@sgorg/datawarehouse-common
Advanced tools
Comparing version 1.15.4 to 1.15.5
@@ -12,3 +12,2 @@ import { Construct } from 'constructs'; | ||
deployPolicyAtt: IamUserPolicyAttachment; | ||
private getResourceIds; | ||
createBucket(): S3Bucket; | ||
@@ -15,0 +14,0 @@ createPublicAccessBlock(): S3BucketPublicAccessBlock; |
"use strict"; | ||
var __importDefault = (this && this.__importDefault) || function (mod) { | ||
return (mod && mod.__esModule) ? mod : { "default": mod }; | ||
}; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
const iam_1 = require("@cdktf/provider-aws/lib/iam"); | ||
const s3_1 = require("@cdktf/provider-aws/lib/s3"); | ||
const createResourceIdentifiers_1 = require("../utils/createResourceIdentifiers"); | ||
const createResourceIdentifiers_1 = __importDefault(require("../utils/createResourceIdentifiers")); | ||
class CodeBucket { | ||
@@ -15,14 +18,9 @@ constructor(scope, config) { | ||
} | ||
getResourceIds(id, type, environment, skipCompany = true, skipProject = false) { | ||
const { projectName } = this.config; | ||
return (0, createResourceIdentifiers_1.createResourceIdentifiers)(id, type, projectName, { | ||
environment, | ||
skipCompany, | ||
skipProject, | ||
}); | ||
} | ||
createBucket() { | ||
const { config, getResourceIds } = this; | ||
const { config } = this; | ||
const { tags, projectName, provider } = config; | ||
const bucketIdentifiers = getResourceIds(`code-${projectName}`, s3_1.S3Bucket.tfResourceType, undefined, false, true); | ||
const bucketIdentifiers = (0, createResourceIdentifiers_1.default)(`code-${projectName}`, s3_1.S3Bucket.tfResourceType, projectName, { | ||
skipCompany: false, | ||
skipProject: true, | ||
}); | ||
return new s3_1.S3Bucket(this.scope, bucketIdentifiers.id, { | ||
@@ -52,5 +50,8 @@ bucket: bucketIdentifiers.name, | ||
createDeployPolicy() { | ||
const { config, getResourceIds } = this; | ||
const { tags, projectName, provider } = config; | ||
const deployPolicyIdentifier = getResourceIds(`deploy-code-${projectName}`, iam_1.IamPolicy.tfResourceType); | ||
const { config } = this; | ||
const { tags, projectName, provider, getResourceIds, } = config; | ||
const deployPolicyIdentifier = getResourceIds({ | ||
id: `deploy-code-${projectName}`, | ||
type: iam_1.IamPolicy.tfResourceType, | ||
}); | ||
const bucketName = this.bucket.bucket; | ||
@@ -79,5 +80,8 @@ const policy = { | ||
createPolicyAttachment() { | ||
const { config, getResourceIds } = this; | ||
const { deployUser, projectName, provider } = config; | ||
const deployPolicyAttIdentifier = getResourceIds(`deploy-code-${projectName}`, iam_1.IamUserPolicyAttachment.tfResourceType); | ||
const { config } = this; | ||
const { deployUser, projectName, provider, getResourceIds, } = config; | ||
const deployPolicyAttIdentifier = getResourceIds({ | ||
id: `deploy-code-${projectName}`, | ||
type: iam_1.IamUserPolicyAttachment.tfResourceType, | ||
}); | ||
return new iam_1.IamUserPolicyAttachment(this.scope, deployPolicyAttIdentifier.id, { | ||
@@ -84,0 +88,0 @@ policyArn: this.deployPolicy.arn, |
@@ -19,3 +19,2 @@ import { Construct } from 'constructs'; | ||
private readonly runtime; | ||
private getResourceIds; | ||
createRole(): IamRole; | ||
@@ -32,2 +31,2 @@ attachExecPolicy(): IamRolePolicyAttachment; | ||
} | ||
export default Lambda; | ||
export { Lambda, LambdaSecrets }; |
@@ -36,2 +36,3 @@ "use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.LambdaSecrets = exports.Lambda = void 0; | ||
const path = __importStar(require("path")); | ||
@@ -45,3 +46,3 @@ const cdktf_1 = require("cdktf"); | ||
const secrets_1 = __importDefault(require("./secrets")); | ||
const createResourceIdentifiers_1 = require("../../utils/createResourceIdentifiers"); | ||
exports.LambdaSecrets = secrets_1.default; | ||
class Lambda { | ||
@@ -61,13 +62,4 @@ constructor(scope, config) { | ||
} | ||
getResourceIds(id, type) { | ||
const { projectName, environment, region } = this.config; | ||
return (0, createResourceIdentifiers_1.createResourceIdentifiers)(id, type, projectName, { | ||
environment, | ||
skipCompany: !!environment, | ||
skipProject: false, | ||
region, | ||
}); | ||
} | ||
createRole() { | ||
const { tags, functionName, provider } = this.config; | ||
const { tags, functionName, provider, getResourceIds, } = this.config; | ||
const assumeRolePolicy = { | ||
@@ -85,3 +77,6 @@ Version: '2012-10-17', | ||
}; | ||
const { id, name } = this.getResourceIds(functionName, iam_1.IamRole.tfResourceType); | ||
const { id, name } = getResourceIds({ | ||
id: functionName, | ||
type: iam_1.IamRole.tfResourceType, | ||
}); | ||
return new iam_1.IamRole(this.scope, id, { | ||
@@ -95,4 +90,7 @@ name, | ||
attachExecPolicy() { | ||
const { functionName, provider } = this.config; | ||
const { id } = this.getResourceIds(`exec-${functionName}`, iam_1.IamRolePolicyAttachment.tfResourceType); | ||
const { functionName, provider, getResourceIds, } = this.config; | ||
const { id } = getResourceIds({ | ||
id: `exec-${functionName}`, | ||
type: iam_1.IamRolePolicyAttachment.tfResourceType, | ||
}); | ||
return new iam_1.IamRolePolicyAttachment(this.scope, id, { | ||
@@ -106,4 +104,4 @@ policyArn: lambda_1.default, | ||
defineS3Object() { | ||
const { codeBucketName, functionName, provider } = this.config; | ||
const assetResource = this.getResourceIds(functionName, 'lambda-asset'); | ||
const { codeBucketName, functionName, provider, getResourceIds, } = this.config; | ||
const assetResource = getResourceIds({ id: functionName, type: 'lambda-asset' }); | ||
const asset = new cdktf_1.TerraformAsset(this.scope, assetResource.id, { | ||
@@ -113,3 +111,6 @@ path: path.resolve(__dirname, '../../lambdaSource'), | ||
}); | ||
const archiveResource = this.getResourceIds(`src-${functionName}`, s3_1.S3BucketObject.tfResourceType); | ||
const archiveResource = getResourceIds({ | ||
id: `src-${functionName}`, | ||
type: s3_1.S3BucketObject.tfResourceType, | ||
}); | ||
return new s3_1.S3BucketObject(this.scope, archiveResource.id, { | ||
@@ -123,7 +124,10 @@ bucket: codeBucketName, | ||
createLambdaFunction() { | ||
const { environment, functionName, tags, codeBucketName, functionEnvVars, timeoutSeconds, provider, } = this.config; | ||
const { environment, functionName, tags, codeBucketName, functionEnvVars, timeoutSeconds, provider, getResourceIds, } = this.config; | ||
const functionEnv = { | ||
variables: Object.assign({ ENVIRONMENT: environment }, functionEnvVars), | ||
}; | ||
const { id, name } = this.getResourceIds(functionName, lambdafunction_1.LambdaFunction.tfResourceType); | ||
const { id, name } = getResourceIds({ | ||
id: functionName, | ||
type: lambdafunction_1.LambdaFunction.tfResourceType, | ||
}); | ||
return new lambdafunction_1.LambdaFunction(this.scope, id, { | ||
@@ -143,3 +147,3 @@ functionName: name, | ||
createExecPolicy() { | ||
const { tags, functionName, provider } = this.config; | ||
const { tags, functionName, provider, getResourceIds, } = this.config; | ||
const definition = { | ||
@@ -155,3 +159,6 @@ Version: '2012-10-17', | ||
}; | ||
const { id, name } = this.getResourceIds(`exec-${functionName}`, iam_1.IamPolicy.tfResourceType); | ||
const { id, name } = getResourceIds({ | ||
id: `exec-${functionName}`, | ||
type: iam_1.IamPolicy.tfResourceType, | ||
}); | ||
return new iam_1.IamPolicy(this.scope, id, { | ||
@@ -166,3 +173,3 @@ name, | ||
attachReadEnvVarsPolicy() { | ||
const { tags, functionName, provider } = this.config; | ||
const { tags, functionName, provider, getResourceIds, } = this.config; | ||
const definition = { | ||
@@ -178,3 +185,6 @@ Version: '2012-10-17', | ||
}; | ||
const policyResource = this.getResourceIds(`read-env-${functionName}`, iam_1.IamPolicy.tfResourceType); | ||
const policyResource = getResourceIds({ | ||
id: `read-env-${functionName}`, | ||
type: iam_1.IamPolicy.tfResourceType, | ||
}); | ||
const policy = new iam_1.IamPolicy(this.scope, policyResource.id, { | ||
@@ -186,3 +196,6 @@ name: policyResource.name, | ||
}); | ||
const policyAttachmentResource = this.getResourceIds(`read-env-${functionName}`, iam_1.IamRolePolicyAttachment.tfResourceType); | ||
const policyAttachmentResource = getResourceIds({ | ||
id: `read-env-${functionName}`, | ||
type: iam_1.IamRolePolicyAttachment.tfResourceType, | ||
}); | ||
return new iam_1.IamRolePolicyAttachment(this.scope, policyAttachmentResource.id, { | ||
@@ -196,5 +209,3 @@ policyArn: policy.arn, | ||
createSecrets() { | ||
const { config, getResourceIds } = this; | ||
const lambdaSecretsConfig = Object.assign(Object.assign({}, config), { getResourceIds }); | ||
return new secrets_1.default(this.scope, this.role, lambdaSecretsConfig); | ||
return new secrets_1.default(this.scope, this.role, this.config); | ||
} | ||
@@ -212,4 +223,7 @@ createLambdaPermissions() { | ||
createLambdaPermission({ principal, sourceArn, moduleId, }) { | ||
const { functionName, provider } = this.config; | ||
const { id, name } = this.getResourceIds(`${moduleId}-exec-${functionName}`, lambdafunction_1.LambdaPermission.tfResourceType); | ||
const { functionName, provider, getResourceIds } = this.config; | ||
const { id, name } = getResourceIds({ | ||
id: `${moduleId}-exec-${functionName}`, | ||
type: lambdafunction_1.LambdaPermission.tfResourceType, | ||
}); | ||
return new lambdafunction_1.LambdaPermission(this.scope, id, { | ||
@@ -226,3 +240,3 @@ statementId: name, | ||
} | ||
exports.default = Lambda; | ||
exports.Lambda = Lambda; | ||
//# sourceMappingURL=index.js.map |
@@ -31,4 +31,8 @@ "use strict"; | ||
}; | ||
const { functionName, provider, getResourceIds } = this.config; | ||
const { id, name } = getResourceIds(functionName, secretsmanager_1.SecretsmanagerSecret.tfResourceType); | ||
const { functionName, provider, projectName, getResourceIds, } = this.config; | ||
const { id, name } = getResourceIds({ | ||
id: functionName, | ||
type: secretsmanager_1.SecretsmanagerSecret.tfResourceType, | ||
projectName, | ||
}); | ||
return new secretsmanager_1.SecretsmanagerSecret(this.scope, id, { | ||
@@ -47,5 +51,9 @@ name, | ||
if (this.secret && Array.isArray((_a = this.config.secrets) === null || _a === void 0 ? void 0 : _a.keys)) { | ||
const { functionName, secrets, provider, getResourceIds, } = this.config; | ||
const { functionName, secrets, provider, projectName, getResourceIds, } = this.config; | ||
const keys = secrets === null || secrets === void 0 ? void 0 : secrets.keys.reduce((prev, key) => (Object.assign(Object.assign({}, prev), { [key]: '' })), {}); | ||
const { id } = getResourceIds(functionName, secretsmanager_1.SecretsmanagerSecretVersion.tfResourceType); | ||
const { id } = getResourceIds({ | ||
id: functionName, | ||
type: secretsmanager_1.SecretsmanagerSecretVersion.tfResourceType, | ||
projectName, | ||
}); | ||
return new secretsmanager_1.SecretsmanagerSecretVersion(this.scope, id, { | ||
@@ -52,0 +60,0 @@ secretId: this.secret.id, |
@@ -11,3 +11,2 @@ import { Construct } from 'constructs'; | ||
get recordName(): string; | ||
private getResourceIds; | ||
getZone(): DataAwsRoute53Zone; | ||
@@ -14,0 +13,0 @@ createRecord(): Route53Record; |
@@ -5,3 +5,2 @@ "use strict"; | ||
const environments_1 = require("../config/environments"); | ||
const createResourceIdentifiers_1 = require("../utils/createResourceIdentifiers"); | ||
class RouteRecord { | ||
@@ -20,13 +19,8 @@ constructor(scope, config) { | ||
} | ||
getResourceIds(id, type) { | ||
const { projectName, environment } = this.config; | ||
return (0, createResourceIdentifiers_1.createResourceIdentifiers)(id, type, projectName, { | ||
environment, | ||
skipCompany: true, | ||
skipProject: false, | ||
getZone() { | ||
const { getResourceIds } = this.config; | ||
const { id } = getResourceIds({ | ||
id: this.zoneSubdomain, | ||
type: route53_1.DataAwsRoute53Zone.tfResourceType, | ||
}); | ||
} | ||
getZone() { | ||
const { getResourceIds } = this; | ||
const { id } = getResourceIds(this.zoneSubdomain, route53_1.DataAwsRoute53Zone.tfResourceType); | ||
return new route53_1.DataAwsRoute53Zone(this.scope, id, { | ||
@@ -37,5 +31,5 @@ name: this.zoneSubdomain, | ||
createRecord() { | ||
const { recordName, config, zone, getResourceIds, } = this; | ||
const { type, ttl, records } = config; | ||
const { id } = getResourceIds(recordName, route53_1.Route53Record.tfResourceType); | ||
const { recordName, config, zone, } = this; | ||
const { type, ttl, records, getResourceIds, } = config; | ||
const { id } = getResourceIds({ id: recordName, type: route53_1.Route53Record.tfResourceType }); | ||
return new route53_1.Route53Record(this.scope, id, { | ||
@@ -42,0 +36,0 @@ name: recordName, |
@@ -5,6 +5,7 @@ import { PROVIDER, REGION, COMPANY_SLUG, COMPANY_NAME, DATA_WAREHOUSE_COMMON_PROJECT_NAME, DATA_WAREHOUSE_COMMON_LAMBDAS_PROJECT_NAME, DATA_LAKE_DATABRICKS_PROJECT_NAME, DATA_LAKE_PROJECT_NAME, DATA_LAKE_GLUE_JOBS_PROJECT_NAME, DATA_LAKE_LAMBDAS_PROJECT_NAME, EVENTS_TRACKER_PROJECT_NAME, EVENTS_DASHBOARD_PROJECT_NAME } from './config/global'; | ||
import LAMBDA_EXECUTION_POLICY_ARN from './config/lambda'; | ||
import { ResourceIdentifierOptions, createResourceIdentifiers } from './utils/createResourceIdentifiers'; | ||
import { TerraformStateBackend, TerraformStateBackendConfig } from './constructs/backend'; | ||
import { Lambda, LambdaSecrets } from './constructs/lambda'; | ||
import CodeBucket from './constructs/codeBucket'; | ||
import Policy from './types/policy'; | ||
import ResourceIdentifier from './types/resourceIdentifier'; | ||
import outputValue from './utils/outputValue'; | ||
import { ResourceIdentifier, ResourceIdentifierOptions } from './types/resourceIdentifier'; | ||
import Tags from './types/tags'; | ||
@@ -17,8 +18,11 @@ import { DataWarehouseUser, DataWarehouseUserName } from './types/user'; | ||
import { LambdaSecretsPreConfig, LambdaEnvVars, LambdaPermissionConfig, LambdaPreConfig, LambdaPostConfig, LambdaSecretsPostConfig } from './types/lambda'; | ||
import { TerraformStateBackend, TerraformStateBackendConfig } from './constructs/backend'; | ||
import Lambda from './constructs/lambda'; | ||
import CodeBucket from './constructs/codeBucket'; | ||
import CodeBucketConfig from './types/codeBucket'; | ||
import RouteRecord from './constructs/routeRecord'; | ||
import { RouteRecordType, RouteRecordConfig } from './types/routeRecord'; | ||
export { Environment, EnvironmentConfig, Policy, ResourceIdentifier, Tags, DataWarehouseUser, DataWarehouseUserName, ResourceIdentifierOptions, DataWarehouseGroup, DataWarehouseGroupName, DataProvider, AwsRegion, AwsProviders, AwsProviderConfig, AwsProvidersConfig, TerraformStateBackendConfig, TerraformStateBackend, Stack, Lambda, LambdaSecretsPreConfig, LambdaEnvVars, LambdaPermissionConfig, LambdaPreConfig, LambdaPostConfig, LambdaSecretsPostConfig, CodeBucket, CodeBucketConfig, RouteRecord, RouteRecordType, RouteRecordConfig, AWS_PROVIDERS, COMPANY_NAME, COMPANY_SLUG, PROVIDER, REGION, AWS_ACCOUNTS, HOSTED_ZONES, DATA_WAREHOUSE_COMMON_PROJECT_NAME, DATA_WAREHOUSE_COMMON_LAMBDAS_PROJECT_NAME, DATA_LAKE_DATABRICKS_PROJECT_NAME, DATA_LAKE_PROJECT_NAME, DATA_LAKE_GLUE_JOBS_PROJECT_NAME, DATA_LAKE_LAMBDAS_PROJECT_NAME, EVENTS_TRACKER_PROJECT_NAME, EVENTS_DASHBOARD_PROJECT_NAME, LAMBDA_EXECUTION_POLICY_ARN, createEnvironmentConfig, createResourceIdentifiers, outputValue, }; | ||
import createResourceIdentifiers from './utils/createResourceIdentifiers'; | ||
import outputValue from './utils/outputValue'; | ||
import * as config from './config'; | ||
import * as constructs from './constructs'; | ||
import * as types from './types'; | ||
import * as utils from './utils'; | ||
export { config, constructs, types, utils, Environment, EnvironmentConfig, Policy, ResourceIdentifier, Tags, DataWarehouseUser, DataWarehouseUserName, ResourceIdentifierOptions, DataWarehouseGroup, DataWarehouseGroupName, DataProvider, AwsRegion, AwsProviders, AwsProviderConfig, AwsProvidersConfig, TerraformStateBackendConfig, TerraformStateBackend, Stack, Lambda, LambdaSecrets, LambdaSecretsPreConfig, LambdaEnvVars, LambdaPermissionConfig, LambdaPreConfig, LambdaPostConfig, LambdaSecretsPostConfig, CodeBucket, CodeBucketConfig, RouteRecord, RouteRecordType, RouteRecordConfig, AWS_PROVIDERS, COMPANY_NAME, COMPANY_SLUG, PROVIDER, REGION, AWS_ACCOUNTS, HOSTED_ZONES, DATA_WAREHOUSE_COMMON_PROJECT_NAME, DATA_WAREHOUSE_COMMON_LAMBDAS_PROJECT_NAME, DATA_LAKE_DATABRICKS_PROJECT_NAME, DATA_LAKE_PROJECT_NAME, DATA_LAKE_GLUE_JOBS_PROJECT_NAME, DATA_LAKE_LAMBDAS_PROJECT_NAME, EVENTS_TRACKER_PROJECT_NAME, EVENTS_DASHBOARD_PROJECT_NAME, LAMBDA_EXECUTION_POLICY_ARN, createEnvironmentConfig, createResourceIdentifiers, outputValue, }; |
"use strict"; | ||
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { | ||
if (k2 === undefined) k2 = k; | ||
Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } }); | ||
}) : (function(o, m, k, k2) { | ||
if (k2 === undefined) k2 = k; | ||
o[k2] = m[k]; | ||
})); | ||
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { | ||
Object.defineProperty(o, "default", { enumerable: true, value: v }); | ||
}) : function(o, v) { | ||
o["default"] = v; | ||
}); | ||
var __importStar = (this && this.__importStar) || function (mod) { | ||
if (mod && mod.__esModule) return mod; | ||
var result = {}; | ||
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); | ||
__setModuleDefault(result, mod); | ||
return result; | ||
}; | ||
var __importDefault = (this && this.__importDefault) || function (mod) { | ||
@@ -6,3 +25,4 @@ return (mod && mod.__esModule) ? mod : { "default": mod }; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.outputValue = exports.createResourceIdentifiers = exports.createEnvironmentConfig = exports.LAMBDA_EXECUTION_POLICY_ARN = exports.EVENTS_DASHBOARD_PROJECT_NAME = exports.EVENTS_TRACKER_PROJECT_NAME = exports.DATA_LAKE_LAMBDAS_PROJECT_NAME = exports.DATA_LAKE_GLUE_JOBS_PROJECT_NAME = exports.DATA_LAKE_PROJECT_NAME = exports.DATA_LAKE_DATABRICKS_PROJECT_NAME = exports.DATA_WAREHOUSE_COMMON_LAMBDAS_PROJECT_NAME = exports.DATA_WAREHOUSE_COMMON_PROJECT_NAME = exports.HOSTED_ZONES = exports.AWS_ACCOUNTS = exports.REGION = exports.PROVIDER = exports.COMPANY_SLUG = exports.COMPANY_NAME = exports.AWS_PROVIDERS = exports.RouteRecord = exports.CodeBucket = exports.Lambda = exports.TerraformStateBackend = exports.AwsRegion = exports.DataProvider = exports.DataWarehouseGroupName = exports.DataWarehouseUserName = exports.Environment = void 0; | ||
exports.outputValue = exports.createResourceIdentifiers = exports.createEnvironmentConfig = exports.LAMBDA_EXECUTION_POLICY_ARN = exports.EVENTS_DASHBOARD_PROJECT_NAME = exports.EVENTS_TRACKER_PROJECT_NAME = exports.DATA_LAKE_LAMBDAS_PROJECT_NAME = exports.DATA_LAKE_GLUE_JOBS_PROJECT_NAME = exports.DATA_LAKE_PROJECT_NAME = exports.DATA_LAKE_DATABRICKS_PROJECT_NAME = exports.DATA_WAREHOUSE_COMMON_LAMBDAS_PROJECT_NAME = exports.DATA_WAREHOUSE_COMMON_PROJECT_NAME = exports.HOSTED_ZONES = exports.AWS_ACCOUNTS = exports.REGION = exports.PROVIDER = exports.COMPANY_SLUG = exports.COMPANY_NAME = exports.AWS_PROVIDERS = exports.RouteRecord = exports.CodeBucket = exports.LambdaSecrets = exports.Lambda = exports.TerraformStateBackend = exports.AwsRegion = exports.DataProvider = exports.DataWarehouseGroupName = exports.DataWarehouseUserName = exports.Environment = exports.utils = exports.types = exports.constructs = exports.config = void 0; | ||
// Config | ||
const global_1 = require("./config/global"); | ||
@@ -30,6 +50,10 @@ Object.defineProperty(exports, "PROVIDER", { enumerable: true, get: function () { return global_1.PROVIDER; } }); | ||
exports.LAMBDA_EXECUTION_POLICY_ARN = lambda_1.default; | ||
const createResourceIdentifiers_1 = require("./utils/createResourceIdentifiers"); | ||
Object.defineProperty(exports, "createResourceIdentifiers", { enumerable: true, get: function () { return createResourceIdentifiers_1.createResourceIdentifiers; } }); | ||
const outputValue_1 = __importDefault(require("./utils/outputValue")); | ||
exports.outputValue = outputValue_1.default; | ||
// Constructs | ||
const backend_1 = require("./constructs/backend"); | ||
Object.defineProperty(exports, "TerraformStateBackend", { enumerable: true, get: function () { return backend_1.TerraformStateBackend; } }); | ||
const lambda_2 = require("./constructs/lambda"); | ||
Object.defineProperty(exports, "Lambda", { enumerable: true, get: function () { return lambda_2.Lambda; } }); | ||
Object.defineProperty(exports, "LambdaSecrets", { enumerable: true, get: function () { return lambda_2.LambdaSecrets; } }); | ||
const codeBucket_1 = __importDefault(require("./constructs/codeBucket")); | ||
exports.CodeBucket = codeBucket_1.default; | ||
const user_1 = require("./types/user"); | ||
@@ -43,10 +67,18 @@ Object.defineProperty(exports, "DataWarehouseUserName", { enumerable: true, get: function () { return user_1.DataWarehouseUserName; } }); | ||
exports.DataProvider = dataProviders_1.default; | ||
const backend_1 = require("./constructs/backend"); | ||
Object.defineProperty(exports, "TerraformStateBackend", { enumerable: true, get: function () { return backend_1.TerraformStateBackend; } }); | ||
const lambda_2 = __importDefault(require("./constructs/lambda")); | ||
exports.Lambda = lambda_2.default; | ||
const codeBucket_1 = __importDefault(require("./constructs/codeBucket")); | ||
exports.CodeBucket = codeBucket_1.default; | ||
const routeRecord_1 = __importDefault(require("./constructs/routeRecord")); | ||
exports.RouteRecord = routeRecord_1.default; | ||
// Utils | ||
const createResourceIdentifiers_1 = __importDefault(require("./utils/createResourceIdentifiers")); | ||
exports.createResourceIdentifiers = createResourceIdentifiers_1.default; | ||
const outputValue_1 = __importDefault(require("./utils/outputValue")); | ||
exports.outputValue = outputValue_1.default; | ||
// Modules | ||
const config = __importStar(require("./config")); | ||
exports.config = config; | ||
const constructs = __importStar(require("./constructs")); | ||
exports.constructs = constructs; | ||
const types = __importStar(require("./types")); | ||
exports.types = types; | ||
const utils = __importStar(require("./utils")); | ||
exports.utils = utils; | ||
//# sourceMappingURL=main.js.map |
@@ -6,2 +6,3 @@ import { AwsProvider } from '@cdktf/provider-aws'; | ||
import Tags from './tags'; | ||
import { ResourceIdentifier, ResourceIdentifierConfig } from './resourceIdentifier'; | ||
interface CodeBucketConfig { | ||
@@ -14,3 +15,4 @@ projectName: string; | ||
region: AwsRegion; | ||
getResourceIds(config: ResourceIdentifierConfig): ResourceIdentifier; | ||
} | ||
export default CodeBucketConfig; |
import { AwsProvider } from '@cdktf/provider-aws'; | ||
import ResourceIdentifier from './resourceIdentifier'; | ||
import { ResourceIdentifier, ResourceIdentifierConfig } from './resourceIdentifier'; | ||
import { Environment } from '../config/environments'; | ||
@@ -22,3 +22,3 @@ import { AwsRegion } from './awsProviders'; | ||
readonly permissions?: Array<LambdaPermissionConfig>; | ||
readonly region: AwsRegion; | ||
readonly region?: AwsRegion; | ||
readonly codeBucketName: string; | ||
@@ -35,6 +35,6 @@ } | ||
projectName: string; | ||
getResourceIds(config: ResourceIdentifierConfig): ResourceIdentifier; | ||
} | ||
interface LambdaSecretsPostConfig extends LambdaPostConfig { | ||
getResourceIds(id: string, type: string): ResourceIdentifier; | ||
} | ||
export { LambdaSecretsPreConfig, LambdaEnvVars, LambdaPermissionConfig, LambdaPreConfig, LambdaPostConfig, LambdaSecretsPostConfig, }; |
@@ -0,1 +1,3 @@ | ||
import { Environment } from '../config/environments'; | ||
import { AwsRegion } from './awsProviders'; | ||
interface ResourceIdentifier { | ||
@@ -5,2 +7,17 @@ name: string; | ||
} | ||
export default ResourceIdentifier; | ||
interface ResourceIdentifierOptions { | ||
skipCompany: boolean; | ||
skipProject: boolean; | ||
environment?: Environment; | ||
region?: AwsRegion; | ||
} | ||
interface ResourceIdentifierConfig { | ||
id: string; | ||
type: string; | ||
projectName?: string; | ||
environment?: Environment; | ||
region?: AwsRegion; | ||
skipCompany?: boolean; | ||
skipProject?: boolean; | ||
} | ||
export { ResourceIdentifierOptions, ResourceIdentifier, ResourceIdentifierConfig }; |
@@ -0,1 +1,2 @@ | ||
import { ResourceIdentifier, ResourceIdentifierConfig } from 'resourceIdentifier'; | ||
import Tags from './tags'; | ||
@@ -12,3 +13,4 @@ import { Environment } from '../config/environments'; | ||
projectName: string; | ||
getResourceIds(config: ResourceIdentifierConfig): ResourceIdentifier; | ||
} | ||
export { RouteRecordType, RouteRecordConfig }; |
@@ -1,11 +0,3 @@ | ||
import { AwsRegion } from '../types/awsProviders'; | ||
import { Environment } from '../config/environments'; | ||
import ResourceIdentifier from '../types/resourceIdentifier'; | ||
interface ResourceIdentifierOptions { | ||
skipCompany: boolean; | ||
skipProject: boolean; | ||
environment?: Environment; | ||
region?: AwsRegion; | ||
} | ||
import { ResourceIdentifier, ResourceIdentifierOptions } from '../types/resourceIdentifier'; | ||
declare function createResourceIdentifiers(id: string, type: string, project: string, options?: ResourceIdentifierOptions): ResourceIdentifier; | ||
export { ResourceIdentifierOptions, createResourceIdentifiers }; | ||
export default createResourceIdentifiers; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.createResourceIdentifiers = void 0; | ||
const global_1 = require("../config/global"); | ||
@@ -15,3 +14,3 @@ function createResourceIdentifiers(id, type, project, options = { | ||
} | ||
exports.createResourceIdentifiers = createResourceIdentifiers; | ||
exports.default = createResourceIdentifiers; | ||
//# sourceMappingURL=createResourceIdentifiers.js.map |
{ | ||
"name": "@sgorg/datawarehouse-common", | ||
"version": "1.15.4", | ||
"version": "1.15.5", | ||
"description": "Project to share constants and configuration across iac projects", | ||
@@ -5,0 +5,0 @@ "main": "./dist/main.js", |
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
81333
84
1248