@liflig/cdk 3.3.0 → 3.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,238 @@
1
+ /**
2
+ * This lambda verifies credentials:
3
+ * - Against Cognito user pool if request uses access token in Bearer authorization header
4
+ * - Against credentials saved in Secret Manager if request uses basic auth (and if secret exists)
5
+ *
6
+ * Expects the following environment variables:
7
+ * - USER_POOL_ID
8
+ * - BASIC_AUTH_CREDENTIALS_SECRET_NAME (optional)
9
+ * - Name of secret in AWS Secrets Manager that stores basic auth credentials. See
10
+ * `BasicAuthAuthorizerProps` on the `ApiGateway` construct for the supported formats.
11
+ * - REQUIRED_SCOPE (optional)
12
+ * - Set this to require that the access token payload contains the given scope
13
+ */
14
+ import { SecretsManager } from "@aws-sdk/client-secrets-manager";
15
+ import { CognitoJwtVerifier } from "aws-jwt-verify";
16
+ export const handler = async (event) => {
17
+ const authHeader = event.headers?.authorization;
18
+ if (!authHeader) {
19
+ return { isAuthorized: false };
20
+ }
21
+ const expectedBasicAuthCredentials = await getExpectedBasicAuthCredentials();
22
+ if (authHeader.startsWith("Bearer ")) {
23
+ const result = await verifyAccessToken(authHeader.substring(7)); // substring(7) == after 'Bearer '
24
+ switch (result) {
25
+ case "INVALID":
26
+ return { isAuthorized: false };
27
+ case "EXPIRED":
28
+ // We want to return 401 Unauthorized for expired tokens, so the client knows to refresh
29
+ // their token when receiving this status code. API Gateway Lambda Authorizers return
30
+ // 403 Forbidden for {isAuthorized: false}, but there is a way to return 401: throwing an
31
+ // error with this exact string. https://stackoverflow.com/a/71965890
32
+ throw new Error("Unauthorized");
33
+ default:
34
+ return {
35
+ isAuthorized: true,
36
+ context: {
37
+ clientId: result.client_id,
38
+ internalAuthorizationHeader: expectedBasicAuthCredentials?.[0]?.basicAuthHeader,
39
+ },
40
+ };
41
+ }
42
+ }
43
+ else if (authHeader.startsWith("Basic ") &&
44
+ expectedBasicAuthCredentials !== undefined) {
45
+ for (const expected of expectedBasicAuthCredentials) {
46
+ if (authHeader === expected.basicAuthHeader) {
47
+ return {
48
+ isAuthorized: true,
49
+ context: {
50
+ username: expected.username,
51
+ internalAuthorizationHeader: expected.basicAuthHeader,
52
+ },
53
+ };
54
+ }
55
+ }
56
+ return { isAuthorized: false };
57
+ }
58
+ else {
59
+ return { isAuthorized: false };
60
+ }
61
+ };
62
+ /** Decodes and verifies the given token against Cognito. */
63
+ async function verifyAccessToken(token) {
64
+ try {
65
+ const tokenVerifier = getTokenVerifier();
66
+ // Must await here instead of returning the promise directly, so that errors can be caught in
67
+ // this function
68
+ return await tokenVerifier.verify(token);
69
+ }
70
+ catch (e) {
71
+ // If the JWT has expired, aws-jwt-verify throws this error:
72
+ // https://github.com/awslabs/aws-jwt-verify/blob/8d8f714d7281913ecd660147f5c30311479601c1/src/jwt.ts#L197
73
+ // We can't check instanceof on that error class, since it's not exported, so this is the next
74
+ // best thing.
75
+ if (e instanceof Error && e.message?.includes("Token expired")) {
76
+ return "EXPIRED";
77
+ }
78
+ else {
79
+ return "INVALID";
80
+ }
81
+ }
82
+ }
83
+ /**
84
+ * We cache the verifier in this global variable, so that subsequent invocations of a hot lambda
85
+ * will re-use this.
86
+ */
87
+ let cachedTokenVerifier = undefined;
88
+ function getTokenVerifier() {
89
+ if (cachedTokenVerifier === undefined) {
90
+ cachedTokenVerifier = dependencies.createTokenVerifier();
91
+ }
92
+ return cachedTokenVerifier;
93
+ }
94
+ /** For overriding dependency creation in tests. */
95
+ export const dependencies = {
96
+ createTokenVerifier: () => {
97
+ const userPoolId = process.env["USER_POOL_ID"];
98
+ if (!userPoolId) {
99
+ console.error("USER_POOL_ID env variable is not defined");
100
+ throw new Error();
101
+ }
102
+ return CognitoJwtVerifier.create({
103
+ userPoolId,
104
+ tokenUse: "access",
105
+ clientId: null,
106
+ scope: process.env.REQUIRED_SCOPE || undefined, // `|| undefined` to discard empty string
107
+ });
108
+ },
109
+ createSecretsManager: () => new SecretsManager(),
110
+ };
111
+ /** Cache this value, so that subsequent lambda invocations don't have to refetch. */
112
+ let cachedBasicAuthCredentials = undefined;
113
+ /**
114
+ * Returns an array, to support credential secrets with multiple values (see
115
+ * `BasicAuthAuthorizerProps` on the `ApiGateway` construct for more on this).
116
+ */
117
+ async function getExpectedBasicAuthCredentials() {
118
+ if (cachedBasicAuthCredentials === undefined) {
119
+ const secretName = process.env["BASIC_AUTH_CREDENTIALS_SECRET_NAME"];
120
+ if (!secretName) {
121
+ return undefined;
122
+ }
123
+ cachedBasicAuthCredentials = await getBasicAuthCredentialsSecret(secretName);
124
+ }
125
+ return cachedBasicAuthCredentials;
126
+ }
127
+ async function getBasicAuthCredentialsSecret(secretName) {
128
+ const secret = await getSecretValue(secretName);
129
+ if (isUsernameAndPasswordObject(secret)) {
130
+ return [encodeBasicAuthCredentials(secret)];
131
+ }
132
+ // See `BasicAuthAuthorizerProps` on the `ApiGateway` construct for an explanation of the formats
133
+ // we parse here
134
+ if (hasCredentialsKeyWithStringValue(secret)) {
135
+ let credentialsArray;
136
+ try {
137
+ credentialsArray = JSON.parse(secret.credentials);
138
+ }
139
+ catch (e) {
140
+ console.error(`Failed to parse credentials array in secret '${secretName}' as JSON`, e);
141
+ throw new Error();
142
+ }
143
+ if (isArrayOfUsernameAndPasswordObjects(credentialsArray)) {
144
+ return credentialsArray.map(encodeBasicAuthCredentials);
145
+ }
146
+ if (isStringArray(credentialsArray)) {
147
+ return credentialsArray.map(parseEncodedBasicAuthCredentials);
148
+ }
149
+ }
150
+ console.error(`Basic auth credentials secret did not follow any expected format (secret name: '${secretName}')`);
151
+ throw new Error();
152
+ }
153
+ async function getSecretValue(secretName) {
154
+ const client = dependencies.createSecretsManager();
155
+ const secret = await client.getSecretValue({ SecretId: secretName });
156
+ if (!secret.SecretString) {
157
+ console.error(`Secret value not found for '${secretName}'`);
158
+ throw new Error();
159
+ }
160
+ try {
161
+ return JSON.parse(secret.SecretString);
162
+ }
163
+ catch (e) {
164
+ console.error(`Failed to parse secret '${secretName}' as JSON:`, e);
165
+ throw new Error();
166
+ }
167
+ }
168
+ function encodeBasicAuthCredentials(credentials) {
169
+ const basicAuthHeader = "Basic " +
170
+ Buffer.from(`${credentials.username}:${credentials.password}`).toString("base64");
171
+ return { basicAuthHeader, username: credentials.username };
172
+ }
173
+ function isUsernameAndPasswordObject(value) {
174
+ return (typeof value === "object" &&
175
+ value !== null &&
176
+ "username" in value &&
177
+ typeof value.username === "string" &&
178
+ "password" in value &&
179
+ typeof value.password === "string");
180
+ }
181
+ function isArrayOfUsernameAndPasswordObjects(value) {
182
+ if (!Array.isArray(value)) {
183
+ return false;
184
+ }
185
+ for (const element of value) {
186
+ if (!isUsernameAndPasswordObject(element)) {
187
+ return false;
188
+ }
189
+ }
190
+ return true;
191
+ }
192
+ function hasCredentialsKeyWithStringValue(value) {
193
+ return (typeof value === "object" &&
194
+ value !== null &&
195
+ "credentials" in value &&
196
+ typeof value.credentials === "string");
197
+ }
198
+ function isStringArray(value) {
199
+ if (!Array.isArray(value)) {
200
+ return false;
201
+ }
202
+ for (const element of value) {
203
+ if (typeof element !== "string") {
204
+ return false;
205
+ }
206
+ }
207
+ return true;
208
+ }
209
+ /**
210
+ * We want to return the requesting username as a context variable in
211
+ * {@link AuthorizerResult.context}, for API Gateway access logs and parameter mapping. So if the
212
+ * basic auth credentials secret is stored as pre-encoded base64 strings, we need to parse them to
213
+ * get the username.
214
+ */
215
+ function parseEncodedBasicAuthCredentials(encodedCredentials) {
216
+ let decodedCredentials;
217
+ try {
218
+ decodedCredentials = Buffer.from(encodedCredentials, "base64").toString();
219
+ }
220
+ catch (e) {
221
+ console.error("Basic auth credentials secret could not be decoded as base64:", e);
222
+ throw new Error();
223
+ }
224
+ const usernameAndPassword = decodedCredentials.split(":", 2);
225
+ if (usernameAndPassword.length !== 2) {
226
+ console.error("Basic auth credentials secret could not be decoded as 'username:password'");
227
+ throw new Error();
228
+ }
229
+ return {
230
+ basicAuthHeader: `Basic ${encodedCredentials}`,
231
+ username: usernameAndPassword[0],
232
+ };
233
+ }
234
+ export function clearCache() {
235
+ cachedTokenVerifier = undefined;
236
+ cachedBasicAuthCredentials = undefined;
237
+ }
238
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"cognito-user-pool-or-basic-auth-authorizer.js","sourceRoot":"","sources":["../../../src/api-gateway/authorizers/cognito-user-pool-or-basic-auth-authorizer.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;GAYG;AAMH,OAAO,EAAE,cAAc,EAAE,MAAM,iCAAiC,CAAA;AAChE,OAAO,EAAE,kBAAkB,EAAE,MAAM,gBAAgB,CAAA;AAmCnD,MAAM,CAAC,MAAM,OAAO,GAAG,KAAK,EAC1B,KAAyC,EACd,EAAE;IAC7B,MAAM,UAAU,GAAG,KAAK,CAAC,OAAO,EAAE,aAAa,CAAA;IAC/C,IAAI,CAAC,UAAU,EAAE,CAAC;QAChB,OAAO,EAAE,YAAY,EAAE,KAAK,EAAE,CAAA;IAChC,CAAC;IAED,MAAM,4BAA4B,GAAG,MAAM,+BAA+B,EAAE,CAAA;IAE5E,IAAI,UAAU,CAAC,UAAU,CAAC,SAAS,CAAC,EAAE,CAAC;QACrC,MAAM,MAAM,GAAG,MAAM,iBAAiB,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAA,CAAC,kCAAkC;QAClG,QAAQ,MAAM,EAAE,CAAC;YACf,KAAK,SAAS;gBACZ,OAAO,EAAE,YAAY,EAAE,KAAK,EAAE,CAAA;YAChC,KAAK,SAAS;gBACZ,wFAAwF;gBACxF,qFAAqF;gBACrF,yFAAyF;gBACzF,qEAAqE;gBACrE,MAAM,IAAI,KAAK,CAAC,cAAc,CAAC,CAAA;YACjC;gBACE,OAAO;oBACL,YAAY,EAAE,IAAI;oBAClB,OAAO,EAAE;wBACP,QAAQ,EAAE,MAAM,CAAC,SAAS;wBAC1B,2BAA2B,EACzB,4BAA4B,EAAE,CAAC,CAAC,CAAC,EAAE,eAAe;qBACrD;iBACF,CAAA;QACL,CAAC;IACH,CAAC;SAAM,IACL,UAAU,CAAC,UAAU,CAAC,QAAQ,CAAC;QAC/B,4BAA4B,KAAK,SAAS,EAC1C,CAAC;QACD,KAAK,MAAM,QAAQ,IAAI,4BAA4B,EAAE,CAAC;YACpD,IAAI,UAAU,KAAK,QAAQ,CAAC,eAAe,EAAE,CAAC;gBAC5C,OAAO;oBACL,YAAY,EAAE,IAAI;oBAClB,OAAO,EAAE;wBACP,QAAQ,EAAE,QAAQ,CAAC,QAAQ;wBAC3B,2BAA2B,EAAE,QAAQ,CAAC,eAAe;qBACtD;iBACF,CAAA;YACH,CAAC;QACH,CAAC;QACD,OAAO,EAAE,YAAY,EAAE,KAAK,EAAE,CAAA;IAChC,CAAC;SAAM,CAAC;QACN,OAAO,EAAE,YAAY,EAAE,KAAK,EAAE,CAAA;IAChC,CAAC;AACH,CAAC,CAAA;AAED,4DAA4D;AAC5D,KAAK,UAAU,iBAAiB,CAC9B,KAAa;IAEb,IAAI,CAAC;QACH,MAAM,aAAa,GAAG,gBAAgB,EAAE,CAAA;QACxC,6FAA6F;QAC7F,gBAAgB;QAChB,OAAO,MAAM,aAAa,CAAC,MAAM,CAAC,KAAK,CAAC,CAAA;IAC1C,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,4DAA4D;QAC5D,0GAA0G;QAC1G,8FAA8F;QAC9F,cAAc;QACd,IAAI,CAAC,YAAY,KAAK,IAAI,CAAC,CAAC,OAAO,EAAE,QAAQ,CAAC,eAAe,CAAC,EAAE,CAAC;YAC/D,OAAO,SAAS,CAAA;QAClB,CAAC;aAAM,CAAC;YACN,OAAO,SAAS,CAAA;QAClB,CAAC;IACH,CAAC;AACH,CAAC;AAMD;;;GAGG;AACH,IAAI,mBAAmB,GAA8B,SAAS,CAAA;AAE9D,SAAS,gBAAgB;IACvB,IAAI,mBAAmB,KAAK,SAAS,EAAE,CAAC;QACtC,mBAAmB,GAAG,YAAY,CAAC,mBAAmB,EAAE,CAAA;IAC1D,CAAC;IACD,OAAO,mBAAmB,CAAA;AAC5B,CAAC;AAED,mDAAmD;AACnD,MAAM,CAAC,MAAM,YAAY,GAAG;IAC1B,mBAAmB,EAAE,GAAkB,EAAE;QACvC,MAAM,UAAU,GAAG,OAAO,CAAC,GAAG,CAAC,cAAc,CAAC,CAAA;QAC9C,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,OAAO,CAAC,KAAK,CAAC,0CAA0C,CAAC,CAAA;YACzD,MAAM,IAAI,KAAK,EAAE,CAAA;QACnB,CAAC;QAED,OAAO,kBAAkB,CAAC,MAAM,CAAC;YAC/B,UAAU;YACV,QAAQ,EAAE,QAAQ;YAClB,QAAQ,EAAE,IAAI;YACd,KAAK,EAAE,OAAO,CAAC,GAAG,CAAC,cAAc,IAAI,SAAS,EAAE,yCAAyC;SAC1F,CAAC,CAAA;IACJ,CAAC;IACD,oBAAoB,EAAE,GAAG,EAAE,CAAC,IAAI,cAAc,EAAE;CACjD,CAAA;AAOD,qFAAqF;AACrF,IAAI,0BAA0B,GAC5B,SAAS,CAAA;AAEX;;;GAGG;AACH,KAAK,UAAU,+BAA+B;IAG5C,IAAI,0BAA0B,KAAK,SAAS,EAAE,CAAC;QAC7C,MAAM,UAAU,GACd,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC,CAAA;QACnD,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,OAAO,SAAS,CAAA;QAClB,CAAC;QAED,0BAA0B,GAAG,MAAM,6BAA6B,CAAC,UAAU,CAAC,CAAA;IAC9E,CAAC;IAED,OAAO,0BAA0B,CAAA;AACnC,CAAC;AAED,KAAK,UAAU,6BAA6B,CAC1C,UAAkB;IAElB,MAAM,MAAM,GAAG,MAAM,cAAc,CAAC,UAAU,CAAC,CAAA;IAE/C,IAAI,2BAA2B,CAAC,MAAM,CAAC,EAAE,CAAC;QACxC,OAAO,CAAC,0BAA0B,CAAC,MAAM,CAAC,CAAC,CAAA;IAC7C,CAAC;IAED,iGAAiG;IACjG,gBAAgB;IAChB,IAAI,gCAAgC,CAAC,MAAM,CAAC,EAAE,CAAC;QAC7C,IAAI,gBAAyB,CAAA;QAC7B,IAAI,CAAC;YACH,gBAAgB,GAAG,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,WAAW,CAAC,CAAA;QACnD,CAAC;QAAC,OAAO,CAAC,EAAE,CAAC;YACX,OAAO,CAAC,KAAK,CACX,gDAAgD,UAAU,WAAW,EACrE,CAAC,CACF,CAAA;YACD,MAAM,IAAI,KAAK,EAAE,CAAA;QACnB,CAAC;QAED,IAAI,mCAAmC,CAAC,gBAAgB,CAAC,EAAE,CAAC;YAC1D,OAAO,gBAAgB,CAAC,GAAG,CAAC,0BAA0B,CAAC,CAAA;QACzD,CAAC;QAED,IAAI,aAAa,CAAC,gBAAgB,CAAC,EAAE,CAAC;YACpC,OAAO,gBAAgB,CAAC,GAAG,CAAC,gCAAgC,CAAC,CAAA;QAC/D,CAAC;IACH,CAAC;IAED,OAAO,CAAC,KAAK,CACX,mFAAmF,UAAU,IAAI,CAClG,CAAA;IACD,MAAM,IAAI,KAAK,EAAE,CAAA;AACnB,CAAC;AAED,KAAK,UAAU,cAAc,CAAC,UAAkB;IAC9C,MAAM,MAAM,GAAG,YAAY,CAAC,oBAAoB,EAAE,CAAA;IAClD,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,cAAc,CAAC,EAAE,QAAQ,EAAE,UAAU,EAAE,CAAC,CAAA;IAEpE,IAAI,CAAC,MAAM,CAAC,YAAY,EAAE,CAAC;QACzB,OAAO,CAAC,KAAK,CAAC,+BAA+B,UAAU,GAAG,CAAC,CAAA;QAC3D,MAAM,IAAI,KAAK,EAAE,CAAA;IACnB,CAAC;IAED,IAAI,CAAC;QACH,OAAO,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,YAAY,CAAC,CAAA;IACxC,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,OAAO,CAAC,KAAK,CAAC,2BAA2B,UAAU,YAAY,EAAE,CAAC,CAAC,CAAA;QACnE,MAAM,IAAI,KAAK,EAAE,CAAA;IACnB,CAAC;AACH,CAAC;AAED,SAAS,0BAA0B,CAAC,WAGnC;IACC,MAAM,eAAe,GACnB,QAAQ;QACR,MAAM,CAAC,IAAI,CAAC,GAAG,WAAW,CAAC,QAAQ,IAAI,WAAW,CAAC,QAAQ,EAAE,CAAC,CAAC,QAAQ,CACrE,QAAQ,CACT,CAAA;IAEH,OAAO,EAAE,eAAe,EAAE,QAAQ,EAAE,WAAW,CAAC,QAAQ,EAAE,CAAA;AAC5D,CAAC;AAED,SAAS,2BAA2B,CAClC,KAAc;IAEd,OAAO,CACL,OAAO,KAAK,KAAK,QAAQ;QACzB,KAAK,KAAK,IAAI;QACd,UAAU,IAAI,KAAK;QACnB,OAAO,KAAK,CAAC,QAAQ,KAAK,QAAQ;QAClC,UAAU,IAAI,KAAK;QACnB,OAAO,KAAK,CAAC,QAAQ,KAAK,QAAQ,CACnC,CAAA;AACH,CAAC;AAED,SAAS,mCAAmC,CAC1C,KAAc;IAEd,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,EAAE,CAAC;QAC1B,OAAO,KAAK,CAAA;IACd,CAAC;IAED,KAAK,MAAM,OAAO,IAAI,KAAK,EAAE,CAAC;QAC5B,IAAI,CAAC,2BAA2B,CAAC,OAAO,CAAC,EAAE,CAAC;YAC1C,OAAO,KAAK,CAAA;QACd,CAAC;IACH,CAAC;IAED,OAAO,IAAI,CAAA;AACb,CAAC;AAED,SAAS,gCAAgC,CACvC,KAAc;IAEd,OAAO,CACL,OAAO,KAAK,KAAK,QAAQ;QACzB,KAAK,KAAK,IAAI;QACd,aAAa,IAAI,KAAK;QACtB,OAAO,KAAK,CAAC,WAAW,KAAK,QAAQ,CACtC,CAAA;AACH,CAAC;AAED,SAAS,aAAa,CAAC,KAAc;IACnC,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,EAAE,CAAC;QAC1B,OAAO,KAAK,CAAA;IACd,CAAC;IAED,KAAK,MAAM,OAAO,IAAI,KAAK,EAAE,CAAC;QAC5B,IAAI,OAAO,OAAO,KAAK,QAAQ,EAAE,CAAC;YAChC,OAAO,KAAK,CAAA;QACd,CAAC;IACH,CAAC;IAED,OAAO,IAAI,CAAA;AACb,CAAC;AAED;;;;;GAKG;AACH,SAAS,gCAAgC,CACvC,kBAA0B;IAE1B,IAAI,kBAA0B,CAAA;IAC9B,IAAI,CAAC;QACH,kBAAkB,GAAG,MAAM,CAAC,IAAI,CAAC,kBAAkB,EAAE,QAAQ,CAAC,CAAC,QAAQ,EAAE,CAAA;IAC3E,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,OAAO,CAAC,KAAK,CACX,+DAA+D,EAC/D,CAAC,CACF,CAAA;QACD,MAAM,IAAI,KAAK,EAAE,CAAA;IACnB,CAAC;IAED,MAAM,mBAAmB,GAAG,kBAAkB,CAAC,KAAK,CAAC,GAAG,EAAE,CAAC,CAAC,CAAA;IAC5D,IAAI,mBAAmB,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;QACrC,OAAO,CAAC,KAAK,CACX,2EAA2E,CAC5E,CAAA;QACD,MAAM,IAAI,KAAK,EAAE,CAAA;IACnB,CAAC;IAED,OAAO;QACL,eAAe,EAAE,SAAS,kBAAkB,EAAE;QAC9C,QAAQ,EAAE,mBAAmB,CAAC,CAAC,CAAC;KACjC,CAAA;AACH,CAAC;AAED,MAAM,UAAU,UAAU;IACxB,mBAAmB,GAAG,SAAS,CAAA;IAC/B,0BAA0B,GAAG,SAAS,CAAA;AACxC,CAAC","sourcesContent":["/**\n * This lambda verifies credentials:\n * - Against Cognito user pool if request uses access token in Bearer authorization header\n * - Against credentials saved in Secret Manager if request uses basic auth (and if secret exists)\n *\n * Expects the following environment variables:\n * - USER_POOL_ID\n * - BASIC_AUTH_CREDENTIALS_SECRET_NAME (optional)\n *   - Name of secret in AWS Secrets Manager that stores basic auth credentials. See\n *     `BasicAuthAuthorizerProps` on the `ApiGateway` construct for the supported formats.\n * - REQUIRED_SCOPE (optional)\n *   - Set this to require that the access token payload contains the given scope\n */\n\nimport type {\n  APIGatewayRequestAuthorizerEventV2,\n  APIGatewaySimpleAuthorizerResult,\n} from \"aws-lambda\"\nimport { SecretsManager } from \"@aws-sdk/client-secrets-manager\"\nimport { CognitoJwtVerifier } from \"aws-jwt-verify\"\nimport type { CognitoAccessTokenPayload } from \"aws-jwt-verify/jwt-model\"\n\ntype AuthorizerResult = APIGatewaySimpleAuthorizerResult & {\n  /**\n   * Returning a context object from our authorizer allows our API Gateway to access these variables\n   * via `${context.authorizer.<property>}`.\n   * https://docs.aws.amazon.com/apigateway/latest/developerguide/http-api-parameter-mapping.html\n   */\n  context?: {\n    /**\n     * If the request used an access token, and the token was verified, we return the auth client ID\n     * from the token's claims in this context variable (named `authorizer.clientId`). We use this\n     * to include the requesting client in the API Gateway access logs (see `defaultAccessLogFormat`\n     * in our `ApiGateway` construct). You can also use this when mapping parameters to the backend\n     * integration (see `AlbIntegrationProps.mapParameters` on the `ApiGateway` construct).\n     */\n    clientId?: string\n    /**\n     * If the request used Basic Auth, and the credentials were verified, we return the username\n     * that was used in this context variable (named `authorizer.username`). We use this to include\n     * the requesting user in the API Gateway access logs (see `defaultAccessLogFormat` in our\n     * `ApiGateway` construct). You can also use this when mapping parameters to the backend\n     * integration (see `AlbIntegrationProps.mapParameters` on the `ApiGateway` construct).\n     */\n    username?: string\n    /**\n     * See `CognitoUserPoolAuthorizerProps.basicAuthForInternalAuthorization` on the `ApiGateway`\n     * construct (we provide the same context variable here as in the Cognito User Pool authorizer,\n     * using the credentials from BASIC_AUTH_CREDENTIALS_SECRET_NAME).\n     */\n    internalAuthorizationHeader?: string\n  }\n}\n\nexport const handler = async (\n  event: APIGatewayRequestAuthorizerEventV2,\n): Promise<AuthorizerResult> => {\n  const authHeader = event.headers?.authorization\n  if (!authHeader) {\n    return { isAuthorized: false }\n  }\n\n  const expectedBasicAuthCredentials = await getExpectedBasicAuthCredentials()\n\n  if (authHeader.startsWith(\"Bearer \")) {\n    const result = await verifyAccessToken(authHeader.substring(7)) // substring(7) == after 'Bearer '\n    switch (result) {\n      case \"INVALID\":\n        return { isAuthorized: false }\n      case \"EXPIRED\":\n        // We want to return 401 Unauthorized for expired tokens, so the client knows to refresh\n        // their token when receiving this status code. API Gateway Lambda Authorizers return\n        // 403 Forbidden for {isAuthorized: false}, but there is a way to return 401: throwing an\n        // error with this exact string. https://stackoverflow.com/a/71965890\n        throw new Error(\"Unauthorized\")\n      default:\n        return {\n          isAuthorized: true,\n          context: {\n            clientId: result.client_id,\n            internalAuthorizationHeader:\n              expectedBasicAuthCredentials?.[0]?.basicAuthHeader,\n          },\n        }\n    }\n  } else if (\n    authHeader.startsWith(\"Basic \") &&\n    expectedBasicAuthCredentials !== undefined\n  ) {\n    for (const expected of expectedBasicAuthCredentials) {\n      if (authHeader === expected.basicAuthHeader) {\n        return {\n          isAuthorized: true,\n          context: {\n            username: expected.username,\n            internalAuthorizationHeader: expected.basicAuthHeader,\n          },\n        }\n      }\n    }\n    return { isAuthorized: false }\n  } else {\n    return { isAuthorized: false }\n  }\n}\n\n/** Decodes and verifies the given token against Cognito. */\nasync function verifyAccessToken(\n  token: string,\n): Promise<CognitoAccessTokenPayload | \"EXPIRED\" | \"INVALID\"> {\n  try {\n    const tokenVerifier = getTokenVerifier()\n    // Must await here instead of returning the promise directly, so that errors can be caught in\n    // this function\n    return await tokenVerifier.verify(token)\n  } catch (e) {\n    // If the JWT has expired, aws-jwt-verify throws this error:\n    // https://github.com/awslabs/aws-jwt-verify/blob/8d8f714d7281913ecd660147f5c30311479601c1/src/jwt.ts#L197\n    // We can't check instanceof on that error class, since it's not exported, so this is the next\n    // best thing.\n    if (e instanceof Error && e.message?.includes(\"Token expired\")) {\n      return \"EXPIRED\"\n    } else {\n      return \"INVALID\"\n    }\n  }\n}\n\nexport type TokenVerifier = {\n  verify: (accessToken: string) => Promise<CognitoAccessTokenPayload>\n}\n\n/**\n * We cache the verifier in this global variable, so that subsequent invocations of a hot lambda\n * will re-use this.\n */\nlet cachedTokenVerifier: TokenVerifier | undefined = undefined\n\nfunction getTokenVerifier(): TokenVerifier {\n  if (cachedTokenVerifier === undefined) {\n    cachedTokenVerifier = dependencies.createTokenVerifier()\n  }\n  return cachedTokenVerifier\n}\n\n/** For overriding dependency creation in tests. */\nexport const dependencies = {\n  createTokenVerifier: (): TokenVerifier => {\n    const userPoolId = process.env[\"USER_POOL_ID\"]\n    if (!userPoolId) {\n      console.error(\"USER_POOL_ID env variable is not defined\")\n      throw new Error()\n    }\n\n    return CognitoJwtVerifier.create({\n      userPoolId,\n      tokenUse: \"access\",\n      clientId: null,\n      scope: process.env.REQUIRED_SCOPE || undefined, // `|| undefined` to discard empty string\n    })\n  },\n  createSecretsManager: () => new SecretsManager(),\n}\n\ntype ExpectedBasicAuthCredentials = {\n  basicAuthHeader: string\n  username: string\n}\n\n/** Cache this value, so that subsequent lambda invocations don't have to refetch. */\nlet cachedBasicAuthCredentials: ExpectedBasicAuthCredentials[] | undefined =\n  undefined\n\n/**\n * Returns an array, to support credential secrets with multiple values (see\n * `BasicAuthAuthorizerProps` on the `ApiGateway` construct for more on this).\n */\nasync function getExpectedBasicAuthCredentials(): Promise<\n  ExpectedBasicAuthCredentials[] | undefined\n> {\n  if (cachedBasicAuthCredentials === undefined) {\n    const secretName: string | undefined =\n      process.env[\"BASIC_AUTH_CREDENTIALS_SECRET_NAME\"]\n    if (!secretName) {\n      return undefined\n    }\n\n    cachedBasicAuthCredentials = await getBasicAuthCredentialsSecret(secretName)\n  }\n\n  return cachedBasicAuthCredentials\n}\n\nasync function getBasicAuthCredentialsSecret(\n  secretName: string,\n): Promise<ExpectedBasicAuthCredentials[]> {\n  const secret = await getSecretValue(secretName)\n\n  if (isUsernameAndPasswordObject(secret)) {\n    return [encodeBasicAuthCredentials(secret)]\n  }\n\n  // See `BasicAuthAuthorizerProps` on the `ApiGateway` construct for an explanation of the formats\n  // we parse here\n  if (hasCredentialsKeyWithStringValue(secret)) {\n    let credentialsArray: unknown\n    try {\n      credentialsArray = JSON.parse(secret.credentials)\n    } catch (e) {\n      console.error(\n        `Failed to parse credentials array in secret '${secretName}' as JSON`,\n        e,\n      )\n      throw new Error()\n    }\n\n    if (isArrayOfUsernameAndPasswordObjects(credentialsArray)) {\n      return credentialsArray.map(encodeBasicAuthCredentials)\n    }\n\n    if (isStringArray(credentialsArray)) {\n      return credentialsArray.map(parseEncodedBasicAuthCredentials)\n    }\n  }\n\n  console.error(\n    `Basic auth credentials secret did not follow any expected format (secret name: '${secretName}')`,\n  )\n  throw new Error()\n}\n\nasync function getSecretValue(secretName: string): Promise<unknown> {\n  const client = dependencies.createSecretsManager()\n  const secret = await client.getSecretValue({ SecretId: secretName })\n\n  if (!secret.SecretString) {\n    console.error(`Secret value not found for '${secretName}'`)\n    throw new Error()\n  }\n\n  try {\n    return JSON.parse(secret.SecretString)\n  } catch (e) {\n    console.error(`Failed to parse secret '${secretName}' as JSON:`, e)\n    throw new Error()\n  }\n}\n\nfunction encodeBasicAuthCredentials(credentials: {\n  username: string\n  password: string\n}): ExpectedBasicAuthCredentials {\n  const basicAuthHeader =\n    \"Basic \" +\n    Buffer.from(`${credentials.username}:${credentials.password}`).toString(\n      \"base64\",\n    )\n\n  return { basicAuthHeader, username: credentials.username }\n}\n\nfunction isUsernameAndPasswordObject(\n  value: unknown,\n): value is { username: string; password: string } {\n  return (\n    typeof value === \"object\" &&\n    value !== null &&\n    \"username\" in value &&\n    typeof value.username === \"string\" &&\n    \"password\" in value &&\n    typeof value.password === \"string\"\n  )\n}\n\nfunction isArrayOfUsernameAndPasswordObjects(\n  value: unknown,\n): value is { username: string; password: string }[] {\n  if (!Array.isArray(value)) {\n    return false\n  }\n\n  for (const element of value) {\n    if (!isUsernameAndPasswordObject(element)) {\n      return false\n    }\n  }\n\n  return true\n}\n\nfunction hasCredentialsKeyWithStringValue(\n  value: unknown,\n): value is { credentials: string } {\n  return (\n    typeof value === \"object\" &&\n    value !== null &&\n    \"credentials\" in value &&\n    typeof value.credentials === \"string\"\n  )\n}\n\nfunction isStringArray(value: unknown): value is string[] {\n  if (!Array.isArray(value)) {\n    return false\n  }\n\n  for (const element of value) {\n    if (typeof element !== \"string\") {\n      return false\n    }\n  }\n\n  return true\n}\n\n/**\n * We want to return the requesting username as a context variable in\n * {@link AuthorizerResult.context}, for API Gateway access logs and parameter mapping. So if the\n * basic auth credentials secret is stored as pre-encoded base64 strings, we need to parse them to\n * get the username.\n */\nfunction parseEncodedBasicAuthCredentials(\n  encodedCredentials: string,\n): ExpectedBasicAuthCredentials {\n  let decodedCredentials: string\n  try {\n    decodedCredentials = Buffer.from(encodedCredentials, \"base64\").toString()\n  } catch (e) {\n    console.error(\n      \"Basic auth credentials secret could not be decoded as base64:\",\n      e,\n    )\n    throw new Error()\n  }\n\n  const usernameAndPassword = decodedCredentials.split(\":\", 2)\n  if (usernameAndPassword.length !== 2) {\n    console.error(\n      \"Basic auth credentials secret could not be decoded as 'username:password'\",\n    )\n    throw new Error()\n  }\n\n  return {\n    basicAuthHeader: `Basic ${encodedCredentials}`,\n    username: usernameAndPassword[0],\n  }\n}\n\nexport function clearCache() {\n  cachedTokenVerifier = undefined\n  cachedBasicAuthCredentials = undefined\n}\n"]}
@@ -7,6 +7,7 @@ import type * as sqs from "aws-cdk-lib/aws-sqs";
7
7
  import * as apigw from "aws-cdk-lib/aws-apigatewayv2";
8
8
  import * as logs from "aws-cdk-lib/aws-logs";
9
9
  import * as iam from "aws-cdk-lib/aws-iam";
10
+ import * as authorizers from "aws-cdk-lib/aws-apigatewayv2-authorizers";
10
11
  import type { IUserPool } from "aws-cdk-lib/aws-cognito";
11
12
  import * as route53 from "aws-cdk-lib/aws-route53";
12
13
  /**
@@ -280,21 +281,21 @@ export type AuthorizationProps<AuthScopesT extends string = string> =
280
281
  type: "IAM";
281
282
  }
282
283
  /**
283
- * Creates a custom authorizer lambda which reads `Authorization: Bearer <access token>` header
284
+ * Creates a custom Lambda authorizer which reads `Authorization: Bearer <access token>` header
284
285
  * and verifies the token against a Cognito user pool.
285
286
  */
286
287
  | ({
287
288
  type: "COGNITO_USER_POOL";
288
289
  } & CognitoUserPoolAuthorizerProps<AuthScopesT>)
289
290
  /**
290
- * Creates a custom authorizer lambda which reads `Authorization: Basic <base64-encoded credentials>`
291
+ * Creates a custom Lambda authorizer which reads `Authorization: Basic <base64-encoded credentials>`
291
292
  * header and verifies the credentials against a given secret.
292
293
  */
293
294
  | ({
294
295
  type: "BASIC_AUTH";
295
296
  } & BasicAuthAuthorizerProps)
296
297
  /**
297
- * Creates a custom authorizer lambda which allows both:
298
+ * Creates a custom Lambda authorizer which allows both:
298
299
  * - `Authorization: Bearer <access token>` header, for which the token is checked against the
299
300
  * given Cognito user pool
300
301
  * - `Authorization: Basic <base64-encoded credentials>` header, for which the credentials are
@@ -304,7 +305,16 @@ export type AuthorizationProps<AuthScopesT extends string = string> =
304
305
  */
305
306
  | ({
306
307
  type: "COGNITO_USER_POOL_OR_BASIC_AUTH";
307
- } & CognitoUserPoolOrBasicAuthAuthorizerProps<AuthScopesT>);
308
+ } & CognitoUserPoolOrBasicAuthAuthorizerProps<AuthScopesT>)
309
+ /**
310
+ * Creates a custom authorizer with the given Lambda function. Use this if you have custom
311
+ * authorization logic, and the other authorizers from this construct don't meet your needs.
312
+ *
313
+ * https://docs.aws.amazon.com/apigateway/latest/developerguide/http-api-lambda-authorizer.html
314
+ */
315
+ | ({
316
+ type: "CUSTOM_LAMBDA_AUTHORIZER";
317
+ } & CustomLambdaAuthorizerProps);
308
318
  export type CognitoUserPoolAuthorizerProps<AuthScopesT extends string = string> = {
309
319
  userPool: IUserPool;
310
320
  /**
@@ -349,54 +359,39 @@ export type CognitoUserPoolAuthorizerProps<AuthScopesT extends string = string>
349
359
  };
350
360
  export type BasicAuthAuthorizerProps = {
351
361
  /**
352
- * Name of secret in AWS Secrets Manager that stores basic auth credentials. The secret value
353
- * should follow this format:
354
- * ```json
355
- * { "username": "<username>", "password": "<password>" }
356
- * ```
357
- *
358
- * The following format is also supported:
359
- * ```json
360
- * { "credentials": "[\"<encoded-credential-1>\",\"<encoded-credential-2>\"]" }
361
- * ```
362
- * ...consisting of:
363
- * - A single key, `credentials`
364
- * - With a _string_ value
365
- * - Which is a stringified, escaped JSON array of base64-encoded credentials
366
- * - In which each element is encoded from `<username>:<password>`
367
- *
368
- * If the secret is on this format, the authorizer will match the request's Authorization header
369
- * against any one of these encoded credentials.
370
- *
371
- * The reason that this second format stores stringified JSON _inside_ JSON, is due to a
372
- * limitation in Liflig's `load-secrets` library, which only allows storing strings values.
362
+ * Name of secret in AWS Secrets Manager that stores basic auth credentials.
363
+ *
364
+ * The following formats are supported for the secret value:
365
+ * - Single username and password:
366
+ * ```json
367
+ * { "username": "<username>", "password": "<password>" }
368
+ * ```
369
+ * - Array of username + password objects:
370
+ * ```json
371
+ * { "credentials": "[{\"username\":\"<user-1>\",\"password\":\"password-1\"},{\"username\":\"<user-2>\",\"password\":\"<password-2>\"}]" }
372
+ * ```
373
+ * - The value of the `credentials` field is a string, with a stringified, escaped JSON array of
374
+ * objects with `username` and `password` fields.
375
+ * - The reason that this second format stores stringified JSON _inside_ JSON, is due to a
376
+ * limitation in Liflig's `load-secrets` library, which only allows storing string values.
377
+ * - Array of base64-encoded credentials:
378
+ * ```json
379
+ * { "credentials": "[\"<encoded-credential-1>\",\"<encoded-credential-2>\"]" }
380
+ * ```
381
+ * - Each element is encoded from `<username>:<password>`.
382
+ * - The array is stringified for the same reason as above.
383
+ *
384
+ * If the secret uses one of the array formats, the authorizer will match the request's
385
+ * Authorization header against any one of the credentials.
373
386
  */
374
387
  credentialsSecretName: string;
375
388
  };
376
389
  export type CognitoUserPoolOrBasicAuthAuthorizerProps<AuthScopesT extends string = string> = {
377
390
  userPool: IUserPool;
378
391
  /**
379
- * Name of secret in AWS Secrets Manager that stores basic auth credentials. The secret value
380
- * should follow this format:
381
- * ```json
382
- * { "username": "<username>", "password": "<password>" }
383
- * ```
384
- *
385
- * The following format is also supported:
386
- * ```json
387
- * { "credentials": "[\"<encoded-credential-1>\",\"<encoded-credential-2>\"]" }
388
- * ```
389
- * ...consisting of:
390
- * - A single key, `credentials`
391
- * - With a _string_ value
392
- * - Which is a stringified, escaped JSON array of base64-encoded credentials
393
- * - In which each element is encoded from `<username>:<password>`
392
+ * Name of secret in AWS Secrets Manager that stores basic auth credentials.
394
393
  *
395
- * If the secret is on this format, the authorizer will match the request's Authorization header
396
- * against any one of these encoded credentials.
397
- *
398
- * The reason that this second format stores stringified JSON _inside_ JSON, is due to a
399
- * limitation in Liflig's `load-secrets` library, which only allows storing strings values.
394
+ * See {@link BasicAuthAuthorizerProps.credentialsSecretName} for the supported formats.
400
395
  */
401
396
  basicAuthCredentialsSecretName?: string;
402
397
  /**
@@ -411,6 +406,32 @@ export type CognitoUserPoolOrBasicAuthAuthorizerProps<AuthScopesT extends string
411
406
  */
412
407
  requiredScope?: AuthScopesT;
413
408
  };
409
+ type CustomLambdaAuthorizerProps = {
410
+ /**
411
+ * The Lambda function that will be run whenever the API Gateway route is invoked, to authenticate
412
+ * the request. See AWS docs for more on how to write the Lambda:
413
+ * https://docs.aws.amazon.com/apigateway/latest/developerguide/http-api-lambda-authorizer.html
414
+ *
415
+ * The default response format used is `HttpLambdaResponseType.SIMPLE` (format 2.0). If you write
416
+ * your Lambda in TypeScript, this means that your handler must return
417
+ * `APIGatewaySimpleAuthorizerResult` (from the `aws-lambda` package). The request event will also
418
+ * use format 2.0 (`APIGatewayRequestAuthorizerEventV2` in TypeScript). See the AWS docs linked
419
+ * above for more details on these formats.
420
+ *
421
+ * You can override the response format type in
422
+ * {@link CustomLambdaAuthorizerProps.authorizerProps}.
423
+ *
424
+ * See the Lambdas under the `authorizers` folder next to the `ApiGateway` construct in
425
+ * `liflig-cdk` for examples.
426
+ */
427
+ lambdaAuthorizer: lambda.IFunction;
428
+ /**
429
+ * Props for the `HttpLambdaAuthorizer` construct. We provide some different defaults:
430
+ * - `responseTypes` defaults to `[HttpLambdaResponseType.SIMPLE]`
431
+ * - `resultsCacheTtl` defaults to `Duration.hours(1)`
432
+ */
433
+ authorizerProps?: Partial<authorizers.HttpLambdaAuthorizerProps>;
434
+ };
414
435
  export type ApiGatewayAccessLogsProps = {
415
436
  /**
416
437
  * Delete the access logs if this construct is deleted?
@@ -530,3 +551,4 @@ export declare class ApiGateway<AuthScopesT extends string = string> extends con
530
551
  */
531
552
  grantInvoke(target: iam.IGrantable): void;
532
553
  }
554
+ export {};