@aws-solutions-constructs/aws-lambda-secretsmanager 2.95.1 → 2.96.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (28) hide show
  1. package/.jsii +3 -3
  2. package/README.adoc +6 -2
  3. package/lib/index.js +1 -1
  4. package/package.json +3 -3
  5. package/test/integ.lamsec-deployFunction.js.snapshot/asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c/index.js +21 -0
  6. package/test/integ.lamsec-deployFunction.js.snapshot/cdk.out +1 -1
  7. package/test/integ.lamsec-deployFunction.js.snapshot/integ.json +3 -2
  8. package/test/integ.lamsec-deployFunction.js.snapshot/lamsec-deployFunction.assets.json +7 -5
  9. package/test/integ.lamsec-deployFunction.js.snapshot/lamsec-deployFunction.template.json +1 -1
  10. package/test/integ.lamsec-deployFunction.js.snapshot/lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA.assets.json +3 -2
  11. package/test/integ.lamsec-deployFunction.js.snapshot/manifest.json +496 -3
  12. package/test/integ.lamsec-deployFunction.js.snapshot/tree.json +1 -1
  13. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsec-deployFunctionWithExistingVpc.assets.json +3 -3
  14. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsec-deployFunctionWithExistingVpc.template.json +1 -1
  15. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/manifest.json +1 -1
  16. package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/tree.json +1 -1
  17. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.assets.json +3 -3
  18. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.template.json +1 -1
  19. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/manifest.json +1 -1
  20. package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/tree.json +1 -1
  21. package/test/integ.lamsec-existingFunction.js.snapshot/asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c/index.js +21 -0
  22. package/test/integ.lamsec-existingFunction.js.snapshot/cdk.out +1 -1
  23. package/test/integ.lamsec-existingFunction.js.snapshot/integ.json +3 -2
  24. package/test/integ.lamsec-existingFunction.js.snapshot/lamsec-existingFunction.assets.json +7 -5
  25. package/test/integ.lamsec-existingFunction.js.snapshot/lamsec-existingFunction.template.json +1 -1
  26. package/test/integ.lamsec-existingFunction.js.snapshot/lamsecexistingFunctionIntegDefaultTestDeployAssert295B352B.assets.json +3 -2
  27. package/test/integ.lamsec-existingFunction.js.snapshot/manifest.json +496 -3
  28. package/test/integ.lamsec-existingFunction.js.snapshot/tree.json +1 -1
package/.jsii CHANGED
@@ -8,7 +8,7 @@
8
8
  "url": "https://aws.amazon.com"
9
9
  },
10
10
  "dependencies": {
11
- "@aws-solutions-constructs/core": "2.95.1",
11
+ "@aws-solutions-constructs/core": "2.96.0",
12
12
  "aws-cdk-lib": "^2.223.0",
13
13
  "constructs": "^10.0.0"
14
14
  },
@@ -4446,6 +4446,6 @@
4446
4446
  "symbolId": "lib/index:LambdaToSecretsmanagerProps"
4447
4447
  }
4448
4448
  },
4449
- "version": "2.95.1",
4450
- "fingerprint": "irejLKBqdZODSYHTWIEpKiiuy19sc4ORAp3G/yWN20w="
4449
+ "version": "2.96.0",
4450
+ "fingerprint": "BwH97aK10bmMOD+mEnqZ+d+aXduNbgNPx1nlgmO36vo="
4451
4451
  }
package/README.adoc CHANGED
@@ -50,7 +50,7 @@ import * as lambda from 'aws-cdk-lib/aws-lambda';
50
50
 
51
51
  const constructProps: LambdaToSecretsmanagerProps = {
52
52
  lambdaFunctionProps: {
53
- runtime: lambda.Runtime.NODEJS_20_X,
53
+ runtime: lambda.Runtime.NODEJS_22_X,
54
54
  code: lambda.Code.fromAsset(`lambda`),
55
55
  handler: 'index.handler'
56
56
  },
@@ -95,7 +95,7 @@ import software.amazon.awsconstructs.services.lambdasecretsmanager.*;
95
95
 
96
96
  new LambdaToSecretsmanager(this, "test-lambda-secretsmanager-stack", new LambdaToSecretsmanagerProps.Builder()
97
97
  .lambdaFunctionProps(new FunctionProps.Builder()
98
- .runtime(Runtime.NODEJS_20_X)
98
+ .runtime(Runtime.NODEJS_22_X)
99
99
  .code(Code.fromAsset("lambda"))
100
100
  .handler("index.handler")
101
101
  .build())
@@ -210,6 +210,10 @@ and higher functions)
210
210
 
211
211
  image::aws-lambda-secretsmanager.png["Diagram showing the Lambda function, Secrets Manager secret, CloudWatch log group and IAM role created by the construct",scaledwidth=100%]
212
212
 
213
+ == Example Lambda Function Implementation
214
+
215
+ While Solutions Constructs does not publish code for the Lambda function to get a Secret from Secrets Manager, there is example code available here: https://github.com/awsdocs/aws-doc-sdk-examples/blob/main/javascriptv3/example_code/secrets-manager/actions/get-secret-value.js['example']. (this example is in JavaScript, but examples in other languages can also be found at this site)
216
+
213
217
  // github block
214
218
 
215
219
  '''''
package/lib/index.js CHANGED
@@ -71,5 +71,5 @@ class LambdaToSecretsmanager extends constructs_1.Construct {
71
71
  }
72
72
  exports.LambdaToSecretsmanager = LambdaToSecretsmanager;
73
73
  _a = JSII_RTTI_SYMBOL_1;
74
- LambdaToSecretsmanager[_a] = { fqn: "@aws-solutions-constructs/aws-lambda-secretsmanager.LambdaToSecretsmanager", version: "2.95.1" };
74
+ LambdaToSecretsmanager[_a] = { fqn: "@aws-solutions-constructs/aws-lambda-secretsmanager.LambdaToSecretsmanager", version: "2.96.0" };
75
75
  //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["index.ts"],"names":[],"mappings":";;;;;AAAA;;;;;;;;;;;GAWG;AAEH,UAAU;AACV,2DAA2D;AAI3D,2CAAuC;AA2DvC;;GAEG;AACH,MAAa,sBAAuB,SAAQ,sBAAS;IAKjD;;;;;;OAMG;IACH,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAkC;QAC1E,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,QAAQ,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC;QAC9B,QAAQ,CAAC,gBAAgB,CAAC,KAAK,CAAC,CAAC;QACjC,QAAQ,CAAC,wBAAwB,CAAC,KAAK,CAAC,CAAC;QAEzC,IAAI,KAAK,CAAC,SAAS,IAAI,KAAK,CAAC,WAAW,EAAE,CAAC;YAEzC,IAAI,CAAC,GAAG,GAAG,QAAQ,CAAC,QAAQ,CAAC,KAAK,EAAE;gBAClC,eAAe,EAAE,QAAQ,CAAC,uBAAuB,EAAE;gBACnD,WAAW,EAAE,KAAK,CAAC,WAAW;gBAC9B,YAAY,EAAE,KAAK,CAAC,QAAQ;gBAC5B,iBAAiB,EAAE;oBACjB,kBAAkB,EAAE,IAAI;oBACxB,gBAAgB,EAAE,IAAI;iBACvB;aACF,CAAC,CAAC;YAEH,QAAQ,CAAC,qBAAqB,CAAC,KAAK,EAAE,IAAI,CAAC,GAAG,EAAE,QAAQ,CAAC,oBAAoB,CAAC,eAAe,CAAC,CAAC;QACjG,CAAC;QAED,4BAA4B;QAC5B,IAAI,CAAC,cAAc,GAAG,QAAQ,CAAC,mBAAmB,CAAC,IAAI,EAAE;YACvD,iBAAiB,EAAE,KAAK,CAAC,iBAAiB;YAC1C,mBAAmB,EAAE,KAAK,CAAC,mBAAmB;YAC9C,GAAG,EAAE,IAAI,CAAC,GAAG;SACd,CAAC,CAAC;QAEH,mBAAmB;QACnB,IAAI,KAAK,CAAC,iBAAiB,EAAE,CAAC;YAC5B,IAAI,CAAC,MAAM,GAAG,KAAK,CAAC,iBAAiB,CAAC;QACxC,CAAC;aAAM,CAAC;YACN,IAAI,CAAC,MAAM,GAAG,QAAQ,CAAC,yBAAyB,CAAC,IAAI,EAAE,QAAQ,EAAE,KAAK,CAAC,WAAW,CAAC,CAAC;QACtF,CAAC;QAED,kCAAkC;QAClC,MAAM,6BAA6B,GAAG,KAAK,CAAC,6BAA6B,IAAI,YAAY,CAAC;QAC1F,IAAI,CAAC,cAAc,CAAC,cAAc,CAAC,6BAA6B,EAAE,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;QAEzF,6DAA6D;QAC7D,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC;QAE3C,IAAI,KAAK,CAAC,gBAAgB,KAAK,WAAW,EAAE,CAAC;YAC3C,IAAI,CAAC,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC;QAC9C,CAAC;IACH,CAAC;;AAzDL,wDA0DC","sourcesContent":["/**\n *  Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n *\n *  Licensed under the Apache License, Version 2.0 (the \"License\"). You may not use this file except in compliance\n *  with the License. A copy of the License is located at\n *\n *      http://www.apache.org/licenses/LICENSE-2.0\n *\n *  or in the 'license' file accompanying this file. This file is distributed on an 'AS IS' BASIS, WITHOUT WARRANTIES\n *  OR CONDITIONS OF ANY KIND, express or implied. See the License for the specific language governing permissions\n *  and limitations under the License.\n */\n\n// Imports\nimport * as defaults from \"@aws-solutions-constructs/core\";\nimport * as lambda from \"aws-cdk-lib/aws-lambda\";\nimport * as secretsmanager from \"aws-cdk-lib/aws-secretsmanager\";\nimport * as ec2 from \"aws-cdk-lib/aws-ec2\";\nimport { Construct } from \"constructs\";\n\n/**\n * @summary The properties for the LambdaToSecretsmanager class.\n */\nexport interface LambdaToSecretsmanagerProps {\n  /**\n   * Existing instance of Lambda Function object, providing both this and `lambdaFunctionProps` will cause an error.\n   *\n   * @default - None\n   */\n  readonly existingLambdaObj?: lambda.Function;\n  /**\n   * User provided props to override the default props for the Lambda function.\n   *\n   * @default - Default properties are used.\n   */\n  readonly lambdaFunctionProps?: lambda.FunctionProps;\n  /**\n   * Existing instance of Secret object, providing both this and secretProps will cause an error.\n   *\n   * @default - Default props are used\n   */\n  readonly existingSecretObj?: secretsmanager.Secret;\n  /**\n   * Optional user-provided props to override the default props for the Secret.\n   *\n   * @default - Default props are used\n   */\n  readonly secretProps?: secretsmanager.SecretProps;\n  /**\n   * An existing VPC for the construct to use (construct will NOT create a new VPC in this case)\n   */\n  readonly existingVpc?: ec2.IVpc;\n  /**\n   * Properties to override default properties if deployVpc is true\n   */\n  readonly vpcProps?: ec2.VpcProps;\n  /**\n   * Whether to deploy a new VPC\n   *\n   * @default - false\n   */\n  readonly deployVpc?: boolean;\n  /**\n   * Optional Name for the Lambda function environment variable set to the ARN of the secret.\n   *\n   * @default - SECRET_ARN\n   */\n  readonly secretEnvironmentVariableName?: string;\n  /**\n   * Optional secret permissions to grant to the Lambda function.\n   * One of the following may be specified: \"Read\" or \"ReadWrite\".\n   *\n   * @default - Read only access is given to the Lambda function if no value is specified.\n   */\n  readonly grantWriteAccess?: string;\n}\n\n/**\n * @summary The LambdaToSecretsmanager class.\n */\nexport class LambdaToSecretsmanager extends Construct {\n    public readonly lambdaFunction: lambda.Function;\n    public readonly secret: secretsmanager.Secret;\n    public readonly vpc?: ec2.IVpc;\n\n    /**\n     * @summary Constructs a new instance of the LambdaToSecretsmanager class.\n     * @param {cdk.App} scope - represents the scope for all the resources.\n     * @param {string} id - this is a a scope-unique id.\n     * @param {LambdaToSecretsmanagerProps} props - user provided props for the construct.\n     * @access public\n     */\n    constructor(scope: Construct, id: string, props: LambdaToSecretsmanagerProps) {\n      super(scope, id);\n      defaults.CheckVpcProps(props);\n      defaults.CheckLambdaProps(props);\n      defaults.CheckSecretsManagerProps(props);\n\n      if (props.deployVpc || props.existingVpc) {\n\n        this.vpc = defaults.buildVpc(scope, {\n          defaultVpcProps: defaults.DefaultIsolatedVpcProps(),\n          existingVpc: props.existingVpc,\n          userVpcProps: props.vpcProps,\n          constructVpcProps: {\n            enableDnsHostnames: true,\n            enableDnsSupport: true,\n          },\n        });\n\n        defaults.AddAwsServiceEndpoint(scope, this.vpc, defaults.ServiceEndpointTypes.SECRETS_MANAGER);\n      }\n\n      // Setup the Lambda function\n      this.lambdaFunction = defaults.buildLambdaFunction(this, {\n        existingLambdaObj: props.existingLambdaObj,\n        lambdaFunctionProps: props.lambdaFunctionProps,\n        vpc: this.vpc,\n      });\n\n      // Setup the Secret\n      if (props.existingSecretObj) {\n        this.secret = props.existingSecretObj;\n      } else {\n        this.secret = defaults.buildSecretsManagerSecret(this, 'secret', props.secretProps);\n      }\n\n      // Configure environment variables\n      const secretEnvironmentVariableName = props.secretEnvironmentVariableName || 'SECRET_ARN';\n      this.lambdaFunction.addEnvironment(secretEnvironmentVariableName, this.secret.secretArn);\n\n      // Enable read permissions for the Lambda function by default\n      this.secret.grantRead(this.lambdaFunction);\n\n      if (props.grantWriteAccess === 'ReadWrite') {\n        this.secret.grantWrite(this.lambdaFunction);\n      }\n    }\n}\n"]}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@aws-solutions-constructs/aws-lambda-secretsmanager",
3
- "version": "2.95.1",
3
+ "version": "2.96.0",
4
4
  "description": "CDK constructs for defining an interaction between an AWS Lambda function and AWS Secrets Manager.",
5
5
  "main": "lib/index.js",
6
6
  "types": "lib/index.d.ts",
@@ -55,7 +55,7 @@
55
55
  }
56
56
  },
57
57
  "dependencies": {
58
- "@aws-solutions-constructs/core": "2.95.1",
58
+ "@aws-solutions-constructs/core": "2.96.0",
59
59
  "constructs": "^10.0.0"
60
60
  },
61
61
  "devDependencies": {
@@ -70,7 +70,7 @@
70
70
  ]
71
71
  },
72
72
  "peerDependencies": {
73
- "@aws-solutions-constructs/core": "2.95.1",
73
+ "@aws-solutions-constructs/core": "2.96.0",
74
74
  "constructs": "^10.0.0",
75
75
  "aws-cdk-lib": "^2.223.0"
76
76
  },
@@ -0,0 +1,21 @@
1
+ /**
2
+ * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
3
+ *
4
+ * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance
5
+ * with the License. A copy of the License is located at
6
+ *
7
+ * http://www.apache.org/licenses/LICENSE-2.0
8
+ *
9
+ * or in the 'license' file accompanying this file. This file is distributed on an 'AS IS' BASIS, WITHOUT WARRANTIES
10
+ * OR CONDITIONS OF ANY KIND, express or implied. See the License for the specific language governing permissions
11
+ * and limitations under the License.
12
+ */
13
+
14
+ exports.handler = async function(event) {
15
+ console.log('request:', JSON.stringify(event, undefined, 2));
16
+ return {
17
+ statusCode: 200,
18
+ headers: { 'Content-Type': 'text/plain' },
19
+ body: `Hello, CDK! You've hit ${event.path}\n`
20
+ };
21
+ };
@@ -1 +1 @@
1
- {"version":"40.0.0"}
1
+ {"version":"48.0.0"}
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "40.0.0",
2
+ "version": "48.0.0",
3
3
  "testCases": {
4
4
  "lamsec-deployFunction/Integ/DefaultTest": {
5
5
  "stacks": [
@@ -8,5 +8,6 @@
8
8
  "assertionStack": "lamsec-deployFunction/Integ/DefaultTest/DeployAssert",
9
9
  "assertionStackName": "lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA"
10
10
  }
11
- }
11
+ },
12
+ "minimumCliVersion": "2.1029.2"
12
13
  }
@@ -1,28 +1,30 @@
1
1
  {
2
- "version": "40.0.0",
2
+ "version": "48.0.0",
3
3
  "files": {
4
4
  "a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c": {
5
+ "displayName": "test-lambda-secretsmanager/LambdaFunction/Code",
5
6
  "source": {
6
7
  "path": "asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c",
7
8
  "packaging": "zip"
8
9
  },
9
10
  "destinations": {
10
- "current_account-current_region": {
11
+ "current_account-current_region-d11fcfce": {
11
12
  "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
12
13
  "objectKey": "a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c.zip",
13
14
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
14
15
  }
15
16
  }
16
17
  },
17
- "36207811f4486da8c2fe4cde8106c4455200827b33057a10e329e26cd2a2b1a9": {
18
+ "137d115a6d6797063693651083d23d0f89e72aafc2b7ea58e84c8d7a8055e6eb": {
19
+ "displayName": "lamsec-deployFunction Template",
18
20
  "source": {
19
21
  "path": "lamsec-deployFunction.template.json",
20
22
  "packaging": "file"
21
23
  },
22
24
  "destinations": {
23
- "current_account-current_region": {
25
+ "current_account-current_region-32d863b5": {
24
26
  "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
25
- "objectKey": "36207811f4486da8c2fe4cde8106c4455200827b33057a10e329e26cd2a2b1a9.json",
27
+ "objectKey": "137d115a6d6797063693651083d23d0f89e72aafc2b7ea58e84c8d7a8055e6eb.json",
26
28
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
27
29
  }
28
30
  }
@@ -113,7 +113,7 @@
113
113
  "Arn"
114
114
  ]
115
115
  },
116
- "Runtime": "nodejs20.x",
116
+ "Runtime": "nodejs22.x",
117
117
  "TracingConfig": {
118
118
  "Mode": "Active"
119
119
  }
@@ -1,13 +1,14 @@
1
1
  {
2
- "version": "40.0.0",
2
+ "version": "48.0.0",
3
3
  "files": {
4
4
  "21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22": {
5
+ "displayName": "lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA Template",
5
6
  "source": {
6
7
  "path": "lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA.template.json",
7
8
  "packaging": "file"
8
9
  },
9
10
  "destinations": {
10
- "current_account-current_region": {
11
+ "current_account-current_region-d8d86b35": {
11
12
  "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
12
13
  "objectKey": "21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22.json",
13
14
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"