@aws-mdaa/dataops-job-l3-construct 1.3.0 → 1.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +114 -389
- package/lib/dataops-job-l3-construct.d.ts +30 -240
- package/lib/dataops-job-l3-construct.js +25 -25
- package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/.npmignore +34 -0
- package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/jest.config.js +5 -0
- package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/lib/index.js +1 -1
- package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/lib/index.ts +241 -0
- package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/package.json +16 -18
- package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/test/bucketpolicy-helper.test.d.ts +5 -0
- package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/test/bucketpolicy-helper.test.js +200 -0
- package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/test/bucketpolicy-helper.test.ts +215 -0
- package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/tsconfig.json +40 -0
- package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/tsconfig.tsbuildinfo +1 -0
- package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/typedoc.json +7 -0
- package/node_modules/@aws-mdaa/s3-inventory-helper/.npmignore +34 -0
- package/node_modules/@aws-mdaa/s3-inventory-helper/jest.config.js +5 -0
- package/node_modules/@aws-mdaa/s3-inventory-helper/lib/index.d.ts +2 -20
- package/node_modules/@aws-mdaa/s3-inventory-helper/lib/index.js +2 -11
- package/node_modules/@aws-mdaa/s3-inventory-helper/lib/index.ts +241 -0
- package/node_modules/@aws-mdaa/s3-inventory-helper/package.json +15 -17
- package/node_modules/@aws-mdaa/s3-inventory-helper/test/TODO +0 -0
- package/node_modules/@aws-mdaa/s3-inventory-helper/tsconfig.json +40 -0
- package/node_modules/@aws-mdaa/s3-inventory-helper/tsconfig.tsbuildinfo +1 -0
- package/node_modules/@aws-mdaa/s3-inventory-helper/typedoc.json +7 -0
- package/node_modules/lodash/README.md +2 -2
- package/node_modules/lodash/_baseUnset.js +47 -2
- package/node_modules/lodash/core.js +1 -1
- package/node_modules/lodash/core.min.js +1 -1
- package/node_modules/lodash/lodash.js +43 -4
- package/node_modules/lodash/lodash.min.js +57 -57
- package/node_modules/lodash/package.json +1 -1
- package/package.json +33 -47
- package/node_modules/lodash/flake.lock +0 -40
- package/node_modules/lodash/flake.nix +0 -20
- package/node_modules/lodash/release.md +0 -48
|
@@ -0,0 +1,241 @@
|
|
|
1
|
+
/*!
|
|
2
|
+
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
|
3
|
+
* SPDX-License-Identifier: Apache-2.0
|
|
4
|
+
*/
|
|
5
|
+
|
|
6
|
+
import { IPrincipal, PolicyStatement, Effect } from 'aws-cdk-lib/aws-iam';
|
|
7
|
+
import { IBucket } from 'aws-cdk-lib/aws-s3';
|
|
8
|
+
|
|
9
|
+
export interface IRestrictObjectPrefixToRoles {
|
|
10
|
+
readonly s3Bucket: IBucket;
|
|
11
|
+
readonly s3Prefix: string;
|
|
12
|
+
readonly readRoleIds?: string[];
|
|
13
|
+
readonly readWriteRoleIds?: string[];
|
|
14
|
+
readonly readWriteSuperRoleIds?: string[];
|
|
15
|
+
readonly readPrincipals?: IPrincipal[];
|
|
16
|
+
readonly readWritePrincipals?: IPrincipal[];
|
|
17
|
+
readonly readWriteSuperPrincipals?: IPrincipal[];
|
|
18
|
+
}
|
|
19
|
+
|
|
20
|
+
export interface IRestrictBucketToRoles {
|
|
21
|
+
readonly s3Bucket: IBucket;
|
|
22
|
+
readonly roleExcludeIds: string[];
|
|
23
|
+
readonly principalExcludes?: string[];
|
|
24
|
+
readonly prefixExcludes?: string[];
|
|
25
|
+
readonly prefixIncludes?: string[];
|
|
26
|
+
}
|
|
27
|
+
|
|
28
|
+
/** Helper class for generating S3 bucket policy statements which grant access to specific object prefixes */
|
|
29
|
+
export class RestrictObjectPrefixToRoles {
|
|
30
|
+
static readonly READ_ACTIONS = ['s3:GetObject*'];
|
|
31
|
+
static readonly READ_WRITE_ACTIONS = [
|
|
32
|
+
...RestrictObjectPrefixToRoles.READ_ACTIONS,
|
|
33
|
+
's3:PutObject',
|
|
34
|
+
's3:PutObjectTagging',
|
|
35
|
+
's3:DeleteObject',
|
|
36
|
+
];
|
|
37
|
+
static readonly READ_WRITE_SUPER_ACTIONS = [
|
|
38
|
+
...RestrictObjectPrefixToRoles.READ_WRITE_ACTIONS,
|
|
39
|
+
's3:DeleteObjectVersion',
|
|
40
|
+
];
|
|
41
|
+
static readonly BUCKET_ALLOW_ACTIONS = ['s3:List*', 's3:GetBucket*'];
|
|
42
|
+
static readonly BUCKET_DENY_ACTIONS = ['s3:PutObject*', 's3:GetObject*', 's3:DeleteObject*'];
|
|
43
|
+
|
|
44
|
+
private _readStatements: PolicyStatement[] = [];
|
|
45
|
+
private _readWriteStatements: PolicyStatement[] = [];
|
|
46
|
+
private _readWriteSuperStatements: PolicyStatement[] = [];
|
|
47
|
+
private _formattedPrefix: string;
|
|
48
|
+
|
|
49
|
+
constructor(props: IRestrictObjectPrefixToRoles) {
|
|
50
|
+
this._formattedPrefix = '/' + this.formatS3Prefix(props.s3Prefix) + '/*';
|
|
51
|
+
// Covers our case where two / get resolved because our prefix is actually /
|
|
52
|
+
this._formattedPrefix = this._formattedPrefix.replace(/\/\//, '/');
|
|
53
|
+
|
|
54
|
+
// FEDERATED / READ
|
|
55
|
+
if (props.readRoleIds != undefined && props.readRoleIds.length > 0) {
|
|
56
|
+
// Construct our User:Id roles for read
|
|
57
|
+
const statement = this._readStatementScaffold(props);
|
|
58
|
+
statement.addCondition('StringLike', { 'aws:userId': props.readRoleIds.map(x => `${x}:*`) });
|
|
59
|
+
statement.addAnyPrincipal();
|
|
60
|
+
this._readStatements.push(statement);
|
|
61
|
+
}
|
|
62
|
+
// FEDERATED / READWRITE
|
|
63
|
+
if (props.readWriteRoleIds != undefined && props.readWriteRoleIds.length > 0) {
|
|
64
|
+
const statement = this._readWriteStatementScaffold(props);
|
|
65
|
+
statement.addCondition('StringLike', { 'aws:userId': props.readWriteRoleIds.map(x => `${x}:*`) });
|
|
66
|
+
statement.addAnyPrincipal();
|
|
67
|
+
this._readWriteStatements.push(statement);
|
|
68
|
+
}
|
|
69
|
+
|
|
70
|
+
// FEDERATED / READWRITESUPER
|
|
71
|
+
if (props.readWriteSuperRoleIds != undefined && props.readWriteSuperRoleIds.length > 0) {
|
|
72
|
+
const statement = this._readWriteSuperStatementScaffold(props);
|
|
73
|
+
statement.addCondition('StringLike', { 'aws:userId': props.readWriteSuperRoleIds.map(x => `${x}:*`) });
|
|
74
|
+
statement.addAnyPrincipal();
|
|
75
|
+
this._readWriteSuperStatements.push(statement);
|
|
76
|
+
}
|
|
77
|
+
|
|
78
|
+
// NONFEDERATED / READ
|
|
79
|
+
if (props.readPrincipals != undefined && props.readPrincipals.length > 0) {
|
|
80
|
+
const statement = this._readStatementScaffold(props);
|
|
81
|
+
props.readPrincipals.forEach(principal => {
|
|
82
|
+
statement.addPrincipals(principal);
|
|
83
|
+
});
|
|
84
|
+
this._readStatements.push(statement);
|
|
85
|
+
}
|
|
86
|
+
// NONFEDERATED / READWRITE
|
|
87
|
+
if (props.readWritePrincipals != undefined && props.readWritePrincipals.length > 0) {
|
|
88
|
+
const statement = this._readWriteStatementScaffold(props);
|
|
89
|
+
props.readWritePrincipals.forEach(principal => {
|
|
90
|
+
statement.addPrincipals(principal);
|
|
91
|
+
});
|
|
92
|
+
this._readWriteStatements.push(statement);
|
|
93
|
+
}
|
|
94
|
+
// NONFEDERATED / READWRITESUPER
|
|
95
|
+
if (props.readWriteSuperPrincipals != undefined && props.readWriteSuperPrincipals.length > 0) {
|
|
96
|
+
const statement = this._readWriteSuperStatementScaffold(props);
|
|
97
|
+
props.readWriteSuperPrincipals.forEach(principal => {
|
|
98
|
+
statement.addPrincipals(principal);
|
|
99
|
+
});
|
|
100
|
+
this._readWriteSuperStatements.push(statement);
|
|
101
|
+
}
|
|
102
|
+
}
|
|
103
|
+
|
|
104
|
+
private _readStatementScaffold(props: IRestrictObjectPrefixToRoles): PolicyStatement {
|
|
105
|
+
return new PolicyStatement({
|
|
106
|
+
sid: `${props.s3Prefix.replace(/\\W/g, '')}_Read`,
|
|
107
|
+
effect: Effect.ALLOW,
|
|
108
|
+
resources: [props.s3Bucket.bucketArn + this._formattedPrefix],
|
|
109
|
+
actions: RestrictObjectPrefixToRoles.READ_ACTIONS,
|
|
110
|
+
});
|
|
111
|
+
}
|
|
112
|
+
|
|
113
|
+
private _readWriteStatementScaffold(props: IRestrictObjectPrefixToRoles): PolicyStatement {
|
|
114
|
+
return new PolicyStatement({
|
|
115
|
+
sid: `${props.s3Prefix.replace(/\\W/g, '')}_ReadWrite`,
|
|
116
|
+
effect: Effect.ALLOW,
|
|
117
|
+
resources: [props.s3Bucket.bucketArn + this._formattedPrefix],
|
|
118
|
+
actions: RestrictObjectPrefixToRoles.READ_WRITE_ACTIONS,
|
|
119
|
+
});
|
|
120
|
+
}
|
|
121
|
+
|
|
122
|
+
private _readWriteSuperStatementScaffold(props: IRestrictObjectPrefixToRoles): PolicyStatement {
|
|
123
|
+
return new PolicyStatement({
|
|
124
|
+
sid: `${props.s3Prefix.replace(/\\W/g, '')}_ReadWriteSuper`,
|
|
125
|
+
effect: Effect.ALLOW,
|
|
126
|
+
resources: [props.s3Bucket.bucketArn + this._formattedPrefix],
|
|
127
|
+
actions: RestrictObjectPrefixToRoles.READ_WRITE_SUPER_ACTIONS,
|
|
128
|
+
});
|
|
129
|
+
}
|
|
130
|
+
|
|
131
|
+
public readStatements(): PolicyStatement[] {
|
|
132
|
+
return this._readStatements;
|
|
133
|
+
}
|
|
134
|
+
|
|
135
|
+
public readWriteStatements(): PolicyStatement[] {
|
|
136
|
+
return this._readWriteStatements;
|
|
137
|
+
}
|
|
138
|
+
|
|
139
|
+
public readWriteSuperStatements(): PolicyStatement[] {
|
|
140
|
+
return this._readWriteSuperStatements;
|
|
141
|
+
}
|
|
142
|
+
|
|
143
|
+
public statements(): PolicyStatement[] {
|
|
144
|
+
return [...this._readStatements, ...this._readWriteStatements, ...this._readWriteSuperStatements];
|
|
145
|
+
}
|
|
146
|
+
|
|
147
|
+
public formatS3Prefix(prefix: string): string {
|
|
148
|
+
let rawPrefix = prefix;
|
|
149
|
+
|
|
150
|
+
// Removes trailing slashes
|
|
151
|
+
rawPrefix = rawPrefix.endsWith('/') ? rawPrefix.slice(0, -1) : rawPrefix;
|
|
152
|
+
// Removes leading slashes
|
|
153
|
+
rawPrefix = rawPrefix.startsWith('/') ? rawPrefix.substring(1) : rawPrefix;
|
|
154
|
+
return rawPrefix;
|
|
155
|
+
}
|
|
156
|
+
}
|
|
157
|
+
|
|
158
|
+
/** Helper class for generating bucket policy statements
|
|
159
|
+
* which allow or deny access to an entire bucket. Used to
|
|
160
|
+
* create bucket-level default deny statements to block accesses
|
|
161
|
+
* not granted in the bucket policy. */
|
|
162
|
+
export class RestrictBucketToRoles {
|
|
163
|
+
public readonly denyStatement: PolicyStatement;
|
|
164
|
+
public readonly allowStatement: PolicyStatement;
|
|
165
|
+
private resource: string[] = [];
|
|
166
|
+
private notResource: string[] = [];
|
|
167
|
+
private denyConditionalNotEquals: {
|
|
168
|
+
'aws:userId'?: string[];
|
|
169
|
+
'aws:PrincipalArn'?: string[];
|
|
170
|
+
} = {};
|
|
171
|
+
|
|
172
|
+
constructor(props: IRestrictBucketToRoles) {
|
|
173
|
+
// Statement allowing access to the bucket for the AROAs
|
|
174
|
+
this.allowStatement = new PolicyStatement({
|
|
175
|
+
sid: `BucketAllow`,
|
|
176
|
+
effect: Effect.ALLOW,
|
|
177
|
+
resources: [props.s3Bucket.bucketArn + '/*', props.s3Bucket.bucketArn],
|
|
178
|
+
actions: RestrictObjectPrefixToRoles.BUCKET_ALLOW_ACTIONS,
|
|
179
|
+
});
|
|
180
|
+
this.allowStatement.addAnyPrincipal();
|
|
181
|
+
this.allowStatement.addCondition('StringLike', { 'aws:userId': props.roleExcludeIds.map(x => `${x}:*`) });
|
|
182
|
+
|
|
183
|
+
// Constuct our deny statement.
|
|
184
|
+
// prefixIncludes denotes we want to include a prefix in our deny meaning Resource
|
|
185
|
+
if (props.prefixIncludes) {
|
|
186
|
+
this.resource = props.prefixIncludes.map(prefix => {
|
|
187
|
+
return `${props.s3Bucket.bucketArn}/${this.formatS3Prefix(prefix)}`;
|
|
188
|
+
});
|
|
189
|
+
} else {
|
|
190
|
+
this.resource = [props.s3Bucket.bucketArn + '/*'];
|
|
191
|
+
}
|
|
192
|
+
// prefixExcludes denote we want to exclude a prefix in our deny meaning notResource
|
|
193
|
+
if (props.prefixExcludes) {
|
|
194
|
+
this.notResource = props.prefixExcludes.map(prefix => {
|
|
195
|
+
return `${props.s3Bucket.bucketArn}/${this.formatS3Prefix(prefix)}`;
|
|
196
|
+
});
|
|
197
|
+
}
|
|
198
|
+
|
|
199
|
+
if (this.notResource.length > 0) {
|
|
200
|
+
this.denyStatement = new PolicyStatement({
|
|
201
|
+
sid: `BucketDeny`,
|
|
202
|
+
effect: Effect.DENY,
|
|
203
|
+
notResources: this.notResource,
|
|
204
|
+
actions: RestrictObjectPrefixToRoles.BUCKET_DENY_ACTIONS,
|
|
205
|
+
});
|
|
206
|
+
} else {
|
|
207
|
+
this.denyStatement = new PolicyStatement({
|
|
208
|
+
sid: `BucketDeny`,
|
|
209
|
+
effect: Effect.DENY,
|
|
210
|
+
resources: this.resource,
|
|
211
|
+
actions: RestrictObjectPrefixToRoles.BUCKET_DENY_ACTIONS,
|
|
212
|
+
});
|
|
213
|
+
}
|
|
214
|
+
this.denyStatement.addAnyPrincipal();
|
|
215
|
+
|
|
216
|
+
// Build our conditionals.
|
|
217
|
+
this.denyConditionalNotEquals['aws:userId'] = props.roleExcludeIds.map(x => `${x}:*`);
|
|
218
|
+
if (props.principalExcludes && props.principalExcludes.length > 0) {
|
|
219
|
+
this.denyConditionalNotEquals['aws:PrincipalArn'] = [...new Set(props.principalExcludes)].sort((a, b) =>
|
|
220
|
+
a.localeCompare(b),
|
|
221
|
+
);
|
|
222
|
+
}
|
|
223
|
+
|
|
224
|
+
// Construct our conditional for our deny
|
|
225
|
+
if (Object.keys(this.denyConditionalNotEquals).length == 1) {
|
|
226
|
+
this.denyStatement.addCondition('StringNotLike', this.denyConditionalNotEquals);
|
|
227
|
+
} else {
|
|
228
|
+
this.denyStatement.addCondition('ForAnyValue:StringNotLike', this.denyConditionalNotEquals);
|
|
229
|
+
}
|
|
230
|
+
}
|
|
231
|
+
|
|
232
|
+
private formatS3Prefix(prefix: string): string {
|
|
233
|
+
let rawPrefix = prefix;
|
|
234
|
+
|
|
235
|
+
// Removes trailing slashes
|
|
236
|
+
rawPrefix = rawPrefix.endsWith('/') ? rawPrefix.slice(0, -1) : rawPrefix;
|
|
237
|
+
// Removes leading slashes
|
|
238
|
+
rawPrefix = rawPrefix.startsWith('/') ? rawPrefix.substring(1) : rawPrefix;
|
|
239
|
+
return `${rawPrefix}/*`;
|
|
240
|
+
}
|
|
241
|
+
}
|
|
@@ -5,35 +5,33 @@
|
|
|
5
5
|
"name": "Amazon Web Services",
|
|
6
6
|
"url": "https://aws.amazon.com/solutions"
|
|
7
7
|
},
|
|
8
|
-
"version": "1.
|
|
8
|
+
"version": "1.5.0",
|
|
9
9
|
"license": "Apache-2.0",
|
|
10
10
|
"main": "lib/index.js",
|
|
11
11
|
"types": "lib/index.d.ts",
|
|
12
12
|
"scripts": {
|
|
13
13
|
"build": "tsc",
|
|
14
14
|
"watch": "tsc -w",
|
|
15
|
-
"test": "jest --passWithNoTests --
|
|
16
|
-
"lint": "eslint --max-warnings 0 -c
|
|
17
|
-
"test
|
|
15
|
+
"test": "jest --passWithNoTests --testPathIgnorePatterns='.*\\.snapshot\\.test\\.ts'",
|
|
16
|
+
"lint": "eslint --max-warnings 0 -c ../../../eslint.config.mjs",
|
|
17
|
+
"test:coverage": "jest --passWithNoTests --coverage --testPathIgnorePatterns='.*\\.snapshot\\.test\\.ts'",
|
|
18
|
+
"test:snapshots": "jest --passWithNoTests --testPathPattern='.*\\.snapshot\\.test\\.ts'",
|
|
19
|
+
"test:snapshots:update": "jest --passWithNoTests --testPathPattern='.*\\.snapshot\\.test\\.ts' --updateSnapshot"
|
|
18
20
|
},
|
|
19
21
|
"devDependencies": {
|
|
20
|
-
"@aws-mdaa/testing": "1.
|
|
21
|
-
"@types/jest": "29.5.
|
|
22
|
-
"@types/node": "
|
|
22
|
+
"@aws-mdaa/testing": "1.5.0",
|
|
23
|
+
"@types/jest": "29.5.14",
|
|
24
|
+
"@types/node": "22.9.0",
|
|
23
25
|
"@types/prettier": "2.6.0",
|
|
24
|
-
"jest": "29.
|
|
25
|
-
"ts-jest": "29.
|
|
26
|
-
"ts-node": "10.9.
|
|
27
|
-
"typescript": "
|
|
28
|
-
"typescript-json-schema": "0.
|
|
29
|
-
},
|
|
30
|
-
"overrides": {
|
|
31
|
-
"aws-cdk-lib": "2.220.0",
|
|
32
|
-
"@types/babel__traverse": "7.18.2"
|
|
26
|
+
"jest": "29.7.0",
|
|
27
|
+
"ts-jest": "29.4.6",
|
|
28
|
+
"ts-node": "10.9.2",
|
|
29
|
+
"typescript": "5.9.3",
|
|
30
|
+
"typescript-json-schema": "0.67.1"
|
|
33
31
|
},
|
|
34
32
|
"dependencies": {
|
|
35
|
-
"@aws-mdaa/iam-role-helper": "1.
|
|
36
|
-
"@aws-mdaa/naming": "1.
|
|
33
|
+
"@aws-mdaa/iam-role-helper": "1.5.0",
|
|
34
|
+
"@aws-mdaa/naming": "1.5.0",
|
|
37
35
|
"aws-cdk-lib": "2.220.0",
|
|
38
36
|
"cdk-nag": "2.37.55",
|
|
39
37
|
"constructs": "10.0.96"
|
|
@@ -0,0 +1,200 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/*!
|
|
3
|
+
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
|
4
|
+
* SPDX-License-Identifier: Apache-2.0
|
|
5
|
+
*/
|
|
6
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
7
|
+
const testing_1 = require("@aws-mdaa/testing");
|
|
8
|
+
const lib_1 = require("../lib");
|
|
9
|
+
const aws_s3_1 = require("aws-cdk-lib/aws-s3");
|
|
10
|
+
const aws_iam_1 = require("aws-cdk-lib/aws-iam");
|
|
11
|
+
describe('Test BucketPolicy Helper', () => {
|
|
12
|
+
const testApp = new testing_1.MdaaTestApp();
|
|
13
|
+
const testBucket = aws_s3_1.Bucket.fromBucketName(testApp.testStack, 'test-bucket', 'test-bucket');
|
|
14
|
+
describe('RestrictPrefix', () => {
|
|
15
|
+
const baseTestProps = {
|
|
16
|
+
s3Bucket: testBucket,
|
|
17
|
+
s3Prefix: 'test-prefix',
|
|
18
|
+
};
|
|
19
|
+
test('Read Role Ids', () => {
|
|
20
|
+
const testProps = {
|
|
21
|
+
...baseTestProps,
|
|
22
|
+
readRoleIds: ['test-role-id-1', 'test-role-id-2'],
|
|
23
|
+
};
|
|
24
|
+
const restriction = new lib_1.RestrictObjectPrefixToRoles(testProps);
|
|
25
|
+
// console.log( JSON.stringify( restriction.statements()[ 0 ], undefined, 2 ) )
|
|
26
|
+
expect(restriction.statements().length).toBe(1);
|
|
27
|
+
expect(restriction.readStatements().length).toBe(1);
|
|
28
|
+
expect(restriction.readWriteSuperStatements().length).toBe(0);
|
|
29
|
+
expect(restriction.readWriteStatements().length).toBe(0);
|
|
30
|
+
expect(restriction.readStatements()[0].actions).toStrictEqual(['s3:GetObject*']);
|
|
31
|
+
expect(restriction.readStatements()[0].conditions).toStrictEqual({
|
|
32
|
+
StringLike: {
|
|
33
|
+
'aws:userId': ['test-role-id-1:*', 'test-role-id-2:*'],
|
|
34
|
+
},
|
|
35
|
+
});
|
|
36
|
+
expect(restriction.readStatements()[0].effect).toBe('Allow');
|
|
37
|
+
expect(restriction.readStatements()[0].resources).toStrictEqual([
|
|
38
|
+
'arn:test-partition:s3:::test-bucket/test-prefix/*',
|
|
39
|
+
]);
|
|
40
|
+
});
|
|
41
|
+
test('ReadWrite Role Ids', () => {
|
|
42
|
+
const testProps = {
|
|
43
|
+
...baseTestProps,
|
|
44
|
+
readWriteRoleIds: ['test-role-id-1', 'test-role-id-2'],
|
|
45
|
+
};
|
|
46
|
+
const restriction = new lib_1.RestrictObjectPrefixToRoles(testProps);
|
|
47
|
+
// console.log( JSON.stringify( restriction.statements()[ 0 ], undefined, 2 ) )
|
|
48
|
+
expect(restriction.statements().length).toBe(1);
|
|
49
|
+
expect(restriction.readWriteStatements().length).toBe(1);
|
|
50
|
+
expect(restriction.readStatements().length).toBe(0);
|
|
51
|
+
expect(restriction.readWriteSuperStatements().length).toBe(0);
|
|
52
|
+
expect(restriction.readWriteStatements()[0].actions).toStrictEqual([
|
|
53
|
+
's3:GetObject*',
|
|
54
|
+
's3:PutObject',
|
|
55
|
+
's3:PutObjectTagging',
|
|
56
|
+
's3:DeleteObject',
|
|
57
|
+
]);
|
|
58
|
+
expect(restriction.readWriteStatements()[0].conditions).toStrictEqual({
|
|
59
|
+
StringLike: {
|
|
60
|
+
'aws:userId': ['test-role-id-1:*', 'test-role-id-2:*'],
|
|
61
|
+
},
|
|
62
|
+
});
|
|
63
|
+
});
|
|
64
|
+
test('ReadWriteSuper Role Ids', () => {
|
|
65
|
+
const testProps = {
|
|
66
|
+
...baseTestProps,
|
|
67
|
+
readWriteSuperRoleIds: ['test-role-id-1', 'test-role-id-2'],
|
|
68
|
+
};
|
|
69
|
+
const restriction = new lib_1.RestrictObjectPrefixToRoles(testProps);
|
|
70
|
+
// console.log( JSON.stringify( restriction.statements()[ 0 ], undefined, 2 ) )
|
|
71
|
+
expect(restriction.statements().length).toBe(1);
|
|
72
|
+
expect(restriction.readWriteSuperStatements().length).toBe(1);
|
|
73
|
+
expect(restriction.readStatements().length).toBe(0);
|
|
74
|
+
expect(restriction.readWriteStatements().length).toBe(0);
|
|
75
|
+
expect(restriction.readWriteSuperStatements()[0].actions).toStrictEqual([
|
|
76
|
+
's3:GetObject*',
|
|
77
|
+
's3:PutObject',
|
|
78
|
+
's3:PutObjectTagging',
|
|
79
|
+
's3:DeleteObject',
|
|
80
|
+
's3:DeleteObjectVersion',
|
|
81
|
+
]);
|
|
82
|
+
expect(restriction.readWriteSuperStatements()[0].conditions).toStrictEqual({
|
|
83
|
+
StringLike: {
|
|
84
|
+
'aws:userId': ['test-role-id-1:*', 'test-role-id-2:*'],
|
|
85
|
+
},
|
|
86
|
+
});
|
|
87
|
+
});
|
|
88
|
+
test('Read Principals', () => {
|
|
89
|
+
const testProps = {
|
|
90
|
+
...baseTestProps,
|
|
91
|
+
readPrincipals: [new aws_iam_1.ArnPrincipal('test-role-arn-1')],
|
|
92
|
+
};
|
|
93
|
+
const restriction = new lib_1.RestrictObjectPrefixToRoles(testProps);
|
|
94
|
+
// console.log( JSON.stringify( restriction.statements()[ 0 ], undefined, 2 ) )
|
|
95
|
+
expect(restriction.statements().length).toBe(1);
|
|
96
|
+
expect(restriction.readStatements().length).toBe(1);
|
|
97
|
+
expect(restriction.readWriteSuperStatements().length).toBe(0);
|
|
98
|
+
expect(restriction.readWriteStatements().length).toBe(0);
|
|
99
|
+
expect(restriction.readStatements()[0].actions).toStrictEqual(['s3:GetObject*']);
|
|
100
|
+
expect(restriction.readStatements()[0].effect).toBe('Allow');
|
|
101
|
+
expect(restriction.readStatements()[0].resources).toStrictEqual([
|
|
102
|
+
'arn:test-partition:s3:::test-bucket/test-prefix/*',
|
|
103
|
+
]);
|
|
104
|
+
expect(restriction.readStatements()[0].principals.length).toBe(1);
|
|
105
|
+
expect(JSON.stringify(restriction.readStatements()[0].principals[0])).toStrictEqual(JSON.stringify({ AWS: ['test-role-arn-1'] }));
|
|
106
|
+
});
|
|
107
|
+
test('ReadWrite Principals', () => {
|
|
108
|
+
const testProps = {
|
|
109
|
+
...baseTestProps,
|
|
110
|
+
readWritePrincipals: [new aws_iam_1.ArnPrincipal('test-role-arn-1')],
|
|
111
|
+
};
|
|
112
|
+
const restriction = new lib_1.RestrictObjectPrefixToRoles(testProps);
|
|
113
|
+
// console.log( JSON.stringify( restriction.statements()[ 0 ], undefined, 2 ) )
|
|
114
|
+
expect(restriction.statements().length).toBe(1);
|
|
115
|
+
expect(restriction.readWriteStatements().length).toBe(1);
|
|
116
|
+
expect(restriction.readStatements().length).toBe(0);
|
|
117
|
+
expect(restriction.readWriteSuperStatements().length).toBe(0);
|
|
118
|
+
expect(restriction.readWriteStatements()[0].actions).toStrictEqual([
|
|
119
|
+
's3:GetObject*',
|
|
120
|
+
's3:PutObject',
|
|
121
|
+
's3:PutObjectTagging',
|
|
122
|
+
's3:DeleteObject',
|
|
123
|
+
]);
|
|
124
|
+
expect(restriction.readWriteStatements()[0].effect).toBe('Allow');
|
|
125
|
+
expect(restriction.readWriteStatements()[0].resources).toStrictEqual([
|
|
126
|
+
'arn:test-partition:s3:::test-bucket/test-prefix/*',
|
|
127
|
+
]);
|
|
128
|
+
expect(restriction.readWriteStatements()[0].principals.length).toBe(1);
|
|
129
|
+
expect(JSON.stringify(restriction.readWriteStatements()[0].principals[0])).toStrictEqual(JSON.stringify({ AWS: ['test-role-arn-1'] }));
|
|
130
|
+
});
|
|
131
|
+
test('ReadWriteSuper Principals', () => {
|
|
132
|
+
const testProps = {
|
|
133
|
+
...baseTestProps,
|
|
134
|
+
readWriteSuperPrincipals: [new aws_iam_1.ArnPrincipal('test-role-arn-1')],
|
|
135
|
+
};
|
|
136
|
+
const restriction = new lib_1.RestrictObjectPrefixToRoles(testProps);
|
|
137
|
+
// console.log( JSON.stringify( restriction.statements()[ 0 ], undefined, 2 ) )
|
|
138
|
+
expect(restriction.statements().length).toBe(1);
|
|
139
|
+
expect(restriction.readStatements().length).toBe(0);
|
|
140
|
+
expect(restriction.readWriteStatements().length).toBe(0);
|
|
141
|
+
expect(restriction.readWriteSuperStatements().length).toBe(1);
|
|
142
|
+
expect(restriction.readWriteSuperStatements()[0].actions).toStrictEqual([
|
|
143
|
+
's3:GetObject*',
|
|
144
|
+
's3:PutObject',
|
|
145
|
+
's3:PutObjectTagging',
|
|
146
|
+
's3:DeleteObject',
|
|
147
|
+
's3:DeleteObjectVersion',
|
|
148
|
+
]);
|
|
149
|
+
expect(restriction.readWriteSuperStatements()[0].effect).toBe('Allow');
|
|
150
|
+
expect(restriction.readWriteSuperStatements()[0].resources).toStrictEqual([
|
|
151
|
+
'arn:test-partition:s3:::test-bucket/test-prefix/*',
|
|
152
|
+
]);
|
|
153
|
+
expect(restriction.readWriteSuperStatements()[0].principals.length).toBe(1);
|
|
154
|
+
expect(JSON.stringify(restriction.readWriteSuperStatements()[0].principals[0])).toStrictEqual(JSON.stringify({ AWS: ['test-role-arn-1'] }));
|
|
155
|
+
});
|
|
156
|
+
});
|
|
157
|
+
describe('RestrictBucket', () => {
|
|
158
|
+
const baseTestProps = {
|
|
159
|
+
s3Bucket: testBucket,
|
|
160
|
+
roleExcludeIds: ['test-role-id-1', 'test-role-id-2'],
|
|
161
|
+
principalExcludes: ['test-arn'],
|
|
162
|
+
prefixExcludes: ['exclude-prefix'],
|
|
163
|
+
prefixIncludes: ['exclude-prefix'],
|
|
164
|
+
};
|
|
165
|
+
test('Base Allow', () => {
|
|
166
|
+
const testProps = {
|
|
167
|
+
...baseTestProps,
|
|
168
|
+
};
|
|
169
|
+
const restriction = new lib_1.RestrictBucketToRoles(testProps);
|
|
170
|
+
console.log(JSON.stringify(restriction.allowStatement, undefined, 2));
|
|
171
|
+
expect(restriction.allowStatement.actions).toStrictEqual(['s3:List*', 's3:GetBucket*']);
|
|
172
|
+
expect(restriction.allowStatement.effect).toBe('Allow');
|
|
173
|
+
expect(restriction.allowStatement.conditions).toStrictEqual({
|
|
174
|
+
StringLike: {
|
|
175
|
+
'aws:userId': ['test-role-id-1:*', 'test-role-id-2:*'],
|
|
176
|
+
},
|
|
177
|
+
});
|
|
178
|
+
expect(restriction.allowStatement.resources).toStrictEqual([
|
|
179
|
+
'arn:test-partition:s3:::test-bucket/*',
|
|
180
|
+
'arn:test-partition:s3:::test-bucket',
|
|
181
|
+
]);
|
|
182
|
+
});
|
|
183
|
+
test('Base Deny', () => {
|
|
184
|
+
const testProps = {
|
|
185
|
+
...baseTestProps,
|
|
186
|
+
};
|
|
187
|
+
const restriction = new lib_1.RestrictBucketToRoles(testProps);
|
|
188
|
+
console.log(JSON.stringify(restriction.denyStatement, undefined, 2));
|
|
189
|
+
expect(restriction.denyStatement.actions).toStrictEqual(['s3:PutObject*', 's3:GetObject*', 's3:DeleteObject*']);
|
|
190
|
+
expect(restriction.denyStatement.effect).toBe('Deny');
|
|
191
|
+
expect(restriction.denyStatement.conditions).toStrictEqual({
|
|
192
|
+
'ForAnyValue:StringNotLike': {
|
|
193
|
+
'aws:userId': ['test-role-id-1:*', 'test-role-id-2:*'],
|
|
194
|
+
'aws:PrincipalArn': ['test-arn'],
|
|
195
|
+
},
|
|
196
|
+
});
|
|
197
|
+
});
|
|
198
|
+
});
|
|
199
|
+
});
|
|
200
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"bucketpolicy-helper.test.js","sourceRoot":"","sources":["bucketpolicy-helper.test.ts"],"names":[],"mappings":";AAAA;;;GAGG;;AAEH,+CAAgD;AAChD,gCAKgB;AAChB,+CAA4C;AAC5C,iDAAmD;AAEnD,QAAQ,CAAC,0BAA0B,EAAE,GAAG,EAAE;IACxC,MAAM,OAAO,GAAG,IAAI,qBAAW,EAAE,CAAC;IAClC,MAAM,UAAU,GAAG,eAAM,CAAC,cAAc,CAAC,OAAO,CAAC,SAAS,EAAE,aAAa,EAAE,aAAa,CAAC,CAAC;IAC1F,QAAQ,CAAC,gBAAgB,EAAE,GAAG,EAAE;QAC9B,MAAM,aAAa,GAAiC;YAClD,QAAQ,EAAE,UAAU;YACpB,QAAQ,EAAE,aAAa;SACxB,CAAC;QACF,IAAI,CAAC,eAAe,EAAE,GAAG,EAAE;YACzB,MAAM,SAAS,GAAiC;gBAC9C,GAAG,aAAa;gBAChB,WAAW,EAAE,CAAC,gBAAgB,EAAE,gBAAgB,CAAC;aAClD,CAAC;YACF,MAAM,WAAW,GAAG,IAAI,iCAA2B,CAAC,SAAS,CAAC,CAAC;YAC/D,+EAA+E;YAC/E,MAAM,CAAC,WAAW,CAAC,UAAU,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAChD,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACpD,MAAM,CAAC,WAAW,CAAC,wBAAwB,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAC9D,MAAM,CAAC,WAAW,CAAC,mBAAmB,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACzD,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,aAAa,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC;YACjF,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,aAAa,CAAC;gBAC/D,UAAU,EAAE;oBACV,YAAY,EAAE,CAAC,kBAAkB,EAAE,kBAAkB,CAAC;iBACvD;aACF,CAAC,CAAC;YACH,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;YAC7D,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,aAAa,CAAC;gBAC9D,mDAAmD;aACpD,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,oBAAoB,EAAE,GAAG,EAAE;YAC9B,MAAM,SAAS,GAAiC;gBAC9C,GAAG,aAAa;gBAChB,gBAAgB,EAAE,CAAC,gBAAgB,EAAE,gBAAgB,CAAC;aACvD,CAAC;YACF,MAAM,WAAW,GAAG,IAAI,iCAA2B,CAAC,SAAS,CAAC,CAAC;YAC/D,+EAA+E;YAC/E,MAAM,CAAC,WAAW,CAAC,UAAU,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAChD,MAAM,CAAC,WAAW,CAAC,mBAAmB,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACzD,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACpD,MAAM,CAAC,WAAW,CAAC,wBAAwB,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAC9D,MAAM,CAAC,WAAW,CAAC,mBAAmB,EAAE,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,aAAa,CAAC;gBACjE,eAAe;gBACf,cAAc;gBACd,qBAAqB;gBACrB,iBAAiB;aAClB,CAAC,CAAC;YACH,MAAM,CAAC,WAAW,CAAC,mBAAmB,EAAE,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,aAAa,CAAC;gBACpE,UAAU,EAAE;oBACV,YAAY,EAAE,CAAC,kBAAkB,EAAE,kBAAkB,CAAC;iBACvD;aACF,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,yBAAyB,EAAE,GAAG,EAAE;YACnC,MAAM,SAAS,GAAiC;gBAC9C,GAAG,aAAa;gBAChB,qBAAqB,EAAE,CAAC,gBAAgB,EAAE,gBAAgB,CAAC;aAC5D,CAAC;YACF,MAAM,WAAW,GAAG,IAAI,iCAA2B,CAAC,SAAS,CAAC,CAAC;YAC/D,+EAA+E;YAC/E,MAAM,CAAC,WAAW,CAAC,UAAU,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAChD,MAAM,CAAC,WAAW,CAAC,wBAAwB,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAC9D,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACpD,MAAM,CAAC,WAAW,CAAC,mBAAmB,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACzD,MAAM,CAAC,WAAW,CAAC,wBAAwB,EAAE,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,aAAa,CAAC;gBACtE,eAAe;gBACf,cAAc;gBACd,qBAAqB;gBACrB,iBAAiB;gBACjB,wBAAwB;aACzB,CAAC,CAAC;YACH,MAAM,CAAC,WAAW,CAAC,wBAAwB,EAAE,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,aAAa,CAAC;gBACzE,UAAU,EAAE;oBACV,YAAY,EAAE,CAAC,kBAAkB,EAAE,kBAAkB,CAAC;iBACvD;aACF,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,iBAAiB,EAAE,GAAG,EAAE;YAC3B,MAAM,SAAS,GAAiC;gBAC9C,GAAG,aAAa;gBAChB,cAAc,EAAE,CAAC,IAAI,sBAAY,CAAC,iBAAiB,CAAC,CAAC;aACtD,CAAC;YACF,MAAM,WAAW,GAAG,IAAI,iCAA2B,CAAC,SAAS,CAAC,CAAC;YAC/D,+EAA+E;YAC/E,MAAM,CAAC,WAAW,CAAC,UAAU,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAChD,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACpD,MAAM,CAAC,WAAW,CAAC,wBAAwB,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAC9D,MAAM,CAAC,WAAW,CAAC,mBAAmB,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACzD,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,aAAa,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC;YACjF,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;YAC7D,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,aAAa,CAAC;gBAC9D,mDAAmD;aACpD,CAAC,CAAC;YACH,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAClE,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,aAAa,CACjF,IAAI,CAAC,SAAS,CAAC,EAAE,GAAG,EAAE,CAAC,iBAAiB,CAAC,EAAE,CAAC,CAC7C,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,sBAAsB,EAAE,GAAG,EAAE;YAChC,MAAM,SAAS,GAAiC;gBAC9C,GAAG,aAAa;gBAChB,mBAAmB,EAAE,CAAC,IAAI,sBAAY,CAAC,iBAAiB,CAAC,CAAC;aAC3D,CAAC;YACF,MAAM,WAAW,GAAG,IAAI,iCAA2B,CAAC,SAAS,CAAC,CAAC;YAC/D,+EAA+E;YAC/E,MAAM,CAAC,WAAW,CAAC,UAAU,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAChD,MAAM,CAAC,WAAW,CAAC,mBAAmB,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACzD,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACpD,MAAM,CAAC,WAAW,CAAC,wBAAwB,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAC9D,MAAM,CAAC,WAAW,CAAC,mBAAmB,EAAE,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,aAAa,CAAC;gBACjE,eAAe;gBACf,cAAc;gBACd,qBAAqB;gBACrB,iBAAiB;aAClB,CAAC,CAAC;YACH,MAAM,CAAC,WAAW,CAAC,mBAAmB,EAAE,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;YAClE,MAAM,CAAC,WAAW,CAAC,mBAAmB,EAAE,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,aAAa,CAAC;gBACnE,mDAAmD;aACpD,CAAC,CAAC;YACH,MAAM,CAAC,WAAW,CAAC,mBAAmB,EAAE,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACvE,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,WAAW,CAAC,mBAAmB,EAAE,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,aAAa,CACtF,IAAI,CAAC,SAAS,CAAC,EAAE,GAAG,EAAE,CAAC,iBAAiB,CAAC,EAAE,CAAC,CAC7C,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,IAAI,CAAC,2BAA2B,EAAE,GAAG,EAAE;YACrC,MAAM,SAAS,GAAiC;gBAC9C,GAAG,aAAa;gBAChB,wBAAwB,EAAE,CAAC,IAAI,sBAAY,CAAC,iBAAiB,CAAC,CAAC;aAChE,CAAC;YACF,MAAM,WAAW,GAAG,IAAI,iCAA2B,CAAC,SAAS,CAAC,CAAC;YAC/D,+EAA+E;YAC/E,MAAM,CAAC,WAAW,CAAC,UAAU,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAChD,MAAM,CAAC,WAAW,CAAC,cAAc,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACpD,MAAM,CAAC,WAAW,CAAC,mBAAmB,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACzD,MAAM,CAAC,WAAW,CAAC,wBAAwB,EAAE,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAC9D,MAAM,CAAC,WAAW,CAAC,wBAAwB,EAAE,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,aAAa,CAAC;gBACtE,eAAe;gBACf,cAAc;gBACd,qBAAqB;gBACrB,iBAAiB;gBACjB,wBAAwB;aACzB,CAAC,CAAC;YACH,MAAM,CAAC,WAAW,CAAC,wBAAwB,EAAE,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;YACvE,MAAM,CAAC,WAAW,CAAC,wBAAwB,EAAE,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,aAAa,CAAC;gBACxE,mDAAmD;aACpD,CAAC,CAAC;YACH,MAAM,CAAC,WAAW,CAAC,wBAAwB,EAAE,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAC5E,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,WAAW,CAAC,wBAAwB,EAAE,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,aAAa,CAC3F,IAAI,CAAC,SAAS,CAAC,EAAE,GAAG,EAAE,CAAC,iBAAiB,CAAC,EAAE,CAAC,CAC7C,CAAC;QACJ,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IACH,QAAQ,CAAC,gBAAgB,EAAE,GAAG,EAAE;QAC9B,MAAM,aAAa,GAA2B;YAC5C,QAAQ,EAAE,UAAU;YACpB,cAAc,EAAE,CAAC,gBAAgB,EAAE,gBAAgB,CAAC;YACpD,iBAAiB,EAAE,CAAC,UAAU,CAAC;YAC/B,cAAc,EAAE,CAAC,gBAAgB,CAAC;YAClC,cAAc,EAAE,CAAC,gBAAgB,CAAC;SACnC,CAAC;QACF,IAAI,CAAC,YAAY,EAAE,GAAG,EAAE;YACtB,MAAM,SAAS,GAA2B;gBACxC,GAAG,aAAa;aACjB,CAAC;YACF,MAAM,WAAW,GAAG,IAAI,2BAAqB,CAAC,SAAS,CAAC,CAAC;YACzD,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,SAAS,CAAC,WAAW,CAAC,cAAc,EAAE,SAAS,EAAE,CAAC,CAAC,CAAC,CAAC;YACtE,MAAM,CAAC,WAAW,CAAC,cAAc,CAAC,OAAO,CAAC,CAAC,aAAa,CAAC,CAAC,UAAU,EAAE,eAAe,CAAC,CAAC,CAAC;YACxF,MAAM,CAAC,WAAW,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;YACxD,MAAM,CAAC,WAAW,CAAC,cAAc,CAAC,UAAU,CAAC,CAAC,aAAa,CAAC;gBAC1D,UAAU,EAAE;oBACV,YAAY,EAAE,CAAC,kBAAkB,EAAE,kBAAkB,CAAC;iBACvD;aACF,CAAC,CAAC;YACH,MAAM,CAAC,WAAW,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC,aAAa,CAAC;gBACzD,uCAAuC;gBACvC,qCAAqC;aACtC,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QACH,IAAI,CAAC,WAAW,EAAE,GAAG,EAAE;YACrB,MAAM,SAAS,GAA2B;gBACxC,GAAG,aAAa;aACjB,CAAC;YACF,MAAM,WAAW,GAAG,IAAI,2BAAqB,CAAC,SAAS,CAAC,CAAC;YACzD,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,SAAS,CAAC,WAAW,CAAC,aAAa,EAAE,SAAS,EAAE,CAAC,CAAC,CAAC,CAAC;YACrE,MAAM,CAAC,WAAW,CAAC,aAAa,CAAC,OAAO,CAAC,CAAC,aAAa,CAAC,CAAC,eAAe,EAAE,eAAe,EAAE,kBAAkB,CAAC,CAAC,CAAC;YAChH,MAAM,CAAC,WAAW,CAAC,aAAa,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YACtD,MAAM,CAAC,WAAW,CAAC,aAAa,CAAC,UAAU,CAAC,CAAC,aAAa,CAAC;gBACzD,2BAA2B,EAAE;oBAC3B,YAAY,EAAE,CAAC,kBAAkB,EAAE,kBAAkB,CAAC;oBACtD,kBAAkB,EAAE,CAAC,UAAU,CAAC;iBACjC;aACF,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC","sourcesContent":["/*!\n * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n * SPDX-License-Identifier: Apache-2.0\n */\n\nimport { MdaaTestApp } from '@aws-mdaa/testing';\nimport {\n  IRestrictBucketToRoles,\n  IRestrictObjectPrefixToRoles,\n  RestrictBucketToRoles,\n  RestrictObjectPrefixToRoles,\n} from '../lib';\nimport { Bucket } from 'aws-cdk-lib/aws-s3';\nimport { ArnPrincipal } from 'aws-cdk-lib/aws-iam';\n\ndescribe('Test BucketPolicy Helper', () => {\n  const testApp = new MdaaTestApp();\n  const testBucket = Bucket.fromBucketName(testApp.testStack, 'test-bucket', 'test-bucket');\n  describe('RestrictPrefix', () => {\n    const baseTestProps: IRestrictObjectPrefixToRoles = {\n      s3Bucket: testBucket,\n      s3Prefix: 'test-prefix',\n    };\n    test('Read Role Ids', () => {\n      const testProps: IRestrictObjectPrefixToRoles = {\n        ...baseTestProps,\n        readRoleIds: ['test-role-id-1', 'test-role-id-2'],\n      };\n      const restriction = new RestrictObjectPrefixToRoles(testProps);\n      // console.log( JSON.stringify( restriction.statements()[ 0 ], undefined, 2 ) )\n      expect(restriction.statements().length).toBe(1);\n      expect(restriction.readStatements().length).toBe(1);\n      expect(restriction.readWriteSuperStatements().length).toBe(0);\n      expect(restriction.readWriteStatements().length).toBe(0);\n      expect(restriction.readStatements()[0].actions).toStrictEqual(['s3:GetObject*']);\n      expect(restriction.readStatements()[0].conditions).toStrictEqual({\n        StringLike: {\n          'aws:userId': ['test-role-id-1:*', 'test-role-id-2:*'],\n        },\n      });\n      expect(restriction.readStatements()[0].effect).toBe('Allow');\n      expect(restriction.readStatements()[0].resources).toStrictEqual([\n        'arn:test-partition:s3:::test-bucket/test-prefix/*',\n      ]);\n    });\n\n    test('ReadWrite Role Ids', () => {\n      const testProps: IRestrictObjectPrefixToRoles = {\n        ...baseTestProps,\n        readWriteRoleIds: ['test-role-id-1', 'test-role-id-2'],\n      };\n      const restriction = new RestrictObjectPrefixToRoles(testProps);\n      // console.log( JSON.stringify( restriction.statements()[ 0 ], undefined, 2 ) )\n      expect(restriction.statements().length).toBe(1);\n      expect(restriction.readWriteStatements().length).toBe(1);\n      expect(restriction.readStatements().length).toBe(0);\n      expect(restriction.readWriteSuperStatements().length).toBe(0);\n      expect(restriction.readWriteStatements()[0].actions).toStrictEqual([\n        's3:GetObject*',\n        's3:PutObject',\n        's3:PutObjectTagging',\n        's3:DeleteObject',\n      ]);\n      expect(restriction.readWriteStatements()[0].conditions).toStrictEqual({\n        StringLike: {\n          'aws:userId': ['test-role-id-1:*', 'test-role-id-2:*'],\n        },\n      });\n    });\n\n    test('ReadWriteSuper Role Ids', () => {\n      const testProps: IRestrictObjectPrefixToRoles = {\n        ...baseTestProps,\n        readWriteSuperRoleIds: ['test-role-id-1', 'test-role-id-2'],\n      };\n      const restriction = new RestrictObjectPrefixToRoles(testProps);\n      // console.log( JSON.stringify( restriction.statements()[ 0 ], undefined, 2 ) )\n      expect(restriction.statements().length).toBe(1);\n      expect(restriction.readWriteSuperStatements().length).toBe(1);\n      expect(restriction.readStatements().length).toBe(0);\n      expect(restriction.readWriteStatements().length).toBe(0);\n      expect(restriction.readWriteSuperStatements()[0].actions).toStrictEqual([\n        's3:GetObject*',\n        's3:PutObject',\n        's3:PutObjectTagging',\n        's3:DeleteObject',\n        's3:DeleteObjectVersion',\n      ]);\n      expect(restriction.readWriteSuperStatements()[0].conditions).toStrictEqual({\n        StringLike: {\n          'aws:userId': ['test-role-id-1:*', 'test-role-id-2:*'],\n        },\n      });\n    });\n\n    test('Read Principals', () => {\n      const testProps: IRestrictObjectPrefixToRoles = {\n        ...baseTestProps,\n        readPrincipals: [new ArnPrincipal('test-role-arn-1')],\n      };\n      const restriction = new RestrictObjectPrefixToRoles(testProps);\n      // console.log( JSON.stringify( restriction.statements()[ 0 ], undefined, 2 ) )\n      expect(restriction.statements().length).toBe(1);\n      expect(restriction.readStatements().length).toBe(1);\n      expect(restriction.readWriteSuperStatements().length).toBe(0);\n      expect(restriction.readWriteStatements().length).toBe(0);\n      expect(restriction.readStatements()[0].actions).toStrictEqual(['s3:GetObject*']);\n      expect(restriction.readStatements()[0].effect).toBe('Allow');\n      expect(restriction.readStatements()[0].resources).toStrictEqual([\n        'arn:test-partition:s3:::test-bucket/test-prefix/*',\n      ]);\n      expect(restriction.readStatements()[0].principals.length).toBe(1);\n      expect(JSON.stringify(restriction.readStatements()[0].principals[0])).toStrictEqual(\n        JSON.stringify({ AWS: ['test-role-arn-1'] }),\n      );\n    });\n\n    test('ReadWrite Principals', () => {\n      const testProps: IRestrictObjectPrefixToRoles = {\n        ...baseTestProps,\n        readWritePrincipals: [new ArnPrincipal('test-role-arn-1')],\n      };\n      const restriction = new RestrictObjectPrefixToRoles(testProps);\n      // console.log( JSON.stringify( restriction.statements()[ 0 ], undefined, 2 ) )\n      expect(restriction.statements().length).toBe(1);\n      expect(restriction.readWriteStatements().length).toBe(1);\n      expect(restriction.readStatements().length).toBe(0);\n      expect(restriction.readWriteSuperStatements().length).toBe(0);\n      expect(restriction.readWriteStatements()[0].actions).toStrictEqual([\n        's3:GetObject*',\n        's3:PutObject',\n        's3:PutObjectTagging',\n        's3:DeleteObject',\n      ]);\n      expect(restriction.readWriteStatements()[0].effect).toBe('Allow');\n      expect(restriction.readWriteStatements()[0].resources).toStrictEqual([\n        'arn:test-partition:s3:::test-bucket/test-prefix/*',\n      ]);\n      expect(restriction.readWriteStatements()[0].principals.length).toBe(1);\n      expect(JSON.stringify(restriction.readWriteStatements()[0].principals[0])).toStrictEqual(\n        JSON.stringify({ AWS: ['test-role-arn-1'] }),\n      );\n    });\n\n    test('ReadWriteSuper Principals', () => {\n      const testProps: IRestrictObjectPrefixToRoles = {\n        ...baseTestProps,\n        readWriteSuperPrincipals: [new ArnPrincipal('test-role-arn-1')],\n      };\n      const restriction = new RestrictObjectPrefixToRoles(testProps);\n      // console.log( JSON.stringify( restriction.statements()[ 0 ], undefined, 2 ) )\n      expect(restriction.statements().length).toBe(1);\n      expect(restriction.readStatements().length).toBe(0);\n      expect(restriction.readWriteStatements().length).toBe(0);\n      expect(restriction.readWriteSuperStatements().length).toBe(1);\n      expect(restriction.readWriteSuperStatements()[0].actions).toStrictEqual([\n        's3:GetObject*',\n        's3:PutObject',\n        's3:PutObjectTagging',\n        's3:DeleteObject',\n        's3:DeleteObjectVersion',\n      ]);\n      expect(restriction.readWriteSuperStatements()[0].effect).toBe('Allow');\n      expect(restriction.readWriteSuperStatements()[0].resources).toStrictEqual([\n        'arn:test-partition:s3:::test-bucket/test-prefix/*',\n      ]);\n      expect(restriction.readWriteSuperStatements()[0].principals.length).toBe(1);\n      expect(JSON.stringify(restriction.readWriteSuperStatements()[0].principals[0])).toStrictEqual(\n        JSON.stringify({ AWS: ['test-role-arn-1'] }),\n      );\n    });\n  });\n  describe('RestrictBucket', () => {\n    const baseTestProps: IRestrictBucketToRoles = {\n      s3Bucket: testBucket,\n      roleExcludeIds: ['test-role-id-1', 'test-role-id-2'],\n      principalExcludes: ['test-arn'],\n      prefixExcludes: ['exclude-prefix'],\n      prefixIncludes: ['exclude-prefix'],\n    };\n    test('Base Allow', () => {\n      const testProps: IRestrictBucketToRoles = {\n        ...baseTestProps,\n      };\n      const restriction = new RestrictBucketToRoles(testProps);\n      console.log(JSON.stringify(restriction.allowStatement, undefined, 2));\n      expect(restriction.allowStatement.actions).toStrictEqual(['s3:List*', 's3:GetBucket*']);\n      expect(restriction.allowStatement.effect).toBe('Allow');\n      expect(restriction.allowStatement.conditions).toStrictEqual({\n        StringLike: {\n          'aws:userId': ['test-role-id-1:*', 'test-role-id-2:*'],\n        },\n      });\n      expect(restriction.allowStatement.resources).toStrictEqual([\n        'arn:test-partition:s3:::test-bucket/*',\n        'arn:test-partition:s3:::test-bucket',\n      ]);\n    });\n    test('Base Deny', () => {\n      const testProps: IRestrictBucketToRoles = {\n        ...baseTestProps,\n      };\n      const restriction = new RestrictBucketToRoles(testProps);\n      console.log(JSON.stringify(restriction.denyStatement, undefined, 2));\n      expect(restriction.denyStatement.actions).toStrictEqual(['s3:PutObject*', 's3:GetObject*', 's3:DeleteObject*']);\n      expect(restriction.denyStatement.effect).toBe('Deny');\n      expect(restriction.denyStatement.conditions).toStrictEqual({\n        'ForAnyValue:StringNotLike': {\n          'aws:userId': ['test-role-id-1:*', 'test-role-id-2:*'],\n          'aws:PrincipalArn': ['test-arn'],\n        },\n      });\n    });\n  });\n});\n"]}
|