@pipeline-builder/pipeline-core 3.1.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +202 -0
- package/README.md +32 -0
- package/lib/config/app-config.d.ts +81 -0
- package/lib/config/app-config.js +151 -0
- package/lib/config/billing-config.d.ts +17 -0
- package/lib/config/billing-config.js +95 -0
- package/lib/config/config-types.d.ts +213 -0
- package/lib/config/config-types.js +5 -0
- package/lib/config/infrastructure-config.d.ts +55 -0
- package/lib/config/infrastructure-config.js +200 -0
- package/lib/config/server-config.d.ts +53 -0
- package/lib/config/server-config.js +180 -0
- package/lib/core/artifact-manager.d.ts +62 -0
- package/lib/core/artifact-manager.js +86 -0
- package/lib/core/id-generator.d.ts +26 -0
- package/lib/core/id-generator.js +44 -0
- package/lib/core/metadata-builder.d.ts +13 -0
- package/lib/core/metadata-builder.js +81 -0
- package/lib/core/network-types.d.ts +200 -0
- package/lib/core/network-types.js +5 -0
- package/lib/core/network.d.ts +20 -0
- package/lib/core/network.js +84 -0
- package/lib/core/pipeline-helpers.d.ts +53 -0
- package/lib/core/pipeline-helpers.js +273 -0
- package/lib/core/pipeline-types.d.ts +136 -0
- package/lib/core/pipeline-types.js +140 -0
- package/lib/core/role-types.d.ts +254 -0
- package/lib/core/role-types.js +5 -0
- package/lib/core/role.d.ts +14 -0
- package/lib/core/role.js +118 -0
- package/lib/core/security-group-types.d.ts +84 -0
- package/lib/core/security-group-types.js +5 -0
- package/lib/core/security-group.d.ts +14 -0
- package/lib/core/security-group.js +34 -0
- package/lib/handlers/plugin-lookup-handler.d.ts +32 -0
- package/lib/handlers/plugin-lookup-handler.js +313 -0
- package/lib/handlers/pnpm-lock.yaml +12 -0
- package/lib/index.d.ts +54 -0
- package/lib/index.js +112 -0
- package/lib/pipeline/pipeline-builder.d.ts +82 -0
- package/lib/pipeline/pipeline-builder.js +292 -0
- package/lib/pipeline/pipeline-configuration.d.ts +72 -0
- package/lib/pipeline/pipeline-configuration.js +196 -0
- package/lib/pipeline/plugin-lookup.d.ts +100 -0
- package/lib/pipeline/plugin-lookup.js +247 -0
- package/lib/pipeline/source-builder.d.ts +47 -0
- package/lib/pipeline/source-builder.js +111 -0
- package/lib/pipeline/source-types.d.ts +191 -0
- package/lib/pipeline/source-types.js +5 -0
- package/lib/pipeline/stage-builder.d.ts +71 -0
- package/lib/pipeline/stage-builder.js +118 -0
- package/lib/pipeline/step-types.d.ts +307 -0
- package/lib/pipeline/step-types.js +5 -0
- package/package.json +137 -0
|
@@ -0,0 +1,254 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Role configuration using an IAM role ARN
|
|
3
|
+
*
|
|
4
|
+
* Looks up an existing IAM role by its ARN via `Role.fromRoleArn`.
|
|
5
|
+
*
|
|
6
|
+
* @example
|
|
7
|
+
* ```typescript
|
|
8
|
+
* const role: RoleArnConfig = {
|
|
9
|
+
* type: 'roleArn',
|
|
10
|
+
* options: {
|
|
11
|
+
* roleArn: 'arn:aws:iam::123456789012:role/MyPipelineRole',
|
|
12
|
+
* }
|
|
13
|
+
* };
|
|
14
|
+
* ```
|
|
15
|
+
*/
|
|
16
|
+
export interface RoleArnConfig {
|
|
17
|
+
readonly type: 'roleArn';
|
|
18
|
+
readonly options: RoleArnOptions;
|
|
19
|
+
}
|
|
20
|
+
/**
|
|
21
|
+
* Role configuration using an IAM role name
|
|
22
|
+
*
|
|
23
|
+
* Looks up an existing IAM role by its name via `Role.fromRoleName`.
|
|
24
|
+
*
|
|
25
|
+
* @example
|
|
26
|
+
* ```typescript
|
|
27
|
+
* const role: RoleNameConfig = {
|
|
28
|
+
* type: 'roleName',
|
|
29
|
+
* options: {
|
|
30
|
+
* roleName: 'MyPipelineRole',
|
|
31
|
+
* }
|
|
32
|
+
* };
|
|
33
|
+
* ```
|
|
34
|
+
*/
|
|
35
|
+
export interface RoleNameConfig {
|
|
36
|
+
readonly type: 'roleName';
|
|
37
|
+
readonly options: RoleNameOptions;
|
|
38
|
+
}
|
|
39
|
+
/**
|
|
40
|
+
* Configuration options for role lookup by ARN
|
|
41
|
+
*/
|
|
42
|
+
export interface RoleArnOptions {
|
|
43
|
+
/**
|
|
44
|
+
* Full ARN of the IAM role
|
|
45
|
+
* @example 'arn:aws:iam::123456789012:role/MyPipelineRole'
|
|
46
|
+
*/
|
|
47
|
+
readonly roleArn: string;
|
|
48
|
+
/**
|
|
49
|
+
* Whether the imported role can be modified by attaching policy resources to it.
|
|
50
|
+
* Set to false if you know the role is already configured correctly and
|
|
51
|
+
* want to avoid additional API calls during synthesis.
|
|
52
|
+
* @default true
|
|
53
|
+
*/
|
|
54
|
+
readonly mutable?: boolean;
|
|
55
|
+
}
|
|
56
|
+
/**
|
|
57
|
+
* Configuration options for role lookup by name
|
|
58
|
+
*/
|
|
59
|
+
export interface RoleNameOptions {
|
|
60
|
+
/**
|
|
61
|
+
* Name of the IAM role
|
|
62
|
+
* @example 'MyPipelineRole'
|
|
63
|
+
*/
|
|
64
|
+
readonly roleName: string;
|
|
65
|
+
/**
|
|
66
|
+
* Whether the imported role can be modified by attaching policy resources to it.
|
|
67
|
+
* Set to false if you know the role is already configured correctly and
|
|
68
|
+
* want to avoid additional API calls during synthesis.
|
|
69
|
+
* @default true
|
|
70
|
+
*/
|
|
71
|
+
readonly mutable?: boolean;
|
|
72
|
+
}
|
|
73
|
+
/**
|
|
74
|
+
* Role configuration that creates a new IAM role with CodeBuild service principal
|
|
75
|
+
* and minimal CloudWatch Logs permissions.
|
|
76
|
+
*
|
|
77
|
+
* **Important:** This role type uses `codebuild.amazonaws.com` as the trust principal.
|
|
78
|
+
* It is intended for CodeBuild project roles only — do NOT use it as the pipeline-level
|
|
79
|
+
* role (`BuilderProps.role`), which requires `codepipeline.amazonaws.com`. For the
|
|
80
|
+
* pipeline role, use `roleArn` or `roleName` to reference a pre-configured role,
|
|
81
|
+
* or omit `role` entirely to let CDK auto-create one with the correct principal.
|
|
82
|
+
*
|
|
83
|
+
* @example
|
|
84
|
+
* ```typescript
|
|
85
|
+
* const role: CodeBuildDefaultRoleConfig = {
|
|
86
|
+
* type: 'codeBuildDefault',
|
|
87
|
+
* options: {},
|
|
88
|
+
* };
|
|
89
|
+
* ```
|
|
90
|
+
*/
|
|
91
|
+
export interface CodeBuildDefaultRoleConfig {
|
|
92
|
+
readonly type: 'codeBuildDefault';
|
|
93
|
+
readonly options: CodeBuildDefaultRoleOptions;
|
|
94
|
+
}
|
|
95
|
+
/**
|
|
96
|
+
* Configuration options for creating a CodeBuild service role
|
|
97
|
+
*/
|
|
98
|
+
export interface CodeBuildDefaultRoleOptions {
|
|
99
|
+
/**
|
|
100
|
+
* Optional custom role name.
|
|
101
|
+
* When omitted, CDK generates a unique name.
|
|
102
|
+
*/
|
|
103
|
+
readonly roleName?: string;
|
|
104
|
+
}
|
|
105
|
+
/**
|
|
106
|
+
* Role configuration using an OIDC identity provider for federated role assumption.
|
|
107
|
+
*
|
|
108
|
+
* Creates a new IAM role that trusts an OpenID Connect provider (e.g. GitHub Actions,
|
|
109
|
+
* GitLab CI, Bitbucket Pipelines) instead of requiring a static role ARN.
|
|
110
|
+
*
|
|
111
|
+
* Provide either `providerArn` to reference an existing OIDC provider,
|
|
112
|
+
* or `issuer` + `clientIds` to create a new one.
|
|
113
|
+
*
|
|
114
|
+
* @example
|
|
115
|
+
* ```typescript
|
|
116
|
+
* // Reference an existing OIDC provider
|
|
117
|
+
* const role: OidcRoleConfig = {
|
|
118
|
+
* type: 'oidc',
|
|
119
|
+
* options: {
|
|
120
|
+
* providerArn: 'arn:aws:iam::123456789012:oidc-provider/token.actions.githubusercontent.com',
|
|
121
|
+
* conditions: {
|
|
122
|
+
* 'token.actions.githubusercontent.com:sub': 'repo:my-org/my-repo:ref:refs/heads/main',
|
|
123
|
+
* },
|
|
124
|
+
* },
|
|
125
|
+
* };
|
|
126
|
+
*
|
|
127
|
+
* // Create a new OIDC provider inline (GitHub Actions)
|
|
128
|
+
* const role: OidcRoleConfig = {
|
|
129
|
+
* type: 'oidc',
|
|
130
|
+
* options: {
|
|
131
|
+
* issuer: 'https://token.actions.githubusercontent.com',
|
|
132
|
+
* clientIds: ['sts.amazonaws.com'],
|
|
133
|
+
* thumbprints: ['6938fd4d98bab03faadb97b34396831e3780aea1'],
|
|
134
|
+
* conditions: {
|
|
135
|
+
* 'token.actions.githubusercontent.com:sub': 'repo:my-org/my-repo:ref:refs/heads/main',
|
|
136
|
+
* },
|
|
137
|
+
* },
|
|
138
|
+
* };
|
|
139
|
+
* ```
|
|
140
|
+
*/
|
|
141
|
+
export interface OidcRoleConfig {
|
|
142
|
+
readonly type: 'oidc';
|
|
143
|
+
readonly options: OidcRoleOptions;
|
|
144
|
+
}
|
|
145
|
+
/**
|
|
146
|
+
* Configuration options for OIDC federated role assumption.
|
|
147
|
+
*/
|
|
148
|
+
export interface OidcRoleOptions {
|
|
149
|
+
/**
|
|
150
|
+
* ARN of an existing IAM OIDC identity provider.
|
|
151
|
+
* Mutually exclusive with `issuer`.
|
|
152
|
+
* @example 'arn:aws:iam::123456789012:oidc-provider/token.actions.githubusercontent.com'
|
|
153
|
+
*/
|
|
154
|
+
readonly providerArn?: string;
|
|
155
|
+
/**
|
|
156
|
+
* OIDC issuer URL for creating a new provider.
|
|
157
|
+
* Mutually exclusive with `providerArn`.
|
|
158
|
+
* @example 'https://token.actions.githubusercontent.com'
|
|
159
|
+
*/
|
|
160
|
+
readonly issuer?: string;
|
|
161
|
+
/**
|
|
162
|
+
* Client IDs (audiences) trusted by the OIDC provider.
|
|
163
|
+
* Required when using `issuer` to create a new provider.
|
|
164
|
+
* @example ['sts.amazonaws.com']
|
|
165
|
+
*/
|
|
166
|
+
readonly clientIds?: string[];
|
|
167
|
+
/**
|
|
168
|
+
* TLS certificate thumbprints for the OIDC provider.
|
|
169
|
+
* Required when using `issuer` to create a new provider.
|
|
170
|
+
*/
|
|
171
|
+
readonly thumbprints?: string[];
|
|
172
|
+
/**
|
|
173
|
+
* StringEquals conditions for the assume-role trust policy.
|
|
174
|
+
* Keys are the condition claim, values are the expected claim value(s).
|
|
175
|
+
* @example { 'token.actions.githubusercontent.com:sub': 'repo:my-org/my-repo:ref:refs/heads/main' }
|
|
176
|
+
*/
|
|
177
|
+
readonly conditions?: Record<string, string | string[]>;
|
|
178
|
+
/**
|
|
179
|
+
* StringLike conditions for wildcard matching in the trust policy.
|
|
180
|
+
* @example { 'token.actions.githubusercontent.com:sub': 'repo:my-org/*' }
|
|
181
|
+
*/
|
|
182
|
+
readonly conditionsLike?: Record<string, string | string[]>;
|
|
183
|
+
/**
|
|
184
|
+
* Optional custom role name.
|
|
185
|
+
* When omitted, CDK generates a unique name.
|
|
186
|
+
*/
|
|
187
|
+
readonly roleName?: string;
|
|
188
|
+
/**
|
|
189
|
+
* Optional description for the IAM role.
|
|
190
|
+
* Appears in the AWS console and API responses.
|
|
191
|
+
* @example 'OIDC role for GitHub Actions CI/CD pipeline'
|
|
192
|
+
*/
|
|
193
|
+
readonly description?: string;
|
|
194
|
+
/**
|
|
195
|
+
* Maximum session duration in seconds for the assumed role.
|
|
196
|
+
* Controls how long the temporary credentials remain valid.
|
|
197
|
+
* Must be between 3600 (1 hour) and 43200 (12 hours).
|
|
198
|
+
* @default 3600 (1 hour, AWS default)
|
|
199
|
+
*/
|
|
200
|
+
readonly maxSessionDuration?: number;
|
|
201
|
+
/**
|
|
202
|
+
* ARN of an IAM permissions boundary to attach to the role.
|
|
203
|
+
* Required in many enterprise AWS environments to limit maximum permissions.
|
|
204
|
+
* @example 'arn:aws:iam::123456789012:policy/DeveloperBoundary'
|
|
205
|
+
*/
|
|
206
|
+
readonly permissionsBoundaryArn?: string;
|
|
207
|
+
/**
|
|
208
|
+
* Optional managed policy ARNs to attach to the role.
|
|
209
|
+
*/
|
|
210
|
+
readonly managedPolicyArns?: string[];
|
|
211
|
+
/**
|
|
212
|
+
* Inline IAM policy statements to attach to the role.
|
|
213
|
+
* Each entry defines an IAM policy statement with effect, actions, and resources.
|
|
214
|
+
*
|
|
215
|
+
* @example
|
|
216
|
+
* ```typescript
|
|
217
|
+
* policyStatements: [
|
|
218
|
+
* { actions: ['s3:GetObject'], resources: ['arn:aws:s3:::my-bucket/*'] },
|
|
219
|
+
* { actions: ['logs:CreateLogGroup', 'logs:PutLogEvents'], resources: ['*'] },
|
|
220
|
+
* ]
|
|
221
|
+
* ```
|
|
222
|
+
*/
|
|
223
|
+
readonly policyStatements?: OidcPolicyStatement[];
|
|
224
|
+
}
|
|
225
|
+
/**
|
|
226
|
+
* An inline IAM policy statement for OIDC roles.
|
|
227
|
+
*/
|
|
228
|
+
export interface OidcPolicyStatement {
|
|
229
|
+
/**
|
|
230
|
+
* IAM effect. Defaults to 'Allow'.
|
|
231
|
+
*/
|
|
232
|
+
readonly effect?: 'Allow' | 'Deny';
|
|
233
|
+
/**
|
|
234
|
+
* IAM actions (e.g. 's3:GetObject', 'logs:*').
|
|
235
|
+
*/
|
|
236
|
+
readonly actions: string[];
|
|
237
|
+
/**
|
|
238
|
+
* IAM resource ARNs this statement applies to.
|
|
239
|
+
*/
|
|
240
|
+
readonly resources: string[];
|
|
241
|
+
}
|
|
242
|
+
/**
|
|
243
|
+
* Union type of all supported role configurations.
|
|
244
|
+
*
|
|
245
|
+
* Used at the pipeline level (`BuilderProps.role`) to specify the IAM role
|
|
246
|
+
* for the CodePipeline construct.
|
|
247
|
+
*
|
|
248
|
+
* Each variant resolves to a CDK `IRole`:
|
|
249
|
+
* - RoleArnConfig: Role looked up by ARN
|
|
250
|
+
* - RoleNameConfig: Role looked up by name
|
|
251
|
+
* - CodeBuildDefaultRoleConfig: Creates a new role with CodeBuild trust + CloudWatch Logs
|
|
252
|
+
* - OidcRoleConfig: Creates a new role with OIDC federated trust (no static ARN needed)
|
|
253
|
+
*/
|
|
254
|
+
export type RoleConfig = RoleArnConfig | RoleNameConfig | CodeBuildDefaultRoleConfig | OidcRoleConfig;
|
|
@@ -0,0 +1,5 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// Copyright 2026 Pipeline Builder Contributors
|
|
3
|
+
// SPDX-License-Identifier: Apache-2.0
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"role-types.js","sourceRoot":"","sources":["../../src/core/role-types.ts"],"names":[],"mappings":";AAAA,+CAA+C;AAC/C,sCAAsC","sourcesContent":["// Copyright 2026 Pipeline Builder Contributors\n// SPDX-License-Identifier: Apache-2.0\n\n/**\n * Role configuration using an IAM role ARN\n *\n * Looks up an existing IAM role by its ARN via `Role.fromRoleArn`.\n *\n * @example\n * ```typescript\n * const role: RoleArnConfig = {\n *   type: 'roleArn',\n *   options: {\n *     roleArn: 'arn:aws:iam::123456789012:role/MyPipelineRole',\n *   }\n * };\n * ```\n */\nexport interface RoleArnConfig {\n  readonly type: 'roleArn';\n  readonly options: RoleArnOptions;\n}\n\n/**\n * Role configuration using an IAM role name\n *\n * Looks up an existing IAM role by its name via `Role.fromRoleName`.\n *\n * @example\n * ```typescript\n * const role: RoleNameConfig = {\n *   type: 'roleName',\n *   options: {\n *     roleName: 'MyPipelineRole',\n *   }\n * };\n * ```\n */\nexport interface RoleNameConfig {\n  readonly type: 'roleName';\n  readonly options: RoleNameOptions;\n}\n\n/**\n * Configuration options for role lookup by ARN\n */\nexport interface RoleArnOptions {\n  /**\n   * Full ARN of the IAM role\n   * @example 'arn:aws:iam::123456789012:role/MyPipelineRole'\n   */\n  readonly roleArn: string;\n\n  /**\n   * Whether the imported role can be modified by attaching policy resources to it.\n   * Set to false if you know the role is already configured correctly and\n   * want to avoid additional API calls during synthesis.\n   * @default true\n   */\n  readonly mutable?: boolean;\n}\n\n/**\n * Configuration options for role lookup by name\n */\nexport interface RoleNameOptions {\n  /**\n   * Name of the IAM role\n   * @example 'MyPipelineRole'\n   */\n  readonly roleName: string;\n\n  /**\n   * Whether the imported role can be modified by attaching policy resources to it.\n   * Set to false if you know the role is already configured correctly and\n   * want to avoid additional API calls during synthesis.\n   * @default true\n   */\n  readonly mutable?: boolean;\n}\n\n/**\n * Role configuration that creates a new IAM role with CodeBuild service principal\n * and minimal CloudWatch Logs permissions.\n *\n * **Important:** This role type uses `codebuild.amazonaws.com` as the trust principal.\n * It is intended for CodeBuild project roles only — do NOT use it as the pipeline-level\n * role (`BuilderProps.role`), which requires `codepipeline.amazonaws.com`. For the\n * pipeline role, use `roleArn` or `roleName` to reference a pre-configured role,\n * or omit `role` entirely to let CDK auto-create one with the correct principal.\n *\n * @example\n * ```typescript\n * const role: CodeBuildDefaultRoleConfig = {\n *   type: 'codeBuildDefault',\n *   options: {},\n * };\n * ```\n */\nexport interface CodeBuildDefaultRoleConfig {\n  readonly type: 'codeBuildDefault';\n  readonly options: CodeBuildDefaultRoleOptions;\n}\n\n/**\n * Configuration options for creating a CodeBuild service role\n */\nexport interface CodeBuildDefaultRoleOptions {\n  /**\n   * Optional custom role name.\n   * When omitted, CDK generates a unique name.\n   */\n  readonly roleName?: string;\n}\n\n/**\n * Role configuration using an OIDC identity provider for federated role assumption.\n *\n * Creates a new IAM role that trusts an OpenID Connect provider (e.g. GitHub Actions,\n * GitLab CI, Bitbucket Pipelines) instead of requiring a static role ARN.\n *\n * Provide either `providerArn` to reference an existing OIDC provider,\n * or `issuer` + `clientIds` to create a new one.\n *\n * @example\n * ```typescript\n * // Reference an existing OIDC provider\n * const role: OidcRoleConfig = {\n *   type: 'oidc',\n *   options: {\n *     providerArn: 'arn:aws:iam::123456789012:oidc-provider/token.actions.githubusercontent.com',\n *     conditions: {\n *       'token.actions.githubusercontent.com:sub': 'repo:my-org/my-repo:ref:refs/heads/main',\n *     },\n *   },\n * };\n *\n * // Create a new OIDC provider inline (GitHub Actions)\n * const role: OidcRoleConfig = {\n *   type: 'oidc',\n *   options: {\n *     issuer: 'https://token.actions.githubusercontent.com',\n *     clientIds: ['sts.amazonaws.com'],\n *     thumbprints: ['6938fd4d98bab03faadb97b34396831e3780aea1'],\n *     conditions: {\n *       'token.actions.githubusercontent.com:sub': 'repo:my-org/my-repo:ref:refs/heads/main',\n *     },\n *   },\n * };\n * ```\n */\nexport interface OidcRoleConfig {\n  readonly type: 'oidc';\n  readonly options: OidcRoleOptions;\n}\n\n/**\n * Configuration options for OIDC federated role assumption.\n */\nexport interface OidcRoleOptions {\n  /**\n   * ARN of an existing IAM OIDC identity provider.\n   * Mutually exclusive with `issuer`.\n   * @example 'arn:aws:iam::123456789012:oidc-provider/token.actions.githubusercontent.com'\n   */\n  readonly providerArn?: string;\n\n  /**\n   * OIDC issuer URL for creating a new provider.\n   * Mutually exclusive with `providerArn`.\n   * @example 'https://token.actions.githubusercontent.com'\n   */\n  readonly issuer?: string;\n\n  /**\n   * Client IDs (audiences) trusted by the OIDC provider.\n   * Required when using `issuer` to create a new provider.\n   * @example ['sts.amazonaws.com']\n   */\n  readonly clientIds?: string[];\n\n  /**\n   * TLS certificate thumbprints for the OIDC provider.\n   * Required when using `issuer` to create a new provider.\n   */\n  readonly thumbprints?: string[];\n\n  /**\n   * StringEquals conditions for the assume-role trust policy.\n   * Keys are the condition claim, values are the expected claim value(s).\n   * @example { 'token.actions.githubusercontent.com:sub': 'repo:my-org/my-repo:ref:refs/heads/main' }\n   */\n  readonly conditions?: Record<string, string | string[]>;\n\n  /**\n   * StringLike conditions for wildcard matching in the trust policy.\n   * @example { 'token.actions.githubusercontent.com:sub': 'repo:my-org/*' }\n   */\n  readonly conditionsLike?: Record<string, string | string[]>;\n\n  /**\n   * Optional custom role name.\n   * When omitted, CDK generates a unique name.\n   */\n  readonly roleName?: string;\n\n  /**\n   * Optional description for the IAM role.\n   * Appears in the AWS console and API responses.\n   * @example 'OIDC role for GitHub Actions CI/CD pipeline'\n   */\n  readonly description?: string;\n\n  /**\n   * Maximum session duration in seconds for the assumed role.\n   * Controls how long the temporary credentials remain valid.\n   * Must be between 3600 (1 hour) and 43200 (12 hours).\n   * @default 3600 (1 hour, AWS default)\n   */\n  readonly maxSessionDuration?: number;\n\n  /**\n   * ARN of an IAM permissions boundary to attach to the role.\n   * Required in many enterprise AWS environments to limit maximum permissions.\n   * @example 'arn:aws:iam::123456789012:policy/DeveloperBoundary'\n   */\n  readonly permissionsBoundaryArn?: string;\n\n  /**\n   * Optional managed policy ARNs to attach to the role.\n   */\n  readonly managedPolicyArns?: string[];\n\n  /**\n   * Inline IAM policy statements to attach to the role.\n   * Each entry defines an IAM policy statement with effect, actions, and resources.\n   *\n   * @example\n   * ```typescript\n   * policyStatements: [\n   *   { actions: ['s3:GetObject'], resources: ['arn:aws:s3:::my-bucket/*'] },\n   *   { actions: ['logs:CreateLogGroup', 'logs:PutLogEvents'], resources: ['*'] },\n   * ]\n   * ```\n   */\n  readonly policyStatements?: OidcPolicyStatement[];\n}\n\n/**\n * An inline IAM policy statement for OIDC roles.\n */\nexport interface OidcPolicyStatement {\n  /**\n   * IAM effect. Defaults to 'Allow'.\n   */\n  readonly effect?: 'Allow' | 'Deny';\n\n  /**\n   * IAM actions (e.g. 's3:GetObject', 'logs:*').\n   */\n  readonly actions: string[];\n\n  /**\n   * IAM resource ARNs this statement applies to.\n   */\n  readonly resources: string[];\n}\n\n/**\n * Union type of all supported role configurations.\n *\n * Used at the pipeline level (`BuilderProps.role`) to specify the IAM role\n * for the CodePipeline construct.\n *\n * Each variant resolves to a CDK `IRole`:\n * - RoleArnConfig: Role looked up by ARN\n * - RoleNameConfig: Role looked up by name\n * - CodeBuildDefaultRoleConfig: Creates a new role with CodeBuild trust + CloudWatch Logs\n * - OidcRoleConfig: Creates a new role with OIDC federated trust (no static ARN needed)\n */\nexport type RoleConfig = RoleArnConfig | RoleNameConfig | CodeBuildDefaultRoleConfig | OidcRoleConfig;\n"]}
|
|
@@ -0,0 +1,14 @@
|
|
|
1
|
+
import { IRole } from 'aws-cdk-lib/aws-iam';
|
|
2
|
+
import { Construct } from 'constructs';
|
|
3
|
+
import { UniqueId } from './id-generator';
|
|
4
|
+
import type { RoleConfig } from './role-types';
|
|
5
|
+
/**
|
|
6
|
+
* Resolve a RoleConfig into a CDK IRole.
|
|
7
|
+
* Uses discriminated union narrowing to delegate to the appropriate CDK lookup.
|
|
8
|
+
*
|
|
9
|
+
* @param scope - CDK construct scope
|
|
10
|
+
* @param id - UniqueId instance for generating unique construct IDs
|
|
11
|
+
* @param config - Role configuration to resolve
|
|
12
|
+
* @returns Resolved CDK IRole ready to pass to CodePipeline
|
|
13
|
+
*/
|
|
14
|
+
export declare function resolveRole(scope: Construct, id: UniqueId, config: RoleConfig): IRole;
|
package/lib/core/role.js
ADDED
|
@@ -0,0 +1,118 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// Copyright 2026 Pipeline Builder Contributors
|
|
3
|
+
// SPDX-License-Identifier: Apache-2.0
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.resolveRole = resolveRole;
|
|
6
|
+
const aws_cdk_lib_1 = require("aws-cdk-lib");
|
|
7
|
+
const aws_iam_1 = require("aws-cdk-lib/aws-iam");
|
|
8
|
+
const app_config_1 = require("../config/app-config");
|
|
9
|
+
/**
|
|
10
|
+
* Resolve a RoleConfig into a CDK IRole.
|
|
11
|
+
* Uses discriminated union narrowing to delegate to the appropriate CDK lookup.
|
|
12
|
+
*
|
|
13
|
+
* @param scope - CDK construct scope
|
|
14
|
+
* @param id - UniqueId instance for generating unique construct IDs
|
|
15
|
+
* @param config - Role configuration to resolve
|
|
16
|
+
* @returns Resolved CDK IRole ready to pass to CodePipeline
|
|
17
|
+
*/
|
|
18
|
+
function resolveRole(scope, id, config) {
|
|
19
|
+
switch (config.type) {
|
|
20
|
+
case 'roleArn':
|
|
21
|
+
return aws_iam_1.Role.fromRoleArn(scope, id.generate('role:arn'), config.options.roleArn, {
|
|
22
|
+
mutable: config.options.mutable,
|
|
23
|
+
});
|
|
24
|
+
case 'roleName':
|
|
25
|
+
return aws_iam_1.Role.fromRoleName(scope, id.generate('role:name'), config.options.roleName, {
|
|
26
|
+
mutable: config.options.mutable,
|
|
27
|
+
});
|
|
28
|
+
case 'codeBuildDefault':
|
|
29
|
+
return createCodeBuildDefaultRole(scope, id, config.options);
|
|
30
|
+
case 'oidc':
|
|
31
|
+
return createOidcRole(scope, id, config.options);
|
|
32
|
+
default: {
|
|
33
|
+
const _exhaustive = config;
|
|
34
|
+
throw new Error(`Unknown role config type: ${_exhaustive.type}`);
|
|
35
|
+
}
|
|
36
|
+
}
|
|
37
|
+
}
|
|
38
|
+
/**
|
|
39
|
+
* Creates a new IAM role with CodeBuild service principal and CloudWatch Logs permissions.
|
|
40
|
+
*/
|
|
41
|
+
function createCodeBuildDefaultRole(scope, id, options) {
|
|
42
|
+
const role = new aws_iam_1.Role(scope, id.generate('role:codebuild'), {
|
|
43
|
+
assumedBy: new aws_iam_1.ServicePrincipal('codebuild.amazonaws.com'),
|
|
44
|
+
...(options.roleName && { roleName: options.roleName }),
|
|
45
|
+
});
|
|
46
|
+
const stack = aws_cdk_lib_1.Stack.of(scope);
|
|
47
|
+
const logGroupPrefix = app_config_1.Config.get('aws').logging.groupName;
|
|
48
|
+
// Derive ARN pattern from the configured log group name (strip trailing segment for wildcard)
|
|
49
|
+
const logGroupPattern = logGroupPrefix.replace(/\/[^/]*$/, '/*');
|
|
50
|
+
role.addToPolicy(new aws_iam_1.PolicyStatement({
|
|
51
|
+
effect: aws_iam_1.Effect.ALLOW,
|
|
52
|
+
actions: [
|
|
53
|
+
'logs:CreateLogGroup',
|
|
54
|
+
'logs:CreateLogStream',
|
|
55
|
+
'logs:PutLogEvents',
|
|
56
|
+
],
|
|
57
|
+
resources: [
|
|
58
|
+
`arn:aws:logs:${stack.region}:${stack.account}:log-group:${logGroupPattern}:*`,
|
|
59
|
+
],
|
|
60
|
+
}));
|
|
61
|
+
return role;
|
|
62
|
+
}
|
|
63
|
+
/**
|
|
64
|
+
* Creates a new IAM role with an OIDC federated trust principal.
|
|
65
|
+
*
|
|
66
|
+
* Supports either referencing an existing OIDC provider by ARN
|
|
67
|
+
* or creating a new one from issuer URL + client IDs.
|
|
68
|
+
*/
|
|
69
|
+
function createOidcRole(scope, id, options) {
|
|
70
|
+
if (options.providerArn && options.issuer) {
|
|
71
|
+
throw new Error('OIDC role config must specify either providerArn or issuer, not both');
|
|
72
|
+
}
|
|
73
|
+
let provider;
|
|
74
|
+
if (options.providerArn) {
|
|
75
|
+
provider = aws_iam_1.OpenIdConnectProvider.fromOpenIdConnectProviderArn(scope, id.generate('oidc:provider'), options.providerArn);
|
|
76
|
+
}
|
|
77
|
+
else if (options.issuer) {
|
|
78
|
+
provider = new aws_iam_1.OpenIdConnectProvider(scope, id.generate('oidc:provider'), {
|
|
79
|
+
url: options.issuer,
|
|
80
|
+
clientIds: options.clientIds ?? ['sts.amazonaws.com'],
|
|
81
|
+
thumbprints: options.thumbprints,
|
|
82
|
+
});
|
|
83
|
+
}
|
|
84
|
+
else {
|
|
85
|
+
throw new Error('OIDC role config requires either providerArn or issuer');
|
|
86
|
+
}
|
|
87
|
+
const principal = new aws_iam_1.OpenIdConnectPrincipal(provider, {
|
|
88
|
+
...(options.conditions && { StringEquals: options.conditions }),
|
|
89
|
+
...(options.conditionsLike && { StringLike: options.conditionsLike }),
|
|
90
|
+
});
|
|
91
|
+
const role = new aws_iam_1.Role(scope, id.generate('role:oidc'), {
|
|
92
|
+
assumedBy: principal,
|
|
93
|
+
...(options.roleName && { roleName: options.roleName }),
|
|
94
|
+
...(options.description && { description: options.description }),
|
|
95
|
+
...(options.maxSessionDuration && {
|
|
96
|
+
maxSessionDuration: aws_cdk_lib_1.Duration.seconds(options.maxSessionDuration),
|
|
97
|
+
}),
|
|
98
|
+
...(options.permissionsBoundaryArn && {
|
|
99
|
+
permissionsBoundary: aws_iam_1.ManagedPolicy.fromManagedPolicyArn(scope, id.generate('oidc:boundary'), options.permissionsBoundaryArn),
|
|
100
|
+
}),
|
|
101
|
+
});
|
|
102
|
+
if (options.managedPolicyArns) {
|
|
103
|
+
for (const arn of options.managedPolicyArns) {
|
|
104
|
+
role.addManagedPolicy(aws_iam_1.ManagedPolicy.fromManagedPolicyArn(scope, id.generate('oidc:policy'), arn));
|
|
105
|
+
}
|
|
106
|
+
}
|
|
107
|
+
if (options.policyStatements) {
|
|
108
|
+
for (const stmt of options.policyStatements) {
|
|
109
|
+
role.addToPolicy(new aws_iam_1.PolicyStatement({
|
|
110
|
+
effect: stmt.effect === 'Deny' ? aws_iam_1.Effect.DENY : aws_iam_1.Effect.ALLOW,
|
|
111
|
+
actions: stmt.actions,
|
|
112
|
+
resources: stmt.resources,
|
|
113
|
+
}));
|
|
114
|
+
}
|
|
115
|
+
}
|
|
116
|
+
return role;
|
|
117
|
+
}
|
|
118
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"role.js","sourceRoot":"","sources":["../../src/core/role.ts"],"names":[],"mappings":";AAAA,+CAA+C;AAC/C,sCAAsC;;AA4BtC,kCAuBC;AAjDD,6CAA8C;AAC9C,iDAU6B;AAI7B,qDAA8C;AAE9C;;;;;;;;GAQG;AACH,SAAgB,WAAW,CACzB,KAAgB,EAChB,EAAY,EACZ,MAAkB;IAElB,QAAQ,MAAM,CAAC,IAAI,EAAE,CAAC;QACpB,KAAK,SAAS;YACZ,OAAO,cAAI,CAAC,WAAW,CAAC,KAAK,EAAE,EAAE,CAAC,QAAQ,CAAC,UAAU,CAAC,EAAE,MAAM,CAAC,OAAO,CAAC,OAAO,EAAE;gBAC9E,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC,OAAO;aAChC,CAAC,CAAC;QACL,KAAK,UAAU;YACb,OAAO,cAAI,CAAC,YAAY,CAAC,KAAK,EAAE,EAAE,CAAC,QAAQ,CAAC,WAAW,CAAC,EAAE,MAAM,CAAC,OAAO,CAAC,QAAQ,EAAE;gBACjF,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC,OAAO;aAChC,CAAC,CAAC;QACL,KAAK,kBAAkB;YACrB,OAAO,0BAA0B,CAAC,KAAK,EAAE,EAAE,EAAE,MAAM,CAAC,OAAO,CAAC,CAAC;QAC/D,KAAK,MAAM;YACT,OAAO,cAAc,CAAC,KAAK,EAAE,EAAE,EAAE,MAAM,CAAC,OAAO,CAAC,CAAC;QACnD,OAAO,CAAC,CAAC,CAAC;YACR,MAAM,WAAW,GAAU,MAAM,CAAC;YAClC,MAAM,IAAI,KAAK,CAAC,6BAA8B,WAA0B,CAAC,IAAI,EAAE,CAAC,CAAC;QACnF,CAAC;IACH,CAAC;AACH,CAAC;AAED;;GAEG;AACH,SAAS,0BAA0B,CACjC,KAAgB,EAChB,EAAY,EACZ,OAAoC;IAEpC,MAAM,IAAI,GAAG,IAAI,cAAI,CAAC,KAAK,EAAE,EAAE,CAAC,QAAQ,CAAC,gBAAgB,CAAC,EAAE;QAC1D,SAAS,EAAE,IAAI,0BAAgB,CAAC,yBAAyB,CAAC;QAC1D,GAAG,CAAC,OAAO,CAAC,QAAQ,IAAI,EAAE,QAAQ,EAAE,OAAO,CAAC,QAAQ,EAAE,CAAC;KACxD,CAAC,CAAC;IAEH,MAAM,KAAK,GAAG,mBAAK,CAAC,EAAE,CAAC,KAAK,CAAC,CAAC;IAC9B,MAAM,cAAc,GAAG,mBAAM,CAAC,GAAG,CAAC,KAAK,CAAC,CAAC,OAAO,CAAC,SAAS,CAAC;IAC3D,8FAA8F;IAC9F,MAAM,eAAe,GAAG,cAAc,CAAC,OAAO,CAAC,UAAU,EAAE,IAAI,CAAC,CAAC;IACjE,IAAI,CAAC,WAAW,CACd,IAAI,yBAAe,CAAC;QAClB,MAAM,EAAE,gBAAM,CAAC,KAAK;QACpB,OAAO,EAAE;YACP,qBAAqB;YACrB,sBAAsB;YACtB,mBAAmB;SACpB;QACD,SAAS,EAAE;YACT,gBAAgB,KAAK,CAAC,MAAM,IAAI,KAAK,CAAC,OAAO,cAAc,eAAe,IAAI;SAC/E;KACF,CAAC,CACH,CAAC;IAEF,OAAO,IAAI,CAAC;AACd,CAAC;AAED;;;;;GAKG;AACH,SAAS,cAAc,CACrB,KAAgB,EAChB,EAAY,EACZ,OAAwB;IAExB,IAAI,OAAO,CAAC,WAAW,IAAI,OAAO,CAAC,MAAM,EAAE,CAAC;QAC1C,MAAM,IAAI,KAAK,CAAC,sEAAsE,CAAC,CAAC;IAC1F,CAAC;IAED,IAAI,QAAgC,CAAC;IAErC,IAAI,OAAO,CAAC,WAAW,EAAE,CAAC;QACxB,QAAQ,GAAG,+BAAqB,CAAC,4BAA4B,CAC3D,KAAK,EACL,EAAE,CAAC,QAAQ,CAAC,eAAe,CAAC,EAC5B,OAAO,CAAC,WAAW,CACpB,CAAC;IACJ,CAAC;SAAM,IAAI,OAAO,CAAC,MAAM,EAAE,CAAC;QAC1B,QAAQ,GAAG,IAAI,+BAAqB,CAAC,KAAK,EAAE,EAAE,CAAC,QAAQ,CAAC,eAAe,CAAC,EAAE;YACxE,GAAG,EAAE,OAAO,CAAC,MAAM;YACnB,SAAS,EAAE,OAAO,CAAC,SAAS,IAAI,CAAC,mBAAmB,CAAC;YACrD,WAAW,EAAE,OAAO,CAAC,WAAW;SACjC,CAAC,CAAC;IACL,CAAC;SAAM,CAAC;QACN,MAAM,IAAI,KAAK,CAAC,wDAAwD,CAAC,CAAC;IAC5E,CAAC;IAED,MAAM,SAAS,GAAG,IAAI,gCAAsB,CAAC,QAAQ,EAAE;QACrD,GAAG,CAAC,OAAO,CAAC,UAAU,IAAI,EAAE,YAAY,EAAE,OAAO,CAAC,UAAU,EAAE,CAAC;QAC/D,GAAG,CAAC,OAAO,CAAC,cAAc,IAAI,EAAE,UAAU,EAAE,OAAO,CAAC,cAAc,EAAE,CAAC;KACtE,CAAC,CAAC;IAEH,MAAM,IAAI,GAAG,IAAI,cAAI,CAAC,KAAK,EAAE,EAAE,CAAC,QAAQ,CAAC,WAAW,CAAC,EAAE;QACrD,SAAS,EAAE,SAAS;QACpB,GAAG,CAAC,OAAO,CAAC,QAAQ,IAAI,EAAE,QAAQ,EAAE,OAAO,CAAC,QAAQ,EAAE,CAAC;QACvD,GAAG,CAAC,OAAO,CAAC,WAAW,IAAI,EAAE,WAAW,EAAE,OAAO,CAAC,WAAW,EAAE,CAAC;QAChE,GAAG,CAAC,OAAO,CAAC,kBAAkB,IAAI;YAChC,kBAAkB,EAAE,sBAAQ,CAAC,OAAO,CAAC,OAAO,CAAC,kBAAkB,CAAC;SACjE,CAAC;QACF,GAAG,CAAC,OAAO,CAAC,sBAAsB,IAAI;YACpC,mBAAmB,EAAE,uBAAa,CAAC,oBAAoB,CACrD,KAAK,EACL,EAAE,CAAC,QAAQ,CAAC,eAAe,CAAC,EAC5B,OAAO,CAAC,sBAAsB,CAC/B;SACF,CAAC;KACH,CAAC,CAAC;IAEH,IAAI,OAAO,CAAC,iBAAiB,EAAE,CAAC;QAC9B,KAAK,MAAM,GAAG,IAAI,OAAO,CAAC,iBAAiB,EAAE,CAAC;YAC5C,IAAI,CAAC,gBAAgB,CAAC,uBAAa,CAAC,oBAAoB,CAAC,KAAK,EAAE,EAAE,CAAC,QAAQ,CAAC,aAAa,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC;QACpG,CAAC;IACH,CAAC;IAED,IAAI,OAAO,CAAC,gBAAgB,EAAE,CAAC;QAC7B,KAAK,MAAM,IAAI,IAAI,OAAO,CAAC,gBAAgB,EAAE,CAAC;YAC5C,IAAI,CAAC,WAAW,CACd,IAAI,yBAAe,CAAC;gBAClB,MAAM,EAAE,IAAI,CAAC,MAAM,KAAK,MAAM,CAAC,CAAC,CAAC,gBAAM,CAAC,IAAI,CAAC,CAAC,CAAC,gBAAM,CAAC,KAAK;gBAC3D,OAAO,EAAE,IAAI,CAAC,OAAO;gBACrB,SAAS,EAAE,IAAI,CAAC,SAAS;aAC1B,CAAC,CACH,CAAC;QACJ,CAAC;IACH,CAAC;IAED,OAAO,IAAI,CAAC;AACd,CAAC","sourcesContent":["// Copyright 2026 Pipeline Builder Contributors\n// SPDX-License-Identifier: Apache-2.0\n\nimport { Duration, Stack } from 'aws-cdk-lib';\nimport {\n  Effect,\n  IOpenIdConnectProvider,\n  IRole,\n  ManagedPolicy,\n  OpenIdConnectPrincipal,\n  OpenIdConnectProvider,\n  PolicyStatement,\n  Role,\n  ServicePrincipal,\n} from 'aws-cdk-lib/aws-iam';\nimport { Construct } from 'constructs';\nimport { UniqueId } from './id-generator';\nimport type { CodeBuildDefaultRoleOptions, OidcRoleOptions, RoleConfig } from './role-types';\nimport { Config } from '../config/app-config';\n\n/**\n * Resolve a RoleConfig into a CDK IRole.\n * Uses discriminated union narrowing to delegate to the appropriate CDK lookup.\n *\n * @param scope - CDK construct scope\n * @param id - UniqueId instance for generating unique construct IDs\n * @param config - Role configuration to resolve\n * @returns Resolved CDK IRole ready to pass to CodePipeline\n */\nexport function resolveRole(\n  scope: Construct,\n  id: UniqueId,\n  config: RoleConfig,\n): IRole {\n  switch (config.type) {\n    case 'roleArn':\n      return Role.fromRoleArn(scope, id.generate('role:arn'), config.options.roleArn, {\n        mutable: config.options.mutable,\n      });\n    case 'roleName':\n      return Role.fromRoleName(scope, id.generate('role:name'), config.options.roleName, {\n        mutable: config.options.mutable,\n      });\n    case 'codeBuildDefault':\n      return createCodeBuildDefaultRole(scope, id, config.options);\n    case 'oidc':\n      return createOidcRole(scope, id, config.options);\n    default: {\n      const _exhaustive: never = config;\n      throw new Error(`Unknown role config type: ${(_exhaustive as RoleConfig).type}`);\n    }\n  }\n}\n\n/**\n * Creates a new IAM role with CodeBuild service principal and CloudWatch Logs permissions.\n */\nfunction createCodeBuildDefaultRole(\n  scope: Construct,\n  id: UniqueId,\n  options: CodeBuildDefaultRoleOptions,\n): IRole {\n  const role = new Role(scope, id.generate('role:codebuild'), {\n    assumedBy: new ServicePrincipal('codebuild.amazonaws.com'),\n    ...(options.roleName && { roleName: options.roleName }),\n  });\n\n  const stack = Stack.of(scope);\n  const logGroupPrefix = Config.get('aws').logging.groupName;\n  // Derive ARN pattern from the configured log group name (strip trailing segment for wildcard)\n  const logGroupPattern = logGroupPrefix.replace(/\\/[^/]*$/, '/*');\n  role.addToPolicy(\n    new PolicyStatement({\n      effect: Effect.ALLOW,\n      actions: [\n        'logs:CreateLogGroup',\n        'logs:CreateLogStream',\n        'logs:PutLogEvents',\n      ],\n      resources: [\n        `arn:aws:logs:${stack.region}:${stack.account}:log-group:${logGroupPattern}:*`,\n      ],\n    }),\n  );\n\n  return role;\n}\n\n/**\n * Creates a new IAM role with an OIDC federated trust principal.\n *\n * Supports either referencing an existing OIDC provider by ARN\n * or creating a new one from issuer URL + client IDs.\n */\nfunction createOidcRole(\n  scope: Construct,\n  id: UniqueId,\n  options: OidcRoleOptions,\n): IRole {\n  if (options.providerArn && options.issuer) {\n    throw new Error('OIDC role config must specify either providerArn or issuer, not both');\n  }\n\n  let provider: IOpenIdConnectProvider;\n\n  if (options.providerArn) {\n    provider = OpenIdConnectProvider.fromOpenIdConnectProviderArn(\n      scope,\n      id.generate('oidc:provider'),\n      options.providerArn,\n    );\n  } else if (options.issuer) {\n    provider = new OpenIdConnectProvider(scope, id.generate('oidc:provider'), {\n      url: options.issuer,\n      clientIds: options.clientIds ?? ['sts.amazonaws.com'],\n      thumbprints: options.thumbprints,\n    });\n  } else {\n    throw new Error('OIDC role config requires either providerArn or issuer');\n  }\n\n  const principal = new OpenIdConnectPrincipal(provider, {\n    ...(options.conditions && { StringEquals: options.conditions }),\n    ...(options.conditionsLike && { StringLike: options.conditionsLike }),\n  });\n\n  const role = new Role(scope, id.generate('role:oidc'), {\n    assumedBy: principal,\n    ...(options.roleName && { roleName: options.roleName }),\n    ...(options.description && { description: options.description }),\n    ...(options.maxSessionDuration && {\n      maxSessionDuration: Duration.seconds(options.maxSessionDuration),\n    }),\n    ...(options.permissionsBoundaryArn && {\n      permissionsBoundary: ManagedPolicy.fromManagedPolicyArn(\n        scope,\n        id.generate('oidc:boundary'),\n        options.permissionsBoundaryArn,\n      ),\n    }),\n  });\n\n  if (options.managedPolicyArns) {\n    for (const arn of options.managedPolicyArns) {\n      role.addManagedPolicy(ManagedPolicy.fromManagedPolicyArn(scope, id.generate('oidc:policy'), arn));\n    }\n  }\n\n  if (options.policyStatements) {\n    for (const stmt of options.policyStatements) {\n      role.addToPolicy(\n        new PolicyStatement({\n          effect: stmt.effect === 'Deny' ? Effect.DENY : Effect.ALLOW,\n          actions: stmt.actions,\n          resources: stmt.resources,\n        }),\n      );\n    }\n  }\n\n  return role;\n}\n"]}
|
|
@@ -0,0 +1,84 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Security group configuration using explicit security group IDs
|
|
3
|
+
*
|
|
4
|
+
* Looks up existing security groups by their IDs via `SecurityGroup.fromSecurityGroupId`.
|
|
5
|
+
*
|
|
6
|
+
* @example
|
|
7
|
+
* ```typescript
|
|
8
|
+
* const sg: SecurityGroupIdsConfig = {
|
|
9
|
+
* type: 'securityGroupIds',
|
|
10
|
+
* options: {
|
|
11
|
+
* securityGroupIds: ['sg-12345678', 'sg-87654321'],
|
|
12
|
+
* }
|
|
13
|
+
* };
|
|
14
|
+
* ```
|
|
15
|
+
*/
|
|
16
|
+
export interface SecurityGroupIdsConfig {
|
|
17
|
+
readonly type: 'securityGroupIds';
|
|
18
|
+
readonly options: SecurityGroupIdsOptions;
|
|
19
|
+
}
|
|
20
|
+
/**
|
|
21
|
+
* Security group configuration using name-based lookup
|
|
22
|
+
*
|
|
23
|
+
* Looks up an existing security group by name and VPC ID
|
|
24
|
+
* via `SecurityGroup.fromLookupByName`.
|
|
25
|
+
*
|
|
26
|
+
* @example
|
|
27
|
+
* ```typescript
|
|
28
|
+
* const sg: SecurityGroupLookupConfig = {
|
|
29
|
+
* type: 'securityGroupLookup',
|
|
30
|
+
* options: {
|
|
31
|
+
* securityGroupName: 'my-codebuild-sg',
|
|
32
|
+
* vpcId: 'vpc-0a1b2c3d4e5f6a7b8',
|
|
33
|
+
* }
|
|
34
|
+
* };
|
|
35
|
+
* ```
|
|
36
|
+
*/
|
|
37
|
+
export interface SecurityGroupLookupConfig {
|
|
38
|
+
readonly type: 'securityGroupLookup';
|
|
39
|
+
readonly options: SecurityGroupLookupOptions;
|
|
40
|
+
}
|
|
41
|
+
/**
|
|
42
|
+
* Configuration options for security group lookup by IDs
|
|
43
|
+
*/
|
|
44
|
+
export interface SecurityGroupIdsOptions {
|
|
45
|
+
/**
|
|
46
|
+
* List of security group IDs
|
|
47
|
+
* @example ['sg-12345678', 'sg-87654321']
|
|
48
|
+
*/
|
|
49
|
+
readonly securityGroupIds: string[];
|
|
50
|
+
/**
|
|
51
|
+
* Whether the imported security groups can be modified by attaching
|
|
52
|
+
* ingress/egress rules. Set to false to avoid additional API calls
|
|
53
|
+
* during synthesis.
|
|
54
|
+
* @default true
|
|
55
|
+
*/
|
|
56
|
+
readonly mutable?: boolean;
|
|
57
|
+
}
|
|
58
|
+
/**
|
|
59
|
+
* Configuration options for security group lookup by name
|
|
60
|
+
*/
|
|
61
|
+
export interface SecurityGroupLookupOptions {
|
|
62
|
+
/**
|
|
63
|
+
* Name of the security group to look up
|
|
64
|
+
* @example 'my-codebuild-sg'
|
|
65
|
+
*/
|
|
66
|
+
readonly securityGroupName: string;
|
|
67
|
+
/**
|
|
68
|
+
* VPC ID that contains the security group.
|
|
69
|
+
* Required for name-based lookup.
|
|
70
|
+
* @example 'vpc-0a1b2c3d4e5f6a7b8'
|
|
71
|
+
*/
|
|
72
|
+
readonly vpcId: string;
|
|
73
|
+
}
|
|
74
|
+
/**
|
|
75
|
+
* Union type of all supported security group configurations.
|
|
76
|
+
*
|
|
77
|
+
* Used at the pipeline level (`CodeBuildDefaults.securityGroups`) to specify
|
|
78
|
+
* security groups for CodeBuild actions.
|
|
79
|
+
*
|
|
80
|
+
* Each variant resolves to CDK `ISecurityGroup[]`:
|
|
81
|
+
* - SecurityGroupIdsConfig: Security groups looked up by IDs
|
|
82
|
+
* - SecurityGroupLookupConfig: Security group looked up by name + VPC
|
|
83
|
+
*/
|
|
84
|
+
export type SecurityGroupConfig = SecurityGroupIdsConfig | SecurityGroupLookupConfig;
|
|
@@ -0,0 +1,5 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// Copyright 2026 Pipeline Builder Contributors
|
|
3
|
+
// SPDX-License-Identifier: Apache-2.0
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,14 @@
|
|
|
1
|
+
import { ISecurityGroup } from 'aws-cdk-lib/aws-ec2';
|
|
2
|
+
import { Construct } from 'constructs';
|
|
3
|
+
import { UniqueId } from './id-generator';
|
|
4
|
+
import type { SecurityGroupConfig } from './security-group-types';
|
|
5
|
+
/**
|
|
6
|
+
* Resolve a SecurityGroupConfig into CDK ISecurityGroup[].
|
|
7
|
+
* Uses discriminated union narrowing to delegate to the appropriate CDK lookup.
|
|
8
|
+
*
|
|
9
|
+
* @param scope - CDK construct scope
|
|
10
|
+
* @param id - UniqueId instance for generating unique construct IDs
|
|
11
|
+
* @param config - Security group configuration to resolve
|
|
12
|
+
* @returns Resolved CDK ISecurityGroup array
|
|
13
|
+
*/
|
|
14
|
+
export declare function resolveSecurityGroup(scope: Construct, id: UniqueId, config: SecurityGroupConfig): ISecurityGroup[];
|
|
@@ -0,0 +1,34 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// Copyright 2026 Pipeline Builder Contributors
|
|
3
|
+
// SPDX-License-Identifier: Apache-2.0
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.resolveSecurityGroup = resolveSecurityGroup;
|
|
6
|
+
const aws_ec2_1 = require("aws-cdk-lib/aws-ec2");
|
|
7
|
+
/**
|
|
8
|
+
* Resolve a SecurityGroupConfig into CDK ISecurityGroup[].
|
|
9
|
+
* Uses discriminated union narrowing to delegate to the appropriate CDK lookup.
|
|
10
|
+
*
|
|
11
|
+
* @param scope - CDK construct scope
|
|
12
|
+
* @param id - UniqueId instance for generating unique construct IDs
|
|
13
|
+
* @param config - Security group configuration to resolve
|
|
14
|
+
* @returns Resolved CDK ISecurityGroup array
|
|
15
|
+
*/
|
|
16
|
+
function resolveSecurityGroup(scope, id, config) {
|
|
17
|
+
switch (config.type) {
|
|
18
|
+
case 'securityGroupIds':
|
|
19
|
+
return config.options.securityGroupIds.map((sgId) => aws_ec2_1.SecurityGroup.fromSecurityGroupId(scope, id.generate('sg:id'), sgId, { mutable: config.options.mutable }));
|
|
20
|
+
case 'securityGroupLookup': {
|
|
21
|
+
const vpc = aws_ec2_1.Vpc.fromLookup(scope, id.generate('sg:vpc'), {
|
|
22
|
+
vpcId: config.options.vpcId,
|
|
23
|
+
});
|
|
24
|
+
return [
|
|
25
|
+
aws_ec2_1.SecurityGroup.fromLookupByName(scope, id.generate('sg:lookup'), config.options.securityGroupName, vpc),
|
|
26
|
+
];
|
|
27
|
+
}
|
|
28
|
+
default: {
|
|
29
|
+
const _exhaustive = config;
|
|
30
|
+
throw new Error(`Unknown security group config type: ${_exhaustive.type}`);
|
|
31
|
+
}
|
|
32
|
+
}
|
|
33
|
+
}
|
|
34
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,32 @@
|
|
|
1
|
+
import { CloudFormationCustomResourceEvent, CloudFormationCustomResourceResponse } from 'aws-lambda';
|
|
2
|
+
/**
|
|
3
|
+
* Lambda handler for CloudFormation Custom Resource that performs plugin lookup.
|
|
4
|
+
*
|
|
5
|
+
* Authenticates using JWT token from AWS Secrets Manager (PLATFORM_SECRET_NAME env var).
|
|
6
|
+
* Create the secret with: `pipeline-manager store-token`
|
|
7
|
+
*
|
|
8
|
+
* Request Types:
|
|
9
|
+
* - Create/Update: fetches and returns plugin configuration from API
|
|
10
|
+
* - Delete: no-op (always succeeds)
|
|
11
|
+
*
|
|
12
|
+
* Response:
|
|
13
|
+
* - Success: Returns base64-encoded plugin JSON in Data.ResultValue
|
|
14
|
+
* - Failure: Returns error message in Reason
|
|
15
|
+
*
|
|
16
|
+
* @param event - CloudFormation custom resource event
|
|
17
|
+
* @returns CloudFormation response
|
|
18
|
+
*
|
|
19
|
+
* @example
|
|
20
|
+
* Custom Resource Properties:
|
|
21
|
+
* ```json
|
|
22
|
+
* {
|
|
23
|
+
* "baseURL": "https://api.example.com",
|
|
24
|
+
* "pluginFilter": {
|
|
25
|
+
* "name": "nodejs-build",
|
|
26
|
+
* "version": "1.0.0",
|
|
27
|
+
* "isActive": true
|
|
28
|
+
* }
|
|
29
|
+
* }
|
|
30
|
+
* ```
|
|
31
|
+
*/
|
|
32
|
+
export declare const handler: (event: CloudFormationCustomResourceEvent) => Promise<CloudFormationCustomResourceResponse>;
|