@aws-mdaa/dataops-job-l3-construct 1.3.0 → 1.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (35) hide show
  1. package/.jsii +114 -389
  2. package/lib/dataops-job-l3-construct.d.ts +30 -240
  3. package/lib/dataops-job-l3-construct.js +25 -25
  4. package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/.npmignore +34 -0
  5. package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/jest.config.js +5 -0
  6. package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/lib/index.js +1 -1
  7. package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/lib/index.ts +241 -0
  8. package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/package.json +16 -18
  9. package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/test/bucketpolicy-helper.test.d.ts +5 -0
  10. package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/test/bucketpolicy-helper.test.js +200 -0
  11. package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/test/bucketpolicy-helper.test.ts +215 -0
  12. package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/tsconfig.json +40 -0
  13. package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/tsconfig.tsbuildinfo +1 -0
  14. package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/typedoc.json +7 -0
  15. package/node_modules/@aws-mdaa/s3-inventory-helper/.npmignore +34 -0
  16. package/node_modules/@aws-mdaa/s3-inventory-helper/jest.config.js +5 -0
  17. package/node_modules/@aws-mdaa/s3-inventory-helper/lib/index.d.ts +2 -20
  18. package/node_modules/@aws-mdaa/s3-inventory-helper/lib/index.js +2 -11
  19. package/node_modules/@aws-mdaa/s3-inventory-helper/lib/index.ts +241 -0
  20. package/node_modules/@aws-mdaa/s3-inventory-helper/package.json +15 -17
  21. package/node_modules/@aws-mdaa/s3-inventory-helper/test/TODO +0 -0
  22. package/node_modules/@aws-mdaa/s3-inventory-helper/tsconfig.json +40 -0
  23. package/node_modules/@aws-mdaa/s3-inventory-helper/tsconfig.tsbuildinfo +1 -0
  24. package/node_modules/@aws-mdaa/s3-inventory-helper/typedoc.json +7 -0
  25. package/node_modules/lodash/README.md +2 -2
  26. package/node_modules/lodash/_baseUnset.js +47 -2
  27. package/node_modules/lodash/core.js +1 -1
  28. package/node_modules/lodash/core.min.js +1 -1
  29. package/node_modules/lodash/lodash.js +43 -4
  30. package/node_modules/lodash/lodash.min.js +57 -57
  31. package/node_modules/lodash/package.json +1 -1
  32. package/package.json +33 -47
  33. package/node_modules/lodash/flake.lock +0 -40
  34. package/node_modules/lodash/flake.nix +0 -20
  35. package/node_modules/lodash/release.md +0 -48
@@ -0,0 +1,241 @@
1
+ /*!
2
+ * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
3
+ * SPDX-License-Identifier: Apache-2.0
4
+ */
5
+
6
+ import { IPrincipal, PolicyStatement, Effect } from 'aws-cdk-lib/aws-iam';
7
+ import { IBucket } from 'aws-cdk-lib/aws-s3';
8
+
9
+ export interface IRestrictObjectPrefixToRoles {
10
+ readonly s3Bucket: IBucket;
11
+ readonly s3Prefix: string;
12
+ readonly readRoleIds?: string[];
13
+ readonly readWriteRoleIds?: string[];
14
+ readonly readWriteSuperRoleIds?: string[];
15
+ readonly readPrincipals?: IPrincipal[];
16
+ readonly readWritePrincipals?: IPrincipal[];
17
+ readonly readWriteSuperPrincipals?: IPrincipal[];
18
+ }
19
+
20
+ export interface IRestrictBucketToRoles {
21
+ readonly s3Bucket: IBucket;
22
+ readonly roleExcludeIds: string[];
23
+ readonly principalExcludes?: string[];
24
+ readonly prefixExcludes?: string[];
25
+ readonly prefixIncludes?: string[];
26
+ }
27
+
28
+ /** Helper class for generating S3 bucket policy statements which grant access to specific object prefixes */
29
+ export class RestrictObjectPrefixToRoles {
30
+ static readonly READ_ACTIONS = ['s3:GetObject*'];
31
+ static readonly READ_WRITE_ACTIONS = [
32
+ ...RestrictObjectPrefixToRoles.READ_ACTIONS,
33
+ 's3:PutObject',
34
+ 's3:PutObjectTagging',
35
+ 's3:DeleteObject',
36
+ ];
37
+ static readonly READ_WRITE_SUPER_ACTIONS = [
38
+ ...RestrictObjectPrefixToRoles.READ_WRITE_ACTIONS,
39
+ 's3:DeleteObjectVersion',
40
+ ];
41
+ static readonly BUCKET_ALLOW_ACTIONS = ['s3:List*', 's3:GetBucket*'];
42
+ static readonly BUCKET_DENY_ACTIONS = ['s3:PutObject*', 's3:GetObject*', 's3:DeleteObject*'];
43
+
44
+ private _readStatements: PolicyStatement[] = [];
45
+ private _readWriteStatements: PolicyStatement[] = [];
46
+ private _readWriteSuperStatements: PolicyStatement[] = [];
47
+ private _formattedPrefix: string;
48
+
49
+ constructor(props: IRestrictObjectPrefixToRoles) {
50
+ this._formattedPrefix = '/' + this.formatS3Prefix(props.s3Prefix) + '/*';
51
+ // Covers our case where two / get resolved because our prefix is actually /
52
+ this._formattedPrefix = this._formattedPrefix.replace(/\/\//, '/');
53
+
54
+ // FEDERATED / READ
55
+ if (props.readRoleIds != undefined && props.readRoleIds.length > 0) {
56
+ // Construct our User:Id roles for read
57
+ const statement = this._readStatementScaffold(props);
58
+ statement.addCondition('StringLike', { 'aws:userId': props.readRoleIds.map(x => `${x}:*`) });
59
+ statement.addAnyPrincipal();
60
+ this._readStatements.push(statement);
61
+ }
62
+ // FEDERATED / READWRITE
63
+ if (props.readWriteRoleIds != undefined && props.readWriteRoleIds.length > 0) {
64
+ const statement = this._readWriteStatementScaffold(props);
65
+ statement.addCondition('StringLike', { 'aws:userId': props.readWriteRoleIds.map(x => `${x}:*`) });
66
+ statement.addAnyPrincipal();
67
+ this._readWriteStatements.push(statement);
68
+ }
69
+
70
+ // FEDERATED / READWRITESUPER
71
+ if (props.readWriteSuperRoleIds != undefined && props.readWriteSuperRoleIds.length > 0) {
72
+ const statement = this._readWriteSuperStatementScaffold(props);
73
+ statement.addCondition('StringLike', { 'aws:userId': props.readWriteSuperRoleIds.map(x => `${x}:*`) });
74
+ statement.addAnyPrincipal();
75
+ this._readWriteSuperStatements.push(statement);
76
+ }
77
+
78
+ // NONFEDERATED / READ
79
+ if (props.readPrincipals != undefined && props.readPrincipals.length > 0) {
80
+ const statement = this._readStatementScaffold(props);
81
+ props.readPrincipals.forEach(principal => {
82
+ statement.addPrincipals(principal);
83
+ });
84
+ this._readStatements.push(statement);
85
+ }
86
+ // NONFEDERATED / READWRITE
87
+ if (props.readWritePrincipals != undefined && props.readWritePrincipals.length > 0) {
88
+ const statement = this._readWriteStatementScaffold(props);
89
+ props.readWritePrincipals.forEach(principal => {
90
+ statement.addPrincipals(principal);
91
+ });
92
+ this._readWriteStatements.push(statement);
93
+ }
94
+ // NONFEDERATED / READWRITESUPER
95
+ if (props.readWriteSuperPrincipals != undefined && props.readWriteSuperPrincipals.length > 0) {
96
+ const statement = this._readWriteSuperStatementScaffold(props);
97
+ props.readWriteSuperPrincipals.forEach(principal => {
98
+ statement.addPrincipals(principal);
99
+ });
100
+ this._readWriteSuperStatements.push(statement);
101
+ }
102
+ }
103
+
104
+ private _readStatementScaffold(props: IRestrictObjectPrefixToRoles): PolicyStatement {
105
+ return new PolicyStatement({
106
+ sid: `${props.s3Prefix.replace(/\\W/g, '')}_Read`,
107
+ effect: Effect.ALLOW,
108
+ resources: [props.s3Bucket.bucketArn + this._formattedPrefix],
109
+ actions: RestrictObjectPrefixToRoles.READ_ACTIONS,
110
+ });
111
+ }
112
+
113
+ private _readWriteStatementScaffold(props: IRestrictObjectPrefixToRoles): PolicyStatement {
114
+ return new PolicyStatement({
115
+ sid: `${props.s3Prefix.replace(/\\W/g, '')}_ReadWrite`,
116
+ effect: Effect.ALLOW,
117
+ resources: [props.s3Bucket.bucketArn + this._formattedPrefix],
118
+ actions: RestrictObjectPrefixToRoles.READ_WRITE_ACTIONS,
119
+ });
120
+ }
121
+
122
+ private _readWriteSuperStatementScaffold(props: IRestrictObjectPrefixToRoles): PolicyStatement {
123
+ return new PolicyStatement({
124
+ sid: `${props.s3Prefix.replace(/\\W/g, '')}_ReadWriteSuper`,
125
+ effect: Effect.ALLOW,
126
+ resources: [props.s3Bucket.bucketArn + this._formattedPrefix],
127
+ actions: RestrictObjectPrefixToRoles.READ_WRITE_SUPER_ACTIONS,
128
+ });
129
+ }
130
+
131
+ public readStatements(): PolicyStatement[] {
132
+ return this._readStatements;
133
+ }
134
+
135
+ public readWriteStatements(): PolicyStatement[] {
136
+ return this._readWriteStatements;
137
+ }
138
+
139
+ public readWriteSuperStatements(): PolicyStatement[] {
140
+ return this._readWriteSuperStatements;
141
+ }
142
+
143
+ public statements(): PolicyStatement[] {
144
+ return [...this._readStatements, ...this._readWriteStatements, ...this._readWriteSuperStatements];
145
+ }
146
+
147
+ public formatS3Prefix(prefix: string): string {
148
+ let rawPrefix = prefix;
149
+
150
+ // Removes trailing slashes
151
+ rawPrefix = rawPrefix.endsWith('/') ? rawPrefix.slice(0, -1) : rawPrefix;
152
+ // Removes leading slashes
153
+ rawPrefix = rawPrefix.startsWith('/') ? rawPrefix.substring(1) : rawPrefix;
154
+ return rawPrefix;
155
+ }
156
+ }
157
+
158
+ /** Helper class for generating bucket policy statements
159
+ * which allow or deny access to an entire bucket. Used to
160
+ * create bucket-level default deny statements to block accesses
161
+ * not granted in the bucket policy. */
162
+ export class RestrictBucketToRoles {
163
+ public readonly denyStatement: PolicyStatement;
164
+ public readonly allowStatement: PolicyStatement;
165
+ private resource: string[] = [];
166
+ private notResource: string[] = [];
167
+ private denyConditionalNotEquals: {
168
+ 'aws:userId'?: string[];
169
+ 'aws:PrincipalArn'?: string[];
170
+ } = {};
171
+
172
+ constructor(props: IRestrictBucketToRoles) {
173
+ // Statement allowing access to the bucket for the AROAs
174
+ this.allowStatement = new PolicyStatement({
175
+ sid: `BucketAllow`,
176
+ effect: Effect.ALLOW,
177
+ resources: [props.s3Bucket.bucketArn + '/*', props.s3Bucket.bucketArn],
178
+ actions: RestrictObjectPrefixToRoles.BUCKET_ALLOW_ACTIONS,
179
+ });
180
+ this.allowStatement.addAnyPrincipal();
181
+ this.allowStatement.addCondition('StringLike', { 'aws:userId': props.roleExcludeIds.map(x => `${x}:*`) });
182
+
183
+ // Constuct our deny statement.
184
+ // prefixIncludes denotes we want to include a prefix in our deny meaning Resource
185
+ if (props.prefixIncludes) {
186
+ this.resource = props.prefixIncludes.map(prefix => {
187
+ return `${props.s3Bucket.bucketArn}/${this.formatS3Prefix(prefix)}`;
188
+ });
189
+ } else {
190
+ this.resource = [props.s3Bucket.bucketArn + '/*'];
191
+ }
192
+ // prefixExcludes denote we want to exclude a prefix in our deny meaning notResource
193
+ if (props.prefixExcludes) {
194
+ this.notResource = props.prefixExcludes.map(prefix => {
195
+ return `${props.s3Bucket.bucketArn}/${this.formatS3Prefix(prefix)}`;
196
+ });
197
+ }
198
+
199
+ if (this.notResource.length > 0) {
200
+ this.denyStatement = new PolicyStatement({
201
+ sid: `BucketDeny`,
202
+ effect: Effect.DENY,
203
+ notResources: this.notResource,
204
+ actions: RestrictObjectPrefixToRoles.BUCKET_DENY_ACTIONS,
205
+ });
206
+ } else {
207
+ this.denyStatement = new PolicyStatement({
208
+ sid: `BucketDeny`,
209
+ effect: Effect.DENY,
210
+ resources: this.resource,
211
+ actions: RestrictObjectPrefixToRoles.BUCKET_DENY_ACTIONS,
212
+ });
213
+ }
214
+ this.denyStatement.addAnyPrincipal();
215
+
216
+ // Build our conditionals.
217
+ this.denyConditionalNotEquals['aws:userId'] = props.roleExcludeIds.map(x => `${x}:*`);
218
+ if (props.principalExcludes && props.principalExcludes.length > 0) {
219
+ this.denyConditionalNotEquals['aws:PrincipalArn'] = [...new Set(props.principalExcludes)].sort((a, b) =>
220
+ a.localeCompare(b),
221
+ );
222
+ }
223
+
224
+ // Construct our conditional for our deny
225
+ if (Object.keys(this.denyConditionalNotEquals).length == 1) {
226
+ this.denyStatement.addCondition('StringNotLike', this.denyConditionalNotEquals);
227
+ } else {
228
+ this.denyStatement.addCondition('ForAnyValue:StringNotLike', this.denyConditionalNotEquals);
229
+ }
230
+ }
231
+
232
+ private formatS3Prefix(prefix: string): string {
233
+ let rawPrefix = prefix;
234
+
235
+ // Removes trailing slashes
236
+ rawPrefix = rawPrefix.endsWith('/') ? rawPrefix.slice(0, -1) : rawPrefix;
237
+ // Removes leading slashes
238
+ rawPrefix = rawPrefix.startsWith('/') ? rawPrefix.substring(1) : rawPrefix;
239
+ return `${rawPrefix}/*`;
240
+ }
241
+ }
@@ -5,35 +5,33 @@
5
5
  "name": "Amazon Web Services",
6
6
  "url": "https://aws.amazon.com/solutions"
7
7
  },
8
- "version": "1.3.0",
8
+ "version": "1.5.0",
9
9
  "license": "Apache-2.0",
10
10
  "main": "lib/index.js",
11
11
  "types": "lib/index.d.ts",
12
12
  "scripts": {
13
13
  "build": "tsc",
14
14
  "watch": "tsc -w",
15
- "test": "jest --passWithNoTests --coverage",
16
- "lint": "eslint --max-warnings 0 -c ../../../.eslintrc.json '**/*.{ts,tsx}' --ignore-pattern 'dist/*' --ignore-pattern 'node_modules/*' --ignore-pattern \"*.d.ts\" ",
17
- "test-coverage": "jest --passWithNoTests --coverage"
15
+ "test": "jest --passWithNoTests --testPathIgnorePatterns='.*\\.snapshot\\.test\\.ts'",
16
+ "lint": "eslint --max-warnings 0 -c ../../../eslint.config.mjs",
17
+ "test:coverage": "jest --passWithNoTests --coverage --testPathIgnorePatterns='.*\\.snapshot\\.test\\.ts'",
18
+ "test:snapshots": "jest --passWithNoTests --testPathPattern='.*\\.snapshot\\.test\\.ts'",
19
+ "test:snapshots:update": "jest --passWithNoTests --testPathPattern='.*\\.snapshot\\.test\\.ts' --updateSnapshot"
18
20
  },
19
21
  "devDependencies": {
20
- "@aws-mdaa/testing": "1.3.0",
21
- "@types/jest": "29.5.0",
22
- "@types/node": "17.0.23",
22
+ "@aws-mdaa/testing": "1.5.0",
23
+ "@types/jest": "29.5.14",
24
+ "@types/node": "22.9.0",
23
25
  "@types/prettier": "2.6.0",
24
- "jest": "29.5.0",
25
- "ts-jest": "29.1.0",
26
- "ts-node": "10.9.1",
27
- "typescript": "4.6.3",
28
- "typescript-json-schema": "0.63.0"
29
- },
30
- "overrides": {
31
- "aws-cdk-lib": "2.220.0",
32
- "@types/babel__traverse": "7.18.2"
26
+ "jest": "29.7.0",
27
+ "ts-jest": "29.4.6",
28
+ "ts-node": "10.9.2",
29
+ "typescript": "5.9.3",
30
+ "typescript-json-schema": "0.67.1"
33
31
  },
34
32
  "dependencies": {
35
- "@aws-mdaa/iam-role-helper": "1.3.0",
36
- "@aws-mdaa/naming": "1.3.0",
33
+ "@aws-mdaa/iam-role-helper": "1.5.0",
34
+ "@aws-mdaa/naming": "1.5.0",
37
35
  "aws-cdk-lib": "2.220.0",
38
36
  "cdk-nag": "2.37.55",
39
37
  "constructs": "10.0.96"
@@ -0,0 +1,5 @@
1
+ /*!
2
+ * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
3
+ * SPDX-License-Identifier: Apache-2.0
4
+ */
5
+ export {};
@@ -0,0 +1,200 @@
1
+ "use strict";
2
+ /*!
3
+ * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
4
+ * SPDX-License-Identifier: Apache-2.0
5
+ */
6
+ Object.defineProperty(exports, "__esModule", { value: true });
7
+ const testing_1 = require("@aws-mdaa/testing");
8
+ const lib_1 = require("../lib");
9
+ const aws_s3_1 = require("aws-cdk-lib/aws-s3");
10
+ const aws_iam_1 = require("aws-cdk-lib/aws-iam");
11
+ describe('Test BucketPolicy Helper', () => {
12
+ const testApp = new testing_1.MdaaTestApp();
13
+ const testBucket = aws_s3_1.Bucket.fromBucketName(testApp.testStack, 'test-bucket', 'test-bucket');
14
+ describe('RestrictPrefix', () => {
15
+ const baseTestProps = {
16
+ s3Bucket: testBucket,
17
+ s3Prefix: 'test-prefix',
18
+ };
19
+ test('Read Role Ids', () => {
20
+ const testProps = {
21
+ ...baseTestProps,
22
+ readRoleIds: ['test-role-id-1', 'test-role-id-2'],
23
+ };
24
+ const restriction = new lib_1.RestrictObjectPrefixToRoles(testProps);
25
+ // console.log( JSON.stringify( restriction.statements()[ 0 ], undefined, 2 ) )
26
+ expect(restriction.statements().length).toBe(1);
27
+ expect(restriction.readStatements().length).toBe(1);
28
+ expect(restriction.readWriteSuperStatements().length).toBe(0);
29
+ expect(restriction.readWriteStatements().length).toBe(0);
30
+ expect(restriction.readStatements()[0].actions).toStrictEqual(['s3:GetObject*']);
31
+ expect(restriction.readStatements()[0].conditions).toStrictEqual({
32
+ StringLike: {
33
+ 'aws:userId': ['test-role-id-1:*', 'test-role-id-2:*'],
34
+ },
35
+ });
36
+ expect(restriction.readStatements()[0].effect).toBe('Allow');
37
+ expect(restriction.readStatements()[0].resources).toStrictEqual([
38
+ 'arn:test-partition:s3:::test-bucket/test-prefix/*',
39
+ ]);
40
+ });
41
+ test('ReadWrite Role Ids', () => {
42
+ const testProps = {
43
+ ...baseTestProps,
44
+ readWriteRoleIds: ['test-role-id-1', 'test-role-id-2'],
45
+ };
46
+ const restriction = new lib_1.RestrictObjectPrefixToRoles(testProps);
47
+ // console.log( JSON.stringify( restriction.statements()[ 0 ], undefined, 2 ) )
48
+ expect(restriction.statements().length).toBe(1);
49
+ expect(restriction.readWriteStatements().length).toBe(1);
50
+ expect(restriction.readStatements().length).toBe(0);
51
+ expect(restriction.readWriteSuperStatements().length).toBe(0);
52
+ expect(restriction.readWriteStatements()[0].actions).toStrictEqual([
53
+ 's3:GetObject*',
54
+ 's3:PutObject',
55
+ 's3:PutObjectTagging',
56
+ 's3:DeleteObject',
57
+ ]);
58
+ expect(restriction.readWriteStatements()[0].conditions).toStrictEqual({
59
+ StringLike: {
60
+ 'aws:userId': ['test-role-id-1:*', 'test-role-id-2:*'],
61
+ },
62
+ });
63
+ });
64
+ test('ReadWriteSuper Role Ids', () => {
65
+ const testProps = {
66
+ ...baseTestProps,
67
+ readWriteSuperRoleIds: ['test-role-id-1', 'test-role-id-2'],
68
+ };
69
+ const restriction = new lib_1.RestrictObjectPrefixToRoles(testProps);
70
+ // console.log( JSON.stringify( restriction.statements()[ 0 ], undefined, 2 ) )
71
+ expect(restriction.statements().length).toBe(1);
72
+ expect(restriction.readWriteSuperStatements().length).toBe(1);
73
+ expect(restriction.readStatements().length).toBe(0);
74
+ expect(restriction.readWriteStatements().length).toBe(0);
75
+ expect(restriction.readWriteSuperStatements()[0].actions).toStrictEqual([
76
+ 's3:GetObject*',
77
+ 's3:PutObject',
78
+ 's3:PutObjectTagging',
79
+ 's3:DeleteObject',
80
+ 's3:DeleteObjectVersion',
81
+ ]);
82
+ expect(restriction.readWriteSuperStatements()[0].conditions).toStrictEqual({
83
+ StringLike: {
84
+ 'aws:userId': ['test-role-id-1:*', 'test-role-id-2:*'],
85
+ },
86
+ });
87
+ });
88
+ test('Read Principals', () => {
89
+ const testProps = {
90
+ ...baseTestProps,
91
+ readPrincipals: [new aws_iam_1.ArnPrincipal('test-role-arn-1')],
92
+ };
93
+ const restriction = new lib_1.RestrictObjectPrefixToRoles(testProps);
94
+ // console.log( JSON.stringify( restriction.statements()[ 0 ], undefined, 2 ) )
95
+ expect(restriction.statements().length).toBe(1);
96
+ expect(restriction.readStatements().length).toBe(1);
97
+ expect(restriction.readWriteSuperStatements().length).toBe(0);
98
+ expect(restriction.readWriteStatements().length).toBe(0);
99
+ expect(restriction.readStatements()[0].actions).toStrictEqual(['s3:GetObject*']);
100
+ expect(restriction.readStatements()[0].effect).toBe('Allow');
101
+ expect(restriction.readStatements()[0].resources).toStrictEqual([
102
+ 'arn:test-partition:s3:::test-bucket/test-prefix/*',
103
+ ]);
104
+ expect(restriction.readStatements()[0].principals.length).toBe(1);
105
+ expect(JSON.stringify(restriction.readStatements()[0].principals[0])).toStrictEqual(JSON.stringify({ AWS: ['test-role-arn-1'] }));
106
+ });
107
+ test('ReadWrite Principals', () => {
108
+ const testProps = {
109
+ ...baseTestProps,
110
+ readWritePrincipals: [new aws_iam_1.ArnPrincipal('test-role-arn-1')],
111
+ };
112
+ const restriction = new lib_1.RestrictObjectPrefixToRoles(testProps);
113
+ // console.log( JSON.stringify( restriction.statements()[ 0 ], undefined, 2 ) )
114
+ expect(restriction.statements().length).toBe(1);
115
+ expect(restriction.readWriteStatements().length).toBe(1);
116
+ expect(restriction.readStatements().length).toBe(0);
117
+ expect(restriction.readWriteSuperStatements().length).toBe(0);
118
+ expect(restriction.readWriteStatements()[0].actions).toStrictEqual([
119
+ 's3:GetObject*',
120
+ 's3:PutObject',
121
+ 's3:PutObjectTagging',
122
+ 's3:DeleteObject',
123
+ ]);
124
+ expect(restriction.readWriteStatements()[0].effect).toBe('Allow');
125
+ expect(restriction.readWriteStatements()[0].resources).toStrictEqual([
126
+ 'arn:test-partition:s3:::test-bucket/test-prefix/*',
127
+ ]);
128
+ expect(restriction.readWriteStatements()[0].principals.length).toBe(1);
129
+ expect(JSON.stringify(restriction.readWriteStatements()[0].principals[0])).toStrictEqual(JSON.stringify({ AWS: ['test-role-arn-1'] }));
130
+ });
131
+ test('ReadWriteSuper Principals', () => {
132
+ const testProps = {
133
+ ...baseTestProps,
134
+ readWriteSuperPrincipals: [new aws_iam_1.ArnPrincipal('test-role-arn-1')],
135
+ };
136
+ const restriction = new lib_1.RestrictObjectPrefixToRoles(testProps);
137
+ // console.log( JSON.stringify( restriction.statements()[ 0 ], undefined, 2 ) )
138
+ expect(restriction.statements().length).toBe(1);
139
+ expect(restriction.readStatements().length).toBe(0);
140
+ expect(restriction.readWriteStatements().length).toBe(0);
141
+ expect(restriction.readWriteSuperStatements().length).toBe(1);
142
+ expect(restriction.readWriteSuperStatements()[0].actions).toStrictEqual([
143
+ 's3:GetObject*',
144
+ 's3:PutObject',
145
+ 's3:PutObjectTagging',
146
+ 's3:DeleteObject',
147
+ 's3:DeleteObjectVersion',
148
+ ]);
149
+ expect(restriction.readWriteSuperStatements()[0].effect).toBe('Allow');
150
+ expect(restriction.readWriteSuperStatements()[0].resources).toStrictEqual([
151
+ 'arn:test-partition:s3:::test-bucket/test-prefix/*',
152
+ ]);
153
+ expect(restriction.readWriteSuperStatements()[0].principals.length).toBe(1);
154
+ expect(JSON.stringify(restriction.readWriteSuperStatements()[0].principals[0])).toStrictEqual(JSON.stringify({ AWS: ['test-role-arn-1'] }));
155
+ });
156
+ });
157
+ describe('RestrictBucket', () => {
158
+ const baseTestProps = {
159
+ s3Bucket: testBucket,
160
+ roleExcludeIds: ['test-role-id-1', 'test-role-id-2'],
161
+ principalExcludes: ['test-arn'],
162
+ prefixExcludes: ['exclude-prefix'],
163
+ prefixIncludes: ['exclude-prefix'],
164
+ };
165
+ test('Base Allow', () => {
166
+ const testProps = {
167
+ ...baseTestProps,
168
+ };
169
+ const restriction = new lib_1.RestrictBucketToRoles(testProps);
170
+ console.log(JSON.stringify(restriction.allowStatement, undefined, 2));
171
+ expect(restriction.allowStatement.actions).toStrictEqual(['s3:List*', 's3:GetBucket*']);
172
+ expect(restriction.allowStatement.effect).toBe('Allow');
173
+ expect(restriction.allowStatement.conditions).toStrictEqual({
174
+ StringLike: {
175
+ 'aws:userId': ['test-role-id-1:*', 'test-role-id-2:*'],
176
+ },
177
+ });
178
+ expect(restriction.allowStatement.resources).toStrictEqual([
179
+ 'arn:test-partition:s3:::test-bucket/*',
180
+ 'arn:test-partition:s3:::test-bucket',
181
+ ]);
182
+ });
183
+ test('Base Deny', () => {
184
+ const testProps = {
185
+ ...baseTestProps,
186
+ };
187
+ const restriction = new lib_1.RestrictBucketToRoles(testProps);
188
+ console.log(JSON.stringify(restriction.denyStatement, undefined, 2));
189
+ expect(restriction.denyStatement.actions).toStrictEqual(['s3:PutObject*', 's3:GetObject*', 's3:DeleteObject*']);
190
+ expect(restriction.denyStatement.effect).toBe('Deny');
191
+ expect(restriction.denyStatement.conditions).toStrictEqual({
192
+ 'ForAnyValue:StringNotLike': {
193
+ 'aws:userId': ['test-role-id-1:*', 'test-role-id-2:*'],
194
+ 'aws:PrincipalArn': ['test-arn'],
195
+ },
196
+ });
197
+ });
198
+ });
199
+ });
200
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"bucketpolicy-helper.test.js","sourceRoot":"","sources":["bucketpolicy-helper.test.ts"],"names":[],"mappings":";AAAA;;;GAGG;;AAEH,+CAAgD;AAChD,gCAKgB;AAChB,+CAA4C;AAC5C,iDAAmD;AAEnD,QAAQ,CAAC,0BAA0B,EAAE,GAAG,EAAE;IACxC,MAAM,OAAO,GAAG,IAAI,qBAAW,EAAE,CAAC;IAClC,MAAM,UAAU,GAAG,eAAM,CAAC,cAAc,CAAC,OAAO,CAAC,SAAS,EAAE,aAAa,EAAE,aAAa,CAAC,CAAC;IAC1F,QAAQ,CAAC,gBAAgB,EAAE,GAAG,EAAE;QAC9B,MAAM,aAAa,GAAiC;YAClD,QAAQ,EAAE,UAAU;YACpB,QAAQ,EAAE,aAAa;SACxB,CAAC;QACF,IAAI,CAAC,eAAe,EAAE,GAAG,EAAE;YACzB,MAAM,SAAS,GAAiC;gBAC9C,GAAG,aAAa;gBAChB,WAAW,EAAE,CAAC,gBAAgB,EAAE,gBAAgB,CAAC;aAClD,CAAC;YACF,MAAM,WAAW,GAAG,IAAI,iCAA2B,CAAC,SAAS,CAAC,CAAC;YAC/D,+EAA+E;YAC/E,MAAM,CAAC,WAAW,CAAC,UAAU,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAChD,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACpD,MAAM,CAAC,WAAW,CAAC,wBAAwB,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAC9D,MAAM,CAAC,WAAW,CAAC,mBAAmB,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACzD,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,aAAa,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC;YACjF,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,aAAa,CAAC;gBAC/D,UAAU,EAAE;oBACV,YAAY,EAAE,CAAC,kBAAkB,EAAE,kBAAkB,CAAC;iBACvD;aACF,CAAC,CAAC;YACH,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;YAC7D,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,aAAa,CAAC;gBAC9D,mDAAmD;aACpD,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,oBAAoB,EAAE,GAAG,EAAE;YAC9B,MAAM,SAAS,GAAiC;gBAC9C,GAAG,aAAa;gBAChB,gBAAgB,EAAE,CAAC,gBAAgB,EAAE,gBAAgB,CAAC;aACvD,CAAC;YACF,MAAM,WAAW,GAAG,IAAI,iCAA2B,CAAC,SAAS,CAAC,CAAC;YAC/D,+EAA+E;YAC/E,MAAM,CAAC,WAAW,CAAC,UAAU,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAChD,MAAM,CAAC,WAAW,CAAC,mBAAmB,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACzD,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACpD,MAAM,CAAC,WAAW,CAAC,wBAAwB,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAC9D,MAAM,CAAC,WAAW,CAAC,mBAAmB,EAAE,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,aAAa,CAAC;gBACjE,eAAe;gBACf,cAAc;gBACd,qBAAqB;gBACrB,iBAAiB;aAClB,CAAC,CAAC;YACH,MAAM,CAAC,WAAW,CAAC,mBAAmB,EAAE,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,aAAa,CAAC;gBACpE,UAAU,EAAE;oBACV,YAAY,EAAE,CAAC,kBAAkB,EAAE,kBAAkB,CAAC;iBACvD;aACF,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,yBAAyB,EAAE,GAAG,EAAE;YACnC,MAAM,SAAS,GAAiC;gBAC9C,GAAG,aAAa;gBAChB,qBAAqB,EAAE,CAAC,gBAAgB,EAAE,gBAAgB,CAAC;aAC5D,CAAC;YACF,MAAM,WAAW,GAAG,IAAI,iCAA2B,CAAC,SAAS,CAAC,CAAC;YAC/D,+EAA+E;YAC/E,MAAM,CAAC,WAAW,CAAC,UAAU,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAChD,MAAM,CAAC,WAAW,CAAC,wBAAwB,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAC9D,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACpD,MAAM,CAAC,WAAW,CAAC,mBAAmB,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACzD,MAAM,CAAC,WAAW,CAAC,wBAAwB,EAAE,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,aAAa,CAAC;gBACtE,eAAe;gBACf,cAAc;gBACd,qBAAqB;gBACrB,iBAAiB;gBACjB,wBAAwB;aACzB,CAAC,CAAC;YACH,MAAM,CAAC,WAAW,CAAC,wBAAwB,EAAE,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,aAAa,CAAC;gBACzE,UAAU,EAAE;oBACV,YAAY,EAAE,CAAC,kBAAkB,EAAE,kBAAkB,CAAC;iBACvD;aACF,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,iBAAiB,EAAE,GAAG,EAAE;YAC3B,MAAM,SAAS,GAAiC;gBAC9C,GAAG,aAAa;gBAChB,cAAc,EAAE,CAAC,IAAI,sBAAY,CAAC,iBAAiB,CAAC,CAAC;aACtD,CAAC;YACF,MAAM,WAAW,GAAG,IAAI,iCAA2B,CAAC,SAAS,CAAC,CAAC;YAC/D,+EAA+E;YAC/E,MAAM,CAAC,WAAW,CAAC,UAAU,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAChD,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACpD,MAAM,CAAC,WAAW,CAAC,wBAAwB,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAC9D,MAAM,CAAC,WAAW,CAAC,mBAAmB,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACzD,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,aAAa,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC;YACjF,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;YAC7D,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,aAAa,CAAC;gBAC9D,mDAAmD;aACpD,CAAC,CAAC;YACH,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAClE,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,aAAa,CACjF,IAAI,CAAC,SAAS,CAAC,EAAE,GAAG,EAAE,CAAC,iBAAiB,CAAC,EAAE,CAAC,CAC7C,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,sBAAsB,EAAE,GAAG,EAAE;YAChC,MAAM,SAAS,GAAiC;gBAC9C,GAAG,aAAa;gBAChB,mBAAmB,EAAE,CAAC,IAAI,sBAAY,CAAC,iBAAiB,CAAC,CAAC;aAC3D,CAAC;YACF,MAAM,WAAW,GAAG,IAAI,iCAA2B,CAAC,SAAS,CAAC,CAAC;YAC/D,+EAA+E;YAC/E,MAAM,CAAC,WAAW,CAAC,UAAU,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAChD,MAAM,CAAC,WAAW,CAAC,mBAAmB,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACzD,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACpD,MAAM,CAAC,WAAW,CAAC,wBAAwB,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAC9D,MAAM,CAAC,WAAW,CAAC,mBAAmB,EAAE,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,aAAa,CAAC;gBACjE,eAAe;gBACf,cAAc;gBACd,qBAAqB;gBACrB,iBAAiB;aAClB,CAAC,CAAC;YACH,MAAM,CAAC,WAAW,CAAC,mBAAmB,EAAE,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;YAClE,MAAM,CAAC,WAAW,CAAC,mBAAmB,EAAE,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,aAAa,CAAC;gBACnE,mDAAmD;aACpD,CAAC,CAAC;YACH,MAAM,CAAC,WAAW,CAAC,mBAAmB,EAAE,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACvE,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,WAAW,CAAC,mBAAmB,EAAE,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,aAAa,CACtF,IAAI,CAAC,SAAS,CAAC,EAAE,GAAG,EAAE,CAAC,iBAAiB,CAAC,EAAE,CAAC,CAC7C,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,2BAA2B,EAAE,GAAG,EAAE;YACrC,MAAM,SAAS,GAAiC;gBAC9C,GAAG,aAAa;gBAChB,wBAAwB,EAAE,CAAC,IAAI,sBAAY,CAAC,iBAAiB,CAAC,CAAC;aAChE,CAAC;YACF,MAAM,WAAW,GAAG,IAAI,iCAA2B,CAAC,SAAS,CAAC,CAAC;YAC/D,+EAA+E;YAC/E,MAAM,CAAC,WAAW,CAAC,UAAU,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAChD,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACpD,MAAM,CAAC,WAAW,CAAC,mBAAmB,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACzD,MAAM,CAAC,WAAW,CAAC,wBAAwB,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAC9D,MAAM,CAAC,WAAW,CAAC,wBAAwB,EAAE,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,aAAa,CAAC;gBACtE,eAAe;gBACf,cAAc;gBACd,qBAAqB;gBACrB,iBAAiB;gBACjB,wBAAwB;aACzB,CAAC,CAAC;YACH,MAAM,CAAC,WAAW,CAAC,wBAAwB,EAAE,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;YACvE,MAAM,CAAC,WAAW,CAAC,wBAAwB,EAAE,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,aAAa,CAAC;gBACxE,mDAAmD;aACpD,CAAC,CAAC;YACH,MAAM,CAAC,WAAW,CAAC,wBAAwB,EAAE,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAC5E,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,WAAW,CAAC,wBAAwB,EAAE,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,aAAa,CAC3F,IAAI,CAAC,SAAS,CAAC,EAAE,GAAG,EAAE,CAAC,iBAAiB,CAAC,EAAE,CAAC,CAC7C,CAAC;QACJ,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IACH,QAAQ,CAAC,gBAAgB,EAAE,GAAG,EAAE;QAC9B,MAAM,aAAa,GAA2B;YAC5C,QAAQ,EAAE,UAAU;YACpB,cAAc,EAAE,CAAC,gBAAgB,EAAE,gBAAgB,CAAC;YACpD,iBAAiB,EAAE,CAAC,UAAU,CAAC;YAC/B,cAAc,EAAE,CAAC,gBAAgB,CAAC;YAClC,cAAc,EAAE,CAAC,gBAAgB,CAAC;SACnC,CAAC;QACF,IAAI,CAAC,YAAY,EAAE,GAAG,EAAE;YACtB,MAAM,SAAS,GAA2B;gBACxC,GAAG,aAAa;aACjB,CAAC;YACF,MAAM,WAAW,GAAG,IAAI,2BAAqB,CAAC,SAAS,CAAC,CAAC;YACzD,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,SAAS,CAAC,WAAW,CAAC,cAAc,EAAE,SAAS,EAAE,CAAC,CAAC,CAAC,CAAC;YACtE,MAAM,CAAC,WAAW,CAAC,cAAc,CAAC,OAAO,CAAC,CAAC,aAAa,CAAC,CAAC,UAAU,EAAE,eAAe,CAAC,CAAC,CAAC;YACxF,MAAM,CAAC,WAAW,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;YACxD,MAAM,CAAC,WAAW,CAAC,cAAc,CAAC,UAAU,CAAC,CAAC,aAAa,CAAC;gBAC1D,UAAU,EAAE;oBACV,YAAY,EAAE,CAAC,kBAAkB,EAAE,kBAAkB,CAAC;iBACvD;aACF,CAAC,CAAC;YACH,MAAM,CAAC,WAAW,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC,aAAa,CAAC;gBACzD,uCAAuC;gBACvC,qCAAqC;aACtC,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QACH,IAAI,CAAC,WAAW,EAAE,GAAG,EAAE;YACrB,MAAM,SAAS,GAA2B;gBACxC,GAAG,aAAa;aACjB,CAAC;YACF,MAAM,WAAW,GAAG,IAAI,2BAAqB,CAAC,SAAS,CAAC,CAAC;YACzD,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,SAAS,CAAC,WAAW,CAAC,aAAa,EAAE,SAAS,EAAE,CAAC,CAAC,CAAC,CAAC;YACrE,MAAM,CAAC,WAAW,CAAC,aAAa,CAAC,OAAO,CAAC,CAAC,aAAa,CAAC,CAAC,eAAe,EAAE,eAAe,EAAE,kBAAkB,CAAC,CAAC,CAAC;YAChH,MAAM,CAAC,WAAW,CAAC,aAAa,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YACtD,MAAM,CAAC,WAAW,CAAC,aAAa,CAAC,UAAU,CAAC,CAAC,aAAa,CAAC;gBACzD,2BAA2B,EAAE;oBAC3B,YAAY,EAAE,CAAC,kBAAkB,EAAE,kBAAkB,CAAC;oBACtD,kBAAkB,EAAE,CAAC,UAAU,CAAC;iBACjC;aACF,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC","sourcesContent":["/*!\n * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n * SPDX-License-Identifier: Apache-2.0\n */\n\nimport { MdaaTestApp } from '@aws-mdaa/testing';\nimport {\n  IRestrictBucketToRoles,\n  IRestrictObjectPrefixToRoles,\n  RestrictBucketToRoles,\n  RestrictObjectPrefixToRoles,\n} from '../lib';\nimport { Bucket } from 'aws-cdk-lib/aws-s3';\nimport { ArnPrincipal } from 'aws-cdk-lib/aws-iam';\n\ndescribe('Test BucketPolicy Helper', () => {\n  const testApp = new MdaaTestApp();\n  const testBucket = Bucket.fromBucketName(testApp.testStack, 'test-bucket', 'test-bucket');\n  describe('RestrictPrefix', () => {\n    const baseTestProps: IRestrictObjectPrefixToRoles = {\n      s3Bucket: testBucket,\n      s3Prefix: 'test-prefix',\n    };\n    test('Read Role Ids', () => {\n      const testProps: IRestrictObjectPrefixToRoles = {\n        ...baseTestProps,\n        readRoleIds: ['test-role-id-1', 'test-role-id-2'],\n      };\n      const restriction = new RestrictObjectPrefixToRoles(testProps);\n      // console.log( JSON.stringify( restriction.statements()[ 0 ], undefined, 2 ) )\n      expect(restriction.statements().length).toBe(1);\n      expect(restriction.readStatements().length).toBe(1);\n      expect(restriction.readWriteSuperStatements().length).toBe(0);\n      expect(restriction.readWriteStatements().length).toBe(0);\n      expect(restriction.readStatements()[0].actions).toStrictEqual(['s3:GetObject*']);\n      expect(restriction.readStatements()[0].conditions).toStrictEqual({\n        StringLike: {\n          'aws:userId': ['test-role-id-1:*', 'test-role-id-2:*'],\n        },\n      });\n      expect(restriction.readStatements()[0].effect).toBe('Allow');\n      expect(restriction.readStatements()[0].resources).toStrictEqual([\n        'arn:test-partition:s3:::test-bucket/test-prefix/*',\n      ]);\n    });\n\n    test('ReadWrite Role Ids', () => {\n      const testProps: IRestrictObjectPrefixToRoles = {\n        ...baseTestProps,\n        readWriteRoleIds: ['test-role-id-1', 'test-role-id-2'],\n      };\n      const restriction = new RestrictObjectPrefixToRoles(testProps);\n      // console.log( JSON.stringify( restriction.statements()[ 0 ], undefined, 2 ) )\n      expect(restriction.statements().length).toBe(1);\n      expect(restriction.readWriteStatements().length).toBe(1);\n      expect(restriction.readStatements().length).toBe(0);\n      expect(restriction.readWriteSuperStatements().length).toBe(0);\n      expect(restriction.readWriteStatements()[0].actions).toStrictEqual([\n        's3:GetObject*',\n        's3:PutObject',\n        's3:PutObjectTagging',\n        's3:DeleteObject',\n      ]);\n      expect(restriction.readWriteStatements()[0].conditions).toStrictEqual({\n        StringLike: {\n          'aws:userId': ['test-role-id-1:*', 'test-role-id-2:*'],\n        },\n      });\n    });\n\n    test('ReadWriteSuper Role Ids', () => {\n      const testProps: IRestrictObjectPrefixToRoles = {\n        ...baseTestProps,\n        readWriteSuperRoleIds: ['test-role-id-1', 'test-role-id-2'],\n      };\n      const restriction = new RestrictObjectPrefixToRoles(testProps);\n      // console.log( JSON.stringify( restriction.statements()[ 0 ], undefined, 2 ) )\n      expect(restriction.statements().length).toBe(1);\n      expect(restriction.readWriteSuperStatements().length).toBe(1);\n      expect(restriction.readStatements().length).toBe(0);\n      expect(restriction.readWriteStatements().length).toBe(0);\n      expect(restriction.readWriteSuperStatements()[0].actions).toStrictEqual([\n        's3:GetObject*',\n        's3:PutObject',\n        's3:PutObjectTagging',\n        's3:DeleteObject',\n        's3:DeleteObjectVersion',\n      ]);\n      expect(restriction.readWriteSuperStatements()[0].conditions).toStrictEqual({\n        StringLike: {\n          'aws:userId': ['test-role-id-1:*', 'test-role-id-2:*'],\n        },\n      });\n    });\n\n    test('Read Principals', () => {\n      const testProps: IRestrictObjectPrefixToRoles = {\n        ...baseTestProps,\n        readPrincipals: [new ArnPrincipal('test-role-arn-1')],\n      };\n      const restriction = new RestrictObjectPrefixToRoles(testProps);\n      // console.log( JSON.stringify( restriction.statements()[ 0 ], undefined, 2 ) )\n      expect(restriction.statements().length).toBe(1);\n      expect(restriction.readStatements().length).toBe(1);\n      expect(restriction.readWriteSuperStatements().length).toBe(0);\n      expect(restriction.readWriteStatements().length).toBe(0);\n      expect(restriction.readStatements()[0].actions).toStrictEqual(['s3:GetObject*']);\n      expect(restriction.readStatements()[0].effect).toBe('Allow');\n      expect(restriction.readStatements()[0].resources).toStrictEqual([\n        'arn:test-partition:s3:::test-bucket/test-prefix/*',\n      ]);\n      expect(restriction.readStatements()[0].principals.length).toBe(1);\n      expect(JSON.stringify(restriction.readStatements()[0].principals[0])).toStrictEqual(\n        JSON.stringify({ AWS: ['test-role-arn-1'] }),\n      );\n    });\n\n    test('ReadWrite Principals', () => {\n      const testProps: IRestrictObjectPrefixToRoles = {\n        ...baseTestProps,\n        readWritePrincipals: [new ArnPrincipal('test-role-arn-1')],\n      };\n      const restriction = new RestrictObjectPrefixToRoles(testProps);\n      // console.log( JSON.stringify( restriction.statements()[ 0 ], undefined, 2 ) )\n      expect(restriction.statements().length).toBe(1);\n      expect(restriction.readWriteStatements().length).toBe(1);\n      expect(restriction.readStatements().length).toBe(0);\n      expect(restriction.readWriteSuperStatements().length).toBe(0);\n      expect(restriction.readWriteStatements()[0].actions).toStrictEqual([\n        's3:GetObject*',\n        's3:PutObject',\n        's3:PutObjectTagging',\n        's3:DeleteObject',\n      ]);\n      expect(restriction.readWriteStatements()[0].effect).toBe('Allow');\n      expect(restriction.readWriteStatements()[0].resources).toStrictEqual([\n        'arn:test-partition:s3:::test-bucket/test-prefix/*',\n      ]);\n      expect(restriction.readWriteStatements()[0].principals.length).toBe(1);\n      expect(JSON.stringify(restriction.readWriteStatements()[0].principals[0])).toStrictEqual(\n        JSON.stringify({ AWS: ['test-role-arn-1'] }),\n      );\n    });\n\n    test('ReadWriteSuper Principals', () => {\n      const testProps: IRestrictObjectPrefixToRoles = {\n        ...baseTestProps,\n        readWriteSuperPrincipals: [new ArnPrincipal('test-role-arn-1')],\n      };\n      const restriction = new RestrictObjectPrefixToRoles(testProps);\n      // console.log( JSON.stringify( restriction.statements()[ 0 ], undefined, 2 ) )\n      expect(restriction.statements().length).toBe(1);\n      expect(restriction.readStatements().length).toBe(0);\n      expect(restriction.readWriteStatements().length).toBe(0);\n      expect(restriction.readWriteSuperStatements().length).toBe(1);\n      expect(restriction.readWriteSuperStatements()[0].actions).toStrictEqual([\n        's3:GetObject*',\n        's3:PutObject',\n        's3:PutObjectTagging',\n        's3:DeleteObject',\n        's3:DeleteObjectVersion',\n      ]);\n      expect(restriction.readWriteSuperStatements()[0].effect).toBe('Allow');\n      expect(restriction.readWriteSuperStatements()[0].resources).toStrictEqual([\n        'arn:test-partition:s3:::test-bucket/test-prefix/*',\n      ]);\n      expect(restriction.readWriteSuperStatements()[0].principals.length).toBe(1);\n      expect(JSON.stringify(restriction.readWriteSuperStatements()[0].principals[0])).toStrictEqual(\n        JSON.stringify({ AWS: ['test-role-arn-1'] }),\n      );\n    });\n  });\n  describe('RestrictBucket', () => {\n    const baseTestProps: IRestrictBucketToRoles = {\n      s3Bucket: testBucket,\n      roleExcludeIds: ['test-role-id-1', 'test-role-id-2'],\n      principalExcludes: ['test-arn'],\n      prefixExcludes: ['exclude-prefix'],\n      prefixIncludes: ['exclude-prefix'],\n    };\n    test('Base Allow', () => {\n      const testProps: IRestrictBucketToRoles = {\n        ...baseTestProps,\n      };\n      const restriction = new RestrictBucketToRoles(testProps);\n      console.log(JSON.stringify(restriction.allowStatement, undefined, 2));\n      expect(restriction.allowStatement.actions).toStrictEqual(['s3:List*', 's3:GetBucket*']);\n      expect(restriction.allowStatement.effect).toBe('Allow');\n      expect(restriction.allowStatement.conditions).toStrictEqual({\n        StringLike: {\n          'aws:userId': ['test-role-id-1:*', 'test-role-id-2:*'],\n        },\n      });\n      expect(restriction.allowStatement.resources).toStrictEqual([\n        'arn:test-partition:s3:::test-bucket/*',\n        'arn:test-partition:s3:::test-bucket',\n      ]);\n    });\n    test('Base Deny', () => {\n      const testProps: IRestrictBucketToRoles = {\n        ...baseTestProps,\n      };\n      const restriction = new RestrictBucketToRoles(testProps);\n      console.log(JSON.stringify(restriction.denyStatement, undefined, 2));\n      expect(restriction.denyStatement.actions).toStrictEqual(['s3:PutObject*', 's3:GetObject*', 's3:DeleteObject*']);\n      expect(restriction.denyStatement.effect).toBe('Deny');\n      expect(restriction.denyStatement.conditions).toStrictEqual({\n        'ForAnyValue:StringNotLike': {\n          'aws:userId': ['test-role-id-1:*', 'test-role-id-2:*'],\n          'aws:PrincipalArn': ['test-arn'],\n        },\n      });\n    });\n  });\n});\n"]}