cdk-ecr-deployment 3.2.1 → 3.3.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/.jsii CHANGED
@@ -3457,7 +3457,7 @@
3457
3457
  "stability": "stable"
3458
3458
  },
3459
3459
  "homepage": "https://github.com/cdklabs/cdk-ecr-deployment",
3460
- "jsiiVersion": "5.1.12 (build 0675712)",
3460
+ "jsiiVersion": "5.7.8 (build 2bc6834)",
3461
3461
  "keywords": [
3462
3462
  "cdk"
3463
3463
  ],
@@ -3472,7 +3472,7 @@
3472
3472
  },
3473
3473
  "name": "cdk-ecr-deployment",
3474
3474
  "readme": {
3475
- "markdown": "# cdk-ecr-deployment\n\n[![Release](https://github.com/cdklabs/cdk-ecr-deployment/actions/workflows/release.yml/badge.svg)](https://github.com/cdklabs/cdk-ecr-deployment/actions/workflows/release.yml)\n[![npm version](https://img.shields.io/npm/v/cdk-ecr-deployment)](https://www.npmjs.com/package/cdk-ecr-deployment)\n[![PyPI](https://img.shields.io/pypi/v/cdk-ecr-deployment)](https://pypi.org/project/cdk-ecr-deployment)\n[![npm](https://img.shields.io/npm/dw/cdk-ecr-deployment?label=npm%20downloads)](https://www.npmjs.com/package/cdk-ecr-deployment)\n[![PyPI - Downloads](https://img.shields.io/pypi/dw/cdk-ecr-deployment?label=pypi%20downloads)](https://pypi.org/project/cdk-ecr-deployment)\n\nCDK construct to synchronize single docker image between docker registries.\n\n**Only use v3 of this package**\n\n⚠️ Version 2.* is no longer supported, as the Go.1.x runtime is no longer supported in AWS Lambda.\\\n⚠️ Version 1.* is no longer supported, as CDK v1 has reached the end-of-life\nstage.\n\n## Features\n\n- Copy image from ECR/external registry to (another) ECR/external registry\n- Copy an archive tarball image from s3 to ECR/external registry\n\n## Environment variables\n\nEnable flags: `true`, `1`. e.g. `export CI=1`\n\n- `CI` indicate if it's CI environment. This flag will enable building lambda from scratch.\n- `NO_PREBUILT_LAMBDA` disable using prebuilt lambda.\n- `FORCE_PREBUILT_LAMBDA` force using prebuilt lambda.\n\n⚠️ If you want to force using prebuilt lambda in CI environment to reduce build time. Try `export FORCE_PREBUILT_LAMBDA=1`.\n\n## Examples\n\n```ts\nimport { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';\n\nconst image = new DockerImageAsset(this, 'CDKDockerImage', {\n directory: path.join(__dirname, 'docker'),\n});\n\n// Copy from cdk docker image asset to another ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {\n src: new ecrdeploy.DockerImageName(image.imageUri),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),\n});\n\n// Copy from docker registry to ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {\n src: new ecrdeploy.DockerImageName('nginx:latest'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be either:\n// - plain text in format <username>:<password>\n// - json in format {\"username\":\"<username>\",\"password\":\"<password>\"}\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {\n src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),\n}).addToPrincipalPolicy(new iam.PolicyStatement({\n effect: iam.Effect.ALLOW,\n actions: [\n 'secretsmanager:GetSecretValue',\n ],\n resources: ['*'],\n}));\n```\n\n## Sample: [test/example.ecr-deployment.ts](./test/example.ecr-deployment.ts)\n\n```shell\n# Run the following command to try the sample.\nNO_PREBUILT_LAMBDA=1 npx cdk deploy -a \"npx ts-node -P tsconfig.dev.json --prefer-ts-exts test/example.ecr-deployment.ts\"\n```\n\n## [API](./API.md)\n\n## Tech Details & Contribution\n\nThe core of this project relies on [containers/image](https://github.com/containers/image) which is used by [Skopeo](https://github.com/containers/skopeo).\nPlease take a look at those projects before contribution.\n\nTo support a new docker image source(like docker tarball in s3), you need to implement [image transport interface](https://github.com/containers/image/blob/master/types/types.go). You could take a look at [docker-archive](https://github.com/containers/image/blob/ccb87a8d0f45cf28846e307eb0ec2b9d38a458c2/docker/archive/transport.go) transport for a good start.\n\nTo test the `lambda` folder, `make test`.\n"
3475
+ "markdown": "# cdk-ecr-deployment\n\n[![Release](https://github.com/cdklabs/cdk-ecr-deployment/actions/workflows/release.yml/badge.svg)](https://github.com/cdklabs/cdk-ecr-deployment/actions/workflows/release.yml)\n[![npm version](https://img.shields.io/npm/v/cdk-ecr-deployment)](https://www.npmjs.com/package/cdk-ecr-deployment)\n[![PyPI](https://img.shields.io/pypi/v/cdk-ecr-deployment)](https://pypi.org/project/cdk-ecr-deployment)\n[![npm](https://img.shields.io/npm/dw/cdk-ecr-deployment?label=npm%20downloads)](https://www.npmjs.com/package/cdk-ecr-deployment)\n[![PyPI - Downloads](https://img.shields.io/pypi/dw/cdk-ecr-deployment?label=pypi%20downloads)](https://pypi.org/project/cdk-ecr-deployment)\n\nCDK construct to synchronize single docker image between docker registries.\n\n**Only use v3 of this package**\n\n⚠️ Version 2.* is no longer supported, as the Go.1.x runtime is no longer supported in AWS Lambda.\\\n⚠️ Version 1.* is no longer supported, as CDK v1 has reached the end-of-life\nstage.\n\n## Features\n\n- Copy image from ECR/external registry to (another) ECR/external registry\n- Copy an archive tarball image from s3 to ECR/external registry\n\n## Environment variables\n\nEnable flags: `true`, `1`. e.g. `export CI=1`\n\n- `CI` indicate if it's CI environment. This flag will enable building lambda from scratch.\n- `NO_PREBUILT_LAMBDA` disable using prebuilt lambda.\n- `FORCE_PREBUILT_LAMBDA` force using prebuilt lambda.\n\n⚠️ If you want to force using prebuilt lambda in CI environment to reduce build time. Try `export FORCE_PREBUILT_LAMBDA=1`.\n\n## Examples\n\n```ts\nimport { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';\n\nconst image = new DockerImageAsset(this, 'CDKDockerImage', {\n directory: path.join(__dirname, 'docker'),\n});\n\n// Copy from cdk docker image asset to another ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {\n src: new ecrdeploy.DockerImageName(image.imageUri),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),\n});\n\n// Copy from docker registry to ECR.\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {\n src: new ecrdeploy.DockerImageName('nginx:latest'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),\n});\n\n// Copy from private docker registry to ECR.\n// The format of secret in aws secrets manager must be either:\n// - plain text in format <username>:<password>\n// - json in format {\"username\":\"<username>\",\"password\":\"<password>\"}\nnew ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {\n src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),\n // src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),\n dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),\n}).addToPrincipalPolicy(new iam.PolicyStatement({\n effect: iam.Effect.ALLOW,\n actions: [\n 'secretsmanager:GetSecretValue',\n ],\n resources: ['*'],\n}));\n```\n\n## Sample: [test/example.ecr-deployment.ts](./test/example.ecr-deployment.ts)\n\nAfter cloning the repository, install dependencies and run a full build:\n\n```console\nyarn --frozen-lockfile --check-files\nyarn build\n```\n\nThen run the example like this:\n\n```shell\n# Run the following command to try the sample.\nNO_PREBUILT_LAMBDA=1 npx cdk deploy -a \"npx ts-node -P tsconfig.dev.json --prefer-ts-exts test/example.ecr-deployment.ts\"\n```\n\nTo run the DockerHub example you will first need to setup a Secret in AWS Secrets Manager to provide DockerHub credentials.\nReplace `username:access-token` with your credentials.\n**Please note that Secrets will occur a cost.**\n\n```console\naws secretsmanager create-secret --name DockerHubCredentials --secret-string \"username:access-token\"\n```\n\nFrom the output, copy the ARN of your new secret and export it as env variable\n\n```console\nexport DOCKERHUB_SECRET_ARN=\"<ARN>\"\n```\n\nFinally run:\n\n```shell\n# Run the following command to try the sample.\nnpx cdk deploy -a \"npx ts-node -P tsconfig.dev.json --prefer-ts-exts test/dockerhub-example.ecr-deployment.ts\"\n```\n\nIf your Secret is encrypted, you might have to adjust the example to also grant decrypt permissions.\n\n## [API](./API.md)\n\n## Tech Details & Contribution\n\nThe core of this project relies on [containers/image](https://github.com/containers/image) which is used by [Skopeo](https://github.com/containers/skopeo).\nPlease take a look at those projects before contribution.\n\nTo support a new docker image source(like docker tarball in s3), you need to implement [image transport interface](https://github.com/containers/image/blob/master/types/types.go). You could take a look at [docker-archive](https://github.com/containers/image/blob/ccb87a8d0f45cf28846e307eb0ec2b9d38a458c2/docker/archive/transport.go) transport for a good start.\n\nAny error in the custom resource provider will show up in the CloudFormation error log as `Invalid PhysicalResourceId`, because of this: <https://github.com/aws/aws-lambda-go/issues/107>. You need to go into the CloudWatch Log Group to find the real error."
3476
3476
  },
3477
3477
  "repository": {
3478
3478
  "type": "git",
@@ -3515,10 +3515,13 @@
3515
3515
  },
3516
3516
  "locationInModule": {
3517
3517
  "filename": "src/index.ts",
3518
- "line": 152
3518
+ "line": 154
3519
3519
  },
3520
3520
  "parameters": [
3521
3521
  {
3522
+ "docs": {
3523
+ "summary": "- The name of the image, e.g. retrieved from `DockerImageAsset.imageUri`."
3524
+ },
3522
3525
  "name": "name",
3523
3526
  "type": {
3524
3527
  "primitive": "string"
@@ -3526,8 +3529,8 @@
3526
3529
  },
3527
3530
  {
3528
3531
  "docs": {
3529
- "remarks": "Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.\n\nIf specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or\nJSON (`{\"username\":\"<username>\",\"password\":\"<password>\"}`).\n\nFor more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html",
3530
- "summary": "The credentials of the docker image."
3532
+ "remarks": "Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.\nIf specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or\nJSON (`{\"username\":\"<username>\",\"password\":\"<password>\"}`).\nFor more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html",
3533
+ "summary": "- The credentials of the docker image."
3531
3534
  },
3532
3535
  "name": "creds",
3533
3536
  "optional": true,
@@ -3543,7 +3546,7 @@
3543
3546
  "kind": "class",
3544
3547
  "locationInModule": {
3545
3548
  "filename": "src/index.ts",
3546
- "line": 151
3549
+ "line": 146
3547
3550
  },
3548
3551
  "name": "DockerImageName",
3549
3552
  "properties": [
@@ -3556,7 +3559,7 @@
3556
3559
  "immutable": true,
3557
3560
  "locationInModule": {
3558
3561
  "filename": "src/index.ts",
3559
- "line": 153
3562
+ "line": 155
3560
3563
  },
3561
3564
  "name": "uri",
3562
3565
  "overrides": "cdk-ecr-deployment.IImageName",
@@ -3566,13 +3569,13 @@
3566
3569
  },
3567
3570
  {
3568
3571
  "docs": {
3569
- "remarks": "Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.\n\nIf specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or\nJSON (`{\"username\":\"<username>\",\"password\":\"<password>\"}`).\n\nFor more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html",
3572
+ "remarks": "Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.\nIf specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or\nJSON (`{\"username\":\"<username>\",\"password\":\"<password>\"}`).\nFor more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html",
3570
3573
  "stability": "stable",
3571
- "summary": "The credentials of the docker image."
3574
+ "summary": "- The credentials of the docker image."
3572
3575
  },
3573
3576
  "locationInModule": {
3574
3577
  "filename": "src/index.ts",
3575
- "line": 152
3578
+ "line": 154
3576
3579
  },
3577
3580
  "name": "creds",
3578
3581
  "optional": true,
@@ -3597,7 +3600,7 @@
3597
3600
  },
3598
3601
  "locationInModule": {
3599
3602
  "filename": "src/index.ts",
3600
- "line": 170
3603
+ "line": 181
3601
3604
  },
3602
3605
  "parameters": [
3603
3606
  {
@@ -3623,7 +3626,7 @@
3623
3626
  "kind": "class",
3624
3627
  "locationInModule": {
3625
3628
  "filename": "src/index.ts",
3626
- "line": 167
3629
+ "line": 178
3627
3630
  },
3628
3631
  "methods": [
3629
3632
  {
@@ -3632,7 +3635,7 @@
3632
3635
  },
3633
3636
  "locationInModule": {
3634
3637
  "filename": "src/index.ts",
3635
- "line": 239
3638
+ "line": 250
3636
3639
  },
3637
3640
  "name": "addToPrincipalPolicy",
3638
3641
  "parameters": [
@@ -3663,7 +3666,7 @@
3663
3666
  "kind": "interface",
3664
3667
  "locationInModule": {
3665
3668
  "filename": "src/index.ts",
3666
- "line": 13
3669
+ "line": 11
3667
3670
  },
3668
3671
  "name": "ECRDeploymentProps",
3669
3672
  "properties": [
@@ -3676,7 +3679,7 @@
3676
3679
  "immutable": true,
3677
3680
  "locationInModule": {
3678
3681
  "filename": "src/index.ts",
3679
- "line": 33
3682
+ "line": 31
3680
3683
  },
3681
3684
  "name": "dest",
3682
3685
  "type": {
@@ -3692,7 +3695,7 @@
3692
3695
  "immutable": true,
3693
3696
  "locationInModule": {
3694
3697
  "filename": "src/index.ts",
3695
- "line": 28
3698
+ "line": 26
3696
3699
  },
3697
3700
  "name": "src",
3698
3701
  "type": {
@@ -3710,7 +3713,7 @@
3710
3713
  "immutable": true,
3711
3714
  "locationInModule": {
3712
3715
  "filename": "src/index.ts",
3713
- "line": 24
3716
+ "line": 22
3714
3717
  },
3715
3718
  "name": "buildImage",
3716
3719
  "optional": true,
@@ -3727,7 +3730,7 @@
3727
3730
  "immutable": true,
3728
3731
  "locationInModule": {
3729
3732
  "filename": "src/index.ts",
3730
- "line": 109
3733
+ "line": 107
3731
3734
  },
3732
3735
  "name": "environment",
3733
3736
  "optional": true,
@@ -3751,7 +3754,7 @@
3751
3754
  "immutable": true,
3752
3755
  "locationInModule": {
3753
3756
  "filename": "src/index.ts",
3754
- "line": 46
3757
+ "line": 44
3755
3758
  },
3756
3759
  "name": "imageArch",
3757
3760
  "optional": true,
@@ -3774,7 +3777,7 @@
3774
3777
  "immutable": true,
3775
3778
  "locationInModule": {
3776
3779
  "filename": "src/index.ts",
3777
- "line": 104
3780
+ "line": 102
3778
3781
  },
3779
3782
  "name": "lambdaHandler",
3780
3783
  "optional": true,
@@ -3792,7 +3795,7 @@
3792
3795
  "immutable": true,
3793
3796
  "locationInModule": {
3794
3797
  "filename": "src/index.ts",
3795
- "line": 97
3798
+ "line": 95
3796
3799
  },
3797
3800
  "name": "lambdaRuntime",
3798
3801
  "optional": true,
@@ -3811,7 +3814,7 @@
3811
3814
  "immutable": true,
3812
3815
  "locationInModule": {
3813
3816
  "filename": "src/index.ts",
3814
- "line": 57
3817
+ "line": 55
3815
3818
  },
3816
3819
  "name": "memoryLimit",
3817
3820
  "optional": true,
@@ -3829,7 +3832,7 @@
3829
3832
  "immutable": true,
3830
3833
  "locationInModule": {
3831
3834
  "filename": "src/index.ts",
3832
- "line": 64
3835
+ "line": 62
3833
3836
  },
3834
3837
  "name": "role",
3835
3838
  "optional": true,
@@ -3848,7 +3851,7 @@
3848
3851
  "immutable": true,
3849
3852
  "locationInModule": {
3850
3853
  "filename": "src/index.ts",
3851
- "line": 90
3854
+ "line": 88
3852
3855
  },
3853
3856
  "name": "securityGroups",
3854
3857
  "optional": true,
@@ -3871,7 +3874,7 @@
3871
3874
  "immutable": true,
3872
3875
  "locationInModule": {
3873
3876
  "filename": "src/index.ts",
3874
- "line": 71
3877
+ "line": 69
3875
3878
  },
3876
3879
  "name": "vpc",
3877
3880
  "optional": true,
@@ -3890,7 +3893,7 @@
3890
3893
  "immutable": true,
3891
3894
  "locationInModule": {
3892
3895
  "filename": "src/index.ts",
3893
- "line": 79
3896
+ "line": 77
3894
3897
  },
3895
3898
  "name": "vpcSubnets",
3896
3899
  "optional": true,
@@ -3910,7 +3913,7 @@
3910
3913
  "kind": "interface",
3911
3914
  "locationInModule": {
3912
3915
  "filename": "src/index.ts",
3913
- "line": 112
3916
+ "line": 110
3914
3917
  },
3915
3918
  "name": "IImageName",
3916
3919
  "properties": [
@@ -3924,7 +3927,7 @@
3924
3927
  "immutable": true,
3925
3928
  "locationInModule": {
3926
3929
  "filename": "src/index.ts",
3927
- "line": 118
3930
+ "line": 116
3928
3931
  },
3929
3932
  "name": "uri",
3930
3933
  "type": {
@@ -3940,7 +3943,7 @@
3940
3943
  },
3941
3944
  "locationInModule": {
3942
3945
  "filename": "src/index.ts",
3943
- "line": 128
3946
+ "line": 126
3944
3947
  },
3945
3948
  "name": "creds",
3946
3949
  "optional": true,
@@ -3963,16 +3966,22 @@
3963
3966
  },
3964
3967
  "locationInModule": {
3965
3968
  "filename": "src/index.ts",
3966
- "line": 158
3969
+ "line": 169
3967
3970
  },
3968
3971
  "parameters": [
3969
3972
  {
3973
+ "docs": {
3974
+ "summary": "- the S3 bucket name and path of the archive (a S3 URI without the s3://)."
3975
+ },
3970
3976
  "name": "p",
3971
3977
  "type": {
3972
3978
  "primitive": "string"
3973
3979
  }
3974
3980
  },
3975
3981
  {
3982
+ "docs": {
3983
+ "summary": "- appended to the end of the name with a `:`, e.g. `:latest`."
3984
+ },
3976
3985
  "name": "ref",
3977
3986
  "optional": true,
3978
3987
  "type": {
@@ -3981,8 +3990,8 @@
3981
3990
  },
3982
3991
  {
3983
3992
  "docs": {
3984
- "remarks": "Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.\n\nIf specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or\nJSON (`{\"username\":\"<username>\",\"password\":\"<password>\"}`).\n\nFor more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html",
3985
- "summary": "The credentials of the docker image."
3993
+ "remarks": "Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.\nIf specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or\nJSON (`{\"username\":\"<username>\",\"password\":\"<password>\"}`).\nFor more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html",
3994
+ "summary": "- The credentials of the docker image."
3986
3995
  },
3987
3996
  "name": "creds",
3988
3997
  "optional": true,
@@ -3998,7 +4007,7 @@
3998
4007
  "kind": "class",
3999
4008
  "locationInModule": {
4000
4009
  "filename": "src/index.ts",
4001
- "line": 156
4010
+ "line": 158
4002
4011
  },
4003
4012
  "name": "S3ArchiveName",
4004
4013
  "properties": [
@@ -4011,7 +4020,7 @@
4011
4020
  "immutable": true,
4012
4021
  "locationInModule": {
4013
4022
  "filename": "src/index.ts",
4014
- "line": 164
4023
+ "line": 175
4015
4024
  },
4016
4025
  "name": "uri",
4017
4026
  "overrides": "cdk-ecr-deployment.IImageName",
@@ -4021,13 +4030,13 @@
4021
4030
  },
4022
4031
  {
4023
4032
  "docs": {
4024
- "remarks": "Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.\n\nIf specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or\nJSON (`{\"username\":\"<username>\",\"password\":\"<password>\"}`).\n\nFor more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html",
4033
+ "remarks": "Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.\nIf specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or\nJSON (`{\"username\":\"<username>\",\"password\":\"<password>\"}`).\nFor more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html",
4025
4034
  "stability": "stable",
4026
- "summary": "The credentials of the docker image."
4035
+ "summary": "- The credentials of the docker image."
4027
4036
  },
4028
4037
  "locationInModule": {
4029
4038
  "filename": "src/index.ts",
4030
- "line": 158
4039
+ "line": 169
4031
4040
  },
4032
4041
  "name": "creds",
4033
4042
  "optional": true,
@@ -4040,6 +4049,6 @@
4040
4049
  "symbolId": "src/index:S3ArchiveName"
4041
4050
  }
4042
4051
  },
4043
- "version": "3.2.1",
4044
- "fingerprint": "4bSRiKQ84kafoVB105sB4gNTjcd0Ck4yLU2zAoM2kKs="
4052
+ "version": "3.3.0",
4053
+ "fingerprint": "XzAPB9yugJfIoHB8jl1sQ52xAQaBBjCs+msSSUDDIjY="
4045
4054
  }
package/API.md CHANGED
@@ -331,8 +331,8 @@ new DockerImageName(name: string, creds?: string)
331
331
 
332
332
  | **Name** | **Type** | **Description** |
333
333
  | --- | --- | --- |
334
- | <code><a href="#cdk-ecr-deployment.DockerImageName.Initializer.parameter.name">name</a></code> | <code>string</code> | *No description.* |
335
- | <code><a href="#cdk-ecr-deployment.DockerImageName.Initializer.parameter.creds">creds</a></code> | <code>string</code> | The credentials of the docker image. |
334
+ | <code><a href="#cdk-ecr-deployment.DockerImageName.Initializer.parameter.name">name</a></code> | <code>string</code> | - The name of the image, e.g. retrieved from `DockerImageAsset.imageUri`. |
335
+ | <code><a href="#cdk-ecr-deployment.DockerImageName.Initializer.parameter.creds">creds</a></code> | <code>string</code> | - The credentials of the docker image. |
336
336
 
337
337
  ---
338
338
 
@@ -340,6 +340,8 @@ new DockerImageName(name: string, creds?: string)
340
340
 
341
341
  - *Type:* string
342
342
 
343
+ The name of the image, e.g. retrieved from `DockerImageAsset.imageUri`.
344
+
343
345
  ---
344
346
 
345
347
  ##### `creds`<sup>Optional</sup> <a name="creds" id="cdk-ecr-deployment.DockerImageName.Initializer.parameter.creds"></a>
@@ -349,10 +351,8 @@ new DockerImageName(name: string, creds?: string)
349
351
  The credentials of the docker image.
350
352
 
351
353
  Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.
352
-
353
354
  If specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or
354
355
  JSON (`{"username":"<username>","password":"<password>"}`).
355
-
356
356
  For more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html
357
357
 
358
358
  ---
@@ -364,7 +364,7 @@ For more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/lates
364
364
  | **Name** | **Type** | **Description** |
365
365
  | --- | --- | --- |
366
366
  | <code><a href="#cdk-ecr-deployment.DockerImageName.property.uri">uri</a></code> | <code>string</code> | The uri of the docker image. |
367
- | <code><a href="#cdk-ecr-deployment.DockerImageName.property.creds">creds</a></code> | <code>string</code> | The credentials of the docker image. |
367
+ | <code><a href="#cdk-ecr-deployment.DockerImageName.property.creds">creds</a></code> | <code>string</code> | - The credentials of the docker image. |
368
368
 
369
369
  ---
370
370
 
@@ -393,10 +393,8 @@ public readonly creds: string;
393
393
  The credentials of the docker image.
394
394
 
395
395
  Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.
396
-
397
396
  If specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or
398
397
  JSON (`{"username":"<username>","password":"<password>"}`).
399
-
400
398
  For more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html
401
399
 
402
400
  ---
@@ -416,9 +414,9 @@ new S3ArchiveName(p: string, ref?: string, creds?: string)
416
414
 
417
415
  | **Name** | **Type** | **Description** |
418
416
  | --- | --- | --- |
419
- | <code><a href="#cdk-ecr-deployment.S3ArchiveName.Initializer.parameter.p">p</a></code> | <code>string</code> | *No description.* |
420
- | <code><a href="#cdk-ecr-deployment.S3ArchiveName.Initializer.parameter.ref">ref</a></code> | <code>string</code> | *No description.* |
421
- | <code><a href="#cdk-ecr-deployment.S3ArchiveName.Initializer.parameter.creds">creds</a></code> | <code>string</code> | The credentials of the docker image. |
417
+ | <code><a href="#cdk-ecr-deployment.S3ArchiveName.Initializer.parameter.p">p</a></code> | <code>string</code> | - the S3 bucket name and path of the archive (a S3 URI without the s3://). |
418
+ | <code><a href="#cdk-ecr-deployment.S3ArchiveName.Initializer.parameter.ref">ref</a></code> | <code>string</code> | - appended to the end of the name with a `:`, e.g. `:latest`. |
419
+ | <code><a href="#cdk-ecr-deployment.S3ArchiveName.Initializer.parameter.creds">creds</a></code> | <code>string</code> | - The credentials of the docker image. |
422
420
 
423
421
  ---
424
422
 
@@ -426,12 +424,16 @@ new S3ArchiveName(p: string, ref?: string, creds?: string)
426
424
 
427
425
  - *Type:* string
428
426
 
427
+ the S3 bucket name and path of the archive (a S3 URI without the s3://).
428
+
429
429
  ---
430
430
 
431
431
  ##### `ref`<sup>Optional</sup> <a name="ref" id="cdk-ecr-deployment.S3ArchiveName.Initializer.parameter.ref"></a>
432
432
 
433
433
  - *Type:* string
434
434
 
435
+ appended to the end of the name with a `:`, e.g. `:latest`.
436
+
435
437
  ---
436
438
 
437
439
  ##### `creds`<sup>Optional</sup> <a name="creds" id="cdk-ecr-deployment.S3ArchiveName.Initializer.parameter.creds"></a>
@@ -441,10 +443,8 @@ new S3ArchiveName(p: string, ref?: string, creds?: string)
441
443
  The credentials of the docker image.
442
444
 
443
445
  Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.
444
-
445
446
  If specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or
446
447
  JSON (`{"username":"<username>","password":"<password>"}`).
447
-
448
448
  For more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html
449
449
 
450
450
  ---
@@ -456,7 +456,7 @@ For more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/lates
456
456
  | **Name** | **Type** | **Description** |
457
457
  | --- | --- | --- |
458
458
  | <code><a href="#cdk-ecr-deployment.S3ArchiveName.property.uri">uri</a></code> | <code>string</code> | The uri of the docker image. |
459
- | <code><a href="#cdk-ecr-deployment.S3ArchiveName.property.creds">creds</a></code> | <code>string</code> | The credentials of the docker image. |
459
+ | <code><a href="#cdk-ecr-deployment.S3ArchiveName.property.creds">creds</a></code> | <code>string</code> | - The credentials of the docker image. |
460
460
 
461
461
  ---
462
462
 
@@ -485,10 +485,8 @@ public readonly creds: string;
485
485
  The credentials of the docker image.
486
486
 
487
487
  Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.
488
-
489
488
  If specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or
490
489
  JSON (`{"username":"<username>","password":"<password>"}`).
491
-
492
490
  For more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html
493
491
 
494
492
  ---
package/README.md CHANGED
@@ -70,11 +70,43 @@ new ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {
70
70
 
71
71
  ## Sample: [test/example.ecr-deployment.ts](./test/example.ecr-deployment.ts)
72
72
 
73
+ After cloning the repository, install dependencies and run a full build:
74
+
75
+ ```console
76
+ yarn --frozen-lockfile --check-files
77
+ yarn build
78
+ ```
79
+
80
+ Then run the example like this:
81
+
73
82
  ```shell
74
83
  # Run the following command to try the sample.
75
84
  NO_PREBUILT_LAMBDA=1 npx cdk deploy -a "npx ts-node -P tsconfig.dev.json --prefer-ts-exts test/example.ecr-deployment.ts"
76
85
  ```
77
86
 
87
+ To run the DockerHub example you will first need to setup a Secret in AWS Secrets Manager to provide DockerHub credentials.
88
+ Replace `username:access-token` with your credentials.
89
+ **Please note that Secrets will occur a cost.**
90
+
91
+ ```console
92
+ aws secretsmanager create-secret --name DockerHubCredentials --secret-string "username:access-token"
93
+ ```
94
+
95
+ From the output, copy the ARN of your new secret and export it as env variable
96
+
97
+ ```console
98
+ export DOCKERHUB_SECRET_ARN="<ARN>"
99
+ ```
100
+
101
+ Finally run:
102
+
103
+ ```shell
104
+ # Run the following command to try the sample.
105
+ npx cdk deploy -a "npx ts-node -P tsconfig.dev.json --prefer-ts-exts test/dockerhub-example.ecr-deployment.ts"
106
+ ```
107
+
108
+ If your Secret is encrypted, you might have to adjust the example to also grant decrypt permissions.
109
+
78
110
  ## [API](./API.md)
79
111
 
80
112
  ## Tech Details & Contribution
@@ -84,4 +116,4 @@ Please take a look at those projects before contribution.
84
116
 
85
117
  To support a new docker image source(like docker tarball in s3), you need to implement [image transport interface](https://github.com/containers/image/blob/master/types/types.go). You could take a look at [docker-archive](https://github.com/containers/image/blob/ccb87a8d0f45cf28846e307eb0ec2b9d38a458c2/docker/archive/transport.go) transport for a good start.
86
118
 
87
- To test the `lambda` folder, `make test`.
119
+ Any error in the custom resource provider will show up in the CloudFormation error log as `Invalid PhysicalResourceId`, because of this: <https://github.com/aws/aws-lambda-go/issues/107>. You need to go into the CloudWatch Log Group to find the real error.
@@ -0,0 +1,12 @@
1
+ #!/bin/bash
2
+ set -eu
3
+
4
+ GOPROXY=${GOPROXY:-https://goproxy.io|https://goproxy.cn|direct}
5
+
6
+ # The build works as follows:
7
+ #
8
+ # Build the given Dockerfile to produce a file in a predefined location.
9
+ # We then start that container to run a single command to copy that file out, according to
10
+ # the CDK Asset Bundling protocol.
11
+ ${CDK_DOCKER:-docker} build -t cdk-ecr-deployment-lambda --build-arg GOPROXY="${GOPROXY}" lambda-src
12
+ ${CDK_DOCKER:-docker} run --rm -v $PWD/lambda-bin:/out cdk-ecr-deployment-lambda cp /asset/bootstrap /out
File without changes
Binary file
@@ -21,7 +21,7 @@ endif
21
21
  BUILDTAGS := exclude_graphdriver_devicemapper exclude_graphdriver_btrfs containers_image_openpgp lambda.norpc
22
22
  OUTPUT ?= cdk-ecr-deployment-handler
23
23
 
24
- all: test lambda
24
+ all: lambda test
25
25
 
26
26
  upgrade-deps:
27
27
  CGO_ENABLED=0 $(GPGME_ENV) $(GO) get -u -tags "$(BUILDTAGS)"
@@ -58,7 +58,7 @@ require (
58
58
  github.com/docker/go-connections v0.5.0 // indirect
59
59
  github.com/docker/go-units v0.5.0 // indirect
60
60
  github.com/felixge/httpsnoop v1.0.4 // indirect
61
- github.com/go-jose/go-jose/v4 v4.0.4 // indirect
61
+ github.com/go-jose/go-jose/v4 v4.0.5 // indirect
62
62
  github.com/go-logr/logr v1.4.2 // indirect
63
63
  github.com/go-logr/stdr v1.2.2 // indirect
64
64
  github.com/go-openapi/analysis v0.23.0 // indirect
@@ -119,8 +119,8 @@ github.com/envoyproxy/go-control-plane v0.9.4/go.mod h1:6rpuAdCZL397s3pYoYcLgu1m
119
119
  github.com/envoyproxy/protoc-gen-validate v0.1.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c=
120
120
  github.com/felixge/httpsnoop v1.0.4 h1:NFTV2Zj1bL4mc9sqWACXbQFVBBg2W3GPvqp8/ESS2Wg=
121
121
  github.com/felixge/httpsnoop v1.0.4/go.mod h1:m8KPJKqk1gH5J9DgRY2ASl2lWCfGKXixSwevea8zH2U=
122
- github.com/go-jose/go-jose/v4 v4.0.4 h1:VsjPI33J0SB9vQM6PLmNjoHqMQNGPiZ0rHL7Ni7Q6/E=
123
- github.com/go-jose/go-jose/v4 v4.0.4/go.mod h1:NKb5HO1EZccyMpiZNbdUw/14tiXNyUJh188dfnMCAfc=
122
+ github.com/go-jose/go-jose/v4 v4.0.5 h1:M6T8+mKZl/+fNNuFHvGIzDz7BTLQPIounk/b9dw3AaE=
123
+ github.com/go-jose/go-jose/v4 v4.0.5/go.mod h1:s3P1lRrkT8igV8D9OjyL4WRyHvjB6a4JSllnOrmmBOA=
124
124
  github.com/go-logr/logr v1.2.2/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A=
125
125
  github.com/go-logr/logr v1.4.2 h1:6pFjapn8bFcIbiKo3XT4j/BhANplGihG6tvd+8rYgrY=
126
126
  github.com/go-logr/logr v1.4.2/go.mod h1:9T104GzyrTigFIr8wt5mBrctHMim0Nb2HLGrmQ40KvY=
package/lib/config.js CHANGED
@@ -1,6 +1,6 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.shouldUsePrebuiltLambda = void 0;
3
+ exports.shouldUsePrebuiltLambda = shouldUsePrebuiltLambda;
4
4
  const TRUTHY = ['true', true, 1, '1'];
5
5
  function shouldUsePrebuiltLambda() {
6
6
  const { CI, NO_PREBUILT_LAMBDA, FORCE_PREBUILT_LAMBDA } = process.env;
@@ -9,5 +9,4 @@ function shouldUsePrebuiltLambda() {
9
9
  const isForcePrebuilt = FORCE_PREBUILT_LAMBDA && TRUTHY.includes(FORCE_PREBUILT_LAMBDA);
10
10
  return isForcePrebuilt || (!(isCI || isNoPrebuilt));
11
11
  }
12
- exports.shouldUsePrebuiltLambda = shouldUsePrebuiltLambda;
13
- //# sourceMappingURL=data:application/json;base64,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
12
+ //# sourceMappingURL=data:application/json;base64,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
package/lib/index.d.ts CHANGED
@@ -110,12 +110,27 @@ export interface IImageName {
110
110
  export declare class DockerImageName implements IImageName {
111
111
  private name;
112
112
  creds?: string | undefined;
113
+ /**
114
+ * @param name - The name of the image, e.g. retrieved from `DockerImageAsset.imageUri`
115
+ * @param creds - The credentials of the docker image. Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.
116
+ * If specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or
117
+ * JSON (`{"username":"<username>","password":"<password>"}`).
118
+ * For more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html
119
+ */
113
120
  constructor(name: string, creds?: string | undefined);
114
121
  get uri(): string;
115
122
  }
116
123
  export declare class S3ArchiveName implements IImageName {
117
124
  creds?: string | undefined;
118
125
  private name;
126
+ /**
127
+ * @param p - the S3 bucket name and path of the archive (a S3 URI without the s3://)
128
+ * @param ref - appended to the end of the name with a `:`, e.g. `:latest`
129
+ * @param creds - The credentials of the docker image. Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.
130
+ * If specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or
131
+ * JSON (`{"username":"<username>","password":"<password>"}`).
132
+ * For more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html
133
+ */
119
134
  constructor(p: string, ref?: string, creds?: string | undefined);
120
135
  get uri(): string;
121
136
  }
package/lib/index.js CHANGED
@@ -5,7 +5,6 @@ exports.ECRDeployment = exports.S3ArchiveName = exports.DockerImageName = void 0
5
5
  const JSII_RTTI_SYMBOL_1 = Symbol.for("jsii.rtti");
6
6
  // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
7
7
  // SPDX-License-Identifier: Apache-2.0
8
- const child_process = require("child_process");
9
8
  const path = require("path");
10
9
  const aws_cdk_lib_1 = require("aws-cdk-lib");
11
10
  const aws_lambda_1 = require("aws-cdk-lib/aws-lambda");
@@ -14,22 +13,27 @@ const config_1 = require("./config");
14
13
  function getCode(buildImage) {
15
14
  if ((0, config_1.shouldUsePrebuiltLambda)()) {
16
15
  try {
17
- const installScript = path.join(__dirname, '../lambda/install.js');
18
- const prebuiltPath = path.join(__dirname, '../lambda/out');
19
- child_process.execFileSync(process.argv0, [installScript, prebuiltPath]);
16
+ const prebuiltPath = path.join(__dirname, '../lambda-bin');
20
17
  return aws_cdk_lib_1.aws_lambda.Code.fromAsset(prebuiltPath);
21
18
  }
22
19
  catch (err) {
23
20
  console.warn(`Can not get prebuilt lambda: ${err}`);
24
21
  }
25
22
  }
26
- return aws_cdk_lib_1.aws_lambda.Code.fromDockerBuild(path.join(__dirname, '../lambda'), {
23
+ return aws_cdk_lib_1.aws_lambda.Code.fromDockerBuild(path.join(__dirname, '../lambda-src'), {
27
24
  buildArgs: {
28
25
  buildImage,
29
26
  },
30
27
  });
31
28
  }
32
29
  class DockerImageName {
30
+ /**
31
+ * @param name - The name of the image, e.g. retrieved from `DockerImageAsset.imageUri`
32
+ * @param creds - The credentials of the docker image. Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.
33
+ * If specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or
34
+ * JSON (`{"username":"<username>","password":"<password>"}`).
35
+ * For more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html
36
+ */
33
37
  constructor(name, creds) {
34
38
  this.name = name;
35
39
  this.creds = creds;
@@ -38,8 +42,16 @@ class DockerImageName {
38
42
  }
39
43
  exports.DockerImageName = DockerImageName;
40
44
  _a = JSII_RTTI_SYMBOL_1;
41
- DockerImageName[_a] = { fqn: "cdk-ecr-deployment.DockerImageName", version: "3.2.1" };
45
+ DockerImageName[_a] = { fqn: "cdk-ecr-deployment.DockerImageName", version: "3.3.0" };
42
46
  class S3ArchiveName {
47
+ /**
48
+ * @param p - the S3 bucket name and path of the archive (a S3 URI without the s3://)
49
+ * @param ref - appended to the end of the name with a `:`, e.g. `:latest`
50
+ * @param creds - The credentials of the docker image. Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.
51
+ * If specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or
52
+ * JSON (`{"username":"<username>","password":"<password>"}`).
53
+ * For more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html
54
+ */
43
55
  constructor(p, ref, creds) {
44
56
  this.creds = creds;
45
57
  this.name = p;
@@ -51,7 +63,7 @@ class S3ArchiveName {
51
63
  }
52
64
  exports.S3ArchiveName = S3ArchiveName;
53
65
  _b = JSII_RTTI_SYMBOL_1;
54
- S3ArchiveName[_b] = { fqn: "cdk-ecr-deployment.S3ArchiveName", version: "3.2.1" };
66
+ S3ArchiveName[_b] = { fqn: "cdk-ecr-deployment.S3ArchiveName", version: "3.3.0" };
55
67
  class ECRDeployment extends constructs_1.Construct {
56
68
  constructor(scope, id, props) {
57
69
  super(scope, id);
@@ -59,7 +71,7 @@ class ECRDeployment extends constructs_1.Construct {
59
71
  this.handler = new aws_cdk_lib_1.aws_lambda.SingletonFunction(this, 'CustomResourceHandler', {
60
72
  uuid: this.renderSingletonUuid(memoryLimit),
61
73
  code: getCode(props.buildImage ?? 'public.ecr.aws/docker/library/golang:1'),
62
- runtime: props.lambdaRuntime ?? new aws_cdk_lib_1.aws_lambda.Runtime('provided.al2023', aws_lambda_1.RuntimeFamily.OTHER),
74
+ runtime: props.lambdaRuntime ?? new aws_cdk_lib_1.aws_lambda.Runtime('provided.al2023', aws_lambda_1.RuntimeFamily.OTHER), // not using Runtime.PROVIDED_AL2023 to support older CDK versions (< 2.105.0)
63
75
  handler: props.lambdaHandler ?? 'bootstrap',
64
76
  environment: props.environment,
65
77
  lambdaPurpose: 'Custom::CDKECRDeployment',
@@ -141,5 +153,5 @@ class ECRDeployment extends constructs_1.Construct {
141
153
  }
142
154
  exports.ECRDeployment = ECRDeployment;
143
155
  _c = JSII_RTTI_SYMBOL_1;
144
- ECRDeployment[_c] = { fqn: "cdk-ecr-deployment.ECRDeployment", version: "3.2.1" };
145
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;AAAA,qEAAqE;AACrE,sCAAsC;AAGtC,+CAA+C;AAC/C,6BAA6B;AAC7B,6CAAoH;AAEpH,uDAAuD;AACvD,2CAAuC;AACvC,qCAAmD;AAwHnD,SAAS,OAAO,CAAC,UAAkB;IACjC,IAAI,IAAA,gCAAuB,GAAE,EAAE;QAC7B,IAAI;YACF,MAAM,aAAa,GAAG,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,sBAAsB,CAAC,CAAC;YACnE,MAAM,YAAY,GAAG,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,eAAe,CAAC,CAAC;YAC3D,aAAa,CAAC,YAAY,CAAC,OAAO,CAAC,KAAK,EAAE,CAAC,aAAa,EAAE,YAAY,CAAC,CAAC,CAAC;YAEzE,OAAO,wBAAM,CAAC,IAAI,CAAC,SAAS,CAAC,YAAY,CAAC,CAAC;SAC5C;QAAC,OAAO,GAAG,EAAE;YACZ,OAAO,CAAC,IAAI,CAAC,gCAAgC,GAAG,EAAE,CAAC,CAAC;SACrD;KACF;IAED,OAAO,wBAAM,CAAC,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,WAAW,CAAC,EAAE;QACpE,SAAS,EAAE;YACT,UAAU;SACX;KACF,CAAC,CAAC;AACL,CAAC;AAED,MAAa,eAAe;IAC1B,YAA2B,IAAY,EAAS,KAAc;QAAnC,SAAI,GAAJ,IAAI,CAAQ;QAAS,UAAK,GAAL,KAAK,CAAS;IAAI,CAAC;IACnE,IAAW,GAAG,KAAa,OAAO,YAAY,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;;AAF9D,0CAGC;;;AAED,MAAa,aAAa;IAExB,YAAmB,CAAS,EAAE,GAAY,EAAS,KAAc;QAAd,UAAK,GAAL,KAAK,CAAS;QAC/D,IAAI,CAAC,IAAI,GAAG,CAAC,CAAC;QACd,IAAI,GAAG,EAAE;YACP,IAAI,CAAC,IAAI,IAAI,GAAG,GAAG,GAAG,CAAC;SACxB;IACH,CAAC;IACD,IAAW,GAAG,KAAa,OAAO,QAAQ,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;;AAR1D,sCASC;;;AAED,MAAa,aAAc,SAAQ,sBAAS;IAG1C,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAyB;QACjE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,MAAM,WAAW,GAAG,KAAK,CAAC,WAAW,IAAI,GAAG,CAAC;QAC7C,IAAI,CAAC,OAAO,GAAG,IAAI,wBAAM,CAAC,iBAAiB,CAAC,IAAI,EAAE,uBAAuB,EAAE;YACzE,IAAI,EAAE,IAAI,CAAC,mBAAmB,CAAC,WAAW,CAAC;YAC3C,IAAI,EAAE,OAAO,CAAC,KAAK,CAAC,UAAU,IAAI,wCAAwC,CAAC;YAC3E,OAAO,EAAE,KAAK,CAAC,aAAa,IAAI,IAAI,wBAAM,CAAC,OAAO,CAAC,iBAAiB,EAAE,0BAAa,CAAC,KAAK,CAAC;YAC1F,OAAO,EAAE,KAAK,CAAC,aAAa,IAAI,WAAW;YAC3C,WAAW,EAAE,KAAK,CAAC,WAAW;YAC9B,aAAa,EAAE,0BAA0B;YACzC,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YAC7B,IAAI,EAAE,KAAK,CAAC,IAAI;YAChB,UAAU,EAAE,WAAW;YACvB,GAAG,EAAE,KAAK,CAAC,GAAG;YACd,UAAU,EAAE,KAAK,CAAC,UAAU;YAC5B,cAAc,EAAE,KAAK,CAAC,cAAc;SACrC,CAAC,CAAC;QAEH,MAAM,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC;QACtC,IAAI,CAAC,WAAW,EAAE;YAAE,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;SAAE;QAE7F,WAAW,CAAC,oBAAoB,CAC9B,IAAI,qBAAG,CAAC,eAAe,CAAC;YACtB,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO,EAAE;gBACP,2BAA2B;gBAC3B,iCAAiC;gBACjC,4BAA4B;gBAC5B,yBAAyB;gBACzB,0BAA0B;gBAC1B,gBAAgB;gBAChB,oBAAoB;gBACpB,mBAAmB;gBACnB,yBAAyB;gBACzB,+BAA+B;gBAC/B,yBAAyB;gBACzB,qBAAqB;gBACrB,yBAAyB;gBACzB,cAAc;aACf;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CAAC,CAAC;QACN,WAAW,CAAC,oBAAoB,CAAC,IAAI,qBAAG,CAAC,eAAe,CAAC;YACvD,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO,EAAE;gBACP,cAAc;aACf;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CAAC,CAAC;QAEJ,IAAI,KAAK,CAAC,SAAS,IAAI,KAAK,CAAC,SAAS,CAAC,MAAM,KAAK,CAAC,EAAE;YACnD,MAAM,IAAI,KAAK,CAAC,iDAAiD,IAAI,CAAC,SAAS,CAAC,KAAK,CAAC,SAAS,CAAC,EAAE,CAAC,CAAC;SACrG;QACD,MAAM,SAAS,GAAG,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;QAE5D,IAAI,4BAAc,CAAC,IAAI,EAAE,gBAAgB,EAAE;YACzC,YAAY,EAAE,IAAI,CAAC,OAAO,CAAC,WAAW;YACtC,sGAAsG;YACtG,YAAY,EAAE,6BAA6B;YAC3C,UAAU,EAAE;gBACV,QAAQ,EAAE,KAAK,CAAC,GAAG,CAAC,GAAG;gBACvB,QAAQ,EAAE,KAAK,CAAC,GAAG,CAAC,KAAK;gBACzB,SAAS,EAAE,KAAK,CAAC,IAAI,CAAC,GAAG;gBACzB,SAAS,EAAE,KAAK,CAAC,IAAI,CAAC,KAAK;gBAC3B,GAAG,SAAS,CAAC,CAAC,CAAC,EAAE,SAAS,EAAE,SAAS,EAAE,CAAC,CAAC,CAAC,EAAE;aAC7C;SACF,CAAC,CAAC;IACL,CAAC;IAEM,oBAAoB,CAAC,SAA0B;QACpD,MAAM,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC;QACtC,IAAI,CAAC,WAAW,EAAE;YAAE,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;SAAE;QAE7F,OAAO,WAAW,CAAC,oBAAoB,CAAC,SAAS,CAAC,CAAC;IACrD,CAAC;IAEO,mBAAmB,CAAC,WAAoB;QAC9C,IAAI,IAAI,GAAG,sCAAsC,CAAC;QAElD,0EAA0E;QAC1E,2EAA2E;QAC3E,4CAA4C;QAC5C,IAAI,WAAW,EAAE;YACf,IAAI,mBAAK,CAAC,YAAY,CAAC,WAAW,CAAC,EAAE;gBACnC,MAAM,IAAI,KAAK,CAAC,mHAAmH,CAAC,CAAC;aACtI;YAED,IAAI,IAAI,IAAI,WAAW,CAAC,QAAQ,EAAE,KAAK,CAAC;SACzC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;;AA9FH,sCA+FC","sourcesContent":["// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n// SPDX-License-Identifier: Apache-2.0\n\n\nimport * as child_process from 'child_process';\nimport * as path from 'path';\nimport { aws_ec2 as ec2, aws_iam as iam, aws_lambda as lambda, Duration, CustomResource, Token } from 'aws-cdk-lib';\nimport { PolicyStatement, AddToPrincipalPolicyResult } from 'aws-cdk-lib/aws-iam';\nimport { RuntimeFamily } from 'aws-cdk-lib/aws-lambda';\nimport { Construct } from 'constructs';\nimport { shouldUsePrebuiltLambda } from './config';\n\nexport interface ECRDeploymentProps {\n\n  /**\n   * Image to use to build Golang lambda for custom resource, if download fails or is not wanted.\n   *\n   * Might be needed for local build if all images need to come from own registry.\n   *\n   * Note that image should use yum as a package manager and have golang available.\n   *\n   * @default - public.ecr.aws/sam/build-go1.x:latest\n   */\n  readonly buildImage?: string;\n  /**\n   * The source of the docker image.\n   */\n  readonly src: IImageName;\n\n  /**\n   * The destination of the docker image.\n   */\n  readonly dest: IImageName;\n\n  /**\n   * The image architecture to be copied.\n   *\n   * The 'amd64' architecture will be copied by default. Specify the\n   * architecture or architectures to copy here.\n   *\n   * It is currently not possible to copy more than one architecture\n   * at a time: the array you specify must contain exactly one string.\n   *\n   * @default ['amd64']\n   */\n  readonly imageArch?: string[];\n\n  /**\n   * The amount of memory (in MiB) to allocate to the AWS Lambda function which\n   * replicates the files from the CDK bucket to the destination bucket.\n   *\n   * If you are deploying large files, you will need to increase this number\n   * accordingly.\n   *\n   * @default - 512\n   */\n  readonly memoryLimit?: number;\n\n  /**\n   * Execution role associated with this function\n   *\n   * @default - A role is automatically created\n   */\n  readonly role?: iam.IRole;\n\n  /**\n   * The VPC network to place the deployment lambda handler in.\n   *\n   * @default - None\n   */\n  readonly vpc?: ec2.IVpc;\n\n  /**\n   * Where in the VPC to place the deployment lambda handler.\n   * Only used if 'vpc' is supplied.\n   *\n   * @default - the Vpc default strategy if not specified\n   */\n  readonly vpcSubnets?: ec2.SubnetSelection;\n\n  /**\n   * The list of security groups to associate with the Lambda's network interfaces.\n   *\n   * Only used if 'vpc' is supplied.\n   *\n   * @default - If the function is placed within a VPC and a security group is\n   * not specified, either by this or securityGroup prop, a dedicated security\n   * group will be created for this function.\n   */\n  readonly securityGroups?: ec2.SecurityGroup[];\n\n  /**\n   * The lambda function runtime environment.\n   *\n   * @default - lambda.Runtime.PROVIDED_AL2023\n   */\n  readonly lambdaRuntime?: lambda.Runtime;\n\n  /**\n   * The name of the lambda handler.\n   *\n   * @default - bootstrap\n   */\n  readonly lambdaHandler?: string;\n\n  /**\n   * The environment variable to set\n   */\n  readonly environment?: { [key: string]: string };\n}\n\nexport interface IImageName {\n  /**\n   *  The uri of the docker image.\n   *\n   *  The uri spec follows https://github.com/containers/skopeo\n   */\n  readonly uri: string;\n\n  /**\n   * The credentials of the docker image. Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.\n   *\n   * If specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or\n   * JSON (`{\"username\":\"<username>\",\"password\":\"<password>\"}`).\n   *\n   * For more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html\n   */\n  creds?: string;\n}\n\nfunction getCode(buildImage: string): lambda.AssetCode {\n  if (shouldUsePrebuiltLambda()) {\n    try {\n      const installScript = path.join(__dirname, '../lambda/install.js');\n      const prebuiltPath = path.join(__dirname, '../lambda/out');\n      child_process.execFileSync(process.argv0, [installScript, prebuiltPath]);\n\n      return lambda.Code.fromAsset(prebuiltPath);\n    } catch (err) {\n      console.warn(`Can not get prebuilt lambda: ${err}`);\n    }\n  }\n\n  return lambda.Code.fromDockerBuild(path.join(__dirname, '../lambda'), {\n    buildArgs: {\n      buildImage,\n    },\n  });\n}\n\nexport class DockerImageName implements IImageName {\n  public constructor(private name: string, public creds?: string) { }\n  public get uri(): string { return `docker://${this.name}`; }\n}\n\nexport class S3ArchiveName implements IImageName {\n  private name: string;\n  public constructor(p: string, ref?: string, public creds?: string) {\n    this.name = p;\n    if (ref) {\n      this.name += ':' + ref;\n    }\n  }\n  public get uri(): string { return `s3://${this.name}`; }\n}\n\nexport class ECRDeployment extends Construct {\n  private handler: lambda.SingletonFunction;\n\n  constructor(scope: Construct, id: string, props: ECRDeploymentProps) {\n    super(scope, id);\n    const memoryLimit = props.memoryLimit ?? 512;\n    this.handler = new lambda.SingletonFunction(this, 'CustomResourceHandler', {\n      uuid: this.renderSingletonUuid(memoryLimit),\n      code: getCode(props.buildImage ?? 'public.ecr.aws/docker/library/golang:1'),\n      runtime: props.lambdaRuntime ?? new lambda.Runtime('provided.al2023', RuntimeFamily.OTHER), // not using Runtime.PROVIDED_AL2023 to support older CDK versions (< 2.105.0)\n      handler: props.lambdaHandler ?? 'bootstrap',\n      environment: props.environment,\n      lambdaPurpose: 'Custom::CDKECRDeployment',\n      timeout: Duration.minutes(15),\n      role: props.role,\n      memorySize: memoryLimit,\n      vpc: props.vpc,\n      vpcSubnets: props.vpcSubnets,\n      securityGroups: props.securityGroups,\n    });\n\n    const handlerRole = this.handler.role;\n    if (!handlerRole) { throw new Error('lambda.SingletonFunction should have created a Role'); }\n\n    handlerRole.addToPrincipalPolicy(\n      new iam.PolicyStatement({\n        effect: iam.Effect.ALLOW,\n        actions: [\n          'ecr:GetAuthorizationToken',\n          'ecr:BatchCheckLayerAvailability',\n          'ecr:GetDownloadUrlForLayer',\n          'ecr:GetRepositoryPolicy',\n          'ecr:DescribeRepositories',\n          'ecr:ListImages',\n          'ecr:DescribeImages',\n          'ecr:BatchGetImage',\n          'ecr:ListTagsForResource',\n          'ecr:DescribeImageScanFindings',\n          'ecr:InitiateLayerUpload',\n          'ecr:UploadLayerPart',\n          'ecr:CompleteLayerUpload',\n          'ecr:PutImage',\n        ],\n        resources: ['*'],\n      }));\n    handlerRole.addToPrincipalPolicy(new iam.PolicyStatement({\n      effect: iam.Effect.ALLOW,\n      actions: [\n        's3:GetObject',\n      ],\n      resources: ['*'],\n    }));\n\n    if (props.imageArch && props.imageArch.length !== 1) {\n      throw new Error(`imageArch must contain exactly 1 element, got ${JSON.stringify(props.imageArch)}`);\n    }\n    const imageArch = props.imageArch ? props.imageArch[0] : '';\n\n    new CustomResource(this, 'CustomResource', {\n      serviceToken: this.handler.functionArn,\n      // This has been copy/pasted and is a pure lie, but changing it is going to change people's infra!! X(\n      resourceType: 'Custom::CDKBucketDeployment',\n      properties: {\n        SrcImage: props.src.uri,\n        SrcCreds: props.src.creds,\n        DestImage: props.dest.uri,\n        DestCreds: props.dest.creds,\n        ...imageArch ? { ImageArch: imageArch } : {},\n      },\n    });\n  }\n\n  public addToPrincipalPolicy(statement: PolicyStatement): AddToPrincipalPolicyResult {\n    const handlerRole = this.handler.role;\n    if (!handlerRole) { throw new Error('lambda.SingletonFunction should have created a Role'); }\n\n    return handlerRole.addToPrincipalPolicy(statement);\n  }\n\n  private renderSingletonUuid(memoryLimit?: number) {\n    let uuid = 'bd07c930-edb9-4112-a20f-03f096f53666';\n\n    // if user specify a custom memory limit, define another singleton handler\n    // with this configuration. otherwise, it won't be possible to use multiple\n    // configurations since we have a singleton.\n    if (memoryLimit) {\n      if (Token.isUnresolved(memoryLimit)) {\n        throw new Error('Can\\'t use tokens when specifying \"memoryLimit\" since we use it to identify the singleton custom resource handler');\n      }\n\n      uuid += `-${memoryLimit.toString()}MiB`;\n    }\n\n    return uuid;\n  }\n}\n"]}
156
+ ECRDeployment[_c] = { fqn: "cdk-ecr-deployment.ECRDeployment", version: "3.3.0" };
157
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;AAAA,qEAAqE;AACrE,sCAAsC;AAEtC,6BAA6B;AAC7B,6CAAoH;AAEpH,uDAAuD;AACvD,2CAAuC;AACvC,qCAAmD;AAwHnD,SAAS,OAAO,CAAC,UAAkB;IACjC,IAAI,IAAA,gCAAuB,GAAE,EAAE,CAAC;QAC9B,IAAI,CAAC;YACH,MAAM,YAAY,GAAG,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,eAAe,CAAC,CAAC;YAC3D,OAAO,wBAAM,CAAC,IAAI,CAAC,SAAS,CAAC,YAAY,CAAC,CAAC;QAC7C,CAAC;QAAC,OAAO,GAAG,EAAE,CAAC;YACb,OAAO,CAAC,IAAI,CAAC,gCAAgC,GAAG,EAAE,CAAC,CAAC;QACtD,CAAC;IACH,CAAC;IAED,OAAO,wBAAM,CAAC,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,eAAe,CAAC,EAAE;QACxE,SAAS,EAAE;YACT,UAAU;SACX;KACF,CAAC,CAAC;AACL,CAAC;AAED,MAAa,eAAe;IAC1B;;;;;;OAMG;IACH,YAA2B,IAAY,EAAS,KAAc;QAAnC,SAAI,GAAJ,IAAI,CAAQ;QAAS,UAAK,GAAL,KAAK,CAAS;IAAI,CAAC;IACnE,IAAW,GAAG,KAAa,OAAO,YAAY,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;;AAT9D,0CAUC;;;AAED,MAAa,aAAa;IAGxB;;;;;;;OAOG;IACH,YAAmB,CAAS,EAAE,GAAY,EAAS,KAAc;QAAd,UAAK,GAAL,KAAK,CAAS;QAC/D,IAAI,CAAC,IAAI,GAAG,CAAC,CAAC;QACd,IAAI,GAAG,EAAE,CAAC;YACR,IAAI,CAAC,IAAI,IAAI,GAAG,GAAG,GAAG,CAAC;QACzB,CAAC;IACH,CAAC;IACD,IAAW,GAAG,KAAa,OAAO,QAAQ,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;;AAjB1D,sCAkBC;;;AAED,MAAa,aAAc,SAAQ,sBAAS;IAG1C,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAyB;QACjE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,MAAM,WAAW,GAAG,KAAK,CAAC,WAAW,IAAI,GAAG,CAAC;QAC7C,IAAI,CAAC,OAAO,GAAG,IAAI,wBAAM,CAAC,iBAAiB,CAAC,IAAI,EAAE,uBAAuB,EAAE;YACzE,IAAI,EAAE,IAAI,CAAC,mBAAmB,CAAC,WAAW,CAAC;YAC3C,IAAI,EAAE,OAAO,CAAC,KAAK,CAAC,UAAU,IAAI,wCAAwC,CAAC;YAC3E,OAAO,EAAE,KAAK,CAAC,aAAa,IAAI,IAAI,wBAAM,CAAC,OAAO,CAAC,iBAAiB,EAAE,0BAAa,CAAC,KAAK,CAAC,EAAE,8EAA8E;YAC1K,OAAO,EAAE,KAAK,CAAC,aAAa,IAAI,WAAW;YAC3C,WAAW,EAAE,KAAK,CAAC,WAAW;YAC9B,aAAa,EAAE,0BAA0B;YACzC,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YAC7B,IAAI,EAAE,KAAK,CAAC,IAAI;YAChB,UAAU,EAAE,WAAW;YACvB,GAAG,EAAE,KAAK,CAAC,GAAG;YACd,UAAU,EAAE,KAAK,CAAC,UAAU;YAC5B,cAAc,EAAE,KAAK,CAAC,cAAc;SACrC,CAAC,CAAC;QAEH,MAAM,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC;QACtC,IAAI,CAAC,WAAW,EAAE,CAAC;YAAC,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;QAAC,CAAC;QAE7F,WAAW,CAAC,oBAAoB,CAC9B,IAAI,qBAAG,CAAC,eAAe,CAAC;YACtB,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO,EAAE;gBACP,2BAA2B;gBAC3B,iCAAiC;gBACjC,4BAA4B;gBAC5B,yBAAyB;gBACzB,0BAA0B;gBAC1B,gBAAgB;gBAChB,oBAAoB;gBACpB,mBAAmB;gBACnB,yBAAyB;gBACzB,+BAA+B;gBAC/B,yBAAyB;gBACzB,qBAAqB;gBACrB,yBAAyB;gBACzB,cAAc;aACf;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CAAC,CAAC;QACN,WAAW,CAAC,oBAAoB,CAAC,IAAI,qBAAG,CAAC,eAAe,CAAC;YACvD,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO,EAAE;gBACP,cAAc;aACf;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CAAC,CAAC;QAEJ,IAAI,KAAK,CAAC,SAAS,IAAI,KAAK,CAAC,SAAS,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACpD,MAAM,IAAI,KAAK,CAAC,iDAAiD,IAAI,CAAC,SAAS,CAAC,KAAK,CAAC,SAAS,CAAC,EAAE,CAAC,CAAC;QACtG,CAAC;QACD,MAAM,SAAS,GAAG,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;QAE5D,IAAI,4BAAc,CAAC,IAAI,EAAE,gBAAgB,EAAE;YACzC,YAAY,EAAE,IAAI,CAAC,OAAO,CAAC,WAAW;YACtC,sGAAsG;YACtG,YAAY,EAAE,6BAA6B;YAC3C,UAAU,EAAE;gBACV,QAAQ,EAAE,KAAK,CAAC,GAAG,CAAC,GAAG;gBACvB,QAAQ,EAAE,KAAK,CAAC,GAAG,CAAC,KAAK;gBACzB,SAAS,EAAE,KAAK,CAAC,IAAI,CAAC,GAAG;gBACzB,SAAS,EAAE,KAAK,CAAC,IAAI,CAAC,KAAK;gBAC3B,GAAG,SAAS,CAAC,CAAC,CAAC,EAAE,SAAS,EAAE,SAAS,EAAE,CAAC,CAAC,CAAC,EAAE;aAC7C;SACF,CAAC,CAAC;IACL,CAAC;IAEM,oBAAoB,CAAC,SAA0B;QACpD,MAAM,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC;QACtC,IAAI,CAAC,WAAW,EAAE,CAAC;YAAC,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;QAAC,CAAC;QAE7F,OAAO,WAAW,CAAC,oBAAoB,CAAC,SAAS,CAAC,CAAC;IACrD,CAAC;IAEO,mBAAmB,CAAC,WAAoB;QAC9C,IAAI,IAAI,GAAG,sCAAsC,CAAC;QAElD,0EAA0E;QAC1E,2EAA2E;QAC3E,4CAA4C;QAC5C,IAAI,WAAW,EAAE,CAAC;YAChB,IAAI,mBAAK,CAAC,YAAY,CAAC,WAAW,CAAC,EAAE,CAAC;gBACpC,MAAM,IAAI,KAAK,CAAC,mHAAmH,CAAC,CAAC;YACvI,CAAC;YAED,IAAI,IAAI,IAAI,WAAW,CAAC,QAAQ,EAAE,KAAK,CAAC;QAC1C,CAAC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;;AA9FH,sCA+FC","sourcesContent":["// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n// SPDX-License-Identifier: Apache-2.0\n\nimport * as path from 'path';\nimport { aws_ec2 as ec2, aws_iam as iam, aws_lambda as lambda, Duration, CustomResource, Token } from 'aws-cdk-lib';\nimport { PolicyStatement, AddToPrincipalPolicyResult } from 'aws-cdk-lib/aws-iam';\nimport { RuntimeFamily } from 'aws-cdk-lib/aws-lambda';\nimport { Construct } from 'constructs';\nimport { shouldUsePrebuiltLambda } from './config';\n\nexport interface ECRDeploymentProps {\n\n  /**\n   * Image to use to build Golang lambda for custom resource, if download fails or is not wanted.\n   *\n   * Might be needed for local build if all images need to come from own registry.\n   *\n   * Note that image should use yum as a package manager and have golang available.\n   *\n   * @default - public.ecr.aws/sam/build-go1.x:latest\n   */\n  readonly buildImage?: string;\n  /**\n   * The source of the docker image.\n   */\n  readonly src: IImageName;\n\n  /**\n   * The destination of the docker image.\n   */\n  readonly dest: IImageName;\n\n  /**\n   * The image architecture to be copied.\n   *\n   * The 'amd64' architecture will be copied by default. Specify the\n   * architecture or architectures to copy here.\n   *\n   * It is currently not possible to copy more than one architecture\n   * at a time: the array you specify must contain exactly one string.\n   *\n   * @default ['amd64']\n   */\n  readonly imageArch?: string[];\n\n  /**\n   * The amount of memory (in MiB) to allocate to the AWS Lambda function which\n   * replicates the files from the CDK bucket to the destination bucket.\n   *\n   * If you are deploying large files, you will need to increase this number\n   * accordingly.\n   *\n   * @default - 512\n   */\n  readonly memoryLimit?: number;\n\n  /**\n   * Execution role associated with this function\n   *\n   * @default - A role is automatically created\n   */\n  readonly role?: iam.IRole;\n\n  /**\n   * The VPC network to place the deployment lambda handler in.\n   *\n   * @default - None\n   */\n  readonly vpc?: ec2.IVpc;\n\n  /**\n   * Where in the VPC to place the deployment lambda handler.\n   * Only used if 'vpc' is supplied.\n   *\n   * @default - the Vpc default strategy if not specified\n   */\n  readonly vpcSubnets?: ec2.SubnetSelection;\n\n  /**\n   * The list of security groups to associate with the Lambda's network interfaces.\n   *\n   * Only used if 'vpc' is supplied.\n   *\n   * @default - If the function is placed within a VPC and a security group is\n   * not specified, either by this or securityGroup prop, a dedicated security\n   * group will be created for this function.\n   */\n  readonly securityGroups?: ec2.SecurityGroup[];\n\n  /**\n   * The lambda function runtime environment.\n   *\n   * @default - lambda.Runtime.PROVIDED_AL2023\n   */\n  readonly lambdaRuntime?: lambda.Runtime;\n\n  /**\n   * The name of the lambda handler.\n   *\n   * @default - bootstrap\n   */\n  readonly lambdaHandler?: string;\n\n  /**\n   * The environment variable to set\n   */\n  readonly environment?: { [key: string]: string };\n}\n\nexport interface IImageName {\n  /**\n   *  The uri of the docker image.\n   *\n   *  The uri spec follows https://github.com/containers/skopeo\n   */\n  readonly uri: string;\n\n  /**\n   * The credentials of the docker image. Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.\n   *\n   * If specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or\n   * JSON (`{\"username\":\"<username>\",\"password\":\"<password>\"}`).\n   *\n   * For more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html\n   */\n  creds?: string;\n}\n\nfunction getCode(buildImage: string): lambda.AssetCode {\n  if (shouldUsePrebuiltLambda()) {\n    try {\n      const prebuiltPath = path.join(__dirname, '../lambda-bin');\n      return lambda.Code.fromAsset(prebuiltPath);\n    } catch (err) {\n      console.warn(`Can not get prebuilt lambda: ${err}`);\n    }\n  }\n\n  return lambda.Code.fromDockerBuild(path.join(__dirname, '../lambda-src'), {\n    buildArgs: {\n      buildImage,\n    },\n  });\n}\n\nexport class DockerImageName implements IImageName {\n  /**\n   * @param name - The name of the image, e.g. retrieved from `DockerImageAsset.imageUri`\n   * @param creds - The credentials of the docker image. Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.\n   *     If specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or\n   *     JSON (`{\"username\":\"<username>\",\"password\":\"<password>\"}`).\n   *     For more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html\n   */\n  public constructor(private name: string, public creds?: string) { }\n  public get uri(): string { return `docker://${this.name}`; }\n}\n\nexport class S3ArchiveName implements IImageName {\n  private name: string;\n\n  /**\n   * @param p - the S3 bucket name and path of the archive (a S3 URI without the s3://)\n   * @param ref - appended to the end of the name with a `:`, e.g. `:latest`\n   * @param creds - The credentials of the docker image. Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`.\n   *     If specifying an AWS Secrets Manager secret, the format of the secret should be either plain text (`user:password`) or\n   *     JSON (`{\"username\":\"<username>\",\"password\":\"<password>\"}`).\n   *     For more details on JSON format, see https://docs.aws.amazon.com/AmazonECS/latest/developerguide/private-auth.html\n   */\n  public constructor(p: string, ref?: string, public creds?: string) {\n    this.name = p;\n    if (ref) {\n      this.name += ':' + ref;\n    }\n  }\n  public get uri(): string { return `s3://${this.name}`; }\n}\n\nexport class ECRDeployment extends Construct {\n  private handler: lambda.SingletonFunction;\n\n  constructor(scope: Construct, id: string, props: ECRDeploymentProps) {\n    super(scope, id);\n    const memoryLimit = props.memoryLimit ?? 512;\n    this.handler = new lambda.SingletonFunction(this, 'CustomResourceHandler', {\n      uuid: this.renderSingletonUuid(memoryLimit),\n      code: getCode(props.buildImage ?? 'public.ecr.aws/docker/library/golang:1'),\n      runtime: props.lambdaRuntime ?? new lambda.Runtime('provided.al2023', RuntimeFamily.OTHER), // not using Runtime.PROVIDED_AL2023 to support older CDK versions (< 2.105.0)\n      handler: props.lambdaHandler ?? 'bootstrap',\n      environment: props.environment,\n      lambdaPurpose: 'Custom::CDKECRDeployment',\n      timeout: Duration.minutes(15),\n      role: props.role,\n      memorySize: memoryLimit,\n      vpc: props.vpc,\n      vpcSubnets: props.vpcSubnets,\n      securityGroups: props.securityGroups,\n    });\n\n    const handlerRole = this.handler.role;\n    if (!handlerRole) { throw new Error('lambda.SingletonFunction should have created a Role'); }\n\n    handlerRole.addToPrincipalPolicy(\n      new iam.PolicyStatement({\n        effect: iam.Effect.ALLOW,\n        actions: [\n          'ecr:GetAuthorizationToken',\n          'ecr:BatchCheckLayerAvailability',\n          'ecr:GetDownloadUrlForLayer',\n          'ecr:GetRepositoryPolicy',\n          'ecr:DescribeRepositories',\n          'ecr:ListImages',\n          'ecr:DescribeImages',\n          'ecr:BatchGetImage',\n          'ecr:ListTagsForResource',\n          'ecr:DescribeImageScanFindings',\n          'ecr:InitiateLayerUpload',\n          'ecr:UploadLayerPart',\n          'ecr:CompleteLayerUpload',\n          'ecr:PutImage',\n        ],\n        resources: ['*'],\n      }));\n    handlerRole.addToPrincipalPolicy(new iam.PolicyStatement({\n      effect: iam.Effect.ALLOW,\n      actions: [\n        's3:GetObject',\n      ],\n      resources: ['*'],\n    }));\n\n    if (props.imageArch && props.imageArch.length !== 1) {\n      throw new Error(`imageArch must contain exactly 1 element, got ${JSON.stringify(props.imageArch)}`);\n    }\n    const imageArch = props.imageArch ? props.imageArch[0] : '';\n\n    new CustomResource(this, 'CustomResource', {\n      serviceToken: this.handler.functionArn,\n      // This has been copy/pasted and is a pure lie, but changing it is going to change people's infra!! X(\n      resourceType: 'Custom::CDKBucketDeployment',\n      properties: {\n        SrcImage: props.src.uri,\n        SrcCreds: props.src.creds,\n        DestImage: props.dest.uri,\n        DestCreds: props.dest.creds,\n        ...imageArch ? { ImageArch: imageArch } : {},\n      },\n    });\n  }\n\n  public addToPrincipalPolicy(statement: PolicyStatement): AddToPrincipalPolicyResult {\n    const handlerRole = this.handler.role;\n    if (!handlerRole) { throw new Error('lambda.SingletonFunction should have created a Role'); }\n\n    return handlerRole.addToPrincipalPolicy(statement);\n  }\n\n  private renderSingletonUuid(memoryLimit?: number) {\n    let uuid = 'bd07c930-edb9-4112-a20f-03f096f53666';\n\n    // if user specify a custom memory limit, define another singleton handler\n    // with this configuration. otherwise, it won't be possible to use multiple\n    // configurations since we have a singleton.\n    if (memoryLimit) {\n      if (Token.isUnresolved(memoryLimit)) {\n        throw new Error('Can\\'t use tokens when specifying \"memoryLimit\" since we use it to identify the singleton custom resource handler');\n      }\n\n      uuid += `-${memoryLimit.toString()}MiB`;\n    }\n\n    return uuid;\n  }\n}\n"]}
package/package.json CHANGED
@@ -47,7 +47,7 @@
47
47
  "@aws-cdk/integ-runner": "latest",
48
48
  "@aws-cdk/integ-tests-alpha": "latest",
49
49
  "@stylistic/eslint-plugin": "^2",
50
- "@types/jest": "^27",
50
+ "@types/jest": "^29",
51
51
  "@types/node": "^18",
52
52
  "@typescript-eslint/eslint-plugin": "^8",
53
53
  "@typescript-eslint/parser": "^8",
@@ -56,19 +56,19 @@
56
56
  "commit-and-tag-version": "^12",
57
57
  "constructs": "10.0.5",
58
58
  "eslint": "^9",
59
- "eslint-import-resolver-typescript": "^2.7.1",
59
+ "eslint-import-resolver-typescript": "^3.8.6",
60
60
  "eslint-plugin-import": "^2.31.0",
61
- "jest": "^27",
62
- "jest-junit": "^15",
63
- "jsii": "5.1.x",
61
+ "jest": "^29",
62
+ "jest-junit": "^16",
63
+ "jsii": "5.7.x",
64
64
  "jsii-diff": "^1.109.0",
65
65
  "jsii-docgen": "^10.5.0",
66
66
  "jsii-pacmak": "^1.109.0",
67
67
  "jsii-rosetta": "^5.7.8",
68
68
  "projen": "^0.91.4",
69
- "ts-jest": "^27",
69
+ "ts-jest": "^29",
70
70
  "ts-node": "^10.9.2",
71
- "typescript": "^4.9.5"
71
+ "typescript": "5.7.x"
72
72
  },
73
73
  "peerDependencies": {
74
74
  "aws-cdk-lib": "^2.80.0",
@@ -94,7 +94,7 @@
94
94
  "publishConfig": {
95
95
  "access": "public"
96
96
  },
97
- "version": "3.2.1",
97
+ "version": "3.3.0",
98
98
  "jest": {
99
99
  "coverageProvider": "v8",
100
100
  "testMatch": [
@@ -131,11 +131,13 @@
131
131
  }
132
132
  ]
133
133
  ],
134
- "preset": "ts-jest",
135
- "globals": {
136
- "ts-jest": {
137
- "tsconfig": "tsconfig.dev.json"
138
- }
134
+ "transform": {
135
+ "^.+\\.[t]sx?$": [
136
+ "ts-jest",
137
+ {
138
+ "tsconfig": "tsconfig.dev.json"
139
+ }
140
+ ]
139
141
  }
140
142
  },
141
143
  "types": "lib/index.d.ts",
package/lambda/install.js DELETED
@@ -1,82 +0,0 @@
1
- const fs = require('fs');
2
- const got = require('got');
3
- const path = require('path');
4
- const stream = require('stream');
5
- const crypto = require('crypto');
6
- const { HttpProxyAgent, HttpsProxyAgent } = require('hpagent');
7
- const { promisify } = require('util');
8
- const pipeline = promisify(stream.pipeline);
9
-
10
- const package = require('../package.json');
11
- const version = package.version;
12
- const rootUrl = package.repository.url.replace('git+', '').replace('.git', '');
13
-
14
- function mkdirp(p) {
15
- if (!fs.existsSync(p)) {
16
- fs.mkdirSync(p, { recursive: true });
17
- }
18
- }
19
-
20
- function sha256sum(p) {
21
- return new Promise(function (resolve, reject) {
22
- const hash = crypto.createHash('sha256');
23
-
24
- fs.createReadStream(p)
25
- .on('error', reject)
26
- .on('data', chunk => hash.update(chunk))
27
- .on('close', () => resolve(hash.digest('hex')));
28
- });
29
- }
30
-
31
- async function download(url, dest, agent) {
32
- remove(dest);
33
- console.log(`download ${url}`);
34
- await pipeline(
35
- got.stream(url, { agent }),
36
- fs.createWriteStream(dest)
37
- );
38
- }
39
-
40
- function remove(dest) {
41
- console.log(`removing ${dest}`);
42
- fs.rmSync(dest, { force: true });
43
- }
44
-
45
-
46
- (async () => {
47
- const dir = process.argv[2];
48
- if (!dir) {
49
- throw new Error('Missing an argument');
50
- }
51
- mkdirp(dir);
52
-
53
- const bin = path.join(dir, 'bootstrap');
54
- const bootstrapExists = fs.existsSync(bin);
55
- const size = bootstrapExists ? fs.statSync(bin).size : 0;
56
- const oneMB = 1024*1024;
57
-
58
- // if the file doesn't exist or is obviously broken, download a new version
59
- if (!bootstrapExists || size < oneMB) {
60
- const agent = {};
61
- agent.https = process.env.HTTPS_PROXY ? new HttpsProxyAgent({proxy: process.env.HTTPS_PROXY}): undefined;
62
- agent.http = process.env.HTTP_PROXY ? new HttpProxyAgent({proxy: process.env.HTTP_PROXY}): undefined;
63
-
64
- try {
65
- await download(`${rootUrl}/releases/download/v${version}/bootstrap`, bin, agent);
66
- const expectedIntegrity = (await got(`${rootUrl}/releases/download/v${version}/bootstrap.sha256`, { agent })).body.trim();
67
- const integrity = await sha256sum(bin);
68
-
69
- if (integrity !== expectedIntegrity) {
70
- throw new Error(`Integrity check error: expected ${expectedIntegrity} but got ${integrity}`);
71
- }
72
- } catch (err) {
73
- // we had a failure downloading or validating integrity of the bootstrap file, so let's remove it to be sure
74
- remove(bin);
75
- throw err;
76
- }
77
- }
78
-
79
- })().catch(err => {
80
- console.error(err.toString());
81
- process.exit(1);
82
- })
File without changes
File without changes
File without changes
File without changes
File without changes
File without changes
File without changes
File without changes
File without changes
File without changes