@aws-solutions-constructs/aws-lambda-secretsmanager 2.80.0 → 2.82.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (35) hide show
  1. package/.jsii +43 -4
  2. package/lib/index.js +1 -1
  3. package/package.json +6 -6
  4. package/test/integ.lamsec-deployFunction.js.snapshot/asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c/index.js +21 -0
  5. package/test/integ.lamsec-deployFunction.js.snapshot/cdk.out +1 -1
  6. package/test/integ.lamsec-deployFunction.js.snapshot/integ.json +1 -1
  7. package/test/integ.lamsec-deployFunction.js.snapshot/lamsec-deployFunction.assets.json +6 -6
  8. package/test/integ.lamsec-deployFunction.js.snapshot/lamsec-deployFunction.template.json +25 -19
  9. package/test/integ.lamsec-deployFunction.js.snapshot/lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA.assets.json +1 -1
  10. package/test/integ.lamsec-deployFunction.js.snapshot/manifest.json +171 -3
  11. package/test/integ.lamsec-deployFunction.js.snapshot/tree.json +1 -342
  12. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/cdk.out +1 -1
  13. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/integ.json +1 -1
  14. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsec-deployFunctionWithExistingVpc.assets.json +3 -3
  15. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsec-deployFunctionWithExistingVpc.template.json +31 -3
  16. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsecdeployFunctionWithExistingVpcIntegDefaultTestDeployAssert647243A7.assets.json +1 -1
  17. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/manifest.json +52 -13
  18. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/tree.json +1 -1722
  19. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/cdk.out +1 -1
  20. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/integ.json +1 -1
  21. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.assets.json +3 -3
  22. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.template.json +29 -3
  23. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsecdeployFunctionWithVpcIntegDefaultTestDeployAssert66148FF5.assets.json +1 -1
  24. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/manifest.json +52 -13
  25. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/tree.json +1 -1266
  26. package/test/integ.lamsec-existingFunction.js.snapshot/asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c/index.js +21 -0
  27. package/test/integ.lamsec-existingFunction.js.snapshot/cdk.out +1 -1
  28. package/test/integ.lamsec-existingFunction.js.snapshot/integ.json +1 -1
  29. package/test/integ.lamsec-existingFunction.js.snapshot/lamsec-existingFunction.assets.json +6 -6
  30. package/test/integ.lamsec-existingFunction.js.snapshot/lamsec-existingFunction.template.json +25 -19
  31. package/test/integ.lamsec-existingFunction.js.snapshot/lamsecexistingFunctionIntegDefaultTestDeployAssert295B352B.assets.json +1 -1
  32. package/test/integ.lamsec-existingFunction.js.snapshot/manifest.json +171 -3
  33. package/test/integ.lamsec-existingFunction.js.snapshot/tree.json +1 -342
  34. package/test/integ.lamsec-deployFunction.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +0 -8
  35. package/test/integ.lamsec-existingFunction.js.snapshot/asset.0c3255e93ffe7a906c7422e9f0e9cc4c7fd86ee996ee3bb302e2f134b38463c8/index.js +0 -8
@@ -1 +1 @@
1
- {"version":"39.0.0"}
1
+ {"version":"40.0.0"}
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "39.0.0",
2
+ "version": "40.0.0",
3
3
  "testCases": {
4
4
  "lamsec-deployFunctionWithVpc/Integ/DefaultTest": {
5
5
  "stacks": [
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "39.0.0",
2
+ "version": "40.0.0",
3
3
  "files": {
4
4
  "7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200": {
5
5
  "source": {
@@ -27,7 +27,7 @@
27
27
  }
28
28
  }
29
29
  },
30
- "b1391eec87063e920e122d85a76ea0f1e4e8563af8009f804e8668c6f5cd3864": {
30
+ "9ec37a379aed9ae1dacee6c8bb5b0b86752110a4a42c2e48daeab4cbb78f5782": {
31
31
  "source": {
32
32
  "path": "lamsec-deployFunctionWithVpc.template.json",
33
33
  "packaging": "file"
@@ -35,7 +35,7 @@
35
35
  "destinations": {
36
36
  "current_account-current_region": {
37
37
  "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
38
- "objectKey": "b1391eec87063e920e122d85a76ea0f1e4e8563af8009f804e8668c6f5cd3864.json",
38
+ "objectKey": "9ec37a379aed9ae1dacee6c8bb5b0b86752110a4a42c2e48daeab4cbb78f5782.json",
39
39
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
40
40
  }
41
41
  }
@@ -74,9 +74,7 @@
74
74
  "ec2:CreateNetworkInterface",
75
75
  "ec2:DeleteNetworkInterface",
76
76
  "ec2:DescribeNetworkInterfaces",
77
- "ec2:UnassignPrivateIpAddresses",
78
- "xray:PutTelemetryRecords",
79
- "xray:PutTraceSegments"
77
+ "ec2:UnassignPrivateIpAddresses"
80
78
  ],
81
79
  "Effect": "Allow",
82
80
  "Resource": "*"
@@ -214,6 +212,34 @@
214
212
  }
215
213
  }
216
214
  },
215
+ "testlambdasecretsmanagerLambdaFunctioninlinePolicyAddedToExecutionRole0A805C55F": {
216
+ "Type": "AWS::IAM::Policy",
217
+ "Properties": {
218
+ "PolicyDocument": {
219
+ "Statement": [
220
+ {
221
+ "Action": [
222
+ "xray:PutTelemetryRecords",
223
+ "xray:PutTraceSegments"
224
+ ],
225
+ "Effect": "Allow",
226
+ "Resource": "*"
227
+ }
228
+ ],
229
+ "Version": "2012-10-17"
230
+ },
231
+ "PolicyName": "testlambdasecretsmanagerLambdaFunctioninlinePolicyAddedToExecutionRole0A805C55F",
232
+ "Roles": [
233
+ {
234
+ "Ref": "testlambdasecretsmanagerLambdaFunctionServiceRole92CE007F"
235
+ }
236
+ ]
237
+ },
238
+ "DependsOn": [
239
+ "VpcisolatedSubnet1RouteTableAssociationD259E31A",
240
+ "VpcisolatedSubnet2RouteTableAssociation25A4716F"
241
+ ]
242
+ },
217
243
  "testlambdasecretsmanagersecret4C99E6BF": {
218
244
  "Type": "AWS::SecretsManager::Secret",
219
245
  "Properties": {
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "39.0.0",
2
+ "version": "40.0.0",
3
3
  "files": {
4
4
  "21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22": {
5
5
  "source": {
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "40.0.0",
2
+ "version": "42.0.0",
3
3
  "artifacts": {
4
4
  "lamsecdeployFunctionWithVpcIntegDefaultTestDeployAssert66148FF5.assets": {
5
5
  "type": "cdk:asset-manifest",
@@ -66,7 +66,7 @@
66
66
  "validateOnSynth": false,
67
67
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
68
68
  "cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
69
- "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/b1391eec87063e920e122d85a76ea0f1e4e8563af8009f804e8668c6f5cd3864.json",
69
+ "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/9ec37a379aed9ae1dacee6c8bb5b0b86752110a4a42c2e48daeab4cbb78f5782.json",
70
70
  "requiresBootstrapStackVersion": 6,
71
71
  "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
72
72
  "additionalDependencies": [
@@ -128,8 +128,16 @@
128
128
  {
129
129
  "type": "aws:cdk:analytics:method",
130
130
  "data": {
131
- "addToPrincipalPolicy": [
132
- {}
131
+ "attachInlinePolicy": [
132
+ "*"
133
+ ]
134
+ }
135
+ },
136
+ {
137
+ "type": "aws:cdk:analytics:method",
138
+ "data": {
139
+ "attachInlinePolicy": [
140
+ "*"
133
141
  ]
134
142
  }
135
143
  },
@@ -183,14 +191,6 @@
183
191
  ]
184
192
  }
185
193
  },
186
- {
187
- "type": "aws:cdk:analytics:method",
188
- "data": {
189
- "addStatements": [
190
- {}
191
- ]
192
- }
193
- },
194
194
  {
195
195
  "type": "aws:cdk:analytics:method",
196
196
  "data": {
@@ -264,6 +264,44 @@
264
264
  "data": "testlambdasecretsmanagerLambdaFunction130E7301"
265
265
  }
266
266
  ],
267
+ "/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/LambdaFunction/inlinePolicyAddedToExecutionRole-0": [
268
+ {
269
+ "type": "aws:cdk:analytics:construct",
270
+ "data": {
271
+ "statements": "*"
272
+ }
273
+ },
274
+ {
275
+ "type": "aws:cdk:analytics:method",
276
+ "data": {
277
+ "addStatements": [
278
+ {}
279
+ ]
280
+ }
281
+ },
282
+ {
283
+ "type": "aws:cdk:analytics:method",
284
+ "data": {
285
+ "attachToRole": [
286
+ "*"
287
+ ]
288
+ }
289
+ },
290
+ {
291
+ "type": "aws:cdk:analytics:method",
292
+ "data": {
293
+ "attachToRole": [
294
+ "*"
295
+ ]
296
+ }
297
+ }
298
+ ],
299
+ "/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource": [
300
+ {
301
+ "type": "aws:cdk:logicalId",
302
+ "data": "testlambdasecretsmanagerLambdaFunctioninlinePolicyAddedToExecutionRole0A805C55F"
303
+ }
304
+ ],
267
305
  "/lamsec-deployFunctionWithVpc/test-lambda-secretsmanager/secret": [
268
306
  {
269
307
  "type": "aws:cdk:analytics:construct",
@@ -635,5 +673,6 @@
635
673
  "file": "tree.json"
636
674
  }
637
675
  }
638
- }
676
+ },
677
+ "minimumCliVersion": "2.1006.0"
639
678
  }