-
Notifications
You must be signed in to change notification settings - Fork 4
/
Copy pathindex.js
129 lines (110 loc) · 3.59 KB
/
index.js
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
"use strict";
const BbPromise = require("bluebird");
const fs = require("fs");
const secretsFile = "secret-baker-secrets.json";
BbPromise.promisifyAll(fs);
class ServerlessSecretBaker {
constructor(serverless, options = {}) {
const pkgHooks = {
"before:package:createDeploymentArtifacts": this.packageSecrets.bind(
this
),
"before:deploy:function:packageFunction": this.packageSecrets.bind(this),
// For serverless-offline plugin
"before:offline:start": this.packageSecrets.bind(this),
// For invoke local
"before:invoke:local:invoke": this.packageSecrets.bind(this),
};
const cleanupHooks = {
"after:package:createDeploymentArtifacts": this.cleanupPackageSecrets.bind(
this
),
"after:deploy:function:packageFunction": this.cleanupPackageSecrets.bind(
this
),
// For serverless-offline plugin
"before:offline:start:end": this.cleanupPackageSecrets.bind(this),
// For invoke local
"after:invoke:local:invoke": this.cleanupPackageSecrets.bind(this),
};
const shouldCleanup = options["secret-baker-cleanup"] != false;
this.hooks = shouldCleanup ? { ...pkgHooks, ...cleanupHooks } : pkgHooks;
this.options = options;
this.serverless = serverless;
}
getSecretsConfig() {
const customPath = this.serverless.service.custom;
const configPath = customPath && customPath.secretBaker;
const secrets = configPath || [];
if (Array.isArray(secrets)) {
return secrets.map((item) => {
if (typeof item === 'string') {
return {
name: item,
path: item
}
} else {
return item
}
})
} else if (typeof secrets === 'object') {
return Object.entries(secrets).map(([name, path]) => ({
name,
path
}));
}
throw new this.serverless.classes.Error(
"Secret Baker configuration contained an unexpected value."
);
}
async writeSecretToFile() {
const providerSecrets = this.getSecretsConfig();
const secrets = {};
for (const {name, path} of providerSecrets) {
const param = await this.getParameterFromSsm(path);
if (!param) {
throw Error(`Unable to load Secret ${name}`);
}
secrets[name] = {
ciphertext: param.Value,
arn: param.ARN
};
}
return fs.writeFileAsync(secretsFile, JSON.stringify(secrets));
}
getParameterFromSsm(name) {
return this.serverless
.getProvider("aws")
.request(
"SSM",
"getParameter",
{
Name: name,
WithDecryption: false
},
{ useCache: true }
) // Use request cache
.then(response => BbPromise.resolve(response.Parameter))
.catch(err => {
if (err.statusCode !== 400) {
return BbPromise.reject(
new this.serverless.classes.Error(err.message)
);
}
return BbPromise.resolve(undefined);
});
}
cleanupPackageSecrets() {
this.serverless.cli.log(`Cleaning up ${secretsFile}`);
if (fs.existsSync(secretsFile)) fs.unlinkSync(secretsFile);
}
packageSecrets() {
this.serverless.cli.log("Serverless Secrets beginning packaging process");
this.serverless.service.package.include =
this.serverless.service.package.include || [];
return this.writeSecretToFile().then(() =>
this.serverless.service.package.include.push(secretsFile)
);
}
}
module.exports = ServerlessSecretBaker;