@aws-solutions-constructs/aws-lambda-secretsmanager 2.79.1 → 2.81.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (35) hide show
  1. package/.jsii +43 -43
  2. package/lib/index.js +1 -1
  3. package/package.json +6 -6
  4. package/test/integ.lamsec-deployFunction.js.snapshot/asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c/index.js +21 -0
  5. package/test/integ.lamsec-deployFunction.js.snapshot/cdk.out +1 -1
  6. package/test/integ.lamsec-deployFunction.js.snapshot/integ.json +1 -1
  7. package/test/integ.lamsec-deployFunction.js.snapshot/lamsec-deployFunction.assets.json +6 -6
  8. package/test/integ.lamsec-deployFunction.js.snapshot/lamsec-deployFunction.template.json +25 -19
  9. package/test/integ.lamsec-deployFunction.js.snapshot/lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA.assets.json +1 -1
  10. package/test/integ.lamsec-deployFunction.js.snapshot/manifest.json +171 -3
  11. package/test/integ.lamsec-deployFunction.js.snapshot/tree.json +1 -342
  12. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/cdk.out +1 -1
  13. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/integ.json +1 -1
  14. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsec-deployFunctionWithExistingVpc.assets.json +3 -3
  15. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsec-deployFunctionWithExistingVpc.template.json +35 -7
  16. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsecdeployFunctionWithExistingVpcIntegDefaultTestDeployAssert647243A7.assets.json +1 -1
  17. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/manifest.json +508 -3
  18. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/tree.json +1 -1407
  19. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/cdk.out +1 -1
  20. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/integ.json +1 -1
  21. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.assets.json +3 -3
  22. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.template.json +33 -7
  23. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsecdeployFunctionWithVpcIntegDefaultTestDeployAssert66148FF5.assets.json +1 -1
  24. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/manifest.json +436 -3
  25. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/tree.json +1 -995
  26. package/test/integ.lamsec-existingFunction.js.snapshot/asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c/index.js +21 -0
  27. package/test/integ.lamsec-existingFunction.js.snapshot/cdk.out +1 -1
  28. package/test/integ.lamsec-existingFunction.js.snapshot/integ.json +1 -1
  29. package/test/integ.lamsec-existingFunction.js.snapshot/lamsec-existingFunction.assets.json +6 -6
  30. package/test/integ.lamsec-existingFunction.js.snapshot/lamsec-existingFunction.template.json +25 -19
  31. package/test/integ.lamsec-existingFunction.js.snapshot/lamsecexistingFunctionIntegDefaultTestDeployAssert295B352B.assets.json +1 -1
  32. package/test/integ.lamsec-existingFunction.js.snapshot/manifest.json +171 -3
  33. package/test/integ.lamsec-existingFunction.js.snapshot/tree.json +1 -342
  34. package/test/integ.lamsec-deployFunction.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +0 -8
  35. package/test/integ.lamsec-existingFunction.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +0 -8
@@ -1,342 +1 @@
1
- {
2
- "version": "tree-0.1",
3
- "tree": {
4
- "id": "App",
5
- "path": "",
6
- "children": {
7
- "lamsec-existingFunction": {
8
- "id": "lamsec-existingFunction",
9
- "path": "lamsec-existingFunction",
10
- "children": {
11
- "LambdaFunctionServiceRole": {
12
- "id": "LambdaFunctionServiceRole",
13
- "path": "lamsec-existingFunction/LambdaFunctionServiceRole",
14
- "children": {
15
- "ImportLambdaFunctionServiceRole": {
16
- "id": "ImportLambdaFunctionServiceRole",
17
- "path": "lamsec-existingFunction/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole",
18
- "constructInfo": {
19
- "fqn": "aws-cdk-lib.Resource",
20
- "version": "2.150.0"
21
- }
22
- },
23
- "Resource": {
24
- "id": "Resource",
25
- "path": "lamsec-existingFunction/LambdaFunctionServiceRole/Resource",
26
- "attributes": {
27
- "aws:cdk:cloudformation:type": "AWS::IAM::Role",
28
- "aws:cdk:cloudformation:props": {
29
- "assumeRolePolicyDocument": {
30
- "Statement": [
31
- {
32
- "Action": "sts:AssumeRole",
33
- "Effect": "Allow",
34
- "Principal": {
35
- "Service": "lambda.amazonaws.com"
36
- }
37
- }
38
- ],
39
- "Version": "2012-10-17"
40
- },
41
- "policies": [
42
- {
43
- "policyName": "LambdaFunctionServiceRolePolicy",
44
- "policyDocument": {
45
- "Statement": [
46
- {
47
- "Action": [
48
- "logs:CreateLogGroup",
49
- "logs:CreateLogStream",
50
- "logs:PutLogEvents"
51
- ],
52
- "Effect": "Allow",
53
- "Resource": {
54
- "Fn::Join": [
55
- "",
56
- [
57
- "arn:",
58
- {
59
- "Ref": "AWS::Partition"
60
- },
61
- ":logs:",
62
- {
63
- "Ref": "AWS::Region"
64
- },
65
- ":",
66
- {
67
- "Ref": "AWS::AccountId"
68
- },
69
- ":log-group:/aws/lambda/*"
70
- ]
71
- ]
72
- }
73
- }
74
- ],
75
- "Version": "2012-10-17"
76
- }
77
- }
78
- ]
79
- }
80
- },
81
- "constructInfo": {
82
- "fqn": "aws-cdk-lib.aws_iam.CfnRole",
83
- "version": "2.150.0"
84
- }
85
- },
86
- "DefaultPolicy": {
87
- "id": "DefaultPolicy",
88
- "path": "lamsec-existingFunction/LambdaFunctionServiceRole/DefaultPolicy",
89
- "children": {
90
- "Resource": {
91
- "id": "Resource",
92
- "path": "lamsec-existingFunction/LambdaFunctionServiceRole/DefaultPolicy/Resource",
93
- "attributes": {
94
- "aws:cdk:cloudformation:type": "AWS::IAM::Policy",
95
- "aws:cdk:cloudformation:props": {
96
- "policyDocument": {
97
- "Statement": [
98
- {
99
- "Action": [
100
- "xray:PutTelemetryRecords",
101
- "xray:PutTraceSegments"
102
- ],
103
- "Effect": "Allow",
104
- "Resource": "*"
105
- },
106
- {
107
- "Action": [
108
- "secretsmanager:DescribeSecret",
109
- "secretsmanager:GetSecretValue"
110
- ],
111
- "Effect": "Allow",
112
- "Resource": {
113
- "Ref": "testlambdasecretsmanagersecret4C99E6BF"
114
- }
115
- }
116
- ],
117
- "Version": "2012-10-17"
118
- },
119
- "policyName": "LambdaFunctionServiceRoleDefaultPolicy126C8897",
120
- "roles": [
121
- {
122
- "Ref": "LambdaFunctionServiceRole0C4CDE0B"
123
- }
124
- ]
125
- }
126
- },
127
- "constructInfo": {
128
- "fqn": "aws-cdk-lib.aws_iam.CfnPolicy",
129
- "version": "2.150.0"
130
- }
131
- }
132
- },
133
- "constructInfo": {
134
- "fqn": "aws-cdk-lib.aws_iam.Policy",
135
- "version": "2.150.0"
136
- }
137
- }
138
- },
139
- "constructInfo": {
140
- "fqn": "aws-cdk-lib.aws_iam.Role",
141
- "version": "2.150.0"
142
- }
143
- },
144
- "LambdaFunction": {
145
- "id": "LambdaFunction",
146
- "path": "lamsec-existingFunction/LambdaFunction",
147
- "children": {
148
- "Code": {
149
- "id": "Code",
150
- "path": "lamsec-existingFunction/LambdaFunction/Code",
151
- "children": {
152
- "Stage": {
153
- "id": "Stage",
154
- "path": "lamsec-existingFunction/LambdaFunction/Code/Stage",
155
- "constructInfo": {
156
- "fqn": "aws-cdk-lib.AssetStaging",
157
- "version": "2.150.0"
158
- }
159
- },
160
- "AssetBucket": {
161
- "id": "AssetBucket",
162
- "path": "lamsec-existingFunction/LambdaFunction/Code/AssetBucket",
163
- "constructInfo": {
164
- "fqn": "aws-cdk-lib.aws_s3.BucketBase",
165
- "version": "2.150.0"
166
- }
167
- }
168
- },
169
- "constructInfo": {
170
- "fqn": "aws-cdk-lib.aws_s3_assets.Asset",
171
- "version": "2.150.0"
172
- }
173
- },
174
- "Resource": {
175
- "id": "Resource",
176
- "path": "lamsec-existingFunction/LambdaFunction/Resource",
177
- "attributes": {
178
- "aws:cdk:cloudformation:type": "AWS::Lambda::Function",
179
- "aws:cdk:cloudformation:props": {
180
- "code": {
181
- "s3Bucket": {
182
- "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
183
- },
184
- "s3Key": "0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8.zip"
185
- },
186
- "environment": {
187
- "variables": {
188
- "AWS_NODEJS_CONNECTION_REUSE_ENABLED": "1",
189
- "SECRET_ARN": {
190
- "Ref": "testlambdasecretsmanagersecret4C99E6BF"
191
- }
192
- }
193
- },
194
- "handler": "index.handler",
195
- "role": {
196
- "Fn::GetAtt": [
197
- "LambdaFunctionServiceRole0C4CDE0B",
198
- "Arn"
199
- ]
200
- },
201
- "runtime": "nodejs20.x",
202
- "tracingConfig": {
203
- "mode": "Active"
204
- }
205
- }
206
- },
207
- "constructInfo": {
208
- "fqn": "aws-cdk-lib.aws_lambda.CfnFunction",
209
- "version": "2.150.0"
210
- }
211
- }
212
- },
213
- "constructInfo": {
214
- "fqn": "aws-cdk-lib.aws_lambda.Function",
215
- "version": "2.150.0"
216
- }
217
- },
218
- "test-lambda-secretsmanager": {
219
- "id": "test-lambda-secretsmanager",
220
- "path": "lamsec-existingFunction/test-lambda-secretsmanager",
221
- "children": {
222
- "secret": {
223
- "id": "secret",
224
- "path": "lamsec-existingFunction/test-lambda-secretsmanager/secret",
225
- "children": {
226
- "Resource": {
227
- "id": "Resource",
228
- "path": "lamsec-existingFunction/test-lambda-secretsmanager/secret/Resource",
229
- "attributes": {
230
- "aws:cdk:cloudformation:type": "AWS::SecretsManager::Secret",
231
- "aws:cdk:cloudformation:props": {
232
- "generateSecretString": {}
233
- }
234
- },
235
- "constructInfo": {
236
- "fqn": "aws-cdk-lib.aws_secretsmanager.CfnSecret",
237
- "version": "2.150.0"
238
- }
239
- }
240
- },
241
- "constructInfo": {
242
- "fqn": "aws-cdk-lib.aws_secretsmanager.Secret",
243
- "version": "2.150.0"
244
- }
245
- }
246
- },
247
- "constructInfo": {
248
- "fqn": "@aws-solutions-constructs/aws-lambda-secretsmanager.LambdaToSecretsmanager",
249
- "version": "2.63.0"
250
- }
251
- },
252
- "Integ": {
253
- "id": "Integ",
254
- "path": "lamsec-existingFunction/Integ",
255
- "children": {
256
- "DefaultTest": {
257
- "id": "DefaultTest",
258
- "path": "lamsec-existingFunction/Integ/DefaultTest",
259
- "children": {
260
- "Default": {
261
- "id": "Default",
262
- "path": "lamsec-existingFunction/Integ/DefaultTest/Default",
263
- "constructInfo": {
264
- "fqn": "constructs.Construct",
265
- "version": "10.3.0"
266
- }
267
- },
268
- "DeployAssert": {
269
- "id": "DeployAssert",
270
- "path": "lamsec-existingFunction/Integ/DefaultTest/DeployAssert",
271
- "children": {
272
- "BootstrapVersion": {
273
- "id": "BootstrapVersion",
274
- "path": "lamsec-existingFunction/Integ/DefaultTest/DeployAssert/BootstrapVersion",
275
- "constructInfo": {
276
- "fqn": "aws-cdk-lib.CfnParameter",
277
- "version": "2.150.0"
278
- }
279
- },
280
- "CheckBootstrapVersion": {
281
- "id": "CheckBootstrapVersion",
282
- "path": "lamsec-existingFunction/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion",
283
- "constructInfo": {
284
- "fqn": "aws-cdk-lib.CfnRule",
285
- "version": "2.150.0"
286
- }
287
- }
288
- },
289
- "constructInfo": {
290
- "fqn": "aws-cdk-lib.Stack",
291
- "version": "2.150.0"
292
- }
293
- }
294
- },
295
- "constructInfo": {
296
- "fqn": "@aws-cdk/integ-tests-alpha.IntegTestCase",
297
- "version": "2.150.0-alpha.0"
298
- }
299
- }
300
- },
301
- "constructInfo": {
302
- "fqn": "@aws-cdk/integ-tests-alpha.IntegTest",
303
- "version": "2.150.0-alpha.0"
304
- }
305
- },
306
- "BootstrapVersion": {
307
- "id": "BootstrapVersion",
308
- "path": "lamsec-existingFunction/BootstrapVersion",
309
- "constructInfo": {
310
- "fqn": "aws-cdk-lib.CfnParameter",
311
- "version": "2.150.0"
312
- }
313
- },
314
- "CheckBootstrapVersion": {
315
- "id": "CheckBootstrapVersion",
316
- "path": "lamsec-existingFunction/CheckBootstrapVersion",
317
- "constructInfo": {
318
- "fqn": "aws-cdk-lib.CfnRule",
319
- "version": "2.150.0"
320
- }
321
- }
322
- },
323
- "constructInfo": {
324
- "fqn": "aws-cdk-lib.Stack",
325
- "version": "2.150.0"
326
- }
327
- },
328
- "Tree": {
329
- "id": "Tree",
330
- "path": "Tree",
331
- "constructInfo": {
332
- "fqn": "constructs.Construct",
333
- "version": "10.3.0"
334
- }
335
- }
336
- },
337
- "constructInfo": {
338
- "fqn": "aws-cdk-lib.App",
339
- "version": "2.150.0"
340
- }
341
- }
342
- }
1
+ {"version":"tree-0.1","tree":{"id":"App","path":"","children":{"lamsec-existingFunction":{"id":"lamsec-existingFunction","path":"lamsec-existingFunction","children":{"LambdaFunctionServiceRole":{"id":"LambdaFunctionServiceRole","path":"lamsec-existingFunction/LambdaFunctionServiceRole","children":{"ImportLambdaFunctionServiceRole":{"id":"ImportLambdaFunctionServiceRole","path":"lamsec-existingFunction/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole","constructInfo":{"fqn":"aws-cdk-lib.Resource","version":"2.186.0","metadata":["*"]}},"Resource":{"id":"Resource","path":"lamsec-existingFunction/LambdaFunctionServiceRole/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Role","aws:cdk:cloudformation:props":{"assumeRolePolicyDocument":{"Statement":[{"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"Service":"lambda.amazonaws.com"}}],"Version":"2012-10-17"},"policies":[{"policyName":"LambdaFunctionServiceRolePolicy","policyDocument":{"Statement":[{"Action":["logs:CreateLogGroup","logs:CreateLogStream","logs:PutLogEvents"],"Effect":"Allow","Resource":{"Fn::Join":["",["arn:",{"Ref":"AWS::Partition"},":logs:",{"Ref":"AWS::Region"},":",{"Ref":"AWS::AccountId"},":log-group:/aws/lambda/*"]]}}],"Version":"2012-10-17"}}]}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnRole","version":"2.186.0"}},"DefaultPolicy":{"id":"DefaultPolicy","path":"lamsec-existingFunction/LambdaFunctionServiceRole/DefaultPolicy","children":{"Resource":{"id":"Resource","path":"lamsec-existingFunction/LambdaFunctionServiceRole/DefaultPolicy/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Policy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":["secretsmanager:DescribeSecret","secretsmanager:GetSecretValue"],"Effect":"Allow","Resource":{"Ref":"testlambdasecretsmanagersecret4C99E6BF"}}],"Version":"2012-10-17"},"policyName":"LambdaFunctionServiceRoleDefaultPolicy126C8897","roles":[{"Ref":"LambdaFunctionServiceRole0C4CDE0B"}]}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnPolicy","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Policy","version":"2.186.0","metadata":["*",{"attachToRole":["*"]},{"attachToRole":["*"]},{"addStatements":[{}]}]}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Role","version":"2.186.0","metadata":[{"assumedBy":{"principalAccount":"*","assumeRoleAction":"*"},"inlinePolicies":"*"},{"attachInlinePolicy":["*"]},{"attachInlinePolicy":["*"]},{"addToPrincipalPolicy":[{}]},{"attachInlinePolicy":["*"]},{"attachInlinePolicy":["*"]}]}},"LambdaFunction":{"id":"LambdaFunction","path":"lamsec-existingFunction/LambdaFunction","children":{"Code":{"id":"Code","path":"lamsec-existingFunction/LambdaFunction/Code","children":{"Stage":{"id":"Stage","path":"lamsec-existingFunction/LambdaFunction/Code/Stage","constructInfo":{"fqn":"aws-cdk-lib.AssetStaging","version":"2.186.0"}},"AssetBucket":{"id":"AssetBucket","path":"lamsec-existingFunction/LambdaFunction/Code/AssetBucket","constructInfo":{"fqn":"aws-cdk-lib.aws_s3.BucketBase","version":"2.186.0","metadata":[]}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_s3_assets.Asset","version":"2.186.0"}},"Resource":{"id":"Resource","path":"lamsec-existingFunction/LambdaFunction/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::Lambda::Function","aws:cdk:cloudformation:props":{"code":{"s3Bucket":{"Fn::Sub":"cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"},"s3Key":"a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c.zip"},"environment":{"variables":{"AWS_NODEJS_CONNECTION_REUSE_ENABLED":"1","SECRET_ARN":{"Ref":"testlambdasecretsmanagersecret4C99E6BF"}}},"handler":"index.handler","role":{"Fn::GetAtt":["LambdaFunctionServiceRole0C4CDE0B","Arn"]},"runtime":"nodejs20.x","tracingConfig":{"mode":"Active"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.CfnFunction","version":"2.186.0"}},"inlinePolicyAddedToExecutionRole-0":{"id":"inlinePolicyAddedToExecutionRole-0","path":"lamsec-existingFunction/LambdaFunction/inlinePolicyAddedToExecutionRole-0","children":{"Resource":{"id":"Resource","path":"lamsec-existingFunction/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Policy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":["xray:PutTelemetryRecords","xray:PutTraceSegments"],"Effect":"Allow","Resource":"*"}],"Version":"2012-10-17"},"policyName":"LambdaFunctioninlinePolicyAddedToExecutionRole007875684","roles":[{"Ref":"LambdaFunctionServiceRole0C4CDE0B"}]}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnPolicy","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Policy","version":"2.186.0","metadata":[{"statements":"*"},{"addStatements":[{}]},{"attachToRole":["*"]},{"attachToRole":["*"]}]}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.Function","version":"2.186.0","metadata":[{"role":"*","tracing":"Active","runtime":"*","handler":"*","code":"*"},{"addEnvironment":["*","*",{"removeInEdge":true}]},{"addEnvironment":["*","*"]}]}},"test-lambda-secretsmanager":{"id":"test-lambda-secretsmanager","path":"lamsec-existingFunction/test-lambda-secretsmanager","children":{"secret":{"id":"secret","path":"lamsec-existingFunction/test-lambda-secretsmanager/secret","children":{"Resource":{"id":"Resource","path":"lamsec-existingFunction/test-lambda-secretsmanager/secret/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::SecretsManager::Secret","aws:cdk:cloudformation:props":{"generateSecretString":{}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_secretsmanager.CfnSecret","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_secretsmanager.Secret","version":"2.186.0","metadata":[{"removalPolicy":"destroy"}]}}},"constructInfo":{"fqn":"@aws-solutions-constructs/aws-lambda-secretsmanager.LambdaToSecretsmanager","version":"2.80.0"}},"Integ":{"id":"Integ","path":"lamsec-existingFunction/Integ","children":{"DefaultTest":{"id":"DefaultTest","path":"lamsec-existingFunction/Integ/DefaultTest","children":{"Default":{"id":"Default","path":"lamsec-existingFunction/Integ/DefaultTest/Default","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}},"DeployAssert":{"id":"DeployAssert","path":"lamsec-existingFunction/Integ/DefaultTest/DeployAssert","children":{"BootstrapVersion":{"id":"BootstrapVersion","path":"lamsec-existingFunction/Integ/DefaultTest/DeployAssert/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.186.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"lamsec-existingFunction/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.186.0"}}},"constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTestCase","version":"2.186.0-alpha.0"}}},"constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTest","version":"2.186.0-alpha.0"}},"BootstrapVersion":{"id":"BootstrapVersion","path":"lamsec-existingFunction/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.186.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"lamsec-existingFunction/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.186.0"}},"Tree":{"id":"Tree","path":"Tree","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}}},"constructInfo":{"fqn":"aws-cdk-lib.App","version":"2.186.0"}}}
@@ -1,8 +0,0 @@
1
- exports.handler = async function(event) {
2
- console.log('request:', JSON.stringify(event, undefined, 2));
3
- return {
4
- statusCode: 200,
5
- headers: { 'Content-Type': 'text/plain' },
6
- body: `Hello, CDK! You've hit ${event.path}\n`
7
- };
8
- };
@@ -1,8 +0,0 @@
1
- exports.handler = async function(event) {
2
- console.log('request:', JSON.stringify(event, undefined, 2));
3
- return {
4
- statusCode: 200,
5
- headers: { 'Content-Type': 'text/plain' },
6
- body: `Hello, CDK! You've hit ${event.path}\n`
7
- };
8
- };