cdk-ecr-deployment 3.2.1 → 3.3.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +48 -39
- package/API.md +13 -15
- package/README.md +33 -1
- package/build-lambda.sh +12 -0
- package/lambda-bin/.gitkeep +0 -0
- package/lambda-bin/bootstrap +0 -0
- package/{lambda → lambda-src}/Makefile +1 -1
- package/{lambda → lambda-src}/go.mod +1 -1
- package/{lambda → lambda-src}/go.sum +2 -2
- package/lib/config.js +2 -3
- package/lib/index.d.ts +15 -0
- package/lib/index.js +22 -10
- package/package.json +15 -13
- package/lambda/install.js +0 -82
- /package/{lambda → lambda-src}/.dockerignore +0 -0
- /package/{lambda → lambda-src}/Dockerfile +0 -0
- /package/{lambda → lambda-src}/internal/iolimits/iolimits.go +0 -0
- /package/{lambda → lambda-src}/internal/iolimits/iolimits_test.go +0 -0
- /package/{lambda → lambda-src}/internal/tarfile/reader.go +0 -0
- /package/{lambda → lambda-src}/internal/tarfile/reader_test.go +0 -0
- /package/{lambda → lambda-src}/internal/tarfile/s3file.go +0 -0
- /package/{lambda → lambda-src}/internal/tarfile/s3file_test.go +0 -0
- /package/{lambda → lambda-src}/internal/tarfile/src.go +0 -0
- /package/{lambda → lambda-src}/internal/tarfile/types.go +0 -0
- /package/{lambda → lambda-src}/main.go +0 -0
- /package/{lambda → lambda-src}/main_test.go +0 -0
- /package/{lambda → lambda-src}/s3/src.go +0 -0
- /package/{lambda → lambda-src}/s3/transport.go +0 -0
- /package/{lambda → lambda-src}/s3/transport_test.go +0 -0
- /package/{lambda → lambda-src}/utils.go +0 -0
- /package/{lambda → lambda-src}/utils_test.go +0 -0
package/.jsii
CHANGED
|
@@ -3457,7 +3457,7 @@
|
|
|
3457
3457
|
"stability": "stable"
|
|
3458
3458
|
},
|
|
3459
3459
|
"homepage": "https://github.com/cdklabs/cdk-ecr-deployment",
|
|
3460
|
-
"jsiiVersion": "5.
|
|
3460
|
+
"jsiiVersion": "5.7.8 (build 2bc6834)",
|
|
3461
3461
|
"keywords": [
|
|
3462
3462
|
"cdk"
|
|
3463
3463
|
],
|
|
@@ -3472,7 +3472,7 @@
|
|
|
3472
3472
|
},
|
|
3473
3473
|
"name": "cdk-ecr-deployment",
|
|
3474
3474
|
"readme": {
|
|
3475
|
-
"markdown": "# cdk-ecr-deployment\n\n[](https://github.com/cdklabs/cdk-ecr-deployment/actions/workflows/release.yml)\n[](https://www.npmjs.com/package/cdk-ecr-deployment)\n[](https://pypi.org/project/cdk-ecr-deployment)\n[](https://www.npmjs.com/package/cdk-ecr-deployment)\n[](https://pypi.org/project/cdk-ecr-deployment)\n\nCDK construct to synchronize single docker image between docker registries.\n\n**Only use v3 of this package**\n\n⚠️ Version 2.* is no longer supported, as the Go.1.x runtime is no longer supported in AWS Lambda.\\\n⚠️ Version 1.* is no longer supported, as CDK v1 has reached the end-of-life\nstage.\n\n## Features\n\n- Copy image from ECR/external registry to (another) ECR/external registry\n- Copy an archive tarball image from s3 to ECR/external registry\n\n## Environment variables\n\nEnable flags: `true`, `1`. e.g. `export CI=1`\n\n- `CI` indicate if it's CI environment. This flag will enable building lambda from scratch.\n- `NO_PREBUILT_LAMBDA` disable using prebuilt lambda.\n- `FORCE_PREBUILT_LAMBDA` force using prebuilt lambda.\n\n⚠️ If you want to force using prebuilt lambda in CI environment to reduce build time. Try `export FORCE_PREBUILT_LAMBDA=1`.\n\n## Examples\n\n```ts\nimport { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';\n\nconst image = new DockerImageAsset(this, 'CDKDockerImage', {\n directory: path.join(__dirname, 'docker'),\n});\n\n// Copy from cdk docker image asset to another ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {\n src: new ecrdeploy.DockerImageName(image.imageUri),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),\n});\n\n// Copy from docker registry to ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {\n src: new ecrdeploy.DockerImageName('nginx:latest'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be either:\n// - plain text in format <username>:<password>\n// - json in format {\"username\":\"<username>\",\"password\":\"<password>\"}\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {\n src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),\n}).addToPrincipalPolicy(new iam.PolicyStatement({\n effect: iam.Effect.ALLOW,\n actions: [\n 'secretsmanager:GetSecretValue',\n ],\n resources: ['*'],\n}));\n```\n\n## Sample: [test/example.ecr-deployment.ts](./test/example.ecr-deployment.ts)\n\n```shell\n# Run the following command to try the sample.\nNO_PREBUILT_LAMBDA=1 npx cdk deploy -a \"npx ts-node -P tsconfig.dev.json --prefer-ts-exts test/example.ecr-deployment.ts\"\n```\n\n## [API](./API.md)\n\n## Tech Details & Contribution\n\nThe core of this project relies on [containers/image](https://github.com/containers/image) which is used by [Skopeo](https://github.com/containers/skopeo).\nPlease take a look at those projects before contribution.\n\nTo support a new docker image source(like docker tarball in s3), you need to implement [image transport interface](https://github.com/containers/image/blob/master/types/types.go). You could take a look at [docker-archive](https://github.com/containers/image/blob/ccb87a8d0f45cf28846e307eb0ec2b9d38a458c2/docker/archive/transport.go) transport for a good start.\n\
|
|
3475
|
+
"markdown": "# cdk-ecr-deployment\n\n[](https://github.com/cdklabs/cdk-ecr-deployment/actions/workflows/release.yml)\n[](https://www.npmjs.com/package/cdk-ecr-deployment)\n[](https://pypi.org/project/cdk-ecr-deployment)\n[](https://www.npmjs.com/package/cdk-ecr-deployment)\n[](https://pypi.org/project/cdk-ecr-deployment)\n\nCDK construct to synchronize single docker image between docker registries.\n\n**Only use v3 of this package**\n\n⚠️ Version 2.* is no longer supported, as the Go.1.x runtime is no longer supported in AWS Lambda.\\\n⚠️ Version 1.* is no longer supported, as CDK v1 has reached the end-of-life\nstage.\n\n## Features\n\n- Copy image from ECR/external registry to (another) ECR/external registry\n- Copy an archive tarball image from s3 to ECR/external registry\n\n## Environment variables\n\nEnable flags: `true`, `1`. e.g. `export CI=1`\n\n- `CI` indicate if it's CI environment. This flag will enable building lambda from scratch.\n- `NO_PREBUILT_LAMBDA` disable using prebuilt lambda.\n- `FORCE_PREBUILT_LAMBDA` force using prebuilt lambda.\n\n⚠️ If you want to force using prebuilt lambda in CI environment to reduce build time. Try `export FORCE_PREBUILT_LAMBDA=1`.\n\n## Examples\n\n```ts\nimport { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';\n\nconst image = new DockerImageAsset(this, 'CDKDockerImage', {\n directory: path.join(__dirname, 'docker'),\n});\n\n// Copy from cdk docker image asset to another ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {\n src: new ecrdeploy.DockerImageName(image.imageUri),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),\n});\n\n// Copy from docker registry to ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {\n src: new ecrdeploy.DockerImageName('nginx:latest'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be either:\n// - plain text in format <username>:<password>\n// - json in format {\"username\":\"<username>\",\"password\":\"<password>\"}\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {\n src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),\n}).addToPrincipalPolicy(new iam.PolicyStatement({\n effect: iam.Effect.ALLOW,\n actions: [\n 'secretsmanager:GetSecretValue',\n ],\n resources: ['*'],\n}));\n```\n\n## Sample: [test/example.ecr-deployment.ts](./test/example.ecr-deployment.ts)\n\nAfter cloning the repository, install dependencies and run a full build:\n\n```console\nyarn --frozen-lockfile --check-files\nyarn build\n```\n\nThen run the example like this:\n\n```shell\n# Run the following command to try the sample.\nNO_PREBUILT_LAMBDA=1 npx cdk deploy -a \"npx ts-node -P tsconfig.dev.json --prefer-ts-exts test/example.ecr-deployment.ts\"\n```\n\nTo run the DockerHub example you will first need to setup a Secret in AWS Secrets Manager to provide DockerHub credentials.\nReplace `username:access-token` with your credentials.\n**Please note that Secrets will occur a cost.**\n\n```console\naws secretsmanager create-secret --name DockerHubCredentials --secret-string \"username:access-token\"\n```\n\nFrom the output, copy the ARN of your new secret and export it as env variable\n\n```console\nexport DOCKERHUB_SECRET_ARN=\"<ARN>\"\n```\n\nFinally run:\n\n```shell\n# Run the following command to try the sample.\nnpx cdk deploy -a \"npx ts-node -P tsconfig.dev.json --prefer-ts-exts test/dockerhub-example.ecr-deployment.ts\"\n```\n\nIf your Secret is encrypted, you might have to adjust the example to also grant decrypt permissions.\n\n## [API](./API.md)\n\n## Tech Details & Contribution\n\nThe core of this project relies on [containers/image](https://github.com/containers/image) which is used by [Skopeo](https://github.com/containers/skopeo).\nPlease take a look at those projects before contribution.\n\nTo support a new docker image source(like docker tarball in s3), you need to implement [image transport interface](https://github.com/containers/image/blob/master/types/types.go). You could take a look at [docker-archive](https://github.com/containers/image/blob/ccb87a8d0f45cf28846e307eb0ec2b9d38a458c2/docker/archive/transport.go) transport for a good start.\n\nAny error in the custom resource provider will show up in the CloudFormation error log as `Invalid PhysicalResourceId`, because of this: <https://github.com/aws/aws-lambda-go/issues/107>. You need to go into the CloudWatch Log Group to find the real error."
|
|
3476
3476
|
},
|
|
3477
3477
|
"repository": {
|
|
3478
3478
|
"type": "git",
|
|
@@ -3515,10 +3515,13 @@
|
|
|
3515
3515
|
},
|
|
3516
3516
|
"locationInModule": {
|
|
3517
3517
|
"filename": "src/index.ts",
|
|
3518
|
-
"line":
|
|
3518
|
+
"line": 154
|
|
3519
3519
|
},
|
|
3520
3520
|
"parameters": [
|
|
3521
3521
|
{
|
|
3522
|
+
"docs": {
|
|
3523
|
+
"summary": "- The name of the image, e.g. retrieved from `DockerImageAsset.imageUri`."
|
|
3524
|
+
},
|
|
3522
3525
|
"name": "name",
|
|
3523
3526
|
"type": {
|
|
3524
3527
|
"primitive": "string"
|
|
@@ -3526,8 +3529,8 @@
|
|
|
3526
3529
|
},
|
|
3527
3530
|
{
|
|
3528
3531
|
"docs": {
|
|
3529
|
-
"remarks": "Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.\
|
|
3530
|
-
"summary": "The credentials of the docker image."
|
|
3532
|
+
"remarks": "Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.\nIf specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or\nJSON (`{\"username\":\"<username>\",\"password\":\"<password>\"}`).\nFor more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html",
|
|
3533
|
+
"summary": "- The credentials of the docker image."
|
|
3531
3534
|
},
|
|
3532
3535
|
"name": "creds",
|
|
3533
3536
|
"optional": true,
|
|
@@ -3543,7 +3546,7 @@
|
|
|
3543
3546
|
"kind": "class",
|
|
3544
3547
|
"locationInModule": {
|
|
3545
3548
|
"filename": "src/index.ts",
|
|
3546
|
-
"line":
|
|
3549
|
+
"line": 146
|
|
3547
3550
|
},
|
|
3548
3551
|
"name": "DockerImageName",
|
|
3549
3552
|
"properties": [
|
|
@@ -3556,7 +3559,7 @@
|
|
|
3556
3559
|
"immutable": true,
|
|
3557
3560
|
"locationInModule": {
|
|
3558
3561
|
"filename": "src/index.ts",
|
|
3559
|
-
"line":
|
|
3562
|
+
"line": 155
|
|
3560
3563
|
},
|
|
3561
3564
|
"name": "uri",
|
|
3562
3565
|
"overrides": "cdk-ecr-deployment.IImageName",
|
|
@@ -3566,13 +3569,13 @@
|
|
|
3566
3569
|
},
|
|
3567
3570
|
{
|
|
3568
3571
|
"docs": {
|
|
3569
|
-
"remarks": "Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.\
|
|
3572
|
+
"remarks": "Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.\nIf specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or\nJSON (`{\"username\":\"<username>\",\"password\":\"<password>\"}`).\nFor more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html",
|
|
3570
3573
|
"stability": "stable",
|
|
3571
|
-
"summary": "The credentials of the docker image."
|
|
3574
|
+
"summary": "- The credentials of the docker image."
|
|
3572
3575
|
},
|
|
3573
3576
|
"locationInModule": {
|
|
3574
3577
|
"filename": "src/index.ts",
|
|
3575
|
-
"line":
|
|
3578
|
+
"line": 154
|
|
3576
3579
|
},
|
|
3577
3580
|
"name": "creds",
|
|
3578
3581
|
"optional": true,
|
|
@@ -3597,7 +3600,7 @@
|
|
|
3597
3600
|
},
|
|
3598
3601
|
"locationInModule": {
|
|
3599
3602
|
"filename": "src/index.ts",
|
|
3600
|
-
"line":
|
|
3603
|
+
"line": 181
|
|
3601
3604
|
},
|
|
3602
3605
|
"parameters": [
|
|
3603
3606
|
{
|
|
@@ -3623,7 +3626,7 @@
|
|
|
3623
3626
|
"kind": "class",
|
|
3624
3627
|
"locationInModule": {
|
|
3625
3628
|
"filename": "src/index.ts",
|
|
3626
|
-
"line":
|
|
3629
|
+
"line": 178
|
|
3627
3630
|
},
|
|
3628
3631
|
"methods": [
|
|
3629
3632
|
{
|
|
@@ -3632,7 +3635,7 @@
|
|
|
3632
3635
|
},
|
|
3633
3636
|
"locationInModule": {
|
|
3634
3637
|
"filename": "src/index.ts",
|
|
3635
|
-
"line":
|
|
3638
|
+
"line": 250
|
|
3636
3639
|
},
|
|
3637
3640
|
"name": "addToPrincipalPolicy",
|
|
3638
3641
|
"parameters": [
|
|
@@ -3663,7 +3666,7 @@
|
|
|
3663
3666
|
"kind": "interface",
|
|
3664
3667
|
"locationInModule": {
|
|
3665
3668
|
"filename": "src/index.ts",
|
|
3666
|
-
"line":
|
|
3669
|
+
"line": 11
|
|
3667
3670
|
},
|
|
3668
3671
|
"name": "ECRDeploymentProps",
|
|
3669
3672
|
"properties": [
|
|
@@ -3676,7 +3679,7 @@
|
|
|
3676
3679
|
"immutable": true,
|
|
3677
3680
|
"locationInModule": {
|
|
3678
3681
|
"filename": "src/index.ts",
|
|
3679
|
-
"line":
|
|
3682
|
+
"line": 31
|
|
3680
3683
|
},
|
|
3681
3684
|
"name": "dest",
|
|
3682
3685
|
"type": {
|
|
@@ -3692,7 +3695,7 @@
|
|
|
3692
3695
|
"immutable": true,
|
|
3693
3696
|
"locationInModule": {
|
|
3694
3697
|
"filename": "src/index.ts",
|
|
3695
|
-
"line":
|
|
3698
|
+
"line": 26
|
|
3696
3699
|
},
|
|
3697
3700
|
"name": "src",
|
|
3698
3701
|
"type": {
|
|
@@ -3710,7 +3713,7 @@
|
|
|
3710
3713
|
"immutable": true,
|
|
3711
3714
|
"locationInModule": {
|
|
3712
3715
|
"filename": "src/index.ts",
|
|
3713
|
-
"line":
|
|
3716
|
+
"line": 22
|
|
3714
3717
|
},
|
|
3715
3718
|
"name": "buildImage",
|
|
3716
3719
|
"optional": true,
|
|
@@ -3727,7 +3730,7 @@
|
|
|
3727
3730
|
"immutable": true,
|
|
3728
3731
|
"locationInModule": {
|
|
3729
3732
|
"filename": "src/index.ts",
|
|
3730
|
-
"line":
|
|
3733
|
+
"line": 107
|
|
3731
3734
|
},
|
|
3732
3735
|
"name": "environment",
|
|
3733
3736
|
"optional": true,
|
|
@@ -3751,7 +3754,7 @@
|
|
|
3751
3754
|
"immutable": true,
|
|
3752
3755
|
"locationInModule": {
|
|
3753
3756
|
"filename": "src/index.ts",
|
|
3754
|
-
"line":
|
|
3757
|
+
"line": 44
|
|
3755
3758
|
},
|
|
3756
3759
|
"name": "imageArch",
|
|
3757
3760
|
"optional": true,
|
|
@@ -3774,7 +3777,7 @@
|
|
|
3774
3777
|
"immutable": true,
|
|
3775
3778
|
"locationInModule": {
|
|
3776
3779
|
"filename": "src/index.ts",
|
|
3777
|
-
"line":
|
|
3780
|
+
"line": 102
|
|
3778
3781
|
},
|
|
3779
3782
|
"name": "lambdaHandler",
|
|
3780
3783
|
"optional": true,
|
|
@@ -3792,7 +3795,7 @@
|
|
|
3792
3795
|
"immutable": true,
|
|
3793
3796
|
"locationInModule": {
|
|
3794
3797
|
"filename": "src/index.ts",
|
|
3795
|
-
"line":
|
|
3798
|
+
"line": 95
|
|
3796
3799
|
},
|
|
3797
3800
|
"name": "lambdaRuntime",
|
|
3798
3801
|
"optional": true,
|
|
@@ -3811,7 +3814,7 @@
|
|
|
3811
3814
|
"immutable": true,
|
|
3812
3815
|
"locationInModule": {
|
|
3813
3816
|
"filename": "src/index.ts",
|
|
3814
|
-
"line":
|
|
3817
|
+
"line": 55
|
|
3815
3818
|
},
|
|
3816
3819
|
"name": "memoryLimit",
|
|
3817
3820
|
"optional": true,
|
|
@@ -3829,7 +3832,7 @@
|
|
|
3829
3832
|
"immutable": true,
|
|
3830
3833
|
"locationInModule": {
|
|
3831
3834
|
"filename": "src/index.ts",
|
|
3832
|
-
"line":
|
|
3835
|
+
"line": 62
|
|
3833
3836
|
},
|
|
3834
3837
|
"name": "role",
|
|
3835
3838
|
"optional": true,
|
|
@@ -3848,7 +3851,7 @@
|
|
|
3848
3851
|
"immutable": true,
|
|
3849
3852
|
"locationInModule": {
|
|
3850
3853
|
"filename": "src/index.ts",
|
|
3851
|
-
"line":
|
|
3854
|
+
"line": 88
|
|
3852
3855
|
},
|
|
3853
3856
|
"name": "securityGroups",
|
|
3854
3857
|
"optional": true,
|
|
@@ -3871,7 +3874,7 @@
|
|
|
3871
3874
|
"immutable": true,
|
|
3872
3875
|
"locationInModule": {
|
|
3873
3876
|
"filename": "src/index.ts",
|
|
3874
|
-
"line":
|
|
3877
|
+
"line": 69
|
|
3875
3878
|
},
|
|
3876
3879
|
"name": "vpc",
|
|
3877
3880
|
"optional": true,
|
|
@@ -3890,7 +3893,7 @@
|
|
|
3890
3893
|
"immutable": true,
|
|
3891
3894
|
"locationInModule": {
|
|
3892
3895
|
"filename": "src/index.ts",
|
|
3893
|
-
"line":
|
|
3896
|
+
"line": 77
|
|
3894
3897
|
},
|
|
3895
3898
|
"name": "vpcSubnets",
|
|
3896
3899
|
"optional": true,
|
|
@@ -3910,7 +3913,7 @@
|
|
|
3910
3913
|
"kind": "interface",
|
|
3911
3914
|
"locationInModule": {
|
|
3912
3915
|
"filename": "src/index.ts",
|
|
3913
|
-
"line":
|
|
3916
|
+
"line": 110
|
|
3914
3917
|
},
|
|
3915
3918
|
"name": "IImageName",
|
|
3916
3919
|
"properties": [
|
|
@@ -3924,7 +3927,7 @@
|
|
|
3924
3927
|
"immutable": true,
|
|
3925
3928
|
"locationInModule": {
|
|
3926
3929
|
"filename": "src/index.ts",
|
|
3927
|
-
"line":
|
|
3930
|
+
"line": 116
|
|
3928
3931
|
},
|
|
3929
3932
|
"name": "uri",
|
|
3930
3933
|
"type": {
|
|
@@ -3940,7 +3943,7 @@
|
|
|
3940
3943
|
},
|
|
3941
3944
|
"locationInModule": {
|
|
3942
3945
|
"filename": "src/index.ts",
|
|
3943
|
-
"line":
|
|
3946
|
+
"line": 126
|
|
3944
3947
|
},
|
|
3945
3948
|
"name": "creds",
|
|
3946
3949
|
"optional": true,
|
|
@@ -3963,16 +3966,22 @@
|
|
|
3963
3966
|
},
|
|
3964
3967
|
"locationInModule": {
|
|
3965
3968
|
"filename": "src/index.ts",
|
|
3966
|
-
"line":
|
|
3969
|
+
"line": 169
|
|
3967
3970
|
},
|
|
3968
3971
|
"parameters": [
|
|
3969
3972
|
{
|
|
3973
|
+
"docs": {
|
|
3974
|
+
"summary": "- the S3 bucket name and path of the archive (a S3 URI without the s3://)."
|
|
3975
|
+
},
|
|
3970
3976
|
"name": "p",
|
|
3971
3977
|
"type": {
|
|
3972
3978
|
"primitive": "string"
|
|
3973
3979
|
}
|
|
3974
3980
|
},
|
|
3975
3981
|
{
|
|
3982
|
+
"docs": {
|
|
3983
|
+
"summary": "- appended to the end of the name with a `:`, e.g. `:latest`."
|
|
3984
|
+
},
|
|
3976
3985
|
"name": "ref",
|
|
3977
3986
|
"optional": true,
|
|
3978
3987
|
"type": {
|
|
@@ -3981,8 +3990,8 @@
|
|
|
3981
3990
|
},
|
|
3982
3991
|
{
|
|
3983
3992
|
"docs": {
|
|
3984
|
-
"remarks": "Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.\
|
|
3985
|
-
"summary": "The credentials of the docker image."
|
|
3993
|
+
"remarks": "Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.\nIf specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or\nJSON (`{\"username\":\"<username>\",\"password\":\"<password>\"}`).\nFor more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html",
|
|
3994
|
+
"summary": "- The credentials of the docker image."
|
|
3986
3995
|
},
|
|
3987
3996
|
"name": "creds",
|
|
3988
3997
|
"optional": true,
|
|
@@ -3998,7 +4007,7 @@
|
|
|
3998
4007
|
"kind": "class",
|
|
3999
4008
|
"locationInModule": {
|
|
4000
4009
|
"filename": "src/index.ts",
|
|
4001
|
-
"line":
|
|
4010
|
+
"line": 158
|
|
4002
4011
|
},
|
|
4003
4012
|
"name": "S3ArchiveName",
|
|
4004
4013
|
"properties": [
|
|
@@ -4011,7 +4020,7 @@
|
|
|
4011
4020
|
"immutable": true,
|
|
4012
4021
|
"locationInModule": {
|
|
4013
4022
|
"filename": "src/index.ts",
|
|
4014
|
-
"line":
|
|
4023
|
+
"line": 175
|
|
4015
4024
|
},
|
|
4016
4025
|
"name": "uri",
|
|
4017
4026
|
"overrides": "cdk-ecr-deployment.IImageName",
|
|
@@ -4021,13 +4030,13 @@
|
|
|
4021
4030
|
},
|
|
4022
4031
|
{
|
|
4023
4032
|
"docs": {
|
|
4024
|
-
"remarks": "Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.\
|
|
4033
|
+
"remarks": "Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.\nIf specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or\nJSON (`{\"username\":\"<username>\",\"password\":\"<password>\"}`).\nFor more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html",
|
|
4025
4034
|
"stability": "stable",
|
|
4026
|
-
"summary": "The credentials of the docker image."
|
|
4035
|
+
"summary": "- The credentials of the docker image."
|
|
4027
4036
|
},
|
|
4028
4037
|
"locationInModule": {
|
|
4029
4038
|
"filename": "src/index.ts",
|
|
4030
|
-
"line":
|
|
4039
|
+
"line": 169
|
|
4031
4040
|
},
|
|
4032
4041
|
"name": "creds",
|
|
4033
4042
|
"optional": true,
|
|
@@ -4040,6 +4049,6 @@
|
|
|
4040
4049
|
"symbolId": "src/index:S3ArchiveName"
|
|
4041
4050
|
}
|
|
4042
4051
|
},
|
|
4043
|
-
"version": "3.
|
|
4044
|
-
"fingerprint": "
|
|
4052
|
+
"version": "3.3.0",
|
|
4053
|
+
"fingerprint": "XzAPB9yugJfIoHB8jl1sQ52xAQaBBjCs+msSSUDDIjY="
|
|
4045
4054
|
}
|
package/API.md
CHANGED
|
@@ -331,8 +331,8 @@ new DockerImageName(name: string, creds?: string)
|
|
|
331
331
|
|
|
332
332
|
| **Name** | **Type** | **Description** |
|
|
333
333
|
| --- | --- | --- |
|
|
334
|
-
| <code><a href="#cdk-ecr-deployment.DockerImageName.Initializer.parameter.name">name</a></code> | <code>string</code> |
|
|
335
|
-
| <code><a href="#cdk-ecr-deployment.DockerImageName.Initializer.parameter.creds">creds</a></code> | <code>string</code> | The credentials of the docker image. |
|
|
334
|
+
| <code><a href="#cdk-ecr-deployment.DockerImageName.Initializer.parameter.name">name</a></code> | <code>string</code> | - The name of the image, e.g. retrieved from `DockerImageAsset.imageUri`. |
|
|
335
|
+
| <code><a href="#cdk-ecr-deployment.DockerImageName.Initializer.parameter.creds">creds</a></code> | <code>string</code> | - The credentials of the docker image. |
|
|
336
336
|
|
|
337
337
|
---
|
|
338
338
|
|
|
@@ -340,6 +340,8 @@ new DockerImageName(name: string, creds?: string)
|
|
|
340
340
|
|
|
341
341
|
- *Type:* string
|
|
342
342
|
|
|
343
|
+
The name of the image, e.g. retrieved from `DockerImageAsset.imageUri`.
|
|
344
|
+
|
|
343
345
|
---
|
|
344
346
|
|
|
345
347
|
##### `creds`<sup>Optional</sup> <a name="creds" id="cdk-ecr-deployment.DockerImageName.Initializer.parameter.creds"></a>
|
|
@@ -349,10 +351,8 @@ new DockerImageName(name: string, creds?: string)
|
|
|
349
351
|
The credentials of the docker image.
|
|
350
352
|
|
|
351
353
|
Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.
|
|
352
|
-
|
|
353
354
|
If specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or
|
|
354
355
|
JSON (`{"username":"<username>","password":"<password>"}`).
|
|
355
|
-
|
|
356
356
|
For more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html
|
|
357
357
|
|
|
358
358
|
---
|
|
@@ -364,7 +364,7 @@ For more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/lates
|
|
|
364
364
|
| **Name** | **Type** | **Description** |
|
|
365
365
|
| --- | --- | --- |
|
|
366
366
|
| <code><a href="#cdk-ecr-deployment.DockerImageName.property.uri">uri</a></code> | <code>string</code> | The uri of the docker image. |
|
|
367
|
-
| <code><a href="#cdk-ecr-deployment.DockerImageName.property.creds">creds</a></code> | <code>string</code> | The credentials of the docker image. |
|
|
367
|
+
| <code><a href="#cdk-ecr-deployment.DockerImageName.property.creds">creds</a></code> | <code>string</code> | - The credentials of the docker image. |
|
|
368
368
|
|
|
369
369
|
---
|
|
370
370
|
|
|
@@ -393,10 +393,8 @@ public readonly creds: string;
|
|
|
393
393
|
The credentials of the docker image.
|
|
394
394
|
|
|
395
395
|
Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.
|
|
396
|
-
|
|
397
396
|
If specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or
|
|
398
397
|
JSON (`{"username":"<username>","password":"<password>"}`).
|
|
399
|
-
|
|
400
398
|
For more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html
|
|
401
399
|
|
|
402
400
|
---
|
|
@@ -416,9 +414,9 @@ new S3ArchiveName(p: string, ref?: string, creds?: string)
|
|
|
416
414
|
|
|
417
415
|
| **Name** | **Type** | **Description** |
|
|
418
416
|
| --- | --- | --- |
|
|
419
|
-
| <code><a href="#cdk-ecr-deployment.S3ArchiveName.Initializer.parameter.p">p</a></code> | <code>string</code> |
|
|
420
|
-
| <code><a href="#cdk-ecr-deployment.S3ArchiveName.Initializer.parameter.ref">ref</a></code> | <code>string</code> |
|
|
421
|
-
| <code><a href="#cdk-ecr-deployment.S3ArchiveName.Initializer.parameter.creds">creds</a></code> | <code>string</code> | The credentials of the docker image. |
|
|
417
|
+
| <code><a href="#cdk-ecr-deployment.S3ArchiveName.Initializer.parameter.p">p</a></code> | <code>string</code> | - the S3 bucket name and path of the archive (a S3 URI without the s3://). |
|
|
418
|
+
| <code><a href="#cdk-ecr-deployment.S3ArchiveName.Initializer.parameter.ref">ref</a></code> | <code>string</code> | - appended to the end of the name with a `:`, e.g. `:latest`. |
|
|
419
|
+
| <code><a href="#cdk-ecr-deployment.S3ArchiveName.Initializer.parameter.creds">creds</a></code> | <code>string</code> | - The credentials of the docker image. |
|
|
422
420
|
|
|
423
421
|
---
|
|
424
422
|
|
|
@@ -426,12 +424,16 @@ new S3ArchiveName(p: string, ref?: string, creds?: string)
|
|
|
426
424
|
|
|
427
425
|
- *Type:* string
|
|
428
426
|
|
|
427
|
+
the S3 bucket name and path of the archive (a S3 URI without the s3://).
|
|
428
|
+
|
|
429
429
|
---
|
|
430
430
|
|
|
431
431
|
##### `ref`<sup>Optional</sup> <a name="ref" id="cdk-ecr-deployment.S3ArchiveName.Initializer.parameter.ref"></a>
|
|
432
432
|
|
|
433
433
|
- *Type:* string
|
|
434
434
|
|
|
435
|
+
appended to the end of the name with a `:`, e.g. `:latest`.
|
|
436
|
+
|
|
435
437
|
---
|
|
436
438
|
|
|
437
439
|
##### `creds`<sup>Optional</sup> <a name="creds" id="cdk-ecr-deployment.S3ArchiveName.Initializer.parameter.creds"></a>
|
|
@@ -441,10 +443,8 @@ new S3ArchiveName(p: string, ref?: string, creds?: string)
|
|
|
441
443
|
The credentials of the docker image.
|
|
442
444
|
|
|
443
445
|
Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.
|
|
444
|
-
|
|
445
446
|
If specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or
|
|
446
447
|
JSON (`{"username":"<username>","password":"<password>"}`).
|
|
447
|
-
|
|
448
448
|
For more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html
|
|
449
449
|
|
|
450
450
|
---
|
|
@@ -456,7 +456,7 @@ For more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/lates
|
|
|
456
456
|
| **Name** | **Type** | **Description** |
|
|
457
457
|
| --- | --- | --- |
|
|
458
458
|
| <code><a href="#cdk-ecr-deployment.S3ArchiveName.property.uri">uri</a></code> | <code>string</code> | The uri of the docker image. |
|
|
459
|
-
| <code><a href="#cdk-ecr-deployment.S3ArchiveName.property.creds">creds</a></code> | <code>string</code> | The credentials of the docker image. |
|
|
459
|
+
| <code><a href="#cdk-ecr-deployment.S3ArchiveName.property.creds">creds</a></code> | <code>string</code> | - The credentials of the docker image. |
|
|
460
460
|
|
|
461
461
|
---
|
|
462
462
|
|
|
@@ -485,10 +485,8 @@ public readonly creds: string;
|
|
|
485
485
|
The credentials of the docker image.
|
|
486
486
|
|
|
487
487
|
Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.
|
|
488
|
-
|
|
489
488
|
If specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or
|
|
490
489
|
JSON (`{"username":"<username>","password":"<password>"}`).
|
|
491
|
-
|
|
492
490
|
For more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html
|
|
493
491
|
|
|
494
492
|
---
|
package/README.md
CHANGED
|
@@ -70,11 +70,43 @@ new ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {
|
|
|
70
70
|
|
|
71
71
|
## Sample: [test/example.ecr-deployment.ts](./test/example.ecr-deployment.ts)
|
|
72
72
|
|
|
73
|
+
After cloning the repository, install dependencies and run a full build:
|
|
74
|
+
|
|
75
|
+
```console
|
|
76
|
+
yarn --frozen-lockfile --check-files
|
|
77
|
+
yarn build
|
|
78
|
+
```
|
|
79
|
+
|
|
80
|
+
Then run the example like this:
|
|
81
|
+
|
|
73
82
|
```shell
|
|
74
83
|
# Run the following command to try the sample.
|
|
75
84
|
NO_PREBUILT_LAMBDA=1 npx cdk deploy -a "npx ts-node -P tsconfig.dev.json --prefer-ts-exts test/example.ecr-deployment.ts"
|
|
76
85
|
```
|
|
77
86
|
|
|
87
|
+
To run the DockerHub example you will first need to setup a Secret in AWS Secrets Manager to provide DockerHub credentials.
|
|
88
|
+
Replace `username:access-token` with your credentials.
|
|
89
|
+
**Please note that Secrets will occur a cost.**
|
|
90
|
+
|
|
91
|
+
```console
|
|
92
|
+
aws secretsmanager create-secret --name DockerHubCredentials --secret-string "username:access-token"
|
|
93
|
+
```
|
|
94
|
+
|
|
95
|
+
From the output, copy the ARN of your new secret and export it as env variable
|
|
96
|
+
|
|
97
|
+
```console
|
|
98
|
+
export DOCKERHUB_SECRET_ARN="<ARN>"
|
|
99
|
+
```
|
|
100
|
+
|
|
101
|
+
Finally run:
|
|
102
|
+
|
|
103
|
+
```shell
|
|
104
|
+
# Run the following command to try the sample.
|
|
105
|
+
npx cdk deploy -a "npx ts-node -P tsconfig.dev.json --prefer-ts-exts test/dockerhub-example.ecr-deployment.ts"
|
|
106
|
+
```
|
|
107
|
+
|
|
108
|
+
If your Secret is encrypted, you might have to adjust the example to also grant decrypt permissions.
|
|
109
|
+
|
|
78
110
|
## [API](./API.md)
|
|
79
111
|
|
|
80
112
|
## Tech Details & Contribution
|
|
@@ -84,4 +116,4 @@ Please take a look at those projects before contribution.
|
|
|
84
116
|
|
|
85
117
|
To support a new docker image source(like docker tarball in s3), you need to implement [image transport interface](https://github.com/containers/image/blob/master/types/types.go). You could take a look at [docker-archive](https://github.com/containers/image/blob/ccb87a8d0f45cf28846e307eb0ec2b9d38a458c2/docker/archive/transport.go) transport for a good start.
|
|
86
118
|
|
|
87
|
-
|
|
119
|
+
Any error in the custom resource provider will show up in the CloudFormation error log as `Invalid PhysicalResourceId`, because of this: <https://github.com/aws/aws-lambda-go/issues/107>. You need to go into the CloudWatch Log Group to find the real error.
|
package/build-lambda.sh
ADDED
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
#!/bin/bash
|
|
2
|
+
set -eu
|
|
3
|
+
|
|
4
|
+
GOPROXY=${GOPROXY:-https://goproxy.io|https://goproxy.cn|direct}
|
|
5
|
+
|
|
6
|
+
# The build works as follows:
|
|
7
|
+
#
|
|
8
|
+
# Build the given Dockerfile to produce a file in a predefined location.
|
|
9
|
+
# We then start that container to run a single command to copy that file out, according to
|
|
10
|
+
# the CDK Asset Bundling protocol.
|
|
11
|
+
${CDK_DOCKER:-docker} build -t cdk-ecr-deployment-lambda --build-arg GOPROXY="${GOPROXY}" lambda-src
|
|
12
|
+
${CDK_DOCKER:-docker} run --rm -v $PWD/lambda-bin:/out cdk-ecr-deployment-lambda cp /asset/bootstrap /out
|
|
File without changes
|
|
Binary file
|
|
@@ -21,7 +21,7 @@ endif
|
|
|
21
21
|
BUILDTAGS := exclude_graphdriver_devicemapper exclude_graphdriver_btrfs containers_image_openpgp lambda.norpc
|
|
22
22
|
OUTPUT ?= cdk-ecr-deployment-handler
|
|
23
23
|
|
|
24
|
-
all: test
|
|
24
|
+
all: lambda test
|
|
25
25
|
|
|
26
26
|
upgrade-deps:
|
|
27
27
|
CGO_ENABLED=0 $(GPGME_ENV) $(GO) get -u -tags "$(BUILDTAGS)"
|
|
@@ -58,7 +58,7 @@ require (
|
|
|
58
58
|
github.com/docker/go-connections v0.5.0 // indirect
|
|
59
59
|
github.com/docker/go-units v0.5.0 // indirect
|
|
60
60
|
github.com/felixge/httpsnoop v1.0.4 // indirect
|
|
61
|
-
github.com/go-jose/go-jose/v4 v4.0.
|
|
61
|
+
github.com/go-jose/go-jose/v4 v4.0.5 // indirect
|
|
62
62
|
github.com/go-logr/logr v1.4.2 // indirect
|
|
63
63
|
github.com/go-logr/stdr v1.2.2 // indirect
|
|
64
64
|
github.com/go-openapi/analysis v0.23.0 // indirect
|
|
@@ -119,8 +119,8 @@ github.com/envoyproxy/go-control-plane v0.9.4/go.mod h1:6rpuAdCZL397s3pYoYcLgu1m
|
|
|
119
119
|
github.com/envoyproxy/protoc-gen-validate v0.1.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c=
|
|
120
120
|
github.com/felixge/httpsnoop v1.0.4 h1:NFTV2Zj1bL4mc9sqWACXbQFVBBg2W3GPvqp8/ESS2Wg=
|
|
121
121
|
github.com/felixge/httpsnoop v1.0.4/go.mod h1:m8KPJKqk1gH5J9DgRY2ASl2lWCfGKXixSwevea8zH2U=
|
|
122
|
-
github.com/go-jose/go-jose/v4 v4.0.
|
|
123
|
-
github.com/go-jose/go-jose/v4 v4.0.
|
|
122
|
+
github.com/go-jose/go-jose/v4 v4.0.5 h1:M6T8+mKZl/+fNNuFHvGIzDz7BTLQPIounk/b9dw3AaE=
|
|
123
|
+
github.com/go-jose/go-jose/v4 v4.0.5/go.mod h1:s3P1lRrkT8igV8D9OjyL4WRyHvjB6a4JSllnOrmmBOA=
|
|
124
124
|
github.com/go-logr/logr v1.2.2/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A=
|
|
125
125
|
github.com/go-logr/logr v1.4.2 h1:6pFjapn8bFcIbiKo3XT4j/BhANplGihG6tvd+8rYgrY=
|
|
126
126
|
github.com/go-logr/logr v1.4.2/go.mod h1:9T104GzyrTigFIr8wt5mBrctHMim0Nb2HLGrmQ40KvY=
|
package/lib/config.js
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.shouldUsePrebuiltLambda =
|
|
3
|
+
exports.shouldUsePrebuiltLambda = shouldUsePrebuiltLambda;
|
|
4
4
|
const TRUTHY = ['true', true, 1, '1'];
|
|
5
5
|
function shouldUsePrebuiltLambda() {
|
|
6
6
|
const { CI, NO_PREBUILT_LAMBDA, FORCE_PREBUILT_LAMBDA } = process.env;
|
|
@@ -9,5 +9,4 @@ function shouldUsePrebuiltLambda() {
|
|
|
9
9
|
const isForcePrebuilt = FORCE_PREBUILT_LAMBDA && TRUTHY.includes(FORCE_PREBUILT_LAMBDA);
|
|
10
10
|
return isForcePrebuilt || (!(isCI || isNoPrebuilt));
|
|
11
11
|
}
|
|
12
|
-
|
|
13
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
12
|
+
//# sourceMappingURL=data:application/json;base64,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
|
package/lib/index.d.ts
CHANGED
|
@@ -110,12 +110,27 @@ export interface IImageName {
|
|
|
110
110
|
export declare class DockerImageName implements IImageName {
|
|
111
111
|
private name;
|
|
112
112
|
creds?: string | undefined;
|
|
113
|
+
/**
|
|
114
|
+
* @param name - The name of the image, e.g. retrieved from `DockerImageAsset.imageUri`
|
|
115
|
+
* @param creds - The credentials of the docker image. Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.
|
|
116
|
+
* If specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or
|
|
117
|
+
* JSON (`{"username":"<username>","password":"<password>"}`).
|
|
118
|
+
* For more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html
|
|
119
|
+
*/
|
|
113
120
|
constructor(name: string, creds?: string | undefined);
|
|
114
121
|
get uri(): string;
|
|
115
122
|
}
|
|
116
123
|
export declare class S3ArchiveName implements IImageName {
|
|
117
124
|
creds?: string | undefined;
|
|
118
125
|
private name;
|
|
126
|
+
/**
|
|
127
|
+
* @param p - the S3 bucket name and path of the archive (a S3 URI without the s3://)
|
|
128
|
+
* @param ref - appended to the end of the name with a `:`, e.g. `:latest`
|
|
129
|
+
* @param creds - The credentials of the docker image. Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.
|
|
130
|
+
* If specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or
|
|
131
|
+
* JSON (`{"username":"<username>","password":"<password>"}`).
|
|
132
|
+
* For more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html
|
|
133
|
+
*/
|
|
119
134
|
constructor(p: string, ref?: string, creds?: string | undefined);
|
|
120
135
|
get uri(): string;
|
|
121
136
|
}
|
package/lib/index.js
CHANGED
|
@@ -5,7 +5,6 @@ exports.ECRDeployment = exports.S3ArchiveName = exports.DockerImageName = void 0
|
|
|
5
5
|
const JSII_RTTI_SYMBOL_1 = Symbol.for("jsii.rtti");
|
|
6
6
|
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
|
7
7
|
// SPDX-License-Identifier: Apache-2.0
|
|
8
|
-
const child_process = require("child_process");
|
|
9
8
|
const path = require("path");
|
|
10
9
|
const aws_cdk_lib_1 = require("aws-cdk-lib");
|
|
11
10
|
const aws_lambda_1 = require("aws-cdk-lib/aws-lambda");
|
|
@@ -14,22 +13,27 @@ const config_1 = require("./config");
|
|
|
14
13
|
function getCode(buildImage) {
|
|
15
14
|
if ((0, config_1.shouldUsePrebuiltLambda)()) {
|
|
16
15
|
try {
|
|
17
|
-
const
|
|
18
|
-
const prebuiltPath = path.join(__dirname, '../lambda/out');
|
|
19
|
-
child_process.execFileSync(process.argv0, [installScript, prebuiltPath]);
|
|
16
|
+
const prebuiltPath = path.join(__dirname, '../lambda-bin');
|
|
20
17
|
return aws_cdk_lib_1.aws_lambda.Code.fromAsset(prebuiltPath);
|
|
21
18
|
}
|
|
22
19
|
catch (err) {
|
|
23
20
|
console.warn(`Can not get prebuilt lambda: ${err}`);
|
|
24
21
|
}
|
|
25
22
|
}
|
|
26
|
-
return aws_cdk_lib_1.aws_lambda.Code.fromDockerBuild(path.join(__dirname, '../lambda'), {
|
|
23
|
+
return aws_cdk_lib_1.aws_lambda.Code.fromDockerBuild(path.join(__dirname, '../lambda-src'), {
|
|
27
24
|
buildArgs: {
|
|
28
25
|
buildImage,
|
|
29
26
|
},
|
|
30
27
|
});
|
|
31
28
|
}
|
|
32
29
|
class DockerImageName {
|
|
30
|
+
/**
|
|
31
|
+
* @param name - The name of the image, e.g. retrieved from `DockerImageAsset.imageUri`
|
|
32
|
+
* @param creds - The credentials of the docker image. Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.
|
|
33
|
+
* If specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or
|
|
34
|
+
* JSON (`{"username":"<username>","password":"<password>"}`).
|
|
35
|
+
* For more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html
|
|
36
|
+
*/
|
|
33
37
|
constructor(name, creds) {
|
|
34
38
|
this.name = name;
|
|
35
39
|
this.creds = creds;
|
|
@@ -38,8 +42,16 @@ class DockerImageName {
|
|
|
38
42
|
}
|
|
39
43
|
exports.DockerImageName = DockerImageName;
|
|
40
44
|
_a = JSII_RTTI_SYMBOL_1;
|
|
41
|
-
DockerImageName[_a] = { fqn: "cdk-ecr-deployment.DockerImageName", version: "3.
|
|
45
|
+
DockerImageName[_a] = { fqn: "cdk-ecr-deployment.DockerImageName", version: "3.3.0" };
|
|
42
46
|
class S3ArchiveName {
|
|
47
|
+
/**
|
|
48
|
+
* @param p - the S3 bucket name and path of the archive (a S3 URI without the s3://)
|
|
49
|
+
* @param ref - appended to the end of the name with a `:`, e.g. `:latest`
|
|
50
|
+
* @param creds - The credentials of the docker image. Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.
|
|
51
|
+
* If specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or
|
|
52
|
+
* JSON (`{"username":"<username>","password":"<password>"}`).
|
|
53
|
+
* For more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html
|
|
54
|
+
*/
|
|
43
55
|
constructor(p, ref, creds) {
|
|
44
56
|
this.creds = creds;
|
|
45
57
|
this.name = p;
|
|
@@ -51,7 +63,7 @@ class S3ArchiveName {
|
|
|
51
63
|
}
|
|
52
64
|
exports.S3ArchiveName = S3ArchiveName;
|
|
53
65
|
_b = JSII_RTTI_SYMBOL_1;
|
|
54
|
-
S3ArchiveName[_b] = { fqn: "cdk-ecr-deployment.S3ArchiveName", version: "3.
|
|
66
|
+
S3ArchiveName[_b] = { fqn: "cdk-ecr-deployment.S3ArchiveName", version: "3.3.0" };
|
|
55
67
|
class ECRDeployment extends constructs_1.Construct {
|
|
56
68
|
constructor(scope, id, props) {
|
|
57
69
|
super(scope, id);
|
|
@@ -59,7 +71,7 @@ class ECRDeployment extends constructs_1.Construct {
|
|
|
59
71
|
this.handler = new aws_cdk_lib_1.aws_lambda.SingletonFunction(this, 'CustomResourceHandler', {
|
|
60
72
|
uuid: this.renderSingletonUuid(memoryLimit),
|
|
61
73
|
code: getCode(props.buildImage ?? 'public.ecr.aws/docker/library/golang:1'),
|
|
62
|
-
runtime: props.lambdaRuntime ?? new aws_cdk_lib_1.aws_lambda.Runtime('provided.al2023', aws_lambda_1.RuntimeFamily.OTHER),
|
|
74
|
+
runtime: props.lambdaRuntime ?? new aws_cdk_lib_1.aws_lambda.Runtime('provided.al2023', aws_lambda_1.RuntimeFamily.OTHER), // not using Runtime.PROVIDED_AL2023 to support older CDK versions (< 2.105.0)
|
|
63
75
|
handler: props.lambdaHandler ?? 'bootstrap',
|
|
64
76
|
environment: props.environment,
|
|
65
77
|
lambdaPurpose: 'Custom::CDKECRDeployment',
|
|
@@ -141,5 +153,5 @@ class ECRDeployment extends constructs_1.Construct {
|
|
|
141
153
|
}
|
|
142
154
|
exports.ECRDeployment = ECRDeployment;
|
|
143
155
|
_c = JSII_RTTI_SYMBOL_1;
|
|
144
|
-
ECRDeployment[_c] = { fqn: "cdk-ecr-deployment.ECRDeployment", version: "3.
|
|
145
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;AAAA,qEAAqE;AACrE,sCAAsC;AAGtC,+CAA+C;AAC/C,6BAA6B;AAC7B,6CAAoH;AAEpH,uDAAuD;AACvD,2CAAuC;AACvC,qCAAmD;AAwHnD,SAAS,OAAO,CAAC,UAAkB;IACjC,IAAI,IAAA,gCAAuB,GAAE,EAAE;QAC7B,IAAI;YACF,MAAM,aAAa,GAAG,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,sBAAsB,CAAC,CAAC;YACnE,MAAM,YAAY,GAAG,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,eAAe,CAAC,CAAC;YAC3D,aAAa,CAAC,YAAY,CAAC,OAAO,CAAC,KAAK,EAAE,CAAC,aAAa,EAAE,YAAY,CAAC,CAAC,CAAC;YAEzE,OAAO,wBAAM,CAAC,IAAI,CAAC,SAAS,CAAC,YAAY,CAAC,CAAC;SAC5C;QAAC,OAAO,GAAG,EAAE;YACZ,OAAO,CAAC,IAAI,CAAC,gCAAgC,GAAG,EAAE,CAAC,CAAC;SACrD;KACF;IAED,OAAO,wBAAM,CAAC,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,WAAW,CAAC,EAAE;QACpE,SAAS,EAAE;YACT,UAAU;SACX;KACF,CAAC,CAAC;AACL,CAAC;AAED,MAAa,eAAe;IAC1B,YAA2B,IAAY,EAAS,KAAc;QAAnC,SAAI,GAAJ,IAAI,CAAQ;QAAS,UAAK,GAAL,KAAK,CAAS;IAAI,CAAC;IACnE,IAAW,GAAG,KAAa,OAAO,YAAY,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;;AAF9D,0CAGC;;;AAED,MAAa,aAAa;IAExB,YAAmB,CAAS,EAAE,GAAY,EAAS,KAAc;QAAd,UAAK,GAAL,KAAK,CAAS;QAC/D,IAAI,CAAC,IAAI,GAAG,CAAC,CAAC;QACd,IAAI,GAAG,EAAE;YACP,IAAI,CAAC,IAAI,IAAI,GAAG,GAAG,GAAG,CAAC;SACxB;IACH,CAAC;IACD,IAAW,GAAG,KAAa,OAAO,QAAQ,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;;AAR1D,sCASC;;;AAED,MAAa,aAAc,SAAQ,sBAAS;IAG1C,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAyB;QACjE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,MAAM,WAAW,GAAG,KAAK,CAAC,WAAW,IAAI,GAAG,CAAC;QAC7C,IAAI,CAAC,OAAO,GAAG,IAAI,wBAAM,CAAC,iBAAiB,CAAC,IAAI,EAAE,uBAAuB,EAAE;YACzE,IAAI,EAAE,IAAI,CAAC,mBAAmB,CAAC,WAAW,CAAC;YAC3C,IAAI,EAAE,OAAO,CAAC,KAAK,CAAC,UAAU,IAAI,wCAAwC,CAAC;YAC3E,OAAO,EAAE,KAAK,CAAC,aAAa,IAAI,IAAI,wBAAM,CAAC,OAAO,CAAC,iBAAiB,EAAE,0BAAa,CAAC,KAAK,CAAC;YAC1F,OAAO,EAAE,KAAK,CAAC,aAAa,IAAI,WAAW;YAC3C,WAAW,EAAE,KAAK,CAAC,WAAW;YAC9B,aAAa,EAAE,0BAA0B;YACzC,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YAC7B,IAAI,EAAE,KAAK,CAAC,IAAI;YAChB,UAAU,EAAE,WAAW;YACvB,GAAG,EAAE,KAAK,CAAC,GAAG;YACd,UAAU,EAAE,KAAK,CAAC,UAAU;YAC5B,cAAc,EAAE,KAAK,CAAC,cAAc;SACrC,CAAC,CAAC;QAEH,MAAM,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC;QACtC,IAAI,CAAC,WAAW,EAAE;YAAE,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;SAAE;QAE7F,WAAW,CAAC,oBAAoB,CAC9B,IAAI,qBAAG,CAAC,eAAe,CAAC;YACtB,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO,EAAE;gBACP,2BAA2B;gBAC3B,iCAAiC;gBACjC,4BAA4B;gBAC5B,yBAAyB;gBACzB,0BAA0B;gBAC1B,gBAAgB;gBAChB,oBAAoB;gBACpB,mBAAmB;gBACnB,yBAAyB;gBACzB,+BAA+B;gBAC/B,yBAAyB;gBACzB,qBAAqB;gBACrB,yBAAyB;gBACzB,cAAc;aACf;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CAAC,CAAC;QACN,WAAW,CAAC,oBAAoB,CAAC,IAAI,qBAAG,CAAC,eAAe,CAAC;YACvD,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO,EAAE;gBACP,cAAc;aACf;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CAAC,CAAC;QAEJ,IAAI,KAAK,CAAC,SAAS,IAAI,KAAK,CAAC,SAAS,CAAC,MAAM,KAAK,CAAC,EAAE;YACnD,MAAM,IAAI,KAAK,CAAC,iDAAiD,IAAI,CAAC,SAAS,CAAC,KAAK,CAAC,SAAS,CAAC,EAAE,CAAC,CAAC;SACrG;QACD,MAAM,SAAS,GAAG,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;QAE5D,IAAI,4BAAc,CAAC,IAAI,EAAE,gBAAgB,EAAE;YACzC,YAAY,EAAE,IAAI,CAAC,OAAO,CAAC,WAAW;YACtC,sGAAsG;YACtG,YAAY,EAAE,6BAA6B;YAC3C,UAAU,EAAE;gBACV,QAAQ,EAAE,KAAK,CAAC,GAAG,CAAC,GAAG;gBACvB,QAAQ,EAAE,KAAK,CAAC,GAAG,CAAC,KAAK;gBACzB,SAAS,EAAE,KAAK,CAAC,IAAI,CAAC,GAAG;gBACzB,SAAS,EAAE,KAAK,CAAC,IAAI,CAAC,KAAK;gBAC3B,GAAG,SAAS,CAAC,CAAC,CAAC,EAAE,SAAS,EAAE,SAAS,EAAE,CAAC,CAAC,CAAC,EAAE;aAC7C;SACF,CAAC,CAAC;IACL,CAAC;IAEM,oBAAoB,CAAC,SAA0B;QACpD,MAAM,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC;QACtC,IAAI,CAAC,WAAW,EAAE;YAAE,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;SAAE;QAE7F,OAAO,WAAW,CAAC,oBAAoB,CAAC,SAAS,CAAC,CAAC;IACrD,CAAC;IAEO,mBAAmB,CAAC,WAAoB;QAC9C,IAAI,IAAI,GAAG,sCAAsC,CAAC;QAElD,0EAA0E;QAC1E,2EAA2E;QAC3E,4CAA4C;QAC5C,IAAI,WAAW,EAAE;YACf,IAAI,mBAAK,CAAC,YAAY,CAAC,WAAW,CAAC,EAAE;gBACnC,MAAM,IAAI,KAAK,CAAC,mHAAmH,CAAC,CAAC;aACtI;YAED,IAAI,IAAI,IAAI,WAAW,CAAC,QAAQ,EAAE,KAAK,CAAC;SACzC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;;AA9FH,sCA+FC","sourcesContent":["// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n// SPDX-License-Identifier: Apache-2.0\n\n\nimport * as child_process from 'child_process';\nimport * as path from 'path';\nimport { aws_ec2 as ec2, aws_iam as iam, aws_lambda as lambda, Duration, CustomResource, Token } from 'aws-cdk-lib';\nimport { PolicyStatement, AddToPrincipalPolicyResult } from 'aws-cdk-lib/aws-iam';\nimport { RuntimeFamily } from 'aws-cdk-lib/aws-lambda';\nimport { Construct } from 'constructs';\nimport { shouldUsePrebuiltLambda } from './config';\n\nexport interface ECRDeploymentProps {\n\n  /**\n   * Image to use to build Golang lambda for custom resource, if download fails or is not wanted.\n   *\n   * Might be needed for local build if all images need to come from own registry.\n   *\n   * Note that image should use yum as a package manager and have golang available.\n   *\n   * @default - public.ecr.aws/sam/build-go1.x:latest\n   */\n  readonly buildImage?: string;\n  /**\n   * The source of the docker image.\n   */\n  readonly src: IImageName;\n\n  /**\n   * The destination of the docker image.\n   */\n  readonly dest: IImageName;\n\n  /**\n   * The image architecture to be copied.\n   *\n   * The 'amd64' architecture will be copied by default. Specify the\n   * architecture or architectures to copy here.\n   *\n   * It is currently not possible to copy more than one architecture\n   * at a time: the array you specify must contain exactly one string.\n   *\n   * @default ['amd64']\n   */\n  readonly imageArch?: string[];\n\n  /**\n   * The amount of memory (in MiB) to allocate to the AWS Lambda function which\n   * replicates the files from the CDK bucket to the destination bucket.\n   *\n   * If you are deploying large files, you will need to increase this number\n   * accordingly.\n   *\n   * @default - 512\n   */\n  readonly memoryLimit?: number;\n\n  /**\n   * Execution role associated with this function\n   *\n   * @default - A role is automatically created\n   */\n  readonly role?: iam.IRole;\n\n  /**\n   * The VPC network to place the deployment lambda handler in.\n   *\n   * @default - None\n   */\n  readonly vpc?: ec2.IVpc;\n\n  /**\n   * Where in the VPC to place the deployment lambda handler.\n   * Only used if 'vpc' is supplied.\n   *\n   * @default - the Vpc default strategy if not specified\n   */\n  readonly vpcSubnets?: ec2.SubnetSelection;\n\n  /**\n   * The list of security groups to associate with the Lambda's network interfaces.\n   *\n   * Only used if 'vpc' is supplied.\n   *\n   * @default - If the function is placed within a VPC and a security group is\n   * not specified, either by this or securityGroup prop, a dedicated security\n   * group will be created for this function.\n   */\n  readonly securityGroups?: ec2.SecurityGroup[];\n\n  /**\n   * The lambda function runtime environment.\n   *\n   * @default - lambda.Runtime.PROVIDED_AL2023\n   */\n  readonly lambdaRuntime?: lambda.Runtime;\n\n  /**\n   * The name of the lambda handler.\n   *\n   * @default - bootstrap\n   */\n  readonly lambdaHandler?: string;\n\n  /**\n   * The environment variable to set\n   */\n  readonly environment?: { [key: string]: string };\n}\n\nexport interface IImageName {\n  /**\n   *  The uri of the docker image.\n   *\n   *  The uri spec follows https://github.com/containers/skopeo\n   */\n  readonly uri: string;\n\n  /**\n   * The credentials of the docker image. Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.\n   *\n   * If specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or\n   * JSON (`{\"username\":\"<username>\",\"password\":\"<password>\"}`).\n   *\n   * For more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html\n   */\n  creds?: string;\n}\n\nfunction getCode(buildImage: string): lambda.AssetCode {\n  if (shouldUsePrebuiltLambda()) {\n    try {\n      const installScript = path.join(__dirname, '../lambda/install.js');\n      const prebuiltPath = path.join(__dirname, '../lambda/out');\n      child_process.execFileSync(process.argv0, [installScript, prebuiltPath]);\n\n      return lambda.Code.fromAsset(prebuiltPath);\n    } catch (err) {\n      console.warn(`Can not get prebuilt lambda: ${err}`);\n    }\n  }\n\n  return lambda.Code.fromDockerBuild(path.join(__dirname, '../lambda'), {\n    buildArgs: {\n      buildImage,\n    },\n  });\n}\n\nexport class DockerImageName implements IImageName {\n  public constructor(private name: string, public creds?: string) { }\n  public get uri(): string { return `docker://${this.name}`; }\n}\n\nexport class S3ArchiveName implements IImageName {\n  private name: string;\n  public constructor(p: string, ref?: string, public creds?: string) {\n    this.name = p;\n    if (ref) {\n      this.name += ':' + ref;\n    }\n  }\n  public get uri(): string { return `s3://${this.name}`; }\n}\n\nexport class ECRDeployment extends Construct {\n  private handler: lambda.SingletonFunction;\n\n  constructor(scope: Construct, id: string, props: ECRDeploymentProps) {\n    super(scope, id);\n    const memoryLimit = props.memoryLimit ?? 512;\n    this.handler = new lambda.SingletonFunction(this, 'CustomResourceHandler', {\n      uuid: this.renderSingletonUuid(memoryLimit),\n      code: getCode(props.buildImage ?? 'public.ecr.aws/docker/library/golang:1'),\n      runtime: props.lambdaRuntime ?? new lambda.Runtime('provided.al2023', RuntimeFamily.OTHER), // not using Runtime.PROVIDED_AL2023 to support older CDK versions (< 2.105.0)\n      handler: props.lambdaHandler ?? 'bootstrap',\n      environment: props.environment,\n      lambdaPurpose: 'Custom::CDKECRDeployment',\n      timeout: Duration.minutes(15),\n      role: props.role,\n      memorySize: memoryLimit,\n      vpc: props.vpc,\n      vpcSubnets: props.vpcSubnets,\n      securityGroups: props.securityGroups,\n    });\n\n    const handlerRole = this.handler.role;\n    if (!handlerRole) { throw new Error('lambda.SingletonFunction should have created a Role'); }\n\n    handlerRole.addToPrincipalPolicy(\n      new iam.PolicyStatement({\n        effect: iam.Effect.ALLOW,\n        actions: [\n          'ecr:GetAuthorizationToken',\n          'ecr:BatchCheckLayerAvailability',\n          'ecr:GetDownloadUrlForLayer',\n          'ecr:GetRepositoryPolicy',\n          'ecr:DescribeRepositories',\n          'ecr:ListImages',\n          'ecr:DescribeImages',\n          'ecr:BatchGetImage',\n          'ecr:ListTagsForResource',\n          'ecr:DescribeImageScanFindings',\n          'ecr:InitiateLayerUpload',\n          'ecr:UploadLayerPart',\n          'ecr:CompleteLayerUpload',\n          'ecr:PutImage',\n        ],\n        resources: ['*'],\n      }));\n    handlerRole.addToPrincipalPolicy(new iam.PolicyStatement({\n      effect: iam.Effect.ALLOW,\n      actions: [\n        's3:GetObject',\n      ],\n      resources: ['*'],\n    }));\n\n    if (props.imageArch && props.imageArch.length !== 1) {\n      throw new Error(`imageArch must contain exactly 1 element, got ${JSON.stringify(props.imageArch)}`);\n    }\n    const imageArch = props.imageArch ? props.imageArch[0] : '';\n\n    new CustomResource(this, 'CustomResource', {\n      serviceToken: this.handler.functionArn,\n      // This has been copy/pasted and is a pure lie, but changing it is going to change people's infra!! X(\n      resourceType: 'Custom::CDKBucketDeployment',\n      properties: {\n        SrcImage: props.src.uri,\n        SrcCreds: props.src.creds,\n        DestImage: props.dest.uri,\n        DestCreds: props.dest.creds,\n        ...imageArch ? { ImageArch: imageArch } : {},\n      },\n    });\n  }\n\n  public addToPrincipalPolicy(statement: PolicyStatement): AddToPrincipalPolicyResult {\n    const handlerRole = this.handler.role;\n    if (!handlerRole) { throw new Error('lambda.SingletonFunction should have created a Role'); }\n\n    return handlerRole.addToPrincipalPolicy(statement);\n  }\n\n  private renderSingletonUuid(memoryLimit?: number) {\n    let uuid = 'bd07c930-edb9-4112-a20f-03f096f53666';\n\n    // if user specify a custom memory limit, define another singleton handler\n    // with this configuration. otherwise, it won't be possible to use multiple\n    // configurations since we have a singleton.\n    if (memoryLimit) {\n      if (Token.isUnresolved(memoryLimit)) {\n        throw new Error('Can\\'t use tokens when specifying \"memoryLimit\" since we use it to identify the singleton custom resource handler');\n      }\n\n      uuid += `-${memoryLimit.toString()}MiB`;\n    }\n\n    return uuid;\n  }\n}\n"]}
|
|
156
|
+
ECRDeployment[_c] = { fqn: "cdk-ecr-deployment.ECRDeployment", version: "3.3.0" };
|
|
157
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;AAAA,qEAAqE;AACrE,sCAAsC;AAEtC,6BAA6B;AAC7B,6CAAoH;AAEpH,uDAAuD;AACvD,2CAAuC;AACvC,qCAAmD;AAwHnD,SAAS,OAAO,CAAC,UAAkB;IACjC,IAAI,IAAA,gCAAuB,GAAE,EAAE,CAAC;QAC9B,IAAI,CAAC;YACH,MAAM,YAAY,GAAG,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,eAAe,CAAC,CAAC;YAC3D,OAAO,wBAAM,CAAC,IAAI,CAAC,SAAS,CAAC,YAAY,CAAC,CAAC;QAC7C,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,IAAI,CAAC,gCAAgC,GAAG,EAAE,CAAC,CAAC;QACtD,CAAC;IACH,CAAC;IAED,OAAO,wBAAM,CAAC,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,eAAe,CAAC,EAAE;QACxE,SAAS,EAAE;YACT,UAAU;SACX;KACF,CAAC,CAAC;AACL,CAAC;AAED,MAAa,eAAe;IAC1B;;;;;;OAMG;IACH,YAA2B,IAAY,EAAS,KAAc;QAAnC,SAAI,GAAJ,IAAI,CAAQ;QAAS,UAAK,GAAL,KAAK,CAAS;IAAI,CAAC;IACnE,IAAW,GAAG,KAAa,OAAO,YAAY,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;;AAT9D,0CAUC;;;AAED,MAAa,aAAa;IAGxB;;;;;;;OAOG;IACH,YAAmB,CAAS,EAAE,GAAY,EAAS,KAAc;QAAd,UAAK,GAAL,KAAK,CAAS;QAC/D,IAAI,CAAC,IAAI,GAAG,CAAC,CAAC;QACd,IAAI,GAAG,EAAE,CAAC;YACR,IAAI,CAAC,IAAI,IAAI,GAAG,GAAG,GAAG,CAAC;QACzB,CAAC;IACH,CAAC;IACD,IAAW,GAAG,KAAa,OAAO,QAAQ,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;;AAjB1D,sCAkBC;;;AAED,MAAa,aAAc,SAAQ,sBAAS;IAG1C,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAyB;QACjE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,MAAM,WAAW,GAAG,KAAK,CAAC,WAAW,IAAI,GAAG,CAAC;QAC7C,IAAI,CAAC,OAAO,GAAG,IAAI,wBAAM,CAAC,iBAAiB,CAAC,IAAI,EAAE,uBAAuB,EAAE;YACzE,IAAI,EAAE,IAAI,CAAC,mBAAmB,CAAC,WAAW,CAAC;YAC3C,IAAI,EAAE,OAAO,CAAC,KAAK,CAAC,UAAU,IAAI,wCAAwC,CAAC;YAC3E,OAAO,EAAE,KAAK,CAAC,aAAa,IAAI,IAAI,wBAAM,CAAC,OAAO,CAAC,iBAAiB,EAAE,0BAAa,CAAC,KAAK,CAAC,EAAE,8EAA8E;YAC1K,OAAO,EAAE,KAAK,CAAC,aAAa,IAAI,WAAW;YAC3C,WAAW,EAAE,KAAK,CAAC,WAAW;YAC9B,aAAa,EAAE,0BAA0B;YACzC,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YAC7B,IAAI,EAAE,KAAK,CAAC,IAAI;YAChB,UAAU,EAAE,WAAW;YACvB,GAAG,EAAE,KAAK,CAAC,GAAG;YACd,UAAU,EAAE,KAAK,CAAC,UAAU;YAC5B,cAAc,EAAE,KAAK,CAAC,cAAc;SACrC,CAAC,CAAC;QAEH,MAAM,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC;QACtC,IAAI,CAAC,WAAW,EAAE,CAAC;YAAC,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;QAAC,CAAC;QAE7F,WAAW,CAAC,oBAAoB,CAC9B,IAAI,qBAAG,CAAC,eAAe,CAAC;YACtB,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO,EAAE;gBACP,2BAA2B;gBAC3B,iCAAiC;gBACjC,4BAA4B;gBAC5B,yBAAyB;gBACzB,0BAA0B;gBAC1B,gBAAgB;gBAChB,oBAAoB;gBACpB,mBAAmB;gBACnB,yBAAyB;gBACzB,+BAA+B;gBAC/B,yBAAyB;gBACzB,qBAAqB;gBACrB,yBAAyB;gBACzB,cAAc;aACf;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CAAC,CAAC;QACN,WAAW,CAAC,oBAAoB,CAAC,IAAI,qBAAG,CAAC,eAAe,CAAC;YACvD,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO,EAAE;gBACP,cAAc;aACf;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CAAC,CAAC;QAEJ,IAAI,KAAK,CAAC,SAAS,IAAI,KAAK,CAAC,SAAS,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACpD,MAAM,IAAI,KAAK,CAAC,iDAAiD,IAAI,CAAC,SAAS,CAAC,KAAK,CAAC,SAAS,CAAC,EAAE,CAAC,CAAC;QACtG,CAAC;QACD,MAAM,SAAS,GAAG,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;QAE5D,IAAI,4BAAc,CAAC,IAAI,EAAE,gBAAgB,EAAE;YACzC,YAAY,EAAE,IAAI,CAAC,OAAO,CAAC,WAAW;YACtC,sGAAsG;YACtG,YAAY,EAAE,6BAA6B;YAC3C,UAAU,EAAE;gBACV,QAAQ,EAAE,KAAK,CAAC,GAAG,CAAC,GAAG;gBACvB,QAAQ,EAAE,KAAK,CAAC,GAAG,CAAC,KAAK;gBACzB,SAAS,EAAE,KAAK,CAAC,IAAI,CAAC,GAAG;gBACzB,SAAS,EAAE,KAAK,CAAC,IAAI,CAAC,KAAK;gBAC3B,GAAG,SAAS,CAAC,CAAC,CAAC,EAAE,SAAS,EAAE,SAAS,EAAE,CAAC,CAAC,CAAC,EAAE;aAC7C;SACF,CAAC,CAAC;IACL,CAAC;IAEM,oBAAoB,CAAC,SAA0B;QACpD,MAAM,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC;QACtC,IAAI,CAAC,WAAW,EAAE,CAAC;YAAC,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;QAAC,CAAC;QAE7F,OAAO,WAAW,CAAC,oBAAoB,CAAC,SAAS,CAAC,CAAC;IACrD,CAAC;IAEO,mBAAmB,CAAC,WAAoB;QAC9C,IAAI,IAAI,GAAG,sCAAsC,CAAC;QAElD,0EAA0E;QAC1E,2EAA2E;QAC3E,4CAA4C;QAC5C,IAAI,WAAW,EAAE,CAAC;YAChB,IAAI,mBAAK,CAAC,YAAY,CAAC,WAAW,CAAC,EAAE,CAAC;gBACpC,MAAM,IAAI,KAAK,CAAC,mHAAmH,CAAC,CAAC;YACvI,CAAC;YAED,IAAI,IAAI,IAAI,WAAW,CAAC,QAAQ,EAAE,KAAK,CAAC;QAC1C,CAAC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;;AA9FH,sCA+FC","sourcesContent":["// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n// SPDX-License-Identifier: Apache-2.0\n\nimport * as path from 'path';\nimport { aws_ec2 as ec2, aws_iam as iam, aws_lambda as lambda, Duration, CustomResource, Token } from 'aws-cdk-lib';\nimport { PolicyStatement, AddToPrincipalPolicyResult } from 'aws-cdk-lib/aws-iam';\nimport { RuntimeFamily } from 'aws-cdk-lib/aws-lambda';\nimport { Construct } from 'constructs';\nimport { shouldUsePrebuiltLambda } from './config';\n\nexport interface ECRDeploymentProps {\n\n  /**\n   * Image to use to build Golang lambda for custom resource, if download fails or is not wanted.\n   *\n   * Might be needed for local build if all images need to come from own registry.\n   *\n   * Note that image should use yum as a package manager and have golang available.\n   *\n   * @default - public.ecr.aws/sam/build-go1.x:latest\n   */\n  readonly buildImage?: string;\n  /**\n   * The source of the docker image.\n   */\n  readonly src: IImageName;\n\n  /**\n   * The destination of the docker image.\n   */\n  readonly dest: IImageName;\n\n  /**\n   * The image architecture to be copied.\n   *\n   * The 'amd64' architecture will be copied by default. Specify the\n   * architecture or architectures to copy here.\n   *\n   * It is currently not possible to copy more than one architecture\n   * at a time: the array you specify must contain exactly one string.\n   *\n   * @default ['amd64']\n   */\n  readonly imageArch?: string[];\n\n  /**\n   * The amount of memory (in MiB) to allocate to the AWS Lambda function which\n   * replicates the files from the CDK bucket to the destination bucket.\n   *\n   * If you are deploying large files, you will need to increase this number\n   * accordingly.\n   *\n   * @default - 512\n   */\n  readonly memoryLimit?: number;\n\n  /**\n   * Execution role associated with this function\n   *\n   * @default - A role is automatically created\n   */\n  readonly role?: iam.IRole;\n\n  /**\n   * The VPC network to place the deployment lambda handler in.\n   *\n   * @default - None\n   */\n  readonly vpc?: ec2.IVpc;\n\n  /**\n   * Where in the VPC to place the deployment lambda handler.\n   * Only used if 'vpc' is supplied.\n   *\n   * @default - the Vpc default strategy if not specified\n   */\n  readonly vpcSubnets?: ec2.SubnetSelection;\n\n  /**\n   * The list of security groups to associate with the Lambda's network interfaces.\n   *\n   * Only used if 'vpc' is supplied.\n   *\n   * @default - If the function is placed within a VPC and a security group is\n   * not specified, either by this or securityGroup prop, a dedicated security\n   * group will be created for this function.\n   */\n  readonly securityGroups?: ec2.SecurityGroup[];\n\n  /**\n   * The lambda function runtime environment.\n   *\n   * @default - lambda.Runtime.PROVIDED_AL2023\n   */\n  readonly lambdaRuntime?: lambda.Runtime;\n\n  /**\n   * The name of the lambda handler.\n   *\n   * @default - bootstrap\n   */\n  readonly lambdaHandler?: string;\n\n  /**\n   * The environment variable to set\n   */\n  readonly environment?: { [key: string]: string };\n}\n\nexport interface IImageName {\n  /**\n   *  The uri of the docker image.\n   *\n   *  The uri spec follows https://github.com/containers/skopeo\n   */\n  readonly uri: string;\n\n  /**\n   * The credentials of the docker image. Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.\n   *\n   * If specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or\n   * JSON (`{\"username\":\"<username>\",\"password\":\"<password>\"}`).\n   *\n   * For more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html\n   */\n  creds?: string;\n}\n\nfunction getCode(buildImage: string): lambda.AssetCode {\n  if (shouldUsePrebuiltLambda()) {\n    try {\n      const prebuiltPath = path.join(__dirname, '../lambda-bin');\n      return lambda.Code.fromAsset(prebuiltPath);\n    } catch (err) {\n      console.warn(`Can not get prebuilt lambda: ${err}`);\n    }\n  }\n\n  return lambda.Code.fromDockerBuild(path.join(__dirname, '../lambda-src'), {\n    buildArgs: {\n      buildImage,\n    },\n  });\n}\n\nexport class DockerImageName implements IImageName {\n  /**\n   * @param name - The name of the image, e.g. retrieved from `DockerImageAsset.imageUri`\n   * @param creds - The credentials of the docker image. Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.\n   *     If specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or\n   *     JSON (`{\"username\":\"<username>\",\"password\":\"<password>\"}`).\n   *     For more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html\n   */\n  public constructor(private name: string, public creds?: string) { }\n  public get uri(): string { return `docker://${this.name}`; }\n}\n\nexport class S3ArchiveName implements IImageName {\n  private name: string;\n\n  /**\n   * @param p - the S3 bucket name and path of the archive (a S3 URI without the s3://)\n   * @param ref - appended to the end of the name with a `:`, e.g. `:latest`\n   * @param creds - The credentials of the docker image. Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.\n   *     If specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or\n   *     JSON (`{\"username\":\"<username>\",\"password\":\"<password>\"}`).\n   *     For more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html\n   */\n  public constructor(p: string, ref?: string, public creds?: string) {\n    this.name = p;\n    if (ref) {\n      this.name += ':' + ref;\n    }\n  }\n  public get uri(): string { return `s3://${this.name}`; }\n}\n\nexport class ECRDeployment extends Construct {\n  private handler: lambda.SingletonFunction;\n\n  constructor(scope: Construct, id: string, props: ECRDeploymentProps) {\n    super(scope, id);\n    const memoryLimit = props.memoryLimit ?? 512;\n    this.handler = new lambda.SingletonFunction(this, 'CustomResourceHandler', {\n      uuid: this.renderSingletonUuid(memoryLimit),\n      code: getCode(props.buildImage ?? 'public.ecr.aws/docker/library/golang:1'),\n      runtime: props.lambdaRuntime ?? new lambda.Runtime('provided.al2023', RuntimeFamily.OTHER), // not using Runtime.PROVIDED_AL2023 to support older CDK versions (< 2.105.0)\n      handler: props.lambdaHandler ?? 'bootstrap',\n      environment: props.environment,\n      lambdaPurpose: 'Custom::CDKECRDeployment',\n      timeout: Duration.minutes(15),\n      role: props.role,\n      memorySize: memoryLimit,\n      vpc: props.vpc,\n      vpcSubnets: props.vpcSubnets,\n      securityGroups: props.securityGroups,\n    });\n\n    const handlerRole = this.handler.role;\n    if (!handlerRole) { throw new Error('lambda.SingletonFunction should have created a Role'); }\n\n    handlerRole.addToPrincipalPolicy(\n      new iam.PolicyStatement({\n        effect: iam.Effect.ALLOW,\n        actions: [\n          'ecr:GetAuthorizationToken',\n          'ecr:BatchCheckLayerAvailability',\n          'ecr:GetDownloadUrlForLayer',\n          'ecr:GetRepositoryPolicy',\n          'ecr:DescribeRepositories',\n          'ecr:ListImages',\n          'ecr:DescribeImages',\n          'ecr:BatchGetImage',\n          'ecr:ListTagsForResource',\n          'ecr:DescribeImageScanFindings',\n          'ecr:InitiateLayerUpload',\n          'ecr:UploadLayerPart',\n          'ecr:CompleteLayerUpload',\n          'ecr:PutImage',\n        ],\n        resources: ['*'],\n      }));\n    handlerRole.addToPrincipalPolicy(new iam.PolicyStatement({\n      effect: iam.Effect.ALLOW,\n      actions: [\n        's3:GetObject',\n      ],\n      resources: ['*'],\n    }));\n\n    if (props.imageArch && props.imageArch.length !== 1) {\n      throw new Error(`imageArch must contain exactly 1 element, got ${JSON.stringify(props.imageArch)}`);\n    }\n    const imageArch = props.imageArch ? props.imageArch[0] : '';\n\n    new CustomResource(this, 'CustomResource', {\n      serviceToken: this.handler.functionArn,\n      // This has been copy/pasted and is a pure lie, but changing it is going to change people's infra!! X(\n      resourceType: 'Custom::CDKBucketDeployment',\n      properties: {\n        SrcImage: props.src.uri,\n        SrcCreds: props.src.creds,\n        DestImage: props.dest.uri,\n        DestCreds: props.dest.creds,\n        ...imageArch ? { ImageArch: imageArch } : {},\n      },\n    });\n  }\n\n  public addToPrincipalPolicy(statement: PolicyStatement): AddToPrincipalPolicyResult {\n    const handlerRole = this.handler.role;\n    if (!handlerRole) { throw new Error('lambda.SingletonFunction should have created a Role'); }\n\n    return handlerRole.addToPrincipalPolicy(statement);\n  }\n\n  private renderSingletonUuid(memoryLimit?: number) {\n    let uuid = 'bd07c930-edb9-4112-a20f-03f096f53666';\n\n    // if user specify a custom memory limit, define another singleton handler\n    // with this configuration. otherwise, it won't be possible to use multiple\n    // configurations since we have a singleton.\n    if (memoryLimit) {\n      if (Token.isUnresolved(memoryLimit)) {\n        throw new Error('Can\\'t use tokens when specifying \"memoryLimit\" since we use it to identify the singleton custom resource handler');\n      }\n\n      uuid += `-${memoryLimit.toString()}MiB`;\n    }\n\n    return uuid;\n  }\n}\n"]}
|
package/package.json
CHANGED
|
@@ -47,7 +47,7 @@
|
|
|
47
47
|
"@aws-cdk/integ-runner": "latest",
|
|
48
48
|
"@aws-cdk/integ-tests-alpha": "latest",
|
|
49
49
|
"@stylistic/eslint-plugin": "^2",
|
|
50
|
-
"@types/jest": "^
|
|
50
|
+
"@types/jest": "^29",
|
|
51
51
|
"@types/node": "^18",
|
|
52
52
|
"@typescript-eslint/eslint-plugin": "^8",
|
|
53
53
|
"@typescript-eslint/parser": "^8",
|
|
@@ -56,19 +56,19 @@
|
|
|
56
56
|
"commit-and-tag-version": "^12",
|
|
57
57
|
"constructs": "10.0.5",
|
|
58
58
|
"eslint": "^9",
|
|
59
|
-
"eslint-import-resolver-typescript": "^
|
|
59
|
+
"eslint-import-resolver-typescript": "^3.8.6",
|
|
60
60
|
"eslint-plugin-import": "^2.31.0",
|
|
61
|
-
"jest": "^
|
|
62
|
-
"jest-junit": "^
|
|
63
|
-
"jsii": "5.
|
|
61
|
+
"jest": "^29",
|
|
62
|
+
"jest-junit": "^16",
|
|
63
|
+
"jsii": "5.7.x",
|
|
64
64
|
"jsii-diff": "^1.109.0",
|
|
65
65
|
"jsii-docgen": "^10.5.0",
|
|
66
66
|
"jsii-pacmak": "^1.109.0",
|
|
67
67
|
"jsii-rosetta": "^5.7.8",
|
|
68
68
|
"projen": "^0.91.4",
|
|
69
|
-
"ts-jest": "^
|
|
69
|
+
"ts-jest": "^29",
|
|
70
70
|
"ts-node": "^10.9.2",
|
|
71
|
-
"typescript": "
|
|
71
|
+
"typescript": "5.7.x"
|
|
72
72
|
},
|
|
73
73
|
"peerDependencies": {
|
|
74
74
|
"aws-cdk-lib": "^2.80.0",
|
|
@@ -94,7 +94,7 @@
|
|
|
94
94
|
"publishConfig": {
|
|
95
95
|
"access": "public"
|
|
96
96
|
},
|
|
97
|
-
"version": "3.
|
|
97
|
+
"version": "3.3.0",
|
|
98
98
|
"jest": {
|
|
99
99
|
"coverageProvider": "v8",
|
|
100
100
|
"testMatch": [
|
|
@@ -131,11 +131,13 @@
|
|
|
131
131
|
}
|
|
132
132
|
]
|
|
133
133
|
],
|
|
134
|
-
"
|
|
135
|
-
|
|
136
|
-
|
|
137
|
-
|
|
138
|
-
|
|
134
|
+
"transform": {
|
|
135
|
+
"^.+\\.[t]sx?$": [
|
|
136
|
+
"ts-jest",
|
|
137
|
+
{
|
|
138
|
+
"tsconfig": "tsconfig.dev.json"
|
|
139
|
+
}
|
|
140
|
+
]
|
|
139
141
|
}
|
|
140
142
|
},
|
|
141
143
|
"types": "lib/index.d.ts",
|
package/lambda/install.js
DELETED
|
@@ -1,82 +0,0 @@
|
|
|
1
|
-
const fs = require('fs');
|
|
2
|
-
const got = require('got');
|
|
3
|
-
const path = require('path');
|
|
4
|
-
const stream = require('stream');
|
|
5
|
-
const crypto = require('crypto');
|
|
6
|
-
const { HttpProxyAgent, HttpsProxyAgent } = require('hpagent');
|
|
7
|
-
const { promisify } = require('util');
|
|
8
|
-
const pipeline = promisify(stream.pipeline);
|
|
9
|
-
|
|
10
|
-
const package = require('../package.json');
|
|
11
|
-
const version = package.version;
|
|
12
|
-
const rootUrl = package.repository.url.replace('git+', '').replace('.git', '');
|
|
13
|
-
|
|
14
|
-
function mkdirp(p) {
|
|
15
|
-
if (!fs.existsSync(p)) {
|
|
16
|
-
fs.mkdirSync(p, { recursive: true });
|
|
17
|
-
}
|
|
18
|
-
}
|
|
19
|
-
|
|
20
|
-
function sha256sum(p) {
|
|
21
|
-
return new Promise(function (resolve, reject) {
|
|
22
|
-
const hash = crypto.createHash('sha256');
|
|
23
|
-
|
|
24
|
-
fs.createReadStream(p)
|
|
25
|
-
.on('error', reject)
|
|
26
|
-
.on('data', chunk => hash.update(chunk))
|
|
27
|
-
.on('close', () => resolve(hash.digest('hex')));
|
|
28
|
-
});
|
|
29
|
-
}
|
|
30
|
-
|
|
31
|
-
async function download(url, dest, agent) {
|
|
32
|
-
remove(dest);
|
|
33
|
-
console.log(`download ${url}`);
|
|
34
|
-
await pipeline(
|
|
35
|
-
got.stream(url, { agent }),
|
|
36
|
-
fs.createWriteStream(dest)
|
|
37
|
-
);
|
|
38
|
-
}
|
|
39
|
-
|
|
40
|
-
function remove(dest) {
|
|
41
|
-
console.log(`removing ${dest}`);
|
|
42
|
-
fs.rmSync(dest, { force: true });
|
|
43
|
-
}
|
|
44
|
-
|
|
45
|
-
|
|
46
|
-
(async () => {
|
|
47
|
-
const dir = process.argv[2];
|
|
48
|
-
if (!dir) {
|
|
49
|
-
throw new Error('Missing an argument');
|
|
50
|
-
}
|
|
51
|
-
mkdirp(dir);
|
|
52
|
-
|
|
53
|
-
const bin = path.join(dir, 'bootstrap');
|
|
54
|
-
const bootstrapExists = fs.existsSync(bin);
|
|
55
|
-
const size = bootstrapExists ? fs.statSync(bin).size : 0;
|
|
56
|
-
const oneMB = 1024*1024;
|
|
57
|
-
|
|
58
|
-
// if the file doesn't exist or is obviously broken, download a new version
|
|
59
|
-
if (!bootstrapExists || size < oneMB) {
|
|
60
|
-
const agent = {};
|
|
61
|
-
agent.https = process.env.HTTPS_PROXY ? new HttpsProxyAgent({proxy: process.env.HTTPS_PROXY}): undefined;
|
|
62
|
-
agent.http = process.env.HTTP_PROXY ? new HttpProxyAgent({proxy: process.env.HTTP_PROXY}): undefined;
|
|
63
|
-
|
|
64
|
-
try {
|
|
65
|
-
await download(`${rootUrl}/releases/download/v${version}/bootstrap`, bin, agent);
|
|
66
|
-
const expectedIntegrity = (await got(`${rootUrl}/releases/download/v${version}/bootstrap.sha256`, { agent })).body.trim();
|
|
67
|
-
const integrity = await sha256sum(bin);
|
|
68
|
-
|
|
69
|
-
if (integrity !== expectedIntegrity) {
|
|
70
|
-
throw new Error(`Integrity check error: expected ${expectedIntegrity} but got ${integrity}`);
|
|
71
|
-
}
|
|
72
|
-
} catch (err) {
|
|
73
|
-
// we had a failure downloading or validating integrity of the bootstrap file, so let's remove it to be sure
|
|
74
|
-
remove(bin);
|
|
75
|
-
throw err;
|
|
76
|
-
}
|
|
77
|
-
}
|
|
78
|
-
|
|
79
|
-
})().catch(err => {
|
|
80
|
-
console.error(err.toString());
|
|
81
|
-
process.exit(1);
|
|
82
|
-
})
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|