aws-cdk-github-oidc 0.0.9 → 0.0.13

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/.jsii CHANGED
@@ -180,7 +180,15 @@
180
180
  "homepage": "https://github.com/aripalo/aws-cdk-github-oidc.git",
181
181
  "jsiiVersion": "1.41.0 (build a274beb)",
182
182
  "keywords": [
183
- "cdk"
183
+ "aws",
184
+ "aws-cdk",
185
+ "awscdk",
186
+ "cdk",
187
+ "github",
188
+ "github-actions",
189
+ "iam",
190
+ "oidc",
191
+ "openid-connect"
184
192
  ],
185
193
  "license": "Apache-2.0",
186
194
  "metadata": {
@@ -192,7 +200,7 @@
192
200
  },
193
201
  "name": "aws-cdk-github-oidc",
194
202
  "readme": {
195
- "markdown": "# AWS CDK Github OpenID Connect\n\n![cdk-support](https://img.shields.io/badge/cdk-%20typescript%20|%20python%20-informational \"TypeScript | Python\")\n\nAWS [CDK](https://aws.amazon.com/cdk/) constructs that define:\n- Github Actions as OpenID Connect Identity Provider into AWS IAM\n- IAM Roles that can be assumed by Github Actions workflows\n\nThese constructs allows you to harden your AWS deployment security by removing the need to create long-term access keys for Github Actions and instead use OpenID Connect to Authenticate your Github Action workflow with AWS IAM.\n\n## Background information\n\n![github-aws-oidc](/assets/github-aws-oidc.svg \"Github OIDC with AWS\")\n\n- [GitHub Actions: Secure cloud deployments with OpenID Connect](https://github.blog/changelog/2021-10-27-github-actions-secure-cloud-deployments-with-openid-connect/) on Github Changelog Blog.\n- [Security hardening your deployments](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments) on Github Docs.\n- [Assuming a role with `aws-actions/configure-aws-credentials`](https://github.com/aws-actions/configure-aws-credentials#assuming-a-role).\n- Shout-out to [Richard H. Boyd](https://twitter.com/rchrdbyd) for helping me to debug Github OIDC setup with AWS IAM and his [Deploying to AWS with Github Actions](https://www.githubuniverse.com/2021/session/692586/deploying-to-aws-with-github-actions)-talk.\n- Shout-out to [Aidan W Steele](https://twitter.com/__steele) and his blog post [AWS federation comes to GitHub Actions](https://awsteele.com/blog/2021/09/15/aws-federation-comes-to-github-actions.html) for being the original inspiration for this.\n\n\n<br/>\n\n## Getting started\n\n```shell\nnpm i -D aws-cdk-github-oidc\n```\n\n<br/>\n\n### OpenID Connect Identity Provider trust for AWS IAM\n\nTo create a new Github OIDC provider into AWS IAM:\n```ts\nimport { GithubActionsIdentityProvider } from 'aws-cdk-github-oidc';\n\nconst provider = new GithubActionsIdentityProvider(scope, 'GithubProvider');\n```\n\nIn the background this creates an OIDC provider trust configuration into AWS IAM with an [issuer URL of `https://token.actions.githubusercontent.com`](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services#adding-the-identity-provider-to-aws), audiences (client IDs) configured as `['sts.amazonaws.com']` (which matches the [`aws-actions/configure-aws-credentials`](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services#adding-the-identity-provider-to-aws) implementation) and the thumbprint as Github's `a031c46782e6e6c662c2c87c76da9aa62ccabd8e`\n\n<br/>\n\n### Retrieving a reference to an existing Github OIDC provider configuration\n\nRemember, **there can be only one (Github OIDC provider per AWS Account)**, so to retrieve a reference to existing Github OIDC provider use `fromAccount` static method:\n```ts\nimport { GithubActionsIdentityProvider } from 'aws-cdk-github-oidc';\n\nconst provider = GithubActionsIdentityProvider.fromAccount(scope, 'GithubProvider');\n```\n\n<br/>\n\n### Defining a role for Github Actions workflow to assume\n\n```ts\nimport { GithubActionsRole } from 'aws-cdk-github-oidc';\n\nconst uploadRole = new GithubActionsRole(scope, 'UploadRole', {\n provider: provider, // reference into the OIDC provider\n owner: 'octo-org', // your repository owner (organization or user) name\n repo: 'octo-repo', // your repository name (without the owner name)\n filter: 'ref:refs/tags/v*', // jwt sub suffix filter, defaults to '*'\n});\n\n// use it like any other role, for example grant S3 bucket write access:\nmyBucket.grantWrite(uploadRole);\n```\n\nYou may pass in any `iam.RoleProps` into the construct's props, except `assumedBy` which will be defined by this construct (CDK will fail if you do):\n```ts\nconst deployRole = new GithubActionsRole(scope, 'DeployRole', {\n provider: provider,\n owner: 'octo-org',\n repo: 'octo-repo',\n roleName: 'MyDeployRole',\n description: 'This role deploys stuff to AWS',\n maxSessionDuration: cdk.Duration.hours(2),\n});\n\n// You may also use various \"add*\" policy methods!\n// \"AdministratorAccess\" not really a good idea, just for an example here:\ndeployRole.addManagedPolicy(iam.ManagedPolicy.fromAwsManagedPolicyName('AdministratorAccess'));\n```\n\n<br/>\n\n#### Subject Filter\n\nBy default the value of `filter` property will be `'*'` which means any workflow (from given repository) from any branch, tag, environment or pull request can assume this role. To further stricten the OIDC trust policy on the role, you may adjust the subject filter as seen on the [examples in Github Docs](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect#configuring-the-oidc-trust-with-the-cloud); For example:\n\n| `filter` value | Descrition |\n| :----------------------------- | :--------------------------------------- |\n| `'ref:refs/tags/v*'` | Allow only tags with prefix of `v` |\n| `'ref:refs/heads/demo-branch'` | Allow only from branch `demo-branch` |\n| `'pull_request'` | Allow only from pull request |\n| `'environment:Production'` | Allow only from `Production` environment |\n\n<br/>\n\n### Github Actions Workflow\n\nTo actually utilize this in your Github Actions workflow, use [aws-actions/configure-aws-credentials](https://github.com/aws-actions/configure-aws-credentials) to [assume a role](https://github.com/aws-actions/configure-aws-credentials#assuming-a-role).\n\nAt the moment you must use the `master` version (until AWS releases a new tag):\n\n```yaml\njobs:\n deploy:\n name: Upload to Amazon S3\n runs-on: ubuntu-latest\n permissions:\n id-token: write # needed to interact with GitHub's OIDC Token endpoint.\n contents: read\n steps:\n - name: Checkout\n uses: actions/checkout@v2\n\n - name: Configure AWS credentials\n uses: aws-actions/configure-aws-credentials@master\n with:\n role-to-assume: arn:aws:iam::111111111111:role/MyUploadRole\n #role-session-name: MySessionName # Optional\n aws-region: us-east-1\n\n - name: Copy files to the test website with the AWS CLI\n run: |\n aws s3 sync . s3://my-s3-test-website-bucket\n```\n\n<br/>\n\n### Development Status\n\nThese constructs are fresh out from the oven, since [Github just announced](https://github.blog/changelog/2021-10-27-github-actions-secure-cloud-deployments-with-openid-connect/) the OpenID Connect feature as generally available. I've been playing around with the feature for few days, but the constructs themselves haven't yet been widely used.\n\nThese constructs will stay in `v0.x.x` for a while, to allow easier bug fixing & breaking changes _if absolutely needed_. Once bugs are fixed (if any), the constructs will be published with `v1` major version and will be marked as stable.\n\nCurrently only TypeScript and Python versions provided, but before going to stable, I'll probably others (supported by JSII) depending on the amount of work required - so no promises!\n"
203
+ "markdown": "# AWS CDK Github OpenID Connect\n\n![cdk-support](https://img.shields.io/badge/cdk-%20typescript%20|%20python%20-informational \"TypeScript | Python\")\n\nAWS [CDK](https://aws.amazon.com/cdk/) constructs that define:\n- Github Actions as OpenID Connect Identity Provider into AWS IAM\n- IAM Roles that can be assumed by Github Actions workflows\n\nThese constructs allows you to harden your AWS deployment security by removing the need to create long-term access keys for Github Actions and instead use OpenID Connect to Authenticate your Github Action workflow with AWS IAM.\n\n## Background information\n\n![github-aws-oidc](/assets/github-aws-oidc.svg \"Github OIDC with AWS\")\n\n- [GitHub Actions: Secure cloud deployments with OpenID Connect](https://github.blog/changelog/2021-10-27-github-actions-secure-cloud-deployments-with-openid-connect/) on Github Changelog Blog.\n- [Security hardening your deployments](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments) on Github Docs.\n- [Assuming a role with `aws-actions/configure-aws-credentials`](https://github.com/aws-actions/configure-aws-credentials#assuming-a-role).\n- Shout-out to [Richard H. Boyd](https://twitter.com/rchrdbyd) for helping me to debug Github OIDC setup with AWS IAM and his [Deploying to AWS with Github Actions](https://www.githubuniverse.com/2021/session/692586/deploying-to-aws-with-github-actions)-talk.\n- Shout-out to [Aidan W Steele](https://twitter.com/__steele) and his blog post [AWS federation comes to GitHub Actions](https://awsteele.com/blog/2021/09/15/aws-federation-comes-to-github-actions.html) for being the original inspiration for this.\n\n\n<br/>\n\n## Getting started\n\n```shell\nnpm i -D aws-cdk-github-oidc\n```\n\n<br/>\n\n### OpenID Connect Identity Provider trust for AWS IAM\n\nTo create a new Github OIDC provider configuration into AWS IAM:\n```ts\nimport { GithubActionsIdentityProvider } from 'aws-cdk-github-oidc';\n\nconst provider = new GithubActionsIdentityProvider(scope, 'GithubProvider');\n```\n\nIn the background this creates an OIDC provider trust configuration into AWS IAM with an [issuer URL of `https://token.actions.githubusercontent.com`](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services#adding-the-identity-provider-to-aws), audiences (client IDs) configured as `['sts.amazonaws.com']` (which matches the [`aws-actions/configure-aws-credentials`](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services#adding-the-identity-provider-to-aws) implementation) and the thumbprint as Github's `a031c46782e6e6c662c2c87c76da9aa62ccabd8e`\n\n<br/>\n\n### Retrieving a reference to an existing Github OIDC provider configuration\n\nRemember, **there can be only one (Github OIDC provider per AWS Account)**, so to retrieve a reference to existing Github OIDC provider use `fromAccount` static method:\n```ts\nimport { GithubActionsIdentityProvider } from 'aws-cdk-github-oidc';\n\nconst provider = GithubActionsIdentityProvider.fromAccount(scope, 'GithubProvider');\n```\n\n<br/>\n\n### Defining a role for Github Actions workflow to assume\n\n```ts\nimport { GithubActionsRole } from 'aws-cdk-github-oidc';\n\nconst uploadRole = new GithubActionsRole(scope, 'UploadRole', {\n provider: provider, // reference into the OIDC provider\n owner: 'octo-org', // your repository owner (organization or user) name\n repo: 'octo-repo', // your repository name (without the owner name)\n filter: 'ref:refs/tags/v*', // JWT sub suffix filter, defaults to '*'\n});\n\n// use it like any other role, for example grant S3 bucket write access:\nmyBucket.grantWrite(uploadRole);\n```\n\nYou may pass in any `iam.RoleProps` into the construct's props, except `assumedBy` which will be defined by this construct (CDK will fail if you do):\n```ts\nconst deployRole = new GithubActionsRole(scope, 'DeployRole', {\n provider: provider,\n owner: 'octo-org',\n repo: 'octo-repo',\n roleName: 'MyDeployRole',\n description: 'This role deploys stuff to AWS',\n maxSessionDuration: cdk.Duration.hours(2),\n});\n\n// You may also use various \"add*\" policy methods!\n// \"AdministratorAccess\" not really a good idea, just for an example here:\ndeployRole.addManagedPolicy(iam.ManagedPolicy.fromAwsManagedPolicyName('AdministratorAccess'));\n```\n\n<br/>\n\n#### Subject Filter\n\nBy default the value of `filter` property will be `'*'` which means any workflow (from given repository) from any branch, tag, environment or pull request can assume this role. To further stricten the OIDC trust policy on the role, you may adjust the subject filter as seen on the [examples in Github Docs](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect#configuring-the-oidc-trust-with-the-cloud); For example:\n\n| `filter` value | Descrition |\n| :----------------------------- | :--------------------------------------- |\n| `'ref:refs/tags/v*'` | Allow only tags with prefix of `v` |\n| `'ref:refs/heads/demo-branch'` | Allow only from branch `demo-branch` |\n| `'pull_request'` | Allow only from pull request |\n| `'environment:Production'` | Allow only from `Production` environment |\n\n<br/>\n\n### Github Actions Workflow\n\nTo actually utilize this in your Github Actions workflow, use [aws-actions/configure-aws-credentials](https://github.com/aws-actions/configure-aws-credentials) to [assume a role](https://github.com/aws-actions/configure-aws-credentials#assuming-a-role).\n\nAt the moment you must use the `master` version (until AWS releases a new tag):\n\n```yaml\njobs:\n deploy:\n name: Upload to Amazon S3\n runs-on: ubuntu-latest\n permissions:\n id-token: write # needed to interact with GitHub's OIDC Token endpoint.\n contents: read\n steps:\n - name: Checkout\n uses: actions/checkout@v2\n\n - name: Configure AWS credentials\n uses: aws-actions/configure-aws-credentials@master\n with:\n role-to-assume: arn:aws:iam::123456789012:role/MyUploadRole\n #role-session-name: MySessionName # Optional\n aws-region: us-east-1\n\n - name: Sync files to S3\n run: |\n aws s3 sync . s3://my-example-bucket\n```\n\n<br/>\n\n### Development Status\n\nThese constructs are fresh out from the oven, since [Github just announced](https://github.blog/changelog/2021-10-27-github-actions-secure-cloud-deployments-with-openid-connect/) the OpenID Connect feature as generally available. I've been playing around with the feature for some time, but the construct itself haven't yet been widely used.\n\nThese constructs will stay in `v0.x.x` for a while, to allow easier bug fixing & breaking changes _if absolutely needed_. Once bugs are fixed (if any), the constructs will be published with `v1` major version and will be marked as stable.\n\nCurrently only TypeScript and Python versions provided, but before going to stable, I'll probably others (supported by JSII) depending on the amount of work required - so no promises!\n"
196
204
  },
197
205
  "repository": {
198
206
  "type": "git",
@@ -710,6 +718,6 @@
710
718
  "symbolId": "src/iam-role-props:RoleProps"
711
719
  }
712
720
  },
713
- "version": "0.0.9",
714
- "fingerprint": "kymtSmuyi3tKWbvGr8wavzbM5Lz+3JBcjdONgUrE5G8="
721
+ "version": "0.0.13",
722
+ "fingerprint": "zr9NSnMbLyP1Jh02tl55ew2a6qrOdI8Y7Jk2LaS84Sk="
715
723
  }
package/README.md CHANGED
@@ -31,7 +31,7 @@ npm i -D aws-cdk-github-oidc
31
31
 
32
32
  ### OpenID Connect Identity Provider trust for AWS IAM
33
33
 
34
- To create a new Github OIDC provider into AWS IAM:
34
+ To create a new Github OIDC provider configuration into AWS IAM:
35
35
  ```ts
36
36
  import { GithubActionsIdentityProvider } from 'aws-cdk-github-oidc';
37
37
 
@@ -62,7 +62,7 @@ const uploadRole = new GithubActionsRole(scope, 'UploadRole', {
62
62
  provider: provider, // reference into the OIDC provider
63
63
  owner: 'octo-org', // your repository owner (organization or user) name
64
64
  repo: 'octo-repo', // your repository name (without the owner name)
65
- filter: 'ref:refs/tags/v*', // jwt sub suffix filter, defaults to '*'
65
+ filter: 'ref:refs/tags/v*', // JWT sub suffix filter, defaults to '*'
66
66
  });
67
67
 
68
68
  // use it like any other role, for example grant S3 bucket write access:
@@ -121,20 +121,20 @@ jobs:
121
121
  - name: Configure AWS credentials
122
122
  uses: aws-actions/configure-aws-credentials@master
123
123
  with:
124
- role-to-assume: arn:aws:iam::111111111111:role/MyUploadRole
124
+ role-to-assume: arn:aws:iam::123456789012:role/MyUploadRole
125
125
  #role-session-name: MySessionName # Optional
126
126
  aws-region: us-east-1
127
127
 
128
- - name: Copy files to the test website with the AWS CLI
128
+ - name: Sync files to S3
129
129
  run: |
130
- aws s3 sync . s3://my-s3-test-website-bucket
130
+ aws s3 sync . s3://my-example-bucket
131
131
  ```
132
132
 
133
133
  <br/>
134
134
 
135
135
  ### Development Status
136
136
 
137
- These constructs are fresh out from the oven, since [Github just announced](https://github.blog/changelog/2021-10-27-github-actions-secure-cloud-deployments-with-openid-connect/) the OpenID Connect feature as generally available. I've been playing around with the feature for few days, but the constructs themselves haven't yet been widely used.
137
+ These constructs are fresh out from the oven, since [Github just announced](https://github.blog/changelog/2021-10-27-github-actions-secure-cloud-deployments-with-openid-connect/) the OpenID Connect feature as generally available. I've been playing around with the feature for some time, but the construct itself haven't yet been widely used.
138
138
 
139
139
  These constructs will stay in `v0.x.x` for a while, to allow easier bug fixing & breaking changes _if absolutely needed_. Once bugs are fixed (if any), the constructs will be published with `v1` major version and will be marked as stable.
140
140
 
package/lib/provider.js CHANGED
@@ -56,7 +56,7 @@ class GithubActionsIdentityProvider extends iam.OpenIdConnectProvider {
56
56
  }
57
57
  exports.GithubActionsIdentityProvider = GithubActionsIdentityProvider;
58
58
  _a = JSII_RTTI_SYMBOL_1;
59
- GithubActionsIdentityProvider[_a] = { fqn: "aws-cdk-github-oidc.GithubActionsIdentityProvider", version: "0.0.9" };
59
+ GithubActionsIdentityProvider[_a] = { fqn: "aws-cdk-github-oidc.GithubActionsIdentityProvider", version: "0.0.13" };
60
60
  /**
61
61
  * @experimental
62
62
  */
package/lib/role.js CHANGED
@@ -103,5 +103,5 @@ class GithubActionsRole extends iam.Role {
103
103
  }
104
104
  exports.GithubActionsRole = GithubActionsRole;
105
105
  _a = JSII_RTTI_SYMBOL_1;
106
- GithubActionsRole[_a] = { fqn: "aws-cdk-github-oidc.GithubActionsRole", version: "0.0.9" };
106
+ GithubActionsRole[_a] = { fqn: "aws-cdk-github-oidc.GithubActionsRole", version: "0.0.13" };
107
107
  //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"role.js","sourceRoot":"","sources":["../src/role.ts"],"names":[],"mappings":";;;;;AAAA,wCAAwC;AACxC,qCAAqC;AAErC,iDAAiD;AACjD,yCAA2F;;;;;;;;;;;;;;;;;;;;AAsB3F,MAAa,iBAAkB,SAAQ,GAAG,CAAC,IAAI;;;;;;;;;;;;;;;;;;;;IAsC7C,YAAY,KAAoB,EAAE,EAAU,EAAE,KAA6B;QAEzE,MAAM,EAAE,QAAQ,EAAE,KAAK,EAAE,IAAI,EAAE,GAAG,KAAK,CAAC;QAExC,sBAAsB;QACtB,iBAAiB,CAAC,aAAa,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;QAC9C,iBAAiB,CAAC,YAAY,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;QAE5C,iBAAiB;QACjB,MAAM,OAAO,GAAG,iBAAiB,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC;QACvD,MAAM,SAAS,GAAG,iBAAiB,CAAC,gBAAgB,CAAC,KAAK,CAAC,CAAC;QAE5D,+BAA+B;QAC/B,KAAK,CAAC,KAAK,EAAE,EAAE,EAAE;YACf,GAAG,SAAS;YACZ,SAAS,EAAE,IAAI,GAAG,CAAC,oBAAoB,CAAC,QAAQ,CAAC,wBAAwB,EAAE;gBACzE,UAAU,EAAE;oBACV,oDAAoD;oBACpD,CAAC,GAAG,wCAA6B,CAAC,MAAM,MAAM,CAAC,EAAE,OAAO;iBACzD;gBACD,YAAY,EAAE;oBACZ,uEAAuE;oBACvE,0KAA0K;oBAC1K,CAAC,GAAG,wCAA6B,CAAC,MAAM,MAAM,CAAC,EAAE,mBAAmB;iBACrE;aACF,CAAC;SACH,CAAC,CAAC;IAEL,CAAC;IAhED;;;;OAIG;IACK,MAAM,CAAC,gBAAgB,CAAC,KAA6B;QAC3D,MAAM,YAAY,GAAQ,KAAK,CAAC;QAChC,OAAO,YAAY,CAAC,QAAQ,CAAC;QAC7B,OAAO,YAAY,CAAC,KAAK,CAAC;QAC1B,OAAO,YAAY,CAAC,IAAI,CAAC;QACzB,OAAO,YAAY,CAAC,MAAM,CAAC;QAC3B,OAAO,YAAY,CAAC;IACtB,CAAC;IAED,8DAA8D;IACtD,MAAM,CAAC,aAAa,CAAC,KAAoB,EAAE,KAAa;QAC9D,IAAI,sBAAmB,CAAC,IAAI,CAAC,KAAK,CAAC,KAAK,IAAI,EAAE;YAC5C,GAAG,CAAC,WAAW,CAAC,EAAE,CAAC,KAAK,CAAC,CAAC,QAAQ,CAAC,oCAAoC,KAAK,0KAA0K,CAAC,CAAC;SACzP;IACH,CAAC;IAED,4DAA4D;IACpD,MAAM,CAAC,YAAY,CAAC,KAAoB,EAAE,IAAY;QAC5D,IAAI,IAAI,KAAK,EAAE,EAAE;YACf,GAAG,CAAC,WAAW,CAAC,EAAE,CAAC,KAAK,CAAC,CAAC,QAAQ,CAAC,mCAAmC,IAAI,6BAA6B,CAAC,CAAC;SAC1G;IACH,CAAC;IAED,oDAAoD;IAC5C,MAAM,CAAC,aAAa,CAAC,KAA0B;QACrD,MAAM,EAAE,KAAK,EAAE,IAAI,EAAE,MAAM,GAAG,GAAG,EAAE,GAAG,KAAK,CAAC;QAC5C,OAAO,QAAQ,KAAK,IAAI,IAAI,IAAI,MAAM,EAAE,CAAC;IAC3C,CAAC;;AAlCH,8CAmEC","sourcesContent":["import * as iam from '@aws-cdk/aws-iam';\nimport * as cdk from '@aws-cdk/core';\nimport { RoleProps } from './iam-role-props';\nimport githubUsernameRegex from './owner-regexp';\nimport { GithubActionsIdentityProvider, IGithubActionsIdentityProvider } from './provider';\n\n                                                                                      \nexport interface GithubConfiguration {\n\n                                                                                                                                                                                                                                                                                                   \n  readonly provider: IGithubActionsIdentityProvider;\n\n                                                                                                \n  readonly owner: string;\n\n                                                                                              \n  readonly repo: string;\n\n                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            \n  readonly filter?: string;\n}\n\n                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      \nexport interface GithubActionsRoleProps extends GithubConfiguration, RoleProps {}\n\n                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 \nexport class GithubActionsRole extends iam.Role {\n\n  /**\n   * Extracts props given for the created IAM Role Construct.\n   * @param props for the GithubActionsRole\n   * @returns for the IAM Role\n   */\n  private static extractRoleProps(props: GithubActionsRoleProps): iam.RoleProps {\n    const extractProps = <any>props;\n    delete extractProps.provider;\n    delete extractProps.owner;\n    delete extractProps.repo;\n    delete extractProps.filter;\n    return extractProps;\n  }\n\n  /** Validates the Github owner (organization or user) name. */\n  private static validateOwner(scope: cdk.Construct, owner: string): void {\n    if (githubUsernameRegex.test(owner) !== true) {\n      cdk.Annotations.of(scope).addError(`Invalid Github Repository Owner \"${owner}\". Must only contain alphanumeric characters or hyphens, cannot have multiple consecutive hyphens, cannot begin or end with a hypen and maximum lenght is 39 characters.`);\n    }\n  }\n\n  /** Validates the Github repository name (without owner). */\n  private static validateRepo(scope: cdk.Construct, repo: string): void {\n    if (repo === '') {\n      cdk.Annotations.of(scope).addError(`Invalid Github Repository Name \"${repo}\". May not be empty string.`);\n    }\n  }\n\n  /** Formats the `sub` value used in trust policy. */\n  private static formatSubject(props: GithubConfiguration): string {\n    const { owner, repo, filter = '*' } = props;\n    return `repo:${owner}/${repo}:${filter}`;\n  }\n\n\n                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                     \n  constructor(scope: cdk.Construct, id: string, props: GithubActionsRoleProps) {\n\n    const { provider, owner, repo } = props;\n\n    // Perform validations\n    GithubActionsRole.validateOwner(scope, owner);\n    GithubActionsRole.validateRepo(scope, repo);\n\n    // Prepare values\n    const subject = GithubActionsRole.formatSubject(props);\n    const roleProps = GithubActionsRole.extractRoleProps(props);\n\n    // The actual IAM Role creation\n    super(scope, id, {\n      ...roleProps,\n      assumedBy: new iam.WebIdentityPrincipal(provider.openIdConnectProviderArn, {\n        StringLike: {\n          // Only allow specified subjects to assume this role\n          [`${GithubActionsIdentityProvider.issuer}:sub`]: subject,\n        },\n        StringEquals: {\n          // Audience is always sts.amazonaws.com with AWS official Github Action\n          // https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services#adding-the-identity-provider-to-aws\n          [`${GithubActionsIdentityProvider.issuer}:aud`]: 'sts.amazonaws.com',\n        },\n      }),\n    });\n\n  }\n}\n\n"]}
package/package.json CHANGED
@@ -71,11 +71,19 @@
71
71
  },
72
72
  "bundledDependencies": [],
73
73
  "keywords": [
74
- "cdk"
74
+ "aws",
75
+ "aws-cdk",
76
+ "awscdk",
77
+ "cdk",
78
+ "github",
79
+ "github-actions",
80
+ "iam",
81
+ "oidc",
82
+ "openid-connect"
75
83
  ],
76
84
  "main": "lib/index.js",
77
85
  "license": "Apache-2.0",
78
- "version": "0.0.9",
86
+ "version": "0.0.13",
79
87
  "jest": {
80
88
  "testMatch": [
81
89
  "**/__tests__/**/*.ts?(x)",