@aws-mdaa/dataops-job-l3-construct 1.5.0 → 1.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (90) hide show
  1. package/.jsii +38 -28
  2. package/README.md +5 -0
  3. package/lib/dataops-job-l3-construct.d.ts +8 -1
  4. package/lib/dataops-job-l3-construct.js +40 -13
  5. package/node_modules/@aws-mdaa/config/README.md +3 -0
  6. package/node_modules/@aws-mdaa/config/lib/blueprint-value-transformer.d.ts +20 -0
  7. package/node_modules/@aws-mdaa/config/lib/blueprint-value-transformer.js +70 -0
  8. package/node_modules/@aws-mdaa/config/lib/blueprint-value-transformer.ts +88 -0
  9. package/node_modules/@aws-mdaa/config/lib/config.d.ts +87 -0
  10. package/node_modules/@aws-mdaa/config/lib/config.js +7 -0
  11. package/node_modules/@aws-mdaa/config/lib/config.ts +92 -0
  12. package/node_modules/@aws-mdaa/config/lib/index.d.ts +11 -0
  13. package/node_modules/@aws-mdaa/config/lib/index.js +28 -0
  14. package/node_modules/@aws-mdaa/config/lib/index.ts +12 -0
  15. package/node_modules/@aws-mdaa/config/lib/param-transformer.d.ts +49 -0
  16. package/node_modules/@aws-mdaa/config/lib/param-transformer.js +160 -0
  17. package/node_modules/@aws-mdaa/config/lib/param-transformer.ts +159 -0
  18. package/node_modules/@aws-mdaa/config/lib/path-value-transformer.d.ts +10 -0
  19. package/node_modules/@aws-mdaa/config/lib/path-value-transformer.js +30 -0
  20. package/node_modules/@aws-mdaa/config/lib/path-value-transformer.ts +27 -0
  21. package/node_modules/@aws-mdaa/config/lib/ref-value-transformer.d.ts +44 -0
  22. package/node_modules/@aws-mdaa/config/lib/ref-value-transformer.js +243 -0
  23. package/node_modules/@aws-mdaa/config/lib/ref-value-transformer.ts +302 -0
  24. package/node_modules/@aws-mdaa/config/lib/ssm-ref-transformer.d.ts +8 -0
  25. package/node_modules/@aws-mdaa/config/lib/ssm-ref-transformer.js +22 -0
  26. package/node_modules/@aws-mdaa/config/lib/ssm-ref-transformer.ts +21 -0
  27. package/node_modules/@aws-mdaa/config/lib/transformer.d.ts +35 -0
  28. package/node_modules/@aws-mdaa/config/lib/transformer.js +66 -0
  29. package/node_modules/@aws-mdaa/config/lib/transformer.ts +74 -0
  30. package/node_modules/@aws-mdaa/config/package.json +42 -0
  31. package/node_modules/@aws-mdaa/config/test/blueprint-value-transformer.test.js +224 -0
  32. package/node_modules/@aws-mdaa/config/test/blueprint-value-transformer.test.ts +259 -0
  33. package/node_modules/@aws-mdaa/config/test/config-nt.test.d.ts +5 -0
  34. package/node_modules/@aws-mdaa/config/test/config-nt.test.js +129 -0
  35. package/node_modules/@aws-mdaa/config/test/config-nt.test.ts +163 -0
  36. package/node_modules/@aws-mdaa/config/test/config.test.d.ts +5 -0
  37. package/node_modules/@aws-mdaa/config/test/config.test.js +409 -0
  38. package/node_modules/@aws-mdaa/config/test/config.test.ts +517 -0
  39. package/node_modules/@aws-mdaa/config/test/param-transformer.test.d.ts +5 -0
  40. package/node_modules/@aws-mdaa/config/test/param-transformer.test.js +216 -0
  41. package/node_modules/@aws-mdaa/config/test/param-transformer.test.ts +234 -0
  42. package/node_modules/@aws-mdaa/config/test/path-value-transformer.test.d.ts +5 -0
  43. package/node_modules/@aws-mdaa/config/test/path-value-transformer.test.js +59 -0
  44. package/node_modules/@aws-mdaa/config/test/path-value-transformer.test.ts +68 -0
  45. package/node_modules/@aws-mdaa/config/test/ref-value-transformer.test.d.ts +5 -0
  46. package/node_modules/@aws-mdaa/config/test/ref-value-transformer.test.js +254 -0
  47. package/node_modules/@aws-mdaa/config/test/ref-value-transformer.test.ts +304 -0
  48. package/node_modules/@aws-mdaa/config/test/ssm-ref-transformer.test.d.ts +5 -0
  49. package/node_modules/@aws-mdaa/config/test/ssm-ref-transformer.test.js +66 -0
  50. package/node_modules/@aws-mdaa/config/test/ssm-ref-transformer.test.ts +79 -0
  51. package/node_modules/@aws-mdaa/config/tsconfig.tsbuildinfo +1 -0
  52. package/node_modules/lodash/README.md +2 -2
  53. package/node_modules/lodash/_baseOrderBy.js +1 -1
  54. package/node_modules/lodash/_baseUnset.js +7 -20
  55. package/node_modules/lodash/_setCacheHas.js +1 -1
  56. package/node_modules/lodash/compact.js +1 -1
  57. package/node_modules/lodash/core.js +3 -3
  58. package/node_modules/lodash/core.min.js +26 -25
  59. package/node_modules/lodash/fromPairs.js +3 -1
  60. package/node_modules/lodash/lodash.js +38 -27
  61. package/node_modules/lodash/lodash.min.js +125 -129
  62. package/node_modules/lodash/package.json +4 -2
  63. package/node_modules/lodash/random.js +9 -0
  64. package/node_modules/lodash/template.js +16 -4
  65. package/node_modules/lodash/templateSettings.js +4 -0
  66. package/package.json +27 -32
  67. package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/README.md +0 -185
  68. package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/lib/index.d.ts +0 -57
  69. package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/lib/index.js +0 -198
  70. package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/lib/index.ts +0 -241
  71. package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/package.json +0 -44
  72. package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/test/bucketpolicy-helper.test.js +0 -200
  73. package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/test/bucketpolicy-helper.test.ts +0 -215
  74. package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/tsconfig.tsbuildinfo +0 -1
  75. package/node_modules/@aws-mdaa/s3-inventory-helper/.npmignore +0 -34
  76. package/node_modules/@aws-mdaa/s3-inventory-helper/README.md +0 -3
  77. package/node_modules/@aws-mdaa/s3-inventory-helper/jest.config.js +0 -5
  78. package/node_modules/@aws-mdaa/s3-inventory-helper/lib/index.d.ts +0 -48
  79. package/node_modules/@aws-mdaa/s3-inventory-helper/lib/index.js +0 -213
  80. package/node_modules/@aws-mdaa/s3-inventory-helper/lib/index.ts +0 -241
  81. package/node_modules/@aws-mdaa/s3-inventory-helper/package.json +0 -44
  82. package/node_modules/@aws-mdaa/s3-inventory-helper/test/TODO +0 -0
  83. package/node_modules/@aws-mdaa/s3-inventory-helper/tsconfig.json +0 -40
  84. package/node_modules/@aws-mdaa/s3-inventory-helper/tsconfig.tsbuildinfo +0 -1
  85. package/node_modules/@aws-mdaa/s3-inventory-helper/typedoc.json +0 -7
  86. /package/node_modules/@aws-mdaa/{s3-bucketpolicy-helper → config}/.npmignore +0 -0
  87. /package/node_modules/@aws-mdaa/{s3-bucketpolicy-helper → config}/jest.config.js +0 -0
  88. /package/node_modules/@aws-mdaa/{s3-bucketpolicy-helper/test/bucketpolicy-helper.test.d.ts → config/test/blueprint-value-transformer.test.d.ts} +0 -0
  89. /package/node_modules/@aws-mdaa/{s3-bucketpolicy-helper → config}/tsconfig.json +0 -0
  90. /package/node_modules/@aws-mdaa/{s3-bucketpolicy-helper → config}/typedoc.json +0 -0
@@ -1,198 +0,0 @@
1
- "use strict";
2
- /*!
3
- * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
4
- * SPDX-License-Identifier: Apache-2.0
5
- */
6
- Object.defineProperty(exports, "__esModule", { value: true });
7
- exports.RestrictBucketToRoles = exports.RestrictObjectPrefixToRoles = void 0;
8
- const aws_iam_1 = require("aws-cdk-lib/aws-iam");
9
- /** Helper class for generating S3 bucket policy statements which grant access to specific object prefixes */
10
- class RestrictObjectPrefixToRoles {
11
- constructor(props) {
12
- this._readStatements = [];
13
- this._readWriteStatements = [];
14
- this._readWriteSuperStatements = [];
15
- this._formattedPrefix = '/' + this.formatS3Prefix(props.s3Prefix) + '/*';
16
- // Covers our case where two / get resolved because our prefix is actually /
17
- this._formattedPrefix = this._formattedPrefix.replace(/\/\//, '/');
18
- // FEDERATED / READ
19
- if (props.readRoleIds != undefined && props.readRoleIds.length > 0) {
20
- // Construct our User:Id roles for read
21
- const statement = this._readStatementScaffold(props);
22
- statement.addCondition('StringLike', { 'aws:userId': props.readRoleIds.map(x => `${x}:*`) });
23
- statement.addAnyPrincipal();
24
- this._readStatements.push(statement);
25
- }
26
- // FEDERATED / READWRITE
27
- if (props.readWriteRoleIds != undefined && props.readWriteRoleIds.length > 0) {
28
- const statement = this._readWriteStatementScaffold(props);
29
- statement.addCondition('StringLike', { 'aws:userId': props.readWriteRoleIds.map(x => `${x}:*`) });
30
- statement.addAnyPrincipal();
31
- this._readWriteStatements.push(statement);
32
- }
33
- // FEDERATED / READWRITESUPER
34
- if (props.readWriteSuperRoleIds != undefined && props.readWriteSuperRoleIds.length > 0) {
35
- const statement = this._readWriteSuperStatementScaffold(props);
36
- statement.addCondition('StringLike', { 'aws:userId': props.readWriteSuperRoleIds.map(x => `${x}:*`) });
37
- statement.addAnyPrincipal();
38
- this._readWriteSuperStatements.push(statement);
39
- }
40
- // NONFEDERATED / READ
41
- if (props.readPrincipals != undefined && props.readPrincipals.length > 0) {
42
- const statement = this._readStatementScaffold(props);
43
- props.readPrincipals.forEach(principal => {
44
- statement.addPrincipals(principal);
45
- });
46
- this._readStatements.push(statement);
47
- }
48
- // NONFEDERATED / READWRITE
49
- if (props.readWritePrincipals != undefined && props.readWritePrincipals.length > 0) {
50
- const statement = this._readWriteStatementScaffold(props);
51
- props.readWritePrincipals.forEach(principal => {
52
- statement.addPrincipals(principal);
53
- });
54
- this._readWriteStatements.push(statement);
55
- }
56
- // NONFEDERATED / READWRITESUPER
57
- if (props.readWriteSuperPrincipals != undefined && props.readWriteSuperPrincipals.length > 0) {
58
- const statement = this._readWriteSuperStatementScaffold(props);
59
- props.readWriteSuperPrincipals.forEach(principal => {
60
- statement.addPrincipals(principal);
61
- });
62
- this._readWriteSuperStatements.push(statement);
63
- }
64
- }
65
- _readStatementScaffold(props) {
66
- return new aws_iam_1.PolicyStatement({
67
- sid: `${props.s3Prefix.replace(/\\W/g, '')}_Read`,
68
- effect: aws_iam_1.Effect.ALLOW,
69
- resources: [props.s3Bucket.bucketArn + this._formattedPrefix],
70
- actions: RestrictObjectPrefixToRoles.READ_ACTIONS,
71
- });
72
- }
73
- _readWriteStatementScaffold(props) {
74
- return new aws_iam_1.PolicyStatement({
75
- sid: `${props.s3Prefix.replace(/\\W/g, '')}_ReadWrite`,
76
- effect: aws_iam_1.Effect.ALLOW,
77
- resources: [props.s3Bucket.bucketArn + this._formattedPrefix],
78
- actions: RestrictObjectPrefixToRoles.READ_WRITE_ACTIONS,
79
- });
80
- }
81
- _readWriteSuperStatementScaffold(props) {
82
- return new aws_iam_1.PolicyStatement({
83
- sid: `${props.s3Prefix.replace(/\\W/g, '')}_ReadWriteSuper`,
84
- effect: aws_iam_1.Effect.ALLOW,
85
- resources: [props.s3Bucket.bucketArn + this._formattedPrefix],
86
- actions: RestrictObjectPrefixToRoles.READ_WRITE_SUPER_ACTIONS,
87
- });
88
- }
89
- readStatements() {
90
- return this._readStatements;
91
- }
92
- readWriteStatements() {
93
- return this._readWriteStatements;
94
- }
95
- readWriteSuperStatements() {
96
- return this._readWriteSuperStatements;
97
- }
98
- statements() {
99
- return [...this._readStatements, ...this._readWriteStatements, ...this._readWriteSuperStatements];
100
- }
101
- formatS3Prefix(prefix) {
102
- let rawPrefix = prefix;
103
- // Removes trailing slashes
104
- rawPrefix = rawPrefix.endsWith('/') ? rawPrefix.slice(0, -1) : rawPrefix;
105
- // Removes leading slashes
106
- rawPrefix = rawPrefix.startsWith('/') ? rawPrefix.substring(1) : rawPrefix;
107
- return rawPrefix;
108
- }
109
- }
110
- exports.RestrictObjectPrefixToRoles = RestrictObjectPrefixToRoles;
111
- RestrictObjectPrefixToRoles.READ_ACTIONS = ['s3:GetObject*'];
112
- RestrictObjectPrefixToRoles.READ_WRITE_ACTIONS = [
113
- ...RestrictObjectPrefixToRoles.READ_ACTIONS,
114
- 's3:PutObject',
115
- 's3:PutObjectTagging',
116
- 's3:DeleteObject',
117
- ];
118
- RestrictObjectPrefixToRoles.READ_WRITE_SUPER_ACTIONS = [
119
- ...RestrictObjectPrefixToRoles.READ_WRITE_ACTIONS,
120
- 's3:DeleteObjectVersion',
121
- ];
122
- RestrictObjectPrefixToRoles.BUCKET_ALLOW_ACTIONS = ['s3:List*', 's3:GetBucket*'];
123
- RestrictObjectPrefixToRoles.BUCKET_DENY_ACTIONS = ['s3:PutObject*', 's3:GetObject*', 's3:DeleteObject*'];
124
- /** Helper class for generating bucket policy statements
125
- * which allow or deny access to an entire bucket. Used to
126
- * create bucket-level default deny statements to block accesses
127
- * not granted in the bucket policy. */
128
- class RestrictBucketToRoles {
129
- constructor(props) {
130
- this.resource = [];
131
- this.notResource = [];
132
- this.denyConditionalNotEquals = {};
133
- // Statement allowing access to the bucket for the AROAs
134
- this.allowStatement = new aws_iam_1.PolicyStatement({
135
- sid: `BucketAllow`,
136
- effect: aws_iam_1.Effect.ALLOW,
137
- resources: [props.s3Bucket.bucketArn + '/*', props.s3Bucket.bucketArn],
138
- actions: RestrictObjectPrefixToRoles.BUCKET_ALLOW_ACTIONS,
139
- });
140
- this.allowStatement.addAnyPrincipal();
141
- this.allowStatement.addCondition('StringLike', { 'aws:userId': props.roleExcludeIds.map(x => `${x}:*`) });
142
- // Constuct our deny statement.
143
- // prefixIncludes denotes we want to include a prefix in our deny meaning Resource
144
- if (props.prefixIncludes) {
145
- this.resource = props.prefixIncludes.map(prefix => {
146
- return `${props.s3Bucket.bucketArn}/${this.formatS3Prefix(prefix)}`;
147
- });
148
- }
149
- else {
150
- this.resource = [props.s3Bucket.bucketArn + '/*'];
151
- }
152
- // prefixExcludes denote we want to exclude a prefix in our deny meaning notResource
153
- if (props.prefixExcludes) {
154
- this.notResource = props.prefixExcludes.map(prefix => {
155
- return `${props.s3Bucket.bucketArn}/${this.formatS3Prefix(prefix)}`;
156
- });
157
- }
158
- if (this.notResource.length > 0) {
159
- this.denyStatement = new aws_iam_1.PolicyStatement({
160
- sid: `BucketDeny`,
161
- effect: aws_iam_1.Effect.DENY,
162
- notResources: this.notResource,
163
- actions: RestrictObjectPrefixToRoles.BUCKET_DENY_ACTIONS,
164
- });
165
- }
166
- else {
167
- this.denyStatement = new aws_iam_1.PolicyStatement({
168
- sid: `BucketDeny`,
169
- effect: aws_iam_1.Effect.DENY,
170
- resources: this.resource,
171
- actions: RestrictObjectPrefixToRoles.BUCKET_DENY_ACTIONS,
172
- });
173
- }
174
- this.denyStatement.addAnyPrincipal();
175
- // Build our conditionals.
176
- this.denyConditionalNotEquals['aws:userId'] = props.roleExcludeIds.map(x => `${x}:*`);
177
- if (props.principalExcludes && props.principalExcludes.length > 0) {
178
- this.denyConditionalNotEquals['aws:PrincipalArn'] = [...new Set(props.principalExcludes)].sort((a, b) => a.localeCompare(b));
179
- }
180
- // Construct our conditional for our deny
181
- if (Object.keys(this.denyConditionalNotEquals).length == 1) {
182
- this.denyStatement.addCondition('StringNotLike', this.denyConditionalNotEquals);
183
- }
184
- else {
185
- this.denyStatement.addCondition('ForAnyValue:StringNotLike', this.denyConditionalNotEquals);
186
- }
187
- }
188
- formatS3Prefix(prefix) {
189
- let rawPrefix = prefix;
190
- // Removes trailing slashes
191
- rawPrefix = rawPrefix.endsWith('/') ? rawPrefix.slice(0, -1) : rawPrefix;
192
- // Removes leading slashes
193
- rawPrefix = rawPrefix.startsWith('/') ? rawPrefix.substring(1) : rawPrefix;
194
- return `${rawPrefix}/*`;
195
- }
196
- }
197
- exports.RestrictBucketToRoles = RestrictBucketToRoles;
198
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["index.ts"],"names":[],"mappings":";AAAA;;;GAGG;;;AAEH,iDAA0E;AAsB1E,6GAA6G;AAC7G,MAAa,2BAA2B;IAoBtC,YAAY,KAAmC;QALvC,oBAAe,GAAsB,EAAE,CAAC;QACxC,yBAAoB,GAAsB,EAAE,CAAC;QAC7C,8BAAyB,GAAsB,EAAE,CAAC;QAIxD,IAAI,CAAC,gBAAgB,GAAG,GAAG,GAAG,IAAI,CAAC,cAAc,CAAC,KAAK,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC;QACzE,4EAA4E;QAC5E,IAAI,CAAC,gBAAgB,GAAG,IAAI,CAAC,gBAAgB,CAAC,OAAO,CAAC,MAAM,EAAE,GAAG,CAAC,CAAC;QAEnE,mBAAmB;QACnB,IAAI,KAAK,CAAC,WAAW,IAAI,SAAS,IAAI,KAAK,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACnE,uCAAuC;YACvC,MAAM,SAAS,GAAG,IAAI,CAAC,sBAAsB,CAAC,KAAK,CAAC,CAAC;YACrD,SAAS,CAAC,YAAY,CAAC,YAAY,EAAE,EAAE,YAAY,EAAE,KAAK,CAAC,WAAW,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;YAC7F,SAAS,CAAC,eAAe,EAAE,CAAC;YAC5B,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;QACvC,CAAC;QACD,wBAAwB;QACxB,IAAI,KAAK,CAAC,gBAAgB,IAAI,SAAS,IAAI,KAAK,CAAC,gBAAgB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAC7E,MAAM,SAAS,GAAG,IAAI,CAAC,2BAA2B,CAAC,KAAK,CAAC,CAAC;YAC1D,SAAS,CAAC,YAAY,CAAC,YAAY,EAAE,EAAE,YAAY,EAAE,KAAK,CAAC,gBAAgB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;YAClG,SAAS,CAAC,eAAe,EAAE,CAAC;YAC5B,IAAI,CAAC,oBAAoB,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;QAC5C,CAAC;QAED,6BAA6B;QAC7B,IAAI,KAAK,CAAC,qBAAqB,IAAI,SAAS,IAAI,KAAK,CAAC,qBAAqB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACvF,MAAM,SAAS,GAAG,IAAI,CAAC,gCAAgC,CAAC,KAAK,CAAC,CAAC;YAC/D,SAAS,CAAC,YAAY,CAAC,YAAY,EAAE,EAAE,YAAY,EAAE,KAAK,CAAC,qBAAqB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;YACvG,SAAS,CAAC,eAAe,EAAE,CAAC;YAC5B,IAAI,CAAC,yBAAyB,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;QACjD,CAAC;QAED,sBAAsB;QACtB,IAAI,KAAK,CAAC,cAAc,IAAI,SAAS,IAAI,KAAK,CAAC,cAAc,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACzE,MAAM,SAAS,GAAG,IAAI,CAAC,sBAAsB,CAAC,KAAK,CAAC,CAAC;YACrD,KAAK,CAAC,cAAc,CAAC,OAAO,CAAC,SAAS,CAAC,EAAE;gBACvC,SAAS,CAAC,aAAa,CAAC,SAAS,CAAC,CAAC;YACrC,CAAC,CAAC,CAAC;YACH,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;QACvC,CAAC;QACD,2BAA2B;QAC3B,IAAI,KAAK,CAAC,mBAAmB,IAAI,SAAS,IAAI,KAAK,CAAC,mBAAmB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACnF,MAAM,SAAS,GAAG,IAAI,CAAC,2BAA2B,CAAC,KAAK,CAAC,CAAC;YAC1D,KAAK,CAAC,mBAAmB,CAAC,OAAO,CAAC,SAAS,CAAC,EAAE;gBAC5C,SAAS,CAAC,aAAa,CAAC,SAAS,CAAC,CAAC;YACrC,CAAC,CAAC,CAAC;YACH,IAAI,CAAC,oBAAoB,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;QAC5C,CAAC;QACD,gCAAgC;QAChC,IAAI,KAAK,CAAC,wBAAwB,IAAI,SAAS,IAAI,KAAK,CAAC,wBAAwB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAC7F,MAAM,SAAS,GAAG,IAAI,CAAC,gCAAgC,CAAC,KAAK,CAAC,CAAC;YAC/D,KAAK,CAAC,wBAAwB,CAAC,OAAO,CAAC,SAAS,CAAC,EAAE;gBACjD,SAAS,CAAC,aAAa,CAAC,SAAS,CAAC,CAAC;YACrC,CAAC,CAAC,CAAC;YACH,IAAI,CAAC,yBAAyB,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;QACjD,CAAC;IACH,CAAC;IAEO,sBAAsB,CAAC,KAAmC;QAChE,OAAO,IAAI,yBAAe,CAAC;YACzB,GAAG,EAAE,GAAG,KAAK,CAAC,QAAQ,CAAC,OAAO,CAAC,MAAM,EAAE,EAAE,CAAC,OAAO;YACjD,MAAM,EAAE,gBAAM,CAAC,KAAK;YACpB,SAAS,EAAE,CAAC,KAAK,CAAC,QAAQ,CAAC,SAAS,GAAG,IAAI,CAAC,gBAAgB,CAAC;YAC7D,OAAO,EAAE,2BAA2B,CAAC,YAAY;SAClD,CAAC,CAAC;IACL,CAAC;IAEO,2BAA2B,CAAC,KAAmC;QACrE,OAAO,IAAI,yBAAe,CAAC;YACzB,GAAG,EAAE,GAAG,KAAK,CAAC,QAAQ,CAAC,OAAO,CAAC,MAAM,EAAE,EAAE,CAAC,YAAY;YACtD,MAAM,EAAE,gBAAM,CAAC,KAAK;YACpB,SAAS,EAAE,CAAC,KAAK,CAAC,QAAQ,CAAC,SAAS,GAAG,IAAI,CAAC,gBAAgB,CAAC;YAC7D,OAAO,EAAE,2BAA2B,CAAC,kBAAkB;SACxD,CAAC,CAAC;IACL,CAAC;IAEO,gCAAgC,CAAC,KAAmC;QAC1E,OAAO,IAAI,yBAAe,CAAC;YACzB,GAAG,EAAE,GAAG,KAAK,CAAC,QAAQ,CAAC,OAAO,CAAC,MAAM,EAAE,EAAE,CAAC,iBAAiB;YAC3D,MAAM,EAAE,gBAAM,CAAC,KAAK;YACpB,SAAS,EAAE,CAAC,KAAK,CAAC,QAAQ,CAAC,SAAS,GAAG,IAAI,CAAC,gBAAgB,CAAC;YAC7D,OAAO,EAAE,2BAA2B,CAAC,wBAAwB;SAC9D,CAAC,CAAC;IACL,CAAC;IAEM,cAAc;QACnB,OAAO,IAAI,CAAC,eAAe,CAAC;IAC9B,CAAC;IAEM,mBAAmB;QACxB,OAAO,IAAI,CAAC,oBAAoB,CAAC;IACnC,CAAC;IAEM,wBAAwB;QAC7B,OAAO,IAAI,CAAC,yBAAyB,CAAC;IACxC,CAAC;IAEM,UAAU;QACf,OAAO,CAAC,GAAG,IAAI,CAAC,eAAe,EAAE,GAAG,IAAI,CAAC,oBAAoB,EAAE,GAAG,IAAI,CAAC,yBAAyB,CAAC,CAAC;IACpG,CAAC;IAEM,cAAc,CAAC,MAAc;QAClC,IAAI,SAAS,GAAG,MAAM,CAAC;QAEvB,2BAA2B;QAC3B,SAAS,GAAG,SAAS,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;QACzE,0BAA0B;QAC1B,SAAS,GAAG,SAAS,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;QAC3E,OAAO,SAAS,CAAC;IACnB,CAAC;;AA9HH,kEA+HC;AA9HiB,wCAAY,GAAG,CAAC,eAAe,CAAC,AAApB,CAAqB;AACjC,8CAAkB,GAAG;IACnC,GAAG,2BAA2B,CAAC,YAAY;IAC3C,cAAc;IACd,qBAAqB;IACrB,iBAAiB;CAClB,AALiC,CAKhC;AACc,oDAAwB,GAAG;IACzC,GAAG,2BAA2B,CAAC,kBAAkB;IACjD,wBAAwB;CACzB,AAHuC,CAGtC;AACc,gDAAoB,GAAG,CAAC,UAAU,EAAE,eAAe,CAAC,AAAhC,CAAiC;AACrD,+CAAmB,GAAG,CAAC,eAAe,EAAE,eAAe,EAAE,kBAAkB,CAAC,AAAzD,CAA0D;AAoH/F;;;uCAGuC;AACvC,MAAa,qBAAqB;IAUhC,YAAY,KAA6B;QAPjC,aAAQ,GAAa,EAAE,CAAC;QACxB,gBAAW,GAAa,EAAE,CAAC;QAC3B,6BAAwB,GAG5B,EAAE,CAAC;QAGL,wDAAwD;QACxD,IAAI,CAAC,cAAc,GAAG,IAAI,yBAAe,CAAC;YACxC,GAAG,EAAE,aAAa;YAClB,MAAM,EAAE,gBAAM,CAAC,KAAK;YACpB,SAAS,EAAE,CAAC,KAAK,CAAC,QAAQ,CAAC,SAAS,GAAG,IAAI,EAAE,KAAK,CAAC,QAAQ,CAAC,SAAS,CAAC;YACtE,OAAO,EAAE,2BAA2B,CAAC,oBAAoB;SAC1D,CAAC,CAAC;QACH,IAAI,CAAC,cAAc,CAAC,eAAe,EAAE,CAAC;QACtC,IAAI,CAAC,cAAc,CAAC,YAAY,CAAC,YAAY,EAAE,EAAE,YAAY,EAAE,KAAK,CAAC,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;QAE1G,+BAA+B;QAC/B,kFAAkF;QAClF,IAAI,KAAK,CAAC,cAAc,EAAE,CAAC;YACzB,IAAI,CAAC,QAAQ,GAAG,KAAK,CAAC,cAAc,CAAC,GAAG,CAAC,MAAM,CAAC,EAAE;gBAChD,OAAO,GAAG,KAAK,CAAC,QAAQ,CAAC,SAAS,IAAI,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,EAAE,CAAC;YACtE,CAAC,CAAC,CAAC;QACL,CAAC;aAAM,CAAC;YACN,IAAI,CAAC,QAAQ,GAAG,CAAC,KAAK,CAAC,QAAQ,CAAC,SAAS,GAAG,IAAI,CAAC,CAAC;QACpD,CAAC;QACD,oFAAoF;QACpF,IAAI,KAAK,CAAC,cAAc,EAAE,CAAC;YACzB,IAAI,CAAC,WAAW,GAAG,KAAK,CAAC,cAAc,CAAC,GAAG,CAAC,MAAM,CAAC,EAAE;gBACnD,OAAO,GAAG,KAAK,CAAC,QAAQ,CAAC,SAAS,IAAI,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,EAAE,CAAC;YACtE,CAAC,CAAC,CAAC;QACL,CAAC;QAED,IAAI,IAAI,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAChC,IAAI,CAAC,aAAa,GAAG,IAAI,yBAAe,CAAC;gBACvC,GAAG,EAAE,YAAY;gBACjB,MAAM,EAAE,gBAAM,CAAC,IAAI;gBACnB,YAAY,EAAE,IAAI,CAAC,WAAW;gBAC9B,OAAO,EAAE,2BAA2B,CAAC,mBAAmB;aACzD,CAAC,CAAC;QACL,CAAC;aAAM,CAAC;YACN,IAAI,CAAC,aAAa,GAAG,IAAI,yBAAe,CAAC;gBACvC,GAAG,EAAE,YAAY;gBACjB,MAAM,EAAE,gBAAM,CAAC,IAAI;gBACnB,SAAS,EAAE,IAAI,CAAC,QAAQ;gBACxB,OAAO,EAAE,2BAA2B,CAAC,mBAAmB;aACzD,CAAC,CAAC;QACL,CAAC;QACD,IAAI,CAAC,aAAa,CAAC,eAAe,EAAE,CAAC;QAErC,0BAA0B;QAC1B,IAAI,CAAC,wBAAwB,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC;QACtF,IAAI,KAAK,CAAC,iBAAiB,IAAI,KAAK,CAAC,iBAAiB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAClE,IAAI,CAAC,wBAAwB,CAAC,kBAAkB,CAAC,GAAG,CAAC,GAAG,IAAI,GAAG,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CACtG,CAAC,CAAC,aAAa,CAAC,CAAC,CAAC,CACnB,CAAC;QACJ,CAAC;QAED,yCAAyC;QACzC,IAAI,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,MAAM,IAAI,CAAC,EAAE,CAAC;YAC3D,IAAI,CAAC,aAAa,CAAC,YAAY,CAAC,eAAe,EAAE,IAAI,CAAC,wBAAwB,CAAC,CAAC;QAClF,CAAC;aAAM,CAAC;YACN,IAAI,CAAC,aAAa,CAAC,YAAY,CAAC,2BAA2B,EAAE,IAAI,CAAC,wBAAwB,CAAC,CAAC;QAC9F,CAAC;IACH,CAAC;IAEO,cAAc,CAAC,MAAc;QACnC,IAAI,SAAS,GAAG,MAAM,CAAC;QAEvB,2BAA2B;QAC3B,SAAS,GAAG,SAAS,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;QACzE,0BAA0B;QAC1B,SAAS,GAAG,SAAS,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;QAC3E,OAAO,GAAG,SAAS,IAAI,CAAC;IAC1B,CAAC;CACF;AA/ED,sDA+EC","sourcesContent":["/*!\n * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n * SPDX-License-Identifier: Apache-2.0\n */\n\nimport { IPrincipal, PolicyStatement, Effect } from 'aws-cdk-lib/aws-iam';\nimport { IBucket } from 'aws-cdk-lib/aws-s3';\n\nexport interface IRestrictObjectPrefixToRoles {\n  readonly s3Bucket: IBucket;\n  readonly s3Prefix: string;\n  readonly readRoleIds?: string[];\n  readonly readWriteRoleIds?: string[];\n  readonly readWriteSuperRoleIds?: string[];\n  readonly readPrincipals?: IPrincipal[];\n  readonly readWritePrincipals?: IPrincipal[];\n  readonly readWriteSuperPrincipals?: IPrincipal[];\n}\n\nexport interface IRestrictBucketToRoles {\n  readonly s3Bucket: IBucket;\n  readonly roleExcludeIds: string[];\n  readonly principalExcludes?: string[];\n  readonly prefixExcludes?: string[];\n  readonly prefixIncludes?: string[];\n}\n\n/** Helper class for generating S3 bucket policy statements which grant access to specific object prefixes */\nexport class RestrictObjectPrefixToRoles {\n  static readonly READ_ACTIONS = ['s3:GetObject*'];\n  static readonly READ_WRITE_ACTIONS = [\n    ...RestrictObjectPrefixToRoles.READ_ACTIONS,\n    's3:PutObject',\n    's3:PutObjectTagging',\n    's3:DeleteObject',\n  ];\n  static readonly READ_WRITE_SUPER_ACTIONS = [\n    ...RestrictObjectPrefixToRoles.READ_WRITE_ACTIONS,\n    's3:DeleteObjectVersion',\n  ];\n  static readonly BUCKET_ALLOW_ACTIONS = ['s3:List*', 's3:GetBucket*'];\n  static readonly BUCKET_DENY_ACTIONS = ['s3:PutObject*', 's3:GetObject*', 's3:DeleteObject*'];\n\n  private _readStatements: PolicyStatement[] = [];\n  private _readWriteStatements: PolicyStatement[] = [];\n  private _readWriteSuperStatements: PolicyStatement[] = [];\n  private _formattedPrefix: string;\n\n  constructor(props: IRestrictObjectPrefixToRoles) {\n    this._formattedPrefix = '/' + this.formatS3Prefix(props.s3Prefix) + '/*';\n    // Covers our case where two / get resolved because our prefix is actually /\n    this._formattedPrefix = this._formattedPrefix.replace(/\\/\\//, '/');\n\n    // FEDERATED / READ\n    if (props.readRoleIds != undefined && props.readRoleIds.length > 0) {\n      // Construct our User:Id roles for read\n      const statement = this._readStatementScaffold(props);\n      statement.addCondition('StringLike', { 'aws:userId': props.readRoleIds.map(x => `${x}:*`) });\n      statement.addAnyPrincipal();\n      this._readStatements.push(statement);\n    }\n    // FEDERATED / READWRITE\n    if (props.readWriteRoleIds != undefined && props.readWriteRoleIds.length > 0) {\n      const statement = this._readWriteStatementScaffold(props);\n      statement.addCondition('StringLike', { 'aws:userId': props.readWriteRoleIds.map(x => `${x}:*`) });\n      statement.addAnyPrincipal();\n      this._readWriteStatements.push(statement);\n    }\n\n    // FEDERATED / READWRITESUPER\n    if (props.readWriteSuperRoleIds != undefined && props.readWriteSuperRoleIds.length > 0) {\n      const statement = this._readWriteSuperStatementScaffold(props);\n      statement.addCondition('StringLike', { 'aws:userId': props.readWriteSuperRoleIds.map(x => `${x}:*`) });\n      statement.addAnyPrincipal();\n      this._readWriteSuperStatements.push(statement);\n    }\n\n    // NONFEDERATED / READ\n    if (props.readPrincipals != undefined && props.readPrincipals.length > 0) {\n      const statement = this._readStatementScaffold(props);\n      props.readPrincipals.forEach(principal => {\n        statement.addPrincipals(principal);\n      });\n      this._readStatements.push(statement);\n    }\n    // NONFEDERATED / READWRITE\n    if (props.readWritePrincipals != undefined && props.readWritePrincipals.length > 0) {\n      const statement = this._readWriteStatementScaffold(props);\n      props.readWritePrincipals.forEach(principal => {\n        statement.addPrincipals(principal);\n      });\n      this._readWriteStatements.push(statement);\n    }\n    // NONFEDERATED / READWRITESUPER\n    if (props.readWriteSuperPrincipals != undefined && props.readWriteSuperPrincipals.length > 0) {\n      const statement = this._readWriteSuperStatementScaffold(props);\n      props.readWriteSuperPrincipals.forEach(principal => {\n        statement.addPrincipals(principal);\n      });\n      this._readWriteSuperStatements.push(statement);\n    }\n  }\n\n  private _readStatementScaffold(props: IRestrictObjectPrefixToRoles): PolicyStatement {\n    return new PolicyStatement({\n      sid: `${props.s3Prefix.replace(/\\\\W/g, '')}_Read`,\n      effect: Effect.ALLOW,\n      resources: [props.s3Bucket.bucketArn + this._formattedPrefix],\n      actions: RestrictObjectPrefixToRoles.READ_ACTIONS,\n    });\n  }\n\n  private _readWriteStatementScaffold(props: IRestrictObjectPrefixToRoles): PolicyStatement {\n    return new PolicyStatement({\n      sid: `${props.s3Prefix.replace(/\\\\W/g, '')}_ReadWrite`,\n      effect: Effect.ALLOW,\n      resources: [props.s3Bucket.bucketArn + this._formattedPrefix],\n      actions: RestrictObjectPrefixToRoles.READ_WRITE_ACTIONS,\n    });\n  }\n\n  private _readWriteSuperStatementScaffold(props: IRestrictObjectPrefixToRoles): PolicyStatement {\n    return new PolicyStatement({\n      sid: `${props.s3Prefix.replace(/\\\\W/g, '')}_ReadWriteSuper`,\n      effect: Effect.ALLOW,\n      resources: [props.s3Bucket.bucketArn + this._formattedPrefix],\n      actions: RestrictObjectPrefixToRoles.READ_WRITE_SUPER_ACTIONS,\n    });\n  }\n\n  public readStatements(): PolicyStatement[] {\n    return this._readStatements;\n  }\n\n  public readWriteStatements(): PolicyStatement[] {\n    return this._readWriteStatements;\n  }\n\n  public readWriteSuperStatements(): PolicyStatement[] {\n    return this._readWriteSuperStatements;\n  }\n\n  public statements(): PolicyStatement[] {\n    return [...this._readStatements, ...this._readWriteStatements, ...this._readWriteSuperStatements];\n  }\n\n  public formatS3Prefix(prefix: string): string {\n    let rawPrefix = prefix;\n\n    // Removes trailing slashes\n    rawPrefix = rawPrefix.endsWith('/') ? rawPrefix.slice(0, -1) : rawPrefix;\n    // Removes leading slashes\n    rawPrefix = rawPrefix.startsWith('/') ? rawPrefix.substring(1) : rawPrefix;\n    return rawPrefix;\n  }\n}\n\n/** Helper class for generating bucket policy statements\n * which allow or deny access to an entire bucket. Used to\n * create bucket-level default deny statements to block accesses\n * not granted in the bucket policy. */\nexport class RestrictBucketToRoles {\n  public readonly denyStatement: PolicyStatement;\n  public readonly allowStatement: PolicyStatement;\n  private resource: string[] = [];\n  private notResource: string[] = [];\n  private denyConditionalNotEquals: {\n    'aws:userId'?: string[];\n    'aws:PrincipalArn'?: string[];\n  } = {};\n\n  constructor(props: IRestrictBucketToRoles) {\n    // Statement allowing access to the bucket for the AROAs\n    this.allowStatement = new PolicyStatement({\n      sid: `BucketAllow`,\n      effect: Effect.ALLOW,\n      resources: [props.s3Bucket.bucketArn + '/*', props.s3Bucket.bucketArn],\n      actions: RestrictObjectPrefixToRoles.BUCKET_ALLOW_ACTIONS,\n    });\n    this.allowStatement.addAnyPrincipal();\n    this.allowStatement.addCondition('StringLike', { 'aws:userId': props.roleExcludeIds.map(x => `${x}:*`) });\n\n    // Constuct our deny statement.\n    // prefixIncludes denotes we want to include a prefix in our deny meaning Resource\n    if (props.prefixIncludes) {\n      this.resource = props.prefixIncludes.map(prefix => {\n        return `${props.s3Bucket.bucketArn}/${this.formatS3Prefix(prefix)}`;\n      });\n    } else {\n      this.resource = [props.s3Bucket.bucketArn + '/*'];\n    }\n    // prefixExcludes denote we want to exclude a prefix in our deny meaning notResource\n    if (props.prefixExcludes) {\n      this.notResource = props.prefixExcludes.map(prefix => {\n        return `${props.s3Bucket.bucketArn}/${this.formatS3Prefix(prefix)}`;\n      });\n    }\n\n    if (this.notResource.length > 0) {\n      this.denyStatement = new PolicyStatement({\n        sid: `BucketDeny`,\n        effect: Effect.DENY,\n        notResources: this.notResource,\n        actions: RestrictObjectPrefixToRoles.BUCKET_DENY_ACTIONS,\n      });\n    } else {\n      this.denyStatement = new PolicyStatement({\n        sid: `BucketDeny`,\n        effect: Effect.DENY,\n        resources: this.resource,\n        actions: RestrictObjectPrefixToRoles.BUCKET_DENY_ACTIONS,\n      });\n    }\n    this.denyStatement.addAnyPrincipal();\n\n    // Build our conditionals.\n    this.denyConditionalNotEquals['aws:userId'] = props.roleExcludeIds.map(x => `${x}:*`);\n    if (props.principalExcludes && props.principalExcludes.length > 0) {\n      this.denyConditionalNotEquals['aws:PrincipalArn'] = [...new Set(props.principalExcludes)].sort((a, b) =>\n        a.localeCompare(b),\n      );\n    }\n\n    // Construct our conditional for our deny\n    if (Object.keys(this.denyConditionalNotEquals).length == 1) {\n      this.denyStatement.addCondition('StringNotLike', this.denyConditionalNotEquals);\n    } else {\n      this.denyStatement.addCondition('ForAnyValue:StringNotLike', this.denyConditionalNotEquals);\n    }\n  }\n\n  private formatS3Prefix(prefix: string): string {\n    let rawPrefix = prefix;\n\n    // Removes trailing slashes\n    rawPrefix = rawPrefix.endsWith('/') ? rawPrefix.slice(0, -1) : rawPrefix;\n    // Removes leading slashes\n    rawPrefix = rawPrefix.startsWith('/') ? rawPrefix.substring(1) : rawPrefix;\n    return `${rawPrefix}/*`;\n  }\n}\n"]}
@@ -1,241 +0,0 @@
1
- /*!
2
- * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
3
- * SPDX-License-Identifier: Apache-2.0
4
- */
5
-
6
- import { IPrincipal, PolicyStatement, Effect } from 'aws-cdk-lib/aws-iam';
7
- import { IBucket } from 'aws-cdk-lib/aws-s3';
8
-
9
- export interface IRestrictObjectPrefixToRoles {
10
- readonly s3Bucket: IBucket;
11
- readonly s3Prefix: string;
12
- readonly readRoleIds?: string[];
13
- readonly readWriteRoleIds?: string[];
14
- readonly readWriteSuperRoleIds?: string[];
15
- readonly readPrincipals?: IPrincipal[];
16
- readonly readWritePrincipals?: IPrincipal[];
17
- readonly readWriteSuperPrincipals?: IPrincipal[];
18
- }
19
-
20
- export interface IRestrictBucketToRoles {
21
- readonly s3Bucket: IBucket;
22
- readonly roleExcludeIds: string[];
23
- readonly principalExcludes?: string[];
24
- readonly prefixExcludes?: string[];
25
- readonly prefixIncludes?: string[];
26
- }
27
-
28
- /** Helper class for generating S3 bucket policy statements which grant access to specific object prefixes */
29
- export class RestrictObjectPrefixToRoles {
30
- static readonly READ_ACTIONS = ['s3:GetObject*'];
31
- static readonly READ_WRITE_ACTIONS = [
32
- ...RestrictObjectPrefixToRoles.READ_ACTIONS,
33
- 's3:PutObject',
34
- 's3:PutObjectTagging',
35
- 's3:DeleteObject',
36
- ];
37
- static readonly READ_WRITE_SUPER_ACTIONS = [
38
- ...RestrictObjectPrefixToRoles.READ_WRITE_ACTIONS,
39
- 's3:DeleteObjectVersion',
40
- ];
41
- static readonly BUCKET_ALLOW_ACTIONS = ['s3:List*', 's3:GetBucket*'];
42
- static readonly BUCKET_DENY_ACTIONS = ['s3:PutObject*', 's3:GetObject*', 's3:DeleteObject*'];
43
-
44
- private _readStatements: PolicyStatement[] = [];
45
- private _readWriteStatements: PolicyStatement[] = [];
46
- private _readWriteSuperStatements: PolicyStatement[] = [];
47
- private _formattedPrefix: string;
48
-
49
- constructor(props: IRestrictObjectPrefixToRoles) {
50
- this._formattedPrefix = '/' + this.formatS3Prefix(props.s3Prefix) + '/*';
51
- // Covers our case where two / get resolved because our prefix is actually /
52
- this._formattedPrefix = this._formattedPrefix.replace(/\/\//, '/');
53
-
54
- // FEDERATED / READ
55
- if (props.readRoleIds != undefined && props.readRoleIds.length > 0) {
56
- // Construct our User:Id roles for read
57
- const statement = this._readStatementScaffold(props);
58
- statement.addCondition('StringLike', { 'aws:userId': props.readRoleIds.map(x => `${x}:*`) });
59
- statement.addAnyPrincipal();
60
- this._readStatements.push(statement);
61
- }
62
- // FEDERATED / READWRITE
63
- if (props.readWriteRoleIds != undefined && props.readWriteRoleIds.length > 0) {
64
- const statement = this._readWriteStatementScaffold(props);
65
- statement.addCondition('StringLike', { 'aws:userId': props.readWriteRoleIds.map(x => `${x}:*`) });
66
- statement.addAnyPrincipal();
67
- this._readWriteStatements.push(statement);
68
- }
69
-
70
- // FEDERATED / READWRITESUPER
71
- if (props.readWriteSuperRoleIds != undefined && props.readWriteSuperRoleIds.length > 0) {
72
- const statement = this._readWriteSuperStatementScaffold(props);
73
- statement.addCondition('StringLike', { 'aws:userId': props.readWriteSuperRoleIds.map(x => `${x}:*`) });
74
- statement.addAnyPrincipal();
75
- this._readWriteSuperStatements.push(statement);
76
- }
77
-
78
- // NONFEDERATED / READ
79
- if (props.readPrincipals != undefined && props.readPrincipals.length > 0) {
80
- const statement = this._readStatementScaffold(props);
81
- props.readPrincipals.forEach(principal => {
82
- statement.addPrincipals(principal);
83
- });
84
- this._readStatements.push(statement);
85
- }
86
- // NONFEDERATED / READWRITE
87
- if (props.readWritePrincipals != undefined && props.readWritePrincipals.length > 0) {
88
- const statement = this._readWriteStatementScaffold(props);
89
- props.readWritePrincipals.forEach(principal => {
90
- statement.addPrincipals(principal);
91
- });
92
- this._readWriteStatements.push(statement);
93
- }
94
- // NONFEDERATED / READWRITESUPER
95
- if (props.readWriteSuperPrincipals != undefined && props.readWriteSuperPrincipals.length > 0) {
96
- const statement = this._readWriteSuperStatementScaffold(props);
97
- props.readWriteSuperPrincipals.forEach(principal => {
98
- statement.addPrincipals(principal);
99
- });
100
- this._readWriteSuperStatements.push(statement);
101
- }
102
- }
103
-
104
- private _readStatementScaffold(props: IRestrictObjectPrefixToRoles): PolicyStatement {
105
- return new PolicyStatement({
106
- sid: `${props.s3Prefix.replace(/\\W/g, '')}_Read`,
107
- effect: Effect.ALLOW,
108
- resources: [props.s3Bucket.bucketArn + this._formattedPrefix],
109
- actions: RestrictObjectPrefixToRoles.READ_ACTIONS,
110
- });
111
- }
112
-
113
- private _readWriteStatementScaffold(props: IRestrictObjectPrefixToRoles): PolicyStatement {
114
- return new PolicyStatement({
115
- sid: `${props.s3Prefix.replace(/\\W/g, '')}_ReadWrite`,
116
- effect: Effect.ALLOW,
117
- resources: [props.s3Bucket.bucketArn + this._formattedPrefix],
118
- actions: RestrictObjectPrefixToRoles.READ_WRITE_ACTIONS,
119
- });
120
- }
121
-
122
- private _readWriteSuperStatementScaffold(props: IRestrictObjectPrefixToRoles): PolicyStatement {
123
- return new PolicyStatement({
124
- sid: `${props.s3Prefix.replace(/\\W/g, '')}_ReadWriteSuper`,
125
- effect: Effect.ALLOW,
126
- resources: [props.s3Bucket.bucketArn + this._formattedPrefix],
127
- actions: RestrictObjectPrefixToRoles.READ_WRITE_SUPER_ACTIONS,
128
- });
129
- }
130
-
131
- public readStatements(): PolicyStatement[] {
132
- return this._readStatements;
133
- }
134
-
135
- public readWriteStatements(): PolicyStatement[] {
136
- return this._readWriteStatements;
137
- }
138
-
139
- public readWriteSuperStatements(): PolicyStatement[] {
140
- return this._readWriteSuperStatements;
141
- }
142
-
143
- public statements(): PolicyStatement[] {
144
- return [...this._readStatements, ...this._readWriteStatements, ...this._readWriteSuperStatements];
145
- }
146
-
147
- public formatS3Prefix(prefix: string): string {
148
- let rawPrefix = prefix;
149
-
150
- // Removes trailing slashes
151
- rawPrefix = rawPrefix.endsWith('/') ? rawPrefix.slice(0, -1) : rawPrefix;
152
- // Removes leading slashes
153
- rawPrefix = rawPrefix.startsWith('/') ? rawPrefix.substring(1) : rawPrefix;
154
- return rawPrefix;
155
- }
156
- }
157
-
158
- /** Helper class for generating bucket policy statements
159
- * which allow or deny access to an entire bucket. Used to
160
- * create bucket-level default deny statements to block accesses
161
- * not granted in the bucket policy. */
162
- export class RestrictBucketToRoles {
163
- public readonly denyStatement: PolicyStatement;
164
- public readonly allowStatement: PolicyStatement;
165
- private resource: string[] = [];
166
- private notResource: string[] = [];
167
- private denyConditionalNotEquals: {
168
- 'aws:userId'?: string[];
169
- 'aws:PrincipalArn'?: string[];
170
- } = {};
171
-
172
- constructor(props: IRestrictBucketToRoles) {
173
- // Statement allowing access to the bucket for the AROAs
174
- this.allowStatement = new PolicyStatement({
175
- sid: `BucketAllow`,
176
- effect: Effect.ALLOW,
177
- resources: [props.s3Bucket.bucketArn + '/*', props.s3Bucket.bucketArn],
178
- actions: RestrictObjectPrefixToRoles.BUCKET_ALLOW_ACTIONS,
179
- });
180
- this.allowStatement.addAnyPrincipal();
181
- this.allowStatement.addCondition('StringLike', { 'aws:userId': props.roleExcludeIds.map(x => `${x}:*`) });
182
-
183
- // Constuct our deny statement.
184
- // prefixIncludes denotes we want to include a prefix in our deny meaning Resource
185
- if (props.prefixIncludes) {
186
- this.resource = props.prefixIncludes.map(prefix => {
187
- return `${props.s3Bucket.bucketArn}/${this.formatS3Prefix(prefix)}`;
188
- });
189
- } else {
190
- this.resource = [props.s3Bucket.bucketArn + '/*'];
191
- }
192
- // prefixExcludes denote we want to exclude a prefix in our deny meaning notResource
193
- if (props.prefixExcludes) {
194
- this.notResource = props.prefixExcludes.map(prefix => {
195
- return `${props.s3Bucket.bucketArn}/${this.formatS3Prefix(prefix)}`;
196
- });
197
- }
198
-
199
- if (this.notResource.length > 0) {
200
- this.denyStatement = new PolicyStatement({
201
- sid: `BucketDeny`,
202
- effect: Effect.DENY,
203
- notResources: this.notResource,
204
- actions: RestrictObjectPrefixToRoles.BUCKET_DENY_ACTIONS,
205
- });
206
- } else {
207
- this.denyStatement = new PolicyStatement({
208
- sid: `BucketDeny`,
209
- effect: Effect.DENY,
210
- resources: this.resource,
211
- actions: RestrictObjectPrefixToRoles.BUCKET_DENY_ACTIONS,
212
- });
213
- }
214
- this.denyStatement.addAnyPrincipal();
215
-
216
- // Build our conditionals.
217
- this.denyConditionalNotEquals['aws:userId'] = props.roleExcludeIds.map(x => `${x}:*`);
218
- if (props.principalExcludes && props.principalExcludes.length > 0) {
219
- this.denyConditionalNotEquals['aws:PrincipalArn'] = [...new Set(props.principalExcludes)].sort((a, b) =>
220
- a.localeCompare(b),
221
- );
222
- }
223
-
224
- // Construct our conditional for our deny
225
- if (Object.keys(this.denyConditionalNotEquals).length == 1) {
226
- this.denyStatement.addCondition('StringNotLike', this.denyConditionalNotEquals);
227
- } else {
228
- this.denyStatement.addCondition('ForAnyValue:StringNotLike', this.denyConditionalNotEquals);
229
- }
230
- }
231
-
232
- private formatS3Prefix(prefix: string): string {
233
- let rawPrefix = prefix;
234
-
235
- // Removes trailing slashes
236
- rawPrefix = rawPrefix.endsWith('/') ? rawPrefix.slice(0, -1) : rawPrefix;
237
- // Removes leading slashes
238
- rawPrefix = rawPrefix.startsWith('/') ? rawPrefix.substring(1) : rawPrefix;
239
- return `${rawPrefix}/*`;
240
- }
241
- }
@@ -1,44 +0,0 @@
1
- {
2
- "name": "@aws-mdaa/s3-bucketpolicy-helper",
3
- "description": "MDAA s3-bucketpolicy-helper utility",
4
- "author": {
5
- "name": "Amazon Web Services",
6
- "url": "https://aws.amazon.com/solutions"
7
- },
8
- "version": "1.5.0",
9
- "license": "Apache-2.0",
10
- "main": "lib/index.js",
11
- "types": "lib/index.d.ts",
12
- "scripts": {
13
- "build": "tsc",
14
- "watch": "tsc -w",
15
- "test": "jest --passWithNoTests --testPathIgnorePatterns='.*\\.snapshot\\.test\\.ts'",
16
- "lint": "eslint --max-warnings 0 -c ../../../eslint.config.mjs",
17
- "test:coverage": "jest --passWithNoTests --coverage --testPathIgnorePatterns='.*\\.snapshot\\.test\\.ts'",
18
- "test:snapshots": "jest --passWithNoTests --testPathPattern='.*\\.snapshot\\.test\\.ts'",
19
- "test:snapshots:update": "jest --passWithNoTests --testPathPattern='.*\\.snapshot\\.test\\.ts' --updateSnapshot"
20
- },
21
- "devDependencies": {
22
- "@aws-mdaa/testing": "1.5.0",
23
- "@types/jest": "29.5.14",
24
- "@types/node": "22.9.0",
25
- "@types/prettier": "2.6.0",
26
- "jest": "29.7.0",
27
- "ts-jest": "29.4.6",
28
- "ts-node": "10.9.2",
29
- "typescript": "5.9.3",
30
- "typescript-json-schema": "0.67.1"
31
- },
32
- "dependencies": {
33
- "@aws-mdaa/iam-role-helper": "1.5.0",
34
- "@aws-mdaa/naming": "1.5.0",
35
- "aws-cdk-lib": "2.220.0",
36
- "cdk-nag": "2.37.55",
37
- "constructs": "10.0.96"
38
- },
39
- "gitHead": "8b49a2b371014baec046605ffdbfe38951099c31",
40
- "repository": {
41
- "type": "git",
42
- "url": "https://github.com/aws/modern-data-architecture-accelerator"
43
- }
44
- }