@aws-mdaa/dataops-job-l3-construct 1.5.0 → 1.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +38 -28
- package/README.md +5 -0
- package/lib/dataops-job-l3-construct.d.ts +8 -1
- package/lib/dataops-job-l3-construct.js +40 -13
- package/node_modules/@aws-mdaa/config/README.md +3 -0
- package/node_modules/@aws-mdaa/config/lib/blueprint-value-transformer.d.ts +20 -0
- package/node_modules/@aws-mdaa/config/lib/blueprint-value-transformer.js +70 -0
- package/node_modules/@aws-mdaa/config/lib/blueprint-value-transformer.ts +88 -0
- package/node_modules/@aws-mdaa/config/lib/config.d.ts +87 -0
- package/node_modules/@aws-mdaa/config/lib/config.js +7 -0
- package/node_modules/@aws-mdaa/config/lib/config.ts +92 -0
- package/node_modules/@aws-mdaa/config/lib/index.d.ts +11 -0
- package/node_modules/@aws-mdaa/config/lib/index.js +28 -0
- package/node_modules/@aws-mdaa/config/lib/index.ts +12 -0
- package/node_modules/@aws-mdaa/config/lib/param-transformer.d.ts +49 -0
- package/node_modules/@aws-mdaa/config/lib/param-transformer.js +160 -0
- package/node_modules/@aws-mdaa/config/lib/param-transformer.ts +159 -0
- package/node_modules/@aws-mdaa/config/lib/path-value-transformer.d.ts +10 -0
- package/node_modules/@aws-mdaa/config/lib/path-value-transformer.js +30 -0
- package/node_modules/@aws-mdaa/config/lib/path-value-transformer.ts +27 -0
- package/node_modules/@aws-mdaa/config/lib/ref-value-transformer.d.ts +44 -0
- package/node_modules/@aws-mdaa/config/lib/ref-value-transformer.js +243 -0
- package/node_modules/@aws-mdaa/config/lib/ref-value-transformer.ts +302 -0
- package/node_modules/@aws-mdaa/config/lib/ssm-ref-transformer.d.ts +8 -0
- package/node_modules/@aws-mdaa/config/lib/ssm-ref-transformer.js +22 -0
- package/node_modules/@aws-mdaa/config/lib/ssm-ref-transformer.ts +21 -0
- package/node_modules/@aws-mdaa/config/lib/transformer.d.ts +35 -0
- package/node_modules/@aws-mdaa/config/lib/transformer.js +66 -0
- package/node_modules/@aws-mdaa/config/lib/transformer.ts +74 -0
- package/node_modules/@aws-mdaa/config/package.json +42 -0
- package/node_modules/@aws-mdaa/config/test/blueprint-value-transformer.test.js +224 -0
- package/node_modules/@aws-mdaa/config/test/blueprint-value-transformer.test.ts +259 -0
- package/node_modules/@aws-mdaa/config/test/config-nt.test.d.ts +5 -0
- package/node_modules/@aws-mdaa/config/test/config-nt.test.js +129 -0
- package/node_modules/@aws-mdaa/config/test/config-nt.test.ts +163 -0
- package/node_modules/@aws-mdaa/config/test/config.test.d.ts +5 -0
- package/node_modules/@aws-mdaa/config/test/config.test.js +409 -0
- package/node_modules/@aws-mdaa/config/test/config.test.ts +517 -0
- package/node_modules/@aws-mdaa/config/test/param-transformer.test.d.ts +5 -0
- package/node_modules/@aws-mdaa/config/test/param-transformer.test.js +216 -0
- package/node_modules/@aws-mdaa/config/test/param-transformer.test.ts +234 -0
- package/node_modules/@aws-mdaa/config/test/path-value-transformer.test.d.ts +5 -0
- package/node_modules/@aws-mdaa/config/test/path-value-transformer.test.js +59 -0
- package/node_modules/@aws-mdaa/config/test/path-value-transformer.test.ts +68 -0
- package/node_modules/@aws-mdaa/config/test/ref-value-transformer.test.d.ts +5 -0
- package/node_modules/@aws-mdaa/config/test/ref-value-transformer.test.js +254 -0
- package/node_modules/@aws-mdaa/config/test/ref-value-transformer.test.ts +304 -0
- package/node_modules/@aws-mdaa/config/test/ssm-ref-transformer.test.d.ts +5 -0
- package/node_modules/@aws-mdaa/config/test/ssm-ref-transformer.test.js +66 -0
- package/node_modules/@aws-mdaa/config/test/ssm-ref-transformer.test.ts +79 -0
- package/node_modules/@aws-mdaa/config/tsconfig.tsbuildinfo +1 -0
- package/node_modules/lodash/README.md +2 -2
- package/node_modules/lodash/_baseOrderBy.js +1 -1
- package/node_modules/lodash/_baseUnset.js +7 -20
- package/node_modules/lodash/_setCacheHas.js +1 -1
- package/node_modules/lodash/compact.js +1 -1
- package/node_modules/lodash/core.js +3 -3
- package/node_modules/lodash/core.min.js +26 -25
- package/node_modules/lodash/fromPairs.js +3 -1
- package/node_modules/lodash/lodash.js +38 -27
- package/node_modules/lodash/lodash.min.js +125 -129
- package/node_modules/lodash/package.json +4 -2
- package/node_modules/lodash/random.js +9 -0
- package/node_modules/lodash/template.js +16 -4
- package/node_modules/lodash/templateSettings.js +4 -0
- package/package.json +27 -32
- package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/README.md +0 -185
- package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/lib/index.d.ts +0 -57
- package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/lib/index.js +0 -198
- package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/lib/index.ts +0 -241
- package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/package.json +0 -44
- package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/test/bucketpolicy-helper.test.js +0 -200
- package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/test/bucketpolicy-helper.test.ts +0 -215
- package/node_modules/@aws-mdaa/s3-bucketpolicy-helper/tsconfig.tsbuildinfo +0 -1
- package/node_modules/@aws-mdaa/s3-inventory-helper/.npmignore +0 -34
- package/node_modules/@aws-mdaa/s3-inventory-helper/README.md +0 -3
- package/node_modules/@aws-mdaa/s3-inventory-helper/jest.config.js +0 -5
- package/node_modules/@aws-mdaa/s3-inventory-helper/lib/index.d.ts +0 -48
- package/node_modules/@aws-mdaa/s3-inventory-helper/lib/index.js +0 -213
- package/node_modules/@aws-mdaa/s3-inventory-helper/lib/index.ts +0 -241
- package/node_modules/@aws-mdaa/s3-inventory-helper/package.json +0 -44
- package/node_modules/@aws-mdaa/s3-inventory-helper/test/TODO +0 -0
- package/node_modules/@aws-mdaa/s3-inventory-helper/tsconfig.json +0 -40
- package/node_modules/@aws-mdaa/s3-inventory-helper/tsconfig.tsbuildinfo +0 -1
- package/node_modules/@aws-mdaa/s3-inventory-helper/typedoc.json +0 -7
- /package/node_modules/@aws-mdaa/{s3-bucketpolicy-helper → config}/.npmignore +0 -0
- /package/node_modules/@aws-mdaa/{s3-bucketpolicy-helper → config}/jest.config.js +0 -0
- /package/node_modules/@aws-mdaa/{s3-bucketpolicy-helper/test/bucketpolicy-helper.test.d.ts → config/test/blueprint-value-transformer.test.d.ts} +0 -0
- /package/node_modules/@aws-mdaa/{s3-bucketpolicy-helper → config}/tsconfig.json +0 -0
- /package/node_modules/@aws-mdaa/{s3-bucketpolicy-helper → config}/typedoc.json +0 -0
|
@@ -1,198 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
/*!
|
|
3
|
-
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
|
4
|
-
* SPDX-License-Identifier: Apache-2.0
|
|
5
|
-
*/
|
|
6
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
7
|
-
exports.RestrictBucketToRoles = exports.RestrictObjectPrefixToRoles = void 0;
|
|
8
|
-
const aws_iam_1 = require("aws-cdk-lib/aws-iam");
|
|
9
|
-
/** Helper class for generating S3 bucket policy statements which grant access to specific object prefixes */
|
|
10
|
-
class RestrictObjectPrefixToRoles {
|
|
11
|
-
constructor(props) {
|
|
12
|
-
this._readStatements = [];
|
|
13
|
-
this._readWriteStatements = [];
|
|
14
|
-
this._readWriteSuperStatements = [];
|
|
15
|
-
this._formattedPrefix = '/' + this.formatS3Prefix(props.s3Prefix) + '/*';
|
|
16
|
-
// Covers our case where two / get resolved because our prefix is actually /
|
|
17
|
-
this._formattedPrefix = this._formattedPrefix.replace(/\/\//, '/');
|
|
18
|
-
// FEDERATED / READ
|
|
19
|
-
if (props.readRoleIds != undefined && props.readRoleIds.length > 0) {
|
|
20
|
-
// Construct our User:Id roles for read
|
|
21
|
-
const statement = this._readStatementScaffold(props);
|
|
22
|
-
statement.addCondition('StringLike', { 'aws:userId': props.readRoleIds.map(x => `${x}:*`) });
|
|
23
|
-
statement.addAnyPrincipal();
|
|
24
|
-
this._readStatements.push(statement);
|
|
25
|
-
}
|
|
26
|
-
// FEDERATED / READWRITE
|
|
27
|
-
if (props.readWriteRoleIds != undefined && props.readWriteRoleIds.length > 0) {
|
|
28
|
-
const statement = this._readWriteStatementScaffold(props);
|
|
29
|
-
statement.addCondition('StringLike', { 'aws:userId': props.readWriteRoleIds.map(x => `${x}:*`) });
|
|
30
|
-
statement.addAnyPrincipal();
|
|
31
|
-
this._readWriteStatements.push(statement);
|
|
32
|
-
}
|
|
33
|
-
// FEDERATED / READWRITESUPER
|
|
34
|
-
if (props.readWriteSuperRoleIds != undefined && props.readWriteSuperRoleIds.length > 0) {
|
|
35
|
-
const statement = this._readWriteSuperStatementScaffold(props);
|
|
36
|
-
statement.addCondition('StringLike', { 'aws:userId': props.readWriteSuperRoleIds.map(x => `${x}:*`) });
|
|
37
|
-
statement.addAnyPrincipal();
|
|
38
|
-
this._readWriteSuperStatements.push(statement);
|
|
39
|
-
}
|
|
40
|
-
// NONFEDERATED / READ
|
|
41
|
-
if (props.readPrincipals != undefined && props.readPrincipals.length > 0) {
|
|
42
|
-
const statement = this._readStatementScaffold(props);
|
|
43
|
-
props.readPrincipals.forEach(principal => {
|
|
44
|
-
statement.addPrincipals(principal);
|
|
45
|
-
});
|
|
46
|
-
this._readStatements.push(statement);
|
|
47
|
-
}
|
|
48
|
-
// NONFEDERATED / READWRITE
|
|
49
|
-
if (props.readWritePrincipals != undefined && props.readWritePrincipals.length > 0) {
|
|
50
|
-
const statement = this._readWriteStatementScaffold(props);
|
|
51
|
-
props.readWritePrincipals.forEach(principal => {
|
|
52
|
-
statement.addPrincipals(principal);
|
|
53
|
-
});
|
|
54
|
-
this._readWriteStatements.push(statement);
|
|
55
|
-
}
|
|
56
|
-
// NONFEDERATED / READWRITESUPER
|
|
57
|
-
if (props.readWriteSuperPrincipals != undefined && props.readWriteSuperPrincipals.length > 0) {
|
|
58
|
-
const statement = this._readWriteSuperStatementScaffold(props);
|
|
59
|
-
props.readWriteSuperPrincipals.forEach(principal => {
|
|
60
|
-
statement.addPrincipals(principal);
|
|
61
|
-
});
|
|
62
|
-
this._readWriteSuperStatements.push(statement);
|
|
63
|
-
}
|
|
64
|
-
}
|
|
65
|
-
_readStatementScaffold(props) {
|
|
66
|
-
return new aws_iam_1.PolicyStatement({
|
|
67
|
-
sid: `${props.s3Prefix.replace(/\\W/g, '')}_Read`,
|
|
68
|
-
effect: aws_iam_1.Effect.ALLOW,
|
|
69
|
-
resources: [props.s3Bucket.bucketArn + this._formattedPrefix],
|
|
70
|
-
actions: RestrictObjectPrefixToRoles.READ_ACTIONS,
|
|
71
|
-
});
|
|
72
|
-
}
|
|
73
|
-
_readWriteStatementScaffold(props) {
|
|
74
|
-
return new aws_iam_1.PolicyStatement({
|
|
75
|
-
sid: `${props.s3Prefix.replace(/\\W/g, '')}_ReadWrite`,
|
|
76
|
-
effect: aws_iam_1.Effect.ALLOW,
|
|
77
|
-
resources: [props.s3Bucket.bucketArn + this._formattedPrefix],
|
|
78
|
-
actions: RestrictObjectPrefixToRoles.READ_WRITE_ACTIONS,
|
|
79
|
-
});
|
|
80
|
-
}
|
|
81
|
-
_readWriteSuperStatementScaffold(props) {
|
|
82
|
-
return new aws_iam_1.PolicyStatement({
|
|
83
|
-
sid: `${props.s3Prefix.replace(/\\W/g, '')}_ReadWriteSuper`,
|
|
84
|
-
effect: aws_iam_1.Effect.ALLOW,
|
|
85
|
-
resources: [props.s3Bucket.bucketArn + this._formattedPrefix],
|
|
86
|
-
actions: RestrictObjectPrefixToRoles.READ_WRITE_SUPER_ACTIONS,
|
|
87
|
-
});
|
|
88
|
-
}
|
|
89
|
-
readStatements() {
|
|
90
|
-
return this._readStatements;
|
|
91
|
-
}
|
|
92
|
-
readWriteStatements() {
|
|
93
|
-
return this._readWriteStatements;
|
|
94
|
-
}
|
|
95
|
-
readWriteSuperStatements() {
|
|
96
|
-
return this._readWriteSuperStatements;
|
|
97
|
-
}
|
|
98
|
-
statements() {
|
|
99
|
-
return [...this._readStatements, ...this._readWriteStatements, ...this._readWriteSuperStatements];
|
|
100
|
-
}
|
|
101
|
-
formatS3Prefix(prefix) {
|
|
102
|
-
let rawPrefix = prefix;
|
|
103
|
-
// Removes trailing slashes
|
|
104
|
-
rawPrefix = rawPrefix.endsWith('/') ? rawPrefix.slice(0, -1) : rawPrefix;
|
|
105
|
-
// Removes leading slashes
|
|
106
|
-
rawPrefix = rawPrefix.startsWith('/') ? rawPrefix.substring(1) : rawPrefix;
|
|
107
|
-
return rawPrefix;
|
|
108
|
-
}
|
|
109
|
-
}
|
|
110
|
-
exports.RestrictObjectPrefixToRoles = RestrictObjectPrefixToRoles;
|
|
111
|
-
RestrictObjectPrefixToRoles.READ_ACTIONS = ['s3:GetObject*'];
|
|
112
|
-
RestrictObjectPrefixToRoles.READ_WRITE_ACTIONS = [
|
|
113
|
-
...RestrictObjectPrefixToRoles.READ_ACTIONS,
|
|
114
|
-
's3:PutObject',
|
|
115
|
-
's3:PutObjectTagging',
|
|
116
|
-
's3:DeleteObject',
|
|
117
|
-
];
|
|
118
|
-
RestrictObjectPrefixToRoles.READ_WRITE_SUPER_ACTIONS = [
|
|
119
|
-
...RestrictObjectPrefixToRoles.READ_WRITE_ACTIONS,
|
|
120
|
-
's3:DeleteObjectVersion',
|
|
121
|
-
];
|
|
122
|
-
RestrictObjectPrefixToRoles.BUCKET_ALLOW_ACTIONS = ['s3:List*', 's3:GetBucket*'];
|
|
123
|
-
RestrictObjectPrefixToRoles.BUCKET_DENY_ACTIONS = ['s3:PutObject*', 's3:GetObject*', 's3:DeleteObject*'];
|
|
124
|
-
/** Helper class for generating bucket policy statements
|
|
125
|
-
* which allow or deny access to an entire bucket. Used to
|
|
126
|
-
* create bucket-level default deny statements to block accesses
|
|
127
|
-
* not granted in the bucket policy. */
|
|
128
|
-
class RestrictBucketToRoles {
|
|
129
|
-
constructor(props) {
|
|
130
|
-
this.resource = [];
|
|
131
|
-
this.notResource = [];
|
|
132
|
-
this.denyConditionalNotEquals = {};
|
|
133
|
-
// Statement allowing access to the bucket for the AROAs
|
|
134
|
-
this.allowStatement = new aws_iam_1.PolicyStatement({
|
|
135
|
-
sid: `BucketAllow`,
|
|
136
|
-
effect: aws_iam_1.Effect.ALLOW,
|
|
137
|
-
resources: [props.s3Bucket.bucketArn + '/*', props.s3Bucket.bucketArn],
|
|
138
|
-
actions: RestrictObjectPrefixToRoles.BUCKET_ALLOW_ACTIONS,
|
|
139
|
-
});
|
|
140
|
-
this.allowStatement.addAnyPrincipal();
|
|
141
|
-
this.allowStatement.addCondition('StringLike', { 'aws:userId': props.roleExcludeIds.map(x => `${x}:*`) });
|
|
142
|
-
// Constuct our deny statement.
|
|
143
|
-
// prefixIncludes denotes we want to include a prefix in our deny meaning Resource
|
|
144
|
-
if (props.prefixIncludes) {
|
|
145
|
-
this.resource = props.prefixIncludes.map(prefix => {
|
|
146
|
-
return `${props.s3Bucket.bucketArn}/${this.formatS3Prefix(prefix)}`;
|
|
147
|
-
});
|
|
148
|
-
}
|
|
149
|
-
else {
|
|
150
|
-
this.resource = [props.s3Bucket.bucketArn + '/*'];
|
|
151
|
-
}
|
|
152
|
-
// prefixExcludes denote we want to exclude a prefix in our deny meaning notResource
|
|
153
|
-
if (props.prefixExcludes) {
|
|
154
|
-
this.notResource = props.prefixExcludes.map(prefix => {
|
|
155
|
-
return `${props.s3Bucket.bucketArn}/${this.formatS3Prefix(prefix)}`;
|
|
156
|
-
});
|
|
157
|
-
}
|
|
158
|
-
if (this.notResource.length > 0) {
|
|
159
|
-
this.denyStatement = new aws_iam_1.PolicyStatement({
|
|
160
|
-
sid: `BucketDeny`,
|
|
161
|
-
effect: aws_iam_1.Effect.DENY,
|
|
162
|
-
notResources: this.notResource,
|
|
163
|
-
actions: RestrictObjectPrefixToRoles.BUCKET_DENY_ACTIONS,
|
|
164
|
-
});
|
|
165
|
-
}
|
|
166
|
-
else {
|
|
167
|
-
this.denyStatement = new aws_iam_1.PolicyStatement({
|
|
168
|
-
sid: `BucketDeny`,
|
|
169
|
-
effect: aws_iam_1.Effect.DENY,
|
|
170
|
-
resources: this.resource,
|
|
171
|
-
actions: RestrictObjectPrefixToRoles.BUCKET_DENY_ACTIONS,
|
|
172
|
-
});
|
|
173
|
-
}
|
|
174
|
-
this.denyStatement.addAnyPrincipal();
|
|
175
|
-
// Build our conditionals.
|
|
176
|
-
this.denyConditionalNotEquals['aws:userId'] = props.roleExcludeIds.map(x => `${x}:*`);
|
|
177
|
-
if (props.principalExcludes && props.principalExcludes.length > 0) {
|
|
178
|
-
this.denyConditionalNotEquals['aws:PrincipalArn'] = [...new Set(props.principalExcludes)].sort((a, b) => a.localeCompare(b));
|
|
179
|
-
}
|
|
180
|
-
// Construct our conditional for our deny
|
|
181
|
-
if (Object.keys(this.denyConditionalNotEquals).length == 1) {
|
|
182
|
-
this.denyStatement.addCondition('StringNotLike', this.denyConditionalNotEquals);
|
|
183
|
-
}
|
|
184
|
-
else {
|
|
185
|
-
this.denyStatement.addCondition('ForAnyValue:StringNotLike', this.denyConditionalNotEquals);
|
|
186
|
-
}
|
|
187
|
-
}
|
|
188
|
-
formatS3Prefix(prefix) {
|
|
189
|
-
let rawPrefix = prefix;
|
|
190
|
-
// Removes trailing slashes
|
|
191
|
-
rawPrefix = rawPrefix.endsWith('/') ? rawPrefix.slice(0, -1) : rawPrefix;
|
|
192
|
-
// Removes leading slashes
|
|
193
|
-
rawPrefix = rawPrefix.startsWith('/') ? rawPrefix.substring(1) : rawPrefix;
|
|
194
|
-
return `${rawPrefix}/*`;
|
|
195
|
-
}
|
|
196
|
-
}
|
|
197
|
-
exports.RestrictBucketToRoles = RestrictBucketToRoles;
|
|
198
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["index.ts"],"names":[],"mappings":";AAAA;;;GAGG;;;AAEH,iDAA0E;AAsB1E,6GAA6G;AAC7G,MAAa,2BAA2B;IAoBtC,YAAY,KAAmC;QALvC,oBAAe,GAAsB,EAAE,CAAC;QACxC,yBAAoB,GAAsB,EAAE,CAAC;QAC7C,8BAAyB,GAAsB,EAAE,CAAC;QAIxD,IAAI,CAAC,gBAAgB,GAAG,GAAG,GAAG,IAAI,CAAC,cAAc,CAAC,KAAK,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC;QACzE,4EAA4E;QAC5E,IAAI,CAAC,gBAAgB,GAAG,IAAI,CAAC,gBAAgB,CAAC,OAAO,CAAC,MAAM,EAAE,GAAG,CAAC,CAAC;QAEnE,mBAAmB;QACnB,IAAI,KAAK,CAAC,WAAW,IAAI,SAAS,IAAI,KAAK,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACnE,uCAAuC;YACvC,MAAM,SAAS,GAAG,IAAI,CAAC,sBAAsB,CAAC,KAAK,CAAC,CAAC;YACrD,SAAS,CAAC,YAAY,CAAC,YAAY,EAAE,EAAE,YAAY,EAAE,KAAK,CAAC,WAAW,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;YAC7F,SAAS,CAAC,eAAe,EAAE,CAAC;YAC5B,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;QACvC,CAAC;QACD,wBAAwB;QACxB,IAAI,KAAK,CAAC,gBAAgB,IAAI,SAAS,IAAI,KAAK,CAAC,gBAAgB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAC7E,MAAM,SAAS,GAAG,IAAI,CAAC,2BAA2B,CAAC,KAAK,CAAC,CAAC;YAC1D,SAAS,CAAC,YAAY,CAAC,YAAY,EAAE,EAAE,YAAY,EAAE,KAAK,CAAC,gBAAgB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;YAClG,SAAS,CAAC,eAAe,EAAE,CAAC;YAC5B,IAAI,CAAC,oBAAoB,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;QAC5C,CAAC;QAED,6BAA6B;QAC7B,IAAI,KAAK,CAAC,qBAAqB,IAAI,SAAS,IAAI,KAAK,CAAC,qBAAqB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACvF,MAAM,SAAS,GAAG,IAAI,CAAC,gCAAgC,CAAC,KAAK,CAAC,CAAC;YAC/D,SAAS,CAAC,YAAY,CAAC,YAAY,EAAE,EAAE,YAAY,EAAE,KAAK,CAAC,qBAAqB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;YACvG,SAAS,CAAC,eAAe,EAAE,CAAC;YAC5B,IAAI,CAAC,yBAAyB,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;QACjD,CAAC;QAED,sBAAsB;QACtB,IAAI,KAAK,CAAC,cAAc,IAAI,SAAS,IAAI,KAAK,CAAC,cAAc,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACzE,MAAM,SAAS,GAAG,IAAI,CAAC,sBAAsB,CAAC,KAAK,CAAC,CAAC;YACrD,KAAK,CAAC,cAAc,CAAC,OAAO,CAAC,SAAS,CAAC,EAAE;gBACvC,SAAS,CAAC,aAAa,CAAC,SAAS,CAAC,CAAC;YACrC,CAAC,CAAC,CAAC;YACH,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;QACvC,CAAC;QACD,2BAA2B;QAC3B,IAAI,KAAK,CAAC,mBAAmB,IAAI,SAAS,IAAI,KAAK,CAAC,mBAAmB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACnF,MAAM,SAAS,GAAG,IAAI,CAAC,2BAA2B,CAAC,KAAK,CAAC,CAAC;YAC1D,KAAK,CAAC,mBAAmB,CAAC,OAAO,CAAC,SAAS,CAAC,EAAE;gBAC5C,SAAS,CAAC,aAAa,CAAC,SAAS,CAAC,CAAC;YACrC,CAAC,CAAC,CAAC;YACH,IAAI,CAAC,oBAAoB,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;QAC5C,CAAC;QACD,gCAAgC;QAChC,IAAI,KAAK,CAAC,wBAAwB,IAAI,SAAS,IAAI,KAAK,CAAC,wBAAwB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAC7F,MAAM,SAAS,GAAG,IAAI,CAAC,gCAAgC,CAAC,KAAK,CAAC,CAAC;YAC/D,KAAK,CAAC,wBAAwB,CAAC,OAAO,CAAC,SAAS,CAAC,EAAE;gBACjD,SAAS,CAAC,aAAa,CAAC,SAAS,CAAC,CAAC;YACrC,CAAC,CAAC,CAAC;YACH,IAAI,CAAC,yBAAyB,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;QACjD,CAAC;IACH,CAAC;IAEO,sBAAsB,CAAC,KAAmC;QAChE,OAAO,IAAI,yBAAe,CAAC;YACzB,GAAG,EAAE,GAAG,KAAK,CAAC,QAAQ,CAAC,OAAO,CAAC,MAAM,EAAE,EAAE,CAAC,OAAO;YACjD,MAAM,EAAE,gBAAM,CAAC,KAAK;YACpB,SAAS,EAAE,CAAC,KAAK,CAAC,QAAQ,CAAC,SAAS,GAAG,IAAI,CAAC,gBAAgB,CAAC;YAC7D,OAAO,EAAE,2BAA2B,CAAC,YAAY;SAClD,CAAC,CAAC;IACL,CAAC;IAEO,2BAA2B,CAAC,KAAmC;QACrE,OAAO,IAAI,yBAAe,CAAC;YACzB,GAAG,EAAE,GAAG,KAAK,CAAC,QAAQ,CAAC,OAAO,CAAC,MAAM,EAAE,EAAE,CAAC,YAAY;YACtD,MAAM,EAAE,gBAAM,CAAC,KAAK;YACpB,SAAS,EAAE,CAAC,KAAK,CAAC,QAAQ,CAAC,SAAS,GAAG,IAAI,CAAC,gBAAgB,CAAC;YAC7D,OAAO,EAAE,2BAA2B,CAAC,kBAAkB;SACxD,CAAC,CAAC;IACL,CAAC;IAEO,gCAAgC,CAAC,KAAmC;QAC1E,OAAO,IAAI,yBAAe,CAAC;YACzB,GAAG,EAAE,GAAG,KAAK,CAAC,QAAQ,CAAC,OAAO,CAAC,MAAM,EAAE,EAAE,CAAC,iBAAiB;YAC3D,MAAM,EAAE,gBAAM,CAAC,KAAK;YACpB,SAAS,EAAE,CAAC,KAAK,CAAC,QAAQ,CAAC,SAAS,GAAG,IAAI,CAAC,gBAAgB,CAAC;YAC7D,OAAO,EAAE,2BAA2B,CAAC,wBAAwB;SAC9D,CAAC,CAAC;IACL,CAAC;IAEM,cAAc;QACnB,OAAO,IAAI,CAAC,eAAe,CAAC;IAC9B,CAAC;IAEM,mBAAmB;QACxB,OAAO,IAAI,CAAC,oBAAoB,CAAC;IACnC,CAAC;IAEM,wBAAwB;QAC7B,OAAO,IAAI,CAAC,yBAAyB,CAAC;IACxC,CAAC;IAEM,UAAU;QACf,OAAO,CAAC,GAAG,IAAI,CAAC,eAAe,EAAE,GAAG,IAAI,CAAC,oBAAoB,EAAE,GAAG,IAAI,CAAC,yBAAyB,CAAC,CAAC;IACpG,CAAC;IAEM,cAAc,CAAC,MAAc;QAClC,IAAI,SAAS,GAAG,MAAM,CAAC;QAEvB,2BAA2B;QAC3B,SAAS,GAAG,SAAS,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;QACzE,0BAA0B;QAC1B,SAAS,GAAG,SAAS,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;QAC3E,OAAO,SAAS,CAAC;IACnB,CAAC;;AA9HH,kEA+HC;AA9HiB,wCAAY,GAAG,CAAC,eAAe,CAAC,AAApB,CAAqB;AACjC,8CAAkB,GAAG;IACnC,GAAG,2BAA2B,CAAC,YAAY;IAC3C,cAAc;IACd,qBAAqB;IACrB,iBAAiB;CAClB,AALiC,CAKhC;AACc,oDAAwB,GAAG;IACzC,GAAG,2BAA2B,CAAC,kBAAkB;IACjD,wBAAwB;CACzB,AAHuC,CAGtC;AACc,gDAAoB,GAAG,CAAC,UAAU,EAAE,eAAe,CAAC,AAAhC,CAAiC;AACrD,+CAAmB,GAAG,CAAC,eAAe,EAAE,eAAe,EAAE,kBAAkB,CAAC,AAAzD,CAA0D;AAoH/F;;;uCAGuC;AACvC,MAAa,qBAAqB;IAUhC,YAAY,KAA6B;QAPjC,aAAQ,GAAa,EAAE,CAAC;QACxB,gBAAW,GAAa,EAAE,CAAC;QAC3B,6BAAwB,GAG5B,EAAE,CAAC;QAGL,wDAAwD;QACxD,IAAI,CAAC,cAAc,GAAG,IAAI,yBAAe,CAAC;YACxC,GAAG,EAAE,aAAa;YAClB,MAAM,EAAE,gBAAM,CAAC,KAAK;YACpB,SAAS,EAAE,CAAC,KAAK,CAAC,QAAQ,CAAC,SAAS,GAAG,IAAI,EAAE,KAAK,CAAC,QAAQ,CAAC,SAAS,CAAC;YACtE,OAAO,EAAE,2BAA2B,CAAC,oBAAoB;SAC1D,CAAC,CAAC;QACH,IAAI,CAAC,cAAc,CAAC,eAAe,EAAE,CAAC;QACtC,IAAI,CAAC,cAAc,CAAC,YAAY,CAAC,YAAY,EAAE,EAAE,YAAY,EAAE,KAAK,CAAC,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;QAE1G,+BAA+B;QAC/B,kFAAkF;QAClF,IAAI,KAAK,CAAC,cAAc,EAAE,CAAC;YACzB,IAAI,CAAC,QAAQ,GAAG,KAAK,CAAC,cAAc,CAAC,GAAG,CAAC,MAAM,CAAC,EAAE;gBAChD,OAAO,GAAG,KAAK,CAAC,QAAQ,CAAC,SAAS,IAAI,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,EAAE,CAAC;YACtE,CAAC,CAAC,CAAC;QACL,CAAC;aAAM,CAAC;YACN,IAAI,CAAC,QAAQ,GAAG,CAAC,KAAK,CAAC,QAAQ,CAAC,SAAS,GAAG,IAAI,CAAC,CAAC;QACpD,CAAC;QACD,oFAAoF;QACpF,IAAI,KAAK,CAAC,cAAc,EAAE,CAAC;YACzB,IAAI,CAAC,WAAW,GAAG,KAAK,CAAC,cAAc,CAAC,GAAG,CAAC,MAAM,CAAC,EAAE;gBACnD,OAAO,GAAG,KAAK,CAAC,QAAQ,CAAC,SAAS,IAAI,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,EAAE,CAAC;YACtE,CAAC,CAAC,CAAC;QACL,CAAC;QAED,IAAI,IAAI,CAAC,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAChC,IAAI,CAAC,aAAa,GAAG,IAAI,yBAAe,CAAC;gBACvC,GAAG,EAAE,YAAY;gBACjB,MAAM,EAAE,gBAAM,CAAC,IAAI;gBACnB,YAAY,EAAE,IAAI,CAAC,WAAW;gBAC9B,OAAO,EAAE,2BAA2B,CAAC,mBAAmB;aACzD,CAAC,CAAC;QACL,CAAC;aAAM,CAAC;YACN,IAAI,CAAC,aAAa,GAAG,IAAI,yBAAe,CAAC;gBACvC,GAAG,EAAE,YAAY;gBACjB,MAAM,EAAE,gBAAM,CAAC,IAAI;gBACnB,SAAS,EAAE,IAAI,CAAC,QAAQ;gBACxB,OAAO,EAAE,2BAA2B,CAAC,mBAAmB;aACzD,CAAC,CAAC;QACL,CAAC;QACD,IAAI,CAAC,aAAa,CAAC,eAAe,EAAE,CAAC;QAErC,0BAA0B;QAC1B,IAAI,CAAC,wBAAwB,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC;QACtF,IAAI,KAAK,CAAC,iBAAiB,IAAI,KAAK,CAAC,iBAAiB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAClE,IAAI,CAAC,wBAAwB,CAAC,kBAAkB,CAAC,GAAG,CAAC,GAAG,IAAI,GAAG,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CACtG,CAAC,CAAC,aAAa,CAAC,CAAC,CAAC,CACnB,CAAC;QACJ,CAAC;QAED,yCAAyC;QACzC,IAAI,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,MAAM,IAAI,CAAC,EAAE,CAAC;YAC3D,IAAI,CAAC,aAAa,CAAC,YAAY,CAAC,eAAe,EAAE,IAAI,CAAC,wBAAwB,CAAC,CAAC;QAClF,CAAC;aAAM,CAAC;YACN,IAAI,CAAC,aAAa,CAAC,YAAY,CAAC,2BAA2B,EAAE,IAAI,CAAC,wBAAwB,CAAC,CAAC;QAC9F,CAAC;IACH,CAAC;IAEO,cAAc,CAAC,MAAc;QACnC,IAAI,SAAS,GAAG,MAAM,CAAC;QAEvB,2BAA2B;QAC3B,SAAS,GAAG,SAAS,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;QACzE,0BAA0B;QAC1B,SAAS,GAAG,SAAS,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;QAC3E,OAAO,GAAG,SAAS,IAAI,CAAC;IAC1B,CAAC;CACF;AA/ED,sDA+EC","sourcesContent":["/*!\n * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n * SPDX-License-Identifier: Apache-2.0\n */\n\nimport { IPrincipal, PolicyStatement, Effect } from 'aws-cdk-lib/aws-iam';\nimport { IBucket } from 'aws-cdk-lib/aws-s3';\n\nexport interface IRestrictObjectPrefixToRoles {\n  readonly s3Bucket: IBucket;\n  readonly s3Prefix: string;\n  readonly readRoleIds?: string[];\n  readonly readWriteRoleIds?: string[];\n  readonly readWriteSuperRoleIds?: string[];\n  readonly readPrincipals?: IPrincipal[];\n  readonly readWritePrincipals?: IPrincipal[];\n  readonly readWriteSuperPrincipals?: IPrincipal[];\n}\n\nexport interface IRestrictBucketToRoles {\n  readonly s3Bucket: IBucket;\n  readonly roleExcludeIds: string[];\n  readonly principalExcludes?: string[];\n  readonly prefixExcludes?: string[];\n  readonly prefixIncludes?: string[];\n}\n\n/** Helper class for generating S3 bucket policy statements which grant access to specific object prefixes */\nexport class RestrictObjectPrefixToRoles {\n  static readonly READ_ACTIONS = ['s3:GetObject*'];\n  static readonly READ_WRITE_ACTIONS = [\n    ...RestrictObjectPrefixToRoles.READ_ACTIONS,\n    's3:PutObject',\n    's3:PutObjectTagging',\n    's3:DeleteObject',\n  ];\n  static readonly READ_WRITE_SUPER_ACTIONS = [\n    ...RestrictObjectPrefixToRoles.READ_WRITE_ACTIONS,\n    's3:DeleteObjectVersion',\n  ];\n  static readonly BUCKET_ALLOW_ACTIONS = ['s3:List*', 's3:GetBucket*'];\n  static readonly BUCKET_DENY_ACTIONS = ['s3:PutObject*', 's3:GetObject*', 's3:DeleteObject*'];\n\n  private _readStatements: PolicyStatement[] = [];\n  private _readWriteStatements: PolicyStatement[] = [];\n  private _readWriteSuperStatements: PolicyStatement[] = [];\n  private _formattedPrefix: string;\n\n  constructor(props: IRestrictObjectPrefixToRoles) {\n    this._formattedPrefix = '/' + this.formatS3Prefix(props.s3Prefix) + '/*';\n    // Covers our case where two / get resolved because our prefix is actually /\n    this._formattedPrefix = this._formattedPrefix.replace(/\\/\\//, '/');\n\n    // FEDERATED / READ\n    if (props.readRoleIds != undefined && props.readRoleIds.length > 0) {\n      // Construct our User:Id roles for read\n      const statement = this._readStatementScaffold(props);\n      statement.addCondition('StringLike', { 'aws:userId': props.readRoleIds.map(x => `${x}:*`) });\n      statement.addAnyPrincipal();\n      this._readStatements.push(statement);\n    }\n    // FEDERATED / READWRITE\n    if (props.readWriteRoleIds != undefined && props.readWriteRoleIds.length > 0) {\n      const statement = this._readWriteStatementScaffold(props);\n      statement.addCondition('StringLike', { 'aws:userId': props.readWriteRoleIds.map(x => `${x}:*`) });\n      statement.addAnyPrincipal();\n      this._readWriteStatements.push(statement);\n    }\n\n    // FEDERATED / READWRITESUPER\n    if (props.readWriteSuperRoleIds != undefined && props.readWriteSuperRoleIds.length > 0) {\n      const statement = this._readWriteSuperStatementScaffold(props);\n      statement.addCondition('StringLike', { 'aws:userId': props.readWriteSuperRoleIds.map(x => `${x}:*`) });\n      statement.addAnyPrincipal();\n      this._readWriteSuperStatements.push(statement);\n    }\n\n    // NONFEDERATED / READ\n    if (props.readPrincipals != undefined && props.readPrincipals.length > 0) {\n      const statement = this._readStatementScaffold(props);\n      props.readPrincipals.forEach(principal => {\n        statement.addPrincipals(principal);\n      });\n      this._readStatements.push(statement);\n    }\n    // NONFEDERATED / READWRITE\n    if (props.readWritePrincipals != undefined && props.readWritePrincipals.length > 0) {\n      const statement = this._readWriteStatementScaffold(props);\n      props.readWritePrincipals.forEach(principal => {\n        statement.addPrincipals(principal);\n      });\n      this._readWriteStatements.push(statement);\n    }\n    // NONFEDERATED / READWRITESUPER\n    if (props.readWriteSuperPrincipals != undefined && props.readWriteSuperPrincipals.length > 0) {\n      const statement = this._readWriteSuperStatementScaffold(props);\n      props.readWriteSuperPrincipals.forEach(principal => {\n        statement.addPrincipals(principal);\n      });\n      this._readWriteSuperStatements.push(statement);\n    }\n  }\n\n  private _readStatementScaffold(props: IRestrictObjectPrefixToRoles): PolicyStatement {\n    return new PolicyStatement({\n      sid: `${props.s3Prefix.replace(/\\\\W/g, '')}_Read`,\n      effect: Effect.ALLOW,\n      resources: [props.s3Bucket.bucketArn + this._formattedPrefix],\n      actions: RestrictObjectPrefixToRoles.READ_ACTIONS,\n    });\n  }\n\n  private _readWriteStatementScaffold(props: IRestrictObjectPrefixToRoles): PolicyStatement {\n    return new PolicyStatement({\n      sid: `${props.s3Prefix.replace(/\\\\W/g, '')}_ReadWrite`,\n      effect: Effect.ALLOW,\n      resources: [props.s3Bucket.bucketArn + this._formattedPrefix],\n      actions: RestrictObjectPrefixToRoles.READ_WRITE_ACTIONS,\n    });\n  }\n\n  private _readWriteSuperStatementScaffold(props: IRestrictObjectPrefixToRoles): PolicyStatement {\n    return new PolicyStatement({\n      sid: `${props.s3Prefix.replace(/\\\\W/g, '')}_ReadWriteSuper`,\n      effect: Effect.ALLOW,\n      resources: [props.s3Bucket.bucketArn + this._formattedPrefix],\n      actions: RestrictObjectPrefixToRoles.READ_WRITE_SUPER_ACTIONS,\n    });\n  }\n\n  public readStatements(): PolicyStatement[] {\n    return this._readStatements;\n  }\n\n  public readWriteStatements(): PolicyStatement[] {\n    return this._readWriteStatements;\n  }\n\n  public readWriteSuperStatements(): PolicyStatement[] {\n    return this._readWriteSuperStatements;\n  }\n\n  public statements(): PolicyStatement[] {\n    return [...this._readStatements, ...this._readWriteStatements, ...this._readWriteSuperStatements];\n  }\n\n  public formatS3Prefix(prefix: string): string {\n    let rawPrefix = prefix;\n\n    // Removes trailing slashes\n    rawPrefix = rawPrefix.endsWith('/') ? rawPrefix.slice(0, -1) : rawPrefix;\n    // Removes leading slashes\n    rawPrefix = rawPrefix.startsWith('/') ? rawPrefix.substring(1) : rawPrefix;\n    return rawPrefix;\n  }\n}\n\n/** Helper class for generating bucket policy statements\n * which allow or deny access to an entire bucket. Used to\n * create bucket-level default deny statements to block accesses\n * not granted in the bucket policy. */\nexport class RestrictBucketToRoles {\n  public readonly denyStatement: PolicyStatement;\n  public readonly allowStatement: PolicyStatement;\n  private resource: string[] = [];\n  private notResource: string[] = [];\n  private denyConditionalNotEquals: {\n    'aws:userId'?: string[];\n    'aws:PrincipalArn'?: string[];\n  } = {};\n\n  constructor(props: IRestrictBucketToRoles) {\n    // Statement allowing access to the bucket for the AROAs\n    this.allowStatement = new PolicyStatement({\n      sid: `BucketAllow`,\n      effect: Effect.ALLOW,\n      resources: [props.s3Bucket.bucketArn + '/*', props.s3Bucket.bucketArn],\n      actions: RestrictObjectPrefixToRoles.BUCKET_ALLOW_ACTIONS,\n    });\n    this.allowStatement.addAnyPrincipal();\n    this.allowStatement.addCondition('StringLike', { 'aws:userId': props.roleExcludeIds.map(x => `${x}:*`) });\n\n    // Constuct our deny statement.\n    // prefixIncludes denotes we want to include a prefix in our deny meaning Resource\n    if (props.prefixIncludes) {\n      this.resource = props.prefixIncludes.map(prefix => {\n        return `${props.s3Bucket.bucketArn}/${this.formatS3Prefix(prefix)}`;\n      });\n    } else {\n      this.resource = [props.s3Bucket.bucketArn + '/*'];\n    }\n    // prefixExcludes denote we want to exclude a prefix in our deny meaning notResource\n    if (props.prefixExcludes) {\n      this.notResource = props.prefixExcludes.map(prefix => {\n        return `${props.s3Bucket.bucketArn}/${this.formatS3Prefix(prefix)}`;\n      });\n    }\n\n    if (this.notResource.length > 0) {\n      this.denyStatement = new PolicyStatement({\n        sid: `BucketDeny`,\n        effect: Effect.DENY,\n        notResources: this.notResource,\n        actions: RestrictObjectPrefixToRoles.BUCKET_DENY_ACTIONS,\n      });\n    } else {\n      this.denyStatement = new PolicyStatement({\n        sid: `BucketDeny`,\n        effect: Effect.DENY,\n        resources: this.resource,\n        actions: RestrictObjectPrefixToRoles.BUCKET_DENY_ACTIONS,\n      });\n    }\n    this.denyStatement.addAnyPrincipal();\n\n    // Build our conditionals.\n    this.denyConditionalNotEquals['aws:userId'] = props.roleExcludeIds.map(x => `${x}:*`);\n    if (props.principalExcludes && props.principalExcludes.length > 0) {\n      this.denyConditionalNotEquals['aws:PrincipalArn'] = [...new Set(props.principalExcludes)].sort((a, b) =>\n        a.localeCompare(b),\n      );\n    }\n\n    // Construct our conditional for our deny\n    if (Object.keys(this.denyConditionalNotEquals).length == 1) {\n      this.denyStatement.addCondition('StringNotLike', this.denyConditionalNotEquals);\n    } else {\n      this.denyStatement.addCondition('ForAnyValue:StringNotLike', this.denyConditionalNotEquals);\n    }\n  }\n\n  private formatS3Prefix(prefix: string): string {\n    let rawPrefix = prefix;\n\n    // Removes trailing slashes\n    rawPrefix = rawPrefix.endsWith('/') ? rawPrefix.slice(0, -1) : rawPrefix;\n    // Removes leading slashes\n    rawPrefix = rawPrefix.startsWith('/') ? rawPrefix.substring(1) : rawPrefix;\n    return `${rawPrefix}/*`;\n  }\n}\n"]}
|
|
@@ -1,241 +0,0 @@
|
|
|
1
|
-
/*!
|
|
2
|
-
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
|
3
|
-
* SPDX-License-Identifier: Apache-2.0
|
|
4
|
-
*/
|
|
5
|
-
|
|
6
|
-
import { IPrincipal, PolicyStatement, Effect } from 'aws-cdk-lib/aws-iam';
|
|
7
|
-
import { IBucket } from 'aws-cdk-lib/aws-s3';
|
|
8
|
-
|
|
9
|
-
export interface IRestrictObjectPrefixToRoles {
|
|
10
|
-
readonly s3Bucket: IBucket;
|
|
11
|
-
readonly s3Prefix: string;
|
|
12
|
-
readonly readRoleIds?: string[];
|
|
13
|
-
readonly readWriteRoleIds?: string[];
|
|
14
|
-
readonly readWriteSuperRoleIds?: string[];
|
|
15
|
-
readonly readPrincipals?: IPrincipal[];
|
|
16
|
-
readonly readWritePrincipals?: IPrincipal[];
|
|
17
|
-
readonly readWriteSuperPrincipals?: IPrincipal[];
|
|
18
|
-
}
|
|
19
|
-
|
|
20
|
-
export interface IRestrictBucketToRoles {
|
|
21
|
-
readonly s3Bucket: IBucket;
|
|
22
|
-
readonly roleExcludeIds: string[];
|
|
23
|
-
readonly principalExcludes?: string[];
|
|
24
|
-
readonly prefixExcludes?: string[];
|
|
25
|
-
readonly prefixIncludes?: string[];
|
|
26
|
-
}
|
|
27
|
-
|
|
28
|
-
/** Helper class for generating S3 bucket policy statements which grant access to specific object prefixes */
|
|
29
|
-
export class RestrictObjectPrefixToRoles {
|
|
30
|
-
static readonly READ_ACTIONS = ['s3:GetObject*'];
|
|
31
|
-
static readonly READ_WRITE_ACTIONS = [
|
|
32
|
-
...RestrictObjectPrefixToRoles.READ_ACTIONS,
|
|
33
|
-
's3:PutObject',
|
|
34
|
-
's3:PutObjectTagging',
|
|
35
|
-
's3:DeleteObject',
|
|
36
|
-
];
|
|
37
|
-
static readonly READ_WRITE_SUPER_ACTIONS = [
|
|
38
|
-
...RestrictObjectPrefixToRoles.READ_WRITE_ACTIONS,
|
|
39
|
-
's3:DeleteObjectVersion',
|
|
40
|
-
];
|
|
41
|
-
static readonly BUCKET_ALLOW_ACTIONS = ['s3:List*', 's3:GetBucket*'];
|
|
42
|
-
static readonly BUCKET_DENY_ACTIONS = ['s3:PutObject*', 's3:GetObject*', 's3:DeleteObject*'];
|
|
43
|
-
|
|
44
|
-
private _readStatements: PolicyStatement[] = [];
|
|
45
|
-
private _readWriteStatements: PolicyStatement[] = [];
|
|
46
|
-
private _readWriteSuperStatements: PolicyStatement[] = [];
|
|
47
|
-
private _formattedPrefix: string;
|
|
48
|
-
|
|
49
|
-
constructor(props: IRestrictObjectPrefixToRoles) {
|
|
50
|
-
this._formattedPrefix = '/' + this.formatS3Prefix(props.s3Prefix) + '/*';
|
|
51
|
-
// Covers our case where two / get resolved because our prefix is actually /
|
|
52
|
-
this._formattedPrefix = this._formattedPrefix.replace(/\/\//, '/');
|
|
53
|
-
|
|
54
|
-
// FEDERATED / READ
|
|
55
|
-
if (props.readRoleIds != undefined && props.readRoleIds.length > 0) {
|
|
56
|
-
// Construct our User:Id roles for read
|
|
57
|
-
const statement = this._readStatementScaffold(props);
|
|
58
|
-
statement.addCondition('StringLike', { 'aws:userId': props.readRoleIds.map(x => `${x}:*`) });
|
|
59
|
-
statement.addAnyPrincipal();
|
|
60
|
-
this._readStatements.push(statement);
|
|
61
|
-
}
|
|
62
|
-
// FEDERATED / READWRITE
|
|
63
|
-
if (props.readWriteRoleIds != undefined && props.readWriteRoleIds.length > 0) {
|
|
64
|
-
const statement = this._readWriteStatementScaffold(props);
|
|
65
|
-
statement.addCondition('StringLike', { 'aws:userId': props.readWriteRoleIds.map(x => `${x}:*`) });
|
|
66
|
-
statement.addAnyPrincipal();
|
|
67
|
-
this._readWriteStatements.push(statement);
|
|
68
|
-
}
|
|
69
|
-
|
|
70
|
-
// FEDERATED / READWRITESUPER
|
|
71
|
-
if (props.readWriteSuperRoleIds != undefined && props.readWriteSuperRoleIds.length > 0) {
|
|
72
|
-
const statement = this._readWriteSuperStatementScaffold(props);
|
|
73
|
-
statement.addCondition('StringLike', { 'aws:userId': props.readWriteSuperRoleIds.map(x => `${x}:*`) });
|
|
74
|
-
statement.addAnyPrincipal();
|
|
75
|
-
this._readWriteSuperStatements.push(statement);
|
|
76
|
-
}
|
|
77
|
-
|
|
78
|
-
// NONFEDERATED / READ
|
|
79
|
-
if (props.readPrincipals != undefined && props.readPrincipals.length > 0) {
|
|
80
|
-
const statement = this._readStatementScaffold(props);
|
|
81
|
-
props.readPrincipals.forEach(principal => {
|
|
82
|
-
statement.addPrincipals(principal);
|
|
83
|
-
});
|
|
84
|
-
this._readStatements.push(statement);
|
|
85
|
-
}
|
|
86
|
-
// NONFEDERATED / READWRITE
|
|
87
|
-
if (props.readWritePrincipals != undefined && props.readWritePrincipals.length > 0) {
|
|
88
|
-
const statement = this._readWriteStatementScaffold(props);
|
|
89
|
-
props.readWritePrincipals.forEach(principal => {
|
|
90
|
-
statement.addPrincipals(principal);
|
|
91
|
-
});
|
|
92
|
-
this._readWriteStatements.push(statement);
|
|
93
|
-
}
|
|
94
|
-
// NONFEDERATED / READWRITESUPER
|
|
95
|
-
if (props.readWriteSuperPrincipals != undefined && props.readWriteSuperPrincipals.length > 0) {
|
|
96
|
-
const statement = this._readWriteSuperStatementScaffold(props);
|
|
97
|
-
props.readWriteSuperPrincipals.forEach(principal => {
|
|
98
|
-
statement.addPrincipals(principal);
|
|
99
|
-
});
|
|
100
|
-
this._readWriteSuperStatements.push(statement);
|
|
101
|
-
}
|
|
102
|
-
}
|
|
103
|
-
|
|
104
|
-
private _readStatementScaffold(props: IRestrictObjectPrefixToRoles): PolicyStatement {
|
|
105
|
-
return new PolicyStatement({
|
|
106
|
-
sid: `${props.s3Prefix.replace(/\\W/g, '')}_Read`,
|
|
107
|
-
effect: Effect.ALLOW,
|
|
108
|
-
resources: [props.s3Bucket.bucketArn + this._formattedPrefix],
|
|
109
|
-
actions: RestrictObjectPrefixToRoles.READ_ACTIONS,
|
|
110
|
-
});
|
|
111
|
-
}
|
|
112
|
-
|
|
113
|
-
private _readWriteStatementScaffold(props: IRestrictObjectPrefixToRoles): PolicyStatement {
|
|
114
|
-
return new PolicyStatement({
|
|
115
|
-
sid: `${props.s3Prefix.replace(/\\W/g, '')}_ReadWrite`,
|
|
116
|
-
effect: Effect.ALLOW,
|
|
117
|
-
resources: [props.s3Bucket.bucketArn + this._formattedPrefix],
|
|
118
|
-
actions: RestrictObjectPrefixToRoles.READ_WRITE_ACTIONS,
|
|
119
|
-
});
|
|
120
|
-
}
|
|
121
|
-
|
|
122
|
-
private _readWriteSuperStatementScaffold(props: IRestrictObjectPrefixToRoles): PolicyStatement {
|
|
123
|
-
return new PolicyStatement({
|
|
124
|
-
sid: `${props.s3Prefix.replace(/\\W/g, '')}_ReadWriteSuper`,
|
|
125
|
-
effect: Effect.ALLOW,
|
|
126
|
-
resources: [props.s3Bucket.bucketArn + this._formattedPrefix],
|
|
127
|
-
actions: RestrictObjectPrefixToRoles.READ_WRITE_SUPER_ACTIONS,
|
|
128
|
-
});
|
|
129
|
-
}
|
|
130
|
-
|
|
131
|
-
public readStatements(): PolicyStatement[] {
|
|
132
|
-
return this._readStatements;
|
|
133
|
-
}
|
|
134
|
-
|
|
135
|
-
public readWriteStatements(): PolicyStatement[] {
|
|
136
|
-
return this._readWriteStatements;
|
|
137
|
-
}
|
|
138
|
-
|
|
139
|
-
public readWriteSuperStatements(): PolicyStatement[] {
|
|
140
|
-
return this._readWriteSuperStatements;
|
|
141
|
-
}
|
|
142
|
-
|
|
143
|
-
public statements(): PolicyStatement[] {
|
|
144
|
-
return [...this._readStatements, ...this._readWriteStatements, ...this._readWriteSuperStatements];
|
|
145
|
-
}
|
|
146
|
-
|
|
147
|
-
public formatS3Prefix(prefix: string): string {
|
|
148
|
-
let rawPrefix = prefix;
|
|
149
|
-
|
|
150
|
-
// Removes trailing slashes
|
|
151
|
-
rawPrefix = rawPrefix.endsWith('/') ? rawPrefix.slice(0, -1) : rawPrefix;
|
|
152
|
-
// Removes leading slashes
|
|
153
|
-
rawPrefix = rawPrefix.startsWith('/') ? rawPrefix.substring(1) : rawPrefix;
|
|
154
|
-
return rawPrefix;
|
|
155
|
-
}
|
|
156
|
-
}
|
|
157
|
-
|
|
158
|
-
/** Helper class for generating bucket policy statements
|
|
159
|
-
* which allow or deny access to an entire bucket. Used to
|
|
160
|
-
* create bucket-level default deny statements to block accesses
|
|
161
|
-
* not granted in the bucket policy. */
|
|
162
|
-
export class RestrictBucketToRoles {
|
|
163
|
-
public readonly denyStatement: PolicyStatement;
|
|
164
|
-
public readonly allowStatement: PolicyStatement;
|
|
165
|
-
private resource: string[] = [];
|
|
166
|
-
private notResource: string[] = [];
|
|
167
|
-
private denyConditionalNotEquals: {
|
|
168
|
-
'aws:userId'?: string[];
|
|
169
|
-
'aws:PrincipalArn'?: string[];
|
|
170
|
-
} = {};
|
|
171
|
-
|
|
172
|
-
constructor(props: IRestrictBucketToRoles) {
|
|
173
|
-
// Statement allowing access to the bucket for the AROAs
|
|
174
|
-
this.allowStatement = new PolicyStatement({
|
|
175
|
-
sid: `BucketAllow`,
|
|
176
|
-
effect: Effect.ALLOW,
|
|
177
|
-
resources: [props.s3Bucket.bucketArn + '/*', props.s3Bucket.bucketArn],
|
|
178
|
-
actions: RestrictObjectPrefixToRoles.BUCKET_ALLOW_ACTIONS,
|
|
179
|
-
});
|
|
180
|
-
this.allowStatement.addAnyPrincipal();
|
|
181
|
-
this.allowStatement.addCondition('StringLike', { 'aws:userId': props.roleExcludeIds.map(x => `${x}:*`) });
|
|
182
|
-
|
|
183
|
-
// Constuct our deny statement.
|
|
184
|
-
// prefixIncludes denotes we want to include a prefix in our deny meaning Resource
|
|
185
|
-
if (props.prefixIncludes) {
|
|
186
|
-
this.resource = props.prefixIncludes.map(prefix => {
|
|
187
|
-
return `${props.s3Bucket.bucketArn}/${this.formatS3Prefix(prefix)}`;
|
|
188
|
-
});
|
|
189
|
-
} else {
|
|
190
|
-
this.resource = [props.s3Bucket.bucketArn + '/*'];
|
|
191
|
-
}
|
|
192
|
-
// prefixExcludes denote we want to exclude a prefix in our deny meaning notResource
|
|
193
|
-
if (props.prefixExcludes) {
|
|
194
|
-
this.notResource = props.prefixExcludes.map(prefix => {
|
|
195
|
-
return `${props.s3Bucket.bucketArn}/${this.formatS3Prefix(prefix)}`;
|
|
196
|
-
});
|
|
197
|
-
}
|
|
198
|
-
|
|
199
|
-
if (this.notResource.length > 0) {
|
|
200
|
-
this.denyStatement = new PolicyStatement({
|
|
201
|
-
sid: `BucketDeny`,
|
|
202
|
-
effect: Effect.DENY,
|
|
203
|
-
notResources: this.notResource,
|
|
204
|
-
actions: RestrictObjectPrefixToRoles.BUCKET_DENY_ACTIONS,
|
|
205
|
-
});
|
|
206
|
-
} else {
|
|
207
|
-
this.denyStatement = new PolicyStatement({
|
|
208
|
-
sid: `BucketDeny`,
|
|
209
|
-
effect: Effect.DENY,
|
|
210
|
-
resources: this.resource,
|
|
211
|
-
actions: RestrictObjectPrefixToRoles.BUCKET_DENY_ACTIONS,
|
|
212
|
-
});
|
|
213
|
-
}
|
|
214
|
-
this.denyStatement.addAnyPrincipal();
|
|
215
|
-
|
|
216
|
-
// Build our conditionals.
|
|
217
|
-
this.denyConditionalNotEquals['aws:userId'] = props.roleExcludeIds.map(x => `${x}:*`);
|
|
218
|
-
if (props.principalExcludes && props.principalExcludes.length > 0) {
|
|
219
|
-
this.denyConditionalNotEquals['aws:PrincipalArn'] = [...new Set(props.principalExcludes)].sort((a, b) =>
|
|
220
|
-
a.localeCompare(b),
|
|
221
|
-
);
|
|
222
|
-
}
|
|
223
|
-
|
|
224
|
-
// Construct our conditional for our deny
|
|
225
|
-
if (Object.keys(this.denyConditionalNotEquals).length == 1) {
|
|
226
|
-
this.denyStatement.addCondition('StringNotLike', this.denyConditionalNotEquals);
|
|
227
|
-
} else {
|
|
228
|
-
this.denyStatement.addCondition('ForAnyValue:StringNotLike', this.denyConditionalNotEquals);
|
|
229
|
-
}
|
|
230
|
-
}
|
|
231
|
-
|
|
232
|
-
private formatS3Prefix(prefix: string): string {
|
|
233
|
-
let rawPrefix = prefix;
|
|
234
|
-
|
|
235
|
-
// Removes trailing slashes
|
|
236
|
-
rawPrefix = rawPrefix.endsWith('/') ? rawPrefix.slice(0, -1) : rawPrefix;
|
|
237
|
-
// Removes leading slashes
|
|
238
|
-
rawPrefix = rawPrefix.startsWith('/') ? rawPrefix.substring(1) : rawPrefix;
|
|
239
|
-
return `${rawPrefix}/*`;
|
|
240
|
-
}
|
|
241
|
-
}
|
|
@@ -1,44 +0,0 @@
|
|
|
1
|
-
{
|
|
2
|
-
"name": "@aws-mdaa/s3-bucketpolicy-helper",
|
|
3
|
-
"description": "MDAA s3-bucketpolicy-helper utility",
|
|
4
|
-
"author": {
|
|
5
|
-
"name": "Amazon Web Services",
|
|
6
|
-
"url": "https://aws.amazon.com/solutions"
|
|
7
|
-
},
|
|
8
|
-
"version": "1.5.0",
|
|
9
|
-
"license": "Apache-2.0",
|
|
10
|
-
"main": "lib/index.js",
|
|
11
|
-
"types": "lib/index.d.ts",
|
|
12
|
-
"scripts": {
|
|
13
|
-
"build": "tsc",
|
|
14
|
-
"watch": "tsc -w",
|
|
15
|
-
"test": "jest --passWithNoTests --testPathIgnorePatterns='.*\\.snapshot\\.test\\.ts'",
|
|
16
|
-
"lint": "eslint --max-warnings 0 -c ../../../eslint.config.mjs",
|
|
17
|
-
"test:coverage": "jest --passWithNoTests --coverage --testPathIgnorePatterns='.*\\.snapshot\\.test\\.ts'",
|
|
18
|
-
"test:snapshots": "jest --passWithNoTests --testPathPattern='.*\\.snapshot\\.test\\.ts'",
|
|
19
|
-
"test:snapshots:update": "jest --passWithNoTests --testPathPattern='.*\\.snapshot\\.test\\.ts' --updateSnapshot"
|
|
20
|
-
},
|
|
21
|
-
"devDependencies": {
|
|
22
|
-
"@aws-mdaa/testing": "1.5.0",
|
|
23
|
-
"@types/jest": "29.5.14",
|
|
24
|
-
"@types/node": "22.9.0",
|
|
25
|
-
"@types/prettier": "2.6.0",
|
|
26
|
-
"jest": "29.7.0",
|
|
27
|
-
"ts-jest": "29.4.6",
|
|
28
|
-
"ts-node": "10.9.2",
|
|
29
|
-
"typescript": "5.9.3",
|
|
30
|
-
"typescript-json-schema": "0.67.1"
|
|
31
|
-
},
|
|
32
|
-
"dependencies": {
|
|
33
|
-
"@aws-mdaa/iam-role-helper": "1.5.0",
|
|
34
|
-
"@aws-mdaa/naming": "1.5.0",
|
|
35
|
-
"aws-cdk-lib": "2.220.0",
|
|
36
|
-
"cdk-nag": "2.37.55",
|
|
37
|
-
"constructs": "10.0.96"
|
|
38
|
-
},
|
|
39
|
-
"gitHead": "8b49a2b371014baec046605ffdbfe38951099c31",
|
|
40
|
-
"repository": {
|
|
41
|
-
"type": "git",
|
|
42
|
-
"url": "https://github.com/aws/modern-data-architecture-accelerator"
|
|
43
|
-
}
|
|
44
|
-
}
|