@gammarers/aws-transfer-custom-lambda-identity-provider 1.0.2 → 1.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/.jsii CHANGED
@@ -3471,7 +3471,7 @@
3471
3471
  },
3472
3472
  "name": "@gammarers/aws-transfer-custom-lambda-identity-provider",
3473
3473
  "readme": {
3474
- "markdown": "# AWS Transfer Custom Lambda Identity Provider\n\n[![GitHub](https://img.shields.io/github/license/gammarers/aws-transfer-custom-lambda-identity-provider?style=flat-square)](https://github.com/gammarers/aws-transfer-custom-lambda-identity-provider/blob/main/LICENSE)\n[![npm (scoped)](https://img.shields.io/npm/v/@gammarers/aws-transfer-custom-lambda-identity-provider?style=flat-square)](https://www.npmjs.com/package/@gammarers/aws-transfer-custom-lambda-identity-provider)\n[![GitHub Workflow Status (branch)](https://img.shields.io/github/actions/workflow/status/gammarers/aws-transfer-custom-lambda-identity-provider/release.yml?branch=main&label=release&style=flat-square)](https://github.com/gammarers/aws-transfer-custom-lambda-identity-provider/actions/workflows/release.yml)\n[![GitHub release (latest SemVer)](https://img.shields.io/github/v/release/gammarers/aws-transfer-custom-lambda-identity-provider?sort=semver&style=flat-square)](https://github.com/gammarers/aws-transfer-custom-lambda-identity-provider/releases)\n\nThis is a Simple Transfer AWS CDK Construct\n\n## Features\n\n- [x] SFTP User password login (inclued ip restrict)\n - [x] testing implementetion\n - [ ] ested in an actual AWS environment\n- [x] SFTP User password login (none ip restrict)\n - [ ] testing implementetion\n - [ ] ested in an actual AWS environment\n- [x] SFTP User public key authentication login (inclued ip restrict)\n - [x] testing implementetion\n - [ ] ested in an actual AWS environment\n- [x] SFTP User public key authentication login (none ip restrict)\n - [ ] testing implementetion\n - [ ] ested in an actual AWS environment\n- [x] SFTP User's info from AWS SecretManager\n - [x] SecureString\n - [x] testing implementetion\n - [ ] ested in an actual AWS environment\n - [x] SecureBinary\n - [ ] testing implementetion\n - [ ] ested in an actual AWS environment\n- [x] FTP/S User's password login (inclued ip restrict)\n - [x] testing implementetion\n - [ ] ested in an actual AWS environment\n- [ ] HomeDirectoryDetails\n\n### Other\n\n- [ ] SecretManager layer\n- [ ] Logging to JSON\n- [ ] disable output log in projen test\n\n## Architecture\n\ndiagram\n\n## Install\n\n### TypeScript\n\n```shell\nnpm install @gammarers/transfer-custom-lambda-identity-provider\n```\nor\n```shell\nyarn add @gammarers/transfer-custom-lambda-identity-provider\n```\n\n## Example\n\n```shell\nnpm install @gammarers/transfer-custom-lambda-identity-provider\n```\n\n```typescript\nimport { TransferCustomLambdaIdentityProvider } from '@gammarers/aws-transfer-custom-lambda-identity-provider';\n\nnew TransferCustomLambdaIdentityProvider(stack, 'TransferCustomLambdaIdentityProvider');\n\n```\n"
3474
+ "markdown": "# AWS Transfer Custom Lambda Identity Provider\n\n[![GitHub](https://img.shields.io/github/license/gammarers/aws-transfer-custom-lambda-identity-provider?style=flat-square)](https://github.com/gammarers/aws-transfer-custom-lambda-identity-provider/blob/main/LICENSE)\n[![npm (scoped)](https://img.shields.io/npm/v/@gammarers/aws-transfer-custom-lambda-identity-provider?style=flat-square)](https://www.npmjs.com/package/@gammarers/aws-transfer-custom-lambda-identity-provider)\n[![GitHub Workflow Status (branch)](https://img.shields.io/github/actions/workflow/status/gammarers/aws-transfer-custom-lambda-identity-provider/release.yml?branch=main&label=release&style=flat-square)](https://github.com/gammarers/aws-transfer-custom-lambda-identity-provider/actions/workflows/release.yml)\n[![GitHub release (latest SemVer)](https://img.shields.io/github/v/release/gammarers/aws-transfer-custom-lambda-identity-provider?sort=semver&style=flat-square)](https://github.com/gammarers/aws-transfer-custom-lambda-identity-provider/releases)\n\nThis is a Simple Transfer AWS CDK Construct\n\n## Features\n\n- [x] SFTP User password login (inclued ip restrict(ipv4,ipv6))\n - [x] testing implementetion\n - [ ] ested in an actual AWS environment\n- [x] SFTP User password login (none ip restrict)\n - [x] testing implementetion\n - [ ] ested in an actual AWS environment\n- [x] SFTP User public key authentication login (inclued ip restrict)\n - [x] testing implementetion\n - [ ] ested in an actual AWS environment\n- [x] SFTP User public key authentication login (none ip restrict)\n - [x] testing implementetion\n - [ ] ested in an actual AWS environment\n- [x] SFTP User's info from AWS SecretManager\n - [x] SecureString\n - [x] testing implementetion\n - [ ] ested in an actual AWS environment\n - [x] SecureBinary\n - [x] testing implementetion\n - [ ] ested in an actual AWS environment\n- [x] FTP/S User's password login (inclued ip restrict)\n - [x] testing implementetion\n - [ ] ested in an actual AWS environment\n- [x] HomeDirectoryDetails\n - [x] Logical home directory\n - [x] testing implementetion\n - [ ] ested in an actual AWS environment\n\n### Other\n\n- [ ] SecretManager layer\n- [ ] Logging to JSON\n- [x] disable output log in projen test\n\n## Architecture\n\ndiagram\n\n## Install\n\n### TypeScript\n\n```shell\nnpm install @gammarers/transfer-custom-lambda-identity-provider\n```\nor\n```shell\nyarn add @gammarers/transfer-custom-lambda-identity-provider\n```\n\n## Example\n\n```shell\nnpm install @gammarers/transfer-custom-lambda-identity-provider\n```\n\n```typescript\nimport { TransferCustomLambdaIdentityProvider } from '@gammarers/aws-transfer-custom-lambda-identity-provider';\n\nnew TransferCustomLambdaIdentityProvider(stack, 'TransferCustomLambdaIdentityProvider');\n\n```\n"
3475
3475
  },
3476
3476
  "repository": {
3477
3477
  "type": "git",
@@ -3523,6 +3523,6 @@
3523
3523
  "symbolId": "src/index:TransferCustomLambdaIdentityProvider"
3524
3524
  }
3525
3525
  },
3526
- "version": "1.0.2",
3527
- "fingerprint": "PjHiQb3gPLoaj4MMbLmP7xOurh9Ynyd/222vWwfcJ4c="
3526
+ "version": "1.1.0",
3527
+ "fingerprint": "dkJh+4S7+QLYViEH+w/35BfANkf6Oi8lxAjVBiUhLVE="
3528
3528
  }
package/README.md CHANGED
@@ -9,35 +9,38 @@ This is a Simple Transfer AWS CDK Construct
9
9
 
10
10
  ## Features
11
11
 
12
- - [x] SFTP User password login (inclued ip restrict)
12
+ - [x] SFTP User password login (inclued ip restrict(ipv4,ipv6))
13
13
  - [x] testing implementetion
14
14
  - [ ] ested in an actual AWS environment
15
15
  - [x] SFTP User password login (none ip restrict)
16
- - [ ] testing implementetion
16
+ - [x] testing implementetion
17
17
  - [ ] ested in an actual AWS environment
18
18
  - [x] SFTP User public key authentication login (inclued ip restrict)
19
19
  - [x] testing implementetion
20
20
  - [ ] ested in an actual AWS environment
21
21
  - [x] SFTP User public key authentication login (none ip restrict)
22
- - [ ] testing implementetion
22
+ - [x] testing implementetion
23
23
  - [ ] ested in an actual AWS environment
24
24
  - [x] SFTP User's info from AWS SecretManager
25
25
  - [x] SecureString
26
26
  - [x] testing implementetion
27
27
  - [ ] ested in an actual AWS environment
28
28
  - [x] SecureBinary
29
- - [ ] testing implementetion
29
+ - [x] testing implementetion
30
30
  - [ ] ested in an actual AWS environment
31
31
  - [x] FTP/S User's password login (inclued ip restrict)
32
32
  - [x] testing implementetion
33
33
  - [ ] ested in an actual AWS environment
34
- - [ ] HomeDirectoryDetails
34
+ - [x] HomeDirectoryDetails
35
+ - [x] Logical home directory
36
+ - [x] testing implementetion
37
+ - [ ] ested in an actual AWS environment
35
38
 
36
39
  ### Other
37
40
 
38
41
  - [ ] SecretManager layer
39
42
  - [ ] Logging to JSON
40
- - [ ] disable output log in projen test
43
+ - [x] disable output log in projen test
41
44
 
42
45
  ## Architecture
43
46
 
@@ -20,10 +20,17 @@ var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: tru
20
20
  // src/funcs/transfer-user-authentication.lambda.ts
21
21
  var transfer_user_authentication_lambda_exports = {};
22
22
  __export(transfer_user_authentication_lambda_exports, {
23
+ EmptySecretValueError: () => EmptySecretValueError,
23
24
  handler: () => handler
24
25
  });
25
26
  module.exports = __toCommonJS(transfer_user_authentication_lambda_exports);
26
27
  var import_client_secrets_manager = require("@aws-sdk/client-secrets-manager");
28
+ var EmptySecretValueError = class extends Error {
29
+ constructor() {
30
+ super("Got a secret value is empty.");
31
+ this.name = "EmptySecretValueError";
32
+ }
33
+ };
27
34
  var handler = async (event) => {
28
35
  const requiredParamList = ["serverId", "username", "protocol", "sourceIp"];
29
36
  for (const parameter of requiredParamList) {
@@ -49,12 +56,18 @@ var handler = async (event) => {
49
56
  return {};
50
57
  }
51
58
  console.log("Using SSH authentication");
52
- authenticationType = "SSH";
59
+ authenticationType = "SSHPubKey";
53
60
  }
54
61
  const secret = await getSecret(`transfer-user/${inputServerId}/${inputUsername}`);
55
62
  if (secret) {
56
63
  const secretDict = JSON.parse(secret);
57
- const userAuthenticated = authenticateUser(authenticationType, secretDict, inputPassword, inputProtocol);
64
+ const userAuthenticated = (() => {
65
+ if (authenticationType === "SSHPubKey") {
66
+ console.log("Skip password check as SSH login request");
67
+ return true;
68
+ }
69
+ return authenticatePasswordUser(secretDict, inputPassword, inputProtocol);
70
+ })();
58
71
  const ipMatch = checkIpAddress(secretDict, inputSourceIp, inputProtocol);
59
72
  if (userAuthenticated && ipMatch) {
60
73
  console.log(`User authenticated, calling buildResponse with: ${authenticationType}`);
@@ -77,13 +90,14 @@ var lookup = (secretDict, key, inputProtocol) => {
77
90
  }
78
91
  };
79
92
  var checkIpAddress = (secretDict, inputSourceIp, inputProtocol) => {
80
- const acceptedIpNetworkList = lookup(secretDict, "AcceptedIpNetworkList", inputProtocol);
81
- if (!acceptedIpNetworkList) {
82
- console.log("No IP range provided - Skip IP check");
83
- return true;
84
- }
85
- for (const acceptedIpNetwork of acceptedIpNetworkList.split(",")) {
86
- if (isIpInCidr(inputSourceIp, acceptedIpNetwork)) {
93
+ const acceptedIpNetworks = lookup(secretDict, "AcceptedIpNetworks", inputProtocol);
94
+ console.log(`AcceptedIpNetworks: ${acceptedIpNetworks}`);
95
+ if (!acceptedIpNetworks) {
96
+ console.log("Unable to authenticate user - No filed match in Secret for AcceptedIpNetworks(CIDR format, comma-separated)");
97
+ return false;
98
+ }
99
+ for (const cidr of acceptedIpNetworks.split(",")) {
100
+ if (isIpInCidr(inputSourceIp, cidr)) {
87
101
  console.log("Source IP address match");
88
102
  return true;
89
103
  }
@@ -91,22 +105,17 @@ var checkIpAddress = (secretDict, inputSourceIp, inputProtocol) => {
91
105
  console.log("Source IP address not in range");
92
106
  return false;
93
107
  };
94
- var authenticateUser = (authType, secretDict, inputPassword, inputProtocol) => {
95
- if (authType === "SSH") {
96
- console.log("Skip password check as SSH login request");
108
+ var authenticatePasswordUser = (secretDict, inputPassword, inputProtocol) => {
109
+ const password = lookup(secretDict, "Password", inputProtocol);
110
+ if (!password) {
111
+ console.log("Unable to authenticate user - No field match in Secret for password");
112
+ return false;
113
+ }
114
+ if (inputPassword === password) {
97
115
  return true;
98
116
  } else {
99
- const password = lookup(secretDict, "Password", inputProtocol);
100
- if (!password) {
101
- console.log("Unable to authenticate user - No field match in Secret for password");
102
- return false;
103
- }
104
- if (inputPassword === password) {
105
- return true;
106
- } else {
107
- console.log("Unable to authenticate user - Incoming password does not match stored");
108
- return false;
109
- }
117
+ console.log("Unable to authenticate user - Incoming password does not match stored");
118
+ return false;
110
119
  }
111
120
  };
112
121
  var buildResponse = (secretDict, authType, inputProtocol) => {
@@ -134,7 +143,7 @@ var buildResponse = (secretDict, authType, inputProtocol) => {
134
143
  console.log("HomeDirectory found - Note: Cannot be used in conjunction with key: HomeDirectoryDetails");
135
144
  responseData.HomeDirectory = homeDirectory;
136
145
  }
137
- if (authType === "SSH") {
146
+ if (authType === "SSHPubKey") {
138
147
  const publicKey = lookup(secretDict, "PublicKey", inputProtocol);
139
148
  if (publicKey) {
140
149
  responseData.PublicKeys = [publicKey];
@@ -150,22 +159,20 @@ var getSecret = async (id) => {
150
159
  const client = new import_client_secrets_manager.SecretsManagerClient({
151
160
  region: "ap-northeast-1"
152
161
  });
153
- const command = new import_client_secrets_manager.GetSecretValueCommand({ SecretId: id });
154
- try {
155
- const data = await client.send(command);
156
- console.log(data);
162
+ return client.send(new import_client_secrets_manager.GetSecretValueCommand({ SecretId: id })).then((data) => {
163
+ if (data.SecretBinary) {
164
+ console.log("Got SecretBinary value");
165
+ return Buffer.from(data.SecretBinary).toString("utf-8");
166
+ }
157
167
  if (data.SecretString) {
168
+ console.log("Got SecretString value");
158
169
  return data.SecretString;
159
170
  }
160
- if (data.SecretBinary) {
161
- return new TextDecoder().decode(data.SecretBinary);
162
- }
163
- return null;
164
- } catch (error) {
165
- console.log("Not found Secret");
166
- console.log(`Error: ${JSON.stringify(error)}`);
171
+ throw new EmptySecretValueError();
172
+ }).catch((error) => {
173
+ console.warn(error.message);
167
174
  return null;
168
- }
175
+ });
169
176
  };
170
177
  var ipToBigInt = (address) => {
171
178
  if (address.includes(":")) {
@@ -184,29 +191,25 @@ var ipToBigInt = (address) => {
184
191
  return bigInt;
185
192
  }
186
193
  };
187
- var getSubnetMask = (bits, isIPv6 = false) => {
188
- let mask = BigInt(0);
189
- const totalBits = isIPv6 ? 128 : 32;
190
- for (let i = 0; i < bits; i++) {
191
- mask = mask * BigInt(2) + BigInt(1);
192
- }
193
- for (let i = bits; i < totalBits; i++) {
194
- mask = mask * BigInt(2);
195
- }
196
- return mask;
197
- };
198
- var isIpInCidr = (address, cidr) => {
194
+ var getSubnetRange = (cidr) => {
199
195
  const [network, bits] = cidr.split("/");
200
196
  const isIPv6 = network.includes(":");
201
- const ipBigInt = ipToBigInt(address);
197
+ const totalBits = isIPv6 ? 128 : 32;
202
198
  const networkBigInt = ipToBigInt(network);
203
- const mask = getSubnetMask(parseInt(bits), isIPv6);
204
- const maskedIp = ipBigInt - ipBigInt % (mask + BigInt(1));
205
- const maskedNetwork = networkBigInt - networkBigInt % (mask + BigInt(1));
206
- return maskedIp === maskedNetwork;
199
+ const hostBits = totalBits - parseInt(bits, 10);
200
+ const subnetSize = BigInt(2) ** BigInt(hostBits);
201
+ const start = networkBigInt - networkBigInt % subnetSize;
202
+ const end = start + subnetSize - BigInt(1);
203
+ return { start, end };
204
+ };
205
+ var isIpInCidr = (ipAddr, cidr) => {
206
+ const ipBigInt = ipToBigInt(ipAddr);
207
+ const { start, end } = getSubnetRange(cidr);
208
+ return ipBigInt >= start && ipBigInt <= end;
207
209
  };
208
210
  // Annotate the CommonJS export names for ESM import in node:
209
211
  0 && (module.exports = {
212
+ EmptySecretValueError,
210
213
  handler
211
214
  });
212
215
  //# sourceMappingURL=index.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../src/funcs/transfer-user-authentication.lambda.ts"],
4
- "sourcesContent": ["import { SecretsManagerClient, GetSecretValueCommand, GetSecretValueCommandOutput } from '@aws-sdk/client-secrets-manager';\nimport { TransferFamilyAuthorizerEvent, TransferFamilyAuthorizerResult } from 'aws-lambda';\n\ninterface SecretDict {\n [key: string]: string;\n}\n\nexport const handler = async (event: TransferFamilyAuthorizerEvent): Promise<TransferFamilyAuthorizerResult> => {\n const requiredParamList = ['serverId', 'username', 'protocol', 'sourceIp'];\n for (const parameter of requiredParamList) {\n if (!event.hasOwnProperty(parameter)) {\n console.log(`Incoming ${parameter} missing - Unexpected`);\n return {};\n }\n }\n\n const inputServerId = event.serverId;\n const inputUsername = event.username;\n const inputProtocol = event.protocol;\n const inputSourceIp = event.sourceIp;\n const inputPassword = event.password || '';\n\n console.log(`ServerId: ${inputServerId}, Username: ${inputUsername}, Protocol: ${inputProtocol}, SourceIp: ${inputSourceIp}`);\n\n console.log('Start User Authentication Flow');\n let authenticationType = '';\n if (inputPassword !== '') {\n console.log('Using PASSWORD authentication');\n authenticationType = 'PASSWORD';\n } else {\n if (inputProtocol === 'FTP' || inputProtocol === 'FTPS') {\n console.log('Empty password not allowed for FTP/S');\n return {};\n }\n console.log('Using SSH authentication');\n authenticationType = 'SSH';\n }\n\n const secret = await getSecret(`transfer-user/${inputServerId}/${inputUsername}`);\n\n if (secret) {\n const secretDict = JSON.parse(secret) as SecretDict;\n const userAuthenticated = authenticateUser(authenticationType, secretDict, inputPassword, inputProtocol);\n const ipMatch = checkIpAddress(secretDict, inputSourceIp, inputProtocol);\n\n if (userAuthenticated && ipMatch) {\n console.log(`User authenticated, calling buildResponse with: ${authenticationType}`);\n return buildResponse(secretDict, authenticationType, inputProtocol);\n } else {\n console.log('User failed authentication return empty response');\n return {};\n }\n } else {\n console.log('Secrets Manager exception thrown - Returning empty response');\n return {};\n }\n};\n\nconst lookup = (secretDict: SecretDict, key: string, inputProtocol: string): string | null => {\n if (secretDict[`${inputProtocol}${key}`]) {\n console.log(`Found protocol-specified ${key}`);\n return secretDict[`${inputProtocol}${key}`];\n } else {\n return secretDict[key] || null;\n }\n};\n\nconst checkIpAddress = (secretDict: SecretDict, inputSourceIp: string, inputProtocol: string): boolean => {\n const acceptedIpNetworkList = lookup(secretDict, 'AcceptedIpNetworkList', inputProtocol);\n if (!acceptedIpNetworkList) {\n console.log('No IP range provided - Skip IP check');\n return true;\n }\n\n for (const acceptedIpNetwork of acceptedIpNetworkList.split(',')) {\n if (isIpInCidr(inputSourceIp, acceptedIpNetwork)) {\n console.log('Source IP address match');\n return true;\n }\n }\n // if (new CIDRMatcher(acceptedIpNetworkList.split(',')).contains(inputSourceIp)) {\n // console.log('Source IP address match');\n // return true;\n // }\n\n console.log('Source IP address not in range');\n return false;\n};\n\nconst authenticateUser = (authType: string, secretDict: SecretDict, inputPassword: string, inputProtocol: string): boolean => {\n if (authType === 'SSH') {\n console.log('Skip password check as SSH login request');\n return true;\n } else {\n const password = lookup(secretDict, 'Password', inputProtocol);\n if (!password) {\n console.log('Unable to authenticate user - No field match in Secret for password');\n return false;\n }\n\n if (inputPassword === password) {\n return true;\n } else {\n console.log('Unable to authenticate user - Incoming password does not match stored');\n return false;\n }\n }\n};\n\nconst buildResponse = (secretDict: SecretDict, authType: string, inputProtocol: string): TransferFamilyAuthorizerResult => {\n const responseData: TransferFamilyAuthorizerResult = {};\n\n const role = lookup(secretDict, 'Role', inputProtocol);\n if (role) {\n responseData.Role = role;\n } else {\n console.log('No field match for role - Set empty string in response');\n responseData.Role = '';\n }\n\n const policy = lookup(secretDict, 'Policy', inputProtocol);\n if (policy) {\n responseData.Policy = policy;\n }\n\n const homeDirectoryDetails = lookup(secretDict, 'HomeDirectoryDetails', inputProtocol);\n if (homeDirectoryDetails) {\n console.log('HomeDirectoryDetails found - Applying setting for virtual folders - Note: Cannot be used in conjunction with key: HomeDirectory');\n responseData.HomeDirectoryDetails = homeDirectoryDetails;\n console.log('Setting HomeDirectoryType to LOGICAL');\n responseData.HomeDirectoryType = 'LOGICAL';\n }\n\n const homeDirectory = lookup(secretDict, 'HomeDirectory', inputProtocol);\n if (homeDirectory) {\n console.log('HomeDirectory found - Note: Cannot be used in conjunction with key: HomeDirectoryDetails');\n responseData.HomeDirectory = homeDirectory;\n }\n\n if (authType === 'SSH') {\n const publicKey = lookup(secretDict, 'PublicKey', inputProtocol);\n if (publicKey) {\n responseData.PublicKeys = [publicKey];\n } else {\n console.log('Unable to authenticate user - No public keys found');\n return {};\n }\n }\n\n return responseData;\n};\n\nconst getSecret = async (id: string): Promise<string | null> => {\n console.log(`Secret Name: ${id}`);\n\n const client = new SecretsManagerClient({\n region: 'ap-northeast-1',\n });\n const command = new GetSecretValueCommand({ SecretId: id });\n\n try {\n const data: GetSecretValueCommandOutput = await client.send(command);\n console.log(data);\n if (data.SecretString) {\n return data.SecretString;\n }\n if (data.SecretBinary) {\n return new TextDecoder().decode(data.SecretBinary);\n }\n return null;\n } catch (error) {\n console.log('Not found Secret');\n console.log(`Error: ${JSON.stringify(error)}`);\n return null;\n }\n //const resp = await client.send(command);\n// return client.send(command)\n// .then((data: GetSecretValueCommandOutput) => {\n// if (data?.SecretString) {\n// return data.SecretString;\n// }\n// if (data?.SecretBinary) {\n// return new TextDecoder().decode(data.SecretBinary);\n// }\n// return null;\n// })\n// .catch((error: Error) => {\n// console.log('Not found Secret');\n// console.log(`Error:${JSON.stringify(error)}`);\n// return null;\n// });\n// console.log(resp);\n// if (resp.SecretString) {\n// console.log('Found Secret String');\n// return resp.SecretString;\n// } else {\n// if (resp.SecretBinary) {\n// console.log('Found Binary Secret');\n// //return Buffer.from(resp.SecretBinary as string, 'base64').toString('ascii');\n// return new TextDecoder().decode(resp.SecretBinary);\n// }\n// }\n//\n// console.log('Not found Secret');\n// return null;\n};\n\nconst ipToBigInt = (address: string) => {\n if (address.includes(':')) {\n // IPv6\n let parts = address.split(':').map(part => part === '' ? '0' : part);\n let bigInt = BigInt(0);\n for (let i = 0; i < parts.length; i++) {\n bigInt = bigInt * BigInt(0x10000) + BigInt(parseInt(parts[i], 16));\n }\n return bigInt;\n } else {\n // IPv4\n let parts = address.split('.').map(part => parseInt(part, 10));\n let bigInt = BigInt(0);\n for (let i = 0; i < parts.length; i++) {\n bigInt = bigInt * BigInt(256) + BigInt(parts[i]);\n }\n return bigInt;\n }\n};\n\nconst getSubnetMask = (bits: number, isIPv6 = false) => {\n let mask = BigInt(0);\n const totalBits = isIPv6 ? 128 : 32;\n for (let i = 0; i < bits; i++) {\n mask = mask * BigInt(2) + BigInt(1);\n }\n for (let i = bits; i < totalBits; i++) {\n mask = mask * BigInt(2);\n }\n return mask;\n};\n\nconst isIpInCidr = (address: string, cidr: string) => {\n const [network, bits] = cidr.split('/');\n const isIPv6 = network.includes(':');\n const ipBigInt = ipToBigInt(address);\n const networkBigInt = ipToBigInt(network);\n const mask = getSubnetMask(parseInt(bits), isIPv6);\n\n const maskedIp = ipBigInt - (ipBigInt % (mask + BigInt(1)));\n const maskedNetwork = networkBigInt - (networkBigInt % (mask + BigInt(1)));\n\n return maskedIp === maskedNetwork;\n};"],
5
- "mappings": ";;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,oCAAyF;AAOlF,IAAM,UAAU,OAAO,UAAkF;AAC9G,QAAM,oBAAoB,CAAC,YAAY,YAAY,YAAY,UAAU;AACzE,aAAW,aAAa,mBAAmB;AACzC,QAAI,CAAC,MAAM,eAAe,SAAS,GAAG;AACpC,cAAQ,IAAI,YAAY,SAAS,uBAAuB;AACxD,aAAO,CAAC;AAAA,IACV;AAAA,EACF;AAEA,QAAM,gBAAgB,MAAM;AAC5B,QAAM,gBAAgB,MAAM;AAC5B,QAAM,gBAAgB,MAAM;AAC5B,QAAM,gBAAgB,MAAM;AAC5B,QAAM,gBAAgB,MAAM,YAAY;AAExC,UAAQ,IAAI,aAAa,aAAa,eAAe,aAAa,eAAe,aAAa,eAAe,aAAa,EAAE;AAE5H,UAAQ,IAAI,gCAAgC;AAC5C,MAAI,qBAAqB;AACzB,MAAI,kBAAkB,IAAI;AACxB,YAAQ,IAAI,+BAA+B;AAC3C,yBAAqB;AAAA,EACvB,OAAO;AACL,QAAI,kBAAkB,SAAS,kBAAkB,QAAQ;AACvD,cAAQ,IAAI,sCAAsC;AAClD,aAAO,CAAC;AAAA,IACV;AACA,YAAQ,IAAI,0BAA0B;AACtC,yBAAqB;AAAA,EACvB;AAEA,QAAM,SAAS,MAAM,UAAU,iBAAiB,aAAa,IAAI,aAAa,EAAE;AAEhF,MAAI,QAAQ;AACV,UAAM,aAAa,KAAK,MAAM,MAAM;AACpC,UAAM,oBAAoB,iBAAiB,oBAAoB,YAAY,eAAe,aAAa;AACvG,UAAM,UAAU,eAAe,YAAY,eAAe,aAAa;AAEvE,QAAI,qBAAqB,SAAS;AAChC,cAAQ,IAAI,mDAAmD,kBAAkB,EAAE;AACnF,aAAO,cAAc,YAAY,oBAAoB,aAAa;AAAA,IACpE,OAAO;AACL,cAAQ,IAAI,kDAAkD;AAC9D,aAAO,CAAC;AAAA,IACV;AAAA,EACF,OAAO;AACL,YAAQ,IAAI,6DAA6D;AACzE,WAAO,CAAC;AAAA,EACV;AACF;AAEA,IAAM,SAAS,CAAC,YAAwB,KAAa,kBAAyC;AAC5F,MAAI,WAAW,GAAG,aAAa,GAAG,GAAG,EAAE,GAAG;AACxC,YAAQ,IAAI,4BAA4B,GAAG,EAAE;AAC7C,WAAO,WAAW,GAAG,aAAa,GAAG,GAAG,EAAE;AAAA,EAC5C,OAAO;AACL,WAAO,WAAW,GAAG,KAAK;AAAA,EAC5B;AACF;AAEA,IAAM,iBAAiB,CAAC,YAAwB,eAAuB,kBAAmC;AACxG,QAAM,wBAAwB,OAAO,YAAY,yBAAyB,aAAa;AACvF,MAAI,CAAC,uBAAuB;AAC1B,YAAQ,IAAI,sCAAsC;AAClD,WAAO;AAAA,EACT;AAEA,aAAW,qBAAqB,sBAAsB,MAAM,GAAG,GAAG;AAChE,QAAI,WAAW,eAAe,iBAAiB,GAAG;AAChD,cAAQ,IAAI,yBAAyB;AACrC,aAAO;AAAA,IACT;AAAA,EACF;AAMA,UAAQ,IAAI,gCAAgC;AAC5C,SAAO;AACT;AAEA,IAAM,mBAAmB,CAAC,UAAkB,YAAwB,eAAuB,kBAAmC;AAC5H,MAAI,aAAa,OAAO;AACtB,YAAQ,IAAI,0CAA0C;AACtD,WAAO;AAAA,EACT,OAAO;AACL,UAAM,WAAW,OAAO,YAAY,YAAY,aAAa;AAC7D,QAAI,CAAC,UAAU;AACb,cAAQ,IAAI,qEAAqE;AACjF,aAAO;AAAA,IACT;AAEA,QAAI,kBAAkB,UAAU;AAC9B,aAAO;AAAA,IACT,OAAO;AACL,cAAQ,IAAI,uEAAuE;AACnF,aAAO;AAAA,IACT;AAAA,EACF;AACF;AAEA,IAAM,gBAAgB,CAAC,YAAwB,UAAkB,kBAA0D;AACzH,QAAM,eAA+C,CAAC;AAEtD,QAAM,OAAO,OAAO,YAAY,QAAQ,aAAa;AACrD,MAAI,MAAM;AACR,iBAAa,OAAO;AAAA,EACtB,OAAO;AACL,YAAQ,IAAI,wDAAwD;AACpE,iBAAa,OAAO;AAAA,EACtB;AAEA,QAAM,SAAS,OAAO,YAAY,UAAU,aAAa;AACzD,MAAI,QAAQ;AACV,iBAAa,SAAS;AAAA,EACxB;AAEA,QAAM,uBAAuB,OAAO,YAAY,wBAAwB,aAAa;AACrF,MAAI,sBAAsB;AACxB,YAAQ,IAAI,iIAAiI;AAC7I,iBAAa,uBAAuB;AACpC,YAAQ,IAAI,sCAAsC;AAClD,iBAAa,oBAAoB;AAAA,EACnC;AAEA,QAAM,gBAAgB,OAAO,YAAY,iBAAiB,aAAa;AACvE,MAAI,eAAe;AACjB,YAAQ,IAAI,0FAA0F;AACtG,iBAAa,gBAAgB;AAAA,EAC/B;AAEA,MAAI,aAAa,OAAO;AACtB,UAAM,YAAY,OAAO,YAAY,aAAa,aAAa;AAC/D,QAAI,WAAW;AACb,mBAAa,aAAa,CAAC,SAAS;AAAA,IACtC,OAAO;AACL,cAAQ,IAAI,oDAAoD;AAChE,aAAO,CAAC;AAAA,IACV;AAAA,EACF;AAEA,SAAO;AACT;AAEA,IAAM,YAAY,OAAO,OAAuC;AAC9D,UAAQ,IAAI,gBAAgB,EAAE,EAAE;AAEhC,QAAM,SAAS,IAAI,mDAAqB;AAAA,IACtC,QAAQ;AAAA,EACV,CAAC;AACD,QAAM,UAAU,IAAI,oDAAsB,EAAE,UAAU,GAAG,CAAC;AAE1D,MAAI;AACF,UAAM,OAAoC,MAAM,OAAO,KAAK,OAAO;AACnE,YAAQ,IAAI,IAAI;AAChB,QAAI,KAAK,cAAc;AACrB,aAAO,KAAK;AAAA,IACd;AACA,QAAI,KAAK,cAAc;AACrB,aAAO,IAAI,YAAY,EAAE,OAAO,KAAK,YAAY;AAAA,IACnD;AACA,WAAO;AAAA,EACT,SAAS,OAAO;AACd,YAAQ,IAAI,kBAAkB;AAC9B,YAAQ,IAAI,UAAU,KAAK,UAAU,KAAK,CAAC,EAAE;AAC7C,WAAO;AAAA,EACT;AA+BF;AAEA,IAAM,aAAa,CAAC,YAAoB;AACtC,MAAI,QAAQ,SAAS,GAAG,GAAG;AAEzB,QAAI,QAAQ,QAAQ,MAAM,GAAG,EAAE,IAAI,UAAQ,SAAS,KAAK,MAAM,IAAI;AACnE,QAAI,SAAS,OAAO,CAAC;AACrB,aAAS,IAAI,GAAG,IAAI,MAAM,QAAQ,KAAK;AACrC,eAAS,SAAS,OAAO,KAAO,IAAI,OAAO,SAAS,MAAM,CAAC,GAAG,EAAE,CAAC;AAAA,IACnE;AACA,WAAO;AAAA,EACT,OAAO;AAEL,QAAI,QAAQ,QAAQ,MAAM,GAAG,EAAE,IAAI,UAAQ,SAAS,MAAM,EAAE,CAAC;AAC7D,QAAI,SAAS,OAAO,CAAC;AACrB,aAAS,IAAI,GAAG,IAAI,MAAM,QAAQ,KAAK;AACrC,eAAS,SAAS,OAAO,GAAG,IAAI,OAAO,MAAM,CAAC,CAAC;AAAA,IACjD;AACA,WAAO;AAAA,EACT;AACF;AAEA,IAAM,gBAAgB,CAAC,MAAc,SAAS,UAAU;AACtD,MAAI,OAAO,OAAO,CAAC;AACnB,QAAM,YAAY,SAAS,MAAM;AACjC,WAAS,IAAI,GAAG,IAAI,MAAM,KAAK;AAC7B,WAAO,OAAO,OAAO,CAAC,IAAI,OAAO,CAAC;AAAA,EACpC;AACA,WAAS,IAAI,MAAM,IAAI,WAAW,KAAK;AACrC,WAAO,OAAO,OAAO,CAAC;AAAA,EACxB;AACA,SAAO;AACT;AAEA,IAAM,aAAa,CAAC,SAAiB,SAAiB;AACpD,QAAM,CAAC,SAAS,IAAI,IAAI,KAAK,MAAM,GAAG;AACtC,QAAM,SAAS,QAAQ,SAAS,GAAG;AACnC,QAAM,WAAW,WAAW,OAAO;AACnC,QAAM,gBAAgB,WAAW,OAAO;AACxC,QAAM,OAAO,cAAc,SAAS,IAAI,GAAG,MAAM;AAEjD,QAAM,WAAW,WAAY,YAAY,OAAO,OAAO,CAAC;AACxD,QAAM,gBAAgB,gBAAiB,iBAAiB,OAAO,OAAO,CAAC;AAEvE,SAAO,aAAa;AACtB;",
4
+ "sourcesContent": ["import { SecretsManagerClient, GetSecretValueCommand, GetSecretValueCommandOutput } from '@aws-sdk/client-secrets-manager';\nimport { TransferFamilyAuthorizerEvent, TransferFamilyAuthorizerResult } from 'aws-lambda';\n\nexport class EmptySecretValueError extends Error {\n constructor() {\n super('Got a secret value is empty.');\n this.name = 'EmptySecretValueError';\n }\n}\n\ninterface SecretDict {\n [key: string]: string;\n}\n\nexport const handler = async (event: TransferFamilyAuthorizerEvent): Promise<TransferFamilyAuthorizerResult> => {\n const requiredParamList = ['serverId', 'username', 'protocol', 'sourceIp'];\n for (const parameter of requiredParamList) {\n if (!event.hasOwnProperty(parameter)) {\n console.log(`Incoming ${parameter} missing - Unexpected`);\n return {};\n }\n }\n\n const inputServerId = event.serverId;\n const inputUsername = event.username;\n const inputProtocol = event.protocol;\n const inputSourceIp = event.sourceIp;\n const inputPassword = event.password || '';\n\n console.log(`ServerId: ${inputServerId}, Username: ${inputUsername}, Protocol: ${inputProtocol}, SourceIp: ${inputSourceIp}`);\n\n console.log('Start User Authentication Flow');\n let authenticationType = '';\n if (inputPassword !== '') {\n console.log('Using PASSWORD authentication');\n authenticationType = 'PASSWORD';\n } else {\n if (inputProtocol === 'FTP' || inputProtocol === 'FTPS') {\n console.log('Empty password not allowed for FTP/S');\n return {};\n }\n console.log('Using SSH authentication');\n authenticationType = 'SSHPubKey';\n }\n\n const secret = await getSecret(`transfer-user/${inputServerId}/${inputUsername}`);\n\n if (secret) {\n const secretDict = JSON.parse(secret) as SecretDict;\n const userAuthenticated = (() => {\n if (authenticationType === 'SSHPubKey') {\n console.log('Skip password check as SSH login request');\n return true;\n }\n return authenticatePasswordUser(secretDict, inputPassword, inputProtocol);\n })();\n const ipMatch = checkIpAddress(secretDict, inputSourceIp, inputProtocol);\n\n if (userAuthenticated && ipMatch) {\n console.log(`User authenticated, calling buildResponse with: ${authenticationType}`);\n return buildResponse(secretDict, authenticationType, inputProtocol);\n } else {\n console.log('User failed authentication return empty response');\n return {};\n }\n } else {\n console.log('Secrets Manager exception thrown - Returning empty response');\n return {};\n }\n};\n\nconst lookup = (secretDict: SecretDict, key: string, inputProtocol: string): string | null => {\n if (secretDict[`${inputProtocol}${key}`]) {\n console.log(`Found protocol-specified ${key}`);\n return secretDict[`${inputProtocol}${key}`];\n } else {\n return secretDict[key] || null;\n }\n};\n\nconst checkIpAddress = (secretDict: SecretDict, inputSourceIp: string, inputProtocol: string): boolean => {\n const acceptedIpNetworks = lookup(secretDict, 'AcceptedIpNetworks', inputProtocol);\n console.log(`AcceptedIpNetworks: ${acceptedIpNetworks}`);\n if (!acceptedIpNetworks) {\n console.log('Unable to authenticate user - No filed match in Secret for AcceptedIpNetworks(CIDR format, comma-separated)');\n return false;\n }\n\n for (const cidr of acceptedIpNetworks.split(',')) {\n if (isIpInCidr(inputSourceIp, cidr)) {\n console.log('Source IP address match');\n return true;\n }\n }\n\n console.log('Source IP address not in range');\n return false;\n};\n\nconst authenticatePasswordUser = (secretDict: SecretDict, inputPassword: string, inputProtocol: string): boolean => {\n const password = lookup(secretDict, 'Password', inputProtocol);\n if (!password) {\n console.log('Unable to authenticate user - No field match in Secret for password');\n return false;\n }\n\n if (inputPassword === password) {\n return true;\n } else {\n console.log('Unable to authenticate user - Incoming password does not match stored');\n return false;\n }\n};\n\nconst buildResponse = (secretDict: SecretDict, authType: string, inputProtocol: string): TransferFamilyAuthorizerResult => {\n const responseData: TransferFamilyAuthorizerResult = {};\n\n const role = lookup(secretDict, 'Role', inputProtocol);\n if (role) {\n responseData.Role = role;\n } else {\n console.log('No field match for role - Set empty string in response');\n responseData.Role = '';\n }\n\n const policy = lookup(secretDict, 'Policy', inputProtocol);\n if (policy) {\n responseData.Policy = policy;\n }\n\n const homeDirectoryDetails = lookup(secretDict, 'HomeDirectoryDetails', inputProtocol);\n if (homeDirectoryDetails) {\n console.log('HomeDirectoryDetails found - Applying setting for virtual folders - Note: Cannot be used in conjunction with key: HomeDirectory');\n responseData.HomeDirectoryDetails = homeDirectoryDetails;\n console.log('Setting HomeDirectoryType to LOGICAL');\n responseData.HomeDirectoryType = 'LOGICAL';\n }\n\n const homeDirectory = lookup(secretDict, 'HomeDirectory', inputProtocol);\n if (homeDirectory) {\n console.log('HomeDirectory found - Note: Cannot be used in conjunction with key: HomeDirectoryDetails');\n responseData.HomeDirectory = homeDirectory;\n }\n\n if (authType === 'SSHPubKey') {\n const publicKey = lookup(secretDict, 'PublicKey', inputProtocol);\n if (publicKey) {\n responseData.PublicKeys = [publicKey];\n } else {\n console.log('Unable to authenticate user - No public keys found');\n return {};\n }\n }\n\n return responseData;\n};\n\nconst getSecret = async (id: string): Promise<string | null> => {\n console.log(`Secret Name: ${id}`);\n\n const client = new SecretsManagerClient({\n region: 'ap-northeast-1',\n });\n\n return client.send(new GetSecretValueCommand({ SecretId: id }))\n .then((data: GetSecretValueCommandOutput) => {\n if (data.SecretBinary) {\n console.log('Got SecretBinary value');\n return Buffer.from(data.SecretBinary).toString('utf-8');\n }\n if (data.SecretString) {\n console.log('Got SecretString value');\n return data.SecretString;\n }\n throw new EmptySecretValueError();\n })\n .catch((error: Error) => {\n console.warn(error.message);\n return null;\n });\n};\n\nconst ipToBigInt = (address: string) => {\n if (address.includes(':')) {\n // IPv6\n let parts = address.split(':').map(part => part === '' ? '0' : part);\n let bigInt = BigInt(0);\n for (let i = 0; i < parts.length; i++) {\n bigInt = bigInt * BigInt(0x10000) + BigInt(parseInt(parts[i], 16));\n }\n return bigInt;\n } else {\n // IPv4\n let parts = address.split('.').map(part => parseInt(part, 10));\n let bigInt = BigInt(0);\n for (let i = 0; i < parts.length; i++) {\n bigInt = bigInt * BigInt(256) + BigInt(parts[i]);\n }\n return bigInt;\n }\n};\n\nconst getSubnetRange = (cidr: string): { start: bigint; end: bigint } => {\n const [network, bits] = cidr.split('/');\n const isIPv6 = network.includes(':');\n const totalBits = isIPv6 ? 128 : 32;\n const networkBigInt = ipToBigInt(network);\n const hostBits = totalBits - parseInt(bits, 10);\n const subnetSize = BigInt(2) ** BigInt(hostBits);\n\n const start = networkBigInt - (networkBigInt % subnetSize);\n const end = start + subnetSize - BigInt(1);\n\n return { start, end };\n};\n\nconst isIpInCidr = (ipAddr: string, cidr: string) => {\n const ipBigInt = ipToBigInt(ipAddr);\n const { start, end } = getSubnetRange(cidr);\n return ipBigInt >= start && ipBigInt <= end;\n};"],
5
+ "mappings": ";;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,oCAAyF;AAGlF,IAAM,wBAAN,cAAoC,MAAM;AAAA,EAC/C,cAAc;AACZ,UAAM,8BAA8B;AACpC,SAAK,OAAO;AAAA,EACd;AACF;AAMO,IAAM,UAAU,OAAO,UAAkF;AAC9G,QAAM,oBAAoB,CAAC,YAAY,YAAY,YAAY,UAAU;AACzE,aAAW,aAAa,mBAAmB;AACzC,QAAI,CAAC,MAAM,eAAe,SAAS,GAAG;AACpC,cAAQ,IAAI,YAAY,SAAS,uBAAuB;AACxD,aAAO,CAAC;AAAA,IACV;AAAA,EACF;AAEA,QAAM,gBAAgB,MAAM;AAC5B,QAAM,gBAAgB,MAAM;AAC5B,QAAM,gBAAgB,MAAM;AAC5B,QAAM,gBAAgB,MAAM;AAC5B,QAAM,gBAAgB,MAAM,YAAY;AAExC,UAAQ,IAAI,aAAa,aAAa,eAAe,aAAa,eAAe,aAAa,eAAe,aAAa,EAAE;AAE5H,UAAQ,IAAI,gCAAgC;AAC5C,MAAI,qBAAqB;AACzB,MAAI,kBAAkB,IAAI;AACxB,YAAQ,IAAI,+BAA+B;AAC3C,yBAAqB;AAAA,EACvB,OAAO;AACL,QAAI,kBAAkB,SAAS,kBAAkB,QAAQ;AACvD,cAAQ,IAAI,sCAAsC;AAClD,aAAO,CAAC;AAAA,IACV;AACA,YAAQ,IAAI,0BAA0B;AACtC,yBAAqB;AAAA,EACvB;AAEA,QAAM,SAAS,MAAM,UAAU,iBAAiB,aAAa,IAAI,aAAa,EAAE;AAEhF,MAAI,QAAQ;AACV,UAAM,aAAa,KAAK,MAAM,MAAM;AACpC,UAAM,qBAAqB,MAAM;AAC/B,UAAI,uBAAuB,aAAa;AACtC,gBAAQ,IAAI,0CAA0C;AACtD,eAAO;AAAA,MACT;AACA,aAAO,yBAAyB,YAAY,eAAe,aAAa;AAAA,IAC1E,GAAG;AACH,UAAM,UAAU,eAAe,YAAY,eAAe,aAAa;AAEvE,QAAI,qBAAqB,SAAS;AAChC,cAAQ,IAAI,mDAAmD,kBAAkB,EAAE;AACnF,aAAO,cAAc,YAAY,oBAAoB,aAAa;AAAA,IACpE,OAAO;AACL,cAAQ,IAAI,kDAAkD;AAC9D,aAAO,CAAC;AAAA,IACV;AAAA,EACF,OAAO;AACL,YAAQ,IAAI,6DAA6D;AACzE,WAAO,CAAC;AAAA,EACV;AACF;AAEA,IAAM,SAAS,CAAC,YAAwB,KAAa,kBAAyC;AAC5F,MAAI,WAAW,GAAG,aAAa,GAAG,GAAG,EAAE,GAAG;AACxC,YAAQ,IAAI,4BAA4B,GAAG,EAAE;AAC7C,WAAO,WAAW,GAAG,aAAa,GAAG,GAAG,EAAE;AAAA,EAC5C,OAAO;AACL,WAAO,WAAW,GAAG,KAAK;AAAA,EAC5B;AACF;AAEA,IAAM,iBAAiB,CAAC,YAAwB,eAAuB,kBAAmC;AACxG,QAAM,qBAAqB,OAAO,YAAY,sBAAsB,aAAa;AACjF,UAAQ,IAAI,uBAAuB,kBAAkB,EAAE;AACvD,MAAI,CAAC,oBAAoB;AACvB,YAAQ,IAAI,6GAA6G;AACzH,WAAO;AAAA,EACT;AAEA,aAAW,QAAQ,mBAAmB,MAAM,GAAG,GAAG;AAChD,QAAI,WAAW,eAAe,IAAI,GAAG;AACnC,cAAQ,IAAI,yBAAyB;AACrC,aAAO;AAAA,IACT;AAAA,EACF;AAEA,UAAQ,IAAI,gCAAgC;AAC5C,SAAO;AACT;AAEA,IAAM,2BAA2B,CAAC,YAAwB,eAAuB,kBAAmC;AAClH,QAAM,WAAW,OAAO,YAAY,YAAY,aAAa;AAC7D,MAAI,CAAC,UAAU;AACb,YAAQ,IAAI,qEAAqE;AACjF,WAAO;AAAA,EACT;AAEA,MAAI,kBAAkB,UAAU;AAC9B,WAAO;AAAA,EACT,OAAO;AACL,YAAQ,IAAI,uEAAuE;AACnF,WAAO;AAAA,EACT;AACF;AAEA,IAAM,gBAAgB,CAAC,YAAwB,UAAkB,kBAA0D;AACzH,QAAM,eAA+C,CAAC;AAEtD,QAAM,OAAO,OAAO,YAAY,QAAQ,aAAa;AACrD,MAAI,MAAM;AACR,iBAAa,OAAO;AAAA,EACtB,OAAO;AACL,YAAQ,IAAI,wDAAwD;AACpE,iBAAa,OAAO;AAAA,EACtB;AAEA,QAAM,SAAS,OAAO,YAAY,UAAU,aAAa;AACzD,MAAI,QAAQ;AACV,iBAAa,SAAS;AAAA,EACxB;AAEA,QAAM,uBAAuB,OAAO,YAAY,wBAAwB,aAAa;AACrF,MAAI,sBAAsB;AACxB,YAAQ,IAAI,iIAAiI;AAC7I,iBAAa,uBAAuB;AACpC,YAAQ,IAAI,sCAAsC;AAClD,iBAAa,oBAAoB;AAAA,EACnC;AAEA,QAAM,gBAAgB,OAAO,YAAY,iBAAiB,aAAa;AACvE,MAAI,eAAe;AACjB,YAAQ,IAAI,0FAA0F;AACtG,iBAAa,gBAAgB;AAAA,EAC/B;AAEA,MAAI,aAAa,aAAa;AAC5B,UAAM,YAAY,OAAO,YAAY,aAAa,aAAa;AAC/D,QAAI,WAAW;AACb,mBAAa,aAAa,CAAC,SAAS;AAAA,IACtC,OAAO;AACL,cAAQ,IAAI,oDAAoD;AAChE,aAAO,CAAC;AAAA,IACV;AAAA,EACF;AAEA,SAAO;AACT;AAEA,IAAM,YAAY,OAAO,OAAuC;AAC9D,UAAQ,IAAI,gBAAgB,EAAE,EAAE;AAEhC,QAAM,SAAS,IAAI,mDAAqB;AAAA,IACtC,QAAQ;AAAA,EACV,CAAC;AAED,SAAO,OAAO,KAAK,IAAI,oDAAsB,EAAE,UAAU,GAAG,CAAC,CAAC,EAC3D,KAAK,CAAC,SAAsC;AAC3C,QAAI,KAAK,cAAc;AACrB,cAAQ,IAAI,wBAAwB;AACpC,aAAO,OAAO,KAAK,KAAK,YAAY,EAAE,SAAS,OAAO;AAAA,IACxD;AACA,QAAI,KAAK,cAAc;AACrB,cAAQ,IAAI,wBAAwB;AACpC,aAAO,KAAK;AAAA,IACd;AACA,UAAM,IAAI,sBAAsB;AAAA,EAClC,CAAC,EACA,MAAM,CAAC,UAAiB;AACvB,YAAQ,KAAK,MAAM,OAAO;AAC1B,WAAO;AAAA,EACT,CAAC;AACL;AAEA,IAAM,aAAa,CAAC,YAAoB;AACtC,MAAI,QAAQ,SAAS,GAAG,GAAG;AAEzB,QAAI,QAAQ,QAAQ,MAAM,GAAG,EAAE,IAAI,UAAQ,SAAS,KAAK,MAAM,IAAI;AACnE,QAAI,SAAS,OAAO,CAAC;AACrB,aAAS,IAAI,GAAG,IAAI,MAAM,QAAQ,KAAK;AACrC,eAAS,SAAS,OAAO,KAAO,IAAI,OAAO,SAAS,MAAM,CAAC,GAAG,EAAE,CAAC;AAAA,IACnE;AACA,WAAO;AAAA,EACT,OAAO;AAEL,QAAI,QAAQ,QAAQ,MAAM,GAAG,EAAE,IAAI,UAAQ,SAAS,MAAM,EAAE,CAAC;AAC7D,QAAI,SAAS,OAAO,CAAC;AACrB,aAAS,IAAI,GAAG,IAAI,MAAM,QAAQ,KAAK;AACrC,eAAS,SAAS,OAAO,GAAG,IAAI,OAAO,MAAM,CAAC,CAAC;AAAA,IACjD;AACA,WAAO;AAAA,EACT;AACF;AAEA,IAAM,iBAAiB,CAAC,SAAiD;AACvE,QAAM,CAAC,SAAS,IAAI,IAAI,KAAK,MAAM,GAAG;AACtC,QAAM,SAAS,QAAQ,SAAS,GAAG;AACnC,QAAM,YAAY,SAAS,MAAM;AACjC,QAAM,gBAAgB,WAAW,OAAO;AACxC,QAAM,WAAW,YAAY,SAAS,MAAM,EAAE;AAC9C,QAAM,aAAa,OAAO,CAAC,KAAK,OAAO,QAAQ;AAE/C,QAAM,QAAQ,gBAAiB,gBAAgB;AAC/C,QAAM,MAAM,QAAQ,aAAa,OAAO,CAAC;AAEzC,SAAO,EAAE,OAAO,IAAI;AACtB;AAEA,IAAM,aAAa,CAAC,QAAgB,SAAiB;AACnD,QAAM,WAAW,WAAW,MAAM;AAClC,QAAM,EAAE,OAAO,IAAI,IAAI,eAAe,IAAI;AAC1C,SAAO,YAAY,SAAS,YAAY;AAC1C;",
6
6
  "names": []
7
7
  }
@@ -1,2 +1,5 @@
1
1
  import { TransferFamilyAuthorizerEvent, TransferFamilyAuthorizerResult } from 'aws-lambda';
2
+ export declare class EmptySecretValueError extends Error {
3
+ constructor();
4
+ }
2
5
  export declare const handler: (event: TransferFamilyAuthorizerEvent) => Promise<TransferFamilyAuthorizerResult>;
@@ -1,7 +1,14 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.handler = void 0;
3
+ exports.handler = exports.EmptySecretValueError = void 0;
4
4
  const client_secrets_manager_1 = require("@aws-sdk/client-secrets-manager");
5
+ class EmptySecretValueError extends Error {
6
+ constructor() {
7
+ super('Got a secret value is empty.');
8
+ this.name = 'EmptySecretValueError';
9
+ }
10
+ }
11
+ exports.EmptySecretValueError = EmptySecretValueError;
5
12
  const handler = async (event) => {
6
13
  const requiredParamList = ['serverId', 'username', 'protocol', 'sourceIp'];
7
14
  for (const parameter of requiredParamList) {
@@ -28,12 +35,18 @@ const handler = async (event) => {
28
35
  return {};
29
36
  }
30
37
  console.log('Using SSH authentication');
31
- authenticationType = 'SSH';
38
+ authenticationType = 'SSHPubKey';
32
39
  }
33
40
  const secret = await getSecret(`transfer-user/${inputServerId}/${inputUsername}`);
34
41
  if (secret) {
35
42
  const secretDict = JSON.parse(secret);
36
- const userAuthenticated = authenticateUser(authenticationType, secretDict, inputPassword, inputProtocol);
43
+ const userAuthenticated = (() => {
44
+ if (authenticationType === 'SSHPubKey') {
45
+ console.log('Skip password check as SSH login request');
46
+ return true;
47
+ }
48
+ return authenticatePasswordUser(secretDict, inputPassword, inputProtocol);
49
+ })();
37
50
  const ipMatch = checkIpAddress(secretDict, inputSourceIp, inputProtocol);
38
51
  if (userAuthenticated && ipMatch) {
39
52
  console.log(`User authenticated, calling buildResponse with: ${authenticationType}`);
@@ -60,42 +73,33 @@ const lookup = (secretDict, key, inputProtocol) => {
60
73
  }
61
74
  };
62
75
  const checkIpAddress = (secretDict, inputSourceIp, inputProtocol) => {
63
- const acceptedIpNetworkList = lookup(secretDict, 'AcceptedIpNetworkList', inputProtocol);
64
- if (!acceptedIpNetworkList) {
65
- console.log('No IP range provided - Skip IP check');
66
- return true;
67
- }
68
- for (const acceptedIpNetwork of acceptedIpNetworkList.split(',')) {
69
- if (isIpInCidr(inputSourceIp, acceptedIpNetwork)) {
76
+ const acceptedIpNetworks = lookup(secretDict, 'AcceptedIpNetworks', inputProtocol);
77
+ console.log(`AcceptedIpNetworks: ${acceptedIpNetworks}`);
78
+ if (!acceptedIpNetworks) {
79
+ console.log('Unable to authenticate user - No filed match in Secret for AcceptedIpNetworks(CIDR format, comma-separated)');
80
+ return false;
81
+ }
82
+ for (const cidr of acceptedIpNetworks.split(',')) {
83
+ if (isIpInCidr(inputSourceIp, cidr)) {
70
84
  console.log('Source IP address match');
71
85
  return true;
72
86
  }
73
87
  }
74
- // if (new CIDRMatcher(acceptedIpNetworkList.split(',')).contains(inputSourceIp)) {
75
- // console.log('Source IP address match');
76
- // return true;
77
- // }
78
88
  console.log('Source IP address not in range');
79
89
  return false;
80
90
  };
81
- const authenticateUser = (authType, secretDict, inputPassword, inputProtocol) => {
82
- if (authType === 'SSH') {
83
- console.log('Skip password check as SSH login request');
91
+ const authenticatePasswordUser = (secretDict, inputPassword, inputProtocol) => {
92
+ const password = lookup(secretDict, 'Password', inputProtocol);
93
+ if (!password) {
94
+ console.log('Unable to authenticate user - No field match in Secret for password');
95
+ return false;
96
+ }
97
+ if (inputPassword === password) {
84
98
  return true;
85
99
  }
86
100
  else {
87
- const password = lookup(secretDict, 'Password', inputProtocol);
88
- if (!password) {
89
- console.log('Unable to authenticate user - No field match in Secret for password');
90
- return false;
91
- }
92
- if (inputPassword === password) {
93
- return true;
94
- }
95
- else {
96
- console.log('Unable to authenticate user - Incoming password does not match stored');
97
- return false;
98
- }
101
+ console.log('Unable to authenticate user - Incoming password does not match stored');
102
+ return false;
99
103
  }
100
104
  };
101
105
  const buildResponse = (secretDict, authType, inputProtocol) => {
@@ -124,7 +128,7 @@ const buildResponse = (secretDict, authType, inputProtocol) => {
124
128
  console.log('HomeDirectory found - Note: Cannot be used in conjunction with key: HomeDirectoryDetails');
125
129
  responseData.HomeDirectory = homeDirectory;
126
130
  }
127
- if (authType === 'SSH') {
131
+ if (authType === 'SSHPubKey') {
128
132
  const publicKey = lookup(secretDict, 'PublicKey', inputProtocol);
129
133
  if (publicKey) {
130
134
  responseData.PublicKeys = [publicKey];
@@ -141,53 +145,22 @@ const getSecret = async (id) => {
141
145
  const client = new client_secrets_manager_1.SecretsManagerClient({
142
146
  region: 'ap-northeast-1',
143
147
  });
144
- const command = new client_secrets_manager_1.GetSecretValueCommand({ SecretId: id });
145
- try {
146
- const data = await client.send(command);
147
- console.log(data);
148
+ return client.send(new client_secrets_manager_1.GetSecretValueCommand({ SecretId: id }))
149
+ .then((data) => {
150
+ if (data.SecretBinary) {
151
+ console.log('Got SecretBinary value');
152
+ return Buffer.from(data.SecretBinary).toString('utf-8');
153
+ }
148
154
  if (data.SecretString) {
155
+ console.log('Got SecretString value');
149
156
  return data.SecretString;
150
157
  }
151
- if (data.SecretBinary) {
152
- return new TextDecoder().decode(data.SecretBinary);
153
- }
154
- return null;
155
- }
156
- catch (error) {
157
- console.log('Not found Secret');
158
- console.log(`Error: ${JSON.stringify(error)}`);
158
+ throw new EmptySecretValueError();
159
+ })
160
+ .catch((error) => {
161
+ console.warn(error.message);
159
162
  return null;
160
- }
161
- //const resp = await client.send(command);
162
- // return client.send(command)
163
- // .then((data: GetSecretValueCommandOutput) => {
164
- // if (data?.SecretString) {
165
- // return data.SecretString;
166
- // }
167
- // if (data?.SecretBinary) {
168
- // return new TextDecoder().decode(data.SecretBinary);
169
- // }
170
- // return null;
171
- // })
172
- // .catch((error: Error) => {
173
- // console.log('Not found Secret');
174
- // console.log(`Error:${JSON.stringify(error)}`);
175
- // return null;
176
- // });
177
- // console.log(resp);
178
- // if (resp.SecretString) {
179
- // console.log('Found Secret String');
180
- // return resp.SecretString;
181
- // } else {
182
- // if (resp.SecretBinary) {
183
- // console.log('Found Binary Secret');
184
- // //return Buffer.from(resp.SecretBinary as string, 'base64').toString('ascii');
185
- // return new TextDecoder().decode(resp.SecretBinary);
186
- // }
187
- // }
188
- //
189
- // console.log('Not found Secret');
190
- // return null;
163
+ });
191
164
  };
192
165
  const ipToBigInt = (address) => {
193
166
  if (address.includes(':')) {
@@ -209,25 +182,20 @@ const ipToBigInt = (address) => {
209
182
  return bigInt;
210
183
  }
211
184
  };
212
- const getSubnetMask = (bits, isIPv6 = false) => {
213
- let mask = BigInt(0);
214
- const totalBits = isIPv6 ? 128 : 32;
215
- for (let i = 0; i < bits; i++) {
216
- mask = mask * BigInt(2) + BigInt(1);
217
- }
218
- for (let i = bits; i < totalBits; i++) {
219
- mask = mask * BigInt(2);
220
- }
221
- return mask;
222
- };
223
- const isIpInCidr = (address, cidr) => {
185
+ const getSubnetRange = (cidr) => {
224
186
  const [network, bits] = cidr.split('/');
225
187
  const isIPv6 = network.includes(':');
226
- const ipBigInt = ipToBigInt(address);
188
+ const totalBits = isIPv6 ? 128 : 32;
227
189
  const networkBigInt = ipToBigInt(network);
228
- const mask = getSubnetMask(parseInt(bits), isIPv6);
229
- const maskedIp = ipBigInt - (ipBigInt % (mask + BigInt(1)));
230
- const maskedNetwork = networkBigInt - (networkBigInt % (mask + BigInt(1)));
231
- return maskedIp === maskedNetwork;
190
+ const hostBits = totalBits - parseInt(bits, 10);
191
+ const subnetSize = BigInt(2) ** BigInt(hostBits);
192
+ const start = networkBigInt - (networkBigInt % subnetSize);
193
+ const end = start + subnetSize - BigInt(1);
194
+ return { start, end };
195
+ };
196
+ const isIpInCidr = (ipAddr, cidr) => {
197
+ const ipBigInt = ipToBigInt(ipAddr);
198
+ const { start, end } = getSubnetRange(cidr);
199
+ return ipBigInt >= start && ipBigInt <= end;
232
200
  };
233
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"transfer-user-authentication.lambda.js","sourceRoot":"","sources":["../../src/funcs/transfer-user-authentication.lambda.ts"],"names":[],"mappings":";;;AAAA,4EAA2H;AAOpH,MAAM,OAAO,GAAG,KAAK,EAAE,KAAoC,EAA2C,EAAE;IAC7G,MAAM,iBAAiB,GAAG,CAAC,UAAU,EAAE,UAAU,EAAE,UAAU,EAAE,UAAU,CAAC,CAAC;IAC3E,KAAK,MAAM,SAAS,IAAI,iBAAiB,EAAE,CAAC;QAC1C,IAAI,CAAC,KAAK,CAAC,cAAc,CAAC,SAAS,CAAC,EAAE,CAAC;YACrC,OAAO,CAAC,GAAG,CAAC,YAAY,SAAS,uBAAuB,CAAC,CAAC;YAC1D,OAAO,EAAE,CAAC;QACZ,CAAC;IACH,CAAC;IAED,MAAM,aAAa,GAAG,KAAK,CAAC,QAAQ,CAAC;IACrC,MAAM,aAAa,GAAG,KAAK,CAAC,QAAQ,CAAC;IACrC,MAAM,aAAa,GAAG,KAAK,CAAC,QAAQ,CAAC;IACrC,MAAM,aAAa,GAAG,KAAK,CAAC,QAAQ,CAAC;IACrC,MAAM,aAAa,GAAG,KAAK,CAAC,QAAQ,IAAI,EAAE,CAAC;IAE3C,OAAO,CAAC,GAAG,CAAC,aAAa,aAAa,eAAe,aAAa,eAAe,aAAa,eAAe,aAAa,EAAE,CAAC,CAAC;IAE9H,OAAO,CAAC,GAAG,CAAC,gCAAgC,CAAC,CAAC;IAC9C,IAAI,kBAAkB,GAAG,EAAE,CAAC;IAC5B,IAAI,aAAa,KAAK,EAAE,EAAE,CAAC;QACzB,OAAO,CAAC,GAAG,CAAC,+BAA+B,CAAC,CAAC;QAC7C,kBAAkB,GAAG,UAAU,CAAC;IAClC,CAAC;SAAM,CAAC;QACN,IAAI,aAAa,KAAK,KAAK,IAAI,aAAa,KAAK,MAAM,EAAE,CAAC;YACxD,OAAO,CAAC,GAAG,CAAC,sCAAsC,CAAC,CAAC;YACpD,OAAO,EAAE,CAAC;QACZ,CAAC;QACD,OAAO,CAAC,GAAG,CAAC,0BAA0B,CAAC,CAAC;QACxC,kBAAkB,GAAG,KAAK,CAAC;IAC7B,CAAC;IAED,MAAM,MAAM,GAAG,MAAM,SAAS,CAAC,iBAAiB,aAAa,IAAI,aAAa,EAAE,CAAC,CAAC;IAElF,IAAI,MAAM,EAAE,CAAC;QACX,MAAM,UAAU,GAAG,IAAI,CAAC,KAAK,CAAC,MAAM,CAAe,CAAC;QACpD,MAAM,iBAAiB,GAAG,gBAAgB,CAAC,kBAAkB,EAAE,UAAU,EAAE,aAAa,EAAE,aAAa,CAAC,CAAC;QACzG,MAAM,OAAO,GAAG,cAAc,CAAC,UAAU,EAAE,aAAa,EAAE,aAAa,CAAC,CAAC;QAEzE,IAAI,iBAAiB,IAAI,OAAO,EAAE,CAAC;YACjC,OAAO,CAAC,GAAG,CAAC,mDAAmD,kBAAkB,EAAE,CAAC,CAAC;YACrF,OAAO,aAAa,CAAC,UAAU,EAAE,kBAAkB,EAAE,aAAa,CAAC,CAAC;QACtE,CAAC;aAAM,CAAC;YACN,OAAO,CAAC,GAAG,CAAC,kDAAkD,CAAC,CAAC;YAChE,OAAO,EAAE,CAAC;QACZ,CAAC;IACH,CAAC;SAAM,CAAC;QACN,OAAO,CAAC,GAAG,CAAC,6DAA6D,CAAC,CAAC;QAC3E,OAAO,EAAE,CAAC;IACZ,CAAC;AACH,CAAC,CAAC;AAjDW,QAAA,OAAO,WAiDlB;AAEF,MAAM,MAAM,GAAG,CAAC,UAAsB,EAAE,GAAW,EAAE,aAAqB,EAAiB,EAAE;IAC3F,IAAI,UAAU,CAAC,GAAG,aAAa,GAAG,GAAG,EAAE,CAAC,EAAE,CAAC;QACzC,OAAO,CAAC,GAAG,CAAC,4BAA4B,GAAG,EAAE,CAAC,CAAC;QAC/C,OAAO,UAAU,CAAC,GAAG,aAAa,GAAG,GAAG,EAAE,CAAC,CAAC;IAC9C,CAAC;SAAM,CAAC;QACN,OAAO,UAAU,CAAC,GAAG,CAAC,IAAI,IAAI,CAAC;IACjC,CAAC;AACH,CAAC,CAAC;AAEF,MAAM,cAAc,GAAG,CAAC,UAAsB,EAAE,aAAqB,EAAE,aAAqB,EAAW,EAAE;IACvG,MAAM,qBAAqB,GAAG,MAAM,CAAC,UAAU,EAAE,uBAAuB,EAAE,aAAa,CAAC,CAAC;IACzF,IAAI,CAAC,qBAAqB,EAAE,CAAC;QAC3B,OAAO,CAAC,GAAG,CAAC,sCAAsC,CAAC,CAAC;QACpD,OAAO,IAAI,CAAC;IACd,CAAC;IAED,KAAK,MAAM,iBAAiB,IAAI,qBAAqB,CAAC,KAAK,CAAC,GAAG,CAAC,EAAE,CAAC;QACjE,IAAI,UAAU,CAAC,aAAa,EAAE,iBAAiB,CAAC,EAAE,CAAC;YACjD,OAAO,CAAC,GAAG,CAAC,yBAAyB,CAAC,CAAC;YACvC,OAAO,IAAI,CAAC;QACd,CAAC;IACH,CAAC;IACD,oFAAoF;IACpF,6CAA6C;IAC7C,kBAAkB;IAClB,KAAK;IAEL,OAAO,CAAC,GAAG,CAAC,gCAAgC,CAAC,CAAC;IAC9C,OAAO,KAAK,CAAC;AACf,CAAC,CAAC;AAEF,MAAM,gBAAgB,GAAG,CAAC,QAAgB,EAAE,UAAsB,EAAE,aAAqB,EAAE,aAAqB,EAAW,EAAE;IAC3H,IAAI,QAAQ,KAAK,KAAK,EAAE,CAAC;QACvB,OAAO,CAAC,GAAG,CAAC,0CAA0C,CAAC,CAAC;QACxD,OAAO,IAAI,CAAC;IACd,CAAC;SAAM,CAAC;QACN,MAAM,QAAQ,GAAG,MAAM,CAAC,UAAU,EAAE,UAAU,EAAE,aAAa,CAAC,CAAC;QAC/D,IAAI,CAAC,QAAQ,EAAE,CAAC;YACd,OAAO,CAAC,GAAG,CAAC,qEAAqE,CAAC,CAAC;YACnF,OAAO,KAAK,CAAC;QACf,CAAC;QAED,IAAI,aAAa,KAAK,QAAQ,EAAE,CAAC;YAC/B,OAAO,IAAI,CAAC;QACd,CAAC;aAAM,CAAC;YACN,OAAO,CAAC,GAAG,CAAC,uEAAuE,CAAC,CAAC;YACrF,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;AACH,CAAC,CAAC;AAEF,MAAM,aAAa,GAAG,CAAC,UAAsB,EAAE,QAAgB,EAAE,aAAqB,EAAkC,EAAE;IACxH,MAAM,YAAY,GAAmC,EAAE,CAAC;IAExD,MAAM,IAAI,GAAG,MAAM,CAAC,UAAU,EAAE,MAAM,EAAE,aAAa,CAAC,CAAC;IACvD,IAAI,IAAI,EAAE,CAAC;QACT,YAAY,CAAC,IAAI,GAAG,IAAI,CAAC;IAC3B,CAAC;SAAM,CAAC;QACN,OAAO,CAAC,GAAG,CAAC,wDAAwD,CAAC,CAAC;QACtE,YAAY,CAAC,IAAI,GAAG,EAAE,CAAC;IACzB,CAAC;IAED,MAAM,MAAM,GAAG,MAAM,CAAC,UAAU,EAAE,QAAQ,EAAE,aAAa,CAAC,CAAC;IAC3D,IAAI,MAAM,EAAE,CAAC;QACX,YAAY,CAAC,MAAM,GAAG,MAAM,CAAC;IAC/B,CAAC;IAED,MAAM,oBAAoB,GAAG,MAAM,CAAC,UAAU,EAAE,sBAAsB,EAAE,aAAa,CAAC,CAAC;IACvF,IAAI,oBAAoB,EAAE,CAAC;QACzB,OAAO,CAAC,GAAG,CAAC,iIAAiI,CAAC,CAAC;QAC/I,YAAY,CAAC,oBAAoB,GAAG,oBAAoB,CAAC;QACzD,OAAO,CAAC,GAAG,CAAC,sCAAsC,CAAC,CAAC;QACpD,YAAY,CAAC,iBAAiB,GAAG,SAAS,CAAC;IAC7C,CAAC;IAED,MAAM,aAAa,GAAG,MAAM,CAAC,UAAU,EAAE,eAAe,EAAE,aAAa,CAAC,CAAC;IACzE,IAAI,aAAa,EAAE,CAAC;QAClB,OAAO,CAAC,GAAG,CAAC,0FAA0F,CAAC,CAAC;QACxG,YAAY,CAAC,aAAa,GAAG,aAAa,CAAC;IAC7C,CAAC;IAED,IAAI,QAAQ,KAAK,KAAK,EAAE,CAAC;QACvB,MAAM,SAAS,GAAG,MAAM,CAAC,UAAU,EAAE,WAAW,EAAE,aAAa,CAAC,CAAC;QACjE,IAAI,SAAS,EAAE,CAAC;YACd,YAAY,CAAC,UAAU,GAAG,CAAC,SAAS,CAAC,CAAC;QACxC,CAAC;aAAM,CAAC;YACN,OAAO,CAAC,GAAG,CAAC,oDAAoD,CAAC,CAAC;YAClE,OAAO,EAAE,CAAC;QACZ,CAAC;IACH,CAAC;IAED,OAAO,YAAY,CAAC;AACtB,CAAC,CAAC;AAEF,MAAM,SAAS,GAAG,KAAK,EAAE,EAAU,EAA0B,EAAE;IAC7D,OAAO,CAAC,GAAG,CAAC,gBAAgB,EAAE,EAAE,CAAC,CAAC;IAElC,MAAM,MAAM,GAAG,IAAI,6CAAoB,CAAC;QACtC,MAAM,EAAE,gBAAgB;KACzB,CAAC,CAAC;IACH,MAAM,OAAO,GAAG,IAAI,8CAAqB,CAAC,EAAE,QAAQ,EAAE,EAAE,EAAE,CAAC,CAAC;IAE5D,IAAI,CAAC;QACH,MAAM,IAAI,GAAgC,MAAM,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QACrE,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC;QAClB,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,OAAO,IAAI,CAAC,YAAY,CAAC;QAC3B,CAAC;QACD,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,OAAO,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;QACrD,CAAC;QACD,OAAO,IAAI,CAAC;IACd,CAAC;IAAC,OAAO,KAAK,EAAE,CAAC;QACf,OAAO,CAAC,GAAG,CAAC,kBAAkB,CAAC,CAAC;QAChC,OAAO,CAAC,GAAG,CAAC,UAAU,IAAI,CAAC,SAAS,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC;QAC/C,OAAO,IAAI,CAAC;IACd,CAAC;IACD,0CAA0C;IAC5C,+BAA+B;IAC/B,oDAAoD;IACpD,iCAAiC;IACjC,mCAAmC;IACnC,SAAS;IACT,iCAAiC;IACjC,6DAA6D;IAC7D,SAAS;IACT,oBAAoB;IACpB,QAAQ;IACR,gCAAgC;IAChC,wCAAwC;IACxC,sDAAsD;IACtD,oBAAoB;IACpB,SAAS;IACT,sBAAsB;IACtB,4BAA4B;IAC5B,yCAAyC;IACzC,+BAA+B;IAC/B,YAAY;IACZ,8BAA8B;IAC9B,2CAA2C;IAC3C,sFAAsF;IACtF,2DAA2D;IAC3D,OAAO;IACP,KAAK;IACL,EAAE;IACF,oCAAoC;IACpC,gBAAgB;AAChB,CAAC,CAAC;AAEF,MAAM,UAAU,GAAG,CAAC,OAAe,EAAE,EAAE;IACrC,IAAI,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;QAC1B,OAAO;QACP,IAAI,KAAK,GAAG,OAAO,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC,IAAI,KAAK,EAAE,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC;QACrE,IAAI,MAAM,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;QACvB,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,KAAK,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACtC,MAAM,GAAG,MAAM,GAAG,MAAM,CAAC,OAAO,CAAC,GAAG,MAAM,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC;QACrE,CAAC;QACD,OAAO,MAAM,CAAC;IAChB,CAAC;SAAM,CAAC;QACN,OAAO;QACP,IAAI,KAAK,GAAG,OAAO,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC,QAAQ,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC,CAAC;QAC/D,IAAI,MAAM,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;QACvB,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,KAAK,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACtC,MAAM,GAAG,MAAM,GAAG,MAAM,CAAC,GAAG,CAAC,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC;QACnD,CAAC;QACD,OAAO,MAAM,CAAC;IAChB,CAAC;AACH,CAAC,CAAC;AAEF,MAAM,aAAa,GAAG,CAAC,IAAY,EAAE,MAAM,GAAG,KAAK,EAAE,EAAE;IACrD,IAAI,IAAI,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;IACrB,MAAM,SAAS,GAAG,MAAM,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC;IACpC,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,IAAI,EAAE,CAAC,EAAE,EAAE,CAAC;QAC9B,IAAI,GAAG,IAAI,GAAG,MAAM,CAAC,CAAC,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;IACtC,CAAC;IACD,KAAK,IAAI,CAAC,GAAG,IAAI,EAAE,CAAC,GAAG,SAAS,EAAE,CAAC,EAAE,EAAE,CAAC;QACtC,IAAI,GAAG,IAAI,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;IAC1B,CAAC;IACD,OAAO,IAAI,CAAC;AACd,CAAC,CAAC;AAEF,MAAM,UAAU,GAAG,CAAC,OAAe,EAAE,IAAY,EAAE,EAAE;IACnD,MAAM,CAAC,OAAO,EAAE,IAAI,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;IACxC,MAAM,MAAM,GAAG,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC;IACrC,MAAM,QAAQ,GAAG,UAAU,CAAC,OAAO,CAAC,CAAC;IACrC,MAAM,aAAa,GAAG,UAAU,CAAC,OAAO,CAAC,CAAC;IAC1C,MAAM,IAAI,GAAG,aAAa,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,MAAM,CAAC,CAAC;IAEnD,MAAM,QAAQ,GAAG,QAAQ,GAAG,CAAC,QAAQ,GAAG,CAAC,IAAI,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;IAC5D,MAAM,aAAa,GAAG,aAAa,GAAG,CAAC,aAAa,GAAG,CAAC,IAAI,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;IAE3E,OAAO,QAAQ,KAAK,aAAa,CAAC;AACpC,CAAC,CAAC","sourcesContent":["import { SecretsManagerClient, GetSecretValueCommand, GetSecretValueCommandOutput } from '@aws-sdk/client-secrets-manager';\nimport { TransferFamilyAuthorizerEvent, TransferFamilyAuthorizerResult } from 'aws-lambda';\n\ninterface SecretDict {\n  [key: string]: string;\n}\n\nexport const handler = async (event: TransferFamilyAuthorizerEvent): Promise<TransferFamilyAuthorizerResult> => {\n  const requiredParamList = ['serverId', 'username', 'protocol', 'sourceIp'];\n  for (const parameter of requiredParamList) {\n    if (!event.hasOwnProperty(parameter)) {\n      console.log(`Incoming ${parameter} missing - Unexpected`);\n      return {};\n    }\n  }\n\n  const inputServerId = event.serverId;\n  const inputUsername = event.username;\n  const inputProtocol = event.protocol;\n  const inputSourceIp = event.sourceIp;\n  const inputPassword = event.password || '';\n\n  console.log(`ServerId: ${inputServerId}, Username: ${inputUsername}, Protocol: ${inputProtocol}, SourceIp: ${inputSourceIp}`);\n\n  console.log('Start User Authentication Flow');\n  let authenticationType = '';\n  if (inputPassword !== '') {\n    console.log('Using PASSWORD authentication');\n    authenticationType = 'PASSWORD';\n  } else {\n    if (inputProtocol === 'FTP' || inputProtocol === 'FTPS') {\n      console.log('Empty password not allowed for FTP/S');\n      return {};\n    }\n    console.log('Using SSH authentication');\n    authenticationType = 'SSH';\n  }\n\n  const secret = await getSecret(`transfer-user/${inputServerId}/${inputUsername}`);\n\n  if (secret) {\n    const secretDict = JSON.parse(secret) as SecretDict;\n    const userAuthenticated = authenticateUser(authenticationType, secretDict, inputPassword, inputProtocol);\n    const ipMatch = checkIpAddress(secretDict, inputSourceIp, inputProtocol);\n\n    if (userAuthenticated && ipMatch) {\n      console.log(`User authenticated, calling buildResponse with: ${authenticationType}`);\n      return buildResponse(secretDict, authenticationType, inputProtocol);\n    } else {\n      console.log('User failed authentication return empty response');\n      return {};\n    }\n  } else {\n    console.log('Secrets Manager exception thrown - Returning empty response');\n    return {};\n  }\n};\n\nconst lookup = (secretDict: SecretDict, key: string, inputProtocol: string): string | null => {\n  if (secretDict[`${inputProtocol}${key}`]) {\n    console.log(`Found protocol-specified ${key}`);\n    return secretDict[`${inputProtocol}${key}`];\n  } else {\n    return secretDict[key] || null;\n  }\n};\n\nconst checkIpAddress = (secretDict: SecretDict, inputSourceIp: string, inputProtocol: string): boolean => {\n  const acceptedIpNetworkList = lookup(secretDict, 'AcceptedIpNetworkList', inputProtocol);\n  if (!acceptedIpNetworkList) {\n    console.log('No IP range provided - Skip IP check');\n    return true;\n  }\n\n  for (const acceptedIpNetwork of acceptedIpNetworkList.split(',')) {\n    if (isIpInCidr(inputSourceIp, acceptedIpNetwork)) {\n      console.log('Source IP address match');\n      return true;\n    }\n  }\n  //  if (new CIDRMatcher(acceptedIpNetworkList.split(',')).contains(inputSourceIp)) {\n  //    console.log('Source IP address match');\n  //    return true;\n  //  }\n\n  console.log('Source IP address not in range');\n  return false;\n};\n\nconst authenticateUser = (authType: string, secretDict: SecretDict, inputPassword: string, inputProtocol: string): boolean => {\n  if (authType === 'SSH') {\n    console.log('Skip password check as SSH login request');\n    return true;\n  } else {\n    const password = lookup(secretDict, 'Password', inputProtocol);\n    if (!password) {\n      console.log('Unable to authenticate user - No field match in Secret for password');\n      return false;\n    }\n\n    if (inputPassword === password) {\n      return true;\n    } else {\n      console.log('Unable to authenticate user - Incoming password does not match stored');\n      return false;\n    }\n  }\n};\n\nconst buildResponse = (secretDict: SecretDict, authType: string, inputProtocol: string): TransferFamilyAuthorizerResult => {\n  const responseData: TransferFamilyAuthorizerResult = {};\n\n  const role = lookup(secretDict, 'Role', inputProtocol);\n  if (role) {\n    responseData.Role = role;\n  } else {\n    console.log('No field match for role - Set empty string in response');\n    responseData.Role = '';\n  }\n\n  const policy = lookup(secretDict, 'Policy', inputProtocol);\n  if (policy) {\n    responseData.Policy = policy;\n  }\n\n  const homeDirectoryDetails = lookup(secretDict, 'HomeDirectoryDetails', inputProtocol);\n  if (homeDirectoryDetails) {\n    console.log('HomeDirectoryDetails found - Applying setting for virtual folders - Note: Cannot be used in conjunction with key: HomeDirectory');\n    responseData.HomeDirectoryDetails = homeDirectoryDetails;\n    console.log('Setting HomeDirectoryType to LOGICAL');\n    responseData.HomeDirectoryType = 'LOGICAL';\n  }\n\n  const homeDirectory = lookup(secretDict, 'HomeDirectory', inputProtocol);\n  if (homeDirectory) {\n    console.log('HomeDirectory found - Note: Cannot be used in conjunction with key: HomeDirectoryDetails');\n    responseData.HomeDirectory = homeDirectory;\n  }\n\n  if (authType === 'SSH') {\n    const publicKey = lookup(secretDict, 'PublicKey', inputProtocol);\n    if (publicKey) {\n      responseData.PublicKeys = [publicKey];\n    } else {\n      console.log('Unable to authenticate user - No public keys found');\n      return {};\n    }\n  }\n\n  return responseData;\n};\n\nconst getSecret = async (id: string): Promise<string | null> => {\n  console.log(`Secret Name: ${id}`);\n\n  const client = new SecretsManagerClient({\n    region: 'ap-northeast-1',\n  });\n  const command = new GetSecretValueCommand({ SecretId: id });\n\n  try {\n    const data: GetSecretValueCommandOutput = await client.send(command);\n    console.log(data);\n    if (data.SecretString) {\n      return data.SecretString;\n    }\n    if (data.SecretBinary) {\n      return new TextDecoder().decode(data.SecretBinary);\n    }\n    return null;\n  } catch (error) {\n    console.log('Not found Secret');\n    console.log(`Error: ${JSON.stringify(error)}`);\n    return null;\n  }\n  //const resp = await client.send(command);\n//  return client.send(command)\n//    .then((data: GetSecretValueCommandOutput) => {\n//      if (data?.SecretString) {\n//        return data.SecretString;\n//      }\n//      if (data?.SecretBinary) {\n//        return new TextDecoder().decode(data.SecretBinary);\n//      }\n//      return null;\n//    })\n//    .catch((error: Error) => {\n//      console.log('Not found Secret');\n//      console.log(`Error:${JSON.stringify(error)}`);\n//      return null;\n//    });\n//  console.log(resp);\n//  if (resp.SecretString) {\n//    console.log('Found Secret String');\n//    return resp.SecretString;\n//  } else {\n//    if (resp.SecretBinary) {\n//      console.log('Found Binary Secret');\n//      //return Buffer.from(resp.SecretBinary as string, 'base64').toString('ascii');\n//      return new TextDecoder().decode(resp.SecretBinary);\n//    }\n//  }\n//\n//  console.log('Not found Secret');\n//  return null;\n};\n\nconst ipToBigInt = (address: string) => {\n  if (address.includes(':')) {\n    // IPv6\n    let parts = address.split(':').map(part => part === '' ? '0' : part);\n    let bigInt = BigInt(0);\n    for (let i = 0; i < parts.length; i++) {\n      bigInt = bigInt * BigInt(0x10000) + BigInt(parseInt(parts[i], 16));\n    }\n    return bigInt;\n  } else {\n    // IPv4\n    let parts = address.split('.').map(part => parseInt(part, 10));\n    let bigInt = BigInt(0);\n    for (let i = 0; i < parts.length; i++) {\n      bigInt = bigInt * BigInt(256) + BigInt(parts[i]);\n    }\n    return bigInt;\n  }\n};\n\nconst getSubnetMask = (bits: number, isIPv6 = false) => {\n  let mask = BigInt(0);\n  const totalBits = isIPv6 ? 128 : 32;\n  for (let i = 0; i < bits; i++) {\n    mask = mask * BigInt(2) + BigInt(1);\n  }\n  for (let i = bits; i < totalBits; i++) {\n    mask = mask * BigInt(2);\n  }\n  return mask;\n};\n\nconst isIpInCidr = (address: string, cidr: string) => {\n  const [network, bits] = cidr.split('/');\n  const isIPv6 = network.includes(':');\n  const ipBigInt = ipToBigInt(address);\n  const networkBigInt = ipToBigInt(network);\n  const mask = getSubnetMask(parseInt(bits), isIPv6);\n\n  const maskedIp = ipBigInt - (ipBigInt % (mask + BigInt(1)));\n  const maskedNetwork = networkBigInt - (networkBigInt % (mask + BigInt(1)));\n\n  return maskedIp === maskedNetwork;\n};"]}
201
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"transfer-user-authentication.lambda.js","sourceRoot":"","sources":["../../src/funcs/transfer-user-authentication.lambda.ts"],"names":[],"mappings":";;;AAAA,4EAA2H;AAG3H,MAAa,qBAAsB,SAAQ,KAAK;IAC9C;QACE,KAAK,CAAC,8BAA8B,CAAC,CAAC;QACtC,IAAI,CAAC,IAAI,GAAG,uBAAuB,CAAC;IACtC,CAAC;CACF;AALD,sDAKC;AAMM,MAAM,OAAO,GAAG,KAAK,EAAE,KAAoC,EAA2C,EAAE;IAC7G,MAAM,iBAAiB,GAAG,CAAC,UAAU,EAAE,UAAU,EAAE,UAAU,EAAE,UAAU,CAAC,CAAC;IAC3E,KAAK,MAAM,SAAS,IAAI,iBAAiB,EAAE,CAAC;QAC1C,IAAI,CAAC,KAAK,CAAC,cAAc,CAAC,SAAS,CAAC,EAAE,CAAC;YACrC,OAAO,CAAC,GAAG,CAAC,YAAY,SAAS,uBAAuB,CAAC,CAAC;YAC1D,OAAO,EAAE,CAAC;QACZ,CAAC;IACH,CAAC;IAED,MAAM,aAAa,GAAG,KAAK,CAAC,QAAQ,CAAC;IACrC,MAAM,aAAa,GAAG,KAAK,CAAC,QAAQ,CAAC;IACrC,MAAM,aAAa,GAAG,KAAK,CAAC,QAAQ,CAAC;IACrC,MAAM,aAAa,GAAG,KAAK,CAAC,QAAQ,CAAC;IACrC,MAAM,aAAa,GAAG,KAAK,CAAC,QAAQ,IAAI,EAAE,CAAC;IAE3C,OAAO,CAAC,GAAG,CAAC,aAAa,aAAa,eAAe,aAAa,eAAe,aAAa,eAAe,aAAa,EAAE,CAAC,CAAC;IAE9H,OAAO,CAAC,GAAG,CAAC,gCAAgC,CAAC,CAAC;IAC9C,IAAI,kBAAkB,GAAG,EAAE,CAAC;IAC5B,IAAI,aAAa,KAAK,EAAE,EAAE,CAAC;QACzB,OAAO,CAAC,GAAG,CAAC,+BAA+B,CAAC,CAAC;QAC7C,kBAAkB,GAAG,UAAU,CAAC;IAClC,CAAC;SAAM,CAAC;QACN,IAAI,aAAa,KAAK,KAAK,IAAI,aAAa,KAAK,MAAM,EAAE,CAAC;YACxD,OAAO,CAAC,GAAG,CAAC,sCAAsC,CAAC,CAAC;YACpD,OAAO,EAAE,CAAC;QACZ,CAAC;QACD,OAAO,CAAC,GAAG,CAAC,0BAA0B,CAAC,CAAC;QACxC,kBAAkB,GAAG,WAAW,CAAC;IACnC,CAAC;IAED,MAAM,MAAM,GAAG,MAAM,SAAS,CAAC,iBAAiB,aAAa,IAAI,aAAa,EAAE,CAAC,CAAC;IAElF,IAAI,MAAM,EAAE,CAAC;QACX,MAAM,UAAU,GAAG,IAAI,CAAC,KAAK,CAAC,MAAM,CAAe,CAAC;QACpD,MAAM,iBAAiB,GAAG,CAAC,GAAG,EAAE;YAC9B,IAAI,kBAAkB,KAAK,WAAW,EAAE,CAAC;gBACvC,OAAO,CAAC,GAAG,CAAC,0CAA0C,CAAC,CAAC;gBACxD,OAAO,IAAI,CAAC;YACd,CAAC;YACD,OAAO,wBAAwB,CAAC,UAAU,EAAE,aAAa,EAAE,aAAa,CAAC,CAAC;QAC5E,CAAC,CAAC,EAAE,CAAC;QACL,MAAM,OAAO,GAAG,cAAc,CAAC,UAAU,EAAE,aAAa,EAAE,aAAa,CAAC,CAAC;QAEzE,IAAI,iBAAiB,IAAI,OAAO,EAAE,CAAC;YACjC,OAAO,CAAC,GAAG,CAAC,mDAAmD,kBAAkB,EAAE,CAAC,CAAC;YACrF,OAAO,aAAa,CAAC,UAAU,EAAE,kBAAkB,EAAE,aAAa,CAAC,CAAC;QACtE,CAAC;aAAM,CAAC;YACN,OAAO,CAAC,GAAG,CAAC,kDAAkD,CAAC,CAAC;YAChE,OAAO,EAAE,CAAC;QACZ,CAAC;IACH,CAAC;SAAM,CAAC;QACN,OAAO,CAAC,GAAG,CAAC,6DAA6D,CAAC,CAAC;QAC3E,OAAO,EAAE,CAAC;IACZ,CAAC;AACH,CAAC,CAAC;AAvDW,QAAA,OAAO,WAuDlB;AAEF,MAAM,MAAM,GAAG,CAAC,UAAsB,EAAE,GAAW,EAAE,aAAqB,EAAiB,EAAE;IAC3F,IAAI,UAAU,CAAC,GAAG,aAAa,GAAG,GAAG,EAAE,CAAC,EAAE,CAAC;QACzC,OAAO,CAAC,GAAG,CAAC,4BAA4B,GAAG,EAAE,CAAC,CAAC;QAC/C,OAAO,UAAU,CAAC,GAAG,aAAa,GAAG,GAAG,EAAE,CAAC,CAAC;IAC9C,CAAC;SAAM,CAAC;QACN,OAAO,UAAU,CAAC,GAAG,CAAC,IAAI,IAAI,CAAC;IACjC,CAAC;AACH,CAAC,CAAC;AAEF,MAAM,cAAc,GAAG,CAAC,UAAsB,EAAE,aAAqB,EAAE,aAAqB,EAAW,EAAE;IACvG,MAAM,kBAAkB,GAAG,MAAM,CAAC,UAAU,EAAE,oBAAoB,EAAE,aAAa,CAAC,CAAC;IACnF,OAAO,CAAC,GAAG,CAAC,uBAAuB,kBAAkB,EAAE,CAAC,CAAC;IACzD,IAAI,CAAC,kBAAkB,EAAE,CAAC;QACxB,OAAO,CAAC,GAAG,CAAC,6GAA6G,CAAC,CAAC;QAC3H,OAAO,KAAK,CAAC;IACf,CAAC;IAED,KAAK,MAAM,IAAI,IAAI,kBAAkB,CAAC,KAAK,CAAC,GAAG,CAAC,EAAE,CAAC;QACjD,IAAI,UAAU,CAAC,aAAa,EAAE,IAAI,CAAC,EAAE,CAAC;YACpC,OAAO,CAAC,GAAG,CAAC,yBAAyB,CAAC,CAAC;YACvC,OAAO,IAAI,CAAC;QACd,CAAC;IACH,CAAC;IAED,OAAO,CAAC,GAAG,CAAC,gCAAgC,CAAC,CAAC;IAC9C,OAAO,KAAK,CAAC;AACf,CAAC,CAAC;AAEF,MAAM,wBAAwB,GAAG,CAAC,UAAsB,EAAE,aAAqB,EAAE,aAAqB,EAAW,EAAE;IACjH,MAAM,QAAQ,GAAG,MAAM,CAAC,UAAU,EAAE,UAAU,EAAE,aAAa,CAAC,CAAC;IAC/D,IAAI,CAAC,QAAQ,EAAE,CAAC;QACd,OAAO,CAAC,GAAG,CAAC,qEAAqE,CAAC,CAAC;QACnF,OAAO,KAAK,CAAC;IACf,CAAC;IAED,IAAI,aAAa,KAAK,QAAQ,EAAE,CAAC;QAC/B,OAAO,IAAI,CAAC;IACd,CAAC;SAAM,CAAC;QACN,OAAO,CAAC,GAAG,CAAC,uEAAuE,CAAC,CAAC;QACrF,OAAO,KAAK,CAAC;IACf,CAAC;AACH,CAAC,CAAC;AAEF,MAAM,aAAa,GAAG,CAAC,UAAsB,EAAE,QAAgB,EAAE,aAAqB,EAAkC,EAAE;IACxH,MAAM,YAAY,GAAmC,EAAE,CAAC;IAExD,MAAM,IAAI,GAAG,MAAM,CAAC,UAAU,EAAE,MAAM,EAAE,aAAa,CAAC,CAAC;IACvD,IAAI,IAAI,EAAE,CAAC;QACT,YAAY,CAAC,IAAI,GAAG,IAAI,CAAC;IAC3B,CAAC;SAAM,CAAC;QACN,OAAO,CAAC,GAAG,CAAC,wDAAwD,CAAC,CAAC;QACtE,YAAY,CAAC,IAAI,GAAG,EAAE,CAAC;IACzB,CAAC;IAED,MAAM,MAAM,GAAG,MAAM,CAAC,UAAU,EAAE,QAAQ,EAAE,aAAa,CAAC,CAAC;IAC3D,IAAI,MAAM,EAAE,CAAC;QACX,YAAY,CAAC,MAAM,GAAG,MAAM,CAAC;IAC/B,CAAC;IAED,MAAM,oBAAoB,GAAG,MAAM,CAAC,UAAU,EAAE,sBAAsB,EAAE,aAAa,CAAC,CAAC;IACvF,IAAI,oBAAoB,EAAE,CAAC;QACzB,OAAO,CAAC,GAAG,CAAC,iIAAiI,CAAC,CAAC;QAC/I,YAAY,CAAC,oBAAoB,GAAG,oBAAoB,CAAC;QACzD,OAAO,CAAC,GAAG,CAAC,sCAAsC,CAAC,CAAC;QACpD,YAAY,CAAC,iBAAiB,GAAG,SAAS,CAAC;IAC7C,CAAC;IAED,MAAM,aAAa,GAAG,MAAM,CAAC,UAAU,EAAE,eAAe,EAAE,aAAa,CAAC,CAAC;IACzE,IAAI,aAAa,EAAE,CAAC;QAClB,OAAO,CAAC,GAAG,CAAC,0FAA0F,CAAC,CAAC;QACxG,YAAY,CAAC,aAAa,GAAG,aAAa,CAAC;IAC7C,CAAC;IAED,IAAI,QAAQ,KAAK,WAAW,EAAE,CAAC;QAC7B,MAAM,SAAS,GAAG,MAAM,CAAC,UAAU,EAAE,WAAW,EAAE,aAAa,CAAC,CAAC;QACjE,IAAI,SAAS,EAAE,CAAC;YACd,YAAY,CAAC,UAAU,GAAG,CAAC,SAAS,CAAC,CAAC;QACxC,CAAC;aAAM,CAAC;YACN,OAAO,CAAC,GAAG,CAAC,oDAAoD,CAAC,CAAC;YAClE,OAAO,EAAE,CAAC;QACZ,CAAC;IACH,CAAC;IAED,OAAO,YAAY,CAAC;AACtB,CAAC,CAAC;AAEF,MAAM,SAAS,GAAG,KAAK,EAAE,EAAU,EAA0B,EAAE;IAC7D,OAAO,CAAC,GAAG,CAAC,gBAAgB,EAAE,EAAE,CAAC,CAAC;IAElC,MAAM,MAAM,GAAG,IAAI,6CAAoB,CAAC;QACtC,MAAM,EAAE,gBAAgB;KACzB,CAAC,CAAC;IAEH,OAAO,MAAM,CAAC,IAAI,CAAC,IAAI,8CAAqB,CAAC,EAAE,QAAQ,EAAE,EAAE,EAAE,CAAC,CAAC;SAC5D,IAAI,CAAC,CAAC,IAAiC,EAAE,EAAE;QAC1C,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,OAAO,CAAC,GAAG,CAAC,wBAAwB,CAAC,CAAC;YACtC,OAAO,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;QAC1D,CAAC;QACD,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC;YACtB,OAAO,CAAC,GAAG,CAAC,wBAAwB,CAAC,CAAC;YACtC,OAAO,IAAI,CAAC,YAAY,CAAC;QAC3B,CAAC;QACD,MAAM,IAAI,qBAAqB,EAAE,CAAC;IACpC,CAAC,CAAC;SACD,KAAK,CAAC,CAAC,KAAY,EAAE,EAAE;QACtB,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;QAC5B,OAAO,IAAI,CAAC;IACd,CAAC,CAAC,CAAC;AACP,CAAC,CAAC;AAEF,MAAM,UAAU,GAAG,CAAC,OAAe,EAAE,EAAE;IACrC,IAAI,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;QAC1B,OAAO;QACP,IAAI,KAAK,GAAG,OAAO,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC,IAAI,KAAK,EAAE,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC;QACrE,IAAI,MAAM,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;QACvB,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,KAAK,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACtC,MAAM,GAAG,MAAM,GAAG,MAAM,CAAC,OAAO,CAAC,GAAG,MAAM,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC;QACrE,CAAC;QACD,OAAO,MAAM,CAAC;IAChB,CAAC;SAAM,CAAC;QACN,OAAO;QACP,IAAI,KAAK,GAAG,OAAO,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC,QAAQ,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC,CAAC;QAC/D,IAAI,MAAM,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;QACvB,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,KAAK,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACtC,MAAM,GAAG,MAAM,GAAG,MAAM,CAAC,GAAG,CAAC,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC;QACnD,CAAC;QACD,OAAO,MAAM,CAAC;IAChB,CAAC;AACH,CAAC,CAAC;AAEF,MAAM,cAAc,GAAG,CAAC,IAAY,EAAkC,EAAE;IACtE,MAAM,CAAC,OAAO,EAAE,IAAI,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;IACxC,MAAM,MAAM,GAAG,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC;IACrC,MAAM,SAAS,GAAG,MAAM,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC;IACpC,MAAM,aAAa,GAAG,UAAU,CAAC,OAAO,CAAC,CAAC;IAC1C,MAAM,QAAQ,GAAG,SAAS,GAAG,QAAQ,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;IAChD,MAAM,UAAU,GAAG,MAAM,CAAC,CAAC,CAAC,IAAI,MAAM,CAAC,QAAQ,CAAC,CAAC;IAEjD,MAAM,KAAK,GAAG,aAAa,GAAG,CAAC,aAAa,GAAG,UAAU,CAAC,CAAC;IAC3D,MAAM,GAAG,GAAG,KAAK,GAAG,UAAU,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;IAE3C,OAAO,EAAE,KAAK,EAAE,GAAG,EAAE,CAAC;AACxB,CAAC,CAAC;AAEF,MAAM,UAAU,GAAG,CAAC,MAAc,EAAE,IAAY,EAAE,EAAE;IAClD,MAAM,QAAQ,GAAG,UAAU,CAAC,MAAM,CAAC,CAAC;IACpC,MAAM,EAAE,KAAK,EAAE,GAAG,EAAE,GAAG,cAAc,CAAC,IAAI,CAAC,CAAC;IAC5C,OAAO,QAAQ,IAAI,KAAK,IAAI,QAAQ,IAAI,GAAG,CAAC;AAC9C,CAAC,CAAC","sourcesContent":["import { SecretsManagerClient, GetSecretValueCommand, GetSecretValueCommandOutput } from '@aws-sdk/client-secrets-manager';\nimport { TransferFamilyAuthorizerEvent, TransferFamilyAuthorizerResult } from 'aws-lambda';\n\nexport class EmptySecretValueError extends Error {\n  constructor() {\n    super('Got a secret value is empty.');\n    this.name = 'EmptySecretValueError';\n  }\n}\n\ninterface SecretDict {\n  [key: string]: string;\n}\n\nexport const handler = async (event: TransferFamilyAuthorizerEvent): Promise<TransferFamilyAuthorizerResult> => {\n  const requiredParamList = ['serverId', 'username', 'protocol', 'sourceIp'];\n  for (const parameter of requiredParamList) {\n    if (!event.hasOwnProperty(parameter)) {\n      console.log(`Incoming ${parameter} missing - Unexpected`);\n      return {};\n    }\n  }\n\n  const inputServerId = event.serverId;\n  const inputUsername = event.username;\n  const inputProtocol = event.protocol;\n  const inputSourceIp = event.sourceIp;\n  const inputPassword = event.password || '';\n\n  console.log(`ServerId: ${inputServerId}, Username: ${inputUsername}, Protocol: ${inputProtocol}, SourceIp: ${inputSourceIp}`);\n\n  console.log('Start User Authentication Flow');\n  let authenticationType = '';\n  if (inputPassword !== '') {\n    console.log('Using PASSWORD authentication');\n    authenticationType = 'PASSWORD';\n  } else {\n    if (inputProtocol === 'FTP' || inputProtocol === 'FTPS') {\n      console.log('Empty password not allowed for FTP/S');\n      return {};\n    }\n    console.log('Using SSH authentication');\n    authenticationType = 'SSHPubKey';\n  }\n\n  const secret = await getSecret(`transfer-user/${inputServerId}/${inputUsername}`);\n\n  if (secret) {\n    const secretDict = JSON.parse(secret) as SecretDict;\n    const userAuthenticated = (() => {\n      if (authenticationType === 'SSHPubKey') {\n        console.log('Skip password check as SSH login request');\n        return true;\n      }\n      return authenticatePasswordUser(secretDict, inputPassword, inputProtocol);\n    })();\n    const ipMatch = checkIpAddress(secretDict, inputSourceIp, inputProtocol);\n\n    if (userAuthenticated && ipMatch) {\n      console.log(`User authenticated, calling buildResponse with: ${authenticationType}`);\n      return buildResponse(secretDict, authenticationType, inputProtocol);\n    } else {\n      console.log('User failed authentication return empty response');\n      return {};\n    }\n  } else {\n    console.log('Secrets Manager exception thrown - Returning empty response');\n    return {};\n  }\n};\n\nconst lookup = (secretDict: SecretDict, key: string, inputProtocol: string): string | null => {\n  if (secretDict[`${inputProtocol}${key}`]) {\n    console.log(`Found protocol-specified ${key}`);\n    return secretDict[`${inputProtocol}${key}`];\n  } else {\n    return secretDict[key] || null;\n  }\n};\n\nconst checkIpAddress = (secretDict: SecretDict, inputSourceIp: string, inputProtocol: string): boolean => {\n  const acceptedIpNetworks = lookup(secretDict, 'AcceptedIpNetworks', inputProtocol);\n  console.log(`AcceptedIpNetworks: ${acceptedIpNetworks}`);\n  if (!acceptedIpNetworks) {\n    console.log('Unable to authenticate user - No filed match in Secret for AcceptedIpNetworks(CIDR format, comma-separated)');\n    return false;\n  }\n\n  for (const cidr of acceptedIpNetworks.split(',')) {\n    if (isIpInCidr(inputSourceIp, cidr)) {\n      console.log('Source IP address match');\n      return true;\n    }\n  }\n\n  console.log('Source IP address not in range');\n  return false;\n};\n\nconst authenticatePasswordUser = (secretDict: SecretDict, inputPassword: string, inputProtocol: string): boolean => {\n  const password = lookup(secretDict, 'Password', inputProtocol);\n  if (!password) {\n    console.log('Unable to authenticate user - No field match in Secret for password');\n    return false;\n  }\n\n  if (inputPassword === password) {\n    return true;\n  } else {\n    console.log('Unable to authenticate user - Incoming password does not match stored');\n    return false;\n  }\n};\n\nconst buildResponse = (secretDict: SecretDict, authType: string, inputProtocol: string): TransferFamilyAuthorizerResult => {\n  const responseData: TransferFamilyAuthorizerResult = {};\n\n  const role = lookup(secretDict, 'Role', inputProtocol);\n  if (role) {\n    responseData.Role = role;\n  } else {\n    console.log('No field match for role - Set empty string in response');\n    responseData.Role = '';\n  }\n\n  const policy = lookup(secretDict, 'Policy', inputProtocol);\n  if (policy) {\n    responseData.Policy = policy;\n  }\n\n  const homeDirectoryDetails = lookup(secretDict, 'HomeDirectoryDetails', inputProtocol);\n  if (homeDirectoryDetails) {\n    console.log('HomeDirectoryDetails found - Applying setting for virtual folders - Note: Cannot be used in conjunction with key: HomeDirectory');\n    responseData.HomeDirectoryDetails = homeDirectoryDetails;\n    console.log('Setting HomeDirectoryType to LOGICAL');\n    responseData.HomeDirectoryType = 'LOGICAL';\n  }\n\n  const homeDirectory = lookup(secretDict, 'HomeDirectory', inputProtocol);\n  if (homeDirectory) {\n    console.log('HomeDirectory found - Note: Cannot be used in conjunction with key: HomeDirectoryDetails');\n    responseData.HomeDirectory = homeDirectory;\n  }\n\n  if (authType === 'SSHPubKey') {\n    const publicKey = lookup(secretDict, 'PublicKey', inputProtocol);\n    if (publicKey) {\n      responseData.PublicKeys = [publicKey];\n    } else {\n      console.log('Unable to authenticate user - No public keys found');\n      return {};\n    }\n  }\n\n  return responseData;\n};\n\nconst getSecret = async (id: string): Promise<string | null> => {\n  console.log(`Secret Name: ${id}`);\n\n  const client = new SecretsManagerClient({\n    region: 'ap-northeast-1',\n  });\n\n  return client.send(new GetSecretValueCommand({ SecretId: id }))\n    .then((data: GetSecretValueCommandOutput) => {\n      if (data.SecretBinary) {\n        console.log('Got SecretBinary value');\n        return Buffer.from(data.SecretBinary).toString('utf-8');\n      }\n      if (data.SecretString) {\n        console.log('Got SecretString value');\n        return data.SecretString;\n      }\n      throw new EmptySecretValueError();\n    })\n    .catch((error: Error) => {\n      console.warn(error.message);\n      return null;\n    });\n};\n\nconst ipToBigInt = (address: string) => {\n  if (address.includes(':')) {\n    // IPv6\n    let parts = address.split(':').map(part => part === '' ? '0' : part);\n    let bigInt = BigInt(0);\n    for (let i = 0; i < parts.length; i++) {\n      bigInt = bigInt * BigInt(0x10000) + BigInt(parseInt(parts[i], 16));\n    }\n    return bigInt;\n  } else {\n    // IPv4\n    let parts = address.split('.').map(part => parseInt(part, 10));\n    let bigInt = BigInt(0);\n    for (let i = 0; i < parts.length; i++) {\n      bigInt = bigInt * BigInt(256) + BigInt(parts[i]);\n    }\n    return bigInt;\n  }\n};\n\nconst getSubnetRange = (cidr: string): { start: bigint; end: bigint } => {\n  const [network, bits] = cidr.split('/');\n  const isIPv6 = network.includes(':');\n  const totalBits = isIPv6 ? 128 : 32;\n  const networkBigInt = ipToBigInt(network);\n  const hostBits = totalBits - parseInt(bits, 10);\n  const subnetSize = BigInt(2) ** BigInt(hostBits);\n\n  const start = networkBigInt - (networkBigInt % subnetSize);\n  const end = start + subnetSize - BigInt(1);\n\n  return { start, end };\n};\n\nconst isIpInCidr = (ipAddr: string, cidr: string) => {\n  const ipBigInt = ipToBigInt(ipAddr);\n  const { start, end } = getSubnetRange(cidr);\n  return ipBigInt >= start && ipBigInt <= end;\n};"]}
package/lib/index.js CHANGED
@@ -45,5 +45,5 @@ class TransferCustomLambdaIdentityProvider extends constructs_1.Construct {
45
45
  }
46
46
  exports.TransferCustomLambdaIdentityProvider = TransferCustomLambdaIdentityProvider;
47
47
  _a = JSII_RTTI_SYMBOL_1;
48
- TransferCustomLambdaIdentityProvider[_a] = { fqn: "@gammarers/aws-transfer-custom-lambda-identity-provider.TransferCustomLambdaIdentityProvider", version: "1.0.2" };
48
+ TransferCustomLambdaIdentityProvider[_a] = { fqn: "@gammarers/aws-transfer-custom-lambda-identity-provider.TransferCustomLambdaIdentityProvider", version: "1.1.0" };
49
49
  //# sourceMappingURL=data:application/json;base64,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
package/package.json CHANGED
@@ -85,7 +85,7 @@
85
85
  "publishConfig": {
86
86
  "access": "public"
87
87
  },
88
- "version": "1.0.2",
88
+ "version": "1.1.0",
89
89
  "jest": {
90
90
  "coverageProvider": "v8",
91
91
  "snapshotSerializers": [