@liflig/cdk 3.3.0 → 3.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/api-gateway/{authorizer-lambdas → authorizers}/basic-auth-authorizer.d.ts +3 -4
- package/lib/api-gateway/authorizers/basic-auth-authorizer.js +160 -0
- package/lib/api-gateway/authorizers/cognito-user-pool-authorizer.js +133 -0
- package/lib/api-gateway/{authorizer-lambdas → authorizers}/cognito-user-pool-or-basic-auth-authorizer.d.ts +3 -4
- package/lib/api-gateway/authorizers/cognito-user-pool-or-basic-auth-authorizer.js +238 -0
- package/lib/api-gateway/http-api-gateway.d.ts +67 -45
- package/lib/api-gateway/http-api-gateway.js +17 -7
- package/package.json +1 -1
- package/lib/api-gateway/authorizer-lambdas/basic-auth-authorizer.js +0 -144
- package/lib/api-gateway/authorizer-lambdas/cognito-user-pool-authorizer.js +0 -133
- package/lib/api-gateway/authorizer-lambdas/cognito-user-pool-or-basic-auth-authorizer.js +0 -222
- /package/lib/api-gateway/{authorizer-lambdas → authorizers}/cognito-user-pool-authorizer.d.ts +0 -0
|
@@ -0,0 +1,238 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* This lambda verifies credentials:
|
|
3
|
+
* - Against Cognito user pool if request uses access token in Bearer authorization header
|
|
4
|
+
* - Against credentials saved in Secret Manager if request uses basic auth (and if secret exists)
|
|
5
|
+
*
|
|
6
|
+
* Expects the following environment variables:
|
|
7
|
+
* - USER_POOL_ID
|
|
8
|
+
* - BASIC_AUTH_CREDENTIALS_SECRET_NAME (optional)
|
|
9
|
+
* - Name of secret in AWS Secrets Manager that stores basic auth credentials. See
|
|
10
|
+
* `BasicAuthAuthorizerProps` on the `ApiGateway` construct for the supported formats.
|
|
11
|
+
* - REQUIRED_SCOPE (optional)
|
|
12
|
+
* - Set this to require that the access token payload contains the given scope
|
|
13
|
+
*/
|
|
14
|
+
import { SecretsManager } from "@aws-sdk/client-secrets-manager";
|
|
15
|
+
import { CognitoJwtVerifier } from "aws-jwt-verify";
|
|
16
|
+
export const handler = async (event) => {
|
|
17
|
+
const authHeader = event.headers?.authorization;
|
|
18
|
+
if (!authHeader) {
|
|
19
|
+
return { isAuthorized: false };
|
|
20
|
+
}
|
|
21
|
+
const expectedBasicAuthCredentials = await getExpectedBasicAuthCredentials();
|
|
22
|
+
if (authHeader.startsWith("Bearer ")) {
|
|
23
|
+
const result = await verifyAccessToken(authHeader.substring(7)); // substring(7) == after 'Bearer '
|
|
24
|
+
switch (result) {
|
|
25
|
+
case "INVALID":
|
|
26
|
+
return { isAuthorized: false };
|
|
27
|
+
case "EXPIRED":
|
|
28
|
+
// We want to return 401 Unauthorized for expired tokens, so the client knows to refresh
|
|
29
|
+
// their token when receiving this status code. API Gateway Lambda Authorizers return
|
|
30
|
+
// 403 Forbidden for {isAuthorized: false}, but there is a way to return 401: throwing an
|
|
31
|
+
// error with this exact string. https://stackoverflow.com/a/71965890
|
|
32
|
+
throw new Error("Unauthorized");
|
|
33
|
+
default:
|
|
34
|
+
return {
|
|
35
|
+
isAuthorized: true,
|
|
36
|
+
context: {
|
|
37
|
+
clientId: result.client_id,
|
|
38
|
+
internalAuthorizationHeader: expectedBasicAuthCredentials?.[0]?.basicAuthHeader,
|
|
39
|
+
},
|
|
40
|
+
};
|
|
41
|
+
}
|
|
42
|
+
}
|
|
43
|
+
else if (authHeader.startsWith("Basic ") &&
|
|
44
|
+
expectedBasicAuthCredentials !== undefined) {
|
|
45
|
+
for (const expected of expectedBasicAuthCredentials) {
|
|
46
|
+
if (authHeader === expected.basicAuthHeader) {
|
|
47
|
+
return {
|
|
48
|
+
isAuthorized: true,
|
|
49
|
+
context: {
|
|
50
|
+
username: expected.username,
|
|
51
|
+
internalAuthorizationHeader: expected.basicAuthHeader,
|
|
52
|
+
},
|
|
53
|
+
};
|
|
54
|
+
}
|
|
55
|
+
}
|
|
56
|
+
return { isAuthorized: false };
|
|
57
|
+
}
|
|
58
|
+
else {
|
|
59
|
+
return { isAuthorized: false };
|
|
60
|
+
}
|
|
61
|
+
};
|
|
62
|
+
/** Decodes and verifies the given token against Cognito. */
|
|
63
|
+
async function verifyAccessToken(token) {
|
|
64
|
+
try {
|
|
65
|
+
const tokenVerifier = getTokenVerifier();
|
|
66
|
+
// Must await here instead of returning the promise directly, so that errors can be caught in
|
|
67
|
+
// this function
|
|
68
|
+
return await tokenVerifier.verify(token);
|
|
69
|
+
}
|
|
70
|
+
catch (e) {
|
|
71
|
+
// If the JWT has expired, aws-jwt-verify throws this error:
|
|
72
|
+
// https://github.com/awslabs/aws-jwt-verify/blob/8d8f714d7281913ecd660147f5c30311479601c1/src/jwt.ts#L197
|
|
73
|
+
// We can't check instanceof on that error class, since it's not exported, so this is the next
|
|
74
|
+
// best thing.
|
|
75
|
+
if (e instanceof Error && e.message?.includes("Token expired")) {
|
|
76
|
+
return "EXPIRED";
|
|
77
|
+
}
|
|
78
|
+
else {
|
|
79
|
+
return "INVALID";
|
|
80
|
+
}
|
|
81
|
+
}
|
|
82
|
+
}
|
|
83
|
+
/**
|
|
84
|
+
* We cache the verifier in this global variable, so that subsequent invocations of a hot lambda
|
|
85
|
+
* will re-use this.
|
|
86
|
+
*/
|
|
87
|
+
let cachedTokenVerifier = undefined;
|
|
88
|
+
function getTokenVerifier() {
|
|
89
|
+
if (cachedTokenVerifier === undefined) {
|
|
90
|
+
cachedTokenVerifier = dependencies.createTokenVerifier();
|
|
91
|
+
}
|
|
92
|
+
return cachedTokenVerifier;
|
|
93
|
+
}
|
|
94
|
+
/** For overriding dependency creation in tests. */
|
|
95
|
+
export const dependencies = {
|
|
96
|
+
createTokenVerifier: () => {
|
|
97
|
+
const userPoolId = process.env["USER_POOL_ID"];
|
|
98
|
+
if (!userPoolId) {
|
|
99
|
+
console.error("USER_POOL_ID env variable is not defined");
|
|
100
|
+
throw new Error();
|
|
101
|
+
}
|
|
102
|
+
return CognitoJwtVerifier.create({
|
|
103
|
+
userPoolId,
|
|
104
|
+
tokenUse: "access",
|
|
105
|
+
clientId: null,
|
|
106
|
+
scope: process.env.REQUIRED_SCOPE || undefined, // `|| undefined` to discard empty string
|
|
107
|
+
});
|
|
108
|
+
},
|
|
109
|
+
createSecretsManager: () => new SecretsManager(),
|
|
110
|
+
};
|
|
111
|
+
/** Cache this value, so that subsequent lambda invocations don't have to refetch. */
|
|
112
|
+
let cachedBasicAuthCredentials = undefined;
|
|
113
|
+
/**
|
|
114
|
+
* Returns an array, to support credential secrets with multiple values (see
|
|
115
|
+
* `BasicAuthAuthorizerProps` on the `ApiGateway` construct for more on this).
|
|
116
|
+
*/
|
|
117
|
+
async function getExpectedBasicAuthCredentials() {
|
|
118
|
+
if (cachedBasicAuthCredentials === undefined) {
|
|
119
|
+
const secretName = process.env["BASIC_AUTH_CREDENTIALS_SECRET_NAME"];
|
|
120
|
+
if (!secretName) {
|
|
121
|
+
return undefined;
|
|
122
|
+
}
|
|
123
|
+
cachedBasicAuthCredentials = await getBasicAuthCredentialsSecret(secretName);
|
|
124
|
+
}
|
|
125
|
+
return cachedBasicAuthCredentials;
|
|
126
|
+
}
|
|
127
|
+
async function getBasicAuthCredentialsSecret(secretName) {
|
|
128
|
+
const secret = await getSecretValue(secretName);
|
|
129
|
+
if (isUsernameAndPasswordObject(secret)) {
|
|
130
|
+
return [encodeBasicAuthCredentials(secret)];
|
|
131
|
+
}
|
|
132
|
+
// See `BasicAuthAuthorizerProps` on the `ApiGateway` construct for an explanation of the formats
|
|
133
|
+
// we parse here
|
|
134
|
+
if (hasCredentialsKeyWithStringValue(secret)) {
|
|
135
|
+
let credentialsArray;
|
|
136
|
+
try {
|
|
137
|
+
credentialsArray = JSON.parse(secret.credentials);
|
|
138
|
+
}
|
|
139
|
+
catch (e) {
|
|
140
|
+
console.error(`Failed to parse credentials array in secret '${secretName}' as JSON`, e);
|
|
141
|
+
throw new Error();
|
|
142
|
+
}
|
|
143
|
+
if (isArrayOfUsernameAndPasswordObjects(credentialsArray)) {
|
|
144
|
+
return credentialsArray.map(encodeBasicAuthCredentials);
|
|
145
|
+
}
|
|
146
|
+
if (isStringArray(credentialsArray)) {
|
|
147
|
+
return credentialsArray.map(parseEncodedBasicAuthCredentials);
|
|
148
|
+
}
|
|
149
|
+
}
|
|
150
|
+
console.error(`Basic auth credentials secret did not follow any expected format (secret name: '${secretName}')`);
|
|
151
|
+
throw new Error();
|
|
152
|
+
}
|
|
153
|
+
async function getSecretValue(secretName) {
|
|
154
|
+
const client = dependencies.createSecretsManager();
|
|
155
|
+
const secret = await client.getSecretValue({ SecretId: secretName });
|
|
156
|
+
if (!secret.SecretString) {
|
|
157
|
+
console.error(`Secret value not found for '${secretName}'`);
|
|
158
|
+
throw new Error();
|
|
159
|
+
}
|
|
160
|
+
try {
|
|
161
|
+
return JSON.parse(secret.SecretString);
|
|
162
|
+
}
|
|
163
|
+
catch (e) {
|
|
164
|
+
console.error(`Failed to parse secret '${secretName}' as JSON:`, e);
|
|
165
|
+
throw new Error();
|
|
166
|
+
}
|
|
167
|
+
}
|
|
168
|
+
function encodeBasicAuthCredentials(credentials) {
|
|
169
|
+
const basicAuthHeader = "Basic " +
|
|
170
|
+
Buffer.from(`${credentials.username}:${credentials.password}`).toString("base64");
|
|
171
|
+
return { basicAuthHeader, username: credentials.username };
|
|
172
|
+
}
|
|
173
|
+
function isUsernameAndPasswordObject(value) {
|
|
174
|
+
return (typeof value === "object" &&
|
|
175
|
+
value !== null &&
|
|
176
|
+
"username" in value &&
|
|
177
|
+
typeof value.username === "string" &&
|
|
178
|
+
"password" in value &&
|
|
179
|
+
typeof value.password === "string");
|
|
180
|
+
}
|
|
181
|
+
function isArrayOfUsernameAndPasswordObjects(value) {
|
|
182
|
+
if (!Array.isArray(value)) {
|
|
183
|
+
return false;
|
|
184
|
+
}
|
|
185
|
+
for (const element of value) {
|
|
186
|
+
if (!isUsernameAndPasswordObject(element)) {
|
|
187
|
+
return false;
|
|
188
|
+
}
|
|
189
|
+
}
|
|
190
|
+
return true;
|
|
191
|
+
}
|
|
192
|
+
function hasCredentialsKeyWithStringValue(value) {
|
|
193
|
+
return (typeof value === "object" &&
|
|
194
|
+
value !== null &&
|
|
195
|
+
"credentials" in value &&
|
|
196
|
+
typeof value.credentials === "string");
|
|
197
|
+
}
|
|
198
|
+
function isStringArray(value) {
|
|
199
|
+
if (!Array.isArray(value)) {
|
|
200
|
+
return false;
|
|
201
|
+
}
|
|
202
|
+
for (const element of value) {
|
|
203
|
+
if (typeof element !== "string") {
|
|
204
|
+
return false;
|
|
205
|
+
}
|
|
206
|
+
}
|
|
207
|
+
return true;
|
|
208
|
+
}
|
|
209
|
+
/**
|
|
210
|
+
* We want to return the requesting username as a context variable in
|
|
211
|
+
* {@link AuthorizerResult.context}, for API Gateway access logs and parameter mapping. So if the
|
|
212
|
+
* basic auth credentials secret is stored as pre-encoded base64 strings, we need to parse them to
|
|
213
|
+
* get the username.
|
|
214
|
+
*/
|
|
215
|
+
function parseEncodedBasicAuthCredentials(encodedCredentials) {
|
|
216
|
+
let decodedCredentials;
|
|
217
|
+
try {
|
|
218
|
+
decodedCredentials = Buffer.from(encodedCredentials, "base64").toString();
|
|
219
|
+
}
|
|
220
|
+
catch (e) {
|
|
221
|
+
console.error("Basic auth credentials secret could not be decoded as base64:", e);
|
|
222
|
+
throw new Error();
|
|
223
|
+
}
|
|
224
|
+
const usernameAndPassword = decodedCredentials.split(":", 2);
|
|
225
|
+
if (usernameAndPassword.length !== 2) {
|
|
226
|
+
console.error("Basic auth credentials secret could not be decoded as 'username:password'");
|
|
227
|
+
throw new Error();
|
|
228
|
+
}
|
|
229
|
+
return {
|
|
230
|
+
basicAuthHeader: `Basic ${encodedCredentials}`,
|
|
231
|
+
username: usernameAndPassword[0],
|
|
232
|
+
};
|
|
233
|
+
}
|
|
234
|
+
export function clearCache() {
|
|
235
|
+
cachedTokenVerifier = undefined;
|
|
236
|
+
cachedBasicAuthCredentials = undefined;
|
|
237
|
+
}
|
|
238
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"cognito-user-pool-or-basic-auth-authorizer.js","sourceRoot":"","sources":["../../../src/api-gateway/authorizers/cognito-user-pool-or-basic-auth-authorizer.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;GAYG;AAMH,OAAO,EAAE,cAAc,EAAE,MAAM,iCAAiC,CAAA;AAChE,OAAO,EAAE,kBAAkB,EAAE,MAAM,gBAAgB,CAAA;AAmCnD,MAAM,CAAC,MAAM,OAAO,GAAG,KAAK,EAC1B,KAAyC,EACd,EAAE;IAC7B,MAAM,UAAU,GAAG,KAAK,CAAC,OAAO,EAAE,aAAa,CAAA;IAC/C,IAAI,CAAC,UAAU,EAAE,CAAC;QAChB,OAAO,EAAE,YAAY,EAAE,KAAK,EAAE,CAAA;IAChC,CAAC;IAED,MAAM,4BAA4B,GAAG,MAAM,+BAA+B,EAAE,CAAA;IAE5E,IAAI,UAAU,CAAC,UAAU,CAAC,SAAS,CAAC,EAAE,CAAC;QACrC,MAAM,MAAM,GAAG,MAAM,iBAAiB,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAA,CAAC,kCAAkC;QAClG,QAAQ,MAAM,EAAE,CAAC;YACf,KAAK,SAAS;gBACZ,OAAO,EAAE,YAAY,EAAE,KAAK,EAAE,CAAA;YAChC,KAAK,SAAS;gBACZ,wFAAwF;gBACxF,qFAAqF;gBACrF,yFAAyF;gBACzF,qEAAqE;gBACrE,MAAM,IAAI,KAAK,CAAC,cAAc,CAAC,CAAA;YACjC;gBACE,OAAO;oBACL,YAAY,EAAE,IAAI;oBAClB,OAAO,EAAE;wBACP,QAAQ,EAAE,MAAM,CAAC,SAAS;wBAC1B,2BAA2B,EACzB,4BAA4B,EAAE,CAAC,CAAC,CAAC,EAAE,eAAe;qBACrD;iBACF,CAAA;QACL,CAAC;IACH,CAAC;SAAM,IACL,UAAU,CAAC,UAAU,CAAC,QAAQ,CAAC;QAC/B,4BAA4B,KAAK,SAAS,EAC1C,CAAC;QACD,KAAK,MAAM,QAAQ,IAAI,4BAA4B,EAAE,CAAC;YACpD,IAAI,UAAU,KAAK,QAAQ,CAAC,eAAe,EAAE,CAAC;gBAC5C,OAAO;oBACL,YAAY,EAAE,IAAI;oBAClB,OAAO,EAAE;wBACP,QAAQ,EAAE,QAAQ,CAAC,QAAQ;wBAC3B,2BAA2B,EAAE,QAAQ,CAAC,eAAe;qBACtD;iBACF,CAAA;YACH,CAAC;QACH,CAAC;QACD,OAAO,EAAE,YAAY,EAAE,KAAK,EAAE,CAAA;IAChC,CAAC;SAAM,CAAC;QACN,OAAO,EAAE,YAAY,EAAE,KAAK,EAAE,CAAA;IAChC,CAAC;AACH,CAAC,CAAA;AAED,4DAA4D;AAC5D,KAAK,UAAU,iBAAiB,CAC9B,KAAa;IAEb,IAAI,CAAC;QACH,MAAM,aAAa,GAAG,gBAAgB,EAAE,CAAA;QACxC,6FAA6F;QAC7F,gBAAgB;QAChB,OAAO,MAAM,aAAa,CAAC,MAAM,CAAC,KAAK,CAAC,CAAA;IAC1C,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,4DAA4D;QAC5D,0GAA0G;QAC1G,8FAA8F;QAC9F,cAAc;QACd,IAAI,CAAC,YAAY,KAAK,IAAI,CAAC,CAAC,OAAO,EAAE,QAAQ,CAAC,eAAe,CAAC,EAAE,CAAC;YAC/D,OAAO,SAAS,CAAA;QAClB,CAAC;aAAM,CAAC;YACN,OAAO,SAAS,CAAA;QAClB,CAAC;IACH,CAAC;AACH,CAAC;AAMD;;;GAGG;AACH,IAAI,mBAAmB,GAA8B,SAAS,CAAA;AAE9D,SAAS,gBAAgB;IACvB,IAAI,mBAAmB,KAAK,SAAS,EAAE,CAAC;QACtC,mBAAmB,GAAG,YAAY,CAAC,mBAAmB,EAAE,CAAA;IAC1D,CAAC;IACD,OAAO,mBAAmB,CAAA;AAC5B,CAAC;AAED,mDAAmD;AACnD,MAAM,CAAC,MAAM,YAAY,GAAG;IAC1B,mBAAmB,EAAE,GAAkB,EAAE;QACvC,MAAM,UAAU,GAAG,OAAO,CAAC,GAAG,CAAC,cAAc,CAAC,CAAA;QAC9C,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,OAAO,CAAC,KAAK,CAAC,0CAA0C,CAAC,CAAA;YACzD,MAAM,IAAI,KAAK,EAAE,CAAA;QACnB,CAAC;QAED,OAAO,kBAAkB,CAAC,MAAM,CAAC;YAC/B,UAAU;YACV,QAAQ,EAAE,QAAQ;YAClB,QAAQ,EAAE,IAAI;YACd,KAAK,EAAE,OAAO,CAAC,GAAG,CAAC,cAAc,IAAI,SAAS,EAAE,yCAAyC;SAC1F,CAAC,CAAA;IACJ,CAAC;IACD,oBAAoB,EAAE,GAAG,EAAE,CAAC,IAAI,cAAc,EAAE;CACjD,CAAA;AAOD,qFAAqF;AACrF,IAAI,0BAA0B,GAC5B,SAAS,CAAA;AAEX;;;GAGG;AACH,KAAK,UAAU,+BAA+B;IAG5C,IAAI,0BAA0B,KAAK,SAAS,EAAE,CAAC;QAC7C,MAAM,UAAU,GACd,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC,CAAA;QACnD,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,OAAO,SAAS,CAAA;QAClB,CAAC;QAED,0BAA0B,GAAG,MAAM,6BAA6B,CAAC,UAAU,CAAC,CAAA;IAC9E,CAAC;IAED,OAAO,0BAA0B,CAAA;AACnC,CAAC;AAED,KAAK,UAAU,6BAA6B,CAC1C,UAAkB;IAElB,MAAM,MAAM,GAAG,MAAM,cAAc,CAAC,UAAU,CAAC,CAAA;IAE/C,IAAI,2BAA2B,CAAC,MAAM,CAAC,EAAE,CAAC;QACxC,OAAO,CAAC,0BAA0B,CAAC,MAAM,CAAC,CAAC,CAAA;IAC7C,CAAC;IAED,iGAAiG;IACjG,gBAAgB;IAChB,IAAI,gCAAgC,CAAC,MAAM,CAAC,EAAE,CAAC;QAC7C,IAAI,gBAAyB,CAAA;QAC7B,IAAI,CAAC;YACH,gBAAgB,GAAG,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,WAAW,CAAC,CAAA;QACnD,CAAC;QAAC,OAAO,CAAC,EAAE,CAAC;YACX,OAAO,CAAC,KAAK,CACX,gDAAgD,UAAU,WAAW,EACrE,CAAC,CACF,CAAA;YACD,MAAM,IAAI,KAAK,EAAE,CAAA;QACnB,CAAC;QAED,IAAI,mCAAmC,CAAC,gBAAgB,CAAC,EAAE,CAAC;YAC1D,OAAO,gBAAgB,CAAC,GAAG,CAAC,0BAA0B,CAAC,CAAA;QACzD,CAAC;QAED,IAAI,aAAa,CAAC,gBAAgB,CAAC,EAAE,CAAC;YACpC,OAAO,gBAAgB,CAAC,GAAG,CAAC,gCAAgC,CAAC,CAAA;QAC/D,CAAC;IACH,CAAC;IAED,OAAO,CAAC,KAAK,CACX,mFAAmF,UAAU,IAAI,CAClG,CAAA;IACD,MAAM,IAAI,KAAK,EAAE,CAAA;AACnB,CAAC;AAED,KAAK,UAAU,cAAc,CAAC,UAAkB;IAC9C,MAAM,MAAM,GAAG,YAAY,CAAC,oBAAoB,EAAE,CAAA;IAClD,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,cAAc,CAAC,EAAE,QAAQ,EAAE,UAAU,EAAE,CAAC,CAAA;IAEpE,IAAI,CAAC,MAAM,CAAC,YAAY,EAAE,CAAC;QACzB,OAAO,CAAC,KAAK,CAAC,+BAA+B,UAAU,GAAG,CAAC,CAAA;QAC3D,MAAM,IAAI,KAAK,EAAE,CAAA;IACnB,CAAC;IAED,IAAI,CAAC;QACH,OAAO,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,YAAY,CAAC,CAAA;IACxC,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,OAAO,CAAC,KAAK,CAAC,2BAA2B,UAAU,YAAY,EAAE,CAAC,CAAC,CAAA;QACnE,MAAM,IAAI,KAAK,EAAE,CAAA;IACnB,CAAC;AACH,CAAC;AAED,SAAS,0BAA0B,CAAC,WAGnC;IACC,MAAM,eAAe,GACnB,QAAQ;QACR,MAAM,CAAC,IAAI,CAAC,GAAG,WAAW,CAAC,QAAQ,IAAI,WAAW,CAAC,QAAQ,EAAE,CAAC,CAAC,QAAQ,CACrE,QAAQ,CACT,CAAA;IAEH,OAAO,EAAE,eAAe,EAAE,QAAQ,EAAE,WAAW,CAAC,QAAQ,EAAE,CAAA;AAC5D,CAAC;AAED,SAAS,2BAA2B,CAClC,KAAc;IAEd,OAAO,CACL,OAAO,KAAK,KAAK,QAAQ;QACzB,KAAK,KAAK,IAAI;QACd,UAAU,IAAI,KAAK;QACnB,OAAO,KAAK,CAAC,QAAQ,KAAK,QAAQ;QAClC,UAAU,IAAI,KAAK;QACnB,OAAO,KAAK,CAAC,QAAQ,KAAK,QAAQ,CACnC,CAAA;AACH,CAAC;AAED,SAAS,mCAAmC,CAC1C,KAAc;IAEd,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,EAAE,CAAC;QAC1B,OAAO,KAAK,CAAA;IACd,CAAC;IAED,KAAK,MAAM,OAAO,IAAI,KAAK,EAAE,CAAC;QAC5B,IAAI,CAAC,2BAA2B,CAAC,OAAO,CAAC,EAAE,CAAC;YAC1C,OAAO,KAAK,CAAA;QACd,CAAC;IACH,CAAC;IAED,OAAO,IAAI,CAAA;AACb,CAAC;AAED,SAAS,gCAAgC,CACvC,KAAc;IAEd,OAAO,CACL,OAAO,KAAK,KAAK,QAAQ;QACzB,KAAK,KAAK,IAAI;QACd,aAAa,IAAI,KAAK;QACtB,OAAO,KAAK,CAAC,WAAW,KAAK,QAAQ,CACtC,CAAA;AACH,CAAC;AAED,SAAS,aAAa,CAAC,KAAc;IACnC,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,EAAE,CAAC;QAC1B,OAAO,KAAK,CAAA;IACd,CAAC;IAED,KAAK,MAAM,OAAO,IAAI,KAAK,EAAE,CAAC;QAC5B,IAAI,OAAO,OAAO,KAAK,QAAQ,EAAE,CAAC;YAChC,OAAO,KAAK,CAAA;QACd,CAAC;IACH,CAAC;IAED,OAAO,IAAI,CAAA;AACb,CAAC;AAED;;;;;GAKG;AACH,SAAS,gCAAgC,CACvC,kBAA0B;IAE1B,IAAI,kBAA0B,CAAA;IAC9B,IAAI,CAAC;QACH,kBAAkB,GAAG,MAAM,CAAC,IAAI,CAAC,kBAAkB,EAAE,QAAQ,CAAC,CAAC,QAAQ,EAAE,CAAA;IAC3E,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,OAAO,CAAC,KAAK,CACX,+DAA+D,EAC/D,CAAC,CACF,CAAA;QACD,MAAM,IAAI,KAAK,EAAE,CAAA;IACnB,CAAC;IAED,MAAM,mBAAmB,GAAG,kBAAkB,CAAC,KAAK,CAAC,GAAG,EAAE,CAAC,CAAC,CAAA;IAC5D,IAAI,mBAAmB,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;QACrC,OAAO,CAAC,KAAK,CACX,2EAA2E,CAC5E,CAAA;QACD,MAAM,IAAI,KAAK,EAAE,CAAA;IACnB,CAAC;IAED,OAAO;QACL,eAAe,EAAE,SAAS,kBAAkB,EAAE;QAC9C,QAAQ,EAAE,mBAAmB,CAAC,CAAC,CAAC;KACjC,CAAA;AACH,CAAC;AAED,MAAM,UAAU,UAAU;IACxB,mBAAmB,GAAG,SAAS,CAAA;IAC/B,0BAA0B,GAAG,SAAS,CAAA;AACxC,CAAC","sourcesContent":["/**\n * This lambda verifies credentials:\n * - Against Cognito user pool if request uses access token in Bearer authorization header\n * - Against credentials saved in Secret Manager if request uses basic auth (and if secret exists)\n *\n * Expects the following environment variables:\n * - USER_POOL_ID\n * - BASIC_AUTH_CREDENTIALS_SECRET_NAME (optional)\n *   - Name of secret in AWS Secrets Manager that stores basic auth credentials. See\n *     `BasicAuthAuthorizerProps` on the `ApiGateway` construct for the supported formats.\n * - REQUIRED_SCOPE (optional)\n *   - Set this to require that the access token payload contains the given scope\n */\n\nimport type {\n  APIGatewayRequestAuthorizerEventV2,\n  APIGatewaySimpleAuthorizerResult,\n} from \"aws-lambda\"\nimport { SecretsManager } from \"@aws-sdk/client-secrets-manager\"\nimport { CognitoJwtVerifier } from \"aws-jwt-verify\"\nimport type { CognitoAccessTokenPayload } from \"aws-jwt-verify/jwt-model\"\n\ntype AuthorizerResult = APIGatewaySimpleAuthorizerResult & {\n  /**\n   * Returning a context object from our authorizer allows our API Gateway to access these variables\n   * via `${context.authorizer.<property>}`.\n   * https://docs.aws.amazon.com/apigateway/latest/developerguide/http-api-parameter-mapping.html\n   */\n  context?: {\n    /**\n     * If the request used an access token, and the token was verified, we return the auth client ID\n     * from the token's claims in this context variable (named `authorizer.clientId`). We use this\n     * to include the requesting client in the API Gateway access logs (see `defaultAccessLogFormat`\n     * in our `ApiGateway` construct). You can also use this when mapping parameters to the backend\n     * integration (see `AlbIntegrationProps.mapParameters` on the `ApiGateway` construct).\n     */\n    clientId?: string\n    /**\n     * If the request used Basic Auth, and the credentials were verified, we return the username\n     * that was used in this context variable (named `authorizer.username`). We use this to include\n     * the requesting user in the API Gateway access logs (see `defaultAccessLogFormat` in our\n     * `ApiGateway` construct). You can also use this when mapping parameters to the backend\n     * integration (see `AlbIntegrationProps.mapParameters` on the `ApiGateway` construct).\n     */\n    username?: string\n    /**\n     * See `CognitoUserPoolAuthorizerProps.basicAuthForInternalAuthorization` on the `ApiGateway`\n     * construct (we provide the same context variable here as in the Cognito User Pool authorizer,\n     * using the credentials from BASIC_AUTH_CREDENTIALS_SECRET_NAME).\n     */\n    internalAuthorizationHeader?: string\n  }\n}\n\nexport const handler = async (\n  event: APIGatewayRequestAuthorizerEventV2,\n): Promise<AuthorizerResult> => {\n  const authHeader = event.headers?.authorization\n  if (!authHeader) {\n    return { isAuthorized: false }\n  }\n\n  const expectedBasicAuthCredentials = await getExpectedBasicAuthCredentials()\n\n  if (authHeader.startsWith(\"Bearer \")) {\n    const result = await verifyAccessToken(authHeader.substring(7)) // substring(7) == after 'Bearer '\n    switch (result) {\n      case \"INVALID\":\n        return { isAuthorized: false }\n      case \"EXPIRED\":\n        // We want to return 401 Unauthorized for expired tokens, so the client knows to refresh\n        // their token when receiving this status code. API Gateway Lambda Authorizers return\n        // 403 Forbidden for {isAuthorized: false}, but there is a way to return 401: throwing an\n        // error with this exact string. https://stackoverflow.com/a/71965890\n        throw new Error(\"Unauthorized\")\n      default:\n        return {\n          isAuthorized: true,\n          context: {\n            clientId: result.client_id,\n            internalAuthorizationHeader:\n              expectedBasicAuthCredentials?.[0]?.basicAuthHeader,\n          },\n        }\n    }\n  } else if (\n    authHeader.startsWith(\"Basic \") &&\n    expectedBasicAuthCredentials !== undefined\n  ) {\n    for (const expected of expectedBasicAuthCredentials) {\n      if (authHeader === expected.basicAuthHeader) {\n        return {\n          isAuthorized: true,\n          context: {\n            username: expected.username,\n            internalAuthorizationHeader: expected.basicAuthHeader,\n          },\n        }\n      }\n    }\n    return { isAuthorized: false }\n  } else {\n    return { isAuthorized: false }\n  }\n}\n\n/** Decodes and verifies the given token against Cognito. */\nasync function verifyAccessToken(\n  token: string,\n): Promise<CognitoAccessTokenPayload | \"EXPIRED\" | \"INVALID\"> {\n  try {\n    const tokenVerifier = getTokenVerifier()\n    // Must await here instead of returning the promise directly, so that errors can be caught in\n    // this function\n    return await tokenVerifier.verify(token)\n  } catch (e) {\n    // If the JWT has expired, aws-jwt-verify throws this error:\n    // https://github.com/awslabs/aws-jwt-verify/blob/8d8f714d7281913ecd660147f5c30311479601c1/src/jwt.ts#L197\n    // We can't check instanceof on that error class, since it's not exported, so this is the next\n    // best thing.\n    if (e instanceof Error && e.message?.includes(\"Token expired\")) {\n      return \"EXPIRED\"\n    } else {\n      return \"INVALID\"\n    }\n  }\n}\n\nexport type TokenVerifier = {\n  verify: (accessToken: string) => Promise<CognitoAccessTokenPayload>\n}\n\n/**\n * We cache the verifier in this global variable, so that subsequent invocations of a hot lambda\n * will re-use this.\n */\nlet cachedTokenVerifier: TokenVerifier | undefined = undefined\n\nfunction getTokenVerifier(): TokenVerifier {\n  if (cachedTokenVerifier === undefined) {\n    cachedTokenVerifier = dependencies.createTokenVerifier()\n  }\n  return cachedTokenVerifier\n}\n\n/** For overriding dependency creation in tests. */\nexport const dependencies = {\n  createTokenVerifier: (): TokenVerifier => {\n    const userPoolId = process.env[\"USER_POOL_ID\"]\n    if (!userPoolId) {\n      console.error(\"USER_POOL_ID env variable is not defined\")\n      throw new Error()\n    }\n\n    return CognitoJwtVerifier.create({\n      userPoolId,\n      tokenUse: \"access\",\n      clientId: null,\n      scope: process.env.REQUIRED_SCOPE || undefined, // `|| undefined` to discard empty string\n    })\n  },\n  createSecretsManager: () => new SecretsManager(),\n}\n\ntype ExpectedBasicAuthCredentials = {\n  basicAuthHeader: string\n  username: string\n}\n\n/** Cache this value, so that subsequent lambda invocations don't have to refetch. */\nlet cachedBasicAuthCredentials: ExpectedBasicAuthCredentials[] | undefined =\n  undefined\n\n/**\n * Returns an array, to support credential secrets with multiple values (see\n * `BasicAuthAuthorizerProps` on the `ApiGateway` construct for more on this).\n */\nasync function getExpectedBasicAuthCredentials(): Promise<\n  ExpectedBasicAuthCredentials[] | undefined\n> {\n  if (cachedBasicAuthCredentials === undefined) {\n    const secretName: string | undefined =\n      process.env[\"BASIC_AUTH_CREDENTIALS_SECRET_NAME\"]\n    if (!secretName) {\n      return undefined\n    }\n\n    cachedBasicAuthCredentials = await getBasicAuthCredentialsSecret(secretName)\n  }\n\n  return cachedBasicAuthCredentials\n}\n\nasync function getBasicAuthCredentialsSecret(\n  secretName: string,\n): Promise<ExpectedBasicAuthCredentials[]> {\n  const secret = await getSecretValue(secretName)\n\n  if (isUsernameAndPasswordObject(secret)) {\n    return [encodeBasicAuthCredentials(secret)]\n  }\n\n  // See `BasicAuthAuthorizerProps` on the `ApiGateway` construct for an explanation of the formats\n  // we parse here\n  if (hasCredentialsKeyWithStringValue(secret)) {\n    let credentialsArray: unknown\n    try {\n      credentialsArray = JSON.parse(secret.credentials)\n    } catch (e) {\n      console.error(\n        `Failed to parse credentials array in secret '${secretName}' as JSON`,\n        e,\n      )\n      throw new Error()\n    }\n\n    if (isArrayOfUsernameAndPasswordObjects(credentialsArray)) {\n      return credentialsArray.map(encodeBasicAuthCredentials)\n    }\n\n    if (isStringArray(credentialsArray)) {\n      return credentialsArray.map(parseEncodedBasicAuthCredentials)\n    }\n  }\n\n  console.error(\n    `Basic auth credentials secret did not follow any expected format (secret name: '${secretName}')`,\n  )\n  throw new Error()\n}\n\nasync function getSecretValue(secretName: string): Promise<unknown> {\n  const client = dependencies.createSecretsManager()\n  const secret = await client.getSecretValue({ SecretId: secretName })\n\n  if (!secret.SecretString) {\n    console.error(`Secret value not found for '${secretName}'`)\n    throw new Error()\n  }\n\n  try {\n    return JSON.parse(secret.SecretString)\n  } catch (e) {\n    console.error(`Failed to parse secret '${secretName}' as JSON:`, e)\n    throw new Error()\n  }\n}\n\nfunction encodeBasicAuthCredentials(credentials: {\n  username: string\n  password: string\n}): ExpectedBasicAuthCredentials {\n  const basicAuthHeader =\n    \"Basic \" +\n    Buffer.from(`${credentials.username}:${credentials.password}`).toString(\n      \"base64\",\n    )\n\n  return { basicAuthHeader, username: credentials.username }\n}\n\nfunction isUsernameAndPasswordObject(\n  value: unknown,\n): value is { username: string; password: string } {\n  return (\n    typeof value === \"object\" &&\n    value !== null &&\n    \"username\" in value &&\n    typeof value.username === \"string\" &&\n    \"password\" in value &&\n    typeof value.password === \"string\"\n  )\n}\n\nfunction isArrayOfUsernameAndPasswordObjects(\n  value: unknown,\n): value is { username: string; password: string }[] {\n  if (!Array.isArray(value)) {\n    return false\n  }\n\n  for (const element of value) {\n    if (!isUsernameAndPasswordObject(element)) {\n      return false\n    }\n  }\n\n  return true\n}\n\nfunction hasCredentialsKeyWithStringValue(\n  value: unknown,\n): value is { credentials: string } {\n  return (\n    typeof value === \"object\" &&\n    value !== null &&\n    \"credentials\" in value &&\n    typeof value.credentials === \"string\"\n  )\n}\n\nfunction isStringArray(value: unknown): value is string[] {\n  if (!Array.isArray(value)) {\n    return false\n  }\n\n  for (const element of value) {\n    if (typeof element !== \"string\") {\n      return false\n    }\n  }\n\n  return true\n}\n\n/**\n * We want to return the requesting username as a context variable in\n * {@link AuthorizerResult.context}, for API Gateway access logs and parameter mapping. So if the\n * basic auth credentials secret is stored as pre-encoded base64 strings, we need to parse them to\n * get the username.\n */\nfunction parseEncodedBasicAuthCredentials(\n  encodedCredentials: string,\n): ExpectedBasicAuthCredentials {\n  let decodedCredentials: string\n  try {\n    decodedCredentials = Buffer.from(encodedCredentials, \"base64\").toString()\n  } catch (e) {\n    console.error(\n      \"Basic auth credentials secret could not be decoded as base64:\",\n      e,\n    )\n    throw new Error()\n  }\n\n  const usernameAndPassword = decodedCredentials.split(\":\", 2)\n  if (usernameAndPassword.length !== 2) {\n    console.error(\n      \"Basic auth credentials secret could not be decoded as 'username:password'\",\n    )\n    throw new Error()\n  }\n\n  return {\n    basicAuthHeader: `Basic ${encodedCredentials}`,\n    username: usernameAndPassword[0],\n  }\n}\n\nexport function clearCache() {\n  cachedTokenVerifier = undefined\n  cachedBasicAuthCredentials = undefined\n}\n"]}
|
|
@@ -7,6 +7,7 @@ import type * as sqs from "aws-cdk-lib/aws-sqs";
|
|
|
7
7
|
import * as apigw from "aws-cdk-lib/aws-apigatewayv2";
|
|
8
8
|
import * as logs from "aws-cdk-lib/aws-logs";
|
|
9
9
|
import * as iam from "aws-cdk-lib/aws-iam";
|
|
10
|
+
import * as authorizers from "aws-cdk-lib/aws-apigatewayv2-authorizers";
|
|
10
11
|
import type { IUserPool } from "aws-cdk-lib/aws-cognito";
|
|
11
12
|
import * as route53 from "aws-cdk-lib/aws-route53";
|
|
12
13
|
/**
|
|
@@ -280,21 +281,21 @@ export type AuthorizationProps<AuthScopesT extends string = string> =
|
|
|
280
281
|
type: "IAM";
|
|
281
282
|
}
|
|
282
283
|
/**
|
|
283
|
-
* Creates a custom authorizer
|
|
284
|
+
* Creates a custom Lambda authorizer which reads `Authorization: Bearer <access token>` header
|
|
284
285
|
* and verifies the token against a Cognito user pool.
|
|
285
286
|
*/
|
|
286
287
|
| ({
|
|
287
288
|
type: "COGNITO_USER_POOL";
|
|
288
289
|
} & CognitoUserPoolAuthorizerProps<AuthScopesT>)
|
|
289
290
|
/**
|
|
290
|
-
* Creates a custom authorizer
|
|
291
|
+
* Creates a custom Lambda authorizer which reads `Authorization: Basic <base64-encoded credentials>`
|
|
291
292
|
* header and verifies the credentials against a given secret.
|
|
292
293
|
*/
|
|
293
294
|
| ({
|
|
294
295
|
type: "BASIC_AUTH";
|
|
295
296
|
} & BasicAuthAuthorizerProps)
|
|
296
297
|
/**
|
|
297
|
-
* Creates a custom authorizer
|
|
298
|
+
* Creates a custom Lambda authorizer which allows both:
|
|
298
299
|
* - `Authorization: Bearer <access token>` header, for which the token is checked against the
|
|
299
300
|
* given Cognito user pool
|
|
300
301
|
* - `Authorization: Basic <base64-encoded credentials>` header, for which the credentials are
|
|
@@ -304,7 +305,16 @@ export type AuthorizationProps<AuthScopesT extends string = string> =
|
|
|
304
305
|
*/
|
|
305
306
|
| ({
|
|
306
307
|
type: "COGNITO_USER_POOL_OR_BASIC_AUTH";
|
|
307
|
-
} & CognitoUserPoolOrBasicAuthAuthorizerProps<AuthScopesT>)
|
|
308
|
+
} & CognitoUserPoolOrBasicAuthAuthorizerProps<AuthScopesT>)
|
|
309
|
+
/**
|
|
310
|
+
* Creates a custom authorizer with the given Lambda function. Use this if you have custom
|
|
311
|
+
* authorization logic, and the other authorizers from this construct don't meet your needs.
|
|
312
|
+
*
|
|
313
|
+
* https://docs.aws.amazon.com/apigateway/latest/developerguide/http-api-lambda-authorizer.html
|
|
314
|
+
*/
|
|
315
|
+
| ({
|
|
316
|
+
type: "CUSTOM_LAMBDA_AUTHORIZER";
|
|
317
|
+
} & CustomLambdaAuthorizerProps);
|
|
308
318
|
export type CognitoUserPoolAuthorizerProps<AuthScopesT extends string = string> = {
|
|
309
319
|
userPool: IUserPool;
|
|
310
320
|
/**
|
|
@@ -349,54 +359,39 @@ export type CognitoUserPoolAuthorizerProps<AuthScopesT extends string = string>
|
|
|
349
359
|
};
|
|
350
360
|
export type BasicAuthAuthorizerProps = {
|
|
351
361
|
/**
|
|
352
|
-
* Name of secret in AWS Secrets Manager that stores basic auth credentials.
|
|
353
|
-
*
|
|
354
|
-
*
|
|
355
|
-
*
|
|
356
|
-
*
|
|
357
|
-
*
|
|
358
|
-
*
|
|
359
|
-
*
|
|
360
|
-
*
|
|
361
|
-
*
|
|
362
|
-
*
|
|
363
|
-
*
|
|
364
|
-
*
|
|
365
|
-
*
|
|
366
|
-
* -
|
|
367
|
-
*
|
|
368
|
-
*
|
|
369
|
-
*
|
|
370
|
-
*
|
|
371
|
-
*
|
|
372
|
-
*
|
|
362
|
+
* Name of secret in AWS Secrets Manager that stores basic auth credentials.
|
|
363
|
+
*
|
|
364
|
+
* The following formats are supported for the secret value:
|
|
365
|
+
* - Single username and password:
|
|
366
|
+
* ```json
|
|
367
|
+
* { "username": "<username>", "password": "<password>" }
|
|
368
|
+
* ```
|
|
369
|
+
* - Array of username + password objects:
|
|
370
|
+
* ```json
|
|
371
|
+
* { "credentials": "[{\"username\":\"<user-1>\",\"password\":\"password-1\"},{\"username\":\"<user-2>\",\"password\":\"<password-2>\"}]" }
|
|
372
|
+
* ```
|
|
373
|
+
* - The value of the `credentials` field is a string, with a stringified, escaped JSON array of
|
|
374
|
+
* objects with `username` and `password` fields.
|
|
375
|
+
* - The reason that this second format stores stringified JSON _inside_ JSON, is due to a
|
|
376
|
+
* limitation in Liflig's `load-secrets` library, which only allows storing string values.
|
|
377
|
+
* - Array of base64-encoded credentials:
|
|
378
|
+
* ```json
|
|
379
|
+
* { "credentials": "[\"<encoded-credential-1>\",\"<encoded-credential-2>\"]" }
|
|
380
|
+
* ```
|
|
381
|
+
* - Each element is encoded from `<username>:<password>`.
|
|
382
|
+
* - The array is stringified for the same reason as above.
|
|
383
|
+
*
|
|
384
|
+
* If the secret uses one of the array formats, the authorizer will match the request's
|
|
385
|
+
* Authorization header against any one of the credentials.
|
|
373
386
|
*/
|
|
374
387
|
credentialsSecretName: string;
|
|
375
388
|
};
|
|
376
389
|
export type CognitoUserPoolOrBasicAuthAuthorizerProps<AuthScopesT extends string = string> = {
|
|
377
390
|
userPool: IUserPool;
|
|
378
391
|
/**
|
|
379
|
-
* Name of secret in AWS Secrets Manager that stores basic auth credentials.
|
|
380
|
-
* should follow this format:
|
|
381
|
-
* ```json
|
|
382
|
-
* { "username": "<username>", "password": "<password>" }
|
|
383
|
-
* ```
|
|
384
|
-
*
|
|
385
|
-
* The following format is also supported:
|
|
386
|
-
* ```json
|
|
387
|
-
* { "credentials": "[\"<encoded-credential-1>\",\"<encoded-credential-2>\"]" }
|
|
388
|
-
* ```
|
|
389
|
-
* ...consisting of:
|
|
390
|
-
* - A single key, `credentials`
|
|
391
|
-
* - With a _string_ value
|
|
392
|
-
* - Which is a stringified, escaped JSON array of base64-encoded credentials
|
|
393
|
-
* - In which each element is encoded from `<username>:<password>`
|
|
392
|
+
* Name of secret in AWS Secrets Manager that stores basic auth credentials.
|
|
394
393
|
*
|
|
395
|
-
*
|
|
396
|
-
* against any one of these encoded credentials.
|
|
397
|
-
*
|
|
398
|
-
* The reason that this second format stores stringified JSON _inside_ JSON, is due to a
|
|
399
|
-
* limitation in Liflig's `load-secrets` library, which only allows storing strings values.
|
|
394
|
+
* See {@link BasicAuthAuthorizerProps.credentialsSecretName} for the supported formats.
|
|
400
395
|
*/
|
|
401
396
|
basicAuthCredentialsSecretName?: string;
|
|
402
397
|
/**
|
|
@@ -411,6 +406,32 @@ export type CognitoUserPoolOrBasicAuthAuthorizerProps<AuthScopesT extends string
|
|
|
411
406
|
*/
|
|
412
407
|
requiredScope?: AuthScopesT;
|
|
413
408
|
};
|
|
409
|
+
type CustomLambdaAuthorizerProps = {
|
|
410
|
+
/**
|
|
411
|
+
* The Lambda function that will be run whenever the API Gateway route is invoked, to authenticate
|
|
412
|
+
* the request. See AWS docs for more on how to write the Lambda:
|
|
413
|
+
* https://docs.aws.amazon.com/apigateway/latest/developerguide/http-api-lambda-authorizer.html
|
|
414
|
+
*
|
|
415
|
+
* The default response format used is `HttpLambdaResponseType.SIMPLE` (format 2.0). If you write
|
|
416
|
+
* your Lambda in TypeScript, this means that your handler must return
|
|
417
|
+
* `APIGatewaySimpleAuthorizerResult` (from the `aws-lambda` package). The request event will also
|
|
418
|
+
* use format 2.0 (`APIGatewayRequestAuthorizerEventV2` in TypeScript). See the AWS docs linked
|
|
419
|
+
* above for more details on these formats.
|
|
420
|
+
*
|
|
421
|
+
* You can override the response format type in
|
|
422
|
+
* {@link CustomLambdaAuthorizerProps.authorizerProps}.
|
|
423
|
+
*
|
|
424
|
+
* See the Lambdas under the `authorizers` folder next to the `ApiGateway` construct in
|
|
425
|
+
* `liflig-cdk` for examples.
|
|
426
|
+
*/
|
|
427
|
+
lambdaAuthorizer: lambda.IFunction;
|
|
428
|
+
/**
|
|
429
|
+
* Props for the `HttpLambdaAuthorizer` construct. We provide some different defaults:
|
|
430
|
+
* - `responseTypes` defaults to `[HttpLambdaResponseType.SIMPLE]`
|
|
431
|
+
* - `resultsCacheTtl` defaults to `Duration.hours(1)`
|
|
432
|
+
*/
|
|
433
|
+
authorizerProps?: Partial<authorizers.HttpLambdaAuthorizerProps>;
|
|
434
|
+
};
|
|
414
435
|
export type ApiGatewayAccessLogsProps = {
|
|
415
436
|
/**
|
|
416
437
|
* Delete the access logs if this construct is deleted?
|
|
@@ -530,3 +551,4 @@ export declare class ApiGateway<AuthScopesT extends string = string> extends con
|
|
|
530
551
|
*/
|
|
531
552
|
grantInvoke(target: iam.IGrantable): void;
|
|
532
553
|
}
|
|
554
|
+
export {};
|