Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: add additional options for assuming roles #115

Merged
merged 1 commit into from
Oct 3, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
16 changes: 15 additions & 1 deletion lib/aws.ts
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,12 @@ import {
GetSecretValueCommandOutput,
SecretsManagerClient,
} from '@aws-sdk/client-secrets-manager';
import { GetCallerIdentityCommand, STSClient, STSClientConfig } from '@aws-sdk/client-sts';
import {
AssumeRoleCommandInput,
GetCallerIdentityCommand,
STSClient,
STSClientConfig,
} from '@aws-sdk/client-sts';
import { fromNodeProviderChain, fromTemporaryCredentials } from '@aws-sdk/credential-providers';
import { Upload } from '@aws-sdk/lib-storage';
import {
Expand All @@ -41,6 +46,10 @@ import {
import { loadConfig } from '@smithy/node-config-provider';
import type { AwsCredentialIdentityProvider } from '@smithy/types';

export type AssumeRoleAdditionalOptions = Partial<
Omit<AssumeRoleCommandInput, 'ExternalId' | 'RoleArn'>
>;

export interface IS3Client {
getBucketEncryption(
input: GetBucketEncryptionCommandInput
Expand Down Expand Up @@ -82,6 +91,7 @@ export interface ClientOptions {
region?: string;
assumeRoleArn?: string;
assumeRoleExternalId?: string;
assumeRoleAdditionalOptions?: AssumeRoleAdditionalOptions;
quiet?: boolean;
}

Expand Down Expand Up @@ -228,6 +238,10 @@ export class DefaultAwsClient implements IAws {
RoleArn: options.assumeRoleArn,
ExternalId: options.assumeRoleExternalId,
RoleSessionName: `${USER_AGENT}-${safeUsername()}`,
TransitiveTagKeys: options.assumeRoleAdditionalOptions?.Tags
? options.assumeRoleAdditionalOptions.Tags.map((t) => t.Key!)
: undefined,
...options.assumeRoleAdditionalOptions,
},
clientConfig: this.config.clientConfig,
});
Expand Down
3 changes: 2 additions & 1 deletion lib/private/handlers/container-images.ts
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
import * as path from 'path';
import { DockerImageDestination } from '@aws-cdk/cloud-assembly-schema';
import { destinationToClientOptions } from '.';
import { DockerImageManifestEntry } from '../../asset-manifest';
import type { IECRClient } from '../../aws';
import { EventType } from '../../progress';
Expand Down Expand Up @@ -105,7 +106,7 @@ export class ContainerImageAssetHandler implements IAssetHandler {

const destination = await replaceAwsPlaceholders(this.asset.destination, this.host.aws);
const ecr = await this.host.aws.ecrClient({
...destination,
...destinationToClientOptions(destination),
quiet: options.quiet,
});
const account = async () => (await this.host.aws.discoverCurrentAccount())?.accountId;
Expand Down
5 changes: 3 additions & 2 deletions lib/private/handlers/files.ts
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@ import { createReadStream, promises as fs } from 'fs';
import * as path from 'path';
import { FileAssetPackaging, FileSource } from '@aws-cdk/cloud-assembly-schema';
import * as mime from 'mime';
import { destinationToClientOptions } from '.';
import { FileManifestEntry } from '../../asset-manifest';
import { IS3Client } from '../../aws';
import { EventType } from '../../progress';
Expand Down Expand Up @@ -36,7 +37,7 @@ export class FileAssetHandler implements IAssetHandler {
const s3Url = `s3://${destination.bucketName}/${destination.objectKey}`;
try {
const s3 = await this.host.aws.s3Client({
...destination,
...destinationToClientOptions(destination),
quiet: true,
});
this.host.emitMessage(EventType.CHECK, `Check ${s3Url}`);
Expand All @@ -54,7 +55,7 @@ export class FileAssetHandler implements IAssetHandler {
public async publish(): Promise<void> {
const destination = await replaceAwsPlaceholders(this.asset.destination, this.host.aws);
const s3Url = `s3://${destination.bucketName}/${destination.objectKey}`;
const s3 = await this.host.aws.s3Client(destination);
const s3 = await this.host.aws.s3Client(destinationToClientOptions(destination));
this.host.emitMessage(EventType.CHECK, `Check ${s3Url}`);

const bucketInfo = BucketInformation.for(this.host);
Expand Down
17 changes: 14 additions & 3 deletions lib/private/handlers/index.ts
Original file line number Diff line number Diff line change
@@ -1,12 +1,14 @@
import type { AwsDestination } from '@aws-cdk/cloud-assembly-schema';
import { ContainerImageAssetHandler } from './container-images';
import { FileAssetHandler } from './files';
import {
AssetManifest,
type AssetManifest,
DockerImageManifestEntry,
FileManifestEntry,
IManifestEntry,
type IManifestEntry,
} from '../../asset-manifest';
import { IAssetHandler, IHandlerHost, IHandlerOptions } from '../asset-handler';
import type { ClientOptions } from '../../aws';
import type { IAssetHandler, IHandlerHost, IHandlerOptions } from '../asset-handler';

export function makeAssetHandler(
manifest: AssetManifest,
Expand All @@ -23,3 +25,12 @@ export function makeAssetHandler(

throw new Error(`Unrecognized asset type: '${asset}'`);
}

export function destinationToClientOptions(destination: AwsDestination): ClientOptions {
return {
assumeRoleArn: destination.assumeRoleArn,
assumeRoleExternalId: destination.assumeRoleExternalId,
assumeRoleAdditionalOptions: destination.assumeRoleAdditionalOptions,
region: destination.region,
};
}
2 changes: 1 addition & 1 deletion package.json

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

76 changes: 76 additions & 0 deletions test/aws.test.ts
Original file line number Diff line number Diff line change
@@ -0,0 +1,76 @@
import 'aws-sdk-client-mock-jest';

import { GetCallerIdentityCommand } from '@aws-sdk/client-sts';
import { fromTemporaryCredentials } from '@aws-sdk/credential-providers';
import { mockSTS } from './mock-aws';
import { DefaultAwsClient } from '../lib';

jest.mock('@aws-sdk/credential-providers');

const { fromNodeProviderChain } = jest.requireActual('@aws-sdk/credential-providers');

const roleArn = 'arn:aws:iam:123456789012:role/the-role-of-a-lifetime';

mockSTS.on(GetCallerIdentityCommand).resolves({
Account: '123456789012',
Arn: roleArn,
});

test('the correct credentials are passed to fromTemporaryCredentials in awsOptions', async () => {
const aws = new DefaultAwsClient();

await aws.discoverTargetAccount({
region: 'far-far-away',
assumeRoleArn: roleArn,
assumeRoleExternalId: 'external-id',
assumeRoleAdditionalOptions: {
DurationSeconds: 3600,
RoleSessionName: 'definitely-me',
},
});

expect(fromTemporaryCredentials).toHaveBeenCalledWith({
clientConfig: {
customUserAgent: 'cdk-assets',
},
params: {
ExternalId: 'external-id',
RoleArn: roleArn,
RoleSessionName: 'definitely-me',
DurationSeconds: 3600,
},
});
});

test('session tags are passed to fromTemporaryCredentials in awsOptions', async () => {
const aws = new DefaultAwsClient();

await aws.discoverTargetAccount({
region: 'far-far-away',
assumeRoleArn: roleArn,
assumeRoleExternalId: 'external-id',
assumeRoleAdditionalOptions: {
RoleSessionName: 'definitely-me',
Tags: [
{ Key: 'this', Value: 'one' },
{ Key: 'that', Value: 'one' },
],
},
});

expect(fromTemporaryCredentials).toHaveBeenCalledWith({
clientConfig: {
customUserAgent: 'cdk-assets',
},
params: {
ExternalId: 'external-id',
RoleArn: roleArn,
RoleSessionName: 'definitely-me',
Tags: [
{ Key: 'this', Value: 'one' },
{ Key: 'that', Value: 'one' },
],
TransitiveTagKeys: ['this', 'that'],
},
});
});
4 changes: 0 additions & 4 deletions test/docker-images.test.ts
Original file line number Diff line number Diff line change
Expand Up @@ -359,10 +359,8 @@ test('pass destination properties to AWS client', async () => {
await pub.publish();

expect(ecrClient).toHaveBeenCalledWith({
imageTag: 'abcdef',
region: 'us-north-50',
assumeRoleArn: 'arn:aws:role',
repositoryName: 'repo',
});
});

Expand Down Expand Up @@ -698,10 +696,8 @@ describe('external assets', () => {
await pub.publish();

expect(ecrClient).toHaveBeenCalledWith({
imageTag: 'ghijkl',
region: 'us-north-50',
assumeRoleArn: 'arn:aws:role',
repositoryName: 'repo',
});

expectAllSpawns();
Expand Down
4 changes: 0 additions & 4 deletions test/placeholders.test.ts
Original file line number Diff line number Diff line change
Expand Up @@ -69,8 +69,6 @@ test('correct calls are made', async () => {

expect(s3Client).toHaveBeenCalledWith({
assumeRoleArn: 'arn:aws:role-current_account',
bucketName: 'some_bucket-current_account-current_region',
objectKey: 'some_key-current_account-current_region',
});

expect(mockS3).toHaveReceivedCommandWith(ListObjectsV2Command, {
Expand All @@ -81,10 +79,8 @@ test('correct calls are made', async () => {

expect(ecrClient).toHaveBeenCalledWith({
assumeRoleArn: 'arn:aws:role-current_account',
imageTag: 'abcdef',
quiet: undefined,
region: 'explicit_region',
repositoryName: 'repo-current_account-explicit_region',
});

expect(mockEcr).toHaveReceivedCommandWith(DescribeImagesCommand, {
Expand Down
8 changes: 4 additions & 4 deletions yarn.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.