token-injectable-docker-builder 1.1.2 → 1.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +121 -11
- package/API.md +104 -0
- package/README.md +198 -37
- package/lib/index.d.ts +59 -0
- package/lib/index.js +23 -6
- package/package.json +1 -1
package/.jsii
CHANGED
|
@@ -3898,7 +3898,7 @@
|
|
|
3898
3898
|
},
|
|
3899
3899
|
"name": "token-injectable-docker-builder",
|
|
3900
3900
|
"readme": {
|
|
3901
|
-
"markdown": "# TokenInjectableDockerBuilder\n\nThe `TokenInjectableDockerBuilder` is a flexible AWS CDK construct that enables the usage of AWS CDK tokens in the building, pushing, and deployment of Docker images to Amazon Elastic Container Registry (ECR). It leverages AWS CodeBuild and Lambda custom resources.\n\n---\n\n## Why?\n\nAWS CDK already provides mechanisms for creating deployable assets using Docker, such as [DockerImageAsset](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_ecr_assets.DockerImageAsset.html) and [DockerImageCode](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_lambda.DockerImageCode.html), but these Constructs are limited because they cannot accept CDK tokens as build-args. The `TokenInjectableDockerBuilder` allows injecting CDK tokens as build-time arguments into Docker-based assets, enabling more dynamic dependency relationships.\n\nFor example, a Next.js frontend Docker image may require an API Gateway URL. With this construct, you can deploy the API Gateway first, then pass its URL as a build-time argument to the Next.js Docker image.\n\n---\n\n## Features\n\n- Automatically builds and pushes Docker images to ECR.\n- Supports custom build arguments for Docker builds, including CDK tokens resolved at deployment time.\n- Retrieves Docker images for use in ECS or Lambda.\n\n---\n\n## Installation\n\n### For NPM\n\nInstall the construct using NPM:\n\n```bash\nnpm install token-injectable-docker-builder\n```\n\n### For Python\n\nInstall the construct using pip:\n\n```bash\npip install token-injectable-docker-builder\n```\n\n---\n\n## Constructor\n\n### `TokenInjectableDockerBuilder`\n\n#### Parameters\n\n- **`scope`**: The construct's parent scope.\n- **`id`**: The construct ID.\n- **`props`**: Configuration properties.\n\n#### Properties in `TokenInjectableDockerBuilderProps`\n\n| Property | Type | Required | Description |\n|------------------------|--------------------|----------|-------------------------------------------------------------------------------------------------------|\n| `path` | `string` | Yes | The file path to the Dockerfile or source code directory. |\n| `buildArgs` | `{ [key: string]: string }` | No | Build arguments to pass to the Docker build process. |\n| `dockerLoginSecretArn` | `string` | No | ARN of an AWS Secrets Manager secret for Docker credentials. Skips login if not provided. |\n\n---\n\n## Usage Examples\n\n### TypeScript/NPM Example\n\nHere is how to use `TokenInjectableDockerBuilder` in an AWS CDK project with TypeScript:\n\n```typescript\nimport * as cdk from 'aws-cdk-lib';\nimport { TokenInjectableDockerBuilder } from 'token-injectable-docker-builder';\nimport * as ecs from 'aws-cdk-lib/aws-ecs';\nimport * as lambda from 'aws-cdk-lib/aws-lambda';\n\nexport class MyStack extends cdk.Stack {\n constructor(scope: cdk.App, id: string, props?: cdk.StackProps) {\n super(scope, id, props);\n\n const dockerBuilder = new TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {\n path: './docker',\n buildArgs: {\n TOKEN: 'my-secret-token',\n ENV: 'production',\n },\n dockerLoginSecretArn: 'arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret',\n });\n\n // Use in ECS\n new ecs.FargateTaskDefinition(this, 'TaskDefinition', {\n containerImage: dockerBuilder.containerImage,\n });\n\n // Use in Lambda\n new lambda.Function(this, 'DockerLambdaFunction', {\n runtime: lambda.Runtime.FROM_IMAGE,\n code: dockerBuilder.dockerImageCode,\n handler: lambda.Handler.FROM_IMAGE,\n });\n }\n}\n```\n\n---\n\n### Python Example\n\nHere is how to use `TokenInjectableDockerBuilder` in an AWS CDK project with Python:\n\n```python\nfrom aws_cdk import core as cdk\nfrom token_injectable_docker_builder import TokenInjectableDockerBuilder\nfrom aws_cdk import aws_ecs as ecs\nfrom aws_cdk import aws_lambda as lambda_\n\nclass MyStack(cdk.Stack):\n\n def __init__(self, scope: cdk.App, id: str, **kwargs):\n super().__init__(scope, id, **kwargs)\n\n docker_builder = TokenInjectableDockerBuilder(self, \"MyDockerBuilder\",\n path=\"./docker\",\n build_args={\n \"TOKEN\": \"my-secret-token\",\n \"ENV\": \"production\"\n },\n docker_login_secret_arn=\"arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret\"\n )\n\n # Use in ECS\n ecs.FargateTaskDefinition(self, \"TaskDefinition\",\n container_image=docker_builder.container_image\n )\n\n # Use in Lambda\n lambda_.Function(self, \"DockerLambdaFunction\",\n runtime=lambda_.Runtime.FROM_IMAGE,\n code=docker_builder.docker_image_code,\n handler=lambda_.Handler.FROM_IMAGE\n )\n```\n\n---\n\n## How It Works\n\n1. **Docker Source**: Packages the source code or Dockerfile specified in the `path` property as an S3 asset.\n2. **CodeBuild Project**:\n - Uses the packaged asset and `buildArgs` to build the Docker image.\n - Pushes the image to an ECR repository.\n3. **Custom Resource**:\n - Triggers the build process using a Lambda function (`onEvent`).\n - Monitors the build status using another Lambda function (`isComplete`).\n4. **Outputs**:\n - `.containerImage`: Returns the Docker image for ECS.\n - `.dockerImageCode`: Returns the Docker image code for Lambda.\n\n---\n\n## IAM Permissions\n\nThe construct automatically grants permissions for:\n- CodeBuild to pull and push images to ECR.\n- Lambda to monitor build status and retrieve logs.\n- Encryption via a custom KMS key.\n\n---\n\n## Notes\n\n- **Build Arguments**: Pass custom arguments via `buildArgs` as `--build-arg` flags.\n- **ECR Repository**: Automatically creates an ECR repository with lifecycle rules.\n- **Custom Resources**: Manages lifecycle events for builds using custom Lambda handlers.\n\n---\n\n## Troubleshooting\n\n1. **Build Errors**: Check CodeBuild logs in CloudWatch.\n2. **Lambda Errors**: Check `onEvent` and `isComplete` Lambda logs in CloudWatch.\n3. **Permissions**: Ensure IAM roles have the required permissions for CodeBuild, ECR, and Secrets Manager.\n\n---\n\n## Support\n\nOpen an issue on [GitHub](https://github.com/AlexTech314/TokenInjectableDockerBuilder).\n\n---\n\n## Reference Links\n[](https://constructs.dev/packages/token-injectable-docker-builder)\n"
|
|
3901
|
+
"markdown": "# TokenInjectableDockerBuilder\n\nThe `TokenInjectableDockerBuilder` is a flexible AWS CDK construct that enables the usage of AWS CDK tokens in the building, pushing, and deployment of Docker images to Amazon Elastic Container Registry (ECR). It leverages AWS CodeBuild and Lambda custom resources.\n\n---\n\n## Why?\n\nAWS CDK already provides mechanisms for creating deployable assets using Docker, such as [DockerImageAsset](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_ecr_assets.DockerImageAsset.html) and [DockerImageCode](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_lambda.DockerImageCode.html), but these constructs are limited because they cannot accept CDK tokens as build-args. The `TokenInjectableDockerBuilder` allows injecting CDK tokens as build-time arguments into Docker-based assets, enabling more dynamic dependency relationships.\n\nFor example, a Next.js frontend Docker image may require an API Gateway URL as an argument. With this construct, you can deploy the API Gateway first, then pass its URL as a build-time argument to the Next.js Docker image. As a result, your Next.js frontend can dynamically fetch data from the API Gateway without hardcoding the URL, or needing mutliple sepereate Stacks.\n\n---\n\n## Features\n\n- **Build and Push Docker Images**: Automatically builds and pushes Docker images to ECR.\n- **Token Support**: Supports custom build arguments for Docker builds, including CDK tokens resolved at deployment time.\n- **Custom Install and Pre-Build Commands**: Allows specifying custom commands to run during the `install` and `pre_build` phases of the CodeBuild build process.\n- **VPC Configuration**: Supports deploying the CodeBuild project within a VPC, with customizable security groups and subnet selection.\n- **Docker Login**: Supports Docker login using credentials stored in AWS Secrets Manager.\n- **ECR Repository Management**: Creates an ECR repository with lifecycle rules and encryption.\n- **Integration with ECS and Lambda**: Provides outputs for use in AWS ECS and AWS Lambda.\n\n---\n\n## Installation\n\n### For NPM\n\nInstall the construct using NPM:\n\n```bash\nnpm install token-injectable-docker-builder\n```\n\n### For Python\n\nInstall the construct using pip:\n\n```bash\npip install token-injectable-docker-builder\n```\n\n---\n\n## Constructor\n\n### `TokenInjectableDockerBuilder`\n\n#### Parameters\n\n- **`scope`**: The construct's parent scope.\n- **`id`**: The construct ID.\n- **`props`**: Configuration properties.\n\n#### Properties in `TokenInjectableDockerBuilderProps`\n\n| Property | Type | Required | Description |\n|--------------------------|-----------------------------|----------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------|\n| `path` | `string` | Yes | The file path to the Dockerfile or source code directory. |\n| `buildArgs` | `{ [key: string]: string }` | No | Build arguments to pass to the Docker build process. These are transformed into `--build-arg` flags. |\n| `dockerLoginSecretArn` | `string` | No | ARN of an AWS Secrets Manager secret for Docker credentials. Skips login if not provided. |\n| `vpc` | `IVpc` | No | The VPC in which the CodeBuild project will be deployed. If provided, the CodeBuild project will be launched within the specified VPC. |\n| `securityGroups` | `ISecurityGroup[]` | No | The security groups to attach to the CodeBuild project. These should define the network access rules for the CodeBuild project. |\n| `subnetSelection` | `SubnetSelection` | No | The subnet selection to specify which subnets to use within the VPC. Allows the user to select private, public, or isolated subnets. |\n| `installCommands` | `string[]` | No | Custom commands to run during the `install` phase of the CodeBuild build process. |\n| `preBuildCommands` | `string[]` | No | Custom commands to run during the `pre_build` phase of the CodeBuild build process. |\n\n---\n\n## Usage Examples\n\n### Simple Usage Example\n\nThis example demonstrates the most basic usage of the `TokenInjectableDockerBuilder`, where you specify the path to your Docker context and provide simple build arguments.\n\n#### TypeScript/NPM Example\n\n```typescript\nimport * as cdk from 'aws-cdk-lib';\nimport { TokenInjectableDockerBuilder } from 'token-injectable-docker-builder';\nimport * as ecs from 'aws-cdk-lib/aws-ecs';\nimport * as lambda from 'aws-cdk-lib/aws-lambda';\n\nexport class SimpleStack extends cdk.Stack {\n constructor(scope: cdk.App, id: string, props?: cdk.StackProps) {\n super(scope, id, props);\n\n const dockerBuilder = new TokenInjectableDockerBuilder(this, 'SimpleDockerBuilder', {\n path: './docker', // Path to your Dockerfile or Docker context\n buildArgs: {\n ENV: 'production', // Simple build argument\n },\n });\n\n // Use in ECS\n new ecs.ContainerDefinition(this, 'SimpleContainer', {\n image: dockerBuilder.containerImage,\n // ... other container properties ...\n });\n\n // Use in Lambda\n new lambda.Function(this, 'SimpleDockerLambdaFunction', {\n runtime: lambda.Runtime.FROM_IMAGE,\n code: dockerBuilder.dockerImageCode,\n handler: lambda.Handler.FROM_IMAGE,\n });\n }\n}\n```\n\n#### Python Example\n\n```python\nfrom aws_cdk import (\n aws_ecs as ecs,\n aws_lambda as lambda_,\n core as cdk,\n)\nfrom token_injectable_docker_builder import TokenInjectableDockerBuilder\n\nclass SimpleStack(cdk.Stack):\n\n def __init__(self, scope: cdk.App, id: str, **kwargs):\n super().__init__(scope, id, **kwargs)\n\n docker_builder = TokenInjectableDockerBuilder(self, \"SimpleDockerBuilder\",\n path=\"./docker\", # Path to your Dockerfile or Docker context\n build_args={\n \"ENV\": \"production\", # Simple build argument\n },\n )\n\n # Use in ECS\n ecs.ContainerDefinition(self, \"SimpleContainer\",\n image=docker_builder.container_image,\n # ... other container properties ...\n )\n\n # Use in Lambda\n lambda_.Function(self, \"SimpleDockerLambdaFunction\",\n runtime=lambda_.Runtime.FROM_IMAGE,\n code=docker_builder.docker_image_code,\n handler=lambda_.Handler.FROM_IMAGE\n )\n```\n\n---\n\n### Advanced Usage Example\n\nThis example demonstrates more advanced usage, including using CDK tokens as build arguments, specifying custom install and pre-build commands, and configuring VPC settings.\n\n#### TypeScript/NPM Example\n\n```typescript\nimport * as cdk from 'aws-cdk-lib';\nimport { TokenInjectableDockerBuilder } from 'token-injectable-docker-builder';\nimport * as ecs from 'aws-cdk-lib/aws-ecs';\nimport * as lambda from 'aws-cdk-lib/aws-lambda';\nimport * as ec2 from 'aws-cdk-lib/aws-ec2';\n\nexport class MyStack extends cdk.Stack {\n constructor(scope: cdk.App, id: string, props?: cdk.StackProps) {\n super(scope, id, props);\n\n // Example VPC and security group (optional)\n const vpc = new ec2.Vpc(this, 'MyVpc');\n const securityGroup = new ec2.SecurityGroup(this, 'MySecurityGroup', {\n vpc,\n });\n\n // Example of using CDK tokens as build arguments\n const myApiGateway = /* ... create or import your API Gateway ... */;\n\n const dockerBuilder = new TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {\n path: './docker',\n buildArgs: {\n API_URL: myApiGateway.url, // Using CDK token\n ENV: 'production',\n },\n dockerLoginSecretArn: 'arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret',\n vpc,\n securityGroups: [securityGroup],\n subnetSelection: { subnetType: ec2.SubnetType.PRIVATE_WITH_EGRESS },\n installCommands: [\n 'echo \"Updating package lists...\"',\n 'apt-get update -y',\n 'echo \"Installing required packages...\"',\n 'apt-get install -y curl dnsutils',\n ],\n preBuildCommands: [\n 'echo \"Fetching configuration from private API...\"',\n 'curl -o config.json https://api.example.com/config',\n ],\n });\n\n // Use in ECS\n new ecs.ContainerDefinition(this, 'MyContainer', {\n image: dockerBuilder.containerImage,\n // ... other container properties ...\n });\n\n // Use in Lambda\n new lambda.Function(this, 'DockerLambdaFunction', {\n runtime: lambda.Runtime.FROM_IMAGE,\n code: dockerBuilder.dockerImageCode,\n handler: lambda.Handler.FROM_IMAGE,\n });\n }\n}\n```\n\n#### Python Example\n\n```python\nfrom aws_cdk import (\n aws_ec2 as ec2,\n aws_ecs as ecs,\n aws_lambda as lambda_,\n core as cdk,\n)\nfrom token_injectable_docker_builder import TokenInjectableDockerBuilder\n\nclass MyStack(cdk.Stack):\n\n def __init__(self, scope: cdk.App, id: str, **kwargs):\n super().__init__(scope, id, **kwargs)\n\n # Example VPC and security group (optional)\n vpc = ec2.Vpc(self, \"MyVpc\")\n security_group = ec2.SecurityGroup(self, \"MySecurityGroup\", vpc=vpc)\n\n # Example of using CDK tokens as build arguments\n my_api_gateway = # ... create or import your API Gateway ...\n\n docker_builder = TokenInjectableDockerBuilder(self, \"MyDockerBuilder\",\n path=\"./docker\",\n build_args={\n \"API_URL\": my_api_gateway.url, # Using CDK token\n \"ENV\": \"production\"\n },\n docker_login_secret_arn=\"arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret\",\n vpc=vpc,\n security_groups=[security_group],\n subnet_selection=ec2.SubnetSelection(subnet_type=ec2.SubnetType.PRIVATE_WITH_EGRESS),\n install_commands=[\n 'echo \"Updating package lists...\"',\n 'apt-get update -y',\n 'echo \"Installing required packages...\"',\n 'apt-get install -y curl dnsutils',\n ],\n pre_build_commands=[\n 'echo \"Fetching configuration from private API...\"',\n 'curl -o config.json https://api.example.com/config',\n ],\n )\n\n # Use in ECS\n ecs.ContainerDefinition(self, \"MyContainer\",\n image=docker_builder.container_image,\n # ... other container properties ...\n )\n\n # Use in Lambda\n lambda_.Function(self, \"DockerLambdaFunction\",\n runtime=lambda_.Runtime.FROM_IMAGE,\n code=docker_builder.docker_image_code,\n handler=lambda_.Handler.FROM_IMAGE\n )\n```\n\n---\n\n## How It Works\n\n1. **Docker Source**: Packages the source code or Dockerfile specified in the `path` property as an S3 asset.\n2. **CodeBuild Project**:\n - Uses the packaged asset and `buildArgs` to build the Docker image.\n - Executes any custom `installCommands` and `preBuildCommands` during the build process.\n - Pushes the image to an ECR repository.\n3. **Custom Resource**:\n - Triggers the build process using a Lambda function (`onEvent`).\n - Monitors the build status using another Lambda function (`isComplete`).\n4. **Outputs**:\n - `.containerImage`: Returns the Docker image for ECS.\n - `.dockerImageCode`: Returns the Docker image code for Lambda.\n\n---\n\n## IAM Permissions\n\nThe construct automatically grants permissions for:\n\n- **CodeBuild**:\n - Pull and push images to ECR.\n - Access to AWS Secrets Manager if `dockerLoginSecretArn` is provided.\n - Access to the KMS key for encryption.\n- **Lambda Functions**:\n - Start and monitor CodeBuild builds.\n - Access CloudWatch Logs.\n - Access to the KMS key for encryption.\n - Pull and push images to ECR.\n\n---\n\n## Notes\n\n- **Build Arguments**: Pass custom arguments via `buildArgs` as `--build-arg` flags. CDK tokens can be used to inject dynamic values resolved at deployment time.\n- **Custom Commands**: Use `installCommands` and `preBuildCommands` to run custom shell commands during the build process. This can be useful for installing dependencies or fetching configuration files.\n- **VPC Configuration**: If your build process requires access to resources within a VPC, you can specify the VPC, security groups, and subnet selection.\n- **Docker Login**: If you need to log in to a private Docker registry before building the image, provide the ARN of a secret in AWS Secrets Manager containing the Docker credentials.\n- **ECR Repository**: Automatically creates an ECR repository with lifecycle rules to manage image retention, encryption with a KMS key, and image scanning on push.\n\n---\n\n## Troubleshooting\n\n1. **Build Errors**: Check the CodeBuild logs in CloudWatch Logs for detailed error messages.\n2. **Lambda Errors**: Check the `onEvent` and `isComplete` Lambda function logs in CloudWatch Logs.\n3. **Permissions**: Ensure IAM roles have the required permissions for CodeBuild, ECR, Secrets Manager, and KMS if applicable.\n4. **Network Access**: If the build requires network access (e.g., to download dependencies), ensure that the VPC configuration allows outbound internet access, or use a NAT gateway if in private subnets.\n\n---\n\n## Support\n\nFor issues or feature requests, please open an issue on [GitHub](https://github.com/AlexTech314/TokenInjectableDockerBuilder).\n\n---\n\n## Reference Links\n\n[](https://constructs.dev/packages/token-injectable-docker-builder)\n\n---\n\n# License\n\nThis project is licensed under the terms of the MIT license.\n\n---\n\n# Acknowledgements\n\n- Inspired by the need for more dynamic Docker asset management in AWS CDK.\n- Thanks to the AWS CDK community for their continuous support and contributions.\n\n---\n\nFeel free to reach out if you have any questions or need further assistance!"
|
|
3902
3902
|
},
|
|
3903
3903
|
"repository": {
|
|
3904
3904
|
"type": "git",
|
|
@@ -3929,7 +3929,7 @@
|
|
|
3929
3929
|
},
|
|
3930
3930
|
"locationInModule": {
|
|
3931
3931
|
"filename": "src/index.ts",
|
|
3932
|
-
"line":
|
|
3932
|
+
"line": 123
|
|
3933
3933
|
},
|
|
3934
3934
|
"parameters": [
|
|
3935
3935
|
{
|
|
@@ -3955,7 +3955,7 @@
|
|
|
3955
3955
|
"kind": "class",
|
|
3956
3956
|
"locationInModule": {
|
|
3957
3957
|
"filename": "src/index.ts",
|
|
3958
|
-
"line":
|
|
3958
|
+
"line": 118
|
|
3959
3959
|
},
|
|
3960
3960
|
"name": "TokenInjectableDockerBuilder",
|
|
3961
3961
|
"properties": [
|
|
@@ -3966,7 +3966,7 @@
|
|
|
3966
3966
|
"immutable": true,
|
|
3967
3967
|
"locationInModule": {
|
|
3968
3968
|
"filename": "src/index.ts",
|
|
3969
|
-
"line":
|
|
3969
|
+
"line": 120
|
|
3970
3970
|
},
|
|
3971
3971
|
"name": "containerImage",
|
|
3972
3972
|
"type": {
|
|
@@ -3980,7 +3980,7 @@
|
|
|
3980
3980
|
"immutable": true,
|
|
3981
3981
|
"locationInModule": {
|
|
3982
3982
|
"filename": "src/index.ts",
|
|
3983
|
-
"line":
|
|
3983
|
+
"line": 121
|
|
3984
3984
|
},
|
|
3985
3985
|
"name": "dockerImageCode",
|
|
3986
3986
|
"type": {
|
|
@@ -4001,7 +4001,7 @@
|
|
|
4001
4001
|
"kind": "interface",
|
|
4002
4002
|
"locationInModule": {
|
|
4003
4003
|
"filename": "src/index.ts",
|
|
4004
|
-
"line":
|
|
4004
|
+
"line": 18
|
|
4005
4005
|
},
|
|
4006
4006
|
"name": "TokenInjectableDockerBuilderProps",
|
|
4007
4007
|
"properties": [
|
|
@@ -4014,7 +4014,7 @@
|
|
|
4014
4014
|
"immutable": true,
|
|
4015
4015
|
"locationInModule": {
|
|
4016
4016
|
"filename": "src/index.ts",
|
|
4017
|
-
"line":
|
|
4017
|
+
"line": 22
|
|
4018
4018
|
},
|
|
4019
4019
|
"name": "path",
|
|
4020
4020
|
"type": {
|
|
@@ -4032,7 +4032,7 @@
|
|
|
4032
4032
|
"immutable": true,
|
|
4033
4033
|
"locationInModule": {
|
|
4034
4034
|
"filename": "src/index.ts",
|
|
4035
|
-
"line":
|
|
4035
|
+
"line": 33
|
|
4036
4036
|
},
|
|
4037
4037
|
"name": "buildArgs",
|
|
4038
4038
|
"optional": true,
|
|
@@ -4056,18 +4056,128 @@
|
|
|
4056
4056
|
"immutable": true,
|
|
4057
4057
|
"locationInModule": {
|
|
4058
4058
|
"filename": "src/index.ts",
|
|
4059
|
-
"line":
|
|
4059
|
+
"line": 48
|
|
4060
4060
|
},
|
|
4061
4061
|
"name": "dockerLoginSecretArn",
|
|
4062
4062
|
"optional": true,
|
|
4063
4063
|
"type": {
|
|
4064
4064
|
"primitive": "string"
|
|
4065
4065
|
}
|
|
4066
|
+
},
|
|
4067
|
+
{
|
|
4068
|
+
"abstract": true,
|
|
4069
|
+
"docs": {
|
|
4070
|
+
"default": "- No additional install commands.",
|
|
4071
|
+
"remarks": "**Example Usage:**\n```typescript\nnew TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {\n path: path.resolve(__dirname, '../app'),\n installCommands: [\n 'echo \"Updating package lists...\"',\n 'apt-get update -y',\n 'echo \"Installing required packages...\"',\n 'apt-get install -y curl dnsutils',\n ],\n // ... other properties ...\n});\n```\n*This example demonstrates how to install the `curl` and `dnsutils` packages during the install phase using `apt-get`, the package manager for Ubuntu-based CodeBuild environments.*",
|
|
4072
|
+
"stability": "stable",
|
|
4073
|
+
"summary": "Custom commands to run during the install phase."
|
|
4074
|
+
},
|
|
4075
|
+
"immutable": true,
|
|
4076
|
+
"locationInModule": {
|
|
4077
|
+
"filename": "src/index.ts",
|
|
4078
|
+
"line": 91
|
|
4079
|
+
},
|
|
4080
|
+
"name": "installCommands",
|
|
4081
|
+
"optional": true,
|
|
4082
|
+
"type": {
|
|
4083
|
+
"collection": {
|
|
4084
|
+
"elementtype": {
|
|
4085
|
+
"primitive": "string"
|
|
4086
|
+
},
|
|
4087
|
+
"kind": "array"
|
|
4088
|
+
}
|
|
4089
|
+
}
|
|
4090
|
+
},
|
|
4091
|
+
{
|
|
4092
|
+
"abstract": true,
|
|
4093
|
+
"docs": {
|
|
4094
|
+
"default": "- No additional pre-build commands.",
|
|
4095
|
+
"remarks": "**Example Usage:**\n```typescript\nnew TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {\n path: path.resolve(__dirname, '../app'),\n preBuildCommands: [\n 'echo \"Fetching configuration from private API...\"',\n 'curl -o config.json https://api.example.com/config',\n ],\n // ... other properties ...\n});\n```\n*In this example, the builder fetches a configuration file from a private API before starting the Docker build. This config file will be available in the same directory as your Dockerfile during CDK deployment.*",
|
|
4096
|
+
"stability": "stable",
|
|
4097
|
+
"summary": "Custom commands to run during the pre_build phase."
|
|
4098
|
+
},
|
|
4099
|
+
"immutable": true,
|
|
4100
|
+
"locationInModule": {
|
|
4101
|
+
"filename": "src/index.ts",
|
|
4102
|
+
"line": 112
|
|
4103
|
+
},
|
|
4104
|
+
"name": "preBuildCommands",
|
|
4105
|
+
"optional": true,
|
|
4106
|
+
"type": {
|
|
4107
|
+
"collection": {
|
|
4108
|
+
"elementtype": {
|
|
4109
|
+
"primitive": "string"
|
|
4110
|
+
},
|
|
4111
|
+
"kind": "array"
|
|
4112
|
+
}
|
|
4113
|
+
}
|
|
4114
|
+
},
|
|
4115
|
+
{
|
|
4116
|
+
"abstract": true,
|
|
4117
|
+
"docs": {
|
|
4118
|
+
"default": "No security groups are attached.",
|
|
4119
|
+
"remarks": "These should define the network access rules for the CodeBuild project.",
|
|
4120
|
+
"stability": "stable",
|
|
4121
|
+
"summary": "The security groups to attach to the CodeBuild project."
|
|
4122
|
+
},
|
|
4123
|
+
"immutable": true,
|
|
4124
|
+
"locationInModule": {
|
|
4125
|
+
"filename": "src/index.ts",
|
|
4126
|
+
"line": 62
|
|
4127
|
+
},
|
|
4128
|
+
"name": "securityGroups",
|
|
4129
|
+
"optional": true,
|
|
4130
|
+
"type": {
|
|
4131
|
+
"collection": {
|
|
4132
|
+
"elementtype": {
|
|
4133
|
+
"fqn": "aws-cdk-lib.aws_ec2.ISecurityGroup"
|
|
4134
|
+
},
|
|
4135
|
+
"kind": "array"
|
|
4136
|
+
}
|
|
4137
|
+
}
|
|
4138
|
+
},
|
|
4139
|
+
{
|
|
4140
|
+
"abstract": true,
|
|
4141
|
+
"docs": {
|
|
4142
|
+
"default": "All subnets in the VPC are used.",
|
|
4143
|
+
"remarks": "Allows the user to select private, public, or isolated subnets.",
|
|
4144
|
+
"stability": "stable",
|
|
4145
|
+
"summary": "The subnet selection to specify which subnets to use within the VPC."
|
|
4146
|
+
},
|
|
4147
|
+
"immutable": true,
|
|
4148
|
+
"locationInModule": {
|
|
4149
|
+
"filename": "src/index.ts",
|
|
4150
|
+
"line": 69
|
|
4151
|
+
},
|
|
4152
|
+
"name": "subnetSelection",
|
|
4153
|
+
"optional": true,
|
|
4154
|
+
"type": {
|
|
4155
|
+
"fqn": "aws-cdk-lib.aws_ec2.SubnetSelection"
|
|
4156
|
+
}
|
|
4157
|
+
},
|
|
4158
|
+
{
|
|
4159
|
+
"abstract": true,
|
|
4160
|
+
"docs": {
|
|
4161
|
+
"default": "No VPC is attached, and the CodeBuild project will use public internet.",
|
|
4162
|
+
"remarks": "If provided, the CodeBuild project will be launched within the specified VPC.",
|
|
4163
|
+
"stability": "stable",
|
|
4164
|
+
"summary": "The VPC in which the CodeBuild project will be deployed."
|
|
4165
|
+
},
|
|
4166
|
+
"immutable": true,
|
|
4167
|
+
"locationInModule": {
|
|
4168
|
+
"filename": "src/index.ts",
|
|
4169
|
+
"line": 55
|
|
4170
|
+
},
|
|
4171
|
+
"name": "vpc",
|
|
4172
|
+
"optional": true,
|
|
4173
|
+
"type": {
|
|
4174
|
+
"fqn": "aws-cdk-lib.aws_ec2.IVpc"
|
|
4175
|
+
}
|
|
4066
4176
|
}
|
|
4067
4177
|
],
|
|
4068
4178
|
"symbolId": "src/index:TokenInjectableDockerBuilderProps"
|
|
4069
4179
|
}
|
|
4070
4180
|
},
|
|
4071
|
-
"version": "1.
|
|
4072
|
-
"fingerprint": "
|
|
4181
|
+
"version": "1.2.0",
|
|
4182
|
+
"fingerprint": "TmxNeVUcLCoAgBQ00ly9fitXZzX7XszZMTsXOXhhKo4="
|
|
4073
4183
|
}
|
package/API.md
CHANGED
|
@@ -146,6 +146,11 @@ const tokenInjectableDockerBuilderProps: TokenInjectableDockerBuilderProps = { .
|
|
|
146
146
|
| <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.path">path</a></code> | <code>string</code> | The path to the directory containing the Dockerfile or source code. |
|
|
147
147
|
| <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.buildArgs">buildArgs</a></code> | <code>{[ key: string ]: string}</code> | Build arguments to pass to the Docker build process. |
|
|
148
148
|
| <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.dockerLoginSecretArn">dockerLoginSecretArn</a></code> | <code>string</code> | The ARN of the AWS Secrets Manager secret containing Docker login credentials. |
|
|
149
|
+
| <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.installCommands">installCommands</a></code> | <code>string[]</code> | Custom commands to run during the install phase. |
|
|
150
|
+
| <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.preBuildCommands">preBuildCommands</a></code> | <code>string[]</code> | Custom commands to run during the pre_build phase. |
|
|
151
|
+
| <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.securityGroups">securityGroups</a></code> | <code>aws-cdk-lib.aws_ec2.ISecurityGroup[]</code> | The security groups to attach to the CodeBuild project. |
|
|
152
|
+
| <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.subnetSelection">subnetSelection</a></code> | <code>aws-cdk-lib.aws_ec2.SubnetSelection</code> | The subnet selection to specify which subnets to use within the VPC. |
|
|
153
|
+
| <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.vpc">vpc</a></code> | <code>aws-cdk-lib.aws_ec2.IVpc</code> | The VPC in which the CodeBuild project will be deployed. |
|
|
149
154
|
|
|
150
155
|
---
|
|
151
156
|
|
|
@@ -213,5 +218,104 @@ If not provided, the construct will skip Docker login during the build process.
|
|
|
213
218
|
```
|
|
214
219
|
|
|
215
220
|
|
|
221
|
+
##### `installCommands`<sup>Optional</sup> <a name="installCommands" id="token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.installCommands"></a>
|
|
222
|
+
|
|
223
|
+
```typescript
|
|
224
|
+
public readonly installCommands: string[];
|
|
225
|
+
```
|
|
226
|
+
|
|
227
|
+
- *Type:* string[]
|
|
228
|
+
- *Default:* No additional install commands.
|
|
229
|
+
|
|
230
|
+
Custom commands to run during the install phase.
|
|
231
|
+
|
|
232
|
+
**Example Usage:**
|
|
233
|
+
```typescript
|
|
234
|
+
new TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {
|
|
235
|
+
path: path.resolve(__dirname, '../app'),
|
|
236
|
+
installCommands: [
|
|
237
|
+
'echo "Updating package lists..."',
|
|
238
|
+
'apt-get update -y',
|
|
239
|
+
'echo "Installing required packages..."',
|
|
240
|
+
'apt-get install -y curl dnsutils',
|
|
241
|
+
],
|
|
242
|
+
// ... other properties ...
|
|
243
|
+
});
|
|
244
|
+
```
|
|
245
|
+
*This example demonstrates how to install the `curl` and `dnsutils` packages during the install phase using `apt-get`, the package manager for Ubuntu-based CodeBuild environments.*
|
|
246
|
+
|
|
247
|
+
---
|
|
248
|
+
|
|
249
|
+
##### `preBuildCommands`<sup>Optional</sup> <a name="preBuildCommands" id="token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.preBuildCommands"></a>
|
|
250
|
+
|
|
251
|
+
```typescript
|
|
252
|
+
public readonly preBuildCommands: string[];
|
|
253
|
+
```
|
|
254
|
+
|
|
255
|
+
- *Type:* string[]
|
|
256
|
+
- *Default:* No additional pre-build commands.
|
|
257
|
+
|
|
258
|
+
Custom commands to run during the pre_build phase.
|
|
259
|
+
|
|
260
|
+
**Example Usage:**
|
|
261
|
+
```typescript
|
|
262
|
+
new TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {
|
|
263
|
+
path: path.resolve(__dirname, '../app'),
|
|
264
|
+
preBuildCommands: [
|
|
265
|
+
'echo "Fetching configuration from private API..."',
|
|
266
|
+
'curl -o config.json https://api.example.com/config',
|
|
267
|
+
],
|
|
268
|
+
// ... other properties ...
|
|
269
|
+
});
|
|
270
|
+
```
|
|
271
|
+
*In this example, the builder fetches a configuration file from a private API before starting the Docker build. This config file will be available in the same directory as your Dockerfile during CDK deployment.*
|
|
272
|
+
|
|
273
|
+
---
|
|
274
|
+
|
|
275
|
+
##### `securityGroups`<sup>Optional</sup> <a name="securityGroups" id="token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.securityGroups"></a>
|
|
276
|
+
|
|
277
|
+
```typescript
|
|
278
|
+
public readonly securityGroups: ISecurityGroup[];
|
|
279
|
+
```
|
|
280
|
+
|
|
281
|
+
- *Type:* aws-cdk-lib.aws_ec2.ISecurityGroup[]
|
|
282
|
+
- *Default:* No security groups are attached.
|
|
283
|
+
|
|
284
|
+
The security groups to attach to the CodeBuild project.
|
|
285
|
+
|
|
286
|
+
These should define the network access rules for the CodeBuild project.
|
|
287
|
+
|
|
288
|
+
---
|
|
289
|
+
|
|
290
|
+
##### `subnetSelection`<sup>Optional</sup> <a name="subnetSelection" id="token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.subnetSelection"></a>
|
|
291
|
+
|
|
292
|
+
```typescript
|
|
293
|
+
public readonly subnetSelection: SubnetSelection;
|
|
294
|
+
```
|
|
295
|
+
|
|
296
|
+
- *Type:* aws-cdk-lib.aws_ec2.SubnetSelection
|
|
297
|
+
- *Default:* All subnets in the VPC are used.
|
|
298
|
+
|
|
299
|
+
The subnet selection to specify which subnets to use within the VPC.
|
|
300
|
+
|
|
301
|
+
Allows the user to select private, public, or isolated subnets.
|
|
302
|
+
|
|
303
|
+
---
|
|
304
|
+
|
|
305
|
+
##### `vpc`<sup>Optional</sup> <a name="vpc" id="token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.vpc"></a>
|
|
306
|
+
|
|
307
|
+
```typescript
|
|
308
|
+
public readonly vpc: IVpc;
|
|
309
|
+
```
|
|
310
|
+
|
|
311
|
+
- *Type:* aws-cdk-lib.aws_ec2.IVpc
|
|
312
|
+
- *Default:* No VPC is attached, and the CodeBuild project will use public internet.
|
|
313
|
+
|
|
314
|
+
The VPC in which the CodeBuild project will be deployed.
|
|
315
|
+
|
|
316
|
+
If provided, the CodeBuild project will be launched within the specified VPC.
|
|
317
|
+
|
|
318
|
+
---
|
|
319
|
+
|
|
216
320
|
|
|
217
321
|
|
package/README.md
CHANGED
|
@@ -6,17 +6,21 @@ The `TokenInjectableDockerBuilder` is a flexible AWS CDK construct that enables
|
|
|
6
6
|
|
|
7
7
|
## Why?
|
|
8
8
|
|
|
9
|
-
AWS CDK already provides mechanisms for creating deployable assets using Docker, such as [DockerImageAsset](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_ecr_assets.DockerImageAsset.html) and [DockerImageCode](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_lambda.DockerImageCode.html), but these
|
|
9
|
+
AWS CDK already provides mechanisms for creating deployable assets using Docker, such as [DockerImageAsset](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_ecr_assets.DockerImageAsset.html) and [DockerImageCode](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_lambda.DockerImageCode.html), but these constructs are limited because they cannot accept CDK tokens as build-args. The `TokenInjectableDockerBuilder` allows injecting CDK tokens as build-time arguments into Docker-based assets, enabling more dynamic dependency relationships.
|
|
10
10
|
|
|
11
|
-
For example, a Next.js frontend Docker image may require an API Gateway URL. With this construct, you can deploy the API Gateway first, then pass its URL as a build-time argument to the Next.js Docker image.
|
|
11
|
+
For example, a Next.js frontend Docker image may require an API Gateway URL as an argument. With this construct, you can deploy the API Gateway first, then pass its URL as a build-time argument to the Next.js Docker image. As a result, your Next.js frontend can dynamically fetch data from the API Gateway without hardcoding the URL, or needing mutliple sepereate Stacks.
|
|
12
12
|
|
|
13
13
|
---
|
|
14
14
|
|
|
15
15
|
## Features
|
|
16
16
|
|
|
17
|
-
- Automatically builds and pushes Docker images to ECR.
|
|
18
|
-
- Supports custom build arguments for Docker builds, including CDK tokens resolved at deployment time.
|
|
19
|
-
-
|
|
17
|
+
- **Build and Push Docker Images**: Automatically builds and pushes Docker images to ECR.
|
|
18
|
+
- **Token Support**: Supports custom build arguments for Docker builds, including CDK tokens resolved at deployment time.
|
|
19
|
+
- **Custom Install and Pre-Build Commands**: Allows specifying custom commands to run during the `install` and `pre_build` phases of the CodeBuild build process.
|
|
20
|
+
- **VPC Configuration**: Supports deploying the CodeBuild project within a VPC, with customizable security groups and subnet selection.
|
|
21
|
+
- **Docker Login**: Supports Docker login using credentials stored in AWS Secrets Manager.
|
|
22
|
+
- **ECR Repository Management**: Creates an ECR repository with lifecycle rules and encryption.
|
|
23
|
+
- **Integration with ECS and Lambda**: Provides outputs for use in AWS ECS and AWS Lambda.
|
|
20
24
|
|
|
21
25
|
---
|
|
22
26
|
|
|
@@ -52,42 +56,150 @@ pip install token-injectable-docker-builder
|
|
|
52
56
|
|
|
53
57
|
#### Properties in `TokenInjectableDockerBuilderProps`
|
|
54
58
|
|
|
55
|
-
| Property
|
|
56
|
-
|
|
57
|
-
| `path`
|
|
58
|
-
| `buildArgs`
|
|
59
|
-
| `dockerLoginSecretArn`
|
|
59
|
+
| Property | Type | Required | Description |
|
|
60
|
+
|--------------------------|-----------------------------|----------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
|
61
|
+
| `path` | `string` | Yes | The file path to the Dockerfile or source code directory. |
|
|
62
|
+
| `buildArgs` | `{ [key: string]: string }` | No | Build arguments to pass to the Docker build process. These are transformed into `--build-arg` flags. |
|
|
63
|
+
| `dockerLoginSecretArn` | `string` | No | ARN of an AWS Secrets Manager secret for Docker credentials. Skips login if not provided. |
|
|
64
|
+
| `vpc` | `IVpc` | No | The VPC in which the CodeBuild project will be deployed. If provided, the CodeBuild project will be launched within the specified VPC. |
|
|
65
|
+
| `securityGroups` | `ISecurityGroup[]` | No | The security groups to attach to the CodeBuild project. These should define the network access rules for the CodeBuild project. |
|
|
66
|
+
| `subnetSelection` | `SubnetSelection` | No | The subnet selection to specify which subnets to use within the VPC. Allows the user to select private, public, or isolated subnets. |
|
|
67
|
+
| `installCommands` | `string[]` | No | Custom commands to run during the `install` phase of the CodeBuild build process. |
|
|
68
|
+
| `preBuildCommands` | `string[]` | No | Custom commands to run during the `pre_build` phase of the CodeBuild build process. |
|
|
60
69
|
|
|
61
70
|
---
|
|
62
71
|
|
|
63
72
|
## Usage Examples
|
|
64
73
|
|
|
65
|
-
###
|
|
74
|
+
### Simple Usage Example
|
|
66
75
|
|
|
67
|
-
|
|
76
|
+
This example demonstrates the most basic usage of the `TokenInjectableDockerBuilder`, where you specify the path to your Docker context and provide simple build arguments.
|
|
77
|
+
|
|
78
|
+
#### TypeScript/NPM Example
|
|
79
|
+
|
|
80
|
+
```typescript
|
|
81
|
+
import * as cdk from 'aws-cdk-lib';
|
|
82
|
+
import { TokenInjectableDockerBuilder } from 'token-injectable-docker-builder';
|
|
83
|
+
import * as ecs from 'aws-cdk-lib/aws-ecs';
|
|
84
|
+
import * as lambda from 'aws-cdk-lib/aws-lambda';
|
|
85
|
+
|
|
86
|
+
export class SimpleStack extends cdk.Stack {
|
|
87
|
+
constructor(scope: cdk.App, id: string, props?: cdk.StackProps) {
|
|
88
|
+
super(scope, id, props);
|
|
89
|
+
|
|
90
|
+
const dockerBuilder = new TokenInjectableDockerBuilder(this, 'SimpleDockerBuilder', {
|
|
91
|
+
path: './docker', // Path to your Dockerfile or Docker context
|
|
92
|
+
buildArgs: {
|
|
93
|
+
ENV: 'production', // Simple build argument
|
|
94
|
+
},
|
|
95
|
+
});
|
|
96
|
+
|
|
97
|
+
// Use in ECS
|
|
98
|
+
new ecs.ContainerDefinition(this, 'SimpleContainer', {
|
|
99
|
+
image: dockerBuilder.containerImage,
|
|
100
|
+
// ... other container properties ...
|
|
101
|
+
});
|
|
102
|
+
|
|
103
|
+
// Use in Lambda
|
|
104
|
+
new lambda.Function(this, 'SimpleDockerLambdaFunction', {
|
|
105
|
+
runtime: lambda.Runtime.FROM_IMAGE,
|
|
106
|
+
code: dockerBuilder.dockerImageCode,
|
|
107
|
+
handler: lambda.Handler.FROM_IMAGE,
|
|
108
|
+
});
|
|
109
|
+
}
|
|
110
|
+
}
|
|
111
|
+
```
|
|
112
|
+
|
|
113
|
+
#### Python Example
|
|
114
|
+
|
|
115
|
+
```python
|
|
116
|
+
from aws_cdk import (
|
|
117
|
+
aws_ecs as ecs,
|
|
118
|
+
aws_lambda as lambda_,
|
|
119
|
+
core as cdk,
|
|
120
|
+
)
|
|
121
|
+
from token_injectable_docker_builder import TokenInjectableDockerBuilder
|
|
122
|
+
|
|
123
|
+
class SimpleStack(cdk.Stack):
|
|
124
|
+
|
|
125
|
+
def __init__(self, scope: cdk.App, id: str, **kwargs):
|
|
126
|
+
super().__init__(scope, id, **kwargs)
|
|
127
|
+
|
|
128
|
+
docker_builder = TokenInjectableDockerBuilder(self, "SimpleDockerBuilder",
|
|
129
|
+
path="./docker", # Path to your Dockerfile or Docker context
|
|
130
|
+
build_args={
|
|
131
|
+
"ENV": "production", # Simple build argument
|
|
132
|
+
},
|
|
133
|
+
)
|
|
134
|
+
|
|
135
|
+
# Use in ECS
|
|
136
|
+
ecs.ContainerDefinition(self, "SimpleContainer",
|
|
137
|
+
image=docker_builder.container_image,
|
|
138
|
+
# ... other container properties ...
|
|
139
|
+
)
|
|
140
|
+
|
|
141
|
+
# Use in Lambda
|
|
142
|
+
lambda_.Function(self, "SimpleDockerLambdaFunction",
|
|
143
|
+
runtime=lambda_.Runtime.FROM_IMAGE,
|
|
144
|
+
code=docker_builder.docker_image_code,
|
|
145
|
+
handler=lambda_.Handler.FROM_IMAGE
|
|
146
|
+
)
|
|
147
|
+
```
|
|
148
|
+
|
|
149
|
+
---
|
|
150
|
+
|
|
151
|
+
### Advanced Usage Example
|
|
152
|
+
|
|
153
|
+
This example demonstrates more advanced usage, including using CDK tokens as build arguments, specifying custom install and pre-build commands, and configuring VPC settings.
|
|
154
|
+
|
|
155
|
+
#### TypeScript/NPM Example
|
|
68
156
|
|
|
69
157
|
```typescript
|
|
70
158
|
import * as cdk from 'aws-cdk-lib';
|
|
71
159
|
import { TokenInjectableDockerBuilder } from 'token-injectable-docker-builder';
|
|
72
160
|
import * as ecs from 'aws-cdk-lib/aws-ecs';
|
|
73
161
|
import * as lambda from 'aws-cdk-lib/aws-lambda';
|
|
162
|
+
import * as ec2 from 'aws-cdk-lib/aws-ec2';
|
|
74
163
|
|
|
75
164
|
export class MyStack extends cdk.Stack {
|
|
76
165
|
constructor(scope: cdk.App, id: string, props?: cdk.StackProps) {
|
|
77
166
|
super(scope, id, props);
|
|
78
167
|
|
|
168
|
+
// Example VPC and security group (optional)
|
|
169
|
+
const vpc = new ec2.Vpc(this, 'MyVpc');
|
|
170
|
+
const securityGroup = new ec2.SecurityGroup(this, 'MySecurityGroup', {
|
|
171
|
+
vpc,
|
|
172
|
+
});
|
|
173
|
+
|
|
174
|
+
// Example of using CDK tokens as build arguments
|
|
175
|
+
const myApiGateway = /* ... create or import your API Gateway ... */;
|
|
176
|
+
|
|
79
177
|
const dockerBuilder = new TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {
|
|
80
178
|
path: './docker',
|
|
81
179
|
buildArgs: {
|
|
82
|
-
|
|
180
|
+
API_URL: myApiGateway.url, // Using CDK token
|
|
83
181
|
ENV: 'production',
|
|
84
182
|
},
|
|
85
183
|
dockerLoginSecretArn: 'arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret',
|
|
184
|
+
vpc,
|
|
185
|
+
securityGroups: [securityGroup],
|
|
186
|
+
subnetSelection: { subnetType: ec2.SubnetType.PRIVATE_WITH_EGRESS },
|
|
187
|
+
installCommands: [
|
|
188
|
+
'echo "Updating package lists..."',
|
|
189
|
+
'apt-get update -y',
|
|
190
|
+
'echo "Installing required packages..."',
|
|
191
|
+
'apt-get install -y curl dnsutils',
|
|
192
|
+
],
|
|
193
|
+
preBuildCommands: [
|
|
194
|
+
'echo "Fetching configuration from private API..."',
|
|
195
|
+
'curl -o config.json https://api.example.com/config',
|
|
196
|
+
],
|
|
86
197
|
});
|
|
87
198
|
|
|
88
199
|
// Use in ECS
|
|
89
|
-
new ecs.
|
|
90
|
-
|
|
200
|
+
new ecs.ContainerDefinition(this, 'MyContainer', {
|
|
201
|
+
image: dockerBuilder.containerImage,
|
|
202
|
+
// ... other container properties ...
|
|
91
203
|
});
|
|
92
204
|
|
|
93
205
|
// Use in Lambda
|
|
@@ -100,35 +212,55 @@ export class MyStack extends cdk.Stack {
|
|
|
100
212
|
}
|
|
101
213
|
```
|
|
102
214
|
|
|
103
|
-
|
|
104
|
-
|
|
105
|
-
### Python Example
|
|
106
|
-
|
|
107
|
-
Here is how to use `TokenInjectableDockerBuilder` in an AWS CDK project with Python:
|
|
215
|
+
#### Python Example
|
|
108
216
|
|
|
109
217
|
```python
|
|
110
|
-
from aws_cdk import
|
|
218
|
+
from aws_cdk import (
|
|
219
|
+
aws_ec2 as ec2,
|
|
220
|
+
aws_ecs as ecs,
|
|
221
|
+
aws_lambda as lambda_,
|
|
222
|
+
core as cdk,
|
|
223
|
+
)
|
|
111
224
|
from token_injectable_docker_builder import TokenInjectableDockerBuilder
|
|
112
|
-
from aws_cdk import aws_ecs as ecs
|
|
113
|
-
from aws_cdk import aws_lambda as lambda_
|
|
114
225
|
|
|
115
226
|
class MyStack(cdk.Stack):
|
|
116
227
|
|
|
117
228
|
def __init__(self, scope: cdk.App, id: str, **kwargs):
|
|
118
229
|
super().__init__(scope, id, **kwargs)
|
|
119
230
|
|
|
231
|
+
# Example VPC and security group (optional)
|
|
232
|
+
vpc = ec2.Vpc(self, "MyVpc")
|
|
233
|
+
security_group = ec2.SecurityGroup(self, "MySecurityGroup", vpc=vpc)
|
|
234
|
+
|
|
235
|
+
# Example of using CDK tokens as build arguments
|
|
236
|
+
my_api_gateway = # ... create or import your API Gateway ...
|
|
237
|
+
|
|
120
238
|
docker_builder = TokenInjectableDockerBuilder(self, "MyDockerBuilder",
|
|
121
239
|
path="./docker",
|
|
122
240
|
build_args={
|
|
123
|
-
"
|
|
241
|
+
"API_URL": my_api_gateway.url, # Using CDK token
|
|
124
242
|
"ENV": "production"
|
|
125
243
|
},
|
|
126
|
-
docker_login_secret_arn="arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret"
|
|
244
|
+
docker_login_secret_arn="arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret",
|
|
245
|
+
vpc=vpc,
|
|
246
|
+
security_groups=[security_group],
|
|
247
|
+
subnet_selection=ec2.SubnetSelection(subnet_type=ec2.SubnetType.PRIVATE_WITH_EGRESS),
|
|
248
|
+
install_commands=[
|
|
249
|
+
'echo "Updating package lists..."',
|
|
250
|
+
'apt-get update -y',
|
|
251
|
+
'echo "Installing required packages..."',
|
|
252
|
+
'apt-get install -y curl dnsutils',
|
|
253
|
+
],
|
|
254
|
+
pre_build_commands=[
|
|
255
|
+
'echo "Fetching configuration from private API..."',
|
|
256
|
+
'curl -o config.json https://api.example.com/config',
|
|
257
|
+
],
|
|
127
258
|
)
|
|
128
259
|
|
|
129
260
|
# Use in ECS
|
|
130
|
-
ecs.
|
|
131
|
-
|
|
261
|
+
ecs.ContainerDefinition(self, "MyContainer",
|
|
262
|
+
image=docker_builder.container_image,
|
|
263
|
+
# ... other container properties ...
|
|
132
264
|
)
|
|
133
265
|
|
|
134
266
|
# Use in Lambda
|
|
@@ -146,6 +278,7 @@ class MyStack(cdk.Stack):
|
|
|
146
278
|
1. **Docker Source**: Packages the source code or Dockerfile specified in the `path` property as an S3 asset.
|
|
147
279
|
2. **CodeBuild Project**:
|
|
148
280
|
- Uses the packaged asset and `buildArgs` to build the Docker image.
|
|
281
|
+
- Executes any custom `installCommands` and `preBuildCommands` during the build process.
|
|
149
282
|
- Pushes the image to an ECR repository.
|
|
150
283
|
3. **Custom Resource**:
|
|
151
284
|
- Triggers the build process using a Lambda function (`onEvent`).
|
|
@@ -159,33 +292,61 @@ class MyStack(cdk.Stack):
|
|
|
159
292
|
## IAM Permissions
|
|
160
293
|
|
|
161
294
|
The construct automatically grants permissions for:
|
|
162
|
-
|
|
163
|
-
-
|
|
164
|
-
-
|
|
295
|
+
|
|
296
|
+
- **CodeBuild**:
|
|
297
|
+
- Pull and push images to ECR.
|
|
298
|
+
- Access to AWS Secrets Manager if `dockerLoginSecretArn` is provided.
|
|
299
|
+
- Access to the KMS key for encryption.
|
|
300
|
+
- **Lambda Functions**:
|
|
301
|
+
- Start and monitor CodeBuild builds.
|
|
302
|
+
- Access CloudWatch Logs.
|
|
303
|
+
- Access to the KMS key for encryption.
|
|
304
|
+
- Pull and push images to ECR.
|
|
165
305
|
|
|
166
306
|
---
|
|
167
307
|
|
|
168
308
|
## Notes
|
|
169
309
|
|
|
170
|
-
- **Build Arguments**: Pass custom arguments via `buildArgs` as `--build-arg` flags.
|
|
171
|
-
- **
|
|
172
|
-
- **
|
|
310
|
+
- **Build Arguments**: Pass custom arguments via `buildArgs` as `--build-arg` flags. CDK tokens can be used to inject dynamic values resolved at deployment time.
|
|
311
|
+
- **Custom Commands**: Use `installCommands` and `preBuildCommands` to run custom shell commands during the build process. This can be useful for installing dependencies or fetching configuration files.
|
|
312
|
+
- **VPC Configuration**: If your build process requires access to resources within a VPC, you can specify the VPC, security groups, and subnet selection.
|
|
313
|
+
- **Docker Login**: If you need to log in to a private Docker registry before building the image, provide the ARN of a secret in AWS Secrets Manager containing the Docker credentials.
|
|
314
|
+
- **ECR Repository**: Automatically creates an ECR repository with lifecycle rules to manage image retention, encryption with a KMS key, and image scanning on push.
|
|
173
315
|
|
|
174
316
|
---
|
|
175
317
|
|
|
176
318
|
## Troubleshooting
|
|
177
319
|
|
|
178
|
-
1. **Build Errors**: Check CodeBuild logs in CloudWatch.
|
|
179
|
-
2. **Lambda Errors**: Check `onEvent` and `isComplete` Lambda logs in CloudWatch.
|
|
180
|
-
3. **Permissions**: Ensure IAM roles have the required permissions for CodeBuild, ECR, and
|
|
320
|
+
1. **Build Errors**: Check the CodeBuild logs in CloudWatch Logs for detailed error messages.
|
|
321
|
+
2. **Lambda Errors**: Check the `onEvent` and `isComplete` Lambda function logs in CloudWatch Logs.
|
|
322
|
+
3. **Permissions**: Ensure IAM roles have the required permissions for CodeBuild, ECR, Secrets Manager, and KMS if applicable.
|
|
323
|
+
4. **Network Access**: If the build requires network access (e.g., to download dependencies), ensure that the VPC configuration allows outbound internet access, or use a NAT gateway if in private subnets.
|
|
181
324
|
|
|
182
325
|
---
|
|
183
326
|
|
|
184
327
|
## Support
|
|
185
328
|
|
|
186
|
-
|
|
329
|
+
For issues or feature requests, please open an issue on [GitHub](https://github.com/AlexTech314/TokenInjectableDockerBuilder).
|
|
187
330
|
|
|
188
331
|
---
|
|
189
332
|
|
|
190
333
|
## Reference Links
|
|
334
|
+
|
|
191
335
|
[](https://constructs.dev/packages/token-injectable-docker-builder)
|
|
336
|
+
|
|
337
|
+
---
|
|
338
|
+
|
|
339
|
+
# License
|
|
340
|
+
|
|
341
|
+
This project is licensed under the terms of the MIT license.
|
|
342
|
+
|
|
343
|
+
---
|
|
344
|
+
|
|
345
|
+
# Acknowledgements
|
|
346
|
+
|
|
347
|
+
- Inspired by the need for more dynamic Docker asset management in AWS CDK.
|
|
348
|
+
- Thanks to the AWS CDK community for their continuous support and contributions.
|
|
349
|
+
|
|
350
|
+
---
|
|
351
|
+
|
|
352
|
+
Feel free to reach out if you have any questions or need further assistance!
|
package/lib/index.d.ts
CHANGED
|
@@ -1,3 +1,4 @@
|
|
|
1
|
+
import { IVpc, ISecurityGroup, SubnetSelection } from 'aws-cdk-lib/aws-ec2';
|
|
1
2
|
import { ContainerImage } from 'aws-cdk-lib/aws-ecs';
|
|
2
3
|
import { DockerImageCode } from 'aws-cdk-lib/aws-lambda';
|
|
3
4
|
import { Construct } from 'constructs';
|
|
@@ -35,6 +36,64 @@ export interface TokenInjectableDockerBuilderProps {
|
|
|
35
36
|
* @example 'arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret'
|
|
36
37
|
*/
|
|
37
38
|
readonly dockerLoginSecretArn?: string;
|
|
39
|
+
/**
|
|
40
|
+
* The VPC in which the CodeBuild project will be deployed.
|
|
41
|
+
* If provided, the CodeBuild project will be launched within the specified VPC.
|
|
42
|
+
* @default No VPC is attached, and the CodeBuild project will use public internet.
|
|
43
|
+
*/
|
|
44
|
+
readonly vpc?: IVpc;
|
|
45
|
+
/**
|
|
46
|
+
* The security groups to attach to the CodeBuild project.
|
|
47
|
+
* These should define the network access rules for the CodeBuild project.
|
|
48
|
+
* @default No security groups are attached.
|
|
49
|
+
*/
|
|
50
|
+
readonly securityGroups?: ISecurityGroup[];
|
|
51
|
+
/**
|
|
52
|
+
* The subnet selection to specify which subnets to use within the VPC.
|
|
53
|
+
* Allows the user to select private, public, or isolated subnets.
|
|
54
|
+
* @default All subnets in the VPC are used.
|
|
55
|
+
*/
|
|
56
|
+
readonly subnetSelection?: SubnetSelection;
|
|
57
|
+
/**
|
|
58
|
+
* Custom commands to run during the install phase.
|
|
59
|
+
*
|
|
60
|
+
* **Example Usage:**
|
|
61
|
+
* ```typescript
|
|
62
|
+
* new TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {
|
|
63
|
+
* path: path.resolve(__dirname, '../app'),
|
|
64
|
+
* installCommands: [
|
|
65
|
+
* 'echo "Updating package lists..."',
|
|
66
|
+
* 'apt-get update -y',
|
|
67
|
+
* 'echo "Installing required packages..."',
|
|
68
|
+
* 'apt-get install -y curl dnsutils',
|
|
69
|
+
* ],
|
|
70
|
+
* // ... other properties ...
|
|
71
|
+
* });
|
|
72
|
+
* ```
|
|
73
|
+
* *This example demonstrates how to install the `curl` and `dnsutils` packages during the install phase using `apt-get`, the package manager for Ubuntu-based CodeBuild environments.*
|
|
74
|
+
*
|
|
75
|
+
* @default - No additional install commands.
|
|
76
|
+
*/
|
|
77
|
+
readonly installCommands?: string[];
|
|
78
|
+
/**
|
|
79
|
+
* Custom commands to run during the pre_build phase.
|
|
80
|
+
*
|
|
81
|
+
* **Example Usage:**
|
|
82
|
+
* ```typescript
|
|
83
|
+
* new TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {
|
|
84
|
+
* path: path.resolve(__dirname, '../app'),
|
|
85
|
+
* preBuildCommands: [
|
|
86
|
+
* 'echo "Fetching configuration from private API..."',
|
|
87
|
+
* 'curl -o config.json https://api.example.com/config',
|
|
88
|
+
* ],
|
|
89
|
+
* // ... other properties ...
|
|
90
|
+
* });
|
|
91
|
+
* ```
|
|
92
|
+
* *In this example, the builder fetches a configuration file from a private API before starting the Docker build. This config file will be available in the same directory as your Dockerfile during CDK deployment.*
|
|
93
|
+
*
|
|
94
|
+
* @default - No additional pre-build commands.
|
|
95
|
+
*/
|
|
96
|
+
readonly preBuildCommands?: string[];
|
|
38
97
|
}
|
|
39
98
|
/**
|
|
40
99
|
* A CDK construct to build and push Docker images to an ECR repository using CodeBuild and Lambda custom resources.
|
package/lib/index.js
CHANGED
|
@@ -21,7 +21,7 @@ const constructs_1 = require("constructs");
|
|
|
21
21
|
class TokenInjectableDockerBuilder extends constructs_1.Construct {
|
|
22
22
|
constructor(scope, id, props) {
|
|
23
23
|
super(scope, id);
|
|
24
|
-
const { path: sourcePath, buildArgs, dockerLoginSecretArn } = props;
|
|
24
|
+
const { path: sourcePath, buildArgs, dockerLoginSecretArn, vpc, securityGroups, subnetSelection, installCommands, preBuildCommands, } = props;
|
|
25
25
|
// Define a KMS key for ECR encryption
|
|
26
26
|
const encryptionKey = new aws_kms_1.Key(this, 'EcrEncryptionKey', {
|
|
27
27
|
enableKeyRotation: true,
|
|
@@ -31,8 +31,8 @@ class TokenInjectableDockerBuilder extends constructs_1.Construct {
|
|
|
31
31
|
lifecycleRules: [
|
|
32
32
|
{
|
|
33
33
|
rulePriority: 1,
|
|
34
|
-
description: 'Remove
|
|
35
|
-
tagStatus: aws_ecr_1.TagStatus.
|
|
34
|
+
description: 'Remove untagged images after 1 day',
|
|
35
|
+
tagStatus: aws_ecr_1.TagStatus.UNTAGGED,
|
|
36
36
|
maxImageAge: aws_cdk_lib_1.Duration.days(1),
|
|
37
37
|
},
|
|
38
38
|
],
|
|
@@ -73,12 +73,25 @@ class TokenInjectableDockerBuilder extends constructs_1.Construct {
|
|
|
73
73
|
environmentVariables: {
|
|
74
74
|
ECR_REPO_URI: { value: this.ecrRepository.repositoryUri },
|
|
75
75
|
BUILD_ARGS: { value: buildArgsString },
|
|
76
|
+
// Include build arguments as environment variables if needed
|
|
77
|
+
...(buildArgs &&
|
|
78
|
+
Object.fromEntries(Object.entries(buildArgs).map(([key, value]) => [key, { value }]))),
|
|
76
79
|
},
|
|
80
|
+
vpc,
|
|
81
|
+
securityGroups,
|
|
82
|
+
subnetSelection,
|
|
77
83
|
buildSpec: aws_codebuild_1.BuildSpec.fromObject({
|
|
78
84
|
version: '0.2',
|
|
79
85
|
phases: {
|
|
86
|
+
install: {
|
|
87
|
+
commands: [
|
|
88
|
+
'echo "Beginning install phase..."',
|
|
89
|
+
...(installCommands || []),
|
|
90
|
+
],
|
|
91
|
+
},
|
|
80
92
|
pre_build: {
|
|
81
93
|
commands: [
|
|
94
|
+
...(preBuildCommands || []),
|
|
82
95
|
...dockerLoginCommands,
|
|
83
96
|
'echo "Retrieving AWS Account ID..."',
|
|
84
97
|
'export ACCOUNT_ID=$(aws sts get-caller-identity --query Account --output text)',
|
|
@@ -104,7 +117,11 @@ class TokenInjectableDockerBuilder extends constructs_1.Construct {
|
|
|
104
117
|
// Grant permissions to CodeBuild
|
|
105
118
|
this.ecrRepository.grantPullPush(codeBuildProject);
|
|
106
119
|
codeBuildProject.role.addToPrincipalPolicy(new aws_iam_1.PolicyStatement({
|
|
107
|
-
actions: [
|
|
120
|
+
actions: [
|
|
121
|
+
'ecr:GetAuthorizationToken',
|
|
122
|
+
'ecr:GetDownloadUrlForLayer',
|
|
123
|
+
'ecr:BatchCheckLayerAvailability',
|
|
124
|
+
],
|
|
108
125
|
resources: [this.ecrRepository.repositoryArn],
|
|
109
126
|
}));
|
|
110
127
|
if (dockerLoginSecretArn) {
|
|
@@ -168,5 +185,5 @@ class TokenInjectableDockerBuilder extends constructs_1.Construct {
|
|
|
168
185
|
}
|
|
169
186
|
exports.TokenInjectableDockerBuilder = TokenInjectableDockerBuilder;
|
|
170
187
|
_a = JSII_RTTI_SYMBOL_1;
|
|
171
|
-
TokenInjectableDockerBuilder[_a] = { fqn: "token-injectable-docker-builder.TokenInjectableDockerBuilder", version: "1.
|
|
172
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;AAAA,iCAAiC;AACjC,6BAA6B;AAC7B,6CAAuD;AACvD,6DAAwF;AACxF,iDAAkF;AAClF,iDAAqD;AACrD,iDAAsD;AACtD,iDAA0C;AAC1C,uDAAkF;AAClF,6DAAkD;AAClD,mEAAwD;AACxD,2CAAuC;AAsCvC;;GAEG;AACH,MAAa,4BAA6B,SAAQ,sBAAS;IAKzD,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAwC;QAChF,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAEjB,MAAM,EAAE,IAAI,EAAE,UAAU,EAAE,SAAS,EAAE,oBAAoB,EAAE,GAAG,KAAK,CAAC;QAEpE,sCAAsC;QACtC,MAAM,aAAa,GAAG,IAAI,aAAG,CAAC,IAAI,EAAE,kBAAkB,EAAE;YACtD,iBAAiB,EAAE,IAAI;SACxB,CAAC,CAAC;QAEH,wFAAwF;QACxF,IAAI,CAAC,aAAa,GAAG,IAAI,oBAAU,CAAC,IAAI,EAAE,eAAe,EAAE;YACzD,cAAc,EAAE;gBACd;oBACE,YAAY,EAAE,CAAC;oBACf,WAAW,EAAE,qBAAqB;oBAClC,SAAS,EAAE,mBAAS,CAAC,GAAG;oBACxB,WAAW,EAAE,sBAAQ,CAAC,IAAI,CAAC,CAAC,CAAC;iBAC9B;aACF;YACD,UAAU,EAAE,8BAAoB,CAAC,GAAG;YACpC,aAAa,EAAE,aAAa;YAC5B,eAAe,EAAE,IAAI;SACtB,CAAC,CAAC;QAEH,sCAAsC;QACtC,MAAM,WAAW,GAAG,IAAI,qBAAK,CAAC,IAAI,EAAE,aAAa,EAAE;YACjD,IAAI,EAAE,UAAU;SACjB,CAAC,CAAC;QAEH,6DAA6D;QAC7D,MAAM,eAAe,GAAG,SAAS;YAC/B,CAAC,CAAC,MAAM,CAAC,OAAO,CAAC,SAAS,CAAC;iBACxB,GAAG,CAAC,CAAC,CAAC,GAAG,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,eAAe,GAAG,IAAI,KAAK,EAAE,CAAC;iBACpD,IAAI,CAAC,GAAG,CAAC;YACZ,CAAC,CAAC,EAAE,CAAC;QAEP,uCAAuC;QACvC,MAAM,mBAAmB,GAAG,oBAAoB;YAC9C,CAAC,CAAC;gBACA,8DAA8D;gBAC9D,qEAAqE,oBAAoB,wDAAwD;gBACjJ,qEAAqE,oBAAoB,wDAAwD;gBACjJ,gCAAgC;gBAChC,mFAAmF;aACpF;YACD,CAAC,CAAC,CAAC,6DAA6D,CAAC,CAAC;QAEpE,6BAA6B;QAC7B,MAAM,gBAAgB,GAAG,IAAI,uBAAO,CAAC,IAAI,EAAE,oBAAoB,EAAE;YAC/D,MAAM,EAAE,sBAAM,CAAC,EAAE,CAAC;gBAChB,MAAM,EAAE,WAAW,CAAC,MAAM;gBAC1B,IAAI,EAAE,WAAW,CAAC,WAAW;aAC9B,CAAC;YACF,WAAW,EAAE;gBACX,UAAU,EAAE,+BAAe,CAAC,YAAY;gBACxC,UAAU,EAAE,IAAI;aACjB;YACD,oBAAoB,EAAE;gBACpB,YAAY,EAAE,EAAE,KAAK,EAAE,IAAI,CAAC,aAAa,CAAC,aAAa,EAAE;gBACzD,UAAU,EAAE,EAAE,KAAK,EAAE,eAAe,EAAE;aACvC;YACD,SAAS,EAAE,yBAAS,CAAC,UAAU,CAAC;gBAC9B,OAAO,EAAE,KAAK;gBACd,MAAM,EAAE;oBACN,SAAS,EAAE;wBACT,QAAQ,EAAE;4BACR,GAAG,mBAAmB;4BACtB,qCAAqC;4BACrC,gFAAgF;4BAChF,oCAAoC;4BACpC,8JAA8J;yBAC/J;qBACF;oBACD,KAAK,EAAE;wBACL,QAAQ,EAAE;4BACR,gDAAgD;4BAChD,qEAAqE;yBACtE;qBACF;oBACD,UAAU,EAAE;wBACV,QAAQ,EAAE;4BACR,oDAAoD;4BACpD,kCAAkC;yBACnC;qBACF;iBACF;aACF,CAAC;SACH,CAAC,CAAC;QAEH,iCAAiC;QACjC,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC,gBAAgB,CAAC,CAAC;QAEnD,gBAAgB,CAAC,IAAK,CAAC,oBAAoB,CACzC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE,CAAC,2BAA2B,EAAE,4BAA4B,EAAE,iCAAiC,CAAC;YACvG,SAAS,EAAE,CAAC,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC;SAC9C,CAAC,CACH,CAAC;QAEF,IAAI,oBAAoB,EAAE,CAAC;YACzB,gBAAgB,CAAC,IAAK,CAAC,oBAAoB,CACzC,IAAI,yBAAe,CAAC;gBAClB,OAAO,EAAE,CAAC,+BAA+B,CAAC;gBAC1C,SAAS,EAAE,CAAC,oBAAoB,CAAC;aAClC,CAAC,CACH,CAAC;QACJ,CAAC;QAED,wCAAwC;QACxC,aAAa,CAAC,mBAAmB,CAAC,gBAAgB,CAAC,IAAK,CAAC,CAAC;QAE1D,8DAA8D;QAC9D,MAAM,sBAAsB,GAAG,IAAI,qBAAQ,CAAC,IAAI,EAAE,wBAAwB,EAAE;YAC1E,OAAO,EAAE,oBAAO,CAAC,WAAW;YAC5B,IAAI,EAAE,iBAAI,CAAC,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,SAAS,EAAE,YAAY,CAAC,CAAC;YAC3D,OAAO,EAAE,iBAAiB;YAC1B,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SAC9B,CAAC,CAAC;QAEH,sBAAsB,CAAC,eAAe,CACpC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE,CAAC,sBAAsB,CAAC;YACjC,SAAS,EAAE,CAAC,gBAAgB,CAAC,UAAU,CAAC,EAAE,+BAA+B;SAC1E,CAAC,CACH,CAAC;QACF,MAAM,yBAAyB,GAAG,IAAI,qBAAQ,CAAC,IAAI,EAAE,2BAA2B,EAAE;YAChF,OAAO,EAAE,oBAAO,CAAC,WAAW;YAC5B,IAAI,EAAE,iBAAI,CAAC,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,SAAS,EAAE,eAAe,CAAC,CAAC;YAC9D,OAAO,EAAE,oBAAoB;YAC7B,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SAC9B,CAAC,CAAC;QAEH,yBAAyB,CAAC,eAAe,CACvC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE;gBACP,0BAA0B;gBAC1B,gCAAgC;gBAChC,mBAAmB;gBACnB,yBAAyB;gBACzB,wBAAwB;aACzB;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CACH,CAAC;QAEF,mDAAmD;QACnD,aAAa,CAAC,mBAAmB,CAAC,sBAAsB,CAAC,CAAC;QAC1D,aAAa,CAAC,mBAAmB,CAAC,yBAAyB,CAAC,CAAC;QAC7D,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC,sBAAsB,CAAC,CAAC;QACzD,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC,yBAAyB,CAAC,CAAC;QAE5D,oCAAoC;QACpC,MAAM,QAAQ,GAAG,IAAI,2BAAQ,CAAC,IAAI,EAAE,wBAAwB,EAAE;YAC5D,cAAc,EAAE,sBAAsB;YACtC,iBAAiB,EAAE,yBAAyB;YAC5C,aAAa,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SACpC,CAAC,CAAC;QAEH,6BAA6B;QAC7B,MAAM,oBAAoB,GAAG,IAAI,4BAAc,CAAC,IAAI,EAAE,sBAAsB,EAAE;YAC5E,YAAY,EAAE,QAAQ,CAAC,YAAY;YACnC,UAAU,EAAE;gBACV,WAAW,EAAE,gBAAgB,CAAC,WAAW;gBACzC,OAAO,EAAE,MAAM,CAAC,UAAU,EAAE;aAC7B;SACF,CAAC,CAAC;QAEH,oBAAoB,CAAC,IAAI,CAAC,aAAa,CAAC,gBAAgB,CAAC,CAAC;QAC1D,IAAI,CAAC,cAAc,GAAG,wBAAc,CAAC,iBAAiB,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;QAC3E,IAAI,CAAC,eAAe,GAAG,4BAAe,CAAC,OAAO,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;IACrE,CAAC;;AAhLH,oEAiLC","sourcesContent":["import * as crypto from 'crypto';\nimport * as path from 'path';\nimport { CustomResource, Duration } from 'aws-cdk-lib';\nimport { Project, Source, LinuxBuildImage, BuildSpec } from 'aws-cdk-lib/aws-codebuild';\nimport { Repository, RepositoryEncryption, TagStatus } from 'aws-cdk-lib/aws-ecr';\nimport { ContainerImage } from 'aws-cdk-lib/aws-ecs';\nimport { PolicyStatement } from 'aws-cdk-lib/aws-iam';\nimport { Key } from 'aws-cdk-lib/aws-kms';\nimport { Runtime, Code, DockerImageCode, Function } from 'aws-cdk-lib/aws-lambda';\nimport { Asset } from 'aws-cdk-lib/aws-s3-assets';\nimport { Provider } from 'aws-cdk-lib/custom-resources';\nimport { Construct } from 'constructs';\n\n/**\n * Properties for the `TokenInjectableDockerBuilder` construct.\n */\nexport interface TokenInjectableDockerBuilderProps {\n  /**\n   * The path to the directory containing the Dockerfile or source code.\n   */\n  readonly path: string;\n\n  /**\n   * Build arguments to pass to the Docker build process.\n   * These are transformed into `--build-arg` flags.\n   * @example\n   * {\n   *   TOKEN: 'my-secret-token',\n   *   ENV: 'production'\n   * }\n   */\n  readonly buildArgs?: { [key: string]: string };\n\n  /**\n   * The ARN of the AWS Secrets Manager secret containing Docker login credentials.\n   * This secret should store a JSON object with the following structure:\n   * ```json\n   * {\n   *   \"username\": \"my-docker-username\",\n   *   \"password\": \"my-docker-password\"\n   * }\n   * ```\n   * If not provided, the construct will skip Docker login during the build process.\n   *\n   * @example 'arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret'\n   */\n  readonly dockerLoginSecretArn?: string;\n}\n\n/**\n * A CDK construct to build and push Docker images to an ECR repository using CodeBuild and Lambda custom resources.\n */\nexport class TokenInjectableDockerBuilder extends Construct {\n  private readonly ecrRepository: Repository;\n  public readonly containerImage: ContainerImage;\n  public readonly dockerImageCode: DockerImageCode;\n\n  constructor(scope: Construct, id: string, props: TokenInjectableDockerBuilderProps) {\n    super(scope, id);\n\n    const { path: sourcePath, buildArgs, dockerLoginSecretArn } = props;\n\n    // Define a KMS key for ECR encryption\n    const encryptionKey = new Key(this, 'EcrEncryptionKey', {\n      enableKeyRotation: true,\n    });\n\n    // Create an ECR repository with lifecycle rules, encryption, and image scanning enabled\n    this.ecrRepository = new Repository(this, 'ECRRepository', {\n      lifecycleRules: [\n        {\n          rulePriority: 1,\n          description: 'Remove stale images',\n          tagStatus: TagStatus.ANY,\n          maxImageAge: Duration.days(1),\n        },\n      ],\n      encryption: RepositoryEncryption.KMS,\n      encryptionKey: encryptionKey,\n      imageScanOnPush: true,\n    });\n\n    // Package the source code as an asset\n    const sourceAsset = new Asset(this, 'SourceAsset', {\n      path: sourcePath,\n    });\n\n    // Transform buildArgs into a string of --build-arg KEY=VALUE\n    const buildArgsString = buildArgs\n      ? Object.entries(buildArgs)\n        .map(([key, value]) => `--build-arg ${key}=${value}`)\n        .join(' ')\n      : '';\n\n    // Conditional Dockerhub login commands\n    const dockerLoginCommands = dockerLoginSecretArn\n      ? [\n        'echo \"Retrieving Docker credentials from Secrets Manager...\"',\n        `DOCKER_USERNAME=$(aws secretsmanager get-secret-value --secret-id ${dockerLoginSecretArn} --query SecretString --output text | jq -r .username)`,\n        `DOCKER_PASSWORD=$(aws secretsmanager get-secret-value --secret-id ${dockerLoginSecretArn} --query SecretString --output text | jq -r .password)`,\n        'echo \"Logging in to Docker...\"',\n        'echo $DOCKER_PASSWORD | docker login --username $DOCKER_USERNAME --password-stdin',\n      ]\n      : ['echo \"No Docker credentials provided. Skipping login step.\"'];\n\n    // Create a CodeBuild project\n    const codeBuildProject = new Project(this, 'UICodeBuildProject', {\n      source: Source.s3({\n        bucket: sourceAsset.bucket,\n        path: sourceAsset.s3ObjectKey,\n      }),\n      environment: {\n        buildImage: LinuxBuildImage.STANDARD_7_0,\n        privileged: true,\n      },\n      environmentVariables: {\n        ECR_REPO_URI: { value: this.ecrRepository.repositoryUri },\n        BUILD_ARGS: { value: buildArgsString },\n      },\n      buildSpec: BuildSpec.fromObject({\n        version: '0.2',\n        phases: {\n          pre_build: {\n            commands: [\n              ...dockerLoginCommands,\n              'echo \"Retrieving AWS Account ID...\"',\n              'export ACCOUNT_ID=$(aws sts get-caller-identity --query Account --output text)',\n              'echo \"Logging in to Amazon ECR...\"',\n              'aws ecr get-login-password --region $AWS_DEFAULT_REGION | docker login --username AWS --password-stdin $ACCOUNT_ID.dkr.ecr.$AWS_DEFAULT_REGION.amazonaws.com',\n            ],\n          },\n          build: {\n            commands: [\n              'echo Build phase: Building the Docker image...',\n              'docker build $BUILD_ARGS -t $ECR_REPO_URI:latest $CODEBUILD_SRC_DIR',\n            ],\n          },\n          post_build: {\n            commands: [\n              'echo Post-build phase: Pushing the Docker image...',\n              'docker push $ECR_REPO_URI:latest',\n            ],\n          },\n        },\n      }),\n    });\n\n    // Grant permissions to CodeBuild\n    this.ecrRepository.grantPullPush(codeBuildProject);\n\n    codeBuildProject.role!.addToPrincipalPolicy(\n      new PolicyStatement({\n        actions: ['ecr:GetAuthorizationToken', 'ecr:GetDownloadUrlForLayer', 'ecr:BatchCheckLayerAvailability'],\n        resources: [this.ecrRepository.repositoryArn],\n      }),\n    );\n\n    if (dockerLoginSecretArn) {\n      codeBuildProject.role!.addToPrincipalPolicy(\n        new PolicyStatement({\n          actions: ['secretsmanager:GetSecretValue'],\n          resources: [dockerLoginSecretArn],\n        }),\n      );\n    }\n\n    // Grant CodeBuild access to the KMS key\n    encryptionKey.grantEncryptDecrypt(codeBuildProject.role!);\n\n    // Create Lambda functions for onEvent and isComplete handlers\n    const onEventHandlerFunction = new Function(this, 'OnEventHandlerFunction', {\n      runtime: Runtime.NODEJS_18_X,\n      code: Code.fromAsset(path.resolve(__dirname, '../onEvent')),\n      handler: 'onEvent.handler',\n      timeout: Duration.minutes(15),\n    });\n\n    onEventHandlerFunction.addToRolePolicy(\n      new PolicyStatement({\n        actions: ['codebuild:StartBuild'],\n        resources: [codeBuildProject.projectArn], // Restrict to specific project\n      }),\n    );\n    const isCompleteHandlerFunction = new Function(this, 'IsCompleteHandlerFunction', {\n      runtime: Runtime.NODEJS_18_X,\n      code: Code.fromAsset(path.resolve(__dirname, '../isComplete')),\n      handler: 'isComplete.handler',\n      timeout: Duration.minutes(15),\n    });\n\n    isCompleteHandlerFunction.addToRolePolicy(\n      new PolicyStatement({\n        actions: [\n          'codebuild:BatchGetBuilds',\n          'codebuild:ListBuildsForProject',\n          'logs:GetLogEvents',\n          'logs:DescribeLogStreams',\n          'logs:DescribeLogGroups',\n        ],\n        resources: ['*'],\n      }),\n    );\n\n    // Grant Lambda functions access to KMS key and ECR\n    encryptionKey.grantEncryptDecrypt(onEventHandlerFunction);\n    encryptionKey.grantEncryptDecrypt(isCompleteHandlerFunction);\n    this.ecrRepository.grantPullPush(onEventHandlerFunction);\n    this.ecrRepository.grantPullPush(isCompleteHandlerFunction);\n\n    // Create a custom resource provider\n    const provider = new Provider(this, 'CustomResourceProvider', {\n      onEventHandler: onEventHandlerFunction,\n      isCompleteHandler: isCompleteHandlerFunction,\n      queryInterval: Duration.seconds(30),\n    });\n\n    // Define the custom resource\n    const buildTriggerResource = new CustomResource(this, 'BuildTriggerResource', {\n      serviceToken: provider.serviceToken,\n      properties: {\n        ProjectName: codeBuildProject.projectName,\n        Trigger: crypto.randomUUID(),\n      },\n    });\n\n    buildTriggerResource.node.addDependency(codeBuildProject);\n    this.containerImage = ContainerImage.fromEcrRepository(this.ecrRepository);\n    this.dockerImageCode = DockerImageCode.fromEcr(this.ecrRepository);\n  }\n}\n"]}
|
|
188
|
+
TokenInjectableDockerBuilder[_a] = { fqn: "token-injectable-docker-builder.TokenInjectableDockerBuilder", version: "1.2.0" };
|
|
189
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;AAAA,iCAAiC;AACjC,6BAA6B;AAC7B,6CAAuD;AACvD,6DAAwF;AAExF,iDAAkF;AAClF,iDAAqD;AACrD,iDAAsD;AACtD,iDAA0C;AAC1C,uDAAkF;AAClF,6DAAkD;AAClD,mEAAwD;AACxD,2CAAuC;AAsGvC;;GAEG;AACH,MAAa,4BAA6B,SAAQ,sBAAS;IAKzD,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAwC;QAChF,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAEjB,MAAM,EACJ,IAAI,EAAE,UAAU,EAChB,SAAS,EACT,oBAAoB,EACpB,GAAG,EACH,cAAc,EACd,eAAe,EACf,eAAe,EACf,gBAAgB,GACjB,GAAG,KAAK,CAAC;QAEV,sCAAsC;QACtC,MAAM,aAAa,GAAG,IAAI,aAAG,CAAC,IAAI,EAAE,kBAAkB,EAAE;YACtD,iBAAiB,EAAE,IAAI;SACxB,CAAC,CAAC;QAEH,wFAAwF;QACxF,IAAI,CAAC,aAAa,GAAG,IAAI,oBAAU,CAAC,IAAI,EAAE,eAAe,EAAE;YACzD,cAAc,EAAE;gBACd;oBACE,YAAY,EAAE,CAAC;oBACf,WAAW,EAAE,oCAAoC;oBACjD,SAAS,EAAE,mBAAS,CAAC,QAAQ;oBAC7B,WAAW,EAAE,sBAAQ,CAAC,IAAI,CAAC,CAAC,CAAC;iBAC9B;aACF;YACD,UAAU,EAAE,8BAAoB,CAAC,GAAG;YACpC,aAAa,EAAE,aAAa;YAC5B,eAAe,EAAE,IAAI;SACtB,CAAC,CAAC;QAEH,sCAAsC;QACtC,MAAM,WAAW,GAAG,IAAI,qBAAK,CAAC,IAAI,EAAE,aAAa,EAAE;YACjD,IAAI,EAAE,UAAU;SACjB,CAAC,CAAC;QAEH,6DAA6D;QAC7D,MAAM,eAAe,GAAG,SAAS;YAC/B,CAAC,CAAC,MAAM,CAAC,OAAO,CAAC,SAAS,CAAC;iBACxB,GAAG,CAAC,CAAC,CAAC,GAAG,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,eAAe,GAAG,IAAI,KAAK,EAAE,CAAC;iBACpD,IAAI,CAAC,GAAG,CAAC;YACZ,CAAC,CAAC,EAAE,CAAC;QAEP,uCAAuC;QACvC,MAAM,mBAAmB,GAAG,oBAAoB;YAC9C,CAAC,CAAC;gBACA,8DAA8D;gBAC9D,qEAAqE,oBAAoB,wDAAwD;gBACjJ,qEAAqE,oBAAoB,wDAAwD;gBACjJ,gCAAgC;gBAChC,mFAAmF;aACpF;YACD,CAAC,CAAC,CAAC,6DAA6D,CAAC,CAAC;QAEpE,6BAA6B;QAC7B,MAAM,gBAAgB,GAAG,IAAI,uBAAO,CAAC,IAAI,EAAE,oBAAoB,EAAE;YAC/D,MAAM,EAAE,sBAAM,CAAC,EAAE,CAAC;gBAChB,MAAM,EAAE,WAAW,CAAC,MAAM;gBAC1B,IAAI,EAAE,WAAW,CAAC,WAAW;aAC9B,CAAC;YACF,WAAW,EAAE;gBACX,UAAU,EAAE,+BAAe,CAAC,YAAY;gBACxC,UAAU,EAAE,IAAI;aACjB;YACD,oBAAoB,EAAE;gBACpB,YAAY,EAAE,EAAE,KAAK,EAAE,IAAI,CAAC,aAAa,CAAC,aAAa,EAAE;gBACzD,UAAU,EAAE,EAAE,KAAK,EAAE,eAAe,EAAE;gBACtC,6DAA6D;gBAC7D,GAAG,CAAC,SAAS;oBACX,MAAM,CAAC,WAAW,CAChB,MAAM,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,GAAG,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,CAAC,GAAG,EAAE,EAAE,KAAK,EAAE,CAAC,CAAC,CAClE,CAAC;aACL;YACD,GAAG;YACH,cAAc;YACd,eAAe;YACf,SAAS,EAAE,yBAAS,CAAC,UAAU,CAAC;gBAC9B,OAAO,EAAE,KAAK;gBACd,MAAM,EAAE;oBACN,OAAO,EAAE;wBACP,QAAQ,EAAE;4BACR,mCAAmC;4BACnC,GAAG,CAAC,eAAe,IAAI,EAAE,CAAC;yBAC3B;qBACF;oBACD,SAAS,EAAE;wBACT,QAAQ,EAAE;4BACR,GAAG,CAAC,gBAAgB,IAAI,EAAE,CAAC;4BAC3B,GAAG,mBAAmB;4BACtB,qCAAqC;4BACrC,gFAAgF;4BAChF,oCAAoC;4BACpC,8JAA8J;yBAC/J;qBACF;oBACD,KAAK,EAAE;wBACL,QAAQ,EAAE;4BACR,gDAAgD;4BAChD,qEAAqE;yBACtE;qBACF;oBACD,UAAU,EAAE;wBACV,QAAQ,EAAE;4BACR,oDAAoD;4BACpD,kCAAkC;yBACnC;qBACF;iBACF;aACF,CAAC;SACH,CAAC,CAAC;QAEH,iCAAiC;QACjC,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC,gBAAgB,CAAC,CAAC;QAEnD,gBAAgB,CAAC,IAAK,CAAC,oBAAoB,CACzC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE;gBACP,2BAA2B;gBAC3B,4BAA4B;gBAC5B,iCAAiC;aAClC;YACD,SAAS,EAAE,CAAC,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC;SAC9C,CAAC,CACH,CAAC;QAEF,IAAI,oBAAoB,EAAE,CAAC;YACzB,gBAAgB,CAAC,IAAK,CAAC,oBAAoB,CACzC,IAAI,yBAAe,CAAC;gBAClB,OAAO,EAAE,CAAC,+BAA+B,CAAC;gBAC1C,SAAS,EAAE,CAAC,oBAAoB,CAAC;aAClC,CAAC,CACH,CAAC;QACJ,CAAC;QAED,wCAAwC;QACxC,aAAa,CAAC,mBAAmB,CAAC,gBAAgB,CAAC,IAAK,CAAC,CAAC;QAE1D,8DAA8D;QAC9D,MAAM,sBAAsB,GAAG,IAAI,qBAAQ,CAAC,IAAI,EAAE,wBAAwB,EAAE;YAC1E,OAAO,EAAE,oBAAO,CAAC,WAAW;YAC5B,IAAI,EAAE,iBAAI,CAAC,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,SAAS,EAAE,YAAY,CAAC,CAAC;YAC3D,OAAO,EAAE,iBAAiB;YAC1B,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SAC9B,CAAC,CAAC;QAEH,sBAAsB,CAAC,eAAe,CACpC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE,CAAC,sBAAsB,CAAC;YACjC,SAAS,EAAE,CAAC,gBAAgB,CAAC,UAAU,CAAC,EAAE,+BAA+B;SAC1E,CAAC,CACH,CAAC;QAEF,MAAM,yBAAyB,GAAG,IAAI,qBAAQ,CAAC,IAAI,EAAE,2BAA2B,EAAE;YAChF,OAAO,EAAE,oBAAO,CAAC,WAAW;YAC5B,IAAI,EAAE,iBAAI,CAAC,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,SAAS,EAAE,eAAe,CAAC,CAAC;YAC9D,OAAO,EAAE,oBAAoB;YAC7B,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SAC9B,CAAC,CAAC;QAEH,yBAAyB,CAAC,eAAe,CACvC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE;gBACP,0BAA0B;gBAC1B,gCAAgC;gBAChC,mBAAmB;gBACnB,yBAAyB;gBACzB,wBAAwB;aACzB;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CACH,CAAC;QAEF,mDAAmD;QACnD,aAAa,CAAC,mBAAmB,CAAC,sBAAsB,CAAC,CAAC;QAC1D,aAAa,CAAC,mBAAmB,CAAC,yBAAyB,CAAC,CAAC;QAC7D,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC,sBAAsB,CAAC,CAAC;QACzD,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC,yBAAyB,CAAC,CAAC;QAE5D,oCAAoC;QACpC,MAAM,QAAQ,GAAG,IAAI,2BAAQ,CAAC,IAAI,EAAE,wBAAwB,EAAE;YAC5D,cAAc,EAAE,sBAAsB;YACtC,iBAAiB,EAAE,yBAAyB;YAC5C,aAAa,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SACpC,CAAC,CAAC;QAEH,6BAA6B;QAC7B,MAAM,oBAAoB,GAAG,IAAI,4BAAc,CAAC,IAAI,EAAE,sBAAsB,EAAE;YAC5E,YAAY,EAAE,QAAQ,CAAC,YAAY;YACnC,UAAU,EAAE;gBACV,WAAW,EAAE,gBAAgB,CAAC,WAAW;gBACzC,OAAO,EAAE,MAAM,CAAC,UAAU,EAAE;aAC7B;SACF,CAAC,CAAC;QAEH,oBAAoB,CAAC,IAAI,CAAC,aAAa,CAAC,gBAAgB,CAAC,CAAC;QAC1D,IAAI,CAAC,cAAc,GAAG,wBAAc,CAAC,iBAAiB,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;QAC3E,IAAI,CAAC,eAAe,GAAG,4BAAe,CAAC,OAAO,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;IACrE,CAAC;;AA7MH,oEA8MC","sourcesContent":["import * as crypto from 'crypto';\nimport * as path from 'path';\nimport { CustomResource, Duration } from 'aws-cdk-lib';\nimport { Project, Source, LinuxBuildImage, BuildSpec } from 'aws-cdk-lib/aws-codebuild';\nimport { IVpc, ISecurityGroup, SubnetSelection } from 'aws-cdk-lib/aws-ec2';\nimport { Repository, RepositoryEncryption, TagStatus } from 'aws-cdk-lib/aws-ecr';\nimport { ContainerImage } from 'aws-cdk-lib/aws-ecs';\nimport { PolicyStatement } from 'aws-cdk-lib/aws-iam';\nimport { Key } from 'aws-cdk-lib/aws-kms';\nimport { Runtime, Code, DockerImageCode, Function } from 'aws-cdk-lib/aws-lambda';\nimport { Asset } from 'aws-cdk-lib/aws-s3-assets';\nimport { Provider } from 'aws-cdk-lib/custom-resources';\nimport { Construct } from 'constructs';\n\n/**\n * Properties for the `TokenInjectableDockerBuilder` construct.\n */\nexport interface TokenInjectableDockerBuilderProps {\n  /**\n   * The path to the directory containing the Dockerfile or source code.\n   */\n  readonly path: string;\n\n  /**\n   * Build arguments to pass to the Docker build process.\n   * These are transformed into `--build-arg` flags.\n   * @example\n   * {\n   *   TOKEN: 'my-secret-token',\n   *   ENV: 'production'\n   * }\n   */\n  readonly buildArgs?: { [key: string]: string };\n\n  /**\n   * The ARN of the AWS Secrets Manager secret containing Docker login credentials.\n   * This secret should store a JSON object with the following structure:\n   * ```json\n   * {\n   *   \"username\": \"my-docker-username\",\n   *   \"password\": \"my-docker-password\"\n   * }\n   * ```\n   * If not provided, the construct will skip Docker login during the build process.\n   *\n   * @example 'arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret'\n   */\n  readonly dockerLoginSecretArn?: string;\n\n  /**\n   * The VPC in which the CodeBuild project will be deployed.\n   * If provided, the CodeBuild project will be launched within the specified VPC.\n   * @default No VPC is attached, and the CodeBuild project will use public internet.\n   */\n  readonly vpc?: IVpc;\n\n  /**\n   * The security groups to attach to the CodeBuild project.\n   * These should define the network access rules for the CodeBuild project.\n   * @default No security groups are attached.\n   */\n  readonly securityGroups?: ISecurityGroup[];\n\n  /**\n   * The subnet selection to specify which subnets to use within the VPC.\n   * Allows the user to select private, public, or isolated subnets.\n   * @default All subnets in the VPC are used.\n   */\n  readonly subnetSelection?: SubnetSelection;\n\n  /**\n   * Custom commands to run during the install phase.\n   *\n   * **Example Usage:**\n   * ```typescript\n   * new TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {\n   *   path: path.resolve(__dirname, '../app'),\n   *   installCommands: [\n   *     'echo \"Updating package lists...\"',\n   *     'apt-get update -y',\n   *     'echo \"Installing required packages...\"',\n   *     'apt-get install -y curl dnsutils',\n   *   ],\n   *   // ... other properties ...\n   * });\n   * ```\n   * *This example demonstrates how to install the `curl` and `dnsutils` packages during the install phase using `apt-get`, the package manager for Ubuntu-based CodeBuild environments.*\n   *\n   * @default - No additional install commands.\n   */\n  readonly installCommands?: string[];\n\n\n  /**\n   * Custom commands to run during the pre_build phase.\n   *\n   * **Example Usage:**\n   * ```typescript\n   * new TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {\n   *   path: path.resolve(__dirname, '../app'),\n   *   preBuildCommands: [\n   *     'echo \"Fetching configuration from private API...\"',\n   *     'curl -o config.json https://api.example.com/config',\n   *   ],\n   *   // ... other properties ...\n   * });\n   * ```\n   * *In this example, the builder fetches a configuration file from a private API before starting the Docker build. This config file will be available in the same directory as your Dockerfile during CDK deployment.*\n   *\n   * @default - No additional pre-build commands.\n   */\n  readonly preBuildCommands?: string[];\n}\n\n/**\n * A CDK construct to build and push Docker images to an ECR repository using CodeBuild and Lambda custom resources.\n */\nexport class TokenInjectableDockerBuilder extends Construct {\n  private readonly ecrRepository: Repository;\n  public readonly containerImage: ContainerImage;\n  public readonly dockerImageCode: DockerImageCode;\n\n  constructor(scope: Construct, id: string, props: TokenInjectableDockerBuilderProps) {\n    super(scope, id);\n\n    const {\n      path: sourcePath,\n      buildArgs,\n      dockerLoginSecretArn,\n      vpc,\n      securityGroups,\n      subnetSelection,\n      installCommands,\n      preBuildCommands,\n    } = props;\n\n    // Define a KMS key for ECR encryption\n    const encryptionKey = new Key(this, 'EcrEncryptionKey', {\n      enableKeyRotation: true,\n    });\n\n    // Create an ECR repository with lifecycle rules, encryption, and image scanning enabled\n    this.ecrRepository = new Repository(this, 'ECRRepository', {\n      lifecycleRules: [\n        {\n          rulePriority: 1,\n          description: 'Remove untagged images after 1 day',\n          tagStatus: TagStatus.UNTAGGED,\n          maxImageAge: Duration.days(1),\n        },\n      ],\n      encryption: RepositoryEncryption.KMS,\n      encryptionKey: encryptionKey,\n      imageScanOnPush: true,\n    });\n\n    // Package the source code as an asset\n    const sourceAsset = new Asset(this, 'SourceAsset', {\n      path: sourcePath,\n    });\n\n    // Transform buildArgs into a string of --build-arg KEY=VALUE\n    const buildArgsString = buildArgs\n      ? Object.entries(buildArgs)\n        .map(([key, value]) => `--build-arg ${key}=${value}`)\n        .join(' ')\n      : '';\n\n    // Conditional Dockerhub login commands\n    const dockerLoginCommands = dockerLoginSecretArn\n      ? [\n        'echo \"Retrieving Docker credentials from Secrets Manager...\"',\n        `DOCKER_USERNAME=$(aws secretsmanager get-secret-value --secret-id ${dockerLoginSecretArn} --query SecretString --output text | jq -r .username)`,\n        `DOCKER_PASSWORD=$(aws secretsmanager get-secret-value --secret-id ${dockerLoginSecretArn} --query SecretString --output text | jq -r .password)`,\n        'echo \"Logging in to Docker...\"',\n        'echo $DOCKER_PASSWORD | docker login --username $DOCKER_USERNAME --password-stdin',\n      ]\n      : ['echo \"No Docker credentials provided. Skipping login step.\"'];\n\n    // Create a CodeBuild project\n    const codeBuildProject = new Project(this, 'UICodeBuildProject', {\n      source: Source.s3({\n        bucket: sourceAsset.bucket,\n        path: sourceAsset.s3ObjectKey,\n      }),\n      environment: {\n        buildImage: LinuxBuildImage.STANDARD_7_0,\n        privileged: true,\n      },\n      environmentVariables: {\n        ECR_REPO_URI: { value: this.ecrRepository.repositoryUri },\n        BUILD_ARGS: { value: buildArgsString },\n        // Include build arguments as environment variables if needed\n        ...(buildArgs &&\n          Object.fromEntries(\n            Object.entries(buildArgs).map(([key, value]) => [key, { value }]),\n          )),\n      },\n      vpc,\n      securityGroups,\n      subnetSelection,\n      buildSpec: BuildSpec.fromObject({\n        version: '0.2',\n        phases: {\n          install: {\n            commands: [\n              'echo \"Beginning install phase...\"',\n              ...(installCommands || []),\n            ],\n          },\n          pre_build: {\n            commands: [\n              ...(preBuildCommands || []),\n              ...dockerLoginCommands,\n              'echo \"Retrieving AWS Account ID...\"',\n              'export ACCOUNT_ID=$(aws sts get-caller-identity --query Account --output text)',\n              'echo \"Logging in to Amazon ECR...\"',\n              'aws ecr get-login-password --region $AWS_DEFAULT_REGION | docker login --username AWS --password-stdin $ACCOUNT_ID.dkr.ecr.$AWS_DEFAULT_REGION.amazonaws.com',\n            ],\n          },\n          build: {\n            commands: [\n              'echo Build phase: Building the Docker image...',\n              'docker build $BUILD_ARGS -t $ECR_REPO_URI:latest $CODEBUILD_SRC_DIR',\n            ],\n          },\n          post_build: {\n            commands: [\n              'echo Post-build phase: Pushing the Docker image...',\n              'docker push $ECR_REPO_URI:latest',\n            ],\n          },\n        },\n      }),\n    });\n\n    // Grant permissions to CodeBuild\n    this.ecrRepository.grantPullPush(codeBuildProject);\n\n    codeBuildProject.role!.addToPrincipalPolicy(\n      new PolicyStatement({\n        actions: [\n          'ecr:GetAuthorizationToken',\n          'ecr:GetDownloadUrlForLayer',\n          'ecr:BatchCheckLayerAvailability',\n        ],\n        resources: [this.ecrRepository.repositoryArn],\n      }),\n    );\n\n    if (dockerLoginSecretArn) {\n      codeBuildProject.role!.addToPrincipalPolicy(\n        new PolicyStatement({\n          actions: ['secretsmanager:GetSecretValue'],\n          resources: [dockerLoginSecretArn],\n        }),\n      );\n    }\n\n    // Grant CodeBuild access to the KMS key\n    encryptionKey.grantEncryptDecrypt(codeBuildProject.role!);\n\n    // Create Lambda functions for onEvent and isComplete handlers\n    const onEventHandlerFunction = new Function(this, 'OnEventHandlerFunction', {\n      runtime: Runtime.NODEJS_18_X,\n      code: Code.fromAsset(path.resolve(__dirname, '../onEvent')),\n      handler: 'onEvent.handler',\n      timeout: Duration.minutes(15),\n    });\n\n    onEventHandlerFunction.addToRolePolicy(\n      new PolicyStatement({\n        actions: ['codebuild:StartBuild'],\n        resources: [codeBuildProject.projectArn], // Restrict to specific project\n      }),\n    );\n\n    const isCompleteHandlerFunction = new Function(this, 'IsCompleteHandlerFunction', {\n      runtime: Runtime.NODEJS_18_X,\n      code: Code.fromAsset(path.resolve(__dirname, '../isComplete')),\n      handler: 'isComplete.handler',\n      timeout: Duration.minutes(15),\n    });\n\n    isCompleteHandlerFunction.addToRolePolicy(\n      new PolicyStatement({\n        actions: [\n          'codebuild:BatchGetBuilds',\n          'codebuild:ListBuildsForProject',\n          'logs:GetLogEvents',\n          'logs:DescribeLogStreams',\n          'logs:DescribeLogGroups',\n        ],\n        resources: ['*'],\n      }),\n    );\n\n    // Grant Lambda functions access to KMS key and ECR\n    encryptionKey.grantEncryptDecrypt(onEventHandlerFunction);\n    encryptionKey.grantEncryptDecrypt(isCompleteHandlerFunction);\n    this.ecrRepository.grantPullPush(onEventHandlerFunction);\n    this.ecrRepository.grantPullPush(isCompleteHandlerFunction);\n\n    // Create a custom resource provider\n    const provider = new Provider(this, 'CustomResourceProvider', {\n      onEventHandler: onEventHandlerFunction,\n      isCompleteHandler: isCompleteHandlerFunction,\n      queryInterval: Duration.seconds(30),\n    });\n\n    // Define the custom resource\n    const buildTriggerResource = new CustomResource(this, 'BuildTriggerResource', {\n      serviceToken: provider.serviceToken,\n      properties: {\n        ProjectName: codeBuildProject.projectName,\n        Trigger: crypto.randomUUID(),\n      },\n    });\n\n    buildTriggerResource.node.addDependency(codeBuildProject);\n    this.containerImage = ContainerImage.fromEcrRepository(this.ecrRepository);\n    this.dockerImageCode = DockerImageCode.fromEcr(this.ecrRepository);\n  }\n}\n"]}
|