@quiltdata/benchling-webhook 0.9.0-20251130T062440Z → 0.9.0-20251204T040448Z

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (55) hide show
  1. package/README.md +63 -47
  2. package/cdk.json +1 -0
  3. package/dist/bin/benchling-webhook.js +13 -0
  4. package/dist/bin/benchling-webhook.js.map +1 -1
  5. package/dist/bin/commands/deploy.d.ts.map +1 -1
  6. package/dist/bin/commands/deploy.js +60 -95
  7. package/dist/bin/commands/deploy.js.map +1 -1
  8. package/dist/bin/commands/destroy.d.ts +0 -1
  9. package/dist/bin/commands/destroy.d.ts.map +1 -1
  10. package/dist/bin/commands/destroy.js +0 -1
  11. package/dist/bin/commands/destroy.js.map +1 -1
  12. package/dist/bin/commands/infer-quilt-config.d.ts.map +1 -1
  13. package/dist/bin/commands/infer-quilt-config.js +13 -10
  14. package/dist/bin/commands/infer-quilt-config.js.map +1 -1
  15. package/dist/bin/commands/setup-profile.js +1 -1
  16. package/dist/bin/commands/setup-profile.js.map +1 -1
  17. package/dist/bin/commands/setup-wizard.d.ts.map +1 -1
  18. package/dist/bin/commands/setup-wizard.js +1 -0
  19. package/dist/bin/commands/setup-wizard.js.map +1 -1
  20. package/dist/lib/benchling-webhook-stack.d.ts.map +1 -1
  21. package/dist/lib/benchling-webhook-stack.js +61 -38
  22. package/dist/lib/benchling-webhook-stack.js.map +1 -1
  23. package/dist/lib/fargate-service.js +1 -1
  24. package/dist/lib/fargate-service.js.map +1 -1
  25. package/dist/lib/index.d.ts +1 -1
  26. package/dist/lib/index.js +3 -3
  27. package/dist/lib/network-load-balancer.d.ts.map +1 -1
  28. package/dist/lib/network-load-balancer.js +0 -2
  29. package/dist/lib/network-load-balancer.js.map +1 -1
  30. package/dist/lib/{http-api-gateway.d.ts → rest-api-gateway.d.ts} +9 -9
  31. package/dist/lib/rest-api-gateway.d.ts.map +1 -0
  32. package/dist/lib/rest-api-gateway.js +212 -0
  33. package/dist/lib/rest-api-gateway.js.map +1 -0
  34. package/dist/lib/types/config.d.ts +36 -3
  35. package/dist/lib/types/config.d.ts.map +1 -1
  36. package/dist/lib/types/config.js.map +1 -1
  37. package/dist/lib/wizard/phase2-stack-query.d.ts.map +1 -1
  38. package/dist/lib/wizard/phase2-stack-query.js +46 -21
  39. package/dist/lib/wizard/phase2-stack-query.js.map +1 -1
  40. package/dist/lib/wizard/phase3-parameter-collection.d.ts.map +1 -1
  41. package/dist/lib/wizard/phase3-parameter-collection.js +101 -67
  42. package/dist/lib/wizard/phase3-parameter-collection.js.map +1 -1
  43. package/dist/lib/wizard/types.d.ts +11 -0
  44. package/dist/lib/wizard/types.d.ts.map +1 -1
  45. package/dist/package.json +2 -2
  46. package/dist/scripts/discover-vpc.js +12 -11
  47. package/dist/scripts/discover-vpc.js.map +1 -1
  48. package/package.json +2 -2
  49. package/dist/lib/http-api-gateway.d.ts.map +0 -1
  50. package/dist/lib/http-api-gateway.js +0 -166
  51. package/dist/lib/http-api-gateway.js.map +0 -1
  52. package/dist/lib/waf-web-acl.d.ts +0 -51
  53. package/dist/lib/waf-web-acl.d.ts.map +0 -1
  54. package/dist/lib/waf-web-acl.js +0 -192
  55. package/dist/lib/waf-web-acl.js.map +0 -1
@@ -1,51 +0,0 @@
1
- import * as wafv2 from "aws-cdk-lib/aws-wafv2";
2
- import * as logs from "aws-cdk-lib/aws-logs";
3
- import { Construct } from "constructs";
4
- export interface WafWebAclProps {
5
- /**
6
- * Comma-separated list of allowed IP addresses/CIDR blocks
7
- *
8
- * Empty string means no IP filtering (discovery mode - COUNT all requests).
9
- * Non-empty string enables IP filtering (security mode - BLOCK unknown IPs).
10
- *
11
- * @example "192.168.1.0/24,10.0.0.0/8"
12
- * @default ""
13
- */
14
- readonly ipAllowList?: string;
15
- }
16
- /**
17
- * WAF Web ACL for Benchling webhook IP filtering
18
- *
19
- * Provides defense-in-depth security at AWS edge with two rules:
20
- * 1. Health check exception - Always allow /health, /health/ready, /health/live
21
- * 2. IP allowlist - Allow requests from configured IP ranges
22
- *
23
- * **Automatic Mode Selection:**
24
- * - Empty IP allowlist → COUNT mode (discovery phase - logs requests but doesn't block)
25
- * - Non-empty IP allowlist → BLOCK mode (security phase - blocks unknown IPs)
26
- *
27
- * This allows customers to deploy initially without knowing Benchling IPs,
28
- * discover them from CloudWatch logs, then add them to enable blocking mode.
29
- */
30
- export declare class WafWebAcl extends Construct {
31
- readonly webAcl: wafv2.CfnWebACL;
32
- readonly ipSet: wafv2.CfnIPSet;
33
- readonly logGroup: logs.ILogGroup;
34
- constructor(scope: Construct, id: string, props?: WafWebAclProps);
35
- /**
36
- * Parse IP allowlist string into array of CIDR blocks
37
- *
38
- * - Splits by comma
39
- * - Trims whitespace
40
- * - Adds /32 suffix if not present
41
- * - Filters out empty entries
42
- *
43
- * @param allowList Comma-separated list of IPs/CIDR blocks
44
- * @returns Array of CIDR blocks
45
- *
46
- * @example
47
- * parseIpAllowList("192.168.1.0/24, 10.0.0.1") → ["192.168.1.0/24", "10.0.0.1/32"]
48
- */
49
- private parseIpAllowList;
50
- }
51
- //# sourceMappingURL=waf-web-acl.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"waf-web-acl.d.ts","sourceRoot":"","sources":["../../lib/waf-web-acl.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,KAAK,MAAM,uBAAuB,CAAC;AAC/C,OAAO,KAAK,IAAI,MAAM,sBAAsB,CAAC;AAC7C,OAAO,EAAE,SAAS,EAAE,MAAM,YAAY,CAAC;AAEvC,MAAM,WAAW,cAAc;IAC3B;;;;;;;;OAQG;IACH,QAAQ,CAAC,WAAW,CAAC,EAAE,MAAM,CAAC;CACjC;AAED;;;;;;;;;;;;;GAaG;AACH,qBAAa,SAAU,SAAQ,SAAS;IACpC,SAAgB,MAAM,EAAE,KAAK,CAAC,SAAS,CAAC;IACxC,SAAgB,KAAK,EAAE,KAAK,CAAC,QAAQ,CAAC;IACtC,SAAgB,QAAQ,EAAE,IAAI,CAAC,SAAS,CAAC;gBAE7B,KAAK,EAAE,SAAS,EAAE,EAAE,EAAE,MAAM,EAAE,KAAK,GAAE,cAAmB;IA2HpE;;;;;;;;;;;;;OAaG;IACH,OAAO,CAAC,gBAAgB;CAU3B"}
@@ -1,192 +0,0 @@
1
- "use strict";
2
- var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
- if (k2 === undefined) k2 = k;
4
- var desc = Object.getOwnPropertyDescriptor(m, k);
5
- if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
- desc = { enumerable: true, get: function() { return m[k]; } };
7
- }
8
- Object.defineProperty(o, k2, desc);
9
- }) : (function(o, m, k, k2) {
10
- if (k2 === undefined) k2 = k;
11
- o[k2] = m[k];
12
- }));
13
- var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
- Object.defineProperty(o, "default", { enumerable: true, value: v });
15
- }) : function(o, v) {
16
- o["default"] = v;
17
- });
18
- var __importStar = (this && this.__importStar) || (function () {
19
- var ownKeys = function(o) {
20
- ownKeys = Object.getOwnPropertyNames || function (o) {
21
- var ar = [];
22
- for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
23
- return ar;
24
- };
25
- return ownKeys(o);
26
- };
27
- return function (mod) {
28
- if (mod && mod.__esModule) return mod;
29
- var result = {};
30
- if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
31
- __setModuleDefault(result, mod);
32
- return result;
33
- };
34
- })();
35
- Object.defineProperty(exports, "__esModule", { value: true });
36
- exports.WafWebAcl = void 0;
37
- const cdk = __importStar(require("aws-cdk-lib"));
38
- const wafv2 = __importStar(require("aws-cdk-lib/aws-wafv2"));
39
- const logs = __importStar(require("aws-cdk-lib/aws-logs"));
40
- const constructs_1 = require("constructs");
41
- /**
42
- * WAF Web ACL for Benchling webhook IP filtering
43
- *
44
- * Provides defense-in-depth security at AWS edge with two rules:
45
- * 1. Health check exception - Always allow /health, /health/ready, /health/live
46
- * 2. IP allowlist - Allow requests from configured IP ranges
47
- *
48
- * **Automatic Mode Selection:**
49
- * - Empty IP allowlist → COUNT mode (discovery phase - logs requests but doesn't block)
50
- * - Non-empty IP allowlist → BLOCK mode (security phase - blocks unknown IPs)
51
- *
52
- * This allows customers to deploy initially without knowing Benchling IPs,
53
- * discover them from CloudWatch logs, then add them to enable blocking mode.
54
- */
55
- class WafWebAcl extends constructs_1.Construct {
56
- constructor(scope, id, props = {}) {
57
- super(scope, id);
58
- // Parse IP allowlist with CIDR notation normalization
59
- const ipAllowList = this.parseIpAllowList(props.ipAllowList || "");
60
- // Automatic mode selection based on IP allowlist
61
- // - Empty allowlist: Allow mode (discovery - logs all requests, no blocking)
62
- // - Has IPs: Block mode (security - blocks unknown IPs)
63
- const isDiscoveryMode = ipAllowList.length === 0;
64
- const mode = isDiscoveryMode ? "Allow" : "Block";
65
- console.log(`WAF mode: ${mode} (${isDiscoveryMode ? "discovery - no IPs configured, all traffic allowed" : `security - ${ipAllowList.length} IP ranges configured`})`);
66
- // Create IP Set for allowlist
67
- this.ipSet = new wafv2.CfnIPSet(this, "IPSet", {
68
- name: "BenchlingWebhookIPSet",
69
- scope: "REGIONAL",
70
- ipAddressVersion: "IPV4",
71
- addresses: ipAllowList,
72
- description: "Allowed IP addresses for Benchling webhooks",
73
- });
74
- // CloudWatch log group for WAF logs
75
- this.logGroup = new logs.LogGroup(this, "WafLogGroup", {
76
- logGroupName: "/aws/waf/benchling-webhook",
77
- retention: logs.RetentionDays.ONE_WEEK,
78
- removalPolicy: cdk.RemovalPolicy.DESTROY,
79
- });
80
- // Create Web ACL with two rules
81
- // Default action: Allow (discovery mode) or Block (security mode)
82
- const defaultActionConfig = isDiscoveryMode
83
- ? { allow: {} }
84
- : { block: {} };
85
- this.webAcl = new wafv2.CfnWebACL(this, "WebACL", {
86
- name: "BenchlingWebhookWebACL",
87
- scope: "REGIONAL",
88
- defaultAction: defaultActionConfig,
89
- description: "WAF for Benchling webhook IP filtering with automatic discovery mode. " +
90
- `Mode: ${mode} (${isDiscoveryMode ? "empty allowlist - all traffic allowed" : `${ipAllowList.length} IPs configured`})`,
91
- rules: [
92
- // Rule 1: Health check exception (Priority 10)
93
- // Always allow health check endpoints regardless of IP
94
- {
95
- name: "HealthCheckException",
96
- priority: 10,
97
- statement: {
98
- orStatement: {
99
- statements: [
100
- {
101
- byteMatchStatement: {
102
- fieldToMatch: { uriPath: {} },
103
- positionalConstraint: "EXACTLY",
104
- searchString: "/health",
105
- textTransformations: [{ priority: 0, type: "NONE" }],
106
- },
107
- },
108
- {
109
- byteMatchStatement: {
110
- fieldToMatch: { uriPath: {} },
111
- positionalConstraint: "EXACTLY",
112
- searchString: "/health/ready",
113
- textTransformations: [{ priority: 0, type: "NONE" }],
114
- },
115
- },
116
- {
117
- byteMatchStatement: {
118
- fieldToMatch: { uriPath: {} },
119
- positionalConstraint: "EXACTLY",
120
- searchString: "/health/live",
121
- textTransformations: [{ priority: 0, type: "NONE" }],
122
- },
123
- },
124
- ],
125
- },
126
- },
127
- action: { allow: {} },
128
- visibilityConfig: {
129
- sampledRequestsEnabled: true,
130
- cloudWatchMetricsEnabled: true,
131
- metricName: "HealthCheckException",
132
- },
133
- },
134
- // Rule 2: IP allowlist (Priority 20)
135
- // Allow requests from configured IP ranges
136
- // Note: When IP allowlist is empty, this rule matches no IPs,
137
- // so all non-health requests fall through to default action (COUNT or BLOCK)
138
- {
139
- name: "IPAllowlist",
140
- priority: 20,
141
- statement: {
142
- ipSetReferenceStatement: {
143
- arn: this.ipSet.attrArn,
144
- },
145
- },
146
- action: { allow: {} },
147
- visibilityConfig: {
148
- sampledRequestsEnabled: true,
149
- cloudWatchMetricsEnabled: true,
150
- metricName: "IPAllowlist",
151
- },
152
- },
153
- ],
154
- visibilityConfig: {
155
- sampledRequestsEnabled: true,
156
- cloudWatchMetricsEnabled: true,
157
- metricName: "BenchlingWebhookWebACL",
158
- },
159
- });
160
- // Configure WAF logging to CloudWatch
161
- new wafv2.CfnLoggingConfiguration(this, "WafLogging", {
162
- resourceArn: this.webAcl.attrArn,
163
- logDestinationConfigs: [this.logGroup.logGroupArn],
164
- });
165
- }
166
- /**
167
- * Parse IP allowlist string into array of CIDR blocks
168
- *
169
- * - Splits by comma
170
- * - Trims whitespace
171
- * - Adds /32 suffix if not present
172
- * - Filters out empty entries
173
- *
174
- * @param allowList Comma-separated list of IPs/CIDR blocks
175
- * @returns Array of CIDR blocks
176
- *
177
- * @example
178
- * parseIpAllowList("192.168.1.0/24, 10.0.0.1") → ["192.168.1.0/24", "10.0.0.1/32"]
179
- */
180
- parseIpAllowList(allowList) {
181
- return allowList
182
- .split(",")
183
- .map((ip) => ip.trim())
184
- .filter((ip) => ip.length > 0)
185
- .map((ip) => {
186
- // Ensure CIDR notation (add /32 if not specified)
187
- return ip.includes("/") ? ip : `${ip}/32`;
188
- });
189
- }
190
- }
191
- exports.WafWebAcl = WafWebAcl;
192
- //# sourceMappingURL=waf-web-acl.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"waf-web-acl.js","sourceRoot":"","sources":["../../lib/waf-web-acl.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,iDAAmC;AACnC,6DAA+C;AAC/C,2DAA6C;AAC7C,2CAAuC;AAevC;;;;;;;;;;;;;GAaG;AACH,MAAa,SAAU,SAAQ,sBAAS;IAKpC,YAAY,KAAgB,EAAE,EAAU,EAAE,QAAwB,EAAE;QAChE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAEjB,sDAAsD;QACtD,MAAM,WAAW,GAAG,IAAI,CAAC,gBAAgB,CAAC,KAAK,CAAC,WAAW,IAAI,EAAE,CAAC,CAAC;QAEnE,iDAAiD;QACjD,6EAA6E;QAC7E,wDAAwD;QACxD,MAAM,eAAe,GAAG,WAAW,CAAC,MAAM,KAAK,CAAC,CAAC;QACjD,MAAM,IAAI,GAAG,eAAe,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,OAAO,CAAC;QAEjD,OAAO,CAAC,GAAG,CACP,aAAa,IAAI,KAAK,eAAe,CAAC,CAAC,CAAC,oDAAoD,CAAC,CAAC,CAAC,cAAc,WAAW,CAAC,MAAM,uBAAuB,GAAG,CAC5J,CAAC;QAEF,8BAA8B;QAC9B,IAAI,CAAC,KAAK,GAAG,IAAI,KAAK,CAAC,QAAQ,CAAC,IAAI,EAAE,OAAO,EAAE;YAC3C,IAAI,EAAE,uBAAuB;YAC7B,KAAK,EAAE,UAAU;YACjB,gBAAgB,EAAE,MAAM;YACxB,SAAS,EAAE,WAAW;YACtB,WAAW,EAAE,6CAA6C;SAC7D,CAAC,CAAC;QAEH,oCAAoC;QACpC,IAAI,CAAC,QAAQ,GAAG,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,aAAa,EAAE;YACnD,YAAY,EAAE,4BAA4B;YAC1C,SAAS,EAAE,IAAI,CAAC,aAAa,CAAC,QAAQ;YACtC,aAAa,EAAE,GAAG,CAAC,aAAa,CAAC,OAAO;SAC3C,CAAC,CAAC;QAEH,gCAAgC;QAChC,kEAAkE;QAClE,MAAM,mBAAmB,GAA0C,eAAe;YAC9E,CAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;YACf,CAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE,CAAC;QAEpB,IAAI,CAAC,MAAM,GAAG,IAAI,KAAK,CAAC,SAAS,CAAC,IAAI,EAAE,QAAQ,EAAE;YAC9C,IAAI,EAAE,wBAAwB;YAC9B,KAAK,EAAE,UAAU;YACjB,aAAa,EAAE,mBAAmB;YAClC,WAAW,EACP,wEAAwE;gBACxE,SAAS,IAAI,KAAK,eAAe,CAAC,CAAC,CAAC,uCAAuC,CAAC,CAAC,CAAC,GAAG,WAAW,CAAC,MAAM,iBAAiB,GAAG;YAC3H,KAAK,EAAE;gBACH,+CAA+C;gBAC/C,uDAAuD;gBACvD;oBACI,IAAI,EAAE,sBAAsB;oBAC5B,QAAQ,EAAE,EAAE;oBACZ,SAAS,EAAE;wBACP,WAAW,EAAE;4BACT,UAAU,EAAE;gCACR;oCACI,kBAAkB,EAAE;wCAChB,YAAY,EAAE,EAAE,OAAO,EAAE,EAAE,EAAE;wCAC7B,oBAAoB,EAAE,SAAS;wCAC/B,YAAY,EAAE,SAAS;wCACvB,mBAAmB,EAAE,CAAC,EAAE,QAAQ,EAAE,CAAC,EAAE,IAAI,EAAE,MAAM,EAAE,CAAC;qCACvD;iCACJ;gCACD;oCACI,kBAAkB,EAAE;wCAChB,YAAY,EAAE,EAAE,OAAO,EAAE,EAAE,EAAE;wCAC7B,oBAAoB,EAAE,SAAS;wCAC/B,YAAY,EAAE,eAAe;wCAC7B,mBAAmB,EAAE,CAAC,EAAE,QAAQ,EAAE,CAAC,EAAE,IAAI,EAAE,MAAM,EAAE,CAAC;qCACvD;iCACJ;gCACD;oCACI,kBAAkB,EAAE;wCAChB,YAAY,EAAE,EAAE,OAAO,EAAE,EAAE,EAAE;wCAC7B,oBAAoB,EAAE,SAAS;wCAC/B,YAAY,EAAE,cAAc;wCAC5B,mBAAmB,EAAE,CAAC,EAAE,QAAQ,EAAE,CAAC,EAAE,IAAI,EAAE,MAAM,EAAE,CAAC;qCACvD;iCACJ;6BACJ;yBACJ;qBACJ;oBACD,MAAM,EAAE,EAAE,KAAK,EAAE,EAAE,EAAE;oBACrB,gBAAgB,EAAE;wBACd,sBAAsB,EAAE,IAAI;wBAC5B,wBAAwB,EAAE,IAAI;wBAC9B,UAAU,EAAE,sBAAsB;qBACrC;iBACJ;gBAED,qCAAqC;gBACrC,2CAA2C;gBAC3C,8DAA8D;gBAC9D,6EAA6E;gBAC7E;oBACI,IAAI,EAAE,aAAa;oBACnB,QAAQ,EAAE,EAAE;oBACZ,SAAS,EAAE;wBACP,uBAAuB,EAAE;4BACrB,GAAG,EAAE,IAAI,CAAC,KAAK,CAAC,OAAO;yBAC1B;qBACJ;oBACD,MAAM,EAAE,EAAE,KAAK,EAAE,EAAE,EAAE;oBACrB,gBAAgB,EAAE;wBACd,sBAAsB,EAAE,IAAI;wBAC5B,wBAAwB,EAAE,IAAI;wBAC9B,UAAU,EAAE,aAAa;qBAC5B;iBACJ;aACJ;YACD,gBAAgB,EAAE;gBACd,sBAAsB,EAAE,IAAI;gBAC5B,wBAAwB,EAAE,IAAI;gBAC9B,UAAU,EAAE,wBAAwB;aACvC;SACJ,CAAC,CAAC;QAEH,sCAAsC;QACtC,IAAI,KAAK,CAAC,uBAAuB,CAAC,IAAI,EAAE,YAAY,EAAE;YAClD,WAAW,EAAE,IAAI,CAAC,MAAM,CAAC,OAAO;YAChC,qBAAqB,EAAE,CAAC,IAAI,CAAC,QAAQ,CAAC,WAAW,CAAC;SACrD,CAAC,CAAC;IACP,CAAC;IAED;;;;;;;;;;;;;OAaG;IACK,gBAAgB,CAAC,SAAiB;QACtC,OAAO,SAAS;aACX,KAAK,CAAC,GAAG,CAAC;aACV,GAAG,CAAC,CAAC,EAAE,EAAE,EAAE,CAAC,EAAE,CAAC,IAAI,EAAE,CAAC;aACtB,MAAM,CAAC,CAAC,EAAE,EAAE,EAAE,CAAC,EAAE,CAAC,MAAM,GAAG,CAAC,CAAC;aAC7B,GAAG,CAAC,CAAC,EAAE,EAAE,EAAE;YACR,kDAAkD;YAClD,OAAO,EAAE,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,GAAG,EAAE,KAAK,CAAC;QAC9C,CAAC,CAAC,CAAC;IACX,CAAC;CACJ;AAxJD,8BAwJC"}