token-injectable-docker-builder 1.0.11 → 1.1.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/.jsii CHANGED
@@ -3898,7 +3898,7 @@
3898
3898
  },
3899
3899
  "name": "token-injectable-docker-builder",
3900
3900
  "readme": {
3901
- "markdown": "# TokenInjectableDockerBuilder\n\nThe `TokenInjectableDockerBuilder` is a flexible AWS CDK construct that enables the usage of AWS CDK tokens in the building, pushing, and deployment of Docker images to Amazon Elastic Container Registry (ECR). It leverages AWS CodeBuild and Lambda custom resources.\n\n## Why?\n\nAWS CDK already provides mechanisms for creating deployable assets using Docker, such as [DockerImageAsset](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_ecr_assets.DockerImageAsset.html) and [DockerImageCode](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_lambda.DockerImageCode.html), but these Constructs are limited because they cannot accept CDK tokens as build-args. With the TokenInjectableDockerBuilder, one can inject CDK tokens as build-time args into their Docker-based assets to satisfy a much larger range of dependency relationships.\n\nFor example, imagine a NextJS frontend Docker image that calls an API Gateway endpoint. Logically, one would first deploy the API Gateway, then deploy the NextJS frontend such that it has reference to the API Gateway endpoint through a [build-time environment variable](https://nextjs.org/docs/pages/building-your-application/configuring/environment-variables). In this case, building the Docker-based asset before deployment time doesn't work since it is dependent on the deployment of the API Gateway.\n\n## Features\n\n- Automatically builds and pushes Docker images to ECR.\n- Supports custom build arguments for Docker builds, including CDK tokens that are resolved at deployment time.\n- Retrieves the latest Docker image from ECR for use in ECS or Lambda.\n\n---\n\n## Installation\n\n### For NPM\n\nInstall the construct using NPM:\n\n```bash\nnpm install token-injectable-docker-builder\n```\n\n### For Python\n\nInstall the construct using pip:\n\n```bash\npip install token-injectable-docker-builder\n```\n\n---\n\n## Constructor\n\n### `TokenInjectableDockerBuilder`\n\n#### Parameters\n\n- **`scope`**: The construct's parent scope.\n- **`id`**: The construct ID.\n- **`props`**: Configuration properties.\n\n#### Properties in `TokenInjectableDockerBuilderProps`\n\n| Property | Type | Required | Description |\n|----------------|-----------------------------------|----------|------------------------------------------------------------|\n| `path` | `string` | Yes | The file path to the Dockerfile or source code directory. |\n| `buildArgs` | `{ [key: string]: string }` | No | Build arguments to pass to the Docker build process. |\n\n---\n\n## Usage Example\n\n### NPM/TypeScript Example\n\nHere is an example of how to use the `TokenInjectableDockerBuilder` in your AWS CDK application:\n\n```typescript\nimport * as cdk from 'aws-cdk-lib';\nimport { TokenInjectableDockerBuilder } from 'token-injectable-docker-builder';\n\nexport class MyStack extends cdk.Stack {\n constructor(scope: cdk.App, id: string, props?: cdk.StackProps) {\n super(scope, id, props);\n\n // Create a TokenInjectableDockerBuilder construct\n const dockerBuilder = new TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {\n path: './docker', // Path to the directory containing your Dockerfile\n buildArgs: {\n TOKEN: 'my-secret-token', // Example of a build argument\n ENV: 'production',\n },\n });\n\n // Retrieve the container image for ECS\n const containerImage = dockerBuilder.containerImage;\n\n // Retrieve the Docker image code for Lambda\n const dockerImageCode = dockerBuilder.dockerImageCode;\n\n // Example: Use the container image in an ECS service\n new ecs.FargateTaskDefinition(this, 'TaskDefinition', {\n containerImage,\n });\n\n // Example: Use the Docker image code in a Lambda function\n new lambda.Function(this, 'DockerLambdaFunction', {\n runtime: lambda.Runtime.FROM_IMAGE,\n code: dockerImageCode,\n handler: lambda.Handler.FROM_IMAGE,\n });\n }\n}\n```\n\n### Python Example\n\nHere is an example of how to use the `TokenInjectableDockerBuilder` in your AWS CDK application using Python:\n\n```python\nfrom aws_cdk import core as cdk\nfrom token_injectable_docker_builder import TokenInjectableDockerBuilder\nfrom aws_cdk import aws_ecs as ecs\nfrom aws_cdk import aws_lambda as lambda_\n\nclass MyStack(cdk.Stack):\n\n def __init__(self, scope: cdk.App, id: str, **kwargs):\n super().__init__(scope, id, **kwargs)\n\n # Create a TokenInjectableDockerBuilder construct\n docker_builder = TokenInjectableDockerBuilder(self, \"MyDockerBuilder\",\n path=\"./docker\", # Path to the directory containing your Dockerfile\n build_args={\n \"TOKEN\": \"my-secret-token\", # Example of a build argument\n \"ENV\": \"production\"\n }\n )\n\n # Retrieve the container image for ECS\n container_image = docker_builder.container_image\n\n # Retrieve the Docker image code for Lambda\n docker_image_code = docker_builder.docker_image_code\n\n # Example: Use the container image in an ECS service\n ecs.FargateTaskDefinition(self, \"TaskDefinition\",\n container_image=container_image\n )\n\n # Example: Use the Docker image code in a Lambda function\n lambda_.Function(self, \"DockerLambdaFunction\",\n runtime=lambda_.Runtime.FROM_IMAGE,\n code=docker_image_code,\n handler=lambda_.Handler.FROM_IMAGE\n )\n```\n\n---\n\n## How It Works\n\n1. **Docker Source**: The construct packages the source code or Dockerfile specified in the `path` property as an S3 asset.\n2. **CodeBuild Project**:\n - Uses the packaged asset and build arguments to build the Docker image.\n - Pushes the image to an ECR repository.\n3. **Custom Resource**:\n - Triggers the build process using a Lambda function (`onEvent`).\n - Monitors the build status using another Lambda function (`isComplete`).\n4. **Outputs**:\n - Provides the Docker image via `.containerImage` for ECS use.\n - Provides the Docker image code via `.dockerImageCode` for Lambda.\n\n---\n\n## IAM Permissions\n\nThis construct automatically grants the required IAM permissions for:\n- CodeBuild to pull and push images to ECR.\n- CodeBuild to write logs to CloudWatch.\n- Lambda functions to monitor the build status and retrieve logs.\n\n---\n\n## Notes\n\n- **Build Arguments**: Use the `buildArgs` property to pass custom arguments to the Docker build process. These are transformed into `--build-arg` flags.\n- **ECR Repository**: A new ECR repository is created automatically.\n- **Custom Resources**: Custom resources are used to handle lifecycle events and ensure the build is completed successfully.\n\n---\n\n## Prerequisites\n\nEnsure you have the following:\n1. Docker installed locally if you're testing builds.\n2. AWS CDK CLI installed (`npm install -g aws-cdk`).\n3. An AWS account and configured credentials.\n\n---\n\n## Troubleshooting\n\n1. **Build Errors**: Check the AWS CodeBuild logs in CloudWatch.\n2. **Lambda Function Errors**: Check the `onEvent` and `isComplete` Lambda logs in CloudWatch.\n3. **Permissions**: Ensure the IAM role for CodeBuild has the required permissions to interact with ECR and CloudWatch.\n\n---\n\n## Support\n\nOpen an issue on [GitHub](https://github.com/AlexTech314/TokenInjectableDockerBuilder) :)\n\n---\n\n## Reference Links\n[![View on Construct Hub](https://constructs.dev/badge?package=token-injectable-docker-builder)](https://constructs.dev/packages/token-injectable-docker-builder)\n"
3901
+ "markdown": "# TokenInjectableDockerBuilder\n\nThe `TokenInjectableDockerBuilder` is a flexible AWS CDK construct that enables the usage of AWS CDK tokens in the building, pushing, and deployment of Docker images to Amazon Elastic Container Registry (ECR). It leverages AWS CodeBuild and Lambda custom resources.\n\n---\n\n## Why?\n\nAWS CDK already provides mechanisms for creating deployable assets using Docker, such as [DockerImageAsset](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_ecr_assets.DockerImageAsset.html) and [DockerImageCode](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_lambda.DockerImageCode.html), but these Constructs are limited because they cannot accept CDK tokens as build-args. The `TokenInjectableDockerBuilder` allows injecting CDK tokens as build-time arguments into Docker-based assets, enabling more dynamic dependency relationships.\n\nFor example, a Next.js frontend Docker image may require an API Gateway URL. With this construct, you can deploy the API Gateway first, then pass its URL as a build-time argument to the Next.js Docker image.\n\n---\n\n## Features\n\n- Automatically builds and pushes Docker images to ECR.\n- Supports custom build arguments for Docker builds, including CDK tokens resolved at deployment time.\n- Retrieves Docker images for use in ECS or Lambda.\n\n---\n\n## Installation\n\n### For NPM\n\nInstall the construct using NPM:\n\n```bash\nnpm install token-injectable-docker-builder\n```\n\n### For Python\n\nInstall the construct using pip:\n\n```bash\npip install token-injectable-docker-builder\n```\n\n---\n\n## Constructor\n\n### `TokenInjectableDockerBuilder`\n\n#### Parameters\n\n- **`scope`**: The construct's parent scope.\n- **`id`**: The construct ID.\n- **`props`**: Configuration properties.\n\n#### Properties in `TokenInjectableDockerBuilderProps`\n\n| Property | Type | Required | Description |\n|------------------------|--------------------|----------|-------------------------------------------------------------------------------------------------------|\n| `path` | `string` | Yes | The file path to the Dockerfile or source code directory. |\n| `buildArgs` | `{ [key: string]: string }` | No | Build arguments to pass to the Docker build process. |\n| `dockerLoginSecretArn` | `string` | No | ARN of an AWS Secrets Manager secret for Docker credentials. Skips login if not provided. |\n\n---\n\n## Usage Examples\n\n### TypeScript/NPM Example\n\nHere is how to use `TokenInjectableDockerBuilder` in an AWS CDK project with TypeScript:\n\n```typescript\nimport * as cdk from 'aws-cdk-lib';\nimport { TokenInjectableDockerBuilder } from 'token-injectable-docker-builder';\nimport * as ecs from 'aws-cdk-lib/aws-ecs';\nimport * as lambda from 'aws-cdk-lib/aws-lambda';\n\nexport class MyStack extends cdk.Stack {\n constructor(scope: cdk.App, id: string, props?: cdk.StackProps) {\n super(scope, id, props);\n\n const dockerBuilder = new TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {\n path: './docker',\n buildArgs: {\n TOKEN: 'my-secret-token',\n ENV: 'production',\n },\n dockerLoginSecretArn: 'arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret',\n });\n\n // Use in ECS\n new ecs.FargateTaskDefinition(this, 'TaskDefinition', {\n containerImage: dockerBuilder.containerImage,\n });\n\n // Use in Lambda\n new lambda.Function(this, 'DockerLambdaFunction', {\n runtime: lambda.Runtime.FROM_IMAGE,\n code: dockerBuilder.dockerImageCode,\n handler: lambda.Handler.FROM_IMAGE,\n });\n }\n}\n```\n\n---\n\n### Python Example\n\nHere is how to use `TokenInjectableDockerBuilder` in an AWS CDK project with Python:\n\n```python\nfrom aws_cdk import core as cdk\nfrom token_injectable_docker_builder import TokenInjectableDockerBuilder\nfrom aws_cdk import aws_ecs as ecs\nfrom aws_cdk import aws_lambda as lambda_\n\nclass MyStack(cdk.Stack):\n\n def __init__(self, scope: cdk.App, id: str, **kwargs):\n super().__init__(scope, id, **kwargs)\n\n docker_builder = TokenInjectableDockerBuilder(self, \"MyDockerBuilder\",\n path=\"./docker\",\n build_args={\n \"TOKEN\": \"my-secret-token\",\n \"ENV\": \"production\"\n },\n docker_login_secret_arn=\"arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret\"\n )\n\n # Use in ECS\n ecs.FargateTaskDefinition(self, \"TaskDefinition\",\n container_image=docker_builder.container_image\n )\n\n # Use in Lambda\n lambda_.Function(self, \"DockerLambdaFunction\",\n runtime=lambda_.Runtime.FROM_IMAGE,\n code=docker_builder.docker_image_code,\n handler=lambda_.Handler.FROM_IMAGE\n )\n```\n\n---\n\n## How It Works\n\n1. **Docker Source**: Packages the source code or Dockerfile specified in the `path` property as an S3 asset.\n2. **CodeBuild Project**:\n - Uses the packaged asset and `buildArgs` to build the Docker image.\n - Pushes the image to an ECR repository.\n3. **Custom Resource**:\n - Triggers the build process using a Lambda function (`onEvent`).\n - Monitors the build status using another Lambda function (`isComplete`).\n4. **Outputs**:\n - `.containerImage`: Returns the Docker image for ECS.\n - `.dockerImageCode`: Returns the Docker image code for Lambda.\n\n---\n\n## IAM Permissions\n\nThe construct automatically grants permissions for:\n- CodeBuild to pull and push images to ECR.\n- Lambda to monitor build status and retrieve logs.\n- Encryption via a custom KMS key.\n\n---\n\n## Notes\n\n- **Build Arguments**: Pass custom arguments via `buildArgs` as `--build-arg` flags.\n- **ECR Repository**: Automatically creates an ECR repository with lifecycle rules.\n- **Custom Resources**: Manages lifecycle events for builds using custom Lambda handlers.\n\n---\n\n## Troubleshooting\n\n1. **Build Errors**: Check CodeBuild logs in CloudWatch.\n2. **Lambda Errors**: Check `onEvent` and `isComplete` Lambda logs in CloudWatch.\n3. **Permissions**: Ensure IAM roles have the required permissions for CodeBuild, ECR, and Secrets Manager.\n\n---\n\n## Support\n\nOpen an issue on [GitHub](https://github.com/AlexTech314/TokenInjectableDockerBuilder).\n\n---\n\n## Reference Links\n[![View on Construct Hub](https://constructs.dev/badge?package=token-injectable-docker-builder)](https://constructs.dev/packages/token-injectable-docker-builder)\n"
3902
3902
  },
3903
3903
  "repository": {
3904
3904
  "type": "git",
@@ -3919,43 +3919,32 @@
3919
3919
  "assembly": "token-injectable-docker-builder",
3920
3920
  "base": "constructs.Construct",
3921
3921
  "docs": {
3922
- "example": "const dockerBuilder = new TokenInjectableDockerBuilder(this, 'DockerBuilder', {\n path: './docker',\n buildArgs: {\n TOKEN: 'my-secret-token',\n ENV: 'production'\n },\n});\n\nconst containerImage = dockerBuilder.getContainerImage();",
3923
3922
  "stability": "stable",
3924
3923
  "summary": "A CDK construct to build and push Docker images to an ECR repository using CodeBuild and Lambda custom resources."
3925
3924
  },
3926
3925
  "fqn": "token-injectable-docker-builder.TokenInjectableDockerBuilder",
3927
3926
  "initializer": {
3928
3927
  "docs": {
3929
- "stability": "stable",
3930
- "summary": "Creates a new `TokenInjectableDockerBuilder` instance."
3928
+ "stability": "stable"
3931
3929
  },
3932
3930
  "locationInModule": {
3933
3931
  "filename": "src/index.ts",
3934
- "line": 61
3932
+ "line": 58
3935
3933
  },
3936
3934
  "parameters": [
3937
3935
  {
3938
- "docs": {
3939
- "summary": "The parent construct/stack."
3940
- },
3941
3936
  "name": "scope",
3942
3937
  "type": {
3943
3938
  "fqn": "constructs.Construct"
3944
3939
  }
3945
3940
  },
3946
3941
  {
3947
- "docs": {
3948
- "summary": "The unique ID of the construct."
3949
- },
3950
3942
  "name": "id",
3951
3943
  "type": {
3952
3944
  "primitive": "string"
3953
3945
  }
3954
3946
  },
3955
3947
  {
3956
- "docs": {
3957
- "summary": "Configuration properties for the construct."
3958
- },
3959
3948
  "name": "props",
3960
3949
  "type": {
3961
3950
  "fqn": "token-injectable-docker-builder.TokenInjectableDockerBuilderProps"
@@ -3966,7 +3955,7 @@
3966
3955
  "kind": "class",
3967
3956
  "locationInModule": {
3968
3957
  "filename": "src/index.ts",
3969
- "line": 49
3958
+ "line": 53
3970
3959
  },
3971
3960
  "name": "TokenInjectableDockerBuilder",
3972
3961
  "properties": [
@@ -3977,7 +3966,7 @@
3977
3966
  "immutable": true,
3978
3967
  "locationInModule": {
3979
3968
  "filename": "src/index.ts",
3980
- "line": 50
3969
+ "line": 55
3981
3970
  },
3982
3971
  "name": "containerImage",
3983
3972
  "type": {
@@ -3991,7 +3980,7 @@
3991
3980
  "immutable": true,
3992
3981
  "locationInModule": {
3993
3982
  "filename": "src/index.ts",
3994
- "line": 51
3983
+ "line": 56
3995
3984
  },
3996
3985
  "name": "dockerImageCode",
3997
3986
  "type": {
@@ -4012,7 +4001,7 @@
4012
4001
  "kind": "interface",
4013
4002
  "locationInModule": {
4014
4003
  "filename": "src/index.ts",
4015
- "line": 16
4004
+ "line": 17
4016
4005
  },
4017
4006
  "name": "TokenInjectableDockerBuilderProps",
4018
4007
  "properties": [
@@ -4025,7 +4014,7 @@
4025
4014
  "immutable": true,
4026
4015
  "locationInModule": {
4027
4016
  "filename": "src/index.ts",
4028
- "line": 20
4017
+ "line": 21
4029
4018
  },
4030
4019
  "name": "path",
4031
4020
  "type": {
@@ -4043,7 +4032,7 @@
4043
4032
  "immutable": true,
4044
4033
  "locationInModule": {
4045
4034
  "filename": "src/index.ts",
4046
- "line": 31
4035
+ "line": 32
4047
4036
  },
4048
4037
  "name": "buildArgs",
4049
4038
  "optional": true,
@@ -4055,11 +4044,30 @@
4055
4044
  "kind": "map"
4056
4045
  }
4057
4046
  }
4047
+ },
4048
+ {
4049
+ "abstract": true,
4050
+ "docs": {
4051
+ "example": "'arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret'",
4052
+ "remarks": "This secret should store a JSON object with the following structure:\n```json\n{\n \"username\": \"my-docker-username\",\n \"password\": \"my-docker-password\"\n}\n```\nIf not provided, the construct will skip Docker login during the build process.",
4053
+ "stability": "stable",
4054
+ "summary": "The ARN of the AWS Secrets Manager secret containing Docker login credentials."
4055
+ },
4056
+ "immutable": true,
4057
+ "locationInModule": {
4058
+ "filename": "src/index.ts",
4059
+ "line": 47
4060
+ },
4061
+ "name": "dockerLoginSecretArn",
4062
+ "optional": true,
4063
+ "type": {
4064
+ "primitive": "string"
4065
+ }
4058
4066
  }
4059
4067
  ],
4060
4068
  "symbolId": "src/index:TokenInjectableDockerBuilderProps"
4061
4069
  }
4062
4070
  },
4063
- "version": "1.0.11",
4064
- "fingerprint": "Xvy1biF4GoRKVQ/M5PjRbQmKLoYqKBSR+G68BdnycPc="
4071
+ "version": "1.1.1",
4072
+ "fingerprint": "dNZza5HJSvkKpYKTwFNzOlEu3XcrKWMe2UHZb9UxVrA="
4065
4073
  }
package/API.md CHANGED
@@ -6,21 +6,6 @@
6
6
 
7
7
  A CDK construct to build and push Docker images to an ECR repository using CodeBuild and Lambda custom resources.
8
8
 
9
- *Example*
10
-
11
- ```typescript
12
- const dockerBuilder = new TokenInjectableDockerBuilder(this, 'DockerBuilder', {
13
- path: './docker',
14
- buildArgs: {
15
- TOKEN: 'my-secret-token',
16
- ENV: 'production'
17
- },
18
- });
19
-
20
- const containerImage = dockerBuilder.getContainerImage();
21
- ```
22
-
23
-
24
9
  #### Initializers <a name="Initializers" id="token-injectable-docker-builder.TokenInjectableDockerBuilder.Initializer"></a>
25
10
 
26
11
  ```typescript
@@ -31,9 +16,9 @@ new TokenInjectableDockerBuilder(scope: Construct, id: string, props: TokenInjec
31
16
 
32
17
  | **Name** | **Type** | **Description** |
33
18
  | --- | --- | --- |
34
- | <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilder.Initializer.parameter.scope">scope</a></code> | <code>constructs.Construct</code> | The parent construct/stack. |
35
- | <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilder.Initializer.parameter.id">id</a></code> | <code>string</code> | The unique ID of the construct. |
36
- | <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilder.Initializer.parameter.props">props</a></code> | <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilderProps">TokenInjectableDockerBuilderProps</a></code> | Configuration properties for the construct. |
19
+ | <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilder.Initializer.parameter.scope">scope</a></code> | <code>constructs.Construct</code> | *No description.* |
20
+ | <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilder.Initializer.parameter.id">id</a></code> | <code>string</code> | *No description.* |
21
+ | <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilder.Initializer.parameter.props">props</a></code> | <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilderProps">TokenInjectableDockerBuilderProps</a></code> | *No description.* |
37
22
 
38
23
  ---
39
24
 
@@ -41,24 +26,18 @@ new TokenInjectableDockerBuilder(scope: Construct, id: string, props: TokenInjec
41
26
 
42
27
  - *Type:* constructs.Construct
43
28
 
44
- The parent construct/stack.
45
-
46
29
  ---
47
30
 
48
31
  ##### `id`<sup>Required</sup> <a name="id" id="token-injectable-docker-builder.TokenInjectableDockerBuilder.Initializer.parameter.id"></a>
49
32
 
50
33
  - *Type:* string
51
34
 
52
- The unique ID of the construct.
53
-
54
35
  ---
55
36
 
56
37
  ##### `props`<sup>Required</sup> <a name="props" id="token-injectable-docker-builder.TokenInjectableDockerBuilder.Initializer.parameter.props"></a>
57
38
 
58
39
  - *Type:* <a href="#token-injectable-docker-builder.TokenInjectableDockerBuilderProps">TokenInjectableDockerBuilderProps</a>
59
40
 
60
- Configuration properties for the construct.
61
-
62
41
  ---
63
42
 
64
43
  #### Methods <a name="Methods" id="Methods"></a>
@@ -166,6 +145,7 @@ const tokenInjectableDockerBuilderProps: TokenInjectableDockerBuilderProps = { .
166
145
  | --- | --- | --- |
167
146
  | <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.path">path</a></code> | <code>string</code> | The path to the directory containing the Dockerfile or source code. |
168
147
  | <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.buildArgs">buildArgs</a></code> | <code>{[ key: string ]: string}</code> | Build arguments to pass to the Docker build process. |
148
+ | <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.dockerLoginSecretArn">dockerLoginSecretArn</a></code> | <code>string</code> | The ARN of the AWS Secrets Manager secret containing Docker login credentials. |
169
149
 
170
150
  ---
171
151
 
@@ -205,5 +185,33 @@ These are transformed into `--build-arg` flags.
205
185
  ```
206
186
 
207
187
 
188
+ ##### `dockerLoginSecretArn`<sup>Optional</sup> <a name="dockerLoginSecretArn" id="token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.dockerLoginSecretArn"></a>
189
+
190
+ ```typescript
191
+ public readonly dockerLoginSecretArn: string;
192
+ ```
193
+
194
+ - *Type:* string
195
+
196
+ The ARN of the AWS Secrets Manager secret containing Docker login credentials.
197
+
198
+ This secret should store a JSON object with the following structure:
199
+ ```json
200
+ {
201
+ "username": "my-docker-username",
202
+ "password": "my-docker-password"
203
+ }
204
+ ```
205
+ If not provided, the construct will skip Docker login during the build process.
206
+
207
+ ---
208
+
209
+ *Example*
210
+
211
+ ```typescript
212
+ 'arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret'
213
+ ```
214
+
215
+
208
216
 
209
217
 
package/README.md CHANGED
@@ -2,17 +2,21 @@
2
2
 
3
3
  The `TokenInjectableDockerBuilder` is a flexible AWS CDK construct that enables the usage of AWS CDK tokens in the building, pushing, and deployment of Docker images to Amazon Elastic Container Registry (ECR). It leverages AWS CodeBuild and Lambda custom resources.
4
4
 
5
+ ---
6
+
5
7
  ## Why?
6
8
 
7
- AWS CDK already provides mechanisms for creating deployable assets using Docker, such as [DockerImageAsset](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_ecr_assets.DockerImageAsset.html) and [DockerImageCode](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_lambda.DockerImageCode.html), but these Constructs are limited because they cannot accept CDK tokens as build-args. With the TokenInjectableDockerBuilder, one can inject CDK tokens as build-time args into their Docker-based assets to satisfy a much larger range of dependency relationships.
9
+ AWS CDK already provides mechanisms for creating deployable assets using Docker, such as [DockerImageAsset](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_ecr_assets.DockerImageAsset.html) and [DockerImageCode](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_lambda.DockerImageCode.html), but these Constructs are limited because they cannot accept CDK tokens as build-args. The `TokenInjectableDockerBuilder` allows injecting CDK tokens as build-time arguments into Docker-based assets, enabling more dynamic dependency relationships.
8
10
 
9
- For example, imagine a NextJS frontend Docker image that calls an API Gateway endpoint. Logically, one would first deploy the API Gateway, then deploy the NextJS frontend such that it has reference to the API Gateway endpoint through a [build-time environment variable](https://nextjs.org/docs/pages/building-your-application/configuring/environment-variables). In this case, building the Docker-based asset before deployment time doesn't work since it is dependent on the deployment of the API Gateway.
11
+ For example, a Next.js frontend Docker image may require an API Gateway URL. With this construct, you can deploy the API Gateway first, then pass its URL as a build-time argument to the Next.js Docker image.
12
+
13
+ ---
10
14
 
11
15
  ## Features
12
16
 
13
17
  - Automatically builds and pushes Docker images to ECR.
14
- - Supports custom build arguments for Docker builds, including CDK tokens that are resolved at deployment time.
15
- - Retrieves the latest Docker image from ECR for use in ECS or Lambda.
18
+ - Supports custom build arguments for Docker builds, including CDK tokens resolved at deployment time.
19
+ - Retrieves Docker images for use in ECS or Lambda.
16
20
 
17
21
  ---
18
22
 
@@ -48,60 +52,59 @@ pip install token-injectable-docker-builder
48
52
 
49
53
  #### Properties in `TokenInjectableDockerBuilderProps`
50
54
 
51
- | Property | Type | Required | Description |
52
- |----------------|-----------------------------------|----------|------------------------------------------------------------|
53
- | `path` | `string` | Yes | The file path to the Dockerfile or source code directory. |
54
- | `buildArgs` | `{ [key: string]: string }` | No | Build arguments to pass to the Docker build process. |
55
+ | Property | Type | Required | Description |
56
+ |------------------------|--------------------|----------|-------------------------------------------------------------------------------------------------------|
57
+ | `path` | `string` | Yes | The file path to the Dockerfile or source code directory. |
58
+ | `buildArgs` | `{ [key: string]: string }` | No | Build arguments to pass to the Docker build process. |
59
+ | `dockerLoginSecretArn` | `string` | No | ARN of an AWS Secrets Manager secret for Docker credentials. Skips login if not provided. |
55
60
 
56
61
  ---
57
62
 
58
- ## Usage Example
63
+ ## Usage Examples
59
64
 
60
- ### NPM/TypeScript Example
65
+ ### TypeScript/NPM Example
61
66
 
62
- Here is an example of how to use the `TokenInjectableDockerBuilder` in your AWS CDK application:
67
+ Here is how to use `TokenInjectableDockerBuilder` in an AWS CDK project with TypeScript:
63
68
 
64
69
  ```typescript
65
70
  import * as cdk from 'aws-cdk-lib';
66
71
  import { TokenInjectableDockerBuilder } from 'token-injectable-docker-builder';
72
+ import * as ecs from 'aws-cdk-lib/aws-ecs';
73
+ import * as lambda from 'aws-cdk-lib/aws-lambda';
67
74
 
68
75
  export class MyStack extends cdk.Stack {
69
76
  constructor(scope: cdk.App, id: string, props?: cdk.StackProps) {
70
77
  super(scope, id, props);
71
78
 
72
- // Create a TokenInjectableDockerBuilder construct
73
79
  const dockerBuilder = new TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {
74
- path: './docker', // Path to the directory containing your Dockerfile
80
+ path: './docker',
75
81
  buildArgs: {
76
- TOKEN: 'my-secret-token', // Example of a build argument
82
+ TOKEN: 'my-secret-token',
77
83
  ENV: 'production',
78
84
  },
85
+ dockerLoginSecretArn: 'arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret',
79
86
  });
80
87
 
81
- // Retrieve the container image for ECS
82
- const containerImage = dockerBuilder.containerImage;
83
-
84
- // Retrieve the Docker image code for Lambda
85
- const dockerImageCode = dockerBuilder.dockerImageCode;
86
-
87
- // Example: Use the container image in an ECS service
88
+ // Use in ECS
88
89
  new ecs.FargateTaskDefinition(this, 'TaskDefinition', {
89
- containerImage,
90
+ containerImage: dockerBuilder.containerImage,
90
91
  });
91
92
 
92
- // Example: Use the Docker image code in a Lambda function
93
+ // Use in Lambda
93
94
  new lambda.Function(this, 'DockerLambdaFunction', {
94
95
  runtime: lambda.Runtime.FROM_IMAGE,
95
- code: dockerImageCode,
96
+ code: dockerBuilder.dockerImageCode,
96
97
  handler: lambda.Handler.FROM_IMAGE,
97
98
  });
98
99
  }
99
100
  }
100
101
  ```
101
102
 
103
+ ---
104
+
102
105
  ### Python Example
103
106
 
104
- Here is an example of how to use the `TokenInjectableDockerBuilder` in your AWS CDK application using Python:
107
+ Here is how to use `TokenInjectableDockerBuilder` in an AWS CDK project with Python:
105
108
 
106
109
  ```python
107
110
  from aws_cdk import core as cdk
@@ -114,30 +117,24 @@ class MyStack(cdk.Stack):
114
117
  def __init__(self, scope: cdk.App, id: str, **kwargs):
115
118
  super().__init__(scope, id, **kwargs)
116
119
 
117
- # Create a TokenInjectableDockerBuilder construct
118
120
  docker_builder = TokenInjectableDockerBuilder(self, "MyDockerBuilder",
119
- path="./docker", # Path to the directory containing your Dockerfile
121
+ path="./docker",
120
122
  build_args={
121
- "TOKEN": "my-secret-token", # Example of a build argument
123
+ "TOKEN": "my-secret-token",
122
124
  "ENV": "production"
123
- }
125
+ },
126
+ docker_login_secret_arn="arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret"
124
127
  )
125
128
 
126
- # Retrieve the container image for ECS
127
- container_image = docker_builder.container_image
128
-
129
- # Retrieve the Docker image code for Lambda
130
- docker_image_code = docker_builder.docker_image_code
131
-
132
- # Example: Use the container image in an ECS service
129
+ # Use in ECS
133
130
  ecs.FargateTaskDefinition(self, "TaskDefinition",
134
- container_image=container_image
131
+ container_image=docker_builder.container_image
135
132
  )
136
133
 
137
- # Example: Use the Docker image code in a Lambda function
134
+ # Use in Lambda
138
135
  lambda_.Function(self, "DockerLambdaFunction",
139
136
  runtime=lambda_.Runtime.FROM_IMAGE,
140
- code=docker_image_code,
137
+ code=docker_builder.docker_image_code,
141
138
  handler=lambda_.Handler.FROM_IMAGE
142
139
  )
143
140
  ```
@@ -146,56 +143,47 @@ class MyStack(cdk.Stack):
146
143
 
147
144
  ## How It Works
148
145
 
149
- 1. **Docker Source**: The construct packages the source code or Dockerfile specified in the `path` property as an S3 asset.
146
+ 1. **Docker Source**: Packages the source code or Dockerfile specified in the `path` property as an S3 asset.
150
147
  2. **CodeBuild Project**:
151
- - Uses the packaged asset and build arguments to build the Docker image.
148
+ - Uses the packaged asset and `buildArgs` to build the Docker image.
152
149
  - Pushes the image to an ECR repository.
153
150
  3. **Custom Resource**:
154
151
  - Triggers the build process using a Lambda function (`onEvent`).
155
152
  - Monitors the build status using another Lambda function (`isComplete`).
156
153
  4. **Outputs**:
157
- - Provides the Docker image via `.containerImage` for ECS use.
158
- - Provides the Docker image code via `.dockerImageCode` for Lambda.
154
+ - `.containerImage`: Returns the Docker image for ECS.
155
+ - `.dockerImageCode`: Returns the Docker image code for Lambda.
159
156
 
160
157
  ---
161
158
 
162
159
  ## IAM Permissions
163
160
 
164
- This construct automatically grants the required IAM permissions for:
161
+ The construct automatically grants permissions for:
165
162
  - CodeBuild to pull and push images to ECR.
166
- - CodeBuild to write logs to CloudWatch.
167
- - Lambda functions to monitor the build status and retrieve logs.
163
+ - Lambda to monitor build status and retrieve logs.
164
+ - Encryption via a custom KMS key.
168
165
 
169
166
  ---
170
167
 
171
168
  ## Notes
172
169
 
173
- - **Build Arguments**: Use the `buildArgs` property to pass custom arguments to the Docker build process. These are transformed into `--build-arg` flags.
174
- - **ECR Repository**: A new ECR repository is created automatically.
175
- - **Custom Resources**: Custom resources are used to handle lifecycle events and ensure the build is completed successfully.
176
-
177
- ---
178
-
179
- ## Prerequisites
180
-
181
- Ensure you have the following:
182
- 1. Docker installed locally if you're testing builds.
183
- 2. AWS CDK CLI installed (`npm install -g aws-cdk`).
184
- 3. An AWS account and configured credentials.
170
+ - **Build Arguments**: Pass custom arguments via `buildArgs` as `--build-arg` flags.
171
+ - **ECR Repository**: Automatically creates an ECR repository with lifecycle rules.
172
+ - **Custom Resources**: Manages lifecycle events for builds using custom Lambda handlers.
185
173
 
186
174
  ---
187
175
 
188
176
  ## Troubleshooting
189
177
 
190
- 1. **Build Errors**: Check the AWS CodeBuild logs in CloudWatch.
191
- 2. **Lambda Function Errors**: Check the `onEvent` and `isComplete` Lambda logs in CloudWatch.
192
- 3. **Permissions**: Ensure the IAM role for CodeBuild has the required permissions to interact with ECR and CloudWatch.
178
+ 1. **Build Errors**: Check CodeBuild logs in CloudWatch.
179
+ 2. **Lambda Errors**: Check `onEvent` and `isComplete` Lambda logs in CloudWatch.
180
+ 3. **Permissions**: Ensure IAM roles have the required permissions for CodeBuild, ECR, and Secrets Manager.
193
181
 
194
182
  ---
195
183
 
196
184
  ## Support
197
185
 
198
- Open an issue on [GitHub](https://github.com/AlexTech314/TokenInjectableDockerBuilder) :)
186
+ Open an issue on [GitHub](https://github.com/AlexTech314/TokenInjectableDockerBuilder).
199
187
 
200
188
  ---
201
189
 
package/lib/index.d.ts CHANGED
@@ -21,31 +21,27 @@ export interface TokenInjectableDockerBuilderProps {
21
21
  readonly buildArgs?: {
22
22
  [key: string]: string;
23
23
  };
24
+ /**
25
+ * The ARN of the AWS Secrets Manager secret containing Docker login credentials.
26
+ * This secret should store a JSON object with the following structure:
27
+ * ```json
28
+ * {
29
+ * "username": "my-docker-username",
30
+ * "password": "my-docker-password"
31
+ * }
32
+ * ```
33
+ * If not provided, the construct will skip Docker login during the build process.
34
+ *
35
+ * @example 'arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret'
36
+ */
37
+ readonly dockerLoginSecretArn?: string;
24
38
  }
25
39
  /**
26
40
  * A CDK construct to build and push Docker images to an ECR repository using CodeBuild and Lambda custom resources.
27
- *
28
- * @example
29
- * const dockerBuilder = new TokenInjectableDockerBuilder(this, 'DockerBuilder', {
30
- * path: './docker',
31
- * buildArgs: {
32
- * TOKEN: 'my-secret-token',
33
- * ENV: 'production'
34
- * },
35
- * });
36
- *
37
- * const containerImage = dockerBuilder.getContainerImage();
38
41
  */
39
42
  export declare class TokenInjectableDockerBuilder extends Construct {
43
+ private readonly ecrRepository;
40
44
  readonly containerImage: ContainerImage;
41
45
  readonly dockerImageCode: DockerImageCode;
42
- private readonly ecrRepository;
43
- /**
44
- * Creates a new `TokenInjectableDockerBuilder` instance.
45
- *
46
- * @param scope The parent construct/stack.
47
- * @param id The unique ID of the construct.
48
- * @param props Configuration properties for the construct.
49
- */
50
46
  constructor(scope: Construct, id: string, props: TokenInjectableDockerBuilderProps);
51
47
  }
package/lib/index.js CHANGED
@@ -10,40 +10,39 @@ const aws_codebuild_1 = require("aws-cdk-lib/aws-codebuild");
10
10
  const aws_ecr_1 = require("aws-cdk-lib/aws-ecr");
11
11
  const aws_ecs_1 = require("aws-cdk-lib/aws-ecs");
12
12
  const aws_iam_1 = require("aws-cdk-lib/aws-iam");
13
+ const aws_kms_1 = require("aws-cdk-lib/aws-kms");
13
14
  const aws_lambda_1 = require("aws-cdk-lib/aws-lambda");
14
15
  const aws_s3_assets_1 = require("aws-cdk-lib/aws-s3-assets");
15
16
  const custom_resources_1 = require("aws-cdk-lib/custom-resources");
16
17
  const constructs_1 = require("constructs");
17
18
  /**
18
19
  * A CDK construct to build and push Docker images to an ECR repository using CodeBuild and Lambda custom resources.
19
- *
20
- * @example
21
- * const dockerBuilder = new TokenInjectableDockerBuilder(this, 'DockerBuilder', {
22
- * path: './docker',
23
- * buildArgs: {
24
- * TOKEN: 'my-secret-token',
25
- * ENV: 'production'
26
- * },
27
- * });
28
- *
29
- * const containerImage = dockerBuilder.getContainerImage();
30
20
  */
31
21
  class TokenInjectableDockerBuilder extends constructs_1.Construct {
32
- /**
33
- * Creates a new `TokenInjectableDockerBuilder` instance.
34
- *
35
- * @param scope The parent construct/stack.
36
- * @param id The unique ID of the construct.
37
- * @param props Configuration properties for the construct.
38
- */
39
22
  constructor(scope, id, props) {
40
23
  super(scope, id);
41
- const { path: sourcePath, buildArgs } = props; // Default to linux/amd64
42
- // Create an ECR repository
43
- this.ecrRepository = new aws_ecr_1.Repository(this, 'ECRRepository');
24
+ const { path: sourcePath, buildArgs, dockerLoginSecretArn } = props;
25
+ // Define a KMS key for ECR encryption
26
+ const encryptionKey = new aws_kms_1.Key(this, 'EcrEncryptionKey', {
27
+ enableKeyRotation: true,
28
+ });
29
+ // Create an ECR repository with lifecycle rules, encryption, and image scanning enabled
30
+ this.ecrRepository = new aws_ecr_1.Repository(this, 'ECRRepository', {
31
+ lifecycleRules: [
32
+ {
33
+ rulePriority: 1,
34
+ description: 'Remove untagged images after 30 days',
35
+ tagStatus: aws_ecr_1.TagStatus.UNTAGGED,
36
+ maxImageAge: aws_cdk_lib_1.Duration.days(1),
37
+ },
38
+ ],
39
+ encryption: aws_ecr_1.RepositoryEncryption.KMS,
40
+ encryptionKey: encryptionKey,
41
+ imageScanOnPush: true,
42
+ });
44
43
  // Package the source code as an asset
45
44
  const sourceAsset = new aws_s3_assets_1.Asset(this, 'SourceAsset', {
46
- path: sourcePath, // Path to the Dockerfile or source code
45
+ path: sourcePath,
47
46
  });
48
47
  // Transform buildArgs into a string of --build-arg KEY=VALUE
49
48
  const buildArgsString = buildArgs
@@ -51,11 +50,16 @@ class TokenInjectableDockerBuilder extends constructs_1.Construct {
51
50
  .map(([key, value]) => `--build-arg ${key}=${value}`)
52
51
  .join(' ')
53
52
  : '';
54
- // Pass the buildArgsString and platform as environment variables
55
- const environmentVariables = {
56
- ECR_REPO_URI: { value: this.ecrRepository.repositoryUri },
57
- BUILD_ARGS: { value: buildArgsString },
58
- };
53
+ // Conditional Dockerhub login commands
54
+ const dockerLoginCommands = dockerLoginSecretArn
55
+ ? [
56
+ 'echo "Retrieving Docker credentials from Secrets Manager..."',
57
+ `DOCKER_USERNAME=$(aws secretsmanager get-secret-value --secret-id ${dockerLoginSecretArn} --query SecretString --output text | jq -r .username)`,
58
+ `DOCKER_PASSWORD=$(aws secretsmanager get-secret-value --secret-id ${dockerLoginSecretArn} --query SecretString --output text | jq -r .password)`,
59
+ 'echo "Logging in to Docker..."',
60
+ 'echo $DOCKER_PASSWORD | docker login --username $DOCKER_USERNAME --password-stdin',
61
+ ]
62
+ : ['echo "No Docker credentials provided. Skipping login step."'];
59
63
  // Create a CodeBuild project
60
64
  const codeBuildProject = new aws_codebuild_1.Project(this, 'UICodeBuildProject', {
61
65
  source: aws_codebuild_1.Source.s3({
@@ -64,14 +68,18 @@ class TokenInjectableDockerBuilder extends constructs_1.Construct {
64
68
  }),
65
69
  environment: {
66
70
  buildImage: aws_codebuild_1.LinuxBuildImage.STANDARD_7_0,
67
- privileged: true, // Required for Docker builds
71
+ privileged: true,
72
+ },
73
+ environmentVariables: {
74
+ ECR_REPO_URI: { value: this.ecrRepository.repositoryUri },
75
+ BUILD_ARGS: { value: buildArgsString },
68
76
  },
69
- environmentVariables: environmentVariables,
70
77
  buildSpec: aws_codebuild_1.BuildSpec.fromObject({
71
78
  version: '0.2',
72
79
  phases: {
73
80
  pre_build: {
74
81
  commands: [
82
+ ...dockerLoginCommands,
75
83
  'echo "Retrieving AWS Account ID..."',
76
84
  'export ACCOUNT_ID=$(aws sts get-caller-identity --query Account --output text)',
77
85
  'echo "Logging in to Amazon ECR..."',
@@ -93,33 +101,35 @@ class TokenInjectableDockerBuilder extends constructs_1.Construct {
93
101
  },
94
102
  }),
95
103
  });
96
- // Grant permissions to interact with ECR
104
+ // Grant permissions to CodeBuild
97
105
  this.ecrRepository.grantPullPush(codeBuildProject);
98
106
  codeBuildProject.role.addToPrincipalPolicy(new aws_iam_1.PolicyStatement({
99
- actions: ['ecr:GetAuthorizationToken'],
100
- resources: ['*'],
101
- }));
102
- // Grant permissions to CodeBuild for CloudWatch Logs
103
- codeBuildProject.role.addToPrincipalPolicy(new aws_iam_1.PolicyStatement({
104
- actions: ['logs:PutLogEvents', 'logs:CreateLogGroup', 'logs:CreateLogStream'],
105
- resources: [`arn:aws:logs:${aws_cdk_lib_1.Stack.of(this).region}:${aws_cdk_lib_1.Stack.of(this).account}:*`],
107
+ actions: ['ecr:GetAuthorizationToken', 'ecr:GetDownloadUrlForLayer', 'ecr:BatchCheckLayerAvailability'],
108
+ resources: [this.ecrRepository.repositoryArn],
106
109
  }));
107
- // Create Node.js Lambda function for onEvent
110
+ if (dockerLoginSecretArn) {
111
+ codeBuildProject.role.addToPrincipalPolicy(new aws_iam_1.PolicyStatement({
112
+ actions: ['secretsmanager:GetSecretValue'],
113
+ resources: [dockerLoginSecretArn],
114
+ }));
115
+ }
116
+ // Grant CodeBuild access to the KMS key
117
+ encryptionKey.grantEncryptDecrypt(codeBuildProject.role);
118
+ // Create Lambda functions for onEvent and isComplete handlers
108
119
  const onEventHandlerFunction = new aws_lambda_1.Function(this, 'OnEventHandlerFunction', {
109
- runtime: aws_lambda_1.Runtime.NODEJS_LATEST, // Use Node.js runtime
110
- code: aws_lambda_1.Code.fromAsset(path.resolve(__dirname, '../onEvent')), // Path to handler code
111
- handler: 'onEvent.handler', // Entry point (adjust as needed)
120
+ runtime: aws_lambda_1.Runtime.NODEJS_18_X,
121
+ code: aws_lambda_1.Code.fromAsset(path.resolve(__dirname, '../onEvent')),
122
+ handler: 'onEvent.handler',
112
123
  timeout: aws_cdk_lib_1.Duration.minutes(15),
113
124
  });
114
125
  onEventHandlerFunction.addToRolePolicy(new aws_iam_1.PolicyStatement({
115
126
  actions: ['codebuild:StartBuild'],
116
127
  resources: [codeBuildProject.projectArn], // Restrict to specific project
117
128
  }));
118
- // Create Node.js Lambda function for isComplete
119
129
  const isCompleteHandlerFunction = new aws_lambda_1.Function(this, 'IsCompleteHandlerFunction', {
120
- runtime: aws_lambda_1.Runtime.NODEJS_LATEST,
121
- code: aws_lambda_1.Code.fromAsset(path.resolve(__dirname, '../isComplete')), // Path to handler code
122
- handler: 'isComplete.handler', // Entry point (adjust as needed)
130
+ runtime: aws_lambda_1.Runtime.NODEJS_18_X,
131
+ code: aws_lambda_1.Code.fromAsset(path.resolve(__dirname, '../isComplete')),
132
+ handler: 'isComplete.handler',
123
133
  timeout: aws_cdk_lib_1.Duration.minutes(15),
124
134
  });
125
135
  isCompleteHandlerFunction.addToRolePolicy(new aws_iam_1.PolicyStatement({
@@ -132,6 +142,11 @@ class TokenInjectableDockerBuilder extends constructs_1.Construct {
132
142
  ],
133
143
  resources: ['*'],
134
144
  }));
145
+ // Grant Lambda functions access to KMS key and ECR
146
+ encryptionKey.grantEncryptDecrypt(onEventHandlerFunction);
147
+ encryptionKey.grantEncryptDecrypt(isCompleteHandlerFunction);
148
+ this.ecrRepository.grantPullPush(onEventHandlerFunction);
149
+ this.ecrRepository.grantPullPush(isCompleteHandlerFunction);
135
150
  // Create a custom resource provider
136
151
  const provider = new custom_resources_1.Provider(this, 'CustomResourceProvider', {
137
152
  onEventHandler: onEventHandlerFunction,
@@ -153,5 +168,5 @@ class TokenInjectableDockerBuilder extends constructs_1.Construct {
153
168
  }
154
169
  exports.TokenInjectableDockerBuilder = TokenInjectableDockerBuilder;
155
170
  _a = JSII_RTTI_SYMBOL_1;
156
- TokenInjectableDockerBuilder[_a] = { fqn: "token-injectable-docker-builder.TokenInjectableDockerBuilder", version: "1.0.11" };
157
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;AAAA,iCAAiC;AACjC,6BAA6B;AAC7B,6CAA8D;AAC9D,6DAAwF;AACxF,iDAAiD;AACjD,iDAAqD;AACrD,iDAAsD;AACtD,uDAAkF;AAClF,6DAAkD;AAClD,mEAAwD;AACxD,2CAAuC;AAwBvC;;;;;;;;;;;;;GAaG;AACH,MAAa,4BAA6B,SAAQ,sBAAS;IAKzD;;;;;;OAMG;IACH,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAwC;QAChF,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAEjB,MAAM,EAAE,IAAI,EAAE,UAAU,EAAE,SAAS,EAAE,GAAG,KAAK,CAAC,CAAC,yBAAyB;QAExE,2BAA2B;QAC3B,IAAI,CAAC,aAAa,GAAG,IAAI,oBAAU,CAAC,IAAI,EAAE,eAAe,CAAC,CAAC;QAE3D,sCAAsC;QACtC,MAAM,WAAW,GAAG,IAAI,qBAAK,CAAC,IAAI,EAAE,aAAa,EAAE;YACjD,IAAI,EAAE,UAAU,EAAE,wCAAwC;SAC3D,CAAC,CAAC;QAEH,6DAA6D;QAC7D,MAAM,eAAe,GAAG,SAAS;YAC/B,CAAC,CAAC,MAAM,CAAC,OAAO,CAAC,SAAS,CAAC;iBACxB,GAAG,CAAC,CAAC,CAAC,GAAG,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,eAAe,GAAG,IAAI,KAAK,EAAE,CAAC;iBACpD,IAAI,CAAC,GAAG,CAAC;YACZ,CAAC,CAAC,EAAE,CAAC;QAEP,iEAAiE;QACjE,MAAM,oBAAoB,GAA0C;YAClE,YAAY,EAAE,EAAE,KAAK,EAAE,IAAI,CAAC,aAAa,CAAC,aAAa,EAAE;YACzD,UAAU,EAAE,EAAE,KAAK,EAAE,eAAe,EAAE;SACvC,CAAC;QAEF,6BAA6B;QAC7B,MAAM,gBAAgB,GAAG,IAAI,uBAAO,CAAC,IAAI,EAAE,oBAAoB,EAAE;YAC/D,MAAM,EAAE,sBAAM,CAAC,EAAE,CAAC;gBAChB,MAAM,EAAE,WAAW,CAAC,MAAM;gBAC1B,IAAI,EAAE,WAAW,CAAC,WAAW;aAC9B,CAAC;YACF,WAAW,EAAE;gBACX,UAAU,EAAE,+BAAe,CAAC,YAAY;gBACxC,UAAU,EAAE,IAAI,EAAE,6BAA6B;aAChD;YACD,oBAAoB,EAAE,oBAAoB;YAC1C,SAAS,EAAE,yBAAS,CAAC,UAAU,CAAC;gBAC9B,OAAO,EAAE,KAAK;gBACd,MAAM,EAAE;oBACN,SAAS,EAAE;wBACT,QAAQ,EAAE;4BACR,qCAAqC;4BACrC,gFAAgF;4BAChF,oCAAoC;4BACpC,8JAA8J;yBAC/J;qBACF;oBACD,KAAK,EAAE;wBACL,QAAQ,EAAE;4BACR,gDAAgD;4BAChD,qEAAqE;yBACtE;qBACF;oBACD,UAAU,EAAE;wBACV,QAAQ,EAAE;4BACR,oDAAoD;4BACpD,kCAAkC;yBACnC;qBACF;iBACF;aACF,CAAC;SACH,CAAC,CAAC;QAEH,yCAAyC;QACzC,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC,gBAAgB,CAAC,CAAC;QAEnD,gBAAgB,CAAC,IAAK,CAAC,oBAAoB,CACzC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE,CAAC,2BAA2B,CAAC;YACtC,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CACH,CAAC;QAEF,qDAAqD;QACrD,gBAAgB,CAAC,IAAK,CAAC,oBAAoB,CACzC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE,CAAC,mBAAmB,EAAE,qBAAqB,EAAE,sBAAsB,CAAC;YAC7E,SAAS,EAAE,CAAC,gBAAgB,mBAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,MAAM,IAAI,mBAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,OAAO,IAAI,CAAC;SACjF,CAAC,CACH,CAAC;QAEF,6CAA6C;QAC7C,MAAM,sBAAsB,GAAG,IAAI,qBAAQ,CAAC,IAAI,EAAE,wBAAwB,EAAE;YAC1E,OAAO,EAAE,oBAAO,CAAC,aAAa,EAAE,sBAAsB;YACtD,IAAI,EAAE,iBAAI,CAAC,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,SAAS,EAAE,YAAY,CAAC,CAAC,EAAE,uBAAuB;YACpF,OAAO,EAAE,iBAAiB,EAAE,iCAAiC;YAC7D,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SAC9B,CAAC,CAAC;QAEH,sBAAsB,CAAC,eAAe,CACpC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE,CAAC,sBAAsB,CAAC;YACjC,SAAS,EAAE,CAAC,gBAAgB,CAAC,UAAU,CAAC,EAAE,+BAA+B;SAC1E,CAAC,CACH,CAAC;QAEF,gDAAgD;QAChD,MAAM,yBAAyB,GAAG,IAAI,qBAAQ,CAAC,IAAI,EAAE,2BAA2B,EAAE;YAChF,OAAO,EAAE,oBAAO,CAAC,aAAa;YAC9B,IAAI,EAAE,iBAAI,CAAC,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,SAAS,EAAE,eAAe,CAAC,CAAC,EAAE,uBAAuB;YACvF,OAAO,EAAE,oBAAoB,EAAE,iCAAiC;YAChE,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SAC9B,CAAC,CAAC;QAEH,yBAAyB,CAAC,eAAe,CACvC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE;gBACP,0BAA0B;gBAC1B,gCAAgC;gBAChC,mBAAmB;gBACnB,yBAAyB;gBACzB,wBAAwB;aACzB;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CACH,CAAC;QAEF,oCAAoC;QACpC,MAAM,QAAQ,GAAG,IAAI,2BAAQ,CAAC,IAAI,EAAE,wBAAwB,EAAE;YAC5D,cAAc,EAAE,sBAAsB;YACtC,iBAAiB,EAAE,yBAAyB;YAC5C,aAAa,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SACpC,CAAC,CAAC;QAEH,6BAA6B;QAC7B,MAAM,oBAAoB,GAAG,IAAI,4BAAc,CAAC,IAAI,EAAE,sBAAsB,EAAE;YAC5E,YAAY,EAAE,QAAQ,CAAC,YAAY;YACnC,UAAU,EAAE;gBACV,WAAW,EAAE,gBAAgB,CAAC,WAAW;gBACzC,OAAO,EAAE,MAAM,CAAC,UAAU,EAAE;aAC7B;SACF,CAAC,CAAC;QAEH,oBAAoB,CAAC,IAAI,CAAC,aAAa,CAAC,gBAAgB,CAAC,CAAC;QAC1D,IAAI,CAAC,cAAc,GAAG,wBAAc,CAAC,iBAAiB,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;QAC3E,IAAI,CAAC,eAAe,GAAG,4BAAe,CAAC,OAAO,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;IACrE,CAAC;;AArJH,oEAsJC","sourcesContent":["import * as crypto from 'crypto';\nimport * as path from 'path';\nimport { CustomResource, Stack, Duration } from 'aws-cdk-lib';\nimport { Project, Source, LinuxBuildImage, BuildSpec } from 'aws-cdk-lib/aws-codebuild';\nimport { Repository } from 'aws-cdk-lib/aws-ecr';\nimport { ContainerImage } from 'aws-cdk-lib/aws-ecs';\nimport { PolicyStatement } from 'aws-cdk-lib/aws-iam';\nimport { Runtime, Code, DockerImageCode, Function } from 'aws-cdk-lib/aws-lambda';\nimport { Asset } from 'aws-cdk-lib/aws-s3-assets';\nimport { Provider } from 'aws-cdk-lib/custom-resources';\nimport { Construct } from 'constructs';\n\n/**\n * Properties for the `TokenInjectableDockerBuilder` construct.\n */\nexport interface TokenInjectableDockerBuilderProps {\n  /**\n   * The path to the directory containing the Dockerfile or source code.\n   */\n  readonly path: string;\n\n  /**\n   * Build arguments to pass to the Docker build process.\n   * These are transformed into `--build-arg` flags.\n   * @example\n   * {\n   *   TOKEN: 'my-secret-token',\n   *   ENV: 'production'\n   * }\n   */\n  readonly buildArgs?: { [key: string]: string };\n}\n\n\n/**\n * A CDK construct to build and push Docker images to an ECR repository using CodeBuild and Lambda custom resources.\n *\n * @example\n * const dockerBuilder = new TokenInjectableDockerBuilder(this, 'DockerBuilder', {\n *   path: './docker',\n *   buildArgs: {\n *     TOKEN: 'my-secret-token',\n *     ENV: 'production'\n *   },\n * });\n *\n * const containerImage = dockerBuilder.getContainerImage();\n */\nexport class TokenInjectableDockerBuilder extends Construct {\n  public readonly containerImage: ContainerImage;\n  public readonly dockerImageCode: DockerImageCode;\n  private readonly ecrRepository: Repository;\n\n  /**\n   * Creates a new `TokenInjectableDockerBuilder` instance.\n   *\n   * @param scope The parent construct/stack.\n   * @param id The unique ID of the construct.\n   * @param props Configuration properties for the construct.\n   */\n  constructor(scope: Construct, id: string, props: TokenInjectableDockerBuilderProps) {\n    super(scope, id);\n\n    const { path: sourcePath, buildArgs } = props; // Default to linux/amd64\n\n    // Create an ECR repository\n    this.ecrRepository = new Repository(this, 'ECRRepository');\n\n    // Package the source code as an asset\n    const sourceAsset = new Asset(this, 'SourceAsset', {\n      path: sourcePath, // Path to the Dockerfile or source code\n    });\n\n    // Transform buildArgs into a string of --build-arg KEY=VALUE\n    const buildArgsString = buildArgs\n      ? Object.entries(buildArgs)\n        .map(([key, value]) => `--build-arg ${key}=${value}`)\n        .join(' ')\n      : '';\n\n    // Pass the buildArgsString and platform as environment variables\n    const environmentVariables: { [name: string]: { value: string } } = {\n      ECR_REPO_URI: { value: this.ecrRepository.repositoryUri },\n      BUILD_ARGS: { value: buildArgsString },\n    };\n\n    // Create a CodeBuild project\n    const codeBuildProject = new Project(this, 'UICodeBuildProject', {\n      source: Source.s3({\n        bucket: sourceAsset.bucket,\n        path: sourceAsset.s3ObjectKey,\n      }),\n      environment: {\n        buildImage: LinuxBuildImage.STANDARD_7_0,\n        privileged: true, // Required for Docker builds\n      },\n      environmentVariables: environmentVariables,\n      buildSpec: BuildSpec.fromObject({\n        version: '0.2',\n        phases: {\n          pre_build: {\n            commands: [\n              'echo \"Retrieving AWS Account ID...\"',\n              'export ACCOUNT_ID=$(aws sts get-caller-identity --query Account --output text)',\n              'echo \"Logging in to Amazon ECR...\"',\n              'aws ecr get-login-password --region $AWS_DEFAULT_REGION | docker login --username AWS --password-stdin $ACCOUNT_ID.dkr.ecr.$AWS_DEFAULT_REGION.amazonaws.com',\n            ],\n          },\n          build: {\n            commands: [\n              'echo Build phase: Building the Docker image...',\n              'docker build $BUILD_ARGS -t $ECR_REPO_URI:latest $CODEBUILD_SRC_DIR',\n            ],\n          },\n          post_build: {\n            commands: [\n              'echo Post-build phase: Pushing the Docker image...',\n              'docker push $ECR_REPO_URI:latest',\n            ],\n          },\n        },\n      }),\n    });\n\n    // Grant permissions to interact with ECR\n    this.ecrRepository.grantPullPush(codeBuildProject);\n\n    codeBuildProject.role!.addToPrincipalPolicy(\n      new PolicyStatement({\n        actions: ['ecr:GetAuthorizationToken'],\n        resources: ['*'],\n      }),\n    );\n\n    // Grant permissions to CodeBuild for CloudWatch Logs\n    codeBuildProject.role!.addToPrincipalPolicy(\n      new PolicyStatement({\n        actions: ['logs:PutLogEvents', 'logs:CreateLogGroup', 'logs:CreateLogStream'],\n        resources: [`arn:aws:logs:${Stack.of(this).region}:${Stack.of(this).account}:*`],\n      }),\n    );\n\n    // Create Node.js Lambda function for onEvent\n    const onEventHandlerFunction = new Function(this, 'OnEventHandlerFunction', {\n      runtime: Runtime.NODEJS_LATEST, // Use Node.js runtime\n      code: Code.fromAsset(path.resolve(__dirname, '../onEvent')), // Path to handler code\n      handler: 'onEvent.handler', // Entry point (adjust as needed)\n      timeout: Duration.minutes(15),\n    });\n\n    onEventHandlerFunction.addToRolePolicy(\n      new PolicyStatement({\n        actions: ['codebuild:StartBuild'],\n        resources: [codeBuildProject.projectArn], // Restrict to specific project\n      }),\n    );\n\n    // Create Node.js Lambda function for isComplete\n    const isCompleteHandlerFunction = new Function(this, 'IsCompleteHandlerFunction', {\n      runtime: Runtime.NODEJS_LATEST,\n      code: Code.fromAsset(path.resolve(__dirname, '../isComplete')), // Path to handler code\n      handler: 'isComplete.handler', // Entry point (adjust as needed)\n      timeout: Duration.minutes(15),\n    });\n\n    isCompleteHandlerFunction.addToRolePolicy(\n      new PolicyStatement({\n        actions: [\n          'codebuild:BatchGetBuilds',\n          'codebuild:ListBuildsForProject',\n          'logs:GetLogEvents',\n          'logs:DescribeLogStreams',\n          'logs:DescribeLogGroups',\n        ],\n        resources: ['*'],\n      }),\n    );\n\n    // Create a custom resource provider\n    const provider = new Provider(this, 'CustomResourceProvider', {\n      onEventHandler: onEventHandlerFunction,\n      isCompleteHandler: isCompleteHandlerFunction,\n      queryInterval: Duration.seconds(30),\n    });\n\n    // Define the custom resource\n    const buildTriggerResource = new CustomResource(this, 'BuildTriggerResource', {\n      serviceToken: provider.serviceToken,\n      properties: {\n        ProjectName: codeBuildProject.projectName,\n        Trigger: crypto.randomUUID(),\n      },\n    });\n\n    buildTriggerResource.node.addDependency(codeBuildProject);\n    this.containerImage = ContainerImage.fromEcrRepository(this.ecrRepository);\n    this.dockerImageCode = DockerImageCode.fromEcr(this.ecrRepository);\n  }\n}\n"]}
171
+ TokenInjectableDockerBuilder[_a] = { fqn: "token-injectable-docker-builder.TokenInjectableDockerBuilder", version: "1.1.1" };
172
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;AAAA,iCAAiC;AACjC,6BAA6B;AAC7B,6CAAuD;AACvD,6DAAwF;AACxF,iDAAkF;AAClF,iDAAqD;AACrD,iDAAsD;AACtD,iDAA0C;AAC1C,uDAAkF;AAClF,6DAAkD;AAClD,mEAAwD;AACxD,2CAAuC;AAsCvC;;GAEG;AACH,MAAa,4BAA6B,SAAQ,sBAAS;IAKzD,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAwC;QAChF,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAEjB,MAAM,EAAE,IAAI,EAAE,UAAU,EAAE,SAAS,EAAE,oBAAoB,EAAE,GAAG,KAAK,CAAC;QAEpE,sCAAsC;QACtC,MAAM,aAAa,GAAG,IAAI,aAAG,CAAC,IAAI,EAAE,kBAAkB,EAAE;YACtD,iBAAiB,EAAE,IAAI;SACxB,CAAC,CAAC;QAEH,wFAAwF;QACxF,IAAI,CAAC,aAAa,GAAG,IAAI,oBAAU,CAAC,IAAI,EAAE,eAAe,EAAE;YACzD,cAAc,EAAE;gBACd;oBACE,YAAY,EAAE,CAAC;oBACf,WAAW,EAAE,sCAAsC;oBACnD,SAAS,EAAE,mBAAS,CAAC,QAAQ;oBAC7B,WAAW,EAAE,sBAAQ,CAAC,IAAI,CAAC,CAAC,CAAC;iBAC9B;aACF;YACD,UAAU,EAAE,8BAAoB,CAAC,GAAG;YACpC,aAAa,EAAE,aAAa;YAC5B,eAAe,EAAE,IAAI;SACtB,CAAC,CAAC;QAEH,sCAAsC;QACtC,MAAM,WAAW,GAAG,IAAI,qBAAK,CAAC,IAAI,EAAE,aAAa,EAAE;YACjD,IAAI,EAAE,UAAU;SACjB,CAAC,CAAC;QAEH,6DAA6D;QAC7D,MAAM,eAAe,GAAG,SAAS;YAC/B,CAAC,CAAC,MAAM,CAAC,OAAO,CAAC,SAAS,CAAC;iBACxB,GAAG,CAAC,CAAC,CAAC,GAAG,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,eAAe,GAAG,IAAI,KAAK,EAAE,CAAC;iBACpD,IAAI,CAAC,GAAG,CAAC;YACZ,CAAC,CAAC,EAAE,CAAC;QAEP,uCAAuC;QACvC,MAAM,mBAAmB,GAAG,oBAAoB;YAC9C,CAAC,CAAC;gBACA,8DAA8D;gBAC9D,qEAAqE,oBAAoB,wDAAwD;gBACjJ,qEAAqE,oBAAoB,wDAAwD;gBACjJ,gCAAgC;gBAChC,mFAAmF;aACpF;YACD,CAAC,CAAC,CAAC,6DAA6D,CAAC,CAAC;QAEpE,6BAA6B;QAC7B,MAAM,gBAAgB,GAAG,IAAI,uBAAO,CAAC,IAAI,EAAE,oBAAoB,EAAE;YAC/D,MAAM,EAAE,sBAAM,CAAC,EAAE,CAAC;gBAChB,MAAM,EAAE,WAAW,CAAC,MAAM;gBAC1B,IAAI,EAAE,WAAW,CAAC,WAAW;aAC9B,CAAC;YACF,WAAW,EAAE;gBACX,UAAU,EAAE,+BAAe,CAAC,YAAY;gBACxC,UAAU,EAAE,IAAI;aACjB;YACD,oBAAoB,EAAE;gBACpB,YAAY,EAAE,EAAE,KAAK,EAAE,IAAI,CAAC,aAAa,CAAC,aAAa,EAAE;gBACzD,UAAU,EAAE,EAAE,KAAK,EAAE,eAAe,EAAE;aACvC;YACD,SAAS,EAAE,yBAAS,CAAC,UAAU,CAAC;gBAC9B,OAAO,EAAE,KAAK;gBACd,MAAM,EAAE;oBACN,SAAS,EAAE;wBACT,QAAQ,EAAE;4BACR,GAAG,mBAAmB;4BACtB,qCAAqC;4BACrC,gFAAgF;4BAChF,oCAAoC;4BACpC,8JAA8J;yBAC/J;qBACF;oBACD,KAAK,EAAE;wBACL,QAAQ,EAAE;4BACR,gDAAgD;4BAChD,qEAAqE;yBACtE;qBACF;oBACD,UAAU,EAAE;wBACV,QAAQ,EAAE;4BACR,oDAAoD;4BACpD,kCAAkC;yBACnC;qBACF;iBACF;aACF,CAAC;SACH,CAAC,CAAC;QAEH,iCAAiC;QACjC,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC,gBAAgB,CAAC,CAAC;QAEnD,gBAAgB,CAAC,IAAK,CAAC,oBAAoB,CACzC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE,CAAC,2BAA2B,EAAE,4BAA4B,EAAE,iCAAiC,CAAC;YACvG,SAAS,EAAE,CAAC,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC;SAC9C,CAAC,CACH,CAAC;QAEF,IAAI,oBAAoB,EAAE,CAAC;YACzB,gBAAgB,CAAC,IAAK,CAAC,oBAAoB,CACzC,IAAI,yBAAe,CAAC;gBAClB,OAAO,EAAE,CAAC,+BAA+B,CAAC;gBAC1C,SAAS,EAAE,CAAC,oBAAoB,CAAC;aAClC,CAAC,CACH,CAAC;QACJ,CAAC;QAED,wCAAwC;QACxC,aAAa,CAAC,mBAAmB,CAAC,gBAAgB,CAAC,IAAK,CAAC,CAAC;QAE1D,8DAA8D;QAC9D,MAAM,sBAAsB,GAAG,IAAI,qBAAQ,CAAC,IAAI,EAAE,wBAAwB,EAAE;YAC1E,OAAO,EAAE,oBAAO,CAAC,WAAW;YAC5B,IAAI,EAAE,iBAAI,CAAC,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,SAAS,EAAE,YAAY,CAAC,CAAC;YAC3D,OAAO,EAAE,iBAAiB;YAC1B,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SAC9B,CAAC,CAAC;QAEH,sBAAsB,CAAC,eAAe,CACpC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE,CAAC,sBAAsB,CAAC;YACjC,SAAS,EAAE,CAAC,gBAAgB,CAAC,UAAU,CAAC,EAAE,+BAA+B;SAC1E,CAAC,CACH,CAAC;QACF,MAAM,yBAAyB,GAAG,IAAI,qBAAQ,CAAC,IAAI,EAAE,2BAA2B,EAAE;YAChF,OAAO,EAAE,oBAAO,CAAC,WAAW;YAC5B,IAAI,EAAE,iBAAI,CAAC,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,SAAS,EAAE,eAAe,CAAC,CAAC;YAC9D,OAAO,EAAE,oBAAoB;YAC7B,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SAC9B,CAAC,CAAC;QAEH,yBAAyB,CAAC,eAAe,CACvC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE;gBACP,0BAA0B;gBAC1B,gCAAgC;gBAChC,mBAAmB;gBACnB,yBAAyB;gBACzB,wBAAwB;aACzB;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CACH,CAAC;QAEF,mDAAmD;QACnD,aAAa,CAAC,mBAAmB,CAAC,sBAAsB,CAAC,CAAC;QAC1D,aAAa,CAAC,mBAAmB,CAAC,yBAAyB,CAAC,CAAC;QAC7D,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC,sBAAsB,CAAC,CAAC;QACzD,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC,yBAAyB,CAAC,CAAC;QAE5D,oCAAoC;QACpC,MAAM,QAAQ,GAAG,IAAI,2BAAQ,CAAC,IAAI,EAAE,wBAAwB,EAAE;YAC5D,cAAc,EAAE,sBAAsB;YACtC,iBAAiB,EAAE,yBAAyB;YAC5C,aAAa,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SACpC,CAAC,CAAC;QAEH,6BAA6B;QAC7B,MAAM,oBAAoB,GAAG,IAAI,4BAAc,CAAC,IAAI,EAAE,sBAAsB,EAAE;YAC5E,YAAY,EAAE,QAAQ,CAAC,YAAY;YACnC,UAAU,EAAE;gBACV,WAAW,EAAE,gBAAgB,CAAC,WAAW;gBACzC,OAAO,EAAE,MAAM,CAAC,UAAU,EAAE;aAC7B;SACF,CAAC,CAAC;QAEH,oBAAoB,CAAC,IAAI,CAAC,aAAa,CAAC,gBAAgB,CAAC,CAAC;QAC1D,IAAI,CAAC,cAAc,GAAG,wBAAc,CAAC,iBAAiB,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;QAC3E,IAAI,CAAC,eAAe,GAAG,4BAAe,CAAC,OAAO,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;IACrE,CAAC;;AAhLH,oEAiLC","sourcesContent":["import * as crypto from 'crypto';\nimport * as path from 'path';\nimport { CustomResource, Duration } from 'aws-cdk-lib';\nimport { Project, Source, LinuxBuildImage, BuildSpec } from 'aws-cdk-lib/aws-codebuild';\nimport { Repository, RepositoryEncryption, TagStatus } from 'aws-cdk-lib/aws-ecr';\nimport { ContainerImage } from 'aws-cdk-lib/aws-ecs';\nimport { PolicyStatement } from 'aws-cdk-lib/aws-iam';\nimport { Key } from 'aws-cdk-lib/aws-kms';\nimport { Runtime, Code, DockerImageCode, Function } from 'aws-cdk-lib/aws-lambda';\nimport { Asset } from 'aws-cdk-lib/aws-s3-assets';\nimport { Provider } from 'aws-cdk-lib/custom-resources';\nimport { Construct } from 'constructs';\n\n/**\n * Properties for the `TokenInjectableDockerBuilder` construct.\n */\nexport interface TokenInjectableDockerBuilderProps {\n  /**\n   * The path to the directory containing the Dockerfile or source code.\n   */\n  readonly path: string;\n\n  /**\n   * Build arguments to pass to the Docker build process.\n   * These are transformed into `--build-arg` flags.\n   * @example\n   * {\n   *   TOKEN: 'my-secret-token',\n   *   ENV: 'production'\n   * }\n   */\n  readonly buildArgs?: { [key: string]: string };\n\n  /**\n   * The ARN of the AWS Secrets Manager secret containing Docker login credentials.\n   * This secret should store a JSON object with the following structure:\n   * ```json\n   * {\n   *   \"username\": \"my-docker-username\",\n   *   \"password\": \"my-docker-password\"\n   * }\n   * ```\n   * If not provided, the construct will skip Docker login during the build process.\n   *\n   * @example 'arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret'\n   */\n  readonly dockerLoginSecretArn?: string;\n}\n\n/**\n * A CDK construct to build and push Docker images to an ECR repository using CodeBuild and Lambda custom resources.\n */\nexport class TokenInjectableDockerBuilder extends Construct {\n  private readonly ecrRepository: Repository;\n  public readonly containerImage: ContainerImage;\n  public readonly dockerImageCode: DockerImageCode;\n\n  constructor(scope: Construct, id: string, props: TokenInjectableDockerBuilderProps) {\n    super(scope, id);\n\n    const { path: sourcePath, buildArgs, dockerLoginSecretArn } = props;\n\n    // Define a KMS key for ECR encryption\n    const encryptionKey = new Key(this, 'EcrEncryptionKey', {\n      enableKeyRotation: true,\n    });\n\n    // Create an ECR repository with lifecycle rules, encryption, and image scanning enabled\n    this.ecrRepository = new Repository(this, 'ECRRepository', {\n      lifecycleRules: [\n        {\n          rulePriority: 1,\n          description: 'Remove untagged images after 30 days',\n          tagStatus: TagStatus.UNTAGGED,\n          maxImageAge: Duration.days(1),\n        },\n      ],\n      encryption: RepositoryEncryption.KMS,\n      encryptionKey: encryptionKey,\n      imageScanOnPush: true,\n    });\n\n    // Package the source code as an asset\n    const sourceAsset = new Asset(this, 'SourceAsset', {\n      path: sourcePath,\n    });\n\n    // Transform buildArgs into a string of --build-arg KEY=VALUE\n    const buildArgsString = buildArgs\n      ? Object.entries(buildArgs)\n        .map(([key, value]) => `--build-arg ${key}=${value}`)\n        .join(' ')\n      : '';\n\n    // Conditional Dockerhub login commands\n    const dockerLoginCommands = dockerLoginSecretArn\n      ? [\n        'echo \"Retrieving Docker credentials from Secrets Manager...\"',\n        `DOCKER_USERNAME=$(aws secretsmanager get-secret-value --secret-id ${dockerLoginSecretArn} --query SecretString --output text | jq -r .username)`,\n        `DOCKER_PASSWORD=$(aws secretsmanager get-secret-value --secret-id ${dockerLoginSecretArn} --query SecretString --output text | jq -r .password)`,\n        'echo \"Logging in to Docker...\"',\n        'echo $DOCKER_PASSWORD | docker login --username $DOCKER_USERNAME --password-stdin',\n      ]\n      : ['echo \"No Docker credentials provided. Skipping login step.\"'];\n\n    // Create a CodeBuild project\n    const codeBuildProject = new Project(this, 'UICodeBuildProject', {\n      source: Source.s3({\n        bucket: sourceAsset.bucket,\n        path: sourceAsset.s3ObjectKey,\n      }),\n      environment: {\n        buildImage: LinuxBuildImage.STANDARD_7_0,\n        privileged: true,\n      },\n      environmentVariables: {\n        ECR_REPO_URI: { value: this.ecrRepository.repositoryUri },\n        BUILD_ARGS: { value: buildArgsString },\n      },\n      buildSpec: BuildSpec.fromObject({\n        version: '0.2',\n        phases: {\n          pre_build: {\n            commands: [\n              ...dockerLoginCommands,\n              'echo \"Retrieving AWS Account ID...\"',\n              'export ACCOUNT_ID=$(aws sts get-caller-identity --query Account --output text)',\n              'echo \"Logging in to Amazon ECR...\"',\n              'aws ecr get-login-password --region $AWS_DEFAULT_REGION | docker login --username AWS --password-stdin $ACCOUNT_ID.dkr.ecr.$AWS_DEFAULT_REGION.amazonaws.com',\n            ],\n          },\n          build: {\n            commands: [\n              'echo Build phase: Building the Docker image...',\n              'docker build $BUILD_ARGS -t $ECR_REPO_URI:latest $CODEBUILD_SRC_DIR',\n            ],\n          },\n          post_build: {\n            commands: [\n              'echo Post-build phase: Pushing the Docker image...',\n              'docker push $ECR_REPO_URI:latest',\n            ],\n          },\n        },\n      }),\n    });\n\n    // Grant permissions to CodeBuild\n    this.ecrRepository.grantPullPush(codeBuildProject);\n\n    codeBuildProject.role!.addToPrincipalPolicy(\n      new PolicyStatement({\n        actions: ['ecr:GetAuthorizationToken', 'ecr:GetDownloadUrlForLayer', 'ecr:BatchCheckLayerAvailability'],\n        resources: [this.ecrRepository.repositoryArn],\n      }),\n    );\n\n    if (dockerLoginSecretArn) {\n      codeBuildProject.role!.addToPrincipalPolicy(\n        new PolicyStatement({\n          actions: ['secretsmanager:GetSecretValue'],\n          resources: [dockerLoginSecretArn],\n        }),\n      );\n    }\n\n    // Grant CodeBuild access to the KMS key\n    encryptionKey.grantEncryptDecrypt(codeBuildProject.role!);\n\n    // Create Lambda functions for onEvent and isComplete handlers\n    const onEventHandlerFunction = new Function(this, 'OnEventHandlerFunction', {\n      runtime: Runtime.NODEJS_18_X,\n      code: Code.fromAsset(path.resolve(__dirname, '../onEvent')),\n      handler: 'onEvent.handler',\n      timeout: Duration.minutes(15),\n    });\n\n    onEventHandlerFunction.addToRolePolicy(\n      new PolicyStatement({\n        actions: ['codebuild:StartBuild'],\n        resources: [codeBuildProject.projectArn], // Restrict to specific project\n      }),\n    );\n    const isCompleteHandlerFunction = new Function(this, 'IsCompleteHandlerFunction', {\n      runtime: Runtime.NODEJS_18_X,\n      code: Code.fromAsset(path.resolve(__dirname, '../isComplete')),\n      handler: 'isComplete.handler',\n      timeout: Duration.minutes(15),\n    });\n\n    isCompleteHandlerFunction.addToRolePolicy(\n      new PolicyStatement({\n        actions: [\n          'codebuild:BatchGetBuilds',\n          'codebuild:ListBuildsForProject',\n          'logs:GetLogEvents',\n          'logs:DescribeLogStreams',\n          'logs:DescribeLogGroups',\n        ],\n        resources: ['*'],\n      }),\n    );\n\n    // Grant Lambda functions access to KMS key and ECR\n    encryptionKey.grantEncryptDecrypt(onEventHandlerFunction);\n    encryptionKey.grantEncryptDecrypt(isCompleteHandlerFunction);\n    this.ecrRepository.grantPullPush(onEventHandlerFunction);\n    this.ecrRepository.grantPullPush(isCompleteHandlerFunction);\n\n    // Create a custom resource provider\n    const provider = new Provider(this, 'CustomResourceProvider', {\n      onEventHandler: onEventHandlerFunction,\n      isCompleteHandler: isCompleteHandlerFunction,\n      queryInterval: Duration.seconds(30),\n    });\n\n    // Define the custom resource\n    const buildTriggerResource = new CustomResource(this, 'BuildTriggerResource', {\n      serviceToken: provider.serviceToken,\n      properties: {\n        ProjectName: codeBuildProject.projectName,\n        Trigger: crypto.randomUUID(),\n      },\n    });\n\n    buildTriggerResource.node.addDependency(codeBuildProject);\n    this.containerImage = ContainerImage.fromEcrRepository(this.ecrRepository);\n    this.dockerImageCode = DockerImageCode.fromEcr(this.ecrRepository);\n  }\n}\n"]}
package/package.json CHANGED
@@ -28,7 +28,9 @@
28
28
  "unbump": "npx projen unbump",
29
29
  "upgrade": "npx projen upgrade",
30
30
  "watch": "npx projen watch",
31
- "projen": "npx projen"
31
+ "projen": "npx projen",
32
+ "local-deploy": "cdk deploy --app \"npx ts-node src/integ.default.ts\"",
33
+ "local-destroy": "cdk destroy --app \"npx ts-node src/integ.default.ts\""
32
34
  },
33
35
  "author": {
34
36
  "name": "AlexTech314",
@@ -94,7 +96,7 @@
94
96
  "publishConfig": {
95
97
  "access": "public"
96
98
  },
97
- "version": "1.0.11",
99
+ "version": "1.1.1",
98
100
  "jest": {
99
101
  "coverageProvider": "v8",
100
102
  "testMatch": [