@cdklabs/cdk-appmod-catalog-blueprints 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +8644 -0
- package/LICENSE +202 -0
- package/README.md +212 -0
- package/lib/document-processing/agentic-document-processing.d.ts +16 -0
- package/lib/document-processing/agentic-document-processing.js +90 -0
- package/lib/document-processing/base-document-processing.d.ts +189 -0
- package/lib/document-processing/base-document-processing.js +509 -0
- package/lib/document-processing/bedrock-document-processing.d.ts +167 -0
- package/lib/document-processing/bedrock-document-processing.js +297 -0
- package/lib/document-processing/index.d.ts +3 -0
- package/lib/document-processing/index.js +20 -0
- package/lib/document-processing/resources/default-bedrock-invoke/index.py +63 -0
- package/lib/document-processing/resources/default-bedrock-invoke/requirements.txt +4 -0
- package/lib/document-processing/resources/default-doc-retrieval-lambda/index.mjs +92 -0
- package/lib/document-processing/resources/default-doc-retrieval-lambda/package.json +10 -0
- package/lib/document-processing/resources/default-error-handler/index.js +46 -0
- package/lib/document-processing/resources/default-error-handler/package.json +4 -0
- package/lib/document-processing/resources/default-image-processor/classifier.mjs +665 -0
- package/lib/document-processing/resources/default-image-processor/extractors.mjs +465 -0
- package/lib/document-processing/resources/default-image-processor/index.mjs +143 -0
- package/lib/document-processing/resources/default-image-processor/package-lock.json +12 -0
- package/lib/document-processing/resources/default-image-processor/package.json +4 -0
- package/lib/document-processing/resources/default-image-validator/index.mjs +76 -0
- package/lib/document-processing/resources/default-image-validator/package-lock.json +154 -0
- package/lib/document-processing/resources/default-image-validator/package.json +7 -0
- package/lib/document-processing/resources/default-pdf-processor/index.js +46 -0
- package/lib/document-processing/resources/default-pdf-validator/index.js +36 -0
- package/lib/document-processing/resources/default-sqs-consumer/index.py +111 -0
- package/lib/document-processing/resources/default-sqs-consumer/requirements.txt +4 -0
- package/lib/document-processing/resources/default-sqs-consumer/sample_payload.json +20 -0
- package/lib/document-processing/resources/default-sqs-consumer/sample_payload_multi.json +24 -0
- package/lib/document-processing/resources/default-strands-agent/index.py +111 -0
- package/lib/document-processing/resources/default-strands-agent/requirements.txt +6 -0
- package/lib/document-processing/tests/agentic-document-processing-nag.test.d.ts +1 -0
- package/lib/document-processing/tests/agentic-document-processing-nag.test.js +107 -0
- package/lib/document-processing/tests/agentic-document-processing.test.d.ts +1 -0
- package/lib/document-processing/tests/agentic-document-processing.test.js +125 -0
- package/lib/document-processing/tests/bedrock-document-processing-nag.test.d.ts +1 -0
- package/lib/document-processing/tests/bedrock-document-processing-nag.test.js +101 -0
- package/lib/document-processing/tests/bedrock-document-processing.test.d.ts +1 -0
- package/lib/document-processing/tests/bedrock-document-processing.test.js +79 -0
- package/lib/framework/custom-resource/default-runtimes.d.ts +21 -0
- package/lib/framework/custom-resource/default-runtimes.js +34 -0
- package/lib/framework/custom-resource/index.d.ts +1 -0
- package/lib/framework/custom-resource/index.js +18 -0
- package/lib/framework/foundation/access-log.d.ts +69 -0
- package/lib/framework/foundation/access-log.js +121 -0
- package/lib/framework/foundation/eventbridge-broker.d.ts +18 -0
- package/lib/framework/foundation/eventbridge-broker.js +42 -0
- package/lib/framework/foundation/index.d.ts +3 -0
- package/lib/framework/foundation/index.js +20 -0
- package/lib/framework/foundation/network.d.ts +19 -0
- package/lib/framework/foundation/network.js +83 -0
- package/lib/framework/index.d.ts +2 -0
- package/lib/framework/index.js +19 -0
- package/lib/framework/quickstart/base-quickstart.d.ts +30 -0
- package/lib/framework/quickstart/base-quickstart.js +30 -0
- package/lib/index.d.ts +4 -0
- package/lib/index.js +21 -0
- package/lib/tsconfig.tsbuildinfo +1 -0
- package/lib/utilities/cdk-nag-config.d.ts +42 -0
- package/lib/utilities/cdk-nag-config.js +194 -0
- package/lib/utilities/data-loader-lambda/index.py +282 -0
- package/lib/utilities/data-loader-lambda/requirements.txt +3 -0
- package/lib/utilities/data-loader.d.ts +173 -0
- package/lib/utilities/data-loader.js +447 -0
- package/lib/utilities/index.d.ts +3 -0
- package/lib/utilities/index.js +20 -0
- package/lib/utilities/lambda-iam-utils.d.ts +145 -0
- package/lib/utilities/lambda-iam-utils.js +235 -0
- package/lib/utilities/lambda_layers/data-masking/layer-construct.d.ts +42 -0
- package/lib/utilities/lambda_layers/data-masking/layer-construct.js +53 -0
- package/lib/utilities/lambda_layers/data-masking/layer-construct.ts +88 -0
- package/lib/utilities/observability/bedrock-observability.d.ts +18 -0
- package/lib/utilities/observability/bedrock-observability.js +131 -0
- package/lib/utilities/observability/cloudfront-distribution-observability-property-injector.d.ts +6 -0
- package/lib/utilities/observability/cloudfront-distribution-observability-property-injector.js +22 -0
- package/lib/utilities/observability/index.d.ts +6 -0
- package/lib/utilities/observability/index.js +25 -0
- package/lib/utilities/observability/lambda-observability-property-injector.d.ts +8 -0
- package/lib/utilities/observability/lambda-observability-property-injector.js +43 -0
- package/lib/utilities/observability/log-group-data-protection-props.d.ts +19 -0
- package/lib/utilities/observability/log-group-data-protection-props.js +5 -0
- package/lib/utilities/observability/observability.d.ts +83 -0
- package/lib/utilities/observability/observability.js +278 -0
- package/lib/utilities/observability/observable.d.ts +32 -0
- package/lib/utilities/observability/observable.js +3 -0
- package/lib/utilities/observability/powertools-config.d.ts +3 -0
- package/lib/utilities/observability/powertools-config.js +25 -0
- package/lib/utilities/observability/resources/bedrock-manage-logging-configuration/index.py +27 -0
- package/lib/utilities/observability/state-machine-observability-property-injector.d.ts +8 -0
- package/lib/utilities/observability/state-machine-observability-property-injector.js +49 -0
- package/lib/utilities/tests/data-loader-nag.test.d.ts +1 -0
- package/lib/utilities/tests/data-loader-nag.test.js +432 -0
- package/lib/utilities/tests/data-loader.test.d.ts +1 -0
- package/lib/utilities/tests/data-loader.test.js +284 -0
- package/lib/webapp/frontend-construct.d.ts +136 -0
- package/lib/webapp/frontend-construct.js +253 -0
- package/lib/webapp/index.d.ts +1 -0
- package/lib/webapp/index.js +18 -0
- package/lib/webapp/tests/frontend-construct-nag.test.d.ts +1 -0
- package/lib/webapp/tests/frontend-construct-nag.test.js +266 -0
- package/lib/webapp/tests/frontend-construct.test.d.ts +1 -0
- package/lib/webapp/tests/frontend-construct.test.js +385 -0
- package/package.json +183 -0
|
@@ -0,0 +1,145 @@
|
|
|
1
|
+
import * as iam from 'aws-cdk-lib/aws-iam';
|
|
2
|
+
import { Construct } from 'constructs';
|
|
3
|
+
/**
|
|
4
|
+
* Stack information
|
|
5
|
+
*/
|
|
6
|
+
export interface LambdaIamUtilsStackInfo {
|
|
7
|
+
readonly region: string;
|
|
8
|
+
readonly account: string;
|
|
9
|
+
}
|
|
10
|
+
/**
|
|
11
|
+
* Configuration options for Lambda CloudWatch Logs permissions
|
|
12
|
+
*/
|
|
13
|
+
export interface LambdaLogsPermissionsProps {
|
|
14
|
+
/**
|
|
15
|
+
* The construct scope (used to generate unique names)
|
|
16
|
+
*/
|
|
17
|
+
readonly scope: Construct;
|
|
18
|
+
/**
|
|
19
|
+
* The base name of the Lambda function
|
|
20
|
+
*/
|
|
21
|
+
readonly functionName: string;
|
|
22
|
+
/**
|
|
23
|
+
* Custom log group name pattern
|
|
24
|
+
* @default '/aws/lambda/{uniqueFunctionName}'
|
|
25
|
+
*/
|
|
26
|
+
readonly logGroupName?: string;
|
|
27
|
+
/**
|
|
28
|
+
* AWS region for the log group ARN
|
|
29
|
+
*/
|
|
30
|
+
readonly region: string;
|
|
31
|
+
/**
|
|
32
|
+
* AWS account ID for the log group ARN
|
|
33
|
+
*/
|
|
34
|
+
readonly account: string;
|
|
35
|
+
}
|
|
36
|
+
/**
|
|
37
|
+
* Result of creating Lambda logs permissions
|
|
38
|
+
*/
|
|
39
|
+
export interface LambdaLogsPermissionsResult {
|
|
40
|
+
/**
|
|
41
|
+
* The policy statements for CloudWatch Logs
|
|
42
|
+
*/
|
|
43
|
+
readonly policyStatements: iam.PolicyStatement[];
|
|
44
|
+
/**
|
|
45
|
+
* The unique function name that was generated
|
|
46
|
+
*/
|
|
47
|
+
readonly uniqueFunctionName: string;
|
|
48
|
+
}
|
|
49
|
+
/**
|
|
50
|
+
* Utility class for creating secure Lambda IAM policy statements with minimal permissions
|
|
51
|
+
*/
|
|
52
|
+
export declare class LambdaIamUtils {
|
|
53
|
+
/**
|
|
54
|
+
* Creates CloudWatch Logs policy statements for Lambda execution
|
|
55
|
+
*
|
|
56
|
+
* @param props Configuration properties
|
|
57
|
+
* @returns Object containing policy statements and the unique function name
|
|
58
|
+
*/
|
|
59
|
+
static createLogsPermissions(props: LambdaLogsPermissionsProps): LambdaLogsPermissionsResult;
|
|
60
|
+
static generateLambdaVPCPermissions(): iam.PolicyStatement;
|
|
61
|
+
/**
|
|
62
|
+
* Generates a unique function name using CDK's built-in functionality
|
|
63
|
+
*
|
|
64
|
+
* @param scope The construct scope
|
|
65
|
+
* @param baseName The base name for the function
|
|
66
|
+
* @returns Unique function name
|
|
67
|
+
*/
|
|
68
|
+
static generateUniqueFunctionName(scope: Construct, baseName: string): string;
|
|
69
|
+
/**
|
|
70
|
+
* Creates VPC permissions for Lambda functions running in VPC
|
|
71
|
+
*
|
|
72
|
+
* @returns Array of IAM PolicyStatements for VPC access
|
|
73
|
+
*/
|
|
74
|
+
static createVpcPermissions(): iam.PolicyStatement[];
|
|
75
|
+
/**
|
|
76
|
+
* Creates X-Ray tracing permissions for Lambda functions
|
|
77
|
+
*
|
|
78
|
+
* @returns Array of IAM PolicyStatements for X-Ray tracing
|
|
79
|
+
*/
|
|
80
|
+
static createXRayPermissions(): iam.PolicyStatement[];
|
|
81
|
+
/**
|
|
82
|
+
* Helper method to get region and account from a construct
|
|
83
|
+
*
|
|
84
|
+
* @param scope The construct scope
|
|
85
|
+
* @returns LambdaIamUtilsStackInfo
|
|
86
|
+
*/
|
|
87
|
+
static getStackInfo(scope: Construct): LambdaIamUtilsStackInfo;
|
|
88
|
+
/**
|
|
89
|
+
* Creates a policy statement for DynamoDB table access
|
|
90
|
+
*
|
|
91
|
+
* @param tableArn The ARN of the DynamoDB table
|
|
92
|
+
* @param actions The DynamoDB actions to allow
|
|
93
|
+
* @returns PolicyStatement for DynamoDB access
|
|
94
|
+
*/
|
|
95
|
+
static createDynamoDbPolicyStatement(tableArn: string, actions?: string[]): iam.PolicyStatement;
|
|
96
|
+
/**
|
|
97
|
+
* Creates a policy statement for S3 bucket access
|
|
98
|
+
*
|
|
99
|
+
* @param bucketArn The ARN of the S3 bucket
|
|
100
|
+
* @param actions The S3 actions to allow
|
|
101
|
+
* @param includeObjects Whether to include object-level permissions
|
|
102
|
+
* @returns PolicyStatement for S3 access
|
|
103
|
+
*/
|
|
104
|
+
static createS3PolicyStatement(bucketArn: string, actions?: string[], includeObjects?: boolean): iam.PolicyStatement;
|
|
105
|
+
/**
|
|
106
|
+
* Creates a policy statement for SQS queue access
|
|
107
|
+
*
|
|
108
|
+
* @param queueArn The ARN of the SQS queue
|
|
109
|
+
* @param actions The SQS actions to allow
|
|
110
|
+
* @returns PolicyStatement for SQS access
|
|
111
|
+
*/
|
|
112
|
+
static createSqsPolicyStatement(queueArn: string, actions?: string[]): iam.PolicyStatement;
|
|
113
|
+
/**
|
|
114
|
+
* Creates a policy statement for SNS topic access
|
|
115
|
+
*
|
|
116
|
+
* @param topicArn The ARN of the SNS topic
|
|
117
|
+
* @param actions The SNS actions to allow
|
|
118
|
+
* @returns PolicyStatement for SNS access
|
|
119
|
+
*/
|
|
120
|
+
static createSnsPolicyStatement(topicArn: string, actions?: string[]): iam.PolicyStatement;
|
|
121
|
+
/**
|
|
122
|
+
* Creates a policy statement for Step Functions execution
|
|
123
|
+
*
|
|
124
|
+
* @param stateMachineArn The ARN of the Step Functions state machine
|
|
125
|
+
* @param actions The Step Functions actions to allow
|
|
126
|
+
* @returns PolicyStatement for Step Functions access
|
|
127
|
+
*/
|
|
128
|
+
static createStepFunctionsPolicyStatement(stateMachineArn: string, actions?: string[]): iam.PolicyStatement;
|
|
129
|
+
/**
|
|
130
|
+
* Creates a policy statement for Secrets Manager access
|
|
131
|
+
*
|
|
132
|
+
* @param secretArn The ARN of the secret
|
|
133
|
+
* @param actions The Secrets Manager actions to allow
|
|
134
|
+
* @returns PolicyStatement for Secrets Manager access
|
|
135
|
+
*/
|
|
136
|
+
static createSecretsManagerPolicyStatement(secretArn: string, actions?: string[]): iam.PolicyStatement;
|
|
137
|
+
/**
|
|
138
|
+
* Creates a policy statement for KMS key access
|
|
139
|
+
*
|
|
140
|
+
* @param keyArn The ARN of the KMS key
|
|
141
|
+
* @param actions The KMS actions to allow
|
|
142
|
+
* @returns PolicyStatement for KMS access
|
|
143
|
+
*/
|
|
144
|
+
static createKmsPolicyStatement(keyArn: string, actions?: string[]): iam.PolicyStatement;
|
|
145
|
+
}
|
|
@@ -0,0 +1,235 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var _a;
|
|
3
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
4
|
+
exports.LambdaIamUtils = void 0;
|
|
5
|
+
const JSII_RTTI_SYMBOL_1 = Symbol.for("jsii.rtti");
|
|
6
|
+
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
|
7
|
+
// SPDX-License-Identifier: Apache-2.0
|
|
8
|
+
const cdk = require("aws-cdk-lib");
|
|
9
|
+
const aws_cdk_lib_1 = require("aws-cdk-lib");
|
|
10
|
+
const iam = require("aws-cdk-lib/aws-iam");
|
|
11
|
+
/**
|
|
12
|
+
* Utility class for creating secure Lambda IAM policy statements with minimal permissions
|
|
13
|
+
*/
|
|
14
|
+
class LambdaIamUtils {
|
|
15
|
+
/**
|
|
16
|
+
* Creates CloudWatch Logs policy statements for Lambda execution
|
|
17
|
+
*
|
|
18
|
+
* @param props Configuration properties
|
|
19
|
+
* @returns Object containing policy statements and the unique function name
|
|
20
|
+
*/
|
|
21
|
+
static createLogsPermissions(props) {
|
|
22
|
+
// Generate unique function name using construct node path
|
|
23
|
+
const uniqueFunctionName = LambdaIamUtils.generateUniqueFunctionName(props.scope, props.functionName);
|
|
24
|
+
const logGroupName = props.logGroupName || `/aws/lambda/${uniqueFunctionName}`;
|
|
25
|
+
const policyStatements = [
|
|
26
|
+
// Permission to create log group
|
|
27
|
+
new iam.PolicyStatement({
|
|
28
|
+
effect: iam.Effect.ALLOW,
|
|
29
|
+
actions: ['logs:CreateLogGroup'],
|
|
30
|
+
resources: [
|
|
31
|
+
`arn:aws:logs:${props.region}:${props.account}:log-group:${logGroupName}:*`,
|
|
32
|
+
],
|
|
33
|
+
}),
|
|
34
|
+
// Permission to create log streams and put log events
|
|
35
|
+
new iam.PolicyStatement({
|
|
36
|
+
effect: iam.Effect.ALLOW,
|
|
37
|
+
actions: [
|
|
38
|
+
'logs:CreateLogStream',
|
|
39
|
+
'logs:PutLogEvents',
|
|
40
|
+
],
|
|
41
|
+
resources: [
|
|
42
|
+
`arn:aws:logs:${props.region}:${props.account}:log-group:${logGroupName}:*`,
|
|
43
|
+
],
|
|
44
|
+
}),
|
|
45
|
+
];
|
|
46
|
+
return {
|
|
47
|
+
policyStatements,
|
|
48
|
+
uniqueFunctionName,
|
|
49
|
+
};
|
|
50
|
+
}
|
|
51
|
+
static generateLambdaVPCPermissions() {
|
|
52
|
+
return new iam.PolicyStatement({
|
|
53
|
+
effect: iam.Effect.ALLOW,
|
|
54
|
+
actions: [
|
|
55
|
+
'ec2:CreateNetworkInterface',
|
|
56
|
+
'ec2:DescribeNetworkInterfaces',
|
|
57
|
+
'ec2:DescribeSubnets',
|
|
58
|
+
'ec2:DeleteNetworkInterface',
|
|
59
|
+
'ec2:AssignPrivateIpAddresses',
|
|
60
|
+
'ec2:UnassignPrivateIpAddresses',
|
|
61
|
+
'ec2:DescribeSecurityGroups',
|
|
62
|
+
'ec2:DescribeVpcs',
|
|
63
|
+
'ec2:GetSecurityGroupsForVpc',
|
|
64
|
+
],
|
|
65
|
+
resources: ['*'],
|
|
66
|
+
});
|
|
67
|
+
}
|
|
68
|
+
/**
|
|
69
|
+
* Generates a unique function name using CDK's built-in functionality
|
|
70
|
+
*
|
|
71
|
+
* @param scope The construct scope
|
|
72
|
+
* @param baseName The base name for the function
|
|
73
|
+
* @returns Unique function name
|
|
74
|
+
*/
|
|
75
|
+
static generateUniqueFunctionName(scope, baseName) {
|
|
76
|
+
return `${baseName}-${aws_cdk_lib_1.Names.uniqueResourceName(scope, { maxLength: 64 - (baseName.length + 1) }).toLowerCase()}`;
|
|
77
|
+
}
|
|
78
|
+
/**
|
|
79
|
+
* Creates VPC permissions for Lambda functions running in VPC
|
|
80
|
+
*
|
|
81
|
+
* @returns Array of IAM PolicyStatements for VPC access
|
|
82
|
+
*/
|
|
83
|
+
static createVpcPermissions() {
|
|
84
|
+
return [
|
|
85
|
+
new iam.PolicyStatement({
|
|
86
|
+
effect: iam.Effect.ALLOW,
|
|
87
|
+
actions: [
|
|
88
|
+
'ec2:CreateNetworkInterface',
|
|
89
|
+
'ec2:DescribeNetworkInterfaces',
|
|
90
|
+
'ec2:DeleteNetworkInterface',
|
|
91
|
+
'ec2:AttachNetworkInterface',
|
|
92
|
+
'ec2:DetachNetworkInterface',
|
|
93
|
+
],
|
|
94
|
+
resources: ['*'], // VPC permissions require wildcard resources
|
|
95
|
+
}),
|
|
96
|
+
];
|
|
97
|
+
}
|
|
98
|
+
/**
|
|
99
|
+
* Creates X-Ray tracing permissions for Lambda functions
|
|
100
|
+
*
|
|
101
|
+
* @returns Array of IAM PolicyStatements for X-Ray tracing
|
|
102
|
+
*/
|
|
103
|
+
static createXRayPermissions() {
|
|
104
|
+
return [
|
|
105
|
+
new iam.PolicyStatement({
|
|
106
|
+
effect: iam.Effect.ALLOW,
|
|
107
|
+
actions: [
|
|
108
|
+
'xray:PutTraceSegments',
|
|
109
|
+
'xray:PutTelemetryRecords',
|
|
110
|
+
],
|
|
111
|
+
resources: ['*'], // X-Ray permissions require wildcard resources
|
|
112
|
+
}),
|
|
113
|
+
];
|
|
114
|
+
}
|
|
115
|
+
/**
|
|
116
|
+
* Helper method to get region and account from a construct
|
|
117
|
+
*
|
|
118
|
+
* @param scope The construct scope
|
|
119
|
+
* @returns LambdaIamUtilsStackInfo
|
|
120
|
+
*/
|
|
121
|
+
static getStackInfo(scope) {
|
|
122
|
+
const stack = cdk.Stack.of(scope);
|
|
123
|
+
return {
|
|
124
|
+
region: stack.region,
|
|
125
|
+
account: stack.account,
|
|
126
|
+
};
|
|
127
|
+
}
|
|
128
|
+
/**
|
|
129
|
+
* Creates a policy statement for DynamoDB table access
|
|
130
|
+
*
|
|
131
|
+
* @param tableArn The ARN of the DynamoDB table
|
|
132
|
+
* @param actions The DynamoDB actions to allow
|
|
133
|
+
* @returns PolicyStatement for DynamoDB access
|
|
134
|
+
*/
|
|
135
|
+
static createDynamoDbPolicyStatement(tableArn, actions = ['dynamodb:GetItem', 'dynamodb:PutItem', 'dynamodb:UpdateItem', 'dynamodb:DeleteItem', 'dynamodb:Query', 'dynamodb:Scan']) {
|
|
136
|
+
return new iam.PolicyStatement({
|
|
137
|
+
effect: iam.Effect.ALLOW,
|
|
138
|
+
actions,
|
|
139
|
+
resources: [tableArn, `${tableArn}/index/*`], // Include GSI access
|
|
140
|
+
});
|
|
141
|
+
}
|
|
142
|
+
/**
|
|
143
|
+
* Creates a policy statement for S3 bucket access
|
|
144
|
+
*
|
|
145
|
+
* @param bucketArn The ARN of the S3 bucket
|
|
146
|
+
* @param actions The S3 actions to allow
|
|
147
|
+
* @param includeObjects Whether to include object-level permissions
|
|
148
|
+
* @returns PolicyStatement for S3 access
|
|
149
|
+
*/
|
|
150
|
+
static createS3PolicyStatement(bucketArn, actions = ['s3:GetObject', 's3:PutObject'], includeObjects = true) {
|
|
151
|
+
const resources = [bucketArn];
|
|
152
|
+
if (includeObjects) {
|
|
153
|
+
resources.push(`${bucketArn}/*`);
|
|
154
|
+
}
|
|
155
|
+
return new iam.PolicyStatement({
|
|
156
|
+
effect: iam.Effect.ALLOW,
|
|
157
|
+
actions,
|
|
158
|
+
resources,
|
|
159
|
+
});
|
|
160
|
+
}
|
|
161
|
+
/**
|
|
162
|
+
* Creates a policy statement for SQS queue access
|
|
163
|
+
*
|
|
164
|
+
* @param queueArn The ARN of the SQS queue
|
|
165
|
+
* @param actions The SQS actions to allow
|
|
166
|
+
* @returns PolicyStatement for SQS access
|
|
167
|
+
*/
|
|
168
|
+
static createSqsPolicyStatement(queueArn, actions = ['sqs:ReceiveMessage', 'sqs:DeleteMessage', 'sqs:GetQueueAttributes']) {
|
|
169
|
+
return new iam.PolicyStatement({
|
|
170
|
+
effect: iam.Effect.ALLOW,
|
|
171
|
+
actions,
|
|
172
|
+
resources: [queueArn],
|
|
173
|
+
});
|
|
174
|
+
}
|
|
175
|
+
/**
|
|
176
|
+
* Creates a policy statement for SNS topic access
|
|
177
|
+
*
|
|
178
|
+
* @param topicArn The ARN of the SNS topic
|
|
179
|
+
* @param actions The SNS actions to allow
|
|
180
|
+
* @returns PolicyStatement for SNS access
|
|
181
|
+
*/
|
|
182
|
+
static createSnsPolicyStatement(topicArn, actions = ['sns:Publish']) {
|
|
183
|
+
return new iam.PolicyStatement({
|
|
184
|
+
effect: iam.Effect.ALLOW,
|
|
185
|
+
actions,
|
|
186
|
+
resources: [topicArn],
|
|
187
|
+
});
|
|
188
|
+
}
|
|
189
|
+
/**
|
|
190
|
+
* Creates a policy statement for Step Functions execution
|
|
191
|
+
*
|
|
192
|
+
* @param stateMachineArn The ARN of the Step Functions state machine
|
|
193
|
+
* @param actions The Step Functions actions to allow
|
|
194
|
+
* @returns PolicyStatement for Step Functions access
|
|
195
|
+
*/
|
|
196
|
+
static createStepFunctionsPolicyStatement(stateMachineArn, actions = ['states:StartExecution']) {
|
|
197
|
+
return new iam.PolicyStatement({
|
|
198
|
+
effect: iam.Effect.ALLOW,
|
|
199
|
+
actions,
|
|
200
|
+
resources: [stateMachineArn],
|
|
201
|
+
});
|
|
202
|
+
}
|
|
203
|
+
/**
|
|
204
|
+
* Creates a policy statement for Secrets Manager access
|
|
205
|
+
*
|
|
206
|
+
* @param secretArn The ARN of the secret
|
|
207
|
+
* @param actions The Secrets Manager actions to allow
|
|
208
|
+
* @returns PolicyStatement for Secrets Manager access
|
|
209
|
+
*/
|
|
210
|
+
static createSecretsManagerPolicyStatement(secretArn, actions = ['secretsmanager:GetSecretValue']) {
|
|
211
|
+
return new iam.PolicyStatement({
|
|
212
|
+
effect: iam.Effect.ALLOW,
|
|
213
|
+
actions,
|
|
214
|
+
resources: [secretArn],
|
|
215
|
+
});
|
|
216
|
+
}
|
|
217
|
+
/**
|
|
218
|
+
* Creates a policy statement for KMS key access
|
|
219
|
+
*
|
|
220
|
+
* @param keyArn The ARN of the KMS key
|
|
221
|
+
* @param actions The KMS actions to allow
|
|
222
|
+
* @returns PolicyStatement for KMS access
|
|
223
|
+
*/
|
|
224
|
+
static createKmsPolicyStatement(keyArn, actions = ['kms:Decrypt', 'kms:GenerateDataKey']) {
|
|
225
|
+
return new iam.PolicyStatement({
|
|
226
|
+
effect: iam.Effect.ALLOW,
|
|
227
|
+
actions,
|
|
228
|
+
resources: [keyArn],
|
|
229
|
+
});
|
|
230
|
+
}
|
|
231
|
+
}
|
|
232
|
+
exports.LambdaIamUtils = LambdaIamUtils;
|
|
233
|
+
_a = JSII_RTTI_SYMBOL_1;
|
|
234
|
+
LambdaIamUtils[_a] = { fqn: "@cdklabs/cdk-appmod-catalog-blueprints.LambdaIamUtils", version: "1.0.0" };
|
|
235
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"lambda-iam-utils.js","sourceRoot":"","sources":["../../use-cases/utilities/lambda-iam-utils.ts"],"names":[],"mappings":";;;;;AAAA,qEAAqE;AACrE,sCAAsC;AACtC,mCAAmC;AACnC,6CAAoC;AACpC,2CAA2C;AAyD3C;;GAEG;AACH,MAAa,cAAc;IACzB;;;;;OAKG;IACI,MAAM,CAAC,qBAAqB,CAAC,KAAiC;QACnE,0DAA0D;QAC1D,MAAM,kBAAkB,GAAG,cAAc,CAAC,0BAA0B,CAAC,KAAK,CAAC,KAAK,EAAE,KAAK,CAAC,YAAY,CAAC,CAAC;QACtG,MAAM,YAAY,GAAG,KAAK,CAAC,YAAY,IAAI,eAAe,kBAAkB,EAAE,CAAC;QAE/E,MAAM,gBAAgB,GAAG;YACvB,iCAAiC;YACjC,IAAI,GAAG,CAAC,eAAe,CAAC;gBACtB,MAAM,EAAE,GAAG,CAAC,MAAM,CAAC,KAAK;gBACxB,OAAO,EAAE,CAAC,qBAAqB,CAAC;gBAChC,SAAS,EAAE;oBACT,gBAAgB,KAAK,CAAC,MAAM,IAAI,KAAK,CAAC,OAAO,cAAc,YAAY,IAAI;iBAC5E;aACF,CAAC;YACF,sDAAsD;YACtD,IAAI,GAAG,CAAC,eAAe,CAAC;gBACtB,MAAM,EAAE,GAAG,CAAC,MAAM,CAAC,KAAK;gBACxB,OAAO,EAAE;oBACP,sBAAsB;oBACtB,mBAAmB;iBACpB;gBACD,SAAS,EAAE;oBACT,gBAAgB,KAAK,CAAC,MAAM,IAAI,KAAK,CAAC,OAAO,cAAc,YAAY,IAAI;iBAC5E;aACF,CAAC;SACH,CAAC;QAEF,OAAO;YACL,gBAAgB;YAChB,kBAAkB;SACnB,CAAC;IACJ,CAAC;IAEM,MAAM,CAAC,4BAA4B;QACxC,OAAO,IAAI,GAAG,CAAC,eAAe,CAAC;YAC7B,MAAM,EAAE,GAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO,EAAE;gBACP,4BAA4B;gBAC5B,+BAA+B;gBAC/B,qBAAqB;gBACrB,4BAA4B;gBAC5B,8BAA8B;gBAC9B,gCAAgC;gBAChC,4BAA4B;gBAC5B,kBAAkB;gBAClB,6BAA6B;aAC9B;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CAAC;IACL,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,0BAA0B,CAAC,KAAgB,EAAE,QAAgB;QACzE,OAAO,GAAG,QAAQ,IAAI,mBAAK,CAAC,kBAAkB,CAAC,KAAK,EAAE,EAAE,SAAS,EAAE,EAAE,GAAG,CAAC,QAAQ,CAAC,MAAM,GAAG,CAAC,CAAC,EAAE,CAAC,CAAC,WAAW,EAAE,EAAE,CAAC;IACnH,CAAC;IAED;;;;OAIG;IACI,MAAM,CAAC,oBAAoB;QAChC,OAAO;YACL,IAAI,GAAG,CAAC,eAAe,CAAC;gBACtB,MAAM,EAAE,GAAG,CAAC,MAAM,CAAC,KAAK;gBACxB,OAAO,EAAE;oBACP,4BAA4B;oBAC5B,+BAA+B;oBAC/B,4BAA4B;oBAC5B,4BAA4B;oBAC5B,4BAA4B;iBAC7B;gBACD,SAAS,EAAE,CAAC,GAAG,CAAC,EAAE,6CAA6C;aAChE,CAAC;SACH,CAAC;IACJ,CAAC;IAED;;;;OAIG;IACI,MAAM,CAAC,qBAAqB;QACjC,OAAO;YACL,IAAI,GAAG,CAAC,eAAe,CAAC;gBACtB,MAAM,EAAE,GAAG,CAAC,MAAM,CAAC,KAAK;gBACxB,OAAO,EAAE;oBACP,uBAAuB;oBACvB,0BAA0B;iBAC3B;gBACD,SAAS,EAAE,CAAC,GAAG,CAAC,EAAE,+CAA+C;aAClE,CAAC;SACH,CAAC;IACJ,CAAC;IAED;;;;;OAKG;IACI,MAAM,CAAC,YAAY,CAAC,KAAgB;QACzC,MAAM,KAAK,GAAG,GAAG,CAAC,KAAK,CAAC,EAAE,CAAC,KAAK,CAAC,CAAC;QAClC,OAAO;YACL,MAAM,EAAE,KAAK,CAAC,MAAM;YACpB,OAAO,EAAE,KAAK,CAAC,OAAO;SACvB,CAAC;IACJ,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,6BAA6B,CACzC,QAAgB,EAChB,UAAoB,CAAC,kBAAkB,EAAE,kBAAkB,EAAE,qBAAqB,EAAE,qBAAqB,EAAE,gBAAgB,EAAE,eAAe,CAAC;QAE7I,OAAO,IAAI,GAAG,CAAC,eAAe,CAAC;YAC7B,MAAM,EAAE,GAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO;YACP,SAAS,EAAE,CAAC,QAAQ,EAAE,GAAG,QAAQ,UAAU,CAAC,EAAE,qBAAqB;SACpE,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;OAOG;IACI,MAAM,CAAC,uBAAuB,CACnC,SAAiB,EACjB,UAAoB,CAAC,cAAc,EAAE,cAAc,CAAC,EACpD,iBAA0B,IAAI;QAE9B,MAAM,SAAS,GAAG,CAAC,SAAS,CAAC,CAAC;QAC9B,IAAI,cAAc,EAAE,CAAC;YACnB,SAAS,CAAC,IAAI,CAAC,GAAG,SAAS,IAAI,CAAC,CAAC;QACnC,CAAC;QAED,OAAO,IAAI,GAAG,CAAC,eAAe,CAAC;YAC7B,MAAM,EAAE,GAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO;YACP,SAAS;SACV,CAAC,CAAC;IACL,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,wBAAwB,CACpC,QAAgB,EAChB,UAAoB,CAAC,oBAAoB,EAAE,mBAAmB,EAAE,wBAAwB,CAAC;QAEzF,OAAO,IAAI,GAAG,CAAC,eAAe,CAAC;YAC7B,MAAM,EAAE,GAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO;YACP,SAAS,EAAE,CAAC,QAAQ,CAAC;SACtB,CAAC,CAAC;IACL,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,wBAAwB,CACpC,QAAgB,EAChB,UAAoB,CAAC,aAAa,CAAC;QAEnC,OAAO,IAAI,GAAG,CAAC,eAAe,CAAC;YAC7B,MAAM,EAAE,GAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO;YACP,SAAS,EAAE,CAAC,QAAQ,CAAC;SACtB,CAAC,CAAC;IACL,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,kCAAkC,CAC9C,eAAuB,EACvB,UAAoB,CAAC,uBAAuB,CAAC;QAE7C,OAAO,IAAI,GAAG,CAAC,eAAe,CAAC;YAC7B,MAAM,EAAE,GAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO;YACP,SAAS,EAAE,CAAC,eAAe,CAAC;SAC7B,CAAC,CAAC;IACL,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,mCAAmC,CAC/C,SAAiB,EACjB,UAAoB,CAAC,+BAA+B,CAAC;QAErD,OAAO,IAAI,GAAG,CAAC,eAAe,CAAC;YAC7B,MAAM,EAAE,GAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO;YACP,SAAS,EAAE,CAAC,SAAS,CAAC;SACvB,CAAC,CAAC;IACL,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,wBAAwB,CACpC,MAAc,EACd,UAAoB,CAAC,aAAa,EAAE,qBAAqB,CAAC;QAE1D,OAAO,IAAI,GAAG,CAAC,eAAe,CAAC;YAC7B,MAAM,EAAE,GAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO;YACP,SAAS,EAAE,CAAC,MAAM,CAAC;SACpB,CAAC,CAAC;IACL,CAAC;;AA7PH,wCA8PC","sourcesContent":["// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n// SPDX-License-Identifier: Apache-2.0\nimport * as cdk from 'aws-cdk-lib';\nimport { Names } from 'aws-cdk-lib';\nimport * as iam from 'aws-cdk-lib/aws-iam';\nimport { Construct } from 'constructs';\n\n/**\n * Stack information\n */\nexport interface LambdaIamUtilsStackInfo {\n  readonly region: string;\n  readonly account: string;\n}\n\n/**\n * Configuration options for Lambda CloudWatch Logs permissions\n */\nexport interface LambdaLogsPermissionsProps {\n  /**\n   * The construct scope (used to generate unique names)\n   */\n  readonly scope: Construct;\n\n  /**\n   * The base name of the Lambda function\n   */\n  readonly functionName: string;\n\n  /**\n   * Custom log group name pattern\n   * @default '/aws/lambda/{uniqueFunctionName}'\n   */\n  readonly logGroupName?: string;\n\n  /**\n   * AWS region for the log group ARN\n   */\n  readonly region: string;\n\n  /**\n   * AWS account ID for the log group ARN\n   */\n  readonly account: string;\n}\n\n/**\n * Result of creating Lambda logs permissions\n */\nexport interface LambdaLogsPermissionsResult {\n  /**\n   * The policy statements for CloudWatch Logs\n   */\n  readonly policyStatements: iam.PolicyStatement[];\n\n  /**\n   * The unique function name that was generated\n   */\n  readonly uniqueFunctionName: string;\n}\n\n/**\n * Utility class for creating secure Lambda IAM policy statements with minimal permissions\n */\nexport class LambdaIamUtils {\n  /**\n   * Creates CloudWatch Logs policy statements for Lambda execution\n   *\n   * @param props Configuration properties\n   * @returns Object containing policy statements and the unique function name\n   */\n  public static createLogsPermissions(props: LambdaLogsPermissionsProps): LambdaLogsPermissionsResult {\n    // Generate unique function name using construct node path\n    const uniqueFunctionName = LambdaIamUtils.generateUniqueFunctionName(props.scope, props.functionName);\n    const logGroupName = props.logGroupName || `/aws/lambda/${uniqueFunctionName}`;\n\n    const policyStatements = [\n      // Permission to create log group\n      new iam.PolicyStatement({\n        effect: iam.Effect.ALLOW,\n        actions: ['logs:CreateLogGroup'],\n        resources: [\n          `arn:aws:logs:${props.region}:${props.account}:log-group:${logGroupName}:*`,\n        ],\n      }),\n      // Permission to create log streams and put log events\n      new iam.PolicyStatement({\n        effect: iam.Effect.ALLOW,\n        actions: [\n          'logs:CreateLogStream',\n          'logs:PutLogEvents',\n        ],\n        resources: [\n          `arn:aws:logs:${props.region}:${props.account}:log-group:${logGroupName}:*`,\n        ],\n      }),\n    ];\n\n    return {\n      policyStatements,\n      uniqueFunctionName,\n    };\n  }\n\n  public static generateLambdaVPCPermissions(): iam.PolicyStatement {\n    return new iam.PolicyStatement({\n      effect: iam.Effect.ALLOW,\n      actions: [\n        'ec2:CreateNetworkInterface',\n        'ec2:DescribeNetworkInterfaces',\n        'ec2:DescribeSubnets',\n        'ec2:DeleteNetworkInterface',\n        'ec2:AssignPrivateIpAddresses',\n        'ec2:UnassignPrivateIpAddresses',\n        'ec2:DescribeSecurityGroups',\n        'ec2:DescribeVpcs',\n        'ec2:GetSecurityGroupsForVpc',\n      ],\n      resources: ['*'],\n    });\n  }\n\n  /**\n   * Generates a unique function name using CDK's built-in functionality\n   *\n   * @param scope The construct scope\n   * @param baseName The base name for the function\n   * @returns Unique function name\n   */\n  public static generateUniqueFunctionName(scope: Construct, baseName: string): string {\n    return `${baseName}-${Names.uniqueResourceName(scope, { maxLength: 64 - (baseName.length + 1) }).toLowerCase()}`;\n  }\n\n  /**\n   * Creates VPC permissions for Lambda functions running in VPC\n   *\n   * @returns Array of IAM PolicyStatements for VPC access\n   */\n  public static createVpcPermissions(): iam.PolicyStatement[] {\n    return [\n      new iam.PolicyStatement({\n        effect: iam.Effect.ALLOW,\n        actions: [\n          'ec2:CreateNetworkInterface',\n          'ec2:DescribeNetworkInterfaces',\n          'ec2:DeleteNetworkInterface',\n          'ec2:AttachNetworkInterface',\n          'ec2:DetachNetworkInterface',\n        ],\n        resources: ['*'], // VPC permissions require wildcard resources\n      }),\n    ];\n  }\n\n  /**\n   * Creates X-Ray tracing permissions for Lambda functions\n   *\n   * @returns Array of IAM PolicyStatements for X-Ray tracing\n   */\n  public static createXRayPermissions(): iam.PolicyStatement[] {\n    return [\n      new iam.PolicyStatement({\n        effect: iam.Effect.ALLOW,\n        actions: [\n          'xray:PutTraceSegments',\n          'xray:PutTelemetryRecords',\n        ],\n        resources: ['*'], // X-Ray permissions require wildcard resources\n      }),\n    ];\n  }\n\n  /**\n   * Helper method to get region and account from a construct\n   *\n   * @param scope The construct scope\n   * @returns LambdaIamUtilsStackInfo\n   */\n  public static getStackInfo(scope: Construct): LambdaIamUtilsStackInfo {\n    const stack = cdk.Stack.of(scope);\n    return {\n      region: stack.region,\n      account: stack.account,\n    };\n  }\n\n  /**\n   * Creates a policy statement for DynamoDB table access\n   *\n   * @param tableArn The ARN of the DynamoDB table\n   * @param actions The DynamoDB actions to allow\n   * @returns PolicyStatement for DynamoDB access\n   */\n  public static createDynamoDbPolicyStatement(\n    tableArn: string,\n    actions: string[] = ['dynamodb:GetItem', 'dynamodb:PutItem', 'dynamodb:UpdateItem', 'dynamodb:DeleteItem', 'dynamodb:Query', 'dynamodb:Scan'],\n  ): iam.PolicyStatement {\n    return new iam.PolicyStatement({\n      effect: iam.Effect.ALLOW,\n      actions,\n      resources: [tableArn, `${tableArn}/index/*`], // Include GSI access\n    });\n  }\n\n  /**\n   * Creates a policy statement for S3 bucket access\n   *\n   * @param bucketArn The ARN of the S3 bucket\n   * @param actions The S3 actions to allow\n   * @param includeObjects Whether to include object-level permissions\n   * @returns PolicyStatement for S3 access\n   */\n  public static createS3PolicyStatement(\n    bucketArn: string,\n    actions: string[] = ['s3:GetObject', 's3:PutObject'],\n    includeObjects: boolean = true,\n  ): iam.PolicyStatement {\n    const resources = [bucketArn];\n    if (includeObjects) {\n      resources.push(`${bucketArn}/*`);\n    }\n\n    return new iam.PolicyStatement({\n      effect: iam.Effect.ALLOW,\n      actions,\n      resources,\n    });\n  }\n\n  /**\n   * Creates a policy statement for SQS queue access\n   *\n   * @param queueArn The ARN of the SQS queue\n   * @param actions The SQS actions to allow\n   * @returns PolicyStatement for SQS access\n   */\n  public static createSqsPolicyStatement(\n    queueArn: string,\n    actions: string[] = ['sqs:ReceiveMessage', 'sqs:DeleteMessage', 'sqs:GetQueueAttributes'],\n  ): iam.PolicyStatement {\n    return new iam.PolicyStatement({\n      effect: iam.Effect.ALLOW,\n      actions,\n      resources: [queueArn],\n    });\n  }\n\n  /**\n   * Creates a policy statement for SNS topic access\n   *\n   * @param topicArn The ARN of the SNS topic\n   * @param actions The SNS actions to allow\n   * @returns PolicyStatement for SNS access\n   */\n  public static createSnsPolicyStatement(\n    topicArn: string,\n    actions: string[] = ['sns:Publish'],\n  ): iam.PolicyStatement {\n    return new iam.PolicyStatement({\n      effect: iam.Effect.ALLOW,\n      actions,\n      resources: [topicArn],\n    });\n  }\n\n  /**\n   * Creates a policy statement for Step Functions execution\n   *\n   * @param stateMachineArn The ARN of the Step Functions state machine\n   * @param actions The Step Functions actions to allow\n   * @returns PolicyStatement for Step Functions access\n   */\n  public static createStepFunctionsPolicyStatement(\n    stateMachineArn: string,\n    actions: string[] = ['states:StartExecution'],\n  ): iam.PolicyStatement {\n    return new iam.PolicyStatement({\n      effect: iam.Effect.ALLOW,\n      actions,\n      resources: [stateMachineArn],\n    });\n  }\n\n  /**\n   * Creates a policy statement for Secrets Manager access\n   *\n   * @param secretArn The ARN of the secret\n   * @param actions The Secrets Manager actions to allow\n   * @returns PolicyStatement for Secrets Manager access\n   */\n  public static createSecretsManagerPolicyStatement(\n    secretArn: string,\n    actions: string[] = ['secretsmanager:GetSecretValue'],\n  ): iam.PolicyStatement {\n    return new iam.PolicyStatement({\n      effect: iam.Effect.ALLOW,\n      actions,\n      resources: [secretArn],\n    });\n  }\n\n  /**\n   * Creates a policy statement for KMS key access\n   *\n   * @param keyArn The ARN of the KMS key\n   * @param actions The KMS actions to allow\n   * @returns PolicyStatement for KMS access\n   */\n  public static createKmsPolicyStatement(\n    keyArn: string,\n    actions: string[] = ['kms:Decrypt', 'kms:GenerateDataKey'],\n  ): iam.PolicyStatement {\n    return new iam.PolicyStatement({\n      effect: iam.Effect.ALLOW,\n      actions,\n      resources: [keyArn],\n    });\n  }\n}\n"]}
|
|
@@ -0,0 +1,42 @@
|
|
|
1
|
+
import * as lambda from 'aws-cdk-lib/aws-lambda';
|
|
2
|
+
import { Construct } from 'constructs';
|
|
3
|
+
/**
|
|
4
|
+
* Properties for the DataMaskingLayerConstruct
|
|
5
|
+
*/
|
|
6
|
+
export interface DataMaskingLayerProps {
|
|
7
|
+
/**
|
|
8
|
+
* Description for the Lambda layer
|
|
9
|
+
* @default 'Lambda layer for masking sensitive data in document processing'
|
|
10
|
+
*/
|
|
11
|
+
description?: string;
|
|
12
|
+
/**
|
|
13
|
+
* Custom masking patterns to add to the default ones
|
|
14
|
+
* @default {}
|
|
15
|
+
*/
|
|
16
|
+
customPatterns?: Record<string, {
|
|
17
|
+
/**
|
|
18
|
+
* Regular expression pattern as string
|
|
19
|
+
*/
|
|
20
|
+
regex: string;
|
|
21
|
+
/**
|
|
22
|
+
* Mask to apply (string or function name)
|
|
23
|
+
*/
|
|
24
|
+
mask: string;
|
|
25
|
+
}>;
|
|
26
|
+
}
|
|
27
|
+
/**
|
|
28
|
+
* Construct that creates a Lambda layer for data masking
|
|
29
|
+
*/
|
|
30
|
+
export declare class DataMaskingLayerConstruct extends Construct {
|
|
31
|
+
/**
|
|
32
|
+
* The Lambda layer containing masking utilities
|
|
33
|
+
*/
|
|
34
|
+
readonly layer: lambda.LayerVersion;
|
|
35
|
+
constructor(scope: Construct, id: string, props?: DataMaskingLayerProps);
|
|
36
|
+
/**
|
|
37
|
+
* Adds the masking layer to a Lambda function
|
|
38
|
+
* @param fn Lambda function to add the layer to
|
|
39
|
+
* @param maskingConfig Optional masking configuration to add as environment variable
|
|
40
|
+
*/
|
|
41
|
+
addToFunction(fn: lambda.Function, maskingConfig?: Record<string, string[]>): void;
|
|
42
|
+
}
|
|
@@ -0,0 +1,53 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
|
3
|
+
// SPDX-License-Identifier: Apache-2.0
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.DataMaskingLayerConstruct = void 0;
|
|
6
|
+
const path = require("path");
|
|
7
|
+
const lambda = require("aws-cdk-lib/aws-lambda");
|
|
8
|
+
const constructs_1 = require("constructs");
|
|
9
|
+
/**
|
|
10
|
+
* Construct that creates a Lambda layer for data masking
|
|
11
|
+
*/
|
|
12
|
+
class DataMaskingLayerConstruct extends constructs_1.Construct {
|
|
13
|
+
constructor(scope, id, props = {}) {
|
|
14
|
+
super(scope, id);
|
|
15
|
+
// Create the Lambda layer
|
|
16
|
+
this.layer = new lambda.LayerVersion(this, 'DataMaskingLayer', {
|
|
17
|
+
code: lambda.Code.fromAsset(path.join(__dirname, '../../../utilities/lambda_layers/data-masking')),
|
|
18
|
+
compatibleRuntimes: [
|
|
19
|
+
lambda.Runtime.NODEJS_16_X,
|
|
20
|
+
lambda.Runtime.NODEJS_18_X,
|
|
21
|
+
lambda.Runtime.NODEJS_20_X,
|
|
22
|
+
],
|
|
23
|
+
description: props.description || 'Lambda layer for masking sensitive data',
|
|
24
|
+
license: 'Apache-2.0',
|
|
25
|
+
});
|
|
26
|
+
// Add metadata about available masking patterns
|
|
27
|
+
const defaultPatterns = [
|
|
28
|
+
'nric', 'ssn', 'creditCard', 'email', 'phone', 'passport',
|
|
29
|
+
];
|
|
30
|
+
// Add custom patterns if provided
|
|
31
|
+
const allPatterns = [...defaultPatterns];
|
|
32
|
+
if (props.customPatterns) {
|
|
33
|
+
allPatterns.push(...Object.keys(props.customPatterns));
|
|
34
|
+
}
|
|
35
|
+
// Add metadata to the construct
|
|
36
|
+
this.node.addMetadata('maskingPatterns', allPatterns.join(', '));
|
|
37
|
+
}
|
|
38
|
+
/**
|
|
39
|
+
* Adds the masking layer to a Lambda function
|
|
40
|
+
* @param fn Lambda function to add the layer to
|
|
41
|
+
* @param maskingConfig Optional masking configuration to add as environment variable
|
|
42
|
+
*/
|
|
43
|
+
addToFunction(fn, maskingConfig) {
|
|
44
|
+
// Add the layer to the function
|
|
45
|
+
fn.addLayers(this.layer);
|
|
46
|
+
// Add masking configuration if provided
|
|
47
|
+
if (maskingConfig) {
|
|
48
|
+
fn.addEnvironment('MASKING_CONFIG', JSON.stringify(maskingConfig));
|
|
49
|
+
}
|
|
50
|
+
}
|
|
51
|
+
}
|
|
52
|
+
exports.DataMaskingLayerConstruct = DataMaskingLayerConstruct;
|
|
53
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,88 @@
|
|
|
1
|
+
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
|
2
|
+
// SPDX-License-Identifier: Apache-2.0
|
|
3
|
+
|
|
4
|
+
import * as path from 'path';
|
|
5
|
+
import * as lambda from 'aws-cdk-lib/aws-lambda';
|
|
6
|
+
import { Construct } from 'constructs';
|
|
7
|
+
|
|
8
|
+
/**
|
|
9
|
+
* Properties for the DataMaskingLayerConstruct
|
|
10
|
+
*/
|
|
11
|
+
export interface DataMaskingLayerProps {
|
|
12
|
+
/**
|
|
13
|
+
* Description for the Lambda layer
|
|
14
|
+
* @default 'Lambda layer for masking sensitive data in document processing'
|
|
15
|
+
*/
|
|
16
|
+
description?: string;
|
|
17
|
+
|
|
18
|
+
/**
|
|
19
|
+
* Custom masking patterns to add to the default ones
|
|
20
|
+
* @default {}
|
|
21
|
+
*/
|
|
22
|
+
customPatterns?: Record<string, {
|
|
23
|
+
/**
|
|
24
|
+
* Regular expression pattern as string
|
|
25
|
+
*/
|
|
26
|
+
regex: string;
|
|
27
|
+
|
|
28
|
+
/**
|
|
29
|
+
* Mask to apply (string or function name)
|
|
30
|
+
*/
|
|
31
|
+
mask: string;
|
|
32
|
+
}>;
|
|
33
|
+
}
|
|
34
|
+
|
|
35
|
+
/**
|
|
36
|
+
* Construct that creates a Lambda layer for data masking
|
|
37
|
+
*/
|
|
38
|
+
export class DataMaskingLayerConstruct extends Construct {
|
|
39
|
+
/**
|
|
40
|
+
* The Lambda layer containing masking utilities
|
|
41
|
+
*/
|
|
42
|
+
public readonly layer: lambda.LayerVersion;
|
|
43
|
+
|
|
44
|
+
constructor(scope: Construct, id: string, props: DataMaskingLayerProps = {}) {
|
|
45
|
+
super(scope, id);
|
|
46
|
+
|
|
47
|
+
// Create the Lambda layer
|
|
48
|
+
this.layer = new lambda.LayerVersion(this, 'DataMaskingLayer', {
|
|
49
|
+
code: lambda.Code.fromAsset(path.join(__dirname, '../../../utilities/lambda_layers/data-masking')),
|
|
50
|
+
compatibleRuntimes: [
|
|
51
|
+
lambda.Runtime.NODEJS_16_X,
|
|
52
|
+
lambda.Runtime.NODEJS_18_X,
|
|
53
|
+
lambda.Runtime.NODEJS_20_X,
|
|
54
|
+
],
|
|
55
|
+
description: props.description || 'Lambda layer for masking sensitive data',
|
|
56
|
+
license: 'Apache-2.0',
|
|
57
|
+
});
|
|
58
|
+
|
|
59
|
+
// Add metadata about available masking patterns
|
|
60
|
+
const defaultPatterns = [
|
|
61
|
+
'nric', 'ssn', 'creditCard', 'email', 'phone', 'passport',
|
|
62
|
+
];
|
|
63
|
+
|
|
64
|
+
// Add custom patterns if provided
|
|
65
|
+
const allPatterns = [...defaultPatterns];
|
|
66
|
+
if (props.customPatterns) {
|
|
67
|
+
allPatterns.push(...Object.keys(props.customPatterns));
|
|
68
|
+
}
|
|
69
|
+
|
|
70
|
+
// Add metadata to the construct
|
|
71
|
+
this.node.addMetadata('maskingPatterns', allPatterns.join(', '));
|
|
72
|
+
}
|
|
73
|
+
|
|
74
|
+
/**
|
|
75
|
+
* Adds the masking layer to a Lambda function
|
|
76
|
+
* @param fn Lambda function to add the layer to
|
|
77
|
+
* @param maskingConfig Optional masking configuration to add as environment variable
|
|
78
|
+
*/
|
|
79
|
+
public addToFunction(fn: lambda.Function, maskingConfig?: Record<string, string[]>): void {
|
|
80
|
+
// Add the layer to the function
|
|
81
|
+
fn.addLayers(this.layer);
|
|
82
|
+
|
|
83
|
+
// Add masking configuration if provided
|
|
84
|
+
if (maskingConfig) {
|
|
85
|
+
fn.addEnvironment('MASKING_CONFIG', JSON.stringify(maskingConfig));
|
|
86
|
+
}
|
|
87
|
+
}
|
|
88
|
+
}
|
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
import { RemovalPolicy } from 'aws-cdk-lib';
|
|
2
|
+
import { Role } from 'aws-cdk-lib/aws-iam';
|
|
3
|
+
import { Key } from 'aws-cdk-lib/aws-kms';
|
|
4
|
+
import { LogGroup } from 'aws-cdk-lib/aws-logs';
|
|
5
|
+
import { Construct } from 'constructs';
|
|
6
|
+
import { LogGroupDataProtectionProps } from './log-group-data-protection-props';
|
|
7
|
+
export interface BedrockObservabilityProps {
|
|
8
|
+
readonly logGroupDataProtection?: LogGroupDataProtectionProps;
|
|
9
|
+
readonly loggingRole?: Role;
|
|
10
|
+
readonly overrideExistingConfiguration?: boolean;
|
|
11
|
+
readonly removalPolicy?: RemovalPolicy;
|
|
12
|
+
}
|
|
13
|
+
export declare class BedrockObservability extends Construct {
|
|
14
|
+
readonly logGroup: LogGroup;
|
|
15
|
+
readonly loggingRole: Role;
|
|
16
|
+
readonly encryptionKey: Key;
|
|
17
|
+
constructor(scope: Construct, id: string, props?: BedrockObservabilityProps);
|
|
18
|
+
}
|