token-injectable-docker-builder 1.1.3 → 1.2.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/.jsii CHANGED
@@ -3898,7 +3898,7 @@
3898
3898
  },
3899
3899
  "name": "token-injectable-docker-builder",
3900
3900
  "readme": {
3901
- "markdown": "# TokenInjectableDockerBuilder\n\nThe `TokenInjectableDockerBuilder` is a flexible AWS CDK construct that enables the usage of AWS CDK tokens in the building, pushing, and deployment of Docker images to Amazon Elastic Container Registry (ECR). It leverages AWS CodeBuild and Lambda custom resources.\n\n---\n\n## Why?\n\nAWS CDK already provides mechanisms for creating deployable assets using Docker, such as [DockerImageAsset](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_ecr_assets.DockerImageAsset.html) and [DockerImageCode](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_lambda.DockerImageCode.html), but these Constructs are limited because they cannot accept CDK tokens as build-args. The `TokenInjectableDockerBuilder` allows injecting CDK tokens as build-time arguments into Docker-based assets, enabling more dynamic dependency relationships.\n\nFor example, a Next.js frontend Docker image may require an API Gateway URL. With this construct, you can deploy the API Gateway first, then pass its URL as a build-time argument to the Next.js Docker image.\n\n---\n\n## Features\n\n- Automatically builds and pushes Docker images to ECR.\n- Supports custom build arguments for Docker builds, including CDK tokens resolved at deployment time.\n- Retrieves Docker images for use in ECS or Lambda.\n\n---\n\n## Installation\n\n### For NPM\n\nInstall the construct using NPM:\n\n```bash\nnpm install token-injectable-docker-builder\n```\n\n### For Python\n\nInstall the construct using pip:\n\n```bash\npip install token-injectable-docker-builder\n```\n\n---\n\n## Constructor\n\n### `TokenInjectableDockerBuilder`\n\n#### Parameters\n\n- **`scope`**: The construct's parent scope.\n- **`id`**: The construct ID.\n- **`props`**: Configuration properties.\n\n#### Properties in `TokenInjectableDockerBuilderProps`\n\n| Property | Type | Required | Description |\n|------------------------|--------------------|----------|-------------------------------------------------------------------------------------------------------|\n| `path` | `string` | Yes | The file path to the Dockerfile or source code directory. |\n| `buildArgs` | `{ [key: string]: string }` | No | Build arguments to pass to the Docker build process. |\n| `dockerLoginSecretArn` | `string` | No | ARN of an AWS Secrets Manager secret for Docker credentials. Skips login if not provided. |\n\n---\n\n## Usage Examples\n\n### TypeScript/NPM Example\n\nHere is how to use `TokenInjectableDockerBuilder` in an AWS CDK project with TypeScript:\n\n```typescript\nimport * as cdk from 'aws-cdk-lib';\nimport { TokenInjectableDockerBuilder } from 'token-injectable-docker-builder';\nimport * as ecs from 'aws-cdk-lib/aws-ecs';\nimport * as lambda from 'aws-cdk-lib/aws-lambda';\n\nexport class MyStack extends cdk.Stack {\n constructor(scope: cdk.App, id: string, props?: cdk.StackProps) {\n super(scope, id, props);\n\n const dockerBuilder = new TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {\n path: './docker',\n buildArgs: {\n TOKEN: 'my-secret-token',\n ENV: 'production',\n },\n dockerLoginSecretArn: 'arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret',\n });\n\n // Use in ECS\n new ecs.FargateTaskDefinition(this, 'TaskDefinition', {\n containerImage: dockerBuilder.containerImage,\n });\n\n // Use in Lambda\n new lambda.Function(this, 'DockerLambdaFunction', {\n runtime: lambda.Runtime.FROM_IMAGE,\n code: dockerBuilder.dockerImageCode,\n handler: lambda.Handler.FROM_IMAGE,\n });\n }\n}\n```\n\n---\n\n### Python Example\n\nHere is how to use `TokenInjectableDockerBuilder` in an AWS CDK project with Python:\n\n```python\nfrom aws_cdk import core as cdk\nfrom token_injectable_docker_builder import TokenInjectableDockerBuilder\nfrom aws_cdk import aws_ecs as ecs\nfrom aws_cdk import aws_lambda as lambda_\n\nclass MyStack(cdk.Stack):\n\n def __init__(self, scope: cdk.App, id: str, **kwargs):\n super().__init__(scope, id, **kwargs)\n\n docker_builder = TokenInjectableDockerBuilder(self, \"MyDockerBuilder\",\n path=\"./docker\",\n build_args={\n \"TOKEN\": \"my-secret-token\",\n \"ENV\": \"production\"\n },\n docker_login_secret_arn=\"arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret\"\n )\n\n # Use in ECS\n ecs.FargateTaskDefinition(self, \"TaskDefinition\",\n container_image=docker_builder.container_image\n )\n\n # Use in Lambda\n lambda_.Function(self, \"DockerLambdaFunction\",\n runtime=lambda_.Runtime.FROM_IMAGE,\n code=docker_builder.docker_image_code,\n handler=lambda_.Handler.FROM_IMAGE\n )\n```\n\n---\n\n## How It Works\n\n1. **Docker Source**: Packages the source code or Dockerfile specified in the `path` property as an S3 asset.\n2. **CodeBuild Project**:\n - Uses the packaged asset and `buildArgs` to build the Docker image.\n - Pushes the image to an ECR repository.\n3. **Custom Resource**:\n - Triggers the build process using a Lambda function (`onEvent`).\n - Monitors the build status using another Lambda function (`isComplete`).\n4. **Outputs**:\n - `.containerImage`: Returns the Docker image for ECS.\n - `.dockerImageCode`: Returns the Docker image code for Lambda.\n\n---\n\n## IAM Permissions\n\nThe construct automatically grants permissions for:\n- CodeBuild to pull and push images to ECR.\n- Lambda to monitor build status and retrieve logs.\n- Encryption via a custom KMS key.\n\n---\n\n## Notes\n\n- **Build Arguments**: Pass custom arguments via `buildArgs` as `--build-arg` flags.\n- **ECR Repository**: Automatically creates an ECR repository with lifecycle rules.\n- **Custom Resources**: Manages lifecycle events for builds using custom Lambda handlers.\n\n---\n\n## Troubleshooting\n\n1. **Build Errors**: Check CodeBuild logs in CloudWatch.\n2. **Lambda Errors**: Check `onEvent` and `isComplete` Lambda logs in CloudWatch.\n3. **Permissions**: Ensure IAM roles have the required permissions for CodeBuild, ECR, and Secrets Manager.\n\n---\n\n## Support\n\nOpen an issue on [GitHub](https://github.com/AlexTech314/TokenInjectableDockerBuilder).\n\n---\n\n## Reference Links\n[![View on Construct Hub](https://constructs.dev/badge?package=token-injectable-docker-builder)](https://constructs.dev/packages/token-injectable-docker-builder)\n"
3901
+ "markdown": "# TokenInjectableDockerBuilder\n\nThe `TokenInjectableDockerBuilder` is a flexible AWS CDK construct that enables the usage of AWS CDK tokens in the building, pushing, and deployment of Docker images to Amazon Elastic Container Registry (ECR). It leverages AWS CodeBuild and Lambda custom resources.\n\n---\n\n## Why?\n\nAWS CDK already provides mechanisms for creating deployable assets using Docker, such as [DockerImageAsset](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_ecr_assets.DockerImageAsset.html) and [DockerImageCode](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_lambda.DockerImageCode.html), but these constructs are limited because they cannot accept CDK tokens as build-args. The `TokenInjectableDockerBuilder` allows injecting CDK tokens as build-time arguments into Docker-based assets, enabling more dynamic dependency relationships.\n\nFor example, a Next.js frontend Docker image may require an API Gateway URL as an argument. With this construct, you can deploy the API Gateway first, then pass its URL as a build-time argument to the Next.js Docker image. As a result, your Next.js frontend can dynamically fetch data from the API Gateway without hardcoding the URL, or needing mutliple sepereate Stacks.\n\n---\n\n## Features\n\n- **Build and Push Docker Images**: Automatically builds and pushes Docker images to ECR.\n- **Token Support**: Supports custom build arguments for Docker builds, including CDK tokens resolved at deployment time.\n- **Custom Install and Pre-Build Commands**: Allows specifying custom commands to run during the `install` and `pre_build` phases of the CodeBuild build process.\n- **VPC Configuration**: Supports deploying the CodeBuild project within a VPC, with customizable security groups and subnet selection.\n- **Docker Login**: Supports Docker login using credentials stored in AWS Secrets Manager.\n- **ECR Repository Management**: Creates an ECR repository with lifecycle rules and encryption.\n- **Integration with ECS and Lambda**: Provides outputs for use in AWS ECS and AWS Lambda.\n\n---\n\n## Installation\n\n### For NPM\n\nInstall the construct using NPM:\n\n```bash\nnpm install token-injectable-docker-builder\n```\n\n### For Python\n\nInstall the construct using pip:\n\n```bash\npip install token-injectable-docker-builder\n```\n\n---\n\n## Constructor\n\n### `TokenInjectableDockerBuilder`\n\n#### Parameters\n\n- **`scope`**: The construct's parent scope.\n- **`id`**: The construct ID.\n- **`props`**: Configuration properties.\n\n#### Properties in `TokenInjectableDockerBuilderProps`\n\n| Property | Type | Required | Description |\n|--------------------------|-----------------------------|----------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------|\n| `path` | `string` | Yes | The file path to the Dockerfile or source code directory. |\n| `buildArgs` | `{ [key: string]: string }` | No | Build arguments to pass to the Docker build process. These are transformed into `--build-arg` flags. |\n| `dockerLoginSecretArn` | `string` | No | ARN of an AWS Secrets Manager secret for Docker credentials. Skips login if not provided. |\n| `vpc` | `IVpc` | No | The VPC in which the CodeBuild project will be deployed. If provided, the CodeBuild project will be launched within the specified VPC. |\n| `securityGroups` | `ISecurityGroup[]` | No | The security groups to attach to the CodeBuild project. These should define the network access rules for the CodeBuild project. |\n| `subnetSelection` | `SubnetSelection` | No | The subnet selection to specify which subnets to use within the VPC. Allows the user to select private, public, or isolated subnets. |\n| `installCommands` | `string[]` | No | Custom commands to run during the `install` phase of the CodeBuild build process. |\n| `preBuildCommands` | `string[]` | No | Custom commands to run during the `pre_build` phase of the CodeBuild build process. |\n\n---\n\n## Usage Examples\n\n### Simple Usage Example\n\nThis example demonstrates the most basic usage of the `TokenInjectableDockerBuilder`, where you specify the path to your Docker context and provide simple build arguments.\n\n#### TypeScript/NPM Example\n\n```typescript\nimport * as cdk from 'aws-cdk-lib';\nimport { TokenInjectableDockerBuilder } from 'token-injectable-docker-builder';\nimport * as ecs from 'aws-cdk-lib/aws-ecs';\nimport * as lambda from 'aws-cdk-lib/aws-lambda';\n\nexport class SimpleStack extends cdk.Stack {\n constructor(scope: cdk.App, id: string, props?: cdk.StackProps) {\n super(scope, id, props);\n\n const dockerBuilder = new TokenInjectableDockerBuilder(this, 'SimpleDockerBuilder', {\n path: './docker', // Path to your Dockerfile or Docker context\n buildArgs: {\n ENV: 'production', // Simple build argument\n },\n });\n\n // Use in ECS\n new ecs.ContainerDefinition(this, 'SimpleContainer', {\n image: dockerBuilder.containerImage,\n // ... other container properties ...\n });\n\n // Use in Lambda\n new lambda.Function(this, 'SimpleDockerLambdaFunction', {\n runtime: lambda.Runtime.FROM_IMAGE,\n code: dockerBuilder.dockerImageCode,\n handler: lambda.Handler.FROM_IMAGE,\n });\n }\n}\n```\n\n#### Python Example\n\n```python\nfrom aws_cdk import (\n aws_ecs as ecs,\n aws_lambda as lambda_,\n core as cdk,\n)\nfrom token_injectable_docker_builder import TokenInjectableDockerBuilder\n\nclass SimpleStack(cdk.Stack):\n\n def __init__(self, scope: cdk.App, id: str, **kwargs):\n super().__init__(scope, id, **kwargs)\n\n docker_builder = TokenInjectableDockerBuilder(self, \"SimpleDockerBuilder\",\n path=\"./docker\", # Path to your Dockerfile or Docker context\n build_args={\n \"ENV\": \"production\", # Simple build argument\n },\n )\n\n # Use in ECS\n ecs.ContainerDefinition(self, \"SimpleContainer\",\n image=docker_builder.container_image,\n # ... other container properties ...\n )\n\n # Use in Lambda\n lambda_.Function(self, \"SimpleDockerLambdaFunction\",\n runtime=lambda_.Runtime.FROM_IMAGE,\n code=docker_builder.docker_image_code,\n handler=lambda_.Handler.FROM_IMAGE\n )\n```\n\n---\n\n### Advanced Usage Example\n\nThis example demonstrates more advanced usage, including using CDK tokens as build arguments, specifying custom install and pre-build commands, and configuring VPC settings.\n\n#### TypeScript/NPM Example\n\n```typescript\nimport * as cdk from 'aws-cdk-lib';\nimport { TokenInjectableDockerBuilder } from 'token-injectable-docker-builder';\nimport * as ecs from 'aws-cdk-lib/aws-ecs';\nimport * as lambda from 'aws-cdk-lib/aws-lambda';\nimport * as ec2 from 'aws-cdk-lib/aws-ec2';\n\nexport class MyStack extends cdk.Stack {\n constructor(scope: cdk.App, id: string, props?: cdk.StackProps) {\n super(scope, id, props);\n\n // Example VPC and security group (optional)\n const vpc = new ec2.Vpc(this, 'MyVpc');\n const securityGroup = new ec2.SecurityGroup(this, 'MySecurityGroup', {\n vpc,\n });\n\n // Example of using CDK tokens as build arguments\n const myApiGateway = /* ... create or import your API Gateway ... */;\n\n const dockerBuilder = new TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {\n path: './docker',\n buildArgs: {\n API_URL: myApiGateway.url, // Using CDK token\n ENV: 'production',\n },\n dockerLoginSecretArn: 'arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret',\n vpc,\n securityGroups: [securityGroup],\n subnetSelection: { subnetType: ec2.SubnetType.PRIVATE_WITH_EGRESS },\n installCommands: [\n 'echo \"Updating package lists...\"',\n 'apt-get update -y',\n 'echo \"Installing required packages...\"',\n 'apt-get install -y curl dnsutils',\n ],\n preBuildCommands: [\n 'echo \"Fetching configuration from private API...\"',\n 'curl -o config.json https://api.example.com/config',\n ],\n });\n\n // Use in ECS\n new ecs.ContainerDefinition(this, 'MyContainer', {\n image: dockerBuilder.containerImage,\n // ... other container properties ...\n });\n\n // Use in Lambda\n new lambda.Function(this, 'DockerLambdaFunction', {\n runtime: lambda.Runtime.FROM_IMAGE,\n code: dockerBuilder.dockerImageCode,\n handler: lambda.Handler.FROM_IMAGE,\n });\n }\n}\n```\n\n#### Python Example\n\n```python\nfrom aws_cdk import (\n aws_ec2 as ec2,\n aws_ecs as ecs,\n aws_lambda as lambda_,\n core as cdk,\n)\nfrom token_injectable_docker_builder import TokenInjectableDockerBuilder\n\nclass MyStack(cdk.Stack):\n\n def __init__(self, scope: cdk.App, id: str, **kwargs):\n super().__init__(scope, id, **kwargs)\n\n # Example VPC and security group (optional)\n vpc = ec2.Vpc(self, \"MyVpc\")\n security_group = ec2.SecurityGroup(self, \"MySecurityGroup\", vpc=vpc)\n\n # Example of using CDK tokens as build arguments\n my_api_gateway = # ... create or import your API Gateway ...\n\n docker_builder = TokenInjectableDockerBuilder(self, \"MyDockerBuilder\",\n path=\"./docker\",\n build_args={\n \"API_URL\": my_api_gateway.url, # Using CDK token\n \"ENV\": \"production\"\n },\n docker_login_secret_arn=\"arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret\",\n vpc=vpc,\n security_groups=[security_group],\n subnet_selection=ec2.SubnetSelection(subnet_type=ec2.SubnetType.PRIVATE_WITH_EGRESS),\n install_commands=[\n 'echo \"Updating package lists...\"',\n 'apt-get update -y',\n 'echo \"Installing required packages...\"',\n 'apt-get install -y curl dnsutils',\n ],\n pre_build_commands=[\n 'echo \"Fetching configuration from private API...\"',\n 'curl -o config.json https://api.example.com/config',\n ],\n )\n\n # Use in ECS\n ecs.ContainerDefinition(self, \"MyContainer\",\n image=docker_builder.container_image,\n # ... other container properties ...\n )\n\n # Use in Lambda\n lambda_.Function(self, \"DockerLambdaFunction\",\n runtime=lambda_.Runtime.FROM_IMAGE,\n code=docker_builder.docker_image_code,\n handler=lambda_.Handler.FROM_IMAGE\n )\n```\n\n---\n\n## How It Works\n\n1. **Docker Source**: Packages the source code or Dockerfile specified in the `path` property as an S3 asset.\n2. **CodeBuild Project**:\n - Uses the packaged asset and `buildArgs` to build the Docker image.\n - Executes any custom `installCommands` and `preBuildCommands` during the build process.\n - Pushes the image to an ECR repository.\n3. **Custom Resource**:\n - Triggers the build process using a Lambda function (`onEvent`).\n - Monitors the build status using another Lambda function (`isComplete`).\n4. **Outputs**:\n - `.containerImage`: Returns the Docker image for ECS.\n - `.dockerImageCode`: Returns the Docker image code for Lambda.\n\n---\n\n## IAM Permissions\n\nThe construct automatically grants permissions for:\n\n- **CodeBuild**:\n - Pull and push images to ECR.\n - Access to AWS Secrets Manager if `dockerLoginSecretArn` is provided.\n - Access to the KMS key for encryption.\n- **Lambda Functions**:\n - Start and monitor CodeBuild builds.\n - Access CloudWatch Logs.\n - Access to the KMS key for encryption.\n - Pull and push images to ECR.\n\n---\n\n## Notes\n\n- **Build Arguments**: Pass custom arguments via `buildArgs` as `--build-arg` flags. CDK tokens can be used to inject dynamic values resolved at deployment time.\n- **Custom Commands**: Use `installCommands` and `preBuildCommands` to run custom shell commands during the build process. This can be useful for installing dependencies or fetching configuration files.\n- **VPC Configuration**: If your build process requires access to resources within a VPC, you can specify the VPC, security groups, and subnet selection.\n- **Docker Login**: If you need to log in to a private Docker registry before building the image, provide the ARN of a secret in AWS Secrets Manager containing the Docker credentials.\n- **ECR Repository**: Automatically creates an ECR repository with lifecycle rules to manage image retention, encryption with a KMS key, and image scanning on push.\n\n---\n\n## Troubleshooting\n\n1. **Build Errors**: Check the CodeBuild logs in CloudWatch Logs for detailed error messages.\n2. **Lambda Errors**: Check the `onEvent` and `isComplete` Lambda function logs in CloudWatch Logs.\n3. **Permissions**: Ensure IAM roles have the required permissions for CodeBuild, ECR, Secrets Manager, and KMS if applicable.\n4. **Network Access**: If the build requires network access (e.g., to download dependencies), ensure that the VPC configuration allows outbound internet access, or use a NAT gateway if in private subnets.\n\n---\n\n## Support\n\nFor issues or feature requests, please open an issue on [GitHub](https://github.com/AlexTech314/TokenInjectableDockerBuilder).\n\n---\n\n## Reference Links\n\n[![View on Construct Hub](https://constructs.dev/badge?package=token-injectable-docker-builder)](https://constructs.dev/packages/token-injectable-docker-builder)\n\n---\n\n# License\n\nThis project is licensed under the terms of the MIT license.\n\n---\n\n# Acknowledgements\n\n- Inspired by the need for more dynamic Docker asset management in AWS CDK.\n- Thanks to the AWS CDK community for their continuous support and contributions.\n\n---\n\nFeel free to reach out if you have any questions or need further assistance!"
3902
3902
  },
3903
3903
  "repository": {
3904
3904
  "type": "git",
@@ -3929,7 +3929,7 @@
3929
3929
  },
3930
3930
  "locationInModule": {
3931
3931
  "filename": "src/index.ts",
3932
- "line": 58
3932
+ "line": 123
3933
3933
  },
3934
3934
  "parameters": [
3935
3935
  {
@@ -3955,7 +3955,7 @@
3955
3955
  "kind": "class",
3956
3956
  "locationInModule": {
3957
3957
  "filename": "src/index.ts",
3958
- "line": 53
3958
+ "line": 118
3959
3959
  },
3960
3960
  "name": "TokenInjectableDockerBuilder",
3961
3961
  "properties": [
@@ -3966,7 +3966,7 @@
3966
3966
  "immutable": true,
3967
3967
  "locationInModule": {
3968
3968
  "filename": "src/index.ts",
3969
- "line": 55
3969
+ "line": 120
3970
3970
  },
3971
3971
  "name": "containerImage",
3972
3972
  "type": {
@@ -3980,7 +3980,7 @@
3980
3980
  "immutable": true,
3981
3981
  "locationInModule": {
3982
3982
  "filename": "src/index.ts",
3983
- "line": 56
3983
+ "line": 121
3984
3984
  },
3985
3985
  "name": "dockerImageCode",
3986
3986
  "type": {
@@ -4001,7 +4001,7 @@
4001
4001
  "kind": "interface",
4002
4002
  "locationInModule": {
4003
4003
  "filename": "src/index.ts",
4004
- "line": 17
4004
+ "line": 18
4005
4005
  },
4006
4006
  "name": "TokenInjectableDockerBuilderProps",
4007
4007
  "properties": [
@@ -4014,7 +4014,7 @@
4014
4014
  "immutable": true,
4015
4015
  "locationInModule": {
4016
4016
  "filename": "src/index.ts",
4017
- "line": 21
4017
+ "line": 22
4018
4018
  },
4019
4019
  "name": "path",
4020
4020
  "type": {
@@ -4032,7 +4032,7 @@
4032
4032
  "immutable": true,
4033
4033
  "locationInModule": {
4034
4034
  "filename": "src/index.ts",
4035
- "line": 32
4035
+ "line": 33
4036
4036
  },
4037
4037
  "name": "buildArgs",
4038
4038
  "optional": true,
@@ -4056,18 +4056,128 @@
4056
4056
  "immutable": true,
4057
4057
  "locationInModule": {
4058
4058
  "filename": "src/index.ts",
4059
- "line": 47
4059
+ "line": 48
4060
4060
  },
4061
4061
  "name": "dockerLoginSecretArn",
4062
4062
  "optional": true,
4063
4063
  "type": {
4064
4064
  "primitive": "string"
4065
4065
  }
4066
+ },
4067
+ {
4068
+ "abstract": true,
4069
+ "docs": {
4070
+ "default": "- No additional install commands.",
4071
+ "remarks": "**Example Usage:**\n```typescript\nnew TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {\n path: path.resolve(__dirname, '../app'),\n installCommands: [\n 'echo \"Updating package lists...\"',\n 'apt-get update -y',\n 'echo \"Installing required packages...\"',\n 'apt-get install -y curl dnsutils',\n ],\n // ... other properties ...\n});\n```\n*This example demonstrates how to install the `curl` and `dnsutils` packages during the install phase using `apt-get`, the package manager for Ubuntu-based CodeBuild environments.*",
4072
+ "stability": "stable",
4073
+ "summary": "Custom commands to run during the install phase."
4074
+ },
4075
+ "immutable": true,
4076
+ "locationInModule": {
4077
+ "filename": "src/index.ts",
4078
+ "line": 91
4079
+ },
4080
+ "name": "installCommands",
4081
+ "optional": true,
4082
+ "type": {
4083
+ "collection": {
4084
+ "elementtype": {
4085
+ "primitive": "string"
4086
+ },
4087
+ "kind": "array"
4088
+ }
4089
+ }
4090
+ },
4091
+ {
4092
+ "abstract": true,
4093
+ "docs": {
4094
+ "default": "- No additional pre-build commands.",
4095
+ "remarks": "**Example Usage:**\n```typescript\nnew TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {\n path: path.resolve(__dirname, '../app'),\n preBuildCommands: [\n 'echo \"Fetching configuration from private API...\"',\n 'curl -o config.json https://api.example.com/config',\n ],\n // ... other properties ...\n});\n```\n*In this example, the builder fetches a configuration file from a private API before starting the Docker build. This config file will be available in the same directory as your Dockerfile during CDK deployment.*",
4096
+ "stability": "stable",
4097
+ "summary": "Custom commands to run during the pre_build phase."
4098
+ },
4099
+ "immutable": true,
4100
+ "locationInModule": {
4101
+ "filename": "src/index.ts",
4102
+ "line": 112
4103
+ },
4104
+ "name": "preBuildCommands",
4105
+ "optional": true,
4106
+ "type": {
4107
+ "collection": {
4108
+ "elementtype": {
4109
+ "primitive": "string"
4110
+ },
4111
+ "kind": "array"
4112
+ }
4113
+ }
4114
+ },
4115
+ {
4116
+ "abstract": true,
4117
+ "docs": {
4118
+ "default": "No security groups are attached.",
4119
+ "remarks": "These should define the network access rules for the CodeBuild project.",
4120
+ "stability": "stable",
4121
+ "summary": "The security groups to attach to the CodeBuild project."
4122
+ },
4123
+ "immutable": true,
4124
+ "locationInModule": {
4125
+ "filename": "src/index.ts",
4126
+ "line": 62
4127
+ },
4128
+ "name": "securityGroups",
4129
+ "optional": true,
4130
+ "type": {
4131
+ "collection": {
4132
+ "elementtype": {
4133
+ "fqn": "aws-cdk-lib.aws_ec2.ISecurityGroup"
4134
+ },
4135
+ "kind": "array"
4136
+ }
4137
+ }
4138
+ },
4139
+ {
4140
+ "abstract": true,
4141
+ "docs": {
4142
+ "default": "All subnets in the VPC are used.",
4143
+ "remarks": "Allows the user to select private, public, or isolated subnets.",
4144
+ "stability": "stable",
4145
+ "summary": "The subnet selection to specify which subnets to use within the VPC."
4146
+ },
4147
+ "immutable": true,
4148
+ "locationInModule": {
4149
+ "filename": "src/index.ts",
4150
+ "line": 69
4151
+ },
4152
+ "name": "subnetSelection",
4153
+ "optional": true,
4154
+ "type": {
4155
+ "fqn": "aws-cdk-lib.aws_ec2.SubnetSelection"
4156
+ }
4157
+ },
4158
+ {
4159
+ "abstract": true,
4160
+ "docs": {
4161
+ "default": "No VPC is attached, and the CodeBuild project will use public internet.",
4162
+ "remarks": "If provided, the CodeBuild project will be launched within the specified VPC.",
4163
+ "stability": "stable",
4164
+ "summary": "The VPC in which the CodeBuild project will be deployed."
4165
+ },
4166
+ "immutable": true,
4167
+ "locationInModule": {
4168
+ "filename": "src/index.ts",
4169
+ "line": 55
4170
+ },
4171
+ "name": "vpc",
4172
+ "optional": true,
4173
+ "type": {
4174
+ "fqn": "aws-cdk-lib.aws_ec2.IVpc"
4175
+ }
4066
4176
  }
4067
4177
  ],
4068
4178
  "symbolId": "src/index:TokenInjectableDockerBuilderProps"
4069
4179
  }
4070
4180
  },
4071
- "version": "1.1.3",
4072
- "fingerprint": "v6DFW98Thu9mQ4Bzmw2vWg3rPPZ0KabZFpqSivvcgbU="
4181
+ "version": "1.2.1",
4182
+ "fingerprint": "a7GeyojH1ylq8LpbucfYVuQAxmidU1TWKcf9PIFYzjw="
4073
4183
  }
package/API.md CHANGED
@@ -146,6 +146,11 @@ const tokenInjectableDockerBuilderProps: TokenInjectableDockerBuilderProps = { .
146
146
  | <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.path">path</a></code> | <code>string</code> | The path to the directory containing the Dockerfile or source code. |
147
147
  | <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.buildArgs">buildArgs</a></code> | <code>{[ key: string ]: string}</code> | Build arguments to pass to the Docker build process. |
148
148
  | <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.dockerLoginSecretArn">dockerLoginSecretArn</a></code> | <code>string</code> | The ARN of the AWS Secrets Manager secret containing Docker login credentials. |
149
+ | <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.installCommands">installCommands</a></code> | <code>string[]</code> | Custom commands to run during the install phase. |
150
+ | <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.preBuildCommands">preBuildCommands</a></code> | <code>string[]</code> | Custom commands to run during the pre_build phase. |
151
+ | <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.securityGroups">securityGroups</a></code> | <code>aws-cdk-lib.aws_ec2.ISecurityGroup[]</code> | The security groups to attach to the CodeBuild project. |
152
+ | <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.subnetSelection">subnetSelection</a></code> | <code>aws-cdk-lib.aws_ec2.SubnetSelection</code> | The subnet selection to specify which subnets to use within the VPC. |
153
+ | <code><a href="#token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.vpc">vpc</a></code> | <code>aws-cdk-lib.aws_ec2.IVpc</code> | The VPC in which the CodeBuild project will be deployed. |
149
154
 
150
155
  ---
151
156
 
@@ -213,5 +218,104 @@ If not provided, the construct will skip Docker login during the build process.
213
218
  ```
214
219
 
215
220
 
221
+ ##### `installCommands`<sup>Optional</sup> <a name="installCommands" id="token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.installCommands"></a>
222
+
223
+ ```typescript
224
+ public readonly installCommands: string[];
225
+ ```
226
+
227
+ - *Type:* string[]
228
+ - *Default:* No additional install commands.
229
+
230
+ Custom commands to run during the install phase.
231
+
232
+ **Example Usage:**
233
+ ```typescript
234
+ new TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {
235
+ path: path.resolve(__dirname, '../app'),
236
+ installCommands: [
237
+ 'echo "Updating package lists..."',
238
+ 'apt-get update -y',
239
+ 'echo "Installing required packages..."',
240
+ 'apt-get install -y curl dnsutils',
241
+ ],
242
+ // ... other properties ...
243
+ });
244
+ ```
245
+ *This example demonstrates how to install the `curl` and `dnsutils` packages during the install phase using `apt-get`, the package manager for Ubuntu-based CodeBuild environments.*
246
+
247
+ ---
248
+
249
+ ##### `preBuildCommands`<sup>Optional</sup> <a name="preBuildCommands" id="token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.preBuildCommands"></a>
250
+
251
+ ```typescript
252
+ public readonly preBuildCommands: string[];
253
+ ```
254
+
255
+ - *Type:* string[]
256
+ - *Default:* No additional pre-build commands.
257
+
258
+ Custom commands to run during the pre_build phase.
259
+
260
+ **Example Usage:**
261
+ ```typescript
262
+ new TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {
263
+ path: path.resolve(__dirname, '../app'),
264
+ preBuildCommands: [
265
+ 'echo "Fetching configuration from private API..."',
266
+ 'curl -o config.json https://api.example.com/config',
267
+ ],
268
+ // ... other properties ...
269
+ });
270
+ ```
271
+ *In this example, the builder fetches a configuration file from a private API before starting the Docker build. This config file will be available in the same directory as your Dockerfile during CDK deployment.*
272
+
273
+ ---
274
+
275
+ ##### `securityGroups`<sup>Optional</sup> <a name="securityGroups" id="token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.securityGroups"></a>
276
+
277
+ ```typescript
278
+ public readonly securityGroups: ISecurityGroup[];
279
+ ```
280
+
281
+ - *Type:* aws-cdk-lib.aws_ec2.ISecurityGroup[]
282
+ - *Default:* No security groups are attached.
283
+
284
+ The security groups to attach to the CodeBuild project.
285
+
286
+ These should define the network access rules for the CodeBuild project.
287
+
288
+ ---
289
+
290
+ ##### `subnetSelection`<sup>Optional</sup> <a name="subnetSelection" id="token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.subnetSelection"></a>
291
+
292
+ ```typescript
293
+ public readonly subnetSelection: SubnetSelection;
294
+ ```
295
+
296
+ - *Type:* aws-cdk-lib.aws_ec2.SubnetSelection
297
+ - *Default:* All subnets in the VPC are used.
298
+
299
+ The subnet selection to specify which subnets to use within the VPC.
300
+
301
+ Allows the user to select private, public, or isolated subnets.
302
+
303
+ ---
304
+
305
+ ##### `vpc`<sup>Optional</sup> <a name="vpc" id="token-injectable-docker-builder.TokenInjectableDockerBuilderProps.property.vpc"></a>
306
+
307
+ ```typescript
308
+ public readonly vpc: IVpc;
309
+ ```
310
+
311
+ - *Type:* aws-cdk-lib.aws_ec2.IVpc
312
+ - *Default:* No VPC is attached, and the CodeBuild project will use public internet.
313
+
314
+ The VPC in which the CodeBuild project will be deployed.
315
+
316
+ If provided, the CodeBuild project will be launched within the specified VPC.
317
+
318
+ ---
319
+
216
320
 
217
321
 
package/README.md CHANGED
@@ -6,17 +6,21 @@ The `TokenInjectableDockerBuilder` is a flexible AWS CDK construct that enables
6
6
 
7
7
  ## Why?
8
8
 
9
- AWS CDK already provides mechanisms for creating deployable assets using Docker, such as [DockerImageAsset](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_ecr_assets.DockerImageAsset.html) and [DockerImageCode](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_lambda.DockerImageCode.html), but these Constructs are limited because they cannot accept CDK tokens as build-args. The `TokenInjectableDockerBuilder` allows injecting CDK tokens as build-time arguments into Docker-based assets, enabling more dynamic dependency relationships.
9
+ AWS CDK already provides mechanisms for creating deployable assets using Docker, such as [DockerImageAsset](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_ecr_assets.DockerImageAsset.html) and [DockerImageCode](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_lambda.DockerImageCode.html), but these constructs are limited because they cannot accept CDK tokens as build-args. The `TokenInjectableDockerBuilder` allows injecting CDK tokens as build-time arguments into Docker-based assets, enabling more dynamic dependency relationships.
10
10
 
11
- For example, a Next.js frontend Docker image may require an API Gateway URL. With this construct, you can deploy the API Gateway first, then pass its URL as a build-time argument to the Next.js Docker image.
11
+ For example, a Next.js frontend Docker image may require an API Gateway URL as an argument. With this construct, you can deploy the API Gateway first, then pass its URL as a build-time argument to the Next.js Docker image. As a result, your Next.js frontend can dynamically fetch data from the API Gateway without hardcoding the URL, or needing mutliple sepereate Stacks.
12
12
 
13
13
  ---
14
14
 
15
15
  ## Features
16
16
 
17
- - Automatically builds and pushes Docker images to ECR.
18
- - Supports custom build arguments for Docker builds, including CDK tokens resolved at deployment time.
19
- - Retrieves Docker images for use in ECS or Lambda.
17
+ - **Build and Push Docker Images**: Automatically builds and pushes Docker images to ECR.
18
+ - **Token Support**: Supports custom build arguments for Docker builds, including CDK tokens resolved at deployment time.
19
+ - **Custom Install and Pre-Build Commands**: Allows specifying custom commands to run during the `install` and `pre_build` phases of the CodeBuild build process.
20
+ - **VPC Configuration**: Supports deploying the CodeBuild project within a VPC, with customizable security groups and subnet selection.
21
+ - **Docker Login**: Supports Docker login using credentials stored in AWS Secrets Manager.
22
+ - **ECR Repository Management**: Creates an ECR repository with lifecycle rules and encryption.
23
+ - **Integration with ECS and Lambda**: Provides outputs for use in AWS ECS and AWS Lambda.
20
24
 
21
25
  ---
22
26
 
@@ -52,42 +56,150 @@ pip install token-injectable-docker-builder
52
56
 
53
57
  #### Properties in `TokenInjectableDockerBuilderProps`
54
58
 
55
- | Property | Type | Required | Description |
56
- |------------------------|--------------------|----------|-------------------------------------------------------------------------------------------------------|
57
- | `path` | `string` | Yes | The file path to the Dockerfile or source code directory. |
58
- | `buildArgs` | `{ [key: string]: string }` | No | Build arguments to pass to the Docker build process. |
59
- | `dockerLoginSecretArn` | `string` | No | ARN of an AWS Secrets Manager secret for Docker credentials. Skips login if not provided. |
59
+ | Property | Type | Required | Description |
60
+ |--------------------------|-----------------------------|----------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------|
61
+ | `path` | `string` | Yes | The file path to the Dockerfile or source code directory. |
62
+ | `buildArgs` | `{ [key: string]: string }` | No | Build arguments to pass to the Docker build process. These are transformed into `--build-arg` flags. |
63
+ | `dockerLoginSecretArn` | `string` | No | ARN of an AWS Secrets Manager secret for Docker credentials. Skips login if not provided. |
64
+ | `vpc` | `IVpc` | No | The VPC in which the CodeBuild project will be deployed. If provided, the CodeBuild project will be launched within the specified VPC. |
65
+ | `securityGroups` | `ISecurityGroup[]` | No | The security groups to attach to the CodeBuild project. These should define the network access rules for the CodeBuild project. |
66
+ | `subnetSelection` | `SubnetSelection` | No | The subnet selection to specify which subnets to use within the VPC. Allows the user to select private, public, or isolated subnets. |
67
+ | `installCommands` | `string[]` | No | Custom commands to run during the `install` phase of the CodeBuild build process. |
68
+ | `preBuildCommands` | `string[]` | No | Custom commands to run during the `pre_build` phase of the CodeBuild build process. |
60
69
 
61
70
  ---
62
71
 
63
72
  ## Usage Examples
64
73
 
65
- ### TypeScript/NPM Example
74
+ ### Simple Usage Example
66
75
 
67
- Here is how to use `TokenInjectableDockerBuilder` in an AWS CDK project with TypeScript:
76
+ This example demonstrates the most basic usage of the `TokenInjectableDockerBuilder`, where you specify the path to your Docker context and provide simple build arguments.
77
+
78
+ #### TypeScript/NPM Example
79
+
80
+ ```typescript
81
+ import * as cdk from 'aws-cdk-lib';
82
+ import { TokenInjectableDockerBuilder } from 'token-injectable-docker-builder';
83
+ import * as ecs from 'aws-cdk-lib/aws-ecs';
84
+ import * as lambda from 'aws-cdk-lib/aws-lambda';
85
+
86
+ export class SimpleStack extends cdk.Stack {
87
+ constructor(scope: cdk.App, id: string, props?: cdk.StackProps) {
88
+ super(scope, id, props);
89
+
90
+ const dockerBuilder = new TokenInjectableDockerBuilder(this, 'SimpleDockerBuilder', {
91
+ path: './docker', // Path to your Dockerfile or Docker context
92
+ buildArgs: {
93
+ ENV: 'production', // Simple build argument
94
+ },
95
+ });
96
+
97
+ // Use in ECS
98
+ new ecs.ContainerDefinition(this, 'SimpleContainer', {
99
+ image: dockerBuilder.containerImage,
100
+ // ... other container properties ...
101
+ });
102
+
103
+ // Use in Lambda
104
+ new lambda.Function(this, 'SimpleDockerLambdaFunction', {
105
+ runtime: lambda.Runtime.FROM_IMAGE,
106
+ code: dockerBuilder.dockerImageCode,
107
+ handler: lambda.Handler.FROM_IMAGE,
108
+ });
109
+ }
110
+ }
111
+ ```
112
+
113
+ #### Python Example
114
+
115
+ ```python
116
+ from aws_cdk import (
117
+ aws_ecs as ecs,
118
+ aws_lambda as lambda_,
119
+ core as cdk,
120
+ )
121
+ from token_injectable_docker_builder import TokenInjectableDockerBuilder
122
+
123
+ class SimpleStack(cdk.Stack):
124
+
125
+ def __init__(self, scope: cdk.App, id: str, **kwargs):
126
+ super().__init__(scope, id, **kwargs)
127
+
128
+ docker_builder = TokenInjectableDockerBuilder(self, "SimpleDockerBuilder",
129
+ path="./docker", # Path to your Dockerfile or Docker context
130
+ build_args={
131
+ "ENV": "production", # Simple build argument
132
+ },
133
+ )
134
+
135
+ # Use in ECS
136
+ ecs.ContainerDefinition(self, "SimpleContainer",
137
+ image=docker_builder.container_image,
138
+ # ... other container properties ...
139
+ )
140
+
141
+ # Use in Lambda
142
+ lambda_.Function(self, "SimpleDockerLambdaFunction",
143
+ runtime=lambda_.Runtime.FROM_IMAGE,
144
+ code=docker_builder.docker_image_code,
145
+ handler=lambda_.Handler.FROM_IMAGE
146
+ )
147
+ ```
148
+
149
+ ---
150
+
151
+ ### Advanced Usage Example
152
+
153
+ This example demonstrates more advanced usage, including using CDK tokens as build arguments, specifying custom install and pre-build commands, and configuring VPC settings.
154
+
155
+ #### TypeScript/NPM Example
68
156
 
69
157
  ```typescript
70
158
  import * as cdk from 'aws-cdk-lib';
71
159
  import { TokenInjectableDockerBuilder } from 'token-injectable-docker-builder';
72
160
  import * as ecs from 'aws-cdk-lib/aws-ecs';
73
161
  import * as lambda from 'aws-cdk-lib/aws-lambda';
162
+ import * as ec2 from 'aws-cdk-lib/aws-ec2';
74
163
 
75
164
  export class MyStack extends cdk.Stack {
76
165
  constructor(scope: cdk.App, id: string, props?: cdk.StackProps) {
77
166
  super(scope, id, props);
78
167
 
168
+ // Example VPC and security group (optional)
169
+ const vpc = new ec2.Vpc(this, 'MyVpc');
170
+ const securityGroup = new ec2.SecurityGroup(this, 'MySecurityGroup', {
171
+ vpc,
172
+ });
173
+
174
+ // Example of using CDK tokens as build arguments
175
+ const myApiGateway = /* ... create or import your API Gateway ... */;
176
+
79
177
  const dockerBuilder = new TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {
80
178
  path: './docker',
81
179
  buildArgs: {
82
- TOKEN: 'my-secret-token',
180
+ API_URL: myApiGateway.url, // Using CDK token
83
181
  ENV: 'production',
84
182
  },
85
183
  dockerLoginSecretArn: 'arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret',
184
+ vpc,
185
+ securityGroups: [securityGroup],
186
+ subnetSelection: { subnetType: ec2.SubnetType.PRIVATE_WITH_EGRESS },
187
+ installCommands: [
188
+ 'echo "Updating package lists..."',
189
+ 'apt-get update -y',
190
+ 'echo "Installing required packages..."',
191
+ 'apt-get install -y curl dnsutils',
192
+ ],
193
+ preBuildCommands: [
194
+ 'echo "Fetching configuration from private API..."',
195
+ 'curl -o config.json https://api.example.com/config',
196
+ ],
86
197
  });
87
198
 
88
199
  // Use in ECS
89
- new ecs.FargateTaskDefinition(this, 'TaskDefinition', {
90
- containerImage: dockerBuilder.containerImage,
200
+ new ecs.ContainerDefinition(this, 'MyContainer', {
201
+ image: dockerBuilder.containerImage,
202
+ // ... other container properties ...
91
203
  });
92
204
 
93
205
  // Use in Lambda
@@ -100,35 +212,55 @@ export class MyStack extends cdk.Stack {
100
212
  }
101
213
  ```
102
214
 
103
- ---
104
-
105
- ### Python Example
106
-
107
- Here is how to use `TokenInjectableDockerBuilder` in an AWS CDK project with Python:
215
+ #### Python Example
108
216
 
109
217
  ```python
110
- from aws_cdk import core as cdk
218
+ from aws_cdk import (
219
+ aws_ec2 as ec2,
220
+ aws_ecs as ecs,
221
+ aws_lambda as lambda_,
222
+ core as cdk,
223
+ )
111
224
  from token_injectable_docker_builder import TokenInjectableDockerBuilder
112
- from aws_cdk import aws_ecs as ecs
113
- from aws_cdk import aws_lambda as lambda_
114
225
 
115
226
  class MyStack(cdk.Stack):
116
227
 
117
228
  def __init__(self, scope: cdk.App, id: str, **kwargs):
118
229
  super().__init__(scope, id, **kwargs)
119
230
 
231
+ # Example VPC and security group (optional)
232
+ vpc = ec2.Vpc(self, "MyVpc")
233
+ security_group = ec2.SecurityGroup(self, "MySecurityGroup", vpc=vpc)
234
+
235
+ # Example of using CDK tokens as build arguments
236
+ my_api_gateway = # ... create or import your API Gateway ...
237
+
120
238
  docker_builder = TokenInjectableDockerBuilder(self, "MyDockerBuilder",
121
239
  path="./docker",
122
240
  build_args={
123
- "TOKEN": "my-secret-token",
241
+ "API_URL": my_api_gateway.url, # Using CDK token
124
242
  "ENV": "production"
125
243
  },
126
- docker_login_secret_arn="arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret"
244
+ docker_login_secret_arn="arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret",
245
+ vpc=vpc,
246
+ security_groups=[security_group],
247
+ subnet_selection=ec2.SubnetSelection(subnet_type=ec2.SubnetType.PRIVATE_WITH_EGRESS),
248
+ install_commands=[
249
+ 'echo "Updating package lists..."',
250
+ 'apt-get update -y',
251
+ 'echo "Installing required packages..."',
252
+ 'apt-get install -y curl dnsutils',
253
+ ],
254
+ pre_build_commands=[
255
+ 'echo "Fetching configuration from private API..."',
256
+ 'curl -o config.json https://api.example.com/config',
257
+ ],
127
258
  )
128
259
 
129
260
  # Use in ECS
130
- ecs.FargateTaskDefinition(self, "TaskDefinition",
131
- container_image=docker_builder.container_image
261
+ ecs.ContainerDefinition(self, "MyContainer",
262
+ image=docker_builder.container_image,
263
+ # ... other container properties ...
132
264
  )
133
265
 
134
266
  # Use in Lambda
@@ -146,6 +278,7 @@ class MyStack(cdk.Stack):
146
278
  1. **Docker Source**: Packages the source code or Dockerfile specified in the `path` property as an S3 asset.
147
279
  2. **CodeBuild Project**:
148
280
  - Uses the packaged asset and `buildArgs` to build the Docker image.
281
+ - Executes any custom `installCommands` and `preBuildCommands` during the build process.
149
282
  - Pushes the image to an ECR repository.
150
283
  3. **Custom Resource**:
151
284
  - Triggers the build process using a Lambda function (`onEvent`).
@@ -159,33 +292,61 @@ class MyStack(cdk.Stack):
159
292
  ## IAM Permissions
160
293
 
161
294
  The construct automatically grants permissions for:
162
- - CodeBuild to pull and push images to ECR.
163
- - Lambda to monitor build status and retrieve logs.
164
- - Encryption via a custom KMS key.
295
+
296
+ - **CodeBuild**:
297
+ - Pull and push images to ECR.
298
+ - Access to AWS Secrets Manager if `dockerLoginSecretArn` is provided.
299
+ - Access to the KMS key for encryption.
300
+ - **Lambda Functions**:
301
+ - Start and monitor CodeBuild builds.
302
+ - Access CloudWatch Logs.
303
+ - Access to the KMS key for encryption.
304
+ - Pull and push images to ECR.
165
305
 
166
306
  ---
167
307
 
168
308
  ## Notes
169
309
 
170
- - **Build Arguments**: Pass custom arguments via `buildArgs` as `--build-arg` flags.
171
- - **ECR Repository**: Automatically creates an ECR repository with lifecycle rules.
172
- - **Custom Resources**: Manages lifecycle events for builds using custom Lambda handlers.
310
+ - **Build Arguments**: Pass custom arguments via `buildArgs` as `--build-arg` flags. CDK tokens can be used to inject dynamic values resolved at deployment time.
311
+ - **Custom Commands**: Use `installCommands` and `preBuildCommands` to run custom shell commands during the build process. This can be useful for installing dependencies or fetching configuration files.
312
+ - **VPC Configuration**: If your build process requires access to resources within a VPC, you can specify the VPC, security groups, and subnet selection.
313
+ - **Docker Login**: If you need to log in to a private Docker registry before building the image, provide the ARN of a secret in AWS Secrets Manager containing the Docker credentials.
314
+ - **ECR Repository**: Automatically creates an ECR repository with lifecycle rules to manage image retention, encryption with a KMS key, and image scanning on push.
173
315
 
174
316
  ---
175
317
 
176
318
  ## Troubleshooting
177
319
 
178
- 1. **Build Errors**: Check CodeBuild logs in CloudWatch.
179
- 2. **Lambda Errors**: Check `onEvent` and `isComplete` Lambda logs in CloudWatch.
180
- 3. **Permissions**: Ensure IAM roles have the required permissions for CodeBuild, ECR, and Secrets Manager.
320
+ 1. **Build Errors**: Check the CodeBuild logs in CloudWatch Logs for detailed error messages.
321
+ 2. **Lambda Errors**: Check the `onEvent` and `isComplete` Lambda function logs in CloudWatch Logs.
322
+ 3. **Permissions**: Ensure IAM roles have the required permissions for CodeBuild, ECR, Secrets Manager, and KMS if applicable.
323
+ 4. **Network Access**: If the build requires network access (e.g., to download dependencies), ensure that the VPC configuration allows outbound internet access, or use a NAT gateway if in private subnets.
181
324
 
182
325
  ---
183
326
 
184
327
  ## Support
185
328
 
186
- Open an issue on [GitHub](https://github.com/AlexTech314/TokenInjectableDockerBuilder).
329
+ For issues or feature requests, please open an issue on [GitHub](https://github.com/AlexTech314/TokenInjectableDockerBuilder).
187
330
 
188
331
  ---
189
332
 
190
333
  ## Reference Links
334
+
191
335
  [![View on Construct Hub](https://constructs.dev/badge?package=token-injectable-docker-builder)](https://constructs.dev/packages/token-injectable-docker-builder)
336
+
337
+ ---
338
+
339
+ # License
340
+
341
+ This project is licensed under the terms of the MIT license.
342
+
343
+ ---
344
+
345
+ # Acknowledgements
346
+
347
+ - Inspired by the need for more dynamic Docker asset management in AWS CDK.
348
+ - Thanks to the AWS CDK community for their continuous support and contributions.
349
+
350
+ ---
351
+
352
+ Feel free to reach out if you have any questions or need further assistance!
package/lib/index.d.ts CHANGED
@@ -1,3 +1,4 @@
1
+ import { IVpc, ISecurityGroup, SubnetSelection } from 'aws-cdk-lib/aws-ec2';
1
2
  import { ContainerImage } from 'aws-cdk-lib/aws-ecs';
2
3
  import { DockerImageCode } from 'aws-cdk-lib/aws-lambda';
3
4
  import { Construct } from 'constructs';
@@ -35,6 +36,64 @@ export interface TokenInjectableDockerBuilderProps {
35
36
  * @example 'arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret'
36
37
  */
37
38
  readonly dockerLoginSecretArn?: string;
39
+ /**
40
+ * The VPC in which the CodeBuild project will be deployed.
41
+ * If provided, the CodeBuild project will be launched within the specified VPC.
42
+ * @default No VPC is attached, and the CodeBuild project will use public internet.
43
+ */
44
+ readonly vpc?: IVpc;
45
+ /**
46
+ * The security groups to attach to the CodeBuild project.
47
+ * These should define the network access rules for the CodeBuild project.
48
+ * @default No security groups are attached.
49
+ */
50
+ readonly securityGroups?: ISecurityGroup[];
51
+ /**
52
+ * The subnet selection to specify which subnets to use within the VPC.
53
+ * Allows the user to select private, public, or isolated subnets.
54
+ * @default All subnets in the VPC are used.
55
+ */
56
+ readonly subnetSelection?: SubnetSelection;
57
+ /**
58
+ * Custom commands to run during the install phase.
59
+ *
60
+ * **Example Usage:**
61
+ * ```typescript
62
+ * new TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {
63
+ * path: path.resolve(__dirname, '../app'),
64
+ * installCommands: [
65
+ * 'echo "Updating package lists..."',
66
+ * 'apt-get update -y',
67
+ * 'echo "Installing required packages..."',
68
+ * 'apt-get install -y curl dnsutils',
69
+ * ],
70
+ * // ... other properties ...
71
+ * });
72
+ * ```
73
+ * *This example demonstrates how to install the `curl` and `dnsutils` packages during the install phase using `apt-get`, the package manager for Ubuntu-based CodeBuild environments.*
74
+ *
75
+ * @default - No additional install commands.
76
+ */
77
+ readonly installCommands?: string[];
78
+ /**
79
+ * Custom commands to run during the pre_build phase.
80
+ *
81
+ * **Example Usage:**
82
+ * ```typescript
83
+ * new TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {
84
+ * path: path.resolve(__dirname, '../app'),
85
+ * preBuildCommands: [
86
+ * 'echo "Fetching configuration from private API..."',
87
+ * 'curl -o config.json https://api.example.com/config',
88
+ * ],
89
+ * // ... other properties ...
90
+ * });
91
+ * ```
92
+ * *In this example, the builder fetches a configuration file from a private API before starting the Docker build. This config file will be available in the same directory as your Dockerfile during CDK deployment.*
93
+ *
94
+ * @default - No additional pre-build commands.
95
+ */
96
+ readonly preBuildCommands?: string[];
38
97
  }
39
98
  /**
40
99
  * A CDK construct to build and push Docker images to an ECR repository using CodeBuild and Lambda custom resources.
package/lib/index.js CHANGED
@@ -21,7 +21,7 @@ const constructs_1 = require("constructs");
21
21
  class TokenInjectableDockerBuilder extends constructs_1.Construct {
22
22
  constructor(scope, id, props) {
23
23
  super(scope, id);
24
- const { path: sourcePath, buildArgs, dockerLoginSecretArn } = props;
24
+ const { path: sourcePath, buildArgs, dockerLoginSecretArn, vpc, securityGroups, subnetSelection, installCommands, preBuildCommands, } = props;
25
25
  // Define a KMS key for ECR encryption
26
26
  const encryptionKey = new aws_kms_1.Key(this, 'EcrEncryptionKey', {
27
27
  enableKeyRotation: true,
@@ -73,12 +73,25 @@ class TokenInjectableDockerBuilder extends constructs_1.Construct {
73
73
  environmentVariables: {
74
74
  ECR_REPO_URI: { value: this.ecrRepository.repositoryUri },
75
75
  BUILD_ARGS: { value: buildArgsString },
76
+ // Include build arguments as environment variables if needed
77
+ ...(buildArgs &&
78
+ Object.fromEntries(Object.entries(buildArgs).map(([key, value]) => [key, { value }]))),
76
79
  },
80
+ vpc,
81
+ securityGroups,
82
+ subnetSelection,
77
83
  buildSpec: aws_codebuild_1.BuildSpec.fromObject({
78
84
  version: '0.2',
79
85
  phases: {
86
+ install: {
87
+ commands: [
88
+ 'echo "Beginning install phase..."',
89
+ ...(installCommands || []),
90
+ ],
91
+ },
80
92
  pre_build: {
81
93
  commands: [
94
+ ...(preBuildCommands || []),
82
95
  ...dockerLoginCommands,
83
96
  'echo "Retrieving AWS Account ID..."',
84
97
  'export ACCOUNT_ID=$(aws sts get-caller-identity --query Account --output text)',
@@ -104,7 +117,11 @@ class TokenInjectableDockerBuilder extends constructs_1.Construct {
104
117
  // Grant permissions to CodeBuild
105
118
  this.ecrRepository.grantPullPush(codeBuildProject);
106
119
  codeBuildProject.role.addToPrincipalPolicy(new aws_iam_1.PolicyStatement({
107
- actions: ['ecr:GetAuthorizationToken', 'ecr:GetDownloadUrlForLayer', 'ecr:BatchCheckLayerAvailability'],
120
+ actions: [
121
+ 'ecr:GetAuthorizationToken',
122
+ 'ecr:GetDownloadUrlForLayer',
123
+ 'ecr:BatchCheckLayerAvailability',
124
+ ],
108
125
  resources: [this.ecrRepository.repositoryArn],
109
126
  }));
110
127
  if (dockerLoginSecretArn) {
@@ -168,5 +185,5 @@ class TokenInjectableDockerBuilder extends constructs_1.Construct {
168
185
  }
169
186
  exports.TokenInjectableDockerBuilder = TokenInjectableDockerBuilder;
170
187
  _a = JSII_RTTI_SYMBOL_1;
171
- TokenInjectableDockerBuilder[_a] = { fqn: "token-injectable-docker-builder.TokenInjectableDockerBuilder", version: "1.1.3" };
172
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;AAAA,iCAAiC;AACjC,6BAA6B;AAC7B,6CAAuD;AACvD,6DAAwF;AACxF,iDAAkF;AAClF,iDAAqD;AACrD,iDAAsD;AACtD,iDAA0C;AAC1C,uDAAkF;AAClF,6DAAkD;AAClD,mEAAwD;AACxD,2CAAuC;AAsCvC;;GAEG;AACH,MAAa,4BAA6B,SAAQ,sBAAS;IAKzD,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAwC;QAChF,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAEjB,MAAM,EAAE,IAAI,EAAE,UAAU,EAAE,SAAS,EAAE,oBAAoB,EAAE,GAAG,KAAK,CAAC;QAEpE,sCAAsC;QACtC,MAAM,aAAa,GAAG,IAAI,aAAG,CAAC,IAAI,EAAE,kBAAkB,EAAE;YACtD,iBAAiB,EAAE,IAAI;SACxB,CAAC,CAAC;QAEH,wFAAwF;QACxF,IAAI,CAAC,aAAa,GAAG,IAAI,oBAAU,CAAC,IAAI,EAAE,eAAe,EAAE;YACzD,cAAc,EAAE;gBACd;oBACE,YAAY,EAAE,CAAC;oBACf,WAAW,EAAE,oCAAoC;oBACjD,SAAS,EAAE,mBAAS,CAAC,QAAQ;oBAC7B,WAAW,EAAE,sBAAQ,CAAC,IAAI,CAAC,CAAC,CAAC;iBAC9B;aACF;YACD,UAAU,EAAE,8BAAoB,CAAC,GAAG;YACpC,aAAa,EAAE,aAAa;YAC5B,eAAe,EAAE,IAAI;SACtB,CAAC,CAAC;QAEH,sCAAsC;QACtC,MAAM,WAAW,GAAG,IAAI,qBAAK,CAAC,IAAI,EAAE,aAAa,EAAE;YACjD,IAAI,EAAE,UAAU;SACjB,CAAC,CAAC;QAEH,6DAA6D;QAC7D,MAAM,eAAe,GAAG,SAAS;YAC/B,CAAC,CAAC,MAAM,CAAC,OAAO,CAAC,SAAS,CAAC;iBACxB,GAAG,CAAC,CAAC,CAAC,GAAG,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,eAAe,GAAG,IAAI,KAAK,EAAE,CAAC;iBACpD,IAAI,CAAC,GAAG,CAAC;YACZ,CAAC,CAAC,EAAE,CAAC;QAEP,uCAAuC;QACvC,MAAM,mBAAmB,GAAG,oBAAoB;YAC9C,CAAC,CAAC;gBACA,8DAA8D;gBAC9D,qEAAqE,oBAAoB,wDAAwD;gBACjJ,qEAAqE,oBAAoB,wDAAwD;gBACjJ,gCAAgC;gBAChC,mFAAmF;aACpF;YACD,CAAC,CAAC,CAAC,6DAA6D,CAAC,CAAC;QAEpE,6BAA6B;QAC7B,MAAM,gBAAgB,GAAG,IAAI,uBAAO,CAAC,IAAI,EAAE,oBAAoB,EAAE;YAC/D,MAAM,EAAE,sBAAM,CAAC,EAAE,CAAC;gBAChB,MAAM,EAAE,WAAW,CAAC,MAAM;gBAC1B,IAAI,EAAE,WAAW,CAAC,WAAW;aAC9B,CAAC;YACF,WAAW,EAAE;gBACX,UAAU,EAAE,+BAAe,CAAC,YAAY;gBACxC,UAAU,EAAE,IAAI;aACjB;YACD,oBAAoB,EAAE;gBACpB,YAAY,EAAE,EAAE,KAAK,EAAE,IAAI,CAAC,aAAa,CAAC,aAAa,EAAE;gBACzD,UAAU,EAAE,EAAE,KAAK,EAAE,eAAe,EAAE;aACvC;YACD,SAAS,EAAE,yBAAS,CAAC,UAAU,CAAC;gBAC9B,OAAO,EAAE,KAAK;gBACd,MAAM,EAAE;oBACN,SAAS,EAAE;wBACT,QAAQ,EAAE;4BACR,GAAG,mBAAmB;4BACtB,qCAAqC;4BACrC,gFAAgF;4BAChF,oCAAoC;4BACpC,8JAA8J;yBAC/J;qBACF;oBACD,KAAK,EAAE;wBACL,QAAQ,EAAE;4BACR,gDAAgD;4BAChD,qEAAqE;yBACtE;qBACF;oBACD,UAAU,EAAE;wBACV,QAAQ,EAAE;4BACR,oDAAoD;4BACpD,kCAAkC;yBACnC;qBACF;iBACF;aACF,CAAC;SACH,CAAC,CAAC;QAEH,iCAAiC;QACjC,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC,gBAAgB,CAAC,CAAC;QAEnD,gBAAgB,CAAC,IAAK,CAAC,oBAAoB,CACzC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE,CAAC,2BAA2B,EAAE,4BAA4B,EAAE,iCAAiC,CAAC;YACvG,SAAS,EAAE,CAAC,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC;SAC9C,CAAC,CACH,CAAC;QAEF,IAAI,oBAAoB,EAAE,CAAC;YACzB,gBAAgB,CAAC,IAAK,CAAC,oBAAoB,CACzC,IAAI,yBAAe,CAAC;gBAClB,OAAO,EAAE,CAAC,+BAA+B,CAAC;gBAC1C,SAAS,EAAE,CAAC,oBAAoB,CAAC;aAClC,CAAC,CACH,CAAC;QACJ,CAAC;QAED,wCAAwC;QACxC,aAAa,CAAC,mBAAmB,CAAC,gBAAgB,CAAC,IAAK,CAAC,CAAC;QAE1D,8DAA8D;QAC9D,MAAM,sBAAsB,GAAG,IAAI,qBAAQ,CAAC,IAAI,EAAE,wBAAwB,EAAE;YAC1E,OAAO,EAAE,oBAAO,CAAC,WAAW;YAC5B,IAAI,EAAE,iBAAI,CAAC,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,SAAS,EAAE,YAAY,CAAC,CAAC;YAC3D,OAAO,EAAE,iBAAiB;YAC1B,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SAC9B,CAAC,CAAC;QAEH,sBAAsB,CAAC,eAAe,CACpC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE,CAAC,sBAAsB,CAAC;YACjC,SAAS,EAAE,CAAC,gBAAgB,CAAC,UAAU,CAAC,EAAE,+BAA+B;SAC1E,CAAC,CACH,CAAC;QACF,MAAM,yBAAyB,GAAG,IAAI,qBAAQ,CAAC,IAAI,EAAE,2BAA2B,EAAE;YAChF,OAAO,EAAE,oBAAO,CAAC,WAAW;YAC5B,IAAI,EAAE,iBAAI,CAAC,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,SAAS,EAAE,eAAe,CAAC,CAAC;YAC9D,OAAO,EAAE,oBAAoB;YAC7B,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SAC9B,CAAC,CAAC;QAEH,yBAAyB,CAAC,eAAe,CACvC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE;gBACP,0BAA0B;gBAC1B,gCAAgC;gBAChC,mBAAmB;gBACnB,yBAAyB;gBACzB,wBAAwB;aACzB;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CACH,CAAC;QAEF,mDAAmD;QACnD,aAAa,CAAC,mBAAmB,CAAC,sBAAsB,CAAC,CAAC;QAC1D,aAAa,CAAC,mBAAmB,CAAC,yBAAyB,CAAC,CAAC;QAC7D,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC,sBAAsB,CAAC,CAAC;QACzD,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC,yBAAyB,CAAC,CAAC;QAE5D,oCAAoC;QACpC,MAAM,QAAQ,GAAG,IAAI,2BAAQ,CAAC,IAAI,EAAE,wBAAwB,EAAE;YAC5D,cAAc,EAAE,sBAAsB;YACtC,iBAAiB,EAAE,yBAAyB;YAC5C,aAAa,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SACpC,CAAC,CAAC;QAEH,6BAA6B;QAC7B,MAAM,oBAAoB,GAAG,IAAI,4BAAc,CAAC,IAAI,EAAE,sBAAsB,EAAE;YAC5E,YAAY,EAAE,QAAQ,CAAC,YAAY;YACnC,UAAU,EAAE;gBACV,WAAW,EAAE,gBAAgB,CAAC,WAAW;gBACzC,OAAO,EAAE,MAAM,CAAC,UAAU,EAAE;aAC7B;SACF,CAAC,CAAC;QAEH,oBAAoB,CAAC,IAAI,CAAC,aAAa,CAAC,gBAAgB,CAAC,CAAC;QAC1D,IAAI,CAAC,cAAc,GAAG,wBAAc,CAAC,iBAAiB,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;QAC3E,IAAI,CAAC,eAAe,GAAG,4BAAe,CAAC,OAAO,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;IACrE,CAAC;;AAhLH,oEAiLC","sourcesContent":["import * as crypto from 'crypto';\nimport * as path from 'path';\nimport { CustomResource, Duration } from 'aws-cdk-lib';\nimport { Project, Source, LinuxBuildImage, BuildSpec } from 'aws-cdk-lib/aws-codebuild';\nimport { Repository, RepositoryEncryption, TagStatus } from 'aws-cdk-lib/aws-ecr';\nimport { ContainerImage } from 'aws-cdk-lib/aws-ecs';\nimport { PolicyStatement } from 'aws-cdk-lib/aws-iam';\nimport { Key } from 'aws-cdk-lib/aws-kms';\nimport { Runtime, Code, DockerImageCode, Function } from 'aws-cdk-lib/aws-lambda';\nimport { Asset } from 'aws-cdk-lib/aws-s3-assets';\nimport { Provider } from 'aws-cdk-lib/custom-resources';\nimport { Construct } from 'constructs';\n\n/**\n * Properties for the `TokenInjectableDockerBuilder` construct.\n */\nexport interface TokenInjectableDockerBuilderProps {\n  /**\n   * The path to the directory containing the Dockerfile or source code.\n   */\n  readonly path: string;\n\n  /**\n   * Build arguments to pass to the Docker build process.\n   * These are transformed into `--build-arg` flags.\n   * @example\n   * {\n   *   TOKEN: 'my-secret-token',\n   *   ENV: 'production'\n   * }\n   */\n  readonly buildArgs?: { [key: string]: string };\n\n  /**\n   * The ARN of the AWS Secrets Manager secret containing Docker login credentials.\n   * This secret should store a JSON object with the following structure:\n   * ```json\n   * {\n   *   \"username\": \"my-docker-username\",\n   *   \"password\": \"my-docker-password\"\n   * }\n   * ```\n   * If not provided, the construct will skip Docker login during the build process.\n   *\n   * @example 'arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret'\n   */\n  readonly dockerLoginSecretArn?: string;\n}\n\n/**\n * A CDK construct to build and push Docker images to an ECR repository using CodeBuild and Lambda custom resources.\n */\nexport class TokenInjectableDockerBuilder extends Construct {\n  private readonly ecrRepository: Repository;\n  public readonly containerImage: ContainerImage;\n  public readonly dockerImageCode: DockerImageCode;\n\n  constructor(scope: Construct, id: string, props: TokenInjectableDockerBuilderProps) {\n    super(scope, id);\n\n    const { path: sourcePath, buildArgs, dockerLoginSecretArn } = props;\n\n    // Define a KMS key for ECR encryption\n    const encryptionKey = new Key(this, 'EcrEncryptionKey', {\n      enableKeyRotation: true,\n    });\n\n    // Create an ECR repository with lifecycle rules, encryption, and image scanning enabled\n    this.ecrRepository = new Repository(this, 'ECRRepository', {\n      lifecycleRules: [\n        {\n          rulePriority: 1,\n          description: 'Remove untagged images after 1 day',\n          tagStatus: TagStatus.UNTAGGED,\n          maxImageAge: Duration.days(1),\n        },\n      ],\n      encryption: RepositoryEncryption.KMS,\n      encryptionKey: encryptionKey,\n      imageScanOnPush: true,\n    });\n\n    // Package the source code as an asset\n    const sourceAsset = new Asset(this, 'SourceAsset', {\n      path: sourcePath,\n    });\n\n    // Transform buildArgs into a string of --build-arg KEY=VALUE\n    const buildArgsString = buildArgs\n      ? Object.entries(buildArgs)\n        .map(([key, value]) => `--build-arg ${key}=${value}`)\n        .join(' ')\n      : '';\n\n    // Conditional Dockerhub login commands\n    const dockerLoginCommands = dockerLoginSecretArn\n      ? [\n        'echo \"Retrieving Docker credentials from Secrets Manager...\"',\n        `DOCKER_USERNAME=$(aws secretsmanager get-secret-value --secret-id ${dockerLoginSecretArn} --query SecretString --output text | jq -r .username)`,\n        `DOCKER_PASSWORD=$(aws secretsmanager get-secret-value --secret-id ${dockerLoginSecretArn} --query SecretString --output text | jq -r .password)`,\n        'echo \"Logging in to Docker...\"',\n        'echo $DOCKER_PASSWORD | docker login --username $DOCKER_USERNAME --password-stdin',\n      ]\n      : ['echo \"No Docker credentials provided. Skipping login step.\"'];\n\n    // Create a CodeBuild project\n    const codeBuildProject = new Project(this, 'UICodeBuildProject', {\n      source: Source.s3({\n        bucket: sourceAsset.bucket,\n        path: sourceAsset.s3ObjectKey,\n      }),\n      environment: {\n        buildImage: LinuxBuildImage.STANDARD_7_0,\n        privileged: true,\n      },\n      environmentVariables: {\n        ECR_REPO_URI: { value: this.ecrRepository.repositoryUri },\n        BUILD_ARGS: { value: buildArgsString },\n      },\n      buildSpec: BuildSpec.fromObject({\n        version: '0.2',\n        phases: {\n          pre_build: {\n            commands: [\n              ...dockerLoginCommands,\n              'echo \"Retrieving AWS Account ID...\"',\n              'export ACCOUNT_ID=$(aws sts get-caller-identity --query Account --output text)',\n              'echo \"Logging in to Amazon ECR...\"',\n              'aws ecr get-login-password --region $AWS_DEFAULT_REGION | docker login --username AWS --password-stdin $ACCOUNT_ID.dkr.ecr.$AWS_DEFAULT_REGION.amazonaws.com',\n            ],\n          },\n          build: {\n            commands: [\n              'echo Build phase: Building the Docker image...',\n              'docker build $BUILD_ARGS -t $ECR_REPO_URI:latest $CODEBUILD_SRC_DIR',\n            ],\n          },\n          post_build: {\n            commands: [\n              'echo Post-build phase: Pushing the Docker image...',\n              'docker push $ECR_REPO_URI:latest',\n            ],\n          },\n        },\n      }),\n    });\n\n    // Grant permissions to CodeBuild\n    this.ecrRepository.grantPullPush(codeBuildProject);\n\n    codeBuildProject.role!.addToPrincipalPolicy(\n      new PolicyStatement({\n        actions: ['ecr:GetAuthorizationToken', 'ecr:GetDownloadUrlForLayer', 'ecr:BatchCheckLayerAvailability'],\n        resources: [this.ecrRepository.repositoryArn],\n      }),\n    );\n\n    if (dockerLoginSecretArn) {\n      codeBuildProject.role!.addToPrincipalPolicy(\n        new PolicyStatement({\n          actions: ['secretsmanager:GetSecretValue'],\n          resources: [dockerLoginSecretArn],\n        }),\n      );\n    }\n\n    // Grant CodeBuild access to the KMS key\n    encryptionKey.grantEncryptDecrypt(codeBuildProject.role!);\n\n    // Create Lambda functions for onEvent and isComplete handlers\n    const onEventHandlerFunction = new Function(this, 'OnEventHandlerFunction', {\n      runtime: Runtime.NODEJS_18_X,\n      code: Code.fromAsset(path.resolve(__dirname, '../onEvent')),\n      handler: 'onEvent.handler',\n      timeout: Duration.minutes(15),\n    });\n\n    onEventHandlerFunction.addToRolePolicy(\n      new PolicyStatement({\n        actions: ['codebuild:StartBuild'],\n        resources: [codeBuildProject.projectArn], // Restrict to specific project\n      }),\n    );\n    const isCompleteHandlerFunction = new Function(this, 'IsCompleteHandlerFunction', {\n      runtime: Runtime.NODEJS_18_X,\n      code: Code.fromAsset(path.resolve(__dirname, '../isComplete')),\n      handler: 'isComplete.handler',\n      timeout: Duration.minutes(15),\n    });\n\n    isCompleteHandlerFunction.addToRolePolicy(\n      new PolicyStatement({\n        actions: [\n          'codebuild:BatchGetBuilds',\n          'codebuild:ListBuildsForProject',\n          'logs:GetLogEvents',\n          'logs:DescribeLogStreams',\n          'logs:DescribeLogGroups',\n        ],\n        resources: ['*'],\n      }),\n    );\n\n    // Grant Lambda functions access to KMS key and ECR\n    encryptionKey.grantEncryptDecrypt(onEventHandlerFunction);\n    encryptionKey.grantEncryptDecrypt(isCompleteHandlerFunction);\n    this.ecrRepository.grantPullPush(onEventHandlerFunction);\n    this.ecrRepository.grantPullPush(isCompleteHandlerFunction);\n\n    // Create a custom resource provider\n    const provider = new Provider(this, 'CustomResourceProvider', {\n      onEventHandler: onEventHandlerFunction,\n      isCompleteHandler: isCompleteHandlerFunction,\n      queryInterval: Duration.seconds(30),\n    });\n\n    // Define the custom resource\n    const buildTriggerResource = new CustomResource(this, 'BuildTriggerResource', {\n      serviceToken: provider.serviceToken,\n      properties: {\n        ProjectName: codeBuildProject.projectName,\n        Trigger: crypto.randomUUID(),\n      },\n    });\n\n    buildTriggerResource.node.addDependency(codeBuildProject);\n    this.containerImage = ContainerImage.fromEcrRepository(this.ecrRepository);\n    this.dockerImageCode = DockerImageCode.fromEcr(this.ecrRepository);\n  }\n}\n"]}
188
+ TokenInjectableDockerBuilder[_a] = { fqn: "token-injectable-docker-builder.TokenInjectableDockerBuilder", version: "1.2.1" };
189
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;AAAA,iCAAiC;AACjC,6BAA6B;AAC7B,6CAAuD;AACvD,6DAAwF;AAExF,iDAAkF;AAClF,iDAAqD;AACrD,iDAAsD;AACtD,iDAA0C;AAC1C,uDAAkF;AAClF,6DAAkD;AAClD,mEAAwD;AACxD,2CAAuC;AAsGvC;;GAEG;AACH,MAAa,4BAA6B,SAAQ,sBAAS;IAKzD,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAwC;QAChF,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAEjB,MAAM,EACJ,IAAI,EAAE,UAAU,EAChB,SAAS,EACT,oBAAoB,EACpB,GAAG,EACH,cAAc,EACd,eAAe,EACf,eAAe,EACf,gBAAgB,GACjB,GAAG,KAAK,CAAC;QAEV,sCAAsC;QACtC,MAAM,aAAa,GAAG,IAAI,aAAG,CAAC,IAAI,EAAE,kBAAkB,EAAE;YACtD,iBAAiB,EAAE,IAAI;SACxB,CAAC,CAAC;QAEH,wFAAwF;QACxF,IAAI,CAAC,aAAa,GAAG,IAAI,oBAAU,CAAC,IAAI,EAAE,eAAe,EAAE;YACzD,cAAc,EAAE;gBACd;oBACE,YAAY,EAAE,CAAC;oBACf,WAAW,EAAE,oCAAoC;oBACjD,SAAS,EAAE,mBAAS,CAAC,QAAQ;oBAC7B,WAAW,EAAE,sBAAQ,CAAC,IAAI,CAAC,CAAC,CAAC;iBAC9B;aACF;YACD,UAAU,EAAE,8BAAoB,CAAC,GAAG;YACpC,aAAa,EAAE,aAAa;YAC5B,eAAe,EAAE,IAAI;SACtB,CAAC,CAAC;QAEH,sCAAsC;QACtC,MAAM,WAAW,GAAG,IAAI,qBAAK,CAAC,IAAI,EAAE,aAAa,EAAE;YACjD,IAAI,EAAE,UAAU;SACjB,CAAC,CAAC;QAEH,6DAA6D;QAC7D,MAAM,eAAe,GAAG,SAAS;YAC/B,CAAC,CAAC,MAAM,CAAC,OAAO,CAAC,SAAS,CAAC;iBACxB,GAAG,CAAC,CAAC,CAAC,GAAG,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,eAAe,GAAG,IAAI,KAAK,EAAE,CAAC;iBACpD,IAAI,CAAC,GAAG,CAAC;YACZ,CAAC,CAAC,EAAE,CAAC;QAEP,uCAAuC;QACvC,MAAM,mBAAmB,GAAG,oBAAoB;YAC9C,CAAC,CAAC;gBACA,8DAA8D;gBAC9D,qEAAqE,oBAAoB,wDAAwD;gBACjJ,qEAAqE,oBAAoB,wDAAwD;gBACjJ,gCAAgC;gBAChC,mFAAmF;aACpF;YACD,CAAC,CAAC,CAAC,6DAA6D,CAAC,CAAC;QAEpE,6BAA6B;QAC7B,MAAM,gBAAgB,GAAG,IAAI,uBAAO,CAAC,IAAI,EAAE,oBAAoB,EAAE;YAC/D,MAAM,EAAE,sBAAM,CAAC,EAAE,CAAC;gBAChB,MAAM,EAAE,WAAW,CAAC,MAAM;gBAC1B,IAAI,EAAE,WAAW,CAAC,WAAW;aAC9B,CAAC;YACF,WAAW,EAAE;gBACX,UAAU,EAAE,+BAAe,CAAC,YAAY;gBACxC,UAAU,EAAE,IAAI;aACjB;YACD,oBAAoB,EAAE;gBACpB,YAAY,EAAE,EAAE,KAAK,EAAE,IAAI,CAAC,aAAa,CAAC,aAAa,EAAE;gBACzD,UAAU,EAAE,EAAE,KAAK,EAAE,eAAe,EAAE;gBACtC,6DAA6D;gBAC7D,GAAG,CAAC,SAAS;oBACX,MAAM,CAAC,WAAW,CAChB,MAAM,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,GAAG,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,CAAC,GAAG,EAAE,EAAE,KAAK,EAAE,CAAC,CAAC,CAClE,CAAC;aACL;YACD,GAAG;YACH,cAAc;YACd,eAAe;YACf,SAAS,EAAE,yBAAS,CAAC,UAAU,CAAC;gBAC9B,OAAO,EAAE,KAAK;gBACd,MAAM,EAAE;oBACN,OAAO,EAAE;wBACP,QAAQ,EAAE;4BACR,mCAAmC;4BACnC,GAAG,CAAC,eAAe,IAAI,EAAE,CAAC;yBAC3B;qBACF;oBACD,SAAS,EAAE;wBACT,QAAQ,EAAE;4BACR,GAAG,CAAC,gBAAgB,IAAI,EAAE,CAAC;4BAC3B,GAAG,mBAAmB;4BACtB,qCAAqC;4BACrC,gFAAgF;4BAChF,oCAAoC;4BACpC,8JAA8J;yBAC/J;qBACF;oBACD,KAAK,EAAE;wBACL,QAAQ,EAAE;4BACR,gDAAgD;4BAChD,qEAAqE;yBACtE;qBACF;oBACD,UAAU,EAAE;wBACV,QAAQ,EAAE;4BACR,oDAAoD;4BACpD,kCAAkC;yBACnC;qBACF;iBACF;aACF,CAAC;SACH,CAAC,CAAC;QAEH,iCAAiC;QACjC,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC,gBAAgB,CAAC,CAAC;QAEnD,gBAAgB,CAAC,IAAK,CAAC,oBAAoB,CACzC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE;gBACP,2BAA2B;gBAC3B,4BAA4B;gBAC5B,iCAAiC;aAClC;YACD,SAAS,EAAE,CAAC,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC;SAC9C,CAAC,CACH,CAAC;QAEF,IAAI,oBAAoB,EAAE,CAAC;YACzB,gBAAgB,CAAC,IAAK,CAAC,oBAAoB,CACzC,IAAI,yBAAe,CAAC;gBAClB,OAAO,EAAE,CAAC,+BAA+B,CAAC;gBAC1C,SAAS,EAAE,CAAC,oBAAoB,CAAC;aAClC,CAAC,CACH,CAAC;QACJ,CAAC;QAED,wCAAwC;QACxC,aAAa,CAAC,mBAAmB,CAAC,gBAAgB,CAAC,IAAK,CAAC,CAAC;QAE1D,8DAA8D;QAC9D,MAAM,sBAAsB,GAAG,IAAI,qBAAQ,CAAC,IAAI,EAAE,wBAAwB,EAAE;YAC1E,OAAO,EAAE,oBAAO,CAAC,WAAW;YAC5B,IAAI,EAAE,iBAAI,CAAC,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,SAAS,EAAE,YAAY,CAAC,CAAC;YAC3D,OAAO,EAAE,iBAAiB;YAC1B,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SAC9B,CAAC,CAAC;QAEH,sBAAsB,CAAC,eAAe,CACpC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE,CAAC,sBAAsB,CAAC;YACjC,SAAS,EAAE,CAAC,gBAAgB,CAAC,UAAU,CAAC,EAAE,+BAA+B;SAC1E,CAAC,CACH,CAAC;QAEF,MAAM,yBAAyB,GAAG,IAAI,qBAAQ,CAAC,IAAI,EAAE,2BAA2B,EAAE;YAChF,OAAO,EAAE,oBAAO,CAAC,WAAW;YAC5B,IAAI,EAAE,iBAAI,CAAC,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,SAAS,EAAE,eAAe,CAAC,CAAC;YAC9D,OAAO,EAAE,oBAAoB;YAC7B,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SAC9B,CAAC,CAAC;QAEH,yBAAyB,CAAC,eAAe,CACvC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE;gBACP,0BAA0B;gBAC1B,gCAAgC;gBAChC,mBAAmB;gBACnB,yBAAyB;gBACzB,wBAAwB;aACzB;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CACH,CAAC;QAEF,mDAAmD;QACnD,aAAa,CAAC,mBAAmB,CAAC,sBAAsB,CAAC,CAAC;QAC1D,aAAa,CAAC,mBAAmB,CAAC,yBAAyB,CAAC,CAAC;QAC7D,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC,sBAAsB,CAAC,CAAC;QACzD,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC,yBAAyB,CAAC,CAAC;QAE5D,oCAAoC;QACpC,MAAM,QAAQ,GAAG,IAAI,2BAAQ,CAAC,IAAI,EAAE,wBAAwB,EAAE;YAC5D,cAAc,EAAE,sBAAsB;YACtC,iBAAiB,EAAE,yBAAyB;YAC5C,aAAa,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SACpC,CAAC,CAAC;QAEH,6BAA6B;QAC7B,MAAM,oBAAoB,GAAG,IAAI,4BAAc,CAAC,IAAI,EAAE,sBAAsB,EAAE;YAC5E,YAAY,EAAE,QAAQ,CAAC,YAAY;YACnC,UAAU,EAAE;gBACV,WAAW,EAAE,gBAAgB,CAAC,WAAW;gBACzC,OAAO,EAAE,MAAM,CAAC,UAAU,EAAE;aAC7B;SACF,CAAC,CAAC;QAEH,oBAAoB,CAAC,IAAI,CAAC,aAAa,CAAC,gBAAgB,CAAC,CAAC;QAC1D,IAAI,CAAC,cAAc,GAAG,wBAAc,CAAC,iBAAiB,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;QAC3E,IAAI,CAAC,eAAe,GAAG,4BAAe,CAAC,OAAO,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;IACrE,CAAC;;AA7MH,oEA8MC","sourcesContent":["import * as crypto from 'crypto';\nimport * as path from 'path';\nimport { CustomResource, Duration } from 'aws-cdk-lib';\nimport { Project, Source, LinuxBuildImage, BuildSpec } from 'aws-cdk-lib/aws-codebuild';\nimport { IVpc, ISecurityGroup, SubnetSelection } from 'aws-cdk-lib/aws-ec2';\nimport { Repository, RepositoryEncryption, TagStatus } from 'aws-cdk-lib/aws-ecr';\nimport { ContainerImage } from 'aws-cdk-lib/aws-ecs';\nimport { PolicyStatement } from 'aws-cdk-lib/aws-iam';\nimport { Key } from 'aws-cdk-lib/aws-kms';\nimport { Runtime, Code, DockerImageCode, Function } from 'aws-cdk-lib/aws-lambda';\nimport { Asset } from 'aws-cdk-lib/aws-s3-assets';\nimport { Provider } from 'aws-cdk-lib/custom-resources';\nimport { Construct } from 'constructs';\n\n/**\n * Properties for the `TokenInjectableDockerBuilder` construct.\n */\nexport interface TokenInjectableDockerBuilderProps {\n  /**\n   * The path to the directory containing the Dockerfile or source code.\n   */\n  readonly path: string;\n\n  /**\n   * Build arguments to pass to the Docker build process.\n   * These are transformed into `--build-arg` flags.\n   * @example\n   * {\n   *   TOKEN: 'my-secret-token',\n   *   ENV: 'production'\n   * }\n   */\n  readonly buildArgs?: { [key: string]: string };\n\n  /**\n   * The ARN of the AWS Secrets Manager secret containing Docker login credentials.\n   * This secret should store a JSON object with the following structure:\n   * ```json\n   * {\n   *   \"username\": \"my-docker-username\",\n   *   \"password\": \"my-docker-password\"\n   * }\n   * ```\n   * If not provided, the construct will skip Docker login during the build process.\n   *\n   * @example 'arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret'\n   */\n  readonly dockerLoginSecretArn?: string;\n\n  /**\n   * The VPC in which the CodeBuild project will be deployed.\n   * If provided, the CodeBuild project will be launched within the specified VPC.\n   * @default No VPC is attached, and the CodeBuild project will use public internet.\n   */\n  readonly vpc?: IVpc;\n\n  /**\n   * The security groups to attach to the CodeBuild project.\n   * These should define the network access rules for the CodeBuild project.\n   * @default No security groups are attached.\n   */\n  readonly securityGroups?: ISecurityGroup[];\n\n  /**\n   * The subnet selection to specify which subnets to use within the VPC.\n   * Allows the user to select private, public, or isolated subnets.\n   * @default All subnets in the VPC are used.\n   */\n  readonly subnetSelection?: SubnetSelection;\n\n  /**\n   * Custom commands to run during the install phase.\n   *\n   * **Example Usage:**\n   * ```typescript\n   * new TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {\n   *   path: path.resolve(__dirname, '../app'),\n   *   installCommands: [\n   *     'echo \"Updating package lists...\"',\n   *     'apt-get update -y',\n   *     'echo \"Installing required packages...\"',\n   *     'apt-get install -y curl dnsutils',\n   *   ],\n   *   // ... other properties ...\n   * });\n   * ```\n   * *This example demonstrates how to install the `curl` and `dnsutils` packages during the install phase using `apt-get`, the package manager for Ubuntu-based CodeBuild environments.*\n   *\n   * @default - No additional install commands.\n   */\n  readonly installCommands?: string[];\n\n\n  /**\n   * Custom commands to run during the pre_build phase.\n   *\n   * **Example Usage:**\n   * ```typescript\n   * new TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {\n   *   path: path.resolve(__dirname, '../app'),\n   *   preBuildCommands: [\n   *     'echo \"Fetching configuration from private API...\"',\n   *     'curl -o config.json https://api.example.com/config',\n   *   ],\n   *   // ... other properties ...\n   * });\n   * ```\n   * *In this example, the builder fetches a configuration file from a private API before starting the Docker build. This config file will be available in the same directory as your Dockerfile during CDK deployment.*\n   *\n   * @default - No additional pre-build commands.\n   */\n  readonly preBuildCommands?: string[];\n}\n\n/**\n * A CDK construct to build and push Docker images to an ECR repository using CodeBuild and Lambda custom resources.\n */\nexport class TokenInjectableDockerBuilder extends Construct {\n  private readonly ecrRepository: Repository;\n  public readonly containerImage: ContainerImage;\n  public readonly dockerImageCode: DockerImageCode;\n\n  constructor(scope: Construct, id: string, props: TokenInjectableDockerBuilderProps) {\n    super(scope, id);\n\n    const {\n      path: sourcePath,\n      buildArgs,\n      dockerLoginSecretArn,\n      vpc,\n      securityGroups,\n      subnetSelection,\n      installCommands,\n      preBuildCommands,\n    } = props;\n\n    // Define a KMS key for ECR encryption\n    const encryptionKey = new Key(this, 'EcrEncryptionKey', {\n      enableKeyRotation: true,\n    });\n\n    // Create an ECR repository with lifecycle rules, encryption, and image scanning enabled\n    this.ecrRepository = new Repository(this, 'ECRRepository', {\n      lifecycleRules: [\n        {\n          rulePriority: 1,\n          description: 'Remove untagged images after 1 day',\n          tagStatus: TagStatus.UNTAGGED,\n          maxImageAge: Duration.days(1),\n        },\n      ],\n      encryption: RepositoryEncryption.KMS,\n      encryptionKey: encryptionKey,\n      imageScanOnPush: true,\n    });\n\n    // Package the source code as an asset\n    const sourceAsset = new Asset(this, 'SourceAsset', {\n      path: sourcePath,\n    });\n\n    // Transform buildArgs into a string of --build-arg KEY=VALUE\n    const buildArgsString = buildArgs\n      ? Object.entries(buildArgs)\n        .map(([key, value]) => `--build-arg ${key}=${value}`)\n        .join(' ')\n      : '';\n\n    // Conditional Dockerhub login commands\n    const dockerLoginCommands = dockerLoginSecretArn\n      ? [\n        'echo \"Retrieving Docker credentials from Secrets Manager...\"',\n        `DOCKER_USERNAME=$(aws secretsmanager get-secret-value --secret-id ${dockerLoginSecretArn} --query SecretString --output text | jq -r .username)`,\n        `DOCKER_PASSWORD=$(aws secretsmanager get-secret-value --secret-id ${dockerLoginSecretArn} --query SecretString --output text | jq -r .password)`,\n        'echo \"Logging in to Docker...\"',\n        'echo $DOCKER_PASSWORD | docker login --username $DOCKER_USERNAME --password-stdin',\n      ]\n      : ['echo \"No Docker credentials provided. Skipping login step.\"'];\n\n    // Create a CodeBuild project\n    const codeBuildProject = new Project(this, 'UICodeBuildProject', {\n      source: Source.s3({\n        bucket: sourceAsset.bucket,\n        path: sourceAsset.s3ObjectKey,\n      }),\n      environment: {\n        buildImage: LinuxBuildImage.STANDARD_7_0,\n        privileged: true,\n      },\n      environmentVariables: {\n        ECR_REPO_URI: { value: this.ecrRepository.repositoryUri },\n        BUILD_ARGS: { value: buildArgsString },\n        // Include build arguments as environment variables if needed\n        ...(buildArgs &&\n          Object.fromEntries(\n            Object.entries(buildArgs).map(([key, value]) => [key, { value }]),\n          )),\n      },\n      vpc,\n      securityGroups,\n      subnetSelection,\n      buildSpec: BuildSpec.fromObject({\n        version: '0.2',\n        phases: {\n          install: {\n            commands: [\n              'echo \"Beginning install phase...\"',\n              ...(installCommands || []),\n            ],\n          },\n          pre_build: {\n            commands: [\n              ...(preBuildCommands || []),\n              ...dockerLoginCommands,\n              'echo \"Retrieving AWS Account ID...\"',\n              'export ACCOUNT_ID=$(aws sts get-caller-identity --query Account --output text)',\n              'echo \"Logging in to Amazon ECR...\"',\n              'aws ecr get-login-password --region $AWS_DEFAULT_REGION | docker login --username AWS --password-stdin $ACCOUNT_ID.dkr.ecr.$AWS_DEFAULT_REGION.amazonaws.com',\n            ],\n          },\n          build: {\n            commands: [\n              'echo Build phase: Building the Docker image...',\n              'docker build $BUILD_ARGS -t $ECR_REPO_URI:latest $CODEBUILD_SRC_DIR',\n            ],\n          },\n          post_build: {\n            commands: [\n              'echo Post-build phase: Pushing the Docker image...',\n              'docker push $ECR_REPO_URI:latest',\n            ],\n          },\n        },\n      }),\n    });\n\n    // Grant permissions to CodeBuild\n    this.ecrRepository.grantPullPush(codeBuildProject);\n\n    codeBuildProject.role!.addToPrincipalPolicy(\n      new PolicyStatement({\n        actions: [\n          'ecr:GetAuthorizationToken',\n          'ecr:GetDownloadUrlForLayer',\n          'ecr:BatchCheckLayerAvailability',\n        ],\n        resources: [this.ecrRepository.repositoryArn],\n      }),\n    );\n\n    if (dockerLoginSecretArn) {\n      codeBuildProject.role!.addToPrincipalPolicy(\n        new PolicyStatement({\n          actions: ['secretsmanager:GetSecretValue'],\n          resources: [dockerLoginSecretArn],\n        }),\n      );\n    }\n\n    // Grant CodeBuild access to the KMS key\n    encryptionKey.grantEncryptDecrypt(codeBuildProject.role!);\n\n    // Create Lambda functions for onEvent and isComplete handlers\n    const onEventHandlerFunction = new Function(this, 'OnEventHandlerFunction', {\n      runtime: Runtime.NODEJS_18_X,\n      code: Code.fromAsset(path.resolve(__dirname, '../onEvent')),\n      handler: 'onEvent.handler',\n      timeout: Duration.minutes(15),\n    });\n\n    onEventHandlerFunction.addToRolePolicy(\n      new PolicyStatement({\n        actions: ['codebuild:StartBuild'],\n        resources: [codeBuildProject.projectArn], // Restrict to specific project\n      }),\n    );\n\n    const isCompleteHandlerFunction = new Function(this, 'IsCompleteHandlerFunction', {\n      runtime: Runtime.NODEJS_18_X,\n      code: Code.fromAsset(path.resolve(__dirname, '../isComplete')),\n      handler: 'isComplete.handler',\n      timeout: Duration.minutes(15),\n    });\n\n    isCompleteHandlerFunction.addToRolePolicy(\n      new PolicyStatement({\n        actions: [\n          'codebuild:BatchGetBuilds',\n          'codebuild:ListBuildsForProject',\n          'logs:GetLogEvents',\n          'logs:DescribeLogStreams',\n          'logs:DescribeLogGroups',\n        ],\n        resources: ['*'],\n      }),\n    );\n\n    // Grant Lambda functions access to KMS key and ECR\n    encryptionKey.grantEncryptDecrypt(onEventHandlerFunction);\n    encryptionKey.grantEncryptDecrypt(isCompleteHandlerFunction);\n    this.ecrRepository.grantPullPush(onEventHandlerFunction);\n    this.ecrRepository.grantPullPush(isCompleteHandlerFunction);\n\n    // Create a custom resource provider\n    const provider = new Provider(this, 'CustomResourceProvider', {\n      onEventHandler: onEventHandlerFunction,\n      isCompleteHandler: isCompleteHandlerFunction,\n      queryInterval: Duration.seconds(30),\n    });\n\n    // Define the custom resource\n    const buildTriggerResource = new CustomResource(this, 'BuildTriggerResource', {\n      serviceToken: provider.serviceToken,\n      properties: {\n        ProjectName: codeBuildProject.projectName,\n        Trigger: crypto.randomUUID(),\n      },\n    });\n\n    buildTriggerResource.node.addDependency(codeBuildProject);\n    this.containerImage = ContainerImage.fromEcrRepository(this.ecrRepository);\n    this.dockerImageCode = DockerImageCode.fromEcr(this.ecrRepository);\n  }\n}\n"]}
package/package.json CHANGED
@@ -40,7 +40,7 @@
40
40
  "devDependencies": {
41
41
  "@stylistic/eslint-plugin": "^2",
42
42
  "@types/jest": "^29.5.14",
43
- "@types/node": "^22.9.4",
43
+ "@types/node": "^22.10.1",
44
44
  "@typescript-eslint/eslint-plugin": "^8",
45
45
  "@typescript-eslint/parser": "^8",
46
46
  "aws-cdk-lib": "2.166.0",
@@ -96,7 +96,7 @@
96
96
  "publishConfig": {
97
97
  "access": "public"
98
98
  },
99
- "version": "1.1.3",
99
+ "version": "1.2.1",
100
100
  "jest": {
101
101
  "coverageProvider": "v8",
102
102
  "testMatch": [