@aws-solutions-constructs/aws-lambda-secretsmanager 2.79.1 → 2.81.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (35) hide show
  1. package/.jsii +43 -43
  2. package/lib/index.js +1 -1
  3. package/package.json +6 -6
  4. package/test/integ.lamsec-deployFunction.js.snapshot/asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c/index.js +21 -0
  5. package/test/integ.lamsec-deployFunction.js.snapshot/cdk.out +1 -1
  6. package/test/integ.lamsec-deployFunction.js.snapshot/integ.json +1 -1
  7. package/test/integ.lamsec-deployFunction.js.snapshot/lamsec-deployFunction.assets.json +6 -6
  8. package/test/integ.lamsec-deployFunction.js.snapshot/lamsec-deployFunction.template.json +25 -19
  9. package/test/integ.lamsec-deployFunction.js.snapshot/lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA.assets.json +1 -1
  10. package/test/integ.lamsec-deployFunction.js.snapshot/manifest.json +171 -3
  11. package/test/integ.lamsec-deployFunction.js.snapshot/tree.json +1 -342
  12. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/cdk.out +1 -1
  13. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/integ.json +1 -1
  14. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsec-deployFunctionWithExistingVpc.assets.json +3 -3
  15. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsec-deployFunctionWithExistingVpc.template.json +35 -7
  16. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsecdeployFunctionWithExistingVpcIntegDefaultTestDeployAssert647243A7.assets.json +1 -1
  17. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/manifest.json +508 -3
  18. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/tree.json +1 -1407
  19. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/cdk.out +1 -1
  20. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/integ.json +1 -1
  21. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.assets.json +3 -3
  22. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.template.json +33 -7
  23. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsecdeployFunctionWithVpcIntegDefaultTestDeployAssert66148FF5.assets.json +1 -1
  24. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/manifest.json +436 -3
  25. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/tree.json +1 -995
  26. package/test/integ.lamsec-existingFunction.js.snapshot/asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c/index.js +21 -0
  27. package/test/integ.lamsec-existingFunction.js.snapshot/cdk.out +1 -1
  28. package/test/integ.lamsec-existingFunction.js.snapshot/integ.json +1 -1
  29. package/test/integ.lamsec-existingFunction.js.snapshot/lamsec-existingFunction.assets.json +6 -6
  30. package/test/integ.lamsec-existingFunction.js.snapshot/lamsec-existingFunction.template.json +25 -19
  31. package/test/integ.lamsec-existingFunction.js.snapshot/lamsecexistingFunctionIntegDefaultTestDeployAssert295B352B.assets.json +1 -1
  32. package/test/integ.lamsec-existingFunction.js.snapshot/manifest.json +171 -3
  33. package/test/integ.lamsec-existingFunction.js.snapshot/tree.json +1 -342
  34. package/test/integ.lamsec-deployFunction.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +0 -8
  35. package/test/integ.lamsec-existingFunction.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +0 -8
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "39.0.0",
2
+ "version": "42.0.0",
3
3
  "artifacts": {
4
4
  "lamsecdeployFunctionWithExistingVpcIntegDefaultTestDeployAssert647243A7.assets": {
5
5
  "type": "cdk:asset-manifest",
@@ -66,7 +66,7 @@
66
66
  "validateOnSynth": false,
67
67
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
68
68
  "cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
69
- "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/cbdd87f183076388ee1c7e2fef5b4aa72011c3ceb66a40d0062d2ce88e737fe9.json",
69
+ "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/9c4451a1fa35b69be5e3a10fbc2659763e1e2eaf5b67a40f4b018813159d668c.json",
70
70
  "requiresBootstrapStackVersion": 6,
71
71
  "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
72
72
  "additionalDependencies": [
@@ -82,12 +82,57 @@
82
82
  "lamsec-deployFunctionWithExistingVpc.assets"
83
83
  ],
84
84
  "metadata": {
85
+ "/lamsec-deployFunctionWithExistingVpc/Vpc": [
86
+ {
87
+ "type": "aws:cdk:analytics:construct",
88
+ "data": {
89
+ "enableDnsHostnames": true,
90
+ "enableDnsSupport": true
91
+ }
92
+ }
93
+ ],
85
94
  "/lamsec-deployFunctionWithExistingVpc/Vpc/Resource": [
86
95
  {
87
96
  "type": "aws:cdk:logicalId",
88
97
  "data": "Vpc8378EB38"
89
98
  }
90
99
  ],
100
+ "/lamsec-deployFunctionWithExistingVpc/Vpc/PublicSubnet1": [
101
+ {
102
+ "type": "aws:cdk:analytics:construct",
103
+ "data": {
104
+ "availabilityZone": "*",
105
+ "vpcId": "*",
106
+ "cidrBlock": "*",
107
+ "mapPublicIpOnLaunch": true,
108
+ "ipv6CidrBlock": "*",
109
+ "assignIpv6AddressOnCreation": "*"
110
+ }
111
+ },
112
+ {
113
+ "type": "aws:cdk:analytics:construct",
114
+ "data": {
115
+ "availabilityZone": "*",
116
+ "vpcId": "*",
117
+ "cidrBlock": "*",
118
+ "mapPublicIpOnLaunch": true,
119
+ "ipv6CidrBlock": "*",
120
+ "assignIpv6AddressOnCreation": "*"
121
+ }
122
+ },
123
+ {
124
+ "type": "aws:cdk:analytics:method",
125
+ "data": {}
126
+ },
127
+ {
128
+ "type": "aws:cdk:analytics:method",
129
+ "data": {
130
+ "addNatGateway": [
131
+ "*"
132
+ ]
133
+ }
134
+ }
135
+ ],
91
136
  "/lamsec-deployFunctionWithExistingVpc/Vpc/PublicSubnet1/Subnet": [
92
137
  {
93
138
  "type": "aws:cdk:logicalId",
@@ -124,6 +169,42 @@
124
169
  "data": "VpcPublicSubnet1NATGateway4D7517AA"
125
170
  }
126
171
  ],
172
+ "/lamsec-deployFunctionWithExistingVpc/Vpc/PublicSubnet2": [
173
+ {
174
+ "type": "aws:cdk:analytics:construct",
175
+ "data": {
176
+ "availabilityZone": "*",
177
+ "vpcId": "*",
178
+ "cidrBlock": "*",
179
+ "mapPublicIpOnLaunch": true,
180
+ "ipv6CidrBlock": "*",
181
+ "assignIpv6AddressOnCreation": "*"
182
+ }
183
+ },
184
+ {
185
+ "type": "aws:cdk:analytics:construct",
186
+ "data": {
187
+ "availabilityZone": "*",
188
+ "vpcId": "*",
189
+ "cidrBlock": "*",
190
+ "mapPublicIpOnLaunch": true,
191
+ "ipv6CidrBlock": "*",
192
+ "assignIpv6AddressOnCreation": "*"
193
+ }
194
+ },
195
+ {
196
+ "type": "aws:cdk:analytics:method",
197
+ "data": {}
198
+ },
199
+ {
200
+ "type": "aws:cdk:analytics:method",
201
+ "data": {
202
+ "addNatGateway": [
203
+ "*"
204
+ ]
205
+ }
206
+ }
207
+ ],
127
208
  "/lamsec-deployFunctionWithExistingVpc/Vpc/PublicSubnet2/Subnet": [
128
209
  {
129
210
  "type": "aws:cdk:logicalId",
@@ -160,6 +241,34 @@
160
241
  "data": "VpcPublicSubnet2NATGateway9182C01D"
161
242
  }
162
243
  ],
244
+ "/lamsec-deployFunctionWithExistingVpc/Vpc/PrivateSubnet1": [
245
+ {
246
+ "type": "aws:cdk:analytics:construct",
247
+ "data": {
248
+ "availabilityZone": "*",
249
+ "vpcId": "*",
250
+ "cidrBlock": "*",
251
+ "mapPublicIpOnLaunch": false,
252
+ "ipv6CidrBlock": "*",
253
+ "assignIpv6AddressOnCreation": "*"
254
+ }
255
+ },
256
+ {
257
+ "type": "aws:cdk:analytics:construct",
258
+ "data": {
259
+ "availabilityZone": "*",
260
+ "vpcId": "*",
261
+ "cidrBlock": "*",
262
+ "mapPublicIpOnLaunch": false,
263
+ "ipv6CidrBlock": "*",
264
+ "assignIpv6AddressOnCreation": "*"
265
+ }
266
+ },
267
+ {
268
+ "type": "aws:cdk:analytics:method",
269
+ "data": {}
270
+ }
271
+ ],
163
272
  "/lamsec-deployFunctionWithExistingVpc/Vpc/PrivateSubnet1/Subnet": [
164
273
  {
165
274
  "type": "aws:cdk:logicalId",
@@ -184,6 +293,34 @@
184
293
  "data": "VpcPrivateSubnet1DefaultRouteBE02A9ED"
185
294
  }
186
295
  ],
296
+ "/lamsec-deployFunctionWithExistingVpc/Vpc/PrivateSubnet2": [
297
+ {
298
+ "type": "aws:cdk:analytics:construct",
299
+ "data": {
300
+ "availabilityZone": "*",
301
+ "vpcId": "*",
302
+ "cidrBlock": "*",
303
+ "mapPublicIpOnLaunch": false,
304
+ "ipv6CidrBlock": "*",
305
+ "assignIpv6AddressOnCreation": "*"
306
+ }
307
+ },
308
+ {
309
+ "type": "aws:cdk:analytics:construct",
310
+ "data": {
311
+ "availabilityZone": "*",
312
+ "vpcId": "*",
313
+ "cidrBlock": "*",
314
+ "mapPublicIpOnLaunch": false,
315
+ "ipv6CidrBlock": "*",
316
+ "assignIpv6AddressOnCreation": "*"
317
+ }
318
+ },
319
+ {
320
+ "type": "aws:cdk:analytics:method",
321
+ "data": {}
322
+ }
323
+ ],
187
324
  "/lamsec-deployFunctionWithExistingVpc/Vpc/PrivateSubnet2/Subnet": [
188
325
  {
189
326
  "type": "aws:cdk:logicalId",
@@ -220,24 +357,132 @@
220
357
  "data": "VpcVPCGWBF912B6E"
221
358
  }
222
359
  ],
360
+ "/lamsec-deployFunctionWithExistingVpc/Vpc/RestrictDefaultSecurityGroupCustomResource": [
361
+ {
362
+ "type": "aws:cdk:analytics:construct",
363
+ "data": "*"
364
+ }
365
+ ],
223
366
  "/lamsec-deployFunctionWithExistingVpc/Vpc/RestrictDefaultSecurityGroupCustomResource/Default": [
224
367
  {
225
368
  "type": "aws:cdk:logicalId",
226
369
  "data": "VpcRestrictDefaultSecurityGroupCustomResourceC73DA2BE"
227
370
  }
228
371
  ],
372
+ "/lamsec-deployFunctionWithExistingVpc/Vpc/FlowLog": [
373
+ {
374
+ "type": "aws:cdk:analytics:construct",
375
+ "data": {
376
+ "resourceType": "*"
377
+ }
378
+ }
379
+ ],
380
+ "/lamsec-deployFunctionWithExistingVpc/Vpc/FlowLog/IAMRole": [
381
+ {
382
+ "type": "aws:cdk:analytics:construct",
383
+ "data": {
384
+ "roleName": "*",
385
+ "assumedBy": {
386
+ "principalAccount": "*",
387
+ "assumeRoleAction": "*"
388
+ }
389
+ }
390
+ },
391
+ {
392
+ "type": "aws:cdk:analytics:method",
393
+ "data": {
394
+ "addToPrincipalPolicy": [
395
+ {}
396
+ ]
397
+ }
398
+ },
399
+ {
400
+ "type": "aws:cdk:analytics:method",
401
+ "data": {
402
+ "attachInlinePolicy": [
403
+ "*"
404
+ ]
405
+ }
406
+ },
407
+ {
408
+ "type": "aws:cdk:analytics:method",
409
+ "data": {
410
+ "attachInlinePolicy": [
411
+ "*"
412
+ ]
413
+ }
414
+ },
415
+ {
416
+ "type": "aws:cdk:analytics:method",
417
+ "data": {
418
+ "addToPrincipalPolicy": [
419
+ {}
420
+ ]
421
+ }
422
+ }
423
+ ],
424
+ "/lamsec-deployFunctionWithExistingVpc/Vpc/FlowLog/IAMRole/ImportIAMRole": [
425
+ {
426
+ "type": "aws:cdk:analytics:construct",
427
+ "data": "*"
428
+ }
429
+ ],
229
430
  "/lamsec-deployFunctionWithExistingVpc/Vpc/FlowLog/IAMRole/Resource": [
230
431
  {
231
432
  "type": "aws:cdk:logicalId",
232
433
  "data": "VpcFlowLogIAMRole6A475D41"
233
434
  }
234
435
  ],
436
+ "/lamsec-deployFunctionWithExistingVpc/Vpc/FlowLog/IAMRole/DefaultPolicy": [
437
+ {
438
+ "type": "aws:cdk:analytics:construct",
439
+ "data": "*"
440
+ },
441
+ {
442
+ "type": "aws:cdk:analytics:method",
443
+ "data": {
444
+ "attachToRole": [
445
+ "*"
446
+ ]
447
+ }
448
+ },
449
+ {
450
+ "type": "aws:cdk:analytics:method",
451
+ "data": {
452
+ "attachToRole": [
453
+ "*"
454
+ ]
455
+ }
456
+ },
457
+ {
458
+ "type": "aws:cdk:analytics:method",
459
+ "data": {
460
+ "addStatements": [
461
+ {}
462
+ ]
463
+ }
464
+ },
465
+ {
466
+ "type": "aws:cdk:analytics:method",
467
+ "data": {
468
+ "addStatements": [
469
+ {}
470
+ ]
471
+ }
472
+ }
473
+ ],
235
474
  "/lamsec-deployFunctionWithExistingVpc/Vpc/FlowLog/IAMRole/DefaultPolicy/Resource": [
236
475
  {
237
476
  "type": "aws:cdk:logicalId",
238
477
  "data": "VpcFlowLogIAMRoleDefaultPolicy406FB995"
239
478
  }
240
479
  ],
480
+ "/lamsec-deployFunctionWithExistingVpc/Vpc/FlowLog/LogGroup": [
481
+ {
482
+ "type": "aws:cdk:analytics:construct",
483
+ "data": "*"
484
+ }
485
+ ],
241
486
  "/lamsec-deployFunctionWithExistingVpc/Vpc/FlowLog/LogGroup/Resource": [
242
487
  {
243
488
  "type": "aws:cdk:logicalId",
@@ -250,6 +495,22 @@
250
495
  "data": "VpcFlowLog8FF33A73"
251
496
  }
252
497
  ],
498
+ "/lamsec-deployFunctionWithExistingVpc/Vpc/SECRETS_MANAGER": [
499
+ {
500
+ "type": "aws:cdk:analytics:construct",
501
+ "data": {
502
+ "vpc": "*",
503
+ "service": {
504
+ "privateDnsDefault": true,
505
+ "name": "*",
506
+ "port": "*"
507
+ },
508
+ "securityGroups": [
509
+ "*"
510
+ ]
511
+ }
512
+ }
513
+ ],
253
514
  "/lamsec-deployFunctionWithExistingVpc/Vpc/SECRETS_MANAGER/Resource": [
254
515
  {
255
516
  "type": "aws:cdk:logicalId",
@@ -280,36 +541,279 @@
280
541
  "data": "CustomVpcRestrictDefaultSGCustomResourceProviderHandlerDC833E5E"
281
542
  }
282
543
  ],
544
+ "/lamsec-deployFunctionWithExistingVpc/test-lambda-secretsmanager-stack/LambdaFunctionServiceRole": [
545
+ {
546
+ "type": "aws:cdk:analytics:construct",
547
+ "data": {
548
+ "assumedBy": {
549
+ "principalAccount": "*",
550
+ "assumeRoleAction": "*"
551
+ },
552
+ "inlinePolicies": "*"
553
+ }
554
+ },
555
+ {
556
+ "type": "aws:cdk:analytics:method",
557
+ "data": {
558
+ "addToPolicy": [
559
+ {}
560
+ ]
561
+ }
562
+ },
563
+ {
564
+ "type": "aws:cdk:analytics:method",
565
+ "data": {
566
+ "addToPrincipalPolicy": [
567
+ {}
568
+ ]
569
+ }
570
+ },
571
+ {
572
+ "type": "aws:cdk:analytics:method",
573
+ "data": {
574
+ "attachInlinePolicy": [
575
+ "*"
576
+ ]
577
+ }
578
+ },
579
+ {
580
+ "type": "aws:cdk:analytics:method",
581
+ "data": {
582
+ "attachInlinePolicy": [
583
+ "*"
584
+ ]
585
+ }
586
+ },
587
+ {
588
+ "type": "aws:cdk:analytics:method",
589
+ "data": {
590
+ "attachInlinePolicy": [
591
+ "*"
592
+ ]
593
+ }
594
+ },
595
+ {
596
+ "type": "aws:cdk:analytics:method",
597
+ "data": {
598
+ "attachInlinePolicy": [
599
+ "*"
600
+ ]
601
+ }
602
+ },
603
+ {
604
+ "type": "aws:cdk:analytics:method",
605
+ "data": {
606
+ "addToPrincipalPolicy": [
607
+ {}
608
+ ]
609
+ }
610
+ }
611
+ ],
612
+ "/lamsec-deployFunctionWithExistingVpc/test-lambda-secretsmanager-stack/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole": [
613
+ {
614
+ "type": "aws:cdk:analytics:construct",
615
+ "data": "*"
616
+ }
617
+ ],
283
618
  "/lamsec-deployFunctionWithExistingVpc/test-lambda-secretsmanager-stack/LambdaFunctionServiceRole/Resource": [
284
619
  {
285
620
  "type": "aws:cdk:logicalId",
286
621
  "data": "testlambdasecretsmanagerstackLambdaFunctionServiceRole4FE7A9C6"
287
622
  }
288
623
  ],
624
+ "/lamsec-deployFunctionWithExistingVpc/test-lambda-secretsmanager-stack/LambdaFunctionServiceRole/DefaultPolicy": [
625
+ {
626
+ "type": "aws:cdk:analytics:construct",
627
+ "data": "*"
628
+ },
629
+ {
630
+ "type": "aws:cdk:analytics:method",
631
+ "data": {
632
+ "attachToRole": [
633
+ "*"
634
+ ]
635
+ }
636
+ },
637
+ {
638
+ "type": "aws:cdk:analytics:method",
639
+ "data": {
640
+ "attachToRole": [
641
+ "*"
642
+ ]
643
+ }
644
+ },
645
+ {
646
+ "type": "aws:cdk:analytics:method",
647
+ "data": {
648
+ "addStatements": [
649
+ {}
650
+ ]
651
+ }
652
+ },
653
+ {
654
+ "type": "aws:cdk:analytics:method",
655
+ "data": {
656
+ "addStatements": [
657
+ {}
658
+ ]
659
+ }
660
+ }
661
+ ],
289
662
  "/lamsec-deployFunctionWithExistingVpc/test-lambda-secretsmanager-stack/LambdaFunctionServiceRole/DefaultPolicy/Resource": [
290
663
  {
291
664
  "type": "aws:cdk:logicalId",
292
665
  "data": "testlambdasecretsmanagerstackLambdaFunctionServiceRoleDefaultPolicy2F46FC5F"
293
666
  }
294
667
  ],
668
+ "/lamsec-deployFunctionWithExistingVpc/test-lambda-secretsmanager-stack/ReplaceDefaultSecurityGroup-security-group": [
669
+ {
670
+ "type": "aws:cdk:analytics:construct",
671
+ "data": {
672
+ "vpc": "*",
673
+ "allowAllOutbound": true
674
+ }
675
+ }
676
+ ],
295
677
  "/lamsec-deployFunctionWithExistingVpc/test-lambda-secretsmanager-stack/ReplaceDefaultSecurityGroup-security-group/Resource": [
296
678
  {
297
679
  "type": "aws:cdk:logicalId",
298
680
  "data": "testlambdasecretsmanagerstackReplaceDefaultSecurityGroupsecuritygroupBBE9275E"
299
681
  }
300
682
  ],
683
+ "/lamsec-deployFunctionWithExistingVpc/test-lambda-secretsmanager-stack/LambdaFunction": [
684
+ {
685
+ "type": "aws:cdk:analytics:construct",
686
+ "data": {
687
+ "role": "*",
688
+ "tracing": "Active",
689
+ "runtime": "*",
690
+ "handler": "*",
691
+ "code": "*",
692
+ "securityGroups": [
693
+ "*"
694
+ ],
695
+ "vpc": "*"
696
+ }
697
+ },
698
+ {
699
+ "type": "aws:cdk:analytics:method",
700
+ "data": {
701
+ "addEnvironment": [
702
+ "*",
703
+ "*",
704
+ {
705
+ "removeInEdge": true
706
+ }
707
+ ]
708
+ }
709
+ },
710
+ {
711
+ "type": "aws:cdk:analytics:method",
712
+ "data": {
713
+ "addEnvironment": [
714
+ "*",
715
+ "*"
716
+ ]
717
+ }
718
+ }
719
+ ],
301
720
  "/lamsec-deployFunctionWithExistingVpc/test-lambda-secretsmanager-stack/LambdaFunction/Resource": [
302
721
  {
303
722
  "type": "aws:cdk:logicalId",
304
723
  "data": "testlambdasecretsmanagerstackLambdaFunction2DDE520A"
305
724
  }
306
725
  ],
726
+ "/lamsec-deployFunctionWithExistingVpc/test-lambda-secretsmanager-stack/LambdaFunction/inlinePolicyAddedToExecutionRole-0": [
727
+ {
728
+ "type": "aws:cdk:analytics:construct",
729
+ "data": {
730
+ "statements": "*"
731
+ }
732
+ },
733
+ {
734
+ "type": "aws:cdk:analytics:method",
735
+ "data": {
736
+ "addStatements": [
737
+ {}
738
+ ]
739
+ }
740
+ },
741
+ {
742
+ "type": "aws:cdk:analytics:method",
743
+ "data": {
744
+ "attachToRole": [
745
+ "*"
746
+ ]
747
+ }
748
+ },
749
+ {
750
+ "type": "aws:cdk:analytics:method",
751
+ "data": {
752
+ "attachToRole": [
753
+ "*"
754
+ ]
755
+ }
756
+ }
757
+ ],
758
+ "/lamsec-deployFunctionWithExistingVpc/test-lambda-secretsmanager-stack/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource": [
759
+ {
760
+ "type": "aws:cdk:logicalId",
761
+ "data": "testlambdasecretsmanagerstackLambdaFunctioninlinePolicyAddedToExecutionRole0EBC40474"
762
+ }
763
+ ],
764
+ "/lamsec-deployFunctionWithExistingVpc/test-lambda-secretsmanager-stack/secret": [
765
+ {
766
+ "type": "aws:cdk:analytics:construct",
767
+ "data": {
768
+ "removalPolicy": "destroy"
769
+ }
770
+ }
771
+ ],
307
772
  "/lamsec-deployFunctionWithExistingVpc/test-lambda-secretsmanager-stack/secret/Resource": [
308
773
  {
309
774
  "type": "aws:cdk:logicalId",
310
775
  "data": "testlambdasecretsmanagerstacksecretC2FCB96E"
311
776
  }
312
777
  ],
778
+ "/lamsec-deployFunctionWithExistingVpc/lamsec-deployFunctionWithExistingVpc-SECRETS_MANAGER-security-group": [
779
+ {
780
+ "type": "aws:cdk:analytics:construct",
781
+ "data": {
782
+ "vpc": "*",
783
+ "allowAllOutbound": true
784
+ }
785
+ },
786
+ {
787
+ "type": "aws:cdk:analytics:method",
788
+ "data": {
789
+ "addIngressRule": [
790
+ {
791
+ "canInlineRule": true,
792
+ "connections": "*",
793
+ "uniqueId": "*"
794
+ },
795
+ {},
796
+ "*",
797
+ "*"
798
+ ]
799
+ }
800
+ },
801
+ {
802
+ "type": "aws:cdk:analytics:method",
803
+ "data": {
804
+ "addIngressRule": [
805
+ {
806
+ "canInlineRule": true,
807
+ "connections": "*",
808
+ "uniqueId": "*"
809
+ },
810
+ {},
811
+ "*",
812
+ false
813
+ ]
814
+ }
815
+ }
816
+ ],
313
817
  "/lamsec-deployFunctionWithExistingVpc/lamsec-deployFunctionWithExistingVpc-SECRETS_MANAGER-security-group/Resource": [
314
818
  {
315
819
  "type": "aws:cdk:logicalId",
@@ -337,5 +841,6 @@
337
841
  "file": "tree.json"
338
842
  }
339
843
  }
340
- }
844
+ },
845
+ "minimumCliVersion": "2.1006.0"
341
846
  }