@aws-solutions-constructs/aws-lambda-secretsmanager 2.80.0 → 2.82.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (35) hide show
  1. package/.jsii +43 -4
  2. package/lib/index.js +1 -1
  3. package/package.json +6 -6
  4. package/test/integ.lamsec-deployFunction.js.snapshot/asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c/index.js +21 -0
  5. package/test/integ.lamsec-deployFunction.js.snapshot/cdk.out +1 -1
  6. package/test/integ.lamsec-deployFunction.js.snapshot/integ.json +1 -1
  7. package/test/integ.lamsec-deployFunction.js.snapshot/lamsec-deployFunction.assets.json +6 -6
  8. package/test/integ.lamsec-deployFunction.js.snapshot/lamsec-deployFunction.template.json +25 -19
  9. package/test/integ.lamsec-deployFunction.js.snapshot/lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA.assets.json +1 -1
  10. package/test/integ.lamsec-deployFunction.js.snapshot/manifest.json +171 -3
  11. package/test/integ.lamsec-deployFunction.js.snapshot/tree.json +1 -342
  12. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/cdk.out +1 -1
  13. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/integ.json +1 -1
  14. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsec-deployFunctionWithExistingVpc.assets.json +3 -3
  15. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsec-deployFunctionWithExistingVpc.template.json +31 -3
  16. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsecdeployFunctionWithExistingVpcIntegDefaultTestDeployAssert647243A7.assets.json +1 -1
  17. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/manifest.json +52 -13
  18. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/tree.json +1 -1722
  19. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/cdk.out +1 -1
  20. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/integ.json +1 -1
  21. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.assets.json +3 -3
  22. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.template.json +29 -3
  23. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsecdeployFunctionWithVpcIntegDefaultTestDeployAssert66148FF5.assets.json +1 -1
  24. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/manifest.json +52 -13
  25. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/tree.json +1 -1266
  26. package/test/integ.lamsec-existingFunction.js.snapshot/asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c/index.js +21 -0
  27. package/test/integ.lamsec-existingFunction.js.snapshot/cdk.out +1 -1
  28. package/test/integ.lamsec-existingFunction.js.snapshot/integ.json +1 -1
  29. package/test/integ.lamsec-existingFunction.js.snapshot/lamsec-existingFunction.assets.json +6 -6
  30. package/test/integ.lamsec-existingFunction.js.snapshot/lamsec-existingFunction.template.json +25 -19
  31. package/test/integ.lamsec-existingFunction.js.snapshot/lamsecexistingFunctionIntegDefaultTestDeployAssert295B352B.assets.json +1 -1
  32. package/test/integ.lamsec-existingFunction.js.snapshot/manifest.json +171 -3
  33. package/test/integ.lamsec-existingFunction.js.snapshot/tree.json +1 -342
  34. package/test/integ.lamsec-deployFunction.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +0 -8
  35. package/test/integ.lamsec-existingFunction.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +0 -8
@@ -1,342 +1 @@
1
- {
2
- "version": "tree-0.1",
3
- "tree": {
4
- "id": "App",
5
- "path": "",
6
- "children": {
7
- "lamsec-deployFunction": {
8
- "id": "lamsec-deployFunction",
9
- "path": "lamsec-deployFunction",
10
- "children": {
11
- "test-lambda-secretsmanager": {
12
- "id": "test-lambda-secretsmanager",
13
- "path": "lamsec-deployFunction/test-lambda-secretsmanager",
14
- "children": {
15
- "LambdaFunctionServiceRole": {
16
- "id": "LambdaFunctionServiceRole",
17
- "path": "lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunctionServiceRole",
18
- "children": {
19
- "ImportLambdaFunctionServiceRole": {
20
- "id": "ImportLambdaFunctionServiceRole",
21
- "path": "lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole",
22
- "constructInfo": {
23
- "fqn": "aws-cdk-lib.Resource",
24
- "version": "2.150.0"
25
- }
26
- },
27
- "Resource": {
28
- "id": "Resource",
29
- "path": "lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunctionServiceRole/Resource",
30
- "attributes": {
31
- "aws:cdk:cloudformation:type": "AWS::IAM::Role",
32
- "aws:cdk:cloudformation:props": {
33
- "assumeRolePolicyDocument": {
34
- "Statement": [
35
- {
36
- "Action": "sts:AssumeRole",
37
- "Effect": "Allow",
38
- "Principal": {
39
- "Service": "lambda.amazonaws.com"
40
- }
41
- }
42
- ],
43
- "Version": "2012-10-17"
44
- },
45
- "policies": [
46
- {
47
- "policyName": "LambdaFunctionServiceRolePolicy",
48
- "policyDocument": {
49
- "Statement": [
50
- {
51
- "Action": [
52
- "logs:CreateLogGroup",
53
- "logs:CreateLogStream",
54
- "logs:PutLogEvents"
55
- ],
56
- "Effect": "Allow",
57
- "Resource": {
58
- "Fn::Join": [
59
- "",
60
- [
61
- "arn:",
62
- {
63
- "Ref": "AWS::Partition"
64
- },
65
- ":logs:",
66
- {
67
- "Ref": "AWS::Region"
68
- },
69
- ":",
70
- {
71
- "Ref": "AWS::AccountId"
72
- },
73
- ":log-group:/aws/lambda/*"
74
- ]
75
- ]
76
- }
77
- }
78
- ],
79
- "Version": "2012-10-17"
80
- }
81
- }
82
- ]
83
- }
84
- },
85
- "constructInfo": {
86
- "fqn": "aws-cdk-lib.aws_iam.CfnRole",
87
- "version": "2.150.0"
88
- }
89
- },
90
- "DefaultPolicy": {
91
- "id": "DefaultPolicy",
92
- "path": "lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunctionServiceRole/DefaultPolicy",
93
- "children": {
94
- "Resource": {
95
- "id": "Resource",
96
- "path": "lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunctionServiceRole/DefaultPolicy/Resource",
97
- "attributes": {
98
- "aws:cdk:cloudformation:type": "AWS::IAM::Policy",
99
- "aws:cdk:cloudformation:props": {
100
- "policyDocument": {
101
- "Statement": [
102
- {
103
- "Action": [
104
- "xray:PutTelemetryRecords",
105
- "xray:PutTraceSegments"
106
- ],
107
- "Effect": "Allow",
108
- "Resource": "*"
109
- },
110
- {
111
- "Action": [
112
- "secretsmanager:DescribeSecret",
113
- "secretsmanager:GetSecretValue"
114
- ],
115
- "Effect": "Allow",
116
- "Resource": {
117
- "Ref": "testlambdasecretsmanagersecret4C99E6BF"
118
- }
119
- }
120
- ],
121
- "Version": "2012-10-17"
122
- },
123
- "policyName": "testlambdasecretsmanagerLambdaFunctionServiceRoleDefaultPolicyF24BF460",
124
- "roles": [
125
- {
126
- "Ref": "testlambdasecretsmanagerLambdaFunctionServiceRole92CE007F"
127
- }
128
- ]
129
- }
130
- },
131
- "constructInfo": {
132
- "fqn": "aws-cdk-lib.aws_iam.CfnPolicy",
133
- "version": "2.150.0"
134
- }
135
- }
136
- },
137
- "constructInfo": {
138
- "fqn": "aws-cdk-lib.aws_iam.Policy",
139
- "version": "2.150.0"
140
- }
141
- }
142
- },
143
- "constructInfo": {
144
- "fqn": "aws-cdk-lib.aws_iam.Role",
145
- "version": "2.150.0"
146
- }
147
- },
148
- "LambdaFunction": {
149
- "id": "LambdaFunction",
150
- "path": "lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunction",
151
- "children": {
152
- "Code": {
153
- "id": "Code",
154
- "path": "lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunction/Code",
155
- "children": {
156
- "Stage": {
157
- "id": "Stage",
158
- "path": "lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunction/Code/Stage",
159
- "constructInfo": {
160
- "fqn": "aws-cdk-lib.AssetStaging",
161
- "version": "2.150.0"
162
- }
163
- },
164
- "AssetBucket": {
165
- "id": "AssetBucket",
166
- "path": "lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunction/Code/AssetBucket",
167
- "constructInfo": {
168
- "fqn": "aws-cdk-lib.aws_s3.BucketBase",
169
- "version": "2.150.0"
170
- }
171
- }
172
- },
173
- "constructInfo": {
174
- "fqn": "aws-cdk-lib.aws_s3_assets.Asset",
175
- "version": "2.150.0"
176
- }
177
- },
178
- "Resource": {
179
- "id": "Resource",
180
- "path": "lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunction/Resource",
181
- "attributes": {
182
- "aws:cdk:cloudformation:type": "AWS::Lambda::Function",
183
- "aws:cdk:cloudformation:props": {
184
- "code": {
185
- "s3Bucket": {
186
- "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
187
- },
188
- "s3Key": "0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8.zip"
189
- },
190
- "environment": {
191
- "variables": {
192
- "AWS_NODEJS_CONNECTION_REUSE_ENABLED": "1",
193
- "SECRET_ARN": {
194
- "Ref": "testlambdasecretsmanagersecret4C99E6BF"
195
- }
196
- }
197
- },
198
- "handler": "index.handler",
199
- "role": {
200
- "Fn::GetAtt": [
201
- "testlambdasecretsmanagerLambdaFunctionServiceRole92CE007F",
202
- "Arn"
203
- ]
204
- },
205
- "runtime": "nodejs20.x",
206
- "tracingConfig": {
207
- "mode": "Active"
208
- }
209
- }
210
- },
211
- "constructInfo": {
212
- "fqn": "aws-cdk-lib.aws_lambda.CfnFunction",
213
- "version": "2.150.0"
214
- }
215
- }
216
- },
217
- "constructInfo": {
218
- "fqn": "aws-cdk-lib.aws_lambda.Function",
219
- "version": "2.150.0"
220
- }
221
- },
222
- "secret": {
223
- "id": "secret",
224
- "path": "lamsec-deployFunction/test-lambda-secretsmanager/secret",
225
- "children": {
226
- "Resource": {
227
- "id": "Resource",
228
- "path": "lamsec-deployFunction/test-lambda-secretsmanager/secret/Resource",
229
- "attributes": {
230
- "aws:cdk:cloudformation:type": "AWS::SecretsManager::Secret",
231
- "aws:cdk:cloudformation:props": {
232
- "generateSecretString": {}
233
- }
234
- },
235
- "constructInfo": {
236
- "fqn": "aws-cdk-lib.aws_secretsmanager.CfnSecret",
237
- "version": "2.150.0"
238
- }
239
- }
240
- },
241
- "constructInfo": {
242
- "fqn": "aws-cdk-lib.aws_secretsmanager.Secret",
243
- "version": "2.150.0"
244
- }
245
- }
246
- },
247
- "constructInfo": {
248
- "fqn": "@aws-solutions-constructs/aws-lambda-secretsmanager.LambdaToSecretsmanager",
249
- "version": "2.63.0"
250
- }
251
- },
252
- "Integ": {
253
- "id": "Integ",
254
- "path": "lamsec-deployFunction/Integ",
255
- "children": {
256
- "DefaultTest": {
257
- "id": "DefaultTest",
258
- "path": "lamsec-deployFunction/Integ/DefaultTest",
259
- "children": {
260
- "Default": {
261
- "id": "Default",
262
- "path": "lamsec-deployFunction/Integ/DefaultTest/Default",
263
- "constructInfo": {
264
- "fqn": "constructs.Construct",
265
- "version": "10.3.0"
266
- }
267
- },
268
- "DeployAssert": {
269
- "id": "DeployAssert",
270
- "path": "lamsec-deployFunction/Integ/DefaultTest/DeployAssert",
271
- "children": {
272
- "BootstrapVersion": {
273
- "id": "BootstrapVersion",
274
- "path": "lamsec-deployFunction/Integ/DefaultTest/DeployAssert/BootstrapVersion",
275
- "constructInfo": {
276
- "fqn": "aws-cdk-lib.CfnParameter",
277
- "version": "2.150.0"
278
- }
279
- },
280
- "CheckBootstrapVersion": {
281
- "id": "CheckBootstrapVersion",
282
- "path": "lamsec-deployFunction/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion",
283
- "constructInfo": {
284
- "fqn": "aws-cdk-lib.CfnRule",
285
- "version": "2.150.0"
286
- }
287
- }
288
- },
289
- "constructInfo": {
290
- "fqn": "aws-cdk-lib.Stack",
291
- "version": "2.150.0"
292
- }
293
- }
294
- },
295
- "constructInfo": {
296
- "fqn": "@aws-cdk/integ-tests-alpha.IntegTestCase",
297
- "version": "2.150.0-alpha.0"
298
- }
299
- }
300
- },
301
- "constructInfo": {
302
- "fqn": "@aws-cdk/integ-tests-alpha.IntegTest",
303
- "version": "2.150.0-alpha.0"
304
- }
305
- },
306
- "BootstrapVersion": {
307
- "id": "BootstrapVersion",
308
- "path": "lamsec-deployFunction/BootstrapVersion",
309
- "constructInfo": {
310
- "fqn": "aws-cdk-lib.CfnParameter",
311
- "version": "2.150.0"
312
- }
313
- },
314
- "CheckBootstrapVersion": {
315
- "id": "CheckBootstrapVersion",
316
- "path": "lamsec-deployFunction/CheckBootstrapVersion",
317
- "constructInfo": {
318
- "fqn": "aws-cdk-lib.CfnRule",
319
- "version": "2.150.0"
320
- }
321
- }
322
- },
323
- "constructInfo": {
324
- "fqn": "aws-cdk-lib.Stack",
325
- "version": "2.150.0"
326
- }
327
- },
328
- "Tree": {
329
- "id": "Tree",
330
- "path": "Tree",
331
- "constructInfo": {
332
- "fqn": "constructs.Construct",
333
- "version": "10.3.0"
334
- }
335
- }
336
- },
337
- "constructInfo": {
338
- "fqn": "aws-cdk-lib.App",
339
- "version": "2.150.0"
340
- }
341
- }
342
- }
1
+ {"version":"tree-0.1","tree":{"id":"App","path":"","children":{"lamsec-deployFunction":{"id":"lamsec-deployFunction","path":"lamsec-deployFunction","children":{"test-lambda-secretsmanager":{"id":"test-lambda-secretsmanager","path":"lamsec-deployFunction/test-lambda-secretsmanager","children":{"LambdaFunctionServiceRole":{"id":"LambdaFunctionServiceRole","path":"lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunctionServiceRole","children":{"ImportLambdaFunctionServiceRole":{"id":"ImportLambdaFunctionServiceRole","path":"lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole","constructInfo":{"fqn":"aws-cdk-lib.Resource","version":"2.186.0","metadata":["*"]}},"Resource":{"id":"Resource","path":"lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunctionServiceRole/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Role","aws:cdk:cloudformation:props":{"assumeRolePolicyDocument":{"Statement":[{"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"Service":"lambda.amazonaws.com"}}],"Version":"2012-10-17"},"policies":[{"policyName":"LambdaFunctionServiceRolePolicy","policyDocument":{"Statement":[{"Action":["logs:CreateLogGroup","logs:CreateLogStream","logs:PutLogEvents"],"Effect":"Allow","Resource":{"Fn::Join":["",["arn:",{"Ref":"AWS::Partition"},":logs:",{"Ref":"AWS::Region"},":",{"Ref":"AWS::AccountId"},":log-group:/aws/lambda/*"]]}}],"Version":"2012-10-17"}}]}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnRole","version":"2.186.0"}},"DefaultPolicy":{"id":"DefaultPolicy","path":"lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunctionServiceRole/DefaultPolicy","children":{"Resource":{"id":"Resource","path":"lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunctionServiceRole/DefaultPolicy/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Policy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":["secretsmanager:DescribeSecret","secretsmanager:GetSecretValue"],"Effect":"Allow","Resource":{"Ref":"testlambdasecretsmanagersecret4C99E6BF"}}],"Version":"2012-10-17"},"policyName":"testlambdasecretsmanagerLambdaFunctionServiceRoleDefaultPolicyF24BF460","roles":[{"Ref":"testlambdasecretsmanagerLambdaFunctionServiceRole92CE007F"}]}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnPolicy","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Policy","version":"2.186.0","metadata":["*",{"attachToRole":["*"]},{"attachToRole":["*"]},{"addStatements":[{}]}]}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Role","version":"2.186.0","metadata":[{"assumedBy":{"principalAccount":"*","assumeRoleAction":"*"},"inlinePolicies":"*"},{"attachInlinePolicy":["*"]},{"attachInlinePolicy":["*"]},{"addToPrincipalPolicy":[{}]},{"attachInlinePolicy":["*"]},{"attachInlinePolicy":["*"]}]}},"LambdaFunction":{"id":"LambdaFunction","path":"lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunction","children":{"Code":{"id":"Code","path":"lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunction/Code","children":{"Stage":{"id":"Stage","path":"lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunction/Code/Stage","constructInfo":{"fqn":"aws-cdk-lib.AssetStaging","version":"2.186.0"}},"AssetBucket":{"id":"AssetBucket","path":"lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunction/Code/AssetBucket","constructInfo":{"fqn":"aws-cdk-lib.aws_s3.BucketBase","version":"2.186.0","metadata":[]}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_s3_assets.Asset","version":"2.186.0"}},"Resource":{"id":"Resource","path":"lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunction/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::Lambda::Function","aws:cdk:cloudformation:props":{"code":{"s3Bucket":{"Fn::Sub":"cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"},"s3Key":"a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c.zip"},"environment":{"variables":{"AWS_NODEJS_CONNECTION_REUSE_ENABLED":"1","SECRET_ARN":{"Ref":"testlambdasecretsmanagersecret4C99E6BF"}}},"handler":"index.handler","role":{"Fn::GetAtt":["testlambdasecretsmanagerLambdaFunctionServiceRole92CE007F","Arn"]},"runtime":"nodejs20.x","tracingConfig":{"mode":"Active"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.CfnFunction","version":"2.186.0"}},"inlinePolicyAddedToExecutionRole-0":{"id":"inlinePolicyAddedToExecutionRole-0","path":"lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunction/inlinePolicyAddedToExecutionRole-0","children":{"Resource":{"id":"Resource","path":"lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Policy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":["xray:PutTelemetryRecords","xray:PutTraceSegments"],"Effect":"Allow","Resource":"*"}],"Version":"2012-10-17"},"policyName":"testlambdasecretsmanagerLambdaFunctioninlinePolicyAddedToExecutionRole0A805C55F","roles":[{"Ref":"testlambdasecretsmanagerLambdaFunctionServiceRole92CE007F"}]}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnPolicy","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Policy","version":"2.186.0","metadata":[{"statements":"*"},{"addStatements":[{}]},{"attachToRole":["*"]},{"attachToRole":["*"]}]}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.Function","version":"2.186.0","metadata":[{"role":"*","tracing":"Active","runtime":"*","handler":"*","code":"*"},{"addEnvironment":["*","*",{"removeInEdge":true}]},{"addEnvironment":["*","*"]}]}},"secret":{"id":"secret","path":"lamsec-deployFunction/test-lambda-secretsmanager/secret","children":{"Resource":{"id":"Resource","path":"lamsec-deployFunction/test-lambda-secretsmanager/secret/Resource","attributes":{"aws:cdk:cloudformation:type":"AWS::SecretsManager::Secret","aws:cdk:cloudformation:props":{"generateSecretString":{}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_secretsmanager.CfnSecret","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.aws_secretsmanager.Secret","version":"2.186.0","metadata":[{"removalPolicy":"destroy"}]}}},"constructInfo":{"fqn":"@aws-solutions-constructs/aws-lambda-secretsmanager.LambdaToSecretsmanager","version":"2.80.0"}},"Integ":{"id":"Integ","path":"lamsec-deployFunction/Integ","children":{"DefaultTest":{"id":"DefaultTest","path":"lamsec-deployFunction/Integ/DefaultTest","children":{"Default":{"id":"Default","path":"lamsec-deployFunction/Integ/DefaultTest/Default","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}},"DeployAssert":{"id":"DeployAssert","path":"lamsec-deployFunction/Integ/DefaultTest/DeployAssert","children":{"BootstrapVersion":{"id":"BootstrapVersion","path":"lamsec-deployFunction/Integ/DefaultTest/DeployAssert/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.186.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"lamsec-deployFunction/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.186.0"}}},"constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTestCase","version":"2.186.0-alpha.0"}}},"constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTest","version":"2.186.0-alpha.0"}},"BootstrapVersion":{"id":"BootstrapVersion","path":"lamsec-deployFunction/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.186.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"lamsec-deployFunction/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.186.0"}}},"constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.186.0"}},"Tree":{"id":"Tree","path":"Tree","constructInfo":{"fqn":"constructs.Construct","version":"10.4.2"}}},"constructInfo":{"fqn":"aws-cdk-lib.App","version":"2.186.0"}}}
@@ -1 +1 @@
1
- {"version":"39.0.0"}
1
+ {"version":"40.0.0"}
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "39.0.0",
2
+ "version": "40.0.0",
3
3
  "testCases": {
4
4
  "lamsec-deployFunctionWithExistingVpc/Integ/DefaultTest": {
5
5
  "stacks": [
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "39.0.0",
2
+ "version": "40.0.0",
3
3
  "files": {
4
4
  "7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200": {
5
5
  "source": {
@@ -27,7 +27,7 @@
27
27
  }
28
28
  }
29
29
  },
30
- "b853dc9a5b4a48c7048b0dc444c54db615792119d977456b27f5f99cf397495e": {
30
+ "9c4451a1fa35b69be5e3a10fbc2659763e1e2eaf5b67a40f4b018813159d668c": {
31
31
  "source": {
32
32
  "path": "lamsec-deployFunctionWithExistingVpc.template.json",
33
33
  "packaging": "file"
@@ -35,7 +35,7 @@
35
35
  "destinations": {
36
36
  "current_account-current_region": {
37
37
  "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
38
- "objectKey": "b853dc9a5b4a48c7048b0dc444c54db615792119d977456b27f5f99cf397495e.json",
38
+ "objectKey": "9c4451a1fa35b69be5e3a10fbc2659763e1e2eaf5b67a40f4b018813159d668c.json",
39
39
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
40
40
  }
41
41
  }
@@ -789,9 +789,7 @@
789
789
  "ec2:CreateNetworkInterface",
790
790
  "ec2:DeleteNetworkInterface",
791
791
  "ec2:DescribeNetworkInterfaces",
792
- "ec2:UnassignPrivateIpAddresses",
793
- "xray:PutTelemetryRecords",
794
- "xray:PutTraceSegments"
792
+ "ec2:UnassignPrivateIpAddresses"
795
793
  ],
796
794
  "Effect": "Allow",
797
795
  "Resource": "*"
@@ -931,6 +929,36 @@
931
929
  }
932
930
  }
933
931
  },
932
+ "testlambdasecretsmanagerstackLambdaFunctioninlinePolicyAddedToExecutionRole0EBC40474": {
933
+ "Type": "AWS::IAM::Policy",
934
+ "Properties": {
935
+ "PolicyDocument": {
936
+ "Statement": [
937
+ {
938
+ "Action": [
939
+ "xray:PutTelemetryRecords",
940
+ "xray:PutTraceSegments"
941
+ ],
942
+ "Effect": "Allow",
943
+ "Resource": "*"
944
+ }
945
+ ],
946
+ "Version": "2012-10-17"
947
+ },
948
+ "PolicyName": "testlambdasecretsmanagerstackLambdaFunctioninlinePolicyAddedToExecutionRole0EBC40474",
949
+ "Roles": [
950
+ {
951
+ "Ref": "testlambdasecretsmanagerstackLambdaFunctionServiceRole4FE7A9C6"
952
+ }
953
+ ]
954
+ },
955
+ "DependsOn": [
956
+ "VpcPrivateSubnet1DefaultRouteBE02A9ED",
957
+ "VpcPrivateSubnet1RouteTableAssociation70C59FA6",
958
+ "VpcPrivateSubnet2DefaultRoute060D2087",
959
+ "VpcPrivateSubnet2RouteTableAssociationA89CAD56"
960
+ ]
961
+ },
934
962
  "testlambdasecretsmanagerstacksecretC2FCB96E": {
935
963
  "Type": "AWS::SecretsManager::Secret",
936
964
  "Properties": {
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "39.0.0",
2
+ "version": "40.0.0",
3
3
  "files": {
4
4
  "21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22": {
5
5
  "source": {
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "40.0.0",
2
+ "version": "42.0.0",
3
3
  "artifacts": {
4
4
  "lamsecdeployFunctionWithExistingVpcIntegDefaultTestDeployAssert647243A7.assets": {
5
5
  "type": "cdk:asset-manifest",
@@ -66,7 +66,7 @@
66
66
  "validateOnSynth": false,
67
67
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
68
68
  "cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
69
- "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/b853dc9a5b4a48c7048b0dc444c54db615792119d977456b27f5f99cf397495e.json",
69
+ "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/9c4451a1fa35b69be5e3a10fbc2659763e1e2eaf5b67a40f4b018813159d668c.json",
70
70
  "requiresBootstrapStackVersion": 6,
71
71
  "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
72
72
  "additionalDependencies": [
@@ -587,8 +587,16 @@
587
587
  {
588
588
  "type": "aws:cdk:analytics:method",
589
589
  "data": {
590
- "addToPrincipalPolicy": [
591
- {}
590
+ "attachInlinePolicy": [
591
+ "*"
592
+ ]
593
+ }
594
+ },
595
+ {
596
+ "type": "aws:cdk:analytics:method",
597
+ "data": {
598
+ "attachInlinePolicy": [
599
+ "*"
592
600
  ]
593
601
  }
594
602
  },
@@ -642,14 +650,6 @@
642
650
  ]
643
651
  }
644
652
  },
645
- {
646
- "type": "aws:cdk:analytics:method",
647
- "data": {
648
- "addStatements": [
649
- {}
650
- ]
651
- }
652
- },
653
653
  {
654
654
  "type": "aws:cdk:analytics:method",
655
655
  "data": {
@@ -723,6 +723,44 @@
723
723
  "data": "testlambdasecretsmanagerstackLambdaFunction2DDE520A"
724
724
  }
725
725
  ],
726
+ "/lamsec-deployFunctionWithExistingVpc/test-lambda-secretsmanager-stack/LambdaFunction/inlinePolicyAddedToExecutionRole-0": [
727
+ {
728
+ "type": "aws:cdk:analytics:construct",
729
+ "data": {
730
+ "statements": "*"
731
+ }
732
+ },
733
+ {
734
+ "type": "aws:cdk:analytics:method",
735
+ "data": {
736
+ "addStatements": [
737
+ {}
738
+ ]
739
+ }
740
+ },
741
+ {
742
+ "type": "aws:cdk:analytics:method",
743
+ "data": {
744
+ "attachToRole": [
745
+ "*"
746
+ ]
747
+ }
748
+ },
749
+ {
750
+ "type": "aws:cdk:analytics:method",
751
+ "data": {
752
+ "attachToRole": [
753
+ "*"
754
+ ]
755
+ }
756
+ }
757
+ ],
758
+ "/lamsec-deployFunctionWithExistingVpc/test-lambda-secretsmanager-stack/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource": [
759
+ {
760
+ "type": "aws:cdk:logicalId",
761
+ "data": "testlambdasecretsmanagerstackLambdaFunctioninlinePolicyAddedToExecutionRole0EBC40474"
762
+ }
763
+ ],
726
764
  "/lamsec-deployFunctionWithExistingVpc/test-lambda-secretsmanager-stack/secret": [
727
765
  {
728
766
  "type": "aws:cdk:analytics:construct",
@@ -803,5 +841,6 @@
803
841
  "file": "tree.json"
804
842
  }
805
843
  }
806
- }
844
+ },
845
+ "minimumCliVersion": "2.1006.0"
807
846
  }