@aws-solutions-constructs/aws-lambda-secretsmanager 2.79.1 → 2.81.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (35) hide show
  1. package/.jsii +43 -43
  2. package/lib/index.js +1 -1
  3. package/package.json +6 -6
  4. package/test/integ.lamsec-deployFunction.js.snapshot/asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c/index.js +21 -0
  5. package/test/integ.lamsec-deployFunction.js.snapshot/cdk.out +1 -1
  6. package/test/integ.lamsec-deployFunction.js.snapshot/integ.json +1 -1
  7. package/test/integ.lamsec-deployFunction.js.snapshot/lamsec-deployFunction.assets.json +6 -6
  8. package/test/integ.lamsec-deployFunction.js.snapshot/lamsec-deployFunction.template.json +25 -19
  9. package/test/integ.lamsec-deployFunction.js.snapshot/lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA.assets.json +1 -1
  10. package/test/integ.lamsec-deployFunction.js.snapshot/manifest.json +171 -3
  11. package/test/integ.lamsec-deployFunction.js.snapshot/tree.json +1 -342
  12. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/cdk.out +1 -1
  13. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/integ.json +1 -1
  14. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsec-deployFunctionWithExistingVpc.assets.json +3 -3
  15. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsec-deployFunctionWithExistingVpc.template.json +35 -7
  16. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsecdeployFunctionWithExistingVpcIntegDefaultTestDeployAssert647243A7.assets.json +1 -1
  17. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/manifest.json +508 -3
  18. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/tree.json +1 -1407
  19. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/cdk.out +1 -1
  20. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/integ.json +1 -1
  21. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.assets.json +3 -3
  22. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.template.json +33 -7
  23. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsecdeployFunctionWithVpcIntegDefaultTestDeployAssert66148FF5.assets.json +1 -1
  24. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/manifest.json +436 -3
  25. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/tree.json +1 -995
  26. package/test/integ.lamsec-existingFunction.js.snapshot/asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c/index.js +21 -0
  27. package/test/integ.lamsec-existingFunction.js.snapshot/cdk.out +1 -1
  28. package/test/integ.lamsec-existingFunction.js.snapshot/integ.json +1 -1
  29. package/test/integ.lamsec-existingFunction.js.snapshot/lamsec-existingFunction.assets.json +6 -6
  30. package/test/integ.lamsec-existingFunction.js.snapshot/lamsec-existingFunction.template.json +25 -19
  31. package/test/integ.lamsec-existingFunction.js.snapshot/lamsecexistingFunctionIntegDefaultTestDeployAssert295B352B.assets.json +1 -1
  32. package/test/integ.lamsec-existingFunction.js.snapshot/manifest.json +171 -3
  33. package/test/integ.lamsec-existingFunction.js.snapshot/tree.json +1 -342
  34. package/test/integ.lamsec-deployFunction.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +0 -8
  35. package/test/integ.lamsec-existingFunction.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +0 -8
@@ -1 +1 @@
1
- {"version":"39.0.0"}
1
+ {"version":"40.0.0"}
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "39.0.0",
2
+ "version": "40.0.0",
3
3
  "testCases": {
4
4
  "lamsec-deployFunctionWithVpc/Integ/DefaultTest": {
5
5
  "stacks": [
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "39.0.0",
2
+ "version": "40.0.0",
3
3
  "files": {
4
4
  "7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200": {
5
5
  "source": {
@@ -27,7 +27,7 @@
27
27
  }
28
28
  }
29
29
  },
30
- "554469df7dc68c62e314d2e15a5e504cc7c5cf9ff30ea51202e7acf77d24962e": {
30
+ "9ec37a379aed9ae1dacee6c8bb5b0b86752110a4a42c2e48daeab4cbb78f5782": {
31
31
  "source": {
32
32
  "path": "lamsec-deployFunctionWithVpc.template.json",
33
33
  "packaging": "file"
@@ -35,7 +35,7 @@
35
35
  "destinations": {
36
36
  "current_account-current_region": {
37
37
  "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
38
- "objectKey": "554469df7dc68c62e314d2e15a5e504cc7c5cf9ff30ea51202e7acf77d24962e.json",
38
+ "objectKey": "9ec37a379aed9ae1dacee6c8bb5b0b86752110a4a42c2e48daeab4cbb78f5782.json",
39
39
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
40
40
  }
41
41
  }
@@ -74,9 +74,7 @@
74
74
  "ec2:CreateNetworkInterface",
75
75
  "ec2:DeleteNetworkInterface",
76
76
  "ec2:DescribeNetworkInterfaces",
77
- "ec2:UnassignPrivateIpAddresses",
78
- "xray:PutTelemetryRecords",
79
- "xray:PutTraceSegments"
77
+ "ec2:UnassignPrivateIpAddresses"
80
78
  ],
81
79
  "Effect": "Allow",
82
80
  "Resource": "*"
@@ -214,6 +212,34 @@
214
212
  }
215
213
  }
216
214
  },
215
+ "testlambdasecretsmanagerLambdaFunctioninlinePolicyAddedToExecutionRole0A805C55F": {
216
+ "Type": "AWS::IAM::Policy",
217
+ "Properties": {
218
+ "PolicyDocument": {
219
+ "Statement": [
220
+ {
221
+ "Action": [
222
+ "xray:PutTelemetryRecords",
223
+ "xray:PutTraceSegments"
224
+ ],
225
+ "Effect": "Allow",
226
+ "Resource": "*"
227
+ }
228
+ ],
229
+ "Version": "2012-10-17"
230
+ },
231
+ "PolicyName": "testlambdasecretsmanagerLambdaFunctioninlinePolicyAddedToExecutionRole0A805C55F",
232
+ "Roles": [
233
+ {
234
+ "Ref": "testlambdasecretsmanagerLambdaFunctionServiceRole92CE007F"
235
+ }
236
+ ]
237
+ },
238
+ "DependsOn": [
239
+ "VpcisolatedSubnet1RouteTableAssociationD259E31A",
240
+ "VpcisolatedSubnet2RouteTableAssociation25A4716F"
241
+ ]
242
+ },
217
243
  "testlambdasecretsmanagersecret4C99E6BF": {
218
244
  "Type": "AWS::SecretsManager::Secret",
219
245
  "Properties": {
@@ -772,10 +798,10 @@
772
798
  "value": "nodejs20.x"
773
799
  },
774
800
  "cn-north-1": {
775
- "value": "nodejs18.x"
801
+ "value": "nodejs20.x"
776
802
  },
777
803
  "cn-northwest-1": {
778
- "value": "nodejs18.x"
804
+ "value": "nodejs20.x"
779
805
  },
780
806
  "eu-central-1": {
781
807
  "value": "nodejs20.x"
@@ -826,10 +852,10 @@
826
852
  "value": "nodejs20.x"
827
853
  },
828
854
  "us-gov-east-1": {
829
- "value": "nodejs18.x"
855
+ "value": "nodejs20.x"
830
856
  },
831
857
  "us-gov-west-1": {
832
- "value": "nodejs18.x"
858
+ "value": "nodejs20.x"
833
859
  },
834
860
  "us-iso-east-1": {
835
861
  "value": "nodejs18.x"
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "39.0.0",
2
+ "version": "40.0.0",
3
3
  "files": {
4
4
  "21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22": {
5
5
  "source": {
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "39.0.0",
2
+ "version": "42.0.0",
3
3
  "artifacts": {
4
4
  "lamsecdeployFunctionWithVpcIntegDefaultTestDeployAssert66148FF5.assets": {
5
5
  "type": "cdk:asset-manifest",
@@ -66,7 +66,7 @@
66
66
  "validateOnSynth": false,
67
67
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
68
68
  "cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
69
- "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/554469df7dc68c62e314d2e15a5e504cc7c5cf9ff30ea51202e7acf77d24962e.json",
69
+ "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/9ec37a379aed9ae1dacee6c8bb5b0b86752110a4a42c2e48daeab4cbb78f5782.json",
70
70
  "requiresBootstrapStackVersion": 6,
71
71
  "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
72
72
  "additionalDependencies": [
@@ -82,42 +82,287 @@
82
82
  "lamsec-deployFunctionWithVpc.assets"
83
83
  ],
84
84
  "metadata": {
85
+ "/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/LambdaFunctionServiceRole": [
86
+ {
87
+ "type": "aws:cdk:analytics:construct",
88
+ "data": {
89
+ "assumedBy": {
90
+ "principalAccount": "*",
91
+ "assumeRoleAction": "*"
92
+ },
93
+ "inlinePolicies": "*"
94
+ }
95
+ },
96
+ {
97
+ "type": "aws:cdk:analytics:method",
98
+ "data": {
99
+ "addToPolicy": [
100
+ {}
101
+ ]
102
+ }
103
+ },
104
+ {
105
+ "type": "aws:cdk:analytics:method",
106
+ "data": {
107
+ "addToPrincipalPolicy": [
108
+ {}
109
+ ]
110
+ }
111
+ },
112
+ {
113
+ "type": "aws:cdk:analytics:method",
114
+ "data": {
115
+ "attachInlinePolicy": [
116
+ "*"
117
+ ]
118
+ }
119
+ },
120
+ {
121
+ "type": "aws:cdk:analytics:method",
122
+ "data": {
123
+ "attachInlinePolicy": [
124
+ "*"
125
+ ]
126
+ }
127
+ },
128
+ {
129
+ "type": "aws:cdk:analytics:method",
130
+ "data": {
131
+ "attachInlinePolicy": [
132
+ "*"
133
+ ]
134
+ }
135
+ },
136
+ {
137
+ "type": "aws:cdk:analytics:method",
138
+ "data": {
139
+ "attachInlinePolicy": [
140
+ "*"
141
+ ]
142
+ }
143
+ },
144
+ {
145
+ "type": "aws:cdk:analytics:method",
146
+ "data": {
147
+ "addToPrincipalPolicy": [
148
+ {}
149
+ ]
150
+ }
151
+ }
152
+ ],
153
+ "/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole": [
154
+ {
155
+ "type": "aws:cdk:analytics:construct",
156
+ "data": "*"
157
+ }
158
+ ],
85
159
  "/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/LambdaFunctionServiceRole/Resource": [
86
160
  {
87
161
  "type": "aws:cdk:logicalId",
88
162
  "data": "testlambdasecretsmanagerLambdaFunctionServiceRole92CE007F"
89
163
  }
90
164
  ],
165
+ "/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/LambdaFunctionServiceRole/DefaultPolicy": [
166
+ {
167
+ "type": "aws:cdk:analytics:construct",
168
+ "data": "*"
169
+ },
170
+ {
171
+ "type": "aws:cdk:analytics:method",
172
+ "data": {
173
+ "attachToRole": [
174
+ "*"
175
+ ]
176
+ }
177
+ },
178
+ {
179
+ "type": "aws:cdk:analytics:method",
180
+ "data": {
181
+ "attachToRole": [
182
+ "*"
183
+ ]
184
+ }
185
+ },
186
+ {
187
+ "type": "aws:cdk:analytics:method",
188
+ "data": {
189
+ "addStatements": [
190
+ {}
191
+ ]
192
+ }
193
+ },
194
+ {
195
+ "type": "aws:cdk:analytics:method",
196
+ "data": {
197
+ "addStatements": [
198
+ {}
199
+ ]
200
+ }
201
+ }
202
+ ],
91
203
  "/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/LambdaFunctionServiceRole/DefaultPolicy/Resource": [
92
204
  {
93
205
  "type": "aws:cdk:logicalId",
94
206
  "data": "testlambdasecretsmanagerLambdaFunctionServiceRoleDefaultPolicyF24BF460"
95
207
  }
96
208
  ],
209
+ "/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/ReplaceDefaultSecurityGroup-security-group": [
210
+ {
211
+ "type": "aws:cdk:analytics:construct",
212
+ "data": {
213
+ "vpc": "*",
214
+ "allowAllOutbound": true
215
+ }
216
+ }
217
+ ],
97
218
  "/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/ReplaceDefaultSecurityGroup-security-group/Resource": [
98
219
  {
99
220
  "type": "aws:cdk:logicalId",
100
221
  "data": "testlambdasecretsmanagerReplaceDefaultSecurityGroupsecuritygroupF837FD37"
101
222
  }
102
223
  ],
224
+ "/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/LambdaFunction": [
225
+ {
226
+ "type": "aws:cdk:analytics:construct",
227
+ "data": {
228
+ "role": "*",
229
+ "tracing": "Active",
230
+ "runtime": "*",
231
+ "handler": "*",
232
+ "code": "*",
233
+ "securityGroups": [
234
+ "*"
235
+ ],
236
+ "vpc": "*"
237
+ }
238
+ },
239
+ {
240
+ "type": "aws:cdk:analytics:method",
241
+ "data": {
242
+ "addEnvironment": [
243
+ "*",
244
+ "*",
245
+ {
246
+ "removeInEdge": true
247
+ }
248
+ ]
249
+ }
250
+ },
251
+ {
252
+ "type": "aws:cdk:analytics:method",
253
+ "data": {
254
+ "addEnvironment": [
255
+ "*",
256
+ "*"
257
+ ]
258
+ }
259
+ }
260
+ ],
103
261
  "/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/LambdaFunction/Resource": [
104
262
  {
105
263
  "type": "aws:cdk:logicalId",
106
264
  "data": "testlambdasecretsmanagerLambdaFunction130E7301"
107
265
  }
108
266
  ],
267
+ "/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/LambdaFunction/inlinePolicyAddedToExecutionRole-0": [
268
+ {
269
+ "type": "aws:cdk:analytics:construct",
270
+ "data": {
271
+ "statements": "*"
272
+ }
273
+ },
274
+ {
275
+ "type": "aws:cdk:analytics:method",
276
+ "data": {
277
+ "addStatements": [
278
+ {}
279
+ ]
280
+ }
281
+ },
282
+ {
283
+ "type": "aws:cdk:analytics:method",
284
+ "data": {
285
+ "attachToRole": [
286
+ "*"
287
+ ]
288
+ }
289
+ },
290
+ {
291
+ "type": "aws:cdk:analytics:method",
292
+ "data": {
293
+ "attachToRole": [
294
+ "*"
295
+ ]
296
+ }
297
+ }
298
+ ],
299
+ "/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource": [
300
+ {
301
+ "type": "aws:cdk:logicalId",
302
+ "data": "testlambdasecretsmanagerLambdaFunctioninlinePolicyAddedToExecutionRole0A805C55F"
303
+ }
304
+ ],
305
+ "/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/secret": [
306
+ {
307
+ "type": "aws:cdk:analytics:construct",
308
+ "data": {
309
+ "removalPolicy": "destroy"
310
+ }
311
+ }
312
+ ],
109
313
  "/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/secret/Resource": [
110
314
  {
111
315
  "type": "aws:cdk:logicalId",
112
316
  "data": "testlambdasecretsmanagersecret4C99E6BF"
113
317
  }
114
318
  ],
319
+ "/lamsec-deployFunctionWithVpc/Vpc": [
320
+ {
321
+ "type": "aws:cdk:analytics:construct",
322
+ "data": {
323
+ "natGateways": "*",
324
+ "subnetConfiguration": [
325
+ {
326
+ "cidrMask": "*",
327
+ "name": "*",
328
+ "subnetType": "Isolated"
329
+ }
330
+ ],
331
+ "enableDnsHostnames": true,
332
+ "enableDnsSupport": true
333
+ }
334
+ }
335
+ ],
115
336
  "/lamsec-deployFunctionWithVpc/Vpc/Resource": [
116
337
  {
117
338
  "type": "aws:cdk:logicalId",
118
339
  "data": "Vpc8378EB38"
119
340
  }
120
341
  ],
342
+ "/lamsec-deployFunctionWithVpc/Vpc/isolatedSubnet1": [
343
+ {
344
+ "type": "aws:cdk:analytics:construct",
345
+ "data": {
346
+ "availabilityZone": "*",
347
+ "vpcId": "*",
348
+ "cidrBlock": "*",
349
+ "mapPublicIpOnLaunch": false,
350
+ "ipv6CidrBlock": "*",
351
+ "assignIpv6AddressOnCreation": "*"
352
+ }
353
+ },
354
+ {
355
+ "type": "aws:cdk:analytics:construct",
356
+ "data": {
357
+ "availabilityZone": "*",
358
+ "vpcId": "*",
359
+ "cidrBlock": "*",
360
+ "mapPublicIpOnLaunch": false,
361
+ "ipv6CidrBlock": "*",
362
+ "assignIpv6AddressOnCreation": "*"
363
+ }
364
+ }
365
+ ],
121
366
  "/lamsec-deployFunctionWithVpc/Vpc/isolatedSubnet1/Subnet": [
122
367
  {
123
368
  "type": "aws:cdk:logicalId",
@@ -136,6 +381,30 @@
136
381
  "data": "VpcisolatedSubnet1RouteTableAssociationD259E31A"
137
382
  }
138
383
  ],
384
+ "/lamsec-deployFunctionWithVpc/Vpc/isolatedSubnet2": [
385
+ {
386
+ "type": "aws:cdk:analytics:construct",
387
+ "data": {
388
+ "availabilityZone": "*",
389
+ "vpcId": "*",
390
+ "cidrBlock": "*",
391
+ "mapPublicIpOnLaunch": false,
392
+ "ipv6CidrBlock": "*",
393
+ "assignIpv6AddressOnCreation": "*"
394
+ }
395
+ },
396
+ {
397
+ "type": "aws:cdk:analytics:construct",
398
+ "data": {
399
+ "availabilityZone": "*",
400
+ "vpcId": "*",
401
+ "cidrBlock": "*",
402
+ "mapPublicIpOnLaunch": false,
403
+ "ipv6CidrBlock": "*",
404
+ "assignIpv6AddressOnCreation": "*"
405
+ }
406
+ }
407
+ ],
139
408
  "/lamsec-deployFunctionWithVpc/Vpc/isolatedSubnet2/Subnet": [
140
409
  {
141
410
  "type": "aws:cdk:logicalId",
@@ -154,24 +423,132 @@
154
423
  "data": "VpcisolatedSubnet2RouteTableAssociation25A4716F"
155
424
  }
156
425
  ],
426
+ "/lamsec-deployFunctionWithVpc/Vpc/RestrictDefaultSecurityGroupCustomResource": [
427
+ {
428
+ "type": "aws:cdk:analytics:construct",
429
+ "data": "*"
430
+ }
431
+ ],
157
432
  "/lamsec-deployFunctionWithVpc/Vpc/RestrictDefaultSecurityGroupCustomResource/Default": [
158
433
  {
159
434
  "type": "aws:cdk:logicalId",
160
435
  "data": "VpcRestrictDefaultSecurityGroupCustomResourceC73DA2BE"
161
436
  }
162
437
  ],
438
+ "/lamsec-deployFunctionWithVpc/Vpc/FlowLog": [
439
+ {
440
+ "type": "aws:cdk:analytics:construct",
441
+ "data": {
442
+ "resourceType": "*"
443
+ }
444
+ }
445
+ ],
446
+ "/lamsec-deployFunctionWithVpc/Vpc/FlowLog/IAMRole": [
447
+ {
448
+ "type": "aws:cdk:analytics:construct",
449
+ "data": {
450
+ "roleName": "*",
451
+ "assumedBy": {
452
+ "principalAccount": "*",
453
+ "assumeRoleAction": "*"
454
+ }
455
+ }
456
+ },
457
+ {
458
+ "type": "aws:cdk:analytics:method",
459
+ "data": {
460
+ "addToPrincipalPolicy": [
461
+ {}
462
+ ]
463
+ }
464
+ },
465
+ {
466
+ "type": "aws:cdk:analytics:method",
467
+ "data": {
468
+ "attachInlinePolicy": [
469
+ "*"
470
+ ]
471
+ }
472
+ },
473
+ {
474
+ "type": "aws:cdk:analytics:method",
475
+ "data": {
476
+ "attachInlinePolicy": [
477
+ "*"
478
+ ]
479
+ }
480
+ },
481
+ {
482
+ "type": "aws:cdk:analytics:method",
483
+ "data": {
484
+ "addToPrincipalPolicy": [
485
+ {}
486
+ ]
487
+ }
488
+ }
489
+ ],
490
+ "/lamsec-deployFunctionWithVpc/Vpc/FlowLog/IAMRole/ImportIAMRole": [
491
+ {
492
+ "type": "aws:cdk:analytics:construct",
493
+ "data": "*"
494
+ }
495
+ ],
163
496
  "/lamsec-deployFunctionWithVpc/Vpc/FlowLog/IAMRole/Resource": [
164
497
  {
165
498
  "type": "aws:cdk:logicalId",
166
499
  "data": "VpcFlowLogIAMRole6A475D41"
167
500
  }
168
501
  ],
502
+ "/lamsec-deployFunctionWithVpc/Vpc/FlowLog/IAMRole/DefaultPolicy": [
503
+ {
504
+ "type": "aws:cdk:analytics:construct",
505
+ "data": "*"
506
+ },
507
+ {
508
+ "type": "aws:cdk:analytics:method",
509
+ "data": {
510
+ "attachToRole": [
511
+ "*"
512
+ ]
513
+ }
514
+ },
515
+ {
516
+ "type": "aws:cdk:analytics:method",
517
+ "data": {
518
+ "attachToRole": [
519
+ "*"
520
+ ]
521
+ }
522
+ },
523
+ {
524
+ "type": "aws:cdk:analytics:method",
525
+ "data": {
526
+ "addStatements": [
527
+ {}
528
+ ]
529
+ }
530
+ },
531
+ {
532
+ "type": "aws:cdk:analytics:method",
533
+ "data": {
534
+ "addStatements": [
535
+ {}
536
+ ]
537
+ }
538
+ }
539
+ ],
169
540
  "/lamsec-deployFunctionWithVpc/Vpc/FlowLog/IAMRole/DefaultPolicy/Resource": [
170
541
  {
171
542
  "type": "aws:cdk:logicalId",
172
543
  "data": "VpcFlowLogIAMRoleDefaultPolicy406FB995"
173
544
  }
174
545
  ],
546
+ "/lamsec-deployFunctionWithVpc/Vpc/FlowLog/LogGroup": [
547
+ {
548
+ "type": "aws:cdk:analytics:construct",
549
+ "data": "*"
550
+ }
551
+ ],
175
552
  "/lamsec-deployFunctionWithVpc/Vpc/FlowLog/LogGroup/Resource": [
176
553
  {
177
554
  "type": "aws:cdk:logicalId",
@@ -184,6 +561,22 @@
184
561
  "data": "VpcFlowLog8FF33A73"
185
562
  }
186
563
  ],
564
+ "/lamsec-deployFunctionWithVpc/Vpc/SECRETS_MANAGER": [
565
+ {
566
+ "type": "aws:cdk:analytics:construct",
567
+ "data": {
568
+ "vpc": "*",
569
+ "service": {
570
+ "privateDnsDefault": true,
571
+ "name": "*",
572
+ "port": "*"
573
+ },
574
+ "securityGroups": [
575
+ "*"
576
+ ]
577
+ }
578
+ }
579
+ ],
187
580
  "/lamsec-deployFunctionWithVpc/Vpc/SECRETS_MANAGER/Resource": [
188
581
  {
189
582
  "type": "aws:cdk:logicalId",
@@ -214,6 +607,45 @@
214
607
  "data": "CustomVpcRestrictDefaultSGCustomResourceProviderHandlerDC833E5E"
215
608
  }
216
609
  ],
610
+ "/lamsec-deployFunctionWithVpc/lamsec-deployFunctionWithVpc-SECRETS_MANAGER-security-group": [
611
+ {
612
+ "type": "aws:cdk:analytics:construct",
613
+ "data": {
614
+ "vpc": "*",
615
+ "allowAllOutbound": true
616
+ }
617
+ },
618
+ {
619
+ "type": "aws:cdk:analytics:method",
620
+ "data": {
621
+ "addIngressRule": [
622
+ {
623
+ "canInlineRule": true,
624
+ "connections": "*",
625
+ "uniqueId": "*"
626
+ },
627
+ {},
628
+ "*",
629
+ "*"
630
+ ]
631
+ }
632
+ },
633
+ {
634
+ "type": "aws:cdk:analytics:method",
635
+ "data": {
636
+ "addIngressRule": [
637
+ {
638
+ "canInlineRule": true,
639
+ "connections": "*",
640
+ "uniqueId": "*"
641
+ },
642
+ {},
643
+ "*",
644
+ false
645
+ ]
646
+ }
647
+ }
648
+ ],
217
649
  "/lamsec-deployFunctionWithVpc/lamsec-deployFunctionWithVpc-SECRETS_MANAGER-security-group/Resource": [
218
650
  {
219
651
  "type": "aws:cdk:logicalId",
@@ -241,5 +673,6 @@
241
673
  "file": "tree.json"
242
674
  }
243
675
  }
244
- }
676
+ },
677
+ "minimumCliVersion": "2.1006.0"
245
678
  }