New Case Study:See how Anthropic automated 95% of dependency reviews with Socket.Learn More
Socket
Sign inDemoInstall
Socket

@sgorg/datawarehouse-common

Package Overview
Dependencies
Maintainers
45
Versions
55
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@sgorg/datawarehouse-common - npm Package Compare versions

Comparing version 1.15.4 to 1.15.5

dist/config/index.d.ts

1

dist/constructs/codeBucket.d.ts

@@ -12,3 +12,2 @@ import { Construct } from 'constructs';

deployPolicyAtt: IamUserPolicyAttachment;
private getResourceIds;
createBucket(): S3Bucket;

@@ -15,0 +14,0 @@ createPublicAccessBlock(): S3BucketPublicAccessBlock;

"use strict";
var __importDefault = (this && this.__importDefault) || function (mod) {
return (mod && mod.__esModule) ? mod : { "default": mod };
};
Object.defineProperty(exports, "__esModule", { value: true });
const iam_1 = require("@cdktf/provider-aws/lib/iam");
const s3_1 = require("@cdktf/provider-aws/lib/s3");
const createResourceIdentifiers_1 = require("../utils/createResourceIdentifiers");
const createResourceIdentifiers_1 = __importDefault(require("../utils/createResourceIdentifiers"));
class CodeBucket {

@@ -15,14 +18,9 @@ constructor(scope, config) {

}
getResourceIds(id, type, environment, skipCompany = true, skipProject = false) {
const { projectName } = this.config;
return (0, createResourceIdentifiers_1.createResourceIdentifiers)(id, type, projectName, {
environment,
skipCompany,
skipProject,
});
}
createBucket() {
const { config, getResourceIds } = this;
const { config } = this;
const { tags, projectName, provider } = config;
const bucketIdentifiers = getResourceIds(`code-${projectName}`, s3_1.S3Bucket.tfResourceType, undefined, false, true);
const bucketIdentifiers = (0, createResourceIdentifiers_1.default)(`code-${projectName}`, s3_1.S3Bucket.tfResourceType, projectName, {
skipCompany: false,
skipProject: true,
});
return new s3_1.S3Bucket(this.scope, bucketIdentifiers.id, {

@@ -52,5 +50,8 @@ bucket: bucketIdentifiers.name,

createDeployPolicy() {
const { config, getResourceIds } = this;
const { tags, projectName, provider } = config;
const deployPolicyIdentifier = getResourceIds(`deploy-code-${projectName}`, iam_1.IamPolicy.tfResourceType);
const { config } = this;
const { tags, projectName, provider, getResourceIds, } = config;
const deployPolicyIdentifier = getResourceIds({
id: `deploy-code-${projectName}`,
type: iam_1.IamPolicy.tfResourceType,
});
const bucketName = this.bucket.bucket;

@@ -79,5 +80,8 @@ const policy = {

createPolicyAttachment() {
const { config, getResourceIds } = this;
const { deployUser, projectName, provider } = config;
const deployPolicyAttIdentifier = getResourceIds(`deploy-code-${projectName}`, iam_1.IamUserPolicyAttachment.tfResourceType);
const { config } = this;
const { deployUser, projectName, provider, getResourceIds, } = config;
const deployPolicyAttIdentifier = getResourceIds({
id: `deploy-code-${projectName}`,
type: iam_1.IamUserPolicyAttachment.tfResourceType,
});
return new iam_1.IamUserPolicyAttachment(this.scope, deployPolicyAttIdentifier.id, {

@@ -84,0 +88,0 @@ policyArn: this.deployPolicy.arn,

@@ -19,3 +19,2 @@ import { Construct } from 'constructs';

private readonly runtime;
private getResourceIds;
createRole(): IamRole;

@@ -32,2 +31,2 @@ attachExecPolicy(): IamRolePolicyAttachment;

}
export default Lambda;
export { Lambda, LambdaSecrets };

@@ -36,2 +36,3 @@ "use strict";

Object.defineProperty(exports, "__esModule", { value: true });
exports.LambdaSecrets = exports.Lambda = void 0;
const path = __importStar(require("path"));

@@ -45,3 +46,3 @@ const cdktf_1 = require("cdktf");

const secrets_1 = __importDefault(require("./secrets"));
const createResourceIdentifiers_1 = require("../../utils/createResourceIdentifiers");
exports.LambdaSecrets = secrets_1.default;
class Lambda {

@@ -61,13 +62,4 @@ constructor(scope, config) {

}
getResourceIds(id, type) {
const { projectName, environment, region } = this.config;
return (0, createResourceIdentifiers_1.createResourceIdentifiers)(id, type, projectName, {
environment,
skipCompany: !!environment,
skipProject: false,
region,
});
}
createRole() {
const { tags, functionName, provider } = this.config;
const { tags, functionName, provider, getResourceIds, } = this.config;
const assumeRolePolicy = {

@@ -85,3 +77,6 @@ Version: '2012-10-17',

};
const { id, name } = this.getResourceIds(functionName, iam_1.IamRole.tfResourceType);
const { id, name } = getResourceIds({
id: functionName,
type: iam_1.IamRole.tfResourceType,
});
return new iam_1.IamRole(this.scope, id, {

@@ -95,4 +90,7 @@ name,

attachExecPolicy() {
const { functionName, provider } = this.config;
const { id } = this.getResourceIds(`exec-${functionName}`, iam_1.IamRolePolicyAttachment.tfResourceType);
const { functionName, provider, getResourceIds, } = this.config;
const { id } = getResourceIds({
id: `exec-${functionName}`,
type: iam_1.IamRolePolicyAttachment.tfResourceType,
});
return new iam_1.IamRolePolicyAttachment(this.scope, id, {

@@ -106,4 +104,4 @@ policyArn: lambda_1.default,

defineS3Object() {
const { codeBucketName, functionName, provider } = this.config;
const assetResource = this.getResourceIds(functionName, 'lambda-asset');
const { codeBucketName, functionName, provider, getResourceIds, } = this.config;
const assetResource = getResourceIds({ id: functionName, type: 'lambda-asset' });
const asset = new cdktf_1.TerraformAsset(this.scope, assetResource.id, {

@@ -113,3 +111,6 @@ path: path.resolve(__dirname, '../../lambdaSource'),

});
const archiveResource = this.getResourceIds(`src-${functionName}`, s3_1.S3BucketObject.tfResourceType);
const archiveResource = getResourceIds({
id: `src-${functionName}`,
type: s3_1.S3BucketObject.tfResourceType,
});
return new s3_1.S3BucketObject(this.scope, archiveResource.id, {

@@ -123,7 +124,10 @@ bucket: codeBucketName,

createLambdaFunction() {
const { environment, functionName, tags, codeBucketName, functionEnvVars, timeoutSeconds, provider, } = this.config;
const { environment, functionName, tags, codeBucketName, functionEnvVars, timeoutSeconds, provider, getResourceIds, } = this.config;
const functionEnv = {
variables: Object.assign({ ENVIRONMENT: environment }, functionEnvVars),
};
const { id, name } = this.getResourceIds(functionName, lambdafunction_1.LambdaFunction.tfResourceType);
const { id, name } = getResourceIds({
id: functionName,
type: lambdafunction_1.LambdaFunction.tfResourceType,
});
return new lambdafunction_1.LambdaFunction(this.scope, id, {

@@ -143,3 +147,3 @@ functionName: name,

createExecPolicy() {
const { tags, functionName, provider } = this.config;
const { tags, functionName, provider, getResourceIds, } = this.config;
const definition = {

@@ -155,3 +159,6 @@ Version: '2012-10-17',

};
const { id, name } = this.getResourceIds(`exec-${functionName}`, iam_1.IamPolicy.tfResourceType);
const { id, name } = getResourceIds({
id: `exec-${functionName}`,
type: iam_1.IamPolicy.tfResourceType,
});
return new iam_1.IamPolicy(this.scope, id, {

@@ -166,3 +173,3 @@ name,

attachReadEnvVarsPolicy() {
const { tags, functionName, provider } = this.config;
const { tags, functionName, provider, getResourceIds, } = this.config;
const definition = {

@@ -178,3 +185,6 @@ Version: '2012-10-17',

};
const policyResource = this.getResourceIds(`read-env-${functionName}`, iam_1.IamPolicy.tfResourceType);
const policyResource = getResourceIds({
id: `read-env-${functionName}`,
type: iam_1.IamPolicy.tfResourceType,
});
const policy = new iam_1.IamPolicy(this.scope, policyResource.id, {

@@ -186,3 +196,6 @@ name: policyResource.name,

});
const policyAttachmentResource = this.getResourceIds(`read-env-${functionName}`, iam_1.IamRolePolicyAttachment.tfResourceType);
const policyAttachmentResource = getResourceIds({
id: `read-env-${functionName}`,
type: iam_1.IamRolePolicyAttachment.tfResourceType,
});
return new iam_1.IamRolePolicyAttachment(this.scope, policyAttachmentResource.id, {

@@ -196,5 +209,3 @@ policyArn: policy.arn,

createSecrets() {
const { config, getResourceIds } = this;
const lambdaSecretsConfig = Object.assign(Object.assign({}, config), { getResourceIds });
return new secrets_1.default(this.scope, this.role, lambdaSecretsConfig);
return new secrets_1.default(this.scope, this.role, this.config);
}

@@ -212,4 +223,7 @@ createLambdaPermissions() {

createLambdaPermission({ principal, sourceArn, moduleId, }) {
const { functionName, provider } = this.config;
const { id, name } = this.getResourceIds(`${moduleId}-exec-${functionName}`, lambdafunction_1.LambdaPermission.tfResourceType);
const { functionName, provider, getResourceIds } = this.config;
const { id, name } = getResourceIds({
id: `${moduleId}-exec-${functionName}`,
type: lambdafunction_1.LambdaPermission.tfResourceType,
});
return new lambdafunction_1.LambdaPermission(this.scope, id, {

@@ -226,3 +240,3 @@ statementId: name,

}
exports.default = Lambda;
exports.Lambda = Lambda;
//# sourceMappingURL=index.js.map

@@ -31,4 +31,8 @@ "use strict";

};
const { functionName, provider, getResourceIds } = this.config;
const { id, name } = getResourceIds(functionName, secretsmanager_1.SecretsmanagerSecret.tfResourceType);
const { functionName, provider, projectName, getResourceIds, } = this.config;
const { id, name } = getResourceIds({
id: functionName,
type: secretsmanager_1.SecretsmanagerSecret.tfResourceType,
projectName,
});
return new secretsmanager_1.SecretsmanagerSecret(this.scope, id, {

@@ -47,5 +51,9 @@ name,

if (this.secret && Array.isArray((_a = this.config.secrets) === null || _a === void 0 ? void 0 : _a.keys)) {
const { functionName, secrets, provider, getResourceIds, } = this.config;
const { functionName, secrets, provider, projectName, getResourceIds, } = this.config;
const keys = secrets === null || secrets === void 0 ? void 0 : secrets.keys.reduce((prev, key) => (Object.assign(Object.assign({}, prev), { [key]: '' })), {});
const { id } = getResourceIds(functionName, secretsmanager_1.SecretsmanagerSecretVersion.tfResourceType);
const { id } = getResourceIds({
id: functionName,
type: secretsmanager_1.SecretsmanagerSecretVersion.tfResourceType,
projectName,
});
return new secretsmanager_1.SecretsmanagerSecretVersion(this.scope, id, {

@@ -52,0 +60,0 @@ secretId: this.secret.id,

@@ -11,3 +11,2 @@ import { Construct } from 'constructs';

get recordName(): string;
private getResourceIds;
getZone(): DataAwsRoute53Zone;

@@ -14,0 +13,0 @@ createRecord(): Route53Record;

@@ -5,3 +5,2 @@ "use strict";

const environments_1 = require("../config/environments");
const createResourceIdentifiers_1 = require("../utils/createResourceIdentifiers");
class RouteRecord {

@@ -20,13 +19,8 @@ constructor(scope, config) {

}
getResourceIds(id, type) {
const { projectName, environment } = this.config;
return (0, createResourceIdentifiers_1.createResourceIdentifiers)(id, type, projectName, {
environment,
skipCompany: true,
skipProject: false,
getZone() {
const { getResourceIds } = this.config;
const { id } = getResourceIds({
id: this.zoneSubdomain,
type: route53_1.DataAwsRoute53Zone.tfResourceType,
});
}
getZone() {
const { getResourceIds } = this;
const { id } = getResourceIds(this.zoneSubdomain, route53_1.DataAwsRoute53Zone.tfResourceType);
return new route53_1.DataAwsRoute53Zone(this.scope, id, {

@@ -37,5 +31,5 @@ name: this.zoneSubdomain,

createRecord() {
const { recordName, config, zone, getResourceIds, } = this;
const { type, ttl, records } = config;
const { id } = getResourceIds(recordName, route53_1.Route53Record.tfResourceType);
const { recordName, config, zone, } = this;
const { type, ttl, records, getResourceIds, } = config;
const { id } = getResourceIds({ id: recordName, type: route53_1.Route53Record.tfResourceType });
return new route53_1.Route53Record(this.scope, id, {

@@ -42,0 +36,0 @@ name: recordName,

@@ -5,6 +5,7 @@ import { PROVIDER, REGION, COMPANY_SLUG, COMPANY_NAME, DATA_WAREHOUSE_COMMON_PROJECT_NAME, DATA_WAREHOUSE_COMMON_LAMBDAS_PROJECT_NAME, DATA_LAKE_DATABRICKS_PROJECT_NAME, DATA_LAKE_PROJECT_NAME, DATA_LAKE_GLUE_JOBS_PROJECT_NAME, DATA_LAKE_LAMBDAS_PROJECT_NAME, EVENTS_TRACKER_PROJECT_NAME, EVENTS_DASHBOARD_PROJECT_NAME } from './config/global';

import LAMBDA_EXECUTION_POLICY_ARN from './config/lambda';
import { ResourceIdentifierOptions, createResourceIdentifiers } from './utils/createResourceIdentifiers';
import { TerraformStateBackend, TerraformStateBackendConfig } from './constructs/backend';
import { Lambda, LambdaSecrets } from './constructs/lambda';
import CodeBucket from './constructs/codeBucket';
import Policy from './types/policy';
import ResourceIdentifier from './types/resourceIdentifier';
import outputValue from './utils/outputValue';
import { ResourceIdentifier, ResourceIdentifierOptions } from './types/resourceIdentifier';
import Tags from './types/tags';

@@ -17,8 +18,11 @@ import { DataWarehouseUser, DataWarehouseUserName } from './types/user';

import { LambdaSecretsPreConfig, LambdaEnvVars, LambdaPermissionConfig, LambdaPreConfig, LambdaPostConfig, LambdaSecretsPostConfig } from './types/lambda';
import { TerraformStateBackend, TerraformStateBackendConfig } from './constructs/backend';
import Lambda from './constructs/lambda';
import CodeBucket from './constructs/codeBucket';
import CodeBucketConfig from './types/codeBucket';
import RouteRecord from './constructs/routeRecord';
import { RouteRecordType, RouteRecordConfig } from './types/routeRecord';
export { Environment, EnvironmentConfig, Policy, ResourceIdentifier, Tags, DataWarehouseUser, DataWarehouseUserName, ResourceIdentifierOptions, DataWarehouseGroup, DataWarehouseGroupName, DataProvider, AwsRegion, AwsProviders, AwsProviderConfig, AwsProvidersConfig, TerraformStateBackendConfig, TerraformStateBackend, Stack, Lambda, LambdaSecretsPreConfig, LambdaEnvVars, LambdaPermissionConfig, LambdaPreConfig, LambdaPostConfig, LambdaSecretsPostConfig, CodeBucket, CodeBucketConfig, RouteRecord, RouteRecordType, RouteRecordConfig, AWS_PROVIDERS, COMPANY_NAME, COMPANY_SLUG, PROVIDER, REGION, AWS_ACCOUNTS, HOSTED_ZONES, DATA_WAREHOUSE_COMMON_PROJECT_NAME, DATA_WAREHOUSE_COMMON_LAMBDAS_PROJECT_NAME, DATA_LAKE_DATABRICKS_PROJECT_NAME, DATA_LAKE_PROJECT_NAME, DATA_LAKE_GLUE_JOBS_PROJECT_NAME, DATA_LAKE_LAMBDAS_PROJECT_NAME, EVENTS_TRACKER_PROJECT_NAME, EVENTS_DASHBOARD_PROJECT_NAME, LAMBDA_EXECUTION_POLICY_ARN, createEnvironmentConfig, createResourceIdentifiers, outputValue, };
import createResourceIdentifiers from './utils/createResourceIdentifiers';
import outputValue from './utils/outputValue';
import * as config from './config';
import * as constructs from './constructs';
import * as types from './types';
import * as utils from './utils';
export { config, constructs, types, utils, Environment, EnvironmentConfig, Policy, ResourceIdentifier, Tags, DataWarehouseUser, DataWarehouseUserName, ResourceIdentifierOptions, DataWarehouseGroup, DataWarehouseGroupName, DataProvider, AwsRegion, AwsProviders, AwsProviderConfig, AwsProvidersConfig, TerraformStateBackendConfig, TerraformStateBackend, Stack, Lambda, LambdaSecrets, LambdaSecretsPreConfig, LambdaEnvVars, LambdaPermissionConfig, LambdaPreConfig, LambdaPostConfig, LambdaSecretsPostConfig, CodeBucket, CodeBucketConfig, RouteRecord, RouteRecordType, RouteRecordConfig, AWS_PROVIDERS, COMPANY_NAME, COMPANY_SLUG, PROVIDER, REGION, AWS_ACCOUNTS, HOSTED_ZONES, DATA_WAREHOUSE_COMMON_PROJECT_NAME, DATA_WAREHOUSE_COMMON_LAMBDAS_PROJECT_NAME, DATA_LAKE_DATABRICKS_PROJECT_NAME, DATA_LAKE_PROJECT_NAME, DATA_LAKE_GLUE_JOBS_PROJECT_NAME, DATA_LAKE_LAMBDAS_PROJECT_NAME, EVENTS_TRACKER_PROJECT_NAME, EVENTS_DASHBOARD_PROJECT_NAME, LAMBDA_EXECUTION_POLICY_ARN, createEnvironmentConfig, createResourceIdentifiers, outputValue, };
"use strict";
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
if (k2 === undefined) k2 = k;
Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } });
}) : (function(o, m, k, k2) {
if (k2 === undefined) k2 = k;
o[k2] = m[k];
}));
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
Object.defineProperty(o, "default", { enumerable: true, value: v });
}) : function(o, v) {
o["default"] = v;
});
var __importStar = (this && this.__importStar) || function (mod) {
if (mod && mod.__esModule) return mod;
var result = {};
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
__setModuleDefault(result, mod);
return result;
};
var __importDefault = (this && this.__importDefault) || function (mod) {

@@ -6,3 +25,4 @@ return (mod && mod.__esModule) ? mod : { "default": mod };

Object.defineProperty(exports, "__esModule", { value: true });
exports.outputValue = exports.createResourceIdentifiers = exports.createEnvironmentConfig = exports.LAMBDA_EXECUTION_POLICY_ARN = exports.EVENTS_DASHBOARD_PROJECT_NAME = exports.EVENTS_TRACKER_PROJECT_NAME = exports.DATA_LAKE_LAMBDAS_PROJECT_NAME = exports.DATA_LAKE_GLUE_JOBS_PROJECT_NAME = exports.DATA_LAKE_PROJECT_NAME = exports.DATA_LAKE_DATABRICKS_PROJECT_NAME = exports.DATA_WAREHOUSE_COMMON_LAMBDAS_PROJECT_NAME = exports.DATA_WAREHOUSE_COMMON_PROJECT_NAME = exports.HOSTED_ZONES = exports.AWS_ACCOUNTS = exports.REGION = exports.PROVIDER = exports.COMPANY_SLUG = exports.COMPANY_NAME = exports.AWS_PROVIDERS = exports.RouteRecord = exports.CodeBucket = exports.Lambda = exports.TerraformStateBackend = exports.AwsRegion = exports.DataProvider = exports.DataWarehouseGroupName = exports.DataWarehouseUserName = exports.Environment = void 0;
exports.outputValue = exports.createResourceIdentifiers = exports.createEnvironmentConfig = exports.LAMBDA_EXECUTION_POLICY_ARN = exports.EVENTS_DASHBOARD_PROJECT_NAME = exports.EVENTS_TRACKER_PROJECT_NAME = exports.DATA_LAKE_LAMBDAS_PROJECT_NAME = exports.DATA_LAKE_GLUE_JOBS_PROJECT_NAME = exports.DATA_LAKE_PROJECT_NAME = exports.DATA_LAKE_DATABRICKS_PROJECT_NAME = exports.DATA_WAREHOUSE_COMMON_LAMBDAS_PROJECT_NAME = exports.DATA_WAREHOUSE_COMMON_PROJECT_NAME = exports.HOSTED_ZONES = exports.AWS_ACCOUNTS = exports.REGION = exports.PROVIDER = exports.COMPANY_SLUG = exports.COMPANY_NAME = exports.AWS_PROVIDERS = exports.RouteRecord = exports.CodeBucket = exports.LambdaSecrets = exports.Lambda = exports.TerraformStateBackend = exports.AwsRegion = exports.DataProvider = exports.DataWarehouseGroupName = exports.DataWarehouseUserName = exports.Environment = exports.utils = exports.types = exports.constructs = exports.config = void 0;
// Config
const global_1 = require("./config/global");

@@ -30,6 +50,10 @@ Object.defineProperty(exports, "PROVIDER", { enumerable: true, get: function () { return global_1.PROVIDER; } });

exports.LAMBDA_EXECUTION_POLICY_ARN = lambda_1.default;
const createResourceIdentifiers_1 = require("./utils/createResourceIdentifiers");
Object.defineProperty(exports, "createResourceIdentifiers", { enumerable: true, get: function () { return createResourceIdentifiers_1.createResourceIdentifiers; } });
const outputValue_1 = __importDefault(require("./utils/outputValue"));
exports.outputValue = outputValue_1.default;
// Constructs
const backend_1 = require("./constructs/backend");
Object.defineProperty(exports, "TerraformStateBackend", { enumerable: true, get: function () { return backend_1.TerraformStateBackend; } });
const lambda_2 = require("./constructs/lambda");
Object.defineProperty(exports, "Lambda", { enumerable: true, get: function () { return lambda_2.Lambda; } });
Object.defineProperty(exports, "LambdaSecrets", { enumerable: true, get: function () { return lambda_2.LambdaSecrets; } });
const codeBucket_1 = __importDefault(require("./constructs/codeBucket"));
exports.CodeBucket = codeBucket_1.default;
const user_1 = require("./types/user");

@@ -43,10 +67,18 @@ Object.defineProperty(exports, "DataWarehouseUserName", { enumerable: true, get: function () { return user_1.DataWarehouseUserName; } });

exports.DataProvider = dataProviders_1.default;
const backend_1 = require("./constructs/backend");
Object.defineProperty(exports, "TerraformStateBackend", { enumerable: true, get: function () { return backend_1.TerraformStateBackend; } });
const lambda_2 = __importDefault(require("./constructs/lambda"));
exports.Lambda = lambda_2.default;
const codeBucket_1 = __importDefault(require("./constructs/codeBucket"));
exports.CodeBucket = codeBucket_1.default;
const routeRecord_1 = __importDefault(require("./constructs/routeRecord"));
exports.RouteRecord = routeRecord_1.default;
// Utils
const createResourceIdentifiers_1 = __importDefault(require("./utils/createResourceIdentifiers"));
exports.createResourceIdentifiers = createResourceIdentifiers_1.default;
const outputValue_1 = __importDefault(require("./utils/outputValue"));
exports.outputValue = outputValue_1.default;
// Modules
const config = __importStar(require("./config"));
exports.config = config;
const constructs = __importStar(require("./constructs"));
exports.constructs = constructs;
const types = __importStar(require("./types"));
exports.types = types;
const utils = __importStar(require("./utils"));
exports.utils = utils;
//# sourceMappingURL=main.js.map

@@ -6,2 +6,3 @@ import { AwsProvider } from '@cdktf/provider-aws';

import Tags from './tags';
import { ResourceIdentifier, ResourceIdentifierConfig } from './resourceIdentifier';
interface CodeBucketConfig {

@@ -14,3 +15,4 @@ projectName: string;

region: AwsRegion;
getResourceIds(config: ResourceIdentifierConfig): ResourceIdentifier;
}
export default CodeBucketConfig;
import { AwsProvider } from '@cdktf/provider-aws';
import ResourceIdentifier from './resourceIdentifier';
import { ResourceIdentifier, ResourceIdentifierConfig } from './resourceIdentifier';
import { Environment } from '../config/environments';

@@ -22,3 +22,3 @@ import { AwsRegion } from './awsProviders';

readonly permissions?: Array<LambdaPermissionConfig>;
readonly region: AwsRegion;
readonly region?: AwsRegion;
readonly codeBucketName: string;

@@ -35,6 +35,6 @@ }

projectName: string;
getResourceIds(config: ResourceIdentifierConfig): ResourceIdentifier;
}
interface LambdaSecretsPostConfig extends LambdaPostConfig {
getResourceIds(id: string, type: string): ResourceIdentifier;
}
export { LambdaSecretsPreConfig, LambdaEnvVars, LambdaPermissionConfig, LambdaPreConfig, LambdaPostConfig, LambdaSecretsPostConfig, };

@@ -0,1 +1,3 @@

import { Environment } from '../config/environments';
import { AwsRegion } from './awsProviders';
interface ResourceIdentifier {

@@ -5,2 +7,17 @@ name: string;

}
export default ResourceIdentifier;
interface ResourceIdentifierOptions {
skipCompany: boolean;
skipProject: boolean;
environment?: Environment;
region?: AwsRegion;
}
interface ResourceIdentifierConfig {
id: string;
type: string;
projectName?: string;
environment?: Environment;
region?: AwsRegion;
skipCompany?: boolean;
skipProject?: boolean;
}
export { ResourceIdentifierOptions, ResourceIdentifier, ResourceIdentifierConfig };

@@ -0,1 +1,2 @@

import { ResourceIdentifier, ResourceIdentifierConfig } from 'resourceIdentifier';
import Tags from './tags';

@@ -12,3 +13,4 @@ import { Environment } from '../config/environments';

projectName: string;
getResourceIds(config: ResourceIdentifierConfig): ResourceIdentifier;
}
export { RouteRecordType, RouteRecordConfig };

@@ -1,11 +0,3 @@

import { AwsRegion } from '../types/awsProviders';
import { Environment } from '../config/environments';
import ResourceIdentifier from '../types/resourceIdentifier';
interface ResourceIdentifierOptions {
skipCompany: boolean;
skipProject: boolean;
environment?: Environment;
region?: AwsRegion;
}
import { ResourceIdentifier, ResourceIdentifierOptions } from '../types/resourceIdentifier';
declare function createResourceIdentifiers(id: string, type: string, project: string, options?: ResourceIdentifierOptions): ResourceIdentifier;
export { ResourceIdentifierOptions, createResourceIdentifiers };
export default createResourceIdentifiers;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.createResourceIdentifiers = void 0;
const global_1 = require("../config/global");

@@ -15,3 +14,3 @@ function createResourceIdentifiers(id, type, project, options = {

}
exports.createResourceIdentifiers = createResourceIdentifiers;
exports.default = createResourceIdentifiers;
//# sourceMappingURL=createResourceIdentifiers.js.map
{
"name": "@sgorg/datawarehouse-common",
"version": "1.15.4",
"version": "1.15.5",
"description": "Project to share constants and configuration across iac projects",

@@ -5,0 +5,0 @@ "main": "./dist/main.js",

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc