@aws-solutions-constructs/aws-lambda-secretsmanager 2.80.0 → 2.82.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +43 -4
- package/lib/index.js +1 -1
- package/package.json +6 -6
- package/test/integ.lamsec-deployFunction.js.snapshot/asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c/index.js +21 -0
- package/test/integ.lamsec-deployFunction.js.snapshot/cdk.out +1 -1
- package/test/integ.lamsec-deployFunction.js.snapshot/integ.json +1 -1
- package/test/integ.lamsec-deployFunction.js.snapshot/lamsec-deployFunction.assets.json +6 -6
- package/test/integ.lamsec-deployFunction.js.snapshot/lamsec-deployFunction.template.json +25 -19
- package/test/integ.lamsec-deployFunction.js.snapshot/lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA.assets.json +1 -1
- package/test/integ.lamsec-deployFunction.js.snapshot/manifest.json +171 -3
- package/test/integ.lamsec-deployFunction.js.snapshot/tree.json +1 -342
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/cdk.out +1 -1
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/integ.json +1 -1
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsec-deployFunctionWithExistingVpc.assets.json +3 -3
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsec-deployFunctionWithExistingVpc.template.json +31 -3
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsecdeployFunctionWithExistingVpcIntegDefaultTestDeployAssert647243A7.assets.json +1 -1
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/manifest.json +52 -13
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/tree.json +1 -1722
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/cdk.out +1 -1
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/integ.json +1 -1
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.assets.json +3 -3
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.template.json +29 -3
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsecdeployFunctionWithVpcIntegDefaultTestDeployAssert66148FF5.assets.json +1 -1
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/manifest.json +52 -13
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/tree.json +1 -1266
- package/test/integ.lamsec-existingFunction.js.snapshot/asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c/index.js +21 -0
- package/test/integ.lamsec-existingFunction.js.snapshot/cdk.out +1 -1
- package/test/integ.lamsec-existingFunction.js.snapshot/integ.json +1 -1
- package/test/integ.lamsec-existingFunction.js.snapshot/lamsec-existingFunction.assets.json +6 -6
- package/test/integ.lamsec-existingFunction.js.snapshot/lamsec-existingFunction.template.json +25 -19
- package/test/integ.lamsec-existingFunction.js.snapshot/lamsecexistingFunctionIntegDefaultTestDeployAssert295B352B.assets.json +1 -1
- package/test/integ.lamsec-existingFunction.js.snapshot/manifest.json +171 -3
- package/test/integ.lamsec-existingFunction.js.snapshot/tree.json +1 -342
- package/test/integ.lamsec-deployFunction.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +0 -8
- package/test/integ.lamsec-existingFunction.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +0 -8
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":"
|
|
1
|
+
{"version":"40.0.0"}
|
package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.assets.json
CHANGED
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
{
|
|
2
|
-
"version": "
|
|
2
|
+
"version": "40.0.0",
|
|
3
3
|
"files": {
|
|
4
4
|
"7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200": {
|
|
5
5
|
"source": {
|
|
@@ -27,7 +27,7 @@
|
|
|
27
27
|
}
|
|
28
28
|
}
|
|
29
29
|
},
|
|
30
|
-
"
|
|
30
|
+
"9ec37a379aed9ae1dacee6c8bb5b0b86752110a4a42c2e48daeab4cbb78f5782": {
|
|
31
31
|
"source": {
|
|
32
32
|
"path": "lamsec-deployFunctionWithVpc.template.json",
|
|
33
33
|
"packaging": "file"
|
|
@@ -35,7 +35,7 @@
|
|
|
35
35
|
"destinations": {
|
|
36
36
|
"current_account-current_region": {
|
|
37
37
|
"bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
|
|
38
|
-
"objectKey": "
|
|
38
|
+
"objectKey": "9ec37a379aed9ae1dacee6c8bb5b0b86752110a4a42c2e48daeab4cbb78f5782.json",
|
|
39
39
|
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
|
|
40
40
|
}
|
|
41
41
|
}
|
|
@@ -74,9 +74,7 @@
|
|
|
74
74
|
"ec2:CreateNetworkInterface",
|
|
75
75
|
"ec2:DeleteNetworkInterface",
|
|
76
76
|
"ec2:DescribeNetworkInterfaces",
|
|
77
|
-
"ec2:UnassignPrivateIpAddresses"
|
|
78
|
-
"xray:PutTelemetryRecords",
|
|
79
|
-
"xray:PutTraceSegments"
|
|
77
|
+
"ec2:UnassignPrivateIpAddresses"
|
|
80
78
|
],
|
|
81
79
|
"Effect": "Allow",
|
|
82
80
|
"Resource": "*"
|
|
@@ -214,6 +212,34 @@
|
|
|
214
212
|
}
|
|
215
213
|
}
|
|
216
214
|
},
|
|
215
|
+
"testlambdasecretsmanagerLambdaFunctioninlinePolicyAddedToExecutionRole0A805C55F": {
|
|
216
|
+
"Type": "AWS::IAM::Policy",
|
|
217
|
+
"Properties": {
|
|
218
|
+
"PolicyDocument": {
|
|
219
|
+
"Statement": [
|
|
220
|
+
{
|
|
221
|
+
"Action": [
|
|
222
|
+
"xray:PutTelemetryRecords",
|
|
223
|
+
"xray:PutTraceSegments"
|
|
224
|
+
],
|
|
225
|
+
"Effect": "Allow",
|
|
226
|
+
"Resource": "*"
|
|
227
|
+
}
|
|
228
|
+
],
|
|
229
|
+
"Version": "2012-10-17"
|
|
230
|
+
},
|
|
231
|
+
"PolicyName": "testlambdasecretsmanagerLambdaFunctioninlinePolicyAddedToExecutionRole0A805C55F",
|
|
232
|
+
"Roles": [
|
|
233
|
+
{
|
|
234
|
+
"Ref": "testlambdasecretsmanagerLambdaFunctionServiceRole92CE007F"
|
|
235
|
+
}
|
|
236
|
+
]
|
|
237
|
+
},
|
|
238
|
+
"DependsOn": [
|
|
239
|
+
"VpcisolatedSubnet1RouteTableAssociationD259E31A",
|
|
240
|
+
"VpcisolatedSubnet2RouteTableAssociation25A4716F"
|
|
241
|
+
]
|
|
242
|
+
},
|
|
217
243
|
"testlambdasecretsmanagersecret4C99E6BF": {
|
|
218
244
|
"Type": "AWS::SecretsManager::Secret",
|
|
219
245
|
"Properties": {
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
{
|
|
2
|
-
"version": "
|
|
2
|
+
"version": "42.0.0",
|
|
3
3
|
"artifacts": {
|
|
4
4
|
"lamsecdeployFunctionWithVpcIntegDefaultTestDeployAssert66148FF5.assets": {
|
|
5
5
|
"type": "cdk:asset-manifest",
|
|
@@ -66,7 +66,7 @@
|
|
|
66
66
|
"validateOnSynth": false,
|
|
67
67
|
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
|
|
68
68
|
"cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
|
|
69
|
-
"stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/
|
|
69
|
+
"stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/9ec37a379aed9ae1dacee6c8bb5b0b86752110a4a42c2e48daeab4cbb78f5782.json",
|
|
70
70
|
"requiresBootstrapStackVersion": 6,
|
|
71
71
|
"bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
|
|
72
72
|
"additionalDependencies": [
|
|
@@ -128,8 +128,16 @@
|
|
|
128
128
|
{
|
|
129
129
|
"type": "aws:cdk:analytics:method",
|
|
130
130
|
"data": {
|
|
131
|
-
"
|
|
132
|
-
|
|
131
|
+
"attachInlinePolicy": [
|
|
132
|
+
"*"
|
|
133
|
+
]
|
|
134
|
+
}
|
|
135
|
+
},
|
|
136
|
+
{
|
|
137
|
+
"type": "aws:cdk:analytics:method",
|
|
138
|
+
"data": {
|
|
139
|
+
"attachInlinePolicy": [
|
|
140
|
+
"*"
|
|
133
141
|
]
|
|
134
142
|
}
|
|
135
143
|
},
|
|
@@ -183,14 +191,6 @@
|
|
|
183
191
|
]
|
|
184
192
|
}
|
|
185
193
|
},
|
|
186
|
-
{
|
|
187
|
-
"type": "aws:cdk:analytics:method",
|
|
188
|
-
"data": {
|
|
189
|
-
"addStatements": [
|
|
190
|
-
{}
|
|
191
|
-
]
|
|
192
|
-
}
|
|
193
|
-
},
|
|
194
194
|
{
|
|
195
195
|
"type": "aws:cdk:analytics:method",
|
|
196
196
|
"data": {
|
|
@@ -264,6 +264,44 @@
|
|
|
264
264
|
"data": "testlambdasecretsmanagerLambdaFunction130E7301"
|
|
265
265
|
}
|
|
266
266
|
],
|
|
267
|
+
"/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/LambdaFunction/inlinePolicyAddedToExecutionRole-0": [
|
|
268
|
+
{
|
|
269
|
+
"type": "aws:cdk:analytics:construct",
|
|
270
|
+
"data": {
|
|
271
|
+
"statements": "*"
|
|
272
|
+
}
|
|
273
|
+
},
|
|
274
|
+
{
|
|
275
|
+
"type": "aws:cdk:analytics:method",
|
|
276
|
+
"data": {
|
|
277
|
+
"addStatements": [
|
|
278
|
+
{}
|
|
279
|
+
]
|
|
280
|
+
}
|
|
281
|
+
},
|
|
282
|
+
{
|
|
283
|
+
"type": "aws:cdk:analytics:method",
|
|
284
|
+
"data": {
|
|
285
|
+
"attachToRole": [
|
|
286
|
+
"*"
|
|
287
|
+
]
|
|
288
|
+
}
|
|
289
|
+
},
|
|
290
|
+
{
|
|
291
|
+
"type": "aws:cdk:analytics:method",
|
|
292
|
+
"data": {
|
|
293
|
+
"attachToRole": [
|
|
294
|
+
"*"
|
|
295
|
+
]
|
|
296
|
+
}
|
|
297
|
+
}
|
|
298
|
+
],
|
|
299
|
+
"/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource": [
|
|
300
|
+
{
|
|
301
|
+
"type": "aws:cdk:logicalId",
|
|
302
|
+
"data": "testlambdasecretsmanagerLambdaFunctioninlinePolicyAddedToExecutionRole0A805C55F"
|
|
303
|
+
}
|
|
304
|
+
],
|
|
267
305
|
"/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/secret": [
|
|
268
306
|
{
|
|
269
307
|
"type": "aws:cdk:analytics:construct",
|
|
@@ -635,5 +673,6 @@
|
|
|
635
673
|
"file": "tree.json"
|
|
636
674
|
}
|
|
637
675
|
}
|
|
638
|
-
}
|
|
676
|
+
},
|
|
677
|
+
"minimumCliVersion": "2.1006.0"
|
|
639
678
|
}
|