@pwrdrvr/microapps-cdk 0.0.24 → 0.0.28

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/.jsii CHANGED
@@ -1281,7 +1281,7 @@
1281
1281
  },
1282
1282
  "locationInModule": {
1283
1283
  "filename": "src/MicroApps.ts",
1284
- "line": 133
1284
+ "line": 188
1285
1285
  },
1286
1286
  "parameters": [
1287
1287
  {
@@ -1308,7 +1308,7 @@
1308
1308
  "kind": "class",
1309
1309
  "locationInModule": {
1310
1310
  "filename": "src/MicroApps.ts",
1311
- "line": 123
1311
+ "line": 178
1312
1312
  },
1313
1313
  "name": "MicroApps"
1314
1314
  },
@@ -1337,7 +1337,7 @@
1337
1337
  "immutable": true,
1338
1338
  "locationInModule": {
1339
1339
  "filename": "src/MicroApps.ts",
1340
- "line": 95
1340
+ "line": 150
1341
1341
  },
1342
1342
  "name": "account",
1343
1343
  "type": {
@@ -1437,7 +1437,7 @@
1437
1437
  "immutable": true,
1438
1438
  "locationInModule": {
1439
1439
  "filename": "src/MicroApps.ts",
1440
- "line": 110
1440
+ "line": 165
1441
1441
  },
1442
1442
  "name": "domainNameEdge",
1443
1443
  "type": {
@@ -1454,7 +1454,7 @@
1454
1454
  "immutable": true,
1455
1455
  "locationInModule": {
1456
1456
  "filename": "src/MicroApps.ts",
1457
- "line": 117
1457
+ "line": 172
1458
1458
  },
1459
1459
  "name": "domainNameOrigin",
1460
1460
  "type": {
@@ -1504,7 +1504,7 @@
1504
1504
  "immutable": true,
1505
1505
  "locationInModule": {
1506
1506
  "filename": "src/MicroApps.ts",
1507
- "line": 103
1507
+ "line": 158
1508
1508
  },
1509
1509
  "name": "region",
1510
1510
  "type": {
@@ -1514,17 +1514,17 @@
1514
1514
  {
1515
1515
  "abstract": true,
1516
1516
  "docs": {
1517
- "example": "AROA1234567890123",
1518
- "remarks": "This allows sessions that assume the IAM Role to be excluded from the\nDENY rules on the S3 Bucket Policy.",
1517
+ "default": "- none",
1519
1518
  "stability": "stable",
1520
- "summary": "AROA of the IAM Role to exclude from the DENY rules on the S3 Bucket Policy."
1519
+ "summary": "Suffix to add to asset names, such as -[env]-pr-[prNum]."
1521
1520
  },
1522
1521
  "immutable": true,
1523
1522
  "locationInModule": {
1524
1523
  "filename": "src/MicroApps.ts",
1525
- "line": 87
1524
+ "line": 38
1526
1525
  },
1527
- "name": "s3PolicyBypassAROA",
1526
+ "name": "assetNameSuffix",
1527
+ "optional": true,
1528
1528
  "type": {
1529
1529
  "primitive": "string"
1530
1530
  }
@@ -1532,51 +1532,85 @@
1532
1532
  {
1533
1533
  "abstract": true,
1534
1534
  "docs": {
1535
- "default": "AdminAccess",
1535
+ "default": "false",
1536
1536
  "stability": "stable",
1537
- "summary": "IAM Role name to exclude from the DENY rules on the S3 Bucket Policy."
1537
+ "summary": "Automatically destroy all assets when stack is deleted."
1538
1538
  },
1539
1539
  "immutable": true,
1540
1540
  "locationInModule": {
1541
1541
  "filename": "src/MicroApps.ts",
1542
- "line": 78
1542
+ "line": 17
1543
1543
  },
1544
- "name": "s3PolicyBypassRoleName",
1544
+ "name": "autoDeleteEverything",
1545
+ "optional": true,
1545
1546
  "type": {
1546
- "primitive": "string"
1547
+ "primitive": "boolean"
1547
1548
  }
1548
1549
  },
1549
1550
  {
1550
1551
  "abstract": true,
1551
1552
  "docs": {
1552
- "default": "- none",
1553
+ "example": "[ 'AROA1234567890123' ]",
1554
+ "remarks": "AROAs of the IAM Role to exclude from the DENY rules on the S3 Bucket Policy.\nThis allows sessions that assume the IAM Role to be excluded from the\nDENY rules on the S3 Bucket Policy.\n\nTypically any admin roles / users that need to view or manage the S3 Bucket\nwould be added to this list.\n\nRoles / users that are used directly, not assumed, can be added to `s3PolicyBypassRoleNames` instead.\n\nNote: This AROA must be specified to prevent this policy from locking\nout non-root sessions that have assumed the admin role.\n\nThe notPrincipals will only match the role name exactly and will not match\nany session that has assumed the role since notPrincipals does not allow\nwildcard matches and does not do wildcard matches implicitly either.\n\nThe AROA must be used because there are only 3 Principal variables available:\n https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_variables.html#principaltable\n aws:username, aws:userid, aws:PrincipalTag\n\nFor an assumed role, aws:username is blank, aws:userid is:\n [unique id AKA AROA for Role]:[session name]\n\nTable of unique ID prefixes such as AROA:\n https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers.html#identifiers-prefixes\n\nThe name of the role is simply not available for an assumed role and, if it was,\na complicated comparison would be requierd to prevent exclusion\nof applying the Deny Rule to roles from other accounts.\n\nTo get the AROA with the AWS CLI:\n aws iam get-role --role-name ROLE-NAME\n aws iam get-user -–user-name USER-NAME",
1555
+ "see": "s3StrictBucketPolicy",
1553
1556
  "stability": "stable",
1554
- "summary": "Suffix to add to asset names, such as -[env]-pr-[prNum]."
1557
+ "summary": "Applies when using s3StrictBucketPolicy = true."
1555
1558
  },
1556
1559
  "immutable": true,
1557
1560
  "locationInModule": {
1558
1561
  "filename": "src/MicroApps.ts",
1559
- "line": 38
1562
+ "line": 142
1560
1563
  },
1561
- "name": "assetNameSuffix",
1564
+ "name": "s3PolicyBypassAROAs",
1562
1565
  "optional": true,
1563
1566
  "type": {
1564
- "primitive": "string"
1567
+ "collection": {
1568
+ "elementtype": {
1569
+ "primitive": "string"
1570
+ },
1571
+ "kind": "array"
1572
+ }
1573
+ }
1574
+ },
1575
+ {
1576
+ "abstract": true,
1577
+ "docs": {
1578
+ "example": "['arn:aws:iam::1234567890123:role/AdminAccess', 'arn:aws:iam::1234567890123:user/MyAdminUser']",
1579
+ "remarks": "IAM Role or IAM User names to exclude from the DENY rules on the S3 Bucket Policy.\n\nRoles that are Assumed must instead have their AROA added to `s3PolicyBypassAROAs`.\n\nTypically any admin roles / users that need to view or manage the S3 Bucket\nwould be added to this list.",
1580
+ "see": "s3PolicyBypassAROAs",
1581
+ "stability": "stable",
1582
+ "summary": "Applies when using s3StrictBucketPolicy = true."
1583
+ },
1584
+ "immutable": true,
1585
+ "locationInModule": {
1586
+ "filename": "src/MicroApps.ts",
1587
+ "line": 99
1588
+ },
1589
+ "name": "s3PolicyBypassPrincipalARNs",
1590
+ "optional": true,
1591
+ "type": {
1592
+ "collection": {
1593
+ "elementtype": {
1594
+ "primitive": "string"
1595
+ },
1596
+ "kind": "array"
1597
+ }
1565
1598
  }
1566
1599
  },
1567
1600
  {
1568
1601
  "abstract": true,
1569
1602
  "docs": {
1570
1603
  "default": "false",
1604
+ "remarks": "This setting should be used when applications are less than\nfully trusted.",
1571
1605
  "stability": "stable",
1572
- "summary": "Automatically destroy all assets when stack is deleted."
1606
+ "summary": "Use a strict S3 Bucket Policy that prevents applications from reading/writing/modifying/deleting files in the S3 Bucket outside of the path that is specific to their app/version."
1573
1607
  },
1574
1608
  "immutable": true,
1575
1609
  "locationInModule": {
1576
1610
  "filename": "src/MicroApps.ts",
1577
- "line": 17
1611
+ "line": 83
1578
1612
  },
1579
- "name": "autoDeleteEverything",
1613
+ "name": "s3StrictBucketPolicy",
1580
1614
  "optional": true,
1581
1615
  "type": {
1582
1616
  "primitive": "boolean"
@@ -1585,6 +1619,6 @@
1585
1619
  ]
1586
1620
  }
1587
1621
  },
1588
- "version": "0.0.24",
1589
- "fingerprint": "e6LDGiAjF4Gfy51zxiHZsZaft99IdeBGzU2Ap6yP4v8="
1622
+ "version": "0.0.28",
1623
+ "fingerprint": "pN31x9a1Ge6xzfe9ibawLdds8o7PqA7OvCumMeTj+74="
1590
1624
  }
package/API.md CHANGED
@@ -142,41 +142,94 @@ AWS Region that the stack is being deployed to, this is required for importing t
142
142
 
143
143
  ---
144
144
 
145
- ##### `s3PolicyBypassAROA`<sup>Required</sup> <a name="@pwrdrvr/microapps-cdk.MicroAppsProps.s3PolicyBypassAROA"></a>
145
+ ##### `assetNameSuffix`<sup>Optional</sup> <a name="@pwrdrvr/microapps-cdk.MicroAppsProps.assetNameSuffix"></a>
146
146
 
147
147
  - *Type:* `string`
148
+ - *Default:* none
149
+
150
+ Suffix to add to asset names, such as -[env]-pr-[prNum].
151
+
152
+ ---
153
+
154
+ ##### `autoDeleteEverything`<sup>Optional</sup> <a name="@pwrdrvr/microapps-cdk.MicroAppsProps.autoDeleteEverything"></a>
155
+
156
+ - *Type:* `boolean`
157
+ - *Default:* false
148
158
 
149
- AROA of the IAM Role to exclude from the DENY rules on the S3 Bucket Policy.
159
+ Automatically destroy all assets when stack is deleted.
160
+
161
+ ---
150
162
 
163
+ ##### `s3PolicyBypassAROAs`<sup>Optional</sup> <a name="@pwrdrvr/microapps-cdk.MicroAppsProps.s3PolicyBypassAROAs"></a>
164
+
165
+ - *Type:* `string`[]
166
+
167
+ Applies when using s3StrictBucketPolicy = true.
168
+
169
+ AROAs of the IAM Role to exclude from the DENY rules on the S3 Bucket Policy.
151
170
  This allows sessions that assume the IAM Role to be excluded from the
152
171
  DENY rules on the S3 Bucket Policy.
153
172
 
154
- ---
173
+ Typically any admin roles / users that need to view or manage the S3 Bucket
174
+ would be added to this list.
155
175
 
156
- ##### `s3PolicyBypassRoleName`<sup>Required</sup> <a name="@pwrdrvr/microapps-cdk.MicroAppsProps.s3PolicyBypassRoleName"></a>
176
+ Roles / users that are used directly, not assumed, can be added to `s3PolicyBypassRoleNames` instead.
157
177
 
158
- - *Type:* `string`
159
- - *Default:* AdminAccess
178
+ Note: This AROA must be specified to prevent this policy from locking
179
+ out non-root sessions that have assumed the admin role.
180
+
181
+ The notPrincipals will only match the role name exactly and will not match
182
+ any session that has assumed the role since notPrincipals does not allow
183
+ wildcard matches and does not do wildcard matches implicitly either.
184
+
185
+ The AROA must be used because there are only 3 Principal variables available:
186
+ https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_variables.html#principaltable
187
+ aws:username, aws:userid, aws:PrincipalTag
188
+
189
+ For an assumed role, aws:username is blank, aws:userid is:
190
+ [unique id AKA AROA for Role]:[session name]
191
+
192
+ Table of unique ID prefixes such as AROA:
193
+ https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers.html#identifiers-prefixes
160
194
 
161
- IAM Role name to exclude from the DENY rules on the S3 Bucket Policy.
195
+ The name of the role is simply not available for an assumed role and, if it was,
196
+ a complicated comparison would be requierd to prevent exclusion
197
+ of applying the Deny Rule to roles from other accounts.
198
+
199
+ To get the AROA with the AWS CLI:
200
+ aws iam get-role --role-name ROLE-NAME
201
+ aws iam get-user -–user-name USER-NAME
202
+
203
+ > s3StrictBucketPolicy
162
204
 
163
205
  ---
164
206
 
165
- ##### `assetNameSuffix`<sup>Optional</sup> <a name="@pwrdrvr/microapps-cdk.MicroAppsProps.assetNameSuffix"></a>
207
+ ##### `s3PolicyBypassPrincipalARNs`<sup>Optional</sup> <a name="@pwrdrvr/microapps-cdk.MicroAppsProps.s3PolicyBypassPrincipalARNs"></a>
166
208
 
167
- - *Type:* `string`
168
- - *Default:* none
209
+ - *Type:* `string`[]
169
210
 
170
- Suffix to add to asset names, such as -[env]-pr-[prNum].
211
+ Applies when using s3StrictBucketPolicy = true.
212
+
213
+ IAM Role or IAM User names to exclude from the DENY rules on the S3 Bucket Policy.
214
+
215
+ Roles that are Assumed must instead have their AROA added to `s3PolicyBypassAROAs`.
216
+
217
+ Typically any admin roles / users that need to view or manage the S3 Bucket
218
+ would be added to this list.
219
+
220
+ > s3PolicyBypassAROAs
171
221
 
172
222
  ---
173
223
 
174
- ##### `autoDeleteEverything`<sup>Optional</sup> <a name="@pwrdrvr/microapps-cdk.MicroAppsProps.autoDeleteEverything"></a>
224
+ ##### `s3StrictBucketPolicy`<sup>Optional</sup> <a name="@pwrdrvr/microapps-cdk.MicroAppsProps.s3StrictBucketPolicy"></a>
175
225
 
176
226
  - *Type:* `boolean`
177
227
  - *Default:* false
178
228
 
179
- Automatically destroy all assets when stack is deleted.
229
+ Use a strict S3 Bucket Policy that prevents applications from reading/writing/modifying/deleting files in the S3 Bucket outside of the path that is specific to their app/version.
230
+
231
+ This setting should be used when applications are less than
232
+ fully trusted.
180
233
 
181
234
  ---
182
235
 
@@ -70,24 +70,76 @@ export interface MicroAppsProps {
70
70
  */
71
71
  readonly certOrigin: acm.ICertificate;
72
72
  /**
73
- * IAM Role name to exclude from the DENY rules on the S3 Bucket Policy.
73
+ * Use a strict S3 Bucket Policy that prevents applications from reading/writing/modifying/deleting files in the S3 Bucket outside of the path that is specific to their app/version.
74
74
  *
75
- * @default AdminAccess
75
+ * This setting should be used when applications are less than
76
+ * fully trusted.
77
+ *
78
+ * @default false
79
+ * @stability stable
80
+ */
81
+ readonly s3StrictBucketPolicy?: boolean;
82
+ /**
83
+ * Applies when using s3StrictBucketPolicy = true.
84
+ *
85
+ * IAM Role or IAM User names to exclude from the DENY rules on the S3 Bucket Policy.
86
+ *
87
+ * Roles that are Assumed must instead have their AROA added to `s3PolicyBypassAROAs`.
88
+ *
89
+ * Typically any admin roles / users that need to view or manage the S3 Bucket
90
+ * would be added to this list.
91
+ *
92
+ * @see s3PolicyBypassAROAs
76
93
  * @stability stable
94
+ * @example
95
+ *
96
+ * ['arn:aws:iam::1234567890123:role/AdminAccess', 'arn:aws:iam::1234567890123:user/MyAdminUser']
77
97
  */
78
- readonly s3PolicyBypassRoleName: string;
98
+ readonly s3PolicyBypassPrincipalARNs?: string[];
79
99
  /**
80
- * AROA of the IAM Role to exclude from the DENY rules on the S3 Bucket Policy.
100
+ * Applies when using s3StrictBucketPolicy = true.
81
101
  *
102
+ * AROAs of the IAM Role to exclude from the DENY rules on the S3 Bucket Policy.
82
103
  * This allows sessions that assume the IAM Role to be excluded from the
83
104
  * DENY rules on the S3 Bucket Policy.
84
105
  *
106
+ * Typically any admin roles / users that need to view or manage the S3 Bucket
107
+ * would be added to this list.
108
+ *
109
+ * Roles / users that are used directly, not assumed, can be added to `s3PolicyBypassRoleNames` instead.
110
+ *
111
+ * Note: This AROA must be specified to prevent this policy from locking
112
+ * out non-root sessions that have assumed the admin role.
113
+ *
114
+ * The notPrincipals will only match the role name exactly and will not match
115
+ * any session that has assumed the role since notPrincipals does not allow
116
+ * wildcard matches and does not do wildcard matches implicitly either.
117
+ *
118
+ * The AROA must be used because there are only 3 Principal variables available:
119
+ * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_variables.html#principaltable
120
+ * aws:username, aws:userid, aws:PrincipalTag
121
+ *
122
+ * For an assumed role, aws:username is blank, aws:userid is:
123
+ * [unique id AKA AROA for Role]:[session name]
124
+ *
125
+ * Table of unique ID prefixes such as AROA:
126
+ * https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers.html#identifiers-prefixes
127
+ *
128
+ * The name of the role is simply not available for an assumed role and, if it was,
129
+ * a complicated comparison would be requierd to prevent exclusion
130
+ * of applying the Deny Rule to roles from other accounts.
131
+ *
132
+ * To get the AROA with the AWS CLI:
133
+ * aws iam get-role --role-name ROLE-NAME
134
+ * aws iam get-user -–user-name USER-NAME
135
+ *
136
+ * @see s3StrictBucketPolicy
85
137
  * @stability stable
86
138
  * @example
87
139
  *
88
- * AROA1234567890123
140
+ * [ 'AROA1234567890123' ]
89
141
  */
90
- readonly s3PolicyBypassAROA: string;
142
+ readonly s3PolicyBypassAROAs?: string[];
91
143
  /**
92
144
  * AWS Account ID that the stack is being deployed to, this is required for importing the R53 Zone.
93
145
  *
package/lib/MicroApps.js CHANGED
@@ -21,7 +21,7 @@ class MicroApps extends cdk.Construct {
21
21
  if (props === undefined) {
22
22
  throw new Error('props must be set');
23
23
  }
24
- const { domainName, domainNameEdge, domainNameOrigin, assetNameRoot = 'microapps', assetNameSuffix = '', autoDeleteEverything = false, r53ZoneID, r53ZoneName, certEdge, account, region, appEnv = 'dev', certOrigin, s3PolicyBypassAROA, s3PolicyBypassRoleName = 'AdminAccess', } = props;
24
+ const { domainName, domainNameEdge, domainNameOrigin, assetNameRoot = 'microapps', assetNameSuffix = '', autoDeleteEverything = false, r53ZoneID, r53ZoneName, certEdge, account, region, appEnv = 'dev', certOrigin, s3PolicyBypassAROAs, s3PolicyBypassPrincipalARNs, s3StrictBucketPolicy, } = props;
25
25
  const reverseDomainName = MicroApps.reverseDomain(domainName);
26
26
  const s3 = new MicroAppsS3_1.MicroAppsS3(this, 'microapps-s3', {
27
27
  autoDeleteEverything,
@@ -58,8 +58,9 @@ class MicroApps extends cdk.Construct {
58
58
  region,
59
59
  appEnv,
60
60
  certOrigin,
61
- s3PolicyBypassAROA,
62
- s3PolicyBypassRoleName,
61
+ s3PolicyBypassAROAs,
62
+ s3PolicyBypassPrincipalARNs,
63
+ s3StrictBucketPolicy,
63
64
  });
64
65
  }
65
66
  // input like 'example.com.' will return as 'com.example'
@@ -73,5 +74,5 @@ class MicroApps extends cdk.Construct {
73
74
  }
74
75
  exports.MicroApps = MicroApps;
75
76
  _a = JSII_RTTI_SYMBOL_1;
76
- MicroApps[_a] = { fqn: "@pwrdrvr/microapps-cdk.MicroApps", version: "0.0.24" };
77
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"MicroApps.js","sourceRoot":"","sources":["../src/MicroApps.ts"],"names":[],"mappings":";;;;;AACA,qCAAqC;AACrC,+CAA4C;AAC5C,+CAA4C;AAC5C,mDAAgD;;;;;;AAmDhD,MAAa,SAAU,SAAQ,GAAG,CAAC,SAAS;;;;IAU1C,YAAY,KAAoB,EAAE,EAAU,EAAE,KAAsB;QAClE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAEjB,IAAI,KAAK,KAAK,SAAS,EAAE;YACvB,MAAM,IAAI,KAAK,CAAC,mBAAmB,CAAC,CAAC;SACtC;QAED,MAAM,EACJ,UAAU,EACV,cAAc,EACd,gBAAgB,EAChB,aAAa,GAAG,WAAW,EAC3B,eAAe,GAAG,EAAE,EACpB,oBAAoB,GAAG,KAAK,EAC5B,SAAS,EACT,WAAW,EACX,QAAQ,EACR,OAAO,EACP,MAAM,EACN,MAAM,GAAG,KAAK,EACd,UAAU,EACV,kBAAkB,EAClB,sBAAsB,GAAG,aAAa,GACvC,GAAG,KAAK,CAAC;QACV,MAAM,iBAAiB,GAAG,SAAS,CAAC,aAAa,CAAC,UAAU,CAAC,CAAC;QAE9D,MAAM,EAAE,GAAG,IAAI,yBAAW,CAAC,IAAI,EAAE,cAAc,EAAE;YAC/C,oBAAoB;YACpB,iBAAiB;YACjB,aAAa;YACb,eAAe;SAChB,CAAC,CAAC;QACH,MAAM,EAAE,GAAG,IAAI,yBAAW,CAAC,IAAI,EAAE,sBAAsB,EAAE;YACvD,SAAS,EAAE,EAAE;YACb,aAAa;YACb,eAAe;YACf,UAAU;YACV,iBAAiB;YACjB,cAAc;YACd,gBAAgB;YAChB,oBAAoB;YACpB,SAAS;YACT,WAAW;YACX,QAAQ;SACT,CAAC,CAAC;QACH,IAAI,6BAAa,CAAC,IAAI,EAAE,gBAAgB,EAAE;YACxC,cAAc,EAAE,EAAE;YAClB,SAAS,EAAE,EAAE;YACb,aAAa;YACb,eAAe;YACf,UAAU;YACV,iBAAiB;YACjB,cAAc;YACd,gBAAgB;YAChB,oBAAoB;YACpB,SAAS;YACT,WAAW;YACX,OAAO;YACP,MAAM;YACN,MAAM;YACN,UAAU;YACV,kBAAkB;YAClB,sBAAsB;SACvB,CAAC,CAAC;IACL,CAAC;IAzED,yDAAyD;IACjD,MAAM,CAAC,aAAa,CAAC,MAAc;QACzC,IAAI,KAAK,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,OAAO,EAAE,CAAC;QACxC,IAAI,KAAK,CAAC,CAAC,CAAC,KAAK,EAAE,EAAE;YACnB,KAAK,GAAG,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;SACxB;QACD,OAAO,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;IACzB,CAAC;;AARH,8BA2EC","sourcesContent":["import * as acm from '@aws-cdk/aws-certificatemanager';\nimport * as cdk from '@aws-cdk/core';\nimport { MicroAppsCF } from './MicroAppsCF';\nimport { MicroAppsS3 } from './MicroAppsS3';\nimport { MicroAppsSvcs } from './MicroAppsSvcs';\n\n                                 \nexport interface MicroAppsProps {\n                                                                                                \n  readonly autoDeleteEverything?: boolean;\n\n                                                                                                   \n  readonly appEnv: string;\n\n                                                                   \n  readonly assetNameRoot: string;\n\n                                                                                                  \n  readonly assetNameSuffix?: string;\n\n                                                                                                                 \n  readonly domainName: string;\n\n                                                                                                \n  readonly r53ZoneName: string;\n\n                                                              \n  readonly r53ZoneID: string;\n\n                                                                               \n  readonly certEdge: acm.ICertificate;\n\n                                                                         \n  readonly certOrigin: acm.ICertificate;\n\n                                                                                                                     \n  readonly s3PolicyBypassRoleName: string;\n\n                                                                                                                                                                                                                                                      \n  readonly s3PolicyBypassAROA: string;\n\n                                                                                                                                                         \n  readonly account: string;\n\n                                                                                                                                               \n  readonly region: string;\n\n                                                                                           \n  readonly domainNameEdge: string;\n\n                                                                                                 \n  readonly domainNameOrigin: string;\n}\n\n                                                          \nexport class MicroApps extends cdk.Construct {\n  // input like 'example.com.' will return as 'com.example'\n  private static reverseDomain(domain: string): string {\n    let parts = domain.split('.').reverse();\n    if (parts[0] === '') {\n      parts = parts.slice(1);\n    }\n    return parts.join('.');\n  }\n\n  constructor(scope: cdk.Construct, id: string, props?: MicroAppsProps) {\n    super(scope, id);\n\n    if (props === undefined) {\n      throw new Error('props must be set');\n    }\n\n    const {\n      domainName,\n      domainNameEdge,\n      domainNameOrigin,\n      assetNameRoot = 'microapps',\n      assetNameSuffix = '',\n      autoDeleteEverything = false,\n      r53ZoneID,\n      r53ZoneName,\n      certEdge,\n      account,\n      region,\n      appEnv = 'dev',\n      certOrigin,\n      s3PolicyBypassAROA,\n      s3PolicyBypassRoleName = 'AdminAccess',\n    } = props;\n    const reverseDomainName = MicroApps.reverseDomain(domainName);\n\n    const s3 = new MicroAppsS3(this, 'microapps-s3', {\n      autoDeleteEverything,\n      reverseDomainName,\n      assetNameRoot,\n      assetNameSuffix,\n    });\n    const cf = new MicroAppsCF(this, 'microapps-cloudfront', {\n      s3Exports: s3,\n      assetNameRoot,\n      assetNameSuffix,\n      domainName,\n      reverseDomainName,\n      domainNameEdge,\n      domainNameOrigin,\n      autoDeleteEverything,\n      r53ZoneID,\n      r53ZoneName,\n      certEdge,\n    });\n    new MicroAppsSvcs(this, 'microapps-svcs', {\n      cfStackExports: cf,\n      s3Exports: s3,\n      assetNameRoot,\n      assetNameSuffix,\n      domainName,\n      reverseDomainName,\n      domainNameEdge,\n      domainNameOrigin,\n      autoDeleteEverything,\n      r53ZoneID,\n      r53ZoneName,\n      account,\n      region,\n      appEnv,\n      certOrigin,\n      s3PolicyBypassAROA,\n      s3PolicyBypassRoleName,\n    });\n  }\n}\n"]}
77
+ MicroApps[_a] = { fqn: "@pwrdrvr/microapps-cdk.MicroApps", version: "0.0.28" };
78
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"MicroApps.js","sourceRoot":"","sources":["../src/MicroApps.ts"],"names":[],"mappings":";;;;;AACA,qCAAqC;AACrC,+CAA4C;AAC5C,+CAA4C;AAC5C,mDAAgD;;;;;;AAsDhD,MAAa,SAAU,SAAQ,GAAG,CAAC,SAAS;;;;IAU1C,YAAY,KAAoB,EAAE,EAAU,EAAE,KAAsB;QAClE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAEjB,IAAI,KAAK,KAAK,SAAS,EAAE;YACvB,MAAM,IAAI,KAAK,CAAC,mBAAmB,CAAC,CAAC;SACtC;QAED,MAAM,EACJ,UAAU,EACV,cAAc,EACd,gBAAgB,EAChB,aAAa,GAAG,WAAW,EAC3B,eAAe,GAAG,EAAE,EACpB,oBAAoB,GAAG,KAAK,EAC5B,SAAS,EACT,WAAW,EACX,QAAQ,EACR,OAAO,EACP,MAAM,EACN,MAAM,GAAG,KAAK,EACd,UAAU,EACV,mBAAmB,EACnB,2BAA2B,EAC3B,oBAAoB,GACrB,GAAG,KAAK,CAAC;QACV,MAAM,iBAAiB,GAAG,SAAS,CAAC,aAAa,CAAC,UAAU,CAAC,CAAC;QAE9D,MAAM,EAAE,GAAG,IAAI,yBAAW,CAAC,IAAI,EAAE,cAAc,EAAE;YAC/C,oBAAoB;YACpB,iBAAiB;YACjB,aAAa;YACb,eAAe;SAChB,CAAC,CAAC;QACH,MAAM,EAAE,GAAG,IAAI,yBAAW,CAAC,IAAI,EAAE,sBAAsB,EAAE;YACvD,SAAS,EAAE,EAAE;YACb,aAAa;YACb,eAAe;YACf,UAAU;YACV,iBAAiB;YACjB,cAAc;YACd,gBAAgB;YAChB,oBAAoB;YACpB,SAAS;YACT,WAAW;YACX,QAAQ;SACT,CAAC,CAAC;QACH,IAAI,6BAAa,CAAC,IAAI,EAAE,gBAAgB,EAAE;YACxC,cAAc,EAAE,EAAE;YAClB,SAAS,EAAE,EAAE;YACb,aAAa;YACb,eAAe;YACf,UAAU;YACV,iBAAiB;YACjB,cAAc;YACd,gBAAgB;YAChB,oBAAoB;YACpB,SAAS;YACT,WAAW;YACX,OAAO;YACP,MAAM;YACN,MAAM;YACN,UAAU;YACV,mBAAmB;YACnB,2BAA2B;YAC3B,oBAAoB;SACrB,CAAC,CAAC;IACL,CAAC;IA3ED,yDAAyD;IACjD,MAAM,CAAC,aAAa,CAAC,MAAc;QACzC,IAAI,KAAK,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,OAAO,EAAE,CAAC;QACxC,IAAI,KAAK,CAAC,CAAC,CAAC,KAAK,EAAE,EAAE;YACnB,KAAK,GAAG,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;SACxB;QACD,OAAO,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;IACzB,CAAC;;AARH,8BA6EC","sourcesContent":["import * as acm from '@aws-cdk/aws-certificatemanager';\nimport * as cdk from '@aws-cdk/core';\nimport { MicroAppsCF } from './MicroAppsCF';\nimport { MicroAppsS3 } from './MicroAppsS3';\nimport { MicroAppsSvcs } from './MicroAppsSvcs';\n\n                                 \nexport interface MicroAppsProps {\n                                                                                                \n  readonly autoDeleteEverything?: boolean;\n\n                                                                                                   \n  readonly appEnv: string;\n\n                                                                   \n  readonly assetNameRoot: string;\n\n                                                                                                  \n  readonly assetNameSuffix?: string;\n\n                                                                                                                 \n  readonly domainName: string;\n\n                                                                                                \n  readonly r53ZoneName: string;\n\n                                                              \n  readonly r53ZoneID: string;\n\n                                                                               \n  readonly certEdge: acm.ICertificate;\n\n                                                                         \n  readonly certOrigin: acm.ICertificate;\n\n                                                                                                                                                                                                                                                                                                                                \n  readonly s3StrictBucketPolicy?: boolean;\n\n                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                       \n  readonly s3PolicyBypassPrincipalARNs?: string[];\n\n                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                     \n  readonly s3PolicyBypassAROAs?: string[];\n\n                                                                                                                                                         \n  readonly account: string;\n\n                                                                                                                                               \n  readonly region: string;\n\n                                                                                           \n  readonly domainNameEdge: string;\n\n                                                                                                 \n  readonly domainNameOrigin: string;\n}\n\n                                                          \nexport class MicroApps extends cdk.Construct {\n  // input like 'example.com.' will return as 'com.example'\n  private static reverseDomain(domain: string): string {\n    let parts = domain.split('.').reverse();\n    if (parts[0] === '') {\n      parts = parts.slice(1);\n    }\n    return parts.join('.');\n  }\n\n  constructor(scope: cdk.Construct, id: string, props?: MicroAppsProps) {\n    super(scope, id);\n\n    if (props === undefined) {\n      throw new Error('props must be set');\n    }\n\n    const {\n      domainName,\n      domainNameEdge,\n      domainNameOrigin,\n      assetNameRoot = 'microapps',\n      assetNameSuffix = '',\n      autoDeleteEverything = false,\n      r53ZoneID,\n      r53ZoneName,\n      certEdge,\n      account,\n      region,\n      appEnv = 'dev',\n      certOrigin,\n      s3PolicyBypassAROAs,\n      s3PolicyBypassPrincipalARNs,\n      s3StrictBucketPolicy,\n    } = props;\n    const reverseDomainName = MicroApps.reverseDomain(domainName);\n\n    const s3 = new MicroAppsS3(this, 'microapps-s3', {\n      autoDeleteEverything,\n      reverseDomainName,\n      assetNameRoot,\n      assetNameSuffix,\n    });\n    const cf = new MicroAppsCF(this, 'microapps-cloudfront', {\n      s3Exports: s3,\n      assetNameRoot,\n      assetNameSuffix,\n      domainName,\n      reverseDomainName,\n      domainNameEdge,\n      domainNameOrigin,\n      autoDeleteEverything,\n      r53ZoneID,\n      r53ZoneName,\n      certEdge,\n    });\n    new MicroAppsSvcs(this, 'microapps-svcs', {\n      cfStackExports: cf,\n      s3Exports: s3,\n      assetNameRoot,\n      assetNameSuffix,\n      domainName,\n      reverseDomainName,\n      domainNameEdge,\n      domainNameOrigin,\n      autoDeleteEverything,\n      r53ZoneID,\n      r53ZoneName,\n      account,\n      region,\n      appEnv,\n      certOrigin,\n      s3PolicyBypassAROAs,\n      s3PolicyBypassPrincipalARNs,\n      s3StrictBucketPolicy,\n    });\n  }\n}\n"]}
@@ -17,8 +17,9 @@ interface MicroAppsSvcsStackProps extends cdk.ResourceProps {
17
17
  readonly certOrigin: acm.ICertificate;
18
18
  readonly r53ZoneName: string;
19
19
  readonly r53ZoneID: string;
20
- readonly s3PolicyBypassAROA: string;
21
- readonly s3PolicyBypassRoleName: string;
20
+ readonly s3StrictBucketPolicy?: boolean;
21
+ readonly s3PolicyBypassAROAs?: string[];
22
+ readonly s3PolicyBypassPrincipalARNs?: string[];
22
23
  readonly account: string;
23
24
  readonly region: string;
24
25
  }