@aws-solutions-constructs/aws-lambda-secretsmanager 2.95.1 → 2.97.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +4391 -57
- package/README.adoc +8 -5
- package/lib/index.d.ts +1 -1
- package/lib/index.js +2 -2
- package/package.json +6 -6
- package/test/integ.lamsec-deployFunction.js.snapshot/asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c/index.js +21 -0
- package/test/integ.lamsec-deployFunction.js.snapshot/cdk.out +1 -1
- package/test/integ.lamsec-deployFunction.js.snapshot/integ.json +3 -2
- package/test/integ.lamsec-deployFunction.js.snapshot/lamsec-deployFunction.assets.json +7 -5
- package/test/integ.lamsec-deployFunction.js.snapshot/lamsec-deployFunction.template.json +1 -1
- package/test/integ.lamsec-deployFunction.js.snapshot/lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA.assets.json +3 -2
- package/test/integ.lamsec-deployFunction.js.snapshot/manifest.json +496 -3
- package/test/integ.lamsec-deployFunction.js.snapshot/tree.json +1 -1
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsec-deployFunctionWithExistingVpc.assets.json +3 -3
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsec-deployFunctionWithExistingVpc.template.json +1 -1
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/manifest.json +1 -1
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/tree.json +1 -1
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.assets.json +3 -3
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.template.json +1 -1
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/manifest.json +1 -1
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/tree.json +1 -1
- package/test/integ.lamsec-existingFunction.js.snapshot/asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c/index.js +21 -0
- package/test/integ.lamsec-existingFunction.js.snapshot/cdk.out +1 -1
- package/test/integ.lamsec-existingFunction.js.snapshot/integ.json +3 -2
- package/test/integ.lamsec-existingFunction.js.snapshot/lamsec-existingFunction.assets.json +7 -5
- package/test/integ.lamsec-existingFunction.js.snapshot/lamsec-existingFunction.template.json +1 -1
- package/test/integ.lamsec-existingFunction.js.snapshot/lamsecexistingFunctionIntegDefaultTestDeployAssert295B352B.assets.json +3 -2
- package/test/integ.lamsec-existingFunction.js.snapshot/manifest.json +496 -3
- package/test/integ.lamsec-existingFunction.js.snapshot/tree.json +1 -1
package/README.adoc
CHANGED
|
@@ -50,7 +50,7 @@ import * as lambda from 'aws-cdk-lib/aws-lambda';
|
|
|
50
50
|
|
|
51
51
|
const constructProps: LambdaToSecretsmanagerProps = {
|
|
52
52
|
lambdaFunctionProps: {
|
|
53
|
-
runtime: lambda.Runtime.
|
|
53
|
+
runtime: lambda.Runtime.NODEJS_22_X,
|
|
54
54
|
code: lambda.Code.fromAsset(`lambda`),
|
|
55
55
|
handler: 'index.handler'
|
|
56
56
|
},
|
|
@@ -95,7 +95,7 @@ import software.amazon.awsconstructs.services.lambdasecretsmanager.*;
|
|
|
95
95
|
|
|
96
96
|
new LambdaToSecretsmanager(this, "test-lambda-secretsmanager-stack", new LambdaToSecretsmanagerProps.Builder()
|
|
97
97
|
.lambdaFunctionProps(new FunctionProps.Builder()
|
|
98
|
-
.runtime(Runtime.
|
|
98
|
+
.runtime(Runtime.NODEJS_22_X)
|
|
99
99
|
.code(Code.fromAsset("lambda"))
|
|
100
100
|
.handler("index.handler")
|
|
101
101
|
.build())
|
|
@@ -110,13 +110,12 @@ new LambdaToSecretsmanager(this, "test-lambda-secretsmanager-stack", new LambdaT
|
|
|
110
110
|
|*Name* |*Type* |*Description*
|
|
111
111
|
|existingLambdaObj?
|
|
112
112
|
|https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_lambda.Function.html[`lambda.Function`]
|
|
113
|
-
|
|
|
113
|
+
|Optional - instance of an existing Lambda Function object, providing both this and
|
|
114
114
|
`lambdaFunctionProps` will cause an error.
|
|
115
115
|
|
|
116
116
|
|lambdaFunctionProps?
|
|
117
117
|
|https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_lambda.FunctionProps.html[`lambda.FunctionProps`]
|
|
118
|
-
|
|
|
119
|
-
function.
|
|
118
|
+
|Optional - user provided props to override the default props for the Lambda function. Providing both this and `existingLambdaObj` is an error.
|
|
120
119
|
|
|
121
120
|
|secretProps?
|
|
122
121
|
|https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_secretsmanager.SecretProps.html[`secretsmanager.SecretProps`]
|
|
@@ -210,6 +209,10 @@ and higher functions)
|
|
|
210
209
|
|
|
211
210
|
image::aws-lambda-secretsmanager.png["Diagram showing the Lambda function, Secrets Manager secret, CloudWatch log group and IAM role created by the construct",scaledwidth=100%]
|
|
212
211
|
|
|
212
|
+
== Example Lambda Function Implementation
|
|
213
|
+
|
|
214
|
+
While Solutions Constructs does not publish code for the Lambda function to get a Secret from Secrets Manager, there is example code available here: https://github.com/awsdocs/aws-doc-sdk-examples/blob/main/javascriptv3/example_code/secrets-manager/actions/get-secret-value.js['example']. (this example is in JavaScript, but examples in other languages can also be found at this site)
|
|
215
|
+
|
|
213
216
|
// github block
|
|
214
217
|
|
|
215
218
|
'''''
|
package/lib/index.d.ts
CHANGED
|
@@ -25,7 +25,7 @@ export interface LambdaToSecretsmanagerProps {
|
|
|
25
25
|
*/
|
|
26
26
|
readonly existingLambdaObj?: lambda.Function;
|
|
27
27
|
/**
|
|
28
|
-
*
|
|
28
|
+
* Optional - user provided props to override the default props for the Lambda function. Providing both this and `existingLambdaObj` is an error.
|
|
29
29
|
*
|
|
30
30
|
* @default - Default properties are used.
|
|
31
31
|
*/
|
package/lib/index.js
CHANGED
|
@@ -71,5 +71,5 @@ class LambdaToSecretsmanager extends constructs_1.Construct {
|
|
|
71
71
|
}
|
|
72
72
|
exports.LambdaToSecretsmanager = LambdaToSecretsmanager;
|
|
73
73
|
_a = JSII_RTTI_SYMBOL_1;
|
|
74
|
-
LambdaToSecretsmanager[_a] = { fqn: "@aws-solutions-constructs/aws-lambda-secretsmanager.LambdaToSecretsmanager", version: "2.
|
|
75
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
74
|
+
LambdaToSecretsmanager[_a] = { fqn: "@aws-solutions-constructs/aws-lambda-secretsmanager.LambdaToSecretsmanager", version: "2.97.0" };
|
|
75
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["index.ts"],"names":[],"mappings":";;;;;AAAA;;;;;;;;;;;GAWG;AAEH,UAAU;AACV,2DAA2D;AAI3D,2CAAuC;AA2DvC;;GAEG;AACH,MAAa,sBAAuB,SAAQ,sBAAS;IAKjD;;;;;;OAMG;IACH,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAkC;QAC1E,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,QAAQ,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC;QAC9B,QAAQ,CAAC,gBAAgB,CAAC,KAAK,CAAC,CAAC;QACjC,QAAQ,CAAC,wBAAwB,CAAC,KAAK,CAAC,CAAC;QAEzC,IAAI,KAAK,CAAC,SAAS,IAAI,KAAK,CAAC,WAAW,EAAE,CAAC;YAEzC,IAAI,CAAC,GAAG,GAAG,QAAQ,CAAC,QAAQ,CAAC,KAAK,EAAE;gBAClC,eAAe,EAAE,QAAQ,CAAC,uBAAuB,EAAE;gBACnD,WAAW,EAAE,KAAK,CAAC,WAAW;gBAC9B,YAAY,EAAE,KAAK,CAAC,QAAQ;gBAC5B,iBAAiB,EAAE;oBACjB,kBAAkB,EAAE,IAAI;oBACxB,gBAAgB,EAAE,IAAI;iBACvB;aACF,CAAC,CAAC;YAEH,QAAQ,CAAC,qBAAqB,CAAC,KAAK,EAAE,IAAI,CAAC,GAAG,EAAE,QAAQ,CAAC,oBAAoB,CAAC,eAAe,CAAC,CAAC;QACjG,CAAC;QAED,4BAA4B;QAC5B,IAAI,CAAC,cAAc,GAAG,QAAQ,CAAC,mBAAmB,CAAC,IAAI,EAAE;YACvD,iBAAiB,EAAE,KAAK,CAAC,iBAAiB;YAC1C,mBAAmB,EAAE,KAAK,CAAC,mBAAmB;YAC9C,GAAG,EAAE,IAAI,CAAC,GAAG;SACd,CAAC,CAAC;QAEH,mBAAmB;QACnB,IAAI,KAAK,CAAC,iBAAiB,EAAE,CAAC;YAC5B,IAAI,CAAC,MAAM,GAAG,KAAK,CAAC,iBAAiB,CAAC;QACxC,CAAC;aAAM,CAAC;YACN,IAAI,CAAC,MAAM,GAAG,QAAQ,CAAC,yBAAyB,CAAC,IAAI,EAAE,QAAQ,EAAE,KAAK,CAAC,WAAW,CAAC,CAAC;QACtF,CAAC;QAED,kCAAkC;QAClC,MAAM,6BAA6B,GAAG,KAAK,CAAC,6BAA6B,IAAI,YAAY,CAAC;QAC1F,IAAI,CAAC,cAAc,CAAC,cAAc,CAAC,6BAA6B,EAAE,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;QAEzF,6DAA6D;QAC7D,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC;QAE3C,IAAI,KAAK,CAAC,gBAAgB,KAAK,WAAW,EAAE,CAAC;YAC3C,IAAI,CAAC,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC;QAC9C,CAAC;IACH,CAAC;;AAzDL,wDA0DC","sourcesContent":["/**\n *  Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n *\n *  Licensed under the Apache License, Version 2.0 (the \"License\"). You may not use this file except in compliance\n *  with the License. A copy of the License is located at\n *\n *      http://www.apache.org/licenses/LICENSE-2.0\n *\n *  or in the 'license' file accompanying this file. This file is distributed on an 'AS IS' BASIS, WITHOUT WARRANTIES\n *  OR CONDITIONS OF ANY KIND, express or implied. See the License for the specific language governing permissions\n *  and limitations under the License.\n */\n\n// Imports\nimport * as defaults from \"@aws-solutions-constructs/core\";\nimport * as lambda from \"aws-cdk-lib/aws-lambda\";\nimport * as secretsmanager from \"aws-cdk-lib/aws-secretsmanager\";\nimport * as ec2 from \"aws-cdk-lib/aws-ec2\";\nimport { Construct } from \"constructs\";\n\n/**\n * @summary The properties for the LambdaToSecretsmanager class.\n */\nexport interface LambdaToSecretsmanagerProps {\n  /**\n   * Existing instance of Lambda Function object, providing both this and `lambdaFunctionProps` will cause an error.\n   *\n   * @default - None\n   */\n  readonly existingLambdaObj?: lambda.Function;\n  /**\n   * Optional - user provided props to override the default props for the Lambda function. Providing both this and `existingLambdaObj` is an error.\n   *\n   * @default - Default properties are used.\n   */\n  readonly lambdaFunctionProps?: lambda.FunctionProps;\n  /**\n   * Existing instance of Secret object, providing both this and secretProps will cause an error.\n   *\n   * @default - Default props are used\n   */\n  readonly existingSecretObj?: secretsmanager.Secret;\n  /**\n   * Optional user-provided props to override the default props for the Secret.\n   *\n   * @default - Default props are used\n   */\n  readonly secretProps?: secretsmanager.SecretProps;\n  /**\n   * An existing VPC for the construct to use (construct will NOT create a new VPC in this case)\n   */\n  readonly existingVpc?: ec2.IVpc;\n  /**\n   * Properties to override default properties if deployVpc is true\n   */\n  readonly vpcProps?: ec2.VpcProps;\n  /**\n   * Whether to deploy a new VPC\n   *\n   * @default - false\n   */\n  readonly deployVpc?: boolean;\n  /**\n   * Optional Name for the Lambda function environment variable set to the ARN of the secret.\n   *\n   * @default - SECRET_ARN\n   */\n  readonly secretEnvironmentVariableName?: string;\n  /**\n   * Optional secret permissions to grant to the Lambda function.\n   * One of the following may be specified: \"Read\" or \"ReadWrite\".\n   *\n   * @default - Read only access is given to the Lambda function if no value is specified.\n   */\n  readonly grantWriteAccess?: string;\n}\n\n/**\n * @summary The LambdaToSecretsmanager class.\n */\nexport class LambdaToSecretsmanager extends Construct {\n    public readonly lambdaFunction: lambda.Function;\n    public readonly secret: secretsmanager.Secret;\n    public readonly vpc?: ec2.IVpc;\n\n    /**\n     * @summary Constructs a new instance of the LambdaToSecretsmanager class.\n     * @param {cdk.App} scope - represents the scope for all the resources.\n     * @param {string} id - this is a a scope-unique id.\n     * @param {LambdaToSecretsmanagerProps} props - user provided props for the construct.\n     * @access public\n     */\n    constructor(scope: Construct, id: string, props: LambdaToSecretsmanagerProps) {\n      super(scope, id);\n      defaults.CheckVpcProps(props);\n      defaults.CheckLambdaProps(props);\n      defaults.CheckSecretsManagerProps(props);\n\n      if (props.deployVpc || props.existingVpc) {\n\n        this.vpc = defaults.buildVpc(scope, {\n          defaultVpcProps: defaults.DefaultIsolatedVpcProps(),\n          existingVpc: props.existingVpc,\n          userVpcProps: props.vpcProps,\n          constructVpcProps: {\n            enableDnsHostnames: true,\n            enableDnsSupport: true,\n          },\n        });\n\n        defaults.AddAwsServiceEndpoint(scope, this.vpc, defaults.ServiceEndpointTypes.SECRETS_MANAGER);\n      }\n\n      // Setup the Lambda function\n      this.lambdaFunction = defaults.buildLambdaFunction(this, {\n        existingLambdaObj: props.existingLambdaObj,\n        lambdaFunctionProps: props.lambdaFunctionProps,\n        vpc: this.vpc,\n      });\n\n      // Setup the Secret\n      if (props.existingSecretObj) {\n        this.secret = props.existingSecretObj;\n      } else {\n        this.secret = defaults.buildSecretsManagerSecret(this, 'secret', props.secretProps);\n      }\n\n      // Configure environment variables\n      const secretEnvironmentVariableName = props.secretEnvironmentVariableName || 'SECRET_ARN';\n      this.lambdaFunction.addEnvironment(secretEnvironmentVariableName, this.secret.secretArn);\n\n      // Enable read permissions for the Lambda function by default\n      this.secret.grantRead(this.lambdaFunction);\n\n      if (props.grantWriteAccess === 'ReadWrite') {\n        this.secret.grantWrite(this.lambdaFunction);\n      }\n    }\n}\n"]}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-solutions-constructs/aws-lambda-secretsmanager",
|
|
3
|
-
"version": "2.
|
|
3
|
+
"version": "2.97.0",
|
|
4
4
|
"description": "CDK constructs for defining an interaction between an AWS Lambda function and AWS Secrets Manager.",
|
|
5
5
|
"main": "lib/index.js",
|
|
6
6
|
"types": "lib/index.d.ts",
|
|
@@ -55,14 +55,14 @@
|
|
|
55
55
|
}
|
|
56
56
|
},
|
|
57
57
|
"dependencies": {
|
|
58
|
-
"@aws-solutions-constructs/core": "2.
|
|
58
|
+
"@aws-solutions-constructs/core": "2.97.0",
|
|
59
59
|
"constructs": "^10.0.0"
|
|
60
60
|
},
|
|
61
61
|
"devDependencies": {
|
|
62
|
-
"@aws-cdk/integ-tests-alpha": "2.
|
|
62
|
+
"@aws-cdk/integ-tests-alpha": "2.233.0-alpha.0",
|
|
63
63
|
"@types/node": "^10.3.0",
|
|
64
64
|
"constructs": "^10.0.0",
|
|
65
|
-
"aws-cdk-lib": "2.
|
|
65
|
+
"aws-cdk-lib": "2.233.0"
|
|
66
66
|
},
|
|
67
67
|
"jest": {
|
|
68
68
|
"moduleFileExtensions": [
|
|
@@ -70,9 +70,9 @@
|
|
|
70
70
|
]
|
|
71
71
|
},
|
|
72
72
|
"peerDependencies": {
|
|
73
|
-
"@aws-solutions-constructs/core": "2.
|
|
73
|
+
"@aws-solutions-constructs/core": "2.97.0",
|
|
74
74
|
"constructs": "^10.0.0",
|
|
75
|
-
"aws-cdk-lib": "^2.
|
|
75
|
+
"aws-cdk-lib": "^2.233.0"
|
|
76
76
|
},
|
|
77
77
|
"keywords": [
|
|
78
78
|
"aws",
|
|
@@ -0,0 +1,21 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
|
3
|
+
*
|
|
4
|
+
* Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance
|
|
5
|
+
* with the License. A copy of the License is located at
|
|
6
|
+
*
|
|
7
|
+
* http://www.apache.org/licenses/LICENSE-2.0
|
|
8
|
+
*
|
|
9
|
+
* or in the 'license' file accompanying this file. This file is distributed on an 'AS IS' BASIS, WITHOUT WARRANTIES
|
|
10
|
+
* OR CONDITIONS OF ANY KIND, express or implied. See the License for the specific language governing permissions
|
|
11
|
+
* and limitations under the License.
|
|
12
|
+
*/
|
|
13
|
+
|
|
14
|
+
exports.handler = async function(event) {
|
|
15
|
+
console.log('request:', JSON.stringify(event, undefined, 2));
|
|
16
|
+
return {
|
|
17
|
+
statusCode: 200,
|
|
18
|
+
headers: { 'Content-Type': 'text/plain' },
|
|
19
|
+
body: `Hello, CDK! You've hit ${event.path}\n`
|
|
20
|
+
};
|
|
21
|
+
};
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":"
|
|
1
|
+
{"version":"48.0.0"}
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
{
|
|
2
|
-
"version": "
|
|
2
|
+
"version": "48.0.0",
|
|
3
3
|
"testCases": {
|
|
4
4
|
"lamsec-deployFunction/Integ/DefaultTest": {
|
|
5
5
|
"stacks": [
|
|
@@ -8,5 +8,6 @@
|
|
|
8
8
|
"assertionStack": "lamsec-deployFunction/Integ/DefaultTest/DeployAssert",
|
|
9
9
|
"assertionStackName": "lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA"
|
|
10
10
|
}
|
|
11
|
-
}
|
|
11
|
+
},
|
|
12
|
+
"minimumCliVersion": "2.1029.2"
|
|
12
13
|
}
|
|
@@ -1,28 +1,30 @@
|
|
|
1
1
|
{
|
|
2
|
-
"version": "
|
|
2
|
+
"version": "48.0.0",
|
|
3
3
|
"files": {
|
|
4
4
|
"a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c": {
|
|
5
|
+
"displayName": "test-lambda-secretsmanager/LambdaFunction/Code",
|
|
5
6
|
"source": {
|
|
6
7
|
"path": "asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c",
|
|
7
8
|
"packaging": "zip"
|
|
8
9
|
},
|
|
9
10
|
"destinations": {
|
|
10
|
-
"current_account-current_region": {
|
|
11
|
+
"current_account-current_region-d11fcfce": {
|
|
11
12
|
"bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
|
|
12
13
|
"objectKey": "a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c.zip",
|
|
13
14
|
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
|
|
14
15
|
}
|
|
15
16
|
}
|
|
16
17
|
},
|
|
17
|
-
"
|
|
18
|
+
"137d115a6d6797063693651083d23d0f89e72aafc2b7ea58e84c8d7a8055e6eb": {
|
|
19
|
+
"displayName": "lamsec-deployFunction Template",
|
|
18
20
|
"source": {
|
|
19
21
|
"path": "lamsec-deployFunction.template.json",
|
|
20
22
|
"packaging": "file"
|
|
21
23
|
},
|
|
22
24
|
"destinations": {
|
|
23
|
-
"current_account-current_region": {
|
|
25
|
+
"current_account-current_region-32d863b5": {
|
|
24
26
|
"bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
|
|
25
|
-
"objectKey": "
|
|
27
|
+
"objectKey": "137d115a6d6797063693651083d23d0f89e72aafc2b7ea58e84c8d7a8055e6eb.json",
|
|
26
28
|
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
|
|
27
29
|
}
|
|
28
30
|
}
|
|
@@ -1,13 +1,14 @@
|
|
|
1
1
|
{
|
|
2
|
-
"version": "
|
|
2
|
+
"version": "48.0.0",
|
|
3
3
|
"files": {
|
|
4
4
|
"21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22": {
|
|
5
|
+
"displayName": "lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA Template",
|
|
5
6
|
"source": {
|
|
6
7
|
"path": "lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA.template.json",
|
|
7
8
|
"packaging": "file"
|
|
8
9
|
},
|
|
9
10
|
"destinations": {
|
|
10
|
-
"current_account-current_region": {
|
|
11
|
+
"current_account-current_region-d8d86b35": {
|
|
11
12
|
"bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
|
|
12
13
|
"objectKey": "21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22.json",
|
|
13
14
|
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
|