diff --git a/.tool-versions b/.tool-versions index 4c23a48c..4a18a5c2 100644 --- a/.tool-versions +++ b/.tool-versions @@ -1,3 +1,3 @@ golang 1.22.3 yarn 1.22.19 -nodejs 20.12.2 \ No newline at end of file +nodejs 20.15.1 \ No newline at end of file diff --git a/lambda/__snapshots__/handler_secret_env_test.snap b/lambda/__snapshots__/handler_secret_env_test.snap index 8f3f2bb3..1cea2875 100755 --- a/lambda/__snapshots__/handler_secret_env_test.snap +++ b/lambda/__snapshots__/handler_secret_env_test.snap @@ -12,6 +12,7 @@ main.putSecretValueInputNotSecure{ _: struct {}{}, ClientRequestToken: &"../test-secrets/dotenv/encrypted-best-secret", + RotationToken: (*string)(nil), SecretBinary: nil, SecretId: &"arn:aws:secretsmanager:eu-central-1:123456789012:secret:testsecret", SecretString: &"banane=yellow\ncrypt=\"ajkscbuiuXA34%%&&=\n", @@ -46,6 +47,7 @@ nil main.putSecretValueInputNotSecure{ _: struct {}{}, ClientRequestToken: &"../test-secrets/dotenv/encrypted-best-secret", + RotationToken: (*string)(nil), SecretBinary: nil, SecretId: &"arn:aws:secretsmanager:eu-central-1:123456789012:secret:testsecret", SecretString: &"{\n \"banane\": \"yellow\",\n \"crypt\": \"\\\"ajkscbuiuXA34%%\\u0026\\u0026=\"\n}", diff --git a/lambda/__snapshots__/handler_secret_json_test.snap b/lambda/__snapshots__/handler_secret_json_test.snap index 372c0ded..9985d9c5 100755 --- a/lambda/__snapshots__/handler_secret_json_test.snap +++ b/lambda/__snapshots__/handler_secret_json_test.snap @@ -12,6 +12,7 @@ main.putSecretValueInputNotSecure{ _: struct {}{}, ClientRequestToken: &"../test-secrets/json/sopsfile.enc-age", + RotationToken: (*string)(nil), SecretBinary: nil, SecretId: &"arn:aws:secretsmanager:eu-central-1:123456789012:secret:testsecret", SecretString: &"{\n \"key1\": \"value1\",\n \"key2\": 12345,\n \"key3\": false\n}", @@ -46,6 +47,7 @@ nil main.putSecretValueInputNotSecure{ _: struct {}{}, ClientRequestToken: &"../test-secrets/json/sopsfile-complex.enc-age", + RotationToken: (*string)(nil), SecretBinary: nil, SecretId: &"arn:aws:secretsmanager:eu-central-1:123456789012:secret:testsecret", SecretString: &"{\n \"and now\": {\n \"some\": [\n {\n \"basic\": false\n },\n {\n \"nested\": 12345\n },\n {\n \"type\": 1.2345\n },\n {\n \"tests\": \"Finish!\"\n }\n ]\n },\n \"some\": {\n \"deep\": {\n \"nested\": {\n \"arrays\": [\n \"with\",\n \"several\",\n {\n \"values\": {\n \"and\": \"objects\"\n }\n }\n ],\n \"object\": \"structure\"\n }\n },\n \"notsodeep\": \"struct\"\n }\n}", @@ -80,6 +82,7 @@ nil main.putSecretValueInputNotSecure{ _: struct {}{}, ClientRequestToken: &"../test-secrets/json/sopsfile-complex.enc-age", + RotationToken: (*string)(nil), SecretBinary: nil, SecretId: &"arn:aws:secretsmanager:eu-central-1:123456789012:secret:testsecret", SecretString: &"{\n \"and now\": {\n \"some\": [\n {\n \"basic\": \"false\"\n },\n {\n \"nested\": \"12345\"\n },\n {\n \"type\": \"1.2345\"\n },\n {\n \"tests\": \"Finish!\"\n }\n ]\n },\n \"some\": {\n \"deep\": {\n \"nested\": {\n \"arrays\": [\n \"with\",\n \"several\",\n {\n \"values\": {\n \"and\": \"objects\"\n }\n }\n ],\n \"object\": \"structure\"\n }\n },\n \"notsodeep\": \"struct\"\n }\n}", @@ -114,6 +117,7 @@ nil main.putSecretValueInputNotSecure{ _: struct {}{}, ClientRequestToken: &"../test-secrets/json/sopsfile-complex.enc-age", + RotationToken: (*string)(nil), SecretBinary: nil, SecretId: &"arn:aws:secretsmanager:eu-central-1:123456789012:secret:testsecret", SecretString: &"{\n \"and now.some[0].basic\": false,\n \"and now.some[1].nested\": 12345,\n \"and now.some[2].type\": 1.2345,\n \"and now.some[3].tests\": \"Finish!\",\n \"some.deep.nested.arrays[0]\": \"with\",\n \"some.deep.nested.arrays[1]\": \"several\",\n \"some.deep.nested.arrays[2].values.and\": \"objects\",\n \"some.deep.nested.object\": \"structure\",\n \"some.notsodeep\": \"struct\"\n}", @@ -140,6 +144,7 @@ nil main.putSecretValueInputNotSecure{ _: struct {}{}, ClientRequestToken: &"MyHash", + RotationToken: (*string)(nil), SecretBinary: nil, SecretId: &"arn:aws:secretsmanager:eu-central-1:123456789012:secret:testsecret", SecretString: &"{\n \"key1\": \"value1\",\n \"key2\": 12345,\n \"key3\": false\n}", @@ -166,6 +171,7 @@ nil main.putSecretValueInputNotSecure{ _: struct {}{}, ClientRequestToken: &"MyHash", + RotationToken: (*string)(nil), SecretBinary: nil, SecretId: &"arn:aws:secretsmanager:eu-central-1:123456789012:secret:testsecret", SecretString: &"{\n \"and now\": {\n \"some\": [\n {\n \"basic\": false\n },\n {\n \"nested\": 12345\n },\n {\n \"type\": 1.2345\n },\n {\n \"tests\": \"Finish!\"\n }\n ]\n },\n \"some\": {\n \"deep\": {\n \"nested\": {\n \"arrays\": [\n \"with\",\n \"several\",\n {\n \"values\": {\n \"and\": \"objects\"\n }\n }\n ],\n \"object\": \"structure\"\n }\n },\n \"notsodeep\": \"struct\"\n }\n}", @@ -192,6 +198,7 @@ nil main.putSecretValueInputNotSecure{ _: struct {}{}, ClientRequestToken: &"MyHash", + RotationToken: (*string)(nil), SecretBinary: nil, SecretId: &"arn:aws:secretsmanager:eu-central-1:123456789012:secret:testsecret", SecretString: &"{\n \"and now\": {\n \"some\": [\n {\n \"basic\": \"false\"\n },\n {\n \"nested\": \"12345\"\n },\n {\n \"type\": \"1.2345\"\n },\n {\n \"tests\": \"Finish!\"\n }\n ]\n },\n \"some\": {\n \"deep\": {\n \"nested\": {\n \"arrays\": [\n \"with\",\n \"several\",\n {\n \"values\": {\n \"and\": \"objects\"\n }\n }\n ],\n \"object\": \"structure\"\n }\n },\n \"notsodeep\": \"struct\"\n }\n}", @@ -218,6 +225,7 @@ nil main.putSecretValueInputNotSecure{ _: struct {}{}, ClientRequestToken: &"MyHash", + RotationToken: (*string)(nil), SecretBinary: nil, SecretId: &"arn:aws:secretsmanager:eu-central-1:123456789012:secret:testsecret", SecretString: &"{\n \"and now.some[0].basic\": false,\n \"and now.some[1].nested\": 12345,\n \"and now.some[2].type\": 1.2345,\n \"and now.some[3].tests\": \"Finish!\",\n \"some.deep.nested.arrays[0]\": \"with\",\n \"some.deep.nested.arrays[1]\": \"several\",\n \"some.deep.nested.arrays[2].values.and\": \"objects\",\n \"some.deep.nested.object\": \"structure\",\n \"some.notsodeep\": \"struct\"\n}", diff --git a/lambda/__snapshots__/handler_secret_raw_test.snap b/lambda/__snapshots__/handler_secret_raw_test.snap index a11edd3f..b2127d7c 100755 --- a/lambda/__snapshots__/handler_secret_raw_test.snap +++ b/lambda/__snapshots__/handler_secret_raw_test.snap @@ -12,6 +12,7 @@ main.putSecretValueInputNotSecure{ _: struct {}{}, ClientRequestToken: &"../test-secrets/binary/sopsfile.enc-age", + RotationToken: (*string)(nil), SecretBinary: nil, SecretId: &"arn:aws:secretsmanager:eu-central-1:123456789012:secret:testsecret", SecretString: &"-----BEGIN RSA PRIVATE KEY-----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\n23bwNOla1k4/B10btnEzNi16/b01Kf3K4hYaicd46sLH\n-----END RSA PRIVATE KEY-----", diff --git a/lambda/__snapshots__/handler_secret_yaml_test.snap b/lambda/__snapshots__/handler_secret_yaml_test.snap index 513db30a..a09322e5 100755 --- a/lambda/__snapshots__/handler_secret_yaml_test.snap +++ b/lambda/__snapshots__/handler_secret_yaml_test.snap @@ -12,6 +12,7 @@ main.putSecretValueInputNotSecure{ _: struct {}{}, ClientRequestToken: &"../test-secrets/yaml/sopsfile.enc-age", + RotationToken: (*string)(nil), SecretBinary: nil, SecretId: &"arn:aws:secretsmanager:eu-central-1:123456789012:secret:testsecret", SecretString: &"key1: value1\nkey2: 12345\nkey3: false\n", @@ -46,6 +47,7 @@ nil main.putSecretValueInputNotSecure{ _: struct {}{}, ClientRequestToken: &"../test-secrets/yaml/sopsfile.enc-age", + RotationToken: (*string)(nil), SecretBinary: nil, SecretId: &"arn:aws:secretsmanager:eu-central-1:123456789012:secret:testsecret", SecretString: &"{\n \"key1\": \"value1\",\n \"key2\": 12345,\n \"key3\": false\n}", @@ -80,6 +82,7 @@ nil main.putSecretValueInputNotSecure{ _: struct {}{}, ClientRequestToken: &"../test-secrets/yaml/sopsfile-complex.enc-age", + RotationToken: (*string)(nil), SecretBinary: nil, SecretId: &"arn:aws:secretsmanager:eu-central-1:123456789012:secret:testsecret", SecretString: &"and now:\n some:\n - basic: false\n - nested: 12345\n - type: 1.2345\n - tests: Finish!\nsome:\n deep:\n nested:\n arrays:\n - with\n - several\n - values:\n and: objects\n object: structure\n notsodeep: struct\n", @@ -114,6 +117,7 @@ nil main.putSecretValueInputNotSecure{ _: struct {}{}, ClientRequestToken: &"../test-secrets/yaml/sopsfile-complex.enc-age", + RotationToken: (*string)(nil), SecretBinary: nil, SecretId: &"arn:aws:secretsmanager:eu-central-1:123456789012:secret:testsecret", SecretString: &"{\n \"and now\": {\n \"some\": [\n {\n \"basic\": false\n },\n {\n \"nested\": 12345\n },\n {\n \"type\": 1.2345\n },\n {\n \"tests\": \"Finish!\"\n }\n ]\n },\n \"some\": {\n \"deep\": {\n \"nested\": {\n \"arrays\": [\n \"with\",\n \"several\",\n {\n \"values\": {\n \"and\": \"objects\"\n }\n }\n ],\n \"object\": \"structure\"\n }\n },\n \"notsodeep\": \"struct\"\n }\n}", @@ -148,6 +152,7 @@ nil main.putSecretValueInputNotSecure{ _: struct {}{}, ClientRequestToken: &"../test-secrets/yaml/sopsfile-complex.enc-age", + RotationToken: (*string)(nil), SecretBinary: nil, SecretId: &"arn:aws:secretsmanager:eu-central-1:123456789012:secret:testsecret", SecretString: &"and now.some[0].basic: false\nand now.some[1].nested: 12345\nand now.some[2].type: 1.2345\nand now.some[3].tests: Finish!\nsome.deep.nested.arrays[0]: with\nsome.deep.nested.arrays[1]: several\nsome.deep.nested.arrays[2].values.and: objects\nsome.deep.nested.object: structure\nsome.notsodeep: struct\n", @@ -182,6 +187,7 @@ nil main.putSecretValueInputNotSecure{ _: struct {}{}, ClientRequestToken: &"../test-secrets/yaml/sopsfile-complex.enc-age", + RotationToken: (*string)(nil), SecretBinary: nil, SecretId: &"arn:aws:secretsmanager:eu-central-1:123456789012:secret:testsecret", SecretString: &"{\n \"and now.some[0].basic\": false,\n \"and now.some[1].nested\": 12345,\n \"and now.some[2].type\": 1.2345,\n \"and now.some[3].tests\": \"Finish!\",\n \"some.deep.nested.arrays[0]\": \"with\",\n \"some.deep.nested.arrays[1]\": \"several\",\n \"some.deep.nested.arrays[2].values.and\": \"objects\",\n \"some.deep.nested.object\": \"structure\",\n \"some.notsodeep\": \"struct\"\n}", @@ -208,6 +214,7 @@ nil main.putSecretValueInputNotSecure{ _: struct {}{}, ClientRequestToken: &"MyHash", + RotationToken: (*string)(nil), SecretBinary: nil, SecretId: &"arn:aws:secretsmanager:eu-central-1:123456789012:secret:testsecret", SecretString: &"key1: value1\nkey2: 12345\nkey3: false\n", @@ -234,6 +241,7 @@ nil main.putSecretValueInputNotSecure{ _: struct {}{}, ClientRequestToken: &"MyHash", + RotationToken: (*string)(nil), SecretBinary: nil, SecretId: &"arn:aws:secretsmanager:eu-central-1:123456789012:secret:testsecret", SecretString: &"{\n \"key1\": \"value1\",\n \"key2\": 12345,\n \"key3\": false\n}", @@ -260,6 +268,7 @@ nil main.putSecretValueInputNotSecure{ _: struct {}{}, ClientRequestToken: &"MyHash", + RotationToken: (*string)(nil), SecretBinary: nil, SecretId: &"arn:aws:secretsmanager:eu-central-1:123456789012:secret:testsecret", SecretString: &"and now:\n some:\n - basic: false\n - nested: 12345\n - type: 1.2345\n - tests: Finish!\nsome:\n deep:\n nested:\n arrays:\n - with\n - several\n - values:\n and: objects\n object: structure\n notsodeep: struct\n", @@ -294,6 +303,7 @@ nil main.putSecretValueInputNotSecure{ _: struct {}{}, ClientRequestToken: &"../test-secrets/yaml/sopsfile-complex.enc-age", + RotationToken: (*string)(nil), SecretBinary: nil, SecretId: &"arn:aws:secretsmanager:eu-central-1:123456789012:secret:testsecret", SecretString: &"{\n \"and now\": {\n \"some\": [\n {\n \"basic\": false\n },\n {\n \"nested\": 12345\n },\n {\n \"type\": 1.2345\n },\n {\n \"tests\": \"Finish!\"\n }\n ]\n },\n \"some\": {\n \"deep\": {\n \"nested\": {\n \"arrays\": [\n \"with\",\n \"several\",\n {\n \"values\": {\n \"and\": \"objects\"\n }\n }\n ],\n \"object\": \"structure\"\n }\n },\n \"notsodeep\": \"struct\"\n }\n}", @@ -320,6 +330,7 @@ nil main.putSecretValueInputNotSecure{ _: struct {}{}, ClientRequestToken: &"MyHash", + RotationToken: (*string)(nil), SecretBinary: nil, SecretId: &"arn:aws:secretsmanager:eu-central-1:123456789012:secret:testsecret", SecretString: &"and now.some[0].basic: false\nand now.some[1].nested: 12345\nand now.some[2].type: 1.2345\nand now.some[3].tests: Finish!\nsome.deep.nested.arrays[0]: with\nsome.deep.nested.arrays[1]: several\nsome.deep.nested.arrays[2].values.and: objects\nsome.deep.nested.object: structure\nsome.notsodeep: struct\n", @@ -346,6 +357,7 @@ nil main.putSecretValueInputNotSecure{ _: struct {}{}, ClientRequestToken: &"MyHash", + RotationToken: (*string)(nil), SecretBinary: nil, SecretId: &"arn:aws:secretsmanager:eu-central-1:123456789012:secret:testsecret", SecretString: &"{\n \"and now.some[0].basic\": false,\n \"and now.some[1].nested\": 12345,\n \"and now.some[2].type\": 1.2345,\n \"and now.some[3].tests\": \"Finish!\",\n \"some.deep.nested.arrays[0]\": \"with\",\n \"some.deep.nested.arrays[1]\": \"several\",\n \"some.deep.nested.arrays[2].values.and\": \"objects\",\n \"some.deep.nested.object\": \"structure\",\n \"some.notsodeep\": \"struct\"\n}", diff --git a/lambda/__snapshots__/main_test.snap b/lambda/__snapshots__/main_test.snap index bcdf957d..eddfddd3 100755 --- a/lambda/__snapshots__/main_test.snap +++ b/lambda/__snapshots__/main_test.snap @@ -37,6 +37,7 @@ main.putSecretValueInputNotSecure{ _: struct {}{}, ClientRequestToken: &"4547532a137611d83958d17095c6c2d38ae0036a760c3b79c9dd5957d1c20cf2.yaml", + RotationToken: (*string)(nil), SecretBinary: nil, SecretId: &"arn:${Partition}:secretsmanager:${Region}:${Account}:secret:${SecretId}", SecretString: &"some-secret-data", diff --git a/lambda/go.mod b/lambda/go.mod index 8fb84455..c15eed2c 100644 --- a/lambda/go.mod +++ b/lambda/go.mod @@ -4,10 +4,10 @@ go 1.22.3 require ( github.com/aws/aws-lambda-go v1.47.0 - github.com/aws/aws-sdk-go v1.53.21 + github.com/aws/aws-sdk-go v1.55.5 github.com/getsops/sops/v3 v3.9.0 - github.com/gkampitakis/go-snaps v0.5.4 - github.com/go-test/deep v1.1.0 + github.com/gkampitakis/go-snaps v0.5.6 + github.com/go-test/deep v1.1.1 gopkg.in/yaml.v3 v3.0.1 ) diff --git a/lambda/go.sum b/lambda/go.sum index 51556fe0..44f57233 100644 --- a/lambda/go.sum +++ b/lambda/go.sum @@ -45,8 +45,8 @@ github.com/ProtonMail/go-crypto v1.1.0-alpha.3-proton h1:0RXAi0EJFs81j+MMsqvHNuA github.com/ProtonMail/go-crypto v1.1.0-alpha.3-proton/go.mod h1:rA3QumHc/FZ8pAHreoekgiAbzpNsfQAosU5td4SnOrE= github.com/aws/aws-lambda-go v1.47.0 h1:0H8s0vumYx/YKs4sE7YM0ktwL2eWse+kfopsRI1sXVI= github.com/aws/aws-lambda-go v1.47.0/go.mod h1:dpMpZgvWx5vuQJfBt0zqBha60q7Dd7RfgJv23DymV8A= -github.com/aws/aws-sdk-go v1.53.21 h1:vAXk3mJQqveg1H3uZaUBaGXrKWa97hc9zBhudsDZugA= -github.com/aws/aws-sdk-go v1.53.21/go.mod h1:LF8svs817+Nz+DmiMQKTO3ubZ/6IaTpq3TjupRn3Eqk= +github.com/aws/aws-sdk-go v1.55.5 h1:KKUZBfBoyqy5d3swXyiC7Q76ic40rYcbqH7qjh59kzU= +github.com/aws/aws-sdk-go v1.55.5/go.mod h1:eRwEWoyTWFMVYVQzKMNHWP5/RV4xIUGMQfXQHfHkpNU= github.com/aws/aws-sdk-go-v2 v1.30.0 h1:6qAwtzlfcTtcL8NHtbDQAqgM5s6NDipQTkPxyH/6kAA= github.com/aws/aws-sdk-go-v2 v1.30.0/go.mod h1:ffIFB97e2yNsv4aTSGkqtHnppsIJzw7G7BReUZ3jCXM= github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.6.2 h1:x6xsQXGSmW6frevwDA+vi/wqhp1ct18mVXYN08/93to= @@ -130,8 +130,8 @@ github.com/gkampitakis/ciinfo v0.3.0 h1:gWZlOC2+RYYttL0hBqcoQhM7h1qNkVqvRCV1fOvp github.com/gkampitakis/ciinfo v0.3.0/go.mod h1:1NIwaOcFChN4fa/B0hEBdAb6npDlFL8Bwx4dfRLRqAo= github.com/gkampitakis/go-diff v1.3.2 h1:Qyn0J9XJSDTgnsgHRdz9Zp24RaJeKMUHg2+PDZZdC4M= github.com/gkampitakis/go-diff v1.3.2/go.mod h1:LLgOrpqleQe26cte8s36HTWcTmMEur6OPYerdAAS9tk= -github.com/gkampitakis/go-snaps v0.5.4 h1:GX+dkKmVsRenz7SoTbdIEL4KQARZctkMiZ8ZKprRwT8= -github.com/gkampitakis/go-snaps v0.5.4/go.mod h1:ZABkO14uCuVxBHAXAfKG+bqNz+aa1bGPAg8jkI0Nk8Y= +github.com/gkampitakis/go-snaps v0.5.6 h1:kAal5JbqTycI+6xeS3K0nPqvNDAxqKX5W3dRXKxIJpA= +github.com/gkampitakis/go-snaps v0.5.6/go.mod h1:ZABkO14uCuVxBHAXAfKG+bqNz+aa1bGPAg8jkI0Nk8Y= github.com/go-jose/go-jose/v4 v4.0.2 h1:R3l3kkBds16bO7ZFAEEcofK0MkrAJt3jlJznWZG0nvk= github.com/go-jose/go-jose/v4 v4.0.2/go.mod h1:WVf9LFMHh/QVrmqrOfqun0C45tMe3RoiKJMPvgWwLfY= github.com/go-logr/logr v1.2.2/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A= @@ -139,8 +139,8 @@ github.com/go-logr/logr v1.4.2 h1:6pFjapn8bFcIbiKo3XT4j/BhANplGihG6tvd+8rYgrY= github.com/go-logr/logr v1.4.2/go.mod h1:9T104GzyrTigFIr8wt5mBrctHMim0Nb2HLGrmQ40KvY= github.com/go-logr/stdr v1.2.2 h1:hSWxHoqTgW2S2qGc0LTAI563KZ5YKYRhT3MFKZMbjag= github.com/go-logr/stdr v1.2.2/go.mod h1:mMo/vtBO5dYbehREoey6XUKy/eSumjCCveDpRre4VKE= -github.com/go-test/deep v1.1.0 h1:WOcxcdHcvdgThNXjw0t76K42FXTU7HpNQWHpA2HHNlg= -github.com/go-test/deep v1.1.0/go.mod h1:5C2ZWiW0ErCdrYzpqxLbTX7MG14M9iiw8DgHncVwcsE= +github.com/go-test/deep v1.1.1 h1:0r/53hagsehfO4bzD2Pgr/+RgHqhmf+k1Bpse2cTu1U= +github.com/go-test/deep v1.1.1/go.mod h1:5C2ZWiW0ErCdrYzpqxLbTX7MG14M9iiw8DgHncVwcsE= github.com/go-viper/mapstructure/v2 v2.0.0 h1:dhn8MZ1gZ0mzeodTG3jt5Vj/o87xZKuNAprG2mQfMfc= github.com/go-viper/mapstructure/v2 v2.0.0/go.mod h1:oJDH3BJKyqBA2TXFhDsKDGDTlndYOZ6rGS0BRZIxGhM= github.com/gogo/protobuf v1.3.2 h1:Ov1cvc58UF3b5XjBnZv7+opcTcQFZebYjWzi34vdm4Q= diff --git a/test/secret-asset.integ.snapshot/SecretIntegrationAsset.assets.json b/test/secret-asset.integ.snapshot/SecretIntegrationAsset.assets.json index 1fb4fbdb..1977d597 100644 --- a/test/secret-asset.integ.snapshot/SecretIntegrationAsset.assets.json +++ b/test/secret-asset.integ.snapshot/SecretIntegrationAsset.assets.json @@ -1,15 +1,15 @@ { "version": "36.0.0", "files": { - "aa78a3fb6ae0b9a57e128f4e8a8635d7e303917e9c7c4c7f0b8ed0a1d3454add": { + "b7c50a3434ecf34da702feaa89e97ff27caa94bfd416feeea0e3f55682836b41": { "source": { - "path": "asset.aa78a3fb6ae0b9a57e128f4e8a8635d7e303917e9c7c4c7f0b8ed0a1d3454add.zip", + "path": "asset.b7c50a3434ecf34da702feaa89e97ff27caa94bfd416feeea0e3f55682836b41.zip", "packaging": "file" }, "destinations": { "current_account-current_region": { "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}", - "objectKey": "aa78a3fb6ae0b9a57e128f4e8a8635d7e303917e9c7c4c7f0b8ed0a1d3454add.zip", + "objectKey": "b7c50a3434ecf34da702feaa89e97ff27caa94bfd416feeea0e3f55682836b41.zip", "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}" } } @@ -79,7 +79,7 @@ } } }, - "5c2e1da953d9f0f5873b195892bb95059e606fcd2d1cd8af7455a05e6d880fcd": { + "aff7a4caa6364c14b174f47d6f89c5548ee0f3d3edb126625196f9a1aa8f2c6a": { "source": { "path": "SecretIntegrationAsset.template.json", "packaging": "file" @@ -87,7 +87,7 @@ "destinations": { "current_account-current_region": { "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}", - "objectKey": "5c2e1da953d9f0f5873b195892bb95059e606fcd2d1cd8af7455a05e6d880fcd.json", + "objectKey": "aff7a4caa6364c14b174f47d6f89c5548ee0f3d3edb126625196f9a1aa8f2c6a.json", "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}" } } diff --git a/test/secret-asset.integ.snapshot/SecretIntegrationAsset.template.json b/test/secret-asset.integ.snapshot/SecretIntegrationAsset.template.json index a6061c3b..a14584e4 100644 --- a/test/secret-asset.integ.snapshot/SecretIntegrationAsset.template.json +++ b/test/secret-asset.integ.snapshot/SecretIntegrationAsset.template.json @@ -232,7 +232,7 @@ "S3Bucket": { "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}" }, - "S3Key": "aa78a3fb6ae0b9a57e128f4e8a8635d7e303917e9c7c4c7f0b8ed0a1d3454add.zip" + "S3Key": "b7c50a3434ecf34da702feaa89e97ff27caa94bfd416feeea0e3f55682836b41.zip" }, "Environment": { "Variables": { diff --git a/test/secret-inline.integ.snapshot/SecretIntegrationInline.assets.json b/test/secret-inline.integ.snapshot/SecretIntegrationInline.assets.json index 2b80483a..9ceb4018 100644 --- a/test/secret-inline.integ.snapshot/SecretIntegrationInline.assets.json +++ b/test/secret-inline.integ.snapshot/SecretIntegrationInline.assets.json @@ -1,20 +1,20 @@ { "version": "36.0.0", "files": { - "aa78a3fb6ae0b9a57e128f4e8a8635d7e303917e9c7c4c7f0b8ed0a1d3454add": { + "b7c50a3434ecf34da702feaa89e97ff27caa94bfd416feeea0e3f55682836b41": { "source": { - "path": "asset.aa78a3fb6ae0b9a57e128f4e8a8635d7e303917e9c7c4c7f0b8ed0a1d3454add.zip", + "path": "asset.b7c50a3434ecf34da702feaa89e97ff27caa94bfd416feeea0e3f55682836b41.zip", "packaging": "file" }, "destinations": { "current_account-current_region": { "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}", - "objectKey": "aa78a3fb6ae0b9a57e128f4e8a8635d7e303917e9c7c4c7f0b8ed0a1d3454add.zip", + "objectKey": "b7c50a3434ecf34da702feaa89e97ff27caa94bfd416feeea0e3f55682836b41.zip", "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}" } } }, - "4fe62bcbe345866da72d953588d9027c052441243a618b04299f388eceb36ddf": { + "d73979929a48c0d0fa477c040de543344bb5c6ba004fc1950e3b342d9aff2fa3": { "source": { "path": "SecretIntegrationInline.template.json", "packaging": "file" @@ -22,7 +22,7 @@ "destinations": { "current_account-current_region": { "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}", - "objectKey": "4fe62bcbe345866da72d953588d9027c052441243a618b04299f388eceb36ddf.json", + "objectKey": "d73979929a48c0d0fa477c040de543344bb5c6ba004fc1950e3b342d9aff2fa3.json", "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}" } } diff --git a/test/secret-inline.integ.snapshot/SecretIntegrationInline.template.json b/test/secret-inline.integ.snapshot/SecretIntegrationInline.template.json index ecb453fc..eb07509b 100644 --- a/test/secret-inline.integ.snapshot/SecretIntegrationInline.template.json +++ b/test/secret-inline.integ.snapshot/SecretIntegrationInline.template.json @@ -199,7 +199,7 @@ "S3Bucket": { "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}" }, - "S3Key": "aa78a3fb6ae0b9a57e128f4e8a8635d7e303917e9c7c4c7f0b8ed0a1d3454add.zip" + "S3Key": "b7c50a3434ecf34da702feaa89e97ff27caa94bfd416feeea0e3f55682836b41.zip" }, "Environment": { "Variables": { diff --git a/test/secret-manual.integ.snapshot/SecretIntegrationAsset.assets.json b/test/secret-manual.integ.snapshot/SecretIntegrationAsset.assets.json index d2235c91..6c3eb3c0 100644 --- a/test/secret-manual.integ.snapshot/SecretIntegrationAsset.assets.json +++ b/test/secret-manual.integ.snapshot/SecretIntegrationAsset.assets.json @@ -1,20 +1,20 @@ { "version": "36.0.0", "files": { - "aa78a3fb6ae0b9a57e128f4e8a8635d7e303917e9c7c4c7f0b8ed0a1d3454add": { + "b7c50a3434ecf34da702feaa89e97ff27caa94bfd416feeea0e3f55682836b41": { "source": { - "path": "asset.aa78a3fb6ae0b9a57e128f4e8a8635d7e303917e9c7c4c7f0b8ed0a1d3454add.zip", + "path": "asset.b7c50a3434ecf34da702feaa89e97ff27caa94bfd416feeea0e3f55682836b41.zip", "packaging": "file" }, "destinations": { "current_account-current_region": { "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}", - "objectKey": "aa78a3fb6ae0b9a57e128f4e8a8635d7e303917e9c7c4c7f0b8ed0a1d3454add.zip", + "objectKey": "b7c50a3434ecf34da702feaa89e97ff27caa94bfd416feeea0e3f55682836b41.zip", "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}" } } }, - "2ece4e668a1ee44f25dab924fdc363ff012d148332cd14eb8423a270c4d38f27": { + "4f4f7f6d9f11a8e7c3cb43640f53826f069d6d4e9274e49cd544826328ef13ad": { "source": { "path": "SecretIntegrationAsset.template.json", "packaging": "file" @@ -22,7 +22,7 @@ "destinations": { "current_account-current_region": { "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}", - "objectKey": "2ece4e668a1ee44f25dab924fdc363ff012d148332cd14eb8423a270c4d38f27.json", + "objectKey": "4f4f7f6d9f11a8e7c3cb43640f53826f069d6d4e9274e49cd544826328ef13ad.json", "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}" } } diff --git a/test/secret-manual.integ.snapshot/SecretIntegrationAsset.template.json b/test/secret-manual.integ.snapshot/SecretIntegrationAsset.template.json index e4cc8a46..3cedfb12 100644 --- a/test/secret-manual.integ.snapshot/SecretIntegrationAsset.template.json +++ b/test/secret-manual.integ.snapshot/SecretIntegrationAsset.template.json @@ -73,7 +73,7 @@ "S3Bucket": { "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}" }, - "S3Key": "aa78a3fb6ae0b9a57e128f4e8a8635d7e303917e9c7c4c7f0b8ed0a1d3454add.zip" + "S3Key": "b7c50a3434ecf34da702feaa89e97ff27caa94bfd416feeea0e3f55682836b41.zip" }, "Environment": { "Variables": { diff --git a/test/secret-multikms.integ.snapshot/SecretMultiKms.assets.json b/test/secret-multikms.integ.snapshot/SecretMultiKms.assets.json index c09975ab..0924a905 100644 --- a/test/secret-multikms.integ.snapshot/SecretMultiKms.assets.json +++ b/test/secret-multikms.integ.snapshot/SecretMultiKms.assets.json @@ -1,20 +1,20 @@ { "version": "36.0.0", "files": { - "aa78a3fb6ae0b9a57e128f4e8a8635d7e303917e9c7c4c7f0b8ed0a1d3454add": { + "b7c50a3434ecf34da702feaa89e97ff27caa94bfd416feeea0e3f55682836b41": { "source": { - "path": "asset.aa78a3fb6ae0b9a57e128f4e8a8635d7e303917e9c7c4c7f0b8ed0a1d3454add.zip", + "path": "asset.b7c50a3434ecf34da702feaa89e97ff27caa94bfd416feeea0e3f55682836b41.zip", "packaging": "file" }, "destinations": { "current_account-current_region": { "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}", - "objectKey": "aa78a3fb6ae0b9a57e128f4e8a8635d7e303917e9c7c4c7f0b8ed0a1d3454add.zip", + "objectKey": "b7c50a3434ecf34da702feaa89e97ff27caa94bfd416feeea0e3f55682836b41.zip", "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}" } } }, - "ded9b7259da454a3efe9572290e25ee5a78edc6426f6ab69f996b91b383537ce": { + "01b9e783c0f49006df34866b0814dfc29091108da13c67ba6e5c1b5c11e5d47c": { "source": { "path": "SecretMultiKms.template.json", "packaging": "file" @@ -22,7 +22,7 @@ "destinations": { "current_account-current_region": { "bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}", - "objectKey": "ded9b7259da454a3efe9572290e25ee5a78edc6426f6ab69f996b91b383537ce.json", + "objectKey": "01b9e783c0f49006df34866b0814dfc29091108da13c67ba6e5c1b5c11e5d47c.json", "assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}" } } diff --git a/test/secret-multikms.integ.snapshot/SecretMultiKms.template.json b/test/secret-multikms.integ.snapshot/SecretMultiKms.template.json index 3cd84b2b..661972f1 100644 --- a/test/secret-multikms.integ.snapshot/SecretMultiKms.template.json +++ b/test/secret-multikms.integ.snapshot/SecretMultiKms.template.json @@ -119,7 +119,7 @@ "S3Bucket": { "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}" }, - "S3Key": "aa78a3fb6ae0b9a57e128f4e8a8635d7e303917e9c7c4c7f0b8ed0a1d3454add.zip" + "S3Key": "b7c50a3434ecf34da702feaa89e97ff27caa94bfd416feeea0e3f55682836b41.zip" }, "Environment": { "Variables": {