@aws-solutions-constructs/aws-lambda-secretsmanager 2.51.0 → 2.52.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (53) hide show
  1. package/.eslintignore +2 -0
  2. package/.jsii +49 -4
  3. package/integ.config.json +7 -0
  4. package/lib/index.js +1 -1
  5. package/package.json +9 -8
  6. package/test/integ.lamsec-deployFunction.js +5 -2
  7. package/test/integ.lamsec-deployFunction.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +8 -0
  8. package/test/integ.lamsec-deployFunction.js.snapshot/cdk.out +1 -0
  9. package/test/integ.lamsec-deployFunction.js.snapshot/integ.json +12 -0
  10. package/test/integ.lamsec-deployFunction.js.snapshot/lamsec-deployFunction.assets.json +32 -0
  11. package/test/integ.lamsec-deployFunction.js.snapshot/lamsec-deployFunction.template.json +208 -0
  12. package/test/integ.lamsec-deployFunction.js.snapshot/lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA.assets.json +19 -0
  13. package/test/integ.lamsec-deployFunction.js.snapshot/lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA.template.json +36 -0
  14. package/test/integ.lamsec-deployFunction.js.snapshot/manifest.json +131 -0
  15. package/test/integ.lamsec-deployFunction.js.snapshot/tree.json +342 -0
  16. package/test/integ.lamsec-deployFunctionWithExistingVpc.js +6 -2
  17. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +8 -0
  18. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/__entrypoint__.js +1 -0
  19. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/index.js +1 -0
  20. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/cdk.out +1 -0
  21. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/integ.json +12 -0
  22. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsec-deployFunctionWithExistingVpc.assets.json +45 -0
  23. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsec-deployFunctionWithExistingVpc.template.json +1019 -0
  24. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsecdeployFunctionWithExistingVpcIntegDefaultTestDeployAssert647243A7.assets.json +19 -0
  25. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsecdeployFunctionWithExistingVpcIntegDefaultTestDeployAssert647243A7.template.json +36 -0
  26. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/manifest.json +329 -0
  27. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/tree.json +1393 -0
  28. package/test/integ.lamsec-deployFunctionWithVpc.js +6 -2
  29. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +8 -0
  30. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/__entrypoint__.js +1 -0
  31. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/index.js +1 -0
  32. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/cdk.out +1 -0
  33. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/integ.json +12 -0
  34. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.assets.json +45 -0
  35. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.template.json +735 -0
  36. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsecdeployFunctionWithVpcIntegDefaultTestDeployAssert66148FF5.assets.json +19 -0
  37. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsecdeployFunctionWithVpcIntegDefaultTestDeployAssert66148FF5.template.json +36 -0
  38. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/manifest.json +233 -0
  39. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/tree.json +981 -0
  40. package/test/integ.lamsec-existingFunction.js +5 -2
  41. package/test/integ.lamsec-existingFunction.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +8 -0
  42. package/test/integ.lamsec-existingFunction.js.snapshot/cdk.out +1 -0
  43. package/test/integ.lamsec-existingFunction.js.snapshot/integ.json +12 -0
  44. package/test/integ.lamsec-existingFunction.js.snapshot/lamsec-existingFunction.assets.json +32 -0
  45. package/test/integ.lamsec-existingFunction.js.snapshot/lamsec-existingFunction.template.json +208 -0
  46. package/test/integ.lamsec-existingFunction.js.snapshot/lamsecexistingFunctionIntegDefaultTestDeployAssert295B352B.assets.json +19 -0
  47. package/test/integ.lamsec-existingFunction.js.snapshot/lamsecexistingFunctionIntegDefaultTestDeployAssert295B352B.template.json +36 -0
  48. package/test/integ.lamsec-existingFunction.js.snapshot/manifest.json +131 -0
  49. package/test/integ.lamsec-existingFunction.js.snapshot/tree.json +342 -0
  50. package/test/integ.lamsec-deployFunction.expected.json +0 -208
  51. package/test/integ.lamsec-deployFunctionWithExistingVpc.expected.json +0 -1044
  52. package/test/integ.lamsec-deployFunctionWithVpc.expected.json +0 -650
  53. package/test/integ.lamsec-existingFunction.expected.json +0 -208
package/.eslintignore CHANGED
@@ -2,4 +2,6 @@ lib/*.js
2
2
  test/*.js
3
3
  *.d.ts
4
4
  coverage
5
+ test/integ.*.js.snapshot/
6
+ test/cdk-integ.out.integ.*.snapshot
5
7
  test/lambda/index.js
package/.jsii CHANGED
@@ -8,8 +8,9 @@
8
8
  "url": "https://aws.amazon.com"
9
9
  },
10
10
  "dependencies": {
11
- "@aws-solutions-constructs/core": "2.51.0",
12
- "aws-cdk-lib": "^2.118.0",
11
+ "@aws-cdk/integ-tests-alpha": "2.127.0-alpha.0",
12
+ "@aws-solutions-constructs/core": "2.52.1",
13
+ "aws-cdk-lib": "^2.127.0",
13
14
  "constructs": "^10.0.0"
14
15
  },
15
16
  "dependencyClosure": {
@@ -91,6 +92,37 @@
91
92
  }
92
93
  }
93
94
  },
95
+ "@aws-cdk/integ-tests-alpha": {
96
+ "targets": {
97
+ "dotnet": {
98
+ "iconUrl": "https://raw.githubusercontent.com/aws/aws-cdk/main/logo/default-256-dark.png",
99
+ "namespace": "Amazon.CDK.IntegTests.Alpha",
100
+ "packageId": "Amazon.CDK.IntegTests.Alpha"
101
+ },
102
+ "go": {
103
+ "moduleName": "github.com/aws/aws-cdk-go",
104
+ "packageName": "awscdkintegtestsalpha"
105
+ },
106
+ "java": {
107
+ "maven": {
108
+ "artifactId": "cdk-integ-tests-alpha",
109
+ "groupId": "software.amazon.awscdk"
110
+ },
111
+ "package": "software.amazon.awscdk.integtests.alpha"
112
+ },
113
+ "js": {
114
+ "npm": "@aws-cdk/integ-tests-alpha"
115
+ },
116
+ "python": {
117
+ "classifiers": [
118
+ "Framework :: AWS CDK",
119
+ "Framework :: AWS CDK :: 2"
120
+ ],
121
+ "distName": "aws-cdk.integ-tests-alpha",
122
+ "module": "aws_cdk.integ_tests_alpha"
123
+ }
124
+ }
125
+ },
94
126
  "@aws-solutions-constructs/core": {
95
127
  "targets": {
96
128
  "dotnet": {
@@ -1004,6 +1036,19 @@
1004
1036
  }
1005
1037
  }
1006
1038
  },
1039
+ "aws-cdk-lib.aws_datazone": {
1040
+ "targets": {
1041
+ "dotnet": {
1042
+ "package": "Amazon.CDK.AWS.DataZone"
1043
+ },
1044
+ "java": {
1045
+ "package": "software.amazon.awscdk.services.datazone"
1046
+ },
1047
+ "python": {
1048
+ "module": "aws_cdk.aws_datazone"
1049
+ }
1050
+ }
1051
+ },
1007
1052
  "aws-cdk-lib.aws_dax": {
1008
1053
  "targets": {
1009
1054
  "dotnet": {
@@ -3975,6 +4020,6 @@
3975
4020
  "symbolId": "lib/index:LambdaToSecretsmanagerProps"
3976
4021
  }
3977
4022
  },
3978
- "version": "2.51.0",
3979
- "fingerprint": "oKQ+ILTvJUxo1QaojsFLIGwRvpcDH2vP5ds4/pGQfcg="
4023
+ "version": "2.52.1",
4024
+ "fingerprint": "PIu8Z9A6vNit9v1t0JFxVrCjXQoWhvh2nlHls7k+gpI="
3980
4025
  }
@@ -0,0 +1,7 @@
1
+ {
2
+ "parallelRegions": [
3
+ "us-east-1"
4
+ ],
5
+ "disable-update-workflow": true,
6
+ "update-on-failed": false
7
+ }
package/lib/index.js CHANGED
@@ -71,5 +71,5 @@ class LambdaToSecretsmanager extends constructs_1.Construct {
71
71
  }
72
72
  exports.LambdaToSecretsmanager = LambdaToSecretsmanager;
73
73
  _a = JSII_RTTI_SYMBOL_1;
74
- LambdaToSecretsmanager[_a] = { fqn: "@aws-solutions-constructs/aws-lambda-secretsmanager.LambdaToSecretsmanager", version: "2.51.0" };
74
+ LambdaToSecretsmanager[_a] = { fqn: "@aws-solutions-constructs/aws-lambda-secretsmanager.LambdaToSecretsmanager", version: "2.52.1" };
75
75
  //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["index.ts"],"names":[],"mappings":";;;;;AAAA;;;;;;;;;;;GAWG;AAEH,UAAU;AACV,2DAA2D;AAI3D,2CAAuC;AA2DvC;;GAEG;AACH,MAAa,sBAAuB,SAAQ,sBAAS;IAKjD;;;;;;OAMG;IACH,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAkC;QAC1E,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,QAAQ,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC;QAC9B,QAAQ,CAAC,gBAAgB,CAAC,KAAK,CAAC,CAAC;QACjC,QAAQ,CAAC,wBAAwB,CAAC,KAAK,CAAC,CAAC;QAEzC,IAAI,KAAK,CAAC,SAAS,IAAI,KAAK,CAAC,WAAW,EAAE;YAExC,IAAI,CAAC,GAAG,GAAG,QAAQ,CAAC,QAAQ,CAAC,KAAK,EAAE;gBAClC,eAAe,EAAE,QAAQ,CAAC,uBAAuB,EAAE;gBACnD,WAAW,EAAE,KAAK,CAAC,WAAW;gBAC9B,YAAY,EAAE,KAAK,CAAC,QAAQ;gBAC5B,iBAAiB,EAAE;oBACjB,kBAAkB,EAAE,IAAI;oBACxB,gBAAgB,EAAE,IAAI;iBACvB;aACF,CAAC,CAAC;YAEH,QAAQ,CAAC,qBAAqB,CAAC,KAAK,EAAE,IAAI,CAAC,GAAG,EAAE,QAAQ,CAAC,oBAAoB,CAAC,eAAe,CAAC,CAAC;SAChG;QAED,4BAA4B;QAC5B,IAAI,CAAC,cAAc,GAAG,QAAQ,CAAC,mBAAmB,CAAC,IAAI,EAAE;YACvD,iBAAiB,EAAE,KAAK,CAAC,iBAAiB;YAC1C,mBAAmB,EAAE,KAAK,CAAC,mBAAmB;YAC9C,GAAG,EAAE,IAAI,CAAC,GAAG;SACd,CAAC,CAAC;QAEH,mBAAmB;QACnB,IAAI,KAAK,CAAC,iBAAiB,EAAE;YAC3B,IAAI,CAAC,MAAM,GAAG,KAAK,CAAC,iBAAiB,CAAC;SACvC;aAAM;YACL,IAAI,CAAC,MAAM,GAAG,QAAQ,CAAC,yBAAyB,CAAC,IAAI,EAAE,QAAQ,EAAE,KAAK,CAAC,WAAW,CAAC,CAAC;SACrF;QAED,kCAAkC;QAClC,MAAM,6BAA6B,GAAG,KAAK,CAAC,6BAA6B,IAAI,YAAY,CAAC;QAC1F,IAAI,CAAC,cAAc,CAAC,cAAc,CAAC,6BAA6B,EAAE,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;QAEzF,6DAA6D;QAC7D,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC;QAE3C,IAAI,KAAK,CAAC,gBAAgB,KAAK,WAAW,EAAE;YAC1C,IAAI,CAAC,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC;SAC7C;IACH,CAAC;;AAzDL,wDA0DC","sourcesContent":["/**\n *  Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n *\n *  Licensed under the Apache License, Version 2.0 (the \"License\"). You may not use this file except in compliance\n *  with the License. A copy of the License is located at\n *\n *      http://www.apache.org/licenses/LICENSE-2.0\n *\n *  or in the 'license' file accompanying this file. This file is distributed on an 'AS IS' BASIS, WITHOUT WARRANTIES\n *  OR CONDITIONS OF ANY KIND, express or implied. See the License for the specific language governing permissions\n *  and limitations under the License.\n */\n\n// Imports\nimport * as defaults from \"@aws-solutions-constructs/core\";\nimport * as lambda from \"aws-cdk-lib/aws-lambda\";\nimport * as secretsmanager from \"aws-cdk-lib/aws-secretsmanager\";\nimport * as ec2 from \"aws-cdk-lib/aws-ec2\";\nimport { Construct } from \"constructs\";\n\n/**\n * @summary The properties for the LambdaToSecretsmanager class.\n */\nexport interface LambdaToSecretsmanagerProps {\n  /**\n   * Existing instance of Lambda Function object, providing both this and `lambdaFunctionProps` will cause an error.\n   *\n   * @default - None\n   */\n  readonly existingLambdaObj?: lambda.Function;\n  /**\n   * User provided props to override the default props for the Lambda function.\n   *\n   * @default - Default properties are used.\n   */\n  readonly lambdaFunctionProps?: lambda.FunctionProps;\n  /**\n   * Existing instance of Secret object, providing both this and secretProps will cause an error.\n   *\n   * @default - Default props are used\n   */\n  readonly existingSecretObj?: secretsmanager.Secret;\n  /**\n   * Optional user-provided props to override the default props for the Secret.\n   *\n   * @default - Default props are used\n   */\n  readonly secretProps?: secretsmanager.SecretProps;\n  /**\n   * An existing VPC for the construct to use (construct will NOT create a new VPC in this case)\n   */\n  readonly existingVpc?: ec2.IVpc;\n  /**\n   * Properties to override default properties if deployVpc is true\n   */\n  readonly vpcProps?: ec2.VpcProps;\n  /**\n   * Whether to deploy a new VPC\n   *\n   * @default - false\n   */\n  readonly deployVpc?: boolean;\n  /**\n   * Optional Name for the Lambda function environment variable set to the ARN of the secret.\n   *\n   * @default - SECRET_ARN\n   */\n  readonly secretEnvironmentVariableName?: string;\n  /**\n   * Optional secret permissions to grant to the Lambda function.\n   * One of the following may be specified: \"Read\" or \"ReadWrite\".\n   *\n   * @default - Read only access is given to the Lambda function if no value is specified.\n   */\n  readonly grantWriteAccess?: string;\n}\n\n/**\n * @summary The LambdaToSecretsmanager class.\n */\nexport class LambdaToSecretsmanager extends Construct {\n    public readonly lambdaFunction: lambda.Function;\n    public readonly secret: secretsmanager.Secret;\n    public readonly vpc?: ec2.IVpc;\n\n    /**\n     * @summary Constructs a new instance of the LambdaToSecretsmanager class.\n     * @param {cdk.App} scope - represents the scope for all the resources.\n     * @param {string} id - this is a a scope-unique id.\n     * @param {LambdaToSecretsmanagerProps} props - user provided props for the construct.\n     * @access public\n     */\n    constructor(scope: Construct, id: string, props: LambdaToSecretsmanagerProps) {\n      super(scope, id);\n      defaults.CheckVpcProps(props);\n      defaults.CheckLambdaProps(props);\n      defaults.CheckSecretsManagerProps(props);\n\n      if (props.deployVpc || props.existingVpc) {\n\n        this.vpc = defaults.buildVpc(scope, {\n          defaultVpcProps: defaults.DefaultIsolatedVpcProps(),\n          existingVpc: props.existingVpc,\n          userVpcProps: props.vpcProps,\n          constructVpcProps: {\n            enableDnsHostnames: true,\n            enableDnsSupport: true,\n          },\n        });\n\n        defaults.AddAwsServiceEndpoint(scope, this.vpc, defaults.ServiceEndpointTypes.SECRETS_MANAGER);\n      }\n\n      // Setup the Lambda function\n      this.lambdaFunction = defaults.buildLambdaFunction(this, {\n        existingLambdaObj: props.existingLambdaObj,\n        lambdaFunctionProps: props.lambdaFunctionProps,\n        vpc: this.vpc,\n      });\n\n      // Setup the Secret\n      if (props.existingSecretObj) {\n        this.secret = props.existingSecretObj;\n      } else {\n        this.secret = defaults.buildSecretsManagerSecret(this, 'secret', props.secretProps);\n      }\n\n      // Configure environment variables\n      const secretEnvironmentVariableName = props.secretEnvironmentVariableName || 'SECRET_ARN';\n      this.lambdaFunction.addEnvironment(secretEnvironmentVariableName, this.secret.secretArn);\n\n      // Enable read permissions for the Lambda function by default\n      this.secret.grantRead(this.lambdaFunction);\n\n      if (props.grantWriteAccess === 'ReadWrite') {\n        this.secret.grantWrite(this.lambdaFunction);\n      }\n    }\n}\n"]}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@aws-solutions-constructs/aws-lambda-secretsmanager",
3
- "version": "2.51.0",
3
+ "version": "2.52.1",
4
4
  "description": "CDK constructs for defining an interaction between an AWS Lambda function and AWS Secrets Manager.",
5
5
  "main": "lib/index.js",
6
6
  "types": "lib/index.d.ts",
@@ -22,9 +22,9 @@
22
22
  "test": "jest --coverage",
23
23
  "clean": "tsc -b --clean",
24
24
  "watch": "tsc -b -w",
25
- "integ": "cdk-integ",
26
- "integ-assert": "cdk-integ-assert-v2",
27
- "integ-no-clean": "cdk-integ --no-clean",
25
+ "integ": "integ-runner --update-on-failed",
26
+ "integ-assert": "integ-runner",
27
+ "integ-no-clean": "integ-runner --update-on-failed --no-clean",
28
28
  "jsii": "jsii",
29
29
  "jsii-pacmak": "jsii-pacmak",
30
30
  "build+lint+test": "npm run jsii && npm run lint && npm test && npm run integ-assert",
@@ -53,14 +53,15 @@
53
53
  }
54
54
  },
55
55
  "dependencies": {
56
- "@aws-solutions-constructs/core": "2.51.0",
56
+ "@aws-cdk/integ-tests-alpha": "2.127.0-alpha.0",
57
+ "@aws-solutions-constructs/core": "2.52.1",
57
58
  "constructs": "^10.0.0"
58
59
  },
59
60
  "devDependencies": {
60
61
  "@types/jest": "^24.0.23",
61
62
  "@types/node": "^10.3.0",
62
63
  "constructs": "^10.0.0",
63
- "aws-cdk-lib": "2.118.0"
64
+ "aws-cdk-lib": "2.127.0"
64
65
  },
65
66
  "jest": {
66
67
  "moduleFileExtensions": [
@@ -68,9 +69,9 @@
68
69
  ]
69
70
  },
70
71
  "peerDependencies": {
71
- "@aws-solutions-constructs/core": "2.51.0",
72
+ "@aws-solutions-constructs/core": "2.52.1",
72
73
  "constructs": "^10.0.0",
73
- "aws-cdk-lib": "^2.118.0"
74
+ "aws-cdk-lib": "^2.127.0"
74
75
  },
75
76
  "keywords": [
76
77
  "aws",
@@ -17,6 +17,7 @@ const aws_cdk_lib_1 = require("aws-cdk-lib");
17
17
  const lib_1 = require("../lib");
18
18
  const lambda = require("aws-cdk-lib/aws-lambda");
19
19
  const core_1 = require("@aws-solutions-constructs/core");
20
+ const integ_tests_alpha_1 = require("@aws-cdk/integ-tests-alpha");
20
21
  // Setup
21
22
  const app = new aws_cdk_lib_1.App();
22
23
  const stack = new aws_cdk_lib_1.Stack(app, core_1.generateIntegStackName(__filename));
@@ -34,5 +35,7 @@ const props = {
34
35
  };
35
36
  new lib_1.LambdaToSecretsmanager(stack, 'test-lambda-secretsmanager', props);
36
37
  // Synth
37
- app.synth();
38
- //# sourceMappingURL=data:application/json;base64,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
38
+ new integ_tests_alpha_1.IntegTest(stack, 'Integ', { testCases: [
39
+ stack
40
+ ] });
41
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,8 @@
1
+ exports.handler = async function(event) {
2
+ console.log('request:', JSON.stringify(event, undefined, 2));
3
+ return {
4
+ statusCode: 200,
5
+ headers: { 'Content-Type': 'text/plain' },
6
+ body: `Hello, CDK! You've hit ${event.path}\n`
7
+ };
8
+ };
@@ -0,0 +1 @@
1
+ {"version":"36.0.0"}
@@ -0,0 +1,12 @@
1
+ {
2
+ "version": "36.0.0",
3
+ "testCases": {
4
+ "lamsec-deployFunction/Integ/DefaultTest": {
5
+ "stacks": [
6
+ "lamsec-deployFunction"
7
+ ],
8
+ "assertionStack": "lamsec-deployFunction/Integ/DefaultTest/DeployAssert",
9
+ "assertionStackName": "lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA"
10
+ }
11
+ }
12
+ }
@@ -0,0 +1,32 @@
1
+ {
2
+ "version": "36.0.0",
3
+ "files": {
4
+ "0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8": {
5
+ "source": {
6
+ "path": "asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8",
7
+ "packaging": "zip"
8
+ },
9
+ "destinations": {
10
+ "current_account-current_region": {
11
+ "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
12
+ "objectKey": "0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8.zip",
13
+ "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
14
+ }
15
+ }
16
+ },
17
+ "880b5cdeae07a9007bf7d25f1a6dc9eac8b90346d0ab395a963b93545506f0f0": {
18
+ "source": {
19
+ "path": "lamsec-deployFunction.template.json",
20
+ "packaging": "file"
21
+ },
22
+ "destinations": {
23
+ "current_account-current_region": {
24
+ "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
25
+ "objectKey": "880b5cdeae07a9007bf7d25f1a6dc9eac8b90346d0ab395a963b93545506f0f0.json",
26
+ "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
27
+ }
28
+ }
29
+ }
30
+ },
31
+ "dockerImages": {}
32
+ }
@@ -0,0 +1,208 @@
1
+ {
2
+ "Description": "Integration Test for aws-lambda-secretsmanager",
3
+ "Resources": {
4
+ "testlambdasecretsmanagerLambdaFunctionServiceRole92CE007F": {
5
+ "Type": "AWS::IAM::Role",
6
+ "Properties": {
7
+ "AssumeRolePolicyDocument": {
8
+ "Statement": [
9
+ {
10
+ "Action": "sts:AssumeRole",
11
+ "Effect": "Allow",
12
+ "Principal": {
13
+ "Service": "lambda.amazonaws.com"
14
+ }
15
+ }
16
+ ],
17
+ "Version": "2012-10-17"
18
+ },
19
+ "Policies": [
20
+ {
21
+ "PolicyDocument": {
22
+ "Statement": [
23
+ {
24
+ "Action": [
25
+ "logs:CreateLogGroup",
26
+ "logs:CreateLogStream",
27
+ "logs:PutLogEvents"
28
+ ],
29
+ "Effect": "Allow",
30
+ "Resource": {
31
+ "Fn::Join": [
32
+ "",
33
+ [
34
+ "arn:",
35
+ {
36
+ "Ref": "AWS::Partition"
37
+ },
38
+ ":logs:",
39
+ {
40
+ "Ref": "AWS::Region"
41
+ },
42
+ ":",
43
+ {
44
+ "Ref": "AWS::AccountId"
45
+ },
46
+ ":log-group:/aws/lambda/*"
47
+ ]
48
+ ]
49
+ }
50
+ }
51
+ ],
52
+ "Version": "2012-10-17"
53
+ },
54
+ "PolicyName": "LambdaFunctionServiceRolePolicy"
55
+ }
56
+ ]
57
+ }
58
+ },
59
+ "testlambdasecretsmanagerLambdaFunctionServiceRoleDefaultPolicyF24BF460": {
60
+ "Type": "AWS::IAM::Policy",
61
+ "Properties": {
62
+ "PolicyDocument": {
63
+ "Statement": [
64
+ {
65
+ "Action": [
66
+ "xray:PutTelemetryRecords",
67
+ "xray:PutTraceSegments"
68
+ ],
69
+ "Effect": "Allow",
70
+ "Resource": "*"
71
+ },
72
+ {
73
+ "Action": [
74
+ "secretsmanager:DescribeSecret",
75
+ "secretsmanager:GetSecretValue"
76
+ ],
77
+ "Effect": "Allow",
78
+ "Resource": {
79
+ "Ref": "testlambdasecretsmanagersecret4C99E6BF"
80
+ }
81
+ }
82
+ ],
83
+ "Version": "2012-10-17"
84
+ },
85
+ "PolicyName": "testlambdasecretsmanagerLambdaFunctionServiceRoleDefaultPolicyF24BF460",
86
+ "Roles": [
87
+ {
88
+ "Ref": "testlambdasecretsmanagerLambdaFunctionServiceRole92CE007F"
89
+ }
90
+ ]
91
+ },
92
+ "Metadata": {
93
+ "cfn_nag": {
94
+ "rules_to_suppress": [
95
+ {
96
+ "id": "W12",
97
+ "reason": "Lambda needs the following minimum required permissions to send trace data to X-Ray and access ENIs in a VPC."
98
+ }
99
+ ]
100
+ }
101
+ }
102
+ },
103
+ "testlambdasecretsmanagerLambdaFunction130E7301": {
104
+ "Type": "AWS::Lambda::Function",
105
+ "Properties": {
106
+ "Code": {
107
+ "S3Bucket": {
108
+ "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
109
+ },
110
+ "S3Key": "0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8.zip"
111
+ },
112
+ "Environment": {
113
+ "Variables": {
114
+ "AWS_NODEJS_CONNECTION_REUSE_ENABLED": "1",
115
+ "SECRET_ARN": {
116
+ "Ref": "testlambdasecretsmanagersecret4C99E6BF"
117
+ }
118
+ }
119
+ },
120
+ "Handler": "index.handler",
121
+ "Role": {
122
+ "Fn::GetAtt": [
123
+ "testlambdasecretsmanagerLambdaFunctionServiceRole92CE007F",
124
+ "Arn"
125
+ ]
126
+ },
127
+ "Runtime": "nodejs16.x",
128
+ "TracingConfig": {
129
+ "Mode": "Active"
130
+ }
131
+ },
132
+ "DependsOn": [
133
+ "testlambdasecretsmanagerLambdaFunctionServiceRoleDefaultPolicyF24BF460",
134
+ "testlambdasecretsmanagerLambdaFunctionServiceRole92CE007F"
135
+ ],
136
+ "Metadata": {
137
+ "cfn_nag": {
138
+ "rules_to_suppress": [
139
+ {
140
+ "id": "W58",
141
+ "reason": "Lambda functions has the required permission to write CloudWatch Logs. It uses custom policy instead of arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole with tighter permissions."
142
+ },
143
+ {
144
+ "id": "W89",
145
+ "reason": "This is not a rule for the general case, just for specific use cases/industries"
146
+ },
147
+ {
148
+ "id": "W92",
149
+ "reason": "Impossible for us to define the correct concurrency for clients"
150
+ }
151
+ ]
152
+ }
153
+ }
154
+ },
155
+ "testlambdasecretsmanagersecret4C99E6BF": {
156
+ "Type": "AWS::SecretsManager::Secret",
157
+ "Properties": {
158
+ "GenerateSecretString": {}
159
+ },
160
+ "UpdateReplacePolicy": "Delete",
161
+ "DeletionPolicy": "Delete",
162
+ "Metadata": {
163
+ "cfn_nag": {
164
+ "rules_to_suppress": [
165
+ {
166
+ "id": "W77",
167
+ "reason": "We allow the use of the AWS account default key aws/secretsmanager for secret encryption."
168
+ }
169
+ ]
170
+ }
171
+ }
172
+ }
173
+ },
174
+ "Parameters": {
175
+ "BootstrapVersion": {
176
+ "Type": "AWS::SSM::Parameter::Value<String>",
177
+ "Default": "/cdk-bootstrap/hnb659fds/version",
178
+ "Description": "Version of the CDK Bootstrap resources in this environment, automatically retrieved from SSM Parameter Store. [cdk:skip]"
179
+ }
180
+ },
181
+ "Rules": {
182
+ "CheckBootstrapVersion": {
183
+ "Assertions": [
184
+ {
185
+ "Assert": {
186
+ "Fn::Not": [
187
+ {
188
+ "Fn::Contains": [
189
+ [
190
+ "1",
191
+ "2",
192
+ "3",
193
+ "4",
194
+ "5"
195
+ ],
196
+ {
197
+ "Ref": "BootstrapVersion"
198
+ }
199
+ ]
200
+ }
201
+ ]
202
+ },
203
+ "AssertDescription": "CDK bootstrap stack version 6 required. Please run 'cdk bootstrap' with a recent version of the CDK CLI."
204
+ }
205
+ ]
206
+ }
207
+ }
208
+ }
@@ -0,0 +1,19 @@
1
+ {
2
+ "version": "36.0.0",
3
+ "files": {
4
+ "21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22": {
5
+ "source": {
6
+ "path": "lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA.template.json",
7
+ "packaging": "file"
8
+ },
9
+ "destinations": {
10
+ "current_account-current_region": {
11
+ "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
12
+ "objectKey": "21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22.json",
13
+ "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
14
+ }
15
+ }
16
+ }
17
+ },
18
+ "dockerImages": {}
19
+ }
@@ -0,0 +1,36 @@
1
+ {
2
+ "Parameters": {
3
+ "BootstrapVersion": {
4
+ "Type": "AWS::SSM::Parameter::Value<String>",
5
+ "Default": "/cdk-bootstrap/hnb659fds/version",
6
+ "Description": "Version of the CDK Bootstrap resources in this environment, automatically retrieved from SSM Parameter Store. [cdk:skip]"
7
+ }
8
+ },
9
+ "Rules": {
10
+ "CheckBootstrapVersion": {
11
+ "Assertions": [
12
+ {
13
+ "Assert": {
14
+ "Fn::Not": [
15
+ {
16
+ "Fn::Contains": [
17
+ [
18
+ "1",
19
+ "2",
20
+ "3",
21
+ "4",
22
+ "5"
23
+ ],
24
+ {
25
+ "Ref": "BootstrapVersion"
26
+ }
27
+ ]
28
+ }
29
+ ]
30
+ },
31
+ "AssertDescription": "CDK bootstrap stack version 6 required. Please run 'cdk bootstrap' with a recent version of the CDK CLI."
32
+ }
33
+ ]
34
+ }
35
+ }
36
+ }
@@ -0,0 +1,131 @@
1
+ {
2
+ "version": "36.0.0",
3
+ "artifacts": {
4
+ "lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA.assets": {
5
+ "type": "cdk:asset-manifest",
6
+ "properties": {
7
+ "file": "lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA.assets.json",
8
+ "requiresBootstrapStackVersion": 6,
9
+ "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version"
10
+ }
11
+ },
12
+ "lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA": {
13
+ "type": "aws:cloudformation:stack",
14
+ "environment": "aws://unknown-account/unknown-region",
15
+ "properties": {
16
+ "templateFile": "lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA.template.json",
17
+ "terminationProtection": false,
18
+ "validateOnSynth": false,
19
+ "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
20
+ "cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
21
+ "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22.json",
22
+ "requiresBootstrapStackVersion": 6,
23
+ "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
24
+ "additionalDependencies": [
25
+ "lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA.assets"
26
+ ],
27
+ "lookupRole": {
28
+ "arn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-lookup-role-${AWS::AccountId}-${AWS::Region}",
29
+ "requiresBootstrapStackVersion": 8,
30
+ "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version"
31
+ }
32
+ },
33
+ "dependencies": [
34
+ "lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA.assets"
35
+ ],
36
+ "metadata": {
37
+ "/lamsec-deployFunction/Integ/DefaultTest/DeployAssert/BootstrapVersion": [
38
+ {
39
+ "type": "aws:cdk:logicalId",
40
+ "data": "BootstrapVersion"
41
+ }
42
+ ],
43
+ "/lamsec-deployFunction/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion": [
44
+ {
45
+ "type": "aws:cdk:logicalId",
46
+ "data": "CheckBootstrapVersion"
47
+ }
48
+ ]
49
+ },
50
+ "displayName": "lamsec-deployFunction/Integ/DefaultTest/DeployAssert"
51
+ },
52
+ "lamsec-deployFunction.assets": {
53
+ "type": "cdk:asset-manifest",
54
+ "properties": {
55
+ "file": "lamsec-deployFunction.assets.json",
56
+ "requiresBootstrapStackVersion": 6,
57
+ "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version"
58
+ }
59
+ },
60
+ "lamsec-deployFunction": {
61
+ "type": "aws:cloudformation:stack",
62
+ "environment": "aws://unknown-account/unknown-region",
63
+ "properties": {
64
+ "templateFile": "lamsec-deployFunction.template.json",
65
+ "terminationProtection": false,
66
+ "validateOnSynth": false,
67
+ "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
68
+ "cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
69
+ "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/880b5cdeae07a9007bf7d25f1a6dc9eac8b90346d0ab395a963b93545506f0f0.json",
70
+ "requiresBootstrapStackVersion": 6,
71
+ "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
72
+ "additionalDependencies": [
73
+ "lamsec-deployFunction.assets"
74
+ ],
75
+ "lookupRole": {
76
+ "arn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-lookup-role-${AWS::AccountId}-${AWS::Region}",
77
+ "requiresBootstrapStackVersion": 8,
78
+ "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version"
79
+ }
80
+ },
81
+ "dependencies": [
82
+ "lamsec-deployFunction.assets"
83
+ ],
84
+ "metadata": {
85
+ "/lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunctionServiceRole/Resource": [
86
+ {
87
+ "type": "aws:cdk:logicalId",
88
+ "data": "testlambdasecretsmanagerLambdaFunctionServiceRole92CE007F"
89
+ }
90
+ ],
91
+ "/lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunctionServiceRole/DefaultPolicy/Resource": [
92
+ {
93
+ "type": "aws:cdk:logicalId",
94
+ "data": "testlambdasecretsmanagerLambdaFunctionServiceRoleDefaultPolicyF24BF460"
95
+ }
96
+ ],
97
+ "/lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunction/Resource": [
98
+ {
99
+ "type": "aws:cdk:logicalId",
100
+ "data": "testlambdasecretsmanagerLambdaFunction130E7301"
101
+ }
102
+ ],
103
+ "/lamsec-deployFunction/test-lambda-secretsmanager/secret/Resource": [
104
+ {
105
+ "type": "aws:cdk:logicalId",
106
+ "data": "testlambdasecretsmanagersecret4C99E6BF"
107
+ }
108
+ ],
109
+ "/lamsec-deployFunction/BootstrapVersion": [
110
+ {
111
+ "type": "aws:cdk:logicalId",
112
+ "data": "BootstrapVersion"
113
+ }
114
+ ],
115
+ "/lamsec-deployFunction/CheckBootstrapVersion": [
116
+ {
117
+ "type": "aws:cdk:logicalId",
118
+ "data": "CheckBootstrapVersion"
119
+ }
120
+ ]
121
+ },
122
+ "displayName": "lamsec-deployFunction"
123
+ },
124
+ "Tree": {
125
+ "type": "cdk:tree",
126
+ "properties": {
127
+ "file": "tree.json"
128
+ }
129
+ }
130
+ }
131
+ }