Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Socket
Sign inDemoInstall

@aws-cdk/aws-secretsmanager

Package Overview
Dependencies
Maintainers
5
Versions
272
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@aws-cdk/aws-secretsmanager - npm Package Compare versions

Comparing version 1.144.0 to 1.145.0

6

.warnings.jsii.js

@@ -38,2 +38,4 @@ function _aws_cdk_aws_secretsmanager_AttachmentTargetType(p) {

}
function _aws_cdk_aws_secretsmanager_ISecretAttachmentTarget(p) {
}
function _aws_cdk_aws_secretsmanager_ResourcePolicyProps(p) {

@@ -47,4 +49,2 @@ if (p == null)

}
function _aws_cdk_aws_secretsmanager_ISecretAttachmentTarget(p) {
}
function _aws_cdk_aws_secretsmanager_ReplicaRegion(p) {

@@ -193,3 +193,3 @@ }

}
module.exports = { print, _aws_cdk_aws_secretsmanager_AttachmentTargetType, _aws_cdk_aws_secretsmanager_CfnSecretTargetAttachmentProps, _aws_cdk_aws_secretsmanager_SecretRotationApplicationOptions, _aws_cdk_aws_secretsmanager_SecretStringGenerator, _aws_cdk_aws_secretsmanager_ISecretTargetAttachment, _aws_cdk_aws_secretsmanager_SecretAttributes, _aws_cdk_aws_secretsmanager_AttachedSecretOptions, _aws_cdk_aws_secretsmanager_ResourcePolicyProps, _aws_cdk_aws_secretsmanager_ISecretAttachmentTarget, _aws_cdk_aws_secretsmanager_ReplicaRegion, _aws_cdk_aws_secretsmanager_SecretAttachmentTargetProps, _aws_cdk_aws_secretsmanager_CfnResourcePolicyProps, _aws_cdk_aws_secretsmanager_SecretTargetAttachmentProps, _aws_cdk_aws_secretsmanager_RotationScheduleProps, _aws_cdk_aws_secretsmanager_MultiUserHostedRotationOptions, _aws_cdk_aws_secretsmanager_SecretStringValueBeta1, _aws_cdk_aws_secretsmanager_RotationSchedule, _aws_cdk_aws_secretsmanager_SecretRotation, _aws_cdk_aws_secretsmanager_RotationScheduleOptions, _aws_cdk_aws_secretsmanager_SingleUserHostedRotationOptions, _aws_cdk_aws_secretsmanager_ResourcePolicy, _aws_cdk_aws_secretsmanager_CfnSecretTargetAttachment, _aws_cdk_aws_secretsmanager_CfnRotationScheduleProps, _aws_cdk_aws_secretsmanager_CfnResourcePolicy, _aws_cdk_aws_secretsmanager_CfnSecretProps, _aws_cdk_aws_secretsmanager_SecretProps, _aws_cdk_aws_secretsmanager_SecretRotationProps, _aws_cdk_aws_secretsmanager_CfnRotationSchedule, _aws_cdk_aws_secretsmanager_CfnRotationSchedule_RotationRulesProperty, _aws_cdk_aws_secretsmanager_CfnRotationSchedule_HostedRotationLambdaProperty, _aws_cdk_aws_secretsmanager_CfnSecret, _aws_cdk_aws_secretsmanager_CfnSecret_ReplicaRegionProperty, _aws_cdk_aws_secretsmanager_ISecret, _aws_cdk_aws_secretsmanager_HostedRotationType, _aws_cdk_aws_secretsmanager_SecretRotationApplication, _aws_cdk_aws_secretsmanager_CfnSecret_GenerateSecretStringProperty, _aws_cdk_aws_secretsmanager_SecretTargetAttachment, _aws_cdk_aws_secretsmanager_Secret, _aws_cdk_aws_secretsmanager_HostedRotation };
module.exports = { print, _aws_cdk_aws_secretsmanager_AttachmentTargetType, _aws_cdk_aws_secretsmanager_CfnSecretTargetAttachmentProps, _aws_cdk_aws_secretsmanager_SecretRotationApplicationOptions, _aws_cdk_aws_secretsmanager_SecretStringGenerator, _aws_cdk_aws_secretsmanager_ISecretTargetAttachment, _aws_cdk_aws_secretsmanager_SecretAttributes, _aws_cdk_aws_secretsmanager_AttachedSecretOptions, _aws_cdk_aws_secretsmanager_ISecretAttachmentTarget, _aws_cdk_aws_secretsmanager_ResourcePolicyProps, _aws_cdk_aws_secretsmanager_ReplicaRegion, _aws_cdk_aws_secretsmanager_SecretAttachmentTargetProps, _aws_cdk_aws_secretsmanager_CfnResourcePolicyProps, _aws_cdk_aws_secretsmanager_SecretTargetAttachmentProps, _aws_cdk_aws_secretsmanager_RotationScheduleProps, _aws_cdk_aws_secretsmanager_MultiUserHostedRotationOptions, _aws_cdk_aws_secretsmanager_SecretStringValueBeta1, _aws_cdk_aws_secretsmanager_RotationSchedule, _aws_cdk_aws_secretsmanager_SecretRotation, _aws_cdk_aws_secretsmanager_RotationScheduleOptions, _aws_cdk_aws_secretsmanager_SingleUserHostedRotationOptions, _aws_cdk_aws_secretsmanager_ResourcePolicy, _aws_cdk_aws_secretsmanager_CfnSecretTargetAttachment, _aws_cdk_aws_secretsmanager_CfnRotationScheduleProps, _aws_cdk_aws_secretsmanager_CfnResourcePolicy, _aws_cdk_aws_secretsmanager_CfnSecretProps, _aws_cdk_aws_secretsmanager_SecretProps, _aws_cdk_aws_secretsmanager_SecretRotationProps, _aws_cdk_aws_secretsmanager_CfnRotationSchedule, _aws_cdk_aws_secretsmanager_CfnRotationSchedule_RotationRulesProperty, _aws_cdk_aws_secretsmanager_CfnRotationSchedule_HostedRotationLambdaProperty, _aws_cdk_aws_secretsmanager_CfnSecret, _aws_cdk_aws_secretsmanager_CfnSecret_ReplicaRegionProperty, _aws_cdk_aws_secretsmanager_ISecret, _aws_cdk_aws_secretsmanager_HostedRotationType, _aws_cdk_aws_secretsmanager_SecretRotationApplication, _aws_cdk_aws_secretsmanager_CfnSecret_GenerateSecretStringProperty, _aws_cdk_aws_secretsmanager_SecretTargetAttachment, _aws_cdk_aws_secretsmanager_Secret, _aws_cdk_aws_secretsmanager_HostedRotation };
module.exports.DeprecationError = DeprecationError;

@@ -6,11 +6,7 @@ import * as iam from '@aws-cdk/aws-iam';

/**
* Construction properties for a ResourcePolicy.
*
* @stability stable
* Construction properties for a ResourcePolicy
*/
export interface ResourcePolicyProps {
/**
* The secret to attach a resource-based permissions policy.
*
* @stability stable
* The secret to attach a resource-based permissions policy
*/

@@ -20,3 +16,3 @@ readonly secret: ISecret;

/**
* Resource Policy for SecretsManager Secrets.
* Resource Policy for SecretsManager Secrets
*

@@ -33,4 +29,2 @@ * Policies define the operations that are allowed on this resource.

* Prefer to use `addToResourcePolicy()` instead.
*
* @stability stable
*/

@@ -40,10 +34,5 @@ export declare class ResourcePolicy extends Resource {

* The IAM policy document for this policy.
*
* @stability stable
*/
readonly document: iam.PolicyDocument;
/**
* @stability stable
*/
constructor(scope: Construct, id: string, props: ResourcePolicyProps);
}

@@ -11,3 +11,3 @@ "use strict";

/**
* Resource Policy for SecretsManager Secrets.
* Resource Policy for SecretsManager Secrets
*

@@ -24,9 +24,4 @@ * Policies define the operations that are allowed on this resource.

* Prefer to use `addToResourcePolicy()` instead.
*
* @stability stable
*/
class ResourcePolicy extends core_1.Resource {
/**
* @stability stable
*/
constructor(scope, id, props) {

@@ -36,4 +31,2 @@ super(scope, id);

* The IAM policy document for this policy.
*
* @stability stable
*/

@@ -50,3 +43,3 @@ this.document = new iam.PolicyDocument();

_a = JSII_RTTI_SYMBOL_1;
ResourcePolicy[_a] = { fqn: "@aws-cdk/aws-secretsmanager.ResourcePolicy", version: "1.144.0" };
//# sourceMappingURL=data:application/json;base64,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
ResourcePolicy[_a] = { fqn: "@aws-cdk/aws-secretsmanager.ResourcePolicy", version: "1.145.0" };
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoicG9saWN5LmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsicG9saWN5LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7Ozs7OztBQUFBLHdDQUF3QztBQUN4Qyx3Q0FBeUM7QUFHekMseUVBQStEO0FBWS9EOzs7Ozs7Ozs7Ozs7O0dBYUc7QUFDSCxNQUFhLGNBQWUsU0FBUSxlQUFRO0lBTTFDLFlBQVksS0FBZ0IsRUFBRSxFQUFVLEVBQUUsS0FBMEI7UUFDbEUsS0FBSyxDQUFDLEtBQUssRUFBRSxFQUFFLENBQUMsQ0FBQztRQU5uQjs7V0FFRztRQUNhLGFBQVEsR0FBRyxJQUFJLEdBQUcsQ0FBQyxjQUFjLEVBQUUsQ0FBQzs7UUFLbEQsSUFBSSw0Q0FBaUIsQ0FBQyxJQUFJLEVBQUUsVUFBVSxFQUFFO1lBQ3RDLGNBQWMsRUFBRSxJQUFJLENBQUMsUUFBUTtZQUM3QixRQUFRLEVBQUUsS0FBSyxDQUFDLE1BQU0sQ0FBQyxTQUFTO1NBQ2pDLENBQUMsQ0FBQztLQUNKOztBQWJILHdDQWNDIiwic291cmNlc0NvbnRlbnQiOlsiaW1wb3J0ICogYXMgaWFtIGZyb20gJ0Bhd3MtY2RrL2F3cy1pYW0nO1xuaW1wb3J0IHsgUmVzb3VyY2UgfSBmcm9tICdAYXdzLWNkay9jb3JlJztcbmltcG9ydCB7IENvbnN0cnVjdCB9IGZyb20gJ2NvbnN0cnVjdHMnO1xuaW1wb3J0IHsgSVNlY3JldCB9IGZyb20gJy4vc2VjcmV0JztcbmltcG9ydCB7IENmblJlc291cmNlUG9saWN5IH0gZnJvbSAnLi9zZWNyZXRzbWFuYWdlci5nZW5lcmF0ZWQnO1xuXG4vKipcbiAqIENvbnN0cnVjdGlvbiBwcm9wZXJ0aWVzIGZvciBhIFJlc291cmNlUG9saWN5XG4gKi9cbmV4cG9ydCBpbnRlcmZhY2UgUmVzb3VyY2VQb2xpY3lQcm9wcyB7XG4gIC8qKlxuICAgKiBUaGUgc2VjcmV0IHRvIGF0dGFjaCBhIHJlc291cmNlLWJhc2VkIHBlcm1pc3Npb25zIHBvbGljeVxuICAgKi9cbiAgcmVhZG9ubHkgc2VjcmV0OiBJU2VjcmV0O1xufVxuXG4vKipcbiAqIFJlc291cmNlIFBvbGljeSBmb3IgU2VjcmV0c01hbmFnZXIgU2VjcmV0c1xuICpcbiAqIFBvbGljaWVzIGRlZmluZSB0aGUgb3BlcmF0aW9ucyB0aGF0IGFyZSBhbGxvd2VkIG9uIHRoaXMgcmVzb3VyY2UuXG4gKlxuICogWW91IGFsbW9zdCBuZXZlciBuZWVkIHRvIGRlZmluZSB0aGlzIGNvbnN0cnVjdCBkaXJlY3RseS5cbiAqXG4gKiBBbGwgQVdTIHJlc291cmNlcyB0aGF0IHN1cHBvcnQgcmVzb3VyY2UgcG9saWNpZXMgaGF2ZSBhIG1ldGhvZCBjYWxsZWRcbiAqIGBhZGRUb1Jlc291cmNlUG9saWN5KClgLCB3aGljaCB3aWxsIGF1dG9tYXRpY2FsbHkgY3JlYXRlIGEgbmV3IHJlc291cmNlXG4gKiBwb2xpY3kgaWYgb25lIGRvZXNuJ3QgZXhpc3QgeWV0LCBvdGhlcndpc2UgaXQgd2lsbCBhZGQgdG8gdGhlIGV4aXN0aW5nXG4gKiBwb2xpY3kuXG4gKlxuICogUHJlZmVyIHRvIHVzZSBgYWRkVG9SZXNvdXJjZVBvbGljeSgpYCBpbnN0ZWFkLlxuICovXG5leHBvcnQgY2xhc3MgUmVzb3VyY2VQb2xpY3kgZXh0ZW5kcyBSZXNvdXJjZSB7XG4gIC8qKlxuICAgKiBUaGUgSUFNIHBvbGljeSBkb2N1bWVudCBmb3IgdGhpcyBwb2xpY3kuXG4gICAqL1xuICBwdWJsaWMgcmVhZG9ubHkgZG9jdW1lbnQgPSBuZXcgaWFtLlBvbGljeURvY3VtZW50KCk7XG5cbiAgY29uc3RydWN0b3Ioc2NvcGU6IENvbnN0cnVjdCwgaWQ6IHN0cmluZywgcHJvcHM6IFJlc291cmNlUG9saWN5UHJvcHMpIHtcbiAgICBzdXBlcihzY29wZSwgaWQpO1xuXG4gICAgbmV3IENmblJlc291cmNlUG9saWN5KHRoaXMsICdSZXNvdXJjZScsIHtcbiAgICAgIHJlc291cmNlUG9saWN5OiB0aGlzLmRvY3VtZW50LFxuICAgICAgc2VjcmV0SWQ6IHByb3BzLnNlY3JldC5zZWNyZXRBcm4sXG4gICAgfSk7XG4gIH1cbn1cbiJdfQ==

@@ -9,4 +9,2 @@ import * as ec2 from '@aws-cdk/aws-ec2';

* Options to add a rotation schedule to a secret.
*
* @stability stable
*/

@@ -18,17 +16,15 @@ export interface RotationScheduleOptions {

* @default - either `rotationLambda` or `hostedRotation` must be specified
* @stability stable
*/
readonly rotationLambda?: lambda.IFunction;
/**
* Hosted rotation.
* Hosted rotation
*
* @default - either `rotationLambda` or `hostedRotation` must be specified
* @stability stable
*/
readonly hostedRotation?: HostedRotation;
/**
* Specifies the number of days after the previous rotation before Secrets Manager triggers the next automatic rotation.
* Specifies the number of days after the previous rotation before
* Secrets Manager triggers the next automatic rotation.
*
* @default Duration.days(30)
* @stability stable
*/

@@ -39,4 +35,2 @@ readonly automaticallyAfter?: Duration;

* Construction properties for a RotationSchedule.
*
* @stability stable
*/

@@ -51,9 +45,9 @@ export interface RotationScheduleProps extends RotationScheduleOptions {

* {
* "engine": <required: database engine>,
* "host": <required: instance host name>,
* "username": <required: username>,
* "password": <required: password>,
* "dbname": <optional: database name>,
* "port": <optional: if not specified, default port will be used>,
* "masterarn": <required for multi user rotation: the arn of the master secret which will be used to create users/change passwords>
* "engine": <required: database engine>,
* "host": <required: instance host name>,
* "username": <required: username>,
* "password": <required: password>,
* "dbname": <optional: database name>,
* "port": <optional: if not specified, default port will be used>,
* "masterarn": <required for multi user rotation: the arn of the master secret which will be used to create users/change passwords>
* }

@@ -64,4 +58,2 @@ * ```

* or an `ISecret` returned by the `attach()` method of `Secret`.
*
* @stability stable
*/

@@ -72,29 +64,20 @@ readonly secret: ISecret;

* A rotation schedule.
*
* @stability stable
*/
export declare class RotationSchedule extends Resource {
/**
* @stability stable
*/
constructor(scope: Construct, id: string, props: RotationScheduleProps);
}
/**
* Single user hosted rotation options.
*
* @stability stable
* Single user hosted rotation options
*/
export interface SingleUserHostedRotationOptions {
/**
* A name for the Lambda created to rotate the secret.
* A name for the Lambda created to rotate the secret
*
* @default - a CloudFormation generated name
* @stability stable
*/
readonly functionName?: string;
/**
* A list of security groups for the Lambda created to rotate the secret.
* A list of security groups for the Lambda created to rotate the secret
*
* @default - a new security group is created
* @stability stable
*/

@@ -106,3 +89,2 @@ readonly securityGroups?: ec2.ISecurityGroup[];

* @default - the Lambda is not deployed in a VPC
* @stability stable
*/

@@ -114,3 +96,2 @@ readonly vpc?: ec2.IVpc;

* @default - the Vpc default strategy if not specified.
* @stability stable
*/

@@ -120,11 +101,7 @@ readonly vpcSubnets?: ec2.SubnetSelection;

/**
* Multi user hosted rotation options.
*
* @stability stable
* Multi user hosted rotation options
*/
export interface MultiUserHostedRotationOptions extends SingleUserHostedRotationOptions {
/**
* The master secret for a multi user rotation scheme.
*
* @stability stable
* The master secret for a multi user rotation scheme
*/

@@ -134,5 +111,3 @@ readonly masterSecret: ISecret;

/**
* A hosted rotation.
*
* @stability stable
* A hosted rotation
*/

@@ -143,85 +118,29 @@ export declare class HostedRotation implements ec2.IConnectable {

private readonly masterSecret?;
/**
* MySQL Single User.
*
* @stability stable
*/
/** MySQL Single User */
static mysqlSingleUser(options?: SingleUserHostedRotationOptions): HostedRotation;
/**
* MySQL Multi User.
*
* @stability stable
*/
/** MySQL Multi User */
static mysqlMultiUser(options: MultiUserHostedRotationOptions): HostedRotation;
/**
* PostgreSQL Single User.
*
* @stability stable
*/
/** PostgreSQL Single User */
static postgreSqlSingleUser(options?: SingleUserHostedRotationOptions): HostedRotation;
/**
* PostgreSQL Multi User.
*
* @stability stable
*/
/** PostgreSQL Multi User */
static postgreSqlMultiUser(options: MultiUserHostedRotationOptions): HostedRotation;
/**
* Oracle Single User.
*
* @stability stable
*/
/** Oracle Single User */
static oracleSingleUser(options?: SingleUserHostedRotationOptions): HostedRotation;
/**
* Oracle Multi User.
*
* @stability stable
*/
/** Oracle Multi User */
static oracleMultiUser(options: MultiUserHostedRotationOptions): HostedRotation;
/**
* MariaDB Single User.
*
* @stability stable
*/
/** MariaDB Single User */
static mariaDbSingleUser(options?: SingleUserHostedRotationOptions): HostedRotation;
/**
* MariaDB Multi User.
*
* @stability stable
*/
/** MariaDB Multi User */
static mariaDbMultiUser(options: MultiUserHostedRotationOptions): HostedRotation;
/**
* SQL Server Single User.
*
* @stability stable
*/
/** SQL Server Single User */
static sqlServerSingleUser(options?: SingleUserHostedRotationOptions): HostedRotation;
/**
* SQL Server Multi User.
*
* @stability stable
*/
/** SQL Server Multi User */
static sqlServerMultiUser(options: MultiUserHostedRotationOptions): HostedRotation;
/**
* Redshift Single User.
*
* @stability stable
*/
/** Redshift Single User */
static redshiftSingleUser(options?: SingleUserHostedRotationOptions): HostedRotation;
/**
* Redshift Multi User.
*
* @stability stable
*/
/** Redshift Multi User */
static redshiftMultiUser(options: MultiUserHostedRotationOptions): HostedRotation;
/**
* MongoDB Single User.
*
* @stability stable
*/
/** MongoDB Single User */
static mongoDbSingleUser(options?: SingleUserHostedRotationOptions): HostedRotation;
/**
* MongoDB Multi User.
*
* @stability stable
*/
/** MongoDB Multi User */
static mongoDbMultiUser(options: MultiUserHostedRotationOptions): HostedRotation;

@@ -231,11 +150,7 @@ private _connections?;

/**
* Binds this hosted rotation to a secret.
*
* @stability stable
* Binds this hosted rotation to a secret
*/
bind(secret: ISecret, scope: Construct): CfnRotationSchedule.HostedRotationLambdaProperty;
/**
* Security group connections for this hosted rotation.
*
* @stability stable
* Security group connections for this hosted rotation
*/

@@ -245,5 +160,3 @@ get connections(): ec2.Connections;

/**
* Hosted rotation type.
*
* @stability stable
* Hosted rotation type
*/

@@ -253,85 +166,29 @@ export declare class HostedRotationType {

readonly isMultiUser?: boolean | undefined;
/**
* MySQL Single User.
*
* @stability stable
*/
/** MySQL Single User */
static readonly MYSQL_SINGLE_USER: HostedRotationType;
/**
* MySQL Multi User.
*
* @stability stable
*/
/** MySQL Multi User */
static readonly MYSQL_MULTI_USER: HostedRotationType;
/**
* PostgreSQL Single User.
*
* @stability stable
*/
/** PostgreSQL Single User */
static readonly POSTGRESQL_SINGLE_USER: HostedRotationType;
/**
* PostgreSQL Multi User.
*
* @stability stable
*/
/** PostgreSQL Multi User */
static readonly POSTGRESQL_MULTI_USER: HostedRotationType;
/**
* Oracle Single User.
*
* @stability stable
*/
/** Oracle Single User */
static readonly ORACLE_SINGLE_USER: HostedRotationType;
/**
* Oracle Multi User.
*
* @stability stable
*/
/** Oracle Multi User */
static readonly ORACLE_MULTI_USER: HostedRotationType;
/**
* MariaDB Single User.
*
* @stability stable
*/
/** MariaDB Single User */
static readonly MARIADB_SINGLE_USER: HostedRotationType;
/**
* MariaDB Multi User.
*
* @stability stable
*/
/** MariaDB Multi User */
static readonly MARIADB_MULTI_USER: HostedRotationType;
/**
* SQL Server Single User.
*
* @stability stable
*/
/** SQL Server Single User */
static readonly SQLSERVER_SINGLE_USER: HostedRotationType;
/**
* SQL Server Multi User.
*
* @stability stable
*/
/** SQL Server Multi User */
static readonly SQLSERVER_MULTI_USER: HostedRotationType;
/**
* Redshift Single User.
*
* @stability stable
*/
/** Redshift Single User */
static readonly REDSHIFT_SINGLE_USER: HostedRotationType;
/**
* Redshift Multi User.
*
* @stability stable
*/
/** Redshift Multi User */
static readonly REDSHIFT_MULTI_USER: HostedRotationType;
/**
* MongoDB Single User.
*
* @stability stable
*/
/** MongoDB Single User */
static readonly MONGODB_SINGLE_USER: HostedRotationType;
/**
* MongoDB Multi User.
*
* @stability stable
*/
/** MongoDB Multi User */
static readonly MONGODB_MULTI_USER: HostedRotationType;

@@ -338,0 +195,0 @@ /**

@@ -14,9 +14,4 @@ "use strict";

* A rotation schedule.
*
* @stability stable
*/
class RotationSchedule extends core_1.Resource {
/**
* @stability stable
*/
constructor(scope, id, props) {

@@ -64,7 +59,5 @@ var _d, _e, _f;

_a = JSII_RTTI_SYMBOL_1;
RotationSchedule[_a] = { fqn: "@aws-cdk/aws-secretsmanager.RotationSchedule", version: "1.144.0" };
RotationSchedule[_a] = { fqn: "@aws-cdk/aws-secretsmanager.RotationSchedule", version: "1.145.0" };
/**
* A hosted rotation.
*
* @stability stable
* A hosted rotation
*/

@@ -80,7 +73,3 @@ class HostedRotation {

}
/**
* MySQL Single User.
*
* @stability stable
*/
/** MySQL Single User */
static mysqlSingleUser(options = {}) {

@@ -90,7 +79,3 @@ jsiiDeprecationWarnings._aws_cdk_aws_secretsmanager_SingleUserHostedRotationOptions(options);

}
/**
* MySQL Multi User.
*
* @stability stable
*/
/** MySQL Multi User */
static mysqlMultiUser(options) {

@@ -100,7 +85,3 @@ jsiiDeprecationWarnings._aws_cdk_aws_secretsmanager_MultiUserHostedRotationOptions(options);

}
/**
* PostgreSQL Single User.
*
* @stability stable
*/
/** PostgreSQL Single User */
static postgreSqlSingleUser(options = {}) {

@@ -110,7 +91,3 @@ jsiiDeprecationWarnings._aws_cdk_aws_secretsmanager_SingleUserHostedRotationOptions(options);

}
/**
* PostgreSQL Multi User.
*
* @stability stable
*/
/** PostgreSQL Multi User */
static postgreSqlMultiUser(options) {

@@ -120,7 +97,3 @@ jsiiDeprecationWarnings._aws_cdk_aws_secretsmanager_MultiUserHostedRotationOptions(options);

}
/**
* Oracle Single User.
*
* @stability stable
*/
/** Oracle Single User */
static oracleSingleUser(options = {}) {

@@ -130,7 +103,3 @@ jsiiDeprecationWarnings._aws_cdk_aws_secretsmanager_SingleUserHostedRotationOptions(options);

}
/**
* Oracle Multi User.
*
* @stability stable
*/
/** Oracle Multi User */
static oracleMultiUser(options) {

@@ -140,7 +109,3 @@ jsiiDeprecationWarnings._aws_cdk_aws_secretsmanager_MultiUserHostedRotationOptions(options);

}
/**
* MariaDB Single User.
*
* @stability stable
*/
/** MariaDB Single User */
static mariaDbSingleUser(options = {}) {

@@ -150,7 +115,3 @@ jsiiDeprecationWarnings._aws_cdk_aws_secretsmanager_SingleUserHostedRotationOptions(options);

}
/**
* MariaDB Multi User.
*
* @stability stable
*/
/** MariaDB Multi User */
static mariaDbMultiUser(options) {

@@ -160,7 +121,3 @@ jsiiDeprecationWarnings._aws_cdk_aws_secretsmanager_MultiUserHostedRotationOptions(options);

}
/**
* SQL Server Single User.
*
* @stability stable
*/
/** SQL Server Single User */
static sqlServerSingleUser(options = {}) {

@@ -170,7 +127,3 @@ jsiiDeprecationWarnings._aws_cdk_aws_secretsmanager_SingleUserHostedRotationOptions(options);

}
/**
* SQL Server Multi User.
*
* @stability stable
*/
/** SQL Server Multi User */
static sqlServerMultiUser(options) {

@@ -180,7 +133,3 @@ jsiiDeprecationWarnings._aws_cdk_aws_secretsmanager_MultiUserHostedRotationOptions(options);

}
/**
* Redshift Single User.
*
* @stability stable
*/
/** Redshift Single User */
static redshiftSingleUser(options = {}) {

@@ -190,7 +139,3 @@ jsiiDeprecationWarnings._aws_cdk_aws_secretsmanager_SingleUserHostedRotationOptions(options);

}
/**
* Redshift Multi User.
*
* @stability stable
*/
/** Redshift Multi User */
static redshiftMultiUser(options) {

@@ -200,7 +145,3 @@ jsiiDeprecationWarnings._aws_cdk_aws_secretsmanager_MultiUserHostedRotationOptions(options);

}
/**
* MongoDB Single User.
*
* @stability stable
*/
/** MongoDB Single User */
static mongoDbSingleUser(options = {}) {

@@ -210,7 +151,3 @@ jsiiDeprecationWarnings._aws_cdk_aws_secretsmanager_SingleUserHostedRotationOptions(options);

}
/**
* MongoDB Multi User.
*
* @stability stable
*/
/** MongoDB Multi User */
static mongoDbMultiUser(options) {

@@ -221,5 +158,3 @@ jsiiDeprecationWarnings._aws_cdk_aws_secretsmanager_MultiUserHostedRotationOptions(options);

/**
* Binds this hosted rotation to a secret.
*
* @stability stable
* Binds this hosted rotation to a secret
*/

@@ -256,5 +191,3 @@ bind(secret, scope) {

/**
* Security group connections for this hosted rotation.
*
* @stability stable
* Security group connections for this hosted rotation
*/

@@ -274,7 +207,5 @@ get connections() {

_b = JSII_RTTI_SYMBOL_1;
HostedRotation[_b] = { fqn: "@aws-cdk/aws-secretsmanager.HostedRotation", version: "1.144.0" };
HostedRotation[_b] = { fqn: "@aws-cdk/aws-secretsmanager.HostedRotation", version: "1.145.0" };
/**
* Hosted rotation type.
*
* @stability stable
* Hosted rotation type
*/

@@ -293,87 +224,31 @@ class HostedRotationType {

_c = JSII_RTTI_SYMBOL_1;
HostedRotationType[_c] = { fqn: "@aws-cdk/aws-secretsmanager.HostedRotationType", version: "1.144.0" };
/**
* MySQL Single User.
*
* @stability stable
*/
HostedRotationType[_c] = { fqn: "@aws-cdk/aws-secretsmanager.HostedRotationType", version: "1.145.0" };
/** MySQL Single User */
HostedRotationType.MYSQL_SINGLE_USER = new HostedRotationType('MySQLSingleUser');
/**
* MySQL Multi User.
*
* @stability stable
*/
/** MySQL Multi User */
HostedRotationType.MYSQL_MULTI_USER = new HostedRotationType('MySQLMultiUser', true);
/**
* PostgreSQL Single User.
*
* @stability stable
*/
/** PostgreSQL Single User */
HostedRotationType.POSTGRESQL_SINGLE_USER = new HostedRotationType('PostgreSQLSingleUser');
/**
* PostgreSQL Multi User.
*
* @stability stable
*/
/** PostgreSQL Multi User */
HostedRotationType.POSTGRESQL_MULTI_USER = new HostedRotationType('PostgreSQLMultiUser', true);
/**
* Oracle Single User.
*
* @stability stable
*/
/** Oracle Single User */
HostedRotationType.ORACLE_SINGLE_USER = new HostedRotationType('OracleSingleUser');
/**
* Oracle Multi User.
*
* @stability stable
*/
/** Oracle Multi User */
HostedRotationType.ORACLE_MULTI_USER = new HostedRotationType('OracleMultiUser', true);
/**
* MariaDB Single User.
*
* @stability stable
*/
/** MariaDB Single User */
HostedRotationType.MARIADB_SINGLE_USER = new HostedRotationType('MariaDBSingleUser');
/**
* MariaDB Multi User.
*
* @stability stable
*/
/** MariaDB Multi User */
HostedRotationType.MARIADB_MULTI_USER = new HostedRotationType('MariaDBMultiUser', true);
/**
* SQL Server Single User.
*
* @stability stable
*/
/** SQL Server Single User */
HostedRotationType.SQLSERVER_SINGLE_USER = new HostedRotationType('SQLServerSingleUser');
/**
* SQL Server Multi User.
*
* @stability stable
*/
/** SQL Server Multi User */
HostedRotationType.SQLSERVER_MULTI_USER = new HostedRotationType('SQLServerMultiUser', true);
/**
* Redshift Single User.
*
* @stability stable
*/
/** Redshift Single User */
HostedRotationType.REDSHIFT_SINGLE_USER = new HostedRotationType('RedshiftSingleUser');
/**
* Redshift Multi User.
*
* @stability stable
*/
/** Redshift Multi User */
HostedRotationType.REDSHIFT_MULTI_USER = new HostedRotationType('RedshiftMultiUser', true);
/**
* MongoDB Single User.
*
* @stability stable
*/
/** MongoDB Single User */
HostedRotationType.MONGODB_SINGLE_USER = new HostedRotationType('MongoDBSingleUser');
/**
* MongoDB Multi User.
*
* @stability stable
*/
/** MongoDB Multi User */
HostedRotationType.MONGODB_MULTI_USER = new HostedRotationType('MongoDBMultiUser', true);
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"rotation-schedule.js","sourceRoot":"","sources":["rotation-schedule.ts"],"names":[],"mappings":";;;;;;AAAA,wCAAwC;AACxC,wCAAwC;AACxC,wCAAwC;AAExC,wCAA0D;AAG1D,yEAAiE;;;;;;AAqBjE,MAAa,gBAAiB,SAAQ,eAAQ;;;;IAC5C,YAAY,KAAgB,EAAE,EAAU,EAAE,KAA4B;;QACpE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;;QAEjB,IAAI,CAAC,CAAC,KAAK,CAAC,cAAc,IAAI,CAAC,KAAK,CAAC,cAAc,CAAC,IAAI,CAAC,KAAK,CAAC,cAAc,IAAI,KAAK,CAAC,cAAc,CAAC,EAAE;YACtG,MAAM,IAAI,KAAK,CAAC,gEAAgE,CAAC,CAAC;SACnF;QAED,UAAI,KAAK,CAAC,cAAc,0CAAE,eAAe,CAAC,YAAY,EAAE;YACtD,IAAI,KAAK,CAAC,MAAM,CAAC,aAAa,EAAE;gBAC9B,KAAK,CAAC,MAAM,CAAC,aAAa,CAAC,mBAAmB,CAC5C,IAAI,GAAG,CAAC,mBAAmB,CACzB,kBAAkB,YAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,MAAM,gBAAgB,EACvD,KAAK,CAAC,cAAc,CAAC,cAAc,CACpC,CACF,CAAC;aACH;YAED,KAAK,CAAC,cAAc,CAAC,WAAW,CAAC,IAAI,GAAG,CAAC,gBAAgB,CAAC,8BAA8B,CAAC,CAAC,CAAC;YAE3F,KAAK,CAAC,cAAc,CAAC,eAAe,CAClC,IAAI,GAAG,CAAC,eAAe,CAAC;gBACtB,OAAO,EAAE;oBACP,+BAA+B;oBAC/B,+BAA+B;oBAC/B,+BAA+B;oBAC/B,yCAAyC;iBAC1C;gBACD,SAAS,EAAE,CAAC,KAAK,CAAC,MAAM,CAAC,aAAa,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,aAAa,CAAC,CAAC,CAAC,GAAG,KAAK,CAAC,MAAM,CAAC,SAAS,SAAS,CAAC;aAC1G,CAAC,CACH,CAAC;YACF,KAAK,CAAC,cAAc,CAAC,eAAe,CAClC,IAAI,GAAG,CAAC,eAAe,CAAC;gBACtB,OAAO,EAAE;oBACP,kCAAkC;iBACnC;gBACD,SAAS,EAAE,CAAC,GAAG,CAAC;aACjB,CAAC,CACH,CAAC;SACH;QAED,IAAI,8CAAmB,CAAC,IAAI,EAAE,UAAU,EAAE;YACxC,QAAQ,EAAE,KAAK,CAAC,MAAM,CAAC,SAAS;YAChC,iBAAiB,QAAE,KAAK,CAAC,cAAc,0CAAE,WAAW;YACpD,oBAAoB,QAAE,KAAK,CAAC,cAAc,0CAAE,IAAI,CAAC,KAAK,CAAC,MAAM,EAAE,IAAI,CAAC;YACpE,aAAa,EAAE;gBACb,sBAAsB,EAAE,KAAK,CAAC,kBAAkB,IAAI,KAAK,CAAC,kBAAkB,CAAC,MAAM,EAAE,IAAI,EAAE;aAC5F;SACF,CAAC,CAAC;QAEH,sDAAsD;QACtD,KAAK,CAAC,MAAM,CAAC,qBAAqB,EAAE,CAAC;KACtC;;AApDH,4CAqDC;;;;;;;;AAwBD,MAAa,cAAc;IAyEzB,YACmB,IAAwB,EACxB,KAAuE,EACvE,YAAsB;QAFtB,SAAI,GAAJ,IAAI,CAAoB;QACxB,UAAK,GAAL,KAAK,CAAkE;QACvE,iBAAY,GAAZ,YAAY,CAAU;QAEvC,IAAI,IAAI,CAAC,WAAW,IAAI,CAAC,YAAY,EAAE;YACrC,MAAM,IAAI,KAAK,CAAC,wEAAwE,CAAC,CAAC;SAC3F;KACF;;;;;;IA/EM,MAAM,CAAC,eAAe,CAAC,UAA2C,EAAE;;QACzE,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,iBAAiB,EAAE,OAAO,CAAC,CAAC;KAC1E;;;;;;IAGM,MAAM,CAAC,cAAc,CAAC,OAAuC;;QAClE,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,gBAAgB,EAAE,OAAO,EAAE,OAAO,CAAC,YAAY,CAAC,CAAC;KAC/F;;;;;;IAGM,MAAM,CAAC,oBAAoB,CAAC,UAA2C,EAAE;;QAC9E,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,sBAAsB,EAAE,OAAO,CAAC,CAAC;KAC/E;;;;;;IAGM,MAAM,CAAC,mBAAmB,CAAC,OAAuC;;QACvE,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,qBAAqB,EAAE,OAAO,EAAE,OAAO,CAAC,YAAY,CAAC,CAAC;KACpG;;;;;;IAGM,MAAM,CAAC,gBAAgB,CAAC,UAA2C,EAAE;;QAC1E,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,kBAAkB,EAAE,OAAO,CAAC,CAAC;KAC3E;;;;;;IAGM,MAAM,CAAC,eAAe,CAAC,OAAuC;;QACnE,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,iBAAiB,EAAE,OAAO,EAAE,OAAO,CAAC,YAAY,CAAC,CAAC;KAChG;;;;;;IAGM,MAAM,CAAC,iBAAiB,CAAC,UAA2C,EAAE;;QAC3E,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,mBAAmB,EAAE,OAAO,CAAC,CAAC;KAC5E;;;;;;IAGM,MAAM,CAAC,gBAAgB,CAAC,OAAuC;;QACpE,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,kBAAkB,EAAE,OAAO,EAAE,OAAO,CAAC,YAAY,CAAC,CAAC;KACjG;;;;;;IAGM,MAAM,CAAC,mBAAmB,CAAC,UAA2C,EAAE;;QAC7E,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,qBAAqB,EAAE,OAAO,CAAC,CAAC;KAC9E;;;;;;IAGM,MAAM,CAAC,kBAAkB,CAAC,OAAuC;;QACtE,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,oBAAoB,EAAE,OAAO,EAAE,OAAO,CAAC,YAAY,CAAC,CAAC;KACnG;;;;;;IAGM,MAAM,CAAC,kBAAkB,CAAC,UAA2C,EAAE;;QAC5E,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,oBAAoB,EAAE,OAAO,CAAC,CAAC;KAC7E;;;;;;IAGM,MAAM,CAAC,iBAAiB,CAAC,OAAuC;;QACrE,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,mBAAmB,EAAE,OAAO,EAAE,OAAO,CAAC,YAAY,CAAC,CAAC;KAClG;;;;;;IAGM,MAAM,CAAC,iBAAiB,CAAC,UAA2C,EAAE;;QAC3E,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,mBAAmB,EAAE,OAAO,CAAC,CAAC;KAC5E;;;;;;IAGM,MAAM,CAAC,gBAAgB,CAAC,OAAuC;;QACpE,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,kBAAkB,EAAE,OAAO,EAAE,OAAO,CAAC,YAAY,CAAC,CAAC;KACjG;;;;;;IAeM,IAAI,CAAC,MAAe,EAAE,KAAgB;;;QAC3C,0IAA0I;QAC1I,YAAK,CAAC,EAAE,CAAC,KAAK,CAAC,CAAC,YAAY,CAAC,gCAAgC,CAAC,CAAC;QAE/D,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,GAAG,IAAI,IAAI,CAAC,KAAK,CAAC,cAAc,EAAE;YAChD,MAAM,IAAI,KAAK,CAAC,2DAA2D,CAAC,CAAC;SAC9E;QAED,IAAI,IAAI,CAAC,KAAK,CAAC,GAAG,EAAE;YAClB,IAAI,CAAC,YAAY,GAAG,IAAI,GAAG,CAAC,WAAW,CAAC;gBACtC,cAAc,EAAE,IAAI,CAAC,KAAK,CAAC,cAAc,IAAI,CAAC,IAAI,GAAG,CAAC,aAAa,CAAC,KAAK,EAAE,eAAe,EAAE;wBAC1F,GAAG,EAAE,IAAI,CAAC,KAAK,CAAC,GAAG;qBACpB,CAAC,CAAC;aACJ,CAAC,CAAC;SACJ;QAED,2DAA2D;QAC3D,IAAI,IAAI,CAAC,YAAY,EAAE;YACrB,IAAI,CAAC,YAAY,CAAC,qBAAqB,EAAE,CAAC;SAC3C;QAED,OAAO;YACL,YAAY,EAAE,IAAI,CAAC,IAAI,CAAC,IAAI;YAC5B,SAAS,QAAE,MAAM,CAAC,aAAa,0CAAE,MAAM;YACvC,eAAe,QAAE,IAAI,CAAC,YAAY,0CAAE,SAAS;YAC7C,qBAAqB,cAAE,IAAI,CAAC,YAAY,0CAAE,aAAa,0CAAE,MAAM;YAC/D,kBAAkB,EAAE,IAAI,CAAC,KAAK,CAAC,YAAY;YAC3C,mBAAmB,cAAE,IAAI,CAAC,YAAY,0CAAE,cAAc,0CAAE,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,eAAe,EAAE,IAAI,CAAC,GAAG,CAAC;YAC7F,YAAY,QAAE,IAAI,CAAC,KAAK,CAAC,GAAG,0CAAE,aAAa,CAAC,IAAI,CAAC,KAAK,CAAC,UAAU,EAAE,SAAS,CAAC,IAAI,CAAC,GAAG,CAAC;SACvF,CAAC;KACH;;;;;;IAGD,IAAW,WAAW;QACpB,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,GAAG,EAAE;YACnB,MAAM,IAAI,KAAK,CAAC,4EAA4E,CAAC,CAAC;SAC/F;QAED,+EAA+E;QAC/E,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE;YACtB,MAAM,IAAI,KAAK,CAAC,kFAAkF,CAAC,CAAC;SACrG;QAED,OAAO,IAAI,CAAC,YAAY,CAAC;KAC1B;;AAhIH,wCAiIC;;;;;;;;AAGD,MAAa,kBAAkB;IA2C7B;;;OAGG;IACH,YAAoC,IAAY,EAAkB,WAAqB;QAAnD,SAAI,GAAJ,IAAI,CAAQ;QAAkB,gBAAW,GAAX,WAAW,CAAU;KAAI;;AA/C7F,gDAgDC;;;;;;;;AA9CwB,oCAAiB,GAAG,IAAI,kBAAkB,CAAC,iBAAiB,CAAC,CAAC;;;;;;AAG9D,mCAAgB,GAAG,IAAI,kBAAkB,CAAC,gBAAgB,EAAE,IAAI,CAAC,CAAC;;;;;;AAGlE,yCAAsB,GAAG,IAAI,kBAAkB,CAAC,sBAAsB,CAAC,CAAC;;;;;;AAGxE,wCAAqB,GAAG,IAAI,kBAAkB,CAAC,qBAAqB,EAAE,IAAI,CAAC,CAAC;;;;;;AAG5E,qCAAkB,GAAG,IAAI,kBAAkB,CAAC,kBAAkB,CAAC,CAAC;;;;;;AAGhE,oCAAiB,GAAG,IAAI,kBAAkB,CAAC,iBAAiB,EAAE,IAAI,CAAC,CAAC;;;;;;AAGpE,sCAAmB,GAAG,IAAI,kBAAkB,CAAC,mBAAmB,CAAC,CAAC;;;;;;AAGlE,qCAAkB,GAAG,IAAI,kBAAkB,CAAC,kBAAkB,EAAE,IAAI,CAAC,CAAC;;;;;;AAGtE,wCAAqB,GAAG,IAAI,kBAAkB,CAAC,qBAAqB,CAAC,CAAA;;;;;;AAGrE,uCAAoB,GAAG,IAAI,kBAAkB,CAAC,oBAAoB,EAAE,IAAI,CAAC,CAAC;;;;;;AAG1E,uCAAoB,GAAG,IAAI,kBAAkB,CAAC,oBAAoB,CAAC,CAAA;;;;;;AAGnE,sCAAmB,GAAG,IAAI,kBAAkB,CAAC,mBAAmB,EAAE,IAAI,CAAC,CAAC;;;;;;AAGxE,sCAAmB,GAAG,IAAI,kBAAkB,CAAC,mBAAmB,CAAC,CAAC;;;;;;AAGlE,qCAAkB,GAAG,IAAI,kBAAkB,CAAC,kBAAkB,EAAE,IAAI,CAAC,CAAC","sourcesContent":["import * as ec2 from '@aws-cdk/aws-ec2';\nimport * as iam from '@aws-cdk/aws-iam';\nimport * as kms from '@aws-cdk/aws-kms';\nimport * as lambda from '@aws-cdk/aws-lambda';\nimport { Duration, Resource, Stack } from '@aws-cdk/core';\nimport { Construct } from 'constructs';\nimport { ISecret } from './secret';\nimport { CfnRotationSchedule } from './secretsmanager.generated';\n\n                                                          \nexport interface RotationScheduleOptions {\n                                                                                                                                                 \n  readonly rotationLambda?: lambda.IFunction;\n\n                                                                                                                   \n  readonly hostedRotation?: HostedRotation;\n\n                                                                                                                                                                                \n  readonly automaticallyAfter?: Duration;\n}\n\n                                                          \nexport interface RotationScheduleProps extends RotationScheduleOptions {\n                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          \n  readonly secret: ISecret;\n}\n\n                               \nexport class RotationSchedule extends Resource {\n  constructor(scope: Construct, id: string, props: RotationScheduleProps) {\n    super(scope, id);\n\n    if ((!props.rotationLambda && !props.hostedRotation) || (props.rotationLambda && props.hostedRotation)) {\n      throw new Error('One of `rotationLambda` or `hostedRotation` must be specified.');\n    }\n\n    if (props.rotationLambda?.permissionsNode.defaultChild) {\n      if (props.secret.encryptionKey) {\n        props.secret.encryptionKey.grantEncryptDecrypt(\n          new kms.ViaServicePrincipal(\n            `secretsmanager.${Stack.of(this).region}.amazonaws.com`,\n            props.rotationLambda.grantPrincipal,\n          ),\n        );\n      }\n\n      props.rotationLambda.grantInvoke(new iam.ServicePrincipal('secretsmanager.amazonaws.com'));\n\n      props.rotationLambda.addToRolePolicy(\n        new iam.PolicyStatement({\n          actions: [\n            'secretsmanager:DescribeSecret',\n            'secretsmanager:GetSecretValue',\n            'secretsmanager:PutSecretValue',\n            'secretsmanager:UpdateSecretVersionStage',\n          ],\n          resources: [props.secret.secretFullArn ? props.secret.secretFullArn : `${props.secret.secretArn}-??????`],\n        }),\n      );\n      props.rotationLambda.addToRolePolicy(\n        new iam.PolicyStatement({\n          actions: [\n            'secretsmanager:GetRandomPassword',\n          ],\n          resources: ['*'],\n        }),\n      );\n    }\n\n    new CfnRotationSchedule(this, 'Resource', {\n      secretId: props.secret.secretArn,\n      rotationLambdaArn: props.rotationLambda?.functionArn,\n      hostedRotationLambda: props.hostedRotation?.bind(props.secret, this),\n      rotationRules: {\n        automaticallyAfterDays: props.automaticallyAfter && props.automaticallyAfter.toDays() || 30,\n      },\n    });\n\n    // Prevent secrets deletions when rotation is in place\n    props.secret.denyAccountRootDelete();\n  }\n}\n\n                                              \nexport interface SingleUserHostedRotationOptions {\n                                                                                                                        \n  readonly functionName?: string;\n\n                                                                                                                                           \n  readonly securityGroups?: ec2.ISecurityGroup[];\n\n                                                                                                                              \n  readonly vpc?: ec2.IVpc;\n\n                                                                                                                                                            \n  readonly vpcSubnets?: ec2.SubnetSelection;\n}\n\n                                             \nexport interface MultiUserHostedRotationOptions extends SingleUserHostedRotationOptions {\n                                                                   \n  readonly masterSecret: ISecret;\n}\n\n                            \nexport class HostedRotation implements ec2.IConnectable {\n                          \n  public static mysqlSingleUser(options: SingleUserHostedRotationOptions = {}) {\n    return new HostedRotation(HostedRotationType.MYSQL_SINGLE_USER, options);\n  }\n\n                         \n  public static mysqlMultiUser(options: MultiUserHostedRotationOptions) {\n    return new HostedRotation(HostedRotationType.MYSQL_MULTI_USER, options, options.masterSecret);\n  }\n\n                               \n  public static postgreSqlSingleUser(options: SingleUserHostedRotationOptions = {}) {\n    return new HostedRotation(HostedRotationType.POSTGRESQL_SINGLE_USER, options);\n  }\n\n                              \n  public static postgreSqlMultiUser(options: MultiUserHostedRotationOptions) {\n    return new HostedRotation(HostedRotationType.POSTGRESQL_MULTI_USER, options, options.masterSecret);\n  }\n\n                           \n  public static oracleSingleUser(options: SingleUserHostedRotationOptions = {}) {\n    return new HostedRotation(HostedRotationType.ORACLE_SINGLE_USER, options);\n  }\n\n                          \n  public static oracleMultiUser(options: MultiUserHostedRotationOptions) {\n    return new HostedRotation(HostedRotationType.ORACLE_MULTI_USER, options, options.masterSecret);\n  }\n\n                            \n  public static mariaDbSingleUser(options: SingleUserHostedRotationOptions = {}) {\n    return new HostedRotation(HostedRotationType.MARIADB_SINGLE_USER, options);\n  }\n\n                           \n  public static mariaDbMultiUser(options: MultiUserHostedRotationOptions) {\n    return new HostedRotation(HostedRotationType.MARIADB_MULTI_USER, options, options.masterSecret);\n  }\n\n                               \n  public static sqlServerSingleUser(options: SingleUserHostedRotationOptions = {}) {\n    return new HostedRotation(HostedRotationType.SQLSERVER_SINGLE_USER, options);\n  }\n\n                              \n  public static sqlServerMultiUser(options: MultiUserHostedRotationOptions) {\n    return new HostedRotation(HostedRotationType.SQLSERVER_MULTI_USER, options, options.masterSecret);\n  }\n\n                             \n  public static redshiftSingleUser(options: SingleUserHostedRotationOptions = {}) {\n    return new HostedRotation(HostedRotationType.REDSHIFT_SINGLE_USER, options);\n  }\n\n                            \n  public static redshiftMultiUser(options: MultiUserHostedRotationOptions) {\n    return new HostedRotation(HostedRotationType.REDSHIFT_MULTI_USER, options, options.masterSecret);\n  }\n\n                            \n  public static mongoDbSingleUser(options: SingleUserHostedRotationOptions = {}) {\n    return new HostedRotation(HostedRotationType.MONGODB_SINGLE_USER, options);\n  }\n\n                           \n  public static mongoDbMultiUser(options: MultiUserHostedRotationOptions) {\n    return new HostedRotation(HostedRotationType.MONGODB_MULTI_USER, options, options.masterSecret);\n  }\n\n  private _connections?: ec2.Connections;\n\n  private constructor(\n    private readonly type: HostedRotationType,\n    private readonly props: SingleUserHostedRotationOptions | MultiUserHostedRotationOptions,\n    private readonly masterSecret?: ISecret,\n  ) {\n    if (type.isMultiUser && !masterSecret) {\n      throw new Error('The `masterSecret` must be specified when using the multi user scheme.');\n    }\n  }\n\n                                                       \n  public bind(secret: ISecret, scope: Construct): CfnRotationSchedule.HostedRotationLambdaProperty {\n    // https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-rotationschedule-hostedrotationlambda.html\n    Stack.of(scope).addTransform('AWS::SecretsManager-2020-07-23');\n\n    if (!this.props.vpc && this.props.securityGroups) {\n      throw new Error('`vpc` must be specified when specifying `securityGroups`.');\n    }\n\n    if (this.props.vpc) {\n      this._connections = new ec2.Connections({\n        securityGroups: this.props.securityGroups || [new ec2.SecurityGroup(scope, 'SecurityGroup', {\n          vpc: this.props.vpc,\n        })],\n      });\n    }\n\n    // Prevent master secret deletion when rotation is in place\n    if (this.masterSecret) {\n      this.masterSecret.denyAccountRootDelete();\n    }\n\n    return {\n      rotationType: this.type.name,\n      kmsKeyArn: secret.encryptionKey?.keyArn,\n      masterSecretArn: this.masterSecret?.secretArn,\n      masterSecretKmsKeyArn: this.masterSecret?.encryptionKey?.keyArn,\n      rotationLambdaName: this.props.functionName,\n      vpcSecurityGroupIds: this._connections?.securityGroups?.map(s => s.securityGroupId).join(','),\n      vpcSubnetIds: this.props.vpc?.selectSubnets(this.props.vpcSubnets).subnetIds.join(','),\n    };\n  }\n\n                                                                    \n  public get connections() {\n    if (!this.props.vpc) {\n      throw new Error('Cannot use connections for a hosted rotation that is not deployed in a VPC');\n    }\n\n    // If we are in a vpc and bind() has been called _connections should be defined\n    if (!this._connections) {\n      throw new Error('Cannot use connections for a hosted rotation that has not been bound to a secret');\n    }\n\n    return this._connections;\n  }\n}\n\n                               \nexport class HostedRotationType {\n                          \n  public static readonly MYSQL_SINGLE_USER = new HostedRotationType('MySQLSingleUser');\n\n                         \n  public static readonly MYSQL_MULTI_USER = new HostedRotationType('MySQLMultiUser', true);\n\n                               \n  public static readonly POSTGRESQL_SINGLE_USER = new HostedRotationType('PostgreSQLSingleUser');\n\n                              \n  public static readonly POSTGRESQL_MULTI_USER = new HostedRotationType('PostgreSQLMultiUser', true);\n\n                           \n  public static readonly ORACLE_SINGLE_USER = new HostedRotationType('OracleSingleUser');\n\n                          \n  public static readonly ORACLE_MULTI_USER = new HostedRotationType('OracleMultiUser', true);\n\n                            \n  public static readonly MARIADB_SINGLE_USER = new HostedRotationType('MariaDBSingleUser');\n\n                           \n  public static readonly MARIADB_MULTI_USER = new HostedRotationType('MariaDBMultiUser', true);\n\n                               \n  public static readonly SQLSERVER_SINGLE_USER = new HostedRotationType('SQLServerSingleUser')\n\n                              \n  public static readonly SQLSERVER_MULTI_USER = new HostedRotationType('SQLServerMultiUser', true);\n\n                             \n  public static readonly REDSHIFT_SINGLE_USER = new HostedRotationType('RedshiftSingleUser')\n\n                            \n  public static readonly REDSHIFT_MULTI_USER = new HostedRotationType('RedshiftMultiUser', true);\n\n                            \n  public static readonly MONGODB_SINGLE_USER = new HostedRotationType('MongoDBSingleUser');\n\n                           \n  public static readonly MONGODB_MULTI_USER = new HostedRotationType('MongoDBMultiUser', true);\n\n  /**\n   * @param name The type of rotation\n   * @param isMultiUser Whether the rotation uses the mutli user scheme\n   */\n  private constructor(public readonly name: string, public readonly isMultiUser?: boolean) {}\n}\n"]}
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"rotation-schedule.js","sourceRoot":"","sources":["rotation-schedule.ts"],"names":[],"mappings":";;;;;;AAAA,wCAAwC;AACxC,wCAAwC;AACxC,wCAAwC;AAExC,wCAA0D;AAG1D,yEAAiE;AAwDjE;;GAEG;AACH,MAAa,gBAAiB,SAAQ,eAAQ;IAC5C,YAAY,KAAgB,EAAE,EAAU,EAAE,KAA4B;;QACpE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;;QAEjB,IAAI,CAAC,CAAC,KAAK,CAAC,cAAc,IAAI,CAAC,KAAK,CAAC,cAAc,CAAC,IAAI,CAAC,KAAK,CAAC,cAAc,IAAI,KAAK,CAAC,cAAc,CAAC,EAAE;YACtG,MAAM,IAAI,KAAK,CAAC,gEAAgE,CAAC,CAAC;SACnF;QAED,UAAI,KAAK,CAAC,cAAc,0CAAE,eAAe,CAAC,YAAY,EAAE;YACtD,IAAI,KAAK,CAAC,MAAM,CAAC,aAAa,EAAE;gBAC9B,KAAK,CAAC,MAAM,CAAC,aAAa,CAAC,mBAAmB,CAC5C,IAAI,GAAG,CAAC,mBAAmB,CACzB,kBAAkB,YAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,MAAM,gBAAgB,EACvD,KAAK,CAAC,cAAc,CAAC,cAAc,CACpC,CACF,CAAC;aACH;YAED,KAAK,CAAC,cAAc,CAAC,WAAW,CAAC,IAAI,GAAG,CAAC,gBAAgB,CAAC,8BAA8B,CAAC,CAAC,CAAC;YAE3F,KAAK,CAAC,cAAc,CAAC,eAAe,CAClC,IAAI,GAAG,CAAC,eAAe,CAAC;gBACtB,OAAO,EAAE;oBACP,+BAA+B;oBAC/B,+BAA+B;oBAC/B,+BAA+B;oBAC/B,yCAAyC;iBAC1C;gBACD,SAAS,EAAE,CAAC,KAAK,CAAC,MAAM,CAAC,aAAa,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,aAAa,CAAC,CAAC,CAAC,GAAG,KAAK,CAAC,MAAM,CAAC,SAAS,SAAS,CAAC;aAC1G,CAAC,CACH,CAAC;YACF,KAAK,CAAC,cAAc,CAAC,eAAe,CAClC,IAAI,GAAG,CAAC,eAAe,CAAC;gBACtB,OAAO,EAAE;oBACP,kCAAkC;iBACnC;gBACD,SAAS,EAAE,CAAC,GAAG,CAAC;aACjB,CAAC,CACH,CAAC;SACH;QAED,IAAI,8CAAmB,CAAC,IAAI,EAAE,UAAU,EAAE;YACxC,QAAQ,EAAE,KAAK,CAAC,MAAM,CAAC,SAAS;YAChC,iBAAiB,QAAE,KAAK,CAAC,cAAc,0CAAE,WAAW;YACpD,oBAAoB,QAAE,KAAK,CAAC,cAAc,0CAAE,IAAI,CAAC,KAAK,CAAC,MAAM,EAAE,IAAI,CAAC;YACpE,aAAa,EAAE;gBACb,sBAAsB,EAAE,KAAK,CAAC,kBAAkB,IAAI,KAAK,CAAC,kBAAkB,CAAC,MAAM,EAAE,IAAI,EAAE;aAC5F;SACF,CAAC,CAAC;QAEH,sDAAsD;QACtD,KAAK,CAAC,MAAM,CAAC,qBAAqB,EAAE,CAAC;KACtC;;AApDH,4CAqDC;;;AA6CD;;GAEG;AACH,MAAa,cAAc;IAyEzB,YACmB,IAAwB,EACxB,KAAuE,EACvE,YAAsB;QAFtB,SAAI,GAAJ,IAAI,CAAoB;QACxB,UAAK,GAAL,KAAK,CAAkE;QACvE,iBAAY,GAAZ,YAAY,CAAU;QAEvC,IAAI,IAAI,CAAC,WAAW,IAAI,CAAC,YAAY,EAAE;YACrC,MAAM,IAAI,KAAK,CAAC,wEAAwE,CAAC,CAAC;SAC3F;KACF;IAhFD,wBAAwB;IACjB,MAAM,CAAC,eAAe,CAAC,UAA2C,EAAE;;QACzE,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,iBAAiB,EAAE,OAAO,CAAC,CAAC;KAC1E;IAED,uBAAuB;IAChB,MAAM,CAAC,cAAc,CAAC,OAAuC;;QAClE,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,gBAAgB,EAAE,OAAO,EAAE,OAAO,CAAC,YAAY,CAAC,CAAC;KAC/F;IAED,6BAA6B;IACtB,MAAM,CAAC,oBAAoB,CAAC,UAA2C,EAAE;;QAC9E,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,sBAAsB,EAAE,OAAO,CAAC,CAAC;KAC/E;IAED,4BAA4B;IACrB,MAAM,CAAC,mBAAmB,CAAC,OAAuC;;QACvE,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,qBAAqB,EAAE,OAAO,EAAE,OAAO,CAAC,YAAY,CAAC,CAAC;KACpG;IAED,yBAAyB;IAClB,MAAM,CAAC,gBAAgB,CAAC,UAA2C,EAAE;;QAC1E,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,kBAAkB,EAAE,OAAO,CAAC,CAAC;KAC3E;IAED,wBAAwB;IACjB,MAAM,CAAC,eAAe,CAAC,OAAuC;;QACnE,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,iBAAiB,EAAE,OAAO,EAAE,OAAO,CAAC,YAAY,CAAC,CAAC;KAChG;IAED,0BAA0B;IACnB,MAAM,CAAC,iBAAiB,CAAC,UAA2C,EAAE;;QAC3E,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,mBAAmB,EAAE,OAAO,CAAC,CAAC;KAC5E;IAED,yBAAyB;IAClB,MAAM,CAAC,gBAAgB,CAAC,OAAuC;;QACpE,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,kBAAkB,EAAE,OAAO,EAAE,OAAO,CAAC,YAAY,CAAC,CAAC;KACjG;IAED,6BAA6B;IACtB,MAAM,CAAC,mBAAmB,CAAC,UAA2C,EAAE;;QAC7E,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,qBAAqB,EAAE,OAAO,CAAC,CAAC;KAC9E;IAED,4BAA4B;IACrB,MAAM,CAAC,kBAAkB,CAAC,OAAuC;;QACtE,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,oBAAoB,EAAE,OAAO,EAAE,OAAO,CAAC,YAAY,CAAC,CAAC;KACnG;IAED,2BAA2B;IACpB,MAAM,CAAC,kBAAkB,CAAC,UAA2C,EAAE;;QAC5E,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,oBAAoB,EAAE,OAAO,CAAC,CAAC;KAC7E;IAED,0BAA0B;IACnB,MAAM,CAAC,iBAAiB,CAAC,OAAuC;;QACrE,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,mBAAmB,EAAE,OAAO,EAAE,OAAO,CAAC,YAAY,CAAC,CAAC;KAClG;IAED,0BAA0B;IACnB,MAAM,CAAC,iBAAiB,CAAC,UAA2C,EAAE;;QAC3E,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,mBAAmB,EAAE,OAAO,CAAC,CAAC;KAC5E;IAED,yBAAyB;IAClB,MAAM,CAAC,gBAAgB,CAAC,OAAuC;;QACpE,OAAO,IAAI,cAAc,CAAC,kBAAkB,CAAC,kBAAkB,EAAE,OAAO,EAAE,OAAO,CAAC,YAAY,CAAC,CAAC;KACjG;IAcD;;OAEG;IACI,IAAI,CAAC,MAAe,EAAE,KAAgB;;;QAC3C,0IAA0I;QAC1I,YAAK,CAAC,EAAE,CAAC,KAAK,CAAC,CAAC,YAAY,CAAC,gCAAgC,CAAC,CAAC;QAE/D,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,GAAG,IAAI,IAAI,CAAC,KAAK,CAAC,cAAc,EAAE;YAChD,MAAM,IAAI,KAAK,CAAC,2DAA2D,CAAC,CAAC;SAC9E;QAED,IAAI,IAAI,CAAC,KAAK,CAAC,GAAG,EAAE;YAClB,IAAI,CAAC,YAAY,GAAG,IAAI,GAAG,CAAC,WAAW,CAAC;gBACtC,cAAc,EAAE,IAAI,CAAC,KAAK,CAAC,cAAc,IAAI,CAAC,IAAI,GAAG,CAAC,aAAa,CAAC,KAAK,EAAE,eAAe,EAAE;wBAC1F,GAAG,EAAE,IAAI,CAAC,KAAK,CAAC,GAAG;qBACpB,CAAC,CAAC;aACJ,CAAC,CAAC;SACJ;QAED,2DAA2D;QAC3D,IAAI,IAAI,CAAC,YAAY,EAAE;YACrB,IAAI,CAAC,YAAY,CAAC,qBAAqB,EAAE,CAAC;SAC3C;QAED,OAAO;YACL,YAAY,EAAE,IAAI,CAAC,IAAI,CAAC,IAAI;YAC5B,SAAS,QAAE,MAAM,CAAC,aAAa,0CAAE,MAAM;YACvC,eAAe,QAAE,IAAI,CAAC,YAAY,0CAAE,SAAS;YAC7C,qBAAqB,cAAE,IAAI,CAAC,YAAY,0CAAE,aAAa,0CAAE,MAAM;YAC/D,kBAAkB,EAAE,IAAI,CAAC,KAAK,CAAC,YAAY;YAC3C,mBAAmB,cAAE,IAAI,CAAC,YAAY,0CAAE,cAAc,0CAAE,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,eAAe,EAAE,IAAI,CAAC,GAAG,CAAC;YAC7F,YAAY,QAAE,IAAI,CAAC,KAAK,CAAC,GAAG,0CAAE,aAAa,CAAC,IAAI,CAAC,KAAK,CAAC,UAAU,EAAE,SAAS,CAAC,IAAI,CAAC,GAAG,CAAC;SACvF,CAAC;KACH;IAED;;OAEG;IACH,IAAW,WAAW;QACpB,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,GAAG,EAAE;YACnB,MAAM,IAAI,KAAK,CAAC,4EAA4E,CAAC,CAAC;SAC/F;QAED,+EAA+E;QAC/E,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE;YACtB,MAAM,IAAI,KAAK,CAAC,kFAAkF,CAAC,CAAC;SACrG;QAED,OAAO,IAAI,CAAC,YAAY,CAAC;KAC1B;;AApIH,wCAqIC;;;AAED;;GAEG;AACH,MAAa,kBAAkB;IA2C7B;;;OAGG;IACH,YAAoC,IAAY,EAAkB,WAAqB;QAAnD,SAAI,GAAJ,IAAI,CAAQ;QAAkB,gBAAW,GAAX,WAAW,CAAU;KAAI;;AA/C7F,gDAgDC;;;AA/CC,wBAAwB;AACD,oCAAiB,GAAG,IAAI,kBAAkB,CAAC,iBAAiB,CAAC,CAAC;AAErF,uBAAuB;AACA,mCAAgB,GAAG,IAAI,kBAAkB,CAAC,gBAAgB,EAAE,IAAI,CAAC,CAAC;AAEzF,6BAA6B;AACN,yCAAsB,GAAG,IAAI,kBAAkB,CAAC,sBAAsB,CAAC,CAAC;AAE/F,4BAA4B;AACL,wCAAqB,GAAG,IAAI,kBAAkB,CAAC,qBAAqB,EAAE,IAAI,CAAC,CAAC;AAEnG,yBAAyB;AACF,qCAAkB,GAAG,IAAI,kBAAkB,CAAC,kBAAkB,CAAC,CAAC;AAEvF,wBAAwB;AACD,oCAAiB,GAAG,IAAI,kBAAkB,CAAC,iBAAiB,EAAE,IAAI,CAAC,CAAC;AAE3F,0BAA0B;AACH,sCAAmB,GAAG,IAAI,kBAAkB,CAAC,mBAAmB,CAAC,CAAC;AAEzF,yBAAyB;AACF,qCAAkB,GAAG,IAAI,kBAAkB,CAAC,kBAAkB,EAAE,IAAI,CAAC,CAAC;AAE7F,6BAA6B;AACN,wCAAqB,GAAG,IAAI,kBAAkB,CAAC,qBAAqB,CAAC,CAAA;AAE5F,4BAA4B;AACL,uCAAoB,GAAG,IAAI,kBAAkB,CAAC,oBAAoB,EAAE,IAAI,CAAC,CAAC;AAEjG,2BAA2B;AACJ,uCAAoB,GAAG,IAAI,kBAAkB,CAAC,oBAAoB,CAAC,CAAA;AAE1F,0BAA0B;AACH,sCAAmB,GAAG,IAAI,kBAAkB,CAAC,mBAAmB,EAAE,IAAI,CAAC,CAAC;AAE/F,0BAA0B;AACH,sCAAmB,GAAG,IAAI,kBAAkB,CAAC,mBAAmB,CAAC,CAAC;AAEzF,yBAAyB;AACF,qCAAkB,GAAG,IAAI,kBAAkB,CAAC,kBAAkB,EAAE,IAAI,CAAC,CAAC","sourcesContent":["import * as ec2 from '@aws-cdk/aws-ec2';\nimport * as iam from '@aws-cdk/aws-iam';\nimport * as kms from '@aws-cdk/aws-kms';\nimport * as lambda from '@aws-cdk/aws-lambda';\nimport { Duration, Resource, Stack } from '@aws-cdk/core';\nimport { Construct } from 'constructs';\nimport { ISecret } from './secret';\nimport { CfnRotationSchedule } from './secretsmanager.generated';\n\n/**\n * Options to add a rotation schedule to a secret.\n */\nexport interface RotationScheduleOptions {\n  /**\n   * A Lambda function that can rotate the secret.\n   *\n   * @default - either `rotationLambda` or `hostedRotation` must be specified\n   */\n  readonly rotationLambda?: lambda.IFunction;\n\n  /**\n   * Hosted rotation\n   *\n   * @default - either `rotationLambda` or `hostedRotation` must be specified\n   */\n  readonly hostedRotation?: HostedRotation;\n\n  /**\n   * Specifies the number of days after the previous rotation before\n   * Secrets Manager triggers the next automatic rotation.\n   *\n   * @default Duration.days(30)\n   */\n  readonly automaticallyAfter?: Duration;\n}\n\n/**\n * Construction properties for a RotationSchedule.\n */\nexport interface RotationScheduleProps extends RotationScheduleOptions {\n  /**\n   * The secret to rotate.\n   *\n   * If hosted rotation is used, this must be a JSON string with the following format:\n   *\n   * ```\n   * {\n   *   \"engine\": <required: database engine>,\n   *   \"host\": <required: instance host name>,\n   *   \"username\": <required: username>,\n   *   \"password\": <required: password>,\n   *   \"dbname\": <optional: database name>,\n   *   \"port\": <optional: if not specified, default port will be used>,\n   *   \"masterarn\": <required for multi user rotation: the arn of the master secret which will be used to create users/change passwords>\n   * }\n   * ```\n   *\n   * This is typically the case for a secret referenced from an `AWS::SecretsManager::SecretTargetAttachment`\n   * or an `ISecret` returned by the `attach()` method of `Secret`.\n   */\n  readonly secret: ISecret;\n}\n\n/**\n * A rotation schedule.\n */\nexport class RotationSchedule extends Resource {\n  constructor(scope: Construct, id: string, props: RotationScheduleProps) {\n    super(scope, id);\n\n    if ((!props.rotationLambda && !props.hostedRotation) || (props.rotationLambda && props.hostedRotation)) {\n      throw new Error('One of `rotationLambda` or `hostedRotation` must be specified.');\n    }\n\n    if (props.rotationLambda?.permissionsNode.defaultChild) {\n      if (props.secret.encryptionKey) {\n        props.secret.encryptionKey.grantEncryptDecrypt(\n          new kms.ViaServicePrincipal(\n            `secretsmanager.${Stack.of(this).region}.amazonaws.com`,\n            props.rotationLambda.grantPrincipal,\n          ),\n        );\n      }\n\n      props.rotationLambda.grantInvoke(new iam.ServicePrincipal('secretsmanager.amazonaws.com'));\n\n      props.rotationLambda.addToRolePolicy(\n        new iam.PolicyStatement({\n          actions: [\n            'secretsmanager:DescribeSecret',\n            'secretsmanager:GetSecretValue',\n            'secretsmanager:PutSecretValue',\n            'secretsmanager:UpdateSecretVersionStage',\n          ],\n          resources: [props.secret.secretFullArn ? props.secret.secretFullArn : `${props.secret.secretArn}-??????`],\n        }),\n      );\n      props.rotationLambda.addToRolePolicy(\n        new iam.PolicyStatement({\n          actions: [\n            'secretsmanager:GetRandomPassword',\n          ],\n          resources: ['*'],\n        }),\n      );\n    }\n\n    new CfnRotationSchedule(this, 'Resource', {\n      secretId: props.secret.secretArn,\n      rotationLambdaArn: props.rotationLambda?.functionArn,\n      hostedRotationLambda: props.hostedRotation?.bind(props.secret, this),\n      rotationRules: {\n        automaticallyAfterDays: props.automaticallyAfter && props.automaticallyAfter.toDays() || 30,\n      },\n    });\n\n    // Prevent secrets deletions when rotation is in place\n    props.secret.denyAccountRootDelete();\n  }\n}\n\n/**\n * Single user hosted rotation options\n */\nexport interface SingleUserHostedRotationOptions {\n  /**\n   * A name for the Lambda created to rotate the secret\n   *\n   * @default - a CloudFormation generated name\n   */\n  readonly functionName?: string;\n\n  /**\n   * A list of security groups for the Lambda created to rotate the secret\n   *\n   * @default - a new security group is created\n   */\n  readonly securityGroups?: ec2.ISecurityGroup[];\n\n  /**\n   * The VPC where the Lambda rotation function will run.\n   *\n   * @default - the Lambda is not deployed in a VPC\n   */\n  readonly vpc?: ec2.IVpc;\n\n  /**\n   * The type of subnets in the VPC where the Lambda rotation function will run.\n   *\n   * @default - the Vpc default strategy if not specified.\n   */\n  readonly vpcSubnets?: ec2.SubnetSelection;\n}\n\n/**\n * Multi user hosted rotation options\n */\nexport interface MultiUserHostedRotationOptions extends SingleUserHostedRotationOptions {\n  /**\n   * The master secret for a multi user rotation scheme\n   */\n  readonly masterSecret: ISecret;\n}\n\n/**\n * A hosted rotation\n */\nexport class HostedRotation implements ec2.IConnectable {\n  /** MySQL Single User */\n  public static mysqlSingleUser(options: SingleUserHostedRotationOptions = {}) {\n    return new HostedRotation(HostedRotationType.MYSQL_SINGLE_USER, options);\n  }\n\n  /** MySQL Multi User */\n  public static mysqlMultiUser(options: MultiUserHostedRotationOptions) {\n    return new HostedRotation(HostedRotationType.MYSQL_MULTI_USER, options, options.masterSecret);\n  }\n\n  /** PostgreSQL Single User */\n  public static postgreSqlSingleUser(options: SingleUserHostedRotationOptions = {}) {\n    return new HostedRotation(HostedRotationType.POSTGRESQL_SINGLE_USER, options);\n  }\n\n  /** PostgreSQL Multi User */\n  public static postgreSqlMultiUser(options: MultiUserHostedRotationOptions) {\n    return new HostedRotation(HostedRotationType.POSTGRESQL_MULTI_USER, options, options.masterSecret);\n  }\n\n  /** Oracle Single User */\n  public static oracleSingleUser(options: SingleUserHostedRotationOptions = {}) {\n    return new HostedRotation(HostedRotationType.ORACLE_SINGLE_USER, options);\n  }\n\n  /** Oracle Multi User */\n  public static oracleMultiUser(options: MultiUserHostedRotationOptions) {\n    return new HostedRotation(HostedRotationType.ORACLE_MULTI_USER, options, options.masterSecret);\n  }\n\n  /** MariaDB Single User */\n  public static mariaDbSingleUser(options: SingleUserHostedRotationOptions = {}) {\n    return new HostedRotation(HostedRotationType.MARIADB_SINGLE_USER, options);\n  }\n\n  /** MariaDB Multi User */\n  public static mariaDbMultiUser(options: MultiUserHostedRotationOptions) {\n    return new HostedRotation(HostedRotationType.MARIADB_MULTI_USER, options, options.masterSecret);\n  }\n\n  /** SQL Server Single User */\n  public static sqlServerSingleUser(options: SingleUserHostedRotationOptions = {}) {\n    return new HostedRotation(HostedRotationType.SQLSERVER_SINGLE_USER, options);\n  }\n\n  /** SQL Server Multi User */\n  public static sqlServerMultiUser(options: MultiUserHostedRotationOptions) {\n    return new HostedRotation(HostedRotationType.SQLSERVER_MULTI_USER, options, options.masterSecret);\n  }\n\n  /** Redshift Single User */\n  public static redshiftSingleUser(options: SingleUserHostedRotationOptions = {}) {\n    return new HostedRotation(HostedRotationType.REDSHIFT_SINGLE_USER, options);\n  }\n\n  /** Redshift Multi User */\n  public static redshiftMultiUser(options: MultiUserHostedRotationOptions) {\n    return new HostedRotation(HostedRotationType.REDSHIFT_MULTI_USER, options, options.masterSecret);\n  }\n\n  /** MongoDB Single User */\n  public static mongoDbSingleUser(options: SingleUserHostedRotationOptions = {}) {\n    return new HostedRotation(HostedRotationType.MONGODB_SINGLE_USER, options);\n  }\n\n  /** MongoDB Multi User */\n  public static mongoDbMultiUser(options: MultiUserHostedRotationOptions) {\n    return new HostedRotation(HostedRotationType.MONGODB_MULTI_USER, options, options.masterSecret);\n  }\n\n  private _connections?: ec2.Connections;\n\n  private constructor(\n    private readonly type: HostedRotationType,\n    private readonly props: SingleUserHostedRotationOptions | MultiUserHostedRotationOptions,\n    private readonly masterSecret?: ISecret,\n  ) {\n    if (type.isMultiUser && !masterSecret) {\n      throw new Error('The `masterSecret` must be specified when using the multi user scheme.');\n    }\n  }\n\n  /**\n   * Binds this hosted rotation to a secret\n   */\n  public bind(secret: ISecret, scope: Construct): CfnRotationSchedule.HostedRotationLambdaProperty {\n    // https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-rotationschedule-hostedrotationlambda.html\n    Stack.of(scope).addTransform('AWS::SecretsManager-2020-07-23');\n\n    if (!this.props.vpc && this.props.securityGroups) {\n      throw new Error('`vpc` must be specified when specifying `securityGroups`.');\n    }\n\n    if (this.props.vpc) {\n      this._connections = new ec2.Connections({\n        securityGroups: this.props.securityGroups || [new ec2.SecurityGroup(scope, 'SecurityGroup', {\n          vpc: this.props.vpc,\n        })],\n      });\n    }\n\n    // Prevent master secret deletion when rotation is in place\n    if (this.masterSecret) {\n      this.masterSecret.denyAccountRootDelete();\n    }\n\n    return {\n      rotationType: this.type.name,\n      kmsKeyArn: secret.encryptionKey?.keyArn,\n      masterSecretArn: this.masterSecret?.secretArn,\n      masterSecretKmsKeyArn: this.masterSecret?.encryptionKey?.keyArn,\n      rotationLambdaName: this.props.functionName,\n      vpcSecurityGroupIds: this._connections?.securityGroups?.map(s => s.securityGroupId).join(','),\n      vpcSubnetIds: this.props.vpc?.selectSubnets(this.props.vpcSubnets).subnetIds.join(','),\n    };\n  }\n\n  /**\n   * Security group connections for this hosted rotation\n   */\n  public get connections() {\n    if (!this.props.vpc) {\n      throw new Error('Cannot use connections for a hosted rotation that is not deployed in a VPC');\n    }\n\n    // If we are in a vpc and bind() has been called _connections should be defined\n    if (!this._connections) {\n      throw new Error('Cannot use connections for a hosted rotation that has not been bound to a secret');\n    }\n\n    return this._connections;\n  }\n}\n\n/**\n * Hosted rotation type\n */\nexport class HostedRotationType {\n  /** MySQL Single User */\n  public static readonly MYSQL_SINGLE_USER = new HostedRotationType('MySQLSingleUser');\n\n  /** MySQL Multi User */\n  public static readonly MYSQL_MULTI_USER = new HostedRotationType('MySQLMultiUser', true);\n\n  /** PostgreSQL Single User */\n  public static readonly POSTGRESQL_SINGLE_USER = new HostedRotationType('PostgreSQLSingleUser');\n\n  /** PostgreSQL Multi User */\n  public static readonly POSTGRESQL_MULTI_USER = new HostedRotationType('PostgreSQLMultiUser', true);\n\n  /** Oracle Single User */\n  public static readonly ORACLE_SINGLE_USER = new HostedRotationType('OracleSingleUser');\n\n  /** Oracle Multi User */\n  public static readonly ORACLE_MULTI_USER = new HostedRotationType('OracleMultiUser', true);\n\n  /** MariaDB Single User */\n  public static readonly MARIADB_SINGLE_USER = new HostedRotationType('MariaDBSingleUser');\n\n  /** MariaDB Multi User */\n  public static readonly MARIADB_MULTI_USER = new HostedRotationType('MariaDBMultiUser', true);\n\n  /** SQL Server Single User */\n  public static readonly SQLSERVER_SINGLE_USER = new HostedRotationType('SQLServerSingleUser')\n\n  /** SQL Server Multi User */\n  public static readonly SQLSERVER_MULTI_USER = new HostedRotationType('SQLServerMultiUser', true);\n\n  /** Redshift Single User */\n  public static readonly REDSHIFT_SINGLE_USER = new HostedRotationType('RedshiftSingleUser')\n\n  /** Redshift Multi User */\n  public static readonly REDSHIFT_MULTI_USER = new HostedRotationType('RedshiftMultiUser', true);\n\n  /** MongoDB Single User */\n  public static readonly MONGODB_SINGLE_USER = new HostedRotationType('MongoDBSingleUser');\n\n  /** MongoDB Multi User */\n  public static readonly MONGODB_MULTI_USER = new HostedRotationType('MongoDBMultiUser', true);\n\n  /**\n   * @param name The type of rotation\n   * @param isMultiUser Whether the rotation uses the mutli user scheme\n   */\n  private constructor(public readonly name: string, public readonly isMultiUser?: boolean) {}\n}\n"]}

@@ -7,12 +7,9 @@ import * as ec2 from '@aws-cdk/aws-ec2';

/**
* Options for a SecretRotationApplication.
*
* @stability stable
* Options for a SecretRotationApplication
*/
export interface SecretRotationApplicationOptions {
/**
* Whether the rotation application uses the mutli user scheme.
* Whether the rotation application uses the mutli user scheme
*
* @default false
* @stability stable
*/

@@ -23,92 +20,62 @@ readonly isMultiUser?: boolean;

* A secret rotation serverless application.
*
* @stability stable
*/
export declare class SecretRotationApplication {
/**
* Conducts an AWS SecretsManager secret rotation for RDS MariaDB using the single user rotation scheme.
*
* @stability stable
* Conducts an AWS SecretsManager secret rotation for RDS MariaDB using the single user rotation scheme
*/
static readonly MARIADB_ROTATION_SINGLE_USER: SecretRotationApplication;
/**
* Conducts an AWS SecretsManager secret rotation for RDS MariaDB using the multi user rotation scheme.
*
* @stability stable
* Conducts an AWS SecretsManager secret rotation for RDS MariaDB using the multi user rotation scheme
*/
static readonly MARIADB_ROTATION_MULTI_USER: SecretRotationApplication;
/**
* Conducts an AWS SecretsManager secret rotation for RDS MySQL using the single user rotation scheme.
*
* @stability stable
* Conducts an AWS SecretsManager secret rotation for RDS MySQL using the single user rotation scheme
*/
static readonly MYSQL_ROTATION_SINGLE_USER: SecretRotationApplication;
/**
* Conducts an AWS SecretsManager secret rotation for RDS MySQL using the multi user rotation scheme.
*
* @stability stable
* Conducts an AWS SecretsManager secret rotation for RDS MySQL using the multi user rotation scheme
*/
static readonly MYSQL_ROTATION_MULTI_USER: SecretRotationApplication;
/**
* Conducts an AWS SecretsManager secret rotation for RDS Oracle using the single user rotation scheme.
*
* @stability stable
* Conducts an AWS SecretsManager secret rotation for RDS Oracle using the single user rotation scheme
*/
static readonly ORACLE_ROTATION_SINGLE_USER: SecretRotationApplication;
/**
* Conducts an AWS SecretsManager secret rotation for RDS Oracle using the multi user rotation scheme.
*
* @stability stable
* Conducts an AWS SecretsManager secret rotation for RDS Oracle using the multi user rotation scheme
*/
static readonly ORACLE_ROTATION_MULTI_USER: SecretRotationApplication;
/**
* Conducts an AWS SecretsManager secret rotation for RDS PostgreSQL using the single user rotation scheme.
*
* @stability stable
* Conducts an AWS SecretsManager secret rotation for RDS PostgreSQL using the single user rotation scheme
*/
static readonly POSTGRES_ROTATION_SINGLE_USER: SecretRotationApplication;
/**
* Conducts an AWS SecretsManager secret rotation for RDS PostgreSQL using the multi user rotation scheme.
*
* @stability stable
* Conducts an AWS SecretsManager secret rotation for RDS PostgreSQL using the multi user rotation scheme
*/
static readonly POSTGRES_ROTATION_MULTI_USER: SecretRotationApplication;
/**
* Conducts an AWS SecretsManager secret rotation for RDS SQL Server using the single user rotation scheme.
*
* @stability stable
* Conducts an AWS SecretsManager secret rotation for RDS SQL Server using the single user rotation scheme
*/
static readonly SQLSERVER_ROTATION_SINGLE_USER: SecretRotationApplication;
/**
* Conducts an AWS SecretsManager secret rotation for RDS SQL Server using the multi user rotation scheme.
*
* @stability stable
* Conducts an AWS SecretsManager secret rotation for RDS SQL Server using the multi user rotation scheme
*/
static readonly SQLSERVER_ROTATION_MULTI_USER: SecretRotationApplication;
/**
* Conducts an AWS SecretsManager secret rotation for Amazon Redshift using the single user rotation scheme.
*
* @stability stable
* Conducts an AWS SecretsManager secret rotation for Amazon Redshift using the single user rotation scheme
*/
static readonly REDSHIFT_ROTATION_SINGLE_USER: SecretRotationApplication;
/**
* Conducts an AWS SecretsManager secret rotation for Amazon Redshift using the multi user rotation scheme.
*
* @stability stable
* Conducts an AWS SecretsManager secret rotation for Amazon Redshift using the multi user rotation scheme
*/
static readonly REDSHIFT_ROTATION_MULTI_USER: SecretRotationApplication;
/**
* Conducts an AWS SecretsManager secret rotation for MongoDB using the single user rotation scheme.
*
* @stability stable
* Conducts an AWS SecretsManager secret rotation for MongoDB using the single user rotation scheme
*/
static readonly MONGODB_ROTATION_SINGLE_USER: SecretRotationApplication;
/**
* Conducts an AWS SecretsManager secret rotation for MongoDB using the multi user rotation scheme.
*
* @stability stable
* Conducts an AWS SecretsManager secret rotation for MongoDB using the multi user rotation scheme
*/
static readonly MONGODB_ROTATION_MULTI_USER: SecretRotationApplication;
/**
* (deprecated) The application identifier of the rotation application.
* The application identifier of the rotation application
*

@@ -119,3 +86,3 @@ * @deprecated only valid when deploying to the 'aws' partition. Use `applicationArnForPartition` instead.

/**
* (deprecated) The semantic version of the rotation application.
* The semantic version of the rotation application
*

@@ -126,5 +93,3 @@ * @deprecated only valid when deploying to the 'aws' partition. Use `semanticVersionForPartition` instead.

/**
* Whether the rotation application uses the mutli user scheme.
*
* @stability stable
* Whether the rotation application uses the mutli user scheme
*/

@@ -136,12 +101,6 @@ readonly isMultiUser?: boolean;

private readonly applicationName;
/**
* @stability stable
*/
constructor(applicationId: string, semanticVersion: string, options?: SecretRotationApplicationOptions);
/**
* Returns the application ARN for the current partition.
*
* Can be used in combination with a `CfnMapping` to automatically select the correct ARN based on the current partition.
*
* @stability stable
*/

@@ -151,6 +110,3 @@ applicationArnForPartition(partition: string): string;

* The semantic version of the app for the current partition.
*
* Can be used in combination with a `CfnMapping` to automatically select the correct version based on the current partition.
*
* @stability stable
*/

@@ -161,18 +117,16 @@ semanticVersionForPartition(partition: string): string;

* Construction properties for a SecretRotation.
*
* @stability stable
*/
export interface SecretRotationProps {
/**
* The secret to rotate. It must be a JSON string with the following format:.
* The secret to rotate. It must be a JSON string with the following format:
*
* ```
* {
* "engine": <required: database engine>,
* "host": <required: instance host name>,
* "username": <required: username>,
* "password": <required: password>,
* "dbname": <optional: database name>,
* "port": <optional: if not specified, default port will be used>,
* "masterarn": <required for multi user rotation: the arn of the master secret which will be used to create users/change passwords>
* "engine": <required: database engine>,
* "host": <required: instance host name>,
* "username": <required: username>,
* "password": <required: password>,
* "dbname": <optional: database name>,
* "port": <optional: if not specified, default port will be used>,
* "masterarn": <required for multi user rotation: the arn of the master secret which will be used to create users/change passwords>
* }

@@ -185,17 +139,15 @@ * ```

* @see https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secrettargetattachment.html
* @stability stable
*/
readonly secret: ISecret;
/**
* The master secret for a multi user rotation scheme.
* The master secret for a multi user rotation scheme
*
* @default - single user rotation scheme
* @stability stable
*/
readonly masterSecret?: ISecret;
/**
* Specifies the number of days after the previous rotation before Secrets Manager triggers the next automatic rotation.
* Specifies the number of days after the previous rotation before
* Secrets Manager triggers the next automatic rotation.
*
* @default Duration.days(30)
* @stability stable
*/

@@ -205,4 +157,2 @@ readonly automaticallyAfter?: Duration;

* The serverless application for the rotation.
*
* @stability stable
*/

@@ -212,4 +162,2 @@ readonly application: SecretRotationApplication;

* The VPC where the Lambda rotation function will run.
*
* @stability stable
*/

@@ -221,27 +169,22 @@ readonly vpc: ec2.IVpc;

* @default - the Vpc default strategy if not specified.
* @stability stable
*/
readonly vpcSubnets?: ec2.SubnetSelection;
/**
* The target service or database.
*
* @stability stable
* The target service or database
*/
readonly target: ec2.IConnectable;
/**
* The security group for the Lambda rotation function.
* The security group for the Lambda rotation function
*
* @default - a new security group is created
* @stability stable
*/
readonly securityGroup?: ec2.ISecurityGroup;
/**
* Characters which should not appear in the generated password.
* Characters which should not appear in the generated password
*
* @default - no additional characters are explicitly excluded
* @stability stable
*/
readonly excludeCharacters?: string;
/**
* The VPC interface endpoint to use for the Secrets Manager API.
* The VPC interface endpoint to use for the Secrets Manager API
*

@@ -254,3 +197,2 @@ * If you enable private DNS hostnames for your VPC private endpoint (the default), you don't

* @default https://secretsmanager.<region>.amazonaws.com
* @stability stable
*/

@@ -260,11 +202,6 @@ readonly endpoint?: ec2.IInterfaceVpcEndpoint;

/**
* Secret rotation for a service or database.
*
* @stability stable
* Secret rotation for a service or database
*/
export declare class SecretRotation extends CoreConstruct {
/**
* @stability stable
*/
constructor(scope: Construct, id: string, props: SecretRotationProps);
}

@@ -16,9 +16,4 @@ "use strict";

* A secret rotation serverless application.
*
* @stability stable
*/
class SecretRotationApplication {
/**
* @stability stable
*/
constructor(applicationId, semanticVersion, options) {

@@ -33,6 +28,3 @@ jsiiDeprecationWarnings._aws_cdk_aws_secretsmanager_SecretRotationApplicationOptions(options);

* Returns the application ARN for the current partition.
*
* Can be used in combination with a `CfnMapping` to automatically select the correct ARN based on the current partition.
*
* @stability stable
*/

@@ -55,6 +47,3 @@ applicationArnForPartition(partition) {

* The semantic version of the app for the current partition.
*
* Can be used in combination with a `CfnMapping` to automatically select the correct version based on the current partition.
*
* @stability stable
*/

@@ -78,13 +67,9 @@ semanticVersionForPartition(partition) {

_a = JSII_RTTI_SYMBOL_1;
SecretRotationApplication[_a] = { fqn: "@aws-cdk/aws-secretsmanager.SecretRotationApplication", version: "1.144.0" };
SecretRotationApplication[_a] = { fqn: "@aws-cdk/aws-secretsmanager.SecretRotationApplication", version: "1.145.0" };
/**
* Conducts an AWS SecretsManager secret rotation for RDS MariaDB using the single user rotation scheme.
*
* @stability stable
* Conducts an AWS SecretsManager secret rotation for RDS MariaDB using the single user rotation scheme
*/
SecretRotationApplication.MARIADB_ROTATION_SINGLE_USER = new SecretRotationApplication('SecretsManagerRDSMariaDBRotationSingleUser', '1.1.60');
/**
* Conducts an AWS SecretsManager secret rotation for RDS MariaDB using the multi user rotation scheme.
*
* @stability stable
* Conducts an AWS SecretsManager secret rotation for RDS MariaDB using the multi user rotation scheme
*/

@@ -95,11 +80,7 @@ SecretRotationApplication.MARIADB_ROTATION_MULTI_USER = new SecretRotationApplication('SecretsManagerRDSMariaDBRotationMultiUser', '1.1.60', {

/**
* Conducts an AWS SecretsManager secret rotation for RDS MySQL using the single user rotation scheme.
*
* @stability stable
* Conducts an AWS SecretsManager secret rotation for RDS MySQL using the single user rotation scheme
*/
SecretRotationApplication.MYSQL_ROTATION_SINGLE_USER = new SecretRotationApplication('SecretsManagerRDSMySQLRotationSingleUser', '1.1.60');
/**
* Conducts an AWS SecretsManager secret rotation for RDS MySQL using the multi user rotation scheme.
*
* @stability stable
* Conducts an AWS SecretsManager secret rotation for RDS MySQL using the multi user rotation scheme
*/

@@ -110,11 +91,7 @@ SecretRotationApplication.MYSQL_ROTATION_MULTI_USER = new SecretRotationApplication('SecretsManagerRDSMySQLRotationMultiUser', '1.1.60', {

/**
* Conducts an AWS SecretsManager secret rotation for RDS Oracle using the single user rotation scheme.
*
* @stability stable
* Conducts an AWS SecretsManager secret rotation for RDS Oracle using the single user rotation scheme
*/
SecretRotationApplication.ORACLE_ROTATION_SINGLE_USER = new SecretRotationApplication('SecretsManagerRDSOracleRotationSingleUser', '1.1.60');
/**
* Conducts an AWS SecretsManager secret rotation for RDS Oracle using the multi user rotation scheme.
*
* @stability stable
* Conducts an AWS SecretsManager secret rotation for RDS Oracle using the multi user rotation scheme
*/

@@ -125,11 +102,7 @@ SecretRotationApplication.ORACLE_ROTATION_MULTI_USER = new SecretRotationApplication('SecretsManagerRDSOracleRotationMultiUser', '1.1.60', {

/**
* Conducts an AWS SecretsManager secret rotation for RDS PostgreSQL using the single user rotation scheme.
*
* @stability stable
* Conducts an AWS SecretsManager secret rotation for RDS PostgreSQL using the single user rotation scheme
*/
SecretRotationApplication.POSTGRES_ROTATION_SINGLE_USER = new SecretRotationApplication('SecretsManagerRDSPostgreSQLRotationSingleUser', '1.1.60');
/**
* Conducts an AWS SecretsManager secret rotation for RDS PostgreSQL using the multi user rotation scheme.
*
* @stability stable
* Conducts an AWS SecretsManager secret rotation for RDS PostgreSQL using the multi user rotation scheme
*/

@@ -140,11 +113,7 @@ SecretRotationApplication.POSTGRES_ROTATION_MULTI_USER = new SecretRotationApplication('SecretsManagerRDSPostgreSQLRotationMultiUser', '1.1.60', {

/**
* Conducts an AWS SecretsManager secret rotation for RDS SQL Server using the single user rotation scheme.
*
* @stability stable
* Conducts an AWS SecretsManager secret rotation for RDS SQL Server using the single user rotation scheme
*/
SecretRotationApplication.SQLSERVER_ROTATION_SINGLE_USER = new SecretRotationApplication('SecretsManagerRDSSQLServerRotationSingleUser', '1.1.60');
/**
* Conducts an AWS SecretsManager secret rotation for RDS SQL Server using the multi user rotation scheme.
*
* @stability stable
* Conducts an AWS SecretsManager secret rotation for RDS SQL Server using the multi user rotation scheme
*/

@@ -155,11 +124,7 @@ SecretRotationApplication.SQLSERVER_ROTATION_MULTI_USER = new SecretRotationApplication('SecretsManagerRDSSQLServerRotationMultiUser', '1.1.60', {

/**
* Conducts an AWS SecretsManager secret rotation for Amazon Redshift using the single user rotation scheme.
*
* @stability stable
* Conducts an AWS SecretsManager secret rotation for Amazon Redshift using the single user rotation scheme
*/
SecretRotationApplication.REDSHIFT_ROTATION_SINGLE_USER = new SecretRotationApplication('SecretsManagerRedshiftRotationSingleUser', '1.1.60');
/**
* Conducts an AWS SecretsManager secret rotation for Amazon Redshift using the multi user rotation scheme.
*
* @stability stable
* Conducts an AWS SecretsManager secret rotation for Amazon Redshift using the multi user rotation scheme
*/

@@ -170,11 +135,7 @@ SecretRotationApplication.REDSHIFT_ROTATION_MULTI_USER = new SecretRotationApplication('SecretsManagerRedshiftRotationMultiUser', '1.1.60', {

/**
* Conducts an AWS SecretsManager secret rotation for MongoDB using the single user rotation scheme.
*
* @stability stable
* Conducts an AWS SecretsManager secret rotation for MongoDB using the single user rotation scheme
*/
SecretRotationApplication.MONGODB_ROTATION_SINGLE_USER = new SecretRotationApplication('SecretsManagerMongoDBRotationSingleUser', '1.1.60');
/**
* Conducts an AWS SecretsManager secret rotation for MongoDB using the multi user rotation scheme.
*
* @stability stable
* Conducts an AWS SecretsManager secret rotation for MongoDB using the multi user rotation scheme
*/

@@ -185,10 +146,5 @@ SecretRotationApplication.MONGODB_ROTATION_MULTI_USER = new SecretRotationApplication('SecretsManagerMongoDBRotationMultiUser', '1.1.60', {

/**
* Secret rotation for a service or database.
*
* @stability stable
* Secret rotation for a service or database
*/
class SecretRotation extends core_2.Construct {
/**
* @stability stable
*/
constructor(scope, id, props) {

@@ -268,3 +224,3 @@ super(scope, id);

_b = JSII_RTTI_SYMBOL_1;
SecretRotation[_b] = { fqn: "@aws-cdk/aws-secretsmanager.SecretRotation", version: "1.144.0" };
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"secret-rotation.js","sourceRoot":"","sources":["secret-rotation.ts"],"names":[],"mappings":";;;;;;AAAA,wCAAwC;AACxC,8CAA8C;AAC9C,+CAA+C;AAC/C,wCAA+E;AAI/E,gHAAgH;AAChH,2BAA2B;AAC3B,wCAA2D;;;;;;AAS3D,MAAa,yBAAyB;;;;IAuEpC,YAAY,aAAqB,EAAE,eAAuB,EAAE,OAA0C;;QACpG,IAAI,CAAC,aAAa,GAAG,8DAA8D,aAAa,EAAE,CAAC;QACnG,IAAI,CAAC,eAAe,GAAG,eAAe,CAAC;QACvC,IAAI,CAAC,eAAe,GAAG,aAAa,CAAC;QACrC,IAAI,CAAC,WAAW,GAAG,OAAO,IAAI,OAAO,CAAC,WAAW,CAAC;KACnD;;;;;;;;IAGM,0BAA0B,CAAC,SAAiB;QACjD,IAAI,SAAS,KAAK,KAAK,EAAE;YACvB,OAAO,IAAI,CAAC,aAAa,CAAC;SAC3B;aAAM,IAAI,SAAS,KAAK,QAAQ,EAAE;YACjC,OAAO,kEAAkE,IAAI,CAAC,eAAe,EAAE,CAAC;SACjG;aAAM,IAAI,SAAS,KAAK,YAAY,EAAE;YACrC,OAAO,yEAAyE,IAAI,CAAC,eAAe,EAAE,CAAC;SACxG;aAAM;YACL,MAAM,IAAI,KAAK,CAAC,0BAA0B,SAAS,EAAE,CAAC,CAAC;SACxD;KACF;;;;;;;;IAGM,2BAA2B,CAAC,SAAiB;QAClD,IAAI,SAAS,KAAK,KAAK,EAAE;YACvB,OAAO,IAAI,CAAC,eAAe,CAAC;SAC7B;aAAM,IAAI,SAAS,KAAK,QAAQ,EAAE;YACjC,OAAO,QAAQ,CAAC;SACjB;aAAM,IAAI,SAAS,KAAK,YAAY,EAAE;YACrC,OAAO,QAAQ,CAAC;SACjB;aAAM;YACL,MAAM,IAAI,KAAK,CAAC,0BAA0B,SAAS,EAAE,CAAC,CAAC;SACxD;KACF;;AAtGH,8DAuGC;;;;;;;;AArGwB,sDAA4B,GAAG,IAAI,yBAAyB,CAAC,4CAA4C,EAAE,QAAQ,CAAC,CAAC;;;;;;AAGrH,qDAA2B,GAAG,IAAI,yBAAyB,CAAC,2CAA2C,EAAE,QAAQ,EAAE;IACxI,WAAW,EAAE,IAAI;CAClB,CAAC,CAAC;;;;;;AAGoB,oDAA0B,GAAG,IAAI,yBAAyB,CAAC,0CAA0C,EAAE,QAAQ,CAAC,CAAC;;;;;;AAGjH,mDAAyB,GAAG,IAAI,yBAAyB,CAAC,yCAAyC,EAAE,QAAQ,EAAE;IACpI,WAAW,EAAE,IAAI;CAClB,CAAC,CAAC;;;;;;AAGoB,qDAA2B,GAAG,IAAI,yBAAyB,CAAC,2CAA2C,EAAE,QAAQ,CAAC,CAAC;;;;;;AAGnH,oDAA0B,GAAG,IAAI,yBAAyB,CAAC,0CAA0C,EAAE,QAAQ,EAAE;IACtI,WAAW,EAAE,IAAI;CAClB,CAAC,CAAC;;;;;;AAGoB,uDAA6B,GAAG,IAAI,yBAAyB,CAAC,+CAA+C,EAAE,QAAQ,CAAC,CAAC;;;;;;AAGzH,sDAA4B,GAAG,IAAI,yBAAyB,CAAC,8CAA8C,EAAE,QAAQ,EAAE;IAC5I,WAAW,EAAE,IAAI;CAClB,CAAC,CAAC;;;;;;AAGoB,wDAA8B,GAAG,IAAI,yBAAyB,CAAC,8CAA8C,EAAE,QAAQ,CAAC,CAAC;;;;;;AAGzH,uDAA6B,GAAG,IAAI,yBAAyB,CAAC,6CAA6C,EAAE,QAAQ,EAAE;IAC5I,WAAW,EAAE,IAAI;CAClB,CAAC,CAAC;;;;;;AAGoB,uDAA6B,GAAG,IAAI,yBAAyB,CAAC,0CAA0C,EAAE,QAAQ,CAAC,CAAC;;;;;;AAGpH,sDAA4B,GAAG,IAAI,yBAAyB,CAAC,yCAAyC,EAAE,QAAQ,EAAE;IACvI,WAAW,EAAE,IAAI;CAClB,CAAC,CAAC;;;;;;AAGoB,sDAA4B,GAAG,IAAI,yBAAyB,CAAC,yCAAyC,EAAE,QAAQ,CAAC,CAAC;;;;;;AAGlH,qDAA2B,GAAG,IAAI,yBAAyB,CAAC,wCAAwC,EAAE,QAAQ,EAAE;IACrI,WAAW,EAAE,IAAI;CAClB,CAAC,CAAC;;;;;;AAoFL,MAAa,cAAe,SAAQ,gBAAa;;;;IAC/C,YAAY,KAAgB,EAAE,EAAU,EAAE,KAA0B;QAClE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;;QAEjB,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,WAAW,CAAC,WAAW,EAAE;YACzC,MAAM,IAAI,KAAK,CAAC,0DAA0D,CAAC,CAAC;SAC7E;QAED,IAAI,KAAK,CAAC,WAAW,CAAC,WAAW,IAAI,CAAC,KAAK,CAAC,YAAY,EAAE;YACxD,MAAM,IAAI,KAAK,CAAC,mFAAmF,CAAC,CAAC;SACtG;QAED,gDAAgD;QAChD,MAAM,QAAQ,GAAG,YAAK,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC;QACtC,MAAM,oBAAoB,GAAG,QAAQ,CAAC,SAAS,CAAC,IAAI,CAAC,GAAG,CAAC,QAAQ,CAAC,MAAM,GAAG,EAAE,EAAE,CAAC,CAAC,EAAE,QAAQ,CAAC,MAAM,CAAC,CAAC;QAEpG,MAAM,aAAa,GAAG,KAAK,CAAC,aAAa,IAAI,IAAI,GAAG,CAAC,aAAa,CAAC,IAAI,EAAE,eAAe,EAAE;YACxF,GAAG,EAAE,KAAK,CAAC,GAAG;SACf,CAAC,CAAC;QACH,KAAK,CAAC,MAAM,CAAC,WAAW,CAAC,oBAAoB,CAAC,aAAa,CAAC,CAAC;QAE7D,MAAM,UAAU,GAA8B;YAC5C,QAAQ,EAAE,WAAW,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,GAAG,KAAK,CAAC,QAAQ,CAAC,aAAa,GAAG,CAAC,CAAC,CAAC,EAAE,kBAAkB,YAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,MAAM,IAAI,YAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,SAAS,EAAE;YAClJ,YAAY,EAAE,oBAAoB;YAClC,YAAY,EAAE,KAAK,CAAC,GAAG,CAAC,aAAa,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,SAAS,CAAC,IAAI,CAAC,GAAG,CAAC;YAC3E,mBAAmB,EAAE,aAAa,CAAC,eAAe;SACnD,CAAC;QAEF,IAAI,KAAK,CAAC,iBAAiB,KAAK,SAAS,EAAE;YACzC,UAAU,CAAC,iBAAiB,GAAG,KAAK,CAAC,iBAAiB,CAAC;SACxD;QAED,IAAI,KAAK,CAAC,MAAM,CAAC,aAAa,EAAE;YAC9B,UAAU,CAAC,SAAS,GAAG,KAAK,CAAC,MAAM,CAAC,aAAa,CAAC,MAAM,CAAC;SAC1D;QAED,IAAI,KAAK,CAAC,YAAY,EAAE;YACtB,UAAU,CAAC,eAAe,GAAG,KAAK,CAAC,YAAY,CAAC,SAAS,CAAC;YAE1D,IAAI,KAAK,CAAC,YAAY,CAAC,aAAa,EAAE;gBACpC,UAAU,CAAC,qBAAqB,GAAG,KAAK,CAAC,YAAY,CAAC,aAAa,CAAC,MAAM,CAAC;aAC5E;SACF;QAED,MAAM,UAAU,GAAG,IAAI,iBAAU,CAAC,IAAI,EAAE,YAAY,EAAE;YACpD,OAAO,EAAE;gBACP,KAAK,EAAE;oBACL,aAAa,EAAE,KAAK,CAAC,WAAW,CAAC,0BAA0B,CAAC,KAAK,CAAC;oBAClE,eAAe,EAAE,KAAK,CAAC,WAAW,CAAC,2BAA2B,CAAC,KAAK,CAAC;iBACtE;gBACD,QAAQ,EAAE;oBACR,aAAa,EAAE,KAAK,CAAC,WAAW,CAAC,0BAA0B,CAAC,QAAQ,CAAC;oBACrE,eAAe,EAAE,KAAK,CAAC,WAAW,CAAC,2BAA2B,CAAC,QAAQ,CAAC;iBACzE;gBACD,YAAY,EAAE;oBACZ,aAAa,EAAE,KAAK,CAAC,WAAW,CAAC,0BAA0B,CAAC,YAAY,CAAC;oBACzE,eAAe,EAAE,KAAK,CAAC,WAAW,CAAC,2BAA2B,CAAC,YAAY,CAAC;iBAC7E;aACF;SACF,CAAC,CAAC;QACH,MAAM,WAAW,GAAG,IAAI,UAAU,CAAC,cAAc,CAAC,IAAI,EAAE,UAAU,EAAE;YAClE,QAAQ,EAAE;gBACR,aAAa,EAAE,UAAU,CAAC,SAAS,CAAC,UAAG,CAAC,SAAS,EAAE,eAAe,CAAC;gBACnE,eAAe,EAAE,UAAU,CAAC,SAAS,CAAC,UAAG,CAAC,SAAS,EAAE,iBAAiB,CAAC;aACxE;YACD,UAAU;SACX,CAAC,CAAC;QAEH,uEAAuE;QACvE,sEAAsE;QACtE,6DAA6D;QAC7D,kGAAkG;QAClG,MAAM,cAAc,GAAG,MAAM,CAAC,QAAQ,CAAC,eAAe,CAAC,IAAI,EAAE,gBAAgB,EAAE,YAAK,CAAC,QAAQ,CAAC,WAAW,CAAC,MAAM,CAAC,2BAA2B,CAAC,CAAC,CAAC,CAAC;QAEhJ,KAAK,CAAC,MAAM,CAAC,mBAAmB,CAAC,kBAAkB,EAAE;YACnD,cAAc;YACd,kBAAkB,EAAE,KAAK,CAAC,kBAAkB;SAC7C,CAAC,CAAC;QAEH,2DAA2D;QAC3D,IAAI,KAAK,CAAC,YAAY,EAAE;YACtB,KAAK,CAAC,YAAY,CAAC,qBAAqB,EAAE,CAAC;SAC5C;KACF;;AAnFH,wCAoFC","sourcesContent":["import * as ec2 from '@aws-cdk/aws-ec2';\nimport * as lambda from '@aws-cdk/aws-lambda';\nimport * as serverless from '@aws-cdk/aws-sam';\nimport { Duration, Names, Stack, Token, CfnMapping, Aws } from '@aws-cdk/core';\nimport { Construct } from 'constructs';\nimport { ISecret } from './secret';\n\n// v2 - keep this import as a separate section to reduce merge conflict when forward merging with the v2 branch.\n// eslint-disable-next-line\nimport { Construct as CoreConstruct } from '@aws-cdk/core';\n\n                                                  \nexport interface SecretRotationApplicationOptions {\n                                                                                                     \n  readonly isMultiUser?: boolean;\n}\n\n                                                    \nexport class SecretRotationApplication {\n                                                                                                                     \n  public static readonly MARIADB_ROTATION_SINGLE_USER = new SecretRotationApplication('SecretsManagerRDSMariaDBRotationSingleUser', '1.1.60');\n\n                                                                                                                    \n  public static readonly MARIADB_ROTATION_MULTI_USER = new SecretRotationApplication('SecretsManagerRDSMariaDBRotationMultiUser', '1.1.60', {\n    isMultiUser: true,\n  });\n\n                                                                                                                   \n  public static readonly MYSQL_ROTATION_SINGLE_USER = new SecretRotationApplication('SecretsManagerRDSMySQLRotationSingleUser', '1.1.60');\n\n                                                                                                                  \n  public static readonly MYSQL_ROTATION_MULTI_USER = new SecretRotationApplication('SecretsManagerRDSMySQLRotationMultiUser', '1.1.60', {\n    isMultiUser: true,\n  });\n\n                                                                                                                    \n  public static readonly ORACLE_ROTATION_SINGLE_USER = new SecretRotationApplication('SecretsManagerRDSOracleRotationSingleUser', '1.1.60');\n\n                                                                                                                   \n  public static readonly ORACLE_ROTATION_MULTI_USER = new SecretRotationApplication('SecretsManagerRDSOracleRotationMultiUser', '1.1.60', {\n    isMultiUser: true,\n  });\n\n                                                                                                                        \n  public static readonly POSTGRES_ROTATION_SINGLE_USER = new SecretRotationApplication('SecretsManagerRDSPostgreSQLRotationSingleUser', '1.1.60');\n\n                                                                                                                       \n  public static readonly POSTGRES_ROTATION_MULTI_USER = new SecretRotationApplication('SecretsManagerRDSPostgreSQLRotationMultiUser', '1.1.60', {\n    isMultiUser: true,\n  });\n\n                                                                                                                        \n  public static readonly SQLSERVER_ROTATION_SINGLE_USER = new SecretRotationApplication('SecretsManagerRDSSQLServerRotationSingleUser', '1.1.60');\n\n                                                                                                                       \n  public static readonly SQLSERVER_ROTATION_MULTI_USER = new SecretRotationApplication('SecretsManagerRDSSQLServerRotationMultiUser', '1.1.60', {\n    isMultiUser: true,\n  });\n\n                                                                                                                         \n  public static readonly REDSHIFT_ROTATION_SINGLE_USER = new SecretRotationApplication('SecretsManagerRedshiftRotationSingleUser', '1.1.60');\n\n                                                                                                                        \n  public static readonly REDSHIFT_ROTATION_MULTI_USER = new SecretRotationApplication('SecretsManagerRedshiftRotationMultiUser', '1.1.60', {\n    isMultiUser: true,\n  });\n\n                                                                                                                 \n  public static readonly MONGODB_ROTATION_SINGLE_USER = new SecretRotationApplication('SecretsManagerMongoDBRotationSingleUser', '1.1.60');\n\n                                                                                                                \n  public static readonly MONGODB_ROTATION_MULTI_USER = new SecretRotationApplication('SecretsManagerMongoDBRotationMultiUser', '1.1.60', {\n    isMultiUser: true,\n  });\n\n                                                                                                                                                                                         \n  public readonly applicationId: string;\n\n                                                                                                                                                                                    \n  public readonly semanticVersion: string;\n\n                                                                            \n  public readonly isMultiUser?: boolean;\n\n  /**\n   * The application name of the rotation application\n   */\n  private readonly applicationName: string;\n\n  constructor(applicationId: string, semanticVersion: string, options?: SecretRotationApplicationOptions) {\n    this.applicationId = `arn:aws:serverlessrepo:us-east-1:297356227824:applications/${applicationId}`;\n    this.semanticVersion = semanticVersion;\n    this.applicationName = applicationId;\n    this.isMultiUser = options && options.isMultiUser;\n  }\n\n                                                                                                                                                                                                   \n  public applicationArnForPartition(partition: string) {\n    if (partition === 'aws') {\n      return this.applicationId;\n    } else if (partition === 'aws-cn') {\n      return `arn:aws-cn:serverlessrepo:cn-north-1:193023089310:applications/${this.applicationName}`;\n    } else if (partition === 'aws-us-gov') {\n      return `arn:aws-us-gov:serverlessrepo:us-gov-west-1:023102451235:applications/${this.applicationName}`;\n    } else {\n      throw new Error(`unsupported partition: ${partition}`);\n    }\n  }\n\n                                                                                                                                                                                                           \n  public semanticVersionForPartition(partition: string) {\n    if (partition === 'aws') {\n      return this.semanticVersion;\n    } else if (partition === 'aws-cn') {\n      return '1.1.37';\n    } else if (partition === 'aws-us-gov') {\n      return '1.1.93';\n    } else {\n      throw new Error(`unsupported partition: ${partition}`);\n    }\n  }\n}\n\n                                                        \nexport interface SecretRotationProps {\n                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        \n  readonly secret: ISecret;\n\n                                                                                                                    \n  readonly masterSecret?: ISecret;\n\n                                                                                                                                                                                \n  readonly automaticallyAfter?: Duration;\n\n                                                             \n  readonly application: SecretRotationApplication;\n\n                                                                     \n  readonly vpc: ec2.IVpc;\n\n                                                                                                                                                            \n  readonly vpcSubnets?: ec2.SubnetSelection;\n\n                                               \n  readonly target: ec2.IConnectable;\n\n                                                                                                                         \n  readonly securityGroup?: ec2.ISecurityGroup;\n\n                                                                                                                                                   \n  readonly excludeCharacters?: string;\n\n                                                                                                                                                                                                                                                                                                                                                                                                                                                                                       \n  readonly endpoint?: ec2.IInterfaceVpcEndpoint;\n}\n\n                                                    \nexport class SecretRotation extends CoreConstruct {\n  constructor(scope: Construct, id: string, props: SecretRotationProps) {\n    super(scope, id);\n\n    if (!props.target.connections.defaultPort) {\n      throw new Error('The `target` connections must have a default port range.');\n    }\n\n    if (props.application.isMultiUser && !props.masterSecret) {\n      throw new Error('The `masterSecret` must be specified for application using the multi user scheme.');\n    }\n\n    // Max length of 64 chars, get the last 64 chars\n    const uniqueId = Names.uniqueId(this);\n    const rotationFunctionName = uniqueId.substring(Math.max(uniqueId.length - 64, 0), uniqueId.length);\n\n    const securityGroup = props.securityGroup || new ec2.SecurityGroup(this, 'SecurityGroup', {\n      vpc: props.vpc,\n    });\n    props.target.connections.allowDefaultPortFrom(securityGroup);\n\n    const parameters: { [key: string]: string } = {\n      endpoint: `https://${props.endpoint ? `${props.endpoint.vpcEndpointId}.` : ''}secretsmanager.${Stack.of(this).region}.${Stack.of(this).urlSuffix}`,\n      functionName: rotationFunctionName,\n      vpcSubnetIds: props.vpc.selectSubnets(props.vpcSubnets).subnetIds.join(','),\n      vpcSecurityGroupIds: securityGroup.securityGroupId,\n    };\n\n    if (props.excludeCharacters !== undefined) {\n      parameters.excludeCharacters = props.excludeCharacters;\n    }\n\n    if (props.secret.encryptionKey) {\n      parameters.kmsKeyArn = props.secret.encryptionKey.keyArn;\n    }\n\n    if (props.masterSecret) {\n      parameters.masterSecretArn = props.masterSecret.secretArn;\n\n      if (props.masterSecret.encryptionKey) {\n        parameters.masterSecretKmsKeyArn = props.masterSecret.encryptionKey.keyArn;\n      }\n    }\n\n    const sarMapping = new CfnMapping(this, 'SARMapping', {\n      mapping: {\n        'aws': {\n          applicationId: props.application.applicationArnForPartition('aws'),\n          semanticVersion: props.application.semanticVersionForPartition('aws'),\n        },\n        'aws-cn': {\n          applicationId: props.application.applicationArnForPartition('aws-cn'),\n          semanticVersion: props.application.semanticVersionForPartition('aws-cn'),\n        },\n        'aws-us-gov': {\n          applicationId: props.application.applicationArnForPartition('aws-us-gov'),\n          semanticVersion: props.application.semanticVersionForPartition('aws-us-gov'),\n        },\n      },\n    });\n    const application = new serverless.CfnApplication(this, 'Resource', {\n      location: {\n        applicationId: sarMapping.findInMap(Aws.PARTITION, 'applicationId'),\n        semanticVersion: sarMapping.findInMap(Aws.PARTITION, 'semanticVersion'),\n      },\n      parameters,\n    });\n\n    // This creates a CF a dependency between the rotation schedule and the\n    // serverless application. This is needed because it's the application\n    // that creates the Lambda permission to invoke the function.\n    // See https://docs.aws.amazon.com/secretsmanager/latest/userguide/integrating_cloudformation.html\n    const rotationLambda = lambda.Function.fromFunctionArn(this, 'RotationLambda', Token.asString(application.getAtt('Outputs.RotationLambdaARN')));\n\n    props.secret.addRotationSchedule('RotationSchedule', {\n      rotationLambda,\n      automaticallyAfter: props.automaticallyAfter,\n    });\n\n    // Prevent master secret deletion when rotation is in place\n    if (props.masterSecret) {\n      props.masterSecret.denyAccountRootDelete();\n    }\n  }\n}\n"]}
SecretRotation[_b] = { fqn: "@aws-cdk/aws-secretsmanager.SecretRotation", version: "1.145.0" };
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"secret-rotation.js","sourceRoot":"","sources":["secret-rotation.ts"],"names":[],"mappings":";;;;;;AAAA,wCAAwC;AACxC,8CAA8C;AAC9C,+CAA+C;AAC/C,wCAA+E;AAI/E,gHAAgH;AAChH,2BAA2B;AAC3B,wCAA2D;AAc3D;;GAEG;AACH,MAAa,yBAAyB;IA6GpC,YAAY,aAAqB,EAAE,eAAuB,EAAE,OAA0C;;QACpG,IAAI,CAAC,aAAa,GAAG,8DAA8D,aAAa,EAAE,CAAC;QACnG,IAAI,CAAC,eAAe,GAAG,eAAe,CAAC;QACvC,IAAI,CAAC,eAAe,GAAG,aAAa,CAAC;QACrC,IAAI,CAAC,WAAW,GAAG,OAAO,IAAI,OAAO,CAAC,WAAW,CAAC;KACnD;IAED;;;OAGG;IACI,0BAA0B,CAAC,SAAiB;QACjD,IAAI,SAAS,KAAK,KAAK,EAAE;YACvB,OAAO,IAAI,CAAC,aAAa,CAAC;SAC3B;aAAM,IAAI,SAAS,KAAK,QAAQ,EAAE;YACjC,OAAO,kEAAkE,IAAI,CAAC,eAAe,EAAE,CAAC;SACjG;aAAM,IAAI,SAAS,KAAK,YAAY,EAAE;YACrC,OAAO,yEAAyE,IAAI,CAAC,eAAe,EAAE,CAAC;SACxG;aAAM;YACL,MAAM,IAAI,KAAK,CAAC,0BAA0B,SAAS,EAAE,CAAC,CAAC;SACxD;KACF;IAED;;;OAGG;IACI,2BAA2B,CAAC,SAAiB;QAClD,IAAI,SAAS,KAAK,KAAK,EAAE;YACvB,OAAO,IAAI,CAAC,eAAe,CAAC;SAC7B;aAAM,IAAI,SAAS,KAAK,QAAQ,EAAE;YACjC,OAAO,QAAQ,CAAC;SACjB;aAAM,IAAI,SAAS,KAAK,YAAY,EAAE;YACrC,OAAO,QAAQ,CAAC;SACjB;aAAM;YACL,MAAM,IAAI,KAAK,CAAC,0BAA0B,SAAS,EAAE,CAAC,CAAC;SACxD;KACF;;AAlJH,8DAmJC;;;AAlJC;;GAEG;AACoB,sDAA4B,GAAG,IAAI,yBAAyB,CAAC,4CAA4C,EAAE,QAAQ,CAAC,CAAC;AAE5I;;GAEG;AACoB,qDAA2B,GAAG,IAAI,yBAAyB,CAAC,2CAA2C,EAAE,QAAQ,EAAE;IACxI,WAAW,EAAE,IAAI;CAClB,CAAC,CAAC;AAEH;;GAEG;AACoB,oDAA0B,GAAG,IAAI,yBAAyB,CAAC,0CAA0C,EAAE,QAAQ,CAAC,CAAC;AAExI;;GAEG;AACoB,mDAAyB,GAAG,IAAI,yBAAyB,CAAC,yCAAyC,EAAE,QAAQ,EAAE;IACpI,WAAW,EAAE,IAAI;CAClB,CAAC,CAAC;AAEH;;GAEG;AACoB,qDAA2B,GAAG,IAAI,yBAAyB,CAAC,2CAA2C,EAAE,QAAQ,CAAC,CAAC;AAE1I;;GAEG;AACoB,oDAA0B,GAAG,IAAI,yBAAyB,CAAC,0CAA0C,EAAE,QAAQ,EAAE;IACtI,WAAW,EAAE,IAAI;CAClB,CAAC,CAAC;AAEH;;GAEG;AACoB,uDAA6B,GAAG,IAAI,yBAAyB,CAAC,+CAA+C,EAAE,QAAQ,CAAC,CAAC;AAEhJ;;GAEG;AACoB,sDAA4B,GAAG,IAAI,yBAAyB,CAAC,8CAA8C,EAAE,QAAQ,EAAE;IAC5I,WAAW,EAAE,IAAI;CAClB,CAAC,CAAC;AAEH;;GAEG;AACoB,wDAA8B,GAAG,IAAI,yBAAyB,CAAC,8CAA8C,EAAE,QAAQ,CAAC,CAAC;AAEhJ;;GAEG;AACoB,uDAA6B,GAAG,IAAI,yBAAyB,CAAC,6CAA6C,EAAE,QAAQ,EAAE;IAC5I,WAAW,EAAE,IAAI;CAClB,CAAC,CAAC;AAEH;;GAEG;AACoB,uDAA6B,GAAG,IAAI,yBAAyB,CAAC,0CAA0C,EAAE,QAAQ,CAAC,CAAC;AAE3I;;GAEG;AACoB,sDAA4B,GAAG,IAAI,yBAAyB,CAAC,yCAAyC,EAAE,QAAQ,EAAE;IACvI,WAAW,EAAE,IAAI;CAClB,CAAC,CAAC;AAEH;;GAEG;AACoB,sDAA4B,GAAG,IAAI,yBAAyB,CAAC,yCAAyC,EAAE,QAAQ,CAAC,CAAC;AAEzI;;GAEG;AACoB,qDAA2B,GAAG,IAAI,yBAAyB,CAAC,wCAAwC,EAAE,QAAQ,EAAE;IACrI,WAAW,EAAE,IAAI;CAClB,CAAC,CAAC;AA4JL;;GAEG;AACH,MAAa,cAAe,SAAQ,gBAAa;IAC/C,YAAY,KAAgB,EAAE,EAAU,EAAE,KAA0B;QAClE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;;QAEjB,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,WAAW,CAAC,WAAW,EAAE;YACzC,MAAM,IAAI,KAAK,CAAC,0DAA0D,CAAC,CAAC;SAC7E;QAED,IAAI,KAAK,CAAC,WAAW,CAAC,WAAW,IAAI,CAAC,KAAK,CAAC,YAAY,EAAE;YACxD,MAAM,IAAI,KAAK,CAAC,mFAAmF,CAAC,CAAC;SACtG;QAED,gDAAgD;QAChD,MAAM,QAAQ,GAAG,YAAK,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC;QACtC,MAAM,oBAAoB,GAAG,QAAQ,CAAC,SAAS,CAAC,IAAI,CAAC,GAAG,CAAC,QAAQ,CAAC,MAAM,GAAG,EAAE,EAAE,CAAC,CAAC,EAAE,QAAQ,CAAC,MAAM,CAAC,CAAC;QAEpG,MAAM,aAAa,GAAG,KAAK,CAAC,aAAa,IAAI,IAAI,GAAG,CAAC,aAAa,CAAC,IAAI,EAAE,eAAe,EAAE;YACxF,GAAG,EAAE,KAAK,CAAC,GAAG;SACf,CAAC,CAAC;QACH,KAAK,CAAC,MAAM,CAAC,WAAW,CAAC,oBAAoB,CAAC,aAAa,CAAC,CAAC;QAE7D,MAAM,UAAU,GAA8B;YAC5C,QAAQ,EAAE,WAAW,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,GAAG,KAAK,CAAC,QAAQ,CAAC,aAAa,GAAG,CAAC,CAAC,CAAC,EAAE,kBAAkB,YAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,MAAM,IAAI,YAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,SAAS,EAAE;YAClJ,YAAY,EAAE,oBAAoB;YAClC,YAAY,EAAE,KAAK,CAAC,GAAG,CAAC,aAAa,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,SAAS,CAAC,IAAI,CAAC,GAAG,CAAC;YAC3E,mBAAmB,EAAE,aAAa,CAAC,eAAe;SACnD,CAAC;QAEF,IAAI,KAAK,CAAC,iBAAiB,KAAK,SAAS,EAAE;YACzC,UAAU,CAAC,iBAAiB,GAAG,KAAK,CAAC,iBAAiB,CAAC;SACxD;QAED,IAAI,KAAK,CAAC,MAAM,CAAC,aAAa,EAAE;YAC9B,UAAU,CAAC,SAAS,GAAG,KAAK,CAAC,MAAM,CAAC,aAAa,CAAC,MAAM,CAAC;SAC1D;QAED,IAAI,KAAK,CAAC,YAAY,EAAE;YACtB,UAAU,CAAC,eAAe,GAAG,KAAK,CAAC,YAAY,CAAC,SAAS,CAAC;YAE1D,IAAI,KAAK,CAAC,YAAY,CAAC,aAAa,EAAE;gBACpC,UAAU,CAAC,qBAAqB,GAAG,KAAK,CAAC,YAAY,CAAC,aAAa,CAAC,MAAM,CAAC;aAC5E;SACF;QAED,MAAM,UAAU,GAAG,IAAI,iBAAU,CAAC,IAAI,EAAE,YAAY,EAAE;YACpD,OAAO,EAAE;gBACP,KAAK,EAAE;oBACL,aAAa,EAAE,KAAK,CAAC,WAAW,CAAC,0BAA0B,CAAC,KAAK,CAAC;oBAClE,eAAe,EAAE,KAAK,CAAC,WAAW,CAAC,2BAA2B,CAAC,KAAK,CAAC;iBACtE;gBACD,QAAQ,EAAE;oBACR,aAAa,EAAE,KAAK,CAAC,WAAW,CAAC,0BAA0B,CAAC,QAAQ,CAAC;oBACrE,eAAe,EAAE,KAAK,CAAC,WAAW,CAAC,2BAA2B,CAAC,QAAQ,CAAC;iBACzE;gBACD,YAAY,EAAE;oBACZ,aAAa,EAAE,KAAK,CAAC,WAAW,CAAC,0BAA0B,CAAC,YAAY,CAAC;oBACzE,eAAe,EAAE,KAAK,CAAC,WAAW,CAAC,2BAA2B,CAAC,YAAY,CAAC;iBAC7E;aACF;SACF,CAAC,CAAC;QACH,MAAM,WAAW,GAAG,IAAI,UAAU,CAAC,cAAc,CAAC,IAAI,EAAE,UAAU,EAAE;YAClE,QAAQ,EAAE;gBACR,aAAa,EAAE,UAAU,CAAC,SAAS,CAAC,UAAG,CAAC,SAAS,EAAE,eAAe,CAAC;gBACnE,eAAe,EAAE,UAAU,CAAC,SAAS,CAAC,UAAG,CAAC,SAAS,EAAE,iBAAiB,CAAC;aACxE;YACD,UAAU;SACX,CAAC,CAAC;QAEH,uEAAuE;QACvE,sEAAsE;QACtE,6DAA6D;QAC7D,kGAAkG;QAClG,MAAM,cAAc,GAAG,MAAM,CAAC,QAAQ,CAAC,eAAe,CAAC,IAAI,EAAE,gBAAgB,EAAE,YAAK,CAAC,QAAQ,CAAC,WAAW,CAAC,MAAM,CAAC,2BAA2B,CAAC,CAAC,CAAC,CAAC;QAEhJ,KAAK,CAAC,MAAM,CAAC,mBAAmB,CAAC,kBAAkB,EAAE;YACnD,cAAc;YACd,kBAAkB,EAAE,KAAK,CAAC,kBAAkB;SAC7C,CAAC,CAAC;QAEH,2DAA2D;QAC3D,IAAI,KAAK,CAAC,YAAY,EAAE;YACtB,KAAK,CAAC,YAAY,CAAC,qBAAqB,EAAE,CAAC;SAC5C;KACF;;AAnFH,wCAoFC","sourcesContent":["import * as ec2 from '@aws-cdk/aws-ec2';\nimport * as lambda from '@aws-cdk/aws-lambda';\nimport * as serverless from '@aws-cdk/aws-sam';\nimport { Duration, Names, Stack, Token, CfnMapping, Aws } from '@aws-cdk/core';\nimport { Construct } from 'constructs';\nimport { ISecret } from './secret';\n\n// v2 - keep this import as a separate section to reduce merge conflict when forward merging with the v2 branch.\n// eslint-disable-next-line\nimport { Construct as CoreConstruct } from '@aws-cdk/core';\n\n/**\n * Options for a SecretRotationApplication\n */\nexport interface SecretRotationApplicationOptions {\n  /**\n   * Whether the rotation application uses the mutli user scheme\n   *\n   * @default false\n   */\n  readonly isMultiUser?: boolean;\n}\n\n/**\n * A secret rotation serverless application.\n */\nexport class SecretRotationApplication {\n  /**\n   * Conducts an AWS SecretsManager secret rotation for RDS MariaDB using the single user rotation scheme\n   */\n  public static readonly MARIADB_ROTATION_SINGLE_USER = new SecretRotationApplication('SecretsManagerRDSMariaDBRotationSingleUser', '1.1.60');\n\n  /**\n   * Conducts an AWS SecretsManager secret rotation for RDS MariaDB using the multi user rotation scheme\n   */\n  public static readonly MARIADB_ROTATION_MULTI_USER = new SecretRotationApplication('SecretsManagerRDSMariaDBRotationMultiUser', '1.1.60', {\n    isMultiUser: true,\n  });\n\n  /**\n   * Conducts an AWS SecretsManager secret rotation for RDS MySQL using the single user rotation scheme\n   */\n  public static readonly MYSQL_ROTATION_SINGLE_USER = new SecretRotationApplication('SecretsManagerRDSMySQLRotationSingleUser', '1.1.60');\n\n  /**\n   * Conducts an AWS SecretsManager secret rotation for RDS MySQL using the multi user rotation scheme\n   */\n  public static readonly MYSQL_ROTATION_MULTI_USER = new SecretRotationApplication('SecretsManagerRDSMySQLRotationMultiUser', '1.1.60', {\n    isMultiUser: true,\n  });\n\n  /**\n   * Conducts an AWS SecretsManager secret rotation for RDS Oracle using the single user rotation scheme\n   */\n  public static readonly ORACLE_ROTATION_SINGLE_USER = new SecretRotationApplication('SecretsManagerRDSOracleRotationSingleUser', '1.1.60');\n\n  /**\n   * Conducts an AWS SecretsManager secret rotation for RDS Oracle using the multi user rotation scheme\n   */\n  public static readonly ORACLE_ROTATION_MULTI_USER = new SecretRotationApplication('SecretsManagerRDSOracleRotationMultiUser', '1.1.60', {\n    isMultiUser: true,\n  });\n\n  /**\n   * Conducts an AWS SecretsManager secret rotation for RDS PostgreSQL using the single user rotation scheme\n   */\n  public static readonly POSTGRES_ROTATION_SINGLE_USER = new SecretRotationApplication('SecretsManagerRDSPostgreSQLRotationSingleUser', '1.1.60');\n\n  /**\n   * Conducts an AWS SecretsManager secret rotation for RDS PostgreSQL using the multi user rotation scheme\n   */\n  public static readonly POSTGRES_ROTATION_MULTI_USER = new SecretRotationApplication('SecretsManagerRDSPostgreSQLRotationMultiUser', '1.1.60', {\n    isMultiUser: true,\n  });\n\n  /**\n   * Conducts an AWS SecretsManager secret rotation for RDS SQL Server using the single user rotation scheme\n   */\n  public static readonly SQLSERVER_ROTATION_SINGLE_USER = new SecretRotationApplication('SecretsManagerRDSSQLServerRotationSingleUser', '1.1.60');\n\n  /**\n   * Conducts an AWS SecretsManager secret rotation for RDS SQL Server using the multi user rotation scheme\n   */\n  public static readonly SQLSERVER_ROTATION_MULTI_USER = new SecretRotationApplication('SecretsManagerRDSSQLServerRotationMultiUser', '1.1.60', {\n    isMultiUser: true,\n  });\n\n  /**\n   * Conducts an AWS SecretsManager secret rotation for Amazon Redshift using the single user rotation scheme\n   */\n  public static readonly REDSHIFT_ROTATION_SINGLE_USER = new SecretRotationApplication('SecretsManagerRedshiftRotationSingleUser', '1.1.60');\n\n  /**\n   * Conducts an AWS SecretsManager secret rotation for Amazon Redshift using the multi user rotation scheme\n   */\n  public static readonly REDSHIFT_ROTATION_MULTI_USER = new SecretRotationApplication('SecretsManagerRedshiftRotationMultiUser', '1.1.60', {\n    isMultiUser: true,\n  });\n\n  /**\n   * Conducts an AWS SecretsManager secret rotation for MongoDB using the single user rotation scheme\n   */\n  public static readonly MONGODB_ROTATION_SINGLE_USER = new SecretRotationApplication('SecretsManagerMongoDBRotationSingleUser', '1.1.60');\n\n  /**\n   * Conducts an AWS SecretsManager secret rotation for MongoDB using the multi user rotation scheme\n   */\n  public static readonly MONGODB_ROTATION_MULTI_USER = new SecretRotationApplication('SecretsManagerMongoDBRotationMultiUser', '1.1.60', {\n    isMultiUser: true,\n  });\n\n  /**\n   * The application identifier of the rotation application\n   *\n   * @deprecated only valid when deploying to the 'aws' partition. Use `applicationArnForPartition` instead.\n   */\n  public readonly applicationId: string;\n\n  /**\n   * The semantic version of the rotation application\n   *\n   * @deprecated only valid when deploying to the 'aws' partition. Use `semanticVersionForPartition` instead.\n   */\n  public readonly semanticVersion: string;\n\n  /**\n   * Whether the rotation application uses the mutli user scheme\n   */\n  public readonly isMultiUser?: boolean;\n\n  /**\n   * The application name of the rotation application\n   */\n  private readonly applicationName: string;\n\n  constructor(applicationId: string, semanticVersion: string, options?: SecretRotationApplicationOptions) {\n    this.applicationId = `arn:aws:serverlessrepo:us-east-1:297356227824:applications/${applicationId}`;\n    this.semanticVersion = semanticVersion;\n    this.applicationName = applicationId;\n    this.isMultiUser = options && options.isMultiUser;\n  }\n\n  /**\n   * Returns the application ARN for the current partition.\n   * Can be used in combination with a `CfnMapping` to automatically select the correct ARN based on the current partition.\n   */\n  public applicationArnForPartition(partition: string) {\n    if (partition === 'aws') {\n      return this.applicationId;\n    } else if (partition === 'aws-cn') {\n      return `arn:aws-cn:serverlessrepo:cn-north-1:193023089310:applications/${this.applicationName}`;\n    } else if (partition === 'aws-us-gov') {\n      return `arn:aws-us-gov:serverlessrepo:us-gov-west-1:023102451235:applications/${this.applicationName}`;\n    } else {\n      throw new Error(`unsupported partition: ${partition}`);\n    }\n  }\n\n  /**\n   * The semantic version of the app for the current partition.\n   * Can be used in combination with a `CfnMapping` to automatically select the correct version based on the current partition.\n   */\n  public semanticVersionForPartition(partition: string) {\n    if (partition === 'aws') {\n      return this.semanticVersion;\n    } else if (partition === 'aws-cn') {\n      return '1.1.37';\n    } else if (partition === 'aws-us-gov') {\n      return '1.1.93';\n    } else {\n      throw new Error(`unsupported partition: ${partition}`);\n    }\n  }\n}\n\n/**\n * Construction properties for a SecretRotation.\n */\nexport interface SecretRotationProps {\n  /**\n   * The secret to rotate. It must be a JSON string with the following format:\n   *\n   * ```\n   * {\n   *   \"engine\": <required: database engine>,\n   *   \"host\": <required: instance host name>,\n   *   \"username\": <required: username>,\n   *   \"password\": <required: password>,\n   *   \"dbname\": <optional: database name>,\n   *   \"port\": <optional: if not specified, default port will be used>,\n   *   \"masterarn\": <required for multi user rotation: the arn of the master secret which will be used to create users/change passwords>\n   * }\n   * ```\n   *\n   * This is typically the case for a secret referenced from an `AWS::SecretsManager::SecretTargetAttachment`\n   * or an `ISecret` returned by the `attach()` method of `Secret`.\n   *\n   * @see https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secrettargetattachment.html\n   */\n  readonly secret: ISecret;\n\n  /**\n   * The master secret for a multi user rotation scheme\n   *\n   * @default - single user rotation scheme\n   */\n  readonly masterSecret?: ISecret;\n\n  /**\n   * Specifies the number of days after the previous rotation before\n   * Secrets Manager triggers the next automatic rotation.\n   *\n   * @default Duration.days(30)\n   */\n  readonly automaticallyAfter?: Duration;\n\n  /**\n   * The serverless application for the rotation.\n   */\n  readonly application: SecretRotationApplication;\n\n  /**\n   * The VPC where the Lambda rotation function will run.\n   */\n  readonly vpc: ec2.IVpc;\n\n  /**\n   * The type of subnets in the VPC where the Lambda rotation function will run.\n   *\n   * @default - the Vpc default strategy if not specified.\n   */\n  readonly vpcSubnets?: ec2.SubnetSelection;\n\n  /**\n   * The target service or database\n   */\n  readonly target: ec2.IConnectable;\n\n  /**\n   * The security group for the Lambda rotation function\n   *\n   * @default - a new security group is created\n   */\n  readonly securityGroup?: ec2.ISecurityGroup;\n\n  /**\n   * Characters which should not appear in the generated password\n   *\n   * @default - no additional characters are explicitly excluded\n   */\n  readonly excludeCharacters?: string;\n\n  /**\n   * The VPC interface endpoint to use for the Secrets Manager API\n   *\n   * If you enable private DNS hostnames for your VPC private endpoint (the default), you don't\n   * need to specify an endpoint. The standard Secrets Manager DNS hostname the Secrets Manager\n   * CLI and SDKs use by default (https://secretsmanager.<region>.amazonaws.com) automatically\n   * resolves to your VPC endpoint.\n   *\n   * @default https://secretsmanager.<region>.amazonaws.com\n   */\n  readonly endpoint?: ec2.IInterfaceVpcEndpoint;\n}\n\n/**\n * Secret rotation for a service or database\n */\nexport class SecretRotation extends CoreConstruct {\n  constructor(scope: Construct, id: string, props: SecretRotationProps) {\n    super(scope, id);\n\n    if (!props.target.connections.defaultPort) {\n      throw new Error('The `target` connections must have a default port range.');\n    }\n\n    if (props.application.isMultiUser && !props.masterSecret) {\n      throw new Error('The `masterSecret` must be specified for application using the multi user scheme.');\n    }\n\n    // Max length of 64 chars, get the last 64 chars\n    const uniqueId = Names.uniqueId(this);\n    const rotationFunctionName = uniqueId.substring(Math.max(uniqueId.length - 64, 0), uniqueId.length);\n\n    const securityGroup = props.securityGroup || new ec2.SecurityGroup(this, 'SecurityGroup', {\n      vpc: props.vpc,\n    });\n    props.target.connections.allowDefaultPortFrom(securityGroup);\n\n    const parameters: { [key: string]: string } = {\n      endpoint: `https://${props.endpoint ? `${props.endpoint.vpcEndpointId}.` : ''}secretsmanager.${Stack.of(this).region}.${Stack.of(this).urlSuffix}`,\n      functionName: rotationFunctionName,\n      vpcSubnetIds: props.vpc.selectSubnets(props.vpcSubnets).subnetIds.join(','),\n      vpcSecurityGroupIds: securityGroup.securityGroupId,\n    };\n\n    if (props.excludeCharacters !== undefined) {\n      parameters.excludeCharacters = props.excludeCharacters;\n    }\n\n    if (props.secret.encryptionKey) {\n      parameters.kmsKeyArn = props.secret.encryptionKey.keyArn;\n    }\n\n    if (props.masterSecret) {\n      parameters.masterSecretArn = props.masterSecret.secretArn;\n\n      if (props.masterSecret.encryptionKey) {\n        parameters.masterSecretKmsKeyArn = props.masterSecret.encryptionKey.keyArn;\n      }\n    }\n\n    const sarMapping = new CfnMapping(this, 'SARMapping', {\n      mapping: {\n        'aws': {\n          applicationId: props.application.applicationArnForPartition('aws'),\n          semanticVersion: props.application.semanticVersionForPartition('aws'),\n        },\n        'aws-cn': {\n          applicationId: props.application.applicationArnForPartition('aws-cn'),\n          semanticVersion: props.application.semanticVersionForPartition('aws-cn'),\n        },\n        'aws-us-gov': {\n          applicationId: props.application.applicationArnForPartition('aws-us-gov'),\n          semanticVersion: props.application.semanticVersionForPartition('aws-us-gov'),\n        },\n      },\n    });\n    const application = new serverless.CfnApplication(this, 'Resource', {\n      location: {\n        applicationId: sarMapping.findInMap(Aws.PARTITION, 'applicationId'),\n        semanticVersion: sarMapping.findInMap(Aws.PARTITION, 'semanticVersion'),\n      },\n      parameters,\n    });\n\n    // This creates a CF a dependency between the rotation schedule and the\n    // serverless application. This is needed because it's the application\n    // that creates the Lambda permission to invoke the function.\n    // See https://docs.aws.amazon.com/secretsmanager/latest/userguide/integrating_cloudformation.html\n    const rotationLambda = lambda.Function.fromFunctionArn(this, 'RotationLambda', Token.asString(application.getAtt('Outputs.RotationLambdaARN')));\n\n    props.secret.addRotationSchedule('RotationSchedule', {\n      rotationLambda,\n      automaticallyAfter: props.automaticallyAfter,\n    });\n\n    // Prevent master secret deletion when rotation is in place\n    if (props.masterSecret) {\n      props.masterSecret.denyAccountRootDelete();\n    }\n  }\n}\n"]}

@@ -8,23 +8,13 @@ import * as iam from '@aws-cdk/aws-iam';

* A secret in AWS Secrets Manager.
*
* @stability stable
*/
export interface ISecret extends IResource {
/**
* The customer-managed encryption key that is used to encrypt this secret, if any.
*
* When not specified, the default
* The customer-managed encryption key that is used to encrypt this secret, if any. When not specified, the default
* KMS key for the account and region is being used.
*
* @stability stable
*/
readonly encryptionKey?: kms.IKey;
/**
* The ARN of the secret in AWS Secrets Manager.
*
* Will return the full ARN if available, otherwise a partial arn.
* The ARN of the secret in AWS Secrets Manager. Will return the full ARN if available, otherwise a partial arn.
* For secrets imported by the deprecated `fromSecretName`, it will return the `secretName`.
*
* @stability stable
* @attribute true
* @attribute
*/

@@ -34,6 +24,3 @@ readonly secretArn: string;

* The full ARN of the secret in AWS Secrets Manager, which is the ARN including the Secrets Manager-supplied 6-character suffix.
*
* This is equal to `secretArn` in most cases, but is undefined when a full ARN is not available (e.g., secrets imported by name).
*
* @stability stable
*/

@@ -46,4 +33,2 @@ readonly secretFullArn?: string;

* '@aws-cdk/aws-secretsmanager:parseOwnedSecretName' feature flag is set.
*
* @stability stable
*/

@@ -53,5 +38,3 @@ readonly secretName: string;

* Retrieve the value of the stored secret as a `SecretValue`.
*
* @stability stable
* @attribute true
* @attribute
*/

@@ -61,4 +44,2 @@ readonly secretValue: SecretValue;

* Interpret the secret as a JSON object and return a field's value from it as a `SecretValue`.
*
* @stability stable
*/

@@ -69,5 +50,5 @@ secretValueFromJson(key: string): SecretValue;

*
* @param grantee the principal being granted permission.
* @param versionStages the version stages the grant is limited to.
* @stability stable
* @param grantee the principal being granted permission.
* @param versionStages the version stages the grant is limited to. If not specified, no restriction on the version
* stages is applied.
*/

@@ -78,4 +59,3 @@ grantRead(grantee: iam.IGrantable, versionStages?: string[]): iam.Grant;

*
* @param grantee the principal being granted permission.
* @stability stable
* @param grantee the principal being granted permission.
*/

@@ -85,4 +65,2 @@ grantWrite(grantee: iam.IGrantable): iam.Grant;

* Adds a rotation schedule to the secret.
*
* @stability stable
*/

@@ -96,10 +74,7 @@ addRotationSchedule(id: string, options: RotationScheduleOptions): RotationSchedule;

* the secret is imported, then this is a no-op.
*
* @stability stable
*/
addToResourcePolicy(statement: iam.PolicyStatement): iam.AddToResourcePolicyResult;
/**
* Denies the `DeleteSecret` action to all principals within the current account.
*
* @stability stable
* Denies the `DeleteSecret` action to all principals within the current
* account.
*/

@@ -112,3 +87,2 @@ denyAccountRootDelete(): void;

* @returns An attached secret
* @stability stable
*/

@@ -119,4 +93,2 @@ attach(target: ISecretAttachmentTarget): ISecret;

* The properties required to create a new secret in AWS Secrets Manager.
*
* @stability stable
*/

@@ -128,3 +100,2 @@ export interface SecretProps {

* @default - No description.
* @stability stable
*/

@@ -136,3 +107,2 @@ readonly description?: string;

* @default - A default KMS key for the account and region is used.
* @stability stable
*/

@@ -147,17 +117,13 @@ readonly encryptionKey?: kms.IKey;

* category), per the default values of ``SecretStringGenerator``.
* @stability stable
*/
readonly generateSecretString?: SecretStringGenerator;
/**
* A name for the secret.
*
* Note that deleting secrets from SecretsManager does not happen immediately, but after a 7 to
* A name for the secret. Note that deleting secrets from SecretsManager does not happen immediately, but after a 7 to
* 30 days blackout period. During that period, it is not possible to create another secret that shares the same name.
*
* @default - A name is generated by CloudFormation.
* @stability stable
*/
readonly secretName?: string;
/**
* Initial value for the secret.
* Initial value for the secret
*

@@ -176,3 +142,2 @@ * **NOTE:** *It is **highly** encouraged to leave this field undefined and allow SecretsManager to create the secret value.

* @default - SecretsManager generates a new secret value.
* @stability stable
*/

@@ -184,3 +149,2 @@ readonly secretStringBeta1?: SecretStringValueBeta1;

* @default - Not set.
* @stability stable
*/

@@ -192,3 +156,2 @@ readonly removalPolicy?: RemovalPolicy;

* @default - Secret is not replicated
* @stability stable
*/

@@ -198,11 +161,7 @@ readonly replicaRegions?: ReplicaRegion[];

/**
* Secret replica region.
*
* @stability stable
* Secret replica region
*/
export interface ReplicaRegion {
/**
* The name of the region.
*
* @stability stable
* The name of the region
*/

@@ -214,3 +173,2 @@ readonly region: string;

* @default - A default KMS key for the account and region is used.
* @stability stable
*/

@@ -221,7 +179,4 @@ readonly encryptionKey?: kms.IKey;

* An experimental class used to specify an initial secret value for a Secret.
*
* The class wraps a simple string (or JSON representation) in order to provide some safety checks and warnings
* about the dangers of using plaintext strings as initial secret seed values via CDK/CloudFormation.
*
* @stability stable
*/

@@ -232,8 +187,5 @@ export declare class SecretStringValueBeta1 {

* Creates a `SecretStringValueBeta1` from a plaintext value.
*
* This approach is inherently unsafe, as the secret value may be visible in your source control repository
* and will also appear in plaintext in the resulting CloudFormation template, including in the AWS Console or APIs.
* Usage of this method is discouraged, especially for production workloads.
*
* @stability stable
*/

@@ -243,3 +195,2 @@ static fromUnsafePlaintext(secretValue: string): SecretStringValueBeta1;

* Creates a `SecretValueValueBeta1` from a string value coming from a Token.
*
* The intent is to enable creating secrets from references (e.g., `Ref`, `Fn::GetAtt`) from other resources.

@@ -251,17 +202,17 @@ * This might be the direct output of another Construct, or the output of a Custom Resource.

* ```ts
* // Creates a new IAM user, access and secret keys, and stores the secret access key in a Secret.
* const user = new iam.User(this, 'User');
* const accessKey = new iam.AccessKey(this, 'AccessKey', { user });
* const secretValue = secretsmanager.SecretStringValueBeta1.fromToken(accessKey.secretAccessKey.toString());
* new secretsmanager.Secret(this, 'Secret', {
* secretStringBeta1: secretValue,
* });
* // Creates a new IAM user, access and secret keys, and stores the secret access key in a Secret.
* const user = new iam.User(this, 'User');
* const accessKey = new iam.AccessKey(this, 'AccessKey', { user });
* const secretValue = secretsmanager.SecretStringValueBeta1.fromToken(accessKey.secretAccessKey.toString());
* new secretsmanager.Secret(this, 'Secret', {
* secretStringBeta1: secretValue,
* });
* ```
*
* The secret may also be embedded in a string representation of a JSON structure:
* const secretValue = secretsmanager.SecretStringValueBeta1.fromToken(JSON.stringify({
* username: user.userName,
* database: 'foo',
* password: accessKey.secretAccessKey.toString(),
* }));
* const secretValue = secretsmanager.SecretStringValueBeta1.fromToken(JSON.stringify({
* username: user.userName,
* database: 'foo',
* password: accessKey.secretAccessKey.toString(),
* }));
*

@@ -272,12 +223,7 @@ * Note that the value being a Token does *not* guarantee safety. For example, a Lazy-evaluated string

*
* @param secretValueFromToken a secret value coming from a Construct attribute or Custom Resource output.
* @stability stable
* @param secretValueFromToken a secret value coming from a Construct attribute or Custom Resource output
*/
static fromToken(secretValueFromToken: string): SecretStringValueBeta1;
private constructor();
/**
* Returns the secret value.
*
* @stability stable
*/
/** Returns the secret value */
secretValue(): string;

@@ -287,6 +233,3 @@ }

* Attributes required to import an existing secret into the Stack.
*
* One ARN format (`secretArn`, `secretCompleteArn`, `secretPartialArn`) must be provided.
*
* @stability stable
*/

@@ -296,11 +239,7 @@ export interface SecretAttributes {

* The encryption key that is used to encrypt the secret, unless the default SecretsManager key is used.
*
* @stability stable
*/
readonly encryptionKey?: kms.IKey;
/**
* (deprecated) The ARN of the secret in SecretsManager.
*
* The ARN of the secret in SecretsManager.
* Cannot be used with `secretCompleteArn` or `secretPartialArn`.
*
* @deprecated use `secretCompleteArn` or `secretPartialArn` instead.

@@ -310,17 +249,9 @@ */

/**
* The complete ARN of the secret in SecretsManager.
*
* This is the ARN including the Secrets Manager 6-character suffix.
* The complete ARN of the secret in SecretsManager. This is the ARN including the Secrets Manager 6-character suffix.
* Cannot be used with `secretArn` or `secretPartialArn`.
*
* @stability stable
*/
readonly secretCompleteArn?: string;
/**
* The partial ARN of the secret in SecretsManager.
*
* This is the ARN without the Secrets Manager 6-character suffix.
* The partial ARN of the secret in SecretsManager. This is the ARN without the Secrets Manager 6-character suffix.
* Cannot be used with `secretArn` or `secretCompleteArn`.
*
* @stability stable
*/

@@ -338,81 +269,23 @@ readonly secretPartialArn?: string;

private policy?;
/**
* The full ARN of the secret in AWS Secrets Manager, which is the ARN including the Secrets Manager-supplied 6-character suffix.
*
* This is equal to `secretArn` in most cases, but is undefined when a full ARN is not available (e.g., secrets imported by name).
*
* @stability stable
*/
get secretFullArn(): string | undefined;
/**
* Grants reading the secret value to some role.
*
* @stability stable
*/
grantRead(grantee: iam.IGrantable, versionStages?: string[]): iam.Grant;
/**
* Grants writing and updating the secret value to some role.
*
* @stability stable
*/
grantWrite(grantee: iam.IGrantable): iam.Grant;
/**
* Retrieve the value of the stored secret as a `SecretValue`.
*
* @stability stable
*/
get secretValue(): SecretValue;
/**
* Interpret the secret as a JSON object and return a field's value from it as a `SecretValue`.
*
* @stability stable
*/
secretValueFromJson(jsonField: string): SecretValue;
/**
* Adds a rotation schedule to the secret.
*
* @stability stable
*/
addRotationSchedule(id: string, options: RotationScheduleOptions): RotationSchedule;
/**
* Adds a statement to the IAM resource policy associated with this secret.
*
* If this secret was created in this stack, a resource policy will be
* automatically created upon the first call to `addToResourcePolicy`. If
* the secret is imported, then this is a no-op.
*
* @stability stable
*/
addToResourcePolicy(statement: iam.PolicyStatement): iam.AddToResourcePolicyResult;
/**
* Validate the current construct.
*
* This method can be implemented by derived constructs in order to perform
* validation logic. It is called on all constructs before synthesis.
*
* @stability stable
*/
protected validate(): string[];
/**
* Denies the `DeleteSecret` action to all principals within the current account.
*
* @stability stable
*/
denyAccountRootDelete(): void;
/**
* Provides an identifier for this secret for use in IAM policies.
*
* If there is a full ARN, this is just the ARN;
* if we have a partial ARN -- due to either importing by secret name or partial ARN --
* then we need to add a suffix to capture the full ARN's format.
*
* @stability stable
*/
protected get arnForPolicies(): string;
/**
* Attach a target to this secret.
* Attach a target to this secret
*
* @param target The target to attach.
* @param target The target to attach
* @returns An attached secret
* @stability stable
*/

@@ -423,32 +296,13 @@ attach(target: ISecretAttachmentTarget): ISecret;

* Creates a new secret in AWS SecretsManager.
*
* @stability stable
*/
export declare class Secret extends SecretBase {
/**
* @deprecated use `fromSecretCompleteArn` or `fromSecretPartialArn`
*/
/** @deprecated use `fromSecretCompleteArn` or `fromSecretPartialArn` */
static fromSecretArn(scope: Construct, id: string, secretArn: string): ISecret;
/**
* Imports a secret by complete ARN.
*
* The complete ARN is the ARN with the Secrets Manager-supplied suffix.
*
* @stability stable
*/
/** Imports a secret by complete ARN. The complete ARN is the ARN with the Secrets Manager-supplied suffix. */
static fromSecretCompleteArn(scope: Construct, id: string, secretCompleteArn: string): ISecret;
/**
* Imports a secret by partial ARN.
*
* The partial ARN is the ARN without the Secrets Manager-supplied suffix.
*
* @stability stable
*/
/** Imports a secret by partial ARN. The partial ARN is the ARN without the Secrets Manager-supplied suffix. */
static fromSecretPartialArn(scope: Construct, id: string, secretPartialArn: string): ISecret;
/**
* (deprecated) Imports a secret by secret name;
*
* the ARN of the Secret will be set to the secret name.
* Imports a secret by secret name; the ARN of the Secret will be set to the secret name.
* A secret with this name must exist in the same account & region.
*
* @deprecated use `fromSecretNameV2`

@@ -459,7 +313,4 @@ */

* Imports a secret by secret name.
*
* A secret with this name must exist in the same account & region.
* Replaces the deprecated `fromSecretName`.
*
* @stability stable
*/

@@ -471,47 +322,17 @@ static fromSecretNameV2(scope: Construct, id: string, secretName: string): ISecret;

* @param scope the scope of the import.
* @param id the ID of the imported Secret in the construct tree.
* @param id the ID of the imported Secret in the construct tree.
* @param attrs the attributes of the imported secret.
* @stability stable
*/
static fromSecretAttributes(scope: Construct, id: string, attrs: SecretAttributes): ISecret;
/**
* The customer-managed encryption key that is used to encrypt this secret, if any.
*
* When not specified, the default
* KMS key for the account and region is being used.
*
* @stability stable
*/
readonly encryptionKey?: kms.IKey;
/**
* The ARN of the secret in AWS Secrets Manager.
*
* Will return the full ARN if available, otherwise a partial arn.
* For secrets imported by the deprecated `fromSecretName`, it will return the `secretName`.
*
* @stability stable
*/
readonly secretArn: string;
/**
* The name of the secret.
*
* For "owned" secrets, this will be the full resource name (secret name + suffix), unless the
* '@aws-cdk/aws-secretsmanager:parseOwnedSecretName' feature flag is set.
*
* @stability stable
*/
readonly secretName: string;
private replicaRegions;
/**
* @stability stable
*/
protected readonly autoCreatePolicy = true;
/**
* @stability stable
*/
constructor(scope: Construct, id: string, props?: SecretProps);
/**
* (deprecated) Adds a target attachment to the secret.
* Adds a target attachment to the secret.
*
* @returns an AttachedSecret
*
* @deprecated use `attach()` instead

@@ -521,7 +342,6 @@ */

/**
* Adds a replica region for the secret.
* Adds a replica region for the secret
*
* @param region The name of the region.
* @param region The name of the region
* @param encryptionKey The customer-managed encryption key to use for encrypting the secret value.
* @stability stable
*/

@@ -532,4 +352,2 @@ addReplicaRegion(region: string, encryptionKey?: kms.IKey): void;

* A secret attachment target.
*
* @stability stable
*/

@@ -539,4 +357,2 @@ export interface ISecretAttachmentTarget {

* Renders the target specifications.
*
* @stability stable
*/

@@ -547,8 +363,6 @@ asSecretAttachmentTarget(): SecretAttachmentTargetProps;

* The type of service or database that's being associated with the secret.
*
* @stability stable
*/
export declare enum AttachmentTargetType {
/**
* (deprecated) A database instance.
* A database instance
*

@@ -559,3 +373,3 @@ * @deprecated use RDS_DB_INSTANCE instead

/**
* (deprecated) A database cluster.
* A database cluster
*

@@ -574,23 +388,15 @@ * @deprecated use RDS_DB_CLUSTER instead

/**
* AWS::RDS::DBProxy.
*
* @stability stable
* AWS::RDS::DBProxy
*/
RDS_DB_PROXY = "AWS::RDS::DBProxy",
/**
* AWS::Redshift::Cluster.
*
* @stability stable
* AWS::Redshift::Cluster
*/
REDSHIFT_CLUSTER = "AWS::Redshift::Cluster",
/**
* AWS::DocDB::DBInstance.
*
* @stability stable
* AWS::DocDB::DBInstance
*/
DOCDB_DB_INSTANCE = "AWS::DocDB::DBInstance",
/**
* AWS::DocDB::DBCluster.
*
* @stability stable
* AWS::DocDB::DBCluster
*/

@@ -601,4 +407,2 @@ DOCDB_DB_CLUSTER = "AWS::DocDB::DBCluster"

* Attachment target specifications.
*
* @stability stable
*/

@@ -608,4 +412,2 @@ export interface SecretAttachmentTargetProps {

* The id of the target to attach the secret to.
*
* @stability stable
*/

@@ -615,4 +417,2 @@ readonly targetId: string;

* The type of the target to attach the secret to.
*
* @stability stable
*/

@@ -623,4 +423,2 @@ readonly targetType: AttachmentTargetType;

* Options to add a secret attachment to a secret.
*
* @stability stable
*/

@@ -630,4 +428,2 @@ export interface AttachedSecretOptions {

* The target to attach the secret to.
*
* @stability stable
*/

@@ -638,4 +434,2 @@ readonly target: ISecretAttachmentTarget;

* Construction properties for an AttachedSecret.
*
* @stability stable
*/

@@ -645,16 +439,10 @@ export interface SecretTargetAttachmentProps extends AttachedSecretOptions {

* The secret to attach to the target.
*
* @stability stable
*/
readonly secret: ISecret;
}
/**
* @stability stable
*/
export interface ISecretTargetAttachment extends ISecret {
/**
* Same as `secretArn`.
* Same as `secretArn`
*
* @stability stable
* @attribute true
* @attribute
*/

@@ -665,51 +453,13 @@ readonly secretTargetAttachmentSecretArn: string;

* An attached secret.
*
* @stability stable
*/
export declare class SecretTargetAttachment extends SecretBase implements ISecretTargetAttachment {
/**
* @stability stable
*/
static fromSecretTargetAttachmentSecretArn(scope: Construct, id: string, secretTargetAttachmentSecretArn: string): ISecretTargetAttachment;
/**
* The customer-managed encryption key that is used to encrypt this secret, if any.
*
* When not specified, the default
* KMS key for the account and region is being used.
*
* @stability stable
*/
readonly encryptionKey?: kms.IKey;
/**
* The ARN of the secret in AWS Secrets Manager.
*
* Will return the full ARN if available, otherwise a partial arn.
* For secrets imported by the deprecated `fromSecretName`, it will return the `secretName`.
*
* @stability stable
*/
readonly secretArn: string;
/**
* The name of the secret.
*
* For "owned" secrets, this will be the full resource name (secret name + suffix), unless the
* '@aws-cdk/aws-secretsmanager:parseOwnedSecretName' feature flag is set.
*
* @stability stable
*/
readonly secretName: string;
/**
* Same as `secretArn`.
*
* @stability stable
* @attribute true
* @attribute
*/
readonly secretTargetAttachmentSecretArn: string;
/**
* @stability stable
*/
protected readonly autoCreatePolicy = true;
/**
* @stability stable
*/
constructor(scope: Construct, id: string, props: SecretTargetAttachmentProps);

@@ -719,4 +469,2 @@ }

* Configuration to generate secrets such as passwords automatically.
*
* @stability stable
*/

@@ -728,3 +476,2 @@ export interface SecretStringGenerator {

* @default false
* @stability stable
*/

@@ -736,3 +483,2 @@ readonly excludeUppercase?: boolean;

* @default true
* @stability stable
*/

@@ -744,13 +490,9 @@ readonly requireEachIncludedType?: boolean;

* @default false
* @stability stable
*/
readonly includeSpace?: boolean;
/**
* A string that includes characters that shouldn't be included in the generated password.
*
* The string can be a minimum
* A string that includes characters that shouldn't be included in the generated password. The string can be a minimum
* of ``0`` and a maximum of ``4096`` characters long.
*
* @default no exclusions
* @stability stable
*/

@@ -762,3 +504,2 @@ readonly excludeCharacters?: string;

* @default 32
* @stability stable
*/

@@ -770,3 +511,2 @@ readonly passwordLength?: number;

* @default false
* @stability stable
*/

@@ -778,3 +518,2 @@ readonly excludePunctuation?: boolean;

* @default false
* @stability stable
*/

@@ -786,23 +525,15 @@ readonly excludeLowercase?: boolean;

* @default false
* @stability stable
*/
readonly excludeNumbers?: boolean;
/**
* A properly structured JSON string that the generated password can be added to.
*
* The ``generateStringKey`` is
* A properly structured JSON string that the generated password can be added to. The ``generateStringKey`` is
* combined with the generated random string and inserted into the JSON structure that's specified by this parameter.
* The merged JSON string is returned as the completed SecretString of the secret. If you specify ``secretStringTemplate``
* then ``generateStringKey`` must be also be specified.
*
* @stability stable
*/
readonly secretStringTemplate?: string;
/**
* The JSON key name that's used to add the generated password to the JSON structure specified by the ``secretStringTemplate`` parameter.
*
* If you specify ``generateStringKey`` then ``secretStringTemplate``
* The JSON key name that's used to add the generated password to the JSON structure specified by the
* ``secretStringTemplate`` parameter. If you specify ``generateStringKey`` then ``secretStringTemplate``
* must be also be specified.
*
* @stability stable
*/

@@ -809,0 +540,0 @@ readonly generateStringKey?: string;

import * as cdk from '@aws-cdk/core';
import * as cfn_parse from '@aws-cdk/core/lib/cfn-parse';
/**
* Properties for defining a `CfnResourcePolicy`.
* Properties for defining a `CfnResourcePolicy`
*
* @external
* @struct
* @stability external
*
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-resourcepolicy.html

@@ -11,7 +13,4 @@ */

/**
* A JSON-formatted string for an AWS resource-based policy.
* A JSON-formatted string for an AWS resource-based policy. For example policies, see [Permissions policy examples](https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access_examples.html) .
*
* For example policies, see [Permissions policy examples](https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access_examples.html) .
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-resourcepolicy.html#cfn-secretsmanager-resourcepolicy-resourcepolicy

@@ -25,3 +24,2 @@ */

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-resourcepolicy.html#cfn-secretsmanager-resourcepolicy-secretid

@@ -31,7 +29,4 @@ */

/**
* Specifies whether to block resource-based policies that allow broad access to the secret.
* Specifies whether to block resource-based policies that allow broad access to the secret. By default, Secrets Manager blocks policies that allow broad access, for example those that use a wildcard for the principal.
*
* By default, Secrets Manager blocks policies that allow broad access, for example those that use a wildcard for the principal.
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-resourcepolicy.html#cfn-secretsmanager-resourcepolicy-blockpublicpolicy

@@ -42,3 +37,3 @@ */

/**
* A CloudFormation `AWS::SecretsManager::ResourcePolicy`.
* A CloudFormation `AWS::SecretsManager::ResourcePolicy`
*

@@ -51,4 +46,5 @@ * Attaches a resource-based permission policy to a secret. A resource-based policy is optional. For more information, see [Authentication and access control for Secrets Manager](https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html)

*
* @external
* @cloudformationResource AWS::SecretsManager::ResourcePolicy
* @stability external
*
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-resourcepolicy.html

@@ -59,4 +55,2 @@ */

* The CloudFormation resource type name for this resource class.
*
* @external
*/

@@ -73,7 +67,4 @@ static readonly CFN_RESOURCE_TYPE_NAME = "AWS::SecretsManager::ResourcePolicy";

/**
* A JSON-formatted string for an AWS resource-based policy.
* A JSON-formatted string for an AWS resource-based policy. For example policies, see [Permissions policy examples](https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access_examples.html) .
*
* For example policies, see [Permissions policy examples](https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access_examples.html) .
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-resourcepolicy.html#cfn-secretsmanager-resourcepolicy-resourcepolicy

@@ -87,3 +78,2 @@ */

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-resourcepolicy.html#cfn-secretsmanager-resourcepolicy-secretid

@@ -93,7 +83,4 @@ */

/**
* Specifies whether to block resource-based policies that allow broad access to the secret.
* Specifies whether to block resource-based policies that allow broad access to the secret. By default, Secrets Manager blocks policies that allow broad access, for example those that use a wildcard for the principal.
*
* By default, Secrets Manager blocks policies that allow broad access, for example those that use a wildcard for the principal.
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-resourcepolicy.html#cfn-secretsmanager-resourcepolicy-blockpublicpolicy

@@ -105,6 +92,5 @@ */

*
* @param scope - scope in which this resource is defined.
* @param id - scoped id of the resource.
* @param props - resource properties.
* @external
* @param scope - scope in which this resource is defined
* @param id - scoped id of the resource
* @param props - resource properties
*/

@@ -115,15 +101,9 @@ constructor(scope: cdk.Construct, id: string, props: CfnResourcePolicyProps);

*
* @param inspector - tree inspector to collect and process attributes.
* @external
* @param inspector - tree inspector to collect and process attributes
*
*/
inspect(inspector: cdk.TreeInspector): void;
/**
* @external
*/
protected get cfnProperties(): {
[key: string]: any;
};
/**
* @external
*/
protected renderProperties(props: {

@@ -136,5 +116,7 @@ [key: string]: any;

/**
* Properties for defining a `CfnRotationSchedule`.
* Properties for defining a `CfnRotationSchedule`
*
* @external
* @struct
* @stability external
*
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-rotationschedule.html

@@ -148,3 +130,2 @@ */

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-rotationschedule.html#cfn-secretsmanager-rotationschedule-secretid

@@ -158,3 +139,2 @@ */

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-rotationschedule.html#cfn-secretsmanager-rotationschedule-hostedrotationlambda

@@ -164,5 +144,4 @@ */

/**
* `AWS::SecretsManager::RotationSchedule.RotateImmediatelyOnUpdate`.
* `AWS::SecretsManager::RotationSchedule.RotateImmediatelyOnUpdate`
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-rotationschedule.html#cfn-secretsmanager-rotationschedule-rotateimmediatelyonupdate

@@ -172,9 +151,6 @@ */

/**
* The ARN of the Lambda function that can rotate the secret.
* The ARN of the Lambda function that can rotate the secret. If you don't specify this parameter, then the secret must already have the ARN of a Lambda function configured.
*
* If you don't specify this parameter, then the secret must already have the ARN of a Lambda function configured.
*
* To reference a Lambda function also created in this template, use the [Ref](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/intrinsic-function-reference-ref.html) function with the function's logical ID.
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-rotationschedule.html#cfn-secretsmanager-rotationschedule-rotationlambdaarn

@@ -186,3 +162,2 @@ */

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-rotationschedule.html#cfn-secretsmanager-rotationschedule-rotationrules

@@ -193,3 +168,3 @@ */

/**
* A CloudFormation `AWS::SecretsManager::RotationSchedule`.
* A CloudFormation `AWS::SecretsManager::RotationSchedule`
*

@@ -200,4 +175,5 @@ * Configures rotation for a secret. You must already configure the secret with the details of the database or service. If you define both the secret and the database or service in an AWS CloudFormation template, then define the [AWS::SecretsManager::SecretTargetAttachment](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secrettargetattachment.html) resource to populate the secret with the connection details of the database or service before you attempt to configure rotation.

*
* @external
* @cloudformationResource AWS::SecretsManager::RotationSchedule
* @stability external
*
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-rotationschedule.html

@@ -208,4 +184,2 @@ */

* The CloudFormation resource type name for this resource class.
*
* @external
*/

@@ -226,3 +200,2 @@ static readonly CFN_RESOURCE_TYPE_NAME = "AWS::SecretsManager::RotationSchedule";

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-rotationschedule.html#cfn-secretsmanager-rotationschedule-secretid

@@ -236,3 +209,2 @@ */

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-rotationschedule.html#cfn-secretsmanager-rotationschedule-hostedrotationlambda

@@ -242,5 +214,4 @@ */

/**
* `AWS::SecretsManager::RotationSchedule.RotateImmediatelyOnUpdate`.
* `AWS::SecretsManager::RotationSchedule.RotateImmediatelyOnUpdate`
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-rotationschedule.html#cfn-secretsmanager-rotationschedule-rotateimmediatelyonupdate

@@ -250,9 +221,6 @@ */

/**
* The ARN of the Lambda function that can rotate the secret.
* The ARN of the Lambda function that can rotate the secret. If you don't specify this parameter, then the secret must already have the ARN of a Lambda function configured.
*
* If you don't specify this parameter, then the secret must already have the ARN of a Lambda function configured.
*
* To reference a Lambda function also created in this template, use the [Ref](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/intrinsic-function-reference-ref.html) function with the function's logical ID.
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-rotationschedule.html#cfn-secretsmanager-rotationschedule-rotationlambdaarn

@@ -264,3 +232,2 @@ */

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-rotationschedule.html#cfn-secretsmanager-rotationschedule-rotationrules

@@ -272,6 +239,5 @@ */

*
* @param scope - scope in which this resource is defined.
* @param id - scoped id of the resource.
* @param props - resource properties.
* @external
* @param scope - scope in which this resource is defined
* @param id - scoped id of the resource
* @param props - resource properties
*/

@@ -282,15 +248,9 @@ constructor(scope: cdk.Construct, id: string, props: CfnRotationScheduleProps);

*
* @param inspector - tree inspector to collect and process attributes.
* @external
* @param inspector - tree inspector to collect and process attributes
*
*/
inspect(inspector: cdk.TreeInspector): void;
/**
* @external
*/
protected get cfnProperties(): {
[key: string]: any;
};
/**
* @external
*/
protected renderProperties(props: {

@@ -302,13 +262,2 @@ [key: string]: any;

}
/**
* A CloudFormation `AWS::SecretsManager::RotationSchedule`.
*
* Configures rotation for a secret. You must already configure the secret with the details of the database or service. If you define both the secret and the database or service in an AWS CloudFormation template, then define the [AWS::SecretsManager::SecretTargetAttachment](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secrettargetattachment.html) resource to populate the secret with the connection details of the database or service before you attempt to configure rotation.
*
* > When you configure rotation for a secret, AWS CloudFormation automatically rotates the secret one time.
*
* @external
* @cloudformationResource AWS::SecretsManager::RotationSchedule
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-rotationschedule.html
*/
export declare namespace CfnRotationSchedule {

@@ -320,3 +269,5 @@ /**

*
* @external
* @struct
* @stability external
*
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-rotationschedule-hostedrotationlambda.html

@@ -326,7 +277,4 @@ */

/**
* The ARN of the KMS key that Secrets Manager uses to encrypt the secret.
* The ARN of the KMS key that Secrets Manager uses to encrypt the secret. If you don't specify this value, then Secrets Manager uses the key `aws/secretsmanager` . If `aws/secretsmanager` doesn't yet exist, then Secrets Manager creates it for you automatically the first time it encrypts the secret value.
*
* If you don't specify this value, then Secrets Manager uses the key `aws/secretsmanager` . If `aws/secretsmanager` doesn't yet exist, then Secrets Manager creates it for you automatically the first time it encrypts the secret value.
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-rotationschedule-hostedrotationlambda.html#cfn-secretsmanager-rotationschedule-hostedrotationlambda-kmskeyarn

@@ -336,7 +284,4 @@ */

/**
* The ARN of the secret that contains elevated credentials.
* The ARN of the secret that contains elevated credentials. The Lambda rotation function uses this secret for the [Alternating users rotation strategy](https://docs.aws.amazon.com/secretsmanager/latest/userguide/rotating-secrets_strategies.html#rotating-secrets-two-users) .
*
* The Lambda rotation function uses this secret for the [Alternating users rotation strategy](https://docs.aws.amazon.com/secretsmanager/latest/userguide/rotating-secrets_strategies.html#rotating-secrets-two-users) .
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-rotationschedule-hostedrotationlambda.html#cfn-secretsmanager-rotationschedule-hostedrotationlambda-mastersecretarn

@@ -348,3 +293,2 @@ */

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-rotationschedule-hostedrotationlambda.html#cfn-secretsmanager-rotationschedule-hostedrotationlambda-mastersecretkmskeyarn

@@ -356,3 +300,2 @@ */

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-rotationschedule-hostedrotationlambda.html#cfn-secretsmanager-rotationschedule-hostedrotationlambda-rotationlambdaname

@@ -381,3 +324,2 @@ */

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-rotationschedule-hostedrotationlambda.html#cfn-secretsmanager-rotationschedule-hostedrotationlambda-rotationtype

@@ -387,7 +329,4 @@ */

/**
* The ARN of the secret that contains elevated credentials.
* The ARN of the secret that contains elevated credentials. The Lambda rotation function uses this secret for the [Alternating users rotation strategy](https://docs.aws.amazon.com/secretsmanager/latest/userguide/rotating-secrets_strategies.html#rotating-secrets-two-users) .
*
* The Lambda rotation function uses this secret for the [Alternating users rotation strategy](https://docs.aws.amazon.com/secretsmanager/latest/userguide/rotating-secrets_strategies.html#rotating-secrets-two-users) .
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-rotationschedule-hostedrotationlambda.html#cfn-secretsmanager-rotationschedule-hostedrotationlambda-superusersecretarn

@@ -399,3 +338,2 @@ */

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-rotationschedule-hostedrotationlambda.html#cfn-secretsmanager-rotationschedule-hostedrotationlambda-superusersecretkmskeyarn

@@ -409,3 +347,2 @@ */

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-rotationschedule-hostedrotationlambda.html#cfn-secretsmanager-rotationschedule-hostedrotationlambda-vpcsecuritygroupids

@@ -415,7 +352,4 @@ */

/**
* A comma separated list of VPC subnet IDs of the target database network.
* A comma separated list of VPC subnet IDs of the target database network. The Lambda rotation function is in the same subnet group.
*
* The Lambda rotation function is in the same subnet group.
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-rotationschedule-hostedrotationlambda.html#cfn-secretsmanager-rotationschedule-hostedrotationlambda-vpcsubnetids

@@ -426,13 +360,2 @@ */

}
/**
* A CloudFormation `AWS::SecretsManager::RotationSchedule`.
*
* Configures rotation for a secret. You must already configure the secret with the details of the database or service. If you define both the secret and the database or service in an AWS CloudFormation template, then define the [AWS::SecretsManager::SecretTargetAttachment](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secrettargetattachment.html) resource to populate the secret with the connection details of the database or service before you attempt to configure rotation.
*
* > When you configure rotation for a secret, AWS CloudFormation automatically rotates the secret one time.
*
* @external
* @cloudformationResource AWS::SecretsManager::RotationSchedule
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-rotationschedule.html
*/
export declare namespace CfnRotationSchedule {

@@ -442,3 +365,5 @@ /**

*
* @external
* @struct
* @stability external
*
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-rotationschedule-rotationrules.html

@@ -448,9 +373,6 @@ */

/**
* The number of days between automatic scheduled rotations of the secret.
* The number of days between automatic scheduled rotations of the secret. You can use this value to check that your secret meets your compliance guidelines for how often secrets must be rotated.
*
* You can use this value to check that your secret meets your compliance guidelines for how often secrets must be rotated.
*
* In `DescribeSecret` and `ListSecrets` , this value is calculated from the rotation schedule after every successful rotation. In `RotateSecret` , you can set the rotation schedule in `RotationRules` with `AutomaticallyAfterDays` or `ScheduleExpression` , but not both.
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-rotationschedule-rotationrules.html#cfn-secretsmanager-rotationschedule-rotationrules-automaticallyafterdays

@@ -460,5 +382,4 @@ */

/**
* `CfnRotationSchedule.RotationRulesProperty.Duration`.
* `CfnRotationSchedule.RotationRulesProperty.Duration`
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-rotationschedule-rotationrules.html#cfn-secretsmanager-rotationschedule-rotationrules-duration

@@ -468,5 +389,4 @@ */

/**
* `CfnRotationSchedule.RotationRulesProperty.ScheduleExpression`.
* `CfnRotationSchedule.RotationRulesProperty.ScheduleExpression`
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-rotationschedule-rotationrules.html#cfn-secretsmanager-rotationschedule-rotationrules-scheduleexpression

@@ -478,5 +398,7 @@ */

/**
* Properties for defining a `CfnSecret`.
* Properties for defining a `CfnSecret`
*
* @external
* @struct
* @stability external
*
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secret.html

@@ -488,3 +410,2 @@ */

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secret.html#cfn-secretsmanager-secret-description

@@ -500,3 +421,2 @@ */

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secret.html#cfn-secretsmanager-secret-generatesecretstring

@@ -514,3 +434,2 @@ */

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secret.html#cfn-secretsmanager-secret-kmskeyid

@@ -526,3 +445,2 @@ */

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secret.html#cfn-secretsmanager-secret-name

@@ -534,3 +452,2 @@ */

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secret.html#cfn-secretsmanager-secret-replicaregions

@@ -540,9 +457,6 @@ */

/**
* The text to encrypt and store in the secret.
* The text to encrypt and store in the secret. We recommend you use a JSON structure of key/value pairs for your secret value.
*
* We recommend you use a JSON structure of key/value pairs for your secret value.
*
* Either `GenerateSecretString` or `SecretString` must have a value, but not both. They cannot both be empty. We recommend that you use the `GenerateSecretString` property to generate a random password.
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secret.html#cfn-secretsmanager-secret-secretstring

@@ -552,6 +466,4 @@ */

/**
* A list of tags to attach to the secret.
* A list of tags to attach to the secret. Each tag is a key and value pair of strings in a JSON text string, for example:
*
* Each tag is a key and value pair of strings in a JSON text string, for example:
*
* `[{"Key":"CostCenter","Value":"12345"},{"Key":"environment","Value":"production"}]`

@@ -574,3 +486,2 @@ *

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secret.html#cfn-secretsmanager-secret-tags

@@ -581,3 +492,3 @@ */

/**
* A CloudFormation `AWS::SecretsManager::Secret`.
* A CloudFormation `AWS::SecretsManager::Secret`
*

@@ -594,4 +505,5 @@ * Creates a new secret. A *secret* is a set of credentials, such as a user name and password, that you store in an encrypted form in Secrets Manager. The secret also includes the connection information to access a database or other service, which Secrets Manager doesn't encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information needed to manage the secret.

*
* @external
* @cloudformationResource AWS::SecretsManager::Secret
* @stability external
*
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secret.html

@@ -602,4 +514,2 @@ */

* The CloudFormation resource type name for this resource class.
*
* @external
*/

@@ -618,3 +528,2 @@ static readonly CFN_RESOURCE_TYPE_NAME = "AWS::SecretsManager::Secret";

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secret.html#cfn-secretsmanager-secret-description

@@ -630,3 +539,2 @@ */

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secret.html#cfn-secretsmanager-secret-generatesecretstring

@@ -644,3 +552,2 @@ */

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secret.html#cfn-secretsmanager-secret-kmskeyid

@@ -656,3 +563,2 @@ */

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secret.html#cfn-secretsmanager-secret-name

@@ -664,3 +570,2 @@ */

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secret.html#cfn-secretsmanager-secret-replicaregions

@@ -670,9 +575,6 @@ */

/**
* The text to encrypt and store in the secret.
* The text to encrypt and store in the secret. We recommend you use a JSON structure of key/value pairs for your secret value.
*
* We recommend you use a JSON structure of key/value pairs for your secret value.
*
* Either `GenerateSecretString` or `SecretString` must have a value, but not both. They cannot both be empty. We recommend that you use the `GenerateSecretString` property to generate a random password.
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secret.html#cfn-secretsmanager-secret-secretstring

@@ -682,6 +584,4 @@ */

/**
* A list of tags to attach to the secret.
* A list of tags to attach to the secret. Each tag is a key and value pair of strings in a JSON text string, for example:
*
* Each tag is a key and value pair of strings in a JSON text string, for example:
*
* `[{"Key":"CostCenter","Value":"12345"},{"Key":"environment","Value":"production"}]`

@@ -704,3 +604,2 @@ *

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secret.html#cfn-secretsmanager-secret-tags

@@ -712,6 +611,5 @@ */

*
* @param scope - scope in which this resource is defined.
* @param id - scoped id of the resource.
* @param props - resource properties.
* @external
* @param scope - scope in which this resource is defined
* @param id - scoped id of the resource
* @param props - resource properties
*/

@@ -722,15 +620,9 @@ constructor(scope: cdk.Construct, id: string, props?: CfnSecretProps);

*
* @param inspector - tree inspector to collect and process attributes.
* @external
* @param inspector - tree inspector to collect and process attributes
*
*/
inspect(inspector: cdk.TreeInspector): void;
/**
* @external
*/
protected get cfnProperties(): {
[key: string]: any;
};
/**
* @external
*/
protected renderProperties(props: {

@@ -742,28 +634,11 @@ [key: string]: any;

}
/**
* A CloudFormation `AWS::SecretsManager::Secret`.
*
* Creates a new secret. A *secret* is a set of credentials, such as a user name and password, that you store in an encrypted form in Secrets Manager. The secret also includes the connection information to access a database or other service, which Secrets Manager doesn't encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information needed to manage the secret.
*
* For information about creating a secret in the console, see [Create a secret](https://docs.aws.amazon.com/secretsmanager/latest/userguide/manage_create-basic-secret.html) .
*
* For information about creating a secret using the CLI or SDK, see [CreateSecret](https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_CreateSecret.html) .
*
* To specify the encrypted value for the secret, you must include either the `GenerateSecretString` or the `SecretString` property, but not both. We recommend that you use the `GenerateSecretString` property to generate a random password as shown in the examples. You can't generate a secret with a `SecretBinary` secret value using AWS CloudFormation .
*
* > Do not create a dynamic reference using a backslash `(\)` as the final value. AWS CloudFormation cannot resolve those references, which causes a resource failure.
*
* @external
* @cloudformationResource AWS::SecretsManager::Secret
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secret.html
*/
export declare namespace CfnSecret {
/**
* Generates a random password.
* Generates a random password. We recommend that you specify the maximum length and include every character type that the system you are generating a password for can support.
*
* We recommend that you specify the maximum length and include every character type that the system you are generating a password for can support.
*
* *Required permissions:* `secretsmanager:GetRandomPassword` . For more information, see [IAM policy actions for Secrets Manager](https://docs.aws.amazon.com/service-authorization/latest/reference/list_awssecretsmanager.html#awssecretsmanager-actions-as-permissions) and [Authentication and access control in Secrets Manager](https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access.html) .
*
* @external
* @struct
* @stability external
*
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-secret-generatesecretstring.html

@@ -775,3 +650,2 @@ */

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-secret-generatesecretstring.html#cfn-secretsmanager-secret-generatesecretstring-excludecharacters

@@ -781,7 +655,4 @@ */

/**
* Specifies whether to exclude lowercase letters from the password.
* Specifies whether to exclude lowercase letters from the password. If you don't include this switch, the password can contain lowercase letters.
*
* If you don't include this switch, the password can contain lowercase letters.
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-secret-generatesecretstring.html#cfn-secretsmanager-secret-generatesecretstring-excludelowercase

@@ -791,7 +662,4 @@ */

/**
* Specifies whether to exclude numbers from the password.
* Specifies whether to exclude numbers from the password. If you don't include this switch, the password can contain numbers.
*
* If you don't include this switch, the password can contain numbers.
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-secret-generatesecretstring.html#cfn-secretsmanager-secret-generatesecretstring-excludenumbers

@@ -801,7 +669,4 @@ */

/**
* Specifies whether to exclude the following punctuation characters from the password: `!
* Specifies whether to exclude the following punctuation characters from the password: `! " # $ % & ' ( ) * + , - . / : ; < = > ? @ [ \ ] ^ _ ` { | } ~` . If you don't include this switch, the password can contain punctuation.
*
* " # $ % & ' ( ) * + , - . / : ; < = > ? @ [ \ ] ^ _ ` { | } ~` . If you don't include this switch, the password can contain punctuation.
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-secret-generatesecretstring.html#cfn-secretsmanager-secret-generatesecretstring-excludepunctuation

@@ -811,7 +676,4 @@ */

/**
* Specifies whether to exclude uppercase letters from the password.
* Specifies whether to exclude uppercase letters from the password. If you don't include this switch, the password can contain uppercase letters.
*
* If you don't include this switch, the password can contain uppercase letters.
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-secret-generatesecretstring.html#cfn-secretsmanager-secret-generatesecretstring-excludeuppercase

@@ -821,7 +683,4 @@ */

/**
* The JSON key name for the key/value pair, where the value is the generated password.
* The JSON key name for the key/value pair, where the value is the generated password. This pair is added to the JSON structure specified by the `SecretStringTemplate` parameter. If you specify this parameter, then you must also specify `SecretStringTemplate` .
*
* This pair is added to the JSON structure specified by the `SecretStringTemplate` parameter. If you specify this parameter, then you must also specify `SecretStringTemplate` .
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-secret-generatesecretstring.html#cfn-secretsmanager-secret-generatesecretstring-generatestringkey

@@ -831,7 +690,4 @@ */

/**
* Specifies whether to include the space character.
* Specifies whether to include the space character. If you include this switch, the password can contain space characters.
*
* If you include this switch, the password can contain space characters.
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-secret-generatesecretstring.html#cfn-secretsmanager-secret-generatesecretstring-includespace

@@ -841,7 +697,4 @@ */

/**
* The length of the password.
* The length of the password. If you don't include this parameter, the default length is 32 characters.
*
* If you don't include this parameter, the default length is 32 characters.
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-secret-generatesecretstring.html#cfn-secretsmanager-secret-generatesecretstring-passwordlength

@@ -851,7 +704,4 @@ */

/**
* Specifies whether to include at least one upper and lowercase letter, one number, and one punctuation.
* Specifies whether to include at least one upper and lowercase letter, one number, and one punctuation. If you don't include this switch, the password contains at least one of every character type.
*
* If you don't include this switch, the password contains at least one of every character type.
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-secret-generatesecretstring.html#cfn-secretsmanager-secret-generatesecretstring-requireeachincludedtype

@@ -863,3 +713,2 @@ */

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-secret-generatesecretstring.html#cfn-secretsmanager-secret-generatesecretstring-secretstringtemplate

@@ -870,19 +719,2 @@ */

}
/**
* A CloudFormation `AWS::SecretsManager::Secret`.
*
* Creates a new secret. A *secret* is a set of credentials, such as a user name and password, that you store in an encrypted form in Secrets Manager. The secret also includes the connection information to access a database or other service, which Secrets Manager doesn't encrypt. A secret in Secrets Manager consists of both the protected secret data and the important information needed to manage the secret.
*
* For information about creating a secret in the console, see [Create a secret](https://docs.aws.amazon.com/secretsmanager/latest/userguide/manage_create-basic-secret.html) .
*
* For information about creating a secret using the CLI or SDK, see [CreateSecret](https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_CreateSecret.html) .
*
* To specify the encrypted value for the secret, you must include either the `GenerateSecretString` or the `SecretString` property, but not both. We recommend that you use the `GenerateSecretString` property to generate a random password as shown in the examples. You can't generate a secret with a `SecretBinary` secret value using AWS CloudFormation .
*
* > Do not create a dynamic reference using a backslash `(\)` as the final value. AWS CloudFormation cannot resolve those references, which causes a resource failure.
*
* @external
* @cloudformationResource AWS::SecretsManager::Secret
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secret.html
*/
export declare namespace CfnSecret {

@@ -892,3 +724,5 @@ /**

*
* @external
* @struct
* @stability external
*
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-secret-replicaregion.html

@@ -898,7 +732,4 @@ */

/**
* The ARN, key ID, or alias of the KMS key to encrypt the secret.
* The ARN, key ID, or alias of the KMS key to encrypt the secret. If you don't include this field, Secrets Manager uses `aws/secretsmanager` .
*
* If you don't include this field, Secrets Manager uses `aws/secretsmanager` .
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-secret-replicaregion.html#cfn-secretsmanager-secret-replicaregion-kmskeyid

@@ -908,5 +739,4 @@ */

/**
* `CfnSecret.ReplicaRegionProperty.Region`.
* `CfnSecret.ReplicaRegionProperty.Region`
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-secretsmanager-secret-replicaregion.html#cfn-secretsmanager-secret-replicaregion-region

@@ -918,5 +748,7 @@ */

/**
* Properties for defining a `CfnSecretTargetAttachment`.
* Properties for defining a `CfnSecretTargetAttachment`
*
* @external
* @struct
* @stability external
*
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secrettargetattachment.html

@@ -926,7 +758,4 @@ */

/**
* The ARN or name of the secret.
* The ARN or name of the secret. To reference a secret also created in this template, use the see [Ref](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/intrinsic-function-reference-ref.html) function with the secret's logical ID.
*
* To reference a secret also created in this template, use the see [Ref](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/intrinsic-function-reference-ref.html) function with the secret's logical ID.
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secrettargetattachment.html#cfn-secretsmanager-secrettargetattachment-secretid

@@ -938,3 +767,2 @@ */

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secrettargetattachment.html#cfn-secretsmanager-secrettargetattachment-targetid

@@ -944,6 +772,4 @@ */

/**
* A string that defines the type of service or database associated with the secret.
* A string that defines the type of service or database associated with the secret. This value instructs Secrets Manager how to update the secret with the details of the service or database. This value must be one of the following:
*
* This value instructs Secrets Manager how to update the secret with the details of the service or database. This value must be one of the following:
*
* - AWS::RDS::DBInstance

@@ -955,3 +781,2 @@ * - AWS::RDS::DBCluster

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secrettargetattachment.html#cfn-secretsmanager-secrettargetattachment-targettype

@@ -962,3 +787,3 @@ */

/**
* A CloudFormation `AWS::SecretsManager::SecretTargetAttachment`.
* A CloudFormation `AWS::SecretsManager::SecretTargetAttachment`
*

@@ -971,4 +796,5 @@ * The `AWS::SecretsManager::SecretTargetAttachment` resource completes the final link between a Secrets Manager secret and the associated database. This is required because each has a dependency on the other. No matter which one you create first, the other doesn't exist yet. To resolve this, you must create the resources in the following order:

*
* @external
* @cloudformationResource AWS::SecretsManager::SecretTargetAttachment
* @stability external
*
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secrettargetattachment.html

@@ -979,4 +805,2 @@ */

* The CloudFormation resource type name for this resource class.
*
* @external
*/

@@ -993,7 +817,4 @@ static readonly CFN_RESOURCE_TYPE_NAME = "AWS::SecretsManager::SecretTargetAttachment";

/**
* The ARN or name of the secret.
* The ARN or name of the secret. To reference a secret also created in this template, use the see [Ref](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/intrinsic-function-reference-ref.html) function with the secret's logical ID.
*
* To reference a secret also created in this template, use the see [Ref](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/intrinsic-function-reference-ref.html) function with the secret's logical ID.
*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secrettargetattachment.html#cfn-secretsmanager-secrettargetattachment-secretid

@@ -1005,3 +826,2 @@ */

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secrettargetattachment.html#cfn-secretsmanager-secrettargetattachment-targetid

@@ -1011,6 +831,4 @@ */

/**
* A string that defines the type of service or database associated with the secret.
* A string that defines the type of service or database associated with the secret. This value instructs Secrets Manager how to update the secret with the details of the service or database. This value must be one of the following:
*
* This value instructs Secrets Manager how to update the secret with the details of the service or database. This value must be one of the following:
*
* - AWS::RDS::DBInstance

@@ -1022,3 +840,2 @@ * - AWS::RDS::DBCluster

*
* @external
* @link http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-secretsmanager-secrettargetattachment.html#cfn-secretsmanager-secrettargetattachment-targettype

@@ -1030,6 +847,5 @@ */

*
* @param scope - scope in which this resource is defined.
* @param id - scoped id of the resource.
* @param props - resource properties.
* @external
* @param scope - scope in which this resource is defined
* @param id - scoped id of the resource
* @param props - resource properties
*/

@@ -1040,15 +856,9 @@ constructor(scope: cdk.Construct, id: string, props: CfnSecretTargetAttachmentProps);

*
* @param inspector - tree inspector to collect and process attributes.
* @external
* @param inspector - tree inspector to collect and process attributes
*
*/
inspect(inspector: cdk.TreeInspector): void;
/**
* @external
*/
protected get cfnProperties(): {
[key: string]: any;
};
/**
* @external
*/
protected renderProperties(props: {

@@ -1055,0 +865,0 @@ [key: string]: any;

{
"name": "@aws-cdk/aws-secretsmanager",
"version": "1.144.0",
"version": "1.145.0",
"description": "The CDK Construct Library for AWS::SecretsManager",

@@ -83,27 +83,27 @@ "main": "lib/index.js",

"devDependencies": {
"@aws-cdk/assertions": "1.144.0",
"@aws-cdk/cdk-build-tools": "1.144.0",
"@aws-cdk/cdk-integ-tools": "1.144.0",
"@aws-cdk/cfn2ts": "1.144.0",
"@aws-cdk/pkglint": "1.144.0",
"@aws-cdk/assertions": "1.145.0",
"@aws-cdk/cdk-build-tools": "1.145.0",
"@aws-cdk/cdk-integ-tools": "1.145.0",
"@aws-cdk/cfn2ts": "1.145.0",
"@aws-cdk/pkglint": "1.145.0",
"@types/jest": "^27.4.0"
},
"dependencies": {
"@aws-cdk/aws-ec2": "1.144.0",
"@aws-cdk/aws-iam": "1.144.0",
"@aws-cdk/aws-kms": "1.144.0",
"@aws-cdk/aws-lambda": "1.144.0",
"@aws-cdk/aws-sam": "1.144.0",
"@aws-cdk/core": "1.144.0",
"@aws-cdk/cx-api": "1.144.0",
"@aws-cdk/aws-ec2": "1.145.0",
"@aws-cdk/aws-iam": "1.145.0",
"@aws-cdk/aws-kms": "1.145.0",
"@aws-cdk/aws-lambda": "1.145.0",
"@aws-cdk/aws-sam": "1.145.0",
"@aws-cdk/core": "1.145.0",
"@aws-cdk/cx-api": "1.145.0",
"constructs": "^3.3.69"
},
"peerDependencies": {
"@aws-cdk/aws-ec2": "1.144.0",
"@aws-cdk/aws-iam": "1.144.0",
"@aws-cdk/aws-kms": "1.144.0",
"@aws-cdk/aws-lambda": "1.144.0",
"@aws-cdk/aws-sam": "1.144.0",
"@aws-cdk/core": "1.144.0",
"@aws-cdk/cx-api": "1.144.0",
"@aws-cdk/aws-ec2": "1.145.0",
"@aws-cdk/aws-iam": "1.145.0",
"@aws-cdk/aws-kms": "1.145.0",
"@aws-cdk/aws-lambda": "1.145.0",
"@aws-cdk/aws-sam": "1.145.0",
"@aws-cdk/core": "1.145.0",
"@aws-cdk/cx-api": "1.145.0",
"constructs": "^3.3.69"

@@ -110,0 +110,0 @@ },

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is too big to display

Sorry, the diff of this file is too big to display

Sorry, the diff of this file is too big to display

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc