@sylvesterllc/aws-constructs 1.0.31 → 1.0.34
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/__tests__/data/testConfig.tsx +136 -0
- package/__tests__/mocks/ResourceMock.ts +10 -0
- package/__tests__/router.test.ts +195 -0
- package/dist/config/AppConfig.js +11 -1
- package/dist/config/customConfigs/ResourceAppConfig.d.ts +4 -1
- package/dist/config/customConfigs/ResourceAppConfig.js +1 -1
- package/dist/config/types/LogDuration.d.ts +8 -0
- package/dist/config/types/LogDuration.js +13 -0
- package/dist/config/types/TsgAuthorizerProp.d.ts +6 -0
- package/dist/config/types/TsgAuthorizerProp.js +3 -0
- package/dist/config/types/TsgAuthorizerType.d.ts +4 -0
- package/dist/config/types/TsgAuthorizerType.js +9 -0
- package/dist/config/types/TsgEc2Prop.d.ts +7 -0
- package/dist/config/types/TsgEc2Prop.js +3 -0
- package/dist/config/types/TsgKeyPair.d.ts +4 -0
- package/dist/config/types/TsgKeyPair.js +3 -0
- package/dist/config/types/TsgLambdaProp.d.ts +2 -0
- package/dist/config/types/TsgLambdaProp.js +1 -1
- package/dist/config/types/TsgLambdaProps.d.ts +0 -2
- package/dist/config/types/TsgLambdaProps.js +1 -1
- package/dist/config/types/index.d.ts +3 -0
- package/dist/config/types/index.js +4 -1
- package/dist/constructs/MicroService.js +4 -13
- package/dist/interfaces/ApiLambdaResult.d.ts +4 -0
- package/dist/interfaces/ApiLambdaResult.js +3 -0
- package/dist/resources/dynamodb/CreateDynamo.js +3 -3
- package/dist/resources/ec2/create-ec2-instance.d.ts +9 -0
- package/dist/resources/ec2/create-ec2-instance.js +42 -0
- package/dist/resources/gateway/CreateApiAndAttachLambdas.d.ts +24 -0
- package/dist/resources/gateway/CreateApiAndAttachLambdas.js +89 -0
- package/dist/resources/helpers/createRoutes.d.ts +2 -2
- package/dist/resources/helpers/createRoutes.js +3 -3
- package/dist/resources/lambda/createLambda.d.ts +5 -4
- package/dist/resources/lambda/createLambda.js +49 -28
- package/dist/resources/{helpers/createAuthorizer.d.ts → lambda-authorizer/TsgJwtTokenAuthorizer.d.ts} +2 -4
- package/dist/resources/lambda-authorizer/TsgJwtTokenAuthorizer.js +80 -0
- package/dist/resources/lambda-authorizer/TsgRequestAuthorizer.d.ts +12 -0
- package/dist/resources/lambda-authorizer/TsgRequestAuthorizer.js +32 -0
- package/dist/resources/lambda-authorizer/createAuthorizerHelpers.d.ts +5 -0
- package/dist/resources/lambda-authorizer/createAuthorizerHelpers.js +50 -0
- package/jest.config.js +9 -0
- package/jest.config.ts.old +20 -0
- package/package.json +13 -11
- package/src/config/AppConfig.ts +13 -0
- package/src/config/customConfigs/ResourceAppConfig.ts +5 -1
- package/src/config/types/LogDuration.ts +8 -0
- package/src/config/types/TsgAuthorizerProp.ts +9 -0
- package/src/config/types/TsgAuthorizerType.ts +5 -0
- package/src/config/types/TsgEc2Prop.ts +9 -0
- package/src/config/types/TsgKeyPair.ts +6 -0
- package/src/config/types/TsgLambdaProp.ts +4 -0
- package/src/config/types/TsgLambdaProps.ts +0 -1
- package/src/config/types/index.ts +3 -1
- package/src/constructs/MicroService.ts +4 -14
- package/src/interfaces/ApiLambdaResult.ts +6 -0
- package/src/resources/dynamodb/CreateDynamo.ts +1 -1
- package/src/resources/ec2/create-ec2-instance.ts +53 -0
- package/src/resources/gateway/CreateApiAndAttachLambdas.ts +137 -0
- package/src/resources/helpers/createRoutes.ts +3 -3
- package/src/resources/lambda/createLambda.ts +83 -55
- package/src/resources/{helpers/createAuthorizer.ts → lambda-authorizer/TsgJwtTokenAuthorizer.ts} +3 -3
- package/src/resources/lambda-authorizer/TsgRequestAuthorizer.ts +36 -0
- package/src/resources/lambda-authorizer/createAuthorizerHelpers.ts +69 -0
- package/dist/resources/gateway/createMicroServiceBundle.d.ts +0 -14
- package/dist/resources/gateway/createMicroServiceBundle.js +0 -127
- package/dist/resources/helpers/createAuthorizer.js +0 -81
- package/src/resources/gateway/createMicroServiceBundle.ts +0 -184
|
@@ -1,127 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.CreateMicroServiceBundle = void 0;
|
|
4
|
-
const aws_dynamodb_1 = require("aws-cdk-lib/aws-dynamodb");
|
|
5
|
-
const aws_iam_1 = require("aws-cdk-lib/aws-iam");
|
|
6
|
-
const createAuthorizer_1 = require("../helpers/createAuthorizer");
|
|
7
|
-
const createRoutes_1 = require("../helpers/createRoutes");
|
|
8
|
-
const createLambda_1 = require("../lambda/createLambda");
|
|
9
|
-
const aws_cdk_lib_1 = require("aws-cdk-lib");
|
|
10
|
-
const CreateDynamo_1 = require("../dynamodb/CreateDynamo");
|
|
11
|
-
class CreateMicroServiceBundle {
|
|
12
|
-
constructor(serviceBundleConfig) {
|
|
13
|
-
this.serviceBundleConfig = serviceBundleConfig;
|
|
14
|
-
this.requireDynamoTableRefs = (this.serviceBundleConfig.props.RESOURCES.DYNAMO?.TABLE_REFS?.length ?? 0 > 0) ? true : false;
|
|
15
|
-
this.requireAuthorizer = (this.serviceBundleConfig.props.RESOURCES.AUTHORIZER) ? true : false;
|
|
16
|
-
this.onInit(this.serviceBundleConfig.scope);
|
|
17
|
-
}
|
|
18
|
-
onInit(scope) {
|
|
19
|
-
let authorizer = undefined;
|
|
20
|
-
// Create Authorizer
|
|
21
|
-
if (this.requireAuthorizer) {
|
|
22
|
-
authorizer = new createAuthorizer_1.CreateAuthorizer(scope, this.serviceBundleConfig.appConfig, this.serviceBundleConfig.props.RESOURCES.AUTHORIZER).JwtAuthorizer;
|
|
23
|
-
authorizer._attachToApi(this.serviceBundleConfig.gatewayApi);
|
|
24
|
-
authorizer.applyRemovalPolicy(aws_cdk_lib_1.RemovalPolicy.DESTROY);
|
|
25
|
-
}
|
|
26
|
-
// Create Lambdas
|
|
27
|
-
const lambdaProp = {
|
|
28
|
-
scope,
|
|
29
|
-
prop: this.serviceBundleConfig.props,
|
|
30
|
-
layers: this.serviceBundleConfig.layers,
|
|
31
|
-
appConfig: this.serviceBundleConfig.appConfig
|
|
32
|
-
};
|
|
33
|
-
const lambdas = new createLambda_1.CreateLambda(lambdaProp, this.serviceBundleConfig.appConfig);
|
|
34
|
-
if (this.serviceBundleConfig.tables) {
|
|
35
|
-
this.AssignAccessToTables(this.serviceBundleConfig.tables, lambdas.Lambdas);
|
|
36
|
-
}
|
|
37
|
-
// Allow access to existing tables
|
|
38
|
-
// if (this.requireDynamoTableRefs) {
|
|
39
|
-
// this.AssignAccessToTableRefs(scope, this.props.RESOURCES.DYNAMO?.TABLE_REFS, lambdas.Lambdas);
|
|
40
|
-
// }
|
|
41
|
-
if (this.serviceBundleConfig.secretMgr) {
|
|
42
|
-
this.AssignAccessToSecretManager(this.serviceBundleConfig.secretMgr, lambdas.Lambdas);
|
|
43
|
-
}
|
|
44
|
-
// lambdas.Lambdas.map((lambda) => {
|
|
45
|
-
// lambda.metricErrors({
|
|
46
|
-
// label: `${lambda.functionName}-errors`,
|
|
47
|
-
// period: Duration.minutes(3)
|
|
48
|
-
// })
|
|
49
|
-
// });
|
|
50
|
-
this.AddRoutes(this.serviceBundleConfig.props, this.serviceBundleConfig.gatewayApi, lambdas.Lambdas, authorizer);
|
|
51
|
-
}
|
|
52
|
-
AssignAccessToTables(tables, lambdas) {
|
|
53
|
-
if (tables) {
|
|
54
|
-
lambdas.forEach((lambda) => {
|
|
55
|
-
tables.forEach((table) => {
|
|
56
|
-
// This is a CDK bug: It doesn't provide
|
|
57
|
-
// access to the indexes.
|
|
58
|
-
//table.grantReadWriteData(lambda);
|
|
59
|
-
// Workaround:
|
|
60
|
-
// lambda.addToRolePolicy(
|
|
61
|
-
// new PolicyStatement({
|
|
62
|
-
// effect: Effect.ALLOW,
|
|
63
|
-
// actions: CreateDynamoDb.ReadWriteActions,
|
|
64
|
-
// resources: [
|
|
65
|
-
// table.tableArn,
|
|
66
|
-
// `${table.tableArn}/*`, // This is not recognized by cdk, but table is. why?
|
|
67
|
-
// ],
|
|
68
|
-
// })
|
|
69
|
-
// );
|
|
70
|
-
table.grantReadWriteData(lambda);
|
|
71
|
-
});
|
|
72
|
-
});
|
|
73
|
-
}
|
|
74
|
-
}
|
|
75
|
-
AssignAccessToTableRefs(scope, tableRefs, lambdas) {
|
|
76
|
-
if (tableRefs) {
|
|
77
|
-
tableRefs.forEach((tableRef) => {
|
|
78
|
-
if (tableRef.region) {
|
|
79
|
-
this.AssignReadWriteAccessToTableInRegion(scope, tableRef, lambdas);
|
|
80
|
-
}
|
|
81
|
-
else {
|
|
82
|
-
this.AssignReadWriteAccessToTable(scope, tableRef, lambdas);
|
|
83
|
-
}
|
|
84
|
-
});
|
|
85
|
-
}
|
|
86
|
-
}
|
|
87
|
-
AssignReadWriteAccessToTableInRegion(scope, tableRef, lambdas) {
|
|
88
|
-
lambdas.forEach((lambda) => {
|
|
89
|
-
let tableArn = "arn:aws:dynamodb:" + tableRef.region + ":" + (scope.account) + ":table/" + tableRef.tableName;
|
|
90
|
-
let statement = new aws_iam_1.PolicyStatement({
|
|
91
|
-
effect: aws_iam_1.Effect.ALLOW,
|
|
92
|
-
resources: [
|
|
93
|
-
tableArn,
|
|
94
|
-
tableArn + "/index/*",
|
|
95
|
-
],
|
|
96
|
-
actions: CreateDynamo_1.CreateDynamoDb.ReadWriteActions,
|
|
97
|
-
});
|
|
98
|
-
lambda.role?.addToPrincipalPolicy(statement);
|
|
99
|
-
});
|
|
100
|
-
}
|
|
101
|
-
AssignReadWriteAccessToTable(scope, tableRef, lambdas) {
|
|
102
|
-
let table = aws_dynamodb_1.Table.fromTableName(scope, tableRef.tableName, tableRef.tableName);
|
|
103
|
-
lambdas.forEach((lambda) => {
|
|
104
|
-
table.grantReadWriteData(lambda);
|
|
105
|
-
});
|
|
106
|
-
}
|
|
107
|
-
AddRoutes(props, gateway, lambdas, authorizer) {
|
|
108
|
-
props.RESOURCES.LAMBDA?.forEach((prop) => {
|
|
109
|
-
const lambdaId = createLambda_1.CreateLambda.getIdForLambda(prop, this.serviceBundleConfig.appConfig);
|
|
110
|
-
if (!lambdaId) {
|
|
111
|
-
throw new Error(`Can't find lambda`);
|
|
112
|
-
}
|
|
113
|
-
const lambdaNode = lambdas.find(x => x.node.id === lambdaId);
|
|
114
|
-
if (!lambdaNode) {
|
|
115
|
-
throw new Error("Can't find the Lambda Integration");
|
|
116
|
-
}
|
|
117
|
-
createRoutes_1.Routes.createResource(prop, gateway, lambdaNode, authorizer);
|
|
118
|
-
});
|
|
119
|
-
}
|
|
120
|
-
AssignAccessToSecretManager(secret, lambdas) {
|
|
121
|
-
lambdas.forEach((lambda) => {
|
|
122
|
-
const result = secret.grantRead(lambda);
|
|
123
|
-
});
|
|
124
|
-
}
|
|
125
|
-
}
|
|
126
|
-
exports.CreateMicroServiceBundle = CreateMicroServiceBundle;
|
|
127
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"createMicroServiceBundle.js","sourceRoot":"","sources":["../../../src/resources/gateway/createMicroServiceBundle.ts"],"names":[],"mappings":";;;AACA,2DAAyD;AAEzD,iDAA8D;AAK9D,kEAA+D;AAC/D,0DAAiD;AACjD,yDAAsD;AACtD,6CAAmD;AACnD,2DAA0D;AAK1D,MAAa,wBAAwB;IAKjC,YAAoB,mBAAwC;QAAxC,wBAAmB,GAAnB,mBAAmB,CAAqB;QAExD,IAAI,CAAC,sBAAsB,GAAG,CAAC,IAAI,CAAC,mBAAmB,CAAC,KAAK,CAAC,SAAS,CAAC,MAAM,EAAE,UAAU,EAAE,MAAM,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,KAAK,CAAC;QAC5H,IAAI,CAAC,iBAAiB,GAAG,CAAC,IAAI,CAAC,mBAAmB,CAAC,KAAK,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,KAAK,CAAC;QAC9F,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,mBAAmB,CAAC,KAAK,CAAC,CAAC;IAChD,CAAC;IAEO,MAAM,CAAC,KAAgB;QAG3B,IAAI,UAAU,GAA8B,SAAS,CAAC;QAEtD,oBAAoB;QACpB,IAAI,IAAI,CAAC,iBAAiB,EAAE;YACxB,UAAU,GAAG,IAAI,mCAAgB,CAAC,KAAK,EAAE,IAAI,CAAC,mBAAmB,CAAC,SAAS,EAAE,IAAI,CAAC,mBAAmB,CAAC,KAAK,CAAC,SAAS,CAAC,UAAW,CAAC,CAAC,aAAa,CAAC;YACjJ,UAAU,CAAC,YAAY,CAAC,IAAI,CAAC,mBAAmB,CAAC,UAAU,CAAC,CAAC;YAC7D,UAAU,CAAC,kBAAkB,CAAC,2BAAa,CAAC,OAAO,CAAC,CAAC;SACxD;QAED,iBAAiB;QACjB,MAAM,UAAU,GAAmB;YAC/B,KAAK;YACL,IAAI,EAAE,IAAI,CAAC,mBAAmB,CAAC,KAAK;YACpC,MAAM,EAAE,IAAI,CAAC,mBAAmB,CAAC,MAAM;YACvC,SAAS,EAAE,IAAI,CAAC,mBAAmB,CAAC,SAAS;SAChD,CAAC;QAEF,MAAM,OAAO,GAAG,IAAI,2BAAY,CAAC,UAAU,EAAE,IAAI,CAAC,mBAAmB,CAAC,SAAS,CAAC,CAAC;QAEjF,IAAI,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE;YACjC,IAAI,CAAC,oBAAoB,CAAC,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,OAAO,CAAC,OAAO,CAAC,CAAC;SAC/E;QAED,kCAAkC;QAClC,qCAAqC;QACrC,qGAAqG;QACrG,IAAI;QAEJ,IAAI,IAAI,CAAC,mBAAmB,CAAC,SAAS,EAAE;YACpC,IAAI,CAAC,2BAA2B,CAAC,IAAI,CAAC,mBAAmB,CAAC,SAAS,EAAE,OAAO,CAAC,OAAO,CAAC,CAAC;SACzF;QAED,oCAAoC;QACpC,4CAA4C;QAC5C,uDAAuD;QACvD,qDAAqD;QAErD,SAAS;QACT,MAAM;QAEN,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,mBAAmB,CAAC,KAAK,EAAE,IAAI,CAAC,mBAAmB,CAAC,UAAU,EAAE,OAAO,CAAC,OAAO,EAAE,UAAU,CAAC,CAAC;IACrH,CAAC;IAEO,oBAAoB,CAAC,MAAe,EAAE,OAAyB;QAEnE,IAAI,MAAM,EAAE;YACR,OAAO,CAAC,OAAO,CAAC,CAAC,MAAsB,EAAE,EAAE;gBAEvC,MAAM,CAAC,OAAO,CAAC,CAAC,KAAa,EAAE,EAAE;oBAI7B,yCAAyC;oBACzC,0BAA0B;oBAC1B,mCAAmC;oBAEnC,eAAe;oBACf,0BAA0B;oBAC1B,4BAA4B;oBAC5B,gCAAgC;oBAChC,oDAAoD;oBACpD,uBAAuB;oBACvB,8BAA8B;oBAC9B,2FAA2F;oBAC3F,aAAa;oBACb,SAAS;oBACT,KAAK;oBAEL,KAAK,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;gBAGrC,CAAC,CAAC,CAAC;YAEP,CAAC,CAAC,CAAC;SACN;IACL,CAAC;IAEO,uBAAuB,CAAC,KAAgB,EAAE,SAA0C,EAAE,OAAyB;QAEnH,IAAI,SAAS,EAAE;YACX,SAAS,CAAC,OAAO,CAAC,CAAC,QAA2B,EAAE,EAAE;gBAE9C,IAAI,QAAQ,CAAC,MAAM,EAAE;oBACjB,IAAI,CAAC,oCAAoC,CAAC,KAAK,EAAE,QAAQ,EAAE,OAAO,CAAC,CAAC;iBACvE;qBACI;oBACD,IAAI,CAAC,4BAA4B,CAAC,KAAK,EAAE,QAAQ,EAAE,OAAO,CAAC,CAAC;iBAC/D;YACL,CAAC,CAAC,CAAC;SACN;IACL,CAAC;IAEO,oCAAoC,CAAC,KAAgB,EAAE,QAA2B,EAAE,OAAyB;QACjH,OAAO,CAAC,OAAO,CAAC,CAAC,MAAsB,EAAE,EAAE;YAEvC,IAAI,QAAQ,GAAG,mBAAmB,GAAG,QAAQ,CAAC,MAAM,GAAG,GAAG,GAAG,CAAE,KAAe,CAAC,OAAO,CAAC,GAAG,SAAS,GAAG,QAAQ,CAAC,SAAS,CAAC;YACzH,IAAI,SAAS,GAAG,IAAI,yBAAe,CAAC;gBAChC,MAAM,EAAE,gBAAM,CAAC,KAAK;gBACpB,SAAS,EAAE;oBACP,QAAQ;oBACR,QAAQ,GAAG,UAAU;iBACxB;gBACD,OAAO,EAAE,6BAAc,CAAC,gBAAgB;aAC3C,CAAC,CAAC;YAEH,MAAM,CAAC,IAAI,EAAE,oBAAoB,CAAC,SAAS,CAAC,CAAC;QAEjD,CAAC,CAAC,CAAC;IACP,CAAC;IAEO,4BAA4B,CAAC,KAAgB,EAAE,QAA2B,EAAE,OAAyB;QACzG,IAAI,KAAK,GAAW,oBAAK,CAAC,aAAa,CAAC,KAAK,EAAE,QAAQ,CAAC,SAAS,EAAE,QAAQ,CAAC,SAAS,CAAC,CAAC;QAEvF,OAAO,CAAC,OAAO,CAAC,CAAC,MAAsB,EAAE,EAAE;YACvC,KAAK,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAA;QAEpC,CAAC,CAAC,CAAC;IACP,CAAC;IAEO,SAAS,CAAC,KAAwB,EACtC,OAAiB,EACjB,OAAyB,EACzB,UAA4B;QAE5B,KAAK,CAAC,SAAS,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC,IAAmB,EAAE,EAAE;YAEpD,MAAM,QAAQ,GAAG,2BAAY,CAAC,cAAc,CAAC,IAAI,EAAE,IAAI,CAAC,mBAAmB,CAAC,SAAS,CAAC,CAAC;YAEvF,IAAI,CAAC,QAAQ,EAAE;gBACX,MAAM,IAAI,KAAK,CAAC,mBAAmB,CAAC,CAAC;aACxC;YACD,MAAM,UAAU,GAAG,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,IAAI,CAAC,EAAE,KAAK,QAAQ,CAAC,CAAC;YAE7D,IAAI,CAAC,UAAU,EAAE;gBACb,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YAED,qBAAM,CAAC,cAAc,CAAC,IAAI,EAAE,OAAO,EAAE,UAAU,EAAE,UAAU,CAAC,CAAC;QAEjE,CAAC,CAAC,CAAC;IACP,CAAC;IAEO,2BAA2B,CAAC,MAAe,EAAE,OAAyB;QAE1E,OAAO,CAAC,OAAO,CAAC,CAAC,MAAM,EAAE,EAAE;YACvB,MAAM,MAAM,GAAG,MAAM,CAAC,SAAS,CAAC,MAAM,CAAC,CAAC;QAE5C,CAAC,CAAC,CAAC;IAEP,CAAC;CAEJ;AAtKD,4DAsKC","sourcesContent":["import { IRestApi, TokenAuthorizer } from \"aws-cdk-lib/aws-apigateway\";\nimport { ITable, Table } from \"aws-cdk-lib/aws-dynamodb\";\nimport { NodejsFunction } from \"aws-cdk-lib/aws-lambda-nodejs\";\nimport { Effect, PolicyStatement } from \"aws-cdk-lib/aws-iam\";\nimport { Construct } from \"constructs\";\nimport { TsgDynamoTableRef, TsgLambdaProp } from \"../../config/types\";\nimport { TsgLambdaProps } from \"../../config/types/TsgLambdaProps\";\nimport { MicroserviceProps } from \"../../interfaces/MicroserviceProps\";\nimport { CreateAuthorizer } from \"../helpers/createAuthorizer\";\nimport { Routes } from \"../helpers/createRoutes\";\nimport { CreateLambda } from \"../lambda/createLambda\";\nimport { RemovalPolicy, Stack } from \"aws-cdk-lib\";\nimport { CreateDynamoDb } from \"../dynamodb/CreateDynamo\";\nimport { ISecret } from \"aws-cdk-lib/aws-secretsmanager\";\n\nimport { ServiceBundleConfig } from \"../../config/ServiceBundleConfig\";\n\nexport class CreateMicroServiceBundle {\n    \n    protected readonly requireDynamoTableRefs: boolean;\n    protected readonly requireAuthorizer: boolean;\n\n    constructor(private serviceBundleConfig: ServiceBundleConfig) {\n        \n        this.requireDynamoTableRefs = (this.serviceBundleConfig.props.RESOURCES.DYNAMO?.TABLE_REFS?.length ?? 0 > 0) ? true : false;\n        this.requireAuthorizer = (this.serviceBundleConfig.props.RESOURCES.AUTHORIZER) ? true : false;\n        this.onInit(this.serviceBundleConfig.scope);\n    }\n\n    private onInit(scope: Construct) {\n\n        \n        let authorizer: TokenAuthorizer|undefined = undefined;\n\n        // Create Authorizer\n        if (this.requireAuthorizer) {\n            authorizer = new CreateAuthorizer(scope, this.serviceBundleConfig.appConfig, this.serviceBundleConfig.props.RESOURCES.AUTHORIZER!).JwtAuthorizer;\n            authorizer._attachToApi(this.serviceBundleConfig.gatewayApi);   \n            authorizer.applyRemovalPolicy(RemovalPolicy.DESTROY);\n        }        \n\n        // Create Lambdas\n        const lambdaProp: TsgLambdaProps = {\n            scope,\n            prop: this.serviceBundleConfig.props,            \n            layers: this.serviceBundleConfig.layers,\n            appConfig: this.serviceBundleConfig.appConfig\n        };\n\n        const lambdas = new CreateLambda(lambdaProp, this.serviceBundleConfig.appConfig);\n\n        if (this.serviceBundleConfig.tables) {\n            this.AssignAccessToTables(this.serviceBundleConfig.tables, lambdas.Lambdas);\n        }        \n\n        // Allow access to existing tables\n        // if (this.requireDynamoTableRefs) {\n        //     this.AssignAccessToTableRefs(scope, this.props.RESOURCES.DYNAMO?.TABLE_REFS, lambdas.Lambdas);\n        // }\n\n        if (this.serviceBundleConfig.secretMgr) {\n            this.AssignAccessToSecretManager(this.serviceBundleConfig.secretMgr, lambdas.Lambdas);\n        }        \n\n        // lambdas.Lambdas.map((lambda) => {\n        //     lambda.metricErrors({                \n        //             label: `${lambda.functionName}-errors`, \n        //             period: Duration.minutes(3)           \n                \n        //     })\n        // });\n\n        this.AddRoutes(this.serviceBundleConfig.props, this.serviceBundleConfig.gatewayApi, lambdas.Lambdas, authorizer);\n    }\n\n    private AssignAccessToTables(tables: Table[], lambdas: NodejsFunction[]) {\n\n        if (tables) {\n            lambdas.forEach((lambda: NodejsFunction) => {\n            \n                tables.forEach((table: ITable) => {\n\n                \n\n                    //  This is a CDK bug: It doesn't provide\n                    //  access to the indexes.\n                    //table.grantReadWriteData(lambda);\n\n                    //  Workaround:\n                    // lambda.addToRolePolicy(\n                    //     new PolicyStatement({\n                    //         effect: Effect.ALLOW,\n                    //         actions: CreateDynamoDb.ReadWriteActions,\n                    //         resources: [\n                    //             table.tableArn,\n                    //             `${table.tableArn}/*`, // This is not recognized by cdk, but table is.  why?\n                    //         ],\n                    //     })\n                    // );\n\n                    table.grantReadWriteData(lambda);\n                    \n                    \n                });\n\n            });\n        }\n    }\n\n    private AssignAccessToTableRefs(scope: Construct, tableRefs: TsgDynamoTableRef[] | undefined, lambdas: NodejsFunction[]) {\n\n        if (tableRefs) {\n            tableRefs.forEach((tableRef: TsgDynamoTableRef) => {\n\n                if (tableRef.region) {\n                    this.AssignReadWriteAccessToTableInRegion(scope, tableRef, lambdas);\n                }\n                else {\n                    this.AssignReadWriteAccessToTable(scope, tableRef, lambdas);\n                }\n            });\n        }\n    }\n\n    private AssignReadWriteAccessToTableInRegion(scope: Construct, tableRef: TsgDynamoTableRef, lambdas: NodejsFunction[]) {\n        lambdas.forEach((lambda: NodejsFunction) => {\n\n            let tableArn = \"arn:aws:dynamodb:\" + tableRef.region + \":\" + ((scope as Stack).account) + \":table/\" + tableRef.tableName;\n            let statement = new PolicyStatement({\n                effect: Effect.ALLOW,\n                resources: [\n                    tableArn,\n                    tableArn + \"/index/*\",\n                ],\n                actions: CreateDynamoDb.ReadWriteActions,\n            });\n\n            lambda.role?.addToPrincipalPolicy(statement);\n            \n        });\n    }\n\n    private AssignReadWriteAccessToTable(scope: Construct, tableRef: TsgDynamoTableRef, lambdas: NodejsFunction[]) {\n        let table: ITable = Table.fromTableName(scope, tableRef.tableName, tableRef.tableName);\n\n        lambdas.forEach((lambda: NodejsFunction) => {\n            table.grantReadWriteData(lambda)\n            \n        });\n    }\n\n    private AddRoutes(props: MicroserviceProps, \n        gateway: IRestApi, \n        lambdas: NodejsFunction[], \n        authorizer?: TokenAuthorizer) {\n\n        props.RESOURCES.LAMBDA?.forEach((prop: TsgLambdaProp) => {\n\n            const lambdaId = CreateLambda.getIdForLambda(prop, this.serviceBundleConfig.appConfig);\n\n            if (!lambdaId) {\n                throw new Error(`Can't find lambda`);\n            }\n            const lambdaNode = lambdas.find(x => x.node.id === lambdaId);\n\n            if (!lambdaNode) {\n                throw new Error(\"Can't find the Lambda Integration\");                \n            }\n\n            Routes.createResource(prop, gateway, lambdaNode, authorizer);\n        \n        });\n    }\n\n    private AssignAccessToSecretManager(secret: ISecret, lambdas: NodejsFunction[]) {\n\n        lambdas.forEach((lambda) => {\n            const result = secret.grantRead(lambda);\n            \n        });\n        \n    }\n\n}"]}
|
|
@@ -1,81 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.CreateAuthorizer = void 0;
|
|
4
|
-
const aws_cdk_lib_1 = require("aws-cdk-lib");
|
|
5
|
-
const aws_apigateway_1 = require("aws-cdk-lib/aws-apigateway");
|
|
6
|
-
const aws_iam_1 = require("aws-cdk-lib/aws-iam");
|
|
7
|
-
const aws_lambda_nodejs_1 = require("aws-cdk-lib/aws-lambda-nodejs");
|
|
8
|
-
const path = require("path");
|
|
9
|
-
const baseResource_1 = require("../base/baseResource");
|
|
10
|
-
const createLambda_1 = require("../lambda/createLambda");
|
|
11
|
-
class CreateAuthorizer extends baseResource_1.BaseResource {
|
|
12
|
-
get JwtAuthorizer() {
|
|
13
|
-
return this.createdResources[0];
|
|
14
|
-
}
|
|
15
|
-
constructor(scope, props, authProps) {
|
|
16
|
-
super(scope, props);
|
|
17
|
-
this.authProps = authProps;
|
|
18
|
-
this.createdResources = this.createResource(scope);
|
|
19
|
-
if (this.createdResources) {
|
|
20
|
-
this.createOutput(scope, this.createdResources);
|
|
21
|
-
}
|
|
22
|
-
}
|
|
23
|
-
createResource(scope) {
|
|
24
|
-
return [this.createLambdaAuthorizer(scope, this.authProps)];
|
|
25
|
-
}
|
|
26
|
-
createLambdaAuthorizer(scope, lambdaConfig) {
|
|
27
|
-
//console.log("ENTER createLambdaAuthorizer");
|
|
28
|
-
const authorizerProps = this.createLambdaFunctionProps(lambdaConfig);
|
|
29
|
-
const lambdaId = createLambda_1.CreateLambda.getIdForLambda(lambdaConfig, this.config);
|
|
30
|
-
const lambda = new aws_lambda_nodejs_1.NodejsFunction(scope, lambdaId, authorizerProps);
|
|
31
|
-
lambda.grantInvoke(new aws_iam_1.ServicePrincipal('apigateway.amazonaws.com'));
|
|
32
|
-
if (lambdaConfig?.managedPolicies && lambdaConfig.managedPolicies.length > 0) {
|
|
33
|
-
this.assignManagedPolicies(lambda, lambdaConfig.managedPolicies);
|
|
34
|
-
}
|
|
35
|
-
const props = {
|
|
36
|
-
handler: lambda,
|
|
37
|
-
authorizerName: lambdaConfig.name,
|
|
38
|
-
resultsCacheTtl: aws_cdk_lib_1.Duration.seconds(0),
|
|
39
|
-
identitySource: aws_apigateway_1.IdentitySource.header('Authorization'),
|
|
40
|
-
};
|
|
41
|
-
const lambdaAuthorizer = new aws_apigateway_1.TokenAuthorizer(scope, `${lambdaConfig.name}-authorizer`, props);
|
|
42
|
-
return lambdaAuthorizer;
|
|
43
|
-
}
|
|
44
|
-
createOutput(scope, createdAssets) {
|
|
45
|
-
const entity = createdAssets[0];
|
|
46
|
-
// new CfnOutput(scope, `authorizer`, {
|
|
47
|
-
// value: (entity as TokenAuthorizer).authorizerArn
|
|
48
|
-
// });
|
|
49
|
-
}
|
|
50
|
-
createLambdaFunctionProps(prop) {
|
|
51
|
-
const lambdaProp = {
|
|
52
|
-
entry: path.join(prop.codePath),
|
|
53
|
-
functionName: prop.name,
|
|
54
|
-
handler: prop.handler,
|
|
55
|
-
runtime: prop.runtime || this.config.GLOBALS.stackRuntime,
|
|
56
|
-
timeout: prop.duration || aws_cdk_lib_1.Duration.minutes(2),
|
|
57
|
-
memorySize: prop.memory || 512,
|
|
58
|
-
environment: {
|
|
59
|
-
"VERBOSE_LOGGING": "true",
|
|
60
|
-
...prop.environment
|
|
61
|
-
},
|
|
62
|
-
bundling: {
|
|
63
|
-
minify: false,
|
|
64
|
-
target: 'es2020',
|
|
65
|
-
sourceMap: true,
|
|
66
|
-
sourceMapMode: aws_lambda_nodejs_1.SourceMapMode.INLINE,
|
|
67
|
-
environment: prop.environment || prop.environment,
|
|
68
|
-
},
|
|
69
|
-
};
|
|
70
|
-
return lambdaProp;
|
|
71
|
-
}
|
|
72
|
-
;
|
|
73
|
-
assignManagedPolicies(lambda, managedPolicyNames) {
|
|
74
|
-
managedPolicyNames.forEach((managedPolicyName) => {
|
|
75
|
-
let policy = aws_iam_1.ManagedPolicy.fromAwsManagedPolicyName(managedPolicyName);
|
|
76
|
-
lambda.role?.addManagedPolicy(policy);
|
|
77
|
-
});
|
|
78
|
-
}
|
|
79
|
-
}
|
|
80
|
-
exports.CreateAuthorizer = CreateAuthorizer;
|
|
81
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"createAuthorizer.js","sourceRoot":"","sources":["../../../src/resources/helpers/createAuthorizer.ts"],"names":[],"mappings":";;;AAAA,6CAAkD;AAClD,+DAAmG;AACnG,iDAAsE;AACtE,qEAAmG;AAEnG,6BAA6B;AAK7B,uDAAoD;AACpD,yDAAsD;AAEtD,MAAa,gBAAiB,SAAQ,2BAA6B;IAE/D,IAAI,aAAa;QACb,OAAO,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,CAAC;IACpC,CAAC;IAED,YAAY,KAAgB,EAAE,KAAgB,EAAY,SAAwB;QAE9E,KAAK,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;QAFkC,cAAS,GAAT,SAAS,CAAe;QAI9E,IAAI,CAAC,gBAAgB,GAAG,IAAI,CAAC,cAAc,CAAC,KAAK,CAAE,CAAC;QAEpD,IAAI,IAAI,CAAC,gBAAgB,EAAE;YACvB,IAAI,CAAC,YAAY,CAAkB,KAAK,EAAE,IAAI,CAAC,gBAAgB,CAAC,CAAC;SACpE;IAEL,CAAC;IAES,cAAc,CAAC,KAAgB;QACrC,OAAO,CAAC,IAAI,CAAC,sBAAsB,CAAC,KAAK,EAAE,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC;IAChE,CAAC;IAEO,sBAAsB,CAAC,KAAgB,EAAE,YAA2B;QACxE,8CAA8C;QAE9C,MAAM,eAAe,GAAG,IAAI,CAAC,yBAAyB,CAAC,YAAa,CAAC,CAAC;QAEtE,MAAM,QAAQ,GAAG,2BAAY,CAAC,cAAc,CAAC,YAAY,EAAE,IAAI,CAAC,MAAM,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,IAAI,kCAAc,CAAC,KAAK,EAAE,QAAQ,EAAE,eAAe,CAAC,CAAC;QAEpE,MAAM,CAAC,WAAW,CAAC,IAAI,0BAAgB,CAAC,0BAA0B,CAAC,CAAC,CAAC;QAErE,IAAI,YAAY,EAAE,eAAe,IAAI,YAAY,CAAC,eAAe,CAAC,MAAM,GAAG,CAAC,EAAE;YAC1E,IAAI,CAAC,qBAAqB,CAAC,MAAM,EAAE,YAAY,CAAC,eAAe,CAAC,CAAC;SACpE;QAED,MAAM,KAAK,GAAyB;YAChC,OAAO,EAAE,MAAM;YACf,cAAc,EAAE,YAAY,CAAC,IAAI;YACjC,eAAe,EAAE,sBAAQ,CAAC,OAAO,CAAC,CAAC,CAAC;YACpC,cAAc,EAAE,+BAAc,CAAC,MAAM,CAAC,eAAe,CAAC;SAEzD,CAAC;QAEF,MAAM,gBAAgB,GAAG,IAAI,gCAAe,CAAC,KAAK,EAAE,GAAG,YAAY,CAAC,IAAI,aAAa,EAAE,KAAK,CAAC,CAAC;QAE9F,OAAO,gBAAgB,CAAC;IAC5B,CAAC;IAES,YAAY,CAAI,KAAgB,EAAE,aAAkB;QAE1D,MAAM,MAAM,GAAG,aAAa,CAAC,CAAC,CAAC,CAAC;QAEhC,uCAAuC;QACvC,uDAAuD;QACvD,MAAM;IAEV,CAAC;IAEO,yBAAyB,CAAC,IAAmB;QAEjD,MAAM,UAAU,GAAwB;YACpC,KAAK,EAAE,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC;YAC/B,YAAY,EAAE,IAAI,CAAC,IAAI;YACvB,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,OAAO,EAAE,IAAI,CAAC,OAAO,IAAI,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,YAAY;YACzD,OAAO,EAAE,IAAI,CAAC,QAAQ,IAAI,sBAAQ,CAAC,OAAO,CAAC,CAAC,CAAC;YAC7C,UAAU,EAAE,IAAI,CAAC,MAAM,IAAI,GAAG;YAC9B,WAAW,EAAE;gBACT,iBAAiB,EAAE,MAAM;gBACzB,GAAG,IAAI,CAAC,WAAW;aACtB;YACD,QAAQ,EAAE;gBACN,MAAM,EAAE,KAAK;gBACb,MAAM,EAAE,QAAQ;gBAChB,SAAS,EAAE,IAAI;gBACf,aAAa,EAAE,iCAAa,CAAC,MAAM;gBACnC,WAAW,EAAE,IAAI,CAAC,WAAW,IAAI,IAAI,CAAC,WAAW;aACpD;SACJ,CAAA;QACD,OAAO,UAAU,CAAC;IACtB,CAAC;IAAA,CAAC;IAEM,qBAAqB,CAAC,MAAsB,EAAE,kBAA4B;QAE9E,kBAAkB,CAAC,OAAO,CAAC,CAAC,iBAAyB,EAAE,EAAE;YAErD,IAAI,MAAM,GAAG,uBAAa,CAAC,wBAAwB,CAAC,iBAAiB,CAAC,CAAC;YAEvE,MAAM,CAAC,IAAI,EAAE,gBAAgB,CAAC,MAAM,CAAC,CAAC;QAC1C,CAAC,CAAC,CAAC;IAEP,CAAC;CAEJ;AA9FD,4CA8FC","sourcesContent":["import { CfnOutput, Duration } from \"aws-cdk-lib\";\nimport { IdentitySource, TokenAuthorizer, TokenAuthorizerProps } from \"aws-cdk-lib/aws-apigateway\";\nimport { ManagedPolicy, ServicePrincipal } from \"aws-cdk-lib/aws-iam\";\nimport { NodejsFunction, NodejsFunctionProps, SourceMapMode } from \"aws-cdk-lib/aws-lambda-nodejs\";\nimport { Construct } from \"constructs\";\nimport * as path from 'path';\nimport { AppConfig } from \"../../config/AppConfig\";\n\nimport { TsgLambdaProp } from \"../../config/types\";\nimport { MicroserviceProps } from \"../../interfaces/MicroserviceProps\";\nimport { BaseResource } from \"../base/baseResource\";\nimport { CreateLambda } from \"../lambda/createLambda\";\n\nexport class CreateAuthorizer extends BaseResource<TokenAuthorizer> {\n\n    get JwtAuthorizer() {\n        return this.createdResources[0];\n    }\n\n    constructor(scope: Construct, props: AppConfig, protected authProps: TsgLambdaProp) {\n\n        super(scope, props);\n\n        this.createdResources = this.createResource(scope)!;\n\n        if (this.createdResources) {\n            this.createOutput<TokenAuthorizer>(scope, this.createdResources);\n        }\n\n    }\n\n    protected createResource(scope: Construct): TokenAuthorizer[] | null {\n        return [this.createLambdaAuthorizer(scope, this.authProps)];\n    }\n\n    private createLambdaAuthorizer(scope: Construct, lambdaConfig: TsgLambdaProp) {\n        //console.log(\"ENTER createLambdaAuthorizer\");\n\n        const authorizerProps = this.createLambdaFunctionProps(lambdaConfig!);\n\n        const lambdaId = CreateLambda.getIdForLambda(lambdaConfig, this.config);\n        const lambda = new NodejsFunction(scope, lambdaId, authorizerProps);\n\n        lambda.grantInvoke(new ServicePrincipal('apigateway.amazonaws.com'));\n\n        if (lambdaConfig?.managedPolicies && lambdaConfig.managedPolicies.length > 0) {\n            this.assignManagedPolicies(lambda, lambdaConfig.managedPolicies);\n        }\n\n        const props: TokenAuthorizerProps = {\n            handler: lambda,\n            authorizerName: lambdaConfig.name,\n            resultsCacheTtl: Duration.seconds(0), \n            identitySource: IdentitySource.header('Authorization'),\n            \n        };\n\n        const lambdaAuthorizer = new TokenAuthorizer(scope, `${lambdaConfig.name}-authorizer`, props);\n\n        return lambdaAuthorizer;\n    }\n\n    protected createOutput<T>(scope: Construct, createdAssets: T[]): void {\n\n        const entity = createdAssets[0];\n\n        // new CfnOutput(scope, `authorizer`, {\n        //     value: (entity as TokenAuthorizer).authorizerArn\n        // });\n\n    }\n\n    private createLambdaFunctionProps(prop: TsgLambdaProp) {       \n\n        const lambdaProp: NodejsFunctionProps = {\n            entry: path.join(prop.codePath),\n            functionName: prop.name,\n            handler: prop.handler,\n            runtime: prop.runtime || this.config.GLOBALS.stackRuntime,\n            timeout: prop.duration || Duration.minutes(2),\n            memorySize: prop.memory || 512,\n            environment: {\n                \"VERBOSE_LOGGING\": \"true\",                \n                ...prop.environment\n            },\n            bundling: {\n                minify: false,\n                target: 'es2020',\n                sourceMap: true,\n                sourceMapMode: SourceMapMode.INLINE,\n                environment: prop.environment || prop.environment,\n            },\n        }\n        return lambdaProp;\n    };\n\n    private assignManagedPolicies(lambda: NodejsFunction, managedPolicyNames: string[]) {\n\n        managedPolicyNames.forEach((managedPolicyName: string) => {\n\n            let policy = ManagedPolicy.fromAwsManagedPolicyName(managedPolicyName);\n\n            lambda.role?.addManagedPolicy(policy);\n        });\n\n    }\n\n}"]}
|
|
@@ -1,184 +0,0 @@
|
|
|
1
|
-
import { IRestApi, TokenAuthorizer } from "aws-cdk-lib/aws-apigateway";
|
|
2
|
-
import { ITable, Table } from "aws-cdk-lib/aws-dynamodb";
|
|
3
|
-
import { NodejsFunction } from "aws-cdk-lib/aws-lambda-nodejs";
|
|
4
|
-
import { Effect, PolicyStatement } from "aws-cdk-lib/aws-iam";
|
|
5
|
-
import { Construct } from "constructs";
|
|
6
|
-
import { TsgDynamoTableRef, TsgLambdaProp } from "../../config/types";
|
|
7
|
-
import { TsgLambdaProps } from "../../config/types/TsgLambdaProps";
|
|
8
|
-
import { MicroserviceProps } from "../../interfaces/MicroserviceProps";
|
|
9
|
-
import { CreateAuthorizer } from "../helpers/createAuthorizer";
|
|
10
|
-
import { Routes } from "../helpers/createRoutes";
|
|
11
|
-
import { CreateLambda } from "../lambda/createLambda";
|
|
12
|
-
import { RemovalPolicy, Stack } from "aws-cdk-lib";
|
|
13
|
-
import { CreateDynamoDb } from "../dynamodb/CreateDynamo";
|
|
14
|
-
import { ISecret } from "aws-cdk-lib/aws-secretsmanager";
|
|
15
|
-
|
|
16
|
-
import { ServiceBundleConfig } from "../../config/ServiceBundleConfig";
|
|
17
|
-
|
|
18
|
-
export class CreateMicroServiceBundle {
|
|
19
|
-
|
|
20
|
-
protected readonly requireDynamoTableRefs: boolean;
|
|
21
|
-
protected readonly requireAuthorizer: boolean;
|
|
22
|
-
|
|
23
|
-
constructor(private serviceBundleConfig: ServiceBundleConfig) {
|
|
24
|
-
|
|
25
|
-
this.requireDynamoTableRefs = (this.serviceBundleConfig.props.RESOURCES.DYNAMO?.TABLE_REFS?.length ?? 0 > 0) ? true : false;
|
|
26
|
-
this.requireAuthorizer = (this.serviceBundleConfig.props.RESOURCES.AUTHORIZER) ? true : false;
|
|
27
|
-
this.onInit(this.serviceBundleConfig.scope);
|
|
28
|
-
}
|
|
29
|
-
|
|
30
|
-
private onInit(scope: Construct) {
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
let authorizer: TokenAuthorizer|undefined = undefined;
|
|
34
|
-
|
|
35
|
-
// Create Authorizer
|
|
36
|
-
if (this.requireAuthorizer) {
|
|
37
|
-
authorizer = new CreateAuthorizer(scope, this.serviceBundleConfig.appConfig, this.serviceBundleConfig.props.RESOURCES.AUTHORIZER!).JwtAuthorizer;
|
|
38
|
-
authorizer._attachToApi(this.serviceBundleConfig.gatewayApi);
|
|
39
|
-
authorizer.applyRemovalPolicy(RemovalPolicy.DESTROY);
|
|
40
|
-
}
|
|
41
|
-
|
|
42
|
-
// Create Lambdas
|
|
43
|
-
const lambdaProp: TsgLambdaProps = {
|
|
44
|
-
scope,
|
|
45
|
-
prop: this.serviceBundleConfig.props,
|
|
46
|
-
layers: this.serviceBundleConfig.layers,
|
|
47
|
-
appConfig: this.serviceBundleConfig.appConfig
|
|
48
|
-
};
|
|
49
|
-
|
|
50
|
-
const lambdas = new CreateLambda(lambdaProp, this.serviceBundleConfig.appConfig);
|
|
51
|
-
|
|
52
|
-
if (this.serviceBundleConfig.tables) {
|
|
53
|
-
this.AssignAccessToTables(this.serviceBundleConfig.tables, lambdas.Lambdas);
|
|
54
|
-
}
|
|
55
|
-
|
|
56
|
-
// Allow access to existing tables
|
|
57
|
-
// if (this.requireDynamoTableRefs) {
|
|
58
|
-
// this.AssignAccessToTableRefs(scope, this.props.RESOURCES.DYNAMO?.TABLE_REFS, lambdas.Lambdas);
|
|
59
|
-
// }
|
|
60
|
-
|
|
61
|
-
if (this.serviceBundleConfig.secretMgr) {
|
|
62
|
-
this.AssignAccessToSecretManager(this.serviceBundleConfig.secretMgr, lambdas.Lambdas);
|
|
63
|
-
}
|
|
64
|
-
|
|
65
|
-
// lambdas.Lambdas.map((lambda) => {
|
|
66
|
-
// lambda.metricErrors({
|
|
67
|
-
// label: `${lambda.functionName}-errors`,
|
|
68
|
-
// period: Duration.minutes(3)
|
|
69
|
-
|
|
70
|
-
// })
|
|
71
|
-
// });
|
|
72
|
-
|
|
73
|
-
this.AddRoutes(this.serviceBundleConfig.props, this.serviceBundleConfig.gatewayApi, lambdas.Lambdas, authorizer);
|
|
74
|
-
}
|
|
75
|
-
|
|
76
|
-
private AssignAccessToTables(tables: Table[], lambdas: NodejsFunction[]) {
|
|
77
|
-
|
|
78
|
-
if (tables) {
|
|
79
|
-
lambdas.forEach((lambda: NodejsFunction) => {
|
|
80
|
-
|
|
81
|
-
tables.forEach((table: ITable) => {
|
|
82
|
-
|
|
83
|
-
|
|
84
|
-
|
|
85
|
-
// This is a CDK bug: It doesn't provide
|
|
86
|
-
// access to the indexes.
|
|
87
|
-
//table.grantReadWriteData(lambda);
|
|
88
|
-
|
|
89
|
-
// Workaround:
|
|
90
|
-
// lambda.addToRolePolicy(
|
|
91
|
-
// new PolicyStatement({
|
|
92
|
-
// effect: Effect.ALLOW,
|
|
93
|
-
// actions: CreateDynamoDb.ReadWriteActions,
|
|
94
|
-
// resources: [
|
|
95
|
-
// table.tableArn,
|
|
96
|
-
// `${table.tableArn}/*`, // This is not recognized by cdk, but table is. why?
|
|
97
|
-
// ],
|
|
98
|
-
// })
|
|
99
|
-
// );
|
|
100
|
-
|
|
101
|
-
table.grantReadWriteData(lambda);
|
|
102
|
-
|
|
103
|
-
|
|
104
|
-
});
|
|
105
|
-
|
|
106
|
-
});
|
|
107
|
-
}
|
|
108
|
-
}
|
|
109
|
-
|
|
110
|
-
private AssignAccessToTableRefs(scope: Construct, tableRefs: TsgDynamoTableRef[] | undefined, lambdas: NodejsFunction[]) {
|
|
111
|
-
|
|
112
|
-
if (tableRefs) {
|
|
113
|
-
tableRefs.forEach((tableRef: TsgDynamoTableRef) => {
|
|
114
|
-
|
|
115
|
-
if (tableRef.region) {
|
|
116
|
-
this.AssignReadWriteAccessToTableInRegion(scope, tableRef, lambdas);
|
|
117
|
-
}
|
|
118
|
-
else {
|
|
119
|
-
this.AssignReadWriteAccessToTable(scope, tableRef, lambdas);
|
|
120
|
-
}
|
|
121
|
-
});
|
|
122
|
-
}
|
|
123
|
-
}
|
|
124
|
-
|
|
125
|
-
private AssignReadWriteAccessToTableInRegion(scope: Construct, tableRef: TsgDynamoTableRef, lambdas: NodejsFunction[]) {
|
|
126
|
-
lambdas.forEach((lambda: NodejsFunction) => {
|
|
127
|
-
|
|
128
|
-
let tableArn = "arn:aws:dynamodb:" + tableRef.region + ":" + ((scope as Stack).account) + ":table/" + tableRef.tableName;
|
|
129
|
-
let statement = new PolicyStatement({
|
|
130
|
-
effect: Effect.ALLOW,
|
|
131
|
-
resources: [
|
|
132
|
-
tableArn,
|
|
133
|
-
tableArn + "/index/*",
|
|
134
|
-
],
|
|
135
|
-
actions: CreateDynamoDb.ReadWriteActions,
|
|
136
|
-
});
|
|
137
|
-
|
|
138
|
-
lambda.role?.addToPrincipalPolicy(statement);
|
|
139
|
-
|
|
140
|
-
});
|
|
141
|
-
}
|
|
142
|
-
|
|
143
|
-
private AssignReadWriteAccessToTable(scope: Construct, tableRef: TsgDynamoTableRef, lambdas: NodejsFunction[]) {
|
|
144
|
-
let table: ITable = Table.fromTableName(scope, tableRef.tableName, tableRef.tableName);
|
|
145
|
-
|
|
146
|
-
lambdas.forEach((lambda: NodejsFunction) => {
|
|
147
|
-
table.grantReadWriteData(lambda)
|
|
148
|
-
|
|
149
|
-
});
|
|
150
|
-
}
|
|
151
|
-
|
|
152
|
-
private AddRoutes(props: MicroserviceProps,
|
|
153
|
-
gateway: IRestApi,
|
|
154
|
-
lambdas: NodejsFunction[],
|
|
155
|
-
authorizer?: TokenAuthorizer) {
|
|
156
|
-
|
|
157
|
-
props.RESOURCES.LAMBDA?.forEach((prop: TsgLambdaProp) => {
|
|
158
|
-
|
|
159
|
-
const lambdaId = CreateLambda.getIdForLambda(prop, this.serviceBundleConfig.appConfig);
|
|
160
|
-
|
|
161
|
-
if (!lambdaId) {
|
|
162
|
-
throw new Error(`Can't find lambda`);
|
|
163
|
-
}
|
|
164
|
-
const lambdaNode = lambdas.find(x => x.node.id === lambdaId);
|
|
165
|
-
|
|
166
|
-
if (!lambdaNode) {
|
|
167
|
-
throw new Error("Can't find the Lambda Integration");
|
|
168
|
-
}
|
|
169
|
-
|
|
170
|
-
Routes.createResource(prop, gateway, lambdaNode, authorizer);
|
|
171
|
-
|
|
172
|
-
});
|
|
173
|
-
}
|
|
174
|
-
|
|
175
|
-
private AssignAccessToSecretManager(secret: ISecret, lambdas: NodejsFunction[]) {
|
|
176
|
-
|
|
177
|
-
lambdas.forEach((lambda) => {
|
|
178
|
-
const result = secret.grantRead(lambda);
|
|
179
|
-
|
|
180
|
-
});
|
|
181
|
-
|
|
182
|
-
}
|
|
183
|
-
|
|
184
|
-
}
|