@cdklabs/cdk-appmod-catalog-blueprints 1.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (105) hide show
  1. package/.jsii +8644 -0
  2. package/LICENSE +202 -0
  3. package/README.md +212 -0
  4. package/lib/document-processing/agentic-document-processing.d.ts +16 -0
  5. package/lib/document-processing/agentic-document-processing.js +90 -0
  6. package/lib/document-processing/base-document-processing.d.ts +189 -0
  7. package/lib/document-processing/base-document-processing.js +509 -0
  8. package/lib/document-processing/bedrock-document-processing.d.ts +167 -0
  9. package/lib/document-processing/bedrock-document-processing.js +297 -0
  10. package/lib/document-processing/index.d.ts +3 -0
  11. package/lib/document-processing/index.js +20 -0
  12. package/lib/document-processing/resources/default-bedrock-invoke/index.py +63 -0
  13. package/lib/document-processing/resources/default-bedrock-invoke/requirements.txt +4 -0
  14. package/lib/document-processing/resources/default-doc-retrieval-lambda/index.mjs +92 -0
  15. package/lib/document-processing/resources/default-doc-retrieval-lambda/package.json +10 -0
  16. package/lib/document-processing/resources/default-error-handler/index.js +46 -0
  17. package/lib/document-processing/resources/default-error-handler/package.json +4 -0
  18. package/lib/document-processing/resources/default-image-processor/classifier.mjs +665 -0
  19. package/lib/document-processing/resources/default-image-processor/extractors.mjs +465 -0
  20. package/lib/document-processing/resources/default-image-processor/index.mjs +143 -0
  21. package/lib/document-processing/resources/default-image-processor/package-lock.json +12 -0
  22. package/lib/document-processing/resources/default-image-processor/package.json +4 -0
  23. package/lib/document-processing/resources/default-image-validator/index.mjs +76 -0
  24. package/lib/document-processing/resources/default-image-validator/package-lock.json +154 -0
  25. package/lib/document-processing/resources/default-image-validator/package.json +7 -0
  26. package/lib/document-processing/resources/default-pdf-processor/index.js +46 -0
  27. package/lib/document-processing/resources/default-pdf-validator/index.js +36 -0
  28. package/lib/document-processing/resources/default-sqs-consumer/index.py +111 -0
  29. package/lib/document-processing/resources/default-sqs-consumer/requirements.txt +4 -0
  30. package/lib/document-processing/resources/default-sqs-consumer/sample_payload.json +20 -0
  31. package/lib/document-processing/resources/default-sqs-consumer/sample_payload_multi.json +24 -0
  32. package/lib/document-processing/resources/default-strands-agent/index.py +111 -0
  33. package/lib/document-processing/resources/default-strands-agent/requirements.txt +6 -0
  34. package/lib/document-processing/tests/agentic-document-processing-nag.test.d.ts +1 -0
  35. package/lib/document-processing/tests/agentic-document-processing-nag.test.js +107 -0
  36. package/lib/document-processing/tests/agentic-document-processing.test.d.ts +1 -0
  37. package/lib/document-processing/tests/agentic-document-processing.test.js +125 -0
  38. package/lib/document-processing/tests/bedrock-document-processing-nag.test.d.ts +1 -0
  39. package/lib/document-processing/tests/bedrock-document-processing-nag.test.js +101 -0
  40. package/lib/document-processing/tests/bedrock-document-processing.test.d.ts +1 -0
  41. package/lib/document-processing/tests/bedrock-document-processing.test.js +79 -0
  42. package/lib/framework/custom-resource/default-runtimes.d.ts +21 -0
  43. package/lib/framework/custom-resource/default-runtimes.js +34 -0
  44. package/lib/framework/custom-resource/index.d.ts +1 -0
  45. package/lib/framework/custom-resource/index.js +18 -0
  46. package/lib/framework/foundation/access-log.d.ts +69 -0
  47. package/lib/framework/foundation/access-log.js +121 -0
  48. package/lib/framework/foundation/eventbridge-broker.d.ts +18 -0
  49. package/lib/framework/foundation/eventbridge-broker.js +42 -0
  50. package/lib/framework/foundation/index.d.ts +3 -0
  51. package/lib/framework/foundation/index.js +20 -0
  52. package/lib/framework/foundation/network.d.ts +19 -0
  53. package/lib/framework/foundation/network.js +83 -0
  54. package/lib/framework/index.d.ts +2 -0
  55. package/lib/framework/index.js +19 -0
  56. package/lib/framework/quickstart/base-quickstart.d.ts +30 -0
  57. package/lib/framework/quickstart/base-quickstart.js +30 -0
  58. package/lib/index.d.ts +4 -0
  59. package/lib/index.js +21 -0
  60. package/lib/tsconfig.tsbuildinfo +1 -0
  61. package/lib/utilities/cdk-nag-config.d.ts +42 -0
  62. package/lib/utilities/cdk-nag-config.js +194 -0
  63. package/lib/utilities/data-loader-lambda/index.py +282 -0
  64. package/lib/utilities/data-loader-lambda/requirements.txt +3 -0
  65. package/lib/utilities/data-loader.d.ts +173 -0
  66. package/lib/utilities/data-loader.js +447 -0
  67. package/lib/utilities/index.d.ts +3 -0
  68. package/lib/utilities/index.js +20 -0
  69. package/lib/utilities/lambda-iam-utils.d.ts +145 -0
  70. package/lib/utilities/lambda-iam-utils.js +235 -0
  71. package/lib/utilities/lambda_layers/data-masking/layer-construct.d.ts +42 -0
  72. package/lib/utilities/lambda_layers/data-masking/layer-construct.js +53 -0
  73. package/lib/utilities/lambda_layers/data-masking/layer-construct.ts +88 -0
  74. package/lib/utilities/observability/bedrock-observability.d.ts +18 -0
  75. package/lib/utilities/observability/bedrock-observability.js +131 -0
  76. package/lib/utilities/observability/cloudfront-distribution-observability-property-injector.d.ts +6 -0
  77. package/lib/utilities/observability/cloudfront-distribution-observability-property-injector.js +22 -0
  78. package/lib/utilities/observability/index.d.ts +6 -0
  79. package/lib/utilities/observability/index.js +25 -0
  80. package/lib/utilities/observability/lambda-observability-property-injector.d.ts +8 -0
  81. package/lib/utilities/observability/lambda-observability-property-injector.js +43 -0
  82. package/lib/utilities/observability/log-group-data-protection-props.d.ts +19 -0
  83. package/lib/utilities/observability/log-group-data-protection-props.js +5 -0
  84. package/lib/utilities/observability/observability.d.ts +83 -0
  85. package/lib/utilities/observability/observability.js +278 -0
  86. package/lib/utilities/observability/observable.d.ts +32 -0
  87. package/lib/utilities/observability/observable.js +3 -0
  88. package/lib/utilities/observability/powertools-config.d.ts +3 -0
  89. package/lib/utilities/observability/powertools-config.js +25 -0
  90. package/lib/utilities/observability/resources/bedrock-manage-logging-configuration/index.py +27 -0
  91. package/lib/utilities/observability/state-machine-observability-property-injector.d.ts +8 -0
  92. package/lib/utilities/observability/state-machine-observability-property-injector.js +49 -0
  93. package/lib/utilities/tests/data-loader-nag.test.d.ts +1 -0
  94. package/lib/utilities/tests/data-loader-nag.test.js +432 -0
  95. package/lib/utilities/tests/data-loader.test.d.ts +1 -0
  96. package/lib/utilities/tests/data-loader.test.js +284 -0
  97. package/lib/webapp/frontend-construct.d.ts +136 -0
  98. package/lib/webapp/frontend-construct.js +253 -0
  99. package/lib/webapp/index.d.ts +1 -0
  100. package/lib/webapp/index.js +18 -0
  101. package/lib/webapp/tests/frontend-construct-nag.test.d.ts +1 -0
  102. package/lib/webapp/tests/frontend-construct-nag.test.js +266 -0
  103. package/lib/webapp/tests/frontend-construct.test.d.ts +1 -0
  104. package/lib/webapp/tests/frontend-construct.test.js +385 -0
  105. package/package.json +183 -0
@@ -0,0 +1,145 @@
1
+ import * as iam from 'aws-cdk-lib/aws-iam';
2
+ import { Construct } from 'constructs';
3
+ /**
4
+ * Stack information
5
+ */
6
+ export interface LambdaIamUtilsStackInfo {
7
+ readonly region: string;
8
+ readonly account: string;
9
+ }
10
+ /**
11
+ * Configuration options for Lambda CloudWatch Logs permissions
12
+ */
13
+ export interface LambdaLogsPermissionsProps {
14
+ /**
15
+ * The construct scope (used to generate unique names)
16
+ */
17
+ readonly scope: Construct;
18
+ /**
19
+ * The base name of the Lambda function
20
+ */
21
+ readonly functionName: string;
22
+ /**
23
+ * Custom log group name pattern
24
+ * @default '/aws/lambda/{uniqueFunctionName}'
25
+ */
26
+ readonly logGroupName?: string;
27
+ /**
28
+ * AWS region for the log group ARN
29
+ */
30
+ readonly region: string;
31
+ /**
32
+ * AWS account ID for the log group ARN
33
+ */
34
+ readonly account: string;
35
+ }
36
+ /**
37
+ * Result of creating Lambda logs permissions
38
+ */
39
+ export interface LambdaLogsPermissionsResult {
40
+ /**
41
+ * The policy statements for CloudWatch Logs
42
+ */
43
+ readonly policyStatements: iam.PolicyStatement[];
44
+ /**
45
+ * The unique function name that was generated
46
+ */
47
+ readonly uniqueFunctionName: string;
48
+ }
49
+ /**
50
+ * Utility class for creating secure Lambda IAM policy statements with minimal permissions
51
+ */
52
+ export declare class LambdaIamUtils {
53
+ /**
54
+ * Creates CloudWatch Logs policy statements for Lambda execution
55
+ *
56
+ * @param props Configuration properties
57
+ * @returns Object containing policy statements and the unique function name
58
+ */
59
+ static createLogsPermissions(props: LambdaLogsPermissionsProps): LambdaLogsPermissionsResult;
60
+ static generateLambdaVPCPermissions(): iam.PolicyStatement;
61
+ /**
62
+ * Generates a unique function name using CDK's built-in functionality
63
+ *
64
+ * @param scope The construct scope
65
+ * @param baseName The base name for the function
66
+ * @returns Unique function name
67
+ */
68
+ static generateUniqueFunctionName(scope: Construct, baseName: string): string;
69
+ /**
70
+ * Creates VPC permissions for Lambda functions running in VPC
71
+ *
72
+ * @returns Array of IAM PolicyStatements for VPC access
73
+ */
74
+ static createVpcPermissions(): iam.PolicyStatement[];
75
+ /**
76
+ * Creates X-Ray tracing permissions for Lambda functions
77
+ *
78
+ * @returns Array of IAM PolicyStatements for X-Ray tracing
79
+ */
80
+ static createXRayPermissions(): iam.PolicyStatement[];
81
+ /**
82
+ * Helper method to get region and account from a construct
83
+ *
84
+ * @param scope The construct scope
85
+ * @returns LambdaIamUtilsStackInfo
86
+ */
87
+ static getStackInfo(scope: Construct): LambdaIamUtilsStackInfo;
88
+ /**
89
+ * Creates a policy statement for DynamoDB table access
90
+ *
91
+ * @param tableArn The ARN of the DynamoDB table
92
+ * @param actions The DynamoDB actions to allow
93
+ * @returns PolicyStatement for DynamoDB access
94
+ */
95
+ static createDynamoDbPolicyStatement(tableArn: string, actions?: string[]): iam.PolicyStatement;
96
+ /**
97
+ * Creates a policy statement for S3 bucket access
98
+ *
99
+ * @param bucketArn The ARN of the S3 bucket
100
+ * @param actions The S3 actions to allow
101
+ * @param includeObjects Whether to include object-level permissions
102
+ * @returns PolicyStatement for S3 access
103
+ */
104
+ static createS3PolicyStatement(bucketArn: string, actions?: string[], includeObjects?: boolean): iam.PolicyStatement;
105
+ /**
106
+ * Creates a policy statement for SQS queue access
107
+ *
108
+ * @param queueArn The ARN of the SQS queue
109
+ * @param actions The SQS actions to allow
110
+ * @returns PolicyStatement for SQS access
111
+ */
112
+ static createSqsPolicyStatement(queueArn: string, actions?: string[]): iam.PolicyStatement;
113
+ /**
114
+ * Creates a policy statement for SNS topic access
115
+ *
116
+ * @param topicArn The ARN of the SNS topic
117
+ * @param actions The SNS actions to allow
118
+ * @returns PolicyStatement for SNS access
119
+ */
120
+ static createSnsPolicyStatement(topicArn: string, actions?: string[]): iam.PolicyStatement;
121
+ /**
122
+ * Creates a policy statement for Step Functions execution
123
+ *
124
+ * @param stateMachineArn The ARN of the Step Functions state machine
125
+ * @param actions The Step Functions actions to allow
126
+ * @returns PolicyStatement for Step Functions access
127
+ */
128
+ static createStepFunctionsPolicyStatement(stateMachineArn: string, actions?: string[]): iam.PolicyStatement;
129
+ /**
130
+ * Creates a policy statement for Secrets Manager access
131
+ *
132
+ * @param secretArn The ARN of the secret
133
+ * @param actions The Secrets Manager actions to allow
134
+ * @returns PolicyStatement for Secrets Manager access
135
+ */
136
+ static createSecretsManagerPolicyStatement(secretArn: string, actions?: string[]): iam.PolicyStatement;
137
+ /**
138
+ * Creates a policy statement for KMS key access
139
+ *
140
+ * @param keyArn The ARN of the KMS key
141
+ * @param actions The KMS actions to allow
142
+ * @returns PolicyStatement for KMS access
143
+ */
144
+ static createKmsPolicyStatement(keyArn: string, actions?: string[]): iam.PolicyStatement;
145
+ }
@@ -0,0 +1,235 @@
1
+ "use strict";
2
+ var _a;
3
+ Object.defineProperty(exports, "__esModule", { value: true });
4
+ exports.LambdaIamUtils = void 0;
5
+ const JSII_RTTI_SYMBOL_1 = Symbol.for("jsii.rtti");
6
+ // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
7
+ // SPDX-License-Identifier: Apache-2.0
8
+ const cdk = require("aws-cdk-lib");
9
+ const aws_cdk_lib_1 = require("aws-cdk-lib");
10
+ const iam = require("aws-cdk-lib/aws-iam");
11
+ /**
12
+ * Utility class for creating secure Lambda IAM policy statements with minimal permissions
13
+ */
14
+ class LambdaIamUtils {
15
+ /**
16
+ * Creates CloudWatch Logs policy statements for Lambda execution
17
+ *
18
+ * @param props Configuration properties
19
+ * @returns Object containing policy statements and the unique function name
20
+ */
21
+ static createLogsPermissions(props) {
22
+ // Generate unique function name using construct node path
23
+ const uniqueFunctionName = LambdaIamUtils.generateUniqueFunctionName(props.scope, props.functionName);
24
+ const logGroupName = props.logGroupName || `/aws/lambda/${uniqueFunctionName}`;
25
+ const policyStatements = [
26
+ // Permission to create log group
27
+ new iam.PolicyStatement({
28
+ effect: iam.Effect.ALLOW,
29
+ actions: ['logs:CreateLogGroup'],
30
+ resources: [
31
+ `arn:aws:logs:${props.region}:${props.account}:log-group:${logGroupName}:*`,
32
+ ],
33
+ }),
34
+ // Permission to create log streams and put log events
35
+ new iam.PolicyStatement({
36
+ effect: iam.Effect.ALLOW,
37
+ actions: [
38
+ 'logs:CreateLogStream',
39
+ 'logs:PutLogEvents',
40
+ ],
41
+ resources: [
42
+ `arn:aws:logs:${props.region}:${props.account}:log-group:${logGroupName}:*`,
43
+ ],
44
+ }),
45
+ ];
46
+ return {
47
+ policyStatements,
48
+ uniqueFunctionName,
49
+ };
50
+ }
51
+ static generateLambdaVPCPermissions() {
52
+ return new iam.PolicyStatement({
53
+ effect: iam.Effect.ALLOW,
54
+ actions: [
55
+ 'ec2:CreateNetworkInterface',
56
+ 'ec2:DescribeNetworkInterfaces',
57
+ 'ec2:DescribeSubnets',
58
+ 'ec2:DeleteNetworkInterface',
59
+ 'ec2:AssignPrivateIpAddresses',
60
+ 'ec2:UnassignPrivateIpAddresses',
61
+ 'ec2:DescribeSecurityGroups',
62
+ 'ec2:DescribeVpcs',
63
+ 'ec2:GetSecurityGroupsForVpc',
64
+ ],
65
+ resources: ['*'],
66
+ });
67
+ }
68
+ /**
69
+ * Generates a unique function name using CDK's built-in functionality
70
+ *
71
+ * @param scope The construct scope
72
+ * @param baseName The base name for the function
73
+ * @returns Unique function name
74
+ */
75
+ static generateUniqueFunctionName(scope, baseName) {
76
+ return `${baseName}-${aws_cdk_lib_1.Names.uniqueResourceName(scope, { maxLength: 64 - (baseName.length + 1) }).toLowerCase()}`;
77
+ }
78
+ /**
79
+ * Creates VPC permissions for Lambda functions running in VPC
80
+ *
81
+ * @returns Array of IAM PolicyStatements for VPC access
82
+ */
83
+ static createVpcPermissions() {
84
+ return [
85
+ new iam.PolicyStatement({
86
+ effect: iam.Effect.ALLOW,
87
+ actions: [
88
+ 'ec2:CreateNetworkInterface',
89
+ 'ec2:DescribeNetworkInterfaces',
90
+ 'ec2:DeleteNetworkInterface',
91
+ 'ec2:AttachNetworkInterface',
92
+ 'ec2:DetachNetworkInterface',
93
+ ],
94
+ resources: ['*'], // VPC permissions require wildcard resources
95
+ }),
96
+ ];
97
+ }
98
+ /**
99
+ * Creates X-Ray tracing permissions for Lambda functions
100
+ *
101
+ * @returns Array of IAM PolicyStatements for X-Ray tracing
102
+ */
103
+ static createXRayPermissions() {
104
+ return [
105
+ new iam.PolicyStatement({
106
+ effect: iam.Effect.ALLOW,
107
+ actions: [
108
+ 'xray:PutTraceSegments',
109
+ 'xray:PutTelemetryRecords',
110
+ ],
111
+ resources: ['*'], // X-Ray permissions require wildcard resources
112
+ }),
113
+ ];
114
+ }
115
+ /**
116
+ * Helper method to get region and account from a construct
117
+ *
118
+ * @param scope The construct scope
119
+ * @returns LambdaIamUtilsStackInfo
120
+ */
121
+ static getStackInfo(scope) {
122
+ const stack = cdk.Stack.of(scope);
123
+ return {
124
+ region: stack.region,
125
+ account: stack.account,
126
+ };
127
+ }
128
+ /**
129
+ * Creates a policy statement for DynamoDB table access
130
+ *
131
+ * @param tableArn The ARN of the DynamoDB table
132
+ * @param actions The DynamoDB actions to allow
133
+ * @returns PolicyStatement for DynamoDB access
134
+ */
135
+ static createDynamoDbPolicyStatement(tableArn, actions = ['dynamodb:GetItem', 'dynamodb:PutItem', 'dynamodb:UpdateItem', 'dynamodb:DeleteItem', 'dynamodb:Query', 'dynamodb:Scan']) {
136
+ return new iam.PolicyStatement({
137
+ effect: iam.Effect.ALLOW,
138
+ actions,
139
+ resources: [tableArn, `${tableArn}/index/*`], // Include GSI access
140
+ });
141
+ }
142
+ /**
143
+ * Creates a policy statement for S3 bucket access
144
+ *
145
+ * @param bucketArn The ARN of the S3 bucket
146
+ * @param actions The S3 actions to allow
147
+ * @param includeObjects Whether to include object-level permissions
148
+ * @returns PolicyStatement for S3 access
149
+ */
150
+ static createS3PolicyStatement(bucketArn, actions = ['s3:GetObject', 's3:PutObject'], includeObjects = true) {
151
+ const resources = [bucketArn];
152
+ if (includeObjects) {
153
+ resources.push(`${bucketArn}/*`);
154
+ }
155
+ return new iam.PolicyStatement({
156
+ effect: iam.Effect.ALLOW,
157
+ actions,
158
+ resources,
159
+ });
160
+ }
161
+ /**
162
+ * Creates a policy statement for SQS queue access
163
+ *
164
+ * @param queueArn The ARN of the SQS queue
165
+ * @param actions The SQS actions to allow
166
+ * @returns PolicyStatement for SQS access
167
+ */
168
+ static createSqsPolicyStatement(queueArn, actions = ['sqs:ReceiveMessage', 'sqs:DeleteMessage', 'sqs:GetQueueAttributes']) {
169
+ return new iam.PolicyStatement({
170
+ effect: iam.Effect.ALLOW,
171
+ actions,
172
+ resources: [queueArn],
173
+ });
174
+ }
175
+ /**
176
+ * Creates a policy statement for SNS topic access
177
+ *
178
+ * @param topicArn The ARN of the SNS topic
179
+ * @param actions The SNS actions to allow
180
+ * @returns PolicyStatement for SNS access
181
+ */
182
+ static createSnsPolicyStatement(topicArn, actions = ['sns:Publish']) {
183
+ return new iam.PolicyStatement({
184
+ effect: iam.Effect.ALLOW,
185
+ actions,
186
+ resources: [topicArn],
187
+ });
188
+ }
189
+ /**
190
+ * Creates a policy statement for Step Functions execution
191
+ *
192
+ * @param stateMachineArn The ARN of the Step Functions state machine
193
+ * @param actions The Step Functions actions to allow
194
+ * @returns PolicyStatement for Step Functions access
195
+ */
196
+ static createStepFunctionsPolicyStatement(stateMachineArn, actions = ['states:StartExecution']) {
197
+ return new iam.PolicyStatement({
198
+ effect: iam.Effect.ALLOW,
199
+ actions,
200
+ resources: [stateMachineArn],
201
+ });
202
+ }
203
+ /**
204
+ * Creates a policy statement for Secrets Manager access
205
+ *
206
+ * @param secretArn The ARN of the secret
207
+ * @param actions The Secrets Manager actions to allow
208
+ * @returns PolicyStatement for Secrets Manager access
209
+ */
210
+ static createSecretsManagerPolicyStatement(secretArn, actions = ['secretsmanager:GetSecretValue']) {
211
+ return new iam.PolicyStatement({
212
+ effect: iam.Effect.ALLOW,
213
+ actions,
214
+ resources: [secretArn],
215
+ });
216
+ }
217
+ /**
218
+ * Creates a policy statement for KMS key access
219
+ *
220
+ * @param keyArn The ARN of the KMS key
221
+ * @param actions The KMS actions to allow
222
+ * @returns PolicyStatement for KMS access
223
+ */
224
+ static createKmsPolicyStatement(keyArn, actions = ['kms:Decrypt', 'kms:GenerateDataKey']) {
225
+ return new iam.PolicyStatement({
226
+ effect: iam.Effect.ALLOW,
227
+ actions,
228
+ resources: [keyArn],
229
+ });
230
+ }
231
+ }
232
+ exports.LambdaIamUtils = LambdaIamUtils;
233
+ _a = JSII_RTTI_SYMBOL_1;
234
+ LambdaIamUtils[_a] = { fqn: "@cdklabs/cdk-appmod-catalog-blueprints.LambdaIamUtils", version: "1.0.0" };
235
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"lambda-iam-utils.js","sourceRoot":"","sources":["../../use-cases/utilities/lambda-iam-utils.ts"],"names":[],"mappings":";;;;;AAAA,qEAAqE;AACrE,sCAAsC;AACtC,mCAAmC;AACnC,6CAAoC;AACpC,2CAA2C;AAyD3C;;GAEG;AACH,MAAa,cAAc;IACzB;;;;;OAKG;IACI,MAAM,CAAC,qBAAqB,CAAC,KAAiC;QACnE,0DAA0D;QAC1D,MAAM,kBAAkB,GAAG,cAAc,CAAC,0BAA0B,CAAC,KAAK,CAAC,KAAK,EAAE,KAAK,CAAC,YAAY,CAAC,CAAC;QACtG,MAAM,YAAY,GAAG,KAAK,CAAC,YAAY,IAAI,eAAe,kBAAkB,EAAE,CAAC;QAE/E,MAAM,gBAAgB,GAAG;YACvB,iCAAiC;YACjC,IAAI,GAAG,CAAC,eAAe,CAAC;gBACtB,MAAM,EAAE,GAAG,CAAC,MAAM,CAAC,KAAK;gBACxB,OAAO,EAAE,CAAC,qBAAqB,CAAC;gBAChC,SAAS,EAAE;oBACT,gBAAgB,KAAK,CAAC,MAAM,IAAI,KAAK,CAAC,OAAO,cAAc,YAAY,IAAI;iBAC5E;aACF,CAAC;YACF,sDAAsD;YACtD,IAAI,GAAG,CAAC,eAAe,CAAC;gBACtB,MAAM,EAAE,GAAG,CAAC,MAAM,CAAC,KAAK;gBACxB,OAAO,EAAE;oBACP,sBAAsB;oBACtB,mBAAmB;iBACpB;gBACD,SAAS,EAAE;oBACT,gBAAgB,KAAK,CAAC,MAAM,IAAI,KAAK,CAAC,OAAO,cAAc,YAAY,IAAI;iBAC5E;aACF,CAAC;SACH,CAAC;QAEF,OAAO;YACL,gBAAgB;YAChB,kBAAkB;SACnB,CAAC;IACJ,CAAC;IAEM,MAAM,CAAC,4BAA4B;QACxC,OAAO,IAAI,GAAG,CAAC,eAAe,CAAC;YAC7B,MAAM,EAAE,GAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO,EAAE;gBACP,4BAA4B;gBAC5B,+BAA+B;gBAC/B,qBAAqB;gBACrB,4BAA4B;gBAC5B,8BAA8B;gBAC9B,gCAAgC;gBAChC,4BAA4B;gBAC5B,kBAAkB;gBAClB,6BAA6B;aAC9B;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CAAC;IACL,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,0BAA0B,CAAC,KAAgB,EAAE,QAAgB;QACzE,OAAO,GAAG,QAAQ,IAAI,mBAAK,CAAC,kBAAkB,CAAC,KAAK,EAAE,EAAE,SAAS,EAAE,EAAE,GAAG,CAAC,QAAQ,CAAC,MAAM,GAAG,CAAC,CAAC,EAAE,CAAC,CAAC,WAAW,EAAE,EAAE,CAAC;IACnH,CAAC;IAED;;;;OAIG;IACI,MAAM,CAAC,oBAAoB;QAChC,OAAO;YACL,IAAI,GAAG,CAAC,eAAe,CAAC;gBACtB,MAAM,EAAE,GAAG,CAAC,MAAM,CAAC,KAAK;gBACxB,OAAO,EAAE;oBACP,4BAA4B;oBAC5B,+BAA+B;oBAC/B,4BAA4B;oBAC5B,4BAA4B;oBAC5B,4BAA4B;iBAC7B;gBACD,SAAS,EAAE,CAAC,GAAG,CAAC,EAAE,6CAA6C;aAChE,CAAC;SACH,CAAC;IACJ,CAAC;IAED;;;;OAIG;IACI,MAAM,CAAC,qBAAqB;QACjC,OAAO;YACL,IAAI,GAAG,CAAC,eAAe,CAAC;gBACtB,MAAM,EAAE,GAAG,CAAC,MAAM,CAAC,KAAK;gBACxB,OAAO,EAAE;oBACP,uBAAuB;oBACvB,0BAA0B;iBAC3B;gBACD,SAAS,EAAE,CAAC,GAAG,CAAC,EAAE,+CAA+C;aAClE,CAAC;SACH,CAAC;IACJ,CAAC;IAED;;;;;OAKG;IACI,MAAM,CAAC,YAAY,CAAC,KAAgB;QACzC,MAAM,KAAK,GAAG,GAAG,CAAC,KAAK,CAAC,EAAE,CAAC,KAAK,CAAC,CAAC;QAClC,OAAO;YACL,MAAM,EAAE,KAAK,CAAC,MAAM;YACpB,OAAO,EAAE,KAAK,CAAC,OAAO;SACvB,CAAC;IACJ,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,6BAA6B,CACzC,QAAgB,EAChB,UAAoB,CAAC,kBAAkB,EAAE,kBAAkB,EAAE,qBAAqB,EAAE,qBAAqB,EAAE,gBAAgB,EAAE,eAAe,CAAC;QAE7I,OAAO,IAAI,GAAG,CAAC,eAAe,CAAC;YAC7B,MAAM,EAAE,GAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO;YACP,SAAS,EAAE,CAAC,QAAQ,EAAE,GAAG,QAAQ,UAAU,CAAC,EAAE,qBAAqB;SACpE,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;OAOG;IACI,MAAM,CAAC,uBAAuB,CACnC,SAAiB,EACjB,UAAoB,CAAC,cAAc,EAAE,cAAc,CAAC,EACpD,iBAA0B,IAAI;QAE9B,MAAM,SAAS,GAAG,CAAC,SAAS,CAAC,CAAC;QAC9B,IAAI,cAAc,EAAE,CAAC;YACnB,SAAS,CAAC,IAAI,CAAC,GAAG,SAAS,IAAI,CAAC,CAAC;QACnC,CAAC;QAED,OAAO,IAAI,GAAG,CAAC,eAAe,CAAC;YAC7B,MAAM,EAAE,GAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO;YACP,SAAS;SACV,CAAC,CAAC;IACL,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,wBAAwB,CACpC,QAAgB,EAChB,UAAoB,CAAC,oBAAoB,EAAE,mBAAmB,EAAE,wBAAwB,CAAC;QAEzF,OAAO,IAAI,GAAG,CAAC,eAAe,CAAC;YAC7B,MAAM,EAAE,GAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO;YACP,SAAS,EAAE,CAAC,QAAQ,CAAC;SACtB,CAAC,CAAC;IACL,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,wBAAwB,CACpC,QAAgB,EAChB,UAAoB,CAAC,aAAa,CAAC;QAEnC,OAAO,IAAI,GAAG,CAAC,eAAe,CAAC;YAC7B,MAAM,EAAE,GAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO;YACP,SAAS,EAAE,CAAC,QAAQ,CAAC;SACtB,CAAC,CAAC;IACL,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,kCAAkC,CAC9C,eAAuB,EACvB,UAAoB,CAAC,uBAAuB,CAAC;QAE7C,OAAO,IAAI,GAAG,CAAC,eAAe,CAAC;YAC7B,MAAM,EAAE,GAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO;YACP,SAAS,EAAE,CAAC,eAAe,CAAC;SAC7B,CAAC,CAAC;IACL,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,mCAAmC,CAC/C,SAAiB,EACjB,UAAoB,CAAC,+BAA+B,CAAC;QAErD,OAAO,IAAI,GAAG,CAAC,eAAe,CAAC;YAC7B,MAAM,EAAE,GAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO;YACP,SAAS,EAAE,CAAC,SAAS,CAAC;SACvB,CAAC,CAAC;IACL,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,wBAAwB,CACpC,MAAc,EACd,UAAoB,CAAC,aAAa,EAAE,qBAAqB,CAAC;QAE1D,OAAO,IAAI,GAAG,CAAC,eAAe,CAAC;YAC7B,MAAM,EAAE,GAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO;YACP,SAAS,EAAE,CAAC,MAAM,CAAC;SACpB,CAAC,CAAC;IACL,CAAC;;AA7PH,wCA8PC","sourcesContent":["// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n// SPDX-License-Identifier: Apache-2.0\nimport * as cdk from 'aws-cdk-lib';\nimport { Names } from 'aws-cdk-lib';\nimport * as iam from 'aws-cdk-lib/aws-iam';\nimport { Construct } from 'constructs';\n\n/**\n * Stack information\n */\nexport interface LambdaIamUtilsStackInfo {\n  readonly region: string;\n  readonly account: string;\n}\n\n/**\n * Configuration options for Lambda CloudWatch Logs permissions\n */\nexport interface LambdaLogsPermissionsProps {\n  /**\n   * The construct scope (used to generate unique names)\n   */\n  readonly scope: Construct;\n\n  /**\n   * The base name of the Lambda function\n   */\n  readonly functionName: string;\n\n  /**\n   * Custom log group name pattern\n   * @default '/aws/lambda/{uniqueFunctionName}'\n   */\n  readonly logGroupName?: string;\n\n  /**\n   * AWS region for the log group ARN\n   */\n  readonly region: string;\n\n  /**\n   * AWS account ID for the log group ARN\n   */\n  readonly account: string;\n}\n\n/**\n * Result of creating Lambda logs permissions\n */\nexport interface LambdaLogsPermissionsResult {\n  /**\n   * The policy statements for CloudWatch Logs\n   */\n  readonly policyStatements: iam.PolicyStatement[];\n\n  /**\n   * The unique function name that was generated\n   */\n  readonly uniqueFunctionName: string;\n}\n\n/**\n * Utility class for creating secure Lambda IAM policy statements with minimal permissions\n */\nexport class LambdaIamUtils {\n  /**\n   * Creates CloudWatch Logs policy statements for Lambda execution\n   *\n   * @param props Configuration properties\n   * @returns Object containing policy statements and the unique function name\n   */\n  public static createLogsPermissions(props: LambdaLogsPermissionsProps): LambdaLogsPermissionsResult {\n    // Generate unique function name using construct node path\n    const uniqueFunctionName = LambdaIamUtils.generateUniqueFunctionName(props.scope, props.functionName);\n    const logGroupName = props.logGroupName || `/aws/lambda/${uniqueFunctionName}`;\n\n    const policyStatements = [\n      // Permission to create log group\n      new iam.PolicyStatement({\n        effect: iam.Effect.ALLOW,\n        actions: ['logs:CreateLogGroup'],\n        resources: [\n          `arn:aws:logs:${props.region}:${props.account}:log-group:${logGroupName}:*`,\n        ],\n      }),\n      // Permission to create log streams and put log events\n      new iam.PolicyStatement({\n        effect: iam.Effect.ALLOW,\n        actions: [\n          'logs:CreateLogStream',\n          'logs:PutLogEvents',\n        ],\n        resources: [\n          `arn:aws:logs:${props.region}:${props.account}:log-group:${logGroupName}:*`,\n        ],\n      }),\n    ];\n\n    return {\n      policyStatements,\n      uniqueFunctionName,\n    };\n  }\n\n  public static generateLambdaVPCPermissions(): iam.PolicyStatement {\n    return new iam.PolicyStatement({\n      effect: iam.Effect.ALLOW,\n      actions: [\n        'ec2:CreateNetworkInterface',\n        'ec2:DescribeNetworkInterfaces',\n        'ec2:DescribeSubnets',\n        'ec2:DeleteNetworkInterface',\n        'ec2:AssignPrivateIpAddresses',\n        'ec2:UnassignPrivateIpAddresses',\n        'ec2:DescribeSecurityGroups',\n        'ec2:DescribeVpcs',\n        'ec2:GetSecurityGroupsForVpc',\n      ],\n      resources: ['*'],\n    });\n  }\n\n  /**\n   * Generates a unique function name using CDK's built-in functionality\n   *\n   * @param scope The construct scope\n   * @param baseName The base name for the function\n   * @returns Unique function name\n   */\n  public static generateUniqueFunctionName(scope: Construct, baseName: string): string {\n    return `${baseName}-${Names.uniqueResourceName(scope, { maxLength: 64 - (baseName.length + 1) }).toLowerCase()}`;\n  }\n\n  /**\n   * Creates VPC permissions for Lambda functions running in VPC\n   *\n   * @returns Array of IAM PolicyStatements for VPC access\n   */\n  public static createVpcPermissions(): iam.PolicyStatement[] {\n    return [\n      new iam.PolicyStatement({\n        effect: iam.Effect.ALLOW,\n        actions: [\n          'ec2:CreateNetworkInterface',\n          'ec2:DescribeNetworkInterfaces',\n          'ec2:DeleteNetworkInterface',\n          'ec2:AttachNetworkInterface',\n          'ec2:DetachNetworkInterface',\n        ],\n        resources: ['*'], // VPC permissions require wildcard resources\n      }),\n    ];\n  }\n\n  /**\n   * Creates X-Ray tracing permissions for Lambda functions\n   *\n   * @returns Array of IAM PolicyStatements for X-Ray tracing\n   */\n  public static createXRayPermissions(): iam.PolicyStatement[] {\n    return [\n      new iam.PolicyStatement({\n        effect: iam.Effect.ALLOW,\n        actions: [\n          'xray:PutTraceSegments',\n          'xray:PutTelemetryRecords',\n        ],\n        resources: ['*'], // X-Ray permissions require wildcard resources\n      }),\n    ];\n  }\n\n  /**\n   * Helper method to get region and account from a construct\n   *\n   * @param scope The construct scope\n   * @returns LambdaIamUtilsStackInfo\n   */\n  public static getStackInfo(scope: Construct): LambdaIamUtilsStackInfo {\n    const stack = cdk.Stack.of(scope);\n    return {\n      region: stack.region,\n      account: stack.account,\n    };\n  }\n\n  /**\n   * Creates a policy statement for DynamoDB table access\n   *\n   * @param tableArn The ARN of the DynamoDB table\n   * @param actions The DynamoDB actions to allow\n   * @returns PolicyStatement for DynamoDB access\n   */\n  public static createDynamoDbPolicyStatement(\n    tableArn: string,\n    actions: string[] = ['dynamodb:GetItem', 'dynamodb:PutItem', 'dynamodb:UpdateItem', 'dynamodb:DeleteItem', 'dynamodb:Query', 'dynamodb:Scan'],\n  ): iam.PolicyStatement {\n    return new iam.PolicyStatement({\n      effect: iam.Effect.ALLOW,\n      actions,\n      resources: [tableArn, `${tableArn}/index/*`], // Include GSI access\n    });\n  }\n\n  /**\n   * Creates a policy statement for S3 bucket access\n   *\n   * @param bucketArn The ARN of the S3 bucket\n   * @param actions The S3 actions to allow\n   * @param includeObjects Whether to include object-level permissions\n   * @returns PolicyStatement for S3 access\n   */\n  public static createS3PolicyStatement(\n    bucketArn: string,\n    actions: string[] = ['s3:GetObject', 's3:PutObject'],\n    includeObjects: boolean = true,\n  ): iam.PolicyStatement {\n    const resources = [bucketArn];\n    if (includeObjects) {\n      resources.push(`${bucketArn}/*`);\n    }\n\n    return new iam.PolicyStatement({\n      effect: iam.Effect.ALLOW,\n      actions,\n      resources,\n    });\n  }\n\n  /**\n   * Creates a policy statement for SQS queue access\n   *\n   * @param queueArn The ARN of the SQS queue\n   * @param actions The SQS actions to allow\n   * @returns PolicyStatement for SQS access\n   */\n  public static createSqsPolicyStatement(\n    queueArn: string,\n    actions: string[] = ['sqs:ReceiveMessage', 'sqs:DeleteMessage', 'sqs:GetQueueAttributes'],\n  ): iam.PolicyStatement {\n    return new iam.PolicyStatement({\n      effect: iam.Effect.ALLOW,\n      actions,\n      resources: [queueArn],\n    });\n  }\n\n  /**\n   * Creates a policy statement for SNS topic access\n   *\n   * @param topicArn The ARN of the SNS topic\n   * @param actions The SNS actions to allow\n   * @returns PolicyStatement for SNS access\n   */\n  public static createSnsPolicyStatement(\n    topicArn: string,\n    actions: string[] = ['sns:Publish'],\n  ): iam.PolicyStatement {\n    return new iam.PolicyStatement({\n      effect: iam.Effect.ALLOW,\n      actions,\n      resources: [topicArn],\n    });\n  }\n\n  /**\n   * Creates a policy statement for Step Functions execution\n   *\n   * @param stateMachineArn The ARN of the Step Functions state machine\n   * @param actions The Step Functions actions to allow\n   * @returns PolicyStatement for Step Functions access\n   */\n  public static createStepFunctionsPolicyStatement(\n    stateMachineArn: string,\n    actions: string[] = ['states:StartExecution'],\n  ): iam.PolicyStatement {\n    return new iam.PolicyStatement({\n      effect: iam.Effect.ALLOW,\n      actions,\n      resources: [stateMachineArn],\n    });\n  }\n\n  /**\n   * Creates a policy statement for Secrets Manager access\n   *\n   * @param secretArn The ARN of the secret\n   * @param actions The Secrets Manager actions to allow\n   * @returns PolicyStatement for Secrets Manager access\n   */\n  public static createSecretsManagerPolicyStatement(\n    secretArn: string,\n    actions: string[] = ['secretsmanager:GetSecretValue'],\n  ): iam.PolicyStatement {\n    return new iam.PolicyStatement({\n      effect: iam.Effect.ALLOW,\n      actions,\n      resources: [secretArn],\n    });\n  }\n\n  /**\n   * Creates a policy statement for KMS key access\n   *\n   * @param keyArn The ARN of the KMS key\n   * @param actions The KMS actions to allow\n   * @returns PolicyStatement for KMS access\n   */\n  public static createKmsPolicyStatement(\n    keyArn: string,\n    actions: string[] = ['kms:Decrypt', 'kms:GenerateDataKey'],\n  ): iam.PolicyStatement {\n    return new iam.PolicyStatement({\n      effect: iam.Effect.ALLOW,\n      actions,\n      resources: [keyArn],\n    });\n  }\n}\n"]}
@@ -0,0 +1,42 @@
1
+ import * as lambda from 'aws-cdk-lib/aws-lambda';
2
+ import { Construct } from 'constructs';
3
+ /**
4
+ * Properties for the DataMaskingLayerConstruct
5
+ */
6
+ export interface DataMaskingLayerProps {
7
+ /**
8
+ * Description for the Lambda layer
9
+ * @default 'Lambda layer for masking sensitive data in document processing'
10
+ */
11
+ description?: string;
12
+ /**
13
+ * Custom masking patterns to add to the default ones
14
+ * @default {}
15
+ */
16
+ customPatterns?: Record<string, {
17
+ /**
18
+ * Regular expression pattern as string
19
+ */
20
+ regex: string;
21
+ /**
22
+ * Mask to apply (string or function name)
23
+ */
24
+ mask: string;
25
+ }>;
26
+ }
27
+ /**
28
+ * Construct that creates a Lambda layer for data masking
29
+ */
30
+ export declare class DataMaskingLayerConstruct extends Construct {
31
+ /**
32
+ * The Lambda layer containing masking utilities
33
+ */
34
+ readonly layer: lambda.LayerVersion;
35
+ constructor(scope: Construct, id: string, props?: DataMaskingLayerProps);
36
+ /**
37
+ * Adds the masking layer to a Lambda function
38
+ * @param fn Lambda function to add the layer to
39
+ * @param maskingConfig Optional masking configuration to add as environment variable
40
+ */
41
+ addToFunction(fn: lambda.Function, maskingConfig?: Record<string, string[]>): void;
42
+ }
@@ -0,0 +1,53 @@
1
+ "use strict";
2
+ // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
3
+ // SPDX-License-Identifier: Apache-2.0
4
+ Object.defineProperty(exports, "__esModule", { value: true });
5
+ exports.DataMaskingLayerConstruct = void 0;
6
+ const path = require("path");
7
+ const lambda = require("aws-cdk-lib/aws-lambda");
8
+ const constructs_1 = require("constructs");
9
+ /**
10
+ * Construct that creates a Lambda layer for data masking
11
+ */
12
+ class DataMaskingLayerConstruct extends constructs_1.Construct {
13
+ constructor(scope, id, props = {}) {
14
+ super(scope, id);
15
+ // Create the Lambda layer
16
+ this.layer = new lambda.LayerVersion(this, 'DataMaskingLayer', {
17
+ code: lambda.Code.fromAsset(path.join(__dirname, '../../../utilities/lambda_layers/data-masking')),
18
+ compatibleRuntimes: [
19
+ lambda.Runtime.NODEJS_16_X,
20
+ lambda.Runtime.NODEJS_18_X,
21
+ lambda.Runtime.NODEJS_20_X,
22
+ ],
23
+ description: props.description || 'Lambda layer for masking sensitive data',
24
+ license: 'Apache-2.0',
25
+ });
26
+ // Add metadata about available masking patterns
27
+ const defaultPatterns = [
28
+ 'nric', 'ssn', 'creditCard', 'email', 'phone', 'passport',
29
+ ];
30
+ // Add custom patterns if provided
31
+ const allPatterns = [...defaultPatterns];
32
+ if (props.customPatterns) {
33
+ allPatterns.push(...Object.keys(props.customPatterns));
34
+ }
35
+ // Add metadata to the construct
36
+ this.node.addMetadata('maskingPatterns', allPatterns.join(', '));
37
+ }
38
+ /**
39
+ * Adds the masking layer to a Lambda function
40
+ * @param fn Lambda function to add the layer to
41
+ * @param maskingConfig Optional masking configuration to add as environment variable
42
+ */
43
+ addToFunction(fn, maskingConfig) {
44
+ // Add the layer to the function
45
+ fn.addLayers(this.layer);
46
+ // Add masking configuration if provided
47
+ if (maskingConfig) {
48
+ fn.addEnvironment('MASKING_CONFIG', JSON.stringify(maskingConfig));
49
+ }
50
+ }
51
+ }
52
+ exports.DataMaskingLayerConstruct = DataMaskingLayerConstruct;
53
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,88 @@
1
+ // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
2
+ // SPDX-License-Identifier: Apache-2.0
3
+
4
+ import * as path from 'path';
5
+ import * as lambda from 'aws-cdk-lib/aws-lambda';
6
+ import { Construct } from 'constructs';
7
+
8
+ /**
9
+ * Properties for the DataMaskingLayerConstruct
10
+ */
11
+ export interface DataMaskingLayerProps {
12
+ /**
13
+ * Description for the Lambda layer
14
+ * @default 'Lambda layer for masking sensitive data in document processing'
15
+ */
16
+ description?: string;
17
+
18
+ /**
19
+ * Custom masking patterns to add to the default ones
20
+ * @default {}
21
+ */
22
+ customPatterns?: Record<string, {
23
+ /**
24
+ * Regular expression pattern as string
25
+ */
26
+ regex: string;
27
+
28
+ /**
29
+ * Mask to apply (string or function name)
30
+ */
31
+ mask: string;
32
+ }>;
33
+ }
34
+
35
+ /**
36
+ * Construct that creates a Lambda layer for data masking
37
+ */
38
+ export class DataMaskingLayerConstruct extends Construct {
39
+ /**
40
+ * The Lambda layer containing masking utilities
41
+ */
42
+ public readonly layer: lambda.LayerVersion;
43
+
44
+ constructor(scope: Construct, id: string, props: DataMaskingLayerProps = {}) {
45
+ super(scope, id);
46
+
47
+ // Create the Lambda layer
48
+ this.layer = new lambda.LayerVersion(this, 'DataMaskingLayer', {
49
+ code: lambda.Code.fromAsset(path.join(__dirname, '../../../utilities/lambda_layers/data-masking')),
50
+ compatibleRuntimes: [
51
+ lambda.Runtime.NODEJS_16_X,
52
+ lambda.Runtime.NODEJS_18_X,
53
+ lambda.Runtime.NODEJS_20_X,
54
+ ],
55
+ description: props.description || 'Lambda layer for masking sensitive data',
56
+ license: 'Apache-2.0',
57
+ });
58
+
59
+ // Add metadata about available masking patterns
60
+ const defaultPatterns = [
61
+ 'nric', 'ssn', 'creditCard', 'email', 'phone', 'passport',
62
+ ];
63
+
64
+ // Add custom patterns if provided
65
+ const allPatterns = [...defaultPatterns];
66
+ if (props.customPatterns) {
67
+ allPatterns.push(...Object.keys(props.customPatterns));
68
+ }
69
+
70
+ // Add metadata to the construct
71
+ this.node.addMetadata('maskingPatterns', allPatterns.join(', '));
72
+ }
73
+
74
+ /**
75
+ * Adds the masking layer to a Lambda function
76
+ * @param fn Lambda function to add the layer to
77
+ * @param maskingConfig Optional masking configuration to add as environment variable
78
+ */
79
+ public addToFunction(fn: lambda.Function, maskingConfig?: Record<string, string[]>): void {
80
+ // Add the layer to the function
81
+ fn.addLayers(this.layer);
82
+
83
+ // Add masking configuration if provided
84
+ if (maskingConfig) {
85
+ fn.addEnvironment('MASKING_CONFIG', JSON.stringify(maskingConfig));
86
+ }
87
+ }
88
+ }
@@ -0,0 +1,18 @@
1
+ import { RemovalPolicy } from 'aws-cdk-lib';
2
+ import { Role } from 'aws-cdk-lib/aws-iam';
3
+ import { Key } from 'aws-cdk-lib/aws-kms';
4
+ import { LogGroup } from 'aws-cdk-lib/aws-logs';
5
+ import { Construct } from 'constructs';
6
+ import { LogGroupDataProtectionProps } from './log-group-data-protection-props';
7
+ export interface BedrockObservabilityProps {
8
+ readonly logGroupDataProtection?: LogGroupDataProtectionProps;
9
+ readonly loggingRole?: Role;
10
+ readonly overrideExistingConfiguration?: boolean;
11
+ readonly removalPolicy?: RemovalPolicy;
12
+ }
13
+ export declare class BedrockObservability extends Construct {
14
+ readonly logGroup: LogGroup;
15
+ readonly loggingRole: Role;
16
+ readonly encryptionKey: Key;
17
+ constructor(scope: Construct, id: string, props?: BedrockObservabilityProps);
18
+ }