eoapi-cdk 5.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (67) hide show
  1. package/.devcontainer/devcontainer.json +4 -0
  2. package/.github/workflows/build.yaml +73 -0
  3. package/.github/workflows/conventional-pr.yaml +26 -0
  4. package/.github/workflows/distribute.yaml +45 -0
  5. package/.github/workflows/docs.yaml +26 -0
  6. package/.github/workflows/test.yaml +13 -0
  7. package/.github/workflows/tox.yaml +24 -0
  8. package/.jsii +5058 -0
  9. package/.nvmrc +1 -0
  10. package/CHANGELOG.md +195 -0
  11. package/README.md +50 -0
  12. package/diagrams/bastion_diagram.excalidraw +1416 -0
  13. package/diagrams/bastion_diagram.png +0 -0
  14. package/diagrams/ingestor_diagram.excalidraw +2274 -0
  15. package/diagrams/ingestor_diagram.png +0 -0
  16. package/lib/bastion-host/index.d.ts +117 -0
  17. package/lib/bastion-host/index.js +162 -0
  18. package/lib/bootstrapper/index.d.ts +57 -0
  19. package/lib/bootstrapper/index.js +73 -0
  20. package/lib/bootstrapper/runtime/Dockerfile +18 -0
  21. package/lib/bootstrapper/runtime/handler.py +235 -0
  22. package/lib/database/index.d.ts +60 -0
  23. package/lib/database/index.js +84 -0
  24. package/lib/database/instance-memory.json +525 -0
  25. package/lib/index.d.ts +6 -0
  26. package/lib/index.js +19 -0
  27. package/lib/ingestor-api/index.d.ts +54 -0
  28. package/lib/ingestor-api/index.js +147 -0
  29. package/lib/ingestor-api/runtime/dev_requirements.txt +2 -0
  30. package/lib/ingestor-api/runtime/requirements.txt +12 -0
  31. package/lib/ingestor-api/runtime/src/__init__.py +0 -0
  32. package/lib/ingestor-api/runtime/src/collection.py +36 -0
  33. package/lib/ingestor-api/runtime/src/config.py +46 -0
  34. package/lib/ingestor-api/runtime/src/dependencies.py +94 -0
  35. package/lib/ingestor-api/runtime/src/handler.py +9 -0
  36. package/lib/ingestor-api/runtime/src/ingestor.py +82 -0
  37. package/lib/ingestor-api/runtime/src/loader.py +21 -0
  38. package/lib/ingestor-api/runtime/src/main.py +125 -0
  39. package/lib/ingestor-api/runtime/src/schemas.py +148 -0
  40. package/lib/ingestor-api/runtime/src/services.py +44 -0
  41. package/lib/ingestor-api/runtime/src/utils.py +52 -0
  42. package/lib/ingestor-api/runtime/src/validators.py +72 -0
  43. package/lib/ingestor-api/runtime/tests/__init__.py +0 -0
  44. package/lib/ingestor-api/runtime/tests/conftest.py +271 -0
  45. package/lib/ingestor-api/runtime/tests/test_collection.py +35 -0
  46. package/lib/ingestor-api/runtime/tests/test_collection_endpoint.py +41 -0
  47. package/lib/ingestor-api/runtime/tests/test_ingestor.py +60 -0
  48. package/lib/ingestor-api/runtime/tests/test_registration.py +198 -0
  49. package/lib/ingestor-api/runtime/tests/test_utils.py +35 -0
  50. package/lib/stac-api/index.d.ts +50 -0
  51. package/lib/stac-api/index.js +60 -0
  52. package/lib/stac-api/runtime/requirements.txt +8 -0
  53. package/lib/stac-api/runtime/src/__init__.py +0 -0
  54. package/lib/stac-api/runtime/src/app.py +58 -0
  55. package/lib/stac-api/runtime/src/config.py +96 -0
  56. package/lib/stac-api/runtime/src/handler.py +9 -0
  57. package/lib/titiler-pgstac-api/index.d.ts +33 -0
  58. package/lib/titiler-pgstac-api/index.js +67 -0
  59. package/lib/titiler-pgstac-api/runtime/Dockerfile +20 -0
  60. package/lib/titiler-pgstac-api/runtime/dev_requirements.txt +1 -0
  61. package/lib/titiler-pgstac-api/runtime/requirements.txt +3 -0
  62. package/lib/titiler-pgstac-api/runtime/src/__init__.py +3 -0
  63. package/lib/titiler-pgstac-api/runtime/src/handler.py +23 -0
  64. package/lib/titiler-pgstac-api/runtime/src/utils.py +26 -0
  65. package/package.json +81 -0
  66. package/tox.ini +52 -0
  67. package/tsconfig.tsbuildinfo +18116 -0
Binary file
@@ -0,0 +1,117 @@
1
+ import { aws_ec2 as ec2, aws_rds as rds } from "aws-cdk-lib";
2
+ import { Construct } from "constructs";
3
+ /**
4
+ * The database is located in an isolated subnet, meaning that it is not accessible from the public internet. As such, to interact with the database directly, a user must tunnel through a bastion host.
5
+ *
6
+ * ### Configuring
7
+ *
8
+ * This codebase controls _who_ is allowed to connect to the bastion host. This requires two steps:
9
+ *
10
+ * 1. Adding the IP address from which you are connecting to the `ipv4Allowlist` array
11
+ * 1. Creating a bastion host system user by adding the user's configuration inform to `userdata.yaml`
12
+ *
13
+ * #### Adding an IP address to the `ipv4Allowlist` array
14
+ *
15
+ * The `BastionHost` construct takes in an `ipv4Allowlist` array as an argument. Find your IP address (eg `curl api.ipify.org`) and add that to the array along with the trailing CIDR block (likely `/32` to indicate that you are adding a single IP address).
16
+ *
17
+ * #### Creating a user via `userdata.yaml`
18
+ *
19
+ * Add an entry to the `users` array with a username (likely matching your local systems username, which you can get by running the `whoami` command in your terminal) and a public key (likely your default public key, which you can get by running `cat ~/.ssh/id_*.pub` in your terminal).
20
+ *
21
+ * #### Tips & Tricks when using the Bastion Host
22
+ *
23
+ * **Connecting to RDS Instance via SSM**
24
+ *
25
+ * ```sh
26
+ * aws ssm start-session --target $INSTANCE_ID \
27
+ * --document-name AWS-StartPortForwardingSessionToRemoteHost \
28
+ * --parameters '{
29
+ * "host": [
30
+ * "example-db.c5abcdefghij.us-west-2.rds.amazonaws.com"
31
+ * ],
32
+ * "portNumber": [
33
+ * "5432"
34
+ * ],
35
+ * "localPortNumber": [
36
+ * "9999"
37
+ * ]
38
+ * }' \
39
+ * --profile $AWS_PROFILE
40
+ * ```
41
+ *
42
+ * ```sh
43
+ * psql -h localhost -p 9999 # continue adding username (-U) and db (-d) here...
44
+ * ```
45
+ *
46
+ * Connect directly to Bastion Host:
47
+ *
48
+ * ```sh
49
+ * aws ssm start-session --target $INSTANCE_ID --profile $AWS_PROFILE
50
+ * ```
51
+ *
52
+ * **Setting up an SSH tunnel**
53
+ *
54
+ * In your `~/.ssh/config` file, add an entry like:
55
+ *
56
+ * ```
57
+ * Host db-tunnel
58
+ * Hostname {the-bastion-host-address}
59
+ * LocalForward 9999 {the-db-hostname}:5432
60
+ * ```
61
+ *
62
+ * Then a tunnel can be opened via:
63
+ *
64
+ * ```
65
+ * ssh -N db-tunnel
66
+ * ```
67
+ *
68
+ * And a connection to the DB can be made via:
69
+ *
70
+ * ```
71
+ * psql -h 127.0.0.1 -p 9999 -U {username} -d {database}
72
+ * ```
73
+ *
74
+ * **Handling `REMOTE HOST IDENTIFICATION HAS CHANGED!` error**
75
+ *
76
+ * If you've redeployed a bastion host that you've previously connected to, you may see an error like:
77
+ *
78
+ * ```
79
+ * @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
80
+ * @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
81
+ * @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
82
+ * IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
83
+ * Someone could be eavesdropping on you right now (man-in-the-middle attack)!
84
+ * It is also possible that a host key has just been changed.
85
+ * The fingerprint for the ECDSA key sent by the remote host is
86
+ * SHA256:mPnxAOXTpb06PFgI1Qc8TMQ2e9b7goU8y2NdS5hzIr8.
87
+ * Please contact your system administrator.
88
+ * Add correct host key in /Users/username/.ssh/known_hosts to get rid of this message.
89
+ * Offending ECDSA key in /Users/username/.ssh/known_hosts:28
90
+ * ECDSA host key for ec2-12-34-56-789.us-west-2.compute.amazonaws.com has changed and you have requested strict checking.
91
+ * Host key verification failed.
92
+ * ```
93
+ *
94
+ * This is due to the server's fingerprint changing. We can scrub the fingerprint from our system with a command like:
95
+ *
96
+ * ```
97
+ * ssh-keygen -R 12.34.56.789
98
+ * ```
99
+ *
100
+ */
101
+ export declare class BastionHost extends Construct {
102
+ instance: ec2.Instance;
103
+ constructor(scope: Construct, id: string, props: BastionHostProps);
104
+ }
105
+ export interface BastionHostProps {
106
+ readonly vpc: ec2.IVpc;
107
+ readonly db: rds.IDatabaseInstance;
108
+ readonly userData: ec2.UserData;
109
+ readonly ipv4Allowlist: string[];
110
+ readonly sshPort?: number;
111
+ /**
112
+ * Whether or not an elastic IP should be created for the bastion host.
113
+ *
114
+ * @default false
115
+ */
116
+ readonly createElasticIp?: boolean;
117
+ }
@@ -0,0 +1,162 @@
1
+ "use strict";
2
+ var _a;
3
+ Object.defineProperty(exports, "__esModule", { value: true });
4
+ exports.BastionHost = void 0;
5
+ const JSII_RTTI_SYMBOL_1 = Symbol.for("jsii.rtti");
6
+ const aws_cdk_lib_1 = require("aws-cdk-lib");
7
+ const constructs_1 = require("constructs");
8
+ /**
9
+ * The database is located in an isolated subnet, meaning that it is not accessible from the public internet. As such, to interact with the database directly, a user must tunnel through a bastion host.
10
+ *
11
+ * ### Configuring
12
+ *
13
+ * This codebase controls _who_ is allowed to connect to the bastion host. This requires two steps:
14
+ *
15
+ * 1. Adding the IP address from which you are connecting to the `ipv4Allowlist` array
16
+ * 1. Creating a bastion host system user by adding the user's configuration inform to `userdata.yaml`
17
+ *
18
+ * #### Adding an IP address to the `ipv4Allowlist` array
19
+ *
20
+ * The `BastionHost` construct takes in an `ipv4Allowlist` array as an argument. Find your IP address (eg `curl api.ipify.org`) and add that to the array along with the trailing CIDR block (likely `/32` to indicate that you are adding a single IP address).
21
+ *
22
+ * #### Creating a user via `userdata.yaml`
23
+ *
24
+ * Add an entry to the `users` array with a username (likely matching your local systems username, which you can get by running the `whoami` command in your terminal) and a public key (likely your default public key, which you can get by running `cat ~/.ssh/id_*.pub` in your terminal).
25
+ *
26
+ * #### Tips & Tricks when using the Bastion Host
27
+ *
28
+ * **Connecting to RDS Instance via SSM**
29
+ *
30
+ * ```sh
31
+ * aws ssm start-session --target $INSTANCE_ID \
32
+ * --document-name AWS-StartPortForwardingSessionToRemoteHost \
33
+ * --parameters '{
34
+ * "host": [
35
+ * "example-db.c5abcdefghij.us-west-2.rds.amazonaws.com"
36
+ * ],
37
+ * "portNumber": [
38
+ * "5432"
39
+ * ],
40
+ * "localPortNumber": [
41
+ * "9999"
42
+ * ]
43
+ * }' \
44
+ * --profile $AWS_PROFILE
45
+ * ```
46
+ *
47
+ * ```sh
48
+ * psql -h localhost -p 9999 # continue adding username (-U) and db (-d) here...
49
+ * ```
50
+ *
51
+ * Connect directly to Bastion Host:
52
+ *
53
+ * ```sh
54
+ * aws ssm start-session --target $INSTANCE_ID --profile $AWS_PROFILE
55
+ * ```
56
+ *
57
+ * **Setting up an SSH tunnel**
58
+ *
59
+ * In your `~/.ssh/config` file, add an entry like:
60
+ *
61
+ * ```
62
+ * Host db-tunnel
63
+ * Hostname {the-bastion-host-address}
64
+ * LocalForward 9999 {the-db-hostname}:5432
65
+ * ```
66
+ *
67
+ * Then a tunnel can be opened via:
68
+ *
69
+ * ```
70
+ * ssh -N db-tunnel
71
+ * ```
72
+ *
73
+ * And a connection to the DB can be made via:
74
+ *
75
+ * ```
76
+ * psql -h 127.0.0.1 -p 9999 -U {username} -d {database}
77
+ * ```
78
+ *
79
+ * **Handling `REMOTE HOST IDENTIFICATION HAS CHANGED!` error**
80
+ *
81
+ * If you've redeployed a bastion host that you've previously connected to, you may see an error like:
82
+ *
83
+ * ```
84
+ * @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
85
+ * @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
86
+ * @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
87
+ * IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
88
+ * Someone could be eavesdropping on you right now (man-in-the-middle attack)!
89
+ * It is also possible that a host key has just been changed.
90
+ * The fingerprint for the ECDSA key sent by the remote host is
91
+ * SHA256:mPnxAOXTpb06PFgI1Qc8TMQ2e9b7goU8y2NdS5hzIr8.
92
+ * Please contact your system administrator.
93
+ * Add correct host key in /Users/username/.ssh/known_hosts to get rid of this message.
94
+ * Offending ECDSA key in /Users/username/.ssh/known_hosts:28
95
+ * ECDSA host key for ec2-12-34-56-789.us-west-2.compute.amazonaws.com has changed and you have requested strict checking.
96
+ * Host key verification failed.
97
+ * ```
98
+ *
99
+ * This is due to the server's fingerprint changing. We can scrub the fingerprint from our system with a command like:
100
+ *
101
+ * ```
102
+ * ssh-keygen -R 12.34.56.789
103
+ * ```
104
+ *
105
+ */
106
+ class BastionHost extends constructs_1.Construct {
107
+ constructor(scope, id, props) {
108
+ super(scope, id);
109
+ const { stackName } = aws_cdk_lib_1.Stack.of(this);
110
+ // Build ec2 instance
111
+ this.instance = new aws_cdk_lib_1.aws_ec2.Instance(this, "bastion-host", {
112
+ vpc: props.vpc,
113
+ vpcSubnets: { subnetType: aws_cdk_lib_1.aws_ec2.SubnetType.PUBLIC },
114
+ instanceName: `${stackName} bastion host`,
115
+ instanceType: aws_cdk_lib_1.aws_ec2.InstanceType.of(aws_cdk_lib_1.aws_ec2.InstanceClass.BURSTABLE4_GRAVITON, aws_cdk_lib_1.aws_ec2.InstanceSize.NANO),
116
+ machineImage: aws_cdk_lib_1.aws_ec2.MachineImage.latestAmazonLinux({
117
+ generation: aws_cdk_lib_1.aws_ec2.AmazonLinuxGeneration.AMAZON_LINUX_2,
118
+ cpuType: aws_cdk_lib_1.aws_ec2.AmazonLinuxCpuType.ARM_64,
119
+ }),
120
+ userData: props.userData,
121
+ userDataCausesReplacement: true,
122
+ });
123
+ // Assign elastic IP
124
+ if (props.createElasticIp ?? true) {
125
+ new aws_cdk_lib_1.aws_ec2.CfnEIP(this, "IP", {
126
+ instanceId: this.instance.instanceId,
127
+ tags: [{ key: "Name", value: stackName }],
128
+ });
129
+ }
130
+ // Allow bastion host to connect to db
131
+ this.instance.connections.allowTo(props.db.connections.securityGroups[0], aws_cdk_lib_1.aws_ec2.Port.tcp(5432), "Allow connection from bastion host");
132
+ // Allow IP access to bastion host
133
+ for (const ipv4 of props.ipv4Allowlist) {
134
+ this.instance.connections.allowFrom(aws_cdk_lib_1.aws_ec2.Peer.ipv4(ipv4), aws_cdk_lib_1.aws_ec2.Port.tcp(props.sshPort || 22), "SSH Access");
135
+ }
136
+ // Integrate with SSM
137
+ this.instance.addToRolePolicy(new aws_cdk_lib_1.aws_iam.PolicyStatement({
138
+ actions: [
139
+ "ssmmessages:*",
140
+ "ssm:UpdateInstanceInformation",
141
+ "ec2messages:*",
142
+ ],
143
+ resources: ["*"],
144
+ }));
145
+ new aws_cdk_lib_1.CfnOutput(this, "instance-id-output", {
146
+ value: this.instance.instanceId,
147
+ exportName: `${stackName}-instance-id`,
148
+ });
149
+ new aws_cdk_lib_1.CfnOutput(this, "instance-public-ip-output", {
150
+ value: this.instance.instancePublicIp,
151
+ exportName: `${stackName}-instance-public-ip`,
152
+ });
153
+ new aws_cdk_lib_1.CfnOutput(this, "instance-public-dns-name-output", {
154
+ value: this.instance.instancePublicDnsName,
155
+ exportName: `${stackName}-public-dns-name`,
156
+ });
157
+ }
158
+ }
159
+ exports.BastionHost = BastionHost;
160
+ _a = JSII_RTTI_SYMBOL_1;
161
+ BastionHost[_a] = { fqn: "eoapi-cdk.BastionHost", version: "5.0.0" };
162
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["index.ts"],"names":[],"mappings":";;;;;AAAA,6CAMqB;AACrB,2CAAuC;AAEvC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiGG;AACH,MAAa,WAAY,SAAQ,sBAAS;IAGxC,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAuB;QAC/D,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAEjB,MAAM,EAAE,SAAS,EAAE,GAAG,mBAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC;QAErC,qBAAqB;QACrB,IAAI,CAAC,QAAQ,GAAG,IAAI,qBAAG,CAAC,QAAQ,CAAC,IAAI,EAAE,cAAc,EAAE;YACrD,GAAG,EAAE,KAAK,CAAC,GAAG;YACd,UAAU,EAAE,EAAE,UAAU,EAAE,qBAAG,CAAC,UAAU,CAAC,MAAM,EAAE;YACjD,YAAY,EAAE,GAAG,SAAS,eAAe;YACzC,YAAY,EAAE,qBAAG,CAAC,YAAY,CAAC,EAAE,CAC/B,qBAAG,CAAC,aAAa,CAAC,mBAAmB,EACrC,qBAAG,CAAC,YAAY,CAAC,IAAI,CACtB;YACD,YAAY,EAAE,qBAAG,CAAC,YAAY,CAAC,iBAAiB,CAAC;gBAC/C,UAAU,EAAE,qBAAG,CAAC,qBAAqB,CAAC,cAAc;gBACpD,OAAO,EAAE,qBAAG,CAAC,kBAAkB,CAAC,MAAM;aACvC,CAAC;YACF,QAAQ,EAAE,KAAK,CAAC,QAAQ;YACxB,yBAAyB,EAAE,IAAI;SAChC,CAAC,CAAC;QAEH,oBAAoB;QACpB,IAAI,KAAK,CAAC,eAAe,IAAI,IAAI,EAAE;YACjC,IAAI,qBAAG,CAAC,MAAM,CAAC,IAAI,EAAE,IAAI,EAAE;gBACzB,UAAU,EAAE,IAAI,CAAC,QAAQ,CAAC,UAAU;gBACpC,IAAI,EAAE,CAAC,EAAE,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,SAAS,EAAE,CAAC;aAC1C,CAAC,CAAC;SACJ;QAED,sCAAsC;QACtC,IAAI,CAAC,QAAQ,CAAC,WAAW,CAAC,OAAO,CAC/B,KAAK,CAAC,EAAE,CAAC,WAAW,CAAC,cAAc,CAAC,CAAC,CAAC,EACtC,qBAAG,CAAC,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,EAClB,oCAAoC,CACrC,CAAC;QAEF,kCAAkC;QAClC,KAAK,MAAM,IAAI,IAAI,KAAK,CAAC,aAAa,EAAE;YACtC,IAAI,CAAC,QAAQ,CAAC,WAAW,CAAC,SAAS,CACjC,qBAAG,CAAC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,EACnB,qBAAG,CAAC,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,OAAO,IAAI,EAAE,CAAC,EACjC,YAAY,CACb,CAAC;SACH;QAED,qBAAqB;QACrB,IAAI,CAAC,QAAQ,CAAC,eAAe,CAC3B,IAAI,qBAAG,CAAC,eAAe,CAAC;YACtB,OAAO,EAAE;gBACP,eAAe;gBACf,+BAA+B;gBAC/B,eAAe;aAChB;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CACH,CAAC;QAEF,IAAI,uBAAS,CAAC,IAAI,EAAE,oBAAoB,EAAE;YACxC,KAAK,EAAE,IAAI,CAAC,QAAQ,CAAC,UAAU;YAC/B,UAAU,EAAE,GAAG,SAAS,cAAc;SACvC,CAAC,CAAC;QACH,IAAI,uBAAS,CAAC,IAAI,EAAE,2BAA2B,EAAE;YAC/C,KAAK,EAAE,IAAI,CAAC,QAAQ,CAAC,gBAAgB;YACrC,UAAU,EAAE,GAAG,SAAS,qBAAqB;SAC9C,CAAC,CAAC;QACH,IAAI,uBAAS,CAAC,IAAI,EAAE,iCAAiC,EAAE;YACrD,KAAK,EAAE,IAAI,CAAC,QAAQ,CAAC,qBAAqB;YAC1C,UAAU,EAAE,GAAG,SAAS,kBAAkB;SAC3C,CAAC,CAAC;IACL,CAAC;;AAzEH,kCA0EC","sourcesContent":["import {\n  Stack,\n  aws_ec2 as ec2,\n  aws_iam as iam,\n  aws_rds as rds,\n  CfnOutput,\n} from \"aws-cdk-lib\";\nimport { Construct } from \"constructs\";\n\n/**\n * The database is located in an isolated subnet, meaning that it is not accessible from the public internet. As such, to interact with the database directly, a user must tunnel through a bastion host.\n *\n * ### Configuring\n *\n * This codebase controls _who_ is allowed to connect to the bastion host. This requires two steps:\n *\n * 1. Adding the IP address from which you are connecting to the `ipv4Allowlist` array\n * 1. Creating a bastion host system user by adding the user's configuration inform to `userdata.yaml`\n *\n * #### Adding an IP address to the `ipv4Allowlist` array\n *\n * The `BastionHost` construct takes in an `ipv4Allowlist` array as an argument. Find your IP address (eg `curl api.ipify.org`) and add that to the array along with the trailing CIDR block (likely `/32` to indicate that you are adding a single IP address).\n *\n * #### Creating a user via `userdata.yaml`\n *\n * Add an entry to the `users` array with a username (likely matching your local systems username, which you can get by running the `whoami` command in your terminal) and a public key (likely your default public key, which you can get by running `cat ~/.ssh/id_*.pub` in your terminal).\n *\n * #### Tips & Tricks when using the Bastion Host\n *\n * **Connecting to RDS Instance via SSM**\n *\n * ```sh\n * aws ssm start-session --target $INSTANCE_ID \\\n * --document-name AWS-StartPortForwardingSessionToRemoteHost \\\n * --parameters '{\n * \"host\": [\n * \"example-db.c5abcdefghij.us-west-2.rds.amazonaws.com\"\n * ],\n * \"portNumber\": [\n * \"5432\"\n * ],\n * \"localPortNumber\": [\n * \"9999\"\n * ]\n * }' \\\n * --profile $AWS_PROFILE\n * ```\n *\n * ```sh\n * psql -h localhost -p 9999 # continue adding username (-U) and db (-d) here...\n * ```\n *\n * Connect directly to Bastion Host:\n *\n * ```sh\n * aws ssm start-session --target $INSTANCE_ID --profile $AWS_PROFILE\n * ```\n *\n * **Setting up an SSH tunnel**\n *\n * In your `~/.ssh/config` file, add an entry like:\n *\n * ```\n * Host db-tunnel\n * Hostname {the-bastion-host-address}\n * LocalForward 9999 {the-db-hostname}:5432\n * ```\n *\n * Then a tunnel can be opened via:\n *\n * ```\n * ssh -N db-tunnel\n * ```\n *\n * And a connection to the DB can be made via:\n *\n * ```\n * psql -h 127.0.0.1 -p 9999 -U {username} -d {database}\n * ```\n *\n * **Handling `REMOTE HOST IDENTIFICATION HAS CHANGED!` error**\n *\n * If you've redeployed a bastion host that you've previously connected to, you may see an error like:\n *\n * ```\n * @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@\n * @    WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!     @\n * @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@\n * IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!\n * Someone could be eavesdropping on you right now (man-in-the-middle attack)!\n * It is also possible that a host key has just been changed.\n * The fingerprint for the ECDSA key sent by the remote host is\n * SHA256:mPnxAOXTpb06PFgI1Qc8TMQ2e9b7goU8y2NdS5hzIr8.\n * Please contact your system administrator.\n * Add correct host key in /Users/username/.ssh/known_hosts to get rid of this message.\n * Offending ECDSA key in /Users/username/.ssh/known_hosts:28\n * ECDSA host key for ec2-12-34-56-789.us-west-2.compute.amazonaws.com has changed and you have requested strict checking.\n * Host key verification failed.\n * ```\n *\n * This is due to the server's fingerprint changing. We can scrub the fingerprint from our system with a command like:\n *\n * ```\n * ssh-keygen -R 12.34.56.789\n * ```\n *\n */\nexport class BastionHost extends Construct {\n  instance: ec2.Instance;\n\n  constructor(scope: Construct, id: string, props: BastionHostProps) {\n    super(scope, id);\n\n    const { stackName } = Stack.of(this);\n\n    // Build ec2 instance\n    this.instance = new ec2.Instance(this, \"bastion-host\", {\n      vpc: props.vpc,\n      vpcSubnets: { subnetType: ec2.SubnetType.PUBLIC },\n      instanceName: `${stackName} bastion host`,\n      instanceType: ec2.InstanceType.of(\n        ec2.InstanceClass.BURSTABLE4_GRAVITON,\n        ec2.InstanceSize.NANO\n      ),\n      machineImage: ec2.MachineImage.latestAmazonLinux({\n        generation: ec2.AmazonLinuxGeneration.AMAZON_LINUX_2,\n        cpuType: ec2.AmazonLinuxCpuType.ARM_64,\n      }),\n      userData: props.userData,\n      userDataCausesReplacement: true,\n    });\n\n    // Assign elastic IP\n    if (props.createElasticIp ?? true) {\n      new ec2.CfnEIP(this, \"IP\", {\n        instanceId: this.instance.instanceId,\n        tags: [{ key: \"Name\", value: stackName }],\n      });\n    }\n\n    // Allow bastion host to connect to db\n    this.instance.connections.allowTo(\n      props.db.connections.securityGroups[0],\n      ec2.Port.tcp(5432),\n      \"Allow connection from bastion host\"\n    );\n\n    // Allow IP access to bastion host\n    for (const ipv4 of props.ipv4Allowlist) {\n      this.instance.connections.allowFrom(\n        ec2.Peer.ipv4(ipv4),\n        ec2.Port.tcp(props.sshPort || 22),\n        \"SSH Access\"\n      );\n    }\n\n    // Integrate with SSM\n    this.instance.addToRolePolicy(\n      new iam.PolicyStatement({\n        actions: [\n          \"ssmmessages:*\",\n          \"ssm:UpdateInstanceInformation\",\n          \"ec2messages:*\",\n        ],\n        resources: [\"*\"],\n      })\n    );\n\n    new CfnOutput(this, \"instance-id-output\", {\n      value: this.instance.instanceId,\n      exportName: `${stackName}-instance-id`,\n    });\n    new CfnOutput(this, \"instance-public-ip-output\", {\n      value: this.instance.instancePublicIp,\n      exportName: `${stackName}-instance-public-ip`,\n    });\n    new CfnOutput(this, \"instance-public-dns-name-output\", {\n      value: this.instance.instancePublicDnsName,\n      exportName: `${stackName}-public-dns-name`,\n    });\n  }\n}\n\nexport interface BastionHostProps {\n  readonly vpc: ec2.IVpc;\n  readonly db: rds.IDatabaseInstance;\n  readonly userData: ec2.UserData;\n  readonly ipv4Allowlist: string[];\n  readonly sshPort?: number;\n\n  /**\n   * Whether or not an elastic IP should be created for the bastion host.\n   *\n   * @default false\n   */\n  readonly createElasticIp?: boolean;\n}\n"]}
@@ -0,0 +1,57 @@
1
+ import { aws_ec2, aws_rds, aws_secretsmanager } from "aws-cdk-lib";
2
+ import { Construct } from "constructs";
3
+ /**
4
+ * Bootstraps a database instance, installing pgSTAC onto the database.
5
+ */
6
+ export declare class BootstrapPgStac extends Construct {
7
+ secret: aws_secretsmanager.ISecret;
8
+ constructor(scope: Construct, id: string, props: BootstrapPgStacProps);
9
+ }
10
+ export interface BootstrapPgStacProps {
11
+ /**
12
+ * VPC in which the database resides.
13
+ *
14
+ * Note - Must be explicitely set if the `database` only conforms to the
15
+ * `aws_rds.IDatabaseInstace` interface (ie it is a reference to a database instance
16
+ * rather than a database instance.)
17
+ *
18
+ * @default - `vpc` property of the `database` instance provided.
19
+ */
20
+ readonly vpc?: aws_ec2.IVpc;
21
+ /**
22
+ * Database onto which pgSTAC should be installed.
23
+ */
24
+ readonly database: aws_rds.DatabaseInstance | aws_rds.IDatabaseInstance;
25
+ /**
26
+ * Secret containing valid connection details for the database instance. Secret must
27
+ * conform to the format of CDK's `DatabaseInstance` (i.e. a JSON object containing a
28
+ * `username`, `password`, `host`, `port`, and optionally a `dbname`). If a `dbname`
29
+ * property is not specified within the secret, the bootstrapper will attempt to
30
+ * connect to a database with the name of `"postgres"`.
31
+ */
32
+ readonly dbSecret: aws_secretsmanager.ISecret;
33
+ /**
34
+ * Name of database that is to be created and onto which pgSTAC will be installed.
35
+ *
36
+ * @default pgstac
37
+ */
38
+ readonly pgstacDbName?: string;
39
+ /**
40
+ * Name of user that will be generated for connecting to the pgSTAC database.
41
+ *
42
+ * @default pgstac_user
43
+ */
44
+ readonly pgstacUsername?: string;
45
+ /**
46
+ * pgSTAC version to be installed.
47
+ *
48
+ * @default 0.6.8
49
+ */
50
+ readonly pgstacVersion?: string;
51
+ /**
52
+ * Prefix to assign to the generated `secrets_manager.Secret`
53
+ *
54
+ * @default pgstac
55
+ */
56
+ readonly secretsPrefix?: string;
57
+ }
@@ -0,0 +1,73 @@
1
+ "use strict";
2
+ var _a;
3
+ Object.defineProperty(exports, "__esModule", { value: true });
4
+ exports.BootstrapPgStac = void 0;
5
+ const JSII_RTTI_SYMBOL_1 = Symbol.for("jsii.rtti");
6
+ const aws_cdk_lib_1 = require("aws-cdk-lib");
7
+ const constructs_1 = require("constructs");
8
+ function hasVpc(instance) {
9
+ return instance.vpc !== undefined;
10
+ }
11
+ const DEFAULT_PGSTAC_VERSION = "0.6.13";
12
+ /**
13
+ * Bootstraps a database instance, installing pgSTAC onto the database.
14
+ */
15
+ class BootstrapPgStac extends constructs_1.Construct {
16
+ constructor(scope, id, props) {
17
+ super(scope, id);
18
+ const { pgstacVersion = DEFAULT_PGSTAC_VERSION } = props;
19
+ const handler = new aws_cdk_lib_1.aws_lambda.Function(this, "lambda", {
20
+ handler: "handler.handler",
21
+ runtime: aws_cdk_lib_1.aws_lambda.Runtime.PYTHON_3_8,
22
+ code: aws_cdk_lib_1.aws_lambda.Code.fromDockerBuild(__dirname, {
23
+ file: "runtime/Dockerfile",
24
+ buildArgs: { PGSTAC_VERSION: pgstacVersion },
25
+ }),
26
+ timeout: aws_cdk_lib_1.Duration.minutes(2),
27
+ vpc: hasVpc(props.database) ? props.database.vpc : props.vpc,
28
+ logRetention: aws_cdk_lib_1.aws_logs.RetentionDays.ONE_WEEK,
29
+ });
30
+ this.secret = new aws_cdk_lib_1.aws_secretsmanager.Secret(this, "secret", {
31
+ secretName: [
32
+ props.secretsPrefix || "pgstac",
33
+ id,
34
+ this.node.addr.slice(-8),
35
+ ].join("/"),
36
+ generateSecretString: {
37
+ secretStringTemplate: JSON.stringify({
38
+ dbname: props.pgstacDbName || "pgstac",
39
+ engine: "postgres",
40
+ port: 5432,
41
+ host: props.database.instanceEndpoint.hostname,
42
+ username: props.pgstacUsername || "pgstac_user",
43
+ }),
44
+ generateStringKey: "password",
45
+ excludePunctuation: true,
46
+ },
47
+ description: `PgSTAC database bootstrapped by ${aws_cdk_lib_1.Stack.of(this).stackName}`,
48
+ });
49
+ // Allow lambda to...
50
+ // read new user secret
51
+ this.secret.grantRead(handler);
52
+ // read database secret
53
+ props.dbSecret.grantRead(handler);
54
+ // connect to database
55
+ props.database.connections.allowFrom(handler, aws_cdk_lib_1.aws_ec2.Port.tcp(5432));
56
+ // this.connections = props.database.connections;
57
+ new aws_cdk_lib_1.CustomResource(this, "bootstrapper", {
58
+ serviceToken: handler.functionArn,
59
+ properties: {
60
+ // By setting pgstac_version in the properties assures
61
+ // that Create/Update events will be passed to the service token
62
+ pgstac_version: pgstacVersion,
63
+ conn_secret_arn: props.dbSecret.secretArn,
64
+ new_user_secret_arn: this.secret.secretArn,
65
+ },
66
+ removalPolicy: aws_cdk_lib_1.RemovalPolicy.RETAIN,
67
+ });
68
+ }
69
+ }
70
+ exports.BootstrapPgStac = BootstrapPgStac;
71
+ _a = JSII_RTTI_SYMBOL_1;
72
+ BootstrapPgStac[_a] = { fqn: "eoapi-cdk.BootstrapPgStac", version: "5.0.0" };
73
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["index.ts"],"names":[],"mappings":";;;;;AAAA,6CAUqB;AACrB,2CAAuC;AAEvC,SAAS,MAAM,CACb,QAA8D;IAE9D,OAAQ,QAAqC,CAAC,GAAG,KAAK,SAAS,CAAC;AAClE,CAAC;AAED,MAAM,sBAAsB,GAAG,QAAQ,CAAC;AAExC;;GAEG;AACH,MAAa,eAAgB,SAAQ,sBAAS;IAG5C,YAAY,KAAgB,EAAE,EAAU,EAAE,KAA2B;QACnE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAEjB,MAAM,EAAE,aAAa,GAAG,sBAAsB,EAAE,GAAG,KAAK,CAAC;QACzD,MAAM,OAAO,GAAG,IAAI,wBAAU,CAAC,QAAQ,CAAC,IAAI,EAAE,QAAQ,EAAE;YACtD,OAAO,EAAE,iBAAiB;YAC1B,OAAO,EAAE,wBAAU,CAAC,OAAO,CAAC,UAAU;YACtC,IAAI,EAAE,wBAAU,CAAC,IAAI,CAAC,eAAe,CAAC,SAAS,EAAE;gBAC/C,IAAI,EAAE,oBAAoB;gBAC1B,SAAS,EAAE,EAAE,cAAc,EAAE,aAAa,EAAE;aAC7C,CAAC;YACF,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,CAAC,CAAC;YAC5B,GAAG,EAAE,MAAM,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG;YAC5D,YAAY,EAAE,sBAAQ,CAAC,aAAa,CAAC,QAAQ;SAC9C,CAAC,CAAC;QAEH,IAAI,CAAC,MAAM,GAAG,IAAI,gCAAkB,CAAC,MAAM,CAAC,IAAI,EAAE,QAAQ,EAAE;YAC1D,UAAU,EAAE;gBACV,KAAK,CAAC,aAAa,IAAI,QAAQ;gBAC/B,EAAE;gBACF,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;aACzB,CAAC,IAAI,CAAC,GAAG,CAAC;YACX,oBAAoB,EAAE;gBACpB,oBAAoB,EAAE,IAAI,CAAC,SAAS,CAAC;oBACnC,MAAM,EAAE,KAAK,CAAC,YAAY,IAAI,QAAQ;oBACtC,MAAM,EAAE,UAAU;oBAClB,IAAI,EAAE,IAAI;oBACV,IAAI,EAAE,KAAK,CAAC,QAAQ,CAAC,gBAAgB,CAAC,QAAQ;oBAC9C,QAAQ,EAAE,KAAK,CAAC,cAAc,IAAI,aAAa;iBAChD,CAAC;gBACF,iBAAiB,EAAE,UAAU;gBAC7B,kBAAkB,EAAE,IAAI;aACzB;YACD,WAAW,EAAE,mCACX,mBAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,SACjB,EAAE;SACH,CAAC,CAAC;QAEH,qBAAqB;QACrB,uBAAuB;QACvB,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,OAAO,CAAC,CAAC;QAC/B,uBAAuB;QACvB,KAAK,CAAC,QAAQ,CAAC,SAAS,CAAC,OAAO,CAAC,CAAC;QAClC,sBAAsB;QACtB,KAAK,CAAC,QAAQ,CAAC,WAAW,CAAC,SAAS,CAAC,OAAO,EAAE,qBAAO,CAAC,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,CAAC;QAEtE,iDAAiD;QACjD,IAAI,4BAAc,CAAC,IAAI,EAAE,cAAc,EAAE;YACvC,YAAY,EAAE,OAAO,CAAC,WAAW;YACjC,UAAU,EAAE;gBACV,sDAAsD;gBACtD,gEAAgE;gBAChE,cAAc,EAAE,aAAa;gBAC7B,eAAe,EAAE,KAAK,CAAC,QAAQ,CAAC,SAAS;gBACzC,mBAAmB,EAAE,IAAI,CAAC,MAAM,CAAC,SAAS;aAC3C;YACD,aAAa,EAAE,2BAAa,CAAC,MAAM;SACpC,CAAC,CAAC;IACL,CAAC;;AA7DH,0CA8DC","sourcesContent":["import {\n  aws_ec2,\n  aws_rds,\n  aws_lambda,\n  aws_logs,\n  aws_secretsmanager,\n  CustomResource,\n  Duration,\n  Stack,\n  RemovalPolicy,\n} from \"aws-cdk-lib\";\nimport { Construct } from \"constructs\";\n\nfunction hasVpc(\n  instance: aws_rds.DatabaseInstance | aws_rds.IDatabaseInstance\n): instance is aws_rds.DatabaseInstance {\n  return (instance as aws_rds.DatabaseInstance).vpc !== undefined;\n}\n\nconst DEFAULT_PGSTAC_VERSION = \"0.6.13\";\n\n/**\n * Bootstraps a database instance, installing pgSTAC onto the database.\n */\nexport class BootstrapPgStac extends Construct {\n  secret: aws_secretsmanager.ISecret;\n\n  constructor(scope: Construct, id: string, props: BootstrapPgStacProps) {\n    super(scope, id);\n\n    const { pgstacVersion = DEFAULT_PGSTAC_VERSION } = props;\n    const handler = new aws_lambda.Function(this, \"lambda\", {\n      handler: \"handler.handler\",\n      runtime: aws_lambda.Runtime.PYTHON_3_8,\n      code: aws_lambda.Code.fromDockerBuild(__dirname, {\n        file: \"runtime/Dockerfile\",\n        buildArgs: { PGSTAC_VERSION: pgstacVersion },\n      }),\n      timeout: Duration.minutes(2),\n      vpc: hasVpc(props.database) ? props.database.vpc : props.vpc,\n      logRetention: aws_logs.RetentionDays.ONE_WEEK,\n    });\n\n    this.secret = new aws_secretsmanager.Secret(this, \"secret\", {\n      secretName: [\n        props.secretsPrefix || \"pgstac\",\n        id,\n        this.node.addr.slice(-8),\n      ].join(\"/\"),\n      generateSecretString: {\n        secretStringTemplate: JSON.stringify({\n          dbname: props.pgstacDbName || \"pgstac\",\n          engine: \"postgres\",\n          port: 5432,\n          host: props.database.instanceEndpoint.hostname,\n          username: props.pgstacUsername || \"pgstac_user\",\n        }),\n        generateStringKey: \"password\",\n        excludePunctuation: true,\n      },\n      description: `PgSTAC database bootstrapped by ${\n        Stack.of(this).stackName\n      }`,\n    });\n\n    // Allow lambda to...\n    // read new user secret\n    this.secret.grantRead(handler);\n    // read database secret\n    props.dbSecret.grantRead(handler);\n    // connect to database\n    props.database.connections.allowFrom(handler, aws_ec2.Port.tcp(5432));\n\n    // this.connections = props.database.connections;\n    new CustomResource(this, \"bootstrapper\", {\n      serviceToken: handler.functionArn,\n      properties: {\n        // By setting pgstac_version in the properties assures\n        // that Create/Update events will be passed to the service token\n        pgstac_version: pgstacVersion,\n        conn_secret_arn: props.dbSecret.secretArn,\n        new_user_secret_arn: this.secret.secretArn,\n      },\n      removalPolicy: RemovalPolicy.RETAIN, // This retains the custom resource (which doesn't really exist), not the database\n    });\n  }\n}\n\nexport interface BootstrapPgStacProps {\n  /**\n   * VPC in which the database resides.\n   *\n   * Note - Must be explicitely set if the `database` only conforms to the\n   * `aws_rds.IDatabaseInstace` interface (ie it is a reference to a database instance\n   * rather than a database instance.)\n   *\n   * @default - `vpc` property of the `database` instance provided.\n   */\n  readonly vpc?: aws_ec2.IVpc;\n\n  /**\n   * Database onto which pgSTAC should be installed.\n   */\n  readonly database: aws_rds.DatabaseInstance | aws_rds.IDatabaseInstance;\n\n  /**\n   * Secret containing valid connection details for the database instance. Secret must\n   * conform to the format of CDK's `DatabaseInstance` (i.e. a JSON object containing a\n   * `username`, `password`, `host`, `port`, and optionally a `dbname`). If a `dbname`\n   * property is not specified within the secret, the bootstrapper will attempt to\n   * connect to a database with the name of `\"postgres\"`.\n   */\n  readonly dbSecret: aws_secretsmanager.ISecret;\n\n  /**\n   * Name of database that is to be created and onto which pgSTAC will be installed.\n   *\n   * @default pgstac\n   */\n  readonly pgstacDbName?: string;\n\n  /**\n   * Name of user that will be generated for connecting to the pgSTAC database.\n   *\n   * @default pgstac_user\n   */\n  readonly pgstacUsername?: string;\n\n  /**\n   * pgSTAC version to be installed.\n   *\n   * @default 0.6.8\n   */\n  readonly pgstacVersion?: string;\n\n  /**\n   * Prefix to assign to the generated `secrets_manager.Secret`\n   *\n   * @default pgstac\n   */\n  readonly secretsPrefix?: string;\n}\n"]}
@@ -0,0 +1,18 @@
1
+ FROM lambci/lambda:build-python3.8
2
+
3
+ ARG PGSTAC_VERSION
4
+ RUN echo "Using PGSTAC Version ${PGSTAC_VERSION}"
5
+
6
+ WORKDIR /tmp
7
+
8
+ RUN pip install httpx psycopg[binary,pool] pypgstac==${PGSTAC_VERSION} -t /asset
9
+
10
+ COPY runtime/handler.py /asset/handler.py
11
+
12
+ # https://stackoverflow.com/a/61746719
13
+ # Tip from eoAPI: turns out, asyncio is part of python
14
+ RUN rm -rf /asset/asyncio*
15
+
16
+ # A command must be present avoid the following error on CDK deploy:
17
+ # Error response from daemon: No command specified
18
+ CMD [ "echo", "ready to go!" ]