aws-cdk 2.1007.0 → 3.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (253) hide show
  1. package/THIRD_PARTY_LICENSES +24 -6
  2. package/build-info.json +2 -2
  3. package/db.json.gz +0 -0
  4. package/lib/api/aws-auth.d.ts +1 -0
  5. package/lib/api/{logs/index.js → aws-auth.js} +2 -3
  6. package/lib/api/bootstrap.d.ts +1 -0
  7. package/lib/api/bootstrap.js +18 -0
  8. package/lib/api/cloud-assembly.d.ts +1 -0
  9. package/lib/api/cloud-assembly.js +18 -0
  10. package/lib/api/cloudformation.d.ts +1 -0
  11. package/lib/api/cloudformation.js +18 -0
  12. package/lib/api/context.d.ts +1 -40
  13. package/lib/api/context.js +16 -80
  14. package/lib/api/deployments.d.ts +1 -0
  15. package/lib/api/deployments.js +18 -0
  16. package/lib/api/environment.d.ts +1 -0
  17. package/lib/api/environment.js +18 -0
  18. package/lib/api/garbage-collection.d.ts +1 -0
  19. package/lib/api/garbage-collection.js +18 -0
  20. package/lib/api/hotswap.d.ts +1 -0
  21. package/lib/api/hotswap.js +18 -0
  22. package/lib/api/index.d.ts +5 -1
  23. package/lib/api/index.js +6 -2
  24. package/lib/api/logs-monitor.d.ts +1 -0
  25. package/lib/api/logs-monitor.js +18 -0
  26. package/lib/api/notices.d.ts +1 -0
  27. package/lib/api/notices.js +18 -0
  28. package/lib/api/plugin.d.ts +1 -0
  29. package/lib/api/{garbage-collection/index.js → plugin.js} +2 -2
  30. package/lib/api/resource-import.d.ts +1 -0
  31. package/lib/api/resource-import.js +18 -0
  32. package/lib/api/rwlock.d.ts +1 -0
  33. package/lib/api/{resource-import/index.js → rwlock.js} +2 -3
  34. package/lib/api/settings.d.ts +1 -26
  35. package/lib/api/settings.js +16 -103
  36. package/lib/api/stack-events.d.ts +1 -0
  37. package/lib/api/stack-events.js +18 -0
  38. package/lib/api/tags.d.ts +1 -9
  39. package/lib/api/tags.js +16 -8
  40. package/lib/api/toolkit-info.d.ts +1 -52
  41. package/lib/api/toolkit-info.js +16 -152
  42. package/lib/api/tree.d.ts +1 -31
  43. package/lib/api/tree.js +16 -35
  44. package/lib/api/work-graph.d.ts +1 -0
  45. package/lib/api/work-graph.js +18 -0
  46. package/lib/api-private.d.ts +3 -0
  47. package/lib/api-private.js +22 -0
  48. package/lib/cli/cdk-toolkit.d.ts +6 -5
  49. package/lib/cli/cdk-toolkit.js +74 -44
  50. package/lib/cli/cli.d.ts +1 -1
  51. package/lib/cli/cli.js +21 -19
  52. package/lib/cli/io-host/cli-io-host.js +2 -2
  53. package/lib/cli/pretty-print-error.js +3 -1
  54. package/lib/cli/util/npm.d.ts +4 -1
  55. package/lib/cli/util/npm.js +25 -13
  56. package/lib/cli/version.d.ts +1 -1
  57. package/lib/cli/version.js +21 -25
  58. package/lib/commands/context.js +3 -2
  59. package/lib/commands/init/init.js +3 -2
  60. package/lib/commands/list-stacks.js +4 -4
  61. package/lib/context-providers/ami.d.ts +1 -13
  62. package/lib/context-providers/ami.js +16 -48
  63. package/lib/context-providers/availability-zones.d.ts +1 -13
  64. package/lib/context-providers/availability-zones.js +16 -25
  65. package/lib/context-providers/cc-api-provider.d.ts +1 -30
  66. package/lib/context-providers/cc-api-provider.js +16 -142
  67. package/lib/context-providers/endpoint-service-availability-zones.d.ts +1 -13
  68. package/lib/context-providers/endpoint-service-availability-zones.js +16 -31
  69. package/lib/context-providers/hosted-zones.d.ts +1 -12
  70. package/lib/context-providers/hosted-zones.js +16 -65
  71. package/lib/context-providers/index.d.ts +1 -44
  72. package/lib/context-providers/index.js +15 -126
  73. package/lib/context-providers/keys.d.ts +1 -13
  74. package/lib/context-providers/keys.js +16 -50
  75. package/lib/context-providers/load-balancers.d.ts +1 -20
  76. package/lib/context-providers/load-balancers.js +16 -154
  77. package/lib/context-providers/security-groups.d.ts +1 -9
  78. package/lib/context-providers/security-groups.js +16 -66
  79. package/lib/context-providers/ssm-parameters.d.ts +1 -25
  80. package/lib/context-providers/ssm-parameters.js +16 -57
  81. package/lib/context-providers/vpcs.d.ts +1 -13
  82. package/lib/context-providers/vpcs.js +16 -285
  83. package/lib/cxapp/cloud-assembly.d.ts +79 -0
  84. package/lib/cxapp/cloud-assembly.js +108 -0
  85. package/lib/{api/cxapp → cxapp}/cloud-executable.d.ts +6 -4
  86. package/lib/cxapp/cloud-executable.js +92 -0
  87. package/lib/{api/cxapp → cxapp}/environments.d.ts +1 -2
  88. package/lib/{api/cxapp → cxapp}/environments.js +2 -2
  89. package/lib/cxapp/exec.d.ts +14 -0
  90. package/lib/cxapp/exec.js +157 -0
  91. package/lib/cxapp/index.d.ts +4 -0
  92. package/lib/{api/bootstrap → cxapp}/index.js +5 -3
  93. package/lib/index.js +133605 -124560
  94. package/lib/init-templates/.init-version.json +1 -1
  95. package/lib/init-templates/.recommended-feature-flags.json +2 -1
  96. package/lib/legacy-aws-auth.d.ts +74 -0
  97. package/lib/legacy-aws-auth.js +40 -0
  98. package/lib/legacy-exports-source.d.ts +13 -18
  99. package/lib/legacy-exports-source.js +42 -49
  100. package/lib/legacy-exports.d.ts +3 -6
  101. package/lib/legacy-exports.js +5 -5
  102. package/lib/legacy-types.d.ts +31 -0
  103. package/lib/legacy-types.js +3 -0
  104. package/package.json +8 -7
  105. package/lib/api/aws-auth/account-cache.d.ts +0 -36
  106. package/lib/api/aws-auth/account-cache.js +0 -99
  107. package/lib/api/aws-auth/awscli-compatible.d.ts +0 -42
  108. package/lib/api/aws-auth/awscli-compatible.js +0 -263
  109. package/lib/api/aws-auth/cached.d.ts +0 -11
  110. package/lib/api/aws-auth/cached.js +0 -26
  111. package/lib/api/aws-auth/credential-plugins.d.ts +0 -36
  112. package/lib/api/aws-auth/credential-plugins.js +0 -152
  113. package/lib/api/aws-auth/index.d.ts +0 -3
  114. package/lib/api/aws-auth/index.js +0 -20
  115. package/lib/api/aws-auth/provider-caching.d.ts +0 -13
  116. package/lib/api/aws-auth/provider-caching.js +0 -24
  117. package/lib/api/aws-auth/sdk-logger.d.ts +0 -69
  118. package/lib/api/aws-auth/sdk-logger.js +0 -124
  119. package/lib/api/aws-auth/sdk-provider.d.ts +0 -207
  120. package/lib/api/aws-auth/sdk-provider.js +0 -357
  121. package/lib/api/aws-auth/sdk.d.ts +0 -229
  122. package/lib/api/aws-auth/sdk.js +0 -373
  123. package/lib/api/aws-auth/tracing.d.ts +0 -11
  124. package/lib/api/aws-auth/tracing.js +0 -60
  125. package/lib/api/aws-auth/user-agent.d.ts +0 -7
  126. package/lib/api/aws-auth/user-agent.js +0 -20
  127. package/lib/api/aws-auth/util.d.ts +0 -6
  128. package/lib/api/aws-auth/util.js +0 -23
  129. package/lib/api/bootstrap/bootstrap-environment.d.ts +0 -35
  130. package/lib/api/bootstrap/bootstrap-environment.js +0 -321
  131. package/lib/api/bootstrap/bootstrap-props.d.ts +0 -130
  132. package/lib/api/bootstrap/bootstrap-props.js +0 -14
  133. package/lib/api/bootstrap/deploy-bootstrap.d.ts +0 -39
  134. package/lib/api/bootstrap/deploy-bootstrap.js +0 -141
  135. package/lib/api/bootstrap/index.d.ts +0 -2
  136. package/lib/api/bootstrap/legacy-template.d.ts +0 -2
  137. package/lib/api/bootstrap/legacy-template.js +0 -82
  138. package/lib/api/cloudformation/evaluate-cloudformation-template.d.ts +0 -85
  139. package/lib/api/cloudformation/evaluate-cloudformation-template.js +0 -440
  140. package/lib/api/cloudformation/index.d.ts +0 -4
  141. package/lib/api/cloudformation/index.js +0 -21
  142. package/lib/api/cloudformation/nested-stack-helpers.d.ts +0 -19
  143. package/lib/api/cloudformation/nested-stack-helpers.js +0 -86
  144. package/lib/api/cloudformation/stack-helpers.d.ts +0 -88
  145. package/lib/api/cloudformation/stack-helpers.js +0 -158
  146. package/lib/api/cloudformation/template-body-parameter.d.ts +0 -22
  147. package/lib/api/cloudformation/template-body-parameter.js +0 -104
  148. package/lib/api/cxapp/cloud-assembly.d.ts +0 -137
  149. package/lib/api/cxapp/cloud-assembly.js +0 -305
  150. package/lib/api/cxapp/cloud-executable.js +0 -89
  151. package/lib/api/cxapp/exec.d.ts +0 -57
  152. package/lib/api/cxapp/exec.js +0 -279
  153. package/lib/api/deployments/asset-manifest-builder.d.ts +0 -8
  154. package/lib/api/deployments/asset-manifest-builder.js +0 -35
  155. package/lib/api/deployments/asset-publishing.d.ts +0 -60
  156. package/lib/api/deployments/asset-publishing.js +0 -141
  157. package/lib/api/deployments/assets.d.ts +0 -11
  158. package/lib/api/deployments/assets.js +0 -109
  159. package/lib/api/deployments/cfn-api.d.ts +0 -138
  160. package/lib/api/deployments/cfn-api.js +0 -438
  161. package/lib/api/deployments/checks.d.ts +0 -9
  162. package/lib/api/deployments/checks.js +0 -72
  163. package/lib/api/deployments/deploy-stack.d.ts +0 -155
  164. package/lib/api/deployments/deploy-stack.js +0 -478
  165. package/lib/api/deployments/deployment-method.d.ts +0 -24
  166. package/lib/api/deployments/deployment-method.js +0 -3
  167. package/lib/api/deployments/deployment-result.d.ts +0 -21
  168. package/lib/api/deployments/deployment-result.js +0 -10
  169. package/lib/api/deployments/deployments.d.ts +0 -296
  170. package/lib/api/deployments/deployments.js +0 -331
  171. package/lib/api/deployments/hotswap-deployments.d.ts +0 -17
  172. package/lib/api/deployments/hotswap-deployments.js +0 -441
  173. package/lib/api/deployments/index.d.ts +0 -5
  174. package/lib/api/deployments/index.js +0 -22
  175. package/lib/api/environment/environment-access.d.ts +0 -140
  176. package/lib/api/environment/environment-access.js +0 -202
  177. package/lib/api/environment/environment-resources.d.ts +0 -75
  178. package/lib/api/environment/environment-resources.js +0 -207
  179. package/lib/api/environment/index.d.ts +0 -3
  180. package/lib/api/environment/index.js +0 -20
  181. package/lib/api/environment/placeholders.d.ts +0 -10
  182. package/lib/api/environment/placeholders.js +0 -23
  183. package/lib/api/garbage-collection/garbage-collector.d.ts +0 -158
  184. package/lib/api/garbage-collection/garbage-collector.js +0 -599
  185. package/lib/api/garbage-collection/index.d.ts +0 -1
  186. package/lib/api/garbage-collection/progress-printer.d.ts +0 -23
  187. package/lib/api/garbage-collection/progress-printer.js +0 -70
  188. package/lib/api/garbage-collection/stack-refresh.d.ts +0 -49
  189. package/lib/api/garbage-collection/stack-refresh.js +0 -151
  190. package/lib/api/hotswap/appsync-mapping-templates.d.ts +0 -4
  191. package/lib/api/hotswap/appsync-mapping-templates.js +0 -162
  192. package/lib/api/hotswap/code-build-projects.d.ts +0 -4
  193. package/lib/api/hotswap/code-build-projects.js +0 -62
  194. package/lib/api/hotswap/common.d.ts +0 -89
  195. package/lib/api/hotswap/common.js +0 -128
  196. package/lib/api/hotswap/ecs-services.d.ts +0 -4
  197. package/lib/api/hotswap/ecs-services.js +0 -159
  198. package/lib/api/hotswap/lambda-functions.d.ts +0 -4
  199. package/lib/api/hotswap/lambda-functions.js +0 -297
  200. package/lib/api/hotswap/s3-bucket-deployments.d.ts +0 -5
  201. package/lib/api/hotswap/s3-bucket-deployments.js +0 -117
  202. package/lib/api/hotswap/stepfunctions-state-machines.d.ts +0 -4
  203. package/lib/api/hotswap/stepfunctions-state-machines.js +0 -48
  204. package/lib/api/logs/find-cloudwatch-logs.d.ts +0 -25
  205. package/lib/api/logs/find-cloudwatch-logs.js +0 -95
  206. package/lib/api/logs/index.d.ts +0 -2
  207. package/lib/api/logs/logs-monitor.d.ts +0 -76
  208. package/lib/api/logs/logs-monitor.js +0 -187
  209. package/lib/api/plugin/context-provider-plugin.d.ts +0 -6
  210. package/lib/api/plugin/context-provider-plugin.js +0 -7
  211. package/lib/api/plugin/index.d.ts +0 -3
  212. package/lib/api/plugin/index.js +0 -20
  213. package/lib/api/plugin/mode.d.ts +0 -4
  214. package/lib/api/plugin/mode.js +0 -9
  215. package/lib/api/plugin/plugin.d.ts +0 -63
  216. package/lib/api/plugin/plugin.js +0 -102
  217. package/lib/api/resource-import/importer.d.ts +0 -215
  218. package/lib/api/resource-import/importer.js +0 -322
  219. package/lib/api/resource-import/index.d.ts +0 -2
  220. package/lib/api/resource-import/migrator.d.ts +0 -26
  221. package/lib/api/resource-import/migrator.js +0 -71
  222. package/lib/api/stack-events/index.d.ts +0 -3
  223. package/lib/api/stack-events/index.js +0 -20
  224. package/lib/api/stack-events/stack-activity-monitor.d.ts +0 -100
  225. package/lib/api/stack-events/stack-activity-monitor.js +0 -142
  226. package/lib/api/stack-events/stack-event-poller.d.ts +0 -69
  227. package/lib/api/stack-events/stack-event-poller.js +0 -128
  228. package/lib/api/stack-events/stack-progress-monitor.d.ts +0 -48
  229. package/lib/api/stack-events/stack-progress-monitor.js +0 -94
  230. package/lib/api/stack-events/stack-status.d.ts +0 -42
  231. package/lib/api/stack-events/stack-status.js +0 -88
  232. package/lib/api/util/rwlock.d.ts +0 -65
  233. package/lib/api/util/rwlock.js +0 -179
  234. package/lib/api/work-graph/index.d.ts +0 -3
  235. package/lib/api/work-graph/index.js +0 -20
  236. package/lib/api/work-graph/work-graph-builder.d.ts +0 -34
  237. package/lib/api/work-graph/work-graph-builder.js +0 -168
  238. package/lib/api/work-graph/work-graph-types.d.ts +0 -50
  239. package/lib/api/work-graph/work-graph-types.js +0 -13
  240. package/lib/api/work-graph/work-graph.d.ts +0 -72
  241. package/lib/api/work-graph/work-graph.js +0 -346
  242. package/lib/cli/activity-printer/base.d.ts +0 -50
  243. package/lib/cli/activity-printer/base.js +0 -114
  244. package/lib/cli/activity-printer/current.d.ts +0 -26
  245. package/lib/cli/activity-printer/current.js +0 -118
  246. package/lib/cli/activity-printer/display.d.ts +0 -13
  247. package/lib/cli/activity-printer/display.js +0 -80
  248. package/lib/cli/activity-printer/history.d.ts +0 -32
  249. package/lib/cli/activity-printer/history.js +0 -108
  250. package/lib/cli/activity-printer/index.d.ts +0 -3
  251. package/lib/cli/activity-printer/index.js +0 -20
  252. package/lib/notices.d.ts +0 -203
  253. package/lib/notices.js +0 -411
@@ -1,7 +0,0 @@
1
- /**
2
- * Find the package.json from the main toolkit.
3
- *
4
- * If we can't read it for some reason, try to do something reasonable anyway.
5
- * Fall back to argv[1], or a standard string if that is undefined for some reason.
6
- */
7
- export declare function defaultCliUserAgent(): string;
@@ -1,20 +0,0 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.defaultCliUserAgent = defaultCliUserAgent;
4
- const path = require("path");
5
- const util_1 = require("./util");
6
- const util_2 = require("../../util");
7
- /**
8
- * Find the package.json from the main toolkit.
9
- *
10
- * If we can't read it for some reason, try to do something reasonable anyway.
11
- * Fall back to argv[1], or a standard string if that is undefined for some reason.
12
- */
13
- function defaultCliUserAgent() {
14
- const root = (0, util_2.bundledPackageRootDir)(__dirname, false);
15
- const pkg = JSON.parse((root ? (0, util_1.readIfPossible)(path.join(root, 'package.json')) : undefined) ?? '{}');
16
- const name = pkg.name ?? path.basename(process.argv[1] ?? 'cdk-cli');
17
- const version = pkg.version ?? '<unknown>';
18
- return `${name}/${version}`;
19
- }
20
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoidXNlci1hZ2VudC5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbInVzZXItYWdlbnQudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7QUFTQSxrREFNQztBQWZELDZCQUE2QjtBQUM3QixpQ0FBd0M7QUFDeEMscUNBQW1EO0FBQ25EOzs7OztHQUtHO0FBQ0gsU0FBZ0IsbUJBQW1CO0lBQ2pDLE1BQU0sSUFBSSxHQUFHLElBQUEsNEJBQXFCLEVBQUMsU0FBUyxFQUFFLEtBQUssQ0FBQyxDQUFDO0lBQ3JELE1BQU0sR0FBRyxHQUFHLElBQUksQ0FBQyxLQUFLLENBQUMsQ0FBQyxJQUFJLENBQUMsQ0FBQyxDQUFDLElBQUEscUJBQWMsRUFBQyxJQUFJLENBQUMsSUFBSSxDQUFDLElBQUksRUFBRSxjQUFjLENBQUMsQ0FBQyxDQUFDLENBQUMsQ0FBQyxTQUFTLENBQUMsSUFBSSxJQUFJLENBQUMsQ0FBQztJQUNyRyxNQUFNLElBQUksR0FBRyxHQUFHLENBQUMsSUFBSSxJQUFJLElBQUksQ0FBQyxRQUFRLENBQUMsT0FBTyxDQUFDLElBQUksQ0FBQyxDQUFDLENBQUMsSUFBSSxTQUFTLENBQUMsQ0FBQztJQUNyRSxNQUFNLE9BQU8sR0FBRyxHQUFHLENBQUMsT0FBTyxJQUFJLFdBQVcsQ0FBQztJQUMzQyxPQUFPLEdBQUcsSUFBSSxJQUFJLE9BQU8sRUFBRSxDQUFDO0FBQzlCLENBQUMiLCJzb3VyY2VzQ29udGVudCI6WyJpbXBvcnQgKiBhcyBwYXRoIGZyb20gJ3BhdGgnO1xuaW1wb3J0IHsgcmVhZElmUG9zc2libGUgfSBmcm9tICcuL3V0aWwnO1xuaW1wb3J0IHsgYnVuZGxlZFBhY2thZ2VSb290RGlyIH0gZnJvbSAnLi4vLi4vdXRpbCc7XG4vKipcbiAqIEZpbmQgdGhlIHBhY2thZ2UuanNvbiBmcm9tIHRoZSBtYWluIHRvb2xraXQuXG4gKlxuICogSWYgd2UgY2FuJ3QgcmVhZCBpdCBmb3Igc29tZSByZWFzb24sIHRyeSB0byBkbyBzb21ldGhpbmcgcmVhc29uYWJsZSBhbnl3YXkuXG4gKiBGYWxsIGJhY2sgdG8gYXJndlsxXSwgb3IgYSBzdGFuZGFyZCBzdHJpbmcgaWYgdGhhdCBpcyB1bmRlZmluZWQgZm9yIHNvbWUgcmVhc29uLlxuICovXG5leHBvcnQgZnVuY3Rpb24gZGVmYXVsdENsaVVzZXJBZ2VudCgpIHtcbiAgY29uc3Qgcm9vdCA9IGJ1bmRsZWRQYWNrYWdlUm9vdERpcihfX2Rpcm5hbWUsIGZhbHNlKTtcbiAgY29uc3QgcGtnID0gSlNPTi5wYXJzZSgocm9vdCA/IHJlYWRJZlBvc3NpYmxlKHBhdGguam9pbihyb290LCAncGFja2FnZS5qc29uJykpIDogdW5kZWZpbmVkKSA/PyAne30nKTtcbiAgY29uc3QgbmFtZSA9IHBrZy5uYW1lID8/IHBhdGguYmFzZW5hbWUocHJvY2Vzcy5hcmd2WzFdID8/ICdjZGstY2xpJyk7XG4gIGNvbnN0IHZlcnNpb24gPSBwa2cudmVyc2lvbiA/PyAnPHVua25vd24+JztcbiAgcmV0dXJuIGAke25hbWV9LyR7dmVyc2lvbn1gO1xufVxuIl19
@@ -1,6 +0,0 @@
1
- /**
2
- * Read a file if it exists, or return undefined
3
- *
4
- * Not async because it is used in the constructor
5
- */
6
- export declare function readIfPossible(filename: string): string | undefined;
@@ -1,23 +0,0 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.readIfPossible = readIfPossible;
4
- const fs = require("fs-extra");
5
- const logging_1 = require("../../logging");
6
- /**
7
- * Read a file if it exists, or return undefined
8
- *
9
- * Not async because it is used in the constructor
10
- */
11
- function readIfPossible(filename) {
12
- try {
13
- if (!fs.pathExistsSync(filename)) {
14
- return undefined;
15
- }
16
- return fs.readFileSync(filename, { encoding: 'utf-8' });
17
- }
18
- catch (e) {
19
- (0, logging_1.debug)(e);
20
- return undefined;
21
- }
22
- }
23
- //# sourceMappingURL=data:application/json;base64,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
@@ -1,35 +0,0 @@
1
- import type * as cxapi from '@aws-cdk/cx-api';
2
- import type { BootstrapEnvironmentOptions } from './bootstrap-props';
3
- import { type IoHelper } from '../../../../@aws-cdk/tmp-toolkit-helpers/src/api/io/private';
4
- import type { SdkProvider } from '../aws-auth';
5
- import type { SuccessfulDeployStackResult } from '../deployments';
6
- export type BootstrapSource = {
7
- source: 'legacy';
8
- } | {
9
- source: 'default';
10
- } | {
11
- source: 'custom';
12
- templateFile: string;
13
- };
14
- export declare class Bootstrapper {
15
- private readonly source;
16
- private readonly ioHelper;
17
- constructor(source: BootstrapSource | undefined, ioHelper: IoHelper);
18
- bootstrapEnvironment(environment: cxapi.Environment, sdkProvider: SdkProvider, options?: BootstrapEnvironmentOptions): Promise<SuccessfulDeployStackResult>;
19
- showTemplate(json: boolean): Promise<void>;
20
- /**
21
- * Deploy legacy bootstrap stack
22
- *
23
- */
24
- private legacyBootstrap;
25
- /**
26
- * Deploy CI/CD-ready bootstrap stack from template
27
- *
28
- */
29
- private modernBootstrap;
30
- private getPolicyName;
31
- private getExamplePermissionsBoundary;
32
- private validatePolicyName;
33
- private customBootstrap;
34
- private loadTemplate;
35
- }
@@ -1,321 +0,0 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.Bootstrapper = void 0;
4
- const path = require("path");
5
- const deploy_bootstrap_1 = require("./deploy-bootstrap");
6
- const legacy_template_1 = require("./legacy-template");
7
- const api_1 = require("../../../../@aws-cdk/tmp-toolkit-helpers/src/api");
8
- const private_1 = require("../../../../@aws-cdk/tmp-toolkit-helpers/src/api/io/private");
9
- const util_1 = require("../../util");
10
- const mode_1 = require("../plugin/mode");
11
- const toolkit_info_1 = require("../toolkit-info");
12
- class Bootstrapper {
13
- constructor(source = { source: 'default' }, ioHelper) {
14
- this.source = source;
15
- this.ioHelper = ioHelper;
16
- }
17
- bootstrapEnvironment(environment, sdkProvider, options = {}) {
18
- switch (this.source.source) {
19
- case 'legacy':
20
- return this.legacyBootstrap(environment, sdkProvider, options);
21
- case 'default':
22
- return this.modernBootstrap(environment, sdkProvider, options);
23
- case 'custom':
24
- return this.customBootstrap(environment, sdkProvider, options);
25
- }
26
- }
27
- async showTemplate(json) {
28
- const template = await this.loadTemplate();
29
- process.stdout.write(`${(0, util_1.serializeStructure)(template, json)}\n`);
30
- }
31
- /**
32
- * Deploy legacy bootstrap stack
33
- *
34
- */
35
- async legacyBootstrap(environment, sdkProvider, options = {}) {
36
- const params = options.parameters ?? {};
37
- if (params.trustedAccounts?.length) {
38
- throw new api_1.ToolkitError('--trust can only be passed for the modern bootstrap experience.');
39
- }
40
- if (params.cloudFormationExecutionPolicies?.length) {
41
- throw new api_1.ToolkitError('--cloudformation-execution-policies can only be passed for the modern bootstrap experience.');
42
- }
43
- if (params.createCustomerMasterKey !== undefined) {
44
- throw new api_1.ToolkitError('--bootstrap-customer-key can only be passed for the modern bootstrap experience.');
45
- }
46
- if (params.qualifier) {
47
- throw new api_1.ToolkitError('--qualifier can only be passed for the modern bootstrap experience.');
48
- }
49
- const toolkitStackName = options.toolkitStackName ?? toolkit_info_1.DEFAULT_TOOLKIT_STACK_NAME;
50
- const current = await deploy_bootstrap_1.BootstrapStack.lookup(sdkProvider, environment, toolkitStackName, this.ioHelper);
51
- return current.update(await this.loadTemplate(params), {}, {
52
- ...options,
53
- terminationProtection: options.terminationProtection ?? current.terminationProtection,
54
- });
55
- }
56
- /**
57
- * Deploy CI/CD-ready bootstrap stack from template
58
- *
59
- */
60
- async modernBootstrap(environment, sdkProvider, options = {}) {
61
- const params = options.parameters ?? {};
62
- const bootstrapTemplate = await this.loadTemplate();
63
- const toolkitStackName = options.toolkitStackName ?? toolkit_info_1.DEFAULT_TOOLKIT_STACK_NAME;
64
- const current = await deploy_bootstrap_1.BootstrapStack.lookup(sdkProvider, environment, toolkitStackName, this.ioHelper);
65
- const partition = await current.partition();
66
- if (params.createCustomerMasterKey !== undefined && params.kmsKeyId) {
67
- throw new api_1.ToolkitError("You cannot pass '--bootstrap-kms-key-id' and '--bootstrap-customer-key' together. Specify one or the other");
68
- }
69
- // If people re-bootstrap, existing parameter values are reused so that people don't accidentally change the configuration
70
- // on their bootstrap stack (this happens automatically in deployStack). However, to do proper validation on the
71
- // combined arguments (such that if --trust has been given, --cloudformation-execution-policies is necessary as well)
72
- // we need to take this parameter reuse into account.
73
- //
74
- // Ideally we'd do this inside the template, but the `Rules` section of CFN
75
- // templates doesn't seem to be able to express the conditions that we need
76
- // (can't use Fn::Join or reference Conditions) so we do it here instead.
77
- const allTrusted = new Set([
78
- ...params.trustedAccounts ?? [],
79
- ...params.trustedAccountsForLookup ?? [],
80
- ]);
81
- const invalid = intersection(allTrusted, new Set(params.untrustedAccounts));
82
- if (invalid.size > 0) {
83
- throw new api_1.ToolkitError(`Accounts cannot be both trusted and untrusted. Found: ${[...invalid].join(',')}`);
84
- }
85
- const removeUntrusted = (accounts) => accounts.filter(acc => !params.untrustedAccounts?.map(String).includes(String(acc)));
86
- const trustedAccounts = removeUntrusted(params.trustedAccounts ?? splitCfnArray(current.parameters.TrustedAccounts));
87
- await this.ioHelper.notify(private_1.IO.DEFAULT_TOOLKIT_INFO.msg(`Trusted accounts for deployment: ${trustedAccounts.length > 0 ? trustedAccounts.join(', ') : '(none)'}`));
88
- const trustedAccountsForLookup = removeUntrusted(params.trustedAccountsForLookup ?? splitCfnArray(current.parameters.TrustedAccountsForLookup));
89
- await this.ioHelper.notify(private_1.IO.DEFAULT_TOOLKIT_INFO.msg(`Trusted accounts for lookup: ${trustedAccountsForLookup.length > 0 ? trustedAccountsForLookup.join(', ') : '(none)'}`));
90
- const cloudFormationExecutionPolicies = params.cloudFormationExecutionPolicies ?? splitCfnArray(current.parameters.CloudFormationExecutionPolicies);
91
- if (trustedAccounts.length === 0 && cloudFormationExecutionPolicies.length === 0) {
92
- // For self-trust it's okay to default to AdministratorAccess, and it improves the usability of bootstrapping a lot.
93
- //
94
- // We don't actually make the implicitly policy a physical parameter. The template will infer it instead,
95
- // we simply do the UI advertising that behavior here.
96
- //
97
- // If we DID make it an explicit parameter, we wouldn't be able to tell the difference between whether
98
- // we inferred it or whether the user told us, and the sequence:
99
- //
100
- // $ cdk bootstrap
101
- // $ cdk bootstrap --trust 1234
102
- //
103
- // Would leave AdministratorAccess policies with a trust relationship, without the user explicitly
104
- // approving the trust policy.
105
- const implicitPolicy = `arn:${partition}:iam::aws:policy/AdministratorAccess`;
106
- await this.ioHelper.notify(private_1.IO.DEFAULT_TOOLKIT_WARN.msg(`Using default execution policy of '${implicitPolicy}'. Pass '--cloudformation-execution-policies' to customize.`));
107
- }
108
- else if (cloudFormationExecutionPolicies.length === 0) {
109
- throw new api_1.ToolkitError(`Please pass \'--cloudformation-execution-policies\' when using \'--trust\' to specify deployment permissions. Try a managed policy of the form \'arn:${partition}:iam::aws:policy/<PolicyName>\'.`);
110
- }
111
- else {
112
- // Remind people what the current settings are
113
- await this.ioHelper.notify(private_1.IO.DEFAULT_TOOLKIT_INFO.msg(`Execution policies: ${cloudFormationExecutionPolicies.join(', ')}`));
114
- }
115
- // * If an ARN is given, that ARN. Otherwise:
116
- // * '-' if customerKey = false
117
- // * '' if customerKey = true
118
- // * if customerKey is also not given
119
- // * undefined if we already had a value in place (reusing what we had)
120
- // * '-' if this is the first time we're deploying this stack (or upgrading from old to new bootstrap)
121
- const currentKmsKeyId = current.parameters.FileAssetsBucketKmsKeyId;
122
- const kmsKeyId = params.kmsKeyId ??
123
- (params.createCustomerMasterKey === true
124
- ? CREATE_NEW_KEY
125
- : params.createCustomerMasterKey === false || currentKmsKeyId === undefined
126
- ? USE_AWS_MANAGED_KEY
127
- : undefined);
128
- /* A permissions boundary can be provided via:
129
- * - the flag indicating the example one should be used
130
- * - the name indicating the custom permissions boundary to be used
131
- * Re-bootstrapping will NOT be blocked by either tightening or relaxing the permissions' boundary.
132
- */
133
- // InputPermissionsBoundary is an `any` type and if it is not defined it
134
- // appears as an empty string ''. We need to force it to evaluate an empty string
135
- // as undefined
136
- const currentPermissionsBoundary = current.parameters.InputPermissionsBoundary || undefined;
137
- const inputPolicyName = params.examplePermissionsBoundary
138
- ? CDK_BOOTSTRAP_PERMISSIONS_BOUNDARY
139
- : params.customPermissionsBoundary;
140
- let policyName;
141
- if (inputPolicyName) {
142
- // If the example policy is not already in place, it must be created.
143
- const sdk = (await sdkProvider.forEnvironment(environment, mode_1.Mode.ForWriting)).sdk;
144
- policyName = await this.getPolicyName(environment, sdk, inputPolicyName, partition, params);
145
- }
146
- if (currentPermissionsBoundary !== policyName) {
147
- if (!currentPermissionsBoundary) {
148
- await this.ioHelper.notify(private_1.IO.DEFAULT_TOOLKIT_WARN.msg(`Adding new permissions boundary ${policyName}`));
149
- }
150
- else if (!policyName) {
151
- await this.ioHelper.notify(private_1.IO.DEFAULT_TOOLKIT_WARN.msg(`Removing existing permissions boundary ${currentPermissionsBoundary}`));
152
- }
153
- else {
154
- await this.ioHelper.notify(private_1.IO.DEFAULT_TOOLKIT_WARN.msg(`Changing permissions boundary from ${currentPermissionsBoundary} to ${policyName}`));
155
- }
156
- }
157
- return current.update(bootstrapTemplate, {
158
- FileAssetsBucketName: params.bucketName,
159
- FileAssetsBucketKmsKeyId: kmsKeyId,
160
- // Empty array becomes empty string
161
- TrustedAccounts: trustedAccounts.join(','),
162
- TrustedAccountsForLookup: trustedAccountsForLookup.join(','),
163
- CloudFormationExecutionPolicies: cloudFormationExecutionPolicies.join(','),
164
- Qualifier: params.qualifier,
165
- PublicAccessBlockConfiguration: params.publicAccessBlockConfiguration || params.publicAccessBlockConfiguration === undefined
166
- ? 'true'
167
- : 'false',
168
- InputPermissionsBoundary: policyName,
169
- }, {
170
- ...options,
171
- terminationProtection: options.terminationProtection ?? current.terminationProtection,
172
- });
173
- }
174
- async getPolicyName(environment, sdk, permissionsBoundary, partition, params) {
175
- if (permissionsBoundary !== CDK_BOOTSTRAP_PERMISSIONS_BOUNDARY) {
176
- this.validatePolicyName(permissionsBoundary);
177
- return Promise.resolve(permissionsBoundary);
178
- }
179
- // if no Qualifier is supplied, resort to the default one
180
- const arn = await this.getExamplePermissionsBoundary(params.qualifier ?? 'hnb659fds', partition, environment.account, sdk);
181
- const policyName = arn.split('/').pop();
182
- if (!policyName) {
183
- throw new api_1.ToolkitError('Could not retrieve the example permission boundary!');
184
- }
185
- return Promise.resolve(policyName);
186
- }
187
- async getExamplePermissionsBoundary(qualifier, partition, account, sdk) {
188
- const iam = sdk.iam();
189
- let policyName = `cdk-${qualifier}-permissions-boundary`;
190
- const arn = `arn:${partition}:iam::${account}:policy/${policyName}`;
191
- try {
192
- let getPolicyResp = await iam.getPolicy({ PolicyArn: arn });
193
- if (getPolicyResp.Policy) {
194
- return arn;
195
- }
196
- }
197
- catch (e) {
198
- // https://docs.aws.amazon.com/IAM/latest/APIReference/API_GetPolicy.html#API_GetPolicy_Errors
199
- if (e.name === 'NoSuchEntity') {
200
- // noop, proceed with creating the policy
201
- }
202
- else {
203
- throw e;
204
- }
205
- }
206
- const policyDoc = {
207
- Version: '2012-10-17',
208
- Statement: [
209
- {
210
- Action: ['*'],
211
- Resource: '*',
212
- Effect: 'Allow',
213
- Sid: 'ExplicitAllowAll',
214
- },
215
- {
216
- Condition: {
217
- StringEquals: {
218
- 'iam:PermissionsBoundary': `arn:${partition}:iam::${account}:policy/cdk-${qualifier}-permissions-boundary`,
219
- },
220
- },
221
- Action: [
222
- 'iam:CreateUser',
223
- 'iam:CreateRole',
224
- 'iam:PutRolePermissionsBoundary',
225
- 'iam:PutUserPermissionsBoundary',
226
- ],
227
- Resource: '*',
228
- Effect: 'Allow',
229
- Sid: 'DenyAccessIfRequiredPermBoundaryIsNotBeingApplied',
230
- },
231
- {
232
- Action: [
233
- 'iam:CreatePolicyVersion',
234
- 'iam:DeletePolicy',
235
- 'iam:DeletePolicyVersion',
236
- 'iam:SetDefaultPolicyVersion',
237
- ],
238
- Resource: `arn:${partition}:iam::${account}:policy/cdk-${qualifier}-permissions-boundary`,
239
- Effect: 'Deny',
240
- Sid: 'DenyPermBoundaryIAMPolicyAlteration',
241
- },
242
- {
243
- Action: ['iam:DeleteUserPermissionsBoundary', 'iam:DeleteRolePermissionsBoundary'],
244
- Resource: '*',
245
- Effect: 'Deny',
246
- Sid: 'DenyRemovalOfPermBoundaryFromAnyUserOrRole',
247
- },
248
- ],
249
- };
250
- const request = {
251
- PolicyName: policyName,
252
- PolicyDocument: JSON.stringify(policyDoc),
253
- };
254
- const createPolicyResponse = await iam.createPolicy(request);
255
- if (createPolicyResponse.Policy?.Arn) {
256
- return createPolicyResponse.Policy.Arn;
257
- }
258
- else {
259
- throw new api_1.ToolkitError(`Could not retrieve the example permission boundary ${arn}!`);
260
- }
261
- }
262
- validatePolicyName(permissionsBoundary) {
263
- // https://docs.aws.amazon.com/IAM/latest/APIReference/API_CreatePolicy.html
264
- // Added support for policy names with a path
265
- // See https://github.com/aws/aws-cdk/issues/26320
266
- const regexp = /[\w+\/=,.@-]+/;
267
- const matches = regexp.exec(permissionsBoundary);
268
- if (!(matches && matches.length === 1 && matches[0] === permissionsBoundary)) {
269
- throw new api_1.ToolkitError(`The permissions boundary name ${permissionsBoundary} does not match the IAM conventions.`);
270
- }
271
- }
272
- async customBootstrap(environment, sdkProvider, options = {}) {
273
- // Look at the template, decide whether it's most likely a legacy or modern bootstrap
274
- // template, and use the right bootstrapper for that.
275
- const version = (0, deploy_bootstrap_1.bootstrapVersionFromTemplate)(await this.loadTemplate());
276
- if (version === 0) {
277
- return this.legacyBootstrap(environment, sdkProvider, options);
278
- }
279
- else {
280
- return this.modernBootstrap(environment, sdkProvider, options);
281
- }
282
- }
283
- async loadTemplate(params = {}) {
284
- switch (this.source.source) {
285
- case 'custom':
286
- return (0, util_1.loadStructuredFile)(this.source.templateFile);
287
- case 'default':
288
- return (0, util_1.loadStructuredFile)(path.join((0, util_1.bundledPackageRootDir)(__dirname), 'lib', 'api', 'bootstrap', 'bootstrap-template.yaml'));
289
- case 'legacy':
290
- return (0, legacy_template_1.legacyBootstrapTemplate)(params);
291
- }
292
- }
293
- }
294
- exports.Bootstrapper = Bootstrapper;
295
- /**
296
- * Magic parameter value that will cause the bootstrap-template.yml to NOT create a CMK but use the default key
297
- */
298
- const USE_AWS_MANAGED_KEY = 'AWS_MANAGED_KEY';
299
- /**
300
- * Magic parameter value that will cause the bootstrap-template.yml to create a CMK
301
- */
302
- const CREATE_NEW_KEY = '';
303
- /**
304
- * Parameter value indicating the use of the default, CDK provided permissions boundary for bootstrap-template.yml
305
- */
306
- const CDK_BOOTSTRAP_PERMISSIONS_BOUNDARY = 'CDK_BOOTSTRAP_PERMISSIONS_BOUNDARY';
307
- /**
308
- * Split an array-like CloudFormation parameter on ,
309
- *
310
- * An empty string is the empty array (instead of `['']`).
311
- */
312
- function splitCfnArray(xs) {
313
- if (xs === '' || xs === undefined) {
314
- return [];
315
- }
316
- return xs.split(',');
317
- }
318
- function intersection(xs, ys) {
319
- return new Set(Array.from(xs).filter(x => ys.has(x)));
320
- }
321
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"bootstrap-environment.js","sourceRoot":"","sources":["bootstrap-environment.ts"],"names":[],"mappings":";;;AAAA,6BAA6B;AAG7B,yDAAkF;AAClF,uDAA4D;AAC5D,0EAAgF;AAChF,yFAAgG;AAChG,qCAA2F;AAG3F,yCAAsC;AACtC,kDAA6D;AAI7D,MAAa,YAAY;IAGvB,YACmB,SAA0B,EAAE,MAAM,EAAE,SAAS,EAAE,EAChE,QAAkB;QADD,WAAM,GAAN,MAAM,CAAyC;QAGhE,IAAI,CAAC,QAAQ,GAAG,QAAQ,CAAC;IAC3B,CAAC;IAEM,oBAAoB,CACzB,WAA8B,EAC9B,WAAwB,EACxB,UAAuC,EAAE;QAEzC,QAAQ,IAAI,CAAC,MAAM,CAAC,MAAM,EAAE,CAAC;YAC3B,KAAK,QAAQ;gBACX,OAAO,IAAI,CAAC,eAAe,CAAC,WAAW,EAAE,WAAW,EAAE,OAAO,CAAC,CAAC;YACjE,KAAK,SAAS;gBACZ,OAAO,IAAI,CAAC,eAAe,CAAC,WAAW,EAAE,WAAW,EAAE,OAAO,CAAC,CAAC;YACjE,KAAK,QAAQ;gBACX,OAAO,IAAI,CAAC,eAAe,CAAC,WAAW,EAAE,WAAW,EAAE,OAAO,CAAC,CAAC;QACnE,CAAC;IACH,CAAC;IAEM,KAAK,CAAC,YAAY,CAAC,IAAa;QACrC,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,YAAY,EAAE,CAAC;QAC3C,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,GAAG,IAAA,yBAAkB,EAAC,QAAQ,EAAE,IAAI,CAAC,IAAI,CAAC,CAAC;IAClE,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,eAAe,CAC3B,WAA8B,EAC9B,WAAwB,EACxB,UAAuC,EAAE;QAEzC,MAAM,MAAM,GAAG,OAAO,CAAC,UAAU,IAAI,EAAE,CAAC;QAExC,IAAI,MAAM,CAAC,eAAe,EAAE,MAAM,EAAE,CAAC;YACnC,MAAM,IAAI,kBAAY,CAAC,iEAAiE,CAAC,CAAC;QAC5F,CAAC;QACD,IAAI,MAAM,CAAC,+BAA+B,EAAE,MAAM,EAAE,CAAC;YACnD,MAAM,IAAI,kBAAY,CAAC,6FAA6F,CAAC,CAAC;QACxH,CAAC;QACD,IAAI,MAAM,CAAC,uBAAuB,KAAK,SAAS,EAAE,CAAC;YACjD,MAAM,IAAI,kBAAY,CAAC,kFAAkF,CAAC,CAAC;QAC7G,CAAC;QACD,IAAI,MAAM,CAAC,SAAS,EAAE,CAAC;YACrB,MAAM,IAAI,kBAAY,CAAC,qEAAqE,CAAC,CAAC;QAChG,CAAC;QAED,MAAM,gBAAgB,GAAG,OAAO,CAAC,gBAAgB,IAAI,yCAA0B,CAAC;QAChF,MAAM,OAAO,GAAG,MAAM,iCAAc,CAAC,MAAM,CAAC,WAAW,EAAE,WAAW,EAAE,gBAAgB,EAAE,IAAI,CAAC,QAAQ,CAAC,CAAC;QACvG,OAAO,OAAO,CAAC,MAAM,CACnB,MAAM,IAAI,CAAC,YAAY,CAAC,MAAM,CAAC,EAC/B,EAAE,EACF;YACE,GAAG,OAAO;YACV,qBAAqB,EAAE,OAAO,CAAC,qBAAqB,IAAI,OAAO,CAAC,qBAAqB;SACtF,CACF,CAAC;IACJ,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,eAAe,CAC3B,WAA8B,EAC9B,WAAwB,EACxB,UAAuC,EAAE;QAEzC,MAAM,MAAM,GAAG,OAAO,CAAC,UAAU,IAAI,EAAE,CAAC;QAExC,MAAM,iBAAiB,GAAG,MAAM,IAAI,CAAC,YAAY,EAAE,CAAC;QAEpD,MAAM,gBAAgB,GAAG,OAAO,CAAC,gBAAgB,IAAI,yCAA0B,CAAC;QAChF,MAAM,OAAO,GAAG,MAAM,iCAAc,CAAC,MAAM,CAAC,WAAW,EAAE,WAAW,EAAE,gBAAgB,EAAE,IAAI,CAAC,QAAQ,CAAC,CAAC;QACvG,MAAM,SAAS,GAAG,MAAM,OAAO,CAAC,SAAS,EAAE,CAAC;QAE5C,IAAI,MAAM,CAAC,uBAAuB,KAAK,SAAS,IAAI,MAAM,CAAC,QAAQ,EAAE,CAAC;YACpE,MAAM,IAAI,kBAAY,CACpB,4GAA4G,CAC7G,CAAC;QACJ,CAAC;QAED,0HAA0H;QAC1H,gHAAgH;QAChH,qHAAqH;QACrH,qDAAqD;QACrD,EAAE;QACF,2EAA2E;QAC3E,2EAA2E;QAC3E,yEAAyE;QACzE,MAAM,UAAU,GAAG,IAAI,GAAG,CAAC;YACzB,GAAG,MAAM,CAAC,eAAe,IAAI,EAAE;YAC/B,GAAG,MAAM,CAAC,wBAAwB,IAAI,EAAE;SACzC,CAAC,CAAC;QACH,MAAM,OAAO,GAAG,YAAY,CAAC,UAAU,EAAE,IAAI,GAAG,CAAC,MAAM,CAAC,iBAAiB,CAAC,CAAC,CAAC;QAC5E,IAAI,OAAO,CAAC,IAAI,GAAG,CAAC,EAAE,CAAC;YACrB,MAAM,IAAI,kBAAY,CAAC,yDAAyD,CAAC,GAAG,OAAO,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;QAC5G,CAAC;QAED,MAAM,eAAe,GAAG,CAAC,QAAkB,EAAE,EAAE,CAC7C,QAAQ,CAAC,MAAM,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC,MAAM,CAAC,iBAAiB,EAAE,GAAG,CAAC,MAAM,CAAC,CAAC,QAAQ,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC;QAEvF,MAAM,eAAe,GAAG,eAAe,CAAC,MAAM,CAAC,eAAe,IAAI,aAAa,CAAC,OAAO,CAAC,UAAU,CAAC,eAAe,CAAC,CAAC,CAAC;QACrH,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,YAAE,CAAC,oBAAoB,CAAC,GAAG,CACpD,oCAAoC,eAAe,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,CAAC,eAAe,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,QAAQ,EAAE,CACzG,CAAC,CAAC;QAEH,MAAM,wBAAwB,GAAG,eAAe,CAC9C,MAAM,CAAC,wBAAwB,IAAI,aAAa,CAAC,OAAO,CAAC,UAAU,CAAC,wBAAwB,CAAC,CAC9F,CAAC;QACF,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,YAAE,CAAC,oBAAoB,CAAC,GAAG,CACpD,gCAAgC,wBAAwB,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,CAAC,wBAAwB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,QAAQ,EAAE,CACvH,CAAC,CAAC;QAEH,MAAM,+BAA+B,GACnC,MAAM,CAAC,+BAA+B,IAAI,aAAa,CAAC,OAAO,CAAC,UAAU,CAAC,+BAA+B,CAAC,CAAC;QAC9G,IAAI,eAAe,CAAC,MAAM,KAAK,CAAC,IAAI,+BAA+B,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACjF,oHAAoH;YACpH,EAAE;YACF,yGAAyG;YACzG,sDAAsD;YACtD,EAAE;YACF,sGAAsG;YACtG,gEAAgE;YAChE,EAAE;YACF,kBAAkB;YAClB,+BAA+B;YAC/B,EAAE;YACF,kGAAkG;YAClG,8BAA8B;YAC9B,MAAM,cAAc,GAAG,OAAO,SAAS,sCAAsC,CAAC;YAC9E,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,YAAE,CAAC,oBAAoB,CAAC,GAAG,CACpD,sCAAsC,cAAc,6DAA6D,CAClH,CAAC,CAAC;QACL,CAAC;aAAM,IAAI,+BAA+B,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACxD,MAAM,IAAI,kBAAY,CACpB,wJAAwJ,SAAS,kCAAkC,CACpM,CAAC;QACJ,CAAC;aAAM,CAAC;YACN,8CAA8C;YAC9C,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,YAAE,CAAC,oBAAoB,CAAC,GAAG,CAAC,uBAAuB,+BAA+B,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC,CAAC;QAC/H,CAAC;QAED,6CAA6C;QAC7C,iCAAiC;QACjC,+BAA+B;QAC/B,uCAAuC;QACvC,2EAA2E;QAC3E,0GAA0G;QAC1G,MAAM,eAAe,GAAG,OAAO,CAAC,UAAU,CAAC,wBAAwB,CAAC;QACpE,MAAM,QAAQ,GACZ,MAAM,CAAC,QAAQ;YACf,CAAC,MAAM,CAAC,uBAAuB,KAAK,IAAI;gBACtC,CAAC,CAAC,cAAc;gBAChB,CAAC,CAAC,MAAM,CAAC,uBAAuB,KAAK,KAAK,IAAI,eAAe,KAAK,SAAS;oBACzE,CAAC,CAAC,mBAAmB;oBACrB,CAAC,CAAC,SAAS,CAAC,CAAC;QAEnB;;;;WAIG;QAEH,wEAAwE;QACxE,iFAAiF;QACjF,eAAe;QACf,MAAM,0BAA0B,GAAuB,OAAO,CAAC,UAAU,CAAC,wBAAwB,IAAI,SAAS,CAAC;QAChH,MAAM,eAAe,GAAG,MAAM,CAAC,0BAA0B;YACvD,CAAC,CAAC,kCAAkC;YACpC,CAAC,CAAC,MAAM,CAAC,yBAAyB,CAAC;QACrC,IAAI,UAA8B,CAAC;QACnC,IAAI,eAAe,EAAE,CAAC;YACpB,qEAAqE;YACrE,MAAM,GAAG,GAAG,CAAC,MAAM,WAAW,CAAC,cAAc,CAAC,WAAW,EAAE,WAAI,CAAC,UAAU,CAAC,CAAC,CAAC,GAAG,CAAC;YACjF,UAAU,GAAG,MAAM,IAAI,CAAC,aAAa,CAAC,WAAW,EAAE,GAAG,EAAE,eAAe,EAAE,SAAS,EAAE,MAAM,CAAC,CAAC;QAC9F,CAAC;QACD,IAAI,0BAA0B,KAAK,UAAU,EAAE,CAAC;YAC9C,IAAI,CAAC,0BAA0B,EAAE,CAAC;gBAChC,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,YAAE,CAAC,oBAAoB,CAAC,GAAG,CACpD,mCAAmC,UAAU,EAAE,CAChD,CAAC,CAAC;YACL,CAAC;iBAAM,IAAI,CAAC,UAAU,EAAE,CAAC;gBACvB,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,YAAE,CAAC,oBAAoB,CAAC,GAAG,CACpD,0CAA0C,0BAA0B,EAAE,CACvE,CAAC,CAAC;YACL,CAAC;iBAAM,CAAC;gBACN,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,YAAE,CAAC,oBAAoB,CAAC,GAAG,CACpD,sCAAsC,0BAA0B,OAAO,UAAU,EAAE,CACpF,CAAC,CAAC;YACL,CAAC;QACH,CAAC;QAED,OAAO,OAAO,CAAC,MAAM,CACnB,iBAAiB,EACjB;YACE,oBAAoB,EAAE,MAAM,CAAC,UAAU;YACvC,wBAAwB,EAAE,QAAQ;YAClC,mCAAmC;YACnC,eAAe,EAAE,eAAe,CAAC,IAAI,CAAC,GAAG,CAAC;YAC1C,wBAAwB,EAAE,wBAAwB,CAAC,IAAI,CAAC,GAAG,CAAC;YAC5D,+BAA+B,EAAE,+BAA+B,CAAC,IAAI,CAAC,GAAG,CAAC;YAC1E,SAAS,EAAE,MAAM,CAAC,SAAS;YAC3B,8BAA8B,EAC5B,MAAM,CAAC,8BAA8B,IAAI,MAAM,CAAC,8BAA8B,KAAK,SAAS;gBAC1F,CAAC,CAAC,MAAM;gBACR,CAAC,CAAC,OAAO;YACb,wBAAwB,EAAE,UAAU;SACrC,EACD;YACE,GAAG,OAAO;YACV,qBAAqB,EAAE,OAAO,CAAC,qBAAqB,IAAI,OAAO,CAAC,qBAAqB;SACtF,CACF,CAAC;IACJ,CAAC;IAEO,KAAK,CAAC,aAAa,CACzB,WAA8B,EAC9B,GAAQ,EACR,mBAA2B,EAC3B,SAAiB,EACjB,MAA+B;QAE/B,IAAI,mBAAmB,KAAK,kCAAkC,EAAE,CAAC;YAC/D,IAAI,CAAC,kBAAkB,CAAC,mBAAmB,CAAC,CAAC;YAC7C,OAAO,OAAO,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC;QAC9C,CAAC;QACD,yDAAyD;QACzD,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,6BAA6B,CAClD,MAAM,CAAC,SAAS,IAAI,WAAW,EAC/B,SAAS,EACT,WAAW,CAAC,OAAO,EACnB,GAAG,CACJ,CAAC;QACF,MAAM,UAAU,GAAG,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,EAAE,CAAC;QACxC,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,MAAM,IAAI,kBAAY,CAAC,qDAAqD,CAAC,CAAC;QAChF,CAAC;QACD,OAAO,OAAO,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC;IACrC,CAAC;IAEO,KAAK,CAAC,6BAA6B,CACzC,SAAiB,EACjB,SAAiB,EACjB,OAAe,EACf,GAAQ;QAER,MAAM,GAAG,GAAG,GAAG,CAAC,GAAG,EAAE,CAAC;QAEtB,IAAI,UAAU,GAAG,OAAO,SAAS,uBAAuB,CAAC;QACzD,MAAM,GAAG,GAAG,OAAO,SAAS,SAAS,OAAO,WAAW,UAAU,EAAE,CAAC;QAEpE,IAAI,CAAC;YACH,IAAI,aAAa,GAAG,MAAM,GAAG,CAAC,SAAS,CAAC,EAAE,SAAS,EAAE,GAAG,EAAE,CAAC,CAAC;YAC5D,IAAI,aAAa,CAAC,MAAM,EAAE,CAAC;gBACzB,OAAO,GAAG,CAAC;YACb,CAAC;QACH,CAAC;QAAC,OAAO,CAAM,EAAE,CAAC;YAChB,8FAA8F;YAC9F,IAAI,CAAC,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;gBAC9B,yCAAyC;YAC3C,CAAC;iBAAM,CAAC;gBACN,MAAM,CAAC,CAAC;YACV,CAAC;QACH,CAAC;QAED,MAAM,SAAS,GAAG;YAChB,OAAO,EAAE,YAAY;YACrB,SAAS,EAAE;gBACT;oBACE,MAAM,EAAE,CAAC,GAAG,CAAC;oBACb,QAAQ,EAAE,GAAG;oBACb,MAAM,EAAE,OAAO;oBACf,GAAG,EAAE,kBAAkB;iBACxB;gBACD;oBACE,SAAS,EAAE;wBACT,YAAY,EAAE;4BACZ,yBAAyB,EAAE,OAAO,SAAS,SAAS,OAAO,eAAe,SAAS,uBAAuB;yBAC3G;qBACF;oBACD,MAAM,EAAE;wBACN,gBAAgB;wBAChB,gBAAgB;wBAChB,gCAAgC;wBAChC,gCAAgC;qBACjC;oBACD,QAAQ,EAAE,GAAG;oBACb,MAAM,EAAE,OAAO;oBACf,GAAG,EAAE,mDAAmD;iBACzD;gBACD;oBACE,MAAM,EAAE;wBACN,yBAAyB;wBACzB,kBAAkB;wBAClB,yBAAyB;wBACzB,6BAA6B;qBAC9B;oBACD,QAAQ,EAAE,OAAO,SAAS,SAAS,OAAO,eAAe,SAAS,uBAAuB;oBACzF,MAAM,EAAE,MAAM;oBACd,GAAG,EAAE,qCAAqC;iBAC3C;gBACD;oBACE,MAAM,EAAE,CAAC,mCAAmC,EAAE,mCAAmC,CAAC;oBAClF,QAAQ,EAAE,GAAG;oBACb,MAAM,EAAE,MAAM;oBACd,GAAG,EAAE,4CAA4C;iBAClD;aACF;SACF,CAAC;QACF,MAAM,OAAO,GAAG;YACd,UAAU,EAAE,UAAU;YACtB,cAAc,EAAE,IAAI,CAAC,SAAS,CAAC,SAAS,CAAC;SAC1C,CAAC;QACF,MAAM,oBAAoB,GAAG,MAAM,GAAG,CAAC,YAAY,CAAC,OAAO,CAAC,CAAC;QAC7D,IAAI,oBAAoB,CAAC,MAAM,EAAE,GAAG,EAAE,CAAC;YACrC,OAAO,oBAAoB,CAAC,MAAM,CAAC,GAAG,CAAC;QACzC,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,kBAAY,CAAC,sDAAsD,GAAG,GAAG,CAAC,CAAC;QACvF,CAAC;IACH,CAAC;IAEO,kBAAkB,CAAC,mBAA2B;QACpD,4EAA4E;QAC5E,6CAA6C;QAC7C,kDAAkD;QAClD,MAAM,MAAM,GAAW,eAAe,CAAC;QACvC,MAAM,OAAO,GAAG,MAAM,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC;QACjD,IAAI,CAAC,CAAC,OAAO,IAAI,OAAO,CAAC,MAAM,KAAK,CAAC,IAAI,OAAO,CAAC,CAAC,CAAC,KAAK,mBAAmB,CAAC,EAAE,CAAC;YAC7E,MAAM,IAAI,kBAAY,CAAC,iCAAiC,mBAAmB,sCAAsC,CAAC,CAAC;QACrH,CAAC;IACH,CAAC;IAEO,KAAK,CAAC,eAAe,CAC3B,WAA8B,EAC9B,WAAwB,EACxB,UAAuC,EAAE;QAEzC,qFAAqF;QACrF,qDAAqD;QACrD,MAAM,OAAO,GAAG,IAAA,+CAA4B,EAAC,MAAM,IAAI,CAAC,YAAY,EAAE,CAAC,CAAC;QACxE,IAAI,OAAO,KAAK,CAAC,EAAE,CAAC;YAClB,OAAO,IAAI,CAAC,eAAe,CAAC,WAAW,EAAE,WAAW,EAAE,OAAO,CAAC,CAAC;QACjE,CAAC;aAAM,CAAC;YACN,OAAO,IAAI,CAAC,eAAe,CAAC,WAAW,EAAE,WAAW,EAAE,OAAO,CAAC,CAAC;QACjE,CAAC;IACH,CAAC;IAEO,KAAK,CAAC,YAAY,CAAC,SAAkC,EAAE;QAC7D,QAAQ,IAAI,CAAC,MAAM,CAAC,MAAM,EAAE,CAAC;YAC3B,KAAK,QAAQ;gBACX,OAAO,IAAA,yBAAkB,EAAC,IAAI,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;YACtD,KAAK,SAAS;gBACZ,OAAO,IAAA,yBAAkB,EAAC,IAAI,CAAC,IAAI,CAAC,IAAA,4BAAqB,EAAC,SAAS,CAAC,EAAE,KAAK,EAAE,KAAK,EAAE,WAAW,EAAE,yBAAyB,CAAC,CAAC,CAAC;YAC/H,KAAK,QAAQ;gBACX,OAAO,IAAA,yCAAuB,EAAC,MAAM,CAAC,CAAC;QAC3C,CAAC;IACH,CAAC;CACF;AA7WD,oCA6WC;AAED;;GAEG;AACH,MAAM,mBAAmB,GAAG,iBAAiB,CAAC;AAE9C;;GAEG;AACH,MAAM,cAAc,GAAG,EAAE,CAAC;AAC1B;;GAEG;AACH,MAAM,kCAAkC,GAAG,oCAAoC,CAAC;AAEhF;;;;GAIG;AACH,SAAS,aAAa,CAAC,EAAsB;IAC3C,IAAI,EAAE,KAAK,EAAE,IAAI,EAAE,KAAK,SAAS,EAAE,CAAC;QAClC,OAAO,EAAE,CAAC;IACZ,CAAC;IACD,OAAO,EAAE,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;AACvB,CAAC;AAED,SAAS,YAAY,CAAI,EAAU,EAAE,EAAU;IAC7C,OAAO,IAAI,GAAG,CAAI,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;AAC3D,CAAC","sourcesContent":["import * as path from 'path';\nimport type * as cxapi from '@aws-cdk/cx-api';\nimport type { BootstrapEnvironmentOptions, BootstrappingParameters } from './bootstrap-props';\nimport { BootstrapStack, bootstrapVersionFromTemplate } from './deploy-bootstrap';\nimport { legacyBootstrapTemplate } from './legacy-template';\nimport { ToolkitError } from '../../../../@aws-cdk/tmp-toolkit-helpers/src/api';\nimport { IO, type IoHelper } from '../../../../@aws-cdk/tmp-toolkit-helpers/src/api/io/private';\nimport { bundledPackageRootDir, loadStructuredFile, serializeStructure } from '../../util';\nimport type { SDK, SdkProvider } from '../aws-auth';\nimport type { SuccessfulDeployStackResult } from '../deployments';\nimport { Mode } from '../plugin/mode';\nimport { DEFAULT_TOOLKIT_STACK_NAME } from '../toolkit-info';\n\nexport type BootstrapSource = { source: 'legacy' } | { source: 'default' } | { source: 'custom'; templateFile: string };\n\nexport class Bootstrapper {\n  private readonly ioHelper: IoHelper;\n\n  constructor(\n    private readonly source: BootstrapSource = { source: 'default' },\n    ioHelper: IoHelper,\n  ) {\n    this.ioHelper = ioHelper;\n  }\n\n  public bootstrapEnvironment(\n    environment: cxapi.Environment,\n    sdkProvider: SdkProvider,\n    options: BootstrapEnvironmentOptions = {},\n  ): Promise<SuccessfulDeployStackResult> {\n    switch (this.source.source) {\n      case 'legacy':\n        return this.legacyBootstrap(environment, sdkProvider, options);\n      case 'default':\n        return this.modernBootstrap(environment, sdkProvider, options);\n      case 'custom':\n        return this.customBootstrap(environment, sdkProvider, options);\n    }\n  }\n\n  public async showTemplate(json: boolean) {\n    const template = await this.loadTemplate();\n    process.stdout.write(`${serializeStructure(template, json)}\\n`);\n  }\n\n  /**\n   * Deploy legacy bootstrap stack\n   *\n   */\n  private async legacyBootstrap(\n    environment: cxapi.Environment,\n    sdkProvider: SdkProvider,\n    options: BootstrapEnvironmentOptions = {},\n  ): Promise<SuccessfulDeployStackResult> {\n    const params = options.parameters ?? {};\n\n    if (params.trustedAccounts?.length) {\n      throw new ToolkitError('--trust can only be passed for the modern bootstrap experience.');\n    }\n    if (params.cloudFormationExecutionPolicies?.length) {\n      throw new ToolkitError('--cloudformation-execution-policies can only be passed for the modern bootstrap experience.');\n    }\n    if (params.createCustomerMasterKey !== undefined) {\n      throw new ToolkitError('--bootstrap-customer-key can only be passed for the modern bootstrap experience.');\n    }\n    if (params.qualifier) {\n      throw new ToolkitError('--qualifier can only be passed for the modern bootstrap experience.');\n    }\n\n    const toolkitStackName = options.toolkitStackName ?? DEFAULT_TOOLKIT_STACK_NAME;\n    const current = await BootstrapStack.lookup(sdkProvider, environment, toolkitStackName, this.ioHelper);\n    return current.update(\n      await this.loadTemplate(params),\n      {},\n      {\n        ...options,\n        terminationProtection: options.terminationProtection ?? current.terminationProtection,\n      },\n    );\n  }\n\n  /**\n   * Deploy CI/CD-ready bootstrap stack from template\n   *\n   */\n  private async modernBootstrap(\n    environment: cxapi.Environment,\n    sdkProvider: SdkProvider,\n    options: BootstrapEnvironmentOptions = {},\n  ): Promise<SuccessfulDeployStackResult> {\n    const params = options.parameters ?? {};\n\n    const bootstrapTemplate = await this.loadTemplate();\n\n    const toolkitStackName = options.toolkitStackName ?? DEFAULT_TOOLKIT_STACK_NAME;\n    const current = await BootstrapStack.lookup(sdkProvider, environment, toolkitStackName, this.ioHelper);\n    const partition = await current.partition();\n\n    if (params.createCustomerMasterKey !== undefined && params.kmsKeyId) {\n      throw new ToolkitError(\n        \"You cannot pass '--bootstrap-kms-key-id' and '--bootstrap-customer-key' together. Specify one or the other\",\n      );\n    }\n\n    // If people re-bootstrap, existing parameter values are reused so that people don't accidentally change the configuration\n    // on their bootstrap stack (this happens automatically in deployStack). However, to do proper validation on the\n    // combined arguments (such that if --trust has been given, --cloudformation-execution-policies is necessary as well)\n    // we need to take this parameter reuse into account.\n    //\n    // Ideally we'd do this inside the template, but the `Rules` section of CFN\n    // templates doesn't seem to be able to express the conditions that we need\n    // (can't use Fn::Join or reference Conditions) so we do it here instead.\n    const allTrusted = new Set([\n      ...params.trustedAccounts ?? [],\n      ...params.trustedAccountsForLookup ?? [],\n    ]);\n    const invalid = intersection(allTrusted, new Set(params.untrustedAccounts));\n    if (invalid.size > 0) {\n      throw new ToolkitError(`Accounts cannot be both trusted and untrusted. Found: ${[...invalid].join(',')}`);\n    }\n\n    const removeUntrusted = (accounts: string[]) =>\n      accounts.filter(acc => !params.untrustedAccounts?.map(String).includes(String(acc)));\n\n    const trustedAccounts = removeUntrusted(params.trustedAccounts ?? splitCfnArray(current.parameters.TrustedAccounts));\n    await this.ioHelper.notify(IO.DEFAULT_TOOLKIT_INFO.msg(\n      `Trusted accounts for deployment: ${trustedAccounts.length > 0 ? trustedAccounts.join(', ') : '(none)'}`,\n    ));\n\n    const trustedAccountsForLookup = removeUntrusted(\n      params.trustedAccountsForLookup ?? splitCfnArray(current.parameters.TrustedAccountsForLookup),\n    );\n    await this.ioHelper.notify(IO.DEFAULT_TOOLKIT_INFO.msg(\n      `Trusted accounts for lookup: ${trustedAccountsForLookup.length > 0 ? trustedAccountsForLookup.join(', ') : '(none)'}`,\n    ));\n\n    const cloudFormationExecutionPolicies =\n      params.cloudFormationExecutionPolicies ?? splitCfnArray(current.parameters.CloudFormationExecutionPolicies);\n    if (trustedAccounts.length === 0 && cloudFormationExecutionPolicies.length === 0) {\n      // For self-trust it's okay to default to AdministratorAccess, and it improves the usability of bootstrapping a lot.\n      //\n      // We don't actually make the implicitly policy a physical parameter. The template will infer it instead,\n      // we simply do the UI advertising that behavior here.\n      //\n      // If we DID make it an explicit parameter, we wouldn't be able to tell the difference between whether\n      // we inferred it or whether the user told us, and the sequence:\n      //\n      // $ cdk bootstrap\n      // $ cdk bootstrap --trust 1234\n      //\n      // Would leave AdministratorAccess policies with a trust relationship, without the user explicitly\n      // approving the trust policy.\n      const implicitPolicy = `arn:${partition}:iam::aws:policy/AdministratorAccess`;\n      await this.ioHelper.notify(IO.DEFAULT_TOOLKIT_WARN.msg(\n        `Using default execution policy of '${implicitPolicy}'. Pass '--cloudformation-execution-policies' to customize.`,\n      ));\n    } else if (cloudFormationExecutionPolicies.length === 0) {\n      throw new ToolkitError(\n        `Please pass \\'--cloudformation-execution-policies\\' when using \\'--trust\\' to specify deployment permissions. Try a managed policy of the form \\'arn:${partition}:iam::aws:policy/<PolicyName>\\'.`,\n      );\n    } else {\n      // Remind people what the current settings are\n      await this.ioHelper.notify(IO.DEFAULT_TOOLKIT_INFO.msg(`Execution policies: ${cloudFormationExecutionPolicies.join(', ')}`));\n    }\n\n    // * If an ARN is given, that ARN. Otherwise:\n    //   * '-' if customerKey = false\n    //   * '' if customerKey = true\n    //   * if customerKey is also not given\n    //     * undefined if we already had a value in place (reusing what we had)\n    //     * '-' if this is the first time we're deploying this stack (or upgrading from old to new bootstrap)\n    const currentKmsKeyId = current.parameters.FileAssetsBucketKmsKeyId;\n    const kmsKeyId =\n      params.kmsKeyId ??\n      (params.createCustomerMasterKey === true\n        ? CREATE_NEW_KEY\n        : params.createCustomerMasterKey === false || currentKmsKeyId === undefined\n          ? USE_AWS_MANAGED_KEY\n          : undefined);\n\n    /* A permissions boundary can be provided via:\n     *    - the flag indicating the example one should be used\n     *    - the name indicating the custom permissions boundary to be used\n     * Re-bootstrapping will NOT be blocked by either tightening or relaxing the permissions' boundary.\n     */\n\n    // InputPermissionsBoundary is an `any` type and if it is not defined it\n    // appears as an empty string ''. We need to force it to evaluate an empty string\n    // as undefined\n    const currentPermissionsBoundary: string | undefined = current.parameters.InputPermissionsBoundary || undefined;\n    const inputPolicyName = params.examplePermissionsBoundary\n      ? CDK_BOOTSTRAP_PERMISSIONS_BOUNDARY\n      : params.customPermissionsBoundary;\n    let policyName: string | undefined;\n    if (inputPolicyName) {\n      // If the example policy is not already in place, it must be created.\n      const sdk = (await sdkProvider.forEnvironment(environment, Mode.ForWriting)).sdk;\n      policyName = await this.getPolicyName(environment, sdk, inputPolicyName, partition, params);\n    }\n    if (currentPermissionsBoundary !== policyName) {\n      if (!currentPermissionsBoundary) {\n        await this.ioHelper.notify(IO.DEFAULT_TOOLKIT_WARN.msg(\n          `Adding new permissions boundary ${policyName}`,\n        ));\n      } else if (!policyName) {\n        await this.ioHelper.notify(IO.DEFAULT_TOOLKIT_WARN.msg(\n          `Removing existing permissions boundary ${currentPermissionsBoundary}`,\n        ));\n      } else {\n        await this.ioHelper.notify(IO.DEFAULT_TOOLKIT_WARN.msg(\n          `Changing permissions boundary from ${currentPermissionsBoundary} to ${policyName}`,\n        ));\n      }\n    }\n\n    return current.update(\n      bootstrapTemplate,\n      {\n        FileAssetsBucketName: params.bucketName,\n        FileAssetsBucketKmsKeyId: kmsKeyId,\n        // Empty array becomes empty string\n        TrustedAccounts: trustedAccounts.join(','),\n        TrustedAccountsForLookup: trustedAccountsForLookup.join(','),\n        CloudFormationExecutionPolicies: cloudFormationExecutionPolicies.join(','),\n        Qualifier: params.qualifier,\n        PublicAccessBlockConfiguration:\n          params.publicAccessBlockConfiguration || params.publicAccessBlockConfiguration === undefined\n            ? 'true'\n            : 'false',\n        InputPermissionsBoundary: policyName,\n      },\n      {\n        ...options,\n        terminationProtection: options.terminationProtection ?? current.terminationProtection,\n      },\n    );\n  }\n\n  private async getPolicyName(\n    environment: cxapi.Environment,\n    sdk: SDK,\n    permissionsBoundary: string,\n    partition: string,\n    params: BootstrappingParameters,\n  ): Promise<string> {\n    if (permissionsBoundary !== CDK_BOOTSTRAP_PERMISSIONS_BOUNDARY) {\n      this.validatePolicyName(permissionsBoundary);\n      return Promise.resolve(permissionsBoundary);\n    }\n    // if no Qualifier is supplied, resort to the default one\n    const arn = await this.getExamplePermissionsBoundary(\n      params.qualifier ?? 'hnb659fds',\n      partition,\n      environment.account,\n      sdk,\n    );\n    const policyName = arn.split('/').pop();\n    if (!policyName) {\n      throw new ToolkitError('Could not retrieve the example permission boundary!');\n    }\n    return Promise.resolve(policyName);\n  }\n\n  private async getExamplePermissionsBoundary(\n    qualifier: string,\n    partition: string,\n    account: string,\n    sdk: SDK,\n  ): Promise<string> {\n    const iam = sdk.iam();\n\n    let policyName = `cdk-${qualifier}-permissions-boundary`;\n    const arn = `arn:${partition}:iam::${account}:policy/${policyName}`;\n\n    try {\n      let getPolicyResp = await iam.getPolicy({ PolicyArn: arn });\n      if (getPolicyResp.Policy) {\n        return arn;\n      }\n    } catch (e: any) {\n      // https://docs.aws.amazon.com/IAM/latest/APIReference/API_GetPolicy.html#API_GetPolicy_Errors\n      if (e.name === 'NoSuchEntity') {\n        // noop, proceed with creating the policy\n      } else {\n        throw e;\n      }\n    }\n\n    const policyDoc = {\n      Version: '2012-10-17',\n      Statement: [\n        {\n          Action: ['*'],\n          Resource: '*',\n          Effect: 'Allow',\n          Sid: 'ExplicitAllowAll',\n        },\n        {\n          Condition: {\n            StringEquals: {\n              'iam:PermissionsBoundary': `arn:${partition}:iam::${account}:policy/cdk-${qualifier}-permissions-boundary`,\n            },\n          },\n          Action: [\n            'iam:CreateUser',\n            'iam:CreateRole',\n            'iam:PutRolePermissionsBoundary',\n            'iam:PutUserPermissionsBoundary',\n          ],\n          Resource: '*',\n          Effect: 'Allow',\n          Sid: 'DenyAccessIfRequiredPermBoundaryIsNotBeingApplied',\n        },\n        {\n          Action: [\n            'iam:CreatePolicyVersion',\n            'iam:DeletePolicy',\n            'iam:DeletePolicyVersion',\n            'iam:SetDefaultPolicyVersion',\n          ],\n          Resource: `arn:${partition}:iam::${account}:policy/cdk-${qualifier}-permissions-boundary`,\n          Effect: 'Deny',\n          Sid: 'DenyPermBoundaryIAMPolicyAlteration',\n        },\n        {\n          Action: ['iam:DeleteUserPermissionsBoundary', 'iam:DeleteRolePermissionsBoundary'],\n          Resource: '*',\n          Effect: 'Deny',\n          Sid: 'DenyRemovalOfPermBoundaryFromAnyUserOrRole',\n        },\n      ],\n    };\n    const request = {\n      PolicyName: policyName,\n      PolicyDocument: JSON.stringify(policyDoc),\n    };\n    const createPolicyResponse = await iam.createPolicy(request);\n    if (createPolicyResponse.Policy?.Arn) {\n      return createPolicyResponse.Policy.Arn;\n    } else {\n      throw new ToolkitError(`Could not retrieve the example permission boundary ${arn}!`);\n    }\n  }\n\n  private validatePolicyName(permissionsBoundary: string) {\n    // https://docs.aws.amazon.com/IAM/latest/APIReference/API_CreatePolicy.html\n    // Added support for policy names with a path\n    // See https://github.com/aws/aws-cdk/issues/26320\n    const regexp: RegExp = /[\\w+\\/=,.@-]+/;\n    const matches = regexp.exec(permissionsBoundary);\n    if (!(matches && matches.length === 1 && matches[0] === permissionsBoundary)) {\n      throw new ToolkitError(`The permissions boundary name ${permissionsBoundary} does not match the IAM conventions.`);\n    }\n  }\n\n  private async customBootstrap(\n    environment: cxapi.Environment,\n    sdkProvider: SdkProvider,\n    options: BootstrapEnvironmentOptions = {},\n  ): Promise<SuccessfulDeployStackResult> {\n    // Look at the template, decide whether it's most likely a legacy or modern bootstrap\n    // template, and use the right bootstrapper for that.\n    const version = bootstrapVersionFromTemplate(await this.loadTemplate());\n    if (version === 0) {\n      return this.legacyBootstrap(environment, sdkProvider, options);\n    } else {\n      return this.modernBootstrap(environment, sdkProvider, options);\n    }\n  }\n\n  private async loadTemplate(params: BootstrappingParameters = {}): Promise<any> {\n    switch (this.source.source) {\n      case 'custom':\n        return loadStructuredFile(this.source.templateFile);\n      case 'default':\n        return loadStructuredFile(path.join(bundledPackageRootDir(__dirname), 'lib', 'api', 'bootstrap', 'bootstrap-template.yaml'));\n      case 'legacy':\n        return legacyBootstrapTemplate(params);\n    }\n  }\n}\n\n/**\n * Magic parameter value that will cause the bootstrap-template.yml to NOT create a CMK but use the default key\n */\nconst USE_AWS_MANAGED_KEY = 'AWS_MANAGED_KEY';\n\n/**\n * Magic parameter value that will cause the bootstrap-template.yml to create a CMK\n */\nconst CREATE_NEW_KEY = '';\n/**\n * Parameter value indicating the use of the default, CDK provided permissions boundary for bootstrap-template.yml\n */\nconst CDK_BOOTSTRAP_PERMISSIONS_BOUNDARY = 'CDK_BOOTSTRAP_PERMISSIONS_BOUNDARY';\n\n/**\n * Split an array-like CloudFormation parameter on ,\n *\n * An empty string is the empty array (instead of `['']`).\n */\nfunction splitCfnArray(xs: string | undefined): string[] {\n  if (xs === '' || xs === undefined) {\n    return [];\n  }\n  return xs.split(',');\n}\n\nfunction intersection<A>(xs: Set<A>, ys: Set<A>): Set<A> {\n  return new Set<A>(Array.from(xs).filter(x => ys.has(x)));\n}\n"]}
@@ -1,130 +0,0 @@
1
- import type { BootstrapSource } from './bootstrap-environment';
2
- import type { StringWithoutPlaceholders } from '../environment';
3
- import type { Tag } from '../tags';
4
- export declare const BUCKET_NAME_OUTPUT = "BucketName";
5
- export declare const REPOSITORY_NAME_OUTPUT = "ImageRepositoryName";
6
- export declare const BUCKET_DOMAIN_NAME_OUTPUT = "BucketDomainName";
7
- export declare const BOOTSTRAP_VERSION_OUTPUT = "BootstrapVersion";
8
- export declare const BOOTSTRAP_VERSION_RESOURCE = "CdkBootstrapVersion";
9
- export declare const BOOTSTRAP_VARIANT_PARAMETER = "BootstrapVariant";
10
- /**
11
- * The assumed vendor of a template in case it is not set
12
- */
13
- export declare const DEFAULT_BOOTSTRAP_VARIANT = "AWS CDK: Default Resources";
14
- /**
15
- * Options for the bootstrapEnvironment operation(s)
16
- */
17
- export interface BootstrapEnvironmentOptions {
18
- readonly toolkitStackName?: string;
19
- readonly roleArn?: StringWithoutPlaceholders;
20
- readonly parameters?: BootstrappingParameters;
21
- readonly force?: boolean;
22
- /**
23
- * The source of the bootstrap stack
24
- *
25
- * @default - modern v2-style bootstrapping
26
- */
27
- readonly source?: BootstrapSource;
28
- /**
29
- * Whether to execute the changeset or only create it and leave it in review.
30
- * @default true
31
- */
32
- readonly execute?: boolean;
33
- /**
34
- * Tags for cdktoolkit stack.
35
- *
36
- * @default - None.
37
- */
38
- readonly tags?: Tag[];
39
- /**
40
- * Whether the stacks created by the bootstrap process should be protected from termination.
41
- * @see https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-protect-stacks.html
42
- * @default true
43
- */
44
- readonly terminationProtection?: boolean;
45
- /**
46
- * Use previous values for unspecified parameters
47
- *
48
- * If not set, all parameters must be specified for every deployment.
49
- *
50
- * @default true
51
- */
52
- usePreviousParameters?: boolean;
53
- }
54
- /**
55
- * Parameters for the bootstrapping template
56
- */
57
- export interface BootstrappingParameters {
58
- /**
59
- * The name to be given to the CDK Bootstrap bucket.
60
- *
61
- * @default - a name is generated by CloudFormation.
62
- */
63
- readonly bucketName?: string;
64
- /**
65
- * The ID of an existing KMS key to be used for encrypting items in the bucket.
66
- *
67
- * @default - use the default KMS key or create a custom one
68
- */
69
- readonly kmsKeyId?: string;
70
- /**
71
- * Whether or not to create a new customer master key (CMK)
72
- *
73
- * Only applies to modern bootstrapping. Legacy bootstrapping will never create
74
- * a CMK, only use the default S3 key.
75
- *
76
- * @default false
77
- */
78
- readonly createCustomerMasterKey?: boolean;
79
- /**
80
- * The list of AWS account IDs that are trusted to deploy into the environment being bootstrapped.
81
- *
82
- * @default - only the bootstrapped account can deploy into this environment
83
- */
84
- readonly trustedAccounts?: string[];
85
- /**
86
- * The list of AWS account IDs that are trusted to look up values in the environment being bootstrapped.
87
- *
88
- * @default - only the bootstrapped account can look up values in this environment
89
- */
90
- readonly trustedAccountsForLookup?: string[];
91
- /**
92
- * The list of AWS account IDs that should not be trusted by the bootstrapped environment.
93
- * If these accounts are already trusted, they will be removed on bootstrapping.
94
- *
95
- * @default - no account will be untrusted.
96
- */
97
- readonly untrustedAccounts?: string[];
98
- /**
99
- * The ARNs of the IAM managed policies that should be attached to the role performing CloudFormation deployments.
100
- * In most cases, this will be the AdministratorAccess policy.
101
- * At least one policy is required if `trustedAccounts` were passed.
102
- *
103
- * @default - the role will have no policies attached
104
- */
105
- readonly cloudFormationExecutionPolicies?: string[];
106
- /**
107
- * Identifier to distinguish multiple bootstrapped environments
108
- *
109
- * @default - Default qualifier
110
- */
111
- readonly qualifier?: string;
112
- /**
113
- * Whether or not to enable S3 Staging Bucket Public Access Block Configuration
114
- *
115
- * @default true
116
- */
117
- readonly publicAccessBlockConfiguration?: boolean;
118
- /**
119
- * Flag for using the default permissions boundary for bootstrapping
120
- *
121
- * @default - No value, optional argument
122
- */
123
- readonly examplePermissionsBoundary?: boolean;
124
- /**
125
- * Name for the customer's custom permissions boundary for bootstrapping
126
- *
127
- * @default - No value, optional argument
128
- */
129
- readonly customPermissionsBoundary?: string;
130
- }