@liflig/cdk 2.18.5 → 2.18.6
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/assets/cloudtrail-slack-integration-lambda/main.py +267 -0
- package/assets/pipeline-slack-notification-lambda/index.py +300 -0
- package/assets/prepare-cdk-source-lambda/index.py +159 -0
- package/assets/slack-alarm-lambda/index.py +103 -0
- package/lib/alarms/database-alarms.d.ts +125 -0
- package/lib/alarms/database-alarms.js +171 -0
- package/lib/alarms/index.d.ts +3 -0
- package/lib/alarms/index.js +10 -0
- package/lib/alarms/service-alarms.d.ts +145 -0
- package/lib/alarms/service-alarms.js +148 -0
- package/lib/alarms/ses-alarms.d.ts +67 -0
- package/lib/alarms/ses-alarms.js +49 -0
- package/lib/alarms/slack-alarm.d.ts +25 -0
- package/lib/alarms/slack-alarm.js +47 -0
- package/lib/bastion-host.d.ts +41 -0
- package/lib/bastion-host.js +86 -0
- package/lib/bin/cdk-create-snapshots.d.ts +2 -0
- package/lib/bin/fetch-pipeline-variables.d.ts +2 -0
- package/lib/build-artifacts/index.d.ts +68 -0
- package/lib/build-artifacts/index.js +118 -0
- package/lib/cdk-deploy/cdk-deploy.d.ts +63 -0
- package/lib/cdk-deploy/cdk-deploy.js +175 -0
- package/lib/cdk-deploy/index.d.ts +1 -0
- package/lib/cdk-deploy/index.js +6 -0
- package/lib/cdk-deploy/start-deploy-handler.d.ts +8 -0
- package/lib/cdk-deploy/start-deploy-handler.js +72 -0
- package/lib/cdk-deploy/status-handler.d.ts +6 -0
- package/lib/cdk-deploy/status-handler.js +83 -0
- package/lib/cdk-pipelines/cloud-assembly-lookup-handler.d.ts +6 -0
- package/lib/cdk-pipelines/cloud-assembly-lookup-handler.js +63 -0
- package/lib/cdk-pipelines/index.d.ts +3 -0
- package/lib/cdk-pipelines/index.js +10 -0
- package/lib/cdk-pipelines/liflig-cdk-pipeline.d.ts +110 -0
- package/lib/cdk-pipelines/liflig-cdk-pipeline.js +232 -0
- package/lib/cdk-pipelines/slack-notification.d.ts +51 -0
- package/lib/cdk-pipelines/slack-notification.js +54 -0
- package/lib/cdk-pipelines/variables.d.ts +15 -0
- package/lib/cdk-pipelines/variables.js +80 -0
- package/lib/cloudtrail-slack-integration/cloudtrail-slack-integration.d.ts +47 -0
- package/lib/cloudtrail-slack-integration/cloudtrail-slack-integration.js +211 -0
- package/lib/cloudtrail-slack-integration/index.d.ts +1 -0
- package/lib/cloudtrail-slack-integration/index.js +6 -0
- package/lib/configure-parameters/configure-parameters.d.ts +61 -0
- package/lib/configure-parameters/configure-parameters.js +94 -0
- package/lib/configure-parameters/index.d.ts +1 -0
- package/lib/configure-parameters/index.js +6 -0
- package/lib/cross-region-ssm-parameter.d.ts +13 -0
- package/lib/cross-region-ssm-parameter.js +46 -0
- package/lib/ecs/cluster.d.ts +25 -0
- package/lib/ecs/cluster.js +70 -0
- package/lib/ecs/fargate-service.d.ts +63 -0
- package/lib/ecs/fargate-service.js +98 -0
- package/lib/ecs/index.d.ts +3 -0
- package/lib/ecs/index.js +10 -0
- package/lib/ecs/listener-rule.d.ts +25 -0
- package/lib/ecs/listener-rule.js +27 -0
- package/lib/ecs-update-image/artifact-status.d.ts +39 -0
- package/lib/ecs-update-image/artifact-status.js +41 -0
- package/lib/ecs-update-image/ecs-update-image.d.ts +41 -0
- package/lib/ecs-update-image/ecs-update-image.js +98 -0
- package/lib/ecs-update-image/index.d.ts +3 -0
- package/lib/ecs-update-image/index.js +10 -0
- package/lib/ecs-update-image/start-deploy-handler.d.ts +6 -0
- package/lib/ecs-update-image/start-deploy-handler.js +104 -0
- package/lib/ecs-update-image/status-handler.d.ts +11 -0
- package/lib/ecs-update-image/status-handler.js +74 -0
- package/lib/ecs-update-image/tag.d.ts +47 -0
- package/lib/ecs-update-image/tag.js +67 -0
- package/lib/feature-flags.d.ts +18 -0
- package/lib/feature-flags.js +48 -0
- package/lib/griid/artefact-bucket.d.ts +7 -0
- package/lib/griid/artefact-bucket.js +30 -0
- package/lib/griid/index.d.ts +4 -0
- package/lib/griid/index.js +18 -0
- package/lib/hosted-zone-with-param.d.ts +29 -0
- package/lib/hosted-zone-with-param.js +65 -0
- package/lib/index.d.ts +32 -0
- package/lib/kinesis/index.d.ts +1 -0
- package/lib/kinesis/index.js +6 -0
- package/lib/kinesis/kinesis-to-datadog-stream.d.ts +28 -0
- package/lib/kinesis/kinesis-to-datadog-stream.js +126 -0
- package/lib/load-balancer/index.d.ts +1 -0
- package/lib/load-balancer/index.js +6 -0
- package/lib/load-balancer/load-balancer.d.ts +16 -0
- package/lib/load-balancer/load-balancer.js +60 -0
- package/lib/pipelines/conventions.d.ts +14 -0
- package/lib/pipelines/conventions.js +24 -0
- package/lib/pipelines/deploy-env.d.ts +18 -0
- package/lib/pipelines/deploy-env.js +96 -0
- package/lib/pipelines/index.d.ts +2 -0
- package/lib/pipelines/index.js +8 -0
- package/lib/pipelines/liflig-cdk-deployer-deps.d.ts +13 -0
- package/lib/pipelines/liflig-cdk-deployer-deps.js +35 -0
- package/lib/pipelines/pipeline.d.ts +78 -0
- package/lib/pipelines/pipeline.js +224 -0
- package/lib/platform/index.d.ts +1 -0
- package/lib/platform/index.js +7 -0
- package/lib/platform/platform.d.ts +37 -0
- package/lib/platform/platform.js +57 -0
- package/lib/rds/database.d.ts +49 -0
- package/lib/rds/database.js +60 -0
- package/lib/rds/index.d.ts +1 -0
- package/lib/rds/index.js +6 -0
- package/lib/ses/configurationsetdeliveryoptions/index.d.ts +26 -0
- package/lib/ses/configurationsetdeliveryoptions/index.js +48 -0
- package/lib/ses/configurationsetsnsdestination/handler.d.ts +17 -0
- package/lib/ses/configurationsetsnsdestination/handler.js +75 -0
- package/lib/ses/configurationsetsnsdestination/index.d.ts +29 -0
- package/lib/ses/configurationsetsnsdestination/index.js +75 -0
- package/lib/ses/index.d.ts +4 -0
- package/lib/ses/index.js +12 -0
- package/lib/ses/sesdomain/handler.d.ts +10 -0
- package/lib/ses/sesdomain/handler.js +82 -0
- package/lib/ses/sesdomain/index.d.ts +57 -0
- package/lib/ses/sesdomain/index.js +94 -0
- package/lib/ses/sesverifyemail/handler.d.ts +9 -0
- package/lib/ses/sesverifyemail/handler.js +25 -0
- package/lib/ses/sesverifyemail/index.d.ts +13 -0
- package/lib/ses/sesverifyemail/index.js +51 -0
- package/lib/snapshots.d.ts +4 -0
- package/lib/snapshots.js +214 -0
- package/lib/ssm-parameter-backed-resource.d.ts +45 -0
- package/lib/ssm-parameter-backed-resource.js +67 -0
- package/lib/ssm-parameter-reader.d.ts +21 -0
- package/lib/ssm-parameter-reader.js +48 -0
- package/lib/tags.d.ts +8 -0
- package/lib/tags.js +36 -0
- package/lib/utils.d.ts +2 -0
- package/lib/utils.js +17 -0
- package/lib/webapp/index.d.ts +3 -0
- package/lib/webapp/index.js +10 -0
- package/lib/webapp/monitor.d.ts +187 -0
- package/lib/webapp/monitor.js +156 -0
- package/lib/webapp/security-headers.d.ts +38 -0
- package/lib/webapp/security-headers.js +129 -0
- package/lib/webapp/webapp.d.ts +116 -0
- package/lib/webapp/webapp.js +118 -0
- package/lib/webapp-deploy-via-role.d.ts +25 -0
- package/lib/webapp-deploy-via-role.js +32 -0
- package/package.json +3 -2
|
@@ -0,0 +1,104 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.startDeployHandler = void 0;
|
|
4
|
+
// This function is inline-compiled for the lambda.
|
|
5
|
+
// It must be self-contained.
|
|
6
|
+
const startDeployHandler = async (event) => {
|
|
7
|
+
const AWS = require("aws-sdk");
|
|
8
|
+
const ecs = new AWS.ECS();
|
|
9
|
+
const sm = new AWS.SecretsManager();
|
|
10
|
+
function requireEnv(name) {
|
|
11
|
+
const value = process.env[name];
|
|
12
|
+
if (value === undefined) {
|
|
13
|
+
throw new Error(`Missing ${name}`);
|
|
14
|
+
}
|
|
15
|
+
return value;
|
|
16
|
+
}
|
|
17
|
+
async function getService(clusterName, serviceName) {
|
|
18
|
+
var _a;
|
|
19
|
+
const services = await ecs
|
|
20
|
+
.describeServices({
|
|
21
|
+
cluster: clusterName,
|
|
22
|
+
services: [serviceName],
|
|
23
|
+
})
|
|
24
|
+
.promise();
|
|
25
|
+
if (((_a = services.services) === null || _a === void 0 ? void 0 : _a.length) !== 1) {
|
|
26
|
+
throw new Error(`Service not found: ${clusterName}/${serviceName}`);
|
|
27
|
+
}
|
|
28
|
+
return services.services[0];
|
|
29
|
+
}
|
|
30
|
+
async function getTaskDefinition(taskDefinition) {
|
|
31
|
+
return (await ecs
|
|
32
|
+
.describeTaskDefinition({
|
|
33
|
+
taskDefinition: taskDefinition,
|
|
34
|
+
})
|
|
35
|
+
.promise()).taskDefinition;
|
|
36
|
+
}
|
|
37
|
+
async function updateServiceToImage(clusterName, serviceName, image) {
|
|
38
|
+
console.log(`Cluster name: ${clusterName}`);
|
|
39
|
+
console.log(`Service name: ${serviceName}`);
|
|
40
|
+
const service = await getService(clusterName, serviceName);
|
|
41
|
+
const prevTaskDefinition = await getTaskDefinition(service.taskDefinition);
|
|
42
|
+
// Don't bother updating the service if the image is already the latest.
|
|
43
|
+
const prevImage = prevTaskDefinition.containerDefinitions[0].image;
|
|
44
|
+
if (prevImage === image) {
|
|
45
|
+
return;
|
|
46
|
+
}
|
|
47
|
+
console.log(`Updating image for service '${serviceName}' from '${prevImage}' to '${image}'`);
|
|
48
|
+
const exclude = [
|
|
49
|
+
"registeredAt",
|
|
50
|
+
"registeredBy",
|
|
51
|
+
"compatibilities",
|
|
52
|
+
"requiresAttributes",
|
|
53
|
+
"revision",
|
|
54
|
+
"status",
|
|
55
|
+
"taskDefinitionArn",
|
|
56
|
+
];
|
|
57
|
+
const updatedSpec = {
|
|
58
|
+
...Object.fromEntries(Object.entries(prevTaskDefinition).filter(([key]) => !exclude.includes(key))),
|
|
59
|
+
containerDefinitions: [
|
|
60
|
+
{
|
|
61
|
+
...prevTaskDefinition.containerDefinitions[0],
|
|
62
|
+
image,
|
|
63
|
+
},
|
|
64
|
+
],
|
|
65
|
+
};
|
|
66
|
+
const updatedTaskDefinition = (await ecs.registerTaskDefinition(updatedSpec).promise()).taskDefinition;
|
|
67
|
+
await ecs
|
|
68
|
+
.updateService({
|
|
69
|
+
cluster: clusterName,
|
|
70
|
+
service: serviceName,
|
|
71
|
+
taskDefinition: updatedTaskDefinition.taskDefinitionArn,
|
|
72
|
+
})
|
|
73
|
+
.promise();
|
|
74
|
+
console.log("Service is updated");
|
|
75
|
+
}
|
|
76
|
+
const clusterName = requireEnv("CLUSTER_NAME");
|
|
77
|
+
const serviceName = requireEnv("SERVICE_NAME");
|
|
78
|
+
const repositoryUrl = requireEnv("REPOSITORY_URL");
|
|
79
|
+
const ecrTagSecretArn = requireEnv("ECR_TAG_SECRET_ARN");
|
|
80
|
+
// Validate the input.
|
|
81
|
+
if (typeof event.tag !== "string") {
|
|
82
|
+
throw new Error("Input invalid: " + JSON.stringify(event, undefined, " "));
|
|
83
|
+
}
|
|
84
|
+
// Register tag as current target.
|
|
85
|
+
// This is needed so that CloudFormation deployments, e.g.
|
|
86
|
+
// updates to the Task Definition, will use the same image.
|
|
87
|
+
await sm
|
|
88
|
+
.updateSecret({
|
|
89
|
+
SecretId: ecrTagSecretArn,
|
|
90
|
+
SecretString: JSON.stringify({
|
|
91
|
+
tag: event.tag,
|
|
92
|
+
}),
|
|
93
|
+
})
|
|
94
|
+
.promise();
|
|
95
|
+
// Update the service if we know the service name. This is unknown
|
|
96
|
+
// during initial deployment of the stack.
|
|
97
|
+
if (serviceName !== "") {
|
|
98
|
+
const image = `${repositoryUrl}:${event.tag}`;
|
|
99
|
+
await updateServiceToImage(clusterName, serviceName, image);
|
|
100
|
+
}
|
|
101
|
+
return {};
|
|
102
|
+
};
|
|
103
|
+
exports.startDeployHandler = startDeployHandler;
|
|
104
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"start-deploy-handler.js","sourceRoot":"","sources":["../../src/ecs-update-image/start-deploy-handler.ts"],"names":[],"mappings":";;;AAaA,mDAAmD;AACnD,6BAA6B;AACtB,MAAM,kBAAkB,GAAoC,KAAK,EACtE,KAAK,EACL,EAAE;IACF,MAAM,GAAG,GAAG,OAAO,CAAC,SAAS,CAAC,CAAA;IAC9B,MAAM,GAAG,GAAG,IAAI,GAAG,CAAC,GAAG,EAAc,CAAA;IACrC,MAAM,EAAE,GAAG,IAAI,GAAG,CAAC,cAAc,EAAyB,CAAA;IAE1D,SAAS,UAAU,CAAC,IAAY;QAC9B,MAAM,KAAK,GAAG,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,CAAA;QAC/B,IAAI,KAAK,KAAK,SAAS,EAAE,CAAC;YACxB,MAAM,IAAI,KAAK,CAAC,WAAW,IAAI,EAAE,CAAC,CAAA;QACpC,CAAC;QACD,OAAO,KAAK,CAAA;IACd,CAAC;IAED,KAAK,UAAU,UAAU,CACvB,WAAmB,EACnB,WAAmB;;QAEnB,MAAM,QAAQ,GAAG,MAAM,GAAG;aACvB,gBAAgB,CAAC;YAChB,OAAO,EAAE,WAAW;YACpB,QAAQ,EAAE,CAAC,WAAW,CAAC;SACxB,CAAC;aACD,OAAO,EAAE,CAAA;QAEZ,IAAI,CAAA,MAAA,QAAQ,CAAC,QAAQ,0CAAE,MAAM,MAAK,CAAC,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CAAC,sBAAsB,WAAW,IAAI,WAAW,EAAE,CAAC,CAAA;QACrE,CAAC;QAED,OAAO,QAAQ,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAA;IAC7B,CAAC;IAED,KAAK,UAAU,iBAAiB,CAC9B,cAAsB;QAEtB,OAAO,CACL,MAAM,GAAG;aACN,sBAAsB,CAAC;YACtB,cAAc,EAAE,cAAc;SAC/B,CAAC;aACD,OAAO,EAAE,CACb,CAAC,cAAe,CAAA;IACnB,CAAC;IAED,KAAK,UAAU,oBAAoB,CACjC,WAAmB,EACnB,WAAmB,EACnB,KAAa;QAEb,OAAO,CAAC,GAAG,CAAC,iBAAiB,WAAW,EAAE,CAAC,CAAA;QAC3C,OAAO,CAAC,GAAG,CAAC,iBAAiB,WAAW,EAAE,CAAC,CAAA;QAE3C,MAAM,OAAO,GAAG,MAAM,UAAU,CAAC,WAAW,EAAE,WAAW,CAAC,CAAA;QAC1D,MAAM,kBAAkB,GAAG,MAAM,iBAAiB,CAAC,OAAO,CAAC,cAAe,CAAC,CAAA;QAE3E,wEAAwE;QACxE,MAAM,SAAS,GAAG,kBAAkB,CAAC,oBAAqB,CAAC,CAAC,CAAC,CAAC,KAAM,CAAA;QACpE,IAAI,SAAS,KAAK,KAAK,EAAE,CAAC;YACxB,OAAM;QACR,CAAC;QAED,OAAO,CAAC,GAAG,CACT,+BAA+B,WAAW,WAAW,SAAS,SAAS,KAAK,GAAG,CAChF,CAAA;QAED,MAAM,OAAO,GAAG;YACd,cAAc;YACd,cAAc;YACd,iBAAiB;YACjB,oBAAoB;YACpB,UAAU;YACV,QAAQ;YACR,mBAAmB;SACpB,CAAA;QAED,MAAM,WAAW,GAAkC;YACjD,GAAG,MAAM,CAAC,WAAW,CACnB,MAAM,CAAC,OAAO,CAAC,kBAAkB,CAAC,CAAC,MAAM,CACvC,CAAC,CAAC,GAAG,CAAC,EAAE,EAAE,CAAC,CAAC,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAC,CAClC,CACF;YACD,oBAAoB,EAAE;gBACpB;oBACE,GAAG,kBAAkB,CAAC,oBAAqB,CAAC,CAAC,CAAC;oBAC9C,KAAK;iBACN;aACF;SAC+B,CAAA;QAElC,MAAM,qBAAqB,GAAG,CAC5B,MAAM,GAAG,CAAC,sBAAsB,CAAC,WAAW,CAAC,CAAC,OAAO,EAAE,CACxD,CAAC,cAAe,CAAA;QAEjB,MAAM,GAAG;aACN,aAAa,CAAC;YACb,OAAO,EAAE,WAAW;YACpB,OAAO,EAAE,WAAW;YACpB,cAAc,EAAE,qBAAqB,CAAC,iBAAiB;SACxD,CAAC;aACD,OAAO,EAAE,CAAA;QAEZ,OAAO,CAAC,GAAG,CAAC,oBAAoB,CAAC,CAAA;IACnC,CAAC;IAED,MAAM,WAAW,GAAG,UAAU,CAAC,cAAc,CAAC,CAAA;IAC9C,MAAM,WAAW,GAAG,UAAU,CAAC,cAAc,CAAC,CAAA;IAC9C,MAAM,aAAa,GAAG,UAAU,CAAC,gBAAgB,CAAC,CAAA;IAClD,MAAM,eAAe,GAAG,UAAU,CAAC,oBAAoB,CAAC,CAAA;IAExD,sBAAsB;IACtB,IAAI,OAAO,KAAK,CAAC,GAAG,KAAK,QAAQ,EAAE,CAAC;QAClC,MAAM,IAAI,KAAK,CAAC,iBAAiB,GAAG,IAAI,CAAC,SAAS,CAAC,KAAK,EAAE,SAAS,EAAE,IAAI,CAAC,CAAC,CAAA;IAC7E,CAAC;IAED,kCAAkC;IAClC,0DAA0D;IAC1D,2DAA2D;IAC3D,MAAM,EAAE;SACL,YAAY,CAAC;QACZ,QAAQ,EAAE,eAAe;QACzB,YAAY,EAAE,IAAI,CAAC,SAAS,CAAC;YAC3B,GAAG,EAAE,KAAK,CAAC,GAAG;SACf,CAAC;KACH,CAAC;SACD,OAAO,EAAE,CAAA;IAEZ,kEAAkE;IAClE,0CAA0C;IAC1C,IAAI,WAAW,KAAK,EAAE,EAAE,CAAC;QACvB,MAAM,KAAK,GAAG,GAAG,aAAa,IAAI,KAAK,CAAC,GAAG,EAAE,CAAA;QAC7C,MAAM,oBAAoB,CAAC,WAAW,EAAE,WAAW,EAAE,KAAK,CAAC,CAAA;IAC7D,CAAC;IAED,OAAO,EAAE,CAAA;AACX,CAAC,CAAA;AAvIY,QAAA,kBAAkB,sBAuI9B","sourcesContent":["/* eslint-disable @typescript-eslint/no-unsafe-assignment */\n/* eslint-disable @typescript-eslint/no-unsafe-call */\n/* eslint-disable @typescript-eslint/no-unsafe-member-access */\n/* eslint-disable @typescript-eslint/no-unsafe-return */\n/* eslint-disable @typescript-eslint/no-var-requires */\nimport type { Handler } from \"aws-lambda\"\nimport type * as _AWS from \"aws-sdk\"\nimport { RegisterTaskDefinitionRequest } from \"aws-sdk/clients/ecs\"\n\ninterface ExpectedInput {\n  tag: string\n}\n\n// This function is inline-compiled for the lambda.\n// It must be self-contained.\nexport const startDeployHandler: Handler<Partial<ExpectedInput>> = async (\n  event,\n) => {\n  const AWS = require(\"aws-sdk\")\n  const ecs = new AWS.ECS() as _AWS.ECS\n  const sm = new AWS.SecretsManager() as _AWS.SecretsManager\n\n  function requireEnv(name: string): string {\n    const value = process.env[name]\n    if (value === undefined) {\n      throw new Error(`Missing ${name}`)\n    }\n    return value\n  }\n\n  async function getService(\n    clusterName: string,\n    serviceName: string,\n  ): Promise<AWS.ECS.Service> {\n    const services = await ecs\n      .describeServices({\n        cluster: clusterName,\n        services: [serviceName],\n      })\n      .promise()\n\n    if (services.services?.length !== 1) {\n      throw new Error(`Service not found: ${clusterName}/${serviceName}`)\n    }\n\n    return services.services[0]\n  }\n\n  async function getTaskDefinition(\n    taskDefinition: string,\n  ): Promise<AWS.ECS.TaskDefinition> {\n    return (\n      await ecs\n        .describeTaskDefinition({\n          taskDefinition: taskDefinition,\n        })\n        .promise()\n    ).taskDefinition!\n  }\n\n  async function updateServiceToImage(\n    clusterName: string,\n    serviceName: string,\n    image: string,\n  ) {\n    console.log(`Cluster name: ${clusterName}`)\n    console.log(`Service name: ${serviceName}`)\n\n    const service = await getService(clusterName, serviceName)\n    const prevTaskDefinition = await getTaskDefinition(service.taskDefinition!)\n\n    // Don't bother updating the service if the image is already the latest.\n    const prevImage = prevTaskDefinition.containerDefinitions![0].image!\n    if (prevImage === image) {\n      return\n    }\n\n    console.log(\n      `Updating image for service '${serviceName}' from '${prevImage}' to '${image}'`,\n    )\n\n    const exclude = [\n      \"registeredAt\",\n      \"registeredBy\",\n      \"compatibilities\",\n      \"requiresAttributes\",\n      \"revision\",\n      \"status\",\n      \"taskDefinitionArn\",\n    ]\n\n    const updatedSpec: RegisterTaskDefinitionRequest = {\n      ...Object.fromEntries(\n        Object.entries(prevTaskDefinition).filter(\n          ([key]) => !exclude.includes(key),\n        ),\n      ),\n      containerDefinitions: [\n        {\n          ...prevTaskDefinition.containerDefinitions![0],\n          image,\n        },\n      ],\n    } as RegisterTaskDefinitionRequest\n\n    const updatedTaskDefinition = (\n      await ecs.registerTaskDefinition(updatedSpec).promise()\n    ).taskDefinition!\n\n    await ecs\n      .updateService({\n        cluster: clusterName,\n        service: serviceName,\n        taskDefinition: updatedTaskDefinition.taskDefinitionArn,\n      })\n      .promise()\n\n    console.log(\"Service is updated\")\n  }\n\n  const clusterName = requireEnv(\"CLUSTER_NAME\")\n  const serviceName = requireEnv(\"SERVICE_NAME\")\n  const repositoryUrl = requireEnv(\"REPOSITORY_URL\")\n  const ecrTagSecretArn = requireEnv(\"ECR_TAG_SECRET_ARN\")\n\n  // Validate the input.\n  if (typeof event.tag !== \"string\") {\n    throw new Error(\"Input invalid: \" + JSON.stringify(event, undefined, \"  \"))\n  }\n\n  // Register tag as current target.\n  // This is needed so that CloudFormation deployments, e.g.\n  // updates to the Task Definition, will use the same image.\n  await sm\n    .updateSecret({\n      SecretId: ecrTagSecretArn,\n      SecretString: JSON.stringify({\n        tag: event.tag,\n      }),\n    })\n    .promise()\n\n  // Update the service if we know the service name. This is unknown\n  // during initial deployment of the stack.\n  if (serviceName !== \"\") {\n    const image = `${repositoryUrl}:${event.tag}`\n    await updateServiceToImage(clusterName, serviceName, image)\n  }\n\n  return {}\n}\n"]}
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
import type { Handler } from "aws-lambda";
|
|
2
|
+
interface Response {
|
|
3
|
+
/**
|
|
4
|
+
* The tag is unknown when the stack is not yet fully set up
|
|
5
|
+
* during initial account/service deployment.
|
|
6
|
+
*/
|
|
7
|
+
currentTag: string | null;
|
|
8
|
+
stabilized: boolean;
|
|
9
|
+
}
|
|
10
|
+
export declare const statusHandler: Handler<unknown, Response>;
|
|
11
|
+
export {};
|
|
@@ -0,0 +1,74 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.statusHandler = void 0;
|
|
4
|
+
// This function is inline-compiled for the lambda.
|
|
5
|
+
// It must be self-contained.
|
|
6
|
+
const statusHandler = async () => {
|
|
7
|
+
var _a;
|
|
8
|
+
const AWS = require("aws-sdk");
|
|
9
|
+
const ecs = new AWS.ECS();
|
|
10
|
+
function requireEnv(name) {
|
|
11
|
+
const value = process.env[name];
|
|
12
|
+
if (value === undefined) {
|
|
13
|
+
throw new Error(`Missing ${name}`);
|
|
14
|
+
}
|
|
15
|
+
return value;
|
|
16
|
+
}
|
|
17
|
+
async function getService(clusterName, serviceName) {
|
|
18
|
+
var _a;
|
|
19
|
+
const services = await ecs
|
|
20
|
+
.describeServices({
|
|
21
|
+
cluster: clusterName,
|
|
22
|
+
services: [serviceName],
|
|
23
|
+
})
|
|
24
|
+
.promise();
|
|
25
|
+
if (((_a = services.services) === null || _a === void 0 ? void 0 : _a.length) !== 1) {
|
|
26
|
+
throw new Error(`Service not found: ${clusterName}/${serviceName}`);
|
|
27
|
+
}
|
|
28
|
+
return services.services[0];
|
|
29
|
+
}
|
|
30
|
+
async function getTaskDefinition(taskDefinition) {
|
|
31
|
+
return (await ecs
|
|
32
|
+
.describeTaskDefinition({
|
|
33
|
+
taskDefinition: taskDefinition,
|
|
34
|
+
})
|
|
35
|
+
.promise()).taskDefinition;
|
|
36
|
+
}
|
|
37
|
+
/**
|
|
38
|
+
* Check if the service is considered to be stabilized.
|
|
39
|
+
*
|
|
40
|
+
* Uses the logic described at
|
|
41
|
+
* https://docs.aws.amazon.com/cli/latest/reference/ecs/wait/services-stable.html
|
|
42
|
+
*/
|
|
43
|
+
function isStabilized(service) {
|
|
44
|
+
var _a;
|
|
45
|
+
return (((_a = service.deployments) === null || _a === void 0 ? void 0 : _a.length) == 1 &&
|
|
46
|
+
service.runningCount == service.desiredCount);
|
|
47
|
+
}
|
|
48
|
+
function extractTag(image) {
|
|
49
|
+
if (!image.includes(":")) {
|
|
50
|
+
return null;
|
|
51
|
+
}
|
|
52
|
+
return image.replace(/.*:/, "");
|
|
53
|
+
}
|
|
54
|
+
const clusterName = requireEnv("CLUSTER_NAME");
|
|
55
|
+
const serviceName = requireEnv("SERVICE_NAME");
|
|
56
|
+
// The service name is unknown during initial deployment of the stack.
|
|
57
|
+
// In this case we return stabilized status as true.
|
|
58
|
+
if (serviceName === "") {
|
|
59
|
+
return {
|
|
60
|
+
currentTag: null,
|
|
61
|
+
stabilized: true,
|
|
62
|
+
};
|
|
63
|
+
}
|
|
64
|
+
const service = await getService(clusterName, serviceName);
|
|
65
|
+
const mainDeployment = (_a = service.deployments) === null || _a === void 0 ? void 0 : _a.find((it) => it.status === "PRIMARY");
|
|
66
|
+
const taskDefinition = await getTaskDefinition(mainDeployment.taskDefinition);
|
|
67
|
+
// Only one container is supported for the task definition.
|
|
68
|
+
return {
|
|
69
|
+
currentTag: extractTag(taskDefinition.containerDefinitions[0].image),
|
|
70
|
+
stabilized: isStabilized(service),
|
|
71
|
+
};
|
|
72
|
+
};
|
|
73
|
+
exports.statusHandler = statusHandler;
|
|
74
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,47 @@
|
|
|
1
|
+
import * as constructs from "constructs";
|
|
2
|
+
import * as iam from "aws-cdk-lib/aws-iam";
|
|
3
|
+
import { EcsUpdateImageArtifactStatus } from "./artifact-status";
|
|
4
|
+
interface Props {
|
|
5
|
+
artifactStatus: EcsUpdateImageArtifactStatus;
|
|
6
|
+
secretName: string;
|
|
7
|
+
}
|
|
8
|
+
/**
|
|
9
|
+
* Container used for holding the current ECR tag for a ECS service.
|
|
10
|
+
*
|
|
11
|
+
* Since we are deploying our ECS services from both CloudFormation
|
|
12
|
+
* (by having the TaskDefinition defined), as well as directly from
|
|
13
|
+
* our CD pipeline by UpdateService call to ECS, we need to ensure
|
|
14
|
+
* the referenced ECR image is kept in sync.
|
|
15
|
+
*
|
|
16
|
+
* To do this we use a container to hold the current ECR tag. This
|
|
17
|
+
* is then looked up during deployment from CloudFormation, and
|
|
18
|
+
* when deploying from CD pipeline it is updated before UpdateService
|
|
19
|
+
* call.
|
|
20
|
+
*
|
|
21
|
+
* A secret is used as it can be dynamically resolved as part of the
|
|
22
|
+
* CloudFormation template.
|
|
23
|
+
*
|
|
24
|
+
* We do not keep any default value for the container, as that might
|
|
25
|
+
* lead us to later deploy a very old version of the build. It is
|
|
26
|
+
* better if the deployment fails in this scenario. If this happens
|
|
27
|
+
* the stack update will fail with:
|
|
28
|
+
*
|
|
29
|
+
* Could not find a value associated with JSONKey in SecretString
|
|
30
|
+
*/
|
|
31
|
+
export declare class EcsUpdateImageTag extends constructs.Construct {
|
|
32
|
+
private readonly secret;
|
|
33
|
+
private readonly artifactStatus;
|
|
34
|
+
readonly secretArn: string;
|
|
35
|
+
constructor(scope: constructs.Construct, id: string, props: Props);
|
|
36
|
+
grantUpdate(grantee: iam.IGrantable): iam.Grant;
|
|
37
|
+
/**
|
|
38
|
+
* A CloudFormation dynamic reference that will be resolved
|
|
39
|
+
* during deployment.
|
|
40
|
+
*
|
|
41
|
+
* If we have not yet flagged the artifact as deployed,
|
|
42
|
+
* we do not allow resolving the value. See the documentation
|
|
43
|
+
* of {@link EcsUpdateImageArtifactStatus}.
|
|
44
|
+
*/
|
|
45
|
+
getEcrTag(): string | null;
|
|
46
|
+
}
|
|
47
|
+
export {};
|
|
@@ -0,0 +1,67 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.EcsUpdateImageTag = void 0;
|
|
4
|
+
const constructs = require("constructs");
|
|
5
|
+
const iam = require("aws-cdk-lib/aws-iam");
|
|
6
|
+
const secretsmanager = require("aws-cdk-lib/aws-secretsmanager");
|
|
7
|
+
/**
|
|
8
|
+
* Container used for holding the current ECR tag for a ECS service.
|
|
9
|
+
*
|
|
10
|
+
* Since we are deploying our ECS services from both CloudFormation
|
|
11
|
+
* (by having the TaskDefinition defined), as well as directly from
|
|
12
|
+
* our CD pipeline by UpdateService call to ECS, we need to ensure
|
|
13
|
+
* the referenced ECR image is kept in sync.
|
|
14
|
+
*
|
|
15
|
+
* To do this we use a container to hold the current ECR tag. This
|
|
16
|
+
* is then looked up during deployment from CloudFormation, and
|
|
17
|
+
* when deploying from CD pipeline it is updated before UpdateService
|
|
18
|
+
* call.
|
|
19
|
+
*
|
|
20
|
+
* A secret is used as it can be dynamically resolved as part of the
|
|
21
|
+
* CloudFormation template.
|
|
22
|
+
*
|
|
23
|
+
* We do not keep any default value for the container, as that might
|
|
24
|
+
* lead us to later deploy a very old version of the build. It is
|
|
25
|
+
* better if the deployment fails in this scenario. If this happens
|
|
26
|
+
* the stack update will fail with:
|
|
27
|
+
*
|
|
28
|
+
* Could not find a value associated with JSONKey in SecretString
|
|
29
|
+
*/
|
|
30
|
+
class EcsUpdateImageTag extends constructs.Construct {
|
|
31
|
+
constructor(scope, id, props) {
|
|
32
|
+
super(scope, id);
|
|
33
|
+
this.artifactStatus = props.artifactStatus;
|
|
34
|
+
this.secret = new secretsmanager.Secret(this, "Secret", {
|
|
35
|
+
secretName: props.secretName,
|
|
36
|
+
generateSecretString: {
|
|
37
|
+
// Do not modify this, as it would cause the secret to regenerate.
|
|
38
|
+
secretStringTemplate: "{}",
|
|
39
|
+
generateStringKey: "unusedField",
|
|
40
|
+
},
|
|
41
|
+
});
|
|
42
|
+
this.secretArn = this.secret.secretArn;
|
|
43
|
+
}
|
|
44
|
+
grantUpdate(grantee) {
|
|
45
|
+
return iam.Grant.addToPrincipal({
|
|
46
|
+
grantee,
|
|
47
|
+
actions: ["secretsmanager:UpdateSecret"],
|
|
48
|
+
resourceArns: [this.secretArn],
|
|
49
|
+
});
|
|
50
|
+
}
|
|
51
|
+
/**
|
|
52
|
+
* A CloudFormation dynamic reference that will be resolved
|
|
53
|
+
* during deployment.
|
|
54
|
+
*
|
|
55
|
+
* If we have not yet flagged the artifact as deployed,
|
|
56
|
+
* we do not allow resolving the value. See the documentation
|
|
57
|
+
* of {@link EcsUpdateImageArtifactStatus}.
|
|
58
|
+
*/
|
|
59
|
+
getEcrTag() {
|
|
60
|
+
if (!this.artifactStatus.artifactPushedAndTagUpdated) {
|
|
61
|
+
return null;
|
|
62
|
+
}
|
|
63
|
+
return this.secret.secretValueFromJson("tag").toString();
|
|
64
|
+
}
|
|
65
|
+
}
|
|
66
|
+
exports.EcsUpdateImageTag = EcsUpdateImageTag;
|
|
67
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoidGFnLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vLi4vc3JjL2Vjcy11cGRhdGUtaW1hZ2UvdGFnLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7OztBQUFBLHlDQUF3QztBQUN4QywyQ0FBMEM7QUFDMUMsaUVBQWdFO0FBUWhFOzs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7O0dBc0JHO0FBQ0gsTUFBYSxpQkFBa0IsU0FBUSxVQUFVLENBQUMsU0FBUztJQUt6RCxZQUFZLEtBQTJCLEVBQUUsRUFBVSxFQUFFLEtBQVk7UUFDL0QsS0FBSyxDQUFDLEtBQUssRUFBRSxFQUFFLENBQUMsQ0FBQTtRQUVoQixJQUFJLENBQUMsY0FBYyxHQUFHLEtBQUssQ0FBQyxjQUFjLENBQUE7UUFFMUMsSUFBSSxDQUFDLE1BQU0sR0FBRyxJQUFJLGNBQWMsQ0FBQyxNQUFNLENBQUMsSUFBSSxFQUFFLFFBQVEsRUFBRTtZQUN0RCxVQUFVLEVBQUUsS0FBSyxDQUFDLFVBQVU7WUFDNUIsb0JBQW9CLEVBQUU7Z0JBQ3BCLGtFQUFrRTtnQkFDbEUsb0JBQW9CLEVBQUUsSUFBSTtnQkFDMUIsaUJBQWlCLEVBQUUsYUFBYTthQUNqQztTQUNGLENBQUMsQ0FBQTtRQUVGLElBQUksQ0FBQyxTQUFTLEdBQUcsSUFBSSxDQUFDLE1BQU0sQ0FBQyxTQUFTLENBQUE7SUFDeEMsQ0FBQztJQUVNLFdBQVcsQ0FBQyxPQUF1QjtRQUN4QyxPQUFPLEdBQUcsQ0FBQyxLQUFLLENBQUMsY0FBYyxDQUFDO1lBQzlCLE9BQU87WUFDUCxPQUFPLEVBQUUsQ0FBQyw2QkFBNkIsQ0FBQztZQUN4QyxZQUFZLEVBQUUsQ0FBQyxJQUFJLENBQUMsU0FBUyxDQUFDO1NBQy9CLENBQUMsQ0FBQTtJQUNKLENBQUM7SUFFRDs7Ozs7OztPQU9HO0lBQ0ksU0FBUztRQUNkLElBQUksQ0FBQyxJQUFJLENBQUMsY0FBYyxDQUFDLDJCQUEyQixFQUFFLENBQUM7WUFDckQsT0FBTyxJQUFJLENBQUE7UUFDYixDQUFDO1FBQ0QsT0FBTyxJQUFJLENBQUMsTUFBTSxDQUFDLG1CQUFtQixDQUFDLEtBQUssQ0FBQyxDQUFDLFFBQVEsRUFBRSxDQUFBO0lBQzFELENBQUM7Q0FDRjtBQTVDRCw4Q0E0Q0MiLCJzb3VyY2VzQ29udGVudCI6WyJpbXBvcnQgKiBhcyBjb25zdHJ1Y3RzIGZyb20gXCJjb25zdHJ1Y3RzXCJcbmltcG9ydCAqIGFzIGlhbSBmcm9tIFwiYXdzLWNkay1saWIvYXdzLWlhbVwiXG5pbXBvcnQgKiBhcyBzZWNyZXRzbWFuYWdlciBmcm9tIFwiYXdzLWNkay1saWIvYXdzLXNlY3JldHNtYW5hZ2VyXCJcbmltcG9ydCB7IEVjc1VwZGF0ZUltYWdlQXJ0aWZhY3RTdGF0dXMgfSBmcm9tIFwiLi9hcnRpZmFjdC1zdGF0dXNcIlxuXG5pbnRlcmZhY2UgUHJvcHMge1xuICBhcnRpZmFjdFN0YXR1czogRWNzVXBkYXRlSW1hZ2VBcnRpZmFjdFN0YXR1c1xuICBzZWNyZXROYW1lOiBzdHJpbmdcbn1cblxuLyoqXG4gKiBDb250YWluZXIgdXNlZCBmb3IgaG9sZGluZyB0aGUgY3VycmVudCBFQ1IgdGFnIGZvciBhIEVDUyBzZXJ2aWNlLlxuICpcbiAqIFNpbmNlIHdlIGFyZSBkZXBsb3lpbmcgb3VyIEVDUyBzZXJ2aWNlcyBmcm9tIGJvdGggQ2xvdWRGb3JtYXRpb25cbiAqIChieSBoYXZpbmcgdGhlIFRhc2tEZWZpbml0aW9uIGRlZmluZWQpLCBhcyB3ZWxsIGFzIGRpcmVjdGx5IGZyb21cbiAqIG91ciBDRCBwaXBlbGluZSBieSBVcGRhdGVTZXJ2aWNlIGNhbGwgdG8gRUNTLCB3ZSBuZWVkIHRvIGVuc3VyZVxuICogdGhlIHJlZmVyZW5jZWQgRUNSIGltYWdlIGlzIGtlcHQgaW4gc3luYy5cbiAqXG4gKiBUbyBkbyB0aGlzIHdlIHVzZSBhIGNvbnRhaW5lciB0byBob2xkIHRoZSBjdXJyZW50IEVDUiB0YWcuIFRoaXNcbiAqIGlzIHRoZW4gbG9va2VkIHVwIGR1cmluZyBkZXBsb3ltZW50IGZyb20gQ2xvdWRGb3JtYXRpb24sIGFuZFxuICogd2hlbiBkZXBsb3lpbmcgZnJvbSBDRCBwaXBlbGluZSBpdCBpcyB1cGRhdGVkIGJlZm9yZSBVcGRhdGVTZXJ2aWNlXG4gKiBjYWxsLlxuICpcbiAqIEEgc2VjcmV0IGlzIHVzZWQgYXMgaXQgY2FuIGJlIGR5bmFtaWNhbGx5IHJlc29sdmVkIGFzIHBhcnQgb2YgdGhlXG4gKiBDbG91ZEZvcm1hdGlvbiB0ZW1wbGF0ZS5cbiAqXG4gKiBXZSBkbyBub3Qga2VlcCBhbnkgZGVmYXVsdCB2YWx1ZSBmb3IgdGhlIGNvbnRhaW5lciwgYXMgdGhhdCBtaWdodFxuICogbGVhZCB1cyB0byBsYXRlciBkZXBsb3kgYSB2ZXJ5IG9sZCB2ZXJzaW9uIG9mIHRoZSBidWlsZC4gSXQgaXNcbiAqIGJldHRlciBpZiB0aGUgZGVwbG95bWVudCBmYWlscyBpbiB0aGlzIHNjZW5hcmlvLiBJZiB0aGlzIGhhcHBlbnNcbiAqIHRoZSBzdGFjayB1cGRhdGUgd2lsbCBmYWlsIHdpdGg6XG4gKlxuICogICBDb3VsZCBub3QgZmluZCBhIHZhbHVlIGFzc29jaWF0ZWQgd2l0aCBKU09OS2V5IGluIFNlY3JldFN0cmluZ1xuICovXG5leHBvcnQgY2xhc3MgRWNzVXBkYXRlSW1hZ2VUYWcgZXh0ZW5kcyBjb25zdHJ1Y3RzLkNvbnN0cnVjdCB7XG4gIHByaXZhdGUgcmVhZG9ubHkgc2VjcmV0OiBzZWNyZXRzbWFuYWdlci5TZWNyZXRcbiAgcHJpdmF0ZSByZWFkb25seSBhcnRpZmFjdFN0YXR1czogRWNzVXBkYXRlSW1hZ2VBcnRpZmFjdFN0YXR1c1xuICByZWFkb25seSBzZWNyZXRBcm46IHN0cmluZ1xuXG4gIGNvbnN0cnVjdG9yKHNjb3BlOiBjb25zdHJ1Y3RzLkNvbnN0cnVjdCwgaWQ6IHN0cmluZywgcHJvcHM6IFByb3BzKSB7XG4gICAgc3VwZXIoc2NvcGUsIGlkKVxuXG4gICAgdGhpcy5hcnRpZmFjdFN0YXR1cyA9IHByb3BzLmFydGlmYWN0U3RhdHVzXG5cbiAgICB0aGlzLnNlY3JldCA9IG5ldyBzZWNyZXRzbWFuYWdlci5TZWNyZXQodGhpcywgXCJTZWNyZXRcIiwge1xuICAgICAgc2VjcmV0TmFtZTogcHJvcHMuc2VjcmV0TmFtZSxcbiAgICAgIGdlbmVyYXRlU2VjcmV0U3RyaW5nOiB7XG4gICAgICAgIC8vIERvIG5vdCBtb2RpZnkgdGhpcywgYXMgaXQgd291bGQgY2F1c2UgdGhlIHNlY3JldCB0byByZWdlbmVyYXRlLlxuICAgICAgICBzZWNyZXRTdHJpbmdUZW1wbGF0ZTogXCJ7fVwiLFxuICAgICAgICBnZW5lcmF0ZVN0cmluZ0tleTogXCJ1bnVzZWRGaWVsZFwiLFxuICAgICAgfSxcbiAgICB9KVxuXG4gICAgdGhpcy5zZWNyZXRBcm4gPSB0aGlzLnNlY3JldC5zZWNyZXRBcm5cbiAgfVxuXG4gIHB1YmxpYyBncmFudFVwZGF0ZShncmFudGVlOiBpYW0uSUdyYW50YWJsZSk6IGlhbS5HcmFudCB7XG4gICAgcmV0dXJuIGlhbS5HcmFudC5hZGRUb1ByaW5jaXBhbCh7XG4gICAgICBncmFudGVlLFxuICAgICAgYWN0aW9uczogW1wic2VjcmV0c21hbmFnZXI6VXBkYXRlU2VjcmV0XCJdLFxuICAgICAgcmVzb3VyY2VBcm5zOiBbdGhpcy5zZWNyZXRBcm5dLFxuICAgIH0pXG4gIH1cblxuICAvKipcbiAgICogQSBDbG91ZEZvcm1hdGlvbiBkeW5hbWljIHJlZmVyZW5jZSB0aGF0IHdpbGwgYmUgcmVzb2x2ZWRcbiAgICogZHVyaW5nIGRlcGxveW1lbnQuXG4gICAqXG4gICAqIElmIHdlIGhhdmUgbm90IHlldCBmbGFnZ2VkIHRoZSBhcnRpZmFjdCBhcyBkZXBsb3llZCxcbiAgICogd2UgZG8gbm90IGFsbG93IHJlc29sdmluZyB0aGUgdmFsdWUuIFNlZSB0aGUgZG9jdW1lbnRhdGlvblxuICAgKiBvZiB7QGxpbmsgRWNzVXBkYXRlSW1hZ2VBcnRpZmFjdFN0YXR1c30uXG4gICAqL1xuICBwdWJsaWMgZ2V0RWNyVGFnKCk6IHN0cmluZyB8IG51bGwge1xuICAgIGlmICghdGhpcy5hcnRpZmFjdFN0YXR1cy5hcnRpZmFjdFB1c2hlZEFuZFRhZ1VwZGF0ZWQpIHtcbiAgICAgIHJldHVybiBudWxsXG4gICAgfVxuICAgIHJldHVybiB0aGlzLnNlY3JldC5zZWNyZXRWYWx1ZUZyb21Kc29uKFwidGFnXCIpLnRvU3RyaW5nKClcbiAgfVxufVxuIl19
|
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
import * as constructs from "constructs";
|
|
2
|
+
export declare const FEATURE_FLAG_CDK_PIPELINES_SPEED_UP = "@liflig-cdk/cdk-pipelines:enableExperimentalSpeedUp";
|
|
3
|
+
/**
|
|
4
|
+
* Exposes feature flags we can use in liflig-cdk to allow consumers to opt-in
|
|
5
|
+
* to experimental functionality without affecting current consumers and having
|
|
6
|
+
* to pollute the official library API with experimental properties and behavior.
|
|
7
|
+
*
|
|
8
|
+
* NOTE: We should only use these flags temporarily and very sparingly as they lead
|
|
9
|
+
* to a brittle and more complex codebase with a lot of branching logic.
|
|
10
|
+
* Once an experiment has concluded we should remove them and update the
|
|
11
|
+
* official library API.
|
|
12
|
+
*/
|
|
13
|
+
export declare class FeatureFlags {
|
|
14
|
+
private readonly scope;
|
|
15
|
+
private constructor();
|
|
16
|
+
static of(scope: constructs.Construct): FeatureFlags;
|
|
17
|
+
isEnabled(flagName: string): boolean;
|
|
18
|
+
}
|
|
@@ -0,0 +1,48 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.FeatureFlags = exports.FEATURE_FLAG_CDK_PIPELINES_SPEED_UP = void 0;
|
|
4
|
+
// Custom feature flags for liflig-cdk
|
|
5
|
+
exports.FEATURE_FLAG_CDK_PIPELINES_SPEED_UP = "@liflig-cdk/cdk-pipelines:enableExperimentalSpeedUp";
|
|
6
|
+
const FLAGS = {
|
|
7
|
+
[exports.FEATURE_FLAG_CDK_PIPELINES_SPEED_UP]: {
|
|
8
|
+
default: false,
|
|
9
|
+
description: "Reduce execution time of CDK Pipelines by making various tweaks (e.g., skip creation of CloudFormation changesets, disable CodePipeline S3 polling).",
|
|
10
|
+
},
|
|
11
|
+
};
|
|
12
|
+
const getFeatureFlagDefault = (flagName) => {
|
|
13
|
+
var _a, _b;
|
|
14
|
+
return (_b = (_a = FLAGS[flagName]) === null || _a === void 0 ? void 0 : _a.default) !== null && _b !== void 0 ? _b : false;
|
|
15
|
+
};
|
|
16
|
+
/**
|
|
17
|
+
* Exposes feature flags we can use in liflig-cdk to allow consumers to opt-in
|
|
18
|
+
* to experimental functionality without affecting current consumers and having
|
|
19
|
+
* to pollute the official library API with experimental properties and behavior.
|
|
20
|
+
*
|
|
21
|
+
* NOTE: We should only use these flags temporarily and very sparingly as they lead
|
|
22
|
+
* to a brittle and more complex codebase with a lot of branching logic.
|
|
23
|
+
* Once an experiment has concluded we should remove them and update the
|
|
24
|
+
* official library API.
|
|
25
|
+
*/
|
|
26
|
+
class FeatureFlags {
|
|
27
|
+
constructor(scope) {
|
|
28
|
+
this.scope = scope;
|
|
29
|
+
}
|
|
30
|
+
static of(scope) {
|
|
31
|
+
return new FeatureFlags(scope);
|
|
32
|
+
}
|
|
33
|
+
isEnabled(flagName) {
|
|
34
|
+
if (!Object.keys(FLAGS).includes(flagName)) {
|
|
35
|
+
throw new Error(`Unsupported feature flag ${flagName}`);
|
|
36
|
+
}
|
|
37
|
+
const contextValue = this.scope.node.tryGetContext(flagName);
|
|
38
|
+
if (contextValue === undefined) {
|
|
39
|
+
return getFeatureFlagDefault(flagName);
|
|
40
|
+
}
|
|
41
|
+
else if (Object.prototype.toString.call(contextValue) === "[object Boolean]") {
|
|
42
|
+
return Boolean(contextValue);
|
|
43
|
+
}
|
|
44
|
+
throw new Error(`Unsupported value for feature flag ${flagName}. Only boolean values are supported.`);
|
|
45
|
+
}
|
|
46
|
+
}
|
|
47
|
+
exports.FeatureFlags = FeatureFlags;
|
|
48
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
import * as constructs from "constructs";
|
|
2
|
+
import * as s3 from "aws-cdk-lib/aws-s3";
|
|
3
|
+
/**
|
|
4
|
+
* Retrieve a Bucket instance based on Griid conventions for
|
|
5
|
+
* the provided build account.
|
|
6
|
+
*/
|
|
7
|
+
export declare function getGriidArtefactBucket(scope: constructs.Construct): s3.IBucket;
|
|
@@ -0,0 +1,30 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.getGriidArtefactBucket = void 0;
|
|
4
|
+
const kms = require("aws-cdk-lib/aws-kms");
|
|
5
|
+
const s3 = require("aws-cdk-lib/aws-s3");
|
|
6
|
+
const ssm = require("aws-cdk-lib/aws-ssm");
|
|
7
|
+
const cdk = require("aws-cdk-lib");
|
|
8
|
+
/**
|
|
9
|
+
* Retrieve a Bucket instance based on Griid conventions for
|
|
10
|
+
* the provided build account.
|
|
11
|
+
*/
|
|
12
|
+
function getGriidArtefactBucket(scope) {
|
|
13
|
+
const buildAccountId = ssm.StringParameter.valueForStringParameter(scope,
|
|
14
|
+
// Convention from Griid.
|
|
15
|
+
"/ccas/global/build");
|
|
16
|
+
const artefactKey = kms.Key.fromKeyArn(scope, "ArtefactKey", cdk.Arn.format({
|
|
17
|
+
service: "kms",
|
|
18
|
+
resource: "key",
|
|
19
|
+
resourceName: ssm.StringParameter.valueForStringParameter(scope,
|
|
20
|
+
// Convention from Griid.
|
|
21
|
+
"/ccas/global/key"),
|
|
22
|
+
}, cdk.Stack.of(scope)));
|
|
23
|
+
return s3.Bucket.fromBucketAttributes(scope, "ArtefactBucket", {
|
|
24
|
+
// Convention from Griid: Name of S3 bucket for build data.
|
|
25
|
+
bucketName: `artefact.eu-west-1.${buildAccountId}`,
|
|
26
|
+
encryptionKey: artefactKey,
|
|
27
|
+
});
|
|
28
|
+
}
|
|
29
|
+
exports.getGriidArtefactBucket = getGriidArtefactBucket;
|
|
30
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.getGriidCiRole = exports.getGriidArtefactBucket = void 0;
|
|
4
|
+
const iam = require("aws-cdk-lib/aws-iam");
|
|
5
|
+
const cdk = require("aws-cdk-lib");
|
|
6
|
+
var artefact_bucket_1 = require("./artefact-bucket");
|
|
7
|
+
Object.defineProperty(exports, "getGriidArtefactBucket", { enumerable: true, get: function () { return artefact_bucket_1.getGriidArtefactBucket; } });
|
|
8
|
+
function getGriidCiRole(scope) {
|
|
9
|
+
return iam.Role.fromRoleArn(scope, "GriidCiRole", cdk.Arn.format({
|
|
10
|
+
service: "iam",
|
|
11
|
+
resource: "role",
|
|
12
|
+
region: "",
|
|
13
|
+
// Convention from Griid.
|
|
14
|
+
resourceName: "CIExternalAccessRole",
|
|
15
|
+
}, cdk.Stack.of(scope)));
|
|
16
|
+
}
|
|
17
|
+
exports.getGriidCiRole = getGriidCiRole;
|
|
18
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,29 @@
|
|
|
1
|
+
import * as constructs from "constructs";
|
|
2
|
+
import * as route53 from "aws-cdk-lib/aws-route53";
|
|
3
|
+
interface Props extends route53.HostedZoneProps {
|
|
4
|
+
/**
|
|
5
|
+
* We don't expect a hosted zone to be recreated while it is being
|
|
6
|
+
* referenced in other stacks, but in case it is, this value can be
|
|
7
|
+
* used to force consumers to refresh the value.
|
|
8
|
+
*
|
|
9
|
+
* @default 1
|
|
10
|
+
*/
|
|
11
|
+
nonce?: string;
|
|
12
|
+
}
|
|
13
|
+
/**
|
|
14
|
+
* A Hosted Zone that writes its ID to SSM Parameter Store and provides
|
|
15
|
+
* a helper to easily retrieve the Hosted Zone cross-region.
|
|
16
|
+
*/
|
|
17
|
+
export declare class HostedZoneWithParam extends constructs.Construct {
|
|
18
|
+
private readonly nonce;
|
|
19
|
+
private readonly hostedZone;
|
|
20
|
+
readonly name: string;
|
|
21
|
+
readonly idParamName: string;
|
|
22
|
+
constructor(scope: constructs.Construct, id: string, props: Props);
|
|
23
|
+
/**
|
|
24
|
+
* Get the Hosted Zone by resolving the zone id from SSM Parameter Store
|
|
25
|
+
* in case we are cross-region.
|
|
26
|
+
*/
|
|
27
|
+
getHostedZone(scope: constructs.Construct, id: string): route53.IHostedZone;
|
|
28
|
+
}
|
|
29
|
+
export {};
|
|
@@ -0,0 +1,65 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.HostedZoneWithParam = void 0;
|
|
4
|
+
const constructs = require("constructs");
|
|
5
|
+
const route53 = require("aws-cdk-lib/aws-route53");
|
|
6
|
+
const ssm = require("aws-cdk-lib/aws-ssm");
|
|
7
|
+
const cdk = require("aws-cdk-lib");
|
|
8
|
+
const ssm_parameter_reader_1 = require("./ssm-parameter-reader");
|
|
9
|
+
const utils_1 = require("./utils");
|
|
10
|
+
/**
|
|
11
|
+
* A Hosted Zone that writes its ID to SSM Parameter Store and provides
|
|
12
|
+
* a helper to easily retrieve the Hosted Zone cross-region.
|
|
13
|
+
*/
|
|
14
|
+
class HostedZoneWithParam extends constructs.Construct {
|
|
15
|
+
constructor(scope, id, props) {
|
|
16
|
+
var _a;
|
|
17
|
+
super(scope, id);
|
|
18
|
+
this.nonce = (_a = props.nonce) !== null && _a !== void 0 ? _a : "1";
|
|
19
|
+
this.name = props.zoneName;
|
|
20
|
+
this.idParamName = `/cf/hosted-zone-id/${props.zoneName}-${props.vpcs ? "private" : "public"}`;
|
|
21
|
+
this.hostedZone = new route53.HostedZone(this, "Resource", props);
|
|
22
|
+
new ssm.CfnParameter(this, "IdParam", {
|
|
23
|
+
type: "String",
|
|
24
|
+
name: this.idParamName,
|
|
25
|
+
value: this.hostedZone.hostedZoneId,
|
|
26
|
+
});
|
|
27
|
+
if (this.hostedZone.hostedZoneNameServers) {
|
|
28
|
+
new cdk.CfnOutput(this, "Nameservers", {
|
|
29
|
+
value: cdk.Fn.join(", ", this.hostedZone.hostedZoneNameServers),
|
|
30
|
+
});
|
|
31
|
+
}
|
|
32
|
+
new cdk.CfnOutput(this, "Id", {
|
|
33
|
+
value: this.hostedZone.hostedZoneId,
|
|
34
|
+
});
|
|
35
|
+
}
|
|
36
|
+
/**
|
|
37
|
+
* Get the Hosted Zone by resolving the zone id from SSM Parameter Store
|
|
38
|
+
* in case we are cross-region.
|
|
39
|
+
*/
|
|
40
|
+
getHostedZone(scope, id) {
|
|
41
|
+
const hostedZoneRegion = cdk.Stack.of(this).region;
|
|
42
|
+
const consumerRegion = cdk.Stack.of(scope).region;
|
|
43
|
+
const sameStageOrApp = (0, utils_1.getStageOrApp)(this) === (0, utils_1.getStageOrApp)(scope);
|
|
44
|
+
// Fast-path: Same region and parent stage/app.
|
|
45
|
+
if (hostedZoneRegion === consumerRegion && sameStageOrApp) {
|
|
46
|
+
return this.hostedZone;
|
|
47
|
+
}
|
|
48
|
+
// Only add dependency if within same app/stage. If not it
|
|
49
|
+
// is the caller responsibility to ensure deployment order.
|
|
50
|
+
if (sameStageOrApp) {
|
|
51
|
+
scope.node.addDependency(this);
|
|
52
|
+
}
|
|
53
|
+
const hostedZoneId = new ssm_parameter_reader_1.SsmParameterReader(scope, `${id}Param`, {
|
|
54
|
+
parameterName: this.idParamName,
|
|
55
|
+
region: cdk.Stack.of(this).region,
|
|
56
|
+
nonce: this.nonce,
|
|
57
|
+
}).getParameterValue();
|
|
58
|
+
return route53.HostedZone.fromHostedZoneAttributes(scope, id, {
|
|
59
|
+
hostedZoneId,
|
|
60
|
+
zoneName: this.name,
|
|
61
|
+
});
|
|
62
|
+
}
|
|
63
|
+
}
|
|
64
|
+
exports.HostedZoneWithParam = HostedZoneWithParam;
|
|
65
|
+
//# sourceMappingURL=data:application/json;base64,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
|
package/lib/index.d.ts
ADDED
|
@@ -0,0 +1,32 @@
|
|
|
1
|
+
import * as alarms from "./alarms";
|
|
2
|
+
import * as cdkPipelines from "./cdk-pipelines";
|
|
3
|
+
import * as griid from "./griid";
|
|
4
|
+
import * as pipelines from "./pipelines";
|
|
5
|
+
import * as ses from "./ses";
|
|
6
|
+
import * as webapp from "./webapp";
|
|
7
|
+
import * as configureParameters from "./configure-parameters";
|
|
8
|
+
import * as ecs from "./ecs";
|
|
9
|
+
import * as loadBalancer from "./load-balancer";
|
|
10
|
+
import * as cloudTrailSlackIntegration from "./cloudtrail-slack-integration";
|
|
11
|
+
import * as rds from "./rds";
|
|
12
|
+
import * as platform from "./platform";
|
|
13
|
+
export { BastionHost } from "./bastion-host";
|
|
14
|
+
export * from "./build-artifacts";
|
|
15
|
+
export * from "./cdk-deploy";
|
|
16
|
+
export { CrossRegionSsmParameter } from "./cross-region-ssm-parameter";
|
|
17
|
+
export * from "./ecs-update-image";
|
|
18
|
+
export { HostedZoneWithParam } from "./hosted-zone-with-param";
|
|
19
|
+
export { createCloudAssemblySnapshot } from "./snapshots";
|
|
20
|
+
export { SsmParameterBackedResource } from "./ssm-parameter-backed-resource";
|
|
21
|
+
export { SsmParameterReader } from "./ssm-parameter-reader";
|
|
22
|
+
export { tagResources } from "./tags";
|
|
23
|
+
export { WebappDeployViaRole } from "./webapp-deploy-via-role";
|
|
24
|
+
export { alarms, cdkPipelines, griid, pipelines, ses, webapp, configureParameters, ecs, loadBalancer, rds, platform, cloudTrailSlackIntegration, };
|
|
25
|
+
/**
|
|
26
|
+
* Check if we are synthesizing a snapshot by setting IS_SNAPSHOT
|
|
27
|
+
* environment variable to true.
|
|
28
|
+
*
|
|
29
|
+
* This allows for special conditional logic that should only
|
|
30
|
+
* happen during snapshot creation.
|
|
31
|
+
*/
|
|
32
|
+
export declare const isSnapshot: boolean;
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
export { KinesisToDatadogStream, KinesisToDatadogStreamProps, } from "./kinesis-to-datadog-stream";
|