@aws-solutions-constructs/aws-lambda-sns 2.80.0 → 2.81.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (24) hide show
  1. package/.jsii +43 -4
  2. package/lib/index.js +1 -1
  3. package/package.json +6 -6
  4. package/test/integ.lamsns-deployFunction.js.snapshot/cdk.out +1 -1
  5. package/test/integ.lamsns-deployFunction.js.snapshot/integ.json +1 -1
  6. package/test/integ.lamsns-deployFunction.js.snapshot/lamsns-deployFunction.assets.json +3 -3
  7. package/test/integ.lamsns-deployFunction.js.snapshot/lamsns-deployFunction.template.json +24 -18
  8. package/test/integ.lamsns-deployFunction.js.snapshot/lamsnsdeployFunctionIntegDefaultTestDeployAssert36FE5D09.assets.json +1 -1
  9. package/test/integ.lamsns-deployFunction.js.snapshot/manifest.json +190 -3
  10. package/test/integ.lamsns-deployFunction.js.snapshot/tree.json +1 -474
  11. package/test/integ.lamsns-deployFunctionWithVpc.js.snapshot/cdk.out +1 -1
  12. package/test/integ.lamsns-deployFunctionWithVpc.js.snapshot/integ.json +1 -1
  13. package/test/integ.lamsns-deployFunctionWithVpc.js.snapshot/lamsns-deployFunctionWithVpc.assets.json +3 -3
  14. package/test/integ.lamsns-deployFunctionWithVpc.js.snapshot/lamsns-deployFunctionWithVpc.template.json +29 -3
  15. package/test/integ.lamsns-deployFunctionWithVpc.js.snapshot/lamsnsdeployFunctionWithVpcIntegDefaultTestDeployAssertEDF33408.assets.json +1 -1
  16. package/test/integ.lamsns-deployFunctionWithVpc.js.snapshot/manifest.json +52 -13
  17. package/test/integ.lamsns-deployFunctionWithVpc.js.snapshot/tree.json +1 -1412
  18. package/test/integ.lamsns-existingFunction.js.snapshot/cdk.out +1 -1
  19. package/test/integ.lamsns-existingFunction.js.snapshot/integ.json +1 -1
  20. package/test/integ.lamsns-existingFunction.js.snapshot/lamsns-existingFunction.assets.json +3 -3
  21. package/test/integ.lamsns-existingFunction.js.snapshot/lamsns-existingFunction.template.json +24 -18
  22. package/test/integ.lamsns-existingFunction.js.snapshot/lamsnsexistingFunctionIntegDefaultTestDeployAssert733AE3CB.assets.json +1 -1
  23. package/test/integ.lamsns-existingFunction.js.snapshot/manifest.json +190 -3
  24. package/test/integ.lamsns-existingFunction.js.snapshot/tree.json +1 -474
@@ -1 +1 @@
1
- {"version":"36.0.0"}
1
+ {"version":"40.0.0"}
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "36.0.0",
2
+ "version": "40.0.0",
3
3
  "testCases": {
4
4
  "lamsns-existingFunction/Integ/DefaultTest": {
5
5
  "stacks": [
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "36.0.0",
2
+ "version": "40.0.0",
3
3
  "files": {
4
4
  "0904d3723480fed2daf7885caa427b930881caae6879d1e6b0d395020173ef6f": {
5
5
  "source": {
@@ -14,7 +14,7 @@
14
14
  }
15
15
  }
16
16
  },
17
- "6ed22a45aa0769a9afa2bcd1b2492496e7bfb00aaa648c4f2a361bd6a483370e": {
17
+ "b5e7554e6051534cc885a930e672a10ca12e942cdb5b1e4873c5ec9383cb1575": {
18
18
  "source": {
19
19
  "path": "lamsns-existingFunction.template.json",
20
20
  "packaging": "file"
@@ -22,7 +22,7 @@
22
22
  "destinations": {
23
23
  "current_account-current_region": {
24
24
  "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
25
- "objectKey": "6ed22a45aa0769a9afa2bcd1b2492496e7bfb00aaa648c4f2a361bd6a483370e.json",
25
+ "objectKey": "b5e7554e6051534cc885a930e672a10ca12e942cdb5b1e4873c5ec9383cb1575.json",
26
26
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
27
27
  }
28
28
  }
@@ -68,14 +68,6 @@
68
68
  "Properties": {
69
69
  "PolicyDocument": {
70
70
  "Statement": [
71
- {
72
- "Action": [
73
- "xray:PutTelemetryRecords",
74
- "xray:PutTraceSegments"
75
- ],
76
- "Effect": "Allow",
77
- "Resource": "*"
78
- },
79
71
  {
80
72
  "Action": "sns:Publish",
81
73
  "Effect": "Allow",
@@ -92,16 +84,6 @@
92
84
  "Ref": "LambdaFunctionServiceRole0C4CDE0B"
93
85
  }
94
86
  ]
95
- },
96
- "Metadata": {
97
- "cfn_nag": {
98
- "rules_to_suppress": [
99
- {
100
- "id": "W12",
101
- "reason": "Lambda needs the following minimum required permissions to send trace data to X-Ray and access ENIs in a VPC."
102
- }
103
- ]
104
- }
105
87
  }
106
88
  },
107
89
  "LambdaFunctionBF21E41F": {
@@ -162,6 +144,30 @@
162
144
  }
163
145
  }
164
146
  },
147
+ "LambdaFunctioninlinePolicyAddedToExecutionRole007875684": {
148
+ "Type": "AWS::IAM::Policy",
149
+ "Properties": {
150
+ "PolicyDocument": {
151
+ "Statement": [
152
+ {
153
+ "Action": [
154
+ "xray:PutTelemetryRecords",
155
+ "xray:PutTraceSegments"
156
+ ],
157
+ "Effect": "Allow",
158
+ "Resource": "*"
159
+ }
160
+ ],
161
+ "Version": "2012-10-17"
162
+ },
163
+ "PolicyName": "LambdaFunctioninlinePolicyAddedToExecutionRole007875684",
164
+ "Roles": [
165
+ {
166
+ "Ref": "LambdaFunctionServiceRole0C4CDE0B"
167
+ }
168
+ ]
169
+ }
170
+ },
165
171
  "testlambdasnsSnsTopic57DFED98": {
166
172
  "Type": "AWS::SNS::Topic",
167
173
  "Properties": {
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "36.0.0",
2
+ "version": "40.0.0",
3
3
  "files": {
4
4
  "21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22": {
5
5
  "source": {
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "36.0.0",
2
+ "version": "42.0.0",
3
3
  "artifacts": {
4
4
  "lamsnsexistingFunctionIntegDefaultTestDeployAssert733AE3CB.assets": {
5
5
  "type": "cdk:asset-manifest",
@@ -66,7 +66,7 @@
66
66
  "validateOnSynth": false,
67
67
  "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
68
68
  "cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
69
- "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/6ed22a45aa0769a9afa2bcd1b2492496e7bfb00aaa648c4f2a361bd6a483370e.json",
69
+ "stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/b5e7554e6051534cc885a930e672a10ca12e942cdb5b1e4873c5ec9383cb1575.json",
70
70
  "requiresBootstrapStackVersion": 6,
71
71
  "bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
72
72
  "additionalDependencies": [
@@ -82,30 +82,216 @@
82
82
  "lamsns-existingFunction.assets"
83
83
  ],
84
84
  "metadata": {
85
+ "/lamsns-existingFunction/LambdaFunctionServiceRole": [
86
+ {
87
+ "type": "aws:cdk:analytics:construct",
88
+ "data": {
89
+ "assumedBy": {
90
+ "principalAccount": "*",
91
+ "assumeRoleAction": "*"
92
+ },
93
+ "inlinePolicies": "*"
94
+ }
95
+ },
96
+ {
97
+ "type": "aws:cdk:analytics:method",
98
+ "data": {
99
+ "attachInlinePolicy": [
100
+ "*"
101
+ ]
102
+ }
103
+ },
104
+ {
105
+ "type": "aws:cdk:analytics:method",
106
+ "data": {
107
+ "attachInlinePolicy": [
108
+ "*"
109
+ ]
110
+ }
111
+ },
112
+ {
113
+ "type": "aws:cdk:analytics:method",
114
+ "data": {
115
+ "addToPrincipalPolicy": [
116
+ {}
117
+ ]
118
+ }
119
+ },
120
+ {
121
+ "type": "aws:cdk:analytics:method",
122
+ "data": {
123
+ "attachInlinePolicy": [
124
+ "*"
125
+ ]
126
+ }
127
+ },
128
+ {
129
+ "type": "aws:cdk:analytics:method",
130
+ "data": {
131
+ "attachInlinePolicy": [
132
+ "*"
133
+ ]
134
+ }
135
+ }
136
+ ],
137
+ "/lamsns-existingFunction/LambdaFunctionServiceRole/ImportLambdaFunctionServiceRole": [
138
+ {
139
+ "type": "aws:cdk:analytics:construct",
140
+ "data": "*"
141
+ }
142
+ ],
85
143
  "/lamsns-existingFunction/LambdaFunctionServiceRole/Resource": [
86
144
  {
87
145
  "type": "aws:cdk:logicalId",
88
146
  "data": "LambdaFunctionServiceRole0C4CDE0B"
89
147
  }
90
148
  ],
149
+ "/lamsns-existingFunction/LambdaFunctionServiceRole/DefaultPolicy": [
150
+ {
151
+ "type": "aws:cdk:analytics:construct",
152
+ "data": "*"
153
+ },
154
+ {
155
+ "type": "aws:cdk:analytics:method",
156
+ "data": {
157
+ "attachToRole": [
158
+ "*"
159
+ ]
160
+ }
161
+ },
162
+ {
163
+ "type": "aws:cdk:analytics:method",
164
+ "data": {
165
+ "attachToRole": [
166
+ "*"
167
+ ]
168
+ }
169
+ },
170
+ {
171
+ "type": "aws:cdk:analytics:method",
172
+ "data": {
173
+ "addStatements": [
174
+ {}
175
+ ]
176
+ }
177
+ }
178
+ ],
91
179
  "/lamsns-existingFunction/LambdaFunctionServiceRole/DefaultPolicy/Resource": [
92
180
  {
93
181
  "type": "aws:cdk:logicalId",
94
182
  "data": "LambdaFunctionServiceRoleDefaultPolicy126C8897"
95
183
  }
96
184
  ],
185
+ "/lamsns-existingFunction/LambdaFunction": [
186
+ {
187
+ "type": "aws:cdk:analytics:construct",
188
+ "data": {
189
+ "role": "*",
190
+ "tracing": "Active",
191
+ "runtime": "*",
192
+ "handler": "*",
193
+ "code": "*"
194
+ }
195
+ },
196
+ {
197
+ "type": "aws:cdk:analytics:method",
198
+ "data": {
199
+ "addEnvironment": [
200
+ "*",
201
+ "*",
202
+ {
203
+ "removeInEdge": true
204
+ }
205
+ ]
206
+ }
207
+ },
208
+ {
209
+ "type": "aws:cdk:analytics:method",
210
+ "data": {
211
+ "addEnvironment": [
212
+ "*",
213
+ "*"
214
+ ]
215
+ }
216
+ },
217
+ {
218
+ "type": "aws:cdk:analytics:method",
219
+ "data": {
220
+ "addEnvironment": [
221
+ "*",
222
+ "*"
223
+ ]
224
+ }
225
+ }
226
+ ],
97
227
  "/lamsns-existingFunction/LambdaFunction/Resource": [
98
228
  {
99
229
  "type": "aws:cdk:logicalId",
100
230
  "data": "LambdaFunctionBF21E41F"
101
231
  }
102
232
  ],
233
+ "/lamsns-existingFunction/LambdaFunction/inlinePolicyAddedToExecutionRole-0": [
234
+ {
235
+ "type": "aws:cdk:analytics:construct",
236
+ "data": {
237
+ "statements": "*"
238
+ }
239
+ },
240
+ {
241
+ "type": "aws:cdk:analytics:method",
242
+ "data": {
243
+ "addStatements": [
244
+ {}
245
+ ]
246
+ }
247
+ },
248
+ {
249
+ "type": "aws:cdk:analytics:method",
250
+ "data": {
251
+ "attachToRole": [
252
+ "*"
253
+ ]
254
+ }
255
+ },
256
+ {
257
+ "type": "aws:cdk:analytics:method",
258
+ "data": {
259
+ "attachToRole": [
260
+ "*"
261
+ ]
262
+ }
263
+ }
264
+ ],
265
+ "/lamsns-existingFunction/LambdaFunction/inlinePolicyAddedToExecutionRole-0/Resource": [
266
+ {
267
+ "type": "aws:cdk:logicalId",
268
+ "data": "LambdaFunctioninlinePolicyAddedToExecutionRole007875684"
269
+ }
270
+ ],
271
+ "/lamsns-existingFunction/test-lambda-sns/SnsTopic": [
272
+ {
273
+ "type": "aws:cdk:analytics:construct",
274
+ "data": {
275
+ "masterKey": "*"
276
+ }
277
+ }
278
+ ],
103
279
  "/lamsns-existingFunction/test-lambda-sns/SnsTopic/Resource": [
104
280
  {
105
281
  "type": "aws:cdk:logicalId",
106
282
  "data": "testlambdasnsSnsTopic57DFED98"
107
283
  }
108
284
  ],
285
+ "/lamsns-existingFunction/test-lambda-sns/SnsTopic/Policy": [
286
+ {
287
+ "type": "aws:cdk:analytics:construct",
288
+ "data": {
289
+ "topics": [
290
+ "*"
291
+ ]
292
+ }
293
+ }
294
+ ],
109
295
  "/lamsns-existingFunction/test-lambda-sns/SnsTopic/Policy/Resource": [
110
296
  {
111
297
  "type": "aws:cdk:logicalId",
@@ -133,5 +319,6 @@
133
319
  "file": "tree.json"
134
320
  }
135
321
  }
136
- }
322
+ },
323
+ "minimumCliVersion": "2.1006.0"
137
324
  }