@aws-solutions-constructs/aws-lambda-secretsmanager 2.80.0 → 2.81.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (35) hide show
  1. package/.jsii +43 -4
  2. package/lib/index.js +1 -1
  3. package/package.json +6 -6
  4. package/test/integ.lamsec-deployFunction.js.snapshot/asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c/index.js +21 -0
  5. package/test/integ.lamsec-deployFunction.js.snapshot/cdk.out +1 -1
  6. package/test/integ.lamsec-deployFunction.js.snapshot/integ.json +1 -1
  7. package/test/integ.lamsec-deployFunction.js.snapshot/lamsec-deployFunction.assets.json +6 -6
  8. package/test/integ.lamsec-deployFunction.js.snapshot/lamsec-deployFunction.template.json +25 -19
  9. package/test/integ.lamsec-deployFunction.js.snapshot/lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA.assets.json +1 -1
  10. package/test/integ.lamsec-deployFunction.js.snapshot/manifest.json +171 -3
  11. package/test/integ.lamsec-deployFunction.js.snapshot/tree.json +1 -342
  12. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/cdk.out +1 -1
  13. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/integ.json +1 -1
  14. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsec-deployFunctionWithExistingVpc.assets.json +3 -3
  15. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsec-deployFunctionWithExistingVpc.template.json +31 -3
  16. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsecdeployFunctionWithExistingVpcIntegDefaultTestDeployAssert647243A7.assets.json +1 -1
  17. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/manifest.json +52 -13
  18. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/tree.json +1 -1722
  19. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/cdk.out +1 -1
  20. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/integ.json +1 -1
  21. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.assets.json +3 -3
  22. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.template.json +29 -3
  23. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsecdeployFunctionWithVpcIntegDefaultTestDeployAssert66148FF5.assets.json +1 -1
  24. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/manifest.json +52 -13
  25. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/tree.json +1 -1266
  26. package/test/integ.lamsec-existingFunction.js.snapshot/asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c/index.js +21 -0
  27. package/test/integ.lamsec-existingFunction.js.snapshot/cdk.out +1 -1
  28. package/test/integ.lamsec-existingFunction.js.snapshot/integ.json +1 -1
  29. package/test/integ.lamsec-existingFunction.js.snapshot/lamsec-existingFunction.assets.json +6 -6
  30. package/test/integ.lamsec-existingFunction.js.snapshot/lamsec-existingFunction.template.json +25 -19
  31. package/test/integ.lamsec-existingFunction.js.snapshot/lamsecexistingFunctionIntegDefaultTestDeployAssert295B352B.assets.json +1 -1
  32. package/test/integ.lamsec-existingFunction.js.snapshot/manifest.json +171 -3
  33. package/test/integ.lamsec-existingFunction.js.snapshot/tree.json +1 -342
  34. package/test/integ.lamsec-deployFunction.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +0 -8
  35. package/test/integ.lamsec-existingFunction.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +0 -8
package/.jsii CHANGED
@@ -8,8 +8,8 @@
8
8
  "url": "https://aws.amazon.com"
9
9
  },
10
10
  "dependencies": {
11
- "@aws-solutions-constructs/core": "2.80.0",
12
- "aws-cdk-lib": "^2.179.0",
11
+ "@aws-solutions-constructs/core": "2.81.0",
12
+ "aws-cdk-lib": "^2.186.0",
13
13
  "constructs": "^10.0.0"
14
14
  },
15
15
  "dependencyClosure": {
@@ -967,6 +967,19 @@
967
967
  }
968
968
  }
969
969
  },
970
+ "aws-cdk-lib.aws_cognito_identitypool": {
971
+ "targets": {
972
+ "dotnet": {
973
+ "namespace": "Amazon.CDK.AWS.Cognito.Identitypool"
974
+ },
975
+ "java": {
976
+ "package": "software.amazon.awscdk.services.cognito.identitypool"
977
+ },
978
+ "python": {
979
+ "module": "aws_cdk.aws_cognito_identitypool"
980
+ }
981
+ }
982
+ },
970
983
  "aws-cdk-lib.aws_comprehend": {
971
984
  "targets": {
972
985
  "dotnet": {
@@ -1643,6 +1656,19 @@
1643
1656
  }
1644
1657
  }
1645
1658
  },
1659
+ "aws-cdk-lib.aws_gameliftstreams": {
1660
+ "targets": {
1661
+ "dotnet": {
1662
+ "package": "Amazon.CDK.AWS.GameLiftStreams"
1663
+ },
1664
+ "java": {
1665
+ "package": "software.amazon.awscdk.services.gameliftstreams"
1666
+ },
1667
+ "python": {
1668
+ "module": "aws_cdk.aws_gameliftstreams"
1669
+ }
1670
+ }
1671
+ },
1646
1672
  "aws-cdk-lib.aws_globalaccelerator": {
1647
1673
  "targets": {
1648
1674
  "dotnet": {
@@ -3268,6 +3294,19 @@
3268
3294
  }
3269
3295
  }
3270
3296
  },
3297
+ "aws-cdk-lib.aws_scheduler_targets": {
3298
+ "targets": {
3299
+ "dotnet": {
3300
+ "namespace": "Amazon.CDK.AWS.Scheduler.Targets"
3301
+ },
3302
+ "java": {
3303
+ "package": "software.amazon.awscdk.services.scheduler.targets"
3304
+ },
3305
+ "python": {
3306
+ "module": "aws_cdk.aws_scheduler_targets"
3307
+ }
3308
+ }
3309
+ },
3271
3310
  "aws-cdk-lib.aws_sdb": {
3272
3311
  "targets": {
3273
3312
  "dotnet": {
@@ -4238,6 +4277,6 @@
4238
4277
  "symbolId": "lib/index:LambdaToSecretsmanagerProps"
4239
4278
  }
4240
4279
  },
4241
- "version": "2.80.0",
4242
- "fingerprint": "Ewtuehuf5ShlVrOv52i+ZJhJuaDOY2LMSZnc0FeXyVI="
4280
+ "version": "2.81.0",
4281
+ "fingerprint": "qmupwjoNysGyUP0KPvdEVfFGgrisqJcsEnbgbOAKbkg="
4243
4282
  }
package/lib/index.js CHANGED
@@ -71,5 +71,5 @@ class LambdaToSecretsmanager extends constructs_1.Construct {
71
71
  }
72
72
  exports.LambdaToSecretsmanager = LambdaToSecretsmanager;
73
73
  _a = JSII_RTTI_SYMBOL_1;
74
- LambdaToSecretsmanager[_a] = { fqn: "@aws-solutions-constructs/aws-lambda-secretsmanager.LambdaToSecretsmanager", version: "2.80.0" };
74
+ LambdaToSecretsmanager[_a] = { fqn: "@aws-solutions-constructs/aws-lambda-secretsmanager.LambdaToSecretsmanager", version: "2.81.0" };
75
75
  //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["index.ts"],"names":[],"mappings":";;;;;AAAA;;;;;;;;;;;GAWG;AAEH,UAAU;AACV,2DAA2D;AAI3D,2CAAuC;AA2DvC;;GAEG;AACH,MAAa,sBAAuB,SAAQ,sBAAS;IAKjD;;;;;;OAMG;IACH,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAkC;QAC1E,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,QAAQ,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC;QAC9B,QAAQ,CAAC,gBAAgB,CAAC,KAAK,CAAC,CAAC;QACjC,QAAQ,CAAC,wBAAwB,CAAC,KAAK,CAAC,CAAC;QAEzC,IAAI,KAAK,CAAC,SAAS,IAAI,KAAK,CAAC,WAAW,EAAE,CAAC;YAEzC,IAAI,CAAC,GAAG,GAAG,QAAQ,CAAC,QAAQ,CAAC,KAAK,EAAE;gBAClC,eAAe,EAAE,QAAQ,CAAC,uBAAuB,EAAE;gBACnD,WAAW,EAAE,KAAK,CAAC,WAAW;gBAC9B,YAAY,EAAE,KAAK,CAAC,QAAQ;gBAC5B,iBAAiB,EAAE;oBACjB,kBAAkB,EAAE,IAAI;oBACxB,gBAAgB,EAAE,IAAI;iBACvB;aACF,CAAC,CAAC;YAEH,QAAQ,CAAC,qBAAqB,CAAC,KAAK,EAAE,IAAI,CAAC,GAAG,EAAE,QAAQ,CAAC,oBAAoB,CAAC,eAAe,CAAC,CAAC;QACjG,CAAC;QAED,4BAA4B;QAC5B,IAAI,CAAC,cAAc,GAAG,QAAQ,CAAC,mBAAmB,CAAC,IAAI,EAAE;YACvD,iBAAiB,EAAE,KAAK,CAAC,iBAAiB;YAC1C,mBAAmB,EAAE,KAAK,CAAC,mBAAmB;YAC9C,GAAG,EAAE,IAAI,CAAC,GAAG;SACd,CAAC,CAAC;QAEH,mBAAmB;QACnB,IAAI,KAAK,CAAC,iBAAiB,EAAE,CAAC;YAC5B,IAAI,CAAC,MAAM,GAAG,KAAK,CAAC,iBAAiB,CAAC;QACxC,CAAC;aAAM,CAAC;YACN,IAAI,CAAC,MAAM,GAAG,QAAQ,CAAC,yBAAyB,CAAC,IAAI,EAAE,QAAQ,EAAE,KAAK,CAAC,WAAW,CAAC,CAAC;QACtF,CAAC;QAED,kCAAkC;QAClC,MAAM,6BAA6B,GAAG,KAAK,CAAC,6BAA6B,IAAI,YAAY,CAAC;QAC1F,IAAI,CAAC,cAAc,CAAC,cAAc,CAAC,6BAA6B,EAAE,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;QAEzF,6DAA6D;QAC7D,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC;QAE3C,IAAI,KAAK,CAAC,gBAAgB,KAAK,WAAW,EAAE,CAAC;YAC3C,IAAI,CAAC,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC;QAC9C,CAAC;IACH,CAAC;;AAzDL,wDA0DC","sourcesContent":["/**\n *  Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n *\n *  Licensed under the Apache License, Version 2.0 (the \"License\"). You may not use this file except in compliance\n *  with the License. A copy of the License is located at\n *\n *      http://www.apache.org/licenses/LICENSE-2.0\n *\n *  or in the 'license' file accompanying this file. This file is distributed on an 'AS IS' BASIS, WITHOUT WARRANTIES\n *  OR CONDITIONS OF ANY KIND, express or implied. See the License for the specific language governing permissions\n *  and limitations under the License.\n */\n\n// Imports\nimport * as defaults from \"@aws-solutions-constructs/core\";\nimport * as lambda from \"aws-cdk-lib/aws-lambda\";\nimport * as secretsmanager from \"aws-cdk-lib/aws-secretsmanager\";\nimport * as ec2 from \"aws-cdk-lib/aws-ec2\";\nimport { Construct } from \"constructs\";\n\n/**\n * @summary The properties for the LambdaToSecretsmanager class.\n */\nexport interface LambdaToSecretsmanagerProps {\n  /**\n   * Existing instance of Lambda Function object, providing both this and `lambdaFunctionProps` will cause an error.\n   *\n   * @default - None\n   */\n  readonly existingLambdaObj?: lambda.Function;\n  /**\n   * User provided props to override the default props for the Lambda function.\n   *\n   * @default - Default properties are used.\n   */\n  readonly lambdaFunctionProps?: lambda.FunctionProps;\n  /**\n   * Existing instance of Secret object, providing both this and secretProps will cause an error.\n   *\n   * @default - Default props are used\n   */\n  readonly existingSecretObj?: secretsmanager.Secret;\n  /**\n   * Optional user-provided props to override the default props for the Secret.\n   *\n   * @default - Default props are used\n   */\n  readonly secretProps?: secretsmanager.SecretProps;\n  /**\n   * An existing VPC for the construct to use (construct will NOT create a new VPC in this case)\n   */\n  readonly existingVpc?: ec2.IVpc;\n  /**\n   * Properties to override default properties if deployVpc is true\n   */\n  readonly vpcProps?: ec2.VpcProps;\n  /**\n   * Whether to deploy a new VPC\n   *\n   * @default - false\n   */\n  readonly deployVpc?: boolean;\n  /**\n   * Optional Name for the Lambda function environment variable set to the ARN of the secret.\n   *\n   * @default - SECRET_ARN\n   */\n  readonly secretEnvironmentVariableName?: string;\n  /**\n   * Optional secret permissions to grant to the Lambda function.\n   * One of the following may be specified: \"Read\" or \"ReadWrite\".\n   *\n   * @default - Read only access is given to the Lambda function if no value is specified.\n   */\n  readonly grantWriteAccess?: string;\n}\n\n/**\n * @summary The LambdaToSecretsmanager class.\n */\nexport class LambdaToSecretsmanager extends Construct {\n    public readonly lambdaFunction: lambda.Function;\n    public readonly secret: secretsmanager.Secret;\n    public readonly vpc?: ec2.IVpc;\n\n    /**\n     * @summary Constructs a new instance of the LambdaToSecretsmanager class.\n     * @param {cdk.App} scope - represents the scope for all the resources.\n     * @param {string} id - this is a a scope-unique id.\n     * @param {LambdaToSecretsmanagerProps} props - user provided props for the construct.\n     * @access public\n     */\n    constructor(scope: Construct, id: string, props: LambdaToSecretsmanagerProps) {\n      super(scope, id);\n      defaults.CheckVpcProps(props);\n      defaults.CheckLambdaProps(props);\n      defaults.CheckSecretsManagerProps(props);\n\n      if (props.deployVpc || props.existingVpc) {\n\n        this.vpc = defaults.buildVpc(scope, {\n          defaultVpcProps: defaults.DefaultIsolatedVpcProps(),\n          existingVpc: props.existingVpc,\n          userVpcProps: props.vpcProps,\n          constructVpcProps: {\n            enableDnsHostnames: true,\n            enableDnsSupport: true,\n          },\n        });\n\n        defaults.AddAwsServiceEndpoint(scope, this.vpc, defaults.ServiceEndpointTypes.SECRETS_MANAGER);\n      }\n\n      // Setup the Lambda function\n      this.lambdaFunction = defaults.buildLambdaFunction(this, {\n        existingLambdaObj: props.existingLambdaObj,\n        lambdaFunctionProps: props.lambdaFunctionProps,\n        vpc: this.vpc,\n      });\n\n      // Setup the Secret\n      if (props.existingSecretObj) {\n        this.secret = props.existingSecretObj;\n      } else {\n        this.secret = defaults.buildSecretsManagerSecret(this, 'secret', props.secretProps);\n      }\n\n      // Configure environment variables\n      const secretEnvironmentVariableName = props.secretEnvironmentVariableName || 'SECRET_ARN';\n      this.lambdaFunction.addEnvironment(secretEnvironmentVariableName, this.secret.secretArn);\n\n      // Enable read permissions for the Lambda function by default\n      this.secret.grantRead(this.lambdaFunction);\n\n      if (props.grantWriteAccess === 'ReadWrite') {\n        this.secret.grantWrite(this.lambdaFunction);\n      }\n    }\n}\n"]}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@aws-solutions-constructs/aws-lambda-secretsmanager",
3
- "version": "2.80.0",
3
+ "version": "2.81.0",
4
4
  "description": "CDK constructs for defining an interaction between an AWS Lambda function and AWS Secrets Manager.",
5
5
  "main": "lib/index.js",
6
6
  "types": "lib/index.d.ts",
@@ -54,14 +54,14 @@
54
54
  }
55
55
  },
56
56
  "dependencies": {
57
- "@aws-solutions-constructs/core": "2.80.0",
57
+ "@aws-solutions-constructs/core": "2.81.0",
58
58
  "constructs": "^10.0.0"
59
59
  },
60
60
  "devDependencies": {
61
- "@aws-cdk/integ-tests-alpha": "2.179.0-alpha.0",
61
+ "@aws-cdk/integ-tests-alpha": "2.186.0-alpha.0",
62
62
  "@types/node": "^10.3.0",
63
63
  "constructs": "^10.0.0",
64
- "aws-cdk-lib": "2.179.0"
64
+ "aws-cdk-lib": "2.186.0"
65
65
  },
66
66
  "jest": {
67
67
  "moduleFileExtensions": [
@@ -69,9 +69,9 @@
69
69
  ]
70
70
  },
71
71
  "peerDependencies": {
72
- "@aws-solutions-constructs/core": "2.80.0",
72
+ "@aws-solutions-constructs/core": "2.81.0",
73
73
  "constructs": "^10.0.0",
74
- "aws-cdk-lib": "^2.179.0"
74
+ "aws-cdk-lib": "^2.186.0"
75
75
  },
76
76
  "keywords": [
77
77
  "aws",
@@ -0,0 +1,21 @@
1
+ /**
2
+ * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
3
+ *
4
+ * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance
5
+ * with the License. A copy of the License is located at
6
+ *
7
+ * http://www.apache.org/licenses/LICENSE-2.0
8
+ *
9
+ * or in the 'license' file accompanying this file. This file is distributed on an 'AS IS' BASIS, WITHOUT WARRANTIES
10
+ * OR CONDITIONS OF ANY KIND, express or implied. See the License for the specific language governing permissions
11
+ * and limitations under the License.
12
+ */
13
+
14
+ exports.handler = async function(event) {
15
+ console.log('request:', JSON.stringify(event, undefined, 2));
16
+ return {
17
+ statusCode: 200,
18
+ headers: { 'Content-Type': 'text/plain' },
19
+ body: `Hello, CDK! You've hit ${event.path}\n`
20
+ };
21
+ };
@@ -1 +1 @@
1
- {"version":"36.0.0"}
1
+ {"version":"40.0.0"}
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "36.0.0",
2
+ "version": "40.0.0",
3
3
  "testCases": {
4
4
  "lamsec-deployFunction/Integ/DefaultTest": {
5
5
  "stacks": [
@@ -1,20 +1,20 @@
1
1
  {
2
- "version": "36.0.0",
2
+ "version": "40.0.0",
3
3
  "files": {
4
- "0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8": {
4
+ "a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c": {
5
5
  "source": {
6
- "path": "asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8",
6
+ "path": "asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c",
7
7
  "packaging": "zip"
8
8
  },
9
9
  "destinations": {
10
10
  "current_account-current_region": {
11
11
  "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
12
- "objectKey": "0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8.zip",
12
+ "objectKey": "a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c.zip",
13
13
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
14
14
  }
15
15
  }
16
16
  },
17
- "79734753278e8ded53cb17236a399ddba231cc313a60a75eb72645cf05649fe9": {
17
+ "36207811f4486da8c2fe4cde8106c4455200827b33057a10e329e26cd2a2b1a9": {
18
18
  "source": {
19
19
  "path": "lamsec-deployFunction.template.json",
20
20
  "packaging": "file"
@@ -22,7 +22,7 @@
22
22
  "destinations": {
23
23
  "current_account-current_region": {
24
24
  "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
25
- "objectKey": "79734753278e8ded53cb17236a399ddba231cc313a60a75eb72645cf05649fe9.json",
25
+ "objectKey": "36207811f4486da8c2fe4cde8106c4455200827b33057a10e329e26cd2a2b1a9.json",
26
26
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
27
27
  }
28
28
  }
@@ -68,14 +68,6 @@
68
68
  "Properties": {
69
69
  "PolicyDocument": {
70
70
  "Statement": [
71
- {
72
- "Action": [
73
- "xray:PutTelemetryRecords",
74
- "xray:PutTraceSegments"
75
- ],
76
- "Effect": "Allow",
77
- "Resource": "*"
78
- },
79
71
  {
80
72
  "Action": [
81
73
  "secretsmanager:DescribeSecret",
@@ -95,16 +87,6 @@
95
87
  "Ref": "testlambdasecretsmanagerLambdaFunctionServiceRole92CE007F"
96
88
  }
97
89
  ]
98
- },
99
- "Metadata": {
100
- "cfn_nag": {
101
- "rules_to_suppress": [
102
- {
103
- "id": "W12",
104
- "reason": "Lambda needs the following minimum required permissions to send trace data to X-Ray and access ENIs in a VPC."
105
- }
106
- ]
107
- }
108
90
  }
109
91
  },
110
92
  "testlambdasecretsmanagerLambdaFunction130E7301": {
@@ -114,7 +96,7 @@
114
96
  "S3Bucket": {
115
97
  "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
116
98
  },
117
- "S3Key": "0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8.zip"
99
+ "S3Key": "a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c.zip"
118
100
  },
119
101
  "Environment": {
120
102
  "Variables": {
@@ -159,6 +141,30 @@
159
141
  }
160
142
  }
161
143
  },
144
+ "testlambdasecretsmanagerLambdaFunctioninlinePolicyAddedToExecutionRole0A805C55F": {
145
+ "Type": "AWS::IAM::Policy",
146
+ "Properties": {
147
+ "PolicyDocument": {
148
+ "Statement": [
149
+ {
150
+ "Action": [
151
+ "xray:PutTelemetryRecords",
152
+ "xray:PutTraceSegments"
153
+ ],
154
+ "Effect": "Allow",
155
+ "Resource": "*"
156
+ }
157
+ ],
158
+ "Version": "2012-10-17"
159
+ },
160
+ "PolicyName": "testlambdasecretsmanagerLambdaFunctioninlinePolicyAddedToExecutionRole0A805C55F",
161
+ "Roles": [
162
+ {
163
+ "Ref": "testlambdasecretsmanagerLambdaFunctionServiceRole92CE007F"
164
+ }
165
+ ]
166
+ }
167
+ },
162
168
  "testlambdasecretsmanagersecret4C99E6BF": {
163
169
  "Type": "AWS::SecretsManager::Secret",
164
170
  "Properties": {
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "36.0.0",
2
+ "version": "40.0.0",
3
3
  "files": {
4
4
  "21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22": {
5
5
  "source": {
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "36.0.0",
2
+ "version": "42.0.0",
3
3
  "artifacts": {
4
4
  "lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA.assets": {
5
5
  "type": "cdk:asset-manifest",
@@ -66,7 +66,7 @@
66
66
  "validateOnSynth": false,
67
67
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
68
68
  "cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
69
- "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/79734753278e8ded53cb17236a399ddba231cc313a60a75eb72645cf05649fe9.json",
69
+ "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/36207811f4486da8c2fe4cde8106c4455200827b33057a10e329e26cd2a2b1a9.json",
70
70
  "requiresBootstrapStackVersion": 6,
71
71
  "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
72
72
  "additionalDependencies": [
@@ -82,24 +82,191 @@
82
82
  "lamsec-deployFunction.assets"
83
83
  ],
84
84
  "metadata": {
85
+ "/lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunctionServiceRole": [
86
+ {
87
+ "type": "aws:cdk:analytics:construct",
88
+ "data": {
89
+ "assumedBy": {
90
+ "principalAccount": "*",
91
+ "assumeRoleAction": "*"
92
+ },
93
+ "inlinePolicies": "*"
94
+ }
95
+ },
96
+ {
97
+ "type": "aws:cdk:analytics:method",
98
+ "data": {
99
+ "attachInlinePolicy": [
100
+ "*"
101
+ ]
102
+ }
103
+ },
104
+ {
105
+ "type": "aws:cdk:analytics:method",
106
+ "data": {
107
+ "attachInlinePolicy": [
108
+ "*"
109
+ ]
110
+ }
111
+ },
112
+ {
113
+ "type": "aws:cdk:analytics:method",
114
+ "data": {
115
+ "addToPrincipalPolicy": [
116
+ {}
117
+ ]
118
+ }
119
+ },
120
+ {
121
+ "type": "aws:cdk:analytics:method",
122
+ "data": {
123
+ "attachInlinePolicy": [
124
+ "*"
125
+ ]
126
+ }
127
+ },
128
+ {
129
+ "type": "aws:cdk:analytics:method",
130
+ "data": {
131
+ "attachInlinePolicy": [
132
+ "*"
133
+ ]
134
+ }
135
+ }
136
+ ],
137
+ "/lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole": [
138
+ {
139
+ "type": "aws:cdk:analytics:construct",
140
+ "data": "*"
141
+ }
142
+ ],
85
143
  "/lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunctionServiceRole/Resource": [
86
144
  {
87
145
  "type": "aws:cdk:logicalId",
88
146
  "data": "testlambdasecretsmanagerLambdaFunctionServiceRole92CE007F"
89
147
  }
90
148
  ],
149
+ "/lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunctionServiceRole/DefaultPolicy": [
150
+ {
151
+ "type": "aws:cdk:analytics:construct",
152
+ "data": "*"
153
+ },
154
+ {
155
+ "type": "aws:cdk:analytics:method",
156
+ "data": {
157
+ "attachToRole": [
158
+ "*"
159
+ ]
160
+ }
161
+ },
162
+ {
163
+ "type": "aws:cdk:analytics:method",
164
+ "data": {
165
+ "attachToRole": [
166
+ "*"
167
+ ]
168
+ }
169
+ },
170
+ {
171
+ "type": "aws:cdk:analytics:method",
172
+ "data": {
173
+ "addStatements": [
174
+ {}
175
+ ]
176
+ }
177
+ }
178
+ ],
91
179
  "/lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunctionServiceRole/DefaultPolicy/Resource": [
92
180
  {
93
181
  "type": "aws:cdk:logicalId",
94
182
  "data": "testlambdasecretsmanagerLambdaFunctionServiceRoleDefaultPolicyF24BF460"
95
183
  }
96
184
  ],
185
+ "/lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunction": [
186
+ {
187
+ "type": "aws:cdk:analytics:construct",
188
+ "data": {
189
+ "role": "*",
190
+ "tracing": "Active",
191
+ "runtime": "*",
192
+ "handler": "*",
193
+ "code": "*"
194
+ }
195
+ },
196
+ {
197
+ "type": "aws:cdk:analytics:method",
198
+ "data": {
199
+ "addEnvironment": [
200
+ "*",
201
+ "*",
202
+ {
203
+ "removeInEdge": true
204
+ }
205
+ ]
206
+ }
207
+ },
208
+ {
209
+ "type": "aws:cdk:analytics:method",
210
+ "data": {
211
+ "addEnvironment": [
212
+ "*",
213
+ "*"
214
+ ]
215
+ }
216
+ }
217
+ ],
97
218
  "/lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunction/Resource": [
98
219
  {
99
220
  "type": "aws:cdk:logicalId",
100
221
  "data": "testlambdasecretsmanagerLambdaFunction130E7301"
101
222
  }
102
223
  ],
224
+ "/lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunction/inlinePolicyAddedToExecutionRole-0": [
225
+ {
226
+ "type": "aws:cdk:analytics:construct",
227
+ "data": {
228
+ "statements": "*"
229
+ }
230
+ },
231
+ {
232
+ "type": "aws:cdk:analytics:method",
233
+ "data": {
234
+ "addStatements": [
235
+ {}
236
+ ]
237
+ }
238
+ },
239
+ {
240
+ "type": "aws:cdk:analytics:method",
241
+ "data": {
242
+ "attachToRole": [
243
+ "*"
244
+ ]
245
+ }
246
+ },
247
+ {
248
+ "type": "aws:cdk:analytics:method",
249
+ "data": {
250
+ "attachToRole": [
251
+ "*"
252
+ ]
253
+ }
254
+ }
255
+ ],
256
+ "/lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource": [
257
+ {
258
+ "type": "aws:cdk:logicalId",
259
+ "data": "testlambdasecretsmanagerLambdaFunctioninlinePolicyAddedToExecutionRole0A805C55F"
260
+ }
261
+ ],
262
+ "/lamsec-deployFunction/test-lambda-secretsmanager/secret": [
263
+ {
264
+ "type": "aws:cdk:analytics:construct",
265
+ "data": {
266
+ "removalPolicy": "destroy"
267
+ }
268
+ }
269
+ ],
103
270
  "/lamsec-deployFunction/test-lambda-secretsmanager/secret/Resource": [
104
271
  {
105
272
  "type": "aws:cdk:logicalId",
@@ -127,5 +294,6 @@
127
294
  "file": "tree.json"
128
295
  }
129
296
  }
130
- }
297
+ },
298
+ "minimumCliVersion": "2.1006.0"
131
299
  }