aws-cdk 2.1006.0 → 3.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (256) hide show
  1. package/README.md +1 -1
  2. package/THIRD_PARTY_LICENSES +104 -86
  3. package/build-info.json +2 -2
  4. package/db.json.gz +0 -0
  5. package/lib/api/aws-auth.d.ts +1 -0
  6. package/lib/api/{logs/index.js → aws-auth.js} +2 -3
  7. package/lib/api/bootstrap.d.ts +1 -0
  8. package/lib/api/bootstrap.js +18 -0
  9. package/lib/api/cloud-assembly.d.ts +1 -0
  10. package/lib/api/cloud-assembly.js +18 -0
  11. package/lib/api/cloudformation.d.ts +1 -0
  12. package/lib/api/cloudformation.js +18 -0
  13. package/lib/api/context.d.ts +1 -40
  14. package/lib/api/context.js +16 -80
  15. package/lib/api/deployments.d.ts +1 -0
  16. package/lib/api/deployments.js +18 -0
  17. package/lib/api/environment.d.ts +1 -0
  18. package/lib/api/environment.js +18 -0
  19. package/lib/api/garbage-collection.d.ts +1 -0
  20. package/lib/api/garbage-collection.js +18 -0
  21. package/lib/api/hotswap.d.ts +1 -0
  22. package/lib/api/hotswap.js +18 -0
  23. package/lib/api/index.d.ts +5 -1
  24. package/lib/api/index.js +6 -2
  25. package/lib/api/logs-monitor.d.ts +1 -0
  26. package/lib/api/logs-monitor.js +18 -0
  27. package/lib/api/notices.d.ts +1 -0
  28. package/lib/api/notices.js +18 -0
  29. package/lib/api/plugin.d.ts +1 -0
  30. package/lib/api/{resource-import/index.js → plugin.js} +2 -3
  31. package/lib/api/resource-import.d.ts +1 -0
  32. package/lib/api/resource-import.js +18 -0
  33. package/lib/api/rwlock.d.ts +1 -0
  34. package/lib/api/{garbage-collection/index.js → rwlock.js} +2 -2
  35. package/lib/api/settings.d.ts +1 -26
  36. package/lib/api/settings.js +16 -103
  37. package/lib/api/stack-events.d.ts +1 -0
  38. package/lib/api/stack-events.js +18 -0
  39. package/lib/api/tags.d.ts +1 -9
  40. package/lib/api/tags.js +16 -8
  41. package/lib/api/toolkit-info.d.ts +1 -52
  42. package/lib/api/toolkit-info.js +16 -152
  43. package/lib/api/tree.d.ts +1 -31
  44. package/lib/api/tree.js +16 -35
  45. package/lib/api/work-graph.d.ts +1 -0
  46. package/lib/api/work-graph.js +18 -0
  47. package/lib/api-private.d.ts +3 -0
  48. package/lib/api-private.js +22 -0
  49. package/lib/cli/cdk-toolkit.d.ts +20 -16
  50. package/lib/cli/cdk-toolkit.js +102 -37
  51. package/lib/cli/cli-config.js +2 -2
  52. package/lib/cli/cli.d.ts +1 -1
  53. package/lib/cli/cli.js +22 -19
  54. package/lib/cli/io-host/cli-io-host.js +2 -2
  55. package/lib/cli/pretty-print-error.js +3 -1
  56. package/lib/cli/util/npm.d.ts +4 -1
  57. package/lib/cli/util/npm.js +25 -13
  58. package/lib/cli/version.d.ts +1 -1
  59. package/lib/cli/version.js +21 -25
  60. package/lib/commands/context.js +3 -2
  61. package/lib/commands/diff.d.ts +1 -50
  62. package/lib/commands/diff.js +5 -213
  63. package/lib/commands/init/init.js +3 -2
  64. package/lib/commands/list-stacks.js +4 -4
  65. package/lib/context-providers/ami.d.ts +1 -13
  66. package/lib/context-providers/ami.js +16 -48
  67. package/lib/context-providers/availability-zones.d.ts +1 -13
  68. package/lib/context-providers/availability-zones.js +16 -25
  69. package/lib/context-providers/cc-api-provider.d.ts +1 -30
  70. package/lib/context-providers/cc-api-provider.js +16 -136
  71. package/lib/context-providers/endpoint-service-availability-zones.d.ts +1 -13
  72. package/lib/context-providers/endpoint-service-availability-zones.js +16 -31
  73. package/lib/context-providers/hosted-zones.d.ts +1 -12
  74. package/lib/context-providers/hosted-zones.js +16 -65
  75. package/lib/context-providers/index.d.ts +1 -44
  76. package/lib/context-providers/index.js +15 -126
  77. package/lib/context-providers/keys.d.ts +1 -13
  78. package/lib/context-providers/keys.js +16 -50
  79. package/lib/context-providers/load-balancers.d.ts +1 -20
  80. package/lib/context-providers/load-balancers.js +16 -154
  81. package/lib/context-providers/security-groups.d.ts +1 -9
  82. package/lib/context-providers/security-groups.js +16 -66
  83. package/lib/context-providers/ssm-parameters.d.ts +1 -25
  84. package/lib/context-providers/ssm-parameters.js +16 -57
  85. package/lib/context-providers/vpcs.d.ts +1 -13
  86. package/lib/context-providers/vpcs.js +16 -285
  87. package/lib/{api/cxapp → cxapp}/cloud-assembly.d.ts +3 -59
  88. package/lib/cxapp/cloud-assembly.js +108 -0
  89. package/lib/{api/cxapp → cxapp}/cloud-executable.d.ts +10 -3
  90. package/lib/cxapp/cloud-executable.js +92 -0
  91. package/lib/{api/cxapp → cxapp}/environments.d.ts +1 -2
  92. package/lib/{api/cxapp → cxapp}/environments.js +2 -2
  93. package/lib/cxapp/exec.d.ts +14 -0
  94. package/lib/cxapp/exec.js +157 -0
  95. package/lib/cxapp/index.d.ts +4 -0
  96. package/lib/{api/bootstrap → cxapp}/index.js +5 -3
  97. package/lib/index.js +134493 -125222
  98. package/lib/init-templates/.init-version.json +1 -1
  99. package/lib/init-templates/.recommended-feature-flags.json +3 -1
  100. package/lib/legacy-aws-auth.d.ts +74 -0
  101. package/lib/legacy-aws-auth.js +40 -0
  102. package/lib/legacy-exports-source.d.ts +13 -18
  103. package/lib/legacy-exports-source.js +42 -49
  104. package/lib/legacy-exports.d.ts +3 -6
  105. package/lib/legacy-exports.js +5 -5
  106. package/lib/legacy-types.d.ts +31 -0
  107. package/lib/legacy-types.js +3 -0
  108. package/package.json +19 -18
  109. package/lib/api/aws-auth/account-cache.d.ts +0 -36
  110. package/lib/api/aws-auth/account-cache.js +0 -99
  111. package/lib/api/aws-auth/awscli-compatible.d.ts +0 -42
  112. package/lib/api/aws-auth/awscli-compatible.js +0 -263
  113. package/lib/api/aws-auth/cached.d.ts +0 -11
  114. package/lib/api/aws-auth/cached.js +0 -26
  115. package/lib/api/aws-auth/credential-plugins.d.ts +0 -36
  116. package/lib/api/aws-auth/credential-plugins.js +0 -152
  117. package/lib/api/aws-auth/index.d.ts +0 -3
  118. package/lib/api/aws-auth/index.js +0 -20
  119. package/lib/api/aws-auth/provider-caching.d.ts +0 -13
  120. package/lib/api/aws-auth/provider-caching.js +0 -24
  121. package/lib/api/aws-auth/sdk-logger.d.ts +0 -69
  122. package/lib/api/aws-auth/sdk-logger.js +0 -124
  123. package/lib/api/aws-auth/sdk-provider.d.ts +0 -207
  124. package/lib/api/aws-auth/sdk-provider.js +0 -357
  125. package/lib/api/aws-auth/sdk.d.ts +0 -229
  126. package/lib/api/aws-auth/sdk.js +0 -373
  127. package/lib/api/aws-auth/tracing.d.ts +0 -11
  128. package/lib/api/aws-auth/tracing.js +0 -60
  129. package/lib/api/aws-auth/user-agent.d.ts +0 -7
  130. package/lib/api/aws-auth/user-agent.js +0 -20
  131. package/lib/api/aws-auth/util.d.ts +0 -6
  132. package/lib/api/aws-auth/util.js +0 -23
  133. package/lib/api/bootstrap/bootstrap-environment.d.ts +0 -35
  134. package/lib/api/bootstrap/bootstrap-environment.js +0 -321
  135. package/lib/api/bootstrap/bootstrap-props.d.ts +0 -130
  136. package/lib/api/bootstrap/bootstrap-props.js +0 -14
  137. package/lib/api/bootstrap/deploy-bootstrap.d.ts +0 -39
  138. package/lib/api/bootstrap/deploy-bootstrap.js +0 -141
  139. package/lib/api/bootstrap/index.d.ts +0 -2
  140. package/lib/api/bootstrap/legacy-template.d.ts +0 -2
  141. package/lib/api/bootstrap/legacy-template.js +0 -82
  142. package/lib/api/cloudformation/evaluate-cloudformation-template.d.ts +0 -85
  143. package/lib/api/cloudformation/evaluate-cloudformation-template.js +0 -440
  144. package/lib/api/cloudformation/index.d.ts +0 -4
  145. package/lib/api/cloudformation/index.js +0 -21
  146. package/lib/api/cloudformation/nested-stack-helpers.d.ts +0 -25
  147. package/lib/api/cloudformation/nested-stack-helpers.js +0 -86
  148. package/lib/api/cloudformation/stack-helpers.d.ts +0 -96
  149. package/lib/api/cloudformation/stack-helpers.js +0 -158
  150. package/lib/api/cloudformation/template-body-parameter.d.ts +0 -22
  151. package/lib/api/cloudformation/template-body-parameter.js +0 -104
  152. package/lib/api/cxapp/cloud-assembly.js +0 -304
  153. package/lib/api/cxapp/cloud-executable.js +0 -89
  154. package/lib/api/cxapp/exec.d.ts +0 -56
  155. package/lib/api/cxapp/exec.js +0 -272
  156. package/lib/api/deployments/asset-manifest-builder.d.ts +0 -8
  157. package/lib/api/deployments/asset-manifest-builder.js +0 -35
  158. package/lib/api/deployments/asset-publishing.d.ts +0 -60
  159. package/lib/api/deployments/asset-publishing.js +0 -141
  160. package/lib/api/deployments/assets.d.ts +0 -11
  161. package/lib/api/deployments/assets.js +0 -109
  162. package/lib/api/deployments/cfn-api.d.ts +0 -138
  163. package/lib/api/deployments/cfn-api.js +0 -438
  164. package/lib/api/deployments/checks.d.ts +0 -9
  165. package/lib/api/deployments/checks.js +0 -72
  166. package/lib/api/deployments/deploy-stack.d.ts +0 -155
  167. package/lib/api/deployments/deploy-stack.js +0 -478
  168. package/lib/api/deployments/deployment-method.d.ts +0 -24
  169. package/lib/api/deployments/deployment-method.js +0 -3
  170. package/lib/api/deployments/deployment-result.d.ts +0 -21
  171. package/lib/api/deployments/deployment-result.js +0 -10
  172. package/lib/api/deployments/deployments.d.ts +0 -296
  173. package/lib/api/deployments/deployments.js +0 -331
  174. package/lib/api/deployments/hotswap-deployments.d.ts +0 -17
  175. package/lib/api/deployments/hotswap-deployments.js +0 -441
  176. package/lib/api/deployments/index.d.ts +0 -4
  177. package/lib/api/deployments/index.js +0 -21
  178. package/lib/api/environment/environment-access.d.ts +0 -140
  179. package/lib/api/environment/environment-access.js +0 -202
  180. package/lib/api/environment/environment-resources.d.ts +0 -75
  181. package/lib/api/environment/environment-resources.js +0 -207
  182. package/lib/api/environment/index.d.ts +0 -3
  183. package/lib/api/environment/index.js +0 -20
  184. package/lib/api/environment/placeholders.d.ts +0 -10
  185. package/lib/api/environment/placeholders.js +0 -23
  186. package/lib/api/garbage-collection/garbage-collector.d.ts +0 -158
  187. package/lib/api/garbage-collection/garbage-collector.js +0 -599
  188. package/lib/api/garbage-collection/index.d.ts +0 -1
  189. package/lib/api/garbage-collection/progress-printer.d.ts +0 -23
  190. package/lib/api/garbage-collection/progress-printer.js +0 -70
  191. package/lib/api/garbage-collection/stack-refresh.d.ts +0 -49
  192. package/lib/api/garbage-collection/stack-refresh.js +0 -151
  193. package/lib/api/hotswap/appsync-mapping-templates.d.ts +0 -4
  194. package/lib/api/hotswap/appsync-mapping-templates.js +0 -162
  195. package/lib/api/hotswap/code-build-projects.d.ts +0 -4
  196. package/lib/api/hotswap/code-build-projects.js +0 -62
  197. package/lib/api/hotswap/common.d.ts +0 -89
  198. package/lib/api/hotswap/common.js +0 -128
  199. package/lib/api/hotswap/ecs-services.d.ts +0 -4
  200. package/lib/api/hotswap/ecs-services.js +0 -159
  201. package/lib/api/hotswap/lambda-functions.d.ts +0 -4
  202. package/lib/api/hotswap/lambda-functions.js +0 -297
  203. package/lib/api/hotswap/s3-bucket-deployments.d.ts +0 -5
  204. package/lib/api/hotswap/s3-bucket-deployments.js +0 -117
  205. package/lib/api/hotswap/stepfunctions-state-machines.d.ts +0 -4
  206. package/lib/api/hotswap/stepfunctions-state-machines.js +0 -48
  207. package/lib/api/logs/find-cloudwatch-logs.d.ts +0 -25
  208. package/lib/api/logs/find-cloudwatch-logs.js +0 -95
  209. package/lib/api/logs/index.d.ts +0 -2
  210. package/lib/api/logs/logs-monitor.d.ts +0 -76
  211. package/lib/api/logs/logs-monitor.js +0 -187
  212. package/lib/api/plugin/context-provider-plugin.d.ts +0 -6
  213. package/lib/api/plugin/context-provider-plugin.js +0 -7
  214. package/lib/api/plugin/index.d.ts +0 -3
  215. package/lib/api/plugin/index.js +0 -20
  216. package/lib/api/plugin/mode.d.ts +0 -4
  217. package/lib/api/plugin/mode.js +0 -9
  218. package/lib/api/plugin/plugin.d.ts +0 -63
  219. package/lib/api/plugin/plugin.js +0 -102
  220. package/lib/api/resource-import/importer.d.ts +0 -220
  221. package/lib/api/resource-import/importer.js +0 -331
  222. package/lib/api/resource-import/index.d.ts +0 -2
  223. package/lib/api/resource-import/migrator.d.ts +0 -26
  224. package/lib/api/resource-import/migrator.js +0 -71
  225. package/lib/api/stack-events/index.d.ts +0 -3
  226. package/lib/api/stack-events/index.js +0 -20
  227. package/lib/api/stack-events/stack-activity-monitor.d.ts +0 -100
  228. package/lib/api/stack-events/stack-activity-monitor.js +0 -142
  229. package/lib/api/stack-events/stack-event-poller.d.ts +0 -69
  230. package/lib/api/stack-events/stack-event-poller.js +0 -128
  231. package/lib/api/stack-events/stack-progress-monitor.d.ts +0 -48
  232. package/lib/api/stack-events/stack-progress-monitor.js +0 -94
  233. package/lib/api/stack-events/stack-status.d.ts +0 -42
  234. package/lib/api/stack-events/stack-status.js +0 -88
  235. package/lib/api/util/rwlock.d.ts +0 -65
  236. package/lib/api/util/rwlock.js +0 -179
  237. package/lib/api/work-graph/index.d.ts +0 -3
  238. package/lib/api/work-graph/index.js +0 -20
  239. package/lib/api/work-graph/work-graph-builder.d.ts +0 -34
  240. package/lib/api/work-graph/work-graph-builder.js +0 -168
  241. package/lib/api/work-graph/work-graph-types.d.ts +0 -50
  242. package/lib/api/work-graph/work-graph-types.js +0 -13
  243. package/lib/api/work-graph/work-graph.d.ts +0 -72
  244. package/lib/api/work-graph/work-graph.js +0 -346
  245. package/lib/cli/activity-printer/base.d.ts +0 -50
  246. package/lib/cli/activity-printer/base.js +0 -114
  247. package/lib/cli/activity-printer/current.d.ts +0 -26
  248. package/lib/cli/activity-printer/current.js +0 -118
  249. package/lib/cli/activity-printer/display.d.ts +0 -13
  250. package/lib/cli/activity-printer/display.js +0 -80
  251. package/lib/cli/activity-printer/history.d.ts +0 -32
  252. package/lib/cli/activity-printer/history.js +0 -108
  253. package/lib/cli/activity-printer/index.d.ts +0 -3
  254. package/lib/cli/activity-printer/index.js +0 -20
  255. package/lib/notices.d.ts +0 -203
  256. package/lib/notices.js +0 -411
@@ -1,7 +0,0 @@
1
- /**
2
- * Find the package.json from the main toolkit.
3
- *
4
- * If we can't read it for some reason, try to do something reasonable anyway.
5
- * Fall back to argv[1], or a standard string if that is undefined for some reason.
6
- */
7
- export declare function defaultCliUserAgent(): string;
@@ -1,20 +0,0 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.defaultCliUserAgent = defaultCliUserAgent;
4
- const path = require("path");
5
- const util_1 = require("./util");
6
- const util_2 = require("../../util");
7
- /**
8
- * Find the package.json from the main toolkit.
9
- *
10
- * If we can't read it for some reason, try to do something reasonable anyway.
11
- * Fall back to argv[1], or a standard string if that is undefined for some reason.
12
- */
13
- function defaultCliUserAgent() {
14
- const root = (0, util_2.bundledPackageRootDir)(__dirname, false);
15
- const pkg = JSON.parse((root ? (0, util_1.readIfPossible)(path.join(root, 'package.json')) : undefined) ?? '{}');
16
- const name = pkg.name ?? path.basename(process.argv[1] ?? 'cdk-cli');
17
- const version = pkg.version ?? '<unknown>';
18
- return `${name}/${version}`;
19
- }
20
- //# sourceMappingURL=data:application/json;base64,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
@@ -1,6 +0,0 @@
1
- /**
2
- * Read a file if it exists, or return undefined
3
- *
4
- * Not async because it is used in the constructor
5
- */
6
- export declare function readIfPossible(filename: string): string | undefined;
@@ -1,23 +0,0 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.readIfPossible = readIfPossible;
4
- const fs = require("fs-extra");
5
- const logging_1 = require("../../logging");
6
- /**
7
- * Read a file if it exists, or return undefined
8
- *
9
- * Not async because it is used in the constructor
10
- */
11
- function readIfPossible(filename) {
12
- try {
13
- if (!fs.pathExistsSync(filename)) {
14
- return undefined;
15
- }
16
- return fs.readFileSync(filename, { encoding: 'utf-8' });
17
- }
18
- catch (e) {
19
- (0, logging_1.debug)(e);
20
- return undefined;
21
- }
22
- }
23
- //# sourceMappingURL=data:application/json;base64,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
@@ -1,35 +0,0 @@
1
- import type * as cxapi from '@aws-cdk/cx-api';
2
- import type { BootstrapEnvironmentOptions } from './bootstrap-props';
3
- import { type IoHelper } from '../../../../@aws-cdk/tmp-toolkit-helpers/src/api/io/private';
4
- import type { SdkProvider } from '../aws-auth';
5
- import type { SuccessfulDeployStackResult } from '../deployments';
6
- export type BootstrapSource = {
7
- source: 'legacy';
8
- } | {
9
- source: 'default';
10
- } | {
11
- source: 'custom';
12
- templateFile: string;
13
- };
14
- export declare class Bootstrapper {
15
- private readonly source;
16
- private readonly ioHelper;
17
- constructor(source: BootstrapSource | undefined, ioHelper: IoHelper);
18
- bootstrapEnvironment(environment: cxapi.Environment, sdkProvider: SdkProvider, options?: BootstrapEnvironmentOptions): Promise<SuccessfulDeployStackResult>;
19
- showTemplate(json: boolean): Promise<void>;
20
- /**
21
- * Deploy legacy bootstrap stack
22
- *
23
- */
24
- private legacyBootstrap;
25
- /**
26
- * Deploy CI/CD-ready bootstrap stack from template
27
- *
28
- */
29
- private modernBootstrap;
30
- private getPolicyName;
31
- private getExamplePermissionsBoundary;
32
- private validatePolicyName;
33
- private customBootstrap;
34
- private loadTemplate;
35
- }
@@ -1,321 +0,0 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.Bootstrapper = void 0;
4
- const path = require("path");
5
- const deploy_bootstrap_1 = require("./deploy-bootstrap");
6
- const legacy_template_1 = require("./legacy-template");
7
- const api_1 = require("../../../../@aws-cdk/tmp-toolkit-helpers/src/api");
8
- const private_1 = require("../../../../@aws-cdk/tmp-toolkit-helpers/src/api/io/private");
9
- const util_1 = require("../../util");
10
- const mode_1 = require("../plugin/mode");
11
- const toolkit_info_1 = require("../toolkit-info");
12
- class Bootstrapper {
13
- constructor(source = { source: 'default' }, ioHelper) {
14
- this.source = source;
15
- this.ioHelper = ioHelper;
16
- }
17
- bootstrapEnvironment(environment, sdkProvider, options = {}) {
18
- switch (this.source.source) {
19
- case 'legacy':
20
- return this.legacyBootstrap(environment, sdkProvider, options);
21
- case 'default':
22
- return this.modernBootstrap(environment, sdkProvider, options);
23
- case 'custom':
24
- return this.customBootstrap(environment, sdkProvider, options);
25
- }
26
- }
27
- async showTemplate(json) {
28
- const template = await this.loadTemplate();
29
- process.stdout.write(`${(0, util_1.serializeStructure)(template, json)}\n`);
30
- }
31
- /**
32
- * Deploy legacy bootstrap stack
33
- *
34
- */
35
- async legacyBootstrap(environment, sdkProvider, options = {}) {
36
- const params = options.parameters ?? {};
37
- if (params.trustedAccounts?.length) {
38
- throw new api_1.ToolkitError('--trust can only be passed for the modern bootstrap experience.');
39
- }
40
- if (params.cloudFormationExecutionPolicies?.length) {
41
- throw new api_1.ToolkitError('--cloudformation-execution-policies can only be passed for the modern bootstrap experience.');
42
- }
43
- if (params.createCustomerMasterKey !== undefined) {
44
- throw new api_1.ToolkitError('--bootstrap-customer-key can only be passed for the modern bootstrap experience.');
45
- }
46
- if (params.qualifier) {
47
- throw new api_1.ToolkitError('--qualifier can only be passed for the modern bootstrap experience.');
48
- }
49
- const toolkitStackName = options.toolkitStackName ?? toolkit_info_1.DEFAULT_TOOLKIT_STACK_NAME;
50
- const current = await deploy_bootstrap_1.BootstrapStack.lookup(sdkProvider, environment, toolkitStackName, this.ioHelper);
51
- return current.update(await this.loadTemplate(params), {}, {
52
- ...options,
53
- terminationProtection: options.terminationProtection ?? current.terminationProtection,
54
- });
55
- }
56
- /**
57
- * Deploy CI/CD-ready bootstrap stack from template
58
- *
59
- */
60
- async modernBootstrap(environment, sdkProvider, options = {}) {
61
- const params = options.parameters ?? {};
62
- const bootstrapTemplate = await this.loadTemplate();
63
- const toolkitStackName = options.toolkitStackName ?? toolkit_info_1.DEFAULT_TOOLKIT_STACK_NAME;
64
- const current = await deploy_bootstrap_1.BootstrapStack.lookup(sdkProvider, environment, toolkitStackName, this.ioHelper);
65
- const partition = await current.partition();
66
- if (params.createCustomerMasterKey !== undefined && params.kmsKeyId) {
67
- throw new api_1.ToolkitError("You cannot pass '--bootstrap-kms-key-id' and '--bootstrap-customer-key' together. Specify one or the other");
68
- }
69
- // If people re-bootstrap, existing parameter values are reused so that people don't accidentally change the configuration
70
- // on their bootstrap stack (this happens automatically in deployStack). However, to do proper validation on the
71
- // combined arguments (such that if --trust has been given, --cloudformation-execution-policies is necessary as well)
72
- // we need to take this parameter reuse into account.
73
- //
74
- // Ideally we'd do this inside the template, but the `Rules` section of CFN
75
- // templates doesn't seem to be able to express the conditions that we need
76
- // (can't use Fn::Join or reference Conditions) so we do it here instead.
77
- const allTrusted = new Set([
78
- ...params.trustedAccounts ?? [],
79
- ...params.trustedAccountsForLookup ?? [],
80
- ]);
81
- const invalid = intersection(allTrusted, new Set(params.untrustedAccounts));
82
- if (invalid.size > 0) {
83
- throw new api_1.ToolkitError(`Accounts cannot be both trusted and untrusted. Found: ${[...invalid].join(',')}`);
84
- }
85
- const removeUntrusted = (accounts) => accounts.filter(acc => !params.untrustedAccounts?.map(String).includes(String(acc)));
86
- const trustedAccounts = removeUntrusted(params.trustedAccounts ?? splitCfnArray(current.parameters.TrustedAccounts));
87
- await this.ioHelper.notify(private_1.IO.DEFAULT_TOOLKIT_INFO.msg(`Trusted accounts for deployment: ${trustedAccounts.length > 0 ? trustedAccounts.join(', ') : '(none)'}`));
88
- const trustedAccountsForLookup = removeUntrusted(params.trustedAccountsForLookup ?? splitCfnArray(current.parameters.TrustedAccountsForLookup));
89
- await this.ioHelper.notify(private_1.IO.DEFAULT_TOOLKIT_INFO.msg(`Trusted accounts for lookup: ${trustedAccountsForLookup.length > 0 ? trustedAccountsForLookup.join(', ') : '(none)'}`));
90
- const cloudFormationExecutionPolicies = params.cloudFormationExecutionPolicies ?? splitCfnArray(current.parameters.CloudFormationExecutionPolicies);
91
- if (trustedAccounts.length === 0 && cloudFormationExecutionPolicies.length === 0) {
92
- // For self-trust it's okay to default to AdministratorAccess, and it improves the usability of bootstrapping a lot.
93
- //
94
- // We don't actually make the implicitly policy a physical parameter. The template will infer it instead,
95
- // we simply do the UI advertising that behavior here.
96
- //
97
- // If we DID make it an explicit parameter, we wouldn't be able to tell the difference between whether
98
- // we inferred it or whether the user told us, and the sequence:
99
- //
100
- // $ cdk bootstrap
101
- // $ cdk bootstrap --trust 1234
102
- //
103
- // Would leave AdministratorAccess policies with a trust relationship, without the user explicitly
104
- // approving the trust policy.
105
- const implicitPolicy = `arn:${partition}:iam::aws:policy/AdministratorAccess`;
106
- await this.ioHelper.notify(private_1.IO.DEFAULT_TOOLKIT_WARN.msg(`Using default execution policy of '${implicitPolicy}'. Pass '--cloudformation-execution-policies' to customize.`));
107
- }
108
- else if (cloudFormationExecutionPolicies.length === 0) {
109
- throw new api_1.ToolkitError(`Please pass \'--cloudformation-execution-policies\' when using \'--trust\' to specify deployment permissions. Try a managed policy of the form \'arn:${partition}:iam::aws:policy/<PolicyName>\'.`);
110
- }
111
- else {
112
- // Remind people what the current settings are
113
- await this.ioHelper.notify(private_1.IO.DEFAULT_TOOLKIT_INFO.msg(`Execution policies: ${cloudFormationExecutionPolicies.join(', ')}`));
114
- }
115
- // * If an ARN is given, that ARN. Otherwise:
116
- // * '-' if customerKey = false
117
- // * '' if customerKey = true
118
- // * if customerKey is also not given
119
- // * undefined if we already had a value in place (reusing what we had)
120
- // * '-' if this is the first time we're deploying this stack (or upgrading from old to new bootstrap)
121
- const currentKmsKeyId = current.parameters.FileAssetsBucketKmsKeyId;
122
- const kmsKeyId = params.kmsKeyId ??
123
- (params.createCustomerMasterKey === true
124
- ? CREATE_NEW_KEY
125
- : params.createCustomerMasterKey === false || currentKmsKeyId === undefined
126
- ? USE_AWS_MANAGED_KEY
127
- : undefined);
128
- /* A permissions boundary can be provided via:
129
- * - the flag indicating the example one should be used
130
- * - the name indicating the custom permissions boundary to be used
131
- * Re-bootstrapping will NOT be blocked by either tightening or relaxing the permissions' boundary.
132
- */
133
- // InputPermissionsBoundary is an `any` type and if it is not defined it
134
- // appears as an empty string ''. We need to force it to evaluate an empty string
135
- // as undefined
136
- const currentPermissionsBoundary = current.parameters.InputPermissionsBoundary || undefined;
137
- const inputPolicyName = params.examplePermissionsBoundary
138
- ? CDK_BOOTSTRAP_PERMISSIONS_BOUNDARY
139
- : params.customPermissionsBoundary;
140
- let policyName;
141
- if (inputPolicyName) {
142
- // If the example policy is not already in place, it must be created.
143
- const sdk = (await sdkProvider.forEnvironment(environment, mode_1.Mode.ForWriting)).sdk;
144
- policyName = await this.getPolicyName(environment, sdk, inputPolicyName, partition, params);
145
- }
146
- if (currentPermissionsBoundary !== policyName) {
147
- if (!currentPermissionsBoundary) {
148
- await this.ioHelper.notify(private_1.IO.DEFAULT_TOOLKIT_WARN.msg(`Adding new permissions boundary ${policyName}`));
149
- }
150
- else if (!policyName) {
151
- await this.ioHelper.notify(private_1.IO.DEFAULT_TOOLKIT_WARN.msg(`Removing existing permissions boundary ${currentPermissionsBoundary}`));
152
- }
153
- else {
154
- await this.ioHelper.notify(private_1.IO.DEFAULT_TOOLKIT_WARN.msg(`Changing permissions boundary from ${currentPermissionsBoundary} to ${policyName}`));
155
- }
156
- }
157
- return current.update(bootstrapTemplate, {
158
- FileAssetsBucketName: params.bucketName,
159
- FileAssetsBucketKmsKeyId: kmsKeyId,
160
- // Empty array becomes empty string
161
- TrustedAccounts: trustedAccounts.join(','),
162
- TrustedAccountsForLookup: trustedAccountsForLookup.join(','),
163
- CloudFormationExecutionPolicies: cloudFormationExecutionPolicies.join(','),
164
- Qualifier: params.qualifier,
165
- PublicAccessBlockConfiguration: params.publicAccessBlockConfiguration || params.publicAccessBlockConfiguration === undefined
166
- ? 'true'
167
- : 'false',
168
- InputPermissionsBoundary: policyName,
169
- }, {
170
- ...options,
171
- terminationProtection: options.terminationProtection ?? current.terminationProtection,
172
- });
173
- }
174
- async getPolicyName(environment, sdk, permissionsBoundary, partition, params) {
175
- if (permissionsBoundary !== CDK_BOOTSTRAP_PERMISSIONS_BOUNDARY) {
176
- this.validatePolicyName(permissionsBoundary);
177
- return Promise.resolve(permissionsBoundary);
178
- }
179
- // if no Qualifier is supplied, resort to the default one
180
- const arn = await this.getExamplePermissionsBoundary(params.qualifier ?? 'hnb659fds', partition, environment.account, sdk);
181
- const policyName = arn.split('/').pop();
182
- if (!policyName) {
183
- throw new api_1.ToolkitError('Could not retrieve the example permission boundary!');
184
- }
185
- return Promise.resolve(policyName);
186
- }
187
- async getExamplePermissionsBoundary(qualifier, partition, account, sdk) {
188
- const iam = sdk.iam();
189
- let policyName = `cdk-${qualifier}-permissions-boundary`;
190
- const arn = `arn:${partition}:iam::${account}:policy/${policyName}`;
191
- try {
192
- let getPolicyResp = await iam.getPolicy({ PolicyArn: arn });
193
- if (getPolicyResp.Policy) {
194
- return arn;
195
- }
196
- }
197
- catch (e) {
198
- // https://docs.aws.amazon.com/IAM/latest/APIReference/API_GetPolicy.html#API_GetPolicy_Errors
199
- if (e.name === 'NoSuchEntity') {
200
- // noop, proceed with creating the policy
201
- }
202
- else {
203
- throw e;
204
- }
205
- }
206
- const policyDoc = {
207
- Version: '2012-10-17',
208
- Statement: [
209
- {
210
- Action: ['*'],
211
- Resource: '*',
212
- Effect: 'Allow',
213
- Sid: 'ExplicitAllowAll',
214
- },
215
- {
216
- Condition: {
217
- StringEquals: {
218
- 'iam:PermissionsBoundary': `arn:${partition}:iam::${account}:policy/cdk-${qualifier}-permissions-boundary`,
219
- },
220
- },
221
- Action: [
222
- 'iam:CreateUser',
223
- 'iam:CreateRole',
224
- 'iam:PutRolePermissionsBoundary',
225
- 'iam:PutUserPermissionsBoundary',
226
- ],
227
- Resource: '*',
228
- Effect: 'Allow',
229
- Sid: 'DenyAccessIfRequiredPermBoundaryIsNotBeingApplied',
230
- },
231
- {
232
- Action: [
233
- 'iam:CreatePolicyVersion',
234
- 'iam:DeletePolicy',
235
- 'iam:DeletePolicyVersion',
236
- 'iam:SetDefaultPolicyVersion',
237
- ],
238
- Resource: `arn:${partition}:iam::${account}:policy/cdk-${qualifier}-permissions-boundary`,
239
- Effect: 'Deny',
240
- Sid: 'DenyPermBoundaryIAMPolicyAlteration',
241
- },
242
- {
243
- Action: ['iam:DeleteUserPermissionsBoundary', 'iam:DeleteRolePermissionsBoundary'],
244
- Resource: '*',
245
- Effect: 'Deny',
246
- Sid: 'DenyRemovalOfPermBoundaryFromAnyUserOrRole',
247
- },
248
- ],
249
- };
250
- const request = {
251
- PolicyName: policyName,
252
- PolicyDocument: JSON.stringify(policyDoc),
253
- };
254
- const createPolicyResponse = await iam.createPolicy(request);
255
- if (createPolicyResponse.Policy?.Arn) {
256
- return createPolicyResponse.Policy.Arn;
257
- }
258
- else {
259
- throw new api_1.ToolkitError(`Could not retrieve the example permission boundary ${arn}!`);
260
- }
261
- }
262
- validatePolicyName(permissionsBoundary) {
263
- // https://docs.aws.amazon.com/IAM/latest/APIReference/API_CreatePolicy.html
264
- // Added support for policy names with a path
265
- // See https://github.com/aws/aws-cdk/issues/26320
266
- const regexp = /[\w+\/=,.@-]+/;
267
- const matches = regexp.exec(permissionsBoundary);
268
- if (!(matches && matches.length === 1 && matches[0] === permissionsBoundary)) {
269
- throw new api_1.ToolkitError(`The permissions boundary name ${permissionsBoundary} does not match the IAM conventions.`);
270
- }
271
- }
272
- async customBootstrap(environment, sdkProvider, options = {}) {
273
- // Look at the template, decide whether it's most likely a legacy or modern bootstrap
274
- // template, and use the right bootstrapper for that.
275
- const version = (0, deploy_bootstrap_1.bootstrapVersionFromTemplate)(await this.loadTemplate());
276
- if (version === 0) {
277
- return this.legacyBootstrap(environment, sdkProvider, options);
278
- }
279
- else {
280
- return this.modernBootstrap(environment, sdkProvider, options);
281
- }
282
- }
283
- async loadTemplate(params = {}) {
284
- switch (this.source.source) {
285
- case 'custom':
286
- return (0, util_1.loadStructuredFile)(this.source.templateFile);
287
- case 'default':
288
- return (0, util_1.loadStructuredFile)(path.join((0, util_1.bundledPackageRootDir)(__dirname), 'lib', 'api', 'bootstrap', 'bootstrap-template.yaml'));
289
- case 'legacy':
290
- return (0, legacy_template_1.legacyBootstrapTemplate)(params);
291
- }
292
- }
293
- }
294
- exports.Bootstrapper = Bootstrapper;
295
- /**
296
- * Magic parameter value that will cause the bootstrap-template.yml to NOT create a CMK but use the default key
297
- */
298
- const USE_AWS_MANAGED_KEY = 'AWS_MANAGED_KEY';
299
- /**
300
- * Magic parameter value that will cause the bootstrap-template.yml to create a CMK
301
- */
302
- const CREATE_NEW_KEY = '';
303
- /**
304
- * Parameter value indicating the use of the default, CDK provided permissions boundary for bootstrap-template.yml
305
- */
306
- const CDK_BOOTSTRAP_PERMISSIONS_BOUNDARY = 'CDK_BOOTSTRAP_PERMISSIONS_BOUNDARY';
307
- /**
308
- * Split an array-like CloudFormation parameter on ,
309
- *
310
- * An empty string is the empty array (instead of `['']`).
311
- */
312
- function splitCfnArray(xs) {
313
- if (xs === '' || xs === undefined) {
314
- return [];
315
- }
316
- return xs.split(',');
317
- }
318
- function intersection(xs, ys) {
319
- return new Set(Array.from(xs).filter(x => ys.has(x)));
320
- }
321
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"bootstrap-environment.js","sourceRoot":"","sources":["bootstrap-environment.ts"],"names":[],"mappings":";;;AAAA,6BAA6B;AAG7B,yDAAkF;AAClF,uDAA4D;AAC5D,0EAAgF;AAChF,yFAAgG;AAChG,qCAA2F;AAG3F,yCAAsC;AACtC,kDAA6D;AAI7D,MAAa,YAAY;IAGvB,YACmB,SAA0B,EAAE,MAAM,EAAE,SAAS,EAAE,EAChE,QAAkB;QADD,WAAM,GAAN,MAAM,CAAyC;QAGhE,IAAI,CAAC,QAAQ,GAAG,QAAQ,CAAC;IAC3B,CAAC;IAEM,oBAAoB,CACzB,WAA8B,EAC9B,WAAwB,EACxB,UAAuC,EAAE;QAEzC,QAAQ,IAAI,CAAC,MAAM,CAAC,MAAM,EAAE,CAAC;YAC3B,KAAK,QAAQ;gBACX,OAAO,IAAI,CAAC,eAAe,CAAC,WAAW,EAAE,WAAW,EAAE,OAAO,CAAC,CAAC;YACjE,KAAK,SAAS;gBACZ,OAAO,IAAI,CAAC,eAAe,CAAC,WAAW,EAAE,WAAW,EAAE,OAAO,CAAC,CAAC;YACjE,KAAK,QAAQ;gBACX,OAAO,IAAI,CAAC,eAAe,CAAC,WAAW,EAAE,WAAW,EAAE,OAAO,CAAC,CAAC;QACnE,CAAC;IACH,CAAC;IAEM,KAAK,CAAC,YAAY,CAAC,IAAa;QACrC,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,YAAY,EAAE,CAAC;QAC3C,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,GAAG,IAAA,yBAAkB,EAAC,QAAQ,EAAE,IAAI,CAAC,IAAI,CAAC,CAAC;IAClE,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,eAAe,CAC3B,WAA8B,EAC9B,WAAwB,EACxB,UAAuC,EAAE;QAEzC,MAAM,MAAM,GAAG,OAAO,CAAC,UAAU,IAAI,EAAE,CAAC;QAExC,IAAI,MAAM,CAAC,eAAe,EAAE,MAAM,EAAE,CAAC;YACnC,MAAM,IAAI,kBAAY,CAAC,iEAAiE,CAAC,CAAC;QAC5F,CAAC;QACD,IAAI,MAAM,CAAC,+BAA+B,EAAE,MAAM,EAAE,CAAC;YACnD,MAAM,IAAI,kBAAY,CAAC,6FAA6F,CAAC,CAAC;QACxH,CAAC;QACD,IAAI,MAAM,CAAC,uBAAuB,KAAK,SAAS,EAAE,CAAC;YACjD,MAAM,IAAI,kBAAY,CAAC,kFAAkF,CAAC,CAAC;QAC7G,CAAC;QACD,IAAI,MAAM,CAAC,SAAS,EAAE,CAAC;YACrB,MAAM,IAAI,kBAAY,CAAC,qEAAqE,CAAC,CAAC;QAChG,CAAC;QAED,MAAM,gBAAgB,GAAG,OAAO,CAAC,gBAAgB,IAAI,yCAA0B,CAAC;QAChF,MAAM,OAAO,GAAG,MAAM,iCAAc,CAAC,MAAM,CAAC,WAAW,EAAE,WAAW,EAAE,gBAAgB,EAAE,IAAI,CAAC,QAAQ,CAAC,CAAC;QACvG,OAAO,OAAO,CAAC,MAAM,CACnB,MAAM,IAAI,CAAC,YAAY,CAAC,MAAM,CAAC,EAC/B,EAAE,EACF;YACE,GAAG,OAAO;YACV,qBAAqB,EAAE,OAAO,CAAC,qBAAqB,IAAI,OAAO,CAAC,qBAAqB;SACtF,CACF,CAAC;IACJ,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,eAAe,CAC3B,WAA8B,EAC9B,WAAwB,EACxB,UAAuC,EAAE;QAEzC,MAAM,MAAM,GAAG,OAAO,CAAC,UAAU,IAAI,EAAE,CAAC;QAExC,MAAM,iBAAiB,GAAG,MAAM,IAAI,CAAC,YAAY,EAAE,CAAC;QAEpD,MAAM,gBAAgB,GAAG,OAAO,CAAC,gBAAgB,IAAI,yCAA0B,CAAC;QAChF,MAAM,OAAO,GAAG,MAAM,iCAAc,CAAC,MAAM,CAAC,WAAW,EAAE,WAAW,EAAE,gBAAgB,EAAE,IAAI,CAAC,QAAQ,CAAC,CAAC;QACvG,MAAM,SAAS,GAAG,MAAM,OAAO,CAAC,SAAS,EAAE,CAAC;QAE5C,IAAI,MAAM,CAAC,uBAAuB,KAAK,SAAS,IAAI,MAAM,CAAC,QAAQ,EAAE,CAAC;YACpE,MAAM,IAAI,kBAAY,CACpB,4GAA4G,CAC7G,CAAC;QACJ,CAAC;QAED,0HAA0H;QAC1H,gHAAgH;QAChH,qHAAqH;QACrH,qDAAqD;QACrD,EAAE;QACF,2EAA2E;QAC3E,2EAA2E;QAC3E,yEAAyE;QACzE,MAAM,UAAU,GAAG,IAAI,GAAG,CAAC;YACzB,GAAG,MAAM,CAAC,eAAe,IAAI,EAAE;YAC/B,GAAG,MAAM,CAAC,wBAAwB,IAAI,EAAE;SACzC,CAAC,CAAC;QACH,MAAM,OAAO,GAAG,YAAY,CAAC,UAAU,EAAE,IAAI,GAAG,CAAC,MAAM,CAAC,iBAAiB,CAAC,CAAC,CAAC;QAC5E,IAAI,OAAO,CAAC,IAAI,GAAG,CAAC,EAAE,CAAC;YACrB,MAAM,IAAI,kBAAY,CAAC,yDAAyD,CAAC,GAAG,OAAO,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;QAC5G,CAAC;QAED,MAAM,eAAe,GAAG,CAAC,QAAkB,EAAE,EAAE,CAC7C,QAAQ,CAAC,MAAM,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC,MAAM,CAAC,iBAAiB,EAAE,GAAG,CAAC,MAAM,CAAC,CAAC,QAAQ,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC;QAEvF,MAAM,eAAe,GAAG,eAAe,CAAC,MAAM,CAAC,eAAe,IAAI,aAAa,CAAC,OAAO,CAAC,UAAU,CAAC,eAAe,CAAC,CAAC,CAAC;QACrH,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,YAAE,CAAC,oBAAoB,CAAC,GAAG,CACpD,oCAAoC,eAAe,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,CAAC,eAAe,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,QAAQ,EAAE,CACzG,CAAC,CAAC;QAEH,MAAM,wBAAwB,GAAG,eAAe,CAC9C,MAAM,CAAC,wBAAwB,IAAI,aAAa,CAAC,OAAO,CAAC,UAAU,CAAC,wBAAwB,CAAC,CAC9F,CAAC;QACF,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,YAAE,CAAC,oBAAoB,CAAC,GAAG,CACpD,gCAAgC,wBAAwB,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,CAAC,wBAAwB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,QAAQ,EAAE,CACvH,CAAC,CAAC;QAEH,MAAM,+BAA+B,GACnC,MAAM,CAAC,+BAA+B,IAAI,aAAa,CAAC,OAAO,CAAC,UAAU,CAAC,+BAA+B,CAAC,CAAC;QAC9G,IAAI,eAAe,CAAC,MAAM,KAAK,CAAC,IAAI,+BAA+B,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACjF,oHAAoH;YACpH,EAAE;YACF,yGAAyG;YACzG,sDAAsD;YACtD,EAAE;YACF,sGAAsG;YACtG,gEAAgE;YAChE,EAAE;YACF,kBAAkB;YAClB,+BAA+B;YAC/B,EAAE;YACF,kGAAkG;YAClG,8BAA8B;YAC9B,MAAM,cAAc,GAAG,OAAO,SAAS,sCAAsC,CAAC;YAC9E,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,YAAE,CAAC,oBAAoB,CAAC,GAAG,CACpD,sCAAsC,cAAc,6DAA6D,CAClH,CAAC,CAAC;QACL,CAAC;aAAM,IAAI,+BAA+B,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACxD,MAAM,IAAI,kBAAY,CACpB,wJAAwJ,SAAS,kCAAkC,CACpM,CAAC;QACJ,CAAC;aAAM,CAAC;YACN,8CAA8C;YAC9C,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,YAAE,CAAC,oBAAoB,CAAC,GAAG,CAAC,uBAAuB,+BAA+B,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC,CAAC;QAC/H,CAAC;QAED,6CAA6C;QAC7C,iCAAiC;QACjC,+BAA+B;QAC/B,uCAAuC;QACvC,2EAA2E;QAC3E,0GAA0G;QAC1G,MAAM,eAAe,GAAG,OAAO,CAAC,UAAU,CAAC,wBAAwB,CAAC;QACpE,MAAM,QAAQ,GACZ,MAAM,CAAC,QAAQ;YACf,CAAC,MAAM,CAAC,uBAAuB,KAAK,IAAI;gBACtC,CAAC,CAAC,cAAc;gBAChB,CAAC,CAAC,MAAM,CAAC,uBAAuB,KAAK,KAAK,IAAI,eAAe,KAAK,SAAS;oBACzE,CAAC,CAAC,mBAAmB;oBACrB,CAAC,CAAC,SAAS,CAAC,CAAC;QAEnB;;;;WAIG;QAEH,wEAAwE;QACxE,iFAAiF;QACjF,eAAe;QACf,MAAM,0BAA0B,GAAuB,OAAO,CAAC,UAAU,CAAC,wBAAwB,IAAI,SAAS,CAAC;QAChH,MAAM,eAAe,GAAG,MAAM,CAAC,0BAA0B;YACvD,CAAC,CAAC,kCAAkC;YACpC,CAAC,CAAC,MAAM,CAAC,yBAAyB,CAAC;QACrC,IAAI,UAA8B,CAAC;QACnC,IAAI,eAAe,EAAE,CAAC;YACpB,qEAAqE;YACrE,MAAM,GAAG,GAAG,CAAC,MAAM,WAAW,CAAC,cAAc,CAAC,WAAW,EAAE,WAAI,CAAC,UAAU,CAAC,CAAC,CAAC,GAAG,CAAC;YACjF,UAAU,GAAG,MAAM,IAAI,CAAC,aAAa,CAAC,WAAW,EAAE,GAAG,EAAE,eAAe,EAAE,SAAS,EAAE,MAAM,CAAC,CAAC;QAC9F,CAAC;QACD,IAAI,0BAA0B,KAAK,UAAU,EAAE,CAAC;YAC9C,IAAI,CAAC,0BAA0B,EAAE,CAAC;gBAChC,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,YAAE,CAAC,oBAAoB,CAAC,GAAG,CACpD,mCAAmC,UAAU,EAAE,CAChD,CAAC,CAAC;YACL,CAAC;iBAAM,IAAI,CAAC,UAAU,EAAE,CAAC;gBACvB,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,YAAE,CAAC,oBAAoB,CAAC,GAAG,CACpD,0CAA0C,0BAA0B,EAAE,CACvE,CAAC,CAAC;YACL,CAAC;iBAAM,CAAC;gBACN,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,YAAE,CAAC,oBAAoB,CAAC,GAAG,CACpD,sCAAsC,0BAA0B,OAAO,UAAU,EAAE,CACpF,CAAC,CAAC;YACL,CAAC;QACH,CAAC;QAED,OAAO,OAAO,CAAC,MAAM,CACnB,iBAAiB,EACjB;YACE,oBAAoB,EAAE,MAAM,CAAC,UAAU;YACvC,wBAAwB,EAAE,QAAQ;YAClC,mCAAmC;YACnC,eAAe,EAAE,eAAe,CAAC,IAAI,CAAC,GAAG,CAAC;YAC1C,wBAAwB,EAAE,wBAAwB,CAAC,IAAI,CAAC,GAAG,CAAC;YAC5D,+BAA+B,EAAE,+BAA+B,CAAC,IAAI,CAAC,GAAG,CAAC;YAC1E,SAAS,EAAE,MAAM,CAAC,SAAS;YAC3B,8BAA8B,EAC5B,MAAM,CAAC,8BAA8B,IAAI,MAAM,CAAC,8BAA8B,KAAK,SAAS;gBAC1F,CAAC,CAAC,MAAM;gBACR,CAAC,CAAC,OAAO;YACb,wBAAwB,EAAE,UAAU;SACrC,EACD;YACE,GAAG,OAAO;YACV,qBAAqB,EAAE,OAAO,CAAC,qBAAqB,IAAI,OAAO,CAAC,qBAAqB;SACtF,CACF,CAAC;IACJ,CAAC;IAEO,KAAK,CAAC,aAAa,CACzB,WAA8B,EAC9B,GAAQ,EACR,mBAA2B,EAC3B,SAAiB,EACjB,MAA+B;QAE/B,IAAI,mBAAmB,KAAK,kCAAkC,EAAE,CAAC;YAC/D,IAAI,CAAC,kBAAkB,CAAC,mBAAmB,CAAC,CAAC;YAC7C,OAAO,OAAO,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC;QAC9C,CAAC;QACD,yDAAyD;QACzD,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,6BAA6B,CAClD,MAAM,CAAC,SAAS,IAAI,WAAW,EAC/B,SAAS,EACT,WAAW,CAAC,OAAO,EACnB,GAAG,CACJ,CAAC;QACF,MAAM,UAAU,GAAG,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,EAAE,CAAC;QACxC,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,MAAM,IAAI,kBAAY,CAAC,qDAAqD,CAAC,CAAC;QAChF,CAAC;QACD,OAAO,OAAO,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC;IACrC,CAAC;IAEO,KAAK,CAAC,6BAA6B,CACzC,SAAiB,EACjB,SAAiB,EACjB,OAAe,EACf,GAAQ;QAER,MAAM,GAAG,GAAG,GAAG,CAAC,GAAG,EAAE,CAAC;QAEtB,IAAI,UAAU,GAAG,OAAO,SAAS,uBAAuB,CAAC;QACzD,MAAM,GAAG,GAAG,OAAO,SAAS,SAAS,OAAO,WAAW,UAAU,EAAE,CAAC;QAEpE,IAAI,CAAC;YACH,IAAI,aAAa,GAAG,MAAM,GAAG,CAAC,SAAS,CAAC,EAAE,SAAS,EAAE,GAAG,EAAE,CAAC,CAAC;YAC5D,IAAI,aAAa,CAAC,MAAM,EAAE,CAAC;gBACzB,OAAO,GAAG,CAAC;YACb,CAAC;QACH,CAAC;QAAC,OAAO,CAAM,EAAE,CAAC;YAChB,8FAA8F;YAC9F,IAAI,CAAC,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;gBAC9B,yCAAyC;YAC3C,CAAC;iBAAM,CAAC;gBACN,MAAM,CAAC,CAAC;YACV,CAAC;QACH,CAAC;QAED,MAAM,SAAS,GAAG;YAChB,OAAO,EAAE,YAAY;YACrB,SAAS,EAAE;gBACT;oBACE,MAAM,EAAE,CAAC,GAAG,CAAC;oBACb,QAAQ,EAAE,GAAG;oBACb,MAAM,EAAE,OAAO;oBACf,GAAG,EAAE,kBAAkB;iBACxB;gBACD;oBACE,SAAS,EAAE;wBACT,YAAY,EAAE;4BACZ,yBAAyB,EAAE,OAAO,SAAS,SAAS,OAAO,eAAe,SAAS,uBAAuB;yBAC3G;qBACF;oBACD,MAAM,EAAE;wBACN,gBAAgB;wBAChB,gBAAgB;wBAChB,gCAAgC;wBAChC,gCAAgC;qBACjC;oBACD,QAAQ,EAAE,GAAG;oBACb,MAAM,EAAE,OAAO;oBACf,GAAG,EAAE,mDAAmD;iBACzD;gBACD;oBACE,MAAM,EAAE;wBACN,yBAAyB;wBACzB,kBAAkB;wBAClB,yBAAyB;wBACzB,6BAA6B;qBAC9B;oBACD,QAAQ,EAAE,OAAO,SAAS,SAAS,OAAO,eAAe,SAAS,uBAAuB;oBACzF,MAAM,EAAE,MAAM;oBACd,GAAG,EAAE,qCAAqC;iBAC3C;gBACD;oBACE,MAAM,EAAE,CAAC,mCAAmC,EAAE,mCAAmC,CAAC;oBAClF,QAAQ,EAAE,GAAG;oBACb,MAAM,EAAE,MAAM;oBACd,GAAG,EAAE,4CAA4C;iBAClD;aACF;SACF,CAAC;QACF,MAAM,OAAO,GAAG;YACd,UAAU,EAAE,UAAU;YACtB,cAAc,EAAE,IAAI,CAAC,SAAS,CAAC,SAAS,CAAC;SAC1C,CAAC;QACF,MAAM,oBAAoB,GAAG,MAAM,GAAG,CAAC,YAAY,CAAC,OAAO,CAAC,CAAC;QAC7D,IAAI,oBAAoB,CAAC,MAAM,EAAE,GAAG,EAAE,CAAC;YACrC,OAAO,oBAAoB,CAAC,MAAM,CAAC,GAAG,CAAC;QACzC,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,kBAAY,CAAC,sDAAsD,GAAG,GAAG,CAAC,CAAC;QACvF,CAAC;IACH,CAAC;IAEO,kBAAkB,CAAC,mBAA2B;QACpD,4EAA4E;QAC5E,6CAA6C;QAC7C,kDAAkD;QAClD,MAAM,MAAM,GAAW,eAAe,CAAC;QACvC,MAAM,OAAO,GAAG,MAAM,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC;QACjD,IAAI,CAAC,CAAC,OAAO,IAAI,OAAO,CAAC,MAAM,KAAK,CAAC,IAAI,OAAO,CAAC,CAAC,CAAC,KAAK,mBAAmB,CAAC,EAAE,CAAC;YAC7E,MAAM,IAAI,kBAAY,CAAC,iCAAiC,mBAAmB,sCAAsC,CAAC,CAAC;QACrH,CAAC;IACH,CAAC;IAEO,KAAK,CAAC,eAAe,CAC3B,WAA8B,EAC9B,WAAwB,EACxB,UAAuC,EAAE;QAEzC,qFAAqF;QACrF,qDAAqD;QACrD,MAAM,OAAO,GAAG,IAAA,+CAA4B,EAAC,MAAM,IAAI,CAAC,YAAY,EAAE,CAAC,CAAC;QACxE,IAAI,OAAO,KAAK,CAAC,EAAE,CAAC;YAClB,OAAO,IAAI,CAAC,eAAe,CAAC,WAAW,EAAE,WAAW,EAAE,OAAO,CAAC,CAAC;QACjE,CAAC;aAAM,CAAC;YACN,OAAO,IAAI,CAAC,eAAe,CAAC,WAAW,EAAE,WAAW,EAAE,OAAO,CAAC,CAAC;QACjE,CAAC;IACH,CAAC;IAEO,KAAK,CAAC,YAAY,CAAC,SAAkC,EAAE;QAC7D,QAAQ,IAAI,CAAC,MAAM,CAAC,MAAM,EAAE,CAAC;YAC3B,KAAK,QAAQ;gBACX,OAAO,IAAA,yBAAkB,EAAC,IAAI,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;YACtD,KAAK,SAAS;gBACZ,OAAO,IAAA,yBAAkB,EAAC,IAAI,CAAC,IAAI,CAAC,IAAA,4BAAqB,EAAC,SAAS,CAAC,EAAE,KAAK,EAAE,KAAK,EAAE,WAAW,EAAE,yBAAyB,CAAC,CAAC,CAAC;YAC/H,KAAK,QAAQ;gBACX,OAAO,IAAA,yCAAuB,EAAC,MAAM,CAAC,CAAC;QAC3C,CAAC;IACH,CAAC;CACF;AA7WD,oCA6WC;AAED;;GAEG;AACH,MAAM,mBAAmB,GAAG,iBAAiB,CAAC;AAE9C;;GAEG;AACH,MAAM,cAAc,GAAG,EAAE,CAAC;AAC1B;;GAEG;AACH,MAAM,kCAAkC,GAAG,oCAAoC,CAAC;AAEhF;;;;GAIG;AACH,SAAS,aAAa,CAAC,EAAsB;IAC3C,IAAI,EAAE,KAAK,EAAE,IAAI,EAAE,KAAK,SAAS,EAAE,CAAC;QAClC,OAAO,EAAE,CAAC;IACZ,CAAC;IACD,OAAO,EAAE,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;AACvB,CAAC;AAED,SAAS,YAAY,CAAI,EAAU,EAAE,EAAU;IAC7C,OAAO,IAAI,GAAG,CAAI,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;AAC3D,CAAC","sourcesContent":["import * as path from 'path';\nimport type * as cxapi from '@aws-cdk/cx-api';\nimport type { BootstrapEnvironmentOptions, BootstrappingParameters } from './bootstrap-props';\nimport { BootstrapStack, bootstrapVersionFromTemplate } from './deploy-bootstrap';\nimport { legacyBootstrapTemplate } from './legacy-template';\nimport { ToolkitError } from '../../../../@aws-cdk/tmp-toolkit-helpers/src/api';\nimport { IO, type IoHelper } from '../../../../@aws-cdk/tmp-toolkit-helpers/src/api/io/private';\nimport { bundledPackageRootDir, loadStructuredFile, serializeStructure } from '../../util';\nimport type { SDK, SdkProvider } from '../aws-auth';\nimport type { SuccessfulDeployStackResult } from '../deployments';\nimport { Mode } from '../plugin/mode';\nimport { DEFAULT_TOOLKIT_STACK_NAME } from '../toolkit-info';\n\nexport type BootstrapSource = { source: 'legacy' } | { source: 'default' } | { source: 'custom'; templateFile: string };\n\nexport class Bootstrapper {\n  private readonly ioHelper: IoHelper;\n\n  constructor(\n    private readonly source: BootstrapSource = { source: 'default' },\n    ioHelper: IoHelper,\n  ) {\n    this.ioHelper = ioHelper;\n  }\n\n  public bootstrapEnvironment(\n    environment: cxapi.Environment,\n    sdkProvider: SdkProvider,\n    options: BootstrapEnvironmentOptions = {},\n  ): Promise<SuccessfulDeployStackResult> {\n    switch (this.source.source) {\n      case 'legacy':\n        return this.legacyBootstrap(environment, sdkProvider, options);\n      case 'default':\n        return this.modernBootstrap(environment, sdkProvider, options);\n      case 'custom':\n        return this.customBootstrap(environment, sdkProvider, options);\n    }\n  }\n\n  public async showTemplate(json: boolean) {\n    const template = await this.loadTemplate();\n    process.stdout.write(`${serializeStructure(template, json)}\\n`);\n  }\n\n  /**\n   * Deploy legacy bootstrap stack\n   *\n   */\n  private async legacyBootstrap(\n    environment: cxapi.Environment,\n    sdkProvider: SdkProvider,\n    options: BootstrapEnvironmentOptions = {},\n  ): Promise<SuccessfulDeployStackResult> {\n    const params = options.parameters ?? {};\n\n    if (params.trustedAccounts?.length) {\n      throw new ToolkitError('--trust can only be passed for the modern bootstrap experience.');\n    }\n    if (params.cloudFormationExecutionPolicies?.length) {\n      throw new ToolkitError('--cloudformation-execution-policies can only be passed for the modern bootstrap experience.');\n    }\n    if (params.createCustomerMasterKey !== undefined) {\n      throw new ToolkitError('--bootstrap-customer-key can only be passed for the modern bootstrap experience.');\n    }\n    if (params.qualifier) {\n      throw new ToolkitError('--qualifier can only be passed for the modern bootstrap experience.');\n    }\n\n    const toolkitStackName = options.toolkitStackName ?? DEFAULT_TOOLKIT_STACK_NAME;\n    const current = await BootstrapStack.lookup(sdkProvider, environment, toolkitStackName, this.ioHelper);\n    return current.update(\n      await this.loadTemplate(params),\n      {},\n      {\n        ...options,\n        terminationProtection: options.terminationProtection ?? current.terminationProtection,\n      },\n    );\n  }\n\n  /**\n   * Deploy CI/CD-ready bootstrap stack from template\n   *\n   */\n  private async modernBootstrap(\n    environment: cxapi.Environment,\n    sdkProvider: SdkProvider,\n    options: BootstrapEnvironmentOptions = {},\n  ): Promise<SuccessfulDeployStackResult> {\n    const params = options.parameters ?? {};\n\n    const bootstrapTemplate = await this.loadTemplate();\n\n    const toolkitStackName = options.toolkitStackName ?? DEFAULT_TOOLKIT_STACK_NAME;\n    const current = await BootstrapStack.lookup(sdkProvider, environment, toolkitStackName, this.ioHelper);\n    const partition = await current.partition();\n\n    if (params.createCustomerMasterKey !== undefined && params.kmsKeyId) {\n      throw new ToolkitError(\n        \"You cannot pass '--bootstrap-kms-key-id' and '--bootstrap-customer-key' together. Specify one or the other\",\n      );\n    }\n\n    // If people re-bootstrap, existing parameter values are reused so that people don't accidentally change the configuration\n    // on their bootstrap stack (this happens automatically in deployStack). However, to do proper validation on the\n    // combined arguments (such that if --trust has been given, --cloudformation-execution-policies is necessary as well)\n    // we need to take this parameter reuse into account.\n    //\n    // Ideally we'd do this inside the template, but the `Rules` section of CFN\n    // templates doesn't seem to be able to express the conditions that we need\n    // (can't use Fn::Join or reference Conditions) so we do it here instead.\n    const allTrusted = new Set([\n      ...params.trustedAccounts ?? [],\n      ...params.trustedAccountsForLookup ?? [],\n    ]);\n    const invalid = intersection(allTrusted, new Set(params.untrustedAccounts));\n    if (invalid.size > 0) {\n      throw new ToolkitError(`Accounts cannot be both trusted and untrusted. Found: ${[...invalid].join(',')}`);\n    }\n\n    const removeUntrusted = (accounts: string[]) =>\n      accounts.filter(acc => !params.untrustedAccounts?.map(String).includes(String(acc)));\n\n    const trustedAccounts = removeUntrusted(params.trustedAccounts ?? splitCfnArray(current.parameters.TrustedAccounts));\n    await this.ioHelper.notify(IO.DEFAULT_TOOLKIT_INFO.msg(\n      `Trusted accounts for deployment: ${trustedAccounts.length > 0 ? trustedAccounts.join(', ') : '(none)'}`,\n    ));\n\n    const trustedAccountsForLookup = removeUntrusted(\n      params.trustedAccountsForLookup ?? splitCfnArray(current.parameters.TrustedAccountsForLookup),\n    );\n    await this.ioHelper.notify(IO.DEFAULT_TOOLKIT_INFO.msg(\n      `Trusted accounts for lookup: ${trustedAccountsForLookup.length > 0 ? trustedAccountsForLookup.join(', ') : '(none)'}`,\n    ));\n\n    const cloudFormationExecutionPolicies =\n      params.cloudFormationExecutionPolicies ?? splitCfnArray(current.parameters.CloudFormationExecutionPolicies);\n    if (trustedAccounts.length === 0 && cloudFormationExecutionPolicies.length === 0) {\n      // For self-trust it's okay to default to AdministratorAccess, and it improves the usability of bootstrapping a lot.\n      //\n      // We don't actually make the implicitly policy a physical parameter. The template will infer it instead,\n      // we simply do the UI advertising that behavior here.\n      //\n      // If we DID make it an explicit parameter, we wouldn't be able to tell the difference between whether\n      // we inferred it or whether the user told us, and the sequence:\n      //\n      // $ cdk bootstrap\n      // $ cdk bootstrap --trust 1234\n      //\n      // Would leave AdministratorAccess policies with a trust relationship, without the user explicitly\n      // approving the trust policy.\n      const implicitPolicy = `arn:${partition}:iam::aws:policy/AdministratorAccess`;\n      await this.ioHelper.notify(IO.DEFAULT_TOOLKIT_WARN.msg(\n        `Using default execution policy of '${implicitPolicy}'. Pass '--cloudformation-execution-policies' to customize.`,\n      ));\n    } else if (cloudFormationExecutionPolicies.length === 0) {\n      throw new ToolkitError(\n        `Please pass \\'--cloudformation-execution-policies\\' when using \\'--trust\\' to specify deployment permissions. Try a managed policy of the form \\'arn:${partition}:iam::aws:policy/<PolicyName>\\'.`,\n      );\n    } else {\n      // Remind people what the current settings are\n      await this.ioHelper.notify(IO.DEFAULT_TOOLKIT_INFO.msg(`Execution policies: ${cloudFormationExecutionPolicies.join(', ')}`));\n    }\n\n    // * If an ARN is given, that ARN. Otherwise:\n    //   * '-' if customerKey = false\n    //   * '' if customerKey = true\n    //   * if customerKey is also not given\n    //     * undefined if we already had a value in place (reusing what we had)\n    //     * '-' if this is the first time we're deploying this stack (or upgrading from old to new bootstrap)\n    const currentKmsKeyId = current.parameters.FileAssetsBucketKmsKeyId;\n    const kmsKeyId =\n      params.kmsKeyId ??\n      (params.createCustomerMasterKey === true\n        ? CREATE_NEW_KEY\n        : params.createCustomerMasterKey === false || currentKmsKeyId === undefined\n          ? USE_AWS_MANAGED_KEY\n          : undefined);\n\n    /* A permissions boundary can be provided via:\n     *    - the flag indicating the example one should be used\n     *    - the name indicating the custom permissions boundary to be used\n     * Re-bootstrapping will NOT be blocked by either tightening or relaxing the permissions' boundary.\n     */\n\n    // InputPermissionsBoundary is an `any` type and if it is not defined it\n    // appears as an empty string ''. We need to force it to evaluate an empty string\n    // as undefined\n    const currentPermissionsBoundary: string | undefined = current.parameters.InputPermissionsBoundary || undefined;\n    const inputPolicyName = params.examplePermissionsBoundary\n      ? CDK_BOOTSTRAP_PERMISSIONS_BOUNDARY\n      : params.customPermissionsBoundary;\n    let policyName: string | undefined;\n    if (inputPolicyName) {\n      // If the example policy is not already in place, it must be created.\n      const sdk = (await sdkProvider.forEnvironment(environment, Mode.ForWriting)).sdk;\n      policyName = await this.getPolicyName(environment, sdk, inputPolicyName, partition, params);\n    }\n    if (currentPermissionsBoundary !== policyName) {\n      if (!currentPermissionsBoundary) {\n        await this.ioHelper.notify(IO.DEFAULT_TOOLKIT_WARN.msg(\n          `Adding new permissions boundary ${policyName}`,\n        ));\n      } else if (!policyName) {\n        await this.ioHelper.notify(IO.DEFAULT_TOOLKIT_WARN.msg(\n          `Removing existing permissions boundary ${currentPermissionsBoundary}`,\n        ));\n      } else {\n        await this.ioHelper.notify(IO.DEFAULT_TOOLKIT_WARN.msg(\n          `Changing permissions boundary from ${currentPermissionsBoundary} to ${policyName}`,\n        ));\n      }\n    }\n\n    return current.update(\n      bootstrapTemplate,\n      {\n        FileAssetsBucketName: params.bucketName,\n        FileAssetsBucketKmsKeyId: kmsKeyId,\n        // Empty array becomes empty string\n        TrustedAccounts: trustedAccounts.join(','),\n        TrustedAccountsForLookup: trustedAccountsForLookup.join(','),\n        CloudFormationExecutionPolicies: cloudFormationExecutionPolicies.join(','),\n        Qualifier: params.qualifier,\n        PublicAccessBlockConfiguration:\n          params.publicAccessBlockConfiguration || params.publicAccessBlockConfiguration === undefined\n            ? 'true'\n            : 'false',\n        InputPermissionsBoundary: policyName,\n      },\n      {\n        ...options,\n        terminationProtection: options.terminationProtection ?? current.terminationProtection,\n      },\n    );\n  }\n\n  private async getPolicyName(\n    environment: cxapi.Environment,\n    sdk: SDK,\n    permissionsBoundary: string,\n    partition: string,\n    params: BootstrappingParameters,\n  ): Promise<string> {\n    if (permissionsBoundary !== CDK_BOOTSTRAP_PERMISSIONS_BOUNDARY) {\n      this.validatePolicyName(permissionsBoundary);\n      return Promise.resolve(permissionsBoundary);\n    }\n    // if no Qualifier is supplied, resort to the default one\n    const arn = await this.getExamplePermissionsBoundary(\n      params.qualifier ?? 'hnb659fds',\n      partition,\n      environment.account,\n      sdk,\n    );\n    const policyName = arn.split('/').pop();\n    if (!policyName) {\n      throw new ToolkitError('Could not retrieve the example permission boundary!');\n    }\n    return Promise.resolve(policyName);\n  }\n\n  private async getExamplePermissionsBoundary(\n    qualifier: string,\n    partition: string,\n    account: string,\n    sdk: SDK,\n  ): Promise<string> {\n    const iam = sdk.iam();\n\n    let policyName = `cdk-${qualifier}-permissions-boundary`;\n    const arn = `arn:${partition}:iam::${account}:policy/${policyName}`;\n\n    try {\n      let getPolicyResp = await iam.getPolicy({ PolicyArn: arn });\n      if (getPolicyResp.Policy) {\n        return arn;\n      }\n    } catch (e: any) {\n      // https://docs.aws.amazon.com/IAM/latest/APIReference/API_GetPolicy.html#API_GetPolicy_Errors\n      if (e.name === 'NoSuchEntity') {\n        // noop, proceed with creating the policy\n      } else {\n        throw e;\n      }\n    }\n\n    const policyDoc = {\n      Version: '2012-10-17',\n      Statement: [\n        {\n          Action: ['*'],\n          Resource: '*',\n          Effect: 'Allow',\n          Sid: 'ExplicitAllowAll',\n        },\n        {\n          Condition: {\n            StringEquals: {\n              'iam:PermissionsBoundary': `arn:${partition}:iam::${account}:policy/cdk-${qualifier}-permissions-boundary`,\n            },\n          },\n          Action: [\n            'iam:CreateUser',\n            'iam:CreateRole',\n            'iam:PutRolePermissionsBoundary',\n            'iam:PutUserPermissionsBoundary',\n          ],\n          Resource: '*',\n          Effect: 'Allow',\n          Sid: 'DenyAccessIfRequiredPermBoundaryIsNotBeingApplied',\n        },\n        {\n          Action: [\n            'iam:CreatePolicyVersion',\n            'iam:DeletePolicy',\n            'iam:DeletePolicyVersion',\n            'iam:SetDefaultPolicyVersion',\n          ],\n          Resource: `arn:${partition}:iam::${account}:policy/cdk-${qualifier}-permissions-boundary`,\n          Effect: 'Deny',\n          Sid: 'DenyPermBoundaryIAMPolicyAlteration',\n        },\n        {\n          Action: ['iam:DeleteUserPermissionsBoundary', 'iam:DeleteRolePermissionsBoundary'],\n          Resource: '*',\n          Effect: 'Deny',\n          Sid: 'DenyRemovalOfPermBoundaryFromAnyUserOrRole',\n        },\n      ],\n    };\n    const request = {\n      PolicyName: policyName,\n      PolicyDocument: JSON.stringify(policyDoc),\n    };\n    const createPolicyResponse = await iam.createPolicy(request);\n    if (createPolicyResponse.Policy?.Arn) {\n      return createPolicyResponse.Policy.Arn;\n    } else {\n      throw new ToolkitError(`Could not retrieve the example permission boundary ${arn}!`);\n    }\n  }\n\n  private validatePolicyName(permissionsBoundary: string) {\n    // https://docs.aws.amazon.com/IAM/latest/APIReference/API_CreatePolicy.html\n    // Added support for policy names with a path\n    // See https://github.com/aws/aws-cdk/issues/26320\n    const regexp: RegExp = /[\\w+\\/=,.@-]+/;\n    const matches = regexp.exec(permissionsBoundary);\n    if (!(matches && matches.length === 1 && matches[0] === permissionsBoundary)) {\n      throw new ToolkitError(`The permissions boundary name ${permissionsBoundary} does not match the IAM conventions.`);\n    }\n  }\n\n  private async customBootstrap(\n    environment: cxapi.Environment,\n    sdkProvider: SdkProvider,\n    options: BootstrapEnvironmentOptions = {},\n  ): Promise<SuccessfulDeployStackResult> {\n    // Look at the template, decide whether it's most likely a legacy or modern bootstrap\n    // template, and use the right bootstrapper for that.\n    const version = bootstrapVersionFromTemplate(await this.loadTemplate());\n    if (version === 0) {\n      return this.legacyBootstrap(environment, sdkProvider, options);\n    } else {\n      return this.modernBootstrap(environment, sdkProvider, options);\n    }\n  }\n\n  private async loadTemplate(params: BootstrappingParameters = {}): Promise<any> {\n    switch (this.source.source) {\n      case 'custom':\n        return loadStructuredFile(this.source.templateFile);\n      case 'default':\n        return loadStructuredFile(path.join(bundledPackageRootDir(__dirname), 'lib', 'api', 'bootstrap', 'bootstrap-template.yaml'));\n      case 'legacy':\n        return legacyBootstrapTemplate(params);\n    }\n  }\n}\n\n/**\n * Magic parameter value that will cause the bootstrap-template.yml to NOT create a CMK but use the default key\n */\nconst USE_AWS_MANAGED_KEY = 'AWS_MANAGED_KEY';\n\n/**\n * Magic parameter value that will cause the bootstrap-template.yml to create a CMK\n */\nconst CREATE_NEW_KEY = '';\n/**\n * Parameter value indicating the use of the default, CDK provided permissions boundary for bootstrap-template.yml\n */\nconst CDK_BOOTSTRAP_PERMISSIONS_BOUNDARY = 'CDK_BOOTSTRAP_PERMISSIONS_BOUNDARY';\n\n/**\n * Split an array-like CloudFormation parameter on ,\n *\n * An empty string is the empty array (instead of `['']`).\n */\nfunction splitCfnArray(xs: string | undefined): string[] {\n  if (xs === '' || xs === undefined) {\n    return [];\n  }\n  return xs.split(',');\n}\n\nfunction intersection<A>(xs: Set<A>, ys: Set<A>): Set<A> {\n  return new Set<A>(Array.from(xs).filter(x => ys.has(x)));\n}\n"]}
@@ -1,130 +0,0 @@
1
- import type { BootstrapSource } from './bootstrap-environment';
2
- import type { StringWithoutPlaceholders } from '../environment';
3
- import type { Tag } from '../tags';
4
- export declare const BUCKET_NAME_OUTPUT = "BucketName";
5
- export declare const REPOSITORY_NAME_OUTPUT = "ImageRepositoryName";
6
- export declare const BUCKET_DOMAIN_NAME_OUTPUT = "BucketDomainName";
7
- export declare const BOOTSTRAP_VERSION_OUTPUT = "BootstrapVersion";
8
- export declare const BOOTSTRAP_VERSION_RESOURCE = "CdkBootstrapVersion";
9
- export declare const BOOTSTRAP_VARIANT_PARAMETER = "BootstrapVariant";
10
- /**
11
- * The assumed vendor of a template in case it is not set
12
- */
13
- export declare const DEFAULT_BOOTSTRAP_VARIANT = "AWS CDK: Default Resources";
14
- /**
15
- * Options for the bootstrapEnvironment operation(s)
16
- */
17
- export interface BootstrapEnvironmentOptions {
18
- readonly toolkitStackName?: string;
19
- readonly roleArn?: StringWithoutPlaceholders;
20
- readonly parameters?: BootstrappingParameters;
21
- readonly force?: boolean;
22
- /**
23
- * The source of the bootstrap stack
24
- *
25
- * @default - modern v2-style bootstrapping
26
- */
27
- readonly source?: BootstrapSource;
28
- /**
29
- * Whether to execute the changeset or only create it and leave it in review.
30
- * @default true
31
- */
32
- readonly execute?: boolean;
33
- /**
34
- * Tags for cdktoolkit stack.
35
- *
36
- * @default - None.
37
- */
38
- readonly tags?: Tag[];
39
- /**
40
- * Whether the stacks created by the bootstrap process should be protected from termination.
41
- * @see https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-protect-stacks.html
42
- * @default true
43
- */
44
- readonly terminationProtection?: boolean;
45
- /**
46
- * Use previous values for unspecified parameters
47
- *
48
- * If not set, all parameters must be specified for every deployment.
49
- *
50
- * @default true
51
- */
52
- usePreviousParameters?: boolean;
53
- }
54
- /**
55
- * Parameters for the bootstrapping template
56
- */
57
- export interface BootstrappingParameters {
58
- /**
59
- * The name to be given to the CDK Bootstrap bucket.
60
- *
61
- * @default - a name is generated by CloudFormation.
62
- */
63
- readonly bucketName?: string;
64
- /**
65
- * The ID of an existing KMS key to be used for encrypting items in the bucket.
66
- *
67
- * @default - use the default KMS key or create a custom one
68
- */
69
- readonly kmsKeyId?: string;
70
- /**
71
- * Whether or not to create a new customer master key (CMK)
72
- *
73
- * Only applies to modern bootstrapping. Legacy bootstrapping will never create
74
- * a CMK, only use the default S3 key.
75
- *
76
- * @default false
77
- */
78
- readonly createCustomerMasterKey?: boolean;
79
- /**
80
- * The list of AWS account IDs that are trusted to deploy into the environment being bootstrapped.
81
- *
82
- * @default - only the bootstrapped account can deploy into this environment
83
- */
84
- readonly trustedAccounts?: string[];
85
- /**
86
- * The list of AWS account IDs that are trusted to look up values in the environment being bootstrapped.
87
- *
88
- * @default - only the bootstrapped account can look up values in this environment
89
- */
90
- readonly trustedAccountsForLookup?: string[];
91
- /**
92
- * The list of AWS account IDs that should not be trusted by the bootstrapped environment.
93
- * If these accounts are already trusted, they will be removed on bootstrapping.
94
- *
95
- * @default - no account will be untrusted.
96
- */
97
- readonly untrustedAccounts?: string[];
98
- /**
99
- * The ARNs of the IAM managed policies that should be attached to the role performing CloudFormation deployments.
100
- * In most cases, this will be the AdministratorAccess policy.
101
- * At least one policy is required if `trustedAccounts` were passed.
102
- *
103
- * @default - the role will have no policies attached
104
- */
105
- readonly cloudFormationExecutionPolicies?: string[];
106
- /**
107
- * Identifier to distinguish multiple bootstrapped environments
108
- *
109
- * @default - Default qualifier
110
- */
111
- readonly qualifier?: string;
112
- /**
113
- * Whether or not to enable S3 Staging Bucket Public Access Block Configuration
114
- *
115
- * @default true
116
- */
117
- readonly publicAccessBlockConfiguration?: boolean;
118
- /**
119
- * Flag for using the default permissions boundary for bootstrapping
120
- *
121
- * @default - No value, optional argument
122
- */
123
- readonly examplePermissionsBoundary?: boolean;
124
- /**
125
- * Name for the customer's custom permissions boundary for bootstrapping
126
- *
127
- * @default - No value, optional argument
128
- */
129
- readonly customPermissionsBoundary?: string;
130
- }