All files / lib/monitor aws-secure-bucket.ts

100% Statements 9/9
50% Branches 1/2
100% Functions 1/1
100% Lines 9/9

Press n or j to go to the next uncovered block, b, p or k for the previous block.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77                              1x 1x 1x 1x                       1x                 2x   2x             2x                   2x                                    
/* 
  Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
  
  Licensed under the Apache License, Version 2.0 (the "License").
  You may not use this file except in compliance with the License.
  You may obtain a copy of the License at
  
      http://www.apache.org/licenses/LICENSE-2.0
  
  Unless required by applicable law or agreed to in writing, software
  distributed under the License is distributed on an "AS IS" BASIS,
  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  See the License for the specific language governing permissions and
  limitations under the License.
*/
import { aws_s3 as s3 } from "aws-cdk-lib";
import { AnyPrincipal, Effect, PolicyStatement } from "aws-cdk-lib/aws-iam";
import { IKey, Key } from "aws-cdk-lib/aws-kms";
import { Construct } from "constructs";
 
export type AWSSecureBucketProps = Omit<
  s3.BucketProps,
  | "encryptionKey"
  | "encryption"
  | "blockPublicAccess"
  | "accessControl"
  | "versioned"
  | "serverAccessLogsPrefix"
> & { encryptionKeyArn?: string };
 
export class AWSSecureBucket extends Construct {
  public readonly bucket: s3.Bucket;
  public readonly encryptionKey: IKey;
 
  public constructor(
    scope: Construct,
    id: string,
    props: AWSSecureBucketProps
  ) {
    super(scope, id);
 
    this.encryptionKey = props.encryptionKeyArn
      ? Key.fromKeyArn(this, `encryption-key-${id}`, props.encryptionKeyArn)
      : new Key(this, `encryption-key-${id}`, {
          removalPolicy: props.removalPolicy,
          enableKeyRotation: true,
        });
 
    this.bucket = new s3.Bucket(this, `ags-${id}`, {
      ...props,
      encryptionKey: this.encryptionKey,
      encryption: s3.BucketEncryption.KMS,
      blockPublicAccess: s3.BlockPublicAccess.BLOCK_ALL,
      accessControl: s3.BucketAccessControl.LOG_DELIVERY_WRITE,
      serverAccessLogsPrefix: "access-log",
      versioned: true,
    });
 
    this.bucket.addToResourcePolicy(
      new PolicyStatement({
        sid: "HttpsOnly",
        resources: [`${this.bucket.bucketArn}/*`],
        actions: ["*"],
        principals: [new AnyPrincipal()],
        effect: Effect.DENY,
        conditions: {
          // eslint-disable-next-line @typescript-eslint/naming-convention
          Bool: {
            // eslint-disable-next-line @typescript-eslint/naming-convention
            "aws:SecureTransport": "false",
          },
        },
      })
    );
  }
}