@aws-solutions-constructs/aws-lambda-secretsmanager 2.98.0 → 2.100.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +36 -9
- package/README.adoc +1 -1
- package/lib/index.js +1 -1
- package/package.json +6 -7
- package/test/integ.lamsec-deployFunction.js +2 -2
- package/test/integ.lamsec-deployFunction.js.snapshot/cdk.out +1 -1
- package/test/integ.lamsec-deployFunction.js.snapshot/integ.json +2 -2
- package/test/integ.lamsec-deployFunction.js.snapshot/lamsec-deployFunction.assets.json +4 -18
- package/test/integ.lamsec-deployFunction.js.snapshot/lamsec-deployFunction.template.json +1 -4
- package/test/integ.lamsec-deployFunction.js.snapshot/lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA.assets.json +1 -1
- package/test/integ.lamsec-deployFunction.js.snapshot/manifest.json +23 -19
- package/test/integ.lamsec-deployFunction.js.snapshot/tree.json +1 -1
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js +2 -2
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/cdk.out +1 -1
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/integ.json +2 -2
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsec-deployFunctionWithExistingVpc.assets.json +4 -18
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsec-deployFunctionWithExistingVpc.template.json +1 -4
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/lamsecdeployFunctionWithExistingVpcIntegDefaultTestDeployAssert647243A7.assets.json +1 -1
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/manifest.json +23 -25
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/tree.json +1 -1
- package/test/integ.lamsec-deployFunctionWithVpc.js +2 -2
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/cdk.out +1 -1
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/integ.json +2 -2
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.assets.json +4 -18
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsec-deployFunctionWithVpc.template.json +1 -4
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/lamsecdeployFunctionWithVpcIntegDefaultTestDeployAssert66148FF5.assets.json +1 -1
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/manifest.json +23 -25
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/tree.json +1 -1
- package/test/integ.lamsec-existingFunction.js +2 -2
- package/test/integ.lamsec-existingFunction.js.snapshot/cdk.out +1 -1
- package/test/integ.lamsec-existingFunction.js.snapshot/integ.json +2 -2
- package/test/integ.lamsec-existingFunction.js.snapshot/lamsec-existingFunction.assets.json +4 -18
- package/test/integ.lamsec-existingFunction.js.snapshot/lamsec-existingFunction.template.json +1 -4
- package/test/integ.lamsec-existingFunction.js.snapshot/lamsecexistingFunctionIntegDefaultTestDeployAssert295B352B.assets.json +1 -1
- package/test/integ.lamsec-existingFunction.js.snapshot/manifest.json +23 -19
- package/test/integ.lamsec-existingFunction.js.snapshot/tree.json +1 -1
- package/test/lambda-secretsmanager.test.js +5 -5
- package/test/integ.lamsec-deployFunction.js.snapshot/asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c/index.js +0 -21
- package/test/integ.lamsec-deployFunctionWithExistingVpc.js.snapshot/asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c/index.js +0 -21
- package/test/integ.lamsec-deployFunctionWithVpc.js.snapshot/asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c/index.js +0 -21
- package/test/integ.lamsec-existingFunction.js.snapshot/asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c/index.js +0 -21
package/.jsii
CHANGED
|
@@ -8,8 +8,8 @@
|
|
|
8
8
|
"url": "https://aws.amazon.com"
|
|
9
9
|
},
|
|
10
10
|
"dependencies": {
|
|
11
|
-
"@aws-solutions-constructs/core": "2.
|
|
12
|
-
"aws-cdk-lib": "^2.
|
|
11
|
+
"@aws-solutions-constructs/core": "2.100.0",
|
|
12
|
+
"aws-cdk-lib": "^2.239.0",
|
|
13
13
|
"constructs": "^10.0.0"
|
|
14
14
|
},
|
|
15
15
|
"dependencyClosure": {
|
|
@@ -100,8 +100,7 @@
|
|
|
100
100
|
"dotnet": {
|
|
101
101
|
"iconUrl": "https://raw.githubusercontent.com/aws/aws-cdk/master/logo/default-256-dark.png",
|
|
102
102
|
"namespace": "Amazon.SolutionsConstructs.AWS.Core",
|
|
103
|
-
"packageId": "Amazon.SolutionsConstructs.AWS.Core"
|
|
104
|
-
"signAssembly": true
|
|
103
|
+
"packageId": "Amazon.SolutionsConstructs.AWS.Core"
|
|
105
104
|
},
|
|
106
105
|
"java": {
|
|
107
106
|
"maven": {
|
|
@@ -2631,6 +2630,19 @@
|
|
|
2631
2630
|
}
|
|
2632
2631
|
}
|
|
2633
2632
|
},
|
|
2633
|
+
"aws-cdk-lib.aws_mwaaserverless": {
|
|
2634
|
+
"targets": {
|
|
2635
|
+
"dotnet": {
|
|
2636
|
+
"namespace": "Amazon.CDK.AWS.MWAAServerless"
|
|
2637
|
+
},
|
|
2638
|
+
"java": {
|
|
2639
|
+
"package": "software.amazon.awscdk.services.mwaaserverless"
|
|
2640
|
+
},
|
|
2641
|
+
"python": {
|
|
2642
|
+
"module": "aws_cdk.aws_mwaaserverless"
|
|
2643
|
+
}
|
|
2644
|
+
}
|
|
2645
|
+
},
|
|
2634
2646
|
"aws-cdk-lib.aws_neptune": {
|
|
2635
2647
|
"targets": {
|
|
2636
2648
|
"dotnet": {
|
|
@@ -6836,6 +6848,22 @@
|
|
|
6836
6848
|
}
|
|
6837
6849
|
}
|
|
6838
6850
|
},
|
|
6851
|
+
"aws-cdk-lib.interfaces.aws_mwaaserverless": {
|
|
6852
|
+
"targets": {
|
|
6853
|
+
"dotnet": {
|
|
6854
|
+
"namespace": "Amazon.CDK.Interfaces.MWAAServerless"
|
|
6855
|
+
},
|
|
6856
|
+
"go": {
|
|
6857
|
+
"packageName": "interfacesawsmwaaserverless"
|
|
6858
|
+
},
|
|
6859
|
+
"java": {
|
|
6860
|
+
"package": "software.amazon.awscdk.interfaces.mwaaserverless"
|
|
6861
|
+
},
|
|
6862
|
+
"python": {
|
|
6863
|
+
"module": "aws_cdk.interfaces.aws_mwaaserverless"
|
|
6864
|
+
}
|
|
6865
|
+
}
|
|
6866
|
+
},
|
|
6839
6867
|
"aws-cdk-lib.interfaces.aws_neptune": {
|
|
6840
6868
|
"targets": {
|
|
6841
6869
|
"dotnet": {
|
|
@@ -8492,7 +8520,7 @@
|
|
|
8492
8520
|
},
|
|
8493
8521
|
"description": "CDK constructs for defining an interaction between an AWS Lambda function and AWS Secrets Manager.",
|
|
8494
8522
|
"homepage": "https://github.com/awslabs/aws-solutions-constructs.git",
|
|
8495
|
-
"jsiiVersion": "5.9.
|
|
8523
|
+
"jsiiVersion": "5.9.28 (build cbad63d)",
|
|
8496
8524
|
"keywords": [
|
|
8497
8525
|
"aws",
|
|
8498
8526
|
"cdk",
|
|
@@ -8523,8 +8551,7 @@
|
|
|
8523
8551
|
"dotnet": {
|
|
8524
8552
|
"iconUrl": "https://raw.githubusercontent.com/aws/aws-cdk/master/logo/default-256-dark.png",
|
|
8525
8553
|
"namespace": "Amazon.SolutionsConstructs.AWS.LambdaSecretsManager",
|
|
8526
|
-
"packageId": "Amazon.SolutionsConstructs.AWS.LambdaSecretsManager"
|
|
8527
|
-
"signAssembly": true
|
|
8554
|
+
"packageId": "Amazon.SolutionsConstructs.AWS.LambdaSecretsManager"
|
|
8528
8555
|
},
|
|
8529
8556
|
"java": {
|
|
8530
8557
|
"maven": {
|
|
@@ -8809,6 +8836,6 @@
|
|
|
8809
8836
|
"symbolId": "lib/index:LambdaToSecretsmanagerProps"
|
|
8810
8837
|
}
|
|
8811
8838
|
},
|
|
8812
|
-
"version": "2.
|
|
8813
|
-
"fingerprint": "
|
|
8839
|
+
"version": "2.100.0",
|
|
8840
|
+
"fingerprint": "5BobM6fv6PD+UMTyulPkp6j+y9cJUsqYgAewcaK4hDQ="
|
|
8814
8841
|
}
|
package/README.adoc
CHANGED
|
@@ -75,7 +75,7 @@ LambdaToSecretsmanager(
|
|
|
75
75
|
self, 'test-lambda-secretsmanager-stack',
|
|
76
76
|
lambda_function_props=_lambda.FunctionProps(
|
|
77
77
|
code=_lambda.Code.from_asset('lambda'),
|
|
78
|
-
runtime=_lambda.Runtime.
|
|
78
|
+
runtime=_lambda.Runtime.PYTHON_3_14,
|
|
79
79
|
handler='index.handler'
|
|
80
80
|
)
|
|
81
81
|
)
|
package/lib/index.js
CHANGED
|
@@ -71,5 +71,5 @@ class LambdaToSecretsmanager extends constructs_1.Construct {
|
|
|
71
71
|
}
|
|
72
72
|
exports.LambdaToSecretsmanager = LambdaToSecretsmanager;
|
|
73
73
|
_a = JSII_RTTI_SYMBOL_1;
|
|
74
|
-
LambdaToSecretsmanager[_a] = { fqn: "@aws-solutions-constructs/aws-lambda-secretsmanager.LambdaToSecretsmanager", version: "2.
|
|
74
|
+
LambdaToSecretsmanager[_a] = { fqn: "@aws-solutions-constructs/aws-lambda-secretsmanager.LambdaToSecretsmanager", version: "2.100.0" };
|
|
75
75
|
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["index.ts"],"names":[],"mappings":";;;;;AAAA;;;;;;;;;;;GAWG;AAEH,UAAU;AACV,2DAA2D;AAI3D,2CAAuC;AA4DvC;;GAEG;AACH,MAAa,sBAAuB,SAAQ,sBAAS;IAKjD;;;;;;OAMG;IACH,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAkC;QAC1E,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,QAAQ,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC;QAC9B,QAAQ,CAAC,gBAAgB,CAAC,KAAK,CAAC,CAAC;QACjC,QAAQ,CAAC,wBAAwB,CAAC,KAAK,CAAC,CAAC;QAEzC,IAAI,KAAK,CAAC,SAAS,IAAI,KAAK,CAAC,WAAW,EAAE,CAAC;YAEzC,IAAI,CAAC,GAAG,GAAG,QAAQ,CAAC,QAAQ,CAAC,KAAK,EAAE;gBAClC,eAAe,EAAE,QAAQ,CAAC,uBAAuB,EAAE;gBACnD,WAAW,EAAE,KAAK,CAAC,WAAW;gBAC9B,YAAY,EAAE,KAAK,CAAC,QAAQ;gBAC5B,iBAAiB,EAAE;oBACjB,kBAAkB,EAAE,IAAI;oBACxB,gBAAgB,EAAE,IAAI;iBACvB;aACF,CAAC,CAAC;YAEH,QAAQ,CAAC,qBAAqB,CAAC,KAAK,EAAE,IAAI,CAAC,GAAG,EAAE,QAAQ,CAAC,oBAAoB,CAAC,eAAe,CAAC,CAAC;QACjG,CAAC;QAED,4BAA4B;QAC5B,IAAI,CAAC,cAAc,GAAG,QAAQ,CAAC,mBAAmB,CAAC,IAAI,EAAE;YACvD,iBAAiB,EAAE,KAAK,CAAC,iBAAiB;YAC1C,mBAAmB,EAAE,KAAK,CAAC,mBAAmB;YAC9C,GAAG,EAAE,IAAI,CAAC,GAAG;SACd,CAAC,CAAC;QAEH,mBAAmB;QACnB,IAAI,KAAK,CAAC,iBAAiB,EAAE,CAAC;YAC5B,IAAI,CAAC,MAAM,GAAG,KAAK,CAAC,iBAAiB,CAAC;QACxC,CAAC;aAAM,CAAC;YACN,IAAI,CAAC,MAAM,GAAG,QAAQ,CAAC,yBAAyB,CAAC,IAAI,EAAE,QAAQ,EAAE,KAAK,CAAC,WAAW,CAAC,CAAC;QACtF,CAAC;QAED,kCAAkC;QAClC,MAAM,6BAA6B,GAAG,KAAK,CAAC,6BAA6B,IAAI,YAAY,CAAC;QAC1F,IAAI,CAAC,cAAc,CAAC,cAAc,CAAC,6BAA6B,EAAE,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;QAEzF,6DAA6D;QAC7D,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC;QAE3C,IAAI,KAAK,CAAC,gBAAgB,KAAK,WAAW,EAAE,CAAC;YAC3C,IAAI,CAAC,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC;QAC9C,CAAC;IACH,CAAC;;AAzDL,wDA0DC","sourcesContent":["/**\n *  Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n *\n *  Licensed under the Apache License, Version 2.0 (the \"License\"). You may not use this file except in compliance\n *  with the License. A copy of the License is located at\n *\n *      http://www.apache.org/licenses/LICENSE-2.0\n *\n *  or in the 'license' file accompanying this file. This file is distributed on an 'AS IS' BASIS, WITHOUT WARRANTIES\n *  OR CONDITIONS OF ANY KIND, express or implied. See the License for the specific language governing permissions\n *  and limitations under the License.\n */\n\n// Imports\nimport * as defaults from \"@aws-solutions-constructs/core\";\nimport * as lambda from \"aws-cdk-lib/aws-lambda\";\nimport * as secretsmanager from \"aws-cdk-lib/aws-secretsmanager\";\nimport * as ec2 from \"aws-cdk-lib/aws-ec2\";\nimport { Construct } from \"constructs\";\n\n/**\n * @summary The properties for the LambdaToSecretsmanager class.\n */\nexport interface LambdaToSecretsmanagerProps {\n  /**\n   * Existing instance of Lambda Function object, providing both this and `lambdaFunctionProps` will cause an error.\n   *\n   * @default - None\n   */\n  readonly existingLambdaObj?: lambda.Function;\n  /**\n   * Optional - user provided props to override the default props for the Lambda function. Providing both this and `existingLambdaObj`\n   * causes an error.\n   *\n   * @default - Default properties are used.\n   */\n  readonly lambdaFunctionProps?: lambda.FunctionProps;\n  /**\n   * Existing instance of Secret object, providing both this and secretProps will cause an error.\n   *\n   * @default - Default props are used\n   */\n  readonly existingSecretObj?: secretsmanager.Secret;\n  /**\n   * Optional user-provided props to override the default props for the Secret.\n   *\n   * @default - Default props are used\n   */\n  readonly secretProps?: secretsmanager.SecretProps;\n  /**\n   * An existing VPC for the construct to use (construct will NOT create a new VPC in this case)\n   */\n  readonly existingVpc?: ec2.IVpc;\n  /**\n   * Properties to override default properties if deployVpc is true\n   */\n  readonly vpcProps?: ec2.VpcProps;\n  /**\n   * Whether to deploy a new VPC\n   *\n   * @default - false\n   */\n  readonly deployVpc?: boolean;\n  /**\n   * Optional Name for the Lambda function environment variable set to the ARN of the secret.\n   *\n   * @default - SECRET_ARN\n   */\n  readonly secretEnvironmentVariableName?: string;\n  /**\n   * Optional secret permissions to grant to the Lambda function.\n   * One of the following may be specified: \"Read\" or \"ReadWrite\".\n   *\n   * @default - Read only access is given to the Lambda function if no value is specified.\n   */\n  readonly grantWriteAccess?: string;\n}\n\n/**\n * @summary The LambdaToSecretsmanager class.\n */\nexport class LambdaToSecretsmanager extends Construct {\n    public readonly lambdaFunction: lambda.Function;\n    public readonly secret: secretsmanager.Secret;\n    public readonly vpc?: ec2.IVpc;\n\n    /**\n     * @summary Constructs a new instance of the LambdaToSecretsmanager class.\n     * @param {cdk.App} scope - represents the scope for all the resources.\n     * @param {string} id - this is a a scope-unique id.\n     * @param {LambdaToSecretsmanagerProps} props - user provided props for the construct.\n     * @access public\n     */\n    constructor(scope: Construct, id: string, props: LambdaToSecretsmanagerProps) {\n      super(scope, id);\n      defaults.CheckVpcProps(props);\n      defaults.CheckLambdaProps(props);\n      defaults.CheckSecretsManagerProps(props);\n\n      if (props.deployVpc || props.existingVpc) {\n\n        this.vpc = defaults.buildVpc(scope, {\n          defaultVpcProps: defaults.DefaultIsolatedVpcProps(),\n          existingVpc: props.existingVpc,\n          userVpcProps: props.vpcProps,\n          constructVpcProps: {\n            enableDnsHostnames: true,\n            enableDnsSupport: true,\n          },\n        });\n\n        defaults.AddAwsServiceEndpoint(scope, this.vpc, defaults.ServiceEndpointTypes.SECRETS_MANAGER);\n      }\n\n      // Setup the Lambda function\n      this.lambdaFunction = defaults.buildLambdaFunction(this, {\n        existingLambdaObj: props.existingLambdaObj,\n        lambdaFunctionProps: props.lambdaFunctionProps,\n        vpc: this.vpc,\n      });\n\n      // Setup the Secret\n      if (props.existingSecretObj) {\n        this.secret = props.existingSecretObj;\n      } else {\n        this.secret = defaults.buildSecretsManagerSecret(this, 'secret', props.secretProps);\n      }\n\n      // Configure environment variables\n      const secretEnvironmentVariableName = props.secretEnvironmentVariableName || 'SECRET_ARN';\n      this.lambdaFunction.addEnvironment(secretEnvironmentVariableName, this.secret.secretArn);\n\n      // Enable read permissions for the Lambda function by default\n      this.secret.grantRead(this.lambdaFunction);\n\n      if (props.grantWriteAccess === 'ReadWrite') {\n        this.secret.grantWrite(this.lambdaFunction);\n      }\n    }\n}\n"]}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-solutions-constructs/aws-lambda-secretsmanager",
|
|
3
|
-
"version": "2.
|
|
3
|
+
"version": "2.100.0",
|
|
4
4
|
"description": "CDK constructs for defining an interaction between an AWS Lambda function and AWS Secrets Manager.",
|
|
5
5
|
"main": "lib/index.js",
|
|
6
6
|
"types": "lib/index.d.ts",
|
|
@@ -45,7 +45,6 @@
|
|
|
45
45
|
"dotnet": {
|
|
46
46
|
"namespace": "Amazon.SolutionsConstructs.AWS.LambdaSecretsManager",
|
|
47
47
|
"packageId": "Amazon.SolutionsConstructs.AWS.LambdaSecretsManager",
|
|
48
|
-
"signAssembly": true,
|
|
49
48
|
"iconUrl": "https://raw.githubusercontent.com/aws/aws-cdk/master/logo/default-256-dark.png"
|
|
50
49
|
},
|
|
51
50
|
"python": {
|
|
@@ -55,14 +54,14 @@
|
|
|
55
54
|
}
|
|
56
55
|
},
|
|
57
56
|
"dependencies": {
|
|
58
|
-
"@aws-solutions-constructs/core": "2.
|
|
57
|
+
"@aws-solutions-constructs/core": "2.100.0",
|
|
59
58
|
"constructs": "^10.0.0"
|
|
60
59
|
},
|
|
61
60
|
"devDependencies": {
|
|
62
|
-
"@aws-cdk/integ-tests-alpha": "2.
|
|
61
|
+
"@aws-cdk/integ-tests-alpha": "2.239.0-alpha.0",
|
|
63
62
|
"@types/node": "^10.3.0",
|
|
64
63
|
"constructs": "^10.0.0",
|
|
65
|
-
"aws-cdk-lib": "2.
|
|
64
|
+
"aws-cdk-lib": "2.239.0"
|
|
66
65
|
},
|
|
67
66
|
"jest": {
|
|
68
67
|
"moduleFileExtensions": [
|
|
@@ -70,9 +69,9 @@
|
|
|
70
69
|
]
|
|
71
70
|
},
|
|
72
71
|
"peerDependencies": {
|
|
73
|
-
"@aws-solutions-constructs/core": "2.
|
|
72
|
+
"@aws-solutions-constructs/core": "2.100.0",
|
|
74
73
|
"constructs": "^10.0.0",
|
|
75
|
-
"aws-cdk-lib": "^2.
|
|
74
|
+
"aws-cdk-lib": "^2.239.0"
|
|
76
75
|
},
|
|
77
76
|
"keywords": [
|
|
78
77
|
"aws",
|
|
@@ -29,7 +29,7 @@ const props = {
|
|
|
29
29
|
lambdaFunctionProps: {
|
|
30
30
|
runtime: defaults.COMMERCIAL_REGION_LAMBDA_NODE_RUNTIME,
|
|
31
31
|
handler: 'index.handler',
|
|
32
|
-
code: lambda.
|
|
32
|
+
code: new lambda.InlineCode('exports.handler = async (event) => { console.log(event); return {statusCode: 200, body: ""}; }')
|
|
33
33
|
},
|
|
34
34
|
secretProps: {
|
|
35
35
|
removalPolicy: aws_cdk_lib_1.RemovalPolicy.DESTROY
|
|
@@ -40,4 +40,4 @@ new lib_1.LambdaToSecretsmanager(stack, 'test-lambda-secretsmanager', props);
|
|
|
40
40
|
new integ_tests_alpha_1.IntegTest(stack, 'Integ', { testCases: [
|
|
41
41
|
stack
|
|
42
42
|
] });
|
|
43
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
43
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":"
|
|
1
|
+
{"version":"50.0.0"}
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
{
|
|
2
|
-
"version": "
|
|
2
|
+
"version": "50.0.0",
|
|
3
3
|
"testCases": {
|
|
4
4
|
"lamsec-deployFunction/Integ/DefaultTest": {
|
|
5
5
|
"stacks": [
|
|
@@ -9,5 +9,5 @@
|
|
|
9
9
|
"assertionStackName": "lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA"
|
|
10
10
|
}
|
|
11
11
|
},
|
|
12
|
-
"minimumCliVersion": "2.
|
|
12
|
+
"minimumCliVersion": "2.1105.0"
|
|
13
13
|
}
|
|
@@ -1,30 +1,16 @@
|
|
|
1
1
|
{
|
|
2
|
-
"version": "
|
|
2
|
+
"version": "50.0.0",
|
|
3
3
|
"files": {
|
|
4
|
-
"
|
|
5
|
-
"displayName": "test-lambda-secretsmanager/LambdaFunction/Code",
|
|
6
|
-
"source": {
|
|
7
|
-
"path": "asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c",
|
|
8
|
-
"packaging": "zip"
|
|
9
|
-
},
|
|
10
|
-
"destinations": {
|
|
11
|
-
"current_account-current_region-d11fcfce": {
|
|
12
|
-
"bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
|
|
13
|
-
"objectKey": "a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c.zip",
|
|
14
|
-
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
|
|
15
|
-
}
|
|
16
|
-
}
|
|
17
|
-
},
|
|
18
|
-
"137d115a6d6797063693651083d23d0f89e72aafc2b7ea58e84c8d7a8055e6eb": {
|
|
4
|
+
"0f6c7e9f41877aad6d2e6a61b2382ab92edd29f550fed73d75f7ccfe04f1b1d5": {
|
|
19
5
|
"displayName": "lamsec-deployFunction Template",
|
|
20
6
|
"source": {
|
|
21
7
|
"path": "lamsec-deployFunction.template.json",
|
|
22
8
|
"packaging": "file"
|
|
23
9
|
},
|
|
24
10
|
"destinations": {
|
|
25
|
-
"current_account-current_region-
|
|
11
|
+
"current_account-current_region-6c80b6a6": {
|
|
26
12
|
"bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
|
|
27
|
-
"objectKey": "
|
|
13
|
+
"objectKey": "0f6c7e9f41877aad6d2e6a61b2382ab92edd29f550fed73d75f7ccfe04f1b1d5.json",
|
|
28
14
|
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
|
|
29
15
|
}
|
|
30
16
|
}
|
|
@@ -93,10 +93,7 @@
|
|
|
93
93
|
"Type": "AWS::Lambda::Function",
|
|
94
94
|
"Properties": {
|
|
95
95
|
"Code": {
|
|
96
|
-
"
|
|
97
|
-
"Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
|
|
98
|
-
},
|
|
99
|
-
"S3Key": "a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c.zip"
|
|
96
|
+
"ZipFile": "exports.handler = async (event) => { console.log(event); return {statusCode: 200, body: \"\"}; }"
|
|
100
97
|
},
|
|
101
98
|
"Environment": {
|
|
102
99
|
"Variables": {
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
{
|
|
2
|
-
"version": "
|
|
2
|
+
"version": "52.0.0",
|
|
3
3
|
"artifacts": {
|
|
4
4
|
"lamsecdeployFunctionIntegDefaultTestDeployAssert7322BEEA.assets": {
|
|
5
5
|
"type": "cdk:asset-manifest",
|
|
@@ -66,7 +66,7 @@
|
|
|
66
66
|
"validateOnSynth": false,
|
|
67
67
|
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
|
|
68
68
|
"cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
|
|
69
|
-
"stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/
|
|
69
|
+
"stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/0f6c7e9f41877aad6d2e6a61b2382ab92edd29f550fed73d75f7ccfe04f1b1d5.json",
|
|
70
70
|
"requiresBootstrapStackVersion": 6,
|
|
71
71
|
"bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
|
|
72
72
|
"additionalDependencies": [
|
|
@@ -134,12 +134,6 @@
|
|
|
134
134
|
}
|
|
135
135
|
}
|
|
136
136
|
],
|
|
137
|
-
"/lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole": [
|
|
138
|
-
{
|
|
139
|
-
"type": "aws:cdk:analytics:construct",
|
|
140
|
-
"data": "*"
|
|
141
|
-
}
|
|
142
|
-
],
|
|
143
137
|
"/lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunctionServiceRole/Resource": [
|
|
144
138
|
{
|
|
145
139
|
"type": "aws:cdk:logicalId",
|
|
@@ -300,6 +294,7 @@
|
|
|
300
294
|
"module": "aws-cdk-lib",
|
|
301
295
|
"flags": {
|
|
302
296
|
"@aws-cdk/aws-signer:signingProfileNamePassedToCfn": {
|
|
297
|
+
"userValue": true,
|
|
303
298
|
"recommendedValue": true,
|
|
304
299
|
"explanation": "Pass signingProfileName to CfnSigningProfile"
|
|
305
300
|
},
|
|
@@ -318,6 +313,7 @@
|
|
|
318
313
|
}
|
|
319
314
|
},
|
|
320
315
|
"@aws-cdk/aws-ecs-patterns:secGroupsDisablesImplicitOpenListener": {
|
|
316
|
+
"userValue": true,
|
|
321
317
|
"recommendedValue": true,
|
|
322
318
|
"explanation": "Disable implicit openListener when custom security groups are provided"
|
|
323
319
|
},
|
|
@@ -583,6 +579,10 @@
|
|
|
583
579
|
"recommendedValue": true,
|
|
584
580
|
"explanation": "When enabled, nodegroupName attribute of the provisioned EKS NodeGroup will not have the cluster name prefix."
|
|
585
581
|
},
|
|
582
|
+
"@aws-cdk/aws-eks:useNativeOidcProvider": {
|
|
583
|
+
"recommendedValue": true,
|
|
584
|
+
"explanation": "When enabled, EKS V2 clusters will use the native OIDC provider resource AWS::IAM::OIDCProvider instead of creating the OIDCProvider with a custom resource (iam.OpenIDConnectProvider)."
|
|
585
|
+
},
|
|
586
586
|
"@aws-cdk/aws-ec2:ebsDefaultGp3Volume": {
|
|
587
587
|
"userValue": true,
|
|
588
588
|
"recommendedValue": true,
|
|
@@ -615,16 +615,6 @@
|
|
|
615
615
|
"recommendedValue": true,
|
|
616
616
|
"explanation": "When enabled, stack tags need to be assigned explicitly on a Stack."
|
|
617
617
|
},
|
|
618
|
-
"@aws-cdk/aws-ecs:enableImdsBlockingDeprecatedFeature": {
|
|
619
|
-
"userValue": false,
|
|
620
|
-
"recommendedValue": false,
|
|
621
|
-
"explanation": "When set to true along with canContainersAccessInstanceRole=false in ECS cluster, new updated commands will be added to UserData to block container accessing IMDS. **Applicable to Linux only. IMPORTANT: See [details.](#aws-cdkaws-ecsenableImdsBlockingDeprecatedFeature)**"
|
|
622
|
-
},
|
|
623
|
-
"@aws-cdk/aws-ecs:disableEcsImdsBlocking": {
|
|
624
|
-
"userValue": true,
|
|
625
|
-
"recommendedValue": true,
|
|
626
|
-
"explanation": "When set to true, CDK synth will throw exception if canContainersAccessInstanceRole is false. **IMPORTANT: See [details.](#aws-cdkaws-ecsdisableEcsImdsBlocking)**"
|
|
627
|
-
},
|
|
628
618
|
"@aws-cdk/aws-ecs:reduceEc2FargateCloudWatchPermissions": {
|
|
629
619
|
"userValue": true,
|
|
630
620
|
"recommendedValue": true,
|
|
@@ -770,6 +760,7 @@
|
|
|
770
760
|
"explanation": "When enabled, CDK creates and manages loggroup for the lambda function"
|
|
771
761
|
},
|
|
772
762
|
"@aws-cdk/aws-elasticloadbalancingv2:networkLoadBalancerWithSecurityGroupByDefault": {
|
|
763
|
+
"userValue": true,
|
|
773
764
|
"recommendedValue": true,
|
|
774
765
|
"explanation": "When enabled, Network Load Balancer will be created with a security group by default."
|
|
775
766
|
},
|
|
@@ -781,12 +772,25 @@
|
|
|
781
772
|
}
|
|
782
773
|
},
|
|
783
774
|
"@aws-cdk/aws-ecs-patterns:uniqueTargetGroupId": {
|
|
775
|
+
"userValue": true,
|
|
784
776
|
"recommendedValue": true,
|
|
785
777
|
"explanation": "When enabled, ECS patterns will generate unique target group IDs to prevent conflicts during load balancer replacement"
|
|
778
|
+
},
|
|
779
|
+
"@aws-cdk/aws-route53-patterns:useDistribution": {
|
|
780
|
+
"userValue": true,
|
|
781
|
+
"recommendedValue": true,
|
|
782
|
+
"explanation": "Use the `Distribution` resource instead of `CloudFrontWebDistribution`"
|
|
783
|
+
},
|
|
784
|
+
"@aws-cdk/core:automaticL1Traits": {
|
|
785
|
+
"recommendedValue": true,
|
|
786
|
+
"explanation": "Automatically use the default L1 traits for L1 constructs`",
|
|
787
|
+
"unconfiguredBehavesLike": {
|
|
788
|
+
"v2": true
|
|
789
|
+
}
|
|
786
790
|
}
|
|
787
791
|
}
|
|
788
792
|
}
|
|
789
793
|
}
|
|
790
794
|
},
|
|
791
|
-
"minimumCliVersion": "2.
|
|
795
|
+
"minimumCliVersion": "2.1106.1"
|
|
792
796
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":"tree-0.1","tree":{"id":"App","path":"","constructInfo":{"fqn":"aws-cdk-lib.App","version":"2.
|
|
1
|
+
{"version":"tree-0.1","tree":{"id":"App","path":"","constructInfo":{"fqn":"aws-cdk-lib.App","version":"2.239.0"},"children":{"lamsec-deployFunction":{"id":"lamsec-deployFunction","path":"lamsec-deployFunction","constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.239.0"},"children":{"test-lambda-secretsmanager":{"id":"test-lambda-secretsmanager","path":"lamsec-deployFunction/test-lambda-secretsmanager","constructInfo":{"fqn":"@aws-solutions-constructs/aws-lambda-secretsmanager.LambdaToSecretsmanager","version":"2.99.0"},"children":{"LambdaFunctionServiceRole":{"id":"LambdaFunctionServiceRole","path":"lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunctionServiceRole","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Role","version":"2.239.0"},"children":{"Resource":{"id":"Resource","path":"lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunctionServiceRole/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnRole","version":"2.239.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Role","aws:cdk:cloudformation:props":{"assumeRolePolicyDocument":{"Statement":[{"Action":"sts:AssumeRole","Effect":"Allow","Principal":{"Service":"lambda.amazonaws.com"}}],"Version":"2012-10-17"},"policies":[{"policyName":"LambdaFunctionServiceRolePolicy","policyDocument":{"Statement":[{"Action":["logs:CreateLogGroup","logs:CreateLogStream","logs:PutLogEvents"],"Effect":"Allow","Resource":{"Fn::Join":["",["arn:",{"Ref":"AWS::Partition"},":logs:",{"Ref":"AWS::Region"},":",{"Ref":"AWS::AccountId"},":log-group:/aws/lambda/*"]]}}],"Version":"2012-10-17"}}]}}},"DefaultPolicy":{"id":"DefaultPolicy","path":"lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunctionServiceRole/DefaultPolicy","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Policy","version":"2.239.0"},"children":{"Resource":{"id":"Resource","path":"lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunctionServiceRole/DefaultPolicy/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnPolicy","version":"2.239.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Policy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":["secretsmanager:DescribeSecret","secretsmanager:GetSecretValue"],"Effect":"Allow","Resource":{"Ref":"testlambdasecretsmanagersecret4C99E6BF"}}],"Version":"2012-10-17"},"policyName":"testlambdasecretsmanagerLambdaFunctionServiceRoleDefaultPolicyF24BF460","roles":[{"Ref":"testlambdasecretsmanagerLambdaFunctionServiceRole92CE007F"}]}}}}}}},"LambdaFunction":{"id":"LambdaFunction","path":"lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunction","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.Function","version":"2.239.0"},"children":{"Resource":{"id":"Resource","path":"lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunction/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_lambda.CfnFunction","version":"2.239.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::Lambda::Function","aws:cdk:cloudformation:props":{"code":{"zipFile":"exports.handler = async (event) => { console.log(event); return {statusCode: 200, body: \"\"}; }"},"environment":{"variables":{"AWS_NODEJS_CONNECTION_REUSE_ENABLED":"1","SECRET_ARN":{"Ref":"testlambdasecretsmanagersecret4C99E6BF"}}},"handler":"index.handler","role":{"Fn::GetAtt":["testlambdasecretsmanagerLambdaFunctionServiceRole92CE007F","Arn"]},"runtime":"nodejs22.x","tracingConfig":{"mode":"Active"}}}},"inlinePolicyAddedToExecutionRole-0":{"id":"inlinePolicyAddedToExecutionRole-0","path":"lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunction/inlinePolicyAddedToExecutionRole-0","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.Policy","version":"2.239.0"},"children":{"Resource":{"id":"Resource","path":"lamsec-deployFunction/test-lambda-secretsmanager/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_iam.CfnPolicy","version":"2.239.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::IAM::Policy","aws:cdk:cloudformation:props":{"policyDocument":{"Statement":[{"Action":["xray:PutTelemetryRecords","xray:PutTraceSegments"],"Effect":"Allow","Resource":"*"}],"Version":"2012-10-17"},"policyName":"testlambdasecretsmanagerLambdaFunctioninlinePolicyAddedToExecutionRole0A805C55F","roles":[{"Ref":"testlambdasecretsmanagerLambdaFunctionServiceRole92CE007F"}]}}}}}}},"secret":{"id":"secret","path":"lamsec-deployFunction/test-lambda-secretsmanager/secret","constructInfo":{"fqn":"aws-cdk-lib.aws_secretsmanager.Secret","version":"2.239.0"},"children":{"Resource":{"id":"Resource","path":"lamsec-deployFunction/test-lambda-secretsmanager/secret/Resource","constructInfo":{"fqn":"aws-cdk-lib.aws_secretsmanager.CfnSecret","version":"2.239.0"},"attributes":{"aws:cdk:cloudformation:type":"AWS::SecretsManager::Secret","aws:cdk:cloudformation:props":{"generateSecretString":{}}}}}}}},"Integ":{"id":"Integ","path":"lamsec-deployFunction/Integ","constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTest","version":"2.239.0-alpha.0"},"children":{"DefaultTest":{"id":"DefaultTest","path":"lamsec-deployFunction/Integ/DefaultTest","constructInfo":{"fqn":"@aws-cdk/integ-tests-alpha.IntegTestCase","version":"2.239.0-alpha.0"},"children":{"Default":{"id":"Default","path":"lamsec-deployFunction/Integ/DefaultTest/Default","constructInfo":{"fqn":"constructs.Construct","version":"10.5.1"}},"DeployAssert":{"id":"DeployAssert","path":"lamsec-deployFunction/Integ/DefaultTest/DeployAssert","constructInfo":{"fqn":"aws-cdk-lib.Stack","version":"2.239.0"},"children":{"BootstrapVersion":{"id":"BootstrapVersion","path":"lamsec-deployFunction/Integ/DefaultTest/DeployAssert/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.239.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"lamsec-deployFunction/Integ/DefaultTest/DeployAssert/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.239.0"}}}}}}}},"BootstrapVersion":{"id":"BootstrapVersion","path":"lamsec-deployFunction/BootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnParameter","version":"2.239.0"}},"CheckBootstrapVersion":{"id":"CheckBootstrapVersion","path":"lamsec-deployFunction/CheckBootstrapVersion","constructInfo":{"fqn":"aws-cdk-lib.CfnRule","version":"2.239.0"}}}},"Tree":{"id":"Tree","path":"Tree","constructInfo":{"fqn":"constructs.Construct","version":"10.5.1"}}}}}
|
|
@@ -37,7 +37,7 @@ const props = {
|
|
|
37
37
|
lambdaFunctionProps: {
|
|
38
38
|
runtime: defaults.COMMERCIAL_REGION_LAMBDA_NODE_RUNTIME,
|
|
39
39
|
handler: "index.handler",
|
|
40
|
-
code: lambda.
|
|
40
|
+
code: new lambda.InlineCode('exports.handler = async (event) => { console.log(event); return {statusCode: 200, body: ""}; }'),
|
|
41
41
|
},
|
|
42
42
|
secretProps: {
|
|
43
43
|
removalPolicy: aws_cdk_lib_1.RemovalPolicy.DESTROY
|
|
@@ -50,4 +50,4 @@ defaults.suppressCustomHandlerCfnNagWarnings(stack, 'Custom::VpcRestrictDefaultS
|
|
|
50
50
|
new integ_tests_alpha_1.IntegTest(stack, 'Integ', { testCases: [
|
|
51
51
|
stack
|
|
52
52
|
] });
|
|
53
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
53
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":"
|
|
1
|
+
{"version":"50.0.0"}
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
{
|
|
2
|
-
"version": "
|
|
2
|
+
"version": "50.0.0",
|
|
3
3
|
"testCases": {
|
|
4
4
|
"lamsec-deployFunctionWithExistingVpc/Integ/DefaultTest": {
|
|
5
5
|
"stacks": [
|
|
@@ -9,5 +9,5 @@
|
|
|
9
9
|
"assertionStackName": "lamsecdeployFunctionWithExistingVpcIntegDefaultTestDeployAssert647243A7"
|
|
10
10
|
}
|
|
11
11
|
},
|
|
12
|
-
"minimumCliVersion": "2.
|
|
12
|
+
"minimumCliVersion": "2.1105.0"
|
|
13
13
|
}
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
{
|
|
2
|
-
"version": "
|
|
2
|
+
"version": "50.0.0",
|
|
3
3
|
"files": {
|
|
4
4
|
"7fa1e366ee8a9ded01fc355f704cff92bfd179574e6f9cfee800a3541df1b200": {
|
|
5
5
|
"displayName": "lamsec-deployFunctionWithExistingVpc/Custom::VpcRestrictDefaultSGCustomResourceProvider Code",
|
|
@@ -15,30 +15,16 @@
|
|
|
15
15
|
}
|
|
16
16
|
}
|
|
17
17
|
},
|
|
18
|
-
"
|
|
19
|
-
"displayName": "test-lambda-secretsmanager-stack/LambdaFunction/Code",
|
|
20
|
-
"source": {
|
|
21
|
-
"path": "asset.a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c",
|
|
22
|
-
"packaging": "zip"
|
|
23
|
-
},
|
|
24
|
-
"destinations": {
|
|
25
|
-
"current_account-current_region-d11fcfce": {
|
|
26
|
-
"bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
|
|
27
|
-
"objectKey": "a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c.zip",
|
|
28
|
-
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
|
|
29
|
-
}
|
|
30
|
-
}
|
|
31
|
-
},
|
|
32
|
-
"66b2b238681362c16bfb788c6d5e1ea266ca5efedeadf33e60e9ba58a6048332": {
|
|
18
|
+
"92e1d90254980224b848f19b3ada6e7902424bc9fa3f6d13d18adcfa531fb57b": {
|
|
33
19
|
"displayName": "lamsec-deployFunctionWithExistingVpc Template",
|
|
34
20
|
"source": {
|
|
35
21
|
"path": "lamsec-deployFunctionWithExistingVpc.template.json",
|
|
36
22
|
"packaging": "file"
|
|
37
23
|
},
|
|
38
24
|
"destinations": {
|
|
39
|
-
"current_account-current_region-
|
|
25
|
+
"current_account-current_region-d19f2345": {
|
|
40
26
|
"bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
|
|
41
|
-
"objectKey": "
|
|
27
|
+
"objectKey": "92e1d90254980224b848f19b3ada6e7902424bc9fa3f6d13d18adcfa531fb57b.json",
|
|
42
28
|
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
|
|
43
29
|
}
|
|
44
30
|
}
|
|
@@ -841,10 +841,7 @@
|
|
|
841
841
|
"Type": "AWS::Lambda::Function",
|
|
842
842
|
"Properties": {
|
|
843
843
|
"Code": {
|
|
844
|
-
"
|
|
845
|
-
"Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
|
|
846
|
-
},
|
|
847
|
-
"S3Key": "a0c6248ec595d3ceec1177aa5ac5b494fdf4c66f1b88aa48086befd44f193d8c.zip"
|
|
844
|
+
"ZipFile": "exports.handler = async (event) => { console.log(event); return {statusCode: 200, body: \"\"}; }"
|
|
848
845
|
},
|
|
849
846
|
"Environment": {
|
|
850
847
|
"Variables": {
|