token-injectable-docker-builder 1.0.11 → 1.1.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +30 -22
- package/API.md +32 -24
- package/README.md +50 -62
- package/lib/index.d.ts +15 -19
- package/lib/index.js +62 -47
- package/package.json +4 -2
package/.jsii
CHANGED
|
@@ -3898,7 +3898,7 @@
|
|
|
3898
3898
|
},
|
|
3899
3899
|
"name": "token-injectable-docker-builder",
|
|
3900
3900
|
"readme": {
|
|
3901
|
-
"markdown": "# TokenInjectableDockerBuilder\n\nThe `TokenInjectableDockerBuilder` is a flexible AWS CDK construct that enables the usage of AWS CDK tokens in the building, pushing, and deployment of Docker images to Amazon Elastic Container Registry (ECR). It leverages AWS CodeBuild and Lambda custom resources.\n\n## Why?\n\nAWS CDK already provides mechanisms for creating deployable assets using Docker, such as [DockerImageAsset](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_ecr_assets.DockerImageAsset.html) and [DockerImageCode](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_lambda.DockerImageCode.html), but these Constructs are limited because they cannot accept CDK tokens as build-args.
|
|
3901
|
+
"markdown": "# TokenInjectableDockerBuilder\n\nThe `TokenInjectableDockerBuilder` is a flexible AWS CDK construct that enables the usage of AWS CDK tokens in the building, pushing, and deployment of Docker images to Amazon Elastic Container Registry (ECR). It leverages AWS CodeBuild and Lambda custom resources.\n\n---\n\n## Why?\n\nAWS CDK already provides mechanisms for creating deployable assets using Docker, such as [DockerImageAsset](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_ecr_assets.DockerImageAsset.html) and [DockerImageCode](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_lambda.DockerImageCode.html), but these Constructs are limited because they cannot accept CDK tokens as build-args. The `TokenInjectableDockerBuilder` allows injecting CDK tokens as build-time arguments into Docker-based assets, enabling more dynamic dependency relationships.\n\nFor example, a Next.js frontend Docker image may require an API Gateway URL. With this construct, you can deploy the API Gateway first, then pass its URL as a build-time argument to the Next.js Docker image.\n\n---\n\n## Features\n\n- Automatically builds and pushes Docker images to ECR.\n- Supports custom build arguments for Docker builds, including CDK tokens resolved at deployment time.\n- Retrieves Docker images for use in ECS or Lambda.\n\n---\n\n## Installation\n\n### For NPM\n\nInstall the construct using NPM:\n\n```bash\nnpm install token-injectable-docker-builder\n```\n\n### For Python\n\nInstall the construct using pip:\n\n```bash\npip install token-injectable-docker-builder\n```\n\n---\n\n## Constructor\n\n### `TokenInjectableDockerBuilder`\n\n#### Parameters\n\n- **`scope`**: The construct's parent scope.\n- **`id`**: The construct ID.\n- **`props`**: Configuration properties.\n\n#### Properties in `TokenInjectableDockerBuilderProps`\n\n| Property | Type | Required | Description |\n|------------------------|--------------------|----------|-------------------------------------------------------------------------------------------------------|\n| `path` | `string` | Yes | The file path to the Dockerfile or source code directory. |\n| `buildArgs` | `{ [key: string]: string }` | No | Build arguments to pass to the Docker build process. |\n| `dockerLoginSecretArn` | `string` | No | ARN of an AWS Secrets Manager secret for Docker credentials. Skips login if not provided. |\n\n---\n\n## Usage Examples\n\n### TypeScript/NPM Example\n\nHere is how to use `TokenInjectableDockerBuilder` in an AWS CDK project with TypeScript:\n\n```typescript\nimport * as cdk from 'aws-cdk-lib';\nimport { TokenInjectableDockerBuilder } from 'token-injectable-docker-builder';\nimport * as ecs from 'aws-cdk-lib/aws-ecs';\nimport * as lambda from 'aws-cdk-lib/aws-lambda';\n\nexport class MyStack extends cdk.Stack {\n constructor(scope: cdk.App, id: string, props?: cdk.StackProps) {\n super(scope, id, props);\n\n const dockerBuilder = new TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {\n path: './docker',\n buildArgs: {\n TOKEN: 'my-secret-token',\n ENV: 'production',\n },\n dockerLoginSecretArn: 'arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret',\n });\n\n // Use in ECS\n new ecs.FargateTaskDefinition(this, 'TaskDefinition', {\n containerImage: dockerBuilder.containerImage,\n });\n\n // Use in Lambda\n new lambda.Function(this, 'DockerLambdaFunction', {\n runtime: lambda.Runtime.FROM_IMAGE,\n code: dockerBuilder.dockerImageCode,\n handler: lambda.Handler.FROM_IMAGE,\n });\n }\n}\n```\n\n---\n\n### Python Example\n\nHere is how to use `TokenInjectableDockerBuilder` in an AWS CDK project with Python:\n\n```python\nfrom aws_cdk import core as cdk\nfrom token_injectable_docker_builder import TokenInjectableDockerBuilder\nfrom aws_cdk import aws_ecs as ecs\nfrom aws_cdk import aws_lambda as lambda_\n\nclass MyStack(cdk.Stack):\n\n def __init__(self, scope: cdk.App, id: str, **kwargs):\n super().__init__(scope, id, **kwargs)\n\n docker_builder = TokenInjectableDockerBuilder(self, \"MyDockerBuilder\",\n path=\"./docker\",\n build_args={\n \"TOKEN\": \"my-secret-token\",\n \"ENV\": \"production\"\n },\n docker_login_secret_arn=\"arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret\"\n )\n\n # Use in ECS\n ecs.FargateTaskDefinition(self, \"TaskDefinition\",\n container_image=docker_builder.container_image\n )\n\n # Use in Lambda\n lambda_.Function(self, \"DockerLambdaFunction\",\n runtime=lambda_.Runtime.FROM_IMAGE,\n code=docker_builder.docker_image_code,\n handler=lambda_.Handler.FROM_IMAGE\n )\n```\n\n---\n\n## How It Works\n\n1. **Docker Source**: Packages the source code or Dockerfile specified in the `path` property as an S3 asset.\n2. **CodeBuild Project**:\n - Uses the packaged asset and `buildArgs` to build the Docker image.\n - Pushes the image to an ECR repository.\n3. **Custom Resource**:\n - Triggers the build process using a Lambda function (`onEvent`).\n - Monitors the build status using another Lambda function (`isComplete`).\n4. **Outputs**:\n - `.containerImage`: Returns the Docker image for ECS.\n - `.dockerImageCode`: Returns the Docker image code for Lambda.\n\n---\n\n## IAM Permissions\n\nThe construct automatically grants permissions for:\n- CodeBuild to pull and push images to ECR.\n- Lambda to monitor build status and retrieve logs.\n- Encryption via a custom KMS key.\n\n---\n\n## Notes\n\n- **Build Arguments**: Pass custom arguments via `buildArgs` as `--build-arg` flags.\n- **ECR Repository**: Automatically creates an ECR repository with lifecycle rules.\n- **Custom Resources**: Manages lifecycle events for builds using custom Lambda handlers.\n\n---\n\n## Troubleshooting\n\n1. **Build Errors**: Check CodeBuild logs in CloudWatch.\n2. **Lambda Errors**: Check `onEvent` and `isComplete` Lambda logs in CloudWatch.\n3. **Permissions**: Ensure IAM roles have the required permissions for CodeBuild, ECR, and Secrets Manager.\n\n---\n\n## Support\n\nOpen an issue on [GitHub](https://github.com/AlexTech314/TokenInjectableDockerBuilder).\n\n---\n\n## Reference Links\n[](https://constructs.dev/packages/token-injectable-docker-builder)\n"
|
|
3902
3902
|
},
|
|
3903
3903
|
"repository": {
|
|
3904
3904
|
"type": "git",
|
|
@@ -3919,43 +3919,32 @@
|
|
|
3919
3919
|
"assembly": "token-injectable-docker-builder",
|
|
3920
3920
|
"base": "constructs.Construct",
|
|
3921
3921
|
"docs": {
|
|
3922
|
-
"example": "const dockerBuilder = new TokenInjectableDockerBuilder(this, 'DockerBuilder', {\n path: './docker',\n buildArgs: {\n TOKEN: 'my-secret-token',\n ENV: 'production'\n },\n});\n\nconst containerImage = dockerBuilder.getContainerImage();",
|
|
3923
3922
|
"stability": "stable",
|
|
3924
3923
|
"summary": "A CDK construct to build and push Docker images to an ECR repository using CodeBuild and Lambda custom resources."
|
|
3925
3924
|
},
|
|
3926
3925
|
"fqn": "token-injectable-docker-builder.TokenInjectableDockerBuilder",
|
|
3927
3926
|
"initializer": {
|
|
3928
3927
|
"docs": {
|
|
3929
|
-
"stability": "stable"
|
|
3930
|
-
"summary": "Creates a new `TokenInjectableDockerBuilder` instance."
|
|
3928
|
+
"stability": "stable"
|
|
3931
3929
|
},
|
|
3932
3930
|
"locationInModule": {
|
|
3933
3931
|
"filename": "src/index.ts",
|
|
3934
|
-
"line":
|
|
3932
|
+
"line": 58
|
|
3935
3933
|
},
|
|
3936
3934
|
"parameters": [
|
|
3937
3935
|
{
|
|
3938
|
-
"docs": {
|
|
3939
|
-
"summary": "The parent construct/stack."
|
|
3940
|
-
},
|
|
3941
3936
|
"name": "scope",
|
|
3942
3937
|
"type": {
|
|
3943
3938
|
"fqn": "constructs.Construct"
|
|
3944
3939
|
}
|
|
3945
3940
|
},
|
|
3946
3941
|
{
|
|
3947
|
-
"docs": {
|
|
3948
|
-
"summary": "The unique ID of the construct."
|
|
3949
|
-
},
|
|
3950
3942
|
"name": "id",
|
|
3951
3943
|
"type": {
|
|
3952
3944
|
"primitive": "string"
|
|
3953
3945
|
}
|
|
3954
3946
|
},
|
|
3955
3947
|
{
|
|
3956
|
-
"docs": {
|
|
3957
|
-
"summary": "Configuration properties for the construct."
|
|
3958
|
-
},
|
|
3959
3948
|
"name": "props",
|
|
3960
3949
|
"type": {
|
|
3961
3950
|
"fqn": "token-injectable-docker-builder.TokenInjectableDockerBuilderProps"
|
|
@@ -3966,7 +3955,7 @@
|
|
|
3966
3955
|
"kind": "class",
|
|
3967
3956
|
"locationInModule": {
|
|
3968
3957
|
"filename": "src/index.ts",
|
|
3969
|
-
"line":
|
|
3958
|
+
"line": 53
|
|
3970
3959
|
},
|
|
3971
3960
|
"name": "TokenInjectableDockerBuilder",
|
|
3972
3961
|
"properties": [
|
|
@@ -3977,7 +3966,7 @@
|
|
|
3977
3966
|
"immutable": true,
|
|
3978
3967
|
"locationInModule": {
|
|
3979
3968
|
"filename": "src/index.ts",
|
|
3980
|
-
"line":
|
|
3969
|
+
"line": 55
|
|
3981
3970
|
},
|
|
3982
3971
|
"name": "containerImage",
|
|
3983
3972
|
"type": {
|
|
@@ -3991,7 +3980,7 @@
|
|
|
3991
3980
|
"immutable": true,
|
|
3992
3981
|
"locationInModule": {
|
|
3993
3982
|
"filename": "src/index.ts",
|
|
3994
|
-
"line":
|
|
3983
|
+
"line": 56
|
|
3995
3984
|
},
|
|
3996
3985
|
"name": "dockerImageCode",
|
|
3997
3986
|
"type": {
|
|
@@ -4012,7 +4001,7 @@
|
|
|
4012
4001
|
"kind": "interface",
|
|
4013
4002
|
"locationInModule": {
|
|
4014
4003
|
"filename": "src/index.ts",
|
|
4015
|
-
"line":
|
|
4004
|
+
"line": 17
|
|
4016
4005
|
},
|
|
4017
4006
|
"name": "TokenInjectableDockerBuilderProps",
|
|
4018
4007
|
"properties": [
|
|
@@ -4025,7 +4014,7 @@
|
|
|
4025
4014
|
"immutable": true,
|
|
4026
4015
|
"locationInModule": {
|
|
4027
4016
|
"filename": "src/index.ts",
|
|
4028
|
-
"line":
|
|
4017
|
+
"line": 21
|
|
4029
4018
|
},
|
|
4030
4019
|
"name": "path",
|
|
4031
4020
|
"type": {
|
|
@@ -4043,7 +4032,7 @@
|
|
|
4043
4032
|
"immutable": true,
|
|
4044
4033
|
"locationInModule": {
|
|
4045
4034
|
"filename": "src/index.ts",
|
|
4046
|
-
"line":
|
|
4035
|
+
"line": 32
|
|
4047
4036
|
},
|
|
4048
4037
|
"name": "buildArgs",
|
|
4049
4038
|
"optional": true,
|
|
@@ -4055,11 +4044,30 @@
|
|
|
4055
4044
|
"kind": "map"
|
|
4056
4045
|
}
|
|
4057
4046
|
}
|
|
4047
|
+
},
|
|
4048
|
+
{
|
|
4049
|
+
"abstract": true,
|
|
4050
|
+
"docs": {
|
|
4051
|
+
"example": "'arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret'",
|
|
4052
|
+
"remarks": "This secret should store a JSON object with the following structure:\n```json\n{\n \"username\": \"my-docker-username\",\n \"password\": \"my-docker-password\"\n}\n```\nIf not provided, the construct will skip Docker login during the build process.",
|
|
4053
|
+
"stability": "stable",
|
|
4054
|
+
"summary": "The ARN of the AWS Secrets Manager secret containing Docker login credentials."
|
|
4055
|
+
},
|
|
4056
|
+
"immutable": true,
|
|
4057
|
+
"locationInModule": {
|
|
4058
|
+
"filename": "src/index.ts",
|
|
4059
|
+
"line": 47
|
|
4060
|
+
},
|
|
4061
|
+
"name": "dockerLoginSecretArn",
|
|
4062
|
+
"optional": true,
|
|
4063
|
+
"type": {
|
|
4064
|
+
"primitive": "string"
|
|
4065
|
+
}
|
|
4058
4066
|
}
|
|
4059
4067
|
],
|
|
4060
4068
|
"symbolId": "src/index:TokenInjectableDockerBuilderProps"
|
|
4061
4069
|
}
|
|
4062
4070
|
},
|
|
4063
|
-
"version": "1.
|
|
4064
|
-
"fingerprint": "
|
|
4071
|
+
"version": "1.1.1",
|
|
4072
|
+
"fingerprint": "dNZza5HJSvkKpYKTwFNzOlEu3XcrKWMe2UHZb9UxVrA="
|
|
4065
4073
|
}
|
package/API.md
CHANGED
|
@@ -6,21 +6,6 @@
|
|
|
6
6
|
|
|
7
7
|
A CDK construct to build and push Docker images to an ECR repository using CodeBuild and Lambda custom resources.
|
|
8
8
|
|
|
9
|
-
*Example*
|
|
10
|
-
|
|
11
|
-
```typescript
|
|
12
|
-
const dockerBuilder = new TokenInjectableDockerBuilder(this, 'DockerBuilder', {
|
|
13
|
-
path: './docker',
|
|
14
|
-
buildArgs: {
|
|
15
|
-
TOKEN: 'my-secret-token',
|
|
16
|
-
ENV: 'production'
|
|
17
|
-
},
|
|
18
|
-
});
|
|
19
|
-
|
|
20
|
-
const containerImage = dockerBuilder.getContainerImage();
|
|
21
|
-
```
|
|
22
|
-
|
|
23
|
-
|
|
24
9
|
#### Initializers <a name="Initializers" id="token-injectable-docker-builder.TokenInjectableDockerBuilder.Initializer"></a>
|
|
25
10
|
|
|
26
11
|
```typescript
|
|
@@ -31,9 +16,9 @@ new TokenInjectableDockerBuilder(scope: Construct, id: string, props: TokenInjec
|
|
|
31
16
|
|
|
32
17
|
| **Name** | **Type** | **Description** |
|
|
33
18
|
| --- | --- | --- |
|
|
34
|
-
| <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilder.Initializer.parameter.scope">scope</a></code> | <code>constructs.Construct</code> |
|
|
35
|
-
| <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilder.Initializer.parameter.id">id</a></code> | <code>string</code> |
|
|
36
|
-
| <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilder.Initializer.parameter.props">props</a></code> | <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilderProps">TokenInjectableDockerBuilderProps</a></code> |
|
|
19
|
+
| <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilder.Initializer.parameter.scope">scope</a></code> | <code>constructs.Construct</code> | *No description.* |
|
|
20
|
+
| <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilder.Initializer.parameter.id">id</a></code> | <code>string</code> | *No description.* |
|
|
21
|
+
| <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilder.Initializer.parameter.props">props</a></code> | <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilderProps">TokenInjectableDockerBuilderProps</a></code> | *No description.* |
|
|
37
22
|
|
|
38
23
|
---
|
|
39
24
|
|
|
@@ -41,24 +26,18 @@ new TokenInjectableDockerBuilder(scope: Construct, id: string, props: TokenInjec
|
|
|
41
26
|
|
|
42
27
|
- *Type:* constructs.Construct
|
|
43
28
|
|
|
44
|
-
The parent construct/stack.
|
|
45
|
-
|
|
46
29
|
---
|
|
47
30
|
|
|
48
31
|
##### `id`<sup>Required</sup> <a name="id" id="token-injectable-docker-builder.TokenInjectableDockerBuilder.Initializer.parameter.id"></a>
|
|
49
32
|
|
|
50
33
|
- *Type:* string
|
|
51
34
|
|
|
52
|
-
The unique ID of the construct.
|
|
53
|
-
|
|
54
35
|
---
|
|
55
36
|
|
|
56
37
|
##### `props`<sup>Required</sup> <a name="props" id="token-injectable-docker-builder.TokenInjectableDockerBuilder.Initializer.parameter.props"></a>
|
|
57
38
|
|
|
58
39
|
- *Type:* <a href="#token-injectable-docker-builder.TokenInjectableDockerBuilderProps">TokenInjectableDockerBuilderProps</a>
|
|
59
40
|
|
|
60
|
-
Configuration properties for the construct.
|
|
61
|
-
|
|
62
41
|
---
|
|
63
42
|
|
|
64
43
|
#### Methods <a name="Methods" id="Methods"></a>
|
|
@@ -166,6 +145,7 @@ const tokenInjectableDockerBuilderProps: TokenInjectableDockerBuilderProps = { .
|
|
|
166
145
|
| --- | --- | --- |
|
|
167
146
|
| <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.path">path</a></code> | <code>string</code> | The path to the directory containing the Dockerfile or source code. |
|
|
168
147
|
| <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.buildArgs">buildArgs</a></code> | <code>{[ key: string ]: string}</code> | Build arguments to pass to the Docker build process. |
|
|
148
|
+
| <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.dockerLoginSecretArn">dockerLoginSecretArn</a></code> | <code>string</code> | The ARN of the AWS Secrets Manager secret containing Docker login credentials. |
|
|
169
149
|
|
|
170
150
|
---
|
|
171
151
|
|
|
@@ -205,5 +185,33 @@ These are transformed into `--build-arg` flags.
|
|
|
205
185
|
```
|
|
206
186
|
|
|
207
187
|
|
|
188
|
+
##### `dockerLoginSecretArn`<sup>Optional</sup> <a name="dockerLoginSecretArn" id="token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.dockerLoginSecretArn"></a>
|
|
189
|
+
|
|
190
|
+
```typescript
|
|
191
|
+
public readonly dockerLoginSecretArn: string;
|
|
192
|
+
```
|
|
193
|
+
|
|
194
|
+
- *Type:* string
|
|
195
|
+
|
|
196
|
+
The ARN of the AWS Secrets Manager secret containing Docker login credentials.
|
|
197
|
+
|
|
198
|
+
This secret should store a JSON object with the following structure:
|
|
199
|
+
```json
|
|
200
|
+
{
|
|
201
|
+
"username": "my-docker-username",
|
|
202
|
+
"password": "my-docker-password"
|
|
203
|
+
}
|
|
204
|
+
```
|
|
205
|
+
If not provided, the construct will skip Docker login during the build process.
|
|
206
|
+
|
|
207
|
+
---
|
|
208
|
+
|
|
209
|
+
*Example*
|
|
210
|
+
|
|
211
|
+
```typescript
|
|
212
|
+
'arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret'
|
|
213
|
+
```
|
|
214
|
+
|
|
215
|
+
|
|
208
216
|
|
|
209
217
|
|
package/README.md
CHANGED
|
@@ -2,17 +2,21 @@
|
|
|
2
2
|
|
|
3
3
|
The `TokenInjectableDockerBuilder` is a flexible AWS CDK construct that enables the usage of AWS CDK tokens in the building, pushing, and deployment of Docker images to Amazon Elastic Container Registry (ECR). It leverages AWS CodeBuild and Lambda custom resources.
|
|
4
4
|
|
|
5
|
+
---
|
|
6
|
+
|
|
5
7
|
## Why?
|
|
6
8
|
|
|
7
|
-
AWS CDK already provides mechanisms for creating deployable assets using Docker, such as [DockerImageAsset](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_ecr_assets.DockerImageAsset.html) and [DockerImageCode](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_lambda.DockerImageCode.html), but these Constructs are limited because they cannot accept CDK tokens as build-args.
|
|
9
|
+
AWS CDK already provides mechanisms for creating deployable assets using Docker, such as [DockerImageAsset](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_ecr_assets.DockerImageAsset.html) and [DockerImageCode](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_lambda.DockerImageCode.html), but these Constructs are limited because they cannot accept CDK tokens as build-args. The `TokenInjectableDockerBuilder` allows injecting CDK tokens as build-time arguments into Docker-based assets, enabling more dynamic dependency relationships.
|
|
8
10
|
|
|
9
|
-
For example,
|
|
11
|
+
For example, a Next.js frontend Docker image may require an API Gateway URL. With this construct, you can deploy the API Gateway first, then pass its URL as a build-time argument to the Next.js Docker image.
|
|
12
|
+
|
|
13
|
+
---
|
|
10
14
|
|
|
11
15
|
## Features
|
|
12
16
|
|
|
13
17
|
- Automatically builds and pushes Docker images to ECR.
|
|
14
|
-
- Supports custom build arguments for Docker builds, including CDK tokens
|
|
15
|
-
- Retrieves
|
|
18
|
+
- Supports custom build arguments for Docker builds, including CDK tokens resolved at deployment time.
|
|
19
|
+
- Retrieves Docker images for use in ECS or Lambda.
|
|
16
20
|
|
|
17
21
|
---
|
|
18
22
|
|
|
@@ -48,60 +52,59 @@ pip install token-injectable-docker-builder
|
|
|
48
52
|
|
|
49
53
|
#### Properties in `TokenInjectableDockerBuilderProps`
|
|
50
54
|
|
|
51
|
-
| Property
|
|
52
|
-
|
|
53
|
-
| `path`
|
|
54
|
-
| `buildArgs`
|
|
55
|
+
| Property | Type | Required | Description |
|
|
56
|
+
|------------------------|--------------------|----------|-------------------------------------------------------------------------------------------------------|
|
|
57
|
+
| `path` | `string` | Yes | The file path to the Dockerfile or source code directory. |
|
|
58
|
+
| `buildArgs` | `{ [key: string]: string }` | No | Build arguments to pass to the Docker build process. |
|
|
59
|
+
| `dockerLoginSecretArn` | `string` | No | ARN of an AWS Secrets Manager secret for Docker credentials. Skips login if not provided. |
|
|
55
60
|
|
|
56
61
|
---
|
|
57
62
|
|
|
58
|
-
## Usage
|
|
63
|
+
## Usage Examples
|
|
59
64
|
|
|
60
|
-
### NPM
|
|
65
|
+
### TypeScript/NPM Example
|
|
61
66
|
|
|
62
|
-
Here is
|
|
67
|
+
Here is how to use `TokenInjectableDockerBuilder` in an AWS CDK project with TypeScript:
|
|
63
68
|
|
|
64
69
|
```typescript
|
|
65
70
|
import * as cdk from 'aws-cdk-lib';
|
|
66
71
|
import { TokenInjectableDockerBuilder } from 'token-injectable-docker-builder';
|
|
72
|
+
import * as ecs from 'aws-cdk-lib/aws-ecs';
|
|
73
|
+
import * as lambda from 'aws-cdk-lib/aws-lambda';
|
|
67
74
|
|
|
68
75
|
export class MyStack extends cdk.Stack {
|
|
69
76
|
constructor(scope: cdk.App, id: string, props?: cdk.StackProps) {
|
|
70
77
|
super(scope, id, props);
|
|
71
78
|
|
|
72
|
-
// Create a TokenInjectableDockerBuilder construct
|
|
73
79
|
const dockerBuilder = new TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {
|
|
74
|
-
path: './docker',
|
|
80
|
+
path: './docker',
|
|
75
81
|
buildArgs: {
|
|
76
|
-
TOKEN: 'my-secret-token',
|
|
82
|
+
TOKEN: 'my-secret-token',
|
|
77
83
|
ENV: 'production',
|
|
78
84
|
},
|
|
85
|
+
dockerLoginSecretArn: 'arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret',
|
|
79
86
|
});
|
|
80
87
|
|
|
81
|
-
//
|
|
82
|
-
const containerImage = dockerBuilder.containerImage;
|
|
83
|
-
|
|
84
|
-
// Retrieve the Docker image code for Lambda
|
|
85
|
-
const dockerImageCode = dockerBuilder.dockerImageCode;
|
|
86
|
-
|
|
87
|
-
// Example: Use the container image in an ECS service
|
|
88
|
+
// Use in ECS
|
|
88
89
|
new ecs.FargateTaskDefinition(this, 'TaskDefinition', {
|
|
89
|
-
containerImage,
|
|
90
|
+
containerImage: dockerBuilder.containerImage,
|
|
90
91
|
});
|
|
91
92
|
|
|
92
|
-
//
|
|
93
|
+
// Use in Lambda
|
|
93
94
|
new lambda.Function(this, 'DockerLambdaFunction', {
|
|
94
95
|
runtime: lambda.Runtime.FROM_IMAGE,
|
|
95
|
-
code: dockerImageCode,
|
|
96
|
+
code: dockerBuilder.dockerImageCode,
|
|
96
97
|
handler: lambda.Handler.FROM_IMAGE,
|
|
97
98
|
});
|
|
98
99
|
}
|
|
99
100
|
}
|
|
100
101
|
```
|
|
101
102
|
|
|
103
|
+
---
|
|
104
|
+
|
|
102
105
|
### Python Example
|
|
103
106
|
|
|
104
|
-
Here is
|
|
107
|
+
Here is how to use `TokenInjectableDockerBuilder` in an AWS CDK project with Python:
|
|
105
108
|
|
|
106
109
|
```python
|
|
107
110
|
from aws_cdk import core as cdk
|
|
@@ -114,30 +117,24 @@ class MyStack(cdk.Stack):
|
|
|
114
117
|
def __init__(self, scope: cdk.App, id: str, **kwargs):
|
|
115
118
|
super().__init__(scope, id, **kwargs)
|
|
116
119
|
|
|
117
|
-
# Create a TokenInjectableDockerBuilder construct
|
|
118
120
|
docker_builder = TokenInjectableDockerBuilder(self, "MyDockerBuilder",
|
|
119
|
-
path="./docker",
|
|
121
|
+
path="./docker",
|
|
120
122
|
build_args={
|
|
121
|
-
"TOKEN": "my-secret-token",
|
|
123
|
+
"TOKEN": "my-secret-token",
|
|
122
124
|
"ENV": "production"
|
|
123
|
-
}
|
|
125
|
+
},
|
|
126
|
+
docker_login_secret_arn="arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret"
|
|
124
127
|
)
|
|
125
128
|
|
|
126
|
-
#
|
|
127
|
-
container_image = docker_builder.container_image
|
|
128
|
-
|
|
129
|
-
# Retrieve the Docker image code for Lambda
|
|
130
|
-
docker_image_code = docker_builder.docker_image_code
|
|
131
|
-
|
|
132
|
-
# Example: Use the container image in an ECS service
|
|
129
|
+
# Use in ECS
|
|
133
130
|
ecs.FargateTaskDefinition(self, "TaskDefinition",
|
|
134
|
-
container_image=container_image
|
|
131
|
+
container_image=docker_builder.container_image
|
|
135
132
|
)
|
|
136
133
|
|
|
137
|
-
#
|
|
134
|
+
# Use in Lambda
|
|
138
135
|
lambda_.Function(self, "DockerLambdaFunction",
|
|
139
136
|
runtime=lambda_.Runtime.FROM_IMAGE,
|
|
140
|
-
code=docker_image_code,
|
|
137
|
+
code=docker_builder.docker_image_code,
|
|
141
138
|
handler=lambda_.Handler.FROM_IMAGE
|
|
142
139
|
)
|
|
143
140
|
```
|
|
@@ -146,56 +143,47 @@ class MyStack(cdk.Stack):
|
|
|
146
143
|
|
|
147
144
|
## How It Works
|
|
148
145
|
|
|
149
|
-
1. **Docker Source**:
|
|
146
|
+
1. **Docker Source**: Packages the source code or Dockerfile specified in the `path` property as an S3 asset.
|
|
150
147
|
2. **CodeBuild Project**:
|
|
151
|
-
- Uses the packaged asset and
|
|
148
|
+
- Uses the packaged asset and `buildArgs` to build the Docker image.
|
|
152
149
|
- Pushes the image to an ECR repository.
|
|
153
150
|
3. **Custom Resource**:
|
|
154
151
|
- Triggers the build process using a Lambda function (`onEvent`).
|
|
155
152
|
- Monitors the build status using another Lambda function (`isComplete`).
|
|
156
153
|
4. **Outputs**:
|
|
157
|
-
-
|
|
158
|
-
-
|
|
154
|
+
- `.containerImage`: Returns the Docker image for ECS.
|
|
155
|
+
- `.dockerImageCode`: Returns the Docker image code for Lambda.
|
|
159
156
|
|
|
160
157
|
---
|
|
161
158
|
|
|
162
159
|
## IAM Permissions
|
|
163
160
|
|
|
164
|
-
|
|
161
|
+
The construct automatically grants permissions for:
|
|
165
162
|
- CodeBuild to pull and push images to ECR.
|
|
166
|
-
-
|
|
167
|
-
-
|
|
163
|
+
- Lambda to monitor build status and retrieve logs.
|
|
164
|
+
- Encryption via a custom KMS key.
|
|
168
165
|
|
|
169
166
|
---
|
|
170
167
|
|
|
171
168
|
## Notes
|
|
172
169
|
|
|
173
|
-
- **Build Arguments**:
|
|
174
|
-
- **ECR Repository**:
|
|
175
|
-
- **Custom Resources**:
|
|
176
|
-
|
|
177
|
-
---
|
|
178
|
-
|
|
179
|
-
## Prerequisites
|
|
180
|
-
|
|
181
|
-
Ensure you have the following:
|
|
182
|
-
1. Docker installed locally if you're testing builds.
|
|
183
|
-
2. AWS CDK CLI installed (`npm install -g aws-cdk`).
|
|
184
|
-
3. An AWS account and configured credentials.
|
|
170
|
+
- **Build Arguments**: Pass custom arguments via `buildArgs` as `--build-arg` flags.
|
|
171
|
+
- **ECR Repository**: Automatically creates an ECR repository with lifecycle rules.
|
|
172
|
+
- **Custom Resources**: Manages lifecycle events for builds using custom Lambda handlers.
|
|
185
173
|
|
|
186
174
|
---
|
|
187
175
|
|
|
188
176
|
## Troubleshooting
|
|
189
177
|
|
|
190
|
-
1. **Build Errors**: Check
|
|
191
|
-
2. **Lambda
|
|
192
|
-
3. **Permissions**: Ensure
|
|
178
|
+
1. **Build Errors**: Check CodeBuild logs in CloudWatch.
|
|
179
|
+
2. **Lambda Errors**: Check `onEvent` and `isComplete` Lambda logs in CloudWatch.
|
|
180
|
+
3. **Permissions**: Ensure IAM roles have the required permissions for CodeBuild, ECR, and Secrets Manager.
|
|
193
181
|
|
|
194
182
|
---
|
|
195
183
|
|
|
196
184
|
## Support
|
|
197
185
|
|
|
198
|
-
Open an issue on [GitHub](https://github.com/AlexTech314/TokenInjectableDockerBuilder)
|
|
186
|
+
Open an issue on [GitHub](https://github.com/AlexTech314/TokenInjectableDockerBuilder).
|
|
199
187
|
|
|
200
188
|
---
|
|
201
189
|
|
package/lib/index.d.ts
CHANGED
|
@@ -21,31 +21,27 @@ export interface TokenInjectableDockerBuilderProps {
|
|
|
21
21
|
readonly buildArgs?: {
|
|
22
22
|
[key: string]: string;
|
|
23
23
|
};
|
|
24
|
+
/**
|
|
25
|
+
* The ARN of the AWS Secrets Manager secret containing Docker login credentials.
|
|
26
|
+
* This secret should store a JSON object with the following structure:
|
|
27
|
+
* ```json
|
|
28
|
+
* {
|
|
29
|
+
* "username": "my-docker-username",
|
|
30
|
+
* "password": "my-docker-password"
|
|
31
|
+
* }
|
|
32
|
+
* ```
|
|
33
|
+
* If not provided, the construct will skip Docker login during the build process.
|
|
34
|
+
*
|
|
35
|
+
* @example 'arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret'
|
|
36
|
+
*/
|
|
37
|
+
readonly dockerLoginSecretArn?: string;
|
|
24
38
|
}
|
|
25
39
|
/**
|
|
26
40
|
* A CDK construct to build and push Docker images to an ECR repository using CodeBuild and Lambda custom resources.
|
|
27
|
-
*
|
|
28
|
-
* @example
|
|
29
|
-
* const dockerBuilder = new TokenInjectableDockerBuilder(this, 'DockerBuilder', {
|
|
30
|
-
* path: './docker',
|
|
31
|
-
* buildArgs: {
|
|
32
|
-
* TOKEN: 'my-secret-token',
|
|
33
|
-
* ENV: 'production'
|
|
34
|
-
* },
|
|
35
|
-
* });
|
|
36
|
-
*
|
|
37
|
-
* const containerImage = dockerBuilder.getContainerImage();
|
|
38
41
|
*/
|
|
39
42
|
export declare class TokenInjectableDockerBuilder extends Construct {
|
|
43
|
+
private readonly ecrRepository;
|
|
40
44
|
readonly containerImage: ContainerImage;
|
|
41
45
|
readonly dockerImageCode: DockerImageCode;
|
|
42
|
-
private readonly ecrRepository;
|
|
43
|
-
/**
|
|
44
|
-
* Creates a new `TokenInjectableDockerBuilder` instance.
|
|
45
|
-
*
|
|
46
|
-
* @param scope The parent construct/stack.
|
|
47
|
-
* @param id The unique ID of the construct.
|
|
48
|
-
* @param props Configuration properties for the construct.
|
|
49
|
-
*/
|
|
50
46
|
constructor(scope: Construct, id: string, props: TokenInjectableDockerBuilderProps);
|
|
51
47
|
}
|
package/lib/index.js
CHANGED
|
@@ -10,40 +10,39 @@ const aws_codebuild_1 = require("aws-cdk-lib/aws-codebuild");
|
|
|
10
10
|
const aws_ecr_1 = require("aws-cdk-lib/aws-ecr");
|
|
11
11
|
const aws_ecs_1 = require("aws-cdk-lib/aws-ecs");
|
|
12
12
|
const aws_iam_1 = require("aws-cdk-lib/aws-iam");
|
|
13
|
+
const aws_kms_1 = require("aws-cdk-lib/aws-kms");
|
|
13
14
|
const aws_lambda_1 = require("aws-cdk-lib/aws-lambda");
|
|
14
15
|
const aws_s3_assets_1 = require("aws-cdk-lib/aws-s3-assets");
|
|
15
16
|
const custom_resources_1 = require("aws-cdk-lib/custom-resources");
|
|
16
17
|
const constructs_1 = require("constructs");
|
|
17
18
|
/**
|
|
18
19
|
* A CDK construct to build and push Docker images to an ECR repository using CodeBuild and Lambda custom resources.
|
|
19
|
-
*
|
|
20
|
-
* @example
|
|
21
|
-
* const dockerBuilder = new TokenInjectableDockerBuilder(this, 'DockerBuilder', {
|
|
22
|
-
* path: './docker',
|
|
23
|
-
* buildArgs: {
|
|
24
|
-
* TOKEN: 'my-secret-token',
|
|
25
|
-
* ENV: 'production'
|
|
26
|
-
* },
|
|
27
|
-
* });
|
|
28
|
-
*
|
|
29
|
-
* const containerImage = dockerBuilder.getContainerImage();
|
|
30
20
|
*/
|
|
31
21
|
class TokenInjectableDockerBuilder extends constructs_1.Construct {
|
|
32
|
-
/**
|
|
33
|
-
* Creates a new `TokenInjectableDockerBuilder` instance.
|
|
34
|
-
*
|
|
35
|
-
* @param scope The parent construct/stack.
|
|
36
|
-
* @param id The unique ID of the construct.
|
|
37
|
-
* @param props Configuration properties for the construct.
|
|
38
|
-
*/
|
|
39
22
|
constructor(scope, id, props) {
|
|
40
23
|
super(scope, id);
|
|
41
|
-
const { path: sourcePath, buildArgs } = props;
|
|
42
|
-
//
|
|
43
|
-
|
|
24
|
+
const { path: sourcePath, buildArgs, dockerLoginSecretArn } = props;
|
|
25
|
+
// Define a KMS key for ECR encryption
|
|
26
|
+
const encryptionKey = new aws_kms_1.Key(this, 'EcrEncryptionKey', {
|
|
27
|
+
enableKeyRotation: true,
|
|
28
|
+
});
|
|
29
|
+
// Create an ECR repository with lifecycle rules, encryption, and image scanning enabled
|
|
30
|
+
this.ecrRepository = new aws_ecr_1.Repository(this, 'ECRRepository', {
|
|
31
|
+
lifecycleRules: [
|
|
32
|
+
{
|
|
33
|
+
rulePriority: 1,
|
|
34
|
+
description: 'Remove untagged images after 30 days',
|
|
35
|
+
tagStatus: aws_ecr_1.TagStatus.UNTAGGED,
|
|
36
|
+
maxImageAge: aws_cdk_lib_1.Duration.days(1),
|
|
37
|
+
},
|
|
38
|
+
],
|
|
39
|
+
encryption: aws_ecr_1.RepositoryEncryption.KMS,
|
|
40
|
+
encryptionKey: encryptionKey,
|
|
41
|
+
imageScanOnPush: true,
|
|
42
|
+
});
|
|
44
43
|
// Package the source code as an asset
|
|
45
44
|
const sourceAsset = new aws_s3_assets_1.Asset(this, 'SourceAsset', {
|
|
46
|
-
path: sourcePath,
|
|
45
|
+
path: sourcePath,
|
|
47
46
|
});
|
|
48
47
|
// Transform buildArgs into a string of --build-arg KEY=VALUE
|
|
49
48
|
const buildArgsString = buildArgs
|
|
@@ -51,11 +50,16 @@ class TokenInjectableDockerBuilder extends constructs_1.Construct {
|
|
|
51
50
|
.map(([key, value]) => `--build-arg ${key}=${value}`)
|
|
52
51
|
.join(' ')
|
|
53
52
|
: '';
|
|
54
|
-
//
|
|
55
|
-
const
|
|
56
|
-
|
|
57
|
-
|
|
58
|
-
|
|
53
|
+
// Conditional Dockerhub login commands
|
|
54
|
+
const dockerLoginCommands = dockerLoginSecretArn
|
|
55
|
+
? [
|
|
56
|
+
'echo "Retrieving Docker credentials from Secrets Manager..."',
|
|
57
|
+
`DOCKER_USERNAME=$(aws secretsmanager get-secret-value --secret-id ${dockerLoginSecretArn} --query SecretString --output text | jq -r .username)`,
|
|
58
|
+
`DOCKER_PASSWORD=$(aws secretsmanager get-secret-value --secret-id ${dockerLoginSecretArn} --query SecretString --output text | jq -r .password)`,
|
|
59
|
+
'echo "Logging in to Docker..."',
|
|
60
|
+
'echo $DOCKER_PASSWORD | docker login --username $DOCKER_USERNAME --password-stdin',
|
|
61
|
+
]
|
|
62
|
+
: ['echo "No Docker credentials provided. Skipping login step."'];
|
|
59
63
|
// Create a CodeBuild project
|
|
60
64
|
const codeBuildProject = new aws_codebuild_1.Project(this, 'UICodeBuildProject', {
|
|
61
65
|
source: aws_codebuild_1.Source.s3({
|
|
@@ -64,14 +68,18 @@ class TokenInjectableDockerBuilder extends constructs_1.Construct {
|
|
|
64
68
|
}),
|
|
65
69
|
environment: {
|
|
66
70
|
buildImage: aws_codebuild_1.LinuxBuildImage.STANDARD_7_0,
|
|
67
|
-
privileged: true,
|
|
71
|
+
privileged: true,
|
|
72
|
+
},
|
|
73
|
+
environmentVariables: {
|
|
74
|
+
ECR_REPO_URI: { value: this.ecrRepository.repositoryUri },
|
|
75
|
+
BUILD_ARGS: { value: buildArgsString },
|
|
68
76
|
},
|
|
69
|
-
environmentVariables: environmentVariables,
|
|
70
77
|
buildSpec: aws_codebuild_1.BuildSpec.fromObject({
|
|
71
78
|
version: '0.2',
|
|
72
79
|
phases: {
|
|
73
80
|
pre_build: {
|
|
74
81
|
commands: [
|
|
82
|
+
...dockerLoginCommands,
|
|
75
83
|
'echo "Retrieving AWS Account ID..."',
|
|
76
84
|
'export ACCOUNT_ID=$(aws sts get-caller-identity --query Account --output text)',
|
|
77
85
|
'echo "Logging in to Amazon ECR..."',
|
|
@@ -93,33 +101,35 @@ class TokenInjectableDockerBuilder extends constructs_1.Construct {
|
|
|
93
101
|
},
|
|
94
102
|
}),
|
|
95
103
|
});
|
|
96
|
-
// Grant permissions to
|
|
104
|
+
// Grant permissions to CodeBuild
|
|
97
105
|
this.ecrRepository.grantPullPush(codeBuildProject);
|
|
98
106
|
codeBuildProject.role.addToPrincipalPolicy(new aws_iam_1.PolicyStatement({
|
|
99
|
-
actions: ['ecr:GetAuthorizationToken'],
|
|
100
|
-
resources: [
|
|
101
|
-
}));
|
|
102
|
-
// Grant permissions to CodeBuild for CloudWatch Logs
|
|
103
|
-
codeBuildProject.role.addToPrincipalPolicy(new aws_iam_1.PolicyStatement({
|
|
104
|
-
actions: ['logs:PutLogEvents', 'logs:CreateLogGroup', 'logs:CreateLogStream'],
|
|
105
|
-
resources: [`arn:aws:logs:${aws_cdk_lib_1.Stack.of(this).region}:${aws_cdk_lib_1.Stack.of(this).account}:*`],
|
|
107
|
+
actions: ['ecr:GetAuthorizationToken', 'ecr:GetDownloadUrlForLayer', 'ecr:BatchCheckLayerAvailability'],
|
|
108
|
+
resources: [this.ecrRepository.repositoryArn],
|
|
106
109
|
}));
|
|
107
|
-
|
|
110
|
+
if (dockerLoginSecretArn) {
|
|
111
|
+
codeBuildProject.role.addToPrincipalPolicy(new aws_iam_1.PolicyStatement({
|
|
112
|
+
actions: ['secretsmanager:GetSecretValue'],
|
|
113
|
+
resources: [dockerLoginSecretArn],
|
|
114
|
+
}));
|
|
115
|
+
}
|
|
116
|
+
// Grant CodeBuild access to the KMS key
|
|
117
|
+
encryptionKey.grantEncryptDecrypt(codeBuildProject.role);
|
|
118
|
+
// Create Lambda functions for onEvent and isComplete handlers
|
|
108
119
|
const onEventHandlerFunction = new aws_lambda_1.Function(this, 'OnEventHandlerFunction', {
|
|
109
|
-
runtime: aws_lambda_1.Runtime.
|
|
110
|
-
code: aws_lambda_1.Code.fromAsset(path.resolve(__dirname, '../onEvent')),
|
|
111
|
-
handler: 'onEvent.handler',
|
|
120
|
+
runtime: aws_lambda_1.Runtime.NODEJS_18_X,
|
|
121
|
+
code: aws_lambda_1.Code.fromAsset(path.resolve(__dirname, '../onEvent')),
|
|
122
|
+
handler: 'onEvent.handler',
|
|
112
123
|
timeout: aws_cdk_lib_1.Duration.minutes(15),
|
|
113
124
|
});
|
|
114
125
|
onEventHandlerFunction.addToRolePolicy(new aws_iam_1.PolicyStatement({
|
|
115
126
|
actions: ['codebuild:StartBuild'],
|
|
116
127
|
resources: [codeBuildProject.projectArn], // Restrict to specific project
|
|
117
128
|
}));
|
|
118
|
-
// Create Node.js Lambda function for isComplete
|
|
119
129
|
const isCompleteHandlerFunction = new aws_lambda_1.Function(this, 'IsCompleteHandlerFunction', {
|
|
120
|
-
runtime: aws_lambda_1.Runtime.
|
|
121
|
-
code: aws_lambda_1.Code.fromAsset(path.resolve(__dirname, '../isComplete')),
|
|
122
|
-
handler: 'isComplete.handler',
|
|
130
|
+
runtime: aws_lambda_1.Runtime.NODEJS_18_X,
|
|
131
|
+
code: aws_lambda_1.Code.fromAsset(path.resolve(__dirname, '../isComplete')),
|
|
132
|
+
handler: 'isComplete.handler',
|
|
123
133
|
timeout: aws_cdk_lib_1.Duration.minutes(15),
|
|
124
134
|
});
|
|
125
135
|
isCompleteHandlerFunction.addToRolePolicy(new aws_iam_1.PolicyStatement({
|
|
@@ -132,6 +142,11 @@ class TokenInjectableDockerBuilder extends constructs_1.Construct {
|
|
|
132
142
|
],
|
|
133
143
|
resources: ['*'],
|
|
134
144
|
}));
|
|
145
|
+
// Grant Lambda functions access to KMS key and ECR
|
|
146
|
+
encryptionKey.grantEncryptDecrypt(onEventHandlerFunction);
|
|
147
|
+
encryptionKey.grantEncryptDecrypt(isCompleteHandlerFunction);
|
|
148
|
+
this.ecrRepository.grantPullPush(onEventHandlerFunction);
|
|
149
|
+
this.ecrRepository.grantPullPush(isCompleteHandlerFunction);
|
|
135
150
|
// Create a custom resource provider
|
|
136
151
|
const provider = new custom_resources_1.Provider(this, 'CustomResourceProvider', {
|
|
137
152
|
onEventHandler: onEventHandlerFunction,
|
|
@@ -153,5 +168,5 @@ class TokenInjectableDockerBuilder extends constructs_1.Construct {
|
|
|
153
168
|
}
|
|
154
169
|
exports.TokenInjectableDockerBuilder = TokenInjectableDockerBuilder;
|
|
155
170
|
_a = JSII_RTTI_SYMBOL_1;
|
|
156
|
-
TokenInjectableDockerBuilder[_a] = { fqn: "token-injectable-docker-builder.TokenInjectableDockerBuilder", version: "1.
|
|
157
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;AAAA,iCAAiC;AACjC,6BAA6B;AAC7B,6CAA8D;AAC9D,6DAAwF;AACxF,iDAAiD;AACjD,iDAAqD;AACrD,iDAAsD;AACtD,uDAAkF;AAClF,6DAAkD;AAClD,mEAAwD;AACxD,2CAAuC;AAwBvC;;;;;;;;;;;;;GAaG;AACH,MAAa,4BAA6B,SAAQ,sBAAS;IAKzD;;;;;;OAMG;IACH,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAwC;QAChF,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAEjB,MAAM,EAAE,IAAI,EAAE,UAAU,EAAE,SAAS,EAAE,GAAG,KAAK,CAAC,CAAC,yBAAyB;QAExE,2BAA2B;QAC3B,IAAI,CAAC,aAAa,GAAG,IAAI,oBAAU,CAAC,IAAI,EAAE,eAAe,CAAC,CAAC;QAE3D,sCAAsC;QACtC,MAAM,WAAW,GAAG,IAAI,qBAAK,CAAC,IAAI,EAAE,aAAa,EAAE;YACjD,IAAI,EAAE,UAAU,EAAE,wCAAwC;SAC3D,CAAC,CAAC;QAEH,6DAA6D;QAC7D,MAAM,eAAe,GAAG,SAAS;YAC/B,CAAC,CAAC,MAAM,CAAC,OAAO,CAAC,SAAS,CAAC;iBACxB,GAAG,CAAC,CAAC,CAAC,GAAG,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,eAAe,GAAG,IAAI,KAAK,EAAE,CAAC;iBACpD,IAAI,CAAC,GAAG,CAAC;YACZ,CAAC,CAAC,EAAE,CAAC;QAEP,iEAAiE;QACjE,MAAM,oBAAoB,GAA0C;YAClE,YAAY,EAAE,EAAE,KAAK,EAAE,IAAI,CAAC,aAAa,CAAC,aAAa,EAAE;YACzD,UAAU,EAAE,EAAE,KAAK,EAAE,eAAe,EAAE;SACvC,CAAC;QAEF,6BAA6B;QAC7B,MAAM,gBAAgB,GAAG,IAAI,uBAAO,CAAC,IAAI,EAAE,oBAAoB,EAAE;YAC/D,MAAM,EAAE,sBAAM,CAAC,EAAE,CAAC;gBAChB,MAAM,EAAE,WAAW,CAAC,MAAM;gBAC1B,IAAI,EAAE,WAAW,CAAC,WAAW;aAC9B,CAAC;YACF,WAAW,EAAE;gBACX,UAAU,EAAE,+BAAe,CAAC,YAAY;gBACxC,UAAU,EAAE,IAAI,EAAE,6BAA6B;aAChD;YACD,oBAAoB,EAAE,oBAAoB;YAC1C,SAAS,EAAE,yBAAS,CAAC,UAAU,CAAC;gBAC9B,OAAO,EAAE,KAAK;gBACd,MAAM,EAAE;oBACN,SAAS,EAAE;wBACT,QAAQ,EAAE;4BACR,qCAAqC;4BACrC,gFAAgF;4BAChF,oCAAoC;4BACpC,8JAA8J;yBAC/J;qBACF;oBACD,KAAK,EAAE;wBACL,QAAQ,EAAE;4BACR,gDAAgD;4BAChD,qEAAqE;yBACtE;qBACF;oBACD,UAAU,EAAE;wBACV,QAAQ,EAAE;4BACR,oDAAoD;4BACpD,kCAAkC;yBACnC;qBACF;iBACF;aACF,CAAC;SACH,CAAC,CAAC;QAEH,yCAAyC;QACzC,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC,gBAAgB,CAAC,CAAC;QAEnD,gBAAgB,CAAC,IAAK,CAAC,oBAAoB,CACzC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE,CAAC,2BAA2B,CAAC;YACtC,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CACH,CAAC;QAEF,qDAAqD;QACrD,gBAAgB,CAAC,IAAK,CAAC,oBAAoB,CACzC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE,CAAC,mBAAmB,EAAE,qBAAqB,EAAE,sBAAsB,CAAC;YAC7E,SAAS,EAAE,CAAC,gBAAgB,mBAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,MAAM,IAAI,mBAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,OAAO,IAAI,CAAC;SACjF,CAAC,CACH,CAAC;QAEF,6CAA6C;QAC7C,MAAM,sBAAsB,GAAG,IAAI,qBAAQ,CAAC,IAAI,EAAE,wBAAwB,EAAE;YAC1E,OAAO,EAAE,oBAAO,CAAC,aAAa,EAAE,sBAAsB;YACtD,IAAI,EAAE,iBAAI,CAAC,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,SAAS,EAAE,YAAY,CAAC,CAAC,EAAE,uBAAuB;YACpF,OAAO,EAAE,iBAAiB,EAAE,iCAAiC;YAC7D,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SAC9B,CAAC,CAAC;QAEH,sBAAsB,CAAC,eAAe,CACpC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE,CAAC,sBAAsB,CAAC;YACjC,SAAS,EAAE,CAAC,gBAAgB,CAAC,UAAU,CAAC,EAAE,+BAA+B;SAC1E,CAAC,CACH,CAAC;QAEF,gDAAgD;QAChD,MAAM,yBAAyB,GAAG,IAAI,qBAAQ,CAAC,IAAI,EAAE,2BAA2B,EAAE;YAChF,OAAO,EAAE,oBAAO,CAAC,aAAa;YAC9B,IAAI,EAAE,iBAAI,CAAC,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,SAAS,EAAE,eAAe,CAAC,CAAC,EAAE,uBAAuB;YACvF,OAAO,EAAE,oBAAoB,EAAE,iCAAiC;YAChE,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SAC9B,CAAC,CAAC;QAEH,yBAAyB,CAAC,eAAe,CACvC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE;gBACP,0BAA0B;gBAC1B,gCAAgC;gBAChC,mBAAmB;gBACnB,yBAAyB;gBACzB,wBAAwB;aACzB;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CACH,CAAC;QAEF,oCAAoC;QACpC,MAAM,QAAQ,GAAG,IAAI,2BAAQ,CAAC,IAAI,EAAE,wBAAwB,EAAE;YAC5D,cAAc,EAAE,sBAAsB;YACtC,iBAAiB,EAAE,yBAAyB;YAC5C,aAAa,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SACpC,CAAC,CAAC;QAEH,6BAA6B;QAC7B,MAAM,oBAAoB,GAAG,IAAI,4BAAc,CAAC,IAAI,EAAE,sBAAsB,EAAE;YAC5E,YAAY,EAAE,QAAQ,CAAC,YAAY;YACnC,UAAU,EAAE;gBACV,WAAW,EAAE,gBAAgB,CAAC,WAAW;gBACzC,OAAO,EAAE,MAAM,CAAC,UAAU,EAAE;aAC7B;SACF,CAAC,CAAC;QAEH,oBAAoB,CAAC,IAAI,CAAC,aAAa,CAAC,gBAAgB,CAAC,CAAC;QAC1D,IAAI,CAAC,cAAc,GAAG,wBAAc,CAAC,iBAAiB,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;QAC3E,IAAI,CAAC,eAAe,GAAG,4BAAe,CAAC,OAAO,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;IACrE,CAAC;;AArJH,oEAsJC","sourcesContent":["import * as crypto from 'crypto';\nimport * as path from 'path';\nimport { CustomResource, Stack, Duration } from 'aws-cdk-lib';\nimport { Project, Source, LinuxBuildImage, BuildSpec } from 'aws-cdk-lib/aws-codebuild';\nimport { Repository } from 'aws-cdk-lib/aws-ecr';\nimport { ContainerImage } from 'aws-cdk-lib/aws-ecs';\nimport { PolicyStatement } from 'aws-cdk-lib/aws-iam';\nimport { Runtime, Code, DockerImageCode, Function } from 'aws-cdk-lib/aws-lambda';\nimport { Asset } from 'aws-cdk-lib/aws-s3-assets';\nimport { Provider } from 'aws-cdk-lib/custom-resources';\nimport { Construct } from 'constructs';\n\n/**\n * Properties for the `TokenInjectableDockerBuilder` construct.\n */\nexport interface TokenInjectableDockerBuilderProps {\n  /**\n   * The path to the directory containing the Dockerfile or source code.\n   */\n  readonly path: string;\n\n  /**\n   * Build arguments to pass to the Docker build process.\n   * These are transformed into `--build-arg` flags.\n   * @example\n   * {\n   *   TOKEN: 'my-secret-token',\n   *   ENV: 'production'\n   * }\n   */\n  readonly buildArgs?: { [key: string]: string };\n}\n\n\n/**\n * A CDK construct to build and push Docker images to an ECR repository using CodeBuild and Lambda custom resources.\n *\n * @example\n * const dockerBuilder = new TokenInjectableDockerBuilder(this, 'DockerBuilder', {\n *   path: './docker',\n *   buildArgs: {\n *     TOKEN: 'my-secret-token',\n *     ENV: 'production'\n *   },\n * });\n *\n * const containerImage = dockerBuilder.getContainerImage();\n */\nexport class TokenInjectableDockerBuilder extends Construct {\n  public readonly containerImage: ContainerImage;\n  public readonly dockerImageCode: DockerImageCode;\n  private readonly ecrRepository: Repository;\n\n  /**\n   * Creates a new `TokenInjectableDockerBuilder` instance.\n   *\n   * @param scope The parent construct/stack.\n   * @param id The unique ID of the construct.\n   * @param props Configuration properties for the construct.\n   */\n  constructor(scope: Construct, id: string, props: TokenInjectableDockerBuilderProps) {\n    super(scope, id);\n\n    const { path: sourcePath, buildArgs } = props; // Default to linux/amd64\n\n    // Create an ECR repository\n    this.ecrRepository = new Repository(this, 'ECRRepository');\n\n    // Package the source code as an asset\n    const sourceAsset = new Asset(this, 'SourceAsset', {\n      path: sourcePath, // Path to the Dockerfile or source code\n    });\n\n    // Transform buildArgs into a string of --build-arg KEY=VALUE\n    const buildArgsString = buildArgs\n      ? Object.entries(buildArgs)\n        .map(([key, value]) => `--build-arg ${key}=${value}`)\n        .join(' ')\n      : '';\n\n    // Pass the buildArgsString and platform as environment variables\n    const environmentVariables: { [name: string]: { value: string } } = {\n      ECR_REPO_URI: { value: this.ecrRepository.repositoryUri },\n      BUILD_ARGS: { value: buildArgsString },\n    };\n\n    // Create a CodeBuild project\n    const codeBuildProject = new Project(this, 'UICodeBuildProject', {\n      source: Source.s3({\n        bucket: sourceAsset.bucket,\n        path: sourceAsset.s3ObjectKey,\n      }),\n      environment: {\n        buildImage: LinuxBuildImage.STANDARD_7_0,\n        privileged: true, // Required for Docker builds\n      },\n      environmentVariables: environmentVariables,\n      buildSpec: BuildSpec.fromObject({\n        version: '0.2',\n        phases: {\n          pre_build: {\n            commands: [\n              'echo \"Retrieving AWS Account ID...\"',\n              'export ACCOUNT_ID=$(aws sts get-caller-identity --query Account --output text)',\n              'echo \"Logging in to Amazon ECR...\"',\n              'aws ecr get-login-password --region $AWS_DEFAULT_REGION | docker login --username AWS --password-stdin $ACCOUNT_ID.dkr.ecr.$AWS_DEFAULT_REGION.amazonaws.com',\n            ],\n          },\n          build: {\n            commands: [\n              'echo Build phase: Building the Docker image...',\n              'docker build $BUILD_ARGS -t $ECR_REPO_URI:latest $CODEBUILD_SRC_DIR',\n            ],\n          },\n          post_build: {\n            commands: [\n              'echo Post-build phase: Pushing the Docker image...',\n              'docker push $ECR_REPO_URI:latest',\n            ],\n          },\n        },\n      }),\n    });\n\n    // Grant permissions to interact with ECR\n    this.ecrRepository.grantPullPush(codeBuildProject);\n\n    codeBuildProject.role!.addToPrincipalPolicy(\n      new PolicyStatement({\n        actions: ['ecr:GetAuthorizationToken'],\n        resources: ['*'],\n      }),\n    );\n\n    // Grant permissions to CodeBuild for CloudWatch Logs\n    codeBuildProject.role!.addToPrincipalPolicy(\n      new PolicyStatement({\n        actions: ['logs:PutLogEvents', 'logs:CreateLogGroup', 'logs:CreateLogStream'],\n        resources: [`arn:aws:logs:${Stack.of(this).region}:${Stack.of(this).account}:*`],\n      }),\n    );\n\n    // Create Node.js Lambda function for onEvent\n    const onEventHandlerFunction = new Function(this, 'OnEventHandlerFunction', {\n      runtime: Runtime.NODEJS_LATEST, // Use Node.js runtime\n      code: Code.fromAsset(path.resolve(__dirname, '../onEvent')), // Path to handler code\n      handler: 'onEvent.handler', // Entry point (adjust as needed)\n      timeout: Duration.minutes(15),\n    });\n\n    onEventHandlerFunction.addToRolePolicy(\n      new PolicyStatement({\n        actions: ['codebuild:StartBuild'],\n        resources: [codeBuildProject.projectArn], // Restrict to specific project\n      }),\n    );\n\n    // Create Node.js Lambda function for isComplete\n    const isCompleteHandlerFunction = new Function(this, 'IsCompleteHandlerFunction', {\n      runtime: Runtime.NODEJS_LATEST,\n      code: Code.fromAsset(path.resolve(__dirname, '../isComplete')), // Path to handler code\n      handler: 'isComplete.handler', // Entry point (adjust as needed)\n      timeout: Duration.minutes(15),\n    });\n\n    isCompleteHandlerFunction.addToRolePolicy(\n      new PolicyStatement({\n        actions: [\n          'codebuild:BatchGetBuilds',\n          'codebuild:ListBuildsForProject',\n          'logs:GetLogEvents',\n          'logs:DescribeLogStreams',\n          'logs:DescribeLogGroups',\n        ],\n        resources: ['*'],\n      }),\n    );\n\n    // Create a custom resource provider\n    const provider = new Provider(this, 'CustomResourceProvider', {\n      onEventHandler: onEventHandlerFunction,\n      isCompleteHandler: isCompleteHandlerFunction,\n      queryInterval: Duration.seconds(30),\n    });\n\n    // Define the custom resource\n    const buildTriggerResource = new CustomResource(this, 'BuildTriggerResource', {\n      serviceToken: provider.serviceToken,\n      properties: {\n        ProjectName: codeBuildProject.projectName,\n        Trigger: crypto.randomUUID(),\n      },\n    });\n\n    buildTriggerResource.node.addDependency(codeBuildProject);\n    this.containerImage = ContainerImage.fromEcrRepository(this.ecrRepository);\n    this.dockerImageCode = DockerImageCode.fromEcr(this.ecrRepository);\n  }\n}\n"]}
|
|
171
|
+
TokenInjectableDockerBuilder[_a] = { fqn: "token-injectable-docker-builder.TokenInjectableDockerBuilder", version: "1.1.1" };
|
|
172
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;AAAA,iCAAiC;AACjC,6BAA6B;AAC7B,6CAAuD;AACvD,6DAAwF;AACxF,iDAAkF;AAClF,iDAAqD;AACrD,iDAAsD;AACtD,iDAA0C;AAC1C,uDAAkF;AAClF,6DAAkD;AAClD,mEAAwD;AACxD,2CAAuC;AAsCvC;;GAEG;AACH,MAAa,4BAA6B,SAAQ,sBAAS;IAKzD,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAwC;QAChF,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAEjB,MAAM,EAAE,IAAI,EAAE,UAAU,EAAE,SAAS,EAAE,oBAAoB,EAAE,GAAG,KAAK,CAAC;QAEpE,sCAAsC;QACtC,MAAM,aAAa,GAAG,IAAI,aAAG,CAAC,IAAI,EAAE,kBAAkB,EAAE;YACtD,iBAAiB,EAAE,IAAI;SACxB,CAAC,CAAC;QAEH,wFAAwF;QACxF,IAAI,CAAC,aAAa,GAAG,IAAI,oBAAU,CAAC,IAAI,EAAE,eAAe,EAAE;YACzD,cAAc,EAAE;gBACd;oBACE,YAAY,EAAE,CAAC;oBACf,WAAW,EAAE,sCAAsC;oBACnD,SAAS,EAAE,mBAAS,CAAC,QAAQ;oBAC7B,WAAW,EAAE,sBAAQ,CAAC,IAAI,CAAC,CAAC,CAAC;iBAC9B;aACF;YACD,UAAU,EAAE,8BAAoB,CAAC,GAAG;YACpC,aAAa,EAAE,aAAa;YAC5B,eAAe,EAAE,IAAI;SACtB,CAAC,CAAC;QAEH,sCAAsC;QACtC,MAAM,WAAW,GAAG,IAAI,qBAAK,CAAC,IAAI,EAAE,aAAa,EAAE;YACjD,IAAI,EAAE,UAAU;SACjB,CAAC,CAAC;QAEH,6DAA6D;QAC7D,MAAM,eAAe,GAAG,SAAS;YAC/B,CAAC,CAAC,MAAM,CAAC,OAAO,CAAC,SAAS,CAAC;iBACxB,GAAG,CAAC,CAAC,CAAC,GAAG,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,eAAe,GAAG,IAAI,KAAK,EAAE,CAAC;iBACpD,IAAI,CAAC,GAAG,CAAC;YACZ,CAAC,CAAC,EAAE,CAAC;QAEP,uCAAuC;QACvC,MAAM,mBAAmB,GAAG,oBAAoB;YAC9C,CAAC,CAAC;gBACA,8DAA8D;gBAC9D,qEAAqE,oBAAoB,wDAAwD;gBACjJ,qEAAqE,oBAAoB,wDAAwD;gBACjJ,gCAAgC;gBAChC,mFAAmF;aACpF;YACD,CAAC,CAAC,CAAC,6DAA6D,CAAC,CAAC;QAEpE,6BAA6B;QAC7B,MAAM,gBAAgB,GAAG,IAAI,uBAAO,CAAC,IAAI,EAAE,oBAAoB,EAAE;YAC/D,MAAM,EAAE,sBAAM,CAAC,EAAE,CAAC;gBAChB,MAAM,EAAE,WAAW,CAAC,MAAM;gBAC1B,IAAI,EAAE,WAAW,CAAC,WAAW;aAC9B,CAAC;YACF,WAAW,EAAE;gBACX,UAAU,EAAE,+BAAe,CAAC,YAAY;gBACxC,UAAU,EAAE,IAAI;aACjB;YACD,oBAAoB,EAAE;gBACpB,YAAY,EAAE,EAAE,KAAK,EAAE,IAAI,CAAC,aAAa,CAAC,aAAa,EAAE;gBACzD,UAAU,EAAE,EAAE,KAAK,EAAE,eAAe,EAAE;aACvC;YACD,SAAS,EAAE,yBAAS,CAAC,UAAU,CAAC;gBAC9B,OAAO,EAAE,KAAK;gBACd,MAAM,EAAE;oBACN,SAAS,EAAE;wBACT,QAAQ,EAAE;4BACR,GAAG,mBAAmB;4BACtB,qCAAqC;4BACrC,gFAAgF;4BAChF,oCAAoC;4BACpC,8JAA8J;yBAC/J;qBACF;oBACD,KAAK,EAAE;wBACL,QAAQ,EAAE;4BACR,gDAAgD;4BAChD,qEAAqE;yBACtE;qBACF;oBACD,UAAU,EAAE;wBACV,QAAQ,EAAE;4BACR,oDAAoD;4BACpD,kCAAkC;yBACnC;qBACF;iBACF;aACF,CAAC;SACH,CAAC,CAAC;QAEH,iCAAiC;QACjC,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC,gBAAgB,CAAC,CAAC;QAEnD,gBAAgB,CAAC,IAAK,CAAC,oBAAoB,CACzC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE,CAAC,2BAA2B,EAAE,4BAA4B,EAAE,iCAAiC,CAAC;YACvG,SAAS,EAAE,CAAC,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC;SAC9C,CAAC,CACH,CAAC;QAEF,IAAI,oBAAoB,EAAE,CAAC;YACzB,gBAAgB,CAAC,IAAK,CAAC,oBAAoB,CACzC,IAAI,yBAAe,CAAC;gBAClB,OAAO,EAAE,CAAC,+BAA+B,CAAC;gBAC1C,SAAS,EAAE,CAAC,oBAAoB,CAAC;aAClC,CAAC,CACH,CAAC;QACJ,CAAC;QAED,wCAAwC;QACxC,aAAa,CAAC,mBAAmB,CAAC,gBAAgB,CAAC,IAAK,CAAC,CAAC;QAE1D,8DAA8D;QAC9D,MAAM,sBAAsB,GAAG,IAAI,qBAAQ,CAAC,IAAI,EAAE,wBAAwB,EAAE;YAC1E,OAAO,EAAE,oBAAO,CAAC,WAAW;YAC5B,IAAI,EAAE,iBAAI,CAAC,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,SAAS,EAAE,YAAY,CAAC,CAAC;YAC3D,OAAO,EAAE,iBAAiB;YAC1B,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SAC9B,CAAC,CAAC;QAEH,sBAAsB,CAAC,eAAe,CACpC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE,CAAC,sBAAsB,CAAC;YACjC,SAAS,EAAE,CAAC,gBAAgB,CAAC,UAAU,CAAC,EAAE,+BAA+B;SAC1E,CAAC,CACH,CAAC;QACF,MAAM,yBAAyB,GAAG,IAAI,qBAAQ,CAAC,IAAI,EAAE,2BAA2B,EAAE;YAChF,OAAO,EAAE,oBAAO,CAAC,WAAW;YAC5B,IAAI,EAAE,iBAAI,CAAC,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,SAAS,EAAE,eAAe,CAAC,CAAC;YAC9D,OAAO,EAAE,oBAAoB;YAC7B,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SAC9B,CAAC,CAAC;QAEH,yBAAyB,CAAC,eAAe,CACvC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE;gBACP,0BAA0B;gBAC1B,gCAAgC;gBAChC,mBAAmB;gBACnB,yBAAyB;gBACzB,wBAAwB;aACzB;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CACH,CAAC;QAEF,mDAAmD;QACnD,aAAa,CAAC,mBAAmB,CAAC,sBAAsB,CAAC,CAAC;QAC1D,aAAa,CAAC,mBAAmB,CAAC,yBAAyB,CAAC,CAAC;QAC7D,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC,sBAAsB,CAAC,CAAC;QACzD,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC,yBAAyB,CAAC,CAAC;QAE5D,oCAAoC;QACpC,MAAM,QAAQ,GAAG,IAAI,2BAAQ,CAAC,IAAI,EAAE,wBAAwB,EAAE;YAC5D,cAAc,EAAE,sBAAsB;YACtC,iBAAiB,EAAE,yBAAyB;YAC5C,aAAa,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SACpC,CAAC,CAAC;QAEH,6BAA6B;QAC7B,MAAM,oBAAoB,GAAG,IAAI,4BAAc,CAAC,IAAI,EAAE,sBAAsB,EAAE;YAC5E,YAAY,EAAE,QAAQ,CAAC,YAAY;YACnC,UAAU,EAAE;gBACV,WAAW,EAAE,gBAAgB,CAAC,WAAW;gBACzC,OAAO,EAAE,MAAM,CAAC,UAAU,EAAE;aAC7B;SACF,CAAC,CAAC;QAEH,oBAAoB,CAAC,IAAI,CAAC,aAAa,CAAC,gBAAgB,CAAC,CAAC;QAC1D,IAAI,CAAC,cAAc,GAAG,wBAAc,CAAC,iBAAiB,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;QAC3E,IAAI,CAAC,eAAe,GAAG,4BAAe,CAAC,OAAO,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;IACrE,CAAC;;AAhLH,oEAiLC","sourcesContent":["import * as crypto from 'crypto';\nimport * as path from 'path';\nimport { CustomResource, Duration } from 'aws-cdk-lib';\nimport { Project, Source, LinuxBuildImage, BuildSpec } from 'aws-cdk-lib/aws-codebuild';\nimport { Repository, RepositoryEncryption, TagStatus } from 'aws-cdk-lib/aws-ecr';\nimport { ContainerImage } from 'aws-cdk-lib/aws-ecs';\nimport { PolicyStatement } from 'aws-cdk-lib/aws-iam';\nimport { Key } from 'aws-cdk-lib/aws-kms';\nimport { Runtime, Code, DockerImageCode, Function } from 'aws-cdk-lib/aws-lambda';\nimport { Asset } from 'aws-cdk-lib/aws-s3-assets';\nimport { Provider } from 'aws-cdk-lib/custom-resources';\nimport { Construct } from 'constructs';\n\n/**\n * Properties for the `TokenInjectableDockerBuilder` construct.\n */\nexport interface TokenInjectableDockerBuilderProps {\n  /**\n   * The path to the directory containing the Dockerfile or source code.\n   */\n  readonly path: string;\n\n  /**\n   * Build arguments to pass to the Docker build process.\n   * These are transformed into `--build-arg` flags.\n   * @example\n   * {\n   *   TOKEN: 'my-secret-token',\n   *   ENV: 'production'\n   * }\n   */\n  readonly buildArgs?: { [key: string]: string };\n\n  /**\n   * The ARN of the AWS Secrets Manager secret containing Docker login credentials.\n   * This secret should store a JSON object with the following structure:\n   * ```json\n   * {\n   *   \"username\": \"my-docker-username\",\n   *   \"password\": \"my-docker-password\"\n   * }\n   * ```\n   * If not provided, the construct will skip Docker login during the build process.\n   *\n   * @example 'arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret'\n   */\n  readonly dockerLoginSecretArn?: string;\n}\n\n/**\n * A CDK construct to build and push Docker images to an ECR repository using CodeBuild and Lambda custom resources.\n */\nexport class TokenInjectableDockerBuilder extends Construct {\n  private readonly ecrRepository: Repository;\n  public readonly containerImage: ContainerImage;\n  public readonly dockerImageCode: DockerImageCode;\n\n  constructor(scope: Construct, id: string, props: TokenInjectableDockerBuilderProps) {\n    super(scope, id);\n\n    const { path: sourcePath, buildArgs, dockerLoginSecretArn } = props;\n\n    // Define a KMS key for ECR encryption\n    const encryptionKey = new Key(this, 'EcrEncryptionKey', {\n      enableKeyRotation: true,\n    });\n\n    // Create an ECR repository with lifecycle rules, encryption, and image scanning enabled\n    this.ecrRepository = new Repository(this, 'ECRRepository', {\n      lifecycleRules: [\n        {\n          rulePriority: 1,\n          description: 'Remove untagged images after 30 days',\n          tagStatus: TagStatus.UNTAGGED,\n          maxImageAge: Duration.days(1),\n        },\n      ],\n      encryption: RepositoryEncryption.KMS,\n      encryptionKey: encryptionKey,\n      imageScanOnPush: true,\n    });\n\n    // Package the source code as an asset\n    const sourceAsset = new Asset(this, 'SourceAsset', {\n      path: sourcePath,\n    });\n\n    // Transform buildArgs into a string of --build-arg KEY=VALUE\n    const buildArgsString = buildArgs\n      ? Object.entries(buildArgs)\n        .map(([key, value]) => `--build-arg ${key}=${value}`)\n        .join(' ')\n      : '';\n\n    // Conditional Dockerhub login commands\n    const dockerLoginCommands = dockerLoginSecretArn\n      ? [\n        'echo \"Retrieving Docker credentials from Secrets Manager...\"',\n        `DOCKER_USERNAME=$(aws secretsmanager get-secret-value --secret-id ${dockerLoginSecretArn} --query SecretString --output text | jq -r .username)`,\n        `DOCKER_PASSWORD=$(aws secretsmanager get-secret-value --secret-id ${dockerLoginSecretArn} --query SecretString --output text | jq -r .password)`,\n        'echo \"Logging in to Docker...\"',\n        'echo $DOCKER_PASSWORD | docker login --username $DOCKER_USERNAME --password-stdin',\n      ]\n      : ['echo \"No Docker credentials provided. Skipping login step.\"'];\n\n    // Create a CodeBuild project\n    const codeBuildProject = new Project(this, 'UICodeBuildProject', {\n      source: Source.s3({\n        bucket: sourceAsset.bucket,\n        path: sourceAsset.s3ObjectKey,\n      }),\n      environment: {\n        buildImage: LinuxBuildImage.STANDARD_7_0,\n        privileged: true,\n      },\n      environmentVariables: {\n        ECR_REPO_URI: { value: this.ecrRepository.repositoryUri },\n        BUILD_ARGS: { value: buildArgsString },\n      },\n      buildSpec: BuildSpec.fromObject({\n        version: '0.2',\n        phases: {\n          pre_build: {\n            commands: [\n              ...dockerLoginCommands,\n              'echo \"Retrieving AWS Account ID...\"',\n              'export ACCOUNT_ID=$(aws sts get-caller-identity --query Account --output text)',\n              'echo \"Logging in to Amazon ECR...\"',\n              'aws ecr get-login-password --region $AWS_DEFAULT_REGION | docker login --username AWS --password-stdin $ACCOUNT_ID.dkr.ecr.$AWS_DEFAULT_REGION.amazonaws.com',\n            ],\n          },\n          build: {\n            commands: [\n              'echo Build phase: Building the Docker image...',\n              'docker build $BUILD_ARGS -t $ECR_REPO_URI:latest $CODEBUILD_SRC_DIR',\n            ],\n          },\n          post_build: {\n            commands: [\n              'echo Post-build phase: Pushing the Docker image...',\n              'docker push $ECR_REPO_URI:latest',\n            ],\n          },\n        },\n      }),\n    });\n\n    // Grant permissions to CodeBuild\n    this.ecrRepository.grantPullPush(codeBuildProject);\n\n    codeBuildProject.role!.addToPrincipalPolicy(\n      new PolicyStatement({\n        actions: ['ecr:GetAuthorizationToken', 'ecr:GetDownloadUrlForLayer', 'ecr:BatchCheckLayerAvailability'],\n        resources: [this.ecrRepository.repositoryArn],\n      }),\n    );\n\n    if (dockerLoginSecretArn) {\n      codeBuildProject.role!.addToPrincipalPolicy(\n        new PolicyStatement({\n          actions: ['secretsmanager:GetSecretValue'],\n          resources: [dockerLoginSecretArn],\n        }),\n      );\n    }\n\n    // Grant CodeBuild access to the KMS key\n    encryptionKey.grantEncryptDecrypt(codeBuildProject.role!);\n\n    // Create Lambda functions for onEvent and isComplete handlers\n    const onEventHandlerFunction = new Function(this, 'OnEventHandlerFunction', {\n      runtime: Runtime.NODEJS_18_X,\n      code: Code.fromAsset(path.resolve(__dirname, '../onEvent')),\n      handler: 'onEvent.handler',\n      timeout: Duration.minutes(15),\n    });\n\n    onEventHandlerFunction.addToRolePolicy(\n      new PolicyStatement({\n        actions: ['codebuild:StartBuild'],\n        resources: [codeBuildProject.projectArn], // Restrict to specific project\n      }),\n    );\n    const isCompleteHandlerFunction = new Function(this, 'IsCompleteHandlerFunction', {\n      runtime: Runtime.NODEJS_18_X,\n      code: Code.fromAsset(path.resolve(__dirname, '../isComplete')),\n      handler: 'isComplete.handler',\n      timeout: Duration.minutes(15),\n    });\n\n    isCompleteHandlerFunction.addToRolePolicy(\n      new PolicyStatement({\n        actions: [\n          'codebuild:BatchGetBuilds',\n          'codebuild:ListBuildsForProject',\n          'logs:GetLogEvents',\n          'logs:DescribeLogStreams',\n          'logs:DescribeLogGroups',\n        ],\n        resources: ['*'],\n      }),\n    );\n\n    // Grant Lambda functions access to KMS key and ECR\n    encryptionKey.grantEncryptDecrypt(onEventHandlerFunction);\n    encryptionKey.grantEncryptDecrypt(isCompleteHandlerFunction);\n    this.ecrRepository.grantPullPush(onEventHandlerFunction);\n    this.ecrRepository.grantPullPush(isCompleteHandlerFunction);\n\n    // Create a custom resource provider\n    const provider = new Provider(this, 'CustomResourceProvider', {\n      onEventHandler: onEventHandlerFunction,\n      isCompleteHandler: isCompleteHandlerFunction,\n      queryInterval: Duration.seconds(30),\n    });\n\n    // Define the custom resource\n    const buildTriggerResource = new CustomResource(this, 'BuildTriggerResource', {\n      serviceToken: provider.serviceToken,\n      properties: {\n        ProjectName: codeBuildProject.projectName,\n        Trigger: crypto.randomUUID(),\n      },\n    });\n\n    buildTriggerResource.node.addDependency(codeBuildProject);\n    this.containerImage = ContainerImage.fromEcrRepository(this.ecrRepository);\n    this.dockerImageCode = DockerImageCode.fromEcr(this.ecrRepository);\n  }\n}\n"]}
|
package/package.json
CHANGED
|
@@ -28,7 +28,9 @@
|
|
|
28
28
|
"unbump": "npx projen unbump",
|
|
29
29
|
"upgrade": "npx projen upgrade",
|
|
30
30
|
"watch": "npx projen watch",
|
|
31
|
-
"projen": "npx projen"
|
|
31
|
+
"projen": "npx projen",
|
|
32
|
+
"local-deploy": "cdk deploy --app \"npx ts-node src/integ.default.ts\"",
|
|
33
|
+
"local-destroy": "cdk destroy --app \"npx ts-node src/integ.default.ts\""
|
|
32
34
|
},
|
|
33
35
|
"author": {
|
|
34
36
|
"name": "AlexTech314",
|
|
@@ -94,7 +96,7 @@
|
|
|
94
96
|
"publishConfig": {
|
|
95
97
|
"access": "public"
|
|
96
98
|
},
|
|
97
|
-
"version": "1.
|
|
99
|
+
"version": "1.1.1",
|
|
98
100
|
"jest": {
|
|
99
101
|
"coverageProvider": "v8",
|
|
100
102
|
"testMatch": [
|