction.assets.json +32 -0
  11. package/test/integ.lamsec-deployFunction.js.snapshot/lamsec-deployFunction.template.json +208 -0
  12. package/test/integ.lamsec-deployFunction.js.snapshot/lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA.assets.json +19 -0
  13. package/test/integ.lamsec-deployFunction.js.snapshot/lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA.template.json +36 -0
  14. package/test/integ.lamsec-deployFunction.js.snapshot/manifest.json +131 -0
  15. package/test/integ.lamsec-deployFunction.js.snapshot/tree.json +342 -0
  16. package/test/integ.lamsec-deployFunctionWithExistingVpc.js +6 -2
  17. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +8 -0
  18. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/__entrypoint__.js +1 -0
  19. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/index.js +1 -0
  20. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/cdk.out +1 -0
  21. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/integ.json +12 -0
  22. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsec-deployFunctionWithExistingVpc.assets.json +45 -0
  23. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsec-deployFunctionWithExistingVpc.template.json +1019 -0
  24. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsecdeployFunctionWithExistingVpcIntegDefaultTestDeployAssert647243A7.assets.json +19 -0
  25. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsecdeployFunctionWithExistingVpcIntegDefaultTestDeployAssert647243A7.template.json +36 -0
  26. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/manifest.json +329 -0
  27. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/tree.json +1393 -0
  28. package/test/integ.lamsec-deployFunctionWithVpc.js +6 -2
  29. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +8 -0
  30. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/__entrypoint__.js +1 -0
  31. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/index.js +1 -0
  32. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/cdk.out +1 -0
  33. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/integ.json +12 -0
  34. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.assets.json +45 -0
  35. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.template.json +735 -0
  36. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsecdeployFunctionWithVpcIntegDefaultTestDeployAssert66148FF5.assets.json +19 -0
  37. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsecdeployFunctionWithVpcIntegDefaultTestDeployAssert66148FF5.template.json +36 -0
  38. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/manifest.json +233 -0
  39. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/tree.json +981 -0
  40. package/test/integ.lamsec-existingFunction.js +5 -2
  41. package/test/integ.lamsec-existingFunction.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +8 -0
  42. package/test/integ.lamsec-existingFunction.js.snapshot/cdk.out +1 -0
  43. package/test/integ.lamsec-existingFunction.js.snapshot/integ.json +12 -0
  44. package/test/integ.lamsec-existingFunction.js.snapshot/lamsec-existingFunction.assets.json +32 -0
  45. package/test/integ.lamsec-existingFunction.js.snapshot/lamsec-existingFunction.template.json +208 -0
  46. package/test/integ.lamsec-existingFunction.js.snapshot/lamsecexistingFunctionIntegDefaultTestDeployAssert295B352B.assets.json +19 -0
  47. package/test/integ.lamsec-existingFunction.js.snapshot/lamsecexistingFunctionIntegDefaultTestDeployAssert295B352B.template.json +36 -0
  48. package/test/integ.lamsec-existingFunction.js.snapshot/manifest.json +131 -0
  49. package/test/integ.lamsec-existingFunction.js.snapshot/tree.json +342 -0
  50. package/test/integ.lamsec-deployFunction.expected.json +0 -208
  51. package/test/integ.lamsec-deployFunctionWithExistingVpc.expected.json +0 -1044
  52. package/test/integ.lamsec-deployFunctionWithVpc.expected.json +0 -650
  53. package/test/integ.lamsec-existingFunction.expected.json +0 -208
@@ -0,0 +1,342 @@
1
+ {
2
+ "version": "tree-0.1",
3
+ "tree": {
4
+ "id": "App",
5
+ "path": "",
6
+ "children": {
7
+ "lamsec-existingFunction": {
8
+ "id": "lamsec-existingFunction",
9
+ "path": "lamsec-existingFunction",
10
+ "children": {
11
+ "LambdaFunctionServiceRole": {
12
+ "id": "LambdaFunctionServiceRole",
13
+ "path": "lamsec-existingFunction/LambdaFunctionServiceRole",
14
+ "children": {
15
+ "ImportLambdaFunctionServiceRole": {
16
+ "id": "ImportLambdaFunctionServiceRole",
17
+ "path": "lamsec-existingFunction/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole",
18
+ "constructInfo": {
19
+ "fqn": "aws-cdk-lib.Resource",
20
+ "version": "2.118.0"
21
+ }
22
+ },
23
+ "Resource": {
24
+ "id": "Resource",
25
+ "path": "lamsec-existingFunction/LambdaFunctionServiceRole/Resource",
26
+ "attributes": {
27
+ "aws:cdk:cloudformation:type": "AWS::IAM::Role",
28
+ "aws:cdk:cloudformation:props": {
29
+ "assumeRolePolicyDocument": {
30
+ "Statement": [
31
+ {
32
+ "Action": "sts:AssumeRole",
33
+ "Effect": "Allow",
34
+ "Principal": {
35
+ "Service": "lambda.amazonaws.com"
36
+ }
37
+ }
38
+ ],
39
+ "Version": "2012-10-17"
40
+ },
41
+ "policies": [
42
+ {
43
+ "policyName": "LambdaFunctionServiceRolePolicy",
44
+ "policyDocument": {
45
+ "Statement": [
46
+ {
47
+ "Action": [
48
+ "logs:CreateLogGroup",
49
+ "logs:CreateLogStream",
50
+ "logs:PutLogEvents"
51
+ ],
52
+ "Effect": "Allow",
53
+ "Resource": {
54
+ "Fn::Join": [
55
+ "",
56
+ [
57
+ "arn:",
58
+ {
59
+ "Ref": "AWS::Partition"
60
+ },
61
+ ":logs:",
62
+ {
63
+ "Ref": "AWS::Region"
64
+ },
65
+ ":",
66
+ {
67
+ "Ref": "AWS::AccountId"
68
+ },
69
+ ":log-group:/aws/lambda/*"
70
+ ]
71
+ ]
72
+ }
73
+ }
74
+ ],
75
+ "Version": "2012-10-17"
76
+ }
77
+ }
78
+ ]
79
+ }
80
+ },
81
+ "constructInfo": {
82
+ "fqn": "aws-cdk-lib.aws_iam.CfnRole",
83
+ "version": "2.118.0"
84
+ }
85
+ },
86
+ "DefaultPolicy": {
87
+ "id": "DefaultPolicy",
88
+ "path": "lamsec-existingFunction/LambdaFunctionServiceRole/DefaultPolicy",
89
+ "children": {
90
+ "Resource": {
91
+ "id": "Resource",
92
+ "path": "lamsec-existingFunction/LambdaFunctionServiceRole/DefaultPolicy/Resource",
93
+ "attributes": {
94
+ "aws:cdk:cloudformation:type": "AWS::IAM::Policy",
95
+ "aws:cdk:cloudformation:props": {
96
+ "policyDocument": {
97
+ "Statement": [
98
+ {
99
+ "Action": [
100
+ "xray:PutTelemetryRecords",
101
+ "xray:PutTraceSegments"
102
+ ],
103
+ "Effect": "Allow",
104
+ "Resource": "*"
105
+ },
106
+ {
107
+ "Action": [
108
+ "secretsmanager:DescribeSecret",
109
+ "secretsmanager:GetSecretValue"
110
+ ],
111
+ "Effect": "Allow",
112
+ "Resource": {
113
+ "Ref": "testlambdasecretsmanagersecret4C99E6BF"
114
+ }
115
+ }
116
+ ],
117
+ "Version": "2012-10-17"
118
+ },
119
+ "policyName": "LambdaFunctionServiceRoleDefaultPolicy126C8897",
120
+ "roles": [
121
+ {
122
+ "Ref": "LambdaFunctionServiceRole0C4CDE0B"
123
+ }
124
+ ]
125
+ }
126
+ },
127
+ "constructInfo": {
128
+ "fqn": "aws-cdk-lib.aws_iam.CfnPolicy",
129
+ "version": "2.118.0"
130
+ }
131
+ }
132
+ },
133
+ "constructInfo": {
134
+ "fqn": "aws-cdk-lib.aws_iam.Policy",
135
+ "version": "2.118.0"
136
+ }
137
+ }
138
+ },
139
+ "constructInfo": {
140
+ "fqn": "aws-cdk-lib.aws_iam.Role",
141
+ "version": "2.118.0"
142
+ }
143
+ },
144
+ "LambdaFunction": {
145
+ "id": "LambdaFunction",
146
+ "path": "lamsec-existingFunction/LambdaFunction",
147
+ "children": {
148
+ "Code": {
149
+ "id": "Code",
150
+ "path": "lamsec-existingFunction/LambdaFunction/Code",
151
+ "children": {
152
+ "Stage": {
153
+ "id": "Stage",
154
+ "path": "lamsec-existingFunction/LambdaFunction/Code/Stage",
155
+ "constructInfo": {
156
+ "fqn": "aws-cdk-lib.AssetStaging",
157
+ "version": "2.118.0"
158
+ }
159
+ },
160
+ "AssetBucket": {
161
+ "id": "AssetBucket",
162
+ "path": "lamsec-existingFunction/LambdaFunction/Code/AssetBucket",
163
+ "constructInfo": {
164
+ "fqn": "aws-cdk-lib.aws_s3.BucketBase",
165
+ "version": "2.118.0"
166
+ }
167
+ }
168
+ },
169
+ "constructInfo": {
170
+ "fqn": "aws-cdk-lib.aws_s3_assets.Asset",
171
+ "version": "2.118.0"
172
+ }
173
+ },
174
+ "Resource": {
175
+ "id": "Resource",
176
+ "path": "lamsec-existingFunction/LambdaFunction/Resource",
177
+ "attributes": {
178
+ "aws:cdk:cloudformation:type": "AWS::Lambda::Function",
179
+ "aws:cdk:cloudformation:props": {
180
+ "code": {
181
+ "s3Bucket": {
182
+ "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
183
+ },
184
+ "s3Key": "0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8.zip"
185
+ },
186
+ "environment": {
187
+ "variables": {
188
+ "AWS_NODEJS_CONNECTION_REUSE_ENABLED": "1",
189
+ "SECRET_ARN": {
190
+ "Ref": "testlambdasecretsmanagersecret4C99E6BF"
191
+ }
192
+ }
193
+ },
194
+ "handler": "index.handler",
195
+ "role": {
196
+ "Fn::GetAtt": [
197
+ "LambdaFunctionServiceRole0C4CDE0B",
198
+ "Arn"
199
+ ]
200
+ },
201
+ "runtime": "nodejs16.x",
202
+ "tracingConfig": {
203
+ "mode": "Active"
204
+ }
205
+ }
206
+ },
207
+ "constructInfo": {
208
+ "fqn": "aws-cdk-lib.aws_lambda.CfnFunction",
209
+ "version": "2.118.0"
210
+ }
211
+ }
212
+ },
213
+ "constructInfo": {
214
+ "fqn": "aws-cdk-lib.aws_lambda.Function",
215
+ "version": "2.118.0"
216
+ }
217
+ },
218
+ "test-lambda-secretsmanager": {
219
+ "id": "test-lambda-secretsmanager",
220
+ "path": "lamsec-existingFunction/test-lambda-secretsmanager",
221
+ "children": {
222
+ "secret": {
223
+ "id": "secret",
224
+ "path": "lamsec-existingFunction/test-lambda-secretsmanager/secret",
225
+ "children": {
226
+ "Resource": {
227
+ "id": "Resource",
228
+ "path": "lamsec-existingFunction/test-lambda-secretsmanager/secret/Resource",
229
+ "attributes": {
230
+ "aws:cdk:cloudformation:type": "AWS::SecretsManager::Secret",
231
+ "aws:cdk:cloudformation:props": {
232
+ "generateSecretString": {}
233
+ }
234
+ },
235
+ "constructInfo": {
236
+ "fqn": "aws-cdk-lib.aws_secretsmanager.CfnSecret",
237
+ "version": "2.118.0"
238
+ }
239
+ }
240
+ },
241
+ "constructInfo": {
242
+ "fqn": "aws-cdk-lib.aws_secretsmanager.Secret",
243
+ "version": "2.118.0"
244
+ }
245
+ }
246
+ },
247
+ "constructInfo": {
248
+ "fqn": "@aws-solutions-constructs/aws-lambda-secretsmanager.LambdaToSecretsmanager",
249
+ "version": "2.50.0"
250
+ }
251
+ },
252
+ "Integ": {
253
+ "id": "Integ",
254
+ "path": "lamsec-existingFunction/Integ",
255
+ "children": {
256
+ "DefaultTest": {
257
+ "id": "DefaultTest",
258
+ "path": "lamsec-existingFunction/Integ/DefaultTest",
259
+ "children": {
260
+ "Default": {
261
+ "id": "Default",
262
+ "path": "lamsec-existingFunction/Integ/DefaultTest/Default",
263
+ "constructInfo": {
264
+ "fqn": "constructs.Construct",
265
+ "version": "10.0.0"
266
+ }
267
+ },
268
+ "DeployAssert": {
269
+ "id": "DeployAssert",
270
+ "path": "lamsec-existingFunction/Integ/DefaultTest/DeployAssert",
271
+ "children": {
272
+ "BootstrapVersion": {
273
+ "id": "BootstrapVersion",
274
+ "path": "lamsec-existingFunction/Integ/DefaultTest/DeployAssert/BootstrapVersion",
275
+ "constructInfo": {
276
+ "fqn": "aws-cdk-lib.CfnParameter",
277
+ "version": "2.118.0"
278
+ }
279
+ },
280
+ "CheckBootstrapVersion": {
281
+ "id": "CheckBootstrapVersion",
282
+ "path": "lamsec-existingFunction/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion",
283
+ "constructInfo": {
284
+ "fqn": "aws-cdk-lib.CfnRule",
285
+ "version": "2.118.0"
286
+ }
287
+ }
288
+ },
289
+ "constructInfo": {
290
+ "fqn": "aws-cdk-lib.Stack",
291
+ "version": "2.118.0"
292
+ }
293
+ }
294
+ },
295
+ "constructInfo": {
296
+ "fqn": "@aws-cdk/integ-tests-alpha.IntegTestCase",
297
+ "version": "2.118.0-alpha.0"
298
+ }
299
+ }
300
+ },
301
+ "constructInfo": {
302
+ "fqn": "@aws-cdk/integ-tests-alpha.IntegTest",
303
+ "version": "2.118.0-alpha.0"
304
+ }
305
+ },
306
+ "BootstrapVersion": {
307
+ "id": "BootstrapVersion",
308
+ "path": "lamsec-existingFunction/BootstrapVersion",
309
+ "constructInfo": {
310
+ "fqn": "aws-cdk-lib.CfnParameter",
311
+ "version": "2.118.0"
312
+ }
313
+ },
314
+ "CheckBootstrapVersion": {
315
+ "id": "CheckBootstrapVersion",
316
+ "path": "lamsec-existingFunction/CheckBootstrapVersion",
317
+ "constructInfo": {
318
+ "fqn": "aws-cdk-lib.CfnRule",
319
+ "version": "2.118.0"
320
+ }
321
+ }
322
+ },
323
+ "constructInfo": {
324
+ "fqn": "aws-cdk-lib.Stack",
325
+ "version": "2.118.0"
326
+ }
327
+ },
328
+ "Tree": {
329
+ "id": "Tree",
330
+ "path": "Tree",
331
+ "constructInfo": {
332
+ "fqn": "constructs.Construct",
333
+ "version": "10.0.0"
334
+ }
335
+ }
336
+ },
337
+ "constructInfo": {
338
+ "fqn": "aws-cdk-lib.App",
339
+ "version": "2.118.0"
340
+ }
341
+ }
342
+ }
@@ -1,208 +0,0 @@
1
- {
2
- "Description": "Integration Test for aws-lambda-secretsmanager",
3
- "Resources": {
4
- "testlambdasecretsmanagerLambdaFunctionServiceRole92CE007F": {
5
- "Type": "AWS::IAM::Role",
6
- "Properties": {
7
- "AssumeRolePolicyDocument": {
8
- "Statement": [
9
- {
10
- "Action": "sts:AssumeRole",
11
- "Effect": "Allow",
12
- "Principal": {
13
- "Service": "lambda.amazonaws.com"
14
- }
15
- }
16
- ],
17
- "Version": "2012-10-17"
18
- },
19
- "Policies": [
20
- {
21
- "PolicyDocument": {
22
- "Statement": [
23
- {
24
- "Action": [
25
- "logs:CreateLogGroup",
26
- "logs:CreateLogStream",
27
- "logs:PutLogEvents"
28
- ],
29
- "Effect": "Allow",
30
- "Resource": {
31
- "Fn::Join": [
32
- "",
33
- [
34
- "arn:",
35
- {
36
- "Ref": "AWS::Partition"
37
- },
38
- ":logs:",
39
- {
40
- "Ref": "AWS::Region"
41
- },
42
- ":",
43
- {
44
- "Ref": "AWS::AccountId"
45
- },
46
- ":log-group:/aws/lambda/*"
47
- ]
48
- ]
49
- }
50
- }
51
- ],
52
- "Version": "2012-10-17"
53
- },
54
- "PolicyName": "LambdaFunctionServiceRolePolicy"
55
- }
56
- ]
57
- }
58
- },
59
- "testlambdasecretsmanagerLambdaFunctionServiceRoleDefaultPolicyF24BF460": {
60
- "Type": "AWS::IAM::Policy",
61
- "Properties": {
62
- "PolicyDocument": {
63
- "Statement": [
64
- {
65
- "Action": [
66
- "xray:PutTraceSegments",
67
- "xray:PutTelemetryRecords"
68
- ],
69
- "Effect": "Allow",
70
- "Resource": "*"
71
- },
72
- {
73
- "Action": [
74
- "secretsmanager:GetSecretValue",
75
- "secretsmanager:DescribeSecret"
76
- ],
77
- "Effect": "Allow",
78
- "Resource": {
79
- "Ref": "testlambdasecretsmanagersecret4C99E6BF"
80
- }
81
- }
82
- ],
83
- "Version": "2012-10-17"
84
- },
85
- "PolicyName": "testlambdasecretsmanagerLambdaFunctionServiceRoleDefaultPolicyF24BF460",
86
- "Roles": [
87
- {
88
- "Ref": "testlambdasecretsmanagerLambdaFunctionServiceRole92CE007F"
89
- }
90
- ]
91
- },
92
- "Metadata": {
93
- "cfn_nag": {
94
- "rules_to_suppress": [
95
- {
96
- "id": "W12",
97
- "reason": "Lambda needs the following minimum required permissions to send trace data to X-Ray and access ENIs in a VPC."
98
- }
99
- ]
100
- }
101
- }
102
- },
103
- "testlambdasecretsmanagerLambdaFunction130E7301": {
104
- "Type": "AWS::Lambda::Function",
105
- "Properties": {
106
- "Code": {
107
- "S3Bucket": {
108
- "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
109
- },
110
- "S3Key": "0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8.zip"
111
- },
112
- "Environment": {
113
- "Variables": {
114
- "AWS_NODEJS_CONNECTION_REUSE_ENABLED": "1",
115
- "SECRET_ARN": {
116
- "Ref": "testlambdasecretsmanagersecret4C99E6BF"
117
- }
118
- }
119
- },
120
- "Handler": "index.handler",
121
- "Role": {
122
- "Fn::GetAtt": [
123
- "testlambdasecretsmanagerLambdaFunctionServiceRole92CE007F",
124
- "Arn"
125
- ]
126
- },
127
- "Runtime": "nodejs16.x",
128
- "TracingConfig": {
129
- "Mode": "Active"
130
- }
131
- },
132
- "DependsOn": [
133
- "testlambdasecretsmanagerLambdaFunctionServiceRoleDefaultPolicyF24BF460",
134
- "testlambdasecretsmanagerLambdaFunctionServiceRole92CE007F"
135
- ],
136
- "Metadata": {
137
- "cfn_nag": {
138
- "rules_to_suppress": [
139
- {
140
- "id": "W58",
141
- "reason": "Lambda functions has the required permission to write CloudWatch Logs. It uses custom policy instead of arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole with tighter permissions."
142
- },
143
- {
144
- "id": "W89",
145
- "reason": "This is not a rule for the general case, just for specific use cases/industries"
146
- },
147
- {
148
- "id": "W92",
149
- "reason": "Impossible for us to define the correct concurrency for clients"
150
- }
151
- ]
152
- }
153
- }
154
- },
155
- "testlambdasecretsmanagersecret4C99E6BF": {
156
- "Type": "AWS::SecretsManager::Secret",
157
- "Properties": {
158
- "GenerateSecretString": {}
159
- },
160
- "UpdateReplacePolicy": "Delete",
161
- "DeletionPolicy": "Delete",
162
- "Metadata": {
163
- "cfn_nag": {
164
- "rules_to_suppress": [
165
- {
166
- "id": "W77",
167
- "reason": "We allow the use of the AWS account default key aws/secretsmanager for secret encryption."
168
- }
169
- ]
170
- }
171
- }
172
- }
173
- },
174
- "Parameters": {
175
- "BootstrapVersion": {
176
- "Type": "AWS::SSM::Parameter::Value<String>",
177
- "Default": "/cdk-bootstrap/hnb659fds/version",
178
- "Description": "Version of the CDK Bootstrap resources in this environment, automatically retrieved from SSM Parameter Store. [cdk:skip]"
179
- }
180
- },
181
- "Rules": {
182
- "CheckBootstrapVersion": {
183
- "Assertions": [
184
- {
185
- "Assert": {
186
- "Fn::Not": [
187
- {
188
- "Fn::Contains": [
189
- [
190
- "1",
191
- "2",
192
- "3",
193
- "4",
194
- "5"
195
- ],
196
- {
197
- "Ref": "BootstrapVersion"
198
- }
199
- ]
200
- }
201
- ]
202
- },
203
- "AssertDescription": "CDK bootstrap stack version 6 required. Please run 'cdk bootstrap' with a recent version of the CDK CLI."
204
- }
205
- ]
206
- }
207
- }
208
- }