@liflig/cdk 2.18.4 → 2.18.6
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/assets/cloudtrail-slack-integration-lambda/main.py +267 -0
- package/assets/pipeline-slack-notification-lambda/index.py +300 -0
- package/assets/prepare-cdk-source-lambda/index.py +159 -0
- package/assets/slack-alarm-lambda/index.py +103 -0
- package/lib/alarms/database-alarms.d.ts +125 -0
- package/lib/alarms/database-alarms.js +171 -0
- package/lib/alarms/index.d.ts +3 -0
- package/lib/alarms/index.js +10 -0
- package/lib/alarms/service-alarms.d.ts +145 -0
- package/lib/alarms/service-alarms.js +148 -0
- package/lib/alarms/ses-alarms.d.ts +67 -0
- package/lib/alarms/ses-alarms.js +49 -0
- package/lib/alarms/slack-alarm.d.ts +25 -0
- package/lib/alarms/slack-alarm.js +47 -0
- package/lib/bastion-host.d.ts +41 -0
- package/lib/bastion-host.js +86 -0
- package/lib/bin/cdk-create-snapshots.d.ts +2 -0
- package/lib/bin/fetch-pipeline-variables.d.ts +2 -0
- package/lib/build-artifacts/index.d.ts +68 -0
- package/lib/build-artifacts/index.js +118 -0
- package/lib/cdk-deploy/cdk-deploy.d.ts +63 -0
- package/lib/cdk-deploy/cdk-deploy.js +175 -0
- package/lib/cdk-deploy/index.d.ts +1 -0
- package/lib/cdk-deploy/index.js +6 -0
- package/lib/cdk-deploy/start-deploy-handler.d.ts +8 -0
- package/lib/cdk-deploy/start-deploy-handler.js +72 -0
- package/lib/cdk-deploy/status-handler.d.ts +6 -0
- package/lib/cdk-deploy/status-handler.js +83 -0
- package/lib/cdk-pipelines/cloud-assembly-lookup-handler.d.ts +6 -0
- package/lib/cdk-pipelines/cloud-assembly-lookup-handler.js +63 -0
- package/lib/cdk-pipelines/index.d.ts +3 -0
- package/lib/cdk-pipelines/index.js +10 -0
- package/lib/cdk-pipelines/liflig-cdk-pipeline.d.ts +110 -0
- package/lib/cdk-pipelines/liflig-cdk-pipeline.js +232 -0
- package/lib/cdk-pipelines/slack-notification.d.ts +51 -0
- package/lib/cdk-pipelines/slack-notification.js +54 -0
- package/lib/cdk-pipelines/variables.d.ts +15 -0
- package/lib/cdk-pipelines/variables.js +80 -0
- package/lib/cloudtrail-slack-integration/cloudtrail-slack-integration.d.ts +47 -0
- package/lib/cloudtrail-slack-integration/cloudtrail-slack-integration.js +211 -0
- package/lib/cloudtrail-slack-integration/index.d.ts +1 -0
- package/lib/cloudtrail-slack-integration/index.js +6 -0
- package/lib/configure-parameters/configure-parameters.d.ts +61 -0
- package/lib/configure-parameters/configure-parameters.js +94 -0
- package/lib/configure-parameters/index.d.ts +1 -0
- package/lib/configure-parameters/index.js +6 -0
- package/lib/cross-region-ssm-parameter.d.ts +13 -0
- package/lib/cross-region-ssm-parameter.js +46 -0
- package/lib/ecs/cluster.d.ts +25 -0
- package/lib/ecs/cluster.js +70 -0
- package/lib/ecs/fargate-service.d.ts +63 -0
- package/lib/ecs/fargate-service.js +98 -0
- package/lib/ecs/index.d.ts +3 -0
- package/lib/ecs/index.js +10 -0
- package/lib/ecs/listener-rule.d.ts +25 -0
- package/lib/ecs/listener-rule.js +27 -0
- package/lib/ecs-update-image/artifact-status.d.ts +39 -0
- package/lib/ecs-update-image/artifact-status.js +41 -0
- package/lib/ecs-update-image/ecs-update-image.d.ts +41 -0
- package/lib/ecs-update-image/ecs-update-image.js +98 -0
- package/lib/ecs-update-image/index.d.ts +3 -0
- package/lib/ecs-update-image/index.js +10 -0
- package/lib/ecs-update-image/start-deploy-handler.d.ts +6 -0
- package/lib/ecs-update-image/start-deploy-handler.js +104 -0
- package/lib/ecs-update-image/status-handler.d.ts +11 -0
- package/lib/ecs-update-image/status-handler.js +74 -0
- package/lib/ecs-update-image/tag.d.ts +47 -0
- package/lib/ecs-update-image/tag.js +67 -0
- package/lib/feature-flags.d.ts +18 -0
- package/lib/feature-flags.js +48 -0
- package/lib/griid/artefact-bucket.d.ts +7 -0
- package/lib/griid/artefact-bucket.js +30 -0
- package/lib/griid/index.d.ts +4 -0
- package/lib/griid/index.js +18 -0
- package/lib/hosted-zone-with-param.d.ts +29 -0
- package/lib/hosted-zone-with-param.js +65 -0
- package/lib/index.d.ts +32 -0
- package/lib/kinesis/index.d.ts +1 -0
- package/lib/kinesis/index.js +6 -0
- package/lib/kinesis/kinesis-to-datadog-stream.d.ts +28 -0
- package/lib/kinesis/kinesis-to-datadog-stream.js +126 -0
- package/lib/load-balancer/index.d.ts +1 -0
- package/lib/load-balancer/index.js +6 -0
- package/lib/load-balancer/load-balancer.d.ts +16 -0
- package/lib/load-balancer/load-balancer.js +60 -0
- package/lib/pipelines/conventions.d.ts +14 -0
- package/lib/pipelines/conventions.js +24 -0
- package/lib/pipelines/deploy-env.d.ts +18 -0
- package/lib/pipelines/deploy-env.js +96 -0
- package/lib/pipelines/index.d.ts +2 -0
- package/lib/pipelines/index.js +8 -0
- package/lib/pipelines/liflig-cdk-deployer-deps.d.ts +13 -0
- package/lib/pipelines/liflig-cdk-deployer-deps.js +35 -0
- package/lib/pipelines/pipeline.d.ts +78 -0
- package/lib/pipelines/pipeline.js +224 -0
- package/lib/platform/index.d.ts +1 -0
- package/lib/platform/index.js +7 -0
- package/lib/platform/platform.d.ts +37 -0
- package/lib/platform/platform.js +57 -0
- package/lib/rds/database.d.ts +49 -0
- package/lib/rds/database.js +60 -0
- package/lib/rds/index.d.ts +1 -0
- package/lib/rds/index.js +6 -0
- package/lib/ses/configurationsetdeliveryoptions/index.d.ts +26 -0
- package/lib/ses/configurationsetdeliveryoptions/index.js +48 -0
- package/lib/ses/configurationsetsnsdestination/handler.d.ts +17 -0
- package/lib/ses/configurationsetsnsdestination/handler.js +75 -0
- package/lib/ses/configurationsetsnsdestination/index.d.ts +29 -0
- package/lib/ses/configurationsetsnsdestination/index.js +75 -0
- package/lib/ses/index.d.ts +4 -0
- package/lib/ses/index.js +12 -0
- package/lib/ses/sesdomain/handler.d.ts +10 -0
- package/lib/ses/sesdomain/handler.js +82 -0
- package/lib/ses/sesdomain/index.d.ts +57 -0
- package/lib/ses/sesdomain/index.js +94 -0
- package/lib/ses/sesverifyemail/handler.d.ts +9 -0
- package/lib/ses/sesverifyemail/handler.js +25 -0
- package/lib/ses/sesverifyemail/index.d.ts +13 -0
- package/lib/ses/sesverifyemail/index.js +51 -0
- package/lib/snapshots.d.ts +4 -0
- package/lib/snapshots.js +214 -0
- package/lib/ssm-parameter-backed-resource.d.ts +45 -0
- package/lib/ssm-parameter-backed-resource.js +67 -0
- package/lib/ssm-parameter-reader.d.ts +21 -0
- package/lib/ssm-parameter-reader.js +48 -0
- package/lib/tags.d.ts +8 -0
- package/lib/tags.js +36 -0
- package/lib/utils.d.ts +2 -0
- package/lib/utils.js +17 -0
- package/lib/webapp/index.d.ts +3 -0
- package/lib/webapp/index.js +10 -0
- package/lib/webapp/monitor.d.ts +187 -0
- package/lib/webapp/monitor.js +156 -0
- package/lib/webapp/security-headers.d.ts +38 -0
- package/lib/webapp/security-headers.js +129 -0
- package/lib/webapp/webapp.d.ts +116 -0
- package/lib/webapp/webapp.js +118 -0
- package/lib/webapp-deploy-via-role.d.ts +25 -0
- package/lib/webapp-deploy-via-role.js +32 -0
- package/package.json +4 -3
|
@@ -0,0 +1,86 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.BastionHost = void 0;
|
|
4
|
+
const constructs = require("constructs");
|
|
5
|
+
const ec2 = require("aws-cdk-lib/aws-ec2");
|
|
6
|
+
const iam = require("aws-cdk-lib/aws-iam");
|
|
7
|
+
const cdk = require("aws-cdk-lib");
|
|
8
|
+
/**
|
|
9
|
+
* This creates a EC2 bastion host that can be used to connect
|
|
10
|
+
* to database instances and other internal resources.
|
|
11
|
+
*
|
|
12
|
+
* The instance is supposed to have no open ingress ports, and users
|
|
13
|
+
* are supposed to connect only through SSM Session Manager.
|
|
14
|
+
*
|
|
15
|
+
* The resources that the bastion host should be allowed to access
|
|
16
|
+
* must have the bastion host security group as allowed ingress.
|
|
17
|
+
*
|
|
18
|
+
* For more internal details, see
|
|
19
|
+
* https://confluence.capraconsulting.no/x/q8UBC
|
|
20
|
+
*/
|
|
21
|
+
class BastionHost extends constructs.Construct {
|
|
22
|
+
constructor(scope, id, props) {
|
|
23
|
+
var _a, _b;
|
|
24
|
+
super(scope, id);
|
|
25
|
+
const region = cdk.Stack.of(this).region;
|
|
26
|
+
this.securityGroup =
|
|
27
|
+
(_a = props.securityGroup) !== null && _a !== void 0 ? _a : new ec2.SecurityGroup(this, "SecurityGroup", {
|
|
28
|
+
vpc: props.vpc,
|
|
29
|
+
});
|
|
30
|
+
const instance = new ec2.Instance(this, "Instance", {
|
|
31
|
+
vpc: props.vpc,
|
|
32
|
+
vpcSubnets: (_b = props.subnetSelection) !== null && _b !== void 0 ? _b : {
|
|
33
|
+
subnetType: ec2.SubnetType.PUBLIC,
|
|
34
|
+
},
|
|
35
|
+
securityGroup: this.securityGroup,
|
|
36
|
+
instanceName: "Bastion",
|
|
37
|
+
instanceType: ec2.InstanceType.of(ec2.InstanceClass.T3, ec2.InstanceSize.NANO),
|
|
38
|
+
machineImage: ec2.MachineImage.latestAmazonLinux({
|
|
39
|
+
generation: ec2.AmazonLinuxGeneration.AMAZON_LINUX_2,
|
|
40
|
+
}),
|
|
41
|
+
});
|
|
42
|
+
instance.addUserData(`yum install -y https://amazon-ssm-${region}.s3.amazonaws.com/latest/linux_amd64/amazon-ssm-agent.rpm socat postgresql mariadb`);
|
|
43
|
+
// SSM support.
|
|
44
|
+
instance.addToRolePolicy(
|
|
45
|
+
// This mimics the AmazonEC2RoleforSSM policy
|
|
46
|
+
// while granting least privileges needed.
|
|
47
|
+
//
|
|
48
|
+
// The default AmazonEC2RoleforSSM policy gives read/write access
|
|
49
|
+
// to all objects in S3, all parameters in Parameter Store, amoung
|
|
50
|
+
// more. We primarily use the SSM agent for limited remote control,
|
|
51
|
+
// and the policy here covers that as the primary use case.
|
|
52
|
+
//
|
|
53
|
+
// See https://www.cflee.com/posts/aws-ssm-iam-policy-caveats/
|
|
54
|
+
// See also https://docs.aws.amazon.com/systems-manager/latest/userguide/setup-instance-profile.html
|
|
55
|
+
new iam.PolicyStatement({
|
|
56
|
+
actions: [
|
|
57
|
+
// https://docs.aws.amazon.com/systems-manager/latest/userguide/systems-manager-setting-up-messageAPIs.html
|
|
58
|
+
// https://docs.aws.amazon.com/IAM/latest/UserGuide/list_awssystemsmanager.html
|
|
59
|
+
"ssm:ListInstanceAssociations",
|
|
60
|
+
"ssm:UpdateInstanceInformation",
|
|
61
|
+
"ssm:GetDocument",
|
|
62
|
+
"ssm:PutInventory",
|
|
63
|
+
"ssm:UpdateInstanceAssociationStatus",
|
|
64
|
+
// https://docs.aws.amazon.com/systems-manager/latest/userguide/systems-manager-setting-up-messageAPIs.html
|
|
65
|
+
"ssmmessages:CreateControlChannel",
|
|
66
|
+
"ssmmessages:CreateDataChannel",
|
|
67
|
+
"ssmmessages:OpenControlChannel",
|
|
68
|
+
"ssmmessages:OpenDataChannel",
|
|
69
|
+
// https://docs.aws.amazon.com/IAM/latest/UserGuide/list_amazonmessagedeliveryservice.html
|
|
70
|
+
"ec2messages:AcknowledgeMessage",
|
|
71
|
+
"ec2messages:DeleteMessage",
|
|
72
|
+
"ec2messages:FailMessage",
|
|
73
|
+
"ec2messages:GetEndpoint",
|
|
74
|
+
"ec2messages:GetMessages",
|
|
75
|
+
"ec2messages:SendReply",
|
|
76
|
+
],
|
|
77
|
+
// Seems this is needed for the given actions.
|
|
78
|
+
resources: ["*"],
|
|
79
|
+
}));
|
|
80
|
+
new cdk.CfnOutput(this, "BastionInstanceId", {
|
|
81
|
+
value: instance.instanceId,
|
|
82
|
+
});
|
|
83
|
+
}
|
|
84
|
+
}
|
|
85
|
+
exports.BastionHost = BastionHost;
|
|
86
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"bastion-host.js","sourceRoot":"","sources":["../src/bastion-host.ts"],"names":[],"mappings":";;;AAAA,yCAAwC;AACxC,2CAA0C;AAC1C,2CAA0C;AAC1C,mCAAkC;AAwBlC;;;;;;;;;;;;GAYG;AACH,MAAa,WAAY,SAAQ,UAAU,CAAC,SAAS;IAGnD,YAAY,KAA2B,EAAE,EAAU,EAAE,KAAY;;QAC/D,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAA;QAEhB,MAAM,MAAM,GAAG,GAAG,CAAC,KAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,MAAM,CAAA;QAExC,IAAI,CAAC,aAAa;YAChB,MAAA,KAAK,CAAC,aAAa,mCACnB,IAAI,GAAG,CAAC,aAAa,CAAC,IAAI,EAAE,eAAe,EAAE;gBAC3C,GAAG,EAAE,KAAK,CAAC,GAAG;aACf,CAAC,CAAA;QAEJ,MAAM,QAAQ,GAAG,IAAI,GAAG,CAAC,QAAQ,CAAC,IAAI,EAAE,UAAU,EAAE;YAClD,GAAG,EAAE,KAAK,CAAC,GAAG;YACd,UAAU,EAAE,MAAA,KAAK,CAAC,eAAe,mCAAI;gBACnC,UAAU,EAAE,GAAG,CAAC,UAAU,CAAC,MAAM;aAClC;YACD,aAAa,EAAE,IAAI,CAAC,aAAa;YACjC,YAAY,EAAE,SAAS;YACvB,YAAY,EAAE,GAAG,CAAC,YAAY,CAAC,EAAE,CAC/B,GAAG,CAAC,aAAa,CAAC,EAAE,EACpB,GAAG,CAAC,YAAY,CAAC,IAAI,CACtB;YACD,YAAY,EAAE,GAAG,CAAC,YAAY,CAAC,iBAAiB,CAAC;gBAC/C,UAAU,EAAE,GAAG,CAAC,qBAAqB,CAAC,cAAc;aACrD,CAAC;SACH,CAAC,CAAA;QAEF,QAAQ,CAAC,WAAW,CAClB,qCAAqC,MAAM,oFAAoF,CAChI,CAAA;QAED,eAAe;QACf,QAAQ,CAAC,eAAe;QACtB,6CAA6C;QAC7C,0CAA0C;QAC1C,EAAE;QACF,iEAAiE;QACjE,kEAAkE;QAClE,mEAAmE;QACnE,2DAA2D;QAC3D,EAAE;QACF,8DAA8D;QAC9D,oGAAoG;QACpG,IAAI,GAAG,CAAC,eAAe,CAAC;YACtB,OAAO,EAAE;gBACP,2GAA2G;gBAC3G,+EAA+E;gBAC/E,8BAA8B;gBAC9B,+BAA+B;gBAC/B,iBAAiB;gBACjB,kBAAkB;gBAClB,qCAAqC;gBACrC,2GAA2G;gBAC3G,kCAAkC;gBAClC,+BAA+B;gBAC/B,gCAAgC;gBAChC,6BAA6B;gBAC7B,0FAA0F;gBAC1F,gCAAgC;gBAChC,2BAA2B;gBAC3B,yBAAyB;gBACzB,yBAAyB;gBACzB,yBAAyB;gBACzB,uBAAuB;aACxB;YACD,8CAA8C;YAC9C,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CACH,CAAA;QAED,IAAI,GAAG,CAAC,SAAS,CAAC,IAAI,EAAE,mBAAmB,EAAE;YAC3C,KAAK,EAAE,QAAQ,CAAC,UAAU;SAC3B,CAAC,CAAA;IACJ,CAAC;CACF;AA7ED,kCA6EC","sourcesContent":["import * as constructs from \"constructs\"\nimport * as ec2 from \"aws-cdk-lib/aws-ec2\"\nimport * as iam from \"aws-cdk-lib/aws-iam\"\nimport * as cdk from \"aws-cdk-lib\"\n\ninterface Props {\n  vpc: ec2.IVpc\n  /**\n   * The security group used for the EC2 instance.\n   *\n   * @default - a security group will be created\n   */\n  securityGroup?: ec2.ISecurityGroup\n  /**\n   * The subnets to place the bastion host.\n   *\n   * Note that if placed inside private subnet, the VPC must have\n   * VPC endpoints to access relevant AWS services for Systems Manager\n   * to work in order to be able to connect to the instance.\n   *\n   * See https://aws.amazon.com/premiumsupport/knowledge-center/ec2-systems-manager-vpc-endpoints/\n   *\n   * @default - public subnets\n   */\n  subnetSelection?: ec2.SubnetSelection\n}\n\n/**\n * This creates a EC2 bastion host that can be used to connect\n * to database instances and other internal resources.\n *\n * The instance is supposed to have no open ingress ports, and users\n * are supposed to connect only through SSM Session Manager.\n *\n * The resources that the bastion host should be allowed to access\n * must have the bastion host security group as allowed ingress.\n *\n * For more internal details, see\n * https://confluence.capraconsulting.no/x/q8UBC\n */\nexport class BastionHost extends constructs.Construct {\n  public readonly securityGroup: ec2.ISecurityGroup\n\n  constructor(scope: constructs.Construct, id: string, props: Props) {\n    super(scope, id)\n\n    const region = cdk.Stack.of(this).region\n\n    this.securityGroup =\n      props.securityGroup ??\n      new ec2.SecurityGroup(this, \"SecurityGroup\", {\n        vpc: props.vpc,\n      })\n\n    const instance = new ec2.Instance(this, \"Instance\", {\n      vpc: props.vpc,\n      vpcSubnets: props.subnetSelection ?? {\n        subnetType: ec2.SubnetType.PUBLIC,\n      },\n      securityGroup: this.securityGroup,\n      instanceName: \"Bastion\",\n      instanceType: ec2.InstanceType.of(\n        ec2.InstanceClass.T3,\n        ec2.InstanceSize.NANO,\n      ),\n      machineImage: ec2.MachineImage.latestAmazonLinux({\n        generation: ec2.AmazonLinuxGeneration.AMAZON_LINUX_2,\n      }),\n    })\n\n    instance.addUserData(\n      `yum install -y https://amazon-ssm-${region}.s3.amazonaws.com/latest/linux_amd64/amazon-ssm-agent.rpm socat postgresql mariadb`,\n    )\n\n    // SSM support.\n    instance.addToRolePolicy(\n      // This mimics the AmazonEC2RoleforSSM policy\n      // while granting least privileges needed.\n      //\n      // The default AmazonEC2RoleforSSM policy gives read/write access\n      // to all objects in S3, all parameters in Parameter Store, amoung\n      // more. We primarily use the SSM agent for limited remote control,\n      // and the policy here covers that as the primary use case.\n      //\n      // See https://www.cflee.com/posts/aws-ssm-iam-policy-caveats/\n      // See also https://docs.aws.amazon.com/systems-manager/latest/userguide/setup-instance-profile.html\n      new iam.PolicyStatement({\n        actions: [\n          // https://docs.aws.amazon.com/systems-manager/latest/userguide/systems-manager-setting-up-messageAPIs.html\n          // https://docs.aws.amazon.com/IAM/latest/UserGuide/list_awssystemsmanager.html\n          \"ssm:ListInstanceAssociations\",\n          \"ssm:UpdateInstanceInformation\",\n          \"ssm:GetDocument\",\n          \"ssm:PutInventory\",\n          \"ssm:UpdateInstanceAssociationStatus\",\n          // https://docs.aws.amazon.com/systems-manager/latest/userguide/systems-manager-setting-up-messageAPIs.html\n          \"ssmmessages:CreateControlChannel\",\n          \"ssmmessages:CreateDataChannel\",\n          \"ssmmessages:OpenControlChannel\",\n          \"ssmmessages:OpenDataChannel\",\n          // https://docs.aws.amazon.com/IAM/latest/UserGuide/list_amazonmessagedeliveryservice.html\n          \"ec2messages:AcknowledgeMessage\",\n          \"ec2messages:DeleteMessage\",\n          \"ec2messages:FailMessage\",\n          \"ec2messages:GetEndpoint\",\n          \"ec2messages:GetMessages\",\n          \"ec2messages:SendReply\",\n        ],\n        // Seems this is needed for the given actions.\n        resources: [\"*\"],\n      }),\n    )\n\n    new cdk.CfnOutput(this, \"BastionInstanceId\", {\n      value: instance.instanceId,\n    })\n  }\n}\n"]}
|
|
@@ -0,0 +1,68 @@
|
|
|
1
|
+
import * as constructs from "constructs";
|
|
2
|
+
import * as ecr from "aws-cdk-lib/aws-ecr";
|
|
3
|
+
interface Props {
|
|
4
|
+
/**
|
|
5
|
+
* The name to use for the S3 Bucket. Should include both account and region
|
|
6
|
+
* so that it will not conflict with other accounts/regions.
|
|
7
|
+
*
|
|
8
|
+
* @default - no bucket will be created
|
|
9
|
+
*/
|
|
10
|
+
bucketName?: string;
|
|
11
|
+
/**
|
|
12
|
+
* The name to use for the ECR Repository.
|
|
13
|
+
*/
|
|
14
|
+
ecrRepositoryName: string;
|
|
15
|
+
/**
|
|
16
|
+
* The lifecycle rules to apply to images stored in the ECR repository.
|
|
17
|
+
*
|
|
18
|
+
* @default - Expire images after 180 days
|
|
19
|
+
*/
|
|
20
|
+
ecrRepositoryLifecycleRules?: ecr.LifecycleRule[];
|
|
21
|
+
/**
|
|
22
|
+
* Reference to the IAM Role that will be granted permission to
|
|
23
|
+
* assume the CI role. This role must have permission to assume
|
|
24
|
+
* the CI role.
|
|
25
|
+
*
|
|
26
|
+
* @default - use Liflig Jenkins role
|
|
27
|
+
*/
|
|
28
|
+
externalRoleArn?: string;
|
|
29
|
+
/**
|
|
30
|
+
* The name of the role that will be created that will be assumed
|
|
31
|
+
* from the CI system.
|
|
32
|
+
*
|
|
33
|
+
* @default - no role will be created
|
|
34
|
+
*/
|
|
35
|
+
ciRoleName?: string;
|
|
36
|
+
/**
|
|
37
|
+
* The AWS Accounts that will be granted permission to read from
|
|
38
|
+
* the artifact repos.
|
|
39
|
+
*/
|
|
40
|
+
targetAccountIds: string[];
|
|
41
|
+
/**
|
|
42
|
+
* Flag if Griid is bootstrapped and the account this construct is
|
|
43
|
+
* deployed to is the build account. Will attach policies and
|
|
44
|
+
* reference existing artifacts and roles.
|
|
45
|
+
*
|
|
46
|
+
* @default false
|
|
47
|
+
*/
|
|
48
|
+
griid?: boolean;
|
|
49
|
+
}
|
|
50
|
+
/**
|
|
51
|
+
* Build artifacts.
|
|
52
|
+
*
|
|
53
|
+
* This holds a S3 Bucket, a ECR Repository and roles to be used
|
|
54
|
+
* from CI system for uploading.
|
|
55
|
+
*
|
|
56
|
+
* TODO: How can we cleanup stuff that goes into this S3 Bucket and
|
|
57
|
+
* ECR Repository? Can we ever reliably cleanup? We probably need
|
|
58
|
+
* some strategy for how we put stuff here to be able to do it.
|
|
59
|
+
*
|
|
60
|
+
* @experimental
|
|
61
|
+
*/
|
|
62
|
+
export declare class BuildArtifacts extends constructs.Construct {
|
|
63
|
+
readonly bucketName: string | undefined;
|
|
64
|
+
readonly ecrRepositoryArn: string;
|
|
65
|
+
readonly ecrRepositoryName: string;
|
|
66
|
+
constructor(scope: constructs.Construct, id: string, props: Props);
|
|
67
|
+
}
|
|
68
|
+
export {};
|
|
@@ -0,0 +1,118 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.BuildArtifacts = void 0;
|
|
4
|
+
const constructs = require("constructs");
|
|
5
|
+
const ecr = require("aws-cdk-lib/aws-ecr");
|
|
6
|
+
const iam = require("aws-cdk-lib/aws-iam");
|
|
7
|
+
const s3 = require("aws-cdk-lib/aws-s3");
|
|
8
|
+
const cdk = require("aws-cdk-lib");
|
|
9
|
+
const griid_1 = require("../griid");
|
|
10
|
+
/**
|
|
11
|
+
* Build artifacts.
|
|
12
|
+
*
|
|
13
|
+
* This holds a S3 Bucket, a ECR Repository and roles to be used
|
|
14
|
+
* from CI system for uploading.
|
|
15
|
+
*
|
|
16
|
+
* TODO: How can we cleanup stuff that goes into this S3 Bucket and
|
|
17
|
+
* ECR Repository? Can we ever reliably cleanup? We probably need
|
|
18
|
+
* some strategy for how we put stuff here to be able to do it.
|
|
19
|
+
*
|
|
20
|
+
* @experimental
|
|
21
|
+
*/
|
|
22
|
+
class BuildArtifacts extends constructs.Construct {
|
|
23
|
+
constructor(scope, id, props) {
|
|
24
|
+
var _a;
|
|
25
|
+
super(scope, id);
|
|
26
|
+
this.bucketName = props.bucketName;
|
|
27
|
+
this.ecrRepositoryName = props.ecrRepositoryName;
|
|
28
|
+
this.ecrRepositoryArn = cdk.Arn.format({
|
|
29
|
+
service: "ecr",
|
|
30
|
+
resource: "repository",
|
|
31
|
+
resourceName: this.ecrRepositoryName,
|
|
32
|
+
}, cdk.Stack.of(this));
|
|
33
|
+
const externalRoleArn = (_a = props.externalRoleArn) !== null && _a !== void 0 ? _a : "arn:aws:iam::923402097046:role/buildtools-jenkins-RoleJenkinsSlave-JQGYHR5WE6C5";
|
|
34
|
+
const ecrRepositoryName = props.ecrRepositoryName;
|
|
35
|
+
let bucket = undefined;
|
|
36
|
+
if (props.bucketName) {
|
|
37
|
+
bucket = new s3.Bucket(this, "S3Bucket", {
|
|
38
|
+
bucketName: props.bucketName,
|
|
39
|
+
encryption: s3.BucketEncryption.S3_MANAGED,
|
|
40
|
+
eventBridgeEnabled: true,
|
|
41
|
+
blockPublicAccess: s3.BlockPublicAccess.BLOCK_ALL,
|
|
42
|
+
versioned: true,
|
|
43
|
+
lifecycleRules: [
|
|
44
|
+
{
|
|
45
|
+
noncurrentVersionExpiration: cdk.Duration.days(10),
|
|
46
|
+
},
|
|
47
|
+
],
|
|
48
|
+
});
|
|
49
|
+
}
|
|
50
|
+
const ciRole = props.ciRoleName
|
|
51
|
+
? new iam.Role(this, "CiRole", {
|
|
52
|
+
roleName: props.ciRoleName,
|
|
53
|
+
assumedBy: new iam.ArnPrincipal(externalRoleArn),
|
|
54
|
+
})
|
|
55
|
+
: undefined;
|
|
56
|
+
const griidCiRole = props.griid
|
|
57
|
+
? (0, griid_1.getGriidCiRole)(this)
|
|
58
|
+
: undefined;
|
|
59
|
+
if (bucket && ciRole) {
|
|
60
|
+
bucket.grantReadWrite(ciRole);
|
|
61
|
+
}
|
|
62
|
+
if (bucket && griidCiRole) {
|
|
63
|
+
bucket.grantReadWrite(griidCiRole);
|
|
64
|
+
}
|
|
65
|
+
const ecrRepo = new ecr.Repository(this, "EcrRepository", {
|
|
66
|
+
repositoryName: ecrRepositoryName,
|
|
67
|
+
lifecycleRules: props.ecrRepositoryLifecycleRules || [
|
|
68
|
+
{
|
|
69
|
+
maxImageAge: cdk.Duration.days(180),
|
|
70
|
+
tagStatus: ecr.TagStatus.ANY,
|
|
71
|
+
},
|
|
72
|
+
],
|
|
73
|
+
});
|
|
74
|
+
if (ciRole) {
|
|
75
|
+
ecrRepo.grantPullPush(ciRole);
|
|
76
|
+
}
|
|
77
|
+
if (griidCiRole) {
|
|
78
|
+
ecrRepo.grantPullPush(griidCiRole);
|
|
79
|
+
}
|
|
80
|
+
// Allow a target to read from the repos. As any specific roles need
|
|
81
|
+
// to exist before we can grant access, we delegate that responsibility
|
|
82
|
+
// to the target account.
|
|
83
|
+
for (const targetAccountId of props.targetAccountIds) {
|
|
84
|
+
if (bucket) {
|
|
85
|
+
bucket.grantRead(new iam.AccountPrincipal(targetAccountId));
|
|
86
|
+
}
|
|
87
|
+
ecrRepo.grantPull(new iam.AccountPrincipal(targetAccountId));
|
|
88
|
+
}
|
|
89
|
+
// Grant permissions to write pipeline variables.
|
|
90
|
+
if (ciRole || griidCiRole) {
|
|
91
|
+
const account = cdk.Stack.of(this).account;
|
|
92
|
+
const region = cdk.Stack.of(this).region;
|
|
93
|
+
const statement = new iam.PolicyStatement({
|
|
94
|
+
actions: ["ssm:PutParameter"],
|
|
95
|
+
resources: [
|
|
96
|
+
`arn:aws:ssm:${region}:${account}:parameter/liflig-cdk/*/pipeline-variables/*`,
|
|
97
|
+
],
|
|
98
|
+
});
|
|
99
|
+
ciRole === null || ciRole === void 0 ? void 0 : ciRole.grantPrincipal.addToPrincipalPolicy(statement);
|
|
100
|
+
griidCiRole === null || griidCiRole === void 0 ? void 0 : griidCiRole.grantPrincipal.addToPrincipalPolicy(statement);
|
|
101
|
+
}
|
|
102
|
+
new cdk.CfnOutput(this, "EcrRepoUri", {
|
|
103
|
+
value: ecrRepo.repositoryUri,
|
|
104
|
+
});
|
|
105
|
+
if (bucket) {
|
|
106
|
+
new cdk.CfnOutput(this, "BucketName", {
|
|
107
|
+
value: bucket.bucketName,
|
|
108
|
+
});
|
|
109
|
+
}
|
|
110
|
+
if (ciRole) {
|
|
111
|
+
new cdk.CfnOutput(this, "CiRoleArn", {
|
|
112
|
+
value: ciRole.roleArn,
|
|
113
|
+
});
|
|
114
|
+
}
|
|
115
|
+
}
|
|
116
|
+
}
|
|
117
|
+
exports.BuildArtifacts = BuildArtifacts;
|
|
118
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/build-artifacts/index.ts"],"names":[],"mappings":";;;AAAA,yCAAwC;AACxC,2CAA0C;AAC1C,2CAA0C;AAC1C,yCAAwC;AACxC,mCAAkC;AAClC,oCAAyC;AAkDzC;;;;;;;;;;;GAWG;AACH,MAAa,cAAe,SAAQ,UAAU,CAAC,SAAS;IAKtD,YAAY,KAA2B,EAAE,EAAU,EAAE,KAAY;;QAC/D,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAA;QAEhB,IAAI,CAAC,UAAU,GAAG,KAAK,CAAC,UAAU,CAAA;QAClC,IAAI,CAAC,iBAAiB,GAAG,KAAK,CAAC,iBAAiB,CAAA;QAChD,IAAI,CAAC,gBAAgB,GAAG,GAAG,CAAC,GAAG,CAAC,MAAM,CACpC;YACE,OAAO,EAAE,KAAK;YACd,QAAQ,EAAE,YAAY;YACtB,YAAY,EAAE,IAAI,CAAC,iBAAiB;SACrC,EACD,GAAG,CAAC,KAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CACnB,CAAA;QAED,MAAM,eAAe,GACnB,MAAA,KAAK,CAAC,eAAe,mCACrB,iFAAiF,CAAA;QAEnF,MAAM,iBAAiB,GAAG,KAAK,CAAC,iBAAiB,CAAA;QAEjD,IAAI,MAAM,GAA0B,SAAS,CAAA;QAE7C,IAAI,KAAK,CAAC,UAAU,EAAE,CAAC;YACrB,MAAM,GAAG,IAAI,EAAE,CAAC,MAAM,CAAC,IAAI,EAAE,UAAU,EAAE;gBACvC,UAAU,EAAE,KAAK,CAAC,UAAU;gBAC5B,UAAU,EAAE,EAAE,CAAC,gBAAgB,CAAC,UAAU;gBAC1C,kBAAkB,EAAE,IAAI;gBACxB,iBAAiB,EAAE,EAAE,CAAC,iBAAiB,CAAC,SAAS;gBACjD,SAAS,EAAE,IAAI;gBACf,cAAc,EAAE;oBACd;wBACE,2BAA2B,EAAE,GAAG,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,CAAC;qBACnD;iBACF;aACF,CAAC,CAAA;QACJ,CAAC;QAED,MAAM,MAAM,GAAyB,KAAK,CAAC,UAAU;YACnD,CAAC,CAAC,IAAI,GAAG,CAAC,IAAI,CAAC,IAAI,EAAE,QAAQ,EAAE;gBAC3B,QAAQ,EAAE,KAAK,CAAC,UAAU;gBAC1B,SAAS,EAAE,IAAI,GAAG,CAAC,YAAY,CAAC,eAAe,CAAC;aACjD,CAAC;YACJ,CAAC,CAAC,SAAS,CAAA;QAEb,MAAM,WAAW,GAA0B,KAAK,CAAC,KAAK;YACpD,CAAC,CAAC,IAAA,sBAAc,EAAC,IAAI,CAAC;YACtB,CAAC,CAAC,SAAS,CAAA;QAEb,IAAI,MAAM,IAAI,MAAM,EAAE,CAAC;YACrB,MAAM,CAAC,cAAc,CAAC,MAAM,CAAC,CAAA;QAC/B,CAAC;QAED,IAAI,MAAM,IAAI,WAAW,EAAE,CAAC;YAC1B,MAAM,CAAC,cAAc,CAAC,WAAW,CAAC,CAAA;QACpC,CAAC;QAED,MAAM,OAAO,GAAG,IAAI,GAAG,CAAC,UAAU,CAAC,IAAI,EAAE,eAAe,EAAE;YACxD,cAAc,EAAE,iBAAiB;YACjC,cAAc,EAAE,KAAK,CAAC,2BAA2B,IAAI;gBACnD;oBACE,WAAW,EAAE,GAAG,CAAC,QAAQ,CAAC,IAAI,CAAC,GAAG,CAAC;oBACnC,SAAS,EAAE,GAAG,CAAC,SAAS,CAAC,GAAG;iBAC7B;aACF;SACF,CAAC,CAAA;QAEF,IAAI,MAAM,EAAE,CAAC;YACX,OAAO,CAAC,aAAa,CAAC,MAAM,CAAC,CAAA;QAC/B,CAAC;QAED,IAAI,WAAW,EAAE,CAAC;YAChB,OAAO,CAAC,aAAa,CAAC,WAAW,CAAC,CAAA;QACpC,CAAC;QAED,oEAAoE;QACpE,uEAAuE;QACvE,yBAAyB;QACzB,KAAK,MAAM,eAAe,IAAI,KAAK,CAAC,gBAAgB,EAAE,CAAC;YACrD,IAAI,MAAM,EAAE,CAAC;gBACX,MAAM,CAAC,SAAS,CAAC,IAAI,GAAG,CAAC,gBAAgB,CAAC,eAAe,CAAC,CAAC,CAAA;YAC7D,CAAC;YACD,OAAO,CAAC,SAAS,CAAC,IAAI,GAAG,CAAC,gBAAgB,CAAC,eAAe,CAAC,CAAC,CAAA;QAC9D,CAAC;QAED,iDAAiD;QACjD,IAAI,MAAM,IAAI,WAAW,EAAE,CAAC;YAC1B,MAAM,OAAO,GAAG,GAAG,CAAC,KAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,OAAO,CAAA;YAC1C,MAAM,MAAM,GAAG,GAAG,CAAC,KAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,MAAM,CAAA;YACxC,MAAM,SAAS,GAAG,IAAI,GAAG,CAAC,eAAe,CAAC;gBACxC,OAAO,EAAE,CAAC,kBAAkB,CAAC;gBAC7B,SAAS,EAAE;oBACT,eAAe,MAAM,IAAI,OAAO,8CAA8C;iBAC/E;aACF,CAAC,CAAA;YAEF,MAAM,aAAN,MAAM,uBAAN,MAAM,CAAE,cAAc,CAAC,oBAAoB,CAAC,SAAS,CAAC,CAAA;YACtD,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,cAAc,CAAC,oBAAoB,CAAC,SAAS,CAAC,CAAA;QAC7D,CAAC;QAED,IAAI,GAAG,CAAC,SAAS,CAAC,IAAI,EAAE,YAAY,EAAE;YACpC,KAAK,EAAE,OAAO,CAAC,aAAa;SAC7B,CAAC,CAAA;QAEF,IAAI,MAAM,EAAE,CAAC;YACX,IAAI,GAAG,CAAC,SAAS,CAAC,IAAI,EAAE,YAAY,EAAE;gBACpC,KAAK,EAAE,MAAM,CAAC,UAAU;aACzB,CAAC,CAAA;QACJ,CAAC;QAED,IAAI,MAAM,EAAE,CAAC;YACX,IAAI,GAAG,CAAC,SAAS,CAAC,IAAI,EAAE,WAAW,EAAE;gBACnC,KAAK,EAAE,MAAM,CAAC,OAAO;aACtB,CAAC,CAAA;QACJ,CAAC;IACH,CAAC;CACF;AAxHD,wCAwHC","sourcesContent":["import * as constructs from \"constructs\"\nimport * as ecr from \"aws-cdk-lib/aws-ecr\"\nimport * as iam from \"aws-cdk-lib/aws-iam\"\nimport * as s3 from \"aws-cdk-lib/aws-s3\"\nimport * as cdk from \"aws-cdk-lib\"\nimport { getGriidCiRole } from \"../griid\"\n\ninterface Props {\n  /**\n   * The name to use for the S3 Bucket. Should include both account and region\n   * so that it will not conflict with other accounts/regions.\n   *\n   * @default - no bucket will be created\n   */\n  bucketName?: string\n  /**\n   * The name to use for the ECR Repository.\n   */\n  ecrRepositoryName: string\n  /**\n   * The lifecycle rules to apply to images stored in the ECR repository.\n   *\n   * @default - Expire images after 180 days\n   */\n  ecrRepositoryLifecycleRules?: ecr.LifecycleRule[]\n  /**\n   * Reference to the IAM Role that will be granted permission to\n   * assume the CI role. This role must have permission to assume\n   * the CI role.\n   *\n   * @default - use Liflig Jenkins role\n   */\n  externalRoleArn?: string\n  /**\n   * The name of the role that will be created that will be assumed\n   * from the CI system.\n   *\n   * @default - no role will be created\n   */\n  ciRoleName?: string\n  /**\n   * The AWS Accounts that will be granted permission to read from\n   * the artifact repos.\n   */\n  targetAccountIds: string[]\n  /**\n   * Flag if Griid is bootstrapped and the account this construct is\n   * deployed to is the build account. Will attach policies and\n   * reference existing artifacts and roles.\n   *\n   * @default false\n   */\n  griid?: boolean\n}\n\n/**\n * Build artifacts.\n *\n * This holds a S3 Bucket, a ECR Repository and roles to be used\n * from CI system for uploading.\n *\n * TODO: How can we cleanup stuff that goes into this S3 Bucket and\n *  ECR Repository? Can we ever reliably cleanup? We probably need\n *  some strategy for how we put stuff here to be able to do it.\n *\n * @experimental\n */\nexport class BuildArtifacts extends constructs.Construct {\n  readonly bucketName: string | undefined\n  readonly ecrRepositoryArn: string\n  readonly ecrRepositoryName: string\n\n  constructor(scope: constructs.Construct, id: string, props: Props) {\n    super(scope, id)\n\n    this.bucketName = props.bucketName\n    this.ecrRepositoryName = props.ecrRepositoryName\n    this.ecrRepositoryArn = cdk.Arn.format(\n      {\n        service: \"ecr\",\n        resource: \"repository\",\n        resourceName: this.ecrRepositoryName,\n      },\n      cdk.Stack.of(this),\n    )\n\n    const externalRoleArn =\n      props.externalRoleArn ??\n      \"arn:aws:iam::923402097046:role/buildtools-jenkins-RoleJenkinsSlave-JQGYHR5WE6C5\"\n\n    const ecrRepositoryName = props.ecrRepositoryName\n\n    let bucket: s3.Bucket | undefined = undefined\n\n    if (props.bucketName) {\n      bucket = new s3.Bucket(this, \"S3Bucket\", {\n        bucketName: props.bucketName,\n        encryption: s3.BucketEncryption.S3_MANAGED,\n        eventBridgeEnabled: true,\n        blockPublicAccess: s3.BlockPublicAccess.BLOCK_ALL,\n        versioned: true,\n        lifecycleRules: [\n          {\n            noncurrentVersionExpiration: cdk.Duration.days(10),\n          },\n        ],\n      })\n    }\n\n    const ciRole: iam.Role | undefined = props.ciRoleName\n      ? new iam.Role(this, \"CiRole\", {\n          roleName: props.ciRoleName,\n          assumedBy: new iam.ArnPrincipal(externalRoleArn),\n        })\n      : undefined\n\n    const griidCiRole: iam.IRole | undefined = props.griid\n      ? getGriidCiRole(this)\n      : undefined\n\n    if (bucket && ciRole) {\n      bucket.grantReadWrite(ciRole)\n    }\n\n    if (bucket && griidCiRole) {\n      bucket.grantReadWrite(griidCiRole)\n    }\n\n    const ecrRepo = new ecr.Repository(this, \"EcrRepository\", {\n      repositoryName: ecrRepositoryName,\n      lifecycleRules: props.ecrRepositoryLifecycleRules || [\n        {\n          maxImageAge: cdk.Duration.days(180),\n          tagStatus: ecr.TagStatus.ANY,\n        },\n      ],\n    })\n\n    if (ciRole) {\n      ecrRepo.grantPullPush(ciRole)\n    }\n\n    if (griidCiRole) {\n      ecrRepo.grantPullPush(griidCiRole)\n    }\n\n    // Allow a target to read from the repos. As any specific roles need\n    // to exist before we can grant access, we delegate that responsibility\n    // to the target account.\n    for (const targetAccountId of props.targetAccountIds) {\n      if (bucket) {\n        bucket.grantRead(new iam.AccountPrincipal(targetAccountId))\n      }\n      ecrRepo.grantPull(new iam.AccountPrincipal(targetAccountId))\n    }\n\n    // Grant permissions to write pipeline variables.\n    if (ciRole || griidCiRole) {\n      const account = cdk.Stack.of(this).account\n      const region = cdk.Stack.of(this).region\n      const statement = new iam.PolicyStatement({\n        actions: [\"ssm:PutParameter\"],\n        resources: [\n          `arn:aws:ssm:${region}:${account}:parameter/liflig-cdk/*/pipeline-variables/*`,\n        ],\n      })\n\n      ciRole?.grantPrincipal.addToPrincipalPolicy(statement)\n      griidCiRole?.grantPrincipal.addToPrincipalPolicy(statement)\n    }\n\n    new cdk.CfnOutput(this, \"EcrRepoUri\", {\n      value: ecrRepo.repositoryUri,\n    })\n\n    if (bucket) {\n      new cdk.CfnOutput(this, \"BucketName\", {\n        value: bucket.bucketName,\n      })\n    }\n\n    if (ciRole) {\n      new cdk.CfnOutput(this, \"CiRoleArn\", {\n        value: ciRole.roleArn,\n      })\n    }\n  }\n}\n"]}
|
|
@@ -0,0 +1,63 @@
|
|
|
1
|
+
import * as constructs from "constructs";
|
|
2
|
+
import * as cdk from "aws-cdk-lib";
|
|
3
|
+
interface Props extends cdk.StackProps {
|
|
4
|
+
/**
|
|
5
|
+
* The role that will be granted permission to assume the deploy
|
|
6
|
+
* role. This role must have permission to assume the deploy role.
|
|
7
|
+
*/
|
|
8
|
+
callerRoleArn: string;
|
|
9
|
+
/**
|
|
10
|
+
* The name that will be used for the deploy role. This is the role
|
|
11
|
+
* that the caller will assume in order to have permission to invoke
|
|
12
|
+
* the Lambda Functions.
|
|
13
|
+
*/
|
|
14
|
+
roleName: string;
|
|
15
|
+
/**
|
|
16
|
+
* The bucket used for storing artifacts. This is used to grant
|
|
17
|
+
* permission to the role to read artifact. If the bucket is in
|
|
18
|
+
* another account, it must have a policy which allows the target
|
|
19
|
+
* account to use IAM permissions from target account.
|
|
20
|
+
*/
|
|
21
|
+
artifactsBucketName: string;
|
|
22
|
+
startDeployFunctionName: string;
|
|
23
|
+
statusFunctionName: string;
|
|
24
|
+
/**
|
|
25
|
+
* This is the stack name used with `cdk bootstrap` and can e
|
|
26
|
+
* found in cdk.json as "toolkitStackName".
|
|
27
|
+
*/
|
|
28
|
+
cdkToolkitStackName: string;
|
|
29
|
+
/**
|
|
30
|
+
* We pass the CDK context values as they contain feature flags
|
|
31
|
+
* used by the CDK CLI.
|
|
32
|
+
*/
|
|
33
|
+
cdkContext: Record<string, string | string[]>;
|
|
34
|
+
/**
|
|
35
|
+
* The secret containing username and password (or access token)
|
|
36
|
+
* for a valid docker user. This is used to access private
|
|
37
|
+
* repositories or to handle docker hub's pull rate limiting.
|
|
38
|
+
*/
|
|
39
|
+
dockerCredentialsSecretName?: string;
|
|
40
|
+
}
|
|
41
|
+
/**
|
|
42
|
+
* This construct is responsible for the privileges and logic of
|
|
43
|
+
* automatically deploying stack resources in an account.
|
|
44
|
+
* Its resources are used from a deployment pipeline.
|
|
45
|
+
*
|
|
46
|
+
* The deployment is performed by invoking the "start deploy"
|
|
47
|
+
* lambda with details of what should be deployed. As this is
|
|
48
|
+
* responsible for deploying infrastructure, the principal invoking
|
|
49
|
+
* might be able to cause privilege escalation. The principal invoking
|
|
50
|
+
* should be assumed to have full administrator access.
|
|
51
|
+
*
|
|
52
|
+
* The process deploying the infrastructure is locked down so this
|
|
53
|
+
* is only possibly by deployment through CloudFormation, and as
|
|
54
|
+
* such removes a lot of possible escalation paths (e.g. no role
|
|
55
|
+
* can be created by direct API call).
|
|
56
|
+
*
|
|
57
|
+
* The "status" lambda can be used to poll for completion, and will
|
|
58
|
+
* also return logs from the job upon completion.
|
|
59
|
+
*/
|
|
60
|
+
export declare class CdkDeploy extends constructs.Construct {
|
|
61
|
+
constructor(scope: constructs.Construct, id: string, props: Props);
|
|
62
|
+
}
|
|
63
|
+
export {};
|
|
@@ -0,0 +1,175 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.CdkDeploy = void 0;
|
|
4
|
+
const constructs = require("constructs");
|
|
5
|
+
const codebuild = require("aws-cdk-lib/aws-codebuild");
|
|
6
|
+
const iam = require("aws-cdk-lib/aws-iam");
|
|
7
|
+
const lambda = require("aws-cdk-lib/aws-lambda");
|
|
8
|
+
const s3 = require("aws-cdk-lib/aws-s3");
|
|
9
|
+
const cdk = require("aws-cdk-lib");
|
|
10
|
+
const secretsmanager = require("aws-cdk-lib/aws-secretsmanager");
|
|
11
|
+
const start_deploy_handler_1 = require("./start-deploy-handler");
|
|
12
|
+
const status_handler_1 = require("./status-handler");
|
|
13
|
+
/**
|
|
14
|
+
* This construct is responsible for the privileges and logic of
|
|
15
|
+
* automatically deploying stack resources in an account.
|
|
16
|
+
* Its resources are used from a deployment pipeline.
|
|
17
|
+
*
|
|
18
|
+
* The deployment is performed by invoking the "start deploy"
|
|
19
|
+
* lambda with details of what should be deployed. As this is
|
|
20
|
+
* responsible for deploying infrastructure, the principal invoking
|
|
21
|
+
* might be able to cause privilege escalation. The principal invoking
|
|
22
|
+
* should be assumed to have full administrator access.
|
|
23
|
+
*
|
|
24
|
+
* The process deploying the infrastructure is locked down so this
|
|
25
|
+
* is only possibly by deployment through CloudFormation, and as
|
|
26
|
+
* such removes a lot of possible escalation paths (e.g. no role
|
|
27
|
+
* can be created by direct API call).
|
|
28
|
+
*
|
|
29
|
+
* The "status" lambda can be used to poll for completion, and will
|
|
30
|
+
* also return logs from the job upon completion.
|
|
31
|
+
*/
|
|
32
|
+
class CdkDeploy extends constructs.Construct {
|
|
33
|
+
constructor(scope, id, props) {
|
|
34
|
+
super(scope, id);
|
|
35
|
+
const account = cdk.Stack.of(this).account;
|
|
36
|
+
const region = cdk.Stack.of(this).region;
|
|
37
|
+
const artifactsBucket = s3.Bucket.fromBucketName(this, "ArtifactsBucket", props.artifactsBucketName);
|
|
38
|
+
const roleToBeAssumed = new iam.Role(this, "Role", {
|
|
39
|
+
roleName: props.roleName,
|
|
40
|
+
assumedBy: new iam.ArnPrincipal(props.callerRoleArn),
|
|
41
|
+
});
|
|
42
|
+
// Bucked used for input to CodeBuild.
|
|
43
|
+
// We let CloudFormation manage the bucket name.
|
|
44
|
+
const codebuildBucket = new s3.Bucket(this, "CodebuildSourceBucket", {
|
|
45
|
+
encryption: s3.BucketEncryption.S3_MANAGED,
|
|
46
|
+
blockPublicAccess: s3.BlockPublicAccess.BLOCK_ALL,
|
|
47
|
+
lifecycleRules: [
|
|
48
|
+
{
|
|
49
|
+
expiration: cdk.Duration.days(5),
|
|
50
|
+
},
|
|
51
|
+
],
|
|
52
|
+
});
|
|
53
|
+
// The role used for CloudFormation deployment.
|
|
54
|
+
const cloudFormationRole = new iam.Role(this, "CloudFormationRole", {
|
|
55
|
+
assumedBy: new iam.ServicePrincipal("cloudformation.amazonaws.com"),
|
|
56
|
+
managedPolicies: [
|
|
57
|
+
// TODO: Can we restrict this a bit more? E.g. look into how Griid has
|
|
58
|
+
// limited what the individual stack deployments have permissions to do.
|
|
59
|
+
iam.ManagedPolicy.fromAwsManagedPolicyName("AdministratorAccess"),
|
|
60
|
+
],
|
|
61
|
+
});
|
|
62
|
+
// Replace CodeBuild with ECS task?
|
|
63
|
+
// See https://aws.amazon.com/blogs/devops/using-aws-codebuild-to-execute-administrative-tasks/
|
|
64
|
+
const codebuildProject = new codebuild.Project(this, "CodebuildProject", {
|
|
65
|
+
environment: {
|
|
66
|
+
buildImage: props.dockerCredentialsSecretName == null
|
|
67
|
+
? codebuild.LinuxBuildImage.fromDockerRegistry("node:16")
|
|
68
|
+
: codebuild.LinuxBuildImage.fromDockerRegistry("node:16", {
|
|
69
|
+
secretsManagerCredentials: secretsmanager.Secret.fromSecretNameV2(this, "dockerCredentialsSecretName", props.dockerCredentialsSecretName),
|
|
70
|
+
}),
|
|
71
|
+
},
|
|
72
|
+
buildSpec: codebuild.BuildSpec.fromObject({
|
|
73
|
+
version: "0.2",
|
|
74
|
+
env: {
|
|
75
|
+
variables: {
|
|
76
|
+
CDK_DEPLOY_ROLE_ARN: cloudFormationRole.roleArn,
|
|
77
|
+
CDK_TOOLKIT_STACK_NAME: props.cdkToolkitStackName,
|
|
78
|
+
},
|
|
79
|
+
},
|
|
80
|
+
phases: {
|
|
81
|
+
build: {
|
|
82
|
+
commands: [
|
|
83
|
+
"npm install -g aws-cdk",
|
|
84
|
+
'cdk --app "$CODEBUILD_SRC_DIR_CLOUDASSEMBLY" --role-arn "$CDK_DEPLOY_ROLE_ARN" --toolkit-stack-name "$CDK_TOOLKIT_STACK_NAME" --require-approval never deploy --exclusively $(cat stack-names.txt)',
|
|
85
|
+
],
|
|
86
|
+
},
|
|
87
|
+
},
|
|
88
|
+
}),
|
|
89
|
+
timeout: cdk.Duration.hours(4),
|
|
90
|
+
});
|
|
91
|
+
// Grant access to CloudFormation.
|
|
92
|
+
codebuildProject.addToRolePolicy(new iam.PolicyStatement({
|
|
93
|
+
actions: [
|
|
94
|
+
// For diff.
|
|
95
|
+
"cloudformation:DescribeStacks",
|
|
96
|
+
"cloudformation:GetTemplate",
|
|
97
|
+
// For deploy.
|
|
98
|
+
"cloudformation:CreateChangeSet",
|
|
99
|
+
"cloudformation:DeleteStack",
|
|
100
|
+
"cloudformation:DescribeChangeSet",
|
|
101
|
+
"cloudformation:ExecuteChangeSet",
|
|
102
|
+
"cloudformation:DescribeStackEvents",
|
|
103
|
+
"cloudformation:DeleteChangeSet",
|
|
104
|
+
],
|
|
105
|
+
resources: ["*"],
|
|
106
|
+
}));
|
|
107
|
+
// Grant access to the CDK Toolkit bucket.
|
|
108
|
+
codebuildProject.addToRolePolicy(new iam.PolicyStatement({
|
|
109
|
+
actions: [
|
|
110
|
+
"s3:GetObject*",
|
|
111
|
+
"s3:GetBucket*",
|
|
112
|
+
"s3:List*",
|
|
113
|
+
"s3:PutObject*",
|
|
114
|
+
"s3:Abort*",
|
|
115
|
+
"s3:DeleteObject*",
|
|
116
|
+
],
|
|
117
|
+
resources: [
|
|
118
|
+
`arn:aws:s3:::${props.cdkToolkitStackName.toLowerCase()}-stagingbucket-*`,
|
|
119
|
+
],
|
|
120
|
+
}));
|
|
121
|
+
artifactsBucket.grantRead(codebuildProject);
|
|
122
|
+
cloudFormationRole.grantPassRole(codebuildProject.role);
|
|
123
|
+
codebuildBucket.grantReadWrite(codebuildProject);
|
|
124
|
+
const startDeployFn = new lambda.Function(this, "StartDeployFunction", {
|
|
125
|
+
code: new lambda.InlineCode(`exports.handler = ${start_deploy_handler_1.startDeployHandler.toString()};`),
|
|
126
|
+
runtime: lambda.Runtime.NODEJS_16_X,
|
|
127
|
+
handler: "index.handler",
|
|
128
|
+
functionName: props.startDeployFunctionName,
|
|
129
|
+
environment: {
|
|
130
|
+
PROJECT_NAME: codebuildProject.projectName,
|
|
131
|
+
BUCKET_NAME: codebuildBucket.bucketName,
|
|
132
|
+
CDK_CONTEXT: JSON.stringify(props.cdkContext),
|
|
133
|
+
},
|
|
134
|
+
timeout: cdk.Duration.seconds(30),
|
|
135
|
+
});
|
|
136
|
+
startDeployFn.grantInvoke(roleToBeAssumed);
|
|
137
|
+
codebuildBucket.grantReadWrite(startDeployFn);
|
|
138
|
+
startDeployFn.addToRolePolicy(new iam.PolicyStatement({
|
|
139
|
+
actions: ["codebuild:StartBuild", "codebuild:BatchGetBuilds"],
|
|
140
|
+
resources: [codebuildProject.projectArn],
|
|
141
|
+
}));
|
|
142
|
+
const statusFn = new lambda.Function(this, "StatusFunction", {
|
|
143
|
+
code: new lambda.InlineCode(`exports.handler = ${status_handler_1.statusHandler.toString()};`),
|
|
144
|
+
runtime: lambda.Runtime.NODEJS_16_X,
|
|
145
|
+
handler: "index.handler",
|
|
146
|
+
functionName: props.statusFunctionName,
|
|
147
|
+
environment: {
|
|
148
|
+
PROJECT_NAME: codebuildProject.projectName,
|
|
149
|
+
},
|
|
150
|
+
timeout: cdk.Duration.seconds(30),
|
|
151
|
+
});
|
|
152
|
+
statusFn.grantInvoke(roleToBeAssumed);
|
|
153
|
+
statusFn.addToRolePolicy(new iam.PolicyStatement({
|
|
154
|
+
actions: ["codebuild:BatchGetBuilds"],
|
|
155
|
+
resources: [codebuildProject.projectArn],
|
|
156
|
+
}));
|
|
157
|
+
statusFn.addToRolePolicy(new iam.PolicyStatement({
|
|
158
|
+
actions: ["logs:GetLogEvents"],
|
|
159
|
+
resources: [
|
|
160
|
+
`arn:aws:logs:${region}:${account}:log-group:/aws/codebuild/${codebuildProject.projectName}:log-stream:*`,
|
|
161
|
+
],
|
|
162
|
+
}));
|
|
163
|
+
new cdk.CfnOutput(this, "RoleToBeAssumedArn", {
|
|
164
|
+
value: roleToBeAssumed.roleArn,
|
|
165
|
+
});
|
|
166
|
+
new cdk.CfnOutput(this, "StatusFunctionArn", {
|
|
167
|
+
value: statusFn.functionArn,
|
|
168
|
+
});
|
|
169
|
+
new cdk.CfnOutput(this, "StartDeployFunctionArn", {
|
|
170
|
+
value: startDeployFn.functionArn,
|
|
171
|
+
});
|
|
172
|
+
}
|
|
173
|
+
}
|
|
174
|
+
exports.CdkDeploy = CdkDeploy;
|
|
175
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"cdk-deploy.js","sourceRoot":"","sources":["../../src/cdk-deploy/cdk-deploy.ts"],"names":[],"mappings":";;;AAAA,yCAAwC;AACxC,uDAAsD;AACtD,2CAA0C;AAC1C,iDAAgD;AAChD,yCAAwC;AACxC,mCAAkC;AAClC,iEAAgE;AAChE,iEAA2D;AAC3D,qDAAgD;AAyChD;;;;;;;;;;;;;;;;;;GAkBG;AACH,MAAa,SAAU,SAAQ,UAAU,CAAC,SAAS;IACjD,YAAY,KAA2B,EAAE,EAAU,EAAE,KAAY;QAC/D,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAA;QAEhB,MAAM,OAAO,GAAG,GAAG,CAAC,KAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,OAAO,CAAA;QAC1C,MAAM,MAAM,GAAG,GAAG,CAAC,KAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,MAAM,CAAA;QAExC,MAAM,eAAe,GAAG,EAAE,CAAC,MAAM,CAAC,cAAc,CAC9C,IAAI,EACJ,iBAAiB,EACjB,KAAK,CAAC,mBAAmB,CAC1B,CAAA;QAED,MAAM,eAAe,GAAG,IAAI,GAAG,CAAC,IAAI,CAAC,IAAI,EAAE,MAAM,EAAE;YACjD,QAAQ,EAAE,KAAK,CAAC,QAAQ;YACxB,SAAS,EAAE,IAAI,GAAG,CAAC,YAAY,CAAC,KAAK,CAAC,aAAa,CAAC;SACrD,CAAC,CAAA;QAEF,sCAAsC;QACtC,gDAAgD;QAChD,MAAM,eAAe,GAAG,IAAI,EAAE,CAAC,MAAM,CAAC,IAAI,EAAE,uBAAuB,EAAE;YACnE,UAAU,EAAE,EAAE,CAAC,gBAAgB,CAAC,UAAU;YAC1C,iBAAiB,EAAE,EAAE,CAAC,iBAAiB,CAAC,SAAS;YACjD,cAAc,EAAE;gBACd;oBACE,UAAU,EAAE,GAAG,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC,CAAC;iBACjC;aACF;SACF,CAAC,CAAA;QAEF,+CAA+C;QAC/C,MAAM,kBAAkB,GAAG,IAAI,GAAG,CAAC,IAAI,CAAC,IAAI,EAAE,oBAAoB,EAAE;YAClE,SAAS,EAAE,IAAI,GAAG,CAAC,gBAAgB,CAAC,8BAA8B,CAAC;YACnE,eAAe,EAAE;gBACf,sEAAsE;gBACtE,yEAAyE;gBACzE,GAAG,CAAC,aAAa,CAAC,wBAAwB,CAAC,qBAAqB,CAAC;aAClE;SACF,CAAC,CAAA;QAEF,mCAAmC;QACnC,+FAA+F;QAC/F,MAAM,gBAAgB,GAAG,IAAI,SAAS,CAAC,OAAO,CAAC,IAAI,EAAE,kBAAkB,EAAE;YACvE,WAAW,EAAE;gBACX,UAAU,EACR,KAAK,CAAC,2BAA2B,IAAI,IAAI;oBACvC,CAAC,CAAC,SAAS,CAAC,eAAe,CAAC,kBAAkB,CAAC,SAAS,CAAC;oBACzD,CAAC,CAAC,SAAS,CAAC,eAAe,CAAC,kBAAkB,CAAC,SAAS,EAAE;wBACtD,yBAAyB,EACvB,cAAc,CAAC,MAAM,CAAC,gBAAgB,CACpC,IAAI,EACJ,6BAA6B,EAC7B,KAAK,CAAC,2BAA2B,CAClC;qBACJ,CAAC;aACT;YACD,SAAS,EAAE,SAAS,CAAC,SAAS,CAAC,UAAU,CAAC;gBACxC,OAAO,EAAE,KAAK;gBACd,GAAG,EAAE;oBACH,SAAS,EAAE;wBACT,mBAAmB,EAAE,kBAAkB,CAAC,OAAO;wBAC/C,sBAAsB,EAAE,KAAK,CAAC,mBAAmB;qBAClD;iBACF;gBACD,MAAM,EAAE;oBACN,KAAK,EAAE;wBACL,QAAQ,EAAE;4BACR,wBAAwB;4BACxB,oMAAoM;yBACrM;qBACF;iBACF;aACF,CAAC;YACF,OAAO,EAAE,GAAG,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC,CAAC;SAC/B,CAAC,CAAA;QAEF,kCAAkC;QAClC,gBAAgB,CAAC,eAAe,CAC9B,IAAI,GAAG,CAAC,eAAe,CAAC;YACtB,OAAO,EAAE;gBACP,YAAY;gBACZ,+BAA+B;gBAC/B,4BAA4B;gBAC5B,cAAc;gBACd,gCAAgC;gBAChC,4BAA4B;gBAC5B,kCAAkC;gBAClC,iCAAiC;gBACjC,oCAAoC;gBACpC,gCAAgC;aACjC;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CACH,CAAA;QAED,0CAA0C;QAC1C,gBAAgB,CAAC,eAAe,CAC9B,IAAI,GAAG,CAAC,eAAe,CAAC;YACtB,OAAO,EAAE;gBACP,eAAe;gBACf,eAAe;gBACf,UAAU;gBACV,eAAe;gBACf,WAAW;gBACX,kBAAkB;aACnB;YACD,SAAS,EAAE;gBACT,gBAAgB,KAAK,CAAC,mBAAmB,CAAC,WAAW,EAAE,kBAAkB;aAC1E;SACF,CAAC,CACH,CAAA;QAED,eAAe,CAAC,SAAS,CAAC,gBAAgB,CAAC,CAAA;QAE3C,kBAAkB,CAAC,aAAa,CAAC,gBAAgB,CAAC,IAAK,CAAC,CAAA;QAExD,eAAe,CAAC,cAAc,CAAC,gBAAgB,CAAC,CAAA;QAEhD,MAAM,aAAa,GAAG,IAAI,MAAM,CAAC,QAAQ,CAAC,IAAI,EAAE,qBAAqB,EAAE;YACrE,IAAI,EAAE,IAAI,MAAM,CAAC,UAAU,CACzB,qBAAqB,yCAAkB,CAAC,QAAQ,EAAE,GAAG,CACtD;YACD,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC,WAAW;YACnC,OAAO,EAAE,eAAe;YACxB,YAAY,EAAE,KAAK,CAAC,uBAAuB;YAC3C,WAAW,EAAE;gBACX,YAAY,EAAE,gBAAgB,CAAC,WAAW;gBAC1C,WAAW,EAAE,eAAe,CAAC,UAAU;gBACvC,WAAW,EAAE,IAAI,CAAC,SAAS,CAAC,KAAK,CAAC,UAAU,CAAC;aAC9C;YACD,OAAO,EAAE,GAAG,CAAC,QAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SAClC,CAAC,CAAA;QAEF,aAAa,CAAC,WAAW,CAAC,eAAe,CAAC,CAAA;QAC1C,eAAe,CAAC,cAAc,CAAC,aAAa,CAAC,CAAA;QAE7C,aAAa,CAAC,eAAe,CAC3B,IAAI,GAAG,CAAC,eAAe,CAAC;YACtB,OAAO,EAAE,CAAC,sBAAsB,EAAE,0BAA0B,CAAC;YAC7D,SAAS,EAAE,CAAC,gBAAgB,CAAC,UAAU,CAAC;SACzC,CAAC,CACH,CAAA;QAED,MAAM,QAAQ,GAAG,IAAI,MAAM,CAAC,QAAQ,CAAC,IAAI,EAAE,gBAAgB,EAAE;YAC3D,IAAI,EAAE,IAAI,MAAM,CAAC,UAAU,CACzB,qBAAqB,8BAAa,CAAC,QAAQ,EAAE,GAAG,CACjD;YACD,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC,WAAW;YACnC,OAAO,EAAE,eAAe;YACxB,YAAY,EAAE,KAAK,CAAC,kBAAkB;YACtC,WAAW,EAAE;gBACX,YAAY,EAAE,gBAAgB,CAAC,WAAW;aAC3C;YACD,OAAO,EAAE,GAAG,CAAC,QAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SAClC,CAAC,CAAA;QAEF,QAAQ,CAAC,WAAW,CAAC,eAAe,CAAC,CAAA;QAErC,QAAQ,CAAC,eAAe,CACtB,IAAI,GAAG,CAAC,eAAe,CAAC;YACtB,OAAO,EAAE,CAAC,0BAA0B,CAAC;YACrC,SAAS,EAAE,CAAC,gBAAgB,CAAC,UAAU,CAAC;SACzC,CAAC,CACH,CAAA;QAED,QAAQ,CAAC,eAAe,CACtB,IAAI,GAAG,CAAC,eAAe,CAAC;YACtB,OAAO,EAAE,CAAC,mBAAmB,CAAC;YAC9B,SAAS,EAAE;gBACT,gBAAgB,MAAM,IAAI,OAAO,6BAA6B,gBAAgB,CAAC,WAAW,eAAe;aAC1G;SACF,CAAC,CACH,CAAA;QAED,IAAI,GAAG,CAAC,SAAS,CAAC,IAAI,EAAE,oBAAoB,EAAE;YAC5C,KAAK,EAAE,eAAe,CAAC,OAAO;SAC/B,CAAC,CAAA;QACF,IAAI,GAAG,CAAC,SAAS,CAAC,IAAI,EAAE,mBAAmB,EAAE;YAC3C,KAAK,EAAE,QAAQ,CAAC,WAAW;SAC5B,CAAC,CAAA;QACF,IAAI,GAAG,CAAC,SAAS,CAAC,IAAI,EAAE,wBAAwB,EAAE;YAChD,KAAK,EAAE,aAAa,CAAC,WAAW;SACjC,CAAC,CAAA;IACJ,CAAC;CACF;AAxLD,8BAwLC","sourcesContent":["import * as constructs from \"constructs\"\nimport * as codebuild from \"aws-cdk-lib/aws-codebuild\"\nimport * as iam from \"aws-cdk-lib/aws-iam\"\nimport * as lambda from \"aws-cdk-lib/aws-lambda\"\nimport * as s3 from \"aws-cdk-lib/aws-s3\"\nimport * as cdk from \"aws-cdk-lib\"\nimport * as secretsmanager from \"aws-cdk-lib/aws-secretsmanager\"\nimport { startDeployHandler } from \"./start-deploy-handler\"\nimport { statusHandler } from \"./status-handler\"\n\ninterface Props extends cdk.StackProps {\n  /**\n   * The role that will be granted permission to assume the deploy\n   * role. This role must have permission to assume the deploy role.\n   */\n  callerRoleArn: string\n  /**\n   * The name that will be used for the deploy role. This is the role\n   * that the caller will assume in order to have permission to invoke\n   * the Lambda Functions.\n   */\n  roleName: string\n  /**\n   * The bucket used for storing artifacts. This is used to grant\n   * permission to the role to read artifact. If the bucket is in\n   * another account, it must have a policy which allows the target\n   * account to use IAM permissions from target account.\n   */\n  artifactsBucketName: string\n  startDeployFunctionName: string\n  statusFunctionName: string\n  /**\n   * This is the stack name used with `cdk bootstrap` and can e\n   * found in cdk.json as \"toolkitStackName\".\n   */\n  cdkToolkitStackName: string\n  /**\n   * We pass the CDK context values as they contain feature flags\n   * used by the CDK CLI.\n   */\n  cdkContext: Record<string, string | string[]>\n  /**\n   * The secret containing username and password (or access token)\n   * for a valid docker user. This is used to access private\n   * repositories or to handle docker hub's pull rate limiting.\n   */\n  dockerCredentialsSecretName?: string\n}\n\n/**\n * This construct is responsible for the privileges and logic of\n * automatically deploying stack resources in an account.\n * Its resources are used from a deployment pipeline.\n *\n * The deployment is performed by invoking the \"start deploy\"\n * lambda with details of what should be deployed. As this is\n * responsible for deploying infrastructure, the principal invoking\n * might be able to cause privilege escalation. The principal invoking\n * should be assumed to have full administrator access.\n *\n * The process deploying the infrastructure is locked down so this\n * is only possibly by deployment through CloudFormation, and as\n * such removes a lot of possible escalation paths (e.g. no role\n * can be created by direct API call).\n *\n * The \"status\" lambda can be used to poll for completion, and will\n * also return logs from the job upon completion.\n */\nexport class CdkDeploy extends constructs.Construct {\n  constructor(scope: constructs.Construct, id: string, props: Props) {\n    super(scope, id)\n\n    const account = cdk.Stack.of(this).account\n    const region = cdk.Stack.of(this).region\n\n    const artifactsBucket = s3.Bucket.fromBucketName(\n      this,\n      \"ArtifactsBucket\",\n      props.artifactsBucketName,\n    )\n\n    const roleToBeAssumed = new iam.Role(this, \"Role\", {\n      roleName: props.roleName,\n      assumedBy: new iam.ArnPrincipal(props.callerRoleArn),\n    })\n\n    // Bucked used for input to CodeBuild.\n    // We let CloudFormation manage the bucket name.\n    const codebuildBucket = new s3.Bucket(this, \"CodebuildSourceBucket\", {\n      encryption: s3.BucketEncryption.S3_MANAGED,\n      blockPublicAccess: s3.BlockPublicAccess.BLOCK_ALL,\n      lifecycleRules: [\n        {\n          expiration: cdk.Duration.days(5),\n        },\n      ],\n    })\n\n    // The role used for CloudFormation deployment.\n    const cloudFormationRole = new iam.Role(this, \"CloudFormationRole\", {\n      assumedBy: new iam.ServicePrincipal(\"cloudformation.amazonaws.com\"),\n      managedPolicies: [\n        // TODO: Can we restrict this a bit more? E.g. look into how Griid has\n        //  limited what the individual stack deployments have permissions to do.\n        iam.ManagedPolicy.fromAwsManagedPolicyName(\"AdministratorAccess\"),\n      ],\n    })\n\n    // Replace CodeBuild with ECS task?\n    // See https://aws.amazon.com/blogs/devops/using-aws-codebuild-to-execute-administrative-tasks/\n    const codebuildProject = new codebuild.Project(this, \"CodebuildProject\", {\n      environment: {\n        buildImage:\n          props.dockerCredentialsSecretName == null\n            ? codebuild.LinuxBuildImage.fromDockerRegistry(\"node:16\")\n            : codebuild.LinuxBuildImage.fromDockerRegistry(\"node:16\", {\n                secretsManagerCredentials:\n                  secretsmanager.Secret.fromSecretNameV2(\n                    this,\n                    \"dockerCredentialsSecretName\",\n                    props.dockerCredentialsSecretName,\n                  ),\n              }),\n      },\n      buildSpec: codebuild.BuildSpec.fromObject({\n        version: \"0.2\",\n        env: {\n          variables: {\n            CDK_DEPLOY_ROLE_ARN: cloudFormationRole.roleArn,\n            CDK_TOOLKIT_STACK_NAME: props.cdkToolkitStackName,\n          },\n        },\n        phases: {\n          build: {\n            commands: [\n              \"npm install -g aws-cdk\",\n              'cdk --app \"$CODEBUILD_SRC_DIR_CLOUDASSEMBLY\" --role-arn \"$CDK_DEPLOY_ROLE_ARN\" --toolkit-stack-name \"$CDK_TOOLKIT_STACK_NAME\" --require-approval never deploy --exclusively $(cat stack-names.txt)',\n            ],\n          },\n        },\n      }),\n      timeout: cdk.Duration.hours(4),\n    })\n\n    // Grant access to CloudFormation.\n    codebuildProject.addToRolePolicy(\n      new iam.PolicyStatement({\n        actions: [\n          // For diff.\n          \"cloudformation:DescribeStacks\",\n          \"cloudformation:GetTemplate\",\n          // For deploy.\n          \"cloudformation:CreateChangeSet\",\n          \"cloudformation:DeleteStack\",\n          \"cloudformation:DescribeChangeSet\",\n          \"cloudformation:ExecuteChangeSet\",\n          \"cloudformation:DescribeStackEvents\",\n          \"cloudformation:DeleteChangeSet\",\n        ],\n        resources: [\"*\"],\n      }),\n    )\n\n    // Grant access to the CDK Toolkit bucket.\n    codebuildProject.addToRolePolicy(\n      new iam.PolicyStatement({\n        actions: [\n          \"s3:GetObject*\",\n          \"s3:GetBucket*\",\n          \"s3:List*\",\n          \"s3:PutObject*\",\n          \"s3:Abort*\",\n          \"s3:DeleteObject*\",\n        ],\n        resources: [\n          `arn:aws:s3:::${props.cdkToolkitStackName.toLowerCase()}-stagingbucket-*`,\n        ],\n      }),\n    )\n\n    artifactsBucket.grantRead(codebuildProject)\n\n    cloudFormationRole.grantPassRole(codebuildProject.role!)\n\n    codebuildBucket.grantReadWrite(codebuildProject)\n\n    const startDeployFn = new lambda.Function(this, \"StartDeployFunction\", {\n      code: new lambda.InlineCode(\n        `exports.handler = ${startDeployHandler.toString()};`,\n      ),\n      runtime: lambda.Runtime.NODEJS_16_X,\n      handler: \"index.handler\",\n      functionName: props.startDeployFunctionName,\n      environment: {\n        PROJECT_NAME: codebuildProject.projectName,\n        BUCKET_NAME: codebuildBucket.bucketName,\n        CDK_CONTEXT: JSON.stringify(props.cdkContext),\n      },\n      timeout: cdk.Duration.seconds(30),\n    })\n\n    startDeployFn.grantInvoke(roleToBeAssumed)\n    codebuildBucket.grantReadWrite(startDeployFn)\n\n    startDeployFn.addToRolePolicy(\n      new iam.PolicyStatement({\n        actions: [\"codebuild:StartBuild\", \"codebuild:BatchGetBuilds\"],\n        resources: [codebuildProject.projectArn],\n      }),\n    )\n\n    const statusFn = new lambda.Function(this, \"StatusFunction\", {\n      code: new lambda.InlineCode(\n        `exports.handler = ${statusHandler.toString()};`,\n      ),\n      runtime: lambda.Runtime.NODEJS_16_X,\n      handler: \"index.handler\",\n      functionName: props.statusFunctionName,\n      environment: {\n        PROJECT_NAME: codebuildProject.projectName,\n      },\n      timeout: cdk.Duration.seconds(30),\n    })\n\n    statusFn.grantInvoke(roleToBeAssumed)\n\n    statusFn.addToRolePolicy(\n      new iam.PolicyStatement({\n        actions: [\"codebuild:BatchGetBuilds\"],\n        resources: [codebuildProject.projectArn],\n      }),\n    )\n\n    statusFn.addToRolePolicy(\n      new iam.PolicyStatement({\n        actions: [\"logs:GetLogEvents\"],\n        resources: [\n          `arn:aws:logs:${region}:${account}:log-group:/aws/codebuild/${codebuildProject.projectName}:log-stream:*`,\n        ],\n      }),\n    )\n\n    new cdk.CfnOutput(this, \"RoleToBeAssumedArn\", {\n      value: roleToBeAssumed.roleArn,\n    })\n    new cdk.CfnOutput(this, \"StatusFunctionArn\", {\n      value: statusFn.functionArn,\n    })\n    new cdk.CfnOutput(this, \"StartDeployFunctionArn\", {\n      value: startDeployFn.functionArn,\n    })\n  }\n}\n"]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
export { CdkDeploy } from "./cdk-deploy";
|
|
@@ -0,0 +1,6 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.CdkDeploy = void 0;
|
|
4
|
+
var cdk_deploy_1 = require("./cdk-deploy");
|
|
5
|
+
Object.defineProperty(exports, "CdkDeploy", { enumerable: true, get: function () { return cdk_deploy_1.CdkDeploy; } });
|
|
6
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi9zcmMvY2RrLWRlcGxveS9pbmRleC50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiOzs7QUFBQSwyQ0FBd0M7QUFBL0IsdUdBQUEsU0FBUyxPQUFBIiwic291cmNlc0NvbnRlbnQiOlsiZXhwb3J0IHsgQ2RrRGVwbG95IH0gZnJvbSBcIi4vY2RrLWRlcGxveVwiXG4iXX0=
|