@aws-solutions-constructs/aws-lambda-secretsmanager 2.93.0 → 2.95.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +57 -5
- package/lib/index.js +1 -1
- package/package.json +6 -6
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/asset.7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200/__entrypoint__.js +1 -0
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/asset.7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200/index.js +1 -0
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c/index.js +21 -0
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/cdk.out +1 -1
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/integ.json +2 -2
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsec-deployFunctionWithExistingVpc.assets.json +4 -4
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsec-deployFunctionWithExistingVpc.template.json +0 -10
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsecdeployFunctionWithExistingVpcIntegDefaultTestDeployAssert647243A7.assets.json +1 -1
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/manifest.json +67 -59
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/tree.json +1 -1
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/asset.7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200/__entrypoint__.js +1 -0
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/asset.7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200/index.js +1 -0
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c/index.js +21 -0
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/cdk.out +1 -1
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/integ.json +2 -2
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.assets.json +4 -4
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.template.json +0 -10
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsecdeployFunctionWithVpcIntegDefaultTestDeployAssert66148FF5.assets.json +1 -1
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/manifest.json +67 -59
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/tree.json +1 -1
package/.jsii
CHANGED
|
@@ -8,8 +8,8 @@
|
|
|
8
8
|
"url": "https://aws.amazon.com"
|
|
9
9
|
},
|
|
10
10
|
"dependencies": {
|
|
11
|
-
"@aws-solutions-constructs/core": "2.
|
|
12
|
-
"aws-cdk-lib": "^2.
|
|
11
|
+
"@aws-solutions-constructs/core": "2.95.0",
|
|
12
|
+
"aws-cdk-lib": "^2.223.0",
|
|
13
13
|
"constructs": "^10.0.0"
|
|
14
14
|
},
|
|
15
15
|
"dependencyClosure": {
|
|
@@ -628,6 +628,19 @@
|
|
|
628
628
|
}
|
|
629
629
|
}
|
|
630
630
|
},
|
|
631
|
+
"aws-cdk-lib.aws_bedrockagentcore": {
|
|
632
|
+
"targets": {
|
|
633
|
+
"dotnet": {
|
|
634
|
+
"package": "Amazon.CDK.AWS.BedrockAgentCore"
|
|
635
|
+
},
|
|
636
|
+
"java": {
|
|
637
|
+
"package": "software.amazon.awscdk.services.bedrockagentcore"
|
|
638
|
+
},
|
|
639
|
+
"python": {
|
|
640
|
+
"module": "aws_cdk.aws_bedrockagentcore"
|
|
641
|
+
}
|
|
642
|
+
}
|
|
643
|
+
},
|
|
631
644
|
"aws-cdk-lib.aws_billingconductor": {
|
|
632
645
|
"targets": {
|
|
633
646
|
"dotnet": {
|
|
@@ -3229,6 +3242,19 @@
|
|
|
3229
3242
|
}
|
|
3230
3243
|
}
|
|
3231
3244
|
},
|
|
3245
|
+
"aws-cdk-lib.aws_rtbfabric": {
|
|
3246
|
+
"targets": {
|
|
3247
|
+
"dotnet": {
|
|
3248
|
+
"package": "Amazon.CDK.AWS.RTBFabric"
|
|
3249
|
+
},
|
|
3250
|
+
"java": {
|
|
3251
|
+
"package": "software.amazon.awscdk.services.rtbfabric"
|
|
3252
|
+
},
|
|
3253
|
+
"python": {
|
|
3254
|
+
"module": "aws_cdk.aws_rtbfabric"
|
|
3255
|
+
}
|
|
3256
|
+
}
|
|
3257
|
+
},
|
|
3232
3258
|
"aws-cdk-lib.aws_rum": {
|
|
3233
3259
|
"targets": {
|
|
3234
3260
|
"dotnet": {
|
|
@@ -3346,6 +3372,19 @@
|
|
|
3346
3372
|
}
|
|
3347
3373
|
}
|
|
3348
3374
|
},
|
|
3375
|
+
"aws-cdk-lib.aws_s3vectors": {
|
|
3376
|
+
"targets": {
|
|
3377
|
+
"dotnet": {
|
|
3378
|
+
"package": "Amazon.CDK.AWS.S3Vectors"
|
|
3379
|
+
},
|
|
3380
|
+
"java": {
|
|
3381
|
+
"package": "software.amazon.awscdk.services.s3vectors"
|
|
3382
|
+
},
|
|
3383
|
+
"python": {
|
|
3384
|
+
"module": "aws_cdk.aws_s3vectors"
|
|
3385
|
+
}
|
|
3386
|
+
}
|
|
3387
|
+
},
|
|
3349
3388
|
"aws-cdk-lib.aws_sagemaker": {
|
|
3350
3389
|
"targets": {
|
|
3351
3390
|
"dotnet": {
|
|
@@ -3554,6 +3593,19 @@
|
|
|
3554
3593
|
}
|
|
3555
3594
|
}
|
|
3556
3595
|
},
|
|
3596
|
+
"aws-cdk-lib.aws_smsvoice": {
|
|
3597
|
+
"targets": {
|
|
3598
|
+
"dotnet": {
|
|
3599
|
+
"package": "Amazon.CDK.AWS.SMSVOICE"
|
|
3600
|
+
},
|
|
3601
|
+
"java": {
|
|
3602
|
+
"package": "software.amazon.awscdk.services.smsvoice"
|
|
3603
|
+
},
|
|
3604
|
+
"python": {
|
|
3605
|
+
"module": "aws_cdk.aws_smsvoice"
|
|
3606
|
+
}
|
|
3607
|
+
}
|
|
3608
|
+
},
|
|
3557
3609
|
"aws-cdk-lib.aws_sns": {
|
|
3558
3610
|
"targets": {
|
|
3559
3611
|
"dotnet": {
|
|
@@ -4078,7 +4130,7 @@
|
|
|
4078
4130
|
},
|
|
4079
4131
|
"description": "CDK constructs for defining an interaction between an AWS Lambda function and AWS Secrets Manager.",
|
|
4080
4132
|
"homepage": "https://github.com/awslabs/aws-solutions-constructs.git",
|
|
4081
|
-
"jsiiVersion": "5.
|
|
4133
|
+
"jsiiVersion": "5.9.8 (build 3d2e131)",
|
|
4082
4134
|
"keywords": [
|
|
4083
4135
|
"aws",
|
|
4084
4136
|
"cdk",
|
|
@@ -4394,6 +4446,6 @@
|
|
|
4394
4446
|
"symbolId": "lib/index:LambdaToSecretsmanagerProps"
|
|
4395
4447
|
}
|
|
4396
4448
|
},
|
|
4397
|
-
"version": "2.
|
|
4398
|
-
"fingerprint": "
|
|
4449
|
+
"version": "2.95.0",
|
|
4450
|
+
"fingerprint": "/An/34cfkFd4nDJXYltZy1l9Mz66abQmpt3q/Wy912w="
|
|
4399
4451
|
}
|
package/lib/index.js
CHANGED
|
@@ -71,5 +71,5 @@ class LambdaToSecretsmanager extends constructs_1.Construct {
|
|
|
71
71
|
}
|
|
72
72
|
exports.LambdaToSecretsmanager = LambdaToSecretsmanager;
|
|
73
73
|
_a = JSII_RTTI_SYMBOL_1;
|
|
74
|
-
LambdaToSecretsmanager[_a] = { fqn: "@aws-solutions-constructs/aws-lambda-secretsmanager.LambdaToSecretsmanager", version: "2.
|
|
74
|
+
LambdaToSecretsmanager[_a] = { fqn: "@aws-solutions-constructs/aws-lambda-secretsmanager.LambdaToSecretsmanager", version: "2.95.0" };
|
|
75
75
|
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["index.ts"],"names":[],"mappings":";;;;;AAAA;;;;;;;;;;;GAWG;AAEH,UAAU;AACV,2DAA2D;AAI3D,2CAAuC;AA2DvC;;GAEG;AACH,MAAa,sBAAuB,SAAQ,sBAAS;IAKjD;;;;;;OAMG;IACH,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAkC;QAC1E,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,QAAQ,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC;QAC9B,QAAQ,CAAC,gBAAgB,CAAC,KAAK,CAAC,CAAC;QACjC,QAAQ,CAAC,wBAAwB,CAAC,KAAK,CAAC,CAAC;QAEzC,IAAI,KAAK,CAAC,SAAS,IAAI,KAAK,CAAC,WAAW,EAAE,CAAC;YAEzC,IAAI,CAAC,GAAG,GAAG,QAAQ,CAAC,QAAQ,CAAC,KAAK,EAAE;gBAClC,eAAe,EAAE,QAAQ,CAAC,uBAAuB,EAAE;gBACnD,WAAW,EAAE,KAAK,CAAC,WAAW;gBAC9B,YAAY,EAAE,KAAK,CAAC,QAAQ;gBAC5B,iBAAiB,EAAE;oBACjB,kBAAkB,EAAE,IAAI;oBACxB,gBAAgB,EAAE,IAAI;iBACvB;aACF,CAAC,CAAC;YAEH,QAAQ,CAAC,qBAAqB,CAAC,KAAK,EAAE,IAAI,CAAC,GAAG,EAAE,QAAQ,CAAC,oBAAoB,CAAC,eAAe,CAAC,CAAC;QACjG,CAAC;QAED,4BAA4B;QAC5B,IAAI,CAAC,cAAc,GAAG,QAAQ,CAAC,mBAAmB,CAAC,IAAI,EAAE;YACvD,iBAAiB,EAAE,KAAK,CAAC,iBAAiB;YAC1C,mBAAmB,EAAE,KAAK,CAAC,mBAAmB;YAC9C,GAAG,EAAE,IAAI,CAAC,GAAG;SACd,CAAC,CAAC;QAEH,mBAAmB;QACnB,IAAI,KAAK,CAAC,iBAAiB,EAAE,CAAC;YAC5B,IAAI,CAAC,MAAM,GAAG,KAAK,CAAC,iBAAiB,CAAC;QACxC,CAAC;aAAM,CAAC;YACN,IAAI,CAAC,MAAM,GAAG,QAAQ,CAAC,yBAAyB,CAAC,IAAI,EAAE,QAAQ,EAAE,KAAK,CAAC,WAAW,CAAC,CAAC;QACtF,CAAC;QAED,kCAAkC;QAClC,MAAM,6BAA6B,GAAG,KAAK,CAAC,6BAA6B,IAAI,YAAY,CAAC;QAC1F,IAAI,CAAC,cAAc,CAAC,cAAc,CAAC,6BAA6B,EAAE,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;QAEzF,6DAA6D;QAC7D,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC;QAE3C,IAAI,KAAK,CAAC,gBAAgB,KAAK,WAAW,EAAE,CAAC;YAC3C,IAAI,CAAC,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC;QAC9C,CAAC;IACH,CAAC;;AAzDL,wDA0DC","sourcesContent":["/**\n *  Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n *\n *  Licensed under the Apache License, Version 2.0 (the \"License\"). You may not use this file except in compliance\n *  with the License. A copy of the License is located at\n *\n *      http://www.apache.org/licenses/LICENSE-2.0\n *\n *  or in the 'license' file accompanying this file. This file is distributed on an 'AS IS' BASIS, WITHOUT WARRANTIES\n *  OR CONDITIONS OF ANY KIND, express or implied. See the License for the specific language governing permissions\n *  and limitations under the License.\n */\n\n// Imports\nimport * as defaults from \"@aws-solutions-constructs/core\";\nimport * as lambda from \"aws-cdk-lib/aws-lambda\";\nimport * as secretsmanager from \"aws-cdk-lib/aws-secretsmanager\";\nimport * as ec2 from \"aws-cdk-lib/aws-ec2\";\nimport { Construct } from \"constructs\";\n\n/**\n * @summary The properties for the LambdaToSecretsmanager class.\n */\nexport interface LambdaToSecretsmanagerProps {\n  /**\n   * Existing instance of Lambda Function object, providing both this and `lambdaFunctionProps` will cause an error.\n   *\n   * @default - None\n   */\n  readonly existingLambdaObj?: lambda.Function;\n  /**\n   * User provided props to override the default props for the Lambda function.\n   *\n   * @default - Default properties are used.\n   */\n  readonly lambdaFunctionProps?: lambda.FunctionProps;\n  /**\n   * Existing instance of Secret object, providing both this and secretProps will cause an error.\n   *\n   * @default - Default props are used\n   */\n  readonly existingSecretObj?: secretsmanager.Secret;\n  /**\n   * Optional user-provided props to override the default props for the Secret.\n   *\n   * @default - Default props are used\n   */\n  readonly secretProps?: secretsmanager.SecretProps;\n  /**\n   * An existing VPC for the construct to use (construct will NOT create a new VPC in this case)\n   */\n  readonly existingVpc?: ec2.IVpc;\n  /**\n   * Properties to override default properties if deployVpc is true\n   */\n  readonly vpcProps?: ec2.VpcProps;\n  /**\n   * Whether to deploy a new VPC\n   *\n   * @default - false\n   */\n  readonly deployVpc?: boolean;\n  /**\n   * Optional Name for the Lambda function environment variable set to the ARN of the secret.\n   *\n   * @default - SECRET_ARN\n   */\n  readonly secretEnvironmentVariableName?: string;\n  /**\n   * Optional secret permissions to grant to the Lambda function.\n   * One of the following may be specified: \"Read\" or \"ReadWrite\".\n   *\n   * @default - Read only access is given to the Lambda function if no value is specified.\n   */\n  readonly grantWriteAccess?: string;\n}\n\n/**\n * @summary The LambdaToSecretsmanager class.\n */\nexport class LambdaToSecretsmanager extends Construct {\n    public readonly lambdaFunction: lambda.Function;\n    public readonly secret: secretsmanager.Secret;\n    public readonly vpc?: ec2.IVpc;\n\n    /**\n     * @summary Constructs a new instance of the LambdaToSecretsmanager class.\n     * @param {cdk.App} scope - represents the scope for all the resources.\n     * @param {string} id - this is a a scope-unique id.\n     * @param {LambdaToSecretsmanagerProps} props - user provided props for the construct.\n     * @access public\n     */\n    constructor(scope: Construct, id: string, props: LambdaToSecretsmanagerProps) {\n      super(scope, id);\n      defaults.CheckVpcProps(props);\n      defaults.CheckLambdaProps(props);\n      defaults.CheckSecretsManagerProps(props);\n\n      if (props.deployVpc || props.existingVpc) {\n\n        this.vpc = defaults.buildVpc(scope, {\n          defaultVpcProps: defaults.DefaultIsolatedVpcProps(),\n          existingVpc: props.existingVpc,\n          userVpcProps: props.vpcProps,\n          constructVpcProps: {\n            enableDnsHostnames: true,\n            enableDnsSupport: true,\n          },\n        });\n\n        defaults.AddAwsServiceEndpoint(scope, this.vpc, defaults.ServiceEndpointTypes.SECRETS_MANAGER);\n      }\n\n      // Setup the Lambda function\n      this.lambdaFunction = defaults.buildLambdaFunction(this, {\n        existingLambdaObj: props.existingLambdaObj,\n        lambdaFunctionProps: props.lambdaFunctionProps,\n        vpc: this.vpc,\n      });\n\n      // Setup the Secret\n      if (props.existingSecretObj) {\n        this.secret = props.existingSecretObj;\n      } else {\n        this.secret = defaults.buildSecretsManagerSecret(this, 'secret', props.secretProps);\n      }\n\n      // Configure environment variables\n      const secretEnvironmentVariableName = props.secretEnvironmentVariableName || 'SECRET_ARN';\n      this.lambdaFunction.addEnvironment(secretEnvironmentVariableName, this.secret.secretArn);\n\n      // Enable read permissions for the Lambda function by default\n      this.secret.grantRead(this.lambdaFunction);\n\n      if (props.grantWriteAccess === 'ReadWrite') {\n        this.secret.grantWrite(this.lambdaFunction);\n      }\n    }\n}\n"]}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-solutions-constructs/aws-lambda-secretsmanager",
|
|
3
|
-
"version": "2.
|
|
3
|
+
"version": "2.95.0",
|
|
4
4
|
"description": "CDK constructs for defining an interaction between an AWS Lambda function and AWS Secrets Manager.",
|
|
5
5
|
"main": "lib/index.js",
|
|
6
6
|
"types": "lib/index.d.ts",
|
|
@@ -55,14 +55,14 @@
|
|
|
55
55
|
}
|
|
56
56
|
},
|
|
57
57
|
"dependencies": {
|
|
58
|
-
"@aws-solutions-constructs/core": "2.
|
|
58
|
+
"@aws-solutions-constructs/core": "2.95.0",
|
|
59
59
|
"constructs": "^10.0.0"
|
|
60
60
|
},
|
|
61
61
|
"devDependencies": {
|
|
62
|
-
"@aws-cdk/integ-tests-alpha": "2.
|
|
62
|
+
"@aws-cdk/integ-tests-alpha": "2.223.0-alpha.0",
|
|
63
63
|
"@types/node": "^10.3.0",
|
|
64
64
|
"constructs": "^10.0.0",
|
|
65
|
-
"aws-cdk-lib": "2.
|
|
65
|
+
"aws-cdk-lib": "2.223.0"
|
|
66
66
|
},
|
|
67
67
|
"jest": {
|
|
68
68
|
"moduleFileExtensions": [
|
|
@@ -70,9 +70,9 @@
|
|
|
70
70
|
]
|
|
71
71
|
},
|
|
72
72
|
"peerDependencies": {
|
|
73
|
-
"@aws-solutions-constructs/core": "2.
|
|
73
|
+
"@aws-solutions-constructs/core": "2.95.0",
|
|
74
74
|
"constructs": "^10.0.0",
|
|
75
|
-
"aws-cdk-lib": "^2.
|
|
75
|
+
"aws-cdk-lib": "^2.223.0"
|
|
76
76
|
},
|
|
77
77
|
"keywords": [
|
|
78
78
|
"aws",
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
"use strict";Object.defineProperty(exports,"__esModule",{value:!0}),exports.external=void 0,exports.handler=handler,exports.withRetries=withRetries;const https=require("https"),url=require("url");exports.external={sendHttpRequest:defaultSendHttpRequest,log:defaultLog,includeStackTraces:!0,userHandlerIndex:"./index"};const CREATE_FAILED_PHYSICAL_ID_MARKER="AWSCDK::CustomResourceProviderFramework::CREATE_FAILED",MISSING_PHYSICAL_ID_MARKER="AWSCDK::CustomResourceProviderFramework::MISSING_PHYSICAL_ID";async function handler(event,context){const sanitizedEvent={...event,ResponseURL:"..."};if(exports.external.log(JSON.stringify(sanitizedEvent,void 0,2)),event.RequestType==="Delete"&&event.PhysicalResourceId===CREATE_FAILED_PHYSICAL_ID_MARKER){exports.external.log("ignoring DELETE event caused by a failed CREATE event"),await submitResponse("SUCCESS",event);return}try{const userHandler=require(exports.external.userHandlerIndex).handler,result=await userHandler(sanitizedEvent,context),responseEvent=renderResponse(event,result);await submitResponse("SUCCESS",responseEvent)}catch(e){const resp={...event,Reason:exports.external.includeStackTraces?e.stack:e.message};resp.PhysicalResourceId||(event.RequestType==="Create"?(exports.external.log("CREATE failed, responding with a marker physical resource id so that the subsequent DELETE will be ignored"),resp.PhysicalResourceId=CREATE_FAILED_PHYSICAL_ID_MARKER):exports.external.log(`ERROR: Malformed event. "PhysicalResourceId" is required: ${JSON.stringify(event)}`)),await submitResponse("FAILED",resp)}}function renderResponse(cfnRequest,handlerResponse={}){const physicalResourceId=handlerResponse.PhysicalResourceId??cfnRequest.PhysicalResourceId??cfnRequest.RequestId;if(cfnRequest.RequestType==="Delete"&&physicalResourceId!==cfnRequest.PhysicalResourceId)throw new Error(`DELETE: cannot change the physical resource ID from "${cfnRequest.PhysicalResourceId}" to "${handlerResponse.PhysicalResourceId}" during deletion`);return{...cfnRequest,...handlerResponse,PhysicalResourceId:physicalResourceId}}async function submitResponse(status,event){const json={Status:status,Reason:event.Reason??status,StackId:event.StackId,RequestId:event.RequestId,PhysicalResourceId:event.PhysicalResourceId||MISSING_PHYSICAL_ID_MARKER,LogicalResourceId:event.LogicalResourceId,NoEcho:event.NoEcho,Data:event.Data},parsedUrl=url.parse(event.ResponseURL),loggingSafeUrl=`${parsedUrl.protocol}//${parsedUrl.hostname}/${parsedUrl.pathname}?***`;exports.external.log("submit response to cloudformation",loggingSafeUrl,json);const responseBody=JSON.stringify(json),req={hostname:parsedUrl.hostname,path:parsedUrl.path,method:"PUT",headers:{"content-type":"","content-length":Buffer.byteLength(responseBody,"utf8")}};await withRetries({attempts:5,sleep:1e3},exports.external.sendHttpRequest)(req,responseBody)}async function defaultSendHttpRequest(options,requestBody){return new Promise((resolve,reject)=>{try{const request=https.request(options,response=>{response.resume(),!response.statusCode||response.statusCode>=400?reject(new Error(`Unsuccessful HTTP response: ${response.statusCode}`)):resolve()});request.on("error",reject),request.write(requestBody),request.end()}catch(e){reject(e)}})}function defaultLog(fmt,...params){console.log(fmt,...params)}function withRetries(options,fn){return async(...xs)=>{let attempts=options.attempts,ms=options.sleep;for(;;)try{return await fn(...xs)}catch(e){if(attempts--<=0)throw e;await sleep(Math.floor(Math.random()*ms)),ms*=2}}}async function sleep(ms){return new Promise(ok=>setTimeout(ok,ms))}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
"use strict";var I=Object.create,t=Object.defineProperty,y=Object.getOwnPropertyDescriptor,P=Object.getOwnPropertyNames,g=Object.getPrototypeOf,l=Object.prototype.hasOwnProperty,G=(r,e)=>{for(var o in e)t(r,o,{get:e[o],enumerable:!0})},n=(r,e,o,i)=>{if(e&&typeof e=="object"||typeof e=="function")for(let s of P(e))!l.call(r,s)&&s!==o&&t(r,s,{get:()=>e[s],enumerable:!(i=y(e,s))||i.enumerable});return r},R=(r,e,o)=>(o=r!=null?I(g(r)):{},n(e||!r||!r.__esModule?t(o,"default",{value:r,enumerable:!0}):o,r)),S=r=>n(t({},"__esModule",{value:!0}),r),k={};G(k,{handler:()=>f}),module.exports=S(k);var a=R(require("@aws-sdk/client-ec2")),u=new a.EC2({});function c(r,e){return{GroupId:r,IpPermissions:[{UserIdGroupPairs:[{GroupId:r,UserId:e}],IpProtocol:"-1"}]}}function d(r){return{GroupId:r,IpPermissions:[{IpRanges:[{CidrIp:"0.0.0.0/0"}],IpProtocol:"-1"}]}}async function f(r){let e=r.ResourceProperties.DefaultSecurityGroupId,o=r.ResourceProperties.Account;switch(r.RequestType){case"Create":return p(e,o);case"Update":return h(r);case"Delete":return m(e,o)}}async function h(r){let e=r.OldResourceProperties.DefaultSecurityGroupId,o=r.ResourceProperties.DefaultSecurityGroupId;e!==o&&(await m(e,r.ResourceProperties.Account),await p(o,r.ResourceProperties.Account))}async function p(r,e){try{await u.revokeSecurityGroupEgress(d(r))}catch(o){if(o.name!=="InvalidPermission.NotFound")throw o}try{await u.revokeSecurityGroupIngress(c(r,e))}catch(o){if(o.name!=="InvalidPermission.NotFound")throw o}}async function m(r,e){await u.authorizeSecurityGroupIngress(c(r,e)),await u.authorizeSecurityGroupEgress(d(r))}
|
|
@@ -0,0 +1,21 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
|
3
|
+
*
|
|
4
|
+
* Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance
|
|
5
|
+
* with the License. A copy of the License is located at
|
|
6
|
+
*
|
|
7
|
+
* http://www.apache.org/licenses/LICENSE-2.0
|
|
8
|
+
*
|
|
9
|
+
* or in the 'license' file accompanying this file. This file is distributed on an 'AS IS' BASIS, WITHOUT WARRANTIES
|
|
10
|
+
* OR CONDITIONS OF ANY KIND, express or implied. See the License for the specific language governing permissions
|
|
11
|
+
* and limitations under the License.
|
|
12
|
+
*/
|
|
13
|
+
|
|
14
|
+
exports.handler = async function(event) {
|
|
15
|
+
console.log('request:', JSON.stringify(event, undefined, 2));
|
|
16
|
+
return {
|
|
17
|
+
statusCode: 200,
|
|
18
|
+
headers: { 'Content-Type': 'text/plain' },
|
|
19
|
+
body: `Hello, CDK! You've hit ${event.path}\n`
|
|
20
|
+
};
|
|
21
|
+
};
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":"
|
|
1
|
+
{"version":"48.0.0"}
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
{
|
|
2
|
-
"version": "
|
|
2
|
+
"version": "48.0.0",
|
|
3
3
|
"testCases": {
|
|
4
4
|
"lamsec-deployFunctionWithExistingVpc/Integ/DefaultTest": {
|
|
5
5
|
"stacks": [
|
|
@@ -9,5 +9,5 @@
|
|
|
9
9
|
"assertionStackName": "lamsecdeployFunctionWithExistingVpcIntegDefaultTestDeployAssert647243A7"
|
|
10
10
|
}
|
|
11
11
|
},
|
|
12
|
-
"minimumCliVersion": "2.
|
|
12
|
+
"minimumCliVersion": "2.1029.2"
|
|
13
13
|
}
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
{
|
|
2
|
-
"version": "
|
|
2
|
+
"version": "48.0.0",
|
|
3
3
|
"files": {
|
|
4
4
|
"7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200": {
|
|
5
5
|
"displayName": "lamsec-deployFunctionWithExistingVpc/Custom::VpcRestrictDefaultSGCustomResourceProvider Code",
|
|
@@ -29,16 +29,16 @@
|
|
|
29
29
|
}
|
|
30
30
|
}
|
|
31
31
|
},
|
|
32
|
-
"
|
|
32
|
+
"a7148c54da01eab17a4e5cd842baf323248cc7f6fb80f967504ca26580d03b58": {
|
|
33
33
|
"displayName": "lamsec-deployFunctionWithExistingVpc Template",
|
|
34
34
|
"source": {
|
|
35
35
|
"path": "lamsec-deployFunctionWithExistingVpc.template.json",
|
|
36
36
|
"packaging": "file"
|
|
37
37
|
},
|
|
38
38
|
"destinations": {
|
|
39
|
-
"current_account-current_region-
|
|
39
|
+
"current_account-current_region-a3b3be65": {
|
|
40
40
|
"bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
|
|
41
|
-
"objectKey": "
|
|
41
|
+
"objectKey": "a7148c54da01eab17a4e5cd842baf323248cc7f6fb80f967504ca26580d03b58.json",
|
|
42
42
|
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
|
|
43
43
|
}
|
|
44
44
|
}
|
|
@@ -66,7 +66,7 @@
|
|
|
66
66
|
"validateOnSynth": false,
|
|
67
67
|
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
|
|
68
68
|
"cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
|
|
69
|
-
"stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/
|
|
69
|
+
"stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/a7148c54da01eab17a4e5cd842baf323248cc7f6fb80f967504ca26580d03b58.json",
|
|
70
70
|
"requiresBootstrapStackVersion": 6,
|
|
71
71
|
"bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
|
|
72
72
|
"additionalDependencies": [
|
|
@@ -411,14 +411,6 @@
|
|
|
411
411
|
"*"
|
|
412
412
|
]
|
|
413
413
|
}
|
|
414
|
-
},
|
|
415
|
-
{
|
|
416
|
-
"type": "aws:cdk:analytics:method",
|
|
417
|
-
"data": {
|
|
418
|
-
"addToPrincipalPolicy": [
|
|
419
|
-
{}
|
|
420
|
-
]
|
|
421
|
-
}
|
|
422
414
|
}
|
|
423
415
|
],
|
|
424
416
|
"/lamsec-deployFunctionWithExistingVpc/Vpc/FlowLog/IAMRole/ImportIAMRole": [
|
|
@@ -454,14 +446,6 @@
|
|
|
454
446
|
]
|
|
455
447
|
}
|
|
456
448
|
},
|
|
457
|
-
{
|
|
458
|
-
"type": "aws:cdk:analytics:method",
|
|
459
|
-
"data": {
|
|
460
|
-
"addStatements": [
|
|
461
|
-
{}
|
|
462
|
-
]
|
|
463
|
-
}
|
|
464
|
-
},
|
|
465
449
|
{
|
|
466
450
|
"type": "aws:cdk:analytics:method",
|
|
467
451
|
"data": {
|
|
@@ -501,9 +485,9 @@
|
|
|
501
485
|
"data": {
|
|
502
486
|
"vpc": "*",
|
|
503
487
|
"service": {
|
|
504
|
-
"privateDnsDefault": true,
|
|
505
488
|
"name": "*",
|
|
506
|
-
"port": "*"
|
|
489
|
+
"port": "*",
|
|
490
|
+
"privateDnsDefault": true
|
|
507
491
|
},
|
|
508
492
|
"securityGroups": [
|
|
509
493
|
"*"
|
|
@@ -840,57 +824,48 @@
|
|
|
840
824
|
"properties": {
|
|
841
825
|
"module": "aws-cdk-lib",
|
|
842
826
|
"flags": {
|
|
843
|
-
"@aws-cdk/
|
|
844
|
-
"recommendedValue": true,
|
|
845
|
-
"explanation": "Allow multiple stacks with the same name"
|
|
846
|
-
},
|
|
847
|
-
"aws-cdk:enableDiffNoFail": {
|
|
827
|
+
"@aws-cdk/aws-signer:signingProfileNamePassedToCfn": {
|
|
848
828
|
"recommendedValue": true,
|
|
849
|
-
"explanation": "
|
|
829
|
+
"explanation": "Pass signingProfileName to CfnSigningProfile"
|
|
850
830
|
},
|
|
851
831
|
"@aws-cdk/core:newStyleStackSynthesis": {
|
|
852
832
|
"recommendedValue": true,
|
|
853
|
-
"explanation": "Switch to new stack synthesis method which enables CI/CD"
|
|
833
|
+
"explanation": "Switch to new stack synthesis method which enables CI/CD",
|
|
834
|
+
"unconfiguredBehavesLike": {
|
|
835
|
+
"v2": true
|
|
836
|
+
}
|
|
854
837
|
},
|
|
855
838
|
"@aws-cdk/core:stackRelativeExports": {
|
|
856
839
|
"recommendedValue": true,
|
|
857
|
-
"explanation": "Name exports based on the construct paths relative to the stack, rather than the global construct path"
|
|
858
|
-
|
|
859
|
-
|
|
860
|
-
|
|
861
|
-
"explanation": "DockerImageAsset properly supports `.dockerignore` files by default"
|
|
862
|
-
},
|
|
863
|
-
"@aws-cdk/aws-secretsmanager:parseOwnedSecretName": {
|
|
864
|
-
"recommendedValue": true,
|
|
865
|
-
"explanation": "Fix the referencing of SecretsManager names from ARNs"
|
|
866
|
-
},
|
|
867
|
-
"@aws-cdk/aws-kms:defaultKeyPolicies": {
|
|
868
|
-
"recommendedValue": true,
|
|
869
|
-
"explanation": "Tighten default KMS key policies"
|
|
870
|
-
},
|
|
871
|
-
"@aws-cdk/aws-s3:grantWriteWithoutAcl": {
|
|
872
|
-
"recommendedValue": true,
|
|
873
|
-
"explanation": "Remove `PutObjectAcl` from Bucket.grantWrite"
|
|
840
|
+
"explanation": "Name exports based on the construct paths relative to the stack, rather than the global construct path",
|
|
841
|
+
"unconfiguredBehavesLike": {
|
|
842
|
+
"v2": true
|
|
843
|
+
}
|
|
874
844
|
},
|
|
875
|
-
"@aws-cdk/aws-ecs-patterns:
|
|
845
|
+
"@aws-cdk/aws-ecs-patterns:secGroupsDisablesImplicitOpenListener": {
|
|
876
846
|
"recommendedValue": true,
|
|
877
|
-
"explanation": "
|
|
847
|
+
"explanation": "Disable implicit openListener when custom security groups are provided"
|
|
878
848
|
},
|
|
879
849
|
"@aws-cdk/aws-rds:lowercaseDbIdentifier": {
|
|
880
850
|
"recommendedValue": true,
|
|
881
|
-
"explanation": "Force lowercasing of RDS Cluster names in CDK"
|
|
851
|
+
"explanation": "Force lowercasing of RDS Cluster names in CDK",
|
|
852
|
+
"unconfiguredBehavesLike": {
|
|
853
|
+
"v2": true
|
|
854
|
+
}
|
|
882
855
|
},
|
|
883
856
|
"@aws-cdk/aws-apigateway:usagePlanKeyOrderInsensitiveId": {
|
|
884
857
|
"recommendedValue": true,
|
|
885
|
-
"explanation": "Allow adding/removing multiple UsagePlanKeys independently"
|
|
886
|
-
|
|
887
|
-
|
|
888
|
-
|
|
889
|
-
"explanation": "Enable this feature flag to have elastic file systems encrypted at rest by default."
|
|
858
|
+
"explanation": "Allow adding/removing multiple UsagePlanKeys independently",
|
|
859
|
+
"unconfiguredBehavesLike": {
|
|
860
|
+
"v2": true
|
|
861
|
+
}
|
|
890
862
|
},
|
|
891
863
|
"@aws-cdk/aws-lambda:recognizeVersionProps": {
|
|
892
864
|
"recommendedValue": true,
|
|
893
|
-
"explanation": "Enable this feature flag to opt in to the updated logical id calculation for Lambda Version created using the `fn.currentVersion`."
|
|
865
|
+
"explanation": "Enable this feature flag to opt in to the updated logical id calculation for Lambda Version created using the `fn.currentVersion`.",
|
|
866
|
+
"unconfiguredBehavesLike": {
|
|
867
|
+
"v2": true
|
|
868
|
+
}
|
|
894
869
|
},
|
|
895
870
|
"@aws-cdk/aws-lambda:recognizeLayerVersion": {
|
|
896
871
|
"userValue": true,
|
|
@@ -899,7 +874,10 @@
|
|
|
899
874
|
},
|
|
900
875
|
"@aws-cdk/aws-cloudfront:defaultSecurityPolicyTLSv1.2_2021": {
|
|
901
876
|
"recommendedValue": true,
|
|
902
|
-
"explanation": "Enable this feature flag to have cloudfront distributions use the security policy TLSv1.2_2021 by default."
|
|
877
|
+
"explanation": "Enable this feature flag to have cloudfront distributions use the security policy TLSv1.2_2021 by default.",
|
|
878
|
+
"unconfiguredBehavesLike": {
|
|
879
|
+
"v2": true
|
|
880
|
+
}
|
|
903
881
|
},
|
|
904
882
|
"@aws-cdk/core:checkSecretUsage": {
|
|
905
883
|
"userValue": true,
|
|
@@ -976,7 +954,7 @@
|
|
|
976
954
|
"@aws-cdk/aws-iam:importedRoleStackSafeDefaultPolicyName": {
|
|
977
955
|
"userValue": true,
|
|
978
956
|
"recommendedValue": true,
|
|
979
|
-
"explanation": "Enable this feature to
|
|
957
|
+
"explanation": "Enable this feature to create default policy names for imported roles that depend on the stack the role is in."
|
|
980
958
|
},
|
|
981
959
|
"@aws-cdk/aws-s3:serverAccessLogsUseBucketPolicy": {
|
|
982
960
|
"userValue": true,
|
|
@@ -1120,7 +1098,10 @@
|
|
|
1120
1098
|
},
|
|
1121
1099
|
"@aws-cdk/pipelines:reduceAssetRoleTrustScope": {
|
|
1122
1100
|
"recommendedValue": true,
|
|
1123
|
-
"explanation": "Remove the root account principal from PipelineAssetsFileRole trust policy"
|
|
1101
|
+
"explanation": "Remove the root account principal from PipelineAssetsFileRole trust policy",
|
|
1102
|
+
"unconfiguredBehavesLike": {
|
|
1103
|
+
"v2": true
|
|
1104
|
+
}
|
|
1124
1105
|
},
|
|
1125
1106
|
"@aws-cdk/aws-eks:nodegroupNameAttribute": {
|
|
1126
1107
|
"userValue": true,
|
|
@@ -1149,7 +1130,10 @@
|
|
|
1149
1130
|
},
|
|
1150
1131
|
"@aws-cdk/aws-stepfunctions-tasks:useNewS3UriParametersForBedrockInvokeModelTask": {
|
|
1151
1132
|
"recommendedValue": true,
|
|
1152
|
-
"explanation": "When enabled, use new props for S3 URI field in task definition of state machine for bedrock invoke model."
|
|
1133
|
+
"explanation": "When enabled, use new props for S3 URI field in task definition of state machine for bedrock invoke model.",
|
|
1134
|
+
"unconfiguredBehavesLike": {
|
|
1135
|
+
"v2": true
|
|
1136
|
+
}
|
|
1153
1137
|
},
|
|
1154
1138
|
"@aws-cdk/core:explicitStackTags": {
|
|
1155
1139
|
"userValue": true,
|
|
@@ -1213,7 +1197,10 @@
|
|
|
1213
1197
|
},
|
|
1214
1198
|
"@aws-cdk/core:aspectStabilization": {
|
|
1215
1199
|
"recommendedValue": true,
|
|
1216
|
-
"explanation": "When enabled, a stabilization loop will be run when invoking Aspects during synthesis."
|
|
1200
|
+
"explanation": "When enabled, a stabilization loop will be run when invoking Aspects during synthesis.",
|
|
1201
|
+
"unconfiguredBehavesLike": {
|
|
1202
|
+
"v2": true
|
|
1203
|
+
}
|
|
1217
1204
|
},
|
|
1218
1205
|
"@aws-cdk/aws-route53-targets:userPoolDomainNameMethodWithoutCustomResource": {
|
|
1219
1206
|
"userValue": true,
|
|
@@ -1247,7 +1234,10 @@
|
|
|
1247
1234
|
},
|
|
1248
1235
|
"@aws-cdk/pipelines:reduceStageRoleTrustScope": {
|
|
1249
1236
|
"recommendedValue": true,
|
|
1250
|
-
"explanation": "Remove the root account principal from Stage addActions trust policy"
|
|
1237
|
+
"explanation": "Remove the root account principal from Stage addActions trust policy",
|
|
1238
|
+
"unconfiguredBehavesLike": {
|
|
1239
|
+
"v2": true
|
|
1240
|
+
}
|
|
1251
1241
|
},
|
|
1252
1242
|
"@aws-cdk/aws-events:requireEventBusPolicySid": {
|
|
1253
1243
|
"userValue": true,
|
|
@@ -1270,7 +1260,10 @@
|
|
|
1270
1260
|
},
|
|
1271
1261
|
"@aws-cdk/pipelines:reduceCrossAccountActionRoleTrustScope": {
|
|
1272
1262
|
"recommendedValue": true,
|
|
1273
|
-
"explanation": "When enabled, scopes down the trust policy for the cross-account action role"
|
|
1263
|
+
"explanation": "When enabled, scopes down the trust policy for the cross-account action role",
|
|
1264
|
+
"unconfiguredBehavesLike": {
|
|
1265
|
+
"v2": true
|
|
1266
|
+
}
|
|
1274
1267
|
},
|
|
1275
1268
|
"@aws-cdk/aws-stepfunctions:useDistributedMapResultWriterV2": {
|
|
1276
1269
|
"userValue": true,
|
|
@@ -1300,6 +1293,21 @@
|
|
|
1300
1293
|
"userValue": true,
|
|
1301
1294
|
"recommendedValue": true,
|
|
1302
1295
|
"explanation": "When enabled, CDK creates and manages loggroup for the lambda function"
|
|
1296
|
+
},
|
|
1297
|
+
"@aws-cdk/aws-elasticloadbalancingv2:networkLoadBalancerWithSecurityGroupByDefault": {
|
|
1298
|
+
"recommendedValue": true,
|
|
1299
|
+
"explanation": "When enabled, Network Load Balancer will be created with a security group by default."
|
|
1300
|
+
},
|
|
1301
|
+
"@aws-cdk/aws-stepfunctions-tasks:httpInvokeDynamicJsonPathEndpoint": {
|
|
1302
|
+
"recommendedValue": true,
|
|
1303
|
+
"explanation": "When enabled, allows using a dynamic apiEndpoint with JSONPath format in HttpInvoke tasks.",
|
|
1304
|
+
"unconfiguredBehavesLike": {
|
|
1305
|
+
"v2": true
|
|
1306
|
+
}
|
|
1307
|
+
},
|
|
1308
|
+
"@aws-cdk/aws-ecs-patterns:uniqueTargetGroupId": {
|
|
1309
|
+
"recommendedValue": true,
|
|
1310
|
+
"explanation": "When enabled, ECS patterns will generate unique target group IDs to prevent conflicts during load balancer replacement"
|
|
1303
1311
|
}
|
|
1304
1312
|
}
|
|
1305
1313
|
}
|