aws-cdk 2.1006.0 → 3.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -1
- package/THIRD_PARTY_LICENSES +104 -86
- package/build-info.json +2 -2
- package/db.json.gz +0 -0
- package/lib/api/aws-auth.d.ts +1 -0
- package/lib/api/{logs/index.js → aws-auth.js} +2 -3
- package/lib/api/bootstrap.d.ts +1 -0
- package/lib/api/bootstrap.js +18 -0
- package/lib/api/cloud-assembly.d.ts +1 -0
- package/lib/api/cloud-assembly.js +18 -0
- package/lib/api/cloudformation.d.ts +1 -0
- package/lib/api/cloudformation.js +18 -0
- package/lib/api/context.d.ts +1 -40
- package/lib/api/context.js +16 -80
- package/lib/api/deployments.d.ts +1 -0
- package/lib/api/deployments.js +18 -0
- package/lib/api/environment.d.ts +1 -0
- package/lib/api/environment.js +18 -0
- package/lib/api/garbage-collection.d.ts +1 -0
- package/lib/api/garbage-collection.js +18 -0
- package/lib/api/hotswap.d.ts +1 -0
- package/lib/api/hotswap.js +18 -0
- package/lib/api/index.d.ts +5 -1
- package/lib/api/index.js +6 -2
- package/lib/api/logs-monitor.d.ts +1 -0
- package/lib/api/logs-monitor.js +18 -0
- package/lib/api/notices.d.ts +1 -0
- package/lib/api/notices.js +18 -0
- package/lib/api/plugin.d.ts +1 -0
- package/lib/api/{resource-import/index.js → plugin.js} +2 -3
- package/lib/api/resource-import.d.ts +1 -0
- package/lib/api/resource-import.js +18 -0
- package/lib/api/rwlock.d.ts +1 -0
- package/lib/api/{garbage-collection/index.js → rwlock.js} +2 -2
- package/lib/api/settings.d.ts +1 -26
- package/lib/api/settings.js +16 -103
- package/lib/api/stack-events.d.ts +1 -0
- package/lib/api/stack-events.js +18 -0
- package/lib/api/tags.d.ts +1 -9
- package/lib/api/tags.js +16 -8
- package/lib/api/toolkit-info.d.ts +1 -52
- package/lib/api/toolkit-info.js +16 -152
- package/lib/api/tree.d.ts +1 -31
- package/lib/api/tree.js +16 -35
- package/lib/api/work-graph.d.ts +1 -0
- package/lib/api/work-graph.js +18 -0
- package/lib/api-private.d.ts +3 -0
- package/lib/api-private.js +22 -0
- package/lib/cli/cdk-toolkit.d.ts +20 -16
- package/lib/cli/cdk-toolkit.js +102 -37
- package/lib/cli/cli-config.js +2 -2
- package/lib/cli/cli.d.ts +1 -1
- package/lib/cli/cli.js +22 -19
- package/lib/cli/io-host/cli-io-host.js +2 -2
- package/lib/cli/pretty-print-error.js +3 -1
- package/lib/cli/util/npm.d.ts +4 -1
- package/lib/cli/util/npm.js +25 -13
- package/lib/cli/version.d.ts +1 -1
- package/lib/cli/version.js +21 -25
- package/lib/commands/context.js +3 -2
- package/lib/commands/diff.d.ts +1 -50
- package/lib/commands/diff.js +5 -213
- package/lib/commands/init/init.js +3 -2
- package/lib/commands/list-stacks.js +4 -4
- package/lib/context-providers/ami.d.ts +1 -13
- package/lib/context-providers/ami.js +16 -48
- package/lib/context-providers/availability-zones.d.ts +1 -13
- package/lib/context-providers/availability-zones.js +16 -25
- package/lib/context-providers/cc-api-provider.d.ts +1 -30
- package/lib/context-providers/cc-api-provider.js +16 -136
- package/lib/context-providers/endpoint-service-availability-zones.d.ts +1 -13
- package/lib/context-providers/endpoint-service-availability-zones.js +16 -31
- package/lib/context-providers/hosted-zones.d.ts +1 -12
- package/lib/context-providers/hosted-zones.js +16 -65
- package/lib/context-providers/index.d.ts +1 -44
- package/lib/context-providers/index.js +15 -126
- package/lib/context-providers/keys.d.ts +1 -13
- package/lib/context-providers/keys.js +16 -50
- package/lib/context-providers/load-balancers.d.ts +1 -20
- package/lib/context-providers/load-balancers.js +16 -154
- package/lib/context-providers/security-groups.d.ts +1 -9
- package/lib/context-providers/security-groups.js +16 -66
- package/lib/context-providers/ssm-parameters.d.ts +1 -25
- package/lib/context-providers/ssm-parameters.js +16 -57
- package/lib/context-providers/vpcs.d.ts +1 -13
- package/lib/context-providers/vpcs.js +16 -285
- package/lib/{api/cxapp → cxapp}/cloud-assembly.d.ts +3 -59
- package/lib/cxapp/cloud-assembly.js +108 -0
- package/lib/{api/cxapp → cxapp}/cloud-executable.d.ts +10 -3
- package/lib/cxapp/cloud-executable.js +92 -0
- package/lib/{api/cxapp → cxapp}/environments.d.ts +1 -2
- package/lib/{api/cxapp → cxapp}/environments.js +2 -2
- package/lib/cxapp/exec.d.ts +14 -0
- package/lib/cxapp/exec.js +157 -0
- package/lib/cxapp/index.d.ts +4 -0
- package/lib/{api/bootstrap → cxapp}/index.js +5 -3
- package/lib/index.js +134493 -125222
- package/lib/init-templates/.init-version.json +1 -1
- package/lib/init-templates/.recommended-feature-flags.json +3 -1
- package/lib/legacy-aws-auth.d.ts +74 -0
- package/lib/legacy-aws-auth.js +40 -0
- package/lib/legacy-exports-source.d.ts +13 -18
- package/lib/legacy-exports-source.js +42 -49
- package/lib/legacy-exports.d.ts +3 -6
- package/lib/legacy-exports.js +5 -5
- package/lib/legacy-types.d.ts +31 -0
- package/lib/legacy-types.js +3 -0
- package/package.json +19 -18
- package/lib/api/aws-auth/account-cache.d.ts +0 -36
- package/lib/api/aws-auth/account-cache.js +0 -99
- package/lib/api/aws-auth/awscli-compatible.d.ts +0 -42
- package/lib/api/aws-auth/awscli-compatible.js +0 -263
- package/lib/api/aws-auth/cached.d.ts +0 -11
- package/lib/api/aws-auth/cached.js +0 -26
- package/lib/api/aws-auth/credential-plugins.d.ts +0 -36
- package/lib/api/aws-auth/credential-plugins.js +0 -152
- package/lib/api/aws-auth/index.d.ts +0 -3
- package/lib/api/aws-auth/index.js +0 -20
- package/lib/api/aws-auth/provider-caching.d.ts +0 -13
- package/lib/api/aws-auth/provider-caching.js +0 -24
- package/lib/api/aws-auth/sdk-logger.d.ts +0 -69
- package/lib/api/aws-auth/sdk-logger.js +0 -124
- package/lib/api/aws-auth/sdk-provider.d.ts +0 -207
- package/lib/api/aws-auth/sdk-provider.js +0 -357
- package/lib/api/aws-auth/sdk.d.ts +0 -229
- package/lib/api/aws-auth/sdk.js +0 -373
- package/lib/api/aws-auth/tracing.d.ts +0 -11
- package/lib/api/aws-auth/tracing.js +0 -60
- package/lib/api/aws-auth/user-agent.d.ts +0 -7
- package/lib/api/aws-auth/user-agent.js +0 -20
- package/lib/api/aws-auth/util.d.ts +0 -6
- package/lib/api/aws-auth/util.js +0 -23
- package/lib/api/bootstrap/bootstrap-environment.d.ts +0 -35
- package/lib/api/bootstrap/bootstrap-environment.js +0 -321
- package/lib/api/bootstrap/bootstrap-props.d.ts +0 -130
- package/lib/api/bootstrap/bootstrap-props.js +0 -14
- package/lib/api/bootstrap/deploy-bootstrap.d.ts +0 -39
- package/lib/api/bootstrap/deploy-bootstrap.js +0 -141
- package/lib/api/bootstrap/index.d.ts +0 -2
- package/lib/api/bootstrap/legacy-template.d.ts +0 -2
- package/lib/api/bootstrap/legacy-template.js +0 -82
- package/lib/api/cloudformation/evaluate-cloudformation-template.d.ts +0 -85
- package/lib/api/cloudformation/evaluate-cloudformation-template.js +0 -440
- package/lib/api/cloudformation/index.d.ts +0 -4
- package/lib/api/cloudformation/index.js +0 -21
- package/lib/api/cloudformation/nested-stack-helpers.d.ts +0 -25
- package/lib/api/cloudformation/nested-stack-helpers.js +0 -86
- package/lib/api/cloudformation/stack-helpers.d.ts +0 -96
- package/lib/api/cloudformation/stack-helpers.js +0 -158
- package/lib/api/cloudformation/template-body-parameter.d.ts +0 -22
- package/lib/api/cloudformation/template-body-parameter.js +0 -104
- package/lib/api/cxapp/cloud-assembly.js +0 -304
- package/lib/api/cxapp/cloud-executable.js +0 -89
- package/lib/api/cxapp/exec.d.ts +0 -56
- package/lib/api/cxapp/exec.js +0 -272
- package/lib/api/deployments/asset-manifest-builder.d.ts +0 -8
- package/lib/api/deployments/asset-manifest-builder.js +0 -35
- package/lib/api/deployments/asset-publishing.d.ts +0 -60
- package/lib/api/deployments/asset-publishing.js +0 -141
- package/lib/api/deployments/assets.d.ts +0 -11
- package/lib/api/deployments/assets.js +0 -109
- package/lib/api/deployments/cfn-api.d.ts +0 -138
- package/lib/api/deployments/cfn-api.js +0 -438
- package/lib/api/deployments/checks.d.ts +0 -9
- package/lib/api/deployments/checks.js +0 -72
- package/lib/api/deployments/deploy-stack.d.ts +0 -155
- package/lib/api/deployments/deploy-stack.js +0 -478
- package/lib/api/deployments/deployment-method.d.ts +0 -24
- package/lib/api/deployments/deployment-method.js +0 -3
- package/lib/api/deployments/deployment-result.d.ts +0 -21
- package/lib/api/deployments/deployment-result.js +0 -10
- package/lib/api/deployments/deployments.d.ts +0 -296
- package/lib/api/deployments/deployments.js +0 -331
- package/lib/api/deployments/hotswap-deployments.d.ts +0 -17
- package/lib/api/deployments/hotswap-deployments.js +0 -441
- package/lib/api/deployments/index.d.ts +0 -4
- package/lib/api/deployments/index.js +0 -21
- package/lib/api/environment/environment-access.d.ts +0 -140
- package/lib/api/environment/environment-access.js +0 -202
- package/lib/api/environment/environment-resources.d.ts +0 -75
- package/lib/api/environment/environment-resources.js +0 -207
- package/lib/api/environment/index.d.ts +0 -3
- package/lib/api/environment/index.js +0 -20
- package/lib/api/environment/placeholders.d.ts +0 -10
- package/lib/api/environment/placeholders.js +0 -23
- package/lib/api/garbage-collection/garbage-collector.d.ts +0 -158
- package/lib/api/garbage-collection/garbage-collector.js +0 -599
- package/lib/api/garbage-collection/index.d.ts +0 -1
- package/lib/api/garbage-collection/progress-printer.d.ts +0 -23
- package/lib/api/garbage-collection/progress-printer.js +0 -70
- package/lib/api/garbage-collection/stack-refresh.d.ts +0 -49
- package/lib/api/garbage-collection/stack-refresh.js +0 -151
- package/lib/api/hotswap/appsync-mapping-templates.d.ts +0 -4
- package/lib/api/hotswap/appsync-mapping-templates.js +0 -162
- package/lib/api/hotswap/code-build-projects.d.ts +0 -4
- package/lib/api/hotswap/code-build-projects.js +0 -62
- package/lib/api/hotswap/common.d.ts +0 -89
- package/lib/api/hotswap/common.js +0 -128
- package/lib/api/hotswap/ecs-services.d.ts +0 -4
- package/lib/api/hotswap/ecs-services.js +0 -159
- package/lib/api/hotswap/lambda-functions.d.ts +0 -4
- package/lib/api/hotswap/lambda-functions.js +0 -297
- package/lib/api/hotswap/s3-bucket-deployments.d.ts +0 -5
- package/lib/api/hotswap/s3-bucket-deployments.js +0 -117
- package/lib/api/hotswap/stepfunctions-state-machines.d.ts +0 -4
- package/lib/api/hotswap/stepfunctions-state-machines.js +0 -48
- package/lib/api/logs/find-cloudwatch-logs.d.ts +0 -25
- package/lib/api/logs/find-cloudwatch-logs.js +0 -95
- package/lib/api/logs/index.d.ts +0 -2
- package/lib/api/logs/logs-monitor.d.ts +0 -76
- package/lib/api/logs/logs-monitor.js +0 -187
- package/lib/api/plugin/context-provider-plugin.d.ts +0 -6
- package/lib/api/plugin/context-provider-plugin.js +0 -7
- package/lib/api/plugin/index.d.ts +0 -3
- package/lib/api/plugin/index.js +0 -20
- package/lib/api/plugin/mode.d.ts +0 -4
- package/lib/api/plugin/mode.js +0 -9
- package/lib/api/plugin/plugin.d.ts +0 -63
- package/lib/api/plugin/plugin.js +0 -102
- package/lib/api/resource-import/importer.d.ts +0 -220
- package/lib/api/resource-import/importer.js +0 -331
- package/lib/api/resource-import/index.d.ts +0 -2
- package/lib/api/resource-import/migrator.d.ts +0 -26
- package/lib/api/resource-import/migrator.js +0 -71
- package/lib/api/stack-events/index.d.ts +0 -3
- package/lib/api/stack-events/index.js +0 -20
- package/lib/api/stack-events/stack-activity-monitor.d.ts +0 -100
- package/lib/api/stack-events/stack-activity-monitor.js +0 -142
- package/lib/api/stack-events/stack-event-poller.d.ts +0 -69
- package/lib/api/stack-events/stack-event-poller.js +0 -128
- package/lib/api/stack-events/stack-progress-monitor.d.ts +0 -48
- package/lib/api/stack-events/stack-progress-monitor.js +0 -94
- package/lib/api/stack-events/stack-status.d.ts +0 -42
- package/lib/api/stack-events/stack-status.js +0 -88
- package/lib/api/util/rwlock.d.ts +0 -65
- package/lib/api/util/rwlock.js +0 -179
- package/lib/api/work-graph/index.d.ts +0 -3
- package/lib/api/work-graph/index.js +0 -20
- package/lib/api/work-graph/work-graph-builder.d.ts +0 -34
- package/lib/api/work-graph/work-graph-builder.js +0 -168
- package/lib/api/work-graph/work-graph-types.d.ts +0 -50
- package/lib/api/work-graph/work-graph-types.js +0 -13
- package/lib/api/work-graph/work-graph.d.ts +0 -72
- package/lib/api/work-graph/work-graph.js +0 -346
- package/lib/cli/activity-printer/base.d.ts +0 -50
- package/lib/cli/activity-printer/base.js +0 -114
- package/lib/cli/activity-printer/current.d.ts +0 -26
- package/lib/cli/activity-printer/current.js +0 -118
- package/lib/cli/activity-printer/display.d.ts +0 -13
- package/lib/cli/activity-printer/display.js +0 -80
- package/lib/cli/activity-printer/history.d.ts +0 -32
- package/lib/cli/activity-printer/history.js +0 -108
- package/lib/cli/activity-printer/index.d.ts +0 -3
- package/lib/cli/activity-printer/index.js +0 -20
- package/lib/notices.d.ts +0 -203
- package/lib/notices.js +0 -411
|
@@ -1,7 +0,0 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* Find the package.json from the main toolkit.
|
|
3
|
-
*
|
|
4
|
-
* If we can't read it for some reason, try to do something reasonable anyway.
|
|
5
|
-
* Fall back to argv[1], or a standard string if that is undefined for some reason.
|
|
6
|
-
*/
|
|
7
|
-
export declare function defaultCliUserAgent(): string;
|
|
@@ -1,20 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.defaultCliUserAgent = defaultCliUserAgent;
|
|
4
|
-
const path = require("path");
|
|
5
|
-
const util_1 = require("./util");
|
|
6
|
-
const util_2 = require("../../util");
|
|
7
|
-
/**
|
|
8
|
-
* Find the package.json from the main toolkit.
|
|
9
|
-
*
|
|
10
|
-
* If we can't read it for some reason, try to do something reasonable anyway.
|
|
11
|
-
* Fall back to argv[1], or a standard string if that is undefined for some reason.
|
|
12
|
-
*/
|
|
13
|
-
function defaultCliUserAgent() {
|
|
14
|
-
const root = (0, util_2.bundledPackageRootDir)(__dirname, false);
|
|
15
|
-
const pkg = JSON.parse((root ? (0, util_1.readIfPossible)(path.join(root, 'package.json')) : undefined) ?? '{}');
|
|
16
|
-
const name = pkg.name ?? path.basename(process.argv[1] ?? 'cdk-cli');
|
|
17
|
-
const version = pkg.version ?? '<unknown>';
|
|
18
|
-
return `${name}/${version}`;
|
|
19
|
-
}
|
|
20
|
-
//# sourceMappingURL=data:application/json;base64,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
|
package/lib/api/aws-auth/util.js
DELETED
|
@@ -1,23 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.readIfPossible = readIfPossible;
|
|
4
|
-
const fs = require("fs-extra");
|
|
5
|
-
const logging_1 = require("../../logging");
|
|
6
|
-
/**
|
|
7
|
-
* Read a file if it exists, or return undefined
|
|
8
|
-
*
|
|
9
|
-
* Not async because it is used in the constructor
|
|
10
|
-
*/
|
|
11
|
-
function readIfPossible(filename) {
|
|
12
|
-
try {
|
|
13
|
-
if (!fs.pathExistsSync(filename)) {
|
|
14
|
-
return undefined;
|
|
15
|
-
}
|
|
16
|
-
return fs.readFileSync(filename, { encoding: 'utf-8' });
|
|
17
|
-
}
|
|
18
|
-
catch (e) {
|
|
19
|
-
(0, logging_1.debug)(e);
|
|
20
|
-
return undefined;
|
|
21
|
-
}
|
|
22
|
-
}
|
|
23
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,35 +0,0 @@
|
|
|
1
|
-
import type * as cxapi from '@aws-cdk/cx-api';
|
|
2
|
-
import type { BootstrapEnvironmentOptions } from './bootstrap-props';
|
|
3
|
-
import { type IoHelper } from '../../../../@aws-cdk/tmp-toolkit-helpers/src/api/io/private';
|
|
4
|
-
import type { SdkProvider } from '../aws-auth';
|
|
5
|
-
import type { SuccessfulDeployStackResult } from '../deployments';
|
|
6
|
-
export type BootstrapSource = {
|
|
7
|
-
source: 'legacy';
|
|
8
|
-
} | {
|
|
9
|
-
source: 'default';
|
|
10
|
-
} | {
|
|
11
|
-
source: 'custom';
|
|
12
|
-
templateFile: string;
|
|
13
|
-
};
|
|
14
|
-
export declare class Bootstrapper {
|
|
15
|
-
private readonly source;
|
|
16
|
-
private readonly ioHelper;
|
|
17
|
-
constructor(source: BootstrapSource | undefined, ioHelper: IoHelper);
|
|
18
|
-
bootstrapEnvironment(environment: cxapi.Environment, sdkProvider: SdkProvider, options?: BootstrapEnvironmentOptions): Promise<SuccessfulDeployStackResult>;
|
|
19
|
-
showTemplate(json: boolean): Promise<void>;
|
|
20
|
-
/**
|
|
21
|
-
* Deploy legacy bootstrap stack
|
|
22
|
-
*
|
|
23
|
-
*/
|
|
24
|
-
private legacyBootstrap;
|
|
25
|
-
/**
|
|
26
|
-
* Deploy CI/CD-ready bootstrap stack from template
|
|
27
|
-
*
|
|
28
|
-
*/
|
|
29
|
-
private modernBootstrap;
|
|
30
|
-
private getPolicyName;
|
|
31
|
-
private getExamplePermissionsBoundary;
|
|
32
|
-
private validatePolicyName;
|
|
33
|
-
private customBootstrap;
|
|
34
|
-
private loadTemplate;
|
|
35
|
-
}
|
|
@@ -1,321 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.Bootstrapper = void 0;
|
|
4
|
-
const path = require("path");
|
|
5
|
-
const deploy_bootstrap_1 = require("./deploy-bootstrap");
|
|
6
|
-
const legacy_template_1 = require("./legacy-template");
|
|
7
|
-
const api_1 = require("../../../../@aws-cdk/tmp-toolkit-helpers/src/api");
|
|
8
|
-
const private_1 = require("../../../../@aws-cdk/tmp-toolkit-helpers/src/api/io/private");
|
|
9
|
-
const util_1 = require("../../util");
|
|
10
|
-
const mode_1 = require("../plugin/mode");
|
|
11
|
-
const toolkit_info_1 = require("../toolkit-info");
|
|
12
|
-
class Bootstrapper {
|
|
13
|
-
constructor(source = { source: 'default' }, ioHelper) {
|
|
14
|
-
this.source = source;
|
|
15
|
-
this.ioHelper = ioHelper;
|
|
16
|
-
}
|
|
17
|
-
bootstrapEnvironment(environment, sdkProvider, options = {}) {
|
|
18
|
-
switch (this.source.source) {
|
|
19
|
-
case 'legacy':
|
|
20
|
-
return this.legacyBootstrap(environment, sdkProvider, options);
|
|
21
|
-
case 'default':
|
|
22
|
-
return this.modernBootstrap(environment, sdkProvider, options);
|
|
23
|
-
case 'custom':
|
|
24
|
-
return this.customBootstrap(environment, sdkProvider, options);
|
|
25
|
-
}
|
|
26
|
-
}
|
|
27
|
-
async showTemplate(json) {
|
|
28
|
-
const template = await this.loadTemplate();
|
|
29
|
-
process.stdout.write(`${(0, util_1.serializeStructure)(template, json)}\n`);
|
|
30
|
-
}
|
|
31
|
-
/**
|
|
32
|
-
* Deploy legacy bootstrap stack
|
|
33
|
-
*
|
|
34
|
-
*/
|
|
35
|
-
async legacyBootstrap(environment, sdkProvider, options = {}) {
|
|
36
|
-
const params = options.parameters ?? {};
|
|
37
|
-
if (params.trustedAccounts?.length) {
|
|
38
|
-
throw new api_1.ToolkitError('--trust can only be passed for the modern bootstrap experience.');
|
|
39
|
-
}
|
|
40
|
-
if (params.cloudFormationExecutionPolicies?.length) {
|
|
41
|
-
throw new api_1.ToolkitError('--cloudformation-execution-policies can only be passed for the modern bootstrap experience.');
|
|
42
|
-
}
|
|
43
|
-
if (params.createCustomerMasterKey !== undefined) {
|
|
44
|
-
throw new api_1.ToolkitError('--bootstrap-customer-key can only be passed for the modern bootstrap experience.');
|
|
45
|
-
}
|
|
46
|
-
if (params.qualifier) {
|
|
47
|
-
throw new api_1.ToolkitError('--qualifier can only be passed for the modern bootstrap experience.');
|
|
48
|
-
}
|
|
49
|
-
const toolkitStackName = options.toolkitStackName ?? toolkit_info_1.DEFAULT_TOOLKIT_STACK_NAME;
|
|
50
|
-
const current = await deploy_bootstrap_1.BootstrapStack.lookup(sdkProvider, environment, toolkitStackName, this.ioHelper);
|
|
51
|
-
return current.update(await this.loadTemplate(params), {}, {
|
|
52
|
-
...options,
|
|
53
|
-
terminationProtection: options.terminationProtection ?? current.terminationProtection,
|
|
54
|
-
});
|
|
55
|
-
}
|
|
56
|
-
/**
|
|
57
|
-
* Deploy CI/CD-ready bootstrap stack from template
|
|
58
|
-
*
|
|
59
|
-
*/
|
|
60
|
-
async modernBootstrap(environment, sdkProvider, options = {}) {
|
|
61
|
-
const params = options.parameters ?? {};
|
|
62
|
-
const bootstrapTemplate = await this.loadTemplate();
|
|
63
|
-
const toolkitStackName = options.toolkitStackName ?? toolkit_info_1.DEFAULT_TOOLKIT_STACK_NAME;
|
|
64
|
-
const current = await deploy_bootstrap_1.BootstrapStack.lookup(sdkProvider, environment, toolkitStackName, this.ioHelper);
|
|
65
|
-
const partition = await current.partition();
|
|
66
|
-
if (params.createCustomerMasterKey !== undefined && params.kmsKeyId) {
|
|
67
|
-
throw new api_1.ToolkitError("You cannot pass '--bootstrap-kms-key-id' and '--bootstrap-customer-key' together. Specify one or the other");
|
|
68
|
-
}
|
|
69
|
-
// If people re-bootstrap, existing parameter values are reused so that people don't accidentally change the configuration
|
|
70
|
-
// on their bootstrap stack (this happens automatically in deployStack). However, to do proper validation on the
|
|
71
|
-
// combined arguments (such that if --trust has been given, --cloudformation-execution-policies is necessary as well)
|
|
72
|
-
// we need to take this parameter reuse into account.
|
|
73
|
-
//
|
|
74
|
-
// Ideally we'd do this inside the template, but the `Rules` section of CFN
|
|
75
|
-
// templates doesn't seem to be able to express the conditions that we need
|
|
76
|
-
// (can't use Fn::Join or reference Conditions) so we do it here instead.
|
|
77
|
-
const allTrusted = new Set([
|
|
78
|
-
...params.trustedAccounts ?? [],
|
|
79
|
-
...params.trustedAccountsForLookup ?? [],
|
|
80
|
-
]);
|
|
81
|
-
const invalid = intersection(allTrusted, new Set(params.untrustedAccounts));
|
|
82
|
-
if (invalid.size > 0) {
|
|
83
|
-
throw new api_1.ToolkitError(`Accounts cannot be both trusted and untrusted. Found: ${[...invalid].join(',')}`);
|
|
84
|
-
}
|
|
85
|
-
const removeUntrusted = (accounts) => accounts.filter(acc => !params.untrustedAccounts?.map(String).includes(String(acc)));
|
|
86
|
-
const trustedAccounts = removeUntrusted(params.trustedAccounts ?? splitCfnArray(current.parameters.TrustedAccounts));
|
|
87
|
-
await this.ioHelper.notify(private_1.IO.DEFAULT_TOOLKIT_INFO.msg(`Trusted accounts for deployment: ${trustedAccounts.length > 0 ? trustedAccounts.join(', ') : '(none)'}`));
|
|
88
|
-
const trustedAccountsForLookup = removeUntrusted(params.trustedAccountsForLookup ?? splitCfnArray(current.parameters.TrustedAccountsForLookup));
|
|
89
|
-
await this.ioHelper.notify(private_1.IO.DEFAULT_TOOLKIT_INFO.msg(`Trusted accounts for lookup: ${trustedAccountsForLookup.length > 0 ? trustedAccountsForLookup.join(', ') : '(none)'}`));
|
|
90
|
-
const cloudFormationExecutionPolicies = params.cloudFormationExecutionPolicies ?? splitCfnArray(current.parameters.CloudFormationExecutionPolicies);
|
|
91
|
-
if (trustedAccounts.length === 0 && cloudFormationExecutionPolicies.length === 0) {
|
|
92
|
-
// For self-trust it's okay to default to AdministratorAccess, and it improves the usability of bootstrapping a lot.
|
|
93
|
-
//
|
|
94
|
-
// We don't actually make the implicitly policy a physical parameter. The template will infer it instead,
|
|
95
|
-
// we simply do the UI advertising that behavior here.
|
|
96
|
-
//
|
|
97
|
-
// If we DID make it an explicit parameter, we wouldn't be able to tell the difference between whether
|
|
98
|
-
// we inferred it or whether the user told us, and the sequence:
|
|
99
|
-
//
|
|
100
|
-
// $ cdk bootstrap
|
|
101
|
-
// $ cdk bootstrap --trust 1234
|
|
102
|
-
//
|
|
103
|
-
// Would leave AdministratorAccess policies with a trust relationship, without the user explicitly
|
|
104
|
-
// approving the trust policy.
|
|
105
|
-
const implicitPolicy = `arn:${partition}:iam::aws:policy/AdministratorAccess`;
|
|
106
|
-
await this.ioHelper.notify(private_1.IO.DEFAULT_TOOLKIT_WARN.msg(`Using default execution policy of '${implicitPolicy}'. Pass '--cloudformation-execution-policies' to customize.`));
|
|
107
|
-
}
|
|
108
|
-
else if (cloudFormationExecutionPolicies.length === 0) {
|
|
109
|
-
throw new api_1.ToolkitError(`Please pass \'--cloudformation-execution-policies\' when using \'--trust\' to specify deployment permissions. Try a managed policy of the form \'arn:${partition}:iam::aws:policy/<PolicyName>\'.`);
|
|
110
|
-
}
|
|
111
|
-
else {
|
|
112
|
-
// Remind people what the current settings are
|
|
113
|
-
await this.ioHelper.notify(private_1.IO.DEFAULT_TOOLKIT_INFO.msg(`Execution policies: ${cloudFormationExecutionPolicies.join(', ')}`));
|
|
114
|
-
}
|
|
115
|
-
// * If an ARN is given, that ARN. Otherwise:
|
|
116
|
-
// * '-' if customerKey = false
|
|
117
|
-
// * '' if customerKey = true
|
|
118
|
-
// * if customerKey is also not given
|
|
119
|
-
// * undefined if we already had a value in place (reusing what we had)
|
|
120
|
-
// * '-' if this is the first time we're deploying this stack (or upgrading from old to new bootstrap)
|
|
121
|
-
const currentKmsKeyId = current.parameters.FileAssetsBucketKmsKeyId;
|
|
122
|
-
const kmsKeyId = params.kmsKeyId ??
|
|
123
|
-
(params.createCustomerMasterKey === true
|
|
124
|
-
? CREATE_NEW_KEY
|
|
125
|
-
: params.createCustomerMasterKey === false || currentKmsKeyId === undefined
|
|
126
|
-
? USE_AWS_MANAGED_KEY
|
|
127
|
-
: undefined);
|
|
128
|
-
/* A permissions boundary can be provided via:
|
|
129
|
-
* - the flag indicating the example one should be used
|
|
130
|
-
* - the name indicating the custom permissions boundary to be used
|
|
131
|
-
* Re-bootstrapping will NOT be blocked by either tightening or relaxing the permissions' boundary.
|
|
132
|
-
*/
|
|
133
|
-
// InputPermissionsBoundary is an `any` type and if it is not defined it
|
|
134
|
-
// appears as an empty string ''. We need to force it to evaluate an empty string
|
|
135
|
-
// as undefined
|
|
136
|
-
const currentPermissionsBoundary = current.parameters.InputPermissionsBoundary || undefined;
|
|
137
|
-
const inputPolicyName = params.examplePermissionsBoundary
|
|
138
|
-
? CDK_BOOTSTRAP_PERMISSIONS_BOUNDARY
|
|
139
|
-
: params.customPermissionsBoundary;
|
|
140
|
-
let policyName;
|
|
141
|
-
if (inputPolicyName) {
|
|
142
|
-
// If the example policy is not already in place, it must be created.
|
|
143
|
-
const sdk = (await sdkProvider.forEnvironment(environment, mode_1.Mode.ForWriting)).sdk;
|
|
144
|
-
policyName = await this.getPolicyName(environment, sdk, inputPolicyName, partition, params);
|
|
145
|
-
}
|
|
146
|
-
if (currentPermissionsBoundary !== policyName) {
|
|
147
|
-
if (!currentPermissionsBoundary) {
|
|
148
|
-
await this.ioHelper.notify(private_1.IO.DEFAULT_TOOLKIT_WARN.msg(`Adding new permissions boundary ${policyName}`));
|
|
149
|
-
}
|
|
150
|
-
else if (!policyName) {
|
|
151
|
-
await this.ioHelper.notify(private_1.IO.DEFAULT_TOOLKIT_WARN.msg(`Removing existing permissions boundary ${currentPermissionsBoundary}`));
|
|
152
|
-
}
|
|
153
|
-
else {
|
|
154
|
-
await this.ioHelper.notify(private_1.IO.DEFAULT_TOOLKIT_WARN.msg(`Changing permissions boundary from ${currentPermissionsBoundary} to ${policyName}`));
|
|
155
|
-
}
|
|
156
|
-
}
|
|
157
|
-
return current.update(bootstrapTemplate, {
|
|
158
|
-
FileAssetsBucketName: params.bucketName,
|
|
159
|
-
FileAssetsBucketKmsKeyId: kmsKeyId,
|
|
160
|
-
// Empty array becomes empty string
|
|
161
|
-
TrustedAccounts: trustedAccounts.join(','),
|
|
162
|
-
TrustedAccountsForLookup: trustedAccountsForLookup.join(','),
|
|
163
|
-
CloudFormationExecutionPolicies: cloudFormationExecutionPolicies.join(','),
|
|
164
|
-
Qualifier: params.qualifier,
|
|
165
|
-
PublicAccessBlockConfiguration: params.publicAccessBlockConfiguration || params.publicAccessBlockConfiguration === undefined
|
|
166
|
-
? 'true'
|
|
167
|
-
: 'false',
|
|
168
|
-
InputPermissionsBoundary: policyName,
|
|
169
|
-
}, {
|
|
170
|
-
...options,
|
|
171
|
-
terminationProtection: options.terminationProtection ?? current.terminationProtection,
|
|
172
|
-
});
|
|
173
|
-
}
|
|
174
|
-
async getPolicyName(environment, sdk, permissionsBoundary, partition, params) {
|
|
175
|
-
if (permissionsBoundary !== CDK_BOOTSTRAP_PERMISSIONS_BOUNDARY) {
|
|
176
|
-
this.validatePolicyName(permissionsBoundary);
|
|
177
|
-
return Promise.resolve(permissionsBoundary);
|
|
178
|
-
}
|
|
179
|
-
// if no Qualifier is supplied, resort to the default one
|
|
180
|
-
const arn = await this.getExamplePermissionsBoundary(params.qualifier ?? 'hnb659fds', partition, environment.account, sdk);
|
|
181
|
-
const policyName = arn.split('/').pop();
|
|
182
|
-
if (!policyName) {
|
|
183
|
-
throw new api_1.ToolkitError('Could not retrieve the example permission boundary!');
|
|
184
|
-
}
|
|
185
|
-
return Promise.resolve(policyName);
|
|
186
|
-
}
|
|
187
|
-
async getExamplePermissionsBoundary(qualifier, partition, account, sdk) {
|
|
188
|
-
const iam = sdk.iam();
|
|
189
|
-
let policyName = `cdk-${qualifier}-permissions-boundary`;
|
|
190
|
-
const arn = `arn:${partition}:iam::${account}:policy/${policyName}`;
|
|
191
|
-
try {
|
|
192
|
-
let getPolicyResp = await iam.getPolicy({ PolicyArn: arn });
|
|
193
|
-
if (getPolicyResp.Policy) {
|
|
194
|
-
return arn;
|
|
195
|
-
}
|
|
196
|
-
}
|
|
197
|
-
catch (e) {
|
|
198
|
-
// https://docs.aws.amazon.com/IAM/latest/APIReference/API_GetPolicy.html#API_GetPolicy_Errors
|
|
199
|
-
if (e.name === 'NoSuchEntity') {
|
|
200
|
-
// noop, proceed with creating the policy
|
|
201
|
-
}
|
|
202
|
-
else {
|
|
203
|
-
throw e;
|
|
204
|
-
}
|
|
205
|
-
}
|
|
206
|
-
const policyDoc = {
|
|
207
|
-
Version: '2012-10-17',
|
|
208
|
-
Statement: [
|
|
209
|
-
{
|
|
210
|
-
Action: ['*'],
|
|
211
|
-
Resource: '*',
|
|
212
|
-
Effect: 'Allow',
|
|
213
|
-
Sid: 'ExplicitAllowAll',
|
|
214
|
-
},
|
|
215
|
-
{
|
|
216
|
-
Condition: {
|
|
217
|
-
StringEquals: {
|
|
218
|
-
'iam:PermissionsBoundary': `arn:${partition}:iam::${account}:policy/cdk-${qualifier}-permissions-boundary`,
|
|
219
|
-
},
|
|
220
|
-
},
|
|
221
|
-
Action: [
|
|
222
|
-
'iam:CreateUser',
|
|
223
|
-
'iam:CreateRole',
|
|
224
|
-
'iam:PutRolePermissionsBoundary',
|
|
225
|
-
'iam:PutUserPermissionsBoundary',
|
|
226
|
-
],
|
|
227
|
-
Resource: '*',
|
|
228
|
-
Effect: 'Allow',
|
|
229
|
-
Sid: 'DenyAccessIfRequiredPermBoundaryIsNotBeingApplied',
|
|
230
|
-
},
|
|
231
|
-
{
|
|
232
|
-
Action: [
|
|
233
|
-
'iam:CreatePolicyVersion',
|
|
234
|
-
'iam:DeletePolicy',
|
|
235
|
-
'iam:DeletePolicyVersion',
|
|
236
|
-
'iam:SetDefaultPolicyVersion',
|
|
237
|
-
],
|
|
238
|
-
Resource: `arn:${partition}:iam::${account}:policy/cdk-${qualifier}-permissions-boundary`,
|
|
239
|
-
Effect: 'Deny',
|
|
240
|
-
Sid: 'DenyPermBoundaryIAMPolicyAlteration',
|
|
241
|
-
},
|
|
242
|
-
{
|
|
243
|
-
Action: ['iam:DeleteUserPermissionsBoundary', 'iam:DeleteRolePermissionsBoundary'],
|
|
244
|
-
Resource: '*',
|
|
245
|
-
Effect: 'Deny',
|
|
246
|
-
Sid: 'DenyRemovalOfPermBoundaryFromAnyUserOrRole',
|
|
247
|
-
},
|
|
248
|
-
],
|
|
249
|
-
};
|
|
250
|
-
const request = {
|
|
251
|
-
PolicyName: policyName,
|
|
252
|
-
PolicyDocument: JSON.stringify(policyDoc),
|
|
253
|
-
};
|
|
254
|
-
const createPolicyResponse = await iam.createPolicy(request);
|
|
255
|
-
if (createPolicyResponse.Policy?.Arn) {
|
|
256
|
-
return createPolicyResponse.Policy.Arn;
|
|
257
|
-
}
|
|
258
|
-
else {
|
|
259
|
-
throw new api_1.ToolkitError(`Could not retrieve the example permission boundary ${arn}!`);
|
|
260
|
-
}
|
|
261
|
-
}
|
|
262
|
-
validatePolicyName(permissionsBoundary) {
|
|
263
|
-
// https://docs.aws.amazon.com/IAM/latest/APIReference/API_CreatePolicy.html
|
|
264
|
-
// Added support for policy names with a path
|
|
265
|
-
// See https://github.com/aws/aws-cdk/issues/26320
|
|
266
|
-
const regexp = /[\w+\/=,.@-]+/;
|
|
267
|
-
const matches = regexp.exec(permissionsBoundary);
|
|
268
|
-
if (!(matches && matches.length === 1 && matches[0] === permissionsBoundary)) {
|
|
269
|
-
throw new api_1.ToolkitError(`The permissions boundary name ${permissionsBoundary} does not match the IAM conventions.`);
|
|
270
|
-
}
|
|
271
|
-
}
|
|
272
|
-
async customBootstrap(environment, sdkProvider, options = {}) {
|
|
273
|
-
// Look at the template, decide whether it's most likely a legacy or modern bootstrap
|
|
274
|
-
// template, and use the right bootstrapper for that.
|
|
275
|
-
const version = (0, deploy_bootstrap_1.bootstrapVersionFromTemplate)(await this.loadTemplate());
|
|
276
|
-
if (version === 0) {
|
|
277
|
-
return this.legacyBootstrap(environment, sdkProvider, options);
|
|
278
|
-
}
|
|
279
|
-
else {
|
|
280
|
-
return this.modernBootstrap(environment, sdkProvider, options);
|
|
281
|
-
}
|
|
282
|
-
}
|
|
283
|
-
async loadTemplate(params = {}) {
|
|
284
|
-
switch (this.source.source) {
|
|
285
|
-
case 'custom':
|
|
286
|
-
return (0, util_1.loadStructuredFile)(this.source.templateFile);
|
|
287
|
-
case 'default':
|
|
288
|
-
return (0, util_1.loadStructuredFile)(path.join((0, util_1.bundledPackageRootDir)(__dirname), 'lib', 'api', 'bootstrap', 'bootstrap-template.yaml'));
|
|
289
|
-
case 'legacy':
|
|
290
|
-
return (0, legacy_template_1.legacyBootstrapTemplate)(params);
|
|
291
|
-
}
|
|
292
|
-
}
|
|
293
|
-
}
|
|
294
|
-
exports.Bootstrapper = Bootstrapper;
|
|
295
|
-
/**
|
|
296
|
-
* Magic parameter value that will cause the bootstrap-template.yml to NOT create a CMK but use the default key
|
|
297
|
-
*/
|
|
298
|
-
const USE_AWS_MANAGED_KEY = 'AWS_MANAGED_KEY';
|
|
299
|
-
/**
|
|
300
|
-
* Magic parameter value that will cause the bootstrap-template.yml to create a CMK
|
|
301
|
-
*/
|
|
302
|
-
const CREATE_NEW_KEY = '';
|
|
303
|
-
/**
|
|
304
|
-
* Parameter value indicating the use of the default, CDK provided permissions boundary for bootstrap-template.yml
|
|
305
|
-
*/
|
|
306
|
-
const CDK_BOOTSTRAP_PERMISSIONS_BOUNDARY = 'CDK_BOOTSTRAP_PERMISSIONS_BOUNDARY';
|
|
307
|
-
/**
|
|
308
|
-
* Split an array-like CloudFormation parameter on ,
|
|
309
|
-
*
|
|
310
|
-
* An empty string is the empty array (instead of `['']`).
|
|
311
|
-
*/
|
|
312
|
-
function splitCfnArray(xs) {
|
|
313
|
-
if (xs === '' || xs === undefined) {
|
|
314
|
-
return [];
|
|
315
|
-
}
|
|
316
|
-
return xs.split(',');
|
|
317
|
-
}
|
|
318
|
-
function intersection(xs, ys) {
|
|
319
|
-
return new Set(Array.from(xs).filter(x => ys.has(x)));
|
|
320
|
-
}
|
|
321
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"bootstrap-environment.js","sourceRoot":"","sources":["bootstrap-environment.ts"],"names":[],"mappings":";;;AAAA,6BAA6B;AAG7B,yDAAkF;AAClF,uDAA4D;AAC5D,0EAAgF;AAChF,yFAAgG;AAChG,qCAA2F;AAG3F,yCAAsC;AACtC,kDAA6D;AAI7D,MAAa,YAAY;IAGvB,YACmB,SAA0B,EAAE,MAAM,EAAE,SAAS,EAAE,EAChE,QAAkB;QADD,WAAM,GAAN,MAAM,CAAyC;QAGhE,IAAI,CAAC,QAAQ,GAAG,QAAQ,CAAC;IAC3B,CAAC;IAEM,oBAAoB,CACzB,WAA8B,EAC9B,WAAwB,EACxB,UAAuC,EAAE;QAEzC,QAAQ,IAAI,CAAC,MAAM,CAAC,MAAM,EAAE,CAAC;YAC3B,KAAK,QAAQ;gBACX,OAAO,IAAI,CAAC,eAAe,CAAC,WAAW,EAAE,WAAW,EAAE,OAAO,CAAC,CAAC;YACjE,KAAK,SAAS;gBACZ,OAAO,IAAI,CAAC,eAAe,CAAC,WAAW,EAAE,WAAW,EAAE,OAAO,CAAC,CAAC;YACjE,KAAK,QAAQ;gBACX,OAAO,IAAI,CAAC,eAAe,CAAC,WAAW,EAAE,WAAW,EAAE,OAAO,CAAC,CAAC;QACnE,CAAC;IACH,CAAC;IAEM,KAAK,CAAC,YAAY,CAAC,IAAa;QACrC,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,YAAY,EAAE,CAAC;QAC3C,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,GAAG,IAAA,yBAAkB,EAAC,QAAQ,EAAE,IAAI,CAAC,IAAI,CAAC,CAAC;IAClE,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,eAAe,CAC3B,WAA8B,EAC9B,WAAwB,EACxB,UAAuC,EAAE;QAEzC,MAAM,MAAM,GAAG,OAAO,CAAC,UAAU,IAAI,EAAE,CAAC;QAExC,IAAI,MAAM,CAAC,eAAe,EAAE,MAAM,EAAE,CAAC;YACnC,MAAM,IAAI,kBAAY,CAAC,iEAAiE,CAAC,CAAC;QAC5F,CAAC;QACD,IAAI,MAAM,CAAC,+BAA+B,EAAE,MAAM,EAAE,CAAC;YACnD,MAAM,IAAI,kBAAY,CAAC,6FAA6F,CAAC,CAAC;QACxH,CAAC;QACD,IAAI,MAAM,CAAC,uBAAuB,KAAK,SAAS,EAAE,CAAC;YACjD,MAAM,IAAI,kBAAY,CAAC,kFAAkF,CAAC,CAAC;QAC7G,CAAC;QACD,IAAI,MAAM,CAAC,SAAS,EAAE,CAAC;YACrB,MAAM,IAAI,kBAAY,CAAC,qEAAqE,CAAC,CAAC;QAChG,CAAC;QAED,MAAM,gBAAgB,GAAG,OAAO,CAAC,gBAAgB,IAAI,yCAA0B,CAAC;QAChF,MAAM,OAAO,GAAG,MAAM,iCAAc,CAAC,MAAM,CAAC,WAAW,EAAE,WAAW,EAAE,gBAAgB,EAAE,IAAI,CAAC,QAAQ,CAAC,CAAC;QACvG,OAAO,OAAO,CAAC,MAAM,CACnB,MAAM,IAAI,CAAC,YAAY,CAAC,MAAM,CAAC,EAC/B,EAAE,EACF;YACE,GAAG,OAAO;YACV,qBAAqB,EAAE,OAAO,CAAC,qBAAqB,IAAI,OAAO,CAAC,qBAAqB;SACtF,CACF,CAAC;IACJ,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,eAAe,CAC3B,WAA8B,EAC9B,WAAwB,EACxB,UAAuC,EAAE;QAEzC,MAAM,MAAM,GAAG,OAAO,CAAC,UAAU,IAAI,EAAE,CAAC;QAExC,MAAM,iBAAiB,GAAG,MAAM,IAAI,CAAC,YAAY,EAAE,CAAC;QAEpD,MAAM,gBAAgB,GAAG,OAAO,CAAC,gBAAgB,IAAI,yCAA0B,CAAC;QAChF,MAAM,OAAO,GAAG,MAAM,iCAAc,CAAC,MAAM,CAAC,WAAW,EAAE,WAAW,EAAE,gBAAgB,EAAE,IAAI,CAAC,QAAQ,CAAC,CAAC;QACvG,MAAM,SAAS,GAAG,MAAM,OAAO,CAAC,SAAS,EAAE,CAAC;QAE5C,IAAI,MAAM,CAAC,uBAAuB,KAAK,SAAS,IAAI,MAAM,CAAC,QAAQ,EAAE,CAAC;YACpE,MAAM,IAAI,kBAAY,CACpB,4GAA4G,CAC7G,CAAC;QACJ,CAAC;QAED,0HAA0H;QAC1H,gHAAgH;QAChH,qHAAqH;QACrH,qDAAqD;QACrD,EAAE;QACF,2EAA2E;QAC3E,2EAA2E;QAC3E,yEAAyE;QACzE,MAAM,UAAU,GAAG,IAAI,GAAG,CAAC;YACzB,GAAG,MAAM,CAAC,eAAe,IAAI,EAAE;YAC/B,GAAG,MAAM,CAAC,wBAAwB,IAAI,EAAE;SACzC,CAAC,CAAC;QACH,MAAM,OAAO,GAAG,YAAY,CAAC,UAAU,EAAE,IAAI,GAAG,CAAC,MAAM,CAAC,iBAAiB,CAAC,CAAC,CAAC;QAC5E,IAAI,OAAO,CAAC,IAAI,GAAG,CAAC,EAAE,CAAC;YACrB,MAAM,IAAI,kBAAY,CAAC,yDAAyD,CAAC,GAAG,OAAO,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;QAC5G,CAAC;QAED,MAAM,eAAe,GAAG,CAAC,QAAkB,EAAE,EAAE,CAC7C,QAAQ,CAAC,MAAM,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC,MAAM,CAAC,iBAAiB,EAAE,GAAG,CAAC,MAAM,CAAC,CAAC,QAAQ,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC;QAEvF,MAAM,eAAe,GAAG,eAAe,CAAC,MAAM,CAAC,eAAe,IAAI,aAAa,CAAC,OAAO,CAAC,UAAU,CAAC,eAAe,CAAC,CAAC,CAAC;QACrH,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,YAAE,CAAC,oBAAoB,CAAC,GAAG,CACpD,oCAAoC,eAAe,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,CAAC,eAAe,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,QAAQ,EAAE,CACzG,CAAC,CAAC;QAEH,MAAM,wBAAwB,GAAG,eAAe,CAC9C,MAAM,CAAC,wBAAwB,IAAI,aAAa,CAAC,OAAO,CAAC,UAAU,CAAC,wBAAwB,CAAC,CAC9F,CAAC;QACF,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,YAAE,CAAC,oBAAoB,CAAC,GAAG,CACpD,gCAAgC,wBAAwB,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,CAAC,wBAAwB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,QAAQ,EAAE,CACvH,CAAC,CAAC;QAEH,MAAM,+BAA+B,GACnC,MAAM,CAAC,+BAA+B,IAAI,aAAa,CAAC,OAAO,CAAC,UAAU,CAAC,+BAA+B,CAAC,CAAC;QAC9G,IAAI,eAAe,CAAC,MAAM,KAAK,CAAC,IAAI,+BAA+B,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACjF,oHAAoH;YACpH,EAAE;YACF,yGAAyG;YACzG,sDAAsD;YACtD,EAAE;YACF,sGAAsG;YACtG,gEAAgE;YAChE,EAAE;YACF,kBAAkB;YAClB,+BAA+B;YAC/B,EAAE;YACF,kGAAkG;YAClG,8BAA8B;YAC9B,MAAM,cAAc,GAAG,OAAO,SAAS,sCAAsC,CAAC;YAC9E,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,YAAE,CAAC,oBAAoB,CAAC,GAAG,CACpD,sCAAsC,cAAc,6DAA6D,CAClH,CAAC,CAAC;QACL,CAAC;aAAM,IAAI,+BAA+B,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACxD,MAAM,IAAI,kBAAY,CACpB,wJAAwJ,SAAS,kCAAkC,CACpM,CAAC;QACJ,CAAC;aAAM,CAAC;YACN,8CAA8C;YAC9C,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,YAAE,CAAC,oBAAoB,CAAC,GAAG,CAAC,uBAAuB,+BAA+B,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC,CAAC;QAC/H,CAAC;QAED,6CAA6C;QAC7C,iCAAiC;QACjC,+BAA+B;QAC/B,uCAAuC;QACvC,2EAA2E;QAC3E,0GAA0G;QAC1G,MAAM,eAAe,GAAG,OAAO,CAAC,UAAU,CAAC,wBAAwB,CAAC;QACpE,MAAM,QAAQ,GACZ,MAAM,CAAC,QAAQ;YACf,CAAC,MAAM,CAAC,uBAAuB,KAAK,IAAI;gBACtC,CAAC,CAAC,cAAc;gBAChB,CAAC,CAAC,MAAM,CAAC,uBAAuB,KAAK,KAAK,IAAI,eAAe,KAAK,SAAS;oBACzE,CAAC,CAAC,mBAAmB;oBACrB,CAAC,CAAC,SAAS,CAAC,CAAC;QAEnB;;;;WAIG;QAEH,wEAAwE;QACxE,iFAAiF;QACjF,eAAe;QACf,MAAM,0BAA0B,GAAuB,OAAO,CAAC,UAAU,CAAC,wBAAwB,IAAI,SAAS,CAAC;QAChH,MAAM,eAAe,GAAG,MAAM,CAAC,0BAA0B;YACvD,CAAC,CAAC,kCAAkC;YACpC,CAAC,CAAC,MAAM,CAAC,yBAAyB,CAAC;QACrC,IAAI,UAA8B,CAAC;QACnC,IAAI,eAAe,EAAE,CAAC;YACpB,qEAAqE;YACrE,MAAM,GAAG,GAAG,CAAC,MAAM,WAAW,CAAC,cAAc,CAAC,WAAW,EAAE,WAAI,CAAC,UAAU,CAAC,CAAC,CAAC,GAAG,CAAC;YACjF,UAAU,GAAG,MAAM,IAAI,CAAC,aAAa,CAAC,WAAW,EAAE,GAAG,EAAE,eAAe,EAAE,SAAS,EAAE,MAAM,CAAC,CAAC;QAC9F,CAAC;QACD,IAAI,0BAA0B,KAAK,UAAU,EAAE,CAAC;YAC9C,IAAI,CAAC,0BAA0B,EAAE,CAAC;gBAChC,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,YAAE,CAAC,oBAAoB,CAAC,GAAG,CACpD,mCAAmC,UAAU,EAAE,CAChD,CAAC,CAAC;YACL,CAAC;iBAAM,IAAI,CAAC,UAAU,EAAE,CAAC;gBACvB,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,YAAE,CAAC,oBAAoB,CAAC,GAAG,CACpD,0CAA0C,0BAA0B,EAAE,CACvE,CAAC,CAAC;YACL,CAAC;iBAAM,CAAC;gBACN,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,YAAE,CAAC,oBAAoB,CAAC,GAAG,CACpD,sCAAsC,0BAA0B,OAAO,UAAU,EAAE,CACpF,CAAC,CAAC;YACL,CAAC;QACH,CAAC;QAED,OAAO,OAAO,CAAC,MAAM,CACnB,iBAAiB,EACjB;YACE,oBAAoB,EAAE,MAAM,CAAC,UAAU;YACvC,wBAAwB,EAAE,QAAQ;YAClC,mCAAmC;YACnC,eAAe,EAAE,eAAe,CAAC,IAAI,CAAC,GAAG,CAAC;YAC1C,wBAAwB,EAAE,wBAAwB,CAAC,IAAI,CAAC,GAAG,CAAC;YAC5D,+BAA+B,EAAE,+BAA+B,CAAC,IAAI,CAAC,GAAG,CAAC;YAC1E,SAAS,EAAE,MAAM,CAAC,SAAS;YAC3B,8BAA8B,EAC5B,MAAM,CAAC,8BAA8B,IAAI,MAAM,CAAC,8BAA8B,KAAK,SAAS;gBAC1F,CAAC,CAAC,MAAM;gBACR,CAAC,CAAC,OAAO;YACb,wBAAwB,EAAE,UAAU;SACrC,EACD;YACE,GAAG,OAAO;YACV,qBAAqB,EAAE,OAAO,CAAC,qBAAqB,IAAI,OAAO,CAAC,qBAAqB;SACtF,CACF,CAAC;IACJ,CAAC;IAEO,KAAK,CAAC,aAAa,CACzB,WAA8B,EAC9B,GAAQ,EACR,mBAA2B,EAC3B,SAAiB,EACjB,MAA+B;QAE/B,IAAI,mBAAmB,KAAK,kCAAkC,EAAE,CAAC;YAC/D,IAAI,CAAC,kBAAkB,CAAC,mBAAmB,CAAC,CAAC;YAC7C,OAAO,OAAO,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC;QAC9C,CAAC;QACD,yDAAyD;QACzD,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,6BAA6B,CAClD,MAAM,CAAC,SAAS,IAAI,WAAW,EAC/B,SAAS,EACT,WAAW,CAAC,OAAO,EACnB,GAAG,CACJ,CAAC;QACF,MAAM,UAAU,GAAG,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,EAAE,CAAC;QACxC,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,MAAM,IAAI,kBAAY,CAAC,qDAAqD,CAAC,CAAC;QAChF,CAAC;QACD,OAAO,OAAO,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC;IACrC,CAAC;IAEO,KAAK,CAAC,6BAA6B,CACzC,SAAiB,EACjB,SAAiB,EACjB,OAAe,EACf,GAAQ;QAER,MAAM,GAAG,GAAG,GAAG,CAAC,GAAG,EAAE,CAAC;QAEtB,IAAI,UAAU,GAAG,OAAO,SAAS,uBAAuB,CAAC;QACzD,MAAM,GAAG,GAAG,OAAO,SAAS,SAAS,OAAO,WAAW,UAAU,EAAE,CAAC;QAEpE,IAAI,CAAC;YACH,IAAI,aAAa,GAAG,MAAM,GAAG,CAAC,SAAS,CAAC,EAAE,SAAS,EAAE,GAAG,EAAE,CAAC,CAAC;YAC5D,IAAI,aAAa,CAAC,MAAM,EAAE,CAAC;gBACzB,OAAO,GAAG,CAAC;YACb,CAAC;QACH,CAAC;QAAC,OAAO,CAAM,EAAE,CAAC;YAChB,8FAA8F;YAC9F,IAAI,CAAC,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;gBAC9B,yCAAyC;YAC3C,CAAC;iBAAM,CAAC;gBACN,MAAM,CAAC,CAAC;YACV,CAAC;QACH,CAAC;QAED,MAAM,SAAS,GAAG;YAChB,OAAO,EAAE,YAAY;YACrB,SAAS,EAAE;gBACT;oBACE,MAAM,EAAE,CAAC,GAAG,CAAC;oBACb,QAAQ,EAAE,GAAG;oBACb,MAAM,EAAE,OAAO;oBACf,GAAG,EAAE,kBAAkB;iBACxB;gBACD;oBACE,SAAS,EAAE;wBACT,YAAY,EAAE;4BACZ,yBAAyB,EAAE,OAAO,SAAS,SAAS,OAAO,eAAe,SAAS,uBAAuB;yBAC3G;qBACF;oBACD,MAAM,EAAE;wBACN,gBAAgB;wBAChB,gBAAgB;wBAChB,gCAAgC;wBAChC,gCAAgC;qBACjC;oBACD,QAAQ,EAAE,GAAG;oBACb,MAAM,EAAE,OAAO;oBACf,GAAG,EAAE,mDAAmD;iBACzD;gBACD;oBACE,MAAM,EAAE;wBACN,yBAAyB;wBACzB,kBAAkB;wBAClB,yBAAyB;wBACzB,6BAA6B;qBAC9B;oBACD,QAAQ,EAAE,OAAO,SAAS,SAAS,OAAO,eAAe,SAAS,uBAAuB;oBACzF,MAAM,EAAE,MAAM;oBACd,GAAG,EAAE,qCAAqC;iBAC3C;gBACD;oBACE,MAAM,EAAE,CAAC,mCAAmC,EAAE,mCAAmC,CAAC;oBAClF,QAAQ,EAAE,GAAG;oBACb,MAAM,EAAE,MAAM;oBACd,GAAG,EAAE,4CAA4C;iBAClD;aACF;SACF,CAAC;QACF,MAAM,OAAO,GAAG;YACd,UAAU,EAAE,UAAU;YACtB,cAAc,EAAE,IAAI,CAAC,SAAS,CAAC,SAAS,CAAC;SAC1C,CAAC;QACF,MAAM,oBAAoB,GAAG,MAAM,GAAG,CAAC,YAAY,CAAC,OAAO,CAAC,CAAC;QAC7D,IAAI,oBAAoB,CAAC,MAAM,EAAE,GAAG,EAAE,CAAC;YACrC,OAAO,oBAAoB,CAAC,MAAM,CAAC,GAAG,CAAC;QACzC,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,kBAAY,CAAC,sDAAsD,GAAG,GAAG,CAAC,CAAC;QACvF,CAAC;IACH,CAAC;IAEO,kBAAkB,CAAC,mBAA2B;QACpD,4EAA4E;QAC5E,6CAA6C;QAC7C,kDAAkD;QAClD,MAAM,MAAM,GAAW,eAAe,CAAC;QACvC,MAAM,OAAO,GAAG,MAAM,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC;QACjD,IAAI,CAAC,CAAC,OAAO,IAAI,OAAO,CAAC,MAAM,KAAK,CAAC,IAAI,OAAO,CAAC,CAAC,CAAC,KAAK,mBAAmB,CAAC,EAAE,CAAC;YAC7E,MAAM,IAAI,kBAAY,CAAC,iCAAiC,mBAAmB,sCAAsC,CAAC,CAAC;QACrH,CAAC;IACH,CAAC;IAEO,KAAK,CAAC,eAAe,CAC3B,WAA8B,EAC9B,WAAwB,EACxB,UAAuC,EAAE;QAEzC,qFAAqF;QACrF,qDAAqD;QACrD,MAAM,OAAO,GAAG,IAAA,+CAA4B,EAAC,MAAM,IAAI,CAAC,YAAY,EAAE,CAAC,CAAC;QACxE,IAAI,OAAO,KAAK,CAAC,EAAE,CAAC;YAClB,OAAO,IAAI,CAAC,eAAe,CAAC,WAAW,EAAE,WAAW,EAAE,OAAO,CAAC,CAAC;QACjE,CAAC;aAAM,CAAC;YACN,OAAO,IAAI,CAAC,eAAe,CAAC,WAAW,EAAE,WAAW,EAAE,OAAO,CAAC,CAAC;QACjE,CAAC;IACH,CAAC;IAEO,KAAK,CAAC,YAAY,CAAC,SAAkC,EAAE;QAC7D,QAAQ,IAAI,CAAC,MAAM,CAAC,MAAM,EAAE,CAAC;YAC3B,KAAK,QAAQ;gBACX,OAAO,IAAA,yBAAkB,EAAC,IAAI,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;YACtD,KAAK,SAAS;gBACZ,OAAO,IAAA,yBAAkB,EAAC,IAAI,CAAC,IAAI,CAAC,IAAA,4BAAqB,EAAC,SAAS,CAAC,EAAE,KAAK,EAAE,KAAK,EAAE,WAAW,EAAE,yBAAyB,CAAC,CAAC,CAAC;YAC/H,KAAK,QAAQ;gBACX,OAAO,IAAA,yCAAuB,EAAC,MAAM,CAAC,CAAC;QAC3C,CAAC;IACH,CAAC;CACF;AA7WD,oCA6WC;AAED;;GAEG;AACH,MAAM,mBAAmB,GAAG,iBAAiB,CAAC;AAE9C;;GAEG;AACH,MAAM,cAAc,GAAG,EAAE,CAAC;AAC1B;;GAEG;AACH,MAAM,kCAAkC,GAAG,oCAAoC,CAAC;AAEhF;;;;GAIG;AACH,SAAS,aAAa,CAAC,EAAsB;IAC3C,IAAI,EAAE,KAAK,EAAE,IAAI,EAAE,KAAK,SAAS,EAAE,CAAC;QAClC,OAAO,EAAE,CAAC;IACZ,CAAC;IACD,OAAO,EAAE,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;AACvB,CAAC;AAED,SAAS,YAAY,CAAI,EAAU,EAAE,EAAU;IAC7C,OAAO,IAAI,GAAG,CAAI,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;AAC3D,CAAC","sourcesContent":["import * as path from 'path';\nimport type * as cxapi from '@aws-cdk/cx-api';\nimport type { BootstrapEnvironmentOptions, BootstrappingParameters } from './bootstrap-props';\nimport { BootstrapStack, bootstrapVersionFromTemplate } from './deploy-bootstrap';\nimport { legacyBootstrapTemplate } from './legacy-template';\nimport { ToolkitError } from '../../../../@aws-cdk/tmp-toolkit-helpers/src/api';\nimport { IO, type IoHelper } from '../../../../@aws-cdk/tmp-toolkit-helpers/src/api/io/private';\nimport { bundledPackageRootDir, loadStructuredFile, serializeStructure } from '../../util';\nimport type { SDK, SdkProvider } from '../aws-auth';\nimport type { SuccessfulDeployStackResult } from '../deployments';\nimport { Mode } from '../plugin/mode';\nimport { DEFAULT_TOOLKIT_STACK_NAME } from '../toolkit-info';\n\nexport type BootstrapSource = { source: 'legacy' } | { source: 'default' } | { source: 'custom'; templateFile: string };\n\nexport class Bootstrapper {\n  private readonly ioHelper: IoHelper;\n\n  constructor(\n    private readonly source: BootstrapSource = { source: 'default' },\n    ioHelper: IoHelper,\n  ) {\n    this.ioHelper = ioHelper;\n  }\n\n  public bootstrapEnvironment(\n    environment: cxapi.Environment,\n    sdkProvider: SdkProvider,\n    options: BootstrapEnvironmentOptions = {},\n  ): Promise<SuccessfulDeployStackResult> {\n    switch (this.source.source) {\n      case 'legacy':\n        return this.legacyBootstrap(environment, sdkProvider, options);\n      case 'default':\n        return this.modernBootstrap(environment, sdkProvider, options);\n      case 'custom':\n        return this.customBootstrap(environment, sdkProvider, options);\n    }\n  }\n\n  public async showTemplate(json: boolean) {\n    const template = await this.loadTemplate();\n    process.stdout.write(`${serializeStructure(template, json)}\\n`);\n  }\n\n  /**\n   * Deploy legacy bootstrap stack\n   *\n   */\n  private async legacyBootstrap(\n    environment: cxapi.Environment,\n    sdkProvider: SdkProvider,\n    options: BootstrapEnvironmentOptions = {},\n  ): Promise<SuccessfulDeployStackResult> {\n    const params = options.parameters ?? {};\n\n    if (params.trustedAccounts?.length) {\n      throw new ToolkitError('--trust can only be passed for the modern bootstrap experience.');\n    }\n    if (params.cloudFormationExecutionPolicies?.length) {\n      throw new ToolkitError('--cloudformation-execution-policies can only be passed for the modern bootstrap experience.');\n    }\n    if (params.createCustomerMasterKey !== undefined) {\n      throw new ToolkitError('--bootstrap-customer-key can only be passed for the modern bootstrap experience.');\n    }\n    if (params.qualifier) {\n      throw new ToolkitError('--qualifier can only be passed for the modern bootstrap experience.');\n    }\n\n    const toolkitStackName = options.toolkitStackName ?? DEFAULT_TOOLKIT_STACK_NAME;\n    const current = await BootstrapStack.lookup(sdkProvider, environment, toolkitStackName, this.ioHelper);\n    return current.update(\n      await this.loadTemplate(params),\n      {},\n      {\n        ...options,\n        terminationProtection: options.terminationProtection ?? current.terminationProtection,\n      },\n    );\n  }\n\n  /**\n   * Deploy CI/CD-ready bootstrap stack from template\n   *\n   */\n  private async modernBootstrap(\n    environment: cxapi.Environment,\n    sdkProvider: SdkProvider,\n    options: BootstrapEnvironmentOptions = {},\n  ): Promise<SuccessfulDeployStackResult> {\n    const params = options.parameters ?? {};\n\n    const bootstrapTemplate = await this.loadTemplate();\n\n    const toolkitStackName = options.toolkitStackName ?? DEFAULT_TOOLKIT_STACK_NAME;\n    const current = await BootstrapStack.lookup(sdkProvider, environment, toolkitStackName, this.ioHelper);\n    const partition = await current.partition();\n\n    if (params.createCustomerMasterKey !== undefined && params.kmsKeyId) {\n      throw new ToolkitError(\n        \"You cannot pass '--bootstrap-kms-key-id' and '--bootstrap-customer-key' together. Specify one or the other\",\n      );\n    }\n\n    // If people re-bootstrap, existing parameter values are reused so that people don't accidentally change the configuration\n    // on their bootstrap stack (this happens automatically in deployStack). However, to do proper validation on the\n    // combined arguments (such that if --trust has been given, --cloudformation-execution-policies is necessary as well)\n    // we need to take this parameter reuse into account.\n    //\n    // Ideally we'd do this inside the template, but the `Rules` section of CFN\n    // templates doesn't seem to be able to express the conditions that we need\n    // (can't use Fn::Join or reference Conditions) so we do it here instead.\n    const allTrusted = new Set([\n      ...params.trustedAccounts ?? [],\n      ...params.trustedAccountsForLookup ?? [],\n    ]);\n    const invalid = intersection(allTrusted, new Set(params.untrustedAccounts));\n    if (invalid.size > 0) {\n      throw new ToolkitError(`Accounts cannot be both trusted and untrusted. Found: ${[...invalid].join(',')}`);\n    }\n\n    const removeUntrusted = (accounts: string[]) =>\n      accounts.filter(acc => !params.untrustedAccounts?.map(String).includes(String(acc)));\n\n    const trustedAccounts = removeUntrusted(params.trustedAccounts ?? splitCfnArray(current.parameters.TrustedAccounts));\n    await this.ioHelper.notify(IO.DEFAULT_TOOLKIT_INFO.msg(\n      `Trusted accounts for deployment: ${trustedAccounts.length > 0 ? trustedAccounts.join(', ') : '(none)'}`,\n    ));\n\n    const trustedAccountsForLookup = removeUntrusted(\n      params.trustedAccountsForLookup ?? splitCfnArray(current.parameters.TrustedAccountsForLookup),\n    );\n    await this.ioHelper.notify(IO.DEFAULT_TOOLKIT_INFO.msg(\n      `Trusted accounts for lookup: ${trustedAccountsForLookup.length > 0 ? trustedAccountsForLookup.join(', ') : '(none)'}`,\n    ));\n\n    const cloudFormationExecutionPolicies =\n      params.cloudFormationExecutionPolicies ?? splitCfnArray(current.parameters.CloudFormationExecutionPolicies);\n    if (trustedAccounts.length === 0 && cloudFormationExecutionPolicies.length === 0) {\n      // For self-trust it's okay to default to AdministratorAccess, and it improves the usability of bootstrapping a lot.\n      //\n      // We don't actually make the implicitly policy a physical parameter. The template will infer it instead,\n      // we simply do the UI advertising that behavior here.\n      //\n      // If we DID make it an explicit parameter, we wouldn't be able to tell the difference between whether\n      // we inferred it or whether the user told us, and the sequence:\n      //\n      // $ cdk bootstrap\n      // $ cdk bootstrap --trust 1234\n      //\n      // Would leave AdministratorAccess policies with a trust relationship, without the user explicitly\n      // approving the trust policy.\n      const implicitPolicy = `arn:${partition}:iam::aws:policy/AdministratorAccess`;\n      await this.ioHelper.notify(IO.DEFAULT_TOOLKIT_WARN.msg(\n        `Using default execution policy of '${implicitPolicy}'. Pass '--cloudformation-execution-policies' to customize.`,\n      ));\n    } else if (cloudFormationExecutionPolicies.length === 0) {\n      throw new ToolkitError(\n        `Please pass \\'--cloudformation-execution-policies\\' when using \\'--trust\\' to specify deployment permissions. Try a managed policy of the form \\'arn:${partition}:iam::aws:policy/<PolicyName>\\'.`,\n      );\n    } else {\n      // Remind people what the current settings are\n      await this.ioHelper.notify(IO.DEFAULT_TOOLKIT_INFO.msg(`Execution policies: ${cloudFormationExecutionPolicies.join(', ')}`));\n    }\n\n    // * If an ARN is given, that ARN. Otherwise:\n    //   * '-' if customerKey = false\n    //   * '' if customerKey = true\n    //   * if customerKey is also not given\n    //     * undefined if we already had a value in place (reusing what we had)\n    //     * '-' if this is the first time we're deploying this stack (or upgrading from old to new bootstrap)\n    const currentKmsKeyId = current.parameters.FileAssetsBucketKmsKeyId;\n    const kmsKeyId =\n      params.kmsKeyId ??\n      (params.createCustomerMasterKey === true\n        ? CREATE_NEW_KEY\n        : params.createCustomerMasterKey === false || currentKmsKeyId === undefined\n          ? USE_AWS_MANAGED_KEY\n          : undefined);\n\n    /* A permissions boundary can be provided via:\n     *    - the flag indicating the example one should be used\n     *    - the name indicating the custom permissions boundary to be used\n     * Re-bootstrapping will NOT be blocked by either tightening or relaxing the permissions' boundary.\n     */\n\n    // InputPermissionsBoundary is an `any` type and if it is not defined it\n    // appears as an empty string ''. We need to force it to evaluate an empty string\n    // as undefined\n    const currentPermissionsBoundary: string | undefined = current.parameters.InputPermissionsBoundary || undefined;\n    const inputPolicyName = params.examplePermissionsBoundary\n      ? CDK_BOOTSTRAP_PERMISSIONS_BOUNDARY\n      : params.customPermissionsBoundary;\n    let policyName: string | undefined;\n    if (inputPolicyName) {\n      // If the example policy is not already in place, it must be created.\n      const sdk = (await sdkProvider.forEnvironment(environment, Mode.ForWriting)).sdk;\n      policyName = await this.getPolicyName(environment, sdk, inputPolicyName, partition, params);\n    }\n    if (currentPermissionsBoundary !== policyName) {\n      if (!currentPermissionsBoundary) {\n        await this.ioHelper.notify(IO.DEFAULT_TOOLKIT_WARN.msg(\n          `Adding new permissions boundary ${policyName}`,\n        ));\n      } else if (!policyName) {\n        await this.ioHelper.notify(IO.DEFAULT_TOOLKIT_WARN.msg(\n          `Removing existing permissions boundary ${currentPermissionsBoundary}`,\n        ));\n      } else {\n        await this.ioHelper.notify(IO.DEFAULT_TOOLKIT_WARN.msg(\n          `Changing permissions boundary from ${currentPermissionsBoundary} to ${policyName}`,\n        ));\n      }\n    }\n\n    return current.update(\n      bootstrapTemplate,\n      {\n        FileAssetsBucketName: params.bucketName,\n        FileAssetsBucketKmsKeyId: kmsKeyId,\n        // Empty array becomes empty string\n        TrustedAccounts: trustedAccounts.join(','),\n        TrustedAccountsForLookup: trustedAccountsForLookup.join(','),\n        CloudFormationExecutionPolicies: cloudFormationExecutionPolicies.join(','),\n        Qualifier: params.qualifier,\n        PublicAccessBlockConfiguration:\n          params.publicAccessBlockConfiguration || params.publicAccessBlockConfiguration === undefined\n            ? 'true'\n            : 'false',\n        InputPermissionsBoundary: policyName,\n      },\n      {\n        ...options,\n        terminationProtection: options.terminationProtection ?? current.terminationProtection,\n      },\n    );\n  }\n\n  private async getPolicyName(\n    environment: cxapi.Environment,\n    sdk: SDK,\n    permissionsBoundary: string,\n    partition: string,\n    params: BootstrappingParameters,\n  ): Promise<string> {\n    if (permissionsBoundary !== CDK_BOOTSTRAP_PERMISSIONS_BOUNDARY) {\n      this.validatePolicyName(permissionsBoundary);\n      return Promise.resolve(permissionsBoundary);\n    }\n    // if no Qualifier is supplied, resort to the default one\n    const arn = await this.getExamplePermissionsBoundary(\n      params.qualifier ?? 'hnb659fds',\n      partition,\n      environment.account,\n      sdk,\n    );\n    const policyName = arn.split('/').pop();\n    if (!policyName) {\n      throw new ToolkitError('Could not retrieve the example permission boundary!');\n    }\n    return Promise.resolve(policyName);\n  }\n\n  private async getExamplePermissionsBoundary(\n    qualifier: string,\n    partition: string,\n    account: string,\n    sdk: SDK,\n  ): Promise<string> {\n    const iam = sdk.iam();\n\n    let policyName = `cdk-${qualifier}-permissions-boundary`;\n    const arn = `arn:${partition}:iam::${account}:policy/${policyName}`;\n\n    try {\n      let getPolicyResp = await iam.getPolicy({ PolicyArn: arn });\n      if (getPolicyResp.Policy) {\n        return arn;\n      }\n    } catch (e: any) {\n      // https://docs.aws.amazon.com/IAM/latest/APIReference/API_GetPolicy.html#API_GetPolicy_Errors\n      if (e.name === 'NoSuchEntity') {\n        // noop, proceed with creating the policy\n      } else {\n        throw e;\n      }\n    }\n\n    const policyDoc = {\n      Version: '2012-10-17',\n      Statement: [\n        {\n          Action: ['*'],\n          Resource: '*',\n          Effect: 'Allow',\n          Sid: 'ExplicitAllowAll',\n        },\n        {\n          Condition: {\n            StringEquals: {\n              'iam:PermissionsBoundary': `arn:${partition}:iam::${account}:policy/cdk-${qualifier}-permissions-boundary`,\n            },\n          },\n          Action: [\n            'iam:CreateUser',\n            'iam:CreateRole',\n            'iam:PutRolePermissionsBoundary',\n            'iam:PutUserPermissionsBoundary',\n          ],\n          Resource: '*',\n          Effect: 'Allow',\n          Sid: 'DenyAccessIfRequiredPermBoundaryIsNotBeingApplied',\n        },\n        {\n          Action: [\n            'iam:CreatePolicyVersion',\n            'iam:DeletePolicy',\n            'iam:DeletePolicyVersion',\n            'iam:SetDefaultPolicyVersion',\n          ],\n          Resource: `arn:${partition}:iam::${account}:policy/cdk-${qualifier}-permissions-boundary`,\n          Effect: 'Deny',\n          Sid: 'DenyPermBoundaryIAMPolicyAlteration',\n        },\n        {\n          Action: ['iam:DeleteUserPermissionsBoundary', 'iam:DeleteRolePermissionsBoundary'],\n          Resource: '*',\n          Effect: 'Deny',\n          Sid: 'DenyRemovalOfPermBoundaryFromAnyUserOrRole',\n        },\n      ],\n    };\n    const request = {\n      PolicyName: policyName,\n      PolicyDocument: JSON.stringify(policyDoc),\n    };\n    const createPolicyResponse = await iam.createPolicy(request);\n    if (createPolicyResponse.Policy?.Arn) {\n      return createPolicyResponse.Policy.Arn;\n    } else {\n      throw new ToolkitError(`Could not retrieve the example permission boundary ${arn}!`);\n    }\n  }\n\n  private validatePolicyName(permissionsBoundary: string) {\n    // https://docs.aws.amazon.com/IAM/latest/APIReference/API_CreatePolicy.html\n    // Added support for policy names with a path\n    // See https://github.com/aws/aws-cdk/issues/26320\n    const regexp: RegExp = /[\\w+\\/=,.@-]+/;\n    const matches = regexp.exec(permissionsBoundary);\n    if (!(matches && matches.length === 1 && matches[0] === permissionsBoundary)) {\n      throw new ToolkitError(`The permissions boundary name ${permissionsBoundary} does not match the IAM conventions.`);\n    }\n  }\n\n  private async customBootstrap(\n    environment: cxapi.Environment,\n    sdkProvider: SdkProvider,\n    options: BootstrapEnvironmentOptions = {},\n  ): Promise<SuccessfulDeployStackResult> {\n    // Look at the template, decide whether it's most likely a legacy or modern bootstrap\n    // template, and use the right bootstrapper for that.\n    const version = bootstrapVersionFromTemplate(await this.loadTemplate());\n    if (version === 0) {\n      return this.legacyBootstrap(environment, sdkProvider, options);\n    } else {\n      return this.modernBootstrap(environment, sdkProvider, options);\n    }\n  }\n\n  private async loadTemplate(params: BootstrappingParameters = {}): Promise<any> {\n    switch (this.source.source) {\n      case 'custom':\n        return loadStructuredFile(this.source.templateFile);\n      case 'default':\n        return loadStructuredFile(path.join(bundledPackageRootDir(__dirname), 'lib', 'api', 'bootstrap', 'bootstrap-template.yaml'));\n      case 'legacy':\n        return legacyBootstrapTemplate(params);\n    }\n  }\n}\n\n/**\n * Magic parameter value that will cause the bootstrap-template.yml to NOT create a CMK but use the default key\n */\nconst USE_AWS_MANAGED_KEY = 'AWS_MANAGED_KEY';\n\n/**\n * Magic parameter value that will cause the bootstrap-template.yml to create a CMK\n */\nconst CREATE_NEW_KEY = '';\n/**\n * Parameter value indicating the use of the default, CDK provided permissions boundary for bootstrap-template.yml\n */\nconst CDK_BOOTSTRAP_PERMISSIONS_BOUNDARY = 'CDK_BOOTSTRAP_PERMISSIONS_BOUNDARY';\n\n/**\n * Split an array-like CloudFormation parameter on ,\n *\n * An empty string is the empty array (instead of `['']`).\n */\nfunction splitCfnArray(xs: string | undefined): string[] {\n  if (xs === '' || xs === undefined) {\n    return [];\n  }\n  return xs.split(',');\n}\n\nfunction intersection<A>(xs: Set<A>, ys: Set<A>): Set<A> {\n  return new Set<A>(Array.from(xs).filter(x => ys.has(x)));\n}\n"]}
|
|
@@ -1,130 +0,0 @@
|
|
|
1
|
-
import type { BootstrapSource } from './bootstrap-environment';
|
|
2
|
-
import type { StringWithoutPlaceholders } from '../environment';
|
|
3
|
-
import type { Tag } from '../tags';
|
|
4
|
-
export declare const BUCKET_NAME_OUTPUT = "BucketName";
|
|
5
|
-
export declare const REPOSITORY_NAME_OUTPUT = "ImageRepositoryName";
|
|
6
|
-
export declare const BUCKET_DOMAIN_NAME_OUTPUT = "BucketDomainName";
|
|
7
|
-
export declare const BOOTSTRAP_VERSION_OUTPUT = "BootstrapVersion";
|
|
8
|
-
export declare const BOOTSTRAP_VERSION_RESOURCE = "CdkBootstrapVersion";
|
|
9
|
-
export declare const BOOTSTRAP_VARIANT_PARAMETER = "BootstrapVariant";
|
|
10
|
-
/**
|
|
11
|
-
* The assumed vendor of a template in case it is not set
|
|
12
|
-
*/
|
|
13
|
-
export declare const DEFAULT_BOOTSTRAP_VARIANT = "AWS CDK: Default Resources";
|
|
14
|
-
/**
|
|
15
|
-
* Options for the bootstrapEnvironment operation(s)
|
|
16
|
-
*/
|
|
17
|
-
export interface BootstrapEnvironmentOptions {
|
|
18
|
-
readonly toolkitStackName?: string;
|
|
19
|
-
readonly roleArn?: StringWithoutPlaceholders;
|
|
20
|
-
readonly parameters?: BootstrappingParameters;
|
|
21
|
-
readonly force?: boolean;
|
|
22
|
-
/**
|
|
23
|
-
* The source of the bootstrap stack
|
|
24
|
-
*
|
|
25
|
-
* @default - modern v2-style bootstrapping
|
|
26
|
-
*/
|
|
27
|
-
readonly source?: BootstrapSource;
|
|
28
|
-
/**
|
|
29
|
-
* Whether to execute the changeset or only create it and leave it in review.
|
|
30
|
-
* @default true
|
|
31
|
-
*/
|
|
32
|
-
readonly execute?: boolean;
|
|
33
|
-
/**
|
|
34
|
-
* Tags for cdktoolkit stack.
|
|
35
|
-
*
|
|
36
|
-
* @default - None.
|
|
37
|
-
*/
|
|
38
|
-
readonly tags?: Tag[];
|
|
39
|
-
/**
|
|
40
|
-
* Whether the stacks created by the bootstrap process should be protected from termination.
|
|
41
|
-
* @see https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-protect-stacks.html
|
|
42
|
-
* @default true
|
|
43
|
-
*/
|
|
44
|
-
readonly terminationProtection?: boolean;
|
|
45
|
-
/**
|
|
46
|
-
* Use previous values for unspecified parameters
|
|
47
|
-
*
|
|
48
|
-
* If not set, all parameters must be specified for every deployment.
|
|
49
|
-
*
|
|
50
|
-
* @default true
|
|
51
|
-
*/
|
|
52
|
-
usePreviousParameters?: boolean;
|
|
53
|
-
}
|
|
54
|
-
/**
|
|
55
|
-
* Parameters for the bootstrapping template
|
|
56
|
-
*/
|
|
57
|
-
export interface BootstrappingParameters {
|
|
58
|
-
/**
|
|
59
|
-
* The name to be given to the CDK Bootstrap bucket.
|
|
60
|
-
*
|
|
61
|
-
* @default - a name is generated by CloudFormation.
|
|
62
|
-
*/
|
|
63
|
-
readonly bucketName?: string;
|
|
64
|
-
/**
|
|
65
|
-
* The ID of an existing KMS key to be used for encrypting items in the bucket.
|
|
66
|
-
*
|
|
67
|
-
* @default - use the default KMS key or create a custom one
|
|
68
|
-
*/
|
|
69
|
-
readonly kmsKeyId?: string;
|
|
70
|
-
/**
|
|
71
|
-
* Whether or not to create a new customer master key (CMK)
|
|
72
|
-
*
|
|
73
|
-
* Only applies to modern bootstrapping. Legacy bootstrapping will never create
|
|
74
|
-
* a CMK, only use the default S3 key.
|
|
75
|
-
*
|
|
76
|
-
* @default false
|
|
77
|
-
*/
|
|
78
|
-
readonly createCustomerMasterKey?: boolean;
|
|
79
|
-
/**
|
|
80
|
-
* The list of AWS account IDs that are trusted to deploy into the environment being bootstrapped.
|
|
81
|
-
*
|
|
82
|
-
* @default - only the bootstrapped account can deploy into this environment
|
|
83
|
-
*/
|
|
84
|
-
readonly trustedAccounts?: string[];
|
|
85
|
-
/**
|
|
86
|
-
* The list of AWS account IDs that are trusted to look up values in the environment being bootstrapped.
|
|
87
|
-
*
|
|
88
|
-
* @default - only the bootstrapped account can look up values in this environment
|
|
89
|
-
*/
|
|
90
|
-
readonly trustedAccountsForLookup?: string[];
|
|
91
|
-
/**
|
|
92
|
-
* The list of AWS account IDs that should not be trusted by the bootstrapped environment.
|
|
93
|
-
* If these accounts are already trusted, they will be removed on bootstrapping.
|
|
94
|
-
*
|
|
95
|
-
* @default - no account will be untrusted.
|
|
96
|
-
*/
|
|
97
|
-
readonly untrustedAccounts?: string[];
|
|
98
|
-
/**
|
|
99
|
-
* The ARNs of the IAM managed policies that should be attached to the role performing CloudFormation deployments.
|
|
100
|
-
* In most cases, this will be the AdministratorAccess policy.
|
|
101
|
-
* At least one policy is required if `trustedAccounts` were passed.
|
|
102
|
-
*
|
|
103
|
-
* @default - the role will have no policies attached
|
|
104
|
-
*/
|
|
105
|
-
readonly cloudFormationExecutionPolicies?: string[];
|
|
106
|
-
/**
|
|
107
|
-
* Identifier to distinguish multiple bootstrapped environments
|
|
108
|
-
*
|
|
109
|
-
* @default - Default qualifier
|
|
110
|
-
*/
|
|
111
|
-
readonly qualifier?: string;
|
|
112
|
-
/**
|
|
113
|
-
* Whether or not to enable S3 Staging Bucket Public Access Block Configuration
|
|
114
|
-
*
|
|
115
|
-
* @default true
|
|
116
|
-
*/
|
|
117
|
-
readonly publicAccessBlockConfiguration?: boolean;
|
|
118
|
-
/**
|
|
119
|
-
* Flag for using the default permissions boundary for bootstrapping
|
|
120
|
-
*
|
|
121
|
-
* @default - No value, optional argument
|
|
122
|
-
*/
|
|
123
|
-
readonly examplePermissionsBoundary?: boolean;
|
|
124
|
-
/**
|
|
125
|
-
* Name for the customer's custom permissions boundary for bootstrapping
|
|
126
|
-
*
|
|
127
|
-
* @default - No value, optional argument
|
|
128
|
-
*/
|
|
129
|
-
readonly customPermissionsBoundary?: string;
|
|
130
|
-
}
|