@sylvesterllc/aws-constructs 1.0.31 → 1.0.32
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/__tests__/data/testConfig.tsx +136 -0
- package/__tests__/mocks/ResourceMock.ts +10 -0
- package/__tests__/router.test.ts +195 -0
- package/dist/config/customConfigs/ResourceAppConfig.d.ts +4 -1
- package/dist/config/customConfigs/ResourceAppConfig.js +1 -1
- package/dist/config/types/LogDuration.d.ts +8 -0
- package/dist/config/types/LogDuration.js +13 -0
- package/dist/config/types/TsgAuthorizerProp.d.ts +6 -0
- package/dist/config/types/TsgAuthorizerProp.js +3 -0
- package/dist/config/types/TsgAuthorizerType.d.ts +4 -0
- package/dist/config/types/TsgAuthorizerType.js +9 -0
- package/dist/config/types/TsgEc2Prop.d.ts +7 -0
- package/dist/config/types/TsgEc2Prop.js +3 -0
- package/dist/config/types/TsgKeyPair.d.ts +4 -0
- package/dist/config/types/TsgKeyPair.js +3 -0
- package/dist/config/types/TsgLambdaProp.d.ts +2 -0
- package/dist/config/types/TsgLambdaProp.js +1 -1
- package/dist/config/types/TsgLambdaProps.d.ts +0 -2
- package/dist/config/types/TsgLambdaProps.js +1 -1
- package/dist/config/types/index.d.ts +1 -0
- package/dist/config/types/index.js +2 -1
- package/dist/constructs/MicroService.js +4 -13
- package/dist/interfaces/ApiLambdaResult.d.ts +4 -0
- package/dist/interfaces/ApiLambdaResult.js +3 -0
- package/dist/resources/dynamodb/CreateDynamo.js +3 -3
- package/dist/resources/ec2/create-ec2-instance.d.ts +9 -0
- package/dist/resources/ec2/create-ec2-instance.js +42 -0
- package/dist/resources/gateway/CreateApiAndAttachLambdas.d.ts +24 -0
- package/dist/resources/gateway/CreateApiAndAttachLambdas.js +89 -0
- package/dist/resources/helpers/createRoutes.d.ts +2 -2
- package/dist/resources/helpers/createRoutes.js +3 -3
- package/dist/resources/lambda/createLambda.d.ts +5 -4
- package/dist/resources/lambda/createLambda.js +49 -28
- package/dist/resources/{helpers/createAuthorizer.d.ts → lambda-authorizer/TsgJwtTokenAuthorizer.d.ts} +2 -4
- package/dist/resources/lambda-authorizer/TsgJwtTokenAuthorizer.js +80 -0
- package/dist/resources/lambda-authorizer/TsgRequestAuthorizer.d.ts +12 -0
- package/dist/resources/lambda-authorizer/TsgRequestAuthorizer.js +32 -0
- package/dist/resources/lambda-authorizer/createAuthorizerHelpers.d.ts +5 -0
- package/dist/resources/lambda-authorizer/createAuthorizerHelpers.js +50 -0
- package/jest.config.js +9 -0
- package/jest.config.ts.old +20 -0
- package/package.json +13 -11
- package/src/config/customConfigs/ResourceAppConfig.ts +5 -1
- package/src/config/types/LogDuration.ts +8 -0
- package/src/config/types/TsgAuthorizerProp.ts +9 -0
- package/src/config/types/TsgAuthorizerType.ts +5 -0
- package/src/config/types/TsgEc2Prop.ts +9 -0
- package/src/config/types/TsgKeyPair.ts +6 -0
- package/src/config/types/TsgLambdaProp.ts +4 -0
- package/src/config/types/TsgLambdaProps.ts +0 -1
- package/src/config/types/index.ts +1 -1
- package/src/constructs/MicroService.ts +4 -14
- package/src/interfaces/ApiLambdaResult.ts +6 -0
- package/src/resources/dynamodb/CreateDynamo.ts +1 -1
- package/src/resources/ec2/create-ec2-instance.ts +53 -0
- package/src/resources/gateway/CreateApiAndAttachLambdas.ts +137 -0
- package/src/resources/helpers/createRoutes.ts +3 -3
- package/src/resources/lambda/createLambda.ts +83 -55
- package/src/resources/{helpers/createAuthorizer.ts → lambda-authorizer/TsgJwtTokenAuthorizer.ts} +3 -3
- package/src/resources/lambda-authorizer/TsgRequestAuthorizer.ts +36 -0
- package/src/resources/lambda-authorizer/createAuthorizerHelpers.ts +69 -0
- package/dist/resources/gateway/createMicroServiceBundle.d.ts +0 -14
- package/dist/resources/gateway/createMicroServiceBundle.js +0 -127
- package/dist/resources/helpers/createAuthorizer.js +0 -81
- package/src/resources/gateway/createMicroServiceBundle.ts +0 -184
|
@@ -1,81 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.CreateAuthorizer = void 0;
|
|
4
|
-
const aws_cdk_lib_1 = require("aws-cdk-lib");
|
|
5
|
-
const aws_apigateway_1 = require("aws-cdk-lib/aws-apigateway");
|
|
6
|
-
const aws_iam_1 = require("aws-cdk-lib/aws-iam");
|
|
7
|
-
const aws_lambda_nodejs_1 = require("aws-cdk-lib/aws-lambda-nodejs");
|
|
8
|
-
const path = require("path");
|
|
9
|
-
const baseResource_1 = require("../base/baseResource");
|
|
10
|
-
const createLambda_1 = require("../lambda/createLambda");
|
|
11
|
-
class CreateAuthorizer extends baseResource_1.BaseResource {
|
|
12
|
-
get JwtAuthorizer() {
|
|
13
|
-
return this.createdResources[0];
|
|
14
|
-
}
|
|
15
|
-
constructor(scope, props, authProps) {
|
|
16
|
-
super(scope, props);
|
|
17
|
-
this.authProps = authProps;
|
|
18
|
-
this.createdResources = this.createResource(scope);
|
|
19
|
-
if (this.createdResources) {
|
|
20
|
-
this.createOutput(scope, this.createdResources);
|
|
21
|
-
}
|
|
22
|
-
}
|
|
23
|
-
createResource(scope) {
|
|
24
|
-
return [this.createLambdaAuthorizer(scope, this.authProps)];
|
|
25
|
-
}
|
|
26
|
-
createLambdaAuthorizer(scope, lambdaConfig) {
|
|
27
|
-
//console.log("ENTER createLambdaAuthorizer");
|
|
28
|
-
const authorizerProps = this.createLambdaFunctionProps(lambdaConfig);
|
|
29
|
-
const lambdaId = createLambda_1.CreateLambda.getIdForLambda(lambdaConfig, this.config);
|
|
30
|
-
const lambda = new aws_lambda_nodejs_1.NodejsFunction(scope, lambdaId, authorizerProps);
|
|
31
|
-
lambda.grantInvoke(new aws_iam_1.ServicePrincipal('apigateway.amazonaws.com'));
|
|
32
|
-
if (lambdaConfig?.managedPolicies && lambdaConfig.managedPolicies.length > 0) {
|
|
33
|
-
this.assignManagedPolicies(lambda, lambdaConfig.managedPolicies);
|
|
34
|
-
}
|
|
35
|
-
const props = {
|
|
36
|
-
handler: lambda,
|
|
37
|
-
authorizerName: lambdaConfig.name,
|
|
38
|
-
resultsCacheTtl: aws_cdk_lib_1.Duration.seconds(0),
|
|
39
|
-
identitySource: aws_apigateway_1.IdentitySource.header('Authorization'),
|
|
40
|
-
};
|
|
41
|
-
const lambdaAuthorizer = new aws_apigateway_1.TokenAuthorizer(scope, `${lambdaConfig.name}-authorizer`, props);
|
|
42
|
-
return lambdaAuthorizer;
|
|
43
|
-
}
|
|
44
|
-
createOutput(scope, createdAssets) {
|
|
45
|
-
const entity = createdAssets[0];
|
|
46
|
-
// new CfnOutput(scope, `authorizer`, {
|
|
47
|
-
// value: (entity as TokenAuthorizer).authorizerArn
|
|
48
|
-
// });
|
|
49
|
-
}
|
|
50
|
-
createLambdaFunctionProps(prop) {
|
|
51
|
-
const lambdaProp = {
|
|
52
|
-
entry: path.join(prop.codePath),
|
|
53
|
-
functionName: prop.name,
|
|
54
|
-
handler: prop.handler,
|
|
55
|
-
runtime: prop.runtime || this.config.GLOBALS.stackRuntime,
|
|
56
|
-
timeout: prop.duration || aws_cdk_lib_1.Duration.minutes(2),
|
|
57
|
-
memorySize: prop.memory || 512,
|
|
58
|
-
environment: {
|
|
59
|
-
"VERBOSE_LOGGING": "true",
|
|
60
|
-
...prop.environment
|
|
61
|
-
},
|
|
62
|
-
bundling: {
|
|
63
|
-
minify: false,
|
|
64
|
-
target: 'es2020',
|
|
65
|
-
sourceMap: true,
|
|
66
|
-
sourceMapMode: aws_lambda_nodejs_1.SourceMapMode.INLINE,
|
|
67
|
-
environment: prop.environment || prop.environment,
|
|
68
|
-
},
|
|
69
|
-
};
|
|
70
|
-
return lambdaProp;
|
|
71
|
-
}
|
|
72
|
-
;
|
|
73
|
-
assignManagedPolicies(lambda, managedPolicyNames) {
|
|
74
|
-
managedPolicyNames.forEach((managedPolicyName) => {
|
|
75
|
-
let policy = aws_iam_1.ManagedPolicy.fromAwsManagedPolicyName(managedPolicyName);
|
|
76
|
-
lambda.role?.addManagedPolicy(policy);
|
|
77
|
-
});
|
|
78
|
-
}
|
|
79
|
-
}
|
|
80
|
-
exports.CreateAuthorizer = CreateAuthorizer;
|
|
81
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"createAuthorizer.js","sourceRoot":"","sources":["../../../src/resources/helpers/createAuthorizer.ts"],"names":[],"mappings":";;;AAAA,6CAAkD;AAClD,+DAAmG;AACnG,iDAAsE;AACtE,qEAAmG;AAEnG,6BAA6B;AAK7B,uDAAoD;AACpD,yDAAsD;AAEtD,MAAa,gBAAiB,SAAQ,2BAA6B;IAE/D,IAAI,aAAa;QACb,OAAO,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,CAAC;IACpC,CAAC;IAED,YAAY,KAAgB,EAAE,KAAgB,EAAY,SAAwB;QAE9E,KAAK,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;QAFkC,cAAS,GAAT,SAAS,CAAe;QAI9E,IAAI,CAAC,gBAAgB,GAAG,IAAI,CAAC,cAAc,CAAC,KAAK,CAAE,CAAC;QAEpD,IAAI,IAAI,CAAC,gBAAgB,EAAE;YACvB,IAAI,CAAC,YAAY,CAAkB,KAAK,EAAE,IAAI,CAAC,gBAAgB,CAAC,CAAC;SACpE;IAEL,CAAC;IAES,cAAc,CAAC,KAAgB;QACrC,OAAO,CAAC,IAAI,CAAC,sBAAsB,CAAC,KAAK,EAAE,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC;IAChE,CAAC;IAEO,sBAAsB,CAAC,KAAgB,EAAE,YAA2B;QACxE,8CAA8C;QAE9C,MAAM,eAAe,GAAG,IAAI,CAAC,yBAAyB,CAAC,YAAa,CAAC,CAAC;QAEtE,MAAM,QAAQ,GAAG,2BAAY,CAAC,cAAc,CAAC,YAAY,EAAE,IAAI,CAAC,MAAM,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,IAAI,kCAAc,CAAC,KAAK,EAAE,QAAQ,EAAE,eAAe,CAAC,CAAC;QAEpE,MAAM,CAAC,WAAW,CAAC,IAAI,0BAAgB,CAAC,0BAA0B,CAAC,CAAC,CAAC;QAErE,IAAI,YAAY,EAAE,eAAe,IAAI,YAAY,CAAC,eAAe,CAAC,MAAM,GAAG,CAAC,EAAE;YAC1E,IAAI,CAAC,qBAAqB,CAAC,MAAM,EAAE,YAAY,CAAC,eAAe,CAAC,CAAC;SACpE;QAED,MAAM,KAAK,GAAyB;YAChC,OAAO,EAAE,MAAM;YACf,cAAc,EAAE,YAAY,CAAC,IAAI;YACjC,eAAe,EAAE,sBAAQ,CAAC,OAAO,CAAC,CAAC,CAAC;YACpC,cAAc,EAAE,+BAAc,CAAC,MAAM,CAAC,eAAe,CAAC;SAEzD,CAAC;QAEF,MAAM,gBAAgB,GAAG,IAAI,gCAAe,CAAC,KAAK,EAAE,GAAG,YAAY,CAAC,IAAI,aAAa,EAAE,KAAK,CAAC,CAAC;QAE9F,OAAO,gBAAgB,CAAC;IAC5B,CAAC;IAES,YAAY,CAAI,KAAgB,EAAE,aAAkB;QAE1D,MAAM,MAAM,GAAG,aAAa,CAAC,CAAC,CAAC,CAAC;QAEhC,uCAAuC;QACvC,uDAAuD;QACvD,MAAM;IAEV,CAAC;IAEO,yBAAyB,CAAC,IAAmB;QAEjD,MAAM,UAAU,GAAwB;YACpC,KAAK,EAAE,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC;YAC/B,YAAY,EAAE,IAAI,CAAC,IAAI;YACvB,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,OAAO,EAAE,IAAI,CAAC,OAAO,IAAI,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,YAAY;YACzD,OAAO,EAAE,IAAI,CAAC,QAAQ,IAAI,sBAAQ,CAAC,OAAO,CAAC,CAAC,CAAC;YAC7C,UAAU,EAAE,IAAI,CAAC,MAAM,IAAI,GAAG;YAC9B,WAAW,EAAE;gBACT,iBAAiB,EAAE,MAAM;gBACzB,GAAG,IAAI,CAAC,WAAW;aACtB;YACD,QAAQ,EAAE;gBACN,MAAM,EAAE,KAAK;gBACb,MAAM,EAAE,QAAQ;gBAChB,SAAS,EAAE,IAAI;gBACf,aAAa,EAAE,iCAAa,CAAC,MAAM;gBACnC,WAAW,EAAE,IAAI,CAAC,WAAW,IAAI,IAAI,CAAC,WAAW;aACpD;SACJ,CAAA;QACD,OAAO,UAAU,CAAC;IACtB,CAAC;IAAA,CAAC;IAEM,qBAAqB,CAAC,MAAsB,EAAE,kBAA4B;QAE9E,kBAAkB,CAAC,OAAO,CAAC,CAAC,iBAAyB,EAAE,EAAE;YAErD,IAAI,MAAM,GAAG,uBAAa,CAAC,wBAAwB,CAAC,iBAAiB,CAAC,CAAC;YAEvE,MAAM,CAAC,IAAI,EAAE,gBAAgB,CAAC,MAAM,CAAC,CAAC;QAC1C,CAAC,CAAC,CAAC;IAEP,CAAC;CAEJ;AA9FD,4CA8FC","sourcesContent":["import { CfnOutput, Duration } from \"aws-cdk-lib\";\nimport { IdentitySource, TokenAuthorizer, TokenAuthorizerProps } from \"aws-cdk-lib/aws-apigateway\";\nimport { ManagedPolicy, ServicePrincipal } from \"aws-cdk-lib/aws-iam\";\nimport { NodejsFunction, NodejsFunctionProps, SourceMapMode } from \"aws-cdk-lib/aws-lambda-nodejs\";\nimport { Construct } from \"constructs\";\nimport * as path from 'path';\nimport { AppConfig } from \"../../config/AppConfig\";\n\nimport { TsgLambdaProp } from \"../../config/types\";\nimport { MicroserviceProps } from \"../../interfaces/MicroserviceProps\";\nimport { BaseResource } from \"../base/baseResource\";\nimport { CreateLambda } from \"../lambda/createLambda\";\n\nexport class CreateAuthorizer extends BaseResource<TokenAuthorizer> {\n\n    get JwtAuthorizer() {\n        return this.createdResources[0];\n    }\n\n    constructor(scope: Construct, props: AppConfig, protected authProps: TsgLambdaProp) {\n\n        super(scope, props);\n\n        this.createdResources = this.createResource(scope)!;\n\n        if (this.createdResources) {\n            this.createOutput<TokenAuthorizer>(scope, this.createdResources);\n        }\n\n    }\n\n    protected createResource(scope: Construct): TokenAuthorizer[] | null {\n        return [this.createLambdaAuthorizer(scope, this.authProps)];\n    }\n\n    private createLambdaAuthorizer(scope: Construct, lambdaConfig: TsgLambdaProp) {\n        //console.log(\"ENTER createLambdaAuthorizer\");\n\n        const authorizerProps = this.createLambdaFunctionProps(lambdaConfig!);\n\n        const lambdaId = CreateLambda.getIdForLambda(lambdaConfig, this.config);\n        const lambda = new NodejsFunction(scope, lambdaId, authorizerProps);\n\n        lambda.grantInvoke(new ServicePrincipal('apigateway.amazonaws.com'));\n\n        if (lambdaConfig?.managedPolicies && lambdaConfig.managedPolicies.length > 0) {\n            this.assignManagedPolicies(lambda, lambdaConfig.managedPolicies);\n        }\n\n        const props: TokenAuthorizerProps = {\n            handler: lambda,\n            authorizerName: lambdaConfig.name,\n            resultsCacheTtl: Duration.seconds(0), \n            identitySource: IdentitySource.header('Authorization'),\n            \n        };\n\n        const lambdaAuthorizer = new TokenAuthorizer(scope, `${lambdaConfig.name}-authorizer`, props);\n\n        return lambdaAuthorizer;\n    }\n\n    protected createOutput<T>(scope: Construct, createdAssets: T[]): void {\n\n        const entity = createdAssets[0];\n\n        // new CfnOutput(scope, `authorizer`, {\n        //     value: (entity as TokenAuthorizer).authorizerArn\n        // });\n\n    }\n\n    private createLambdaFunctionProps(prop: TsgLambdaProp) {       \n\n        const lambdaProp: NodejsFunctionProps = {\n            entry: path.join(prop.codePath),\n            functionName: prop.name,\n            handler: prop.handler,\n            runtime: prop.runtime || this.config.GLOBALS.stackRuntime,\n            timeout: prop.duration || Duration.minutes(2),\n            memorySize: prop.memory || 512,\n            environment: {\n                \"VERBOSE_LOGGING\": \"true\",                \n                ...prop.environment\n            },\n            bundling: {\n                minify: false,\n                target: 'es2020',\n                sourceMap: true,\n                sourceMapMode: SourceMapMode.INLINE,\n                environment: prop.environment || prop.environment,\n            },\n        }\n        return lambdaProp;\n    };\n\n    private assignManagedPolicies(lambda: NodejsFunction, managedPolicyNames: string[]) {\n\n        managedPolicyNames.forEach((managedPolicyName: string) => {\n\n            let policy = ManagedPolicy.fromAwsManagedPolicyName(managedPolicyName);\n\n            lambda.role?.addManagedPolicy(policy);\n        });\n\n    }\n\n}"]}
|
|
@@ -1,184 +0,0 @@
|
|
|
1
|
-
import { IRestApi, TokenAuthorizer } from "aws-cdk-lib/aws-apigateway";
|
|
2
|
-
import { ITable, Table } from "aws-cdk-lib/aws-dynamodb";
|
|
3
|
-
import { NodejsFunction } from "aws-cdk-lib/aws-lambda-nodejs";
|
|
4
|
-
import { Effect, PolicyStatement } from "aws-cdk-lib/aws-iam";
|
|
5
|
-
import { Construct } from "constructs";
|
|
6
|
-
import { TsgDynamoTableRef, TsgLambdaProp } from "../../config/types";
|
|
7
|
-
import { TsgLambdaProps } from "../../config/types/TsgLambdaProps";
|
|
8
|
-
import { MicroserviceProps } from "../../interfaces/MicroserviceProps";
|
|
9
|
-
import { CreateAuthorizer } from "../helpers/createAuthorizer";
|
|
10
|
-
import { Routes } from "../helpers/createRoutes";
|
|
11
|
-
import { CreateLambda } from "../lambda/createLambda";
|
|
12
|
-
import { RemovalPolicy, Stack } from "aws-cdk-lib";
|
|
13
|
-
import { CreateDynamoDb } from "../dynamodb/CreateDynamo";
|
|
14
|
-
import { ISecret } from "aws-cdk-lib/aws-secretsmanager";
|
|
15
|
-
|
|
16
|
-
import { ServiceBundleConfig } from "../../config/ServiceBundleConfig";
|
|
17
|
-
|
|
18
|
-
export class CreateMicroServiceBundle {
|
|
19
|
-
|
|
20
|
-
protected readonly requireDynamoTableRefs: boolean;
|
|
21
|
-
protected readonly requireAuthorizer: boolean;
|
|
22
|
-
|
|
23
|
-
constructor(private serviceBundleConfig: ServiceBundleConfig) {
|
|
24
|
-
|
|
25
|
-
this.requireDynamoTableRefs = (this.serviceBundleConfig.props.RESOURCES.DYNAMO?.TABLE_REFS?.length ?? 0 > 0) ? true : false;
|
|
26
|
-
this.requireAuthorizer = (this.serviceBundleConfig.props.RESOURCES.AUTHORIZER) ? true : false;
|
|
27
|
-
this.onInit(this.serviceBundleConfig.scope);
|
|
28
|
-
}
|
|
29
|
-
|
|
30
|
-
private onInit(scope: Construct) {
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
let authorizer: TokenAuthorizer|undefined = undefined;
|
|
34
|
-
|
|
35
|
-
// Create Authorizer
|
|
36
|
-
if (this.requireAuthorizer) {
|
|
37
|
-
authorizer = new CreateAuthorizer(scope, this.serviceBundleConfig.appConfig, this.serviceBundleConfig.props.RESOURCES.AUTHORIZER!).JwtAuthorizer;
|
|
38
|
-
authorizer._attachToApi(this.serviceBundleConfig.gatewayApi);
|
|
39
|
-
authorizer.applyRemovalPolicy(RemovalPolicy.DESTROY);
|
|
40
|
-
}
|
|
41
|
-
|
|
42
|
-
// Create Lambdas
|
|
43
|
-
const lambdaProp: TsgLambdaProps = {
|
|
44
|
-
scope,
|
|
45
|
-
prop: this.serviceBundleConfig.props,
|
|
46
|
-
layers: this.serviceBundleConfig.layers,
|
|
47
|
-
appConfig: this.serviceBundleConfig.appConfig
|
|
48
|
-
};
|
|
49
|
-
|
|
50
|
-
const lambdas = new CreateLambda(lambdaProp, this.serviceBundleConfig.appConfig);
|
|
51
|
-
|
|
52
|
-
if (this.serviceBundleConfig.tables) {
|
|
53
|
-
this.AssignAccessToTables(this.serviceBundleConfig.tables, lambdas.Lambdas);
|
|
54
|
-
}
|
|
55
|
-
|
|
56
|
-
// Allow access to existing tables
|
|
57
|
-
// if (this.requireDynamoTableRefs) {
|
|
58
|
-
// this.AssignAccessToTableRefs(scope, this.props.RESOURCES.DYNAMO?.TABLE_REFS, lambdas.Lambdas);
|
|
59
|
-
// }
|
|
60
|
-
|
|
61
|
-
if (this.serviceBundleConfig.secretMgr) {
|
|
62
|
-
this.AssignAccessToSecretManager(this.serviceBundleConfig.secretMgr, lambdas.Lambdas);
|
|
63
|
-
}
|
|
64
|
-
|
|
65
|
-
// lambdas.Lambdas.map((lambda) => {
|
|
66
|
-
// lambda.metricErrors({
|
|
67
|
-
// label: `${lambda.functionName}-errors`,
|
|
68
|
-
// period: Duration.minutes(3)
|
|
69
|
-
|
|
70
|
-
// })
|
|
71
|
-
// });
|
|
72
|
-
|
|
73
|
-
this.AddRoutes(this.serviceBundleConfig.props, this.serviceBundleConfig.gatewayApi, lambdas.Lambdas, authorizer);
|
|
74
|
-
}
|
|
75
|
-
|
|
76
|
-
private AssignAccessToTables(tables: Table[], lambdas: NodejsFunction[]) {
|
|
77
|
-
|
|
78
|
-
if (tables) {
|
|
79
|
-
lambdas.forEach((lambda: NodejsFunction) => {
|
|
80
|
-
|
|
81
|
-
tables.forEach((table: ITable) => {
|
|
82
|
-
|
|
83
|
-
|
|
84
|
-
|
|
85
|
-
// This is a CDK bug: It doesn't provide
|
|
86
|
-
// access to the indexes.
|
|
87
|
-
//table.grantReadWriteData(lambda);
|
|
88
|
-
|
|
89
|
-
// Workaround:
|
|
90
|
-
// lambda.addToRolePolicy(
|
|
91
|
-
// new PolicyStatement({
|
|
92
|
-
// effect: Effect.ALLOW,
|
|
93
|
-
// actions: CreateDynamoDb.ReadWriteActions,
|
|
94
|
-
// resources: [
|
|
95
|
-
// table.tableArn,
|
|
96
|
-
// `${table.tableArn}/*`, // This is not recognized by cdk, but table is. why?
|
|
97
|
-
// ],
|
|
98
|
-
// })
|
|
99
|
-
// );
|
|
100
|
-
|
|
101
|
-
table.grantReadWriteData(lambda);
|
|
102
|
-
|
|
103
|
-
|
|
104
|
-
});
|
|
105
|
-
|
|
106
|
-
});
|
|
107
|
-
}
|
|
108
|
-
}
|
|
109
|
-
|
|
110
|
-
private AssignAccessToTableRefs(scope: Construct, tableRefs: TsgDynamoTableRef[] | undefined, lambdas: NodejsFunction[]) {
|
|
111
|
-
|
|
112
|
-
if (tableRefs) {
|
|
113
|
-
tableRefs.forEach((tableRef: TsgDynamoTableRef) => {
|
|
114
|
-
|
|
115
|
-
if (tableRef.region) {
|
|
116
|
-
this.AssignReadWriteAccessToTableInRegion(scope, tableRef, lambdas);
|
|
117
|
-
}
|
|
118
|
-
else {
|
|
119
|
-
this.AssignReadWriteAccessToTable(scope, tableRef, lambdas);
|
|
120
|
-
}
|
|
121
|
-
});
|
|
122
|
-
}
|
|
123
|
-
}
|
|
124
|
-
|
|
125
|
-
private AssignReadWriteAccessToTableInRegion(scope: Construct, tableRef: TsgDynamoTableRef, lambdas: NodejsFunction[]) {
|
|
126
|
-
lambdas.forEach((lambda: NodejsFunction) => {
|
|
127
|
-
|
|
128
|
-
let tableArn = "arn:aws:dynamodb:" + tableRef.region + ":" + ((scope as Stack).account) + ":table/" + tableRef.tableName;
|
|
129
|
-
let statement = new PolicyStatement({
|
|
130
|
-
effect: Effect.ALLOW,
|
|
131
|
-
resources: [
|
|
132
|
-
tableArn,
|
|
133
|
-
tableArn + "/index/*",
|
|
134
|
-
],
|
|
135
|
-
actions: CreateDynamoDb.ReadWriteActions,
|
|
136
|
-
});
|
|
137
|
-
|
|
138
|
-
lambda.role?.addToPrincipalPolicy(statement);
|
|
139
|
-
|
|
140
|
-
});
|
|
141
|
-
}
|
|
142
|
-
|
|
143
|
-
private AssignReadWriteAccessToTable(scope: Construct, tableRef: TsgDynamoTableRef, lambdas: NodejsFunction[]) {
|
|
144
|
-
let table: ITable = Table.fromTableName(scope, tableRef.tableName, tableRef.tableName);
|
|
145
|
-
|
|
146
|
-
lambdas.forEach((lambda: NodejsFunction) => {
|
|
147
|
-
table.grantReadWriteData(lambda)
|
|
148
|
-
|
|
149
|
-
});
|
|
150
|
-
}
|
|
151
|
-
|
|
152
|
-
private AddRoutes(props: MicroserviceProps,
|
|
153
|
-
gateway: IRestApi,
|
|
154
|
-
lambdas: NodejsFunction[],
|
|
155
|
-
authorizer?: TokenAuthorizer) {
|
|
156
|
-
|
|
157
|
-
props.RESOURCES.LAMBDA?.forEach((prop: TsgLambdaProp) => {
|
|
158
|
-
|
|
159
|
-
const lambdaId = CreateLambda.getIdForLambda(prop, this.serviceBundleConfig.appConfig);
|
|
160
|
-
|
|
161
|
-
if (!lambdaId) {
|
|
162
|
-
throw new Error(`Can't find lambda`);
|
|
163
|
-
}
|
|
164
|
-
const lambdaNode = lambdas.find(x => x.node.id === lambdaId);
|
|
165
|
-
|
|
166
|
-
if (!lambdaNode) {
|
|
167
|
-
throw new Error("Can't find the Lambda Integration");
|
|
168
|
-
}
|
|
169
|
-
|
|
170
|
-
Routes.createResource(prop, gateway, lambdaNode, authorizer);
|
|
171
|
-
|
|
172
|
-
});
|
|
173
|
-
}
|
|
174
|
-
|
|
175
|
-
private AssignAccessToSecretManager(secret: ISecret, lambdas: NodejsFunction[]) {
|
|
176
|
-
|
|
177
|
-
lambdas.forEach((lambda) => {
|
|
178
|
-
const result = secret.grantRead(lambda);
|
|
179
|
-
|
|
180
|
-
});
|
|
181
|
-
|
|
182
|
-
}
|
|
183
|
-
|
|
184
|
-
}
|