@aws-solutions-constructs/aws-lambda-secretsmanager 2.79.1 → 2.81.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +43 -43
- package/lib/index.js +1 -1
- package/package.json +6 -6
- package/test/integ.lamsec-deployFunction.js.snapshot/asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c/index.js +21 -0
- package/test/integ.lamsec-deployFunction.js.snapshot/cdk.out +1 -1
- package/test/integ.lamsec-deployFunction.js.snapshot/integ.json +1 -1
- package/test/integ.lamsec-deployFunction.js.snapshot/lamsec-deployFunction.assets.json +6 -6
- package/test/integ.lamsec-deployFunction.js.snapshot/lamsec-deployFunction.template.json +25 -19
- package/test/integ.lamsec-deployFunction.js.snapshot/lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA.assets.json +1 -1
- package/test/integ.lamsec-deployFunction.js.snapshot/manifest.json +171 -3
- package/test/integ.lamsec-deployFunction.js.snapshot/tree.json +1 -342
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/cdk.out +1 -1
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/integ.json +1 -1
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsec-deployFunctionWithExistingVpc.assets.json +3 -3
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsec-deployFunctionWithExistingVpc.template.json +35 -7
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsecdeployFunctionWithExistingVpcIntegDefaultTestDeployAssert647243A7.assets.json +1 -1
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/manifest.json +508 -3
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/tree.json +1 -1407
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/cdk.out +1 -1
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/integ.json +1 -1
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.assets.json +3 -3
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.template.json +33 -7
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsecdeployFunctionWithVpcIntegDefaultTestDeployAssert66148FF5.assets.json +1 -1
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/manifest.json +436 -3
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/tree.json +1 -995
- package/test/integ.lamsec-existingFunction.js.snapshot/asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c/index.js +21 -0
- package/test/integ.lamsec-existingFunction.js.snapshot/cdk.out +1 -1
- package/test/integ.lamsec-existingFunction.js.snapshot/integ.json +1 -1
- package/test/integ.lamsec-existingFunction.js.snapshot/lamsec-existingFunction.assets.json +6 -6
- package/test/integ.lamsec-existingFunction.js.snapshot/lamsec-existingFunction.template.json +25 -19
- package/test/integ.lamsec-existingFunction.js.snapshot/lamsecexistingFunctionIntegDefaultTestDeployAssert295B352B.assets.json +1 -1
- package/test/integ.lamsec-existingFunction.js.snapshot/manifest.json +171 -3
- package/test/integ.lamsec-existingFunction.js.snapshot/tree.json +1 -342
- package/test/integ.lamsec-deployFunction.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +0 -8
- package/test/integ.lamsec-existingFunction.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +0 -8
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":"
|
|
1
|
+
{"version":"40.0.0"}
|
package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.assets.json
CHANGED
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
{
|
|
2
|
-
"version": "
|
|
2
|
+
"version": "40.0.0",
|
|
3
3
|
"files": {
|
|
4
4
|
"7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200": {
|
|
5
5
|
"source": {
|
|
@@ -27,7 +27,7 @@
|
|
|
27
27
|
}
|
|
28
28
|
}
|
|
29
29
|
},
|
|
30
|
-
"
|
|
30
|
+
"9ec37a379aed9ae1dacee6c8bb5b0b86752110a4a42c2e48daeab4cbb78f5782": {
|
|
31
31
|
"source": {
|
|
32
32
|
"path": "lamsec-deployFunctionWithVpc.template.json",
|
|
33
33
|
"packaging": "file"
|
|
@@ -35,7 +35,7 @@
|
|
|
35
35
|
"destinations": {
|
|
36
36
|
"current_account-current_region": {
|
|
37
37
|
"bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
|
|
38
|
-
"objectKey": "
|
|
38
|
+
"objectKey": "9ec37a379aed9ae1dacee6c8bb5b0b86752110a4a42c2e48daeab4cbb78f5782.json",
|
|
39
39
|
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
|
|
40
40
|
}
|
|
41
41
|
}
|
|
@@ -74,9 +74,7 @@
|
|
|
74
74
|
"ec2:CreateNetworkInterface",
|
|
75
75
|
"ec2:DeleteNetworkInterface",
|
|
76
76
|
"ec2:DescribeNetworkInterfaces",
|
|
77
|
-
"ec2:UnassignPrivateIpAddresses"
|
|
78
|
-
"xray:PutTelemetryRecords",
|
|
79
|
-
"xray:PutTraceSegments"
|
|
77
|
+
"ec2:UnassignPrivateIpAddresses"
|
|
80
78
|
],
|
|
81
79
|
"Effect": "Allow",
|
|
82
80
|
"Resource": "*"
|
|
@@ -214,6 +212,34 @@
|
|
|
214
212
|
}
|
|
215
213
|
}
|
|
216
214
|
},
|
|
215
|
+
"testlambdasecretsmanagerLambdaFunctioninlinePolicyAddedToExecutionRole0A805C55F": {
|
|
216
|
+
"Type": "AWS::IAM::Policy",
|
|
217
|
+
"Properties": {
|
|
218
|
+
"PolicyDocument": {
|
|
219
|
+
"Statement": [
|
|
220
|
+
{
|
|
221
|
+
"Action": [
|
|
222
|
+
"xray:PutTelemetryRecords",
|
|
223
|
+
"xray:PutTraceSegments"
|
|
224
|
+
],
|
|
225
|
+
"Effect": "Allow",
|
|
226
|
+
"Resource": "*"
|
|
227
|
+
}
|
|
228
|
+
],
|
|
229
|
+
"Version": "2012-10-17"
|
|
230
|
+
},
|
|
231
|
+
"PolicyName": "testlambdasecretsmanagerLambdaFunctioninlinePolicyAddedToExecutionRole0A805C55F",
|
|
232
|
+
"Roles": [
|
|
233
|
+
{
|
|
234
|
+
"Ref": "testlambdasecretsmanagerLambdaFunctionServiceRole92CE007F"
|
|
235
|
+
}
|
|
236
|
+
]
|
|
237
|
+
},
|
|
238
|
+
"DependsOn": [
|
|
239
|
+
"VpcisolatedSubnet1RouteTableAssociationD259E31A",
|
|
240
|
+
"VpcisolatedSubnet2RouteTableAssociation25A4716F"
|
|
241
|
+
]
|
|
242
|
+
},
|
|
217
243
|
"testlambdasecretsmanagersecret4C99E6BF": {
|
|
218
244
|
"Type": "AWS::SecretsManager::Secret",
|
|
219
245
|
"Properties": {
|
|
@@ -772,10 +798,10 @@
|
|
|
772
798
|
"value": "nodejs20.x"
|
|
773
799
|
},
|
|
774
800
|
"cn-north-1": {
|
|
775
|
-
"value": "
|
|
801
|
+
"value": "nodejs20.x"
|
|
776
802
|
},
|
|
777
803
|
"cn-northwest-1": {
|
|
778
|
-
"value": "
|
|
804
|
+
"value": "nodejs20.x"
|
|
779
805
|
},
|
|
780
806
|
"eu-central-1": {
|
|
781
807
|
"value": "nodejs20.x"
|
|
@@ -826,10 +852,10 @@
|
|
|
826
852
|
"value": "nodejs20.x"
|
|
827
853
|
},
|
|
828
854
|
"us-gov-east-1": {
|
|
829
|
-
"value": "
|
|
855
|
+
"value": "nodejs20.x"
|
|
830
856
|
},
|
|
831
857
|
"us-gov-west-1": {
|
|
832
|
-
"value": "
|
|
858
|
+
"value": "nodejs20.x"
|
|
833
859
|
},
|
|
834
860
|
"us-iso-east-1": {
|
|
835
861
|
"value": "nodejs18.x"
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
{
|
|
2
|
-
"version": "
|
|
2
|
+
"version": "42.0.0",
|
|
3
3
|
"artifacts": {
|
|
4
4
|
"lamsecdeployFunctionWithVpcIntegDefaultTestDeployAssert66148FF5.assets": {
|
|
5
5
|
"type": "cdk:asset-manifest",
|
|
@@ -66,7 +66,7 @@
|
|
|
66
66
|
"validateOnSynth": false,
|
|
67
67
|
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
|
|
68
68
|
"cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
|
|
69
|
-
"stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/
|
|
69
|
+
"stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/9ec37a379aed9ae1dacee6c8bb5b0b86752110a4a42c2e48daeab4cbb78f5782.json",
|
|
70
70
|
"requiresBootstrapStackVersion": 6,
|
|
71
71
|
"bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
|
|
72
72
|
"additionalDependencies": [
|
|
@@ -82,42 +82,287 @@
|
|
|
82
82
|
"lamsec-deployFunctionWithVpc.assets"
|
|
83
83
|
],
|
|
84
84
|
"metadata": {
|
|
85
|
+
"/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/LambdaFunctionServiceRole": [
|
|
86
|
+
{
|
|
87
|
+
"type": "aws:cdk:analytics:construct",
|
|
88
|
+
"data": {
|
|
89
|
+
"assumedBy": {
|
|
90
|
+
"principalAccount": "*",
|
|
91
|
+
"assumeRoleAction": "*"
|
|
92
|
+
},
|
|
93
|
+
"inlinePolicies": "*"
|
|
94
|
+
}
|
|
95
|
+
},
|
|
96
|
+
{
|
|
97
|
+
"type": "aws:cdk:analytics:method",
|
|
98
|
+
"data": {
|
|
99
|
+
"addToPolicy": [
|
|
100
|
+
{}
|
|
101
|
+
]
|
|
102
|
+
}
|
|
103
|
+
},
|
|
104
|
+
{
|
|
105
|
+
"type": "aws:cdk:analytics:method",
|
|
106
|
+
"data": {
|
|
107
|
+
"addToPrincipalPolicy": [
|
|
108
|
+
{}
|
|
109
|
+
]
|
|
110
|
+
}
|
|
111
|
+
},
|
|
112
|
+
{
|
|
113
|
+
"type": "aws:cdk:analytics:method",
|
|
114
|
+
"data": {
|
|
115
|
+
"attachInlinePolicy": [
|
|
116
|
+
"*"
|
|
117
|
+
]
|
|
118
|
+
}
|
|
119
|
+
},
|
|
120
|
+
{
|
|
121
|
+
"type": "aws:cdk:analytics:method",
|
|
122
|
+
"data": {
|
|
123
|
+
"attachInlinePolicy": [
|
|
124
|
+
"*"
|
|
125
|
+
]
|
|
126
|
+
}
|
|
127
|
+
},
|
|
128
|
+
{
|
|
129
|
+
"type": "aws:cdk:analytics:method",
|
|
130
|
+
"data": {
|
|
131
|
+
"attachInlinePolicy": [
|
|
132
|
+
"*"
|
|
133
|
+
]
|
|
134
|
+
}
|
|
135
|
+
},
|
|
136
|
+
{
|
|
137
|
+
"type": "aws:cdk:analytics:method",
|
|
138
|
+
"data": {
|
|
139
|
+
"attachInlinePolicy": [
|
|
140
|
+
"*"
|
|
141
|
+
]
|
|
142
|
+
}
|
|
143
|
+
},
|
|
144
|
+
{
|
|
145
|
+
"type": "aws:cdk:analytics:method",
|
|
146
|
+
"data": {
|
|
147
|
+
"addToPrincipalPolicy": [
|
|
148
|
+
{}
|
|
149
|
+
]
|
|
150
|
+
}
|
|
151
|
+
}
|
|
152
|
+
],
|
|
153
|
+
"/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole": [
|
|
154
|
+
{
|
|
155
|
+
"type": "aws:cdk:analytics:construct",
|
|
156
|
+
"data": "*"
|
|
157
|
+
}
|
|
158
|
+
],
|
|
85
159
|
"/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/LambdaFunctionServiceRole/Resource": [
|
|
86
160
|
{
|
|
87
161
|
"type": "aws:cdk:logicalId",
|
|
88
162
|
"data": "testlambdasecretsmanagerLambdaFunctionServiceRole92CE007F"
|
|
89
163
|
}
|
|
90
164
|
],
|
|
165
|
+
"/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/LambdaFunctionServiceRole/DefaultPolicy": [
|
|
166
|
+
{
|
|
167
|
+
"type": "aws:cdk:analytics:construct",
|
|
168
|
+
"data": "*"
|
|
169
|
+
},
|
|
170
|
+
{
|
|
171
|
+
"type": "aws:cdk:analytics:method",
|
|
172
|
+
"data": {
|
|
173
|
+
"attachToRole": [
|
|
174
|
+
"*"
|
|
175
|
+
]
|
|
176
|
+
}
|
|
177
|
+
},
|
|
178
|
+
{
|
|
179
|
+
"type": "aws:cdk:analytics:method",
|
|
180
|
+
"data": {
|
|
181
|
+
"attachToRole": [
|
|
182
|
+
"*"
|
|
183
|
+
]
|
|
184
|
+
}
|
|
185
|
+
},
|
|
186
|
+
{
|
|
187
|
+
"type": "aws:cdk:analytics:method",
|
|
188
|
+
"data": {
|
|
189
|
+
"addStatements": [
|
|
190
|
+
{}
|
|
191
|
+
]
|
|
192
|
+
}
|
|
193
|
+
},
|
|
194
|
+
{
|
|
195
|
+
"type": "aws:cdk:analytics:method",
|
|
196
|
+
"data": {
|
|
197
|
+
"addStatements": [
|
|
198
|
+
{}
|
|
199
|
+
]
|
|
200
|
+
}
|
|
201
|
+
}
|
|
202
|
+
],
|
|
91
203
|
"/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/LambdaFunctionServiceRole/DefaultPolicy/Resource": [
|
|
92
204
|
{
|
|
93
205
|
"type": "aws:cdk:logicalId",
|
|
94
206
|
"data": "testlambdasecretsmanagerLambdaFunctionServiceRoleDefaultPolicyF24BF460"
|
|
95
207
|
}
|
|
96
208
|
],
|
|
209
|
+
"/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/ReplaceDefaultSecurityGroup-security-group": [
|
|
210
|
+
{
|
|
211
|
+
"type": "aws:cdk:analytics:construct",
|
|
212
|
+
"data": {
|
|
213
|
+
"vpc": "*",
|
|
214
|
+
"allowAllOutbound": true
|
|
215
|
+
}
|
|
216
|
+
}
|
|
217
|
+
],
|
|
97
218
|
"/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/ReplaceDefaultSecurityGroup-security-group/Resource": [
|
|
98
219
|
{
|
|
99
220
|
"type": "aws:cdk:logicalId",
|
|
100
221
|
"data": "testlambdasecretsmanagerReplaceDefaultSecurityGroupsecuritygroupF837FD37"
|
|
101
222
|
}
|
|
102
223
|
],
|
|
224
|
+
"/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/LambdaFunction": [
|
|
225
|
+
{
|
|
226
|
+
"type": "aws:cdk:analytics:construct",
|
|
227
|
+
"data": {
|
|
228
|
+
"role": "*",
|
|
229
|
+
"tracing": "Active",
|
|
230
|
+
"runtime": "*",
|
|
231
|
+
"handler": "*",
|
|
232
|
+
"code": "*",
|
|
233
|
+
"securityGroups": [
|
|
234
|
+
"*"
|
|
235
|
+
],
|
|
236
|
+
"vpc": "*"
|
|
237
|
+
}
|
|
238
|
+
},
|
|
239
|
+
{
|
|
240
|
+
"type": "aws:cdk:analytics:method",
|
|
241
|
+
"data": {
|
|
242
|
+
"addEnvironment": [
|
|
243
|
+
"*",
|
|
244
|
+
"*",
|
|
245
|
+
{
|
|
246
|
+
"removeInEdge": true
|
|
247
|
+
}
|
|
248
|
+
]
|
|
249
|
+
}
|
|
250
|
+
},
|
|
251
|
+
{
|
|
252
|
+
"type": "aws:cdk:analytics:method",
|
|
253
|
+
"data": {
|
|
254
|
+
"addEnvironment": [
|
|
255
|
+
"*",
|
|
256
|
+
"*"
|
|
257
|
+
]
|
|
258
|
+
}
|
|
259
|
+
}
|
|
260
|
+
],
|
|
103
261
|
"/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/LambdaFunction/Resource": [
|
|
104
262
|
{
|
|
105
263
|
"type": "aws:cdk:logicalId",
|
|
106
264
|
"data": "testlambdasecretsmanagerLambdaFunction130E7301"
|
|
107
265
|
}
|
|
108
266
|
],
|
|
267
|
+
"/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/LambdaFunction/inlinePolicyAddedToExecutionRole-0": [
|
|
268
|
+
{
|
|
269
|
+
"type": "aws:cdk:analytics:construct",
|
|
270
|
+
"data": {
|
|
271
|
+
"statements": "*"
|
|
272
|
+
}
|
|
273
|
+
},
|
|
274
|
+
{
|
|
275
|
+
"type": "aws:cdk:analytics:method",
|
|
276
|
+
"data": {
|
|
277
|
+
"addStatements": [
|
|
278
|
+
{}
|
|
279
|
+
]
|
|
280
|
+
}
|
|
281
|
+
},
|
|
282
|
+
{
|
|
283
|
+
"type": "aws:cdk:analytics:method",
|
|
284
|
+
"data": {
|
|
285
|
+
"attachToRole": [
|
|
286
|
+
"*"
|
|
287
|
+
]
|
|
288
|
+
}
|
|
289
|
+
},
|
|
290
|
+
{
|
|
291
|
+
"type": "aws:cdk:analytics:method",
|
|
292
|
+
"data": {
|
|
293
|
+
"attachToRole": [
|
|
294
|
+
"*"
|
|
295
|
+
]
|
|
296
|
+
}
|
|
297
|
+
}
|
|
298
|
+
],
|
|
299
|
+
"/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource": [
|
|
300
|
+
{
|
|
301
|
+
"type": "aws:cdk:logicalId",
|
|
302
|
+
"data": "testlambdasecretsmanagerLambdaFunctioninlinePolicyAddedToExecutionRole0A805C55F"
|
|
303
|
+
}
|
|
304
|
+
],
|
|
305
|
+
"/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/secret": [
|
|
306
|
+
{
|
|
307
|
+
"type": "aws:cdk:analytics:construct",
|
|
308
|
+
"data": {
|
|
309
|
+
"removalPolicy": "destroy"
|
|
310
|
+
}
|
|
311
|
+
}
|
|
312
|
+
],
|
|
109
313
|
"/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/secret/Resource": [
|
|
110
314
|
{
|
|
111
315
|
"type": "aws:cdk:logicalId",
|
|
112
316
|
"data": "testlambdasecretsmanagersecret4C99E6BF"
|
|
113
317
|
}
|
|
114
318
|
],
|
|
319
|
+
"/lamsec-deployFunctionWithVpc/Vpc": [
|
|
320
|
+
{
|
|
321
|
+
"type": "aws:cdk:analytics:construct",
|
|
322
|
+
"data": {
|
|
323
|
+
"natGateways": "*",
|
|
324
|
+
"subnetConfiguration": [
|
|
325
|
+
{
|
|
326
|
+
"cidrMask": "*",
|
|
327
|
+
"name": "*",
|
|
328
|
+
"subnetType": "Isolated"
|
|
329
|
+
}
|
|
330
|
+
],
|
|
331
|
+
"enableDnsHostnames": true,
|
|
332
|
+
"enableDnsSupport": true
|
|
333
|
+
}
|
|
334
|
+
}
|
|
335
|
+
],
|
|
115
336
|
"/lamsec-deployFunctionWithVpc/Vpc/Resource": [
|
|
116
337
|
{
|
|
117
338
|
"type": "aws:cdk:logicalId",
|
|
118
339
|
"data": "Vpc8378EB38"
|
|
119
340
|
}
|
|
120
341
|
],
|
|
342
|
+
"/lamsec-deployFunctionWithVpc/Vpc/isolatedSubnet1": [
|
|
343
|
+
{
|
|
344
|
+
"type": "aws:cdk:analytics:construct",
|
|
345
|
+
"data": {
|
|
346
|
+
"availabilityZone": "*",
|
|
347
|
+
"vpcId": "*",
|
|
348
|
+
"cidrBlock": "*",
|
|
349
|
+
"mapPublicIpOnLaunch": false,
|
|
350
|
+
"ipv6CidrBlock": "*",
|
|
351
|
+
"assignIpv6AddressOnCreation": "*"
|
|
352
|
+
}
|
|
353
|
+
},
|
|
354
|
+
{
|
|
355
|
+
"type": "aws:cdk:analytics:construct",
|
|
356
|
+
"data": {
|
|
357
|
+
"availabilityZone": "*",
|
|
358
|
+
"vpcId": "*",
|
|
359
|
+
"cidrBlock": "*",
|
|
360
|
+
"mapPublicIpOnLaunch": false,
|
|
361
|
+
"ipv6CidrBlock": "*",
|
|
362
|
+
"assignIpv6AddressOnCreation": "*"
|
|
363
|
+
}
|
|
364
|
+
}
|
|
365
|
+
],
|
|
121
366
|
"/lamsec-deployFunctionWithVpc/Vpc/isolatedSubnet1/Subnet": [
|
|
122
367
|
{
|
|
123
368
|
"type": "aws:cdk:logicalId",
|
|
@@ -136,6 +381,30 @@
|
|
|
136
381
|
"data": "VpcisolatedSubnet1RouteTableAssociationD259E31A"
|
|
137
382
|
}
|
|
138
383
|
],
|
|
384
|
+
"/lamsec-deployFunctionWithVpc/Vpc/isolatedSubnet2": [
|
|
385
|
+
{
|
|
386
|
+
"type": "aws:cdk:analytics:construct",
|
|
387
|
+
"data": {
|
|
388
|
+
"availabilityZone": "*",
|
|
389
|
+
"vpcId": "*",
|
|
390
|
+
"cidrBlock": "*",
|
|
391
|
+
"mapPublicIpOnLaunch": false,
|
|
392
|
+
"ipv6CidrBlock": "*",
|
|
393
|
+
"assignIpv6AddressOnCreation": "*"
|
|
394
|
+
}
|
|
395
|
+
},
|
|
396
|
+
{
|
|
397
|
+
"type": "aws:cdk:analytics:construct",
|
|
398
|
+
"data": {
|
|
399
|
+
"availabilityZone": "*",
|
|
400
|
+
"vpcId": "*",
|
|
401
|
+
"cidrBlock": "*",
|
|
402
|
+
"mapPublicIpOnLaunch": false,
|
|
403
|
+
"ipv6CidrBlock": "*",
|
|
404
|
+
"assignIpv6AddressOnCreation": "*"
|
|
405
|
+
}
|
|
406
|
+
}
|
|
407
|
+
],
|
|
139
408
|
"/lamsec-deployFunctionWithVpc/Vpc/isolatedSubnet2/Subnet": [
|
|
140
409
|
{
|
|
141
410
|
"type": "aws:cdk:logicalId",
|
|
@@ -154,24 +423,132 @@
|
|
|
154
423
|
"data": "VpcisolatedSubnet2RouteTableAssociation25A4716F"
|
|
155
424
|
}
|
|
156
425
|
],
|
|
426
|
+
"/lamsec-deployFunctionWithVpc/Vpc/RestrictDefaultSecurityGroupCustomResource": [
|
|
427
|
+
{
|
|
428
|
+
"type": "aws:cdk:analytics:construct",
|
|
429
|
+
"data": "*"
|
|
430
|
+
}
|
|
431
|
+
],
|
|
157
432
|
"/lamsec-deployFunctionWithVpc/Vpc/RestrictDefaultSecurityGroupCustomResource/Default": [
|
|
158
433
|
{
|
|
159
434
|
"type": "aws:cdk:logicalId",
|
|
160
435
|
"data": "VpcRestrictDefaultSecurityGroupCustomResourceC73DA2BE"
|
|
161
436
|
}
|
|
162
437
|
],
|
|
438
|
+
"/lamsec-deployFunctionWithVpc/Vpc/FlowLog": [
|
|
439
|
+
{
|
|
440
|
+
"type": "aws:cdk:analytics:construct",
|
|
441
|
+
"data": {
|
|
442
|
+
"resourceType": "*"
|
|
443
|
+
}
|
|
444
|
+
}
|
|
445
|
+
],
|
|
446
|
+
"/lamsec-deployFunctionWithVpc/Vpc/FlowLog/IAMRole": [
|
|
447
|
+
{
|
|
448
|
+
"type": "aws:cdk:analytics:construct",
|
|
449
|
+
"data": {
|
|
450
|
+
"roleName": "*",
|
|
451
|
+
"assumedBy": {
|
|
452
|
+
"principalAccount": "*",
|
|
453
|
+
"assumeRoleAction": "*"
|
|
454
|
+
}
|
|
455
|
+
}
|
|
456
|
+
},
|
|
457
|
+
{
|
|
458
|
+
"type": "aws:cdk:analytics:method",
|
|
459
|
+
"data": {
|
|
460
|
+
"addToPrincipalPolicy": [
|
|
461
|
+
{}
|
|
462
|
+
]
|
|
463
|
+
}
|
|
464
|
+
},
|
|
465
|
+
{
|
|
466
|
+
"type": "aws:cdk:analytics:method",
|
|
467
|
+
"data": {
|
|
468
|
+
"attachInlinePolicy": [
|
|
469
|
+
"*"
|
|
470
|
+
]
|
|
471
|
+
}
|
|
472
|
+
},
|
|
473
|
+
{
|
|
474
|
+
"type": "aws:cdk:analytics:method",
|
|
475
|
+
"data": {
|
|
476
|
+
"attachInlinePolicy": [
|
|
477
|
+
"*"
|
|
478
|
+
]
|
|
479
|
+
}
|
|
480
|
+
},
|
|
481
|
+
{
|
|
482
|
+
"type": "aws:cdk:analytics:method",
|
|
483
|
+
"data": {
|
|
484
|
+
"addToPrincipalPolicy": [
|
|
485
|
+
{}
|
|
486
|
+
]
|
|
487
|
+
}
|
|
488
|
+
}
|
|
489
|
+
],
|
|
490
|
+
"/lamsec-deployFunctionWithVpc/Vpc/FlowLog/IAMRole/ImportIAMRole": [
|
|
491
|
+
{
|
|
492
|
+
"type": "aws:cdk:analytics:construct",
|
|
493
|
+
"data": "*"
|
|
494
|
+
}
|
|
495
|
+
],
|
|
163
496
|
"/lamsec-deployFunctionWithVpc/Vpc/FlowLog/IAMRole/Resource": [
|
|
164
497
|
{
|
|
165
498
|
"type": "aws:cdk:logicalId",
|
|
166
499
|
"data": "VpcFlowLogIAMRole6A475D41"
|
|
167
500
|
}
|
|
168
501
|
],
|
|
502
|
+
"/lamsec-deployFunctionWithVpc/Vpc/FlowLog/IAMRole/DefaultPolicy": [
|
|
503
|
+
{
|
|
504
|
+
"type": "aws:cdk:analytics:construct",
|
|
505
|
+
"data": "*"
|
|
506
|
+
},
|
|
507
|
+
{
|
|
508
|
+
"type": "aws:cdk:analytics:method",
|
|
509
|
+
"data": {
|
|
510
|
+
"attachToRole": [
|
|
511
|
+
"*"
|
|
512
|
+
]
|
|
513
|
+
}
|
|
514
|
+
},
|
|
515
|
+
{
|
|
516
|
+
"type": "aws:cdk:analytics:method",
|
|
517
|
+
"data": {
|
|
518
|
+
"attachToRole": [
|
|
519
|
+
"*"
|
|
520
|
+
]
|
|
521
|
+
}
|
|
522
|
+
},
|
|
523
|
+
{
|
|
524
|
+
"type": "aws:cdk:analytics:method",
|
|
525
|
+
"data": {
|
|
526
|
+
"addStatements": [
|
|
527
|
+
{}
|
|
528
|
+
]
|
|
529
|
+
}
|
|
530
|
+
},
|
|
531
|
+
{
|
|
532
|
+
"type": "aws:cdk:analytics:method",
|
|
533
|
+
"data": {
|
|
534
|
+
"addStatements": [
|
|
535
|
+
{}
|
|
536
|
+
]
|
|
537
|
+
}
|
|
538
|
+
}
|
|
539
|
+
],
|
|
169
540
|
"/lamsec-deployFunctionWithVpc/Vpc/FlowLog/IAMRole/DefaultPolicy/Resource": [
|
|
170
541
|
{
|
|
171
542
|
"type": "aws:cdk:logicalId",
|
|
172
543
|
"data": "VpcFlowLogIAMRoleDefaultPolicy406FB995"
|
|
173
544
|
}
|
|
174
545
|
],
|
|
546
|
+
"/lamsec-deployFunctionWithVpc/Vpc/FlowLog/LogGroup": [
|
|
547
|
+
{
|
|
548
|
+
"type": "aws:cdk:analytics:construct",
|
|
549
|
+
"data": "*"
|
|
550
|
+
}
|
|
551
|
+
],
|
|
175
552
|
"/lamsec-deployFunctionWithVpc/Vpc/FlowLog/LogGroup/Resource": [
|
|
176
553
|
{
|
|
177
554
|
"type": "aws:cdk:logicalId",
|
|
@@ -184,6 +561,22 @@
|
|
|
184
561
|
"data": "VpcFlowLog8FF33A73"
|
|
185
562
|
}
|
|
186
563
|
],
|
|
564
|
+
"/lamsec-deployFunctionWithVpc/Vpc/SECRETS_MANAGER": [
|
|
565
|
+
{
|
|
566
|
+
"type": "aws:cdk:analytics:construct",
|
|
567
|
+
"data": {
|
|
568
|
+
"vpc": "*",
|
|
569
|
+
"service": {
|
|
570
|
+
"privateDnsDefault": true,
|
|
571
|
+
"name": "*",
|
|
572
|
+
"port": "*"
|
|
573
|
+
},
|
|
574
|
+
"securityGroups": [
|
|
575
|
+
"*"
|
|
576
|
+
]
|
|
577
|
+
}
|
|
578
|
+
}
|
|
579
|
+
],
|
|
187
580
|
"/lamsec-deployFunctionWithVpc/Vpc/SECRETS_MANAGER/Resource": [
|
|
188
581
|
{
|
|
189
582
|
"type": "aws:cdk:logicalId",
|
|
@@ -214,6 +607,45 @@
|
|
|
214
607
|
"data": "CustomVpcRestrictDefaultSGCustomResourceProviderHandlerDC833E5E"
|
|
215
608
|
}
|
|
216
609
|
],
|
|
610
|
+
"/lamsec-deployFunctionWithVpc/lamsec-deployFunctionWithVpc-SECRETS_MANAGER-security-group": [
|
|
611
|
+
{
|
|
612
|
+
"type": "aws:cdk:analytics:construct",
|
|
613
|
+
"data": {
|
|
614
|
+
"vpc": "*",
|
|
615
|
+
"allowAllOutbound": true
|
|
616
|
+
}
|
|
617
|
+
},
|
|
618
|
+
{
|
|
619
|
+
"type": "aws:cdk:analytics:method",
|
|
620
|
+
"data": {
|
|
621
|
+
"addIngressRule": [
|
|
622
|
+
{
|
|
623
|
+
"canInlineRule": true,
|
|
624
|
+
"connections": "*",
|
|
625
|
+
"uniqueId": "*"
|
|
626
|
+
},
|
|
627
|
+
{},
|
|
628
|
+
"*",
|
|
629
|
+
"*"
|
|
630
|
+
]
|
|
631
|
+
}
|
|
632
|
+
},
|
|
633
|
+
{
|
|
634
|
+
"type": "aws:cdk:analytics:method",
|
|
635
|
+
"data": {
|
|
636
|
+
"addIngressRule": [
|
|
637
|
+
{
|
|
638
|
+
"canInlineRule": true,
|
|
639
|
+
"connections": "*",
|
|
640
|
+
"uniqueId": "*"
|
|
641
|
+
},
|
|
642
|
+
{},
|
|
643
|
+
"*",
|
|
644
|
+
false
|
|
645
|
+
]
|
|
646
|
+
}
|
|
647
|
+
}
|
|
648
|
+
],
|
|
217
649
|
"/lamsec-deployFunctionWithVpc/lamsec-deployFunctionWithVpc-SECRETS_MANAGER-security-group/Resource": [
|
|
218
650
|
{
|
|
219
651
|
"type": "aws:cdk:logicalId",
|
|
@@ -241,5 +673,6 @@
|
|
|
241
673
|
"file": "tree.json"
|
|
242
674
|
}
|
|
243
675
|
}
|
|
244
|
-
}
|
|
676
|
+
},
|
|
677
|
+
"minimumCliVersion": "2.1006.0"
|
|
245
678
|
}
|