@pwrdrvr/microapps-cdk 0.0.24 → 0.0.28
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +60 -26
- package/API.md +66 -13
- package/lib/MicroApps.d.ts +58 -6
- package/lib/MicroApps.js +6 -5
- package/lib/MicroAppsSvcs.d.ts +3 -2
- package/lib/MicroAppsSvcs.js +40 -18
- package/lib/microapps-deployer/index.js +67 -63
- package/lib/microapps-deployer/index.js.map +3 -3
- package/lib/microapps-router/index.js +31 -31
- package/lib/microapps-router/index.js.map +2 -2
- package/package.json +1 -1
package/.jsii
CHANGED
|
@@ -1281,7 +1281,7 @@
|
|
|
1281
1281
|
},
|
|
1282
1282
|
"locationInModule": {
|
|
1283
1283
|
"filename": "src/MicroApps.ts",
|
|
1284
|
-
"line":
|
|
1284
|
+
"line": 188
|
|
1285
1285
|
},
|
|
1286
1286
|
"parameters": [
|
|
1287
1287
|
{
|
|
@@ -1308,7 +1308,7 @@
|
|
|
1308
1308
|
"kind": "class",
|
|
1309
1309
|
"locationInModule": {
|
|
1310
1310
|
"filename": "src/MicroApps.ts",
|
|
1311
|
-
"line":
|
|
1311
|
+
"line": 178
|
|
1312
1312
|
},
|
|
1313
1313
|
"name": "MicroApps"
|
|
1314
1314
|
},
|
|
@@ -1337,7 +1337,7 @@
|
|
|
1337
1337
|
"immutable": true,
|
|
1338
1338
|
"locationInModule": {
|
|
1339
1339
|
"filename": "src/MicroApps.ts",
|
|
1340
|
-
"line":
|
|
1340
|
+
"line": 150
|
|
1341
1341
|
},
|
|
1342
1342
|
"name": "account",
|
|
1343
1343
|
"type": {
|
|
@@ -1437,7 +1437,7 @@
|
|
|
1437
1437
|
"immutable": true,
|
|
1438
1438
|
"locationInModule": {
|
|
1439
1439
|
"filename": "src/MicroApps.ts",
|
|
1440
|
-
"line":
|
|
1440
|
+
"line": 165
|
|
1441
1441
|
},
|
|
1442
1442
|
"name": "domainNameEdge",
|
|
1443
1443
|
"type": {
|
|
@@ -1454,7 +1454,7 @@
|
|
|
1454
1454
|
"immutable": true,
|
|
1455
1455
|
"locationInModule": {
|
|
1456
1456
|
"filename": "src/MicroApps.ts",
|
|
1457
|
-
"line":
|
|
1457
|
+
"line": 172
|
|
1458
1458
|
},
|
|
1459
1459
|
"name": "domainNameOrigin",
|
|
1460
1460
|
"type": {
|
|
@@ -1504,7 +1504,7 @@
|
|
|
1504
1504
|
"immutable": true,
|
|
1505
1505
|
"locationInModule": {
|
|
1506
1506
|
"filename": "src/MicroApps.ts",
|
|
1507
|
-
"line":
|
|
1507
|
+
"line": 158
|
|
1508
1508
|
},
|
|
1509
1509
|
"name": "region",
|
|
1510
1510
|
"type": {
|
|
@@ -1514,17 +1514,17 @@
|
|
|
1514
1514
|
{
|
|
1515
1515
|
"abstract": true,
|
|
1516
1516
|
"docs": {
|
|
1517
|
-
"
|
|
1518
|
-
"remarks": "This allows sessions that assume the IAM Role to be excluded from the\nDENY rules on the S3 Bucket Policy.",
|
|
1517
|
+
"default": "- none",
|
|
1519
1518
|
"stability": "stable",
|
|
1520
|
-
"summary": "
|
|
1519
|
+
"summary": "Suffix to add to asset names, such as -[env]-pr-[prNum]."
|
|
1521
1520
|
},
|
|
1522
1521
|
"immutable": true,
|
|
1523
1522
|
"locationInModule": {
|
|
1524
1523
|
"filename": "src/MicroApps.ts",
|
|
1525
|
-
"line":
|
|
1524
|
+
"line": 38
|
|
1526
1525
|
},
|
|
1527
|
-
"name": "
|
|
1526
|
+
"name": "assetNameSuffix",
|
|
1527
|
+
"optional": true,
|
|
1528
1528
|
"type": {
|
|
1529
1529
|
"primitive": "string"
|
|
1530
1530
|
}
|
|
@@ -1532,51 +1532,85 @@
|
|
|
1532
1532
|
{
|
|
1533
1533
|
"abstract": true,
|
|
1534
1534
|
"docs": {
|
|
1535
|
-
"default": "
|
|
1535
|
+
"default": "false",
|
|
1536
1536
|
"stability": "stable",
|
|
1537
|
-
"summary": "
|
|
1537
|
+
"summary": "Automatically destroy all assets when stack is deleted."
|
|
1538
1538
|
},
|
|
1539
1539
|
"immutable": true,
|
|
1540
1540
|
"locationInModule": {
|
|
1541
1541
|
"filename": "src/MicroApps.ts",
|
|
1542
|
-
"line":
|
|
1542
|
+
"line": 17
|
|
1543
1543
|
},
|
|
1544
|
-
"name": "
|
|
1544
|
+
"name": "autoDeleteEverything",
|
|
1545
|
+
"optional": true,
|
|
1545
1546
|
"type": {
|
|
1546
|
-
"primitive": "
|
|
1547
|
+
"primitive": "boolean"
|
|
1547
1548
|
}
|
|
1548
1549
|
},
|
|
1549
1550
|
{
|
|
1550
1551
|
"abstract": true,
|
|
1551
1552
|
"docs": {
|
|
1552
|
-
"
|
|
1553
|
+
"example": "[ 'AROA1234567890123' ]",
|
|
1554
|
+
"remarks": "AROAs of the IAM Role to exclude from the DENY rules on the S3 Bucket Policy.\nThis allows sessions that assume the IAM Role to be excluded from the\nDENY rules on the S3 Bucket Policy.\n\nTypically any admin roles / users that need to view or manage the S3 Bucket\nwould be added to this list.\n\nRoles / users that are used directly, not assumed, can be added to `s3PolicyBypassRoleNames` instead.\n\nNote: This AROA must be specified to prevent this policy from locking\nout non-root sessions that have assumed the admin role.\n\nThe notPrincipals will only match the role name exactly and will not match\nany session that has assumed the role since notPrincipals does not allow\nwildcard matches and does not do wildcard matches implicitly either.\n\nThe AROA must be used because there are only 3 Principal variables available:\n https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_variables.html#principaltable\n aws:username, aws:userid, aws:PrincipalTag\n\nFor an assumed role, aws:username is blank, aws:userid is:\n [unique id AKA AROA for Role]:[session name]\n\nTable of unique ID prefixes such as AROA:\n https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers.html#identifiers-prefixes\n\nThe name of the role is simply not available for an assumed role and, if it was,\na complicated comparison would be requierd to prevent exclusion\nof applying the Deny Rule to roles from other accounts.\n\nTo get the AROA with the AWS CLI:\n aws iam get-role --role-name ROLE-NAME\n aws iam get-user -–user-name USER-NAME",
|
|
1555
|
+
"see": "s3StrictBucketPolicy",
|
|
1553
1556
|
"stability": "stable",
|
|
1554
|
-
"summary": "
|
|
1557
|
+
"summary": "Applies when using s3StrictBucketPolicy = true."
|
|
1555
1558
|
},
|
|
1556
1559
|
"immutable": true,
|
|
1557
1560
|
"locationInModule": {
|
|
1558
1561
|
"filename": "src/MicroApps.ts",
|
|
1559
|
-
"line":
|
|
1562
|
+
"line": 142
|
|
1560
1563
|
},
|
|
1561
|
-
"name": "
|
|
1564
|
+
"name": "s3PolicyBypassAROAs",
|
|
1562
1565
|
"optional": true,
|
|
1563
1566
|
"type": {
|
|
1564
|
-
"
|
|
1567
|
+
"collection": {
|
|
1568
|
+
"elementtype": {
|
|
1569
|
+
"primitive": "string"
|
|
1570
|
+
},
|
|
1571
|
+
"kind": "array"
|
|
1572
|
+
}
|
|
1573
|
+
}
|
|
1574
|
+
},
|
|
1575
|
+
{
|
|
1576
|
+
"abstract": true,
|
|
1577
|
+
"docs": {
|
|
1578
|
+
"example": "['arn:aws:iam::1234567890123:role/AdminAccess', 'arn:aws:iam::1234567890123:user/MyAdminUser']",
|
|
1579
|
+
"remarks": "IAM Role or IAM User names to exclude from the DENY rules on the S3 Bucket Policy.\n\nRoles that are Assumed must instead have their AROA added to `s3PolicyBypassAROAs`.\n\nTypically any admin roles / users that need to view or manage the S3 Bucket\nwould be added to this list.",
|
|
1580
|
+
"see": "s3PolicyBypassAROAs",
|
|
1581
|
+
"stability": "stable",
|
|
1582
|
+
"summary": "Applies when using s3StrictBucketPolicy = true."
|
|
1583
|
+
},
|
|
1584
|
+
"immutable": true,
|
|
1585
|
+
"locationInModule": {
|
|
1586
|
+
"filename": "src/MicroApps.ts",
|
|
1587
|
+
"line": 99
|
|
1588
|
+
},
|
|
1589
|
+
"name": "s3PolicyBypassPrincipalARNs",
|
|
1590
|
+
"optional": true,
|
|
1591
|
+
"type": {
|
|
1592
|
+
"collection": {
|
|
1593
|
+
"elementtype": {
|
|
1594
|
+
"primitive": "string"
|
|
1595
|
+
},
|
|
1596
|
+
"kind": "array"
|
|
1597
|
+
}
|
|
1565
1598
|
}
|
|
1566
1599
|
},
|
|
1567
1600
|
{
|
|
1568
1601
|
"abstract": true,
|
|
1569
1602
|
"docs": {
|
|
1570
1603
|
"default": "false",
|
|
1604
|
+
"remarks": "This setting should be used when applications are less than\nfully trusted.",
|
|
1571
1605
|
"stability": "stable",
|
|
1572
|
-
"summary": "
|
|
1606
|
+
"summary": "Use a strict S3 Bucket Policy that prevents applications from reading/writing/modifying/deleting files in the S3 Bucket outside of the path that is specific to their app/version."
|
|
1573
1607
|
},
|
|
1574
1608
|
"immutable": true,
|
|
1575
1609
|
"locationInModule": {
|
|
1576
1610
|
"filename": "src/MicroApps.ts",
|
|
1577
|
-
"line":
|
|
1611
|
+
"line": 83
|
|
1578
1612
|
},
|
|
1579
|
-
"name": "
|
|
1613
|
+
"name": "s3StrictBucketPolicy",
|
|
1580
1614
|
"optional": true,
|
|
1581
1615
|
"type": {
|
|
1582
1616
|
"primitive": "boolean"
|
|
@@ -1585,6 +1619,6 @@
|
|
|
1585
1619
|
]
|
|
1586
1620
|
}
|
|
1587
1621
|
},
|
|
1588
|
-
"version": "0.0.
|
|
1589
|
-
"fingerprint": "
|
|
1622
|
+
"version": "0.0.28",
|
|
1623
|
+
"fingerprint": "pN31x9a1Ge6xzfe9ibawLdds8o7PqA7OvCumMeTj+74="
|
|
1590
1624
|
}
|
package/API.md
CHANGED
|
@@ -142,41 +142,94 @@ AWS Region that the stack is being deployed to, this is required for importing t
|
|
|
142
142
|
|
|
143
143
|
---
|
|
144
144
|
|
|
145
|
-
##### `
|
|
145
|
+
##### `assetNameSuffix`<sup>Optional</sup> <a name="@pwrdrvr/microapps-cdk.MicroAppsProps.assetNameSuffix"></a>
|
|
146
146
|
|
|
147
147
|
- *Type:* `string`
|
|
148
|
+
- *Default:* none
|
|
149
|
+
|
|
150
|
+
Suffix to add to asset names, such as -[env]-pr-[prNum].
|
|
151
|
+
|
|
152
|
+
---
|
|
153
|
+
|
|
154
|
+
##### `autoDeleteEverything`<sup>Optional</sup> <a name="@pwrdrvr/microapps-cdk.MicroAppsProps.autoDeleteEverything"></a>
|
|
155
|
+
|
|
156
|
+
- *Type:* `boolean`
|
|
157
|
+
- *Default:* false
|
|
148
158
|
|
|
149
|
-
|
|
159
|
+
Automatically destroy all assets when stack is deleted.
|
|
160
|
+
|
|
161
|
+
---
|
|
150
162
|
|
|
163
|
+
##### `s3PolicyBypassAROAs`<sup>Optional</sup> <a name="@pwrdrvr/microapps-cdk.MicroAppsProps.s3PolicyBypassAROAs"></a>
|
|
164
|
+
|
|
165
|
+
- *Type:* `string`[]
|
|
166
|
+
|
|
167
|
+
Applies when using s3StrictBucketPolicy = true.
|
|
168
|
+
|
|
169
|
+
AROAs of the IAM Role to exclude from the DENY rules on the S3 Bucket Policy.
|
|
151
170
|
This allows sessions that assume the IAM Role to be excluded from the
|
|
152
171
|
DENY rules on the S3 Bucket Policy.
|
|
153
172
|
|
|
154
|
-
|
|
173
|
+
Typically any admin roles / users that need to view or manage the S3 Bucket
|
|
174
|
+
would be added to this list.
|
|
155
175
|
|
|
156
|
-
|
|
176
|
+
Roles / users that are used directly, not assumed, can be added to `s3PolicyBypassRoleNames` instead.
|
|
157
177
|
|
|
158
|
-
|
|
159
|
-
-
|
|
178
|
+
Note: This AROA must be specified to prevent this policy from locking
|
|
179
|
+
out non-root sessions that have assumed the admin role.
|
|
180
|
+
|
|
181
|
+
The notPrincipals will only match the role name exactly and will not match
|
|
182
|
+
any session that has assumed the role since notPrincipals does not allow
|
|
183
|
+
wildcard matches and does not do wildcard matches implicitly either.
|
|
184
|
+
|
|
185
|
+
The AROA must be used because there are only 3 Principal variables available:
|
|
186
|
+
https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_variables.html#principaltable
|
|
187
|
+
aws:username, aws:userid, aws:PrincipalTag
|
|
188
|
+
|
|
189
|
+
For an assumed role, aws:username is blank, aws:userid is:
|
|
190
|
+
[unique id AKA AROA for Role]:[session name]
|
|
191
|
+
|
|
192
|
+
Table of unique ID prefixes such as AROA:
|
|
193
|
+
https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers.html#identifiers-prefixes
|
|
160
194
|
|
|
161
|
-
|
|
195
|
+
The name of the role is simply not available for an assumed role and, if it was,
|
|
196
|
+
a complicated comparison would be requierd to prevent exclusion
|
|
197
|
+
of applying the Deny Rule to roles from other accounts.
|
|
198
|
+
|
|
199
|
+
To get the AROA with the AWS CLI:
|
|
200
|
+
aws iam get-role --role-name ROLE-NAME
|
|
201
|
+
aws iam get-user -–user-name USER-NAME
|
|
202
|
+
|
|
203
|
+
> s3StrictBucketPolicy
|
|
162
204
|
|
|
163
205
|
---
|
|
164
206
|
|
|
165
|
-
##### `
|
|
207
|
+
##### `s3PolicyBypassPrincipalARNs`<sup>Optional</sup> <a name="@pwrdrvr/microapps-cdk.MicroAppsProps.s3PolicyBypassPrincipalARNs"></a>
|
|
166
208
|
|
|
167
|
-
- *Type:* `string`
|
|
168
|
-
- *Default:* none
|
|
209
|
+
- *Type:* `string`[]
|
|
169
210
|
|
|
170
|
-
|
|
211
|
+
Applies when using s3StrictBucketPolicy = true.
|
|
212
|
+
|
|
213
|
+
IAM Role or IAM User names to exclude from the DENY rules on the S3 Bucket Policy.
|
|
214
|
+
|
|
215
|
+
Roles that are Assumed must instead have their AROA added to `s3PolicyBypassAROAs`.
|
|
216
|
+
|
|
217
|
+
Typically any admin roles / users that need to view or manage the S3 Bucket
|
|
218
|
+
would be added to this list.
|
|
219
|
+
|
|
220
|
+
> s3PolicyBypassAROAs
|
|
171
221
|
|
|
172
222
|
---
|
|
173
223
|
|
|
174
|
-
##### `
|
|
224
|
+
##### `s3StrictBucketPolicy`<sup>Optional</sup> <a name="@pwrdrvr/microapps-cdk.MicroAppsProps.s3StrictBucketPolicy"></a>
|
|
175
225
|
|
|
176
226
|
- *Type:* `boolean`
|
|
177
227
|
- *Default:* false
|
|
178
228
|
|
|
179
|
-
|
|
229
|
+
Use a strict S3 Bucket Policy that prevents applications from reading/writing/modifying/deleting files in the S3 Bucket outside of the path that is specific to their app/version.
|
|
230
|
+
|
|
231
|
+
This setting should be used when applications are less than
|
|
232
|
+
fully trusted.
|
|
180
233
|
|
|
181
234
|
---
|
|
182
235
|
|
package/lib/MicroApps.d.ts
CHANGED
|
@@ -70,24 +70,76 @@ export interface MicroAppsProps {
|
|
|
70
70
|
*/
|
|
71
71
|
readonly certOrigin: acm.ICertificate;
|
|
72
72
|
/**
|
|
73
|
-
*
|
|
73
|
+
* Use a strict S3 Bucket Policy that prevents applications from reading/writing/modifying/deleting files in the S3 Bucket outside of the path that is specific to their app/version.
|
|
74
74
|
*
|
|
75
|
-
*
|
|
75
|
+
* This setting should be used when applications are less than
|
|
76
|
+
* fully trusted.
|
|
77
|
+
*
|
|
78
|
+
* @default false
|
|
79
|
+
* @stability stable
|
|
80
|
+
*/
|
|
81
|
+
readonly s3StrictBucketPolicy?: boolean;
|
|
82
|
+
/**
|
|
83
|
+
* Applies when using s3StrictBucketPolicy = true.
|
|
84
|
+
*
|
|
85
|
+
* IAM Role or IAM User names to exclude from the DENY rules on the S3 Bucket Policy.
|
|
86
|
+
*
|
|
87
|
+
* Roles that are Assumed must instead have their AROA added to `s3PolicyBypassAROAs`.
|
|
88
|
+
*
|
|
89
|
+
* Typically any admin roles / users that need to view or manage the S3 Bucket
|
|
90
|
+
* would be added to this list.
|
|
91
|
+
*
|
|
92
|
+
* @see s3PolicyBypassAROAs
|
|
76
93
|
* @stability stable
|
|
94
|
+
* @example
|
|
95
|
+
*
|
|
96
|
+
* ['arn:aws:iam::1234567890123:role/AdminAccess', 'arn:aws:iam::1234567890123:user/MyAdminUser']
|
|
77
97
|
*/
|
|
78
|
-
readonly
|
|
98
|
+
readonly s3PolicyBypassPrincipalARNs?: string[];
|
|
79
99
|
/**
|
|
80
|
-
*
|
|
100
|
+
* Applies when using s3StrictBucketPolicy = true.
|
|
81
101
|
*
|
|
102
|
+
* AROAs of the IAM Role to exclude from the DENY rules on the S3 Bucket Policy.
|
|
82
103
|
* This allows sessions that assume the IAM Role to be excluded from the
|
|
83
104
|
* DENY rules on the S3 Bucket Policy.
|
|
84
105
|
*
|
|
106
|
+
* Typically any admin roles / users that need to view or manage the S3 Bucket
|
|
107
|
+
* would be added to this list.
|
|
108
|
+
*
|
|
109
|
+
* Roles / users that are used directly, not assumed, can be added to `s3PolicyBypassRoleNames` instead.
|
|
110
|
+
*
|
|
111
|
+
* Note: This AROA must be specified to prevent this policy from locking
|
|
112
|
+
* out non-root sessions that have assumed the admin role.
|
|
113
|
+
*
|
|
114
|
+
* The notPrincipals will only match the role name exactly and will not match
|
|
115
|
+
* any session that has assumed the role since notPrincipals does not allow
|
|
116
|
+
* wildcard matches and does not do wildcard matches implicitly either.
|
|
117
|
+
*
|
|
118
|
+
* The AROA must be used because there are only 3 Principal variables available:
|
|
119
|
+
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_variables.html#principaltable
|
|
120
|
+
* aws:username, aws:userid, aws:PrincipalTag
|
|
121
|
+
*
|
|
122
|
+
* For an assumed role, aws:username is blank, aws:userid is:
|
|
123
|
+
* [unique id AKA AROA for Role]:[session name]
|
|
124
|
+
*
|
|
125
|
+
* Table of unique ID prefixes such as AROA:
|
|
126
|
+
* https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers.html#identifiers-prefixes
|
|
127
|
+
*
|
|
128
|
+
* The name of the role is simply not available for an assumed role and, if it was,
|
|
129
|
+
* a complicated comparison would be requierd to prevent exclusion
|
|
130
|
+
* of applying the Deny Rule to roles from other accounts.
|
|
131
|
+
*
|
|
132
|
+
* To get the AROA with the AWS CLI:
|
|
133
|
+
* aws iam get-role --role-name ROLE-NAME
|
|
134
|
+
* aws iam get-user -–user-name USER-NAME
|
|
135
|
+
*
|
|
136
|
+
* @see s3StrictBucketPolicy
|
|
85
137
|
* @stability stable
|
|
86
138
|
* @example
|
|
87
139
|
*
|
|
88
|
-
* AROA1234567890123
|
|
140
|
+
* [ 'AROA1234567890123' ]
|
|
89
141
|
*/
|
|
90
|
-
readonly
|
|
142
|
+
readonly s3PolicyBypassAROAs?: string[];
|
|
91
143
|
/**
|
|
92
144
|
* AWS Account ID that the stack is being deployed to, this is required for importing the R53 Zone.
|
|
93
145
|
*
|
package/lib/MicroApps.js
CHANGED
|
@@ -21,7 +21,7 @@ class MicroApps extends cdk.Construct {
|
|
|
21
21
|
if (props === undefined) {
|
|
22
22
|
throw new Error('props must be set');
|
|
23
23
|
}
|
|
24
|
-
const { domainName, domainNameEdge, domainNameOrigin, assetNameRoot = 'microapps', assetNameSuffix = '', autoDeleteEverything = false, r53ZoneID, r53ZoneName, certEdge, account, region, appEnv = 'dev', certOrigin,
|
|
24
|
+
const { domainName, domainNameEdge, domainNameOrigin, assetNameRoot = 'microapps', assetNameSuffix = '', autoDeleteEverything = false, r53ZoneID, r53ZoneName, certEdge, account, region, appEnv = 'dev', certOrigin, s3PolicyBypassAROAs, s3PolicyBypassPrincipalARNs, s3StrictBucketPolicy, } = props;
|
|
25
25
|
const reverseDomainName = MicroApps.reverseDomain(domainName);
|
|
26
26
|
const s3 = new MicroAppsS3_1.MicroAppsS3(this, 'microapps-s3', {
|
|
27
27
|
autoDeleteEverything,
|
|
@@ -58,8 +58,9 @@ class MicroApps extends cdk.Construct {
|
|
|
58
58
|
region,
|
|
59
59
|
appEnv,
|
|
60
60
|
certOrigin,
|
|
61
|
-
|
|
62
|
-
|
|
61
|
+
s3PolicyBypassAROAs,
|
|
62
|
+
s3PolicyBypassPrincipalARNs,
|
|
63
|
+
s3StrictBucketPolicy,
|
|
63
64
|
});
|
|
64
65
|
}
|
|
65
66
|
// input like 'example.com.' will return as 'com.example'
|
|
@@ -73,5 +74,5 @@ class MicroApps extends cdk.Construct {
|
|
|
73
74
|
}
|
|
74
75
|
exports.MicroApps = MicroApps;
|
|
75
76
|
_a = JSII_RTTI_SYMBOL_1;
|
|
76
|
-
MicroApps[_a] = { fqn: "@pwrdrvr/microapps-cdk.MicroApps", version: "0.0.
|
|
77
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"MicroApps.js","sourceRoot":"","sources":["../src/MicroApps.ts"],"names":[],"mappings":";;;;;AACA,qCAAqC;AACrC,+CAA4C;AAC5C,+CAA4C;AAC5C,mDAAgD;;;;;;AAmDhD,MAAa,SAAU,SAAQ,GAAG,CAAC,SAAS;;;;IAU1C,YAAY,KAAoB,EAAE,EAAU,EAAE,KAAsB;QAClE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAEjB,IAAI,KAAK,KAAK,SAAS,EAAE;YACvB,MAAM,IAAI,KAAK,CAAC,mBAAmB,CAAC,CAAC;SACtC;QAED,MAAM,EACJ,UAAU,EACV,cAAc,EACd,gBAAgB,EAChB,aAAa,GAAG,WAAW,EAC3B,eAAe,GAAG,EAAE,EACpB,oBAAoB,GAAG,KAAK,EAC5B,SAAS,EACT,WAAW,EACX,QAAQ,EACR,OAAO,EACP,MAAM,EACN,MAAM,GAAG,KAAK,EACd,UAAU,EACV,kBAAkB,EAClB,sBAAsB,GAAG,aAAa,GACvC,GAAG,KAAK,CAAC;QACV,MAAM,iBAAiB,GAAG,SAAS,CAAC,aAAa,CAAC,UAAU,CAAC,CAAC;QAE9D,MAAM,EAAE,GAAG,IAAI,yBAAW,CAAC,IAAI,EAAE,cAAc,EAAE;YAC/C,oBAAoB;YACpB,iBAAiB;YACjB,aAAa;YACb,eAAe;SAChB,CAAC,CAAC;QACH,MAAM,EAAE,GAAG,IAAI,yBAAW,CAAC,IAAI,EAAE,sBAAsB,EAAE;YACvD,SAAS,EAAE,EAAE;YACb,aAAa;YACb,eAAe;YACf,UAAU;YACV,iBAAiB;YACjB,cAAc;YACd,gBAAgB;YAChB,oBAAoB;YACpB,SAAS;YACT,WAAW;YACX,QAAQ;SACT,CAAC,CAAC;QACH,IAAI,6BAAa,CAAC,IAAI,EAAE,gBAAgB,EAAE;YACxC,cAAc,EAAE,EAAE;YAClB,SAAS,EAAE,EAAE;YACb,aAAa;YACb,eAAe;YACf,UAAU;YACV,iBAAiB;YACjB,cAAc;YACd,gBAAgB;YAChB,oBAAoB;YACpB,SAAS;YACT,WAAW;YACX,OAAO;YACP,MAAM;YACN,MAAM;YACN,UAAU;YACV,kBAAkB;YAClB,sBAAsB;SACvB,CAAC,CAAC;IACL,CAAC;IAzED,yDAAyD;IACjD,MAAM,CAAC,aAAa,CAAC,MAAc;QACzC,IAAI,KAAK,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,OAAO,EAAE,CAAC;QACxC,IAAI,KAAK,CAAC,CAAC,CAAC,KAAK,EAAE,EAAE;YACnB,KAAK,GAAG,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;SACxB;QACD,OAAO,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;IACzB,CAAC;;AARH,8BA2EC","sourcesContent":["import * as acm from '@aws-cdk/aws-certificatemanager';\nimport * as cdk from '@aws-cdk/core';\nimport { MicroAppsCF } from './MicroAppsCF';\nimport { MicroAppsS3 } from './MicroAppsS3';\nimport { MicroAppsSvcs } from './MicroAppsSvcs';\n\n                                 \nexport interface MicroAppsProps {\n                                                                                                \n  readonly autoDeleteEverything?: boolean;\n\n                                                                                                   \n  readonly appEnv: string;\n\n                                                                   \n  readonly assetNameRoot: string;\n\n                                                                                                  \n  readonly assetNameSuffix?: string;\n\n                                                                                                                 \n  readonly domainName: string;\n\n                                                                                                \n  readonly r53ZoneName: string;\n\n                                                              \n  readonly r53ZoneID: string;\n\n                                                                               \n  readonly certEdge: acm.ICertificate;\n\n                                                                         \n  readonly certOrigin: acm.ICertificate;\n\n                                                                                                                     \n  readonly s3PolicyBypassRoleName: string;\n\n                                                                                                                                                                                                                                                      \n  readonly s3PolicyBypassAROA: string;\n\n                                                                                                                                                         \n  readonly account: string;\n\n                                                                                                                                               \n  readonly region: string;\n\n                                                                                           \n  readonly domainNameEdge: string;\n\n                                                                                                 \n  readonly domainNameOrigin: string;\n}\n\n                                                          \nexport class MicroApps extends cdk.Construct {\n  // input like 'example.com.' will return as 'com.example'\n  private static reverseDomain(domain: string): string {\n    let parts = domain.split('.').reverse();\n    if (parts[0] === '') {\n      parts = parts.slice(1);\n    }\n    return parts.join('.');\n  }\n\n  constructor(scope: cdk.Construct, id: string, props?: MicroAppsProps) {\n    super(scope, id);\n\n    if (props === undefined) {\n      throw new Error('props must be set');\n    }\n\n    const {\n      domainName,\n      domainNameEdge,\n      domainNameOrigin,\n      assetNameRoot = 'microapps',\n      assetNameSuffix = '',\n      autoDeleteEverything = false,\n      r53ZoneID,\n      r53ZoneName,\n      certEdge,\n      account,\n      region,\n      appEnv = 'dev',\n      certOrigin,\n      s3PolicyBypassAROA,\n      s3PolicyBypassRoleName = 'AdminAccess',\n    } = props;\n    const reverseDomainName = MicroApps.reverseDomain(domainName);\n\n    const s3 = new MicroAppsS3(this, 'microapps-s3', {\n      autoDeleteEverything,\n      reverseDomainName,\n      assetNameRoot,\n      assetNameSuffix,\n    });\n    const cf = new MicroAppsCF(this, 'microapps-cloudfront', {\n      s3Exports: s3,\n      assetNameRoot,\n      assetNameSuffix,\n      domainName,\n      reverseDomainName,\n      domainNameEdge,\n      domainNameOrigin,\n      autoDeleteEverything,\n      r53ZoneID,\n      r53ZoneName,\n      certEdge,\n    });\n    new MicroAppsSvcs(this, 'microapps-svcs', {\n      cfStackExports: cf,\n      s3Exports: s3,\n      assetNameRoot,\n      assetNameSuffix,\n      domainName,\n      reverseDomainName,\n      domainNameEdge,\n      domainNameOrigin,\n      autoDeleteEverything,\n      r53ZoneID,\n      r53ZoneName,\n      account,\n      region,\n      appEnv,\n      certOrigin,\n      s3PolicyBypassAROA,\n      s3PolicyBypassRoleName,\n    });\n  }\n}\n"]}
|
|
77
|
+
MicroApps[_a] = { fqn: "@pwrdrvr/microapps-cdk.MicroApps", version: "0.0.28" };
|
|
78
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"MicroApps.js","sourceRoot":"","sources":["../src/MicroApps.ts"],"names":[],"mappings":";;;;;AACA,qCAAqC;AACrC,+CAA4C;AAC5C,+CAA4C;AAC5C,mDAAgD;;;;;;AAsDhD,MAAa,SAAU,SAAQ,GAAG,CAAC,SAAS;;;;IAU1C,YAAY,KAAoB,EAAE,EAAU,EAAE,KAAsB;QAClE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAEjB,IAAI,KAAK,KAAK,SAAS,EAAE;YACvB,MAAM,IAAI,KAAK,CAAC,mBAAmB,CAAC,CAAC;SACtC;QAED,MAAM,EACJ,UAAU,EACV,cAAc,EACd,gBAAgB,EAChB,aAAa,GAAG,WAAW,EAC3B,eAAe,GAAG,EAAE,EACpB,oBAAoB,GAAG,KAAK,EAC5B,SAAS,EACT,WAAW,EACX,QAAQ,EACR,OAAO,EACP,MAAM,EACN,MAAM,GAAG,KAAK,EACd,UAAU,EACV,mBAAmB,EACnB,2BAA2B,EAC3B,oBAAoB,GACrB,GAAG,KAAK,CAAC;QACV,MAAM,iBAAiB,GAAG,SAAS,CAAC,aAAa,CAAC,UAAU,CAAC,CAAC;QAE9D,MAAM,EAAE,GAAG,IAAI,yBAAW,CAAC,IAAI,EAAE,cAAc,EAAE;YAC/C,oBAAoB;YACpB,iBAAiB;YACjB,aAAa;YACb,eAAe;SAChB,CAAC,CAAC;QACH,MAAM,EAAE,GAAG,IAAI,yBAAW,CAAC,IAAI,EAAE,sBAAsB,EAAE;YACvD,SAAS,EAAE,EAAE;YACb,aAAa;YACb,eAAe;YACf,UAAU;YACV,iBAAiB;YACjB,cAAc;YACd,gBAAgB;YAChB,oBAAoB;YACpB,SAAS;YACT,WAAW;YACX,QAAQ;SACT,CAAC,CAAC;QACH,IAAI,6BAAa,CAAC,IAAI,EAAE,gBAAgB,EAAE;YACxC,cAAc,EAAE,EAAE;YAClB,SAAS,EAAE,EAAE;YACb,aAAa;YACb,eAAe;YACf,UAAU;YACV,iBAAiB;YACjB,cAAc;YACd,gBAAgB;YAChB,oBAAoB;YACpB,SAAS;YACT,WAAW;YACX,OAAO;YACP,MAAM;YACN,MAAM;YACN,UAAU;YACV,mBAAmB;YACnB,2BAA2B;YAC3B,oBAAoB;SACrB,CAAC,CAAC;IACL,CAAC;IA3ED,yDAAyD;IACjD,MAAM,CAAC,aAAa,CAAC,MAAc;QACzC,IAAI,KAAK,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,OAAO,EAAE,CAAC;QACxC,IAAI,KAAK,CAAC,CAAC,CAAC,KAAK,EAAE,EAAE;YACnB,KAAK,GAAG,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;SACxB;QACD,OAAO,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;IACzB,CAAC;;AARH,8BA6EC","sourcesContent":["import * as acm from '@aws-cdk/aws-certificatemanager';\nimport * as cdk from '@aws-cdk/core';\nimport { MicroAppsCF } from './MicroAppsCF';\nimport { MicroAppsS3 } from './MicroAppsS3';\nimport { MicroAppsSvcs } from './MicroAppsSvcs';\n\n                                 \nexport interface MicroAppsProps {\n                                                                                                \n  readonly autoDeleteEverything?: boolean;\n\n                                                                                                   \n  readonly appEnv: string;\n\n                                                                   \n  readonly assetNameRoot: string;\n\n                                                                                                  \n  readonly assetNameSuffix?: string;\n\n                                                                                                                 \n  readonly domainName: string;\n\n                                                                                                \n  readonly r53ZoneName: string;\n\n                                                              \n  readonly r53ZoneID: string;\n\n                                                                               \n  readonly certEdge: acm.ICertificate;\n\n                                                                         \n  readonly certOrigin: acm.ICertificate;\n\n                                                                                                                                                                                                                                                                                                                                \n  readonly s3StrictBucketPolicy?: boolean;\n\n                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                       \n  readonly s3PolicyBypassPrincipalARNs?: string[];\n\n                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                     \n  readonly s3PolicyBypassAROAs?: string[];\n\n                                                                                                                                                         \n  readonly account: string;\n\n                                                                                                                                               \n  readonly region: string;\n\n                                                                                           \n  readonly domainNameEdge: string;\n\n                                                                                                 \n  readonly domainNameOrigin: string;\n}\n\n                                                          \nexport class MicroApps extends cdk.Construct {\n  // input like 'example.com.' will return as 'com.example'\n  private static reverseDomain(domain: string): string {\n    let parts = domain.split('.').reverse();\n    if (parts[0] === '') {\n      parts = parts.slice(1);\n    }\n    return parts.join('.');\n  }\n\n  constructor(scope: cdk.Construct, id: string, props?: MicroAppsProps) {\n    super(scope, id);\n\n    if (props === undefined) {\n      throw new Error('props must be set');\n    }\n\n    const {\n      domainName,\n      domainNameEdge,\n      domainNameOrigin,\n      assetNameRoot = 'microapps',\n      assetNameSuffix = '',\n      autoDeleteEverything = false,\n      r53ZoneID,\n      r53ZoneName,\n      certEdge,\n      account,\n      region,\n      appEnv = 'dev',\n      certOrigin,\n      s3PolicyBypassAROAs,\n      s3PolicyBypassPrincipalARNs,\n      s3StrictBucketPolicy,\n    } = props;\n    const reverseDomainName = MicroApps.reverseDomain(domainName);\n\n    const s3 = new MicroAppsS3(this, 'microapps-s3', {\n      autoDeleteEverything,\n      reverseDomainName,\n      assetNameRoot,\n      assetNameSuffix,\n    });\n    const cf = new MicroAppsCF(this, 'microapps-cloudfront', {\n      s3Exports: s3,\n      assetNameRoot,\n      assetNameSuffix,\n      domainName,\n      reverseDomainName,\n      domainNameEdge,\n      domainNameOrigin,\n      autoDeleteEverything,\n      r53ZoneID,\n      r53ZoneName,\n      certEdge,\n    });\n    new MicroAppsSvcs(this, 'microapps-svcs', {\n      cfStackExports: cf,\n      s3Exports: s3,\n      assetNameRoot,\n      assetNameSuffix,\n      domainName,\n      reverseDomainName,\n      domainNameEdge,\n      domainNameOrigin,\n      autoDeleteEverything,\n      r53ZoneID,\n      r53ZoneName,\n      account,\n      region,\n      appEnv,\n      certOrigin,\n      s3PolicyBypassAROAs,\n      s3PolicyBypassPrincipalARNs,\n      s3StrictBucketPolicy,\n    });\n  }\n}\n"]}
|
package/lib/MicroAppsSvcs.d.ts
CHANGED
|
@@ -17,8 +17,9 @@ interface MicroAppsSvcsStackProps extends cdk.ResourceProps {
|
|
|
17
17
|
readonly certOrigin: acm.ICertificate;
|
|
18
18
|
readonly r53ZoneName: string;
|
|
19
19
|
readonly r53ZoneID: string;
|
|
20
|
-
readonly
|
|
21
|
-
readonly
|
|
20
|
+
readonly s3StrictBucketPolicy?: boolean;
|
|
21
|
+
readonly s3PolicyBypassAROAs?: string[];
|
|
22
|
+
readonly s3PolicyBypassPrincipalARNs?: string[];
|
|
22
23
|
readonly account: string;
|
|
23
24
|
readonly region: string;
|
|
24
25
|
}
|