aws-cdk 2.1006.0 → 3.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -1
- package/THIRD_PARTY_LICENSES +104 -86
- package/build-info.json +2 -2
- package/db.json.gz +0 -0
- package/lib/api/aws-auth.d.ts +1 -0
- package/lib/api/{logs/index.js → aws-auth.js} +2 -3
- package/lib/api/bootstrap.d.ts +1 -0
- package/lib/api/bootstrap.js +18 -0
- package/lib/api/cloud-assembly.d.ts +1 -0
- package/lib/api/cloud-assembly.js +18 -0
- package/lib/api/cloudformation.d.ts +1 -0
- package/lib/api/cloudformation.js +18 -0
- package/lib/api/context.d.ts +1 -40
- package/lib/api/context.js +16 -80
- package/lib/api/deployments.d.ts +1 -0
- package/lib/api/deployments.js +18 -0
- package/lib/api/environment.d.ts +1 -0
- package/lib/api/environment.js +18 -0
- package/lib/api/garbage-collection.d.ts +1 -0
- package/lib/api/garbage-collection.js +18 -0
- package/lib/api/hotswap.d.ts +1 -0
- package/lib/api/hotswap.js +18 -0
- package/lib/api/index.d.ts +5 -1
- package/lib/api/index.js +6 -2
- package/lib/api/logs-monitor.d.ts +1 -0
- package/lib/api/logs-monitor.js +18 -0
- package/lib/api/notices.d.ts +1 -0
- package/lib/api/notices.js +18 -0
- package/lib/api/plugin.d.ts +1 -0
- package/lib/api/{resource-import/index.js → plugin.js} +2 -3
- package/lib/api/resource-import.d.ts +1 -0
- package/lib/api/resource-import.js +18 -0
- package/lib/api/rwlock.d.ts +1 -0
- package/lib/api/{garbage-collection/index.js → rwlock.js} +2 -2
- package/lib/api/settings.d.ts +1 -26
- package/lib/api/settings.js +16 -103
- package/lib/api/stack-events.d.ts +1 -0
- package/lib/api/stack-events.js +18 -0
- package/lib/api/tags.d.ts +1 -9
- package/lib/api/tags.js +16 -8
- package/lib/api/toolkit-info.d.ts +1 -52
- package/lib/api/toolkit-info.js +16 -152
- package/lib/api/tree.d.ts +1 -31
- package/lib/api/tree.js +16 -35
- package/lib/api/work-graph.d.ts +1 -0
- package/lib/api/work-graph.js +18 -0
- package/lib/api-private.d.ts +3 -0
- package/lib/api-private.js +22 -0
- package/lib/cli/cdk-toolkit.d.ts +20 -16
- package/lib/cli/cdk-toolkit.js +102 -37
- package/lib/cli/cli-config.js +2 -2
- package/lib/cli/cli.d.ts +1 -1
- package/lib/cli/cli.js +22 -19
- package/lib/cli/io-host/cli-io-host.js +2 -2
- package/lib/cli/pretty-print-error.js +3 -1
- package/lib/cli/util/npm.d.ts +4 -1
- package/lib/cli/util/npm.js +25 -13
- package/lib/cli/version.d.ts +1 -1
- package/lib/cli/version.js +21 -25
- package/lib/commands/context.js +3 -2
- package/lib/commands/diff.d.ts +1 -50
- package/lib/commands/diff.js +5 -213
- package/lib/commands/init/init.js +3 -2
- package/lib/commands/list-stacks.js +4 -4
- package/lib/context-providers/ami.d.ts +1 -13
- package/lib/context-providers/ami.js +16 -48
- package/lib/context-providers/availability-zones.d.ts +1 -13
- package/lib/context-providers/availability-zones.js +16 -25
- package/lib/context-providers/cc-api-provider.d.ts +1 -30
- package/lib/context-providers/cc-api-provider.js +16 -136
- package/lib/context-providers/endpoint-service-availability-zones.d.ts +1 -13
- package/lib/context-providers/endpoint-service-availability-zones.js +16 -31
- package/lib/context-providers/hosted-zones.d.ts +1 -12
- package/lib/context-providers/hosted-zones.js +16 -65
- package/lib/context-providers/index.d.ts +1 -44
- package/lib/context-providers/index.js +15 -126
- package/lib/context-providers/keys.d.ts +1 -13
- package/lib/context-providers/keys.js +16 -50
- package/lib/context-providers/load-balancers.d.ts +1 -20
- package/lib/context-providers/load-balancers.js +16 -154
- package/lib/context-providers/security-groups.d.ts +1 -9
- package/lib/context-providers/security-groups.js +16 -66
- package/lib/context-providers/ssm-parameters.d.ts +1 -25
- package/lib/context-providers/ssm-parameters.js +16 -57
- package/lib/context-providers/vpcs.d.ts +1 -13
- package/lib/context-providers/vpcs.js +16 -285
- package/lib/{api/cxapp → cxapp}/cloud-assembly.d.ts +3 -59
- package/lib/cxapp/cloud-assembly.js +108 -0
- package/lib/{api/cxapp → cxapp}/cloud-executable.d.ts +10 -3
- package/lib/cxapp/cloud-executable.js +92 -0
- package/lib/{api/cxapp → cxapp}/environments.d.ts +1 -2
- package/lib/{api/cxapp → cxapp}/environments.js +2 -2
- package/lib/cxapp/exec.d.ts +14 -0
- package/lib/cxapp/exec.js +157 -0
- package/lib/cxapp/index.d.ts +4 -0
- package/lib/{api/bootstrap → cxapp}/index.js +5 -3
- package/lib/index.js +134493 -125222
- package/lib/init-templates/.init-version.json +1 -1
- package/lib/init-templates/.recommended-feature-flags.json +3 -1
- package/lib/legacy-aws-auth.d.ts +74 -0
- package/lib/legacy-aws-auth.js +40 -0
- package/lib/legacy-exports-source.d.ts +13 -18
- package/lib/legacy-exports-source.js +42 -49
- package/lib/legacy-exports.d.ts +3 -6
- package/lib/legacy-exports.js +5 -5
- package/lib/legacy-types.d.ts +31 -0
- package/lib/legacy-types.js +3 -0
- package/package.json +19 -18
- package/lib/api/aws-auth/account-cache.d.ts +0 -36
- package/lib/api/aws-auth/account-cache.js +0 -99
- package/lib/api/aws-auth/awscli-compatible.d.ts +0 -42
- package/lib/api/aws-auth/awscli-compatible.js +0 -263
- package/lib/api/aws-auth/cached.d.ts +0 -11
- package/lib/api/aws-auth/cached.js +0 -26
- package/lib/api/aws-auth/credential-plugins.d.ts +0 -36
- package/lib/api/aws-auth/credential-plugins.js +0 -152
- package/lib/api/aws-auth/index.d.ts +0 -3
- package/lib/api/aws-auth/index.js +0 -20
- package/lib/api/aws-auth/provider-caching.d.ts +0 -13
- package/lib/api/aws-auth/provider-caching.js +0 -24
- package/lib/api/aws-auth/sdk-logger.d.ts +0 -69
- package/lib/api/aws-auth/sdk-logger.js +0 -124
- package/lib/api/aws-auth/sdk-provider.d.ts +0 -207
- package/lib/api/aws-auth/sdk-provider.js +0 -357
- package/lib/api/aws-auth/sdk.d.ts +0 -229
- package/lib/api/aws-auth/sdk.js +0 -373
- package/lib/api/aws-auth/tracing.d.ts +0 -11
- package/lib/api/aws-auth/tracing.js +0 -60
- package/lib/api/aws-auth/user-agent.d.ts +0 -7
- package/lib/api/aws-auth/user-agent.js +0 -20
- package/lib/api/aws-auth/util.d.ts +0 -6
- package/lib/api/aws-auth/util.js +0 -23
- package/lib/api/bootstrap/bootstrap-environment.d.ts +0 -35
- package/lib/api/bootstrap/bootstrap-environment.js +0 -321
- package/lib/api/bootstrap/bootstrap-props.d.ts +0 -130
- package/lib/api/bootstrap/bootstrap-props.js +0 -14
- package/lib/api/bootstrap/deploy-bootstrap.d.ts +0 -39
- package/lib/api/bootstrap/deploy-bootstrap.js +0 -141
- package/lib/api/bootstrap/index.d.ts +0 -2
- package/lib/api/bootstrap/legacy-template.d.ts +0 -2
- package/lib/api/bootstrap/legacy-template.js +0 -82
- package/lib/api/cloudformation/evaluate-cloudformation-template.d.ts +0 -85
- package/lib/api/cloudformation/evaluate-cloudformation-template.js +0 -440
- package/lib/api/cloudformation/index.d.ts +0 -4
- package/lib/api/cloudformation/index.js +0 -21
- package/lib/api/cloudformation/nested-stack-helpers.d.ts +0 -25
- package/lib/api/cloudformation/nested-stack-helpers.js +0 -86
- package/lib/api/cloudformation/stack-helpers.d.ts +0 -96
- package/lib/api/cloudformation/stack-helpers.js +0 -158
- package/lib/api/cloudformation/template-body-parameter.d.ts +0 -22
- package/lib/api/cloudformation/template-body-parameter.js +0 -104
- package/lib/api/cxapp/cloud-assembly.js +0 -304
- package/lib/api/cxapp/cloud-executable.js +0 -89
- package/lib/api/cxapp/exec.d.ts +0 -56
- package/lib/api/cxapp/exec.js +0 -272
- package/lib/api/deployments/asset-manifest-builder.d.ts +0 -8
- package/lib/api/deployments/asset-manifest-builder.js +0 -35
- package/lib/api/deployments/asset-publishing.d.ts +0 -60
- package/lib/api/deployments/asset-publishing.js +0 -141
- package/lib/api/deployments/assets.d.ts +0 -11
- package/lib/api/deployments/assets.js +0 -109
- package/lib/api/deployments/cfn-api.d.ts +0 -138
- package/lib/api/deployments/cfn-api.js +0 -438
- package/lib/api/deployments/checks.d.ts +0 -9
- package/lib/api/deployments/checks.js +0 -72
- package/lib/api/deployments/deploy-stack.d.ts +0 -155
- package/lib/api/deployments/deploy-stack.js +0 -478
- package/lib/api/deployments/deployment-method.d.ts +0 -24
- package/lib/api/deployments/deployment-method.js +0 -3
- package/lib/api/deployments/deployment-result.d.ts +0 -21
- package/lib/api/deployments/deployment-result.js +0 -10
- package/lib/api/deployments/deployments.d.ts +0 -296
- package/lib/api/deployments/deployments.js +0 -331
- package/lib/api/deployments/hotswap-deployments.d.ts +0 -17
- package/lib/api/deployments/hotswap-deployments.js +0 -441
- package/lib/api/deployments/index.d.ts +0 -4
- package/lib/api/deployments/index.js +0 -21
- package/lib/api/environment/environment-access.d.ts +0 -140
- package/lib/api/environment/environment-access.js +0 -202
- package/lib/api/environment/environment-resources.d.ts +0 -75
- package/lib/api/environment/environment-resources.js +0 -207
- package/lib/api/environment/index.d.ts +0 -3
- package/lib/api/environment/index.js +0 -20
- package/lib/api/environment/placeholders.d.ts +0 -10
- package/lib/api/environment/placeholders.js +0 -23
- package/lib/api/garbage-collection/garbage-collector.d.ts +0 -158
- package/lib/api/garbage-collection/garbage-collector.js +0 -599
- package/lib/api/garbage-collection/index.d.ts +0 -1
- package/lib/api/garbage-collection/progress-printer.d.ts +0 -23
- package/lib/api/garbage-collection/progress-printer.js +0 -70
- package/lib/api/garbage-collection/stack-refresh.d.ts +0 -49
- package/lib/api/garbage-collection/stack-refresh.js +0 -151
- package/lib/api/hotswap/appsync-mapping-templates.d.ts +0 -4
- package/lib/api/hotswap/appsync-mapping-templates.js +0 -162
- package/lib/api/hotswap/code-build-projects.d.ts +0 -4
- package/lib/api/hotswap/code-build-projects.js +0 -62
- package/lib/api/hotswap/common.d.ts +0 -89
- package/lib/api/hotswap/common.js +0 -128
- package/lib/api/hotswap/ecs-services.d.ts +0 -4
- package/lib/api/hotswap/ecs-services.js +0 -159
- package/lib/api/hotswap/lambda-functions.d.ts +0 -4
- package/lib/api/hotswap/lambda-functions.js +0 -297
- package/lib/api/hotswap/s3-bucket-deployments.d.ts +0 -5
- package/lib/api/hotswap/s3-bucket-deployments.js +0 -117
- package/lib/api/hotswap/stepfunctions-state-machines.d.ts +0 -4
- package/lib/api/hotswap/stepfunctions-state-machines.js +0 -48
- package/lib/api/logs/find-cloudwatch-logs.d.ts +0 -25
- package/lib/api/logs/find-cloudwatch-logs.js +0 -95
- package/lib/api/logs/index.d.ts +0 -2
- package/lib/api/logs/logs-monitor.d.ts +0 -76
- package/lib/api/logs/logs-monitor.js +0 -187
- package/lib/api/plugin/context-provider-plugin.d.ts +0 -6
- package/lib/api/plugin/context-provider-plugin.js +0 -7
- package/lib/api/plugin/index.d.ts +0 -3
- package/lib/api/plugin/index.js +0 -20
- package/lib/api/plugin/mode.d.ts +0 -4
- package/lib/api/plugin/mode.js +0 -9
- package/lib/api/plugin/plugin.d.ts +0 -63
- package/lib/api/plugin/plugin.js +0 -102
- package/lib/api/resource-import/importer.d.ts +0 -220
- package/lib/api/resource-import/importer.js +0 -331
- package/lib/api/resource-import/index.d.ts +0 -2
- package/lib/api/resource-import/migrator.d.ts +0 -26
- package/lib/api/resource-import/migrator.js +0 -71
- package/lib/api/stack-events/index.d.ts +0 -3
- package/lib/api/stack-events/index.js +0 -20
- package/lib/api/stack-events/stack-activity-monitor.d.ts +0 -100
- package/lib/api/stack-events/stack-activity-monitor.js +0 -142
- package/lib/api/stack-events/stack-event-poller.d.ts +0 -69
- package/lib/api/stack-events/stack-event-poller.js +0 -128
- package/lib/api/stack-events/stack-progress-monitor.d.ts +0 -48
- package/lib/api/stack-events/stack-progress-monitor.js +0 -94
- package/lib/api/stack-events/stack-status.d.ts +0 -42
- package/lib/api/stack-events/stack-status.js +0 -88
- package/lib/api/util/rwlock.d.ts +0 -65
- package/lib/api/util/rwlock.js +0 -179
- package/lib/api/work-graph/index.d.ts +0 -3
- package/lib/api/work-graph/index.js +0 -20
- package/lib/api/work-graph/work-graph-builder.d.ts +0 -34
- package/lib/api/work-graph/work-graph-builder.js +0 -168
- package/lib/api/work-graph/work-graph-types.d.ts +0 -50
- package/lib/api/work-graph/work-graph-types.js +0 -13
- package/lib/api/work-graph/work-graph.d.ts +0 -72
- package/lib/api/work-graph/work-graph.js +0 -346
- package/lib/cli/activity-printer/base.d.ts +0 -50
- package/lib/cli/activity-printer/base.js +0 -114
- package/lib/cli/activity-printer/current.d.ts +0 -26
- package/lib/cli/activity-printer/current.js +0 -118
- package/lib/cli/activity-printer/display.d.ts +0 -13
- package/lib/cli/activity-printer/display.js +0 -80
- package/lib/cli/activity-printer/history.d.ts +0 -32
- package/lib/cli/activity-printer/history.js +0 -108
- package/lib/cli/activity-printer/index.d.ts +0 -3
- package/lib/cli/activity-printer/index.js +0 -20
- package/lib/notices.d.ts +0 -203
- package/lib/notices.js +0 -411
|
@@ -1,140 +0,0 @@
|
|
|
1
|
-
import type * as cxapi from '@aws-cdk/cx-api';
|
|
2
|
-
import type { SDK } from '../aws-auth';
|
|
3
|
-
import type { EnvironmentResources } from './environment-resources';
|
|
4
|
-
import type { StringWithoutPlaceholders } from './placeholders';
|
|
5
|
-
import { type IoHelper } from '../../../../@aws-cdk/tmp-toolkit-helpers/src/api/io/private';
|
|
6
|
-
import type { SdkProvider } from '../aws-auth/sdk-provider';
|
|
7
|
-
/**
|
|
8
|
-
* Access particular AWS resources, based on information from the CX manifest
|
|
9
|
-
*
|
|
10
|
-
* It is not possible to grab direct access to AWS credentials; 9 times out of 10
|
|
11
|
-
* we have to allow for role assumption, and role assumption can only work if
|
|
12
|
-
* there is a CX Manifest that contains a role ARN.
|
|
13
|
-
*
|
|
14
|
-
* This class exists so new code isn't tempted to go and get SDK credentials directly.
|
|
15
|
-
*/
|
|
16
|
-
export declare class EnvironmentAccess {
|
|
17
|
-
private readonly sdkProvider;
|
|
18
|
-
private readonly sdkCache;
|
|
19
|
-
private readonly environmentResources;
|
|
20
|
-
private readonly ioHelper;
|
|
21
|
-
constructor(sdkProvider: SdkProvider, toolkitStackName: string, ioHelper: IoHelper);
|
|
22
|
-
/**
|
|
23
|
-
* Resolves the environment for a stack.
|
|
24
|
-
*/
|
|
25
|
-
resolveStackEnvironment(stack: cxapi.CloudFormationStackArtifact): Promise<cxapi.Environment>;
|
|
26
|
-
/**
|
|
27
|
-
* Get an SDK to access the given stack's environment for stack operations
|
|
28
|
-
*
|
|
29
|
-
* Will ask plugins for readonly credentials if available, use the default
|
|
30
|
-
* AWS credentials if not.
|
|
31
|
-
*
|
|
32
|
-
* Will assume the deploy role if configured on the stack. Check the default `deploy-role`
|
|
33
|
-
* policies to see what you can do with this role.
|
|
34
|
-
*/
|
|
35
|
-
accessStackForReadOnlyStackOperations(stack: cxapi.CloudFormationStackArtifact): Promise<TargetEnvironment>;
|
|
36
|
-
/**
|
|
37
|
-
* Get an SDK to access the given stack's environment for stack operations
|
|
38
|
-
*
|
|
39
|
-
* Will ask plugins for mutating credentials if available, use the default AWS
|
|
40
|
-
* credentials if not. The `mode` parameter is only used for querying
|
|
41
|
-
* plugins.
|
|
42
|
-
*
|
|
43
|
-
* Will assume the deploy role if configured on the stack. Check the default `deploy-role`
|
|
44
|
-
* policies to see what you can do with this role.
|
|
45
|
-
*/
|
|
46
|
-
accessStackForMutableStackOperations(stack: cxapi.CloudFormationStackArtifact): Promise<TargetEnvironment>;
|
|
47
|
-
/**
|
|
48
|
-
* Get an SDK to access the given stack's environment for environmental lookups
|
|
49
|
-
*
|
|
50
|
-
* Will use a plugin if available, use the default AWS credentials if not.
|
|
51
|
-
* The `mode` parameter is only used for querying plugins.
|
|
52
|
-
*
|
|
53
|
-
* Will assume the lookup role if configured on the stack. Check the default `lookup-role`
|
|
54
|
-
* policies to see what you can do with this role. It can generally read everything
|
|
55
|
-
* in the account that does not require KMS access.
|
|
56
|
-
*
|
|
57
|
-
* ---
|
|
58
|
-
*
|
|
59
|
-
* For backwards compatibility reasons, there are some scenarios that are handled here:
|
|
60
|
-
*
|
|
61
|
-
* 1. The lookup role may not exist (it was added in bootstrap stack version 7). If so:
|
|
62
|
-
* a. Return the default credentials if the default credentials are for the stack account
|
|
63
|
-
* (you will notice this as `isFallbackCredentials=true`).
|
|
64
|
-
* b. Throw an error if the default credentials are not for the stack account.
|
|
65
|
-
*
|
|
66
|
-
* 2. The lookup role may not have the correct permissions (for example, ReadOnlyAccess was added in
|
|
67
|
-
* bootstrap stack version 8); the stack will have a minimum version number on it.
|
|
68
|
-
* a. If it does not we throw an error which should be handled in the calling
|
|
69
|
-
* function (and fallback to use a different role, etc)
|
|
70
|
-
*
|
|
71
|
-
* Upon success, caller will have an SDK for the right account, which may or may not have
|
|
72
|
-
* the right permissions.
|
|
73
|
-
*/
|
|
74
|
-
accessStackForLookup(stack: cxapi.CloudFormationStackArtifact): Promise<TargetEnvironment>;
|
|
75
|
-
/**
|
|
76
|
-
* Get an SDK to access the given stack's environment for reading stack attributes
|
|
77
|
-
*
|
|
78
|
-
* Will use a plugin if available, use the default AWS credentials if not.
|
|
79
|
-
* The `mode` parameter is only used for querying plugins.
|
|
80
|
-
*
|
|
81
|
-
* Will try to assume the lookup role if given, will use the regular stack operations
|
|
82
|
-
* access (deploy-role) otherwise. When calling this, you should assume that you will get
|
|
83
|
-
* the least privileged role, so don't try to use it for anything the `deploy-role`
|
|
84
|
-
* wouldn't be able to do. Also you cannot rely on being able to read encrypted anything.
|
|
85
|
-
*/
|
|
86
|
-
accessStackForLookupBestEffort(stack: cxapi.CloudFormationStackArtifact): Promise<TargetEnvironment>;
|
|
87
|
-
/**
|
|
88
|
-
* Get an SDK to access the given stack's environment for stack operations
|
|
89
|
-
*
|
|
90
|
-
* Will use a plugin if available, use the default AWS credentials if not.
|
|
91
|
-
* The `mode` parameter is only used for querying plugins.
|
|
92
|
-
*
|
|
93
|
-
* Will assume the deploy role if configured on the stack. Check the default `deploy-role`
|
|
94
|
-
* policies to see what you can do with this role.
|
|
95
|
-
*/
|
|
96
|
-
private accessStackForStackOperations;
|
|
97
|
-
/**
|
|
98
|
-
* Prepare an SDK for use in the given environment and optionally with a role assumed.
|
|
99
|
-
*/
|
|
100
|
-
private prepareSdk;
|
|
101
|
-
private cachedSdkForEnvironment;
|
|
102
|
-
}
|
|
103
|
-
/**
|
|
104
|
-
* SDK obtained by assuming the deploy role
|
|
105
|
-
* for a given environment
|
|
106
|
-
*/
|
|
107
|
-
export interface TargetEnvironment {
|
|
108
|
-
/**
|
|
109
|
-
* The SDK for the given environment
|
|
110
|
-
*/
|
|
111
|
-
readonly sdk: SDK;
|
|
112
|
-
/**
|
|
113
|
-
* The resolved environment for the stack
|
|
114
|
-
* (no more 'unknown-account/unknown-region')
|
|
115
|
-
*/
|
|
116
|
-
readonly resolvedEnvironment: cxapi.Environment;
|
|
117
|
-
/**
|
|
118
|
-
* Access class for environmental resources to help the deployment
|
|
119
|
-
*/
|
|
120
|
-
readonly resources: EnvironmentResources;
|
|
121
|
-
/**
|
|
122
|
-
* Whether or not we assumed a role in the process of getting these credentials
|
|
123
|
-
*/
|
|
124
|
-
readonly didAssumeRole: boolean;
|
|
125
|
-
/**
|
|
126
|
-
* Whether or not these are fallback credentials
|
|
127
|
-
*
|
|
128
|
-
* Fallback credentials means that assuming the intended role failed, but the
|
|
129
|
-
* base credentials happen to be for the right account so we just picked those
|
|
130
|
-
* and hope the future SDK calls succeed.
|
|
131
|
-
*
|
|
132
|
-
* This is a backwards compatibility mechanism from around the time we introduced
|
|
133
|
-
* deployment roles.
|
|
134
|
-
*/
|
|
135
|
-
readonly isFallbackCredentials: boolean;
|
|
136
|
-
/**
|
|
137
|
-
* Replace environment placeholders according to the current environment
|
|
138
|
-
*/
|
|
139
|
-
replacePlaceholders(x: string | undefined): Promise<StringWithoutPlaceholders | undefined>;
|
|
140
|
-
}
|
|
@@ -1,202 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.EnvironmentAccess = void 0;
|
|
4
|
-
const environment_resources_1 = require("./environment-resources");
|
|
5
|
-
const placeholders_1 = require("./placeholders");
|
|
6
|
-
const api_1 = require("../../../../@aws-cdk/tmp-toolkit-helpers/src/api");
|
|
7
|
-
const private_1 = require("../../../../@aws-cdk/tmp-toolkit-helpers/src/api/io/private");
|
|
8
|
-
const util_1 = require("../../util");
|
|
9
|
-
const mode_1 = require("../plugin/mode");
|
|
10
|
-
/**
|
|
11
|
-
* Access particular AWS resources, based on information from the CX manifest
|
|
12
|
-
*
|
|
13
|
-
* It is not possible to grab direct access to AWS credentials; 9 times out of 10
|
|
14
|
-
* we have to allow for role assumption, and role assumption can only work if
|
|
15
|
-
* there is a CX Manifest that contains a role ARN.
|
|
16
|
-
*
|
|
17
|
-
* This class exists so new code isn't tempted to go and get SDK credentials directly.
|
|
18
|
-
*/
|
|
19
|
-
class EnvironmentAccess {
|
|
20
|
-
constructor(sdkProvider, toolkitStackName, ioHelper) {
|
|
21
|
-
this.sdkProvider = sdkProvider;
|
|
22
|
-
this.sdkCache = new Map();
|
|
23
|
-
this.environmentResources = new environment_resources_1.EnvironmentResourcesRegistry(toolkitStackName);
|
|
24
|
-
this.ioHelper = ioHelper;
|
|
25
|
-
}
|
|
26
|
-
/**
|
|
27
|
-
* Resolves the environment for a stack.
|
|
28
|
-
*/
|
|
29
|
-
async resolveStackEnvironment(stack) {
|
|
30
|
-
return this.sdkProvider.resolveEnvironment(stack.environment);
|
|
31
|
-
}
|
|
32
|
-
/**
|
|
33
|
-
* Get an SDK to access the given stack's environment for stack operations
|
|
34
|
-
*
|
|
35
|
-
* Will ask plugins for readonly credentials if available, use the default
|
|
36
|
-
* AWS credentials if not.
|
|
37
|
-
*
|
|
38
|
-
* Will assume the deploy role if configured on the stack. Check the default `deploy-role`
|
|
39
|
-
* policies to see what you can do with this role.
|
|
40
|
-
*/
|
|
41
|
-
async accessStackForReadOnlyStackOperations(stack) {
|
|
42
|
-
return this.accessStackForStackOperations(stack, mode_1.Mode.ForReading);
|
|
43
|
-
}
|
|
44
|
-
/**
|
|
45
|
-
* Get an SDK to access the given stack's environment for stack operations
|
|
46
|
-
*
|
|
47
|
-
* Will ask plugins for mutating credentials if available, use the default AWS
|
|
48
|
-
* credentials if not. The `mode` parameter is only used for querying
|
|
49
|
-
* plugins.
|
|
50
|
-
*
|
|
51
|
-
* Will assume the deploy role if configured on the stack. Check the default `deploy-role`
|
|
52
|
-
* policies to see what you can do with this role.
|
|
53
|
-
*/
|
|
54
|
-
async accessStackForMutableStackOperations(stack) {
|
|
55
|
-
return this.accessStackForStackOperations(stack, mode_1.Mode.ForWriting);
|
|
56
|
-
}
|
|
57
|
-
/**
|
|
58
|
-
* Get an SDK to access the given stack's environment for environmental lookups
|
|
59
|
-
*
|
|
60
|
-
* Will use a plugin if available, use the default AWS credentials if not.
|
|
61
|
-
* The `mode` parameter is only used for querying plugins.
|
|
62
|
-
*
|
|
63
|
-
* Will assume the lookup role if configured on the stack. Check the default `lookup-role`
|
|
64
|
-
* policies to see what you can do with this role. It can generally read everything
|
|
65
|
-
* in the account that does not require KMS access.
|
|
66
|
-
*
|
|
67
|
-
* ---
|
|
68
|
-
*
|
|
69
|
-
* For backwards compatibility reasons, there are some scenarios that are handled here:
|
|
70
|
-
*
|
|
71
|
-
* 1. The lookup role may not exist (it was added in bootstrap stack version 7). If so:
|
|
72
|
-
* a. Return the default credentials if the default credentials are for the stack account
|
|
73
|
-
* (you will notice this as `isFallbackCredentials=true`).
|
|
74
|
-
* b. Throw an error if the default credentials are not for the stack account.
|
|
75
|
-
*
|
|
76
|
-
* 2. The lookup role may not have the correct permissions (for example, ReadOnlyAccess was added in
|
|
77
|
-
* bootstrap stack version 8); the stack will have a minimum version number on it.
|
|
78
|
-
* a. If it does not we throw an error which should be handled in the calling
|
|
79
|
-
* function (and fallback to use a different role, etc)
|
|
80
|
-
*
|
|
81
|
-
* Upon success, caller will have an SDK for the right account, which may or may not have
|
|
82
|
-
* the right permissions.
|
|
83
|
-
*/
|
|
84
|
-
async accessStackForLookup(stack) {
|
|
85
|
-
if (!stack.environment) {
|
|
86
|
-
throw new api_1.ToolkitError(`The stack ${stack.displayName} does not have an environment`);
|
|
87
|
-
}
|
|
88
|
-
const lookupEnv = await this.prepareSdk({
|
|
89
|
-
environment: stack.environment,
|
|
90
|
-
mode: mode_1.Mode.ForReading,
|
|
91
|
-
assumeRoleArn: stack.lookupRole?.arn,
|
|
92
|
-
assumeRoleExternalId: stack.lookupRole?.assumeRoleExternalId,
|
|
93
|
-
assumeRoleAdditionalOptions: stack.lookupRole?.assumeRoleAdditionalOptions,
|
|
94
|
-
});
|
|
95
|
-
// if we succeed in assuming the lookup role, make sure we have the correct bootstrap stack version
|
|
96
|
-
if (lookupEnv.didAssumeRole && stack.lookupRole?.bootstrapStackVersionSsmParameter && stack.lookupRole.requiresBootstrapStackVersion) {
|
|
97
|
-
const version = await lookupEnv.resources.versionFromSsmParameter(stack.lookupRole.bootstrapStackVersionSsmParameter);
|
|
98
|
-
if (version < stack.lookupRole.requiresBootstrapStackVersion) {
|
|
99
|
-
throw new api_1.ToolkitError(`Bootstrap stack version '${stack.lookupRole.requiresBootstrapStackVersion}' is required, found version '${version}'. To get rid of this error, please upgrade to bootstrap version >= ${stack.lookupRole.requiresBootstrapStackVersion}`);
|
|
100
|
-
}
|
|
101
|
-
}
|
|
102
|
-
if (lookupEnv.isFallbackCredentials) {
|
|
103
|
-
const arn = await lookupEnv.replacePlaceholders(stack.lookupRole?.arn);
|
|
104
|
-
await this.ioHelper.notify(private_1.IO.DEFAULT_TOOLKIT_WARN.msg(`Lookup role ${arn} was not assumed. Proceeding with default credentials.`));
|
|
105
|
-
}
|
|
106
|
-
return lookupEnv;
|
|
107
|
-
}
|
|
108
|
-
/**
|
|
109
|
-
* Get an SDK to access the given stack's environment for reading stack attributes
|
|
110
|
-
*
|
|
111
|
-
* Will use a plugin if available, use the default AWS credentials if not.
|
|
112
|
-
* The `mode` parameter is only used for querying plugins.
|
|
113
|
-
*
|
|
114
|
-
* Will try to assume the lookup role if given, will use the regular stack operations
|
|
115
|
-
* access (deploy-role) otherwise. When calling this, you should assume that you will get
|
|
116
|
-
* the least privileged role, so don't try to use it for anything the `deploy-role`
|
|
117
|
-
* wouldn't be able to do. Also you cannot rely on being able to read encrypted anything.
|
|
118
|
-
*/
|
|
119
|
-
async accessStackForLookupBestEffort(stack) {
|
|
120
|
-
if (!stack.environment) {
|
|
121
|
-
throw new api_1.ToolkitError(`The stack ${stack.displayName} does not have an environment`);
|
|
122
|
-
}
|
|
123
|
-
try {
|
|
124
|
-
return await this.accessStackForLookup(stack);
|
|
125
|
-
}
|
|
126
|
-
catch (e) {
|
|
127
|
-
await this.ioHelper.notify(private_1.IO.DEFAULT_TOOLKIT_WARN.msg(`${(0, util_1.formatErrorMessage)(e)}`));
|
|
128
|
-
}
|
|
129
|
-
return this.accessStackForStackOperations(stack, mode_1.Mode.ForReading);
|
|
130
|
-
}
|
|
131
|
-
/**
|
|
132
|
-
* Get an SDK to access the given stack's environment for stack operations
|
|
133
|
-
*
|
|
134
|
-
* Will use a plugin if available, use the default AWS credentials if not.
|
|
135
|
-
* The `mode` parameter is only used for querying plugins.
|
|
136
|
-
*
|
|
137
|
-
* Will assume the deploy role if configured on the stack. Check the default `deploy-role`
|
|
138
|
-
* policies to see what you can do with this role.
|
|
139
|
-
*/
|
|
140
|
-
async accessStackForStackOperations(stack, mode) {
|
|
141
|
-
if (!stack.environment) {
|
|
142
|
-
throw new api_1.ToolkitError(`The stack ${stack.displayName} does not have an environment`);
|
|
143
|
-
}
|
|
144
|
-
return this.prepareSdk({
|
|
145
|
-
environment: stack.environment,
|
|
146
|
-
mode,
|
|
147
|
-
assumeRoleArn: stack.assumeRoleArn,
|
|
148
|
-
assumeRoleExternalId: stack.assumeRoleExternalId,
|
|
149
|
-
assumeRoleAdditionalOptions: stack.assumeRoleAdditionalOptions,
|
|
150
|
-
});
|
|
151
|
-
}
|
|
152
|
-
/**
|
|
153
|
-
* Prepare an SDK for use in the given environment and optionally with a role assumed.
|
|
154
|
-
*/
|
|
155
|
-
async prepareSdk(options) {
|
|
156
|
-
const resolvedEnvironment = await this.sdkProvider.resolveEnvironment(options.environment);
|
|
157
|
-
// Substitute any placeholders with information about the current environment
|
|
158
|
-
const { assumeRoleArn } = await (0, placeholders_1.replaceEnvPlaceholders)({
|
|
159
|
-
assumeRoleArn: options.assumeRoleArn,
|
|
160
|
-
}, resolvedEnvironment, this.sdkProvider);
|
|
161
|
-
const stackSdk = await this.cachedSdkForEnvironment(resolvedEnvironment, options.mode, {
|
|
162
|
-
assumeRoleArn,
|
|
163
|
-
assumeRoleExternalId: options.assumeRoleExternalId,
|
|
164
|
-
assumeRoleAdditionalOptions: options.assumeRoleAdditionalOptions,
|
|
165
|
-
});
|
|
166
|
-
return {
|
|
167
|
-
sdk: stackSdk.sdk,
|
|
168
|
-
resolvedEnvironment,
|
|
169
|
-
resources: this.environmentResources.for(resolvedEnvironment, stackSdk.sdk, this.ioHelper),
|
|
170
|
-
// If we asked for a role, did not successfully assume it, and yet got here without an exception: that
|
|
171
|
-
// means we must have fallback credentials.
|
|
172
|
-
isFallbackCredentials: !stackSdk.didAssumeRole && !!assumeRoleArn,
|
|
173
|
-
didAssumeRole: stackSdk.didAssumeRole,
|
|
174
|
-
replacePlaceholders: async (str) => {
|
|
175
|
-
const ret = await (0, placeholders_1.replaceEnvPlaceholders)({ str }, resolvedEnvironment, this.sdkProvider);
|
|
176
|
-
return ret.str;
|
|
177
|
-
},
|
|
178
|
-
};
|
|
179
|
-
}
|
|
180
|
-
async cachedSdkForEnvironment(environment, mode, options) {
|
|
181
|
-
const cacheKeyElements = [
|
|
182
|
-
environment.account,
|
|
183
|
-
environment.region,
|
|
184
|
-
`${mode}`,
|
|
185
|
-
options?.assumeRoleArn ?? '',
|
|
186
|
-
options?.assumeRoleExternalId ?? '',
|
|
187
|
-
];
|
|
188
|
-
if (options?.assumeRoleAdditionalOptions) {
|
|
189
|
-
cacheKeyElements.push(JSON.stringify(options.assumeRoleAdditionalOptions));
|
|
190
|
-
}
|
|
191
|
-
const cacheKey = cacheKeyElements.join(':');
|
|
192
|
-
const existing = this.sdkCache.get(cacheKey);
|
|
193
|
-
if (existing) {
|
|
194
|
-
return existing;
|
|
195
|
-
}
|
|
196
|
-
const ret = await this.sdkProvider.forEnvironment(environment, mode, options);
|
|
197
|
-
this.sdkCache.set(cacheKey, ret);
|
|
198
|
-
return ret;
|
|
199
|
-
}
|
|
200
|
-
}
|
|
201
|
-
exports.EnvironmentAccess = EnvironmentAccess;
|
|
202
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"environment-access.js","sourceRoot":"","sources":["environment-access.ts"],"names":[],"mappings":";;;AAGA,mEAAuE;AAEvE,iDAAwD;AACxD,0EAAgF;AAChF,yFAAgG;AAChG,qCAAgD;AAEhD,yCAAsC;AAEtC;;;;;;;;GAQG;AACH,MAAa,iBAAiB;IAK5B,YAA6B,WAAwB,EAAE,gBAAwB,EAAE,QAAkB;QAAtE,gBAAW,GAAX,WAAW,CAAa;QAJpC,aAAQ,GAAG,IAAI,GAAG,EAA6B,CAAC;QAK/D,IAAI,CAAC,oBAAoB,GAAG,IAAI,oDAA4B,CAAC,gBAAgB,CAAC,CAAC;QAC/E,IAAI,CAAC,QAAQ,GAAG,QAAQ,CAAC;IAC3B,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,uBAAuB,CAAC,KAAwC;QAC3E,OAAO,IAAI,CAAC,WAAW,CAAC,kBAAkB,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC;IAChE,CAAC;IAED;;;;;;;;OAQG;IACI,KAAK,CAAC,qCAAqC,CAAC,KAAwC;QACzF,OAAO,IAAI,CAAC,6BAA6B,CAAC,KAAK,EAAE,WAAI,CAAC,UAAU,CAAC,CAAC;IACpE,CAAC;IAED;;;;;;;;;OASG;IACI,KAAK,CAAC,oCAAoC,CAAC,KAAwC;QACxF,OAAO,IAAI,CAAC,6BAA6B,CAAC,KAAK,EAAE,WAAI,CAAC,UAAU,CAAC,CAAC;IACpE,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;;;;;OA0BG;IACI,KAAK,CAAC,oBAAoB,CAAC,KAAwC;QACxE,IAAI,CAAC,KAAK,CAAC,WAAW,EAAE,CAAC;YACvB,MAAM,IAAI,kBAAY,CAAC,aAAa,KAAK,CAAC,WAAW,+BAA+B,CAAC,CAAC;QACxF,CAAC;QAED,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC;YACtC,WAAW,EAAE,KAAK,CAAC,WAAW;YAC9B,IAAI,EAAE,WAAI,CAAC,UAAU;YACrB,aAAa,EAAE,KAAK,CAAC,UAAU,EAAE,GAAG;YACpC,oBAAoB,EAAE,KAAK,CAAC,UAAU,EAAE,oBAAoB;YAC5D,2BAA2B,EAAE,KAAK,CAAC,UAAU,EAAE,2BAA2B;SAC3E,CAAC,CAAC;QAEH,mGAAmG;QACnG,IAAI,SAAS,CAAC,aAAa,IAAI,KAAK,CAAC,UAAU,EAAE,iCAAiC,IAAI,KAAK,CAAC,UAAU,CAAC,6BAA6B,EAAE,CAAC;YACrI,MAAM,OAAO,GAAG,MAAM,SAAS,CAAC,SAAS,CAAC,uBAAuB,CAAC,KAAK,CAAC,UAAU,CAAC,iCAAiC,CAAC,CAAC;YACtH,IAAI,OAAO,GAAG,KAAK,CAAC,UAAU,CAAC,6BAA6B,EAAE,CAAC;gBAC7D,MAAM,IAAI,kBAAY,CAAC,4BAA4B,KAAK,CAAC,UAAU,CAAC,6BAA6B,iCAAiC,OAAO,uEAAuE,KAAK,CAAC,UAAU,CAAC,6BAA6B,EAAE,CAAC,CAAC;YACpQ,CAAC;QACH,CAAC;QACD,IAAI,SAAS,CAAC,qBAAqB,EAAE,CAAC;YACpC,MAAM,GAAG,GAAG,MAAM,SAAS,CAAC,mBAAmB,CAAC,KAAK,CAAC,UAAU,EAAE,GAAG,CAAC,CAAC;YACvE,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,YAAE,CAAC,oBAAoB,CAAC,GAAG,CAAC,eAAe,GAAG,wDAAwD,CAAC,CAAC,CAAC;QACtI,CAAC;QACD,OAAO,SAAS,CAAC;IACnB,CAAC;IAED;;;;;;;;;;OAUG;IACI,KAAK,CAAC,8BAA8B,CAAC,KAAwC;QAClF,IAAI,CAAC,KAAK,CAAC,WAAW,EAAE,CAAC;YACvB,MAAM,IAAI,kBAAY,CAAC,aAAa,KAAK,CAAC,WAAW,+BAA+B,CAAC,CAAC;QACxF,CAAC;QAED,IAAI,CAAC;YACH,OAAO,MAAM,IAAI,CAAC,oBAAoB,CAAC,KAAK,CAAC,CAAC;QAChD,CAAC;QAAC,OAAO,CAAM,EAAE,CAAC;YAChB,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,YAAE,CAAC,oBAAoB,CAAC,GAAG,CAAC,GAAG,IAAA,yBAAkB,EAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC;QACtF,CAAC;QACD,OAAO,IAAI,CAAC,6BAA6B,CAAC,KAAK,EAAE,WAAI,CAAC,UAAU,CAAC,CAAC;IACpE,CAAC;IAED;;;;;;;;OAQG;IACK,KAAK,CAAC,6BAA6B,CAAC,KAAwC,EAAE,IAAU;QAC9F,IAAI,CAAC,KAAK,CAAC,WAAW,EAAE,CAAC;YACvB,MAAM,IAAI,kBAAY,CAAC,aAAa,KAAK,CAAC,WAAW,+BAA+B,CAAC,CAAC;QACxF,CAAC;QAED,OAAO,IAAI,CAAC,UAAU,CAAC;YACrB,WAAW,EAAE,KAAK,CAAC,WAAW;YAC9B,IAAI;YACJ,aAAa,EAAE,KAAK,CAAC,aAAa;YAClC,oBAAoB,EAAE,KAAK,CAAC,oBAAoB;YAChD,2BAA2B,EAAE,KAAK,CAAC,2BAA2B;SAC/D,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,UAAU,CACtB,OAA8B;QAE9B,MAAM,mBAAmB,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,kBAAkB,CAAC,OAAO,CAAC,WAAW,CAAC,CAAC;QAE3F,6EAA6E;QAC7E,MAAM,EAAE,aAAa,EAAE,GAAG,MAAM,IAAA,qCAAsB,EAAC;YACrD,aAAa,EAAE,OAAO,CAAC,aAAa;SACrC,EAAE,mBAAmB,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC;QAE1C,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,uBAAuB,CAAC,mBAAmB,EAAE,OAAO,CAAC,IAAI,EAAE;YACrF,aAAa;YACb,oBAAoB,EAAE,OAAO,CAAC,oBAAoB;YAClD,2BAA2B,EAAE,OAAO,CAAC,2BAA2B;SACjE,CAAC,CAAC;QAEH,OAAO;YACL,GAAG,EAAE,QAAQ,CAAC,GAAG;YACjB,mBAAmB;YACnB,SAAS,EAAE,IAAI,CAAC,oBAAoB,CAAC,GAAG,CAAC,mBAAmB,EAAE,QAAQ,CAAC,GAAG,EAAE,IAAI,CAAC,QAAQ,CAAC;YAC1F,sGAAsG;YACtG,2CAA2C;YAC3C,qBAAqB,EAAE,CAAC,QAAQ,CAAC,aAAa,IAAI,CAAC,CAAC,aAAa;YACjE,aAAa,EAAE,QAAQ,CAAC,aAAa;YACrC,mBAAmB,EAAE,KAAK,EAAgC,GAAM,EAAE,EAAE;gBAClE,MAAM,GAAG,GAAG,MAAM,IAAA,qCAAsB,EAAC,EAAE,GAAG,EAAE,EAAE,mBAAmB,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC;gBACzF,OAAO,GAAG,CAAC,GAAG,CAAC;YACjB,CAAC;SACF,CAAC;IACJ,CAAC;IAEO,KAAK,CAAC,uBAAuB,CACnC,WAA8B,EAC9B,IAAU,EACV,OAA4B;QAE5B,MAAM,gBAAgB,GAAG;YACvB,WAAW,CAAC,OAAO;YACnB,WAAW,CAAC,MAAM;YAClB,GAAG,IAAI,EAAE;YACT,OAAO,EAAE,aAAa,IAAI,EAAE;YAC5B,OAAO,EAAE,oBAAoB,IAAI,EAAE;SACpC,CAAC;QAEF,IAAI,OAAO,EAAE,2BAA2B,EAAE,CAAC;YACzC,gBAAgB,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,OAAO,CAAC,2BAA2B,CAAC,CAAC,CAAC;QAC7E,CAAC;QAED,MAAM,QAAQ,GAAG,gBAAgB,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QAC5C,MAAM,QAAQ,GAAG,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;QAC7C,IAAI,QAAQ,EAAE,CAAC;YACb,OAAO,QAAQ,CAAC;QAClB,CAAC;QACD,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,cAAc,CAAC,WAAW,EAAE,IAAI,EAAE,OAAO,CAAC,CAAC;QAC9E,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,QAAQ,EAAE,GAAG,CAAC,CAAC;QACjC,OAAO,GAAG,CAAC;IACb,CAAC;CACF;AA7MD,8CA6MC","sourcesContent":["import type * as cxapi from '@aws-cdk/cx-api';\nimport type { SDK } from '../aws-auth';\nimport type { EnvironmentResources } from './environment-resources';\nimport { EnvironmentResourcesRegistry } from './environment-resources';\nimport type { StringWithoutPlaceholders } from './placeholders';\nimport { replaceEnvPlaceholders } from './placeholders';\nimport { ToolkitError } from '../../../../@aws-cdk/tmp-toolkit-helpers/src/api';\nimport { IO, type IoHelper } from '../../../../@aws-cdk/tmp-toolkit-helpers/src/api/io/private';\nimport { formatErrorMessage } from '../../util';\nimport type { CredentialsOptions, SdkForEnvironment, SdkProvider } from '../aws-auth/sdk-provider';\nimport { Mode } from '../plugin/mode';\n\n/**\n * Access particular AWS resources, based on information from the CX manifest\n *\n * It is not possible to grab direct access to AWS credentials; 9 times out of 10\n * we have to allow for role assumption, and role assumption can only work if\n * there is a CX Manifest that contains a role ARN.\n *\n * This class exists so new code isn't tempted to go and get SDK credentials directly.\n */\nexport class EnvironmentAccess {\n  private readonly sdkCache = new Map<string, SdkForEnvironment>();\n  private readonly environmentResources: EnvironmentResourcesRegistry;\n  private readonly ioHelper: IoHelper;\n\n  constructor(private readonly sdkProvider: SdkProvider, toolkitStackName: string, ioHelper: IoHelper) {\n    this.environmentResources = new EnvironmentResourcesRegistry(toolkitStackName);\n    this.ioHelper = ioHelper;\n  }\n\n  /**\n   * Resolves the environment for a stack.\n   */\n  public async resolveStackEnvironment(stack: cxapi.CloudFormationStackArtifact): Promise<cxapi.Environment> {\n    return this.sdkProvider.resolveEnvironment(stack.environment);\n  }\n\n  /**\n   * Get an SDK to access the given stack's environment for stack operations\n   *\n   * Will ask plugins for readonly credentials if available, use the default\n   * AWS credentials if not.\n   *\n   * Will assume the deploy role if configured on the stack. Check the default `deploy-role`\n   * policies to see what you can do with this role.\n   */\n  public async accessStackForReadOnlyStackOperations(stack: cxapi.CloudFormationStackArtifact): Promise<TargetEnvironment> {\n    return this.accessStackForStackOperations(stack, Mode.ForReading);\n  }\n\n  /**\n   * Get an SDK to access the given stack's environment for stack operations\n   *\n   * Will ask plugins for mutating credentials if available, use the default AWS\n   * credentials if not.  The `mode` parameter is only used for querying\n   * plugins.\n   *\n   * Will assume the deploy role if configured on the stack. Check the default `deploy-role`\n   * policies to see what you can do with this role.\n   */\n  public async accessStackForMutableStackOperations(stack: cxapi.CloudFormationStackArtifact): Promise<TargetEnvironment> {\n    return this.accessStackForStackOperations(stack, Mode.ForWriting);\n  }\n\n  /**\n   * Get an SDK to access the given stack's environment for environmental lookups\n   *\n   * Will use a plugin if available, use the default AWS credentials if not.\n   * The `mode` parameter is only used for querying plugins.\n   *\n   * Will assume the lookup role if configured on the stack. Check the default `lookup-role`\n   * policies to see what you can do with this role. It can generally read everything\n   * in the account that does not require KMS access.\n   *\n   * ---\n   *\n   * For backwards compatibility reasons, there are some scenarios that are handled here:\n   *\n   *  1. The lookup role may not exist (it was added in bootstrap stack version 7). If so:\n   *     a. Return the default credentials if the default credentials are for the stack account\n   *        (you will notice this as `isFallbackCredentials=true`).\n   *     b. Throw an error if the default credentials are not for the stack account.\n   *\n   *  2. The lookup role may not have the correct permissions (for example, ReadOnlyAccess was added in\n   *     bootstrap stack version 8); the stack will have a minimum version number on it.\n   *     a. If it does not we throw an error which should be handled in the calling\n   *        function (and fallback to use a different role, etc)\n   *\n   * Upon success, caller will have an SDK for the right account, which may or may not have\n   * the right permissions.\n   */\n  public async accessStackForLookup(stack: cxapi.CloudFormationStackArtifact): Promise<TargetEnvironment> {\n    if (!stack.environment) {\n      throw new ToolkitError(`The stack ${stack.displayName} does not have an environment`);\n    }\n\n    const lookupEnv = await this.prepareSdk({\n      environment: stack.environment,\n      mode: Mode.ForReading,\n      assumeRoleArn: stack.lookupRole?.arn,\n      assumeRoleExternalId: stack.lookupRole?.assumeRoleExternalId,\n      assumeRoleAdditionalOptions: stack.lookupRole?.assumeRoleAdditionalOptions,\n    });\n\n    // if we succeed in assuming the lookup role, make sure we have the correct bootstrap stack version\n    if (lookupEnv.didAssumeRole && stack.lookupRole?.bootstrapStackVersionSsmParameter && stack.lookupRole.requiresBootstrapStackVersion) {\n      const version = await lookupEnv.resources.versionFromSsmParameter(stack.lookupRole.bootstrapStackVersionSsmParameter);\n      if (version < stack.lookupRole.requiresBootstrapStackVersion) {\n        throw new ToolkitError(`Bootstrap stack version '${stack.lookupRole.requiresBootstrapStackVersion}' is required, found version '${version}'. To get rid of this error, please upgrade to bootstrap version >= ${stack.lookupRole.requiresBootstrapStackVersion}`);\n      }\n    }\n    if (lookupEnv.isFallbackCredentials) {\n      const arn = await lookupEnv.replacePlaceholders(stack.lookupRole?.arn);\n      await this.ioHelper.notify(IO.DEFAULT_TOOLKIT_WARN.msg(`Lookup role ${arn} was not assumed. Proceeding with default credentials.`));\n    }\n    return lookupEnv;\n  }\n\n  /**\n   * Get an SDK to access the given stack's environment for reading stack attributes\n   *\n   * Will use a plugin if available, use the default AWS credentials if not.\n   * The `mode` parameter is only used for querying plugins.\n   *\n   * Will try to assume the lookup role if given, will use the regular stack operations\n   * access (deploy-role) otherwise. When calling this, you should assume that you will get\n   * the least privileged role, so don't try to use it for anything the `deploy-role`\n   * wouldn't be able to do. Also you cannot rely on being able to read encrypted anything.\n   */\n  public async accessStackForLookupBestEffort(stack: cxapi.CloudFormationStackArtifact): Promise<TargetEnvironment> {\n    if (!stack.environment) {\n      throw new ToolkitError(`The stack ${stack.displayName} does not have an environment`);\n    }\n\n    try {\n      return await this.accessStackForLookup(stack);\n    } catch (e: any) {\n      await this.ioHelper.notify(IO.DEFAULT_TOOLKIT_WARN.msg(`${formatErrorMessage(e)}`));\n    }\n    return this.accessStackForStackOperations(stack, Mode.ForReading);\n  }\n\n  /**\n   * Get an SDK to access the given stack's environment for stack operations\n   *\n   * Will use a plugin if available, use the default AWS credentials if not.\n   * The `mode` parameter is only used for querying plugins.\n   *\n   * Will assume the deploy role if configured on the stack. Check the default `deploy-role`\n   * policies to see what you can do with this role.\n   */\n  private async accessStackForStackOperations(stack: cxapi.CloudFormationStackArtifact, mode: Mode): Promise<TargetEnvironment> {\n    if (!stack.environment) {\n      throw new ToolkitError(`The stack ${stack.displayName} does not have an environment`);\n    }\n\n    return this.prepareSdk({\n      environment: stack.environment,\n      mode,\n      assumeRoleArn: stack.assumeRoleArn,\n      assumeRoleExternalId: stack.assumeRoleExternalId,\n      assumeRoleAdditionalOptions: stack.assumeRoleAdditionalOptions,\n    });\n  }\n\n  /**\n   * Prepare an SDK for use in the given environment and optionally with a role assumed.\n   */\n  private async prepareSdk(\n    options: PrepareSdkRoleOptions,\n  ): Promise<TargetEnvironment> {\n    const resolvedEnvironment = await this.sdkProvider.resolveEnvironment(options.environment);\n\n    // Substitute any placeholders with information about the current environment\n    const { assumeRoleArn } = await replaceEnvPlaceholders({\n      assumeRoleArn: options.assumeRoleArn,\n    }, resolvedEnvironment, this.sdkProvider);\n\n    const stackSdk = await this.cachedSdkForEnvironment(resolvedEnvironment, options.mode, {\n      assumeRoleArn,\n      assumeRoleExternalId: options.assumeRoleExternalId,\n      assumeRoleAdditionalOptions: options.assumeRoleAdditionalOptions,\n    });\n\n    return {\n      sdk: stackSdk.sdk,\n      resolvedEnvironment,\n      resources: this.environmentResources.for(resolvedEnvironment, stackSdk.sdk, this.ioHelper),\n      // If we asked for a role, did not successfully assume it, and yet got here without an exception: that\n      // means we must have fallback credentials.\n      isFallbackCredentials: !stackSdk.didAssumeRole && !!assumeRoleArn,\n      didAssumeRole: stackSdk.didAssumeRole,\n      replacePlaceholders: async <A extends string | undefined>(str: A) => {\n        const ret = await replaceEnvPlaceholders({ str }, resolvedEnvironment, this.sdkProvider);\n        return ret.str;\n      },\n    };\n  }\n\n  private async cachedSdkForEnvironment(\n    environment: cxapi.Environment,\n    mode: Mode,\n    options?: CredentialsOptions,\n  ) {\n    const cacheKeyElements = [\n      environment.account,\n      environment.region,\n      `${mode}`,\n      options?.assumeRoleArn ?? '',\n      options?.assumeRoleExternalId ?? '',\n    ];\n\n    if (options?.assumeRoleAdditionalOptions) {\n      cacheKeyElements.push(JSON.stringify(options.assumeRoleAdditionalOptions));\n    }\n\n    const cacheKey = cacheKeyElements.join(':');\n    const existing = this.sdkCache.get(cacheKey);\n    if (existing) {\n      return existing;\n    }\n    const ret = await this.sdkProvider.forEnvironment(environment, mode, options);\n    this.sdkCache.set(cacheKey, ret);\n    return ret;\n  }\n}\n\n/**\n * SDK obtained by assuming the deploy role\n * for a given environment\n */\nexport interface TargetEnvironment {\n  /**\n   * The SDK for the given environment\n   */\n  readonly sdk: SDK;\n\n  /**\n   * The resolved environment for the stack\n   * (no more 'unknown-account/unknown-region')\n   */\n  readonly resolvedEnvironment: cxapi.Environment;\n\n  /**\n   * Access class for environmental resources to help the deployment\n   */\n  readonly resources: EnvironmentResources;\n\n  /**\n   * Whether or not we assumed a role in the process of getting these credentials\n   */\n  readonly didAssumeRole: boolean;\n\n  /**\n   * Whether or not these are fallback credentials\n   *\n   * Fallback credentials means that assuming the intended role failed, but the\n   * base credentials happen to be for the right account so we just picked those\n   * and hope the future SDK calls succeed.\n   *\n   * This is a backwards compatibility mechanism from around the time we introduced\n   * deployment roles.\n   */\n  readonly isFallbackCredentials: boolean;\n\n  /**\n   * Replace environment placeholders according to the current environment\n   */\n  replacePlaceholders(x: string | undefined): Promise<StringWithoutPlaceholders | undefined>;\n}\n\ninterface PrepareSdkRoleOptions {\n  readonly environment: cxapi.Environment;\n  readonly mode: Mode;\n  readonly assumeRoleArn?: string;\n  readonly assumeRoleExternalId?: string;\n  readonly assumeRoleAdditionalOptions?: { [key: string]: any };\n}\n"]}
|
|
@@ -1,75 +0,0 @@
|
|
|
1
|
-
import type { Environment } from '@aws-cdk/cx-api';
|
|
2
|
-
import { type IoHelper } from '../../../../@aws-cdk/tmp-toolkit-helpers/src/api/io/private';
|
|
3
|
-
import type { SDK } from '../aws-auth';
|
|
4
|
-
import { type EcrRepositoryInfo, ToolkitInfo } from '../toolkit-info';
|
|
5
|
-
/**
|
|
6
|
-
* Registry class for `EnvironmentResources`.
|
|
7
|
-
*
|
|
8
|
-
* The state management of this class is a bit non-standard. We want to cache
|
|
9
|
-
* data related to toolkit stacks and SSM parameters, but we are not in charge
|
|
10
|
-
* of ensuring caching of SDKs. Since `EnvironmentResources` needs an SDK to
|
|
11
|
-
* function, we treat it as an ephemeral class, and store the actual cached data
|
|
12
|
-
* in `EnvironmentResourcesRegistry`.
|
|
13
|
-
*/
|
|
14
|
-
export declare class EnvironmentResourcesRegistry {
|
|
15
|
-
private readonly toolkitStackName?;
|
|
16
|
-
private readonly cache;
|
|
17
|
-
constructor(toolkitStackName?: string | undefined);
|
|
18
|
-
for(resolvedEnvironment: Environment, sdk: SDK, ioHelper: IoHelper): EnvironmentResources;
|
|
19
|
-
}
|
|
20
|
-
/**
|
|
21
|
-
* Interface with the account and region we're deploying into
|
|
22
|
-
*
|
|
23
|
-
* Manages lookups for bootstrapped resources, falling back to the legacy "CDK Toolkit"
|
|
24
|
-
* original bootstrap stack if necessary.
|
|
25
|
-
*
|
|
26
|
-
* The state management of this class is a bit non-standard. We want to cache
|
|
27
|
-
* data related to toolkit stacks and SSM parameters, but we are not in charge
|
|
28
|
-
* of ensuring caching of SDKs. Since `EnvironmentResources` needs an SDK to
|
|
29
|
-
* function, we treat it as an ephemeral class, and store the actual cached data
|
|
30
|
-
* in `EnvironmentResourcesRegistry`.
|
|
31
|
-
*/
|
|
32
|
-
export declare class EnvironmentResources {
|
|
33
|
-
readonly environment: Environment;
|
|
34
|
-
private readonly sdk;
|
|
35
|
-
private readonly ioHelper;
|
|
36
|
-
private readonly cache;
|
|
37
|
-
private readonly toolkitStackName?;
|
|
38
|
-
constructor(environment: Environment, sdk: SDK, ioHelper: IoHelper, cache: EnvironmentCache, toolkitStackName?: string | undefined);
|
|
39
|
-
/**
|
|
40
|
-
* Look up the toolkit for a given environment, using a given SDK
|
|
41
|
-
*/
|
|
42
|
-
lookupToolkit(): Promise<ToolkitInfo>;
|
|
43
|
-
/**
|
|
44
|
-
* Validate that the bootstrap stack version matches or exceeds the expected version
|
|
45
|
-
*
|
|
46
|
-
* Use the SSM parameter name to read the version number if given, otherwise use the version
|
|
47
|
-
* discovered on the bootstrap stack.
|
|
48
|
-
*
|
|
49
|
-
* Pass in the SSM parameter name so we can cache the lookups an don't need to do the same
|
|
50
|
-
* lookup again and again for every artifact.
|
|
51
|
-
*/
|
|
52
|
-
validateVersion(expectedVersion: number | undefined, ssmParameterName: string | undefined): Promise<void>;
|
|
53
|
-
/**
|
|
54
|
-
* Read a version from an SSM parameter, cached
|
|
55
|
-
*/
|
|
56
|
-
versionFromSsmParameter(parameterName: string): Promise<number>;
|
|
57
|
-
prepareEcrRepository(repositoryName: string): Promise<EcrRepositoryInfo>;
|
|
58
|
-
}
|
|
59
|
-
export declare class NoBootstrapStackEnvironmentResources extends EnvironmentResources {
|
|
60
|
-
constructor(environment: Environment, sdk: SDK, ioHelper: IoHelper);
|
|
61
|
-
/**
|
|
62
|
-
* Look up the toolkit for a given environment, using a given SDK
|
|
63
|
-
*/
|
|
64
|
-
lookupToolkit(): Promise<ToolkitInfo>;
|
|
65
|
-
}
|
|
66
|
-
/**
|
|
67
|
-
* Data that is cached on a per-environment level
|
|
68
|
-
*
|
|
69
|
-
* This cache may be shared between different instances of the `EnvironmentResources` class.
|
|
70
|
-
*/
|
|
71
|
-
interface EnvironmentCache {
|
|
72
|
-
readonly ssmParameters: Map<string, number>;
|
|
73
|
-
toolkitInfo?: ToolkitInfo;
|
|
74
|
-
}
|
|
75
|
-
export {};
|