123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960 |
- "use strict";
- Object.defineProperty(exports, "__esModule", { value: true });
- exports.prettySecretName = exports.getSecretLabels = exports.getActiveSecrets = exports.getManagedSecrets = exports.grantFirexServiceAgentSecretAdminRole = exports.usesSecrets = exports.ensureSecretManagerApiEnabled = exports.SECRET_ROLE = exports.SECRET_LABEL = void 0;
- const getProjectNumber_1 = require("../getProjectNumber");
- const utils = require("../utils");
- const ensureApiEnabled_1 = require("../ensureApiEnabled");
- const projectUtils_1 = require("../projectUtils");
- const types_1 = require("./types");
- const secretManagerApi = require("../gcp/secretManager");
- const logger_1 = require("../logger");
- exports.SECRET_LABEL = "firebase-extensions-managed";
- exports.SECRET_ROLE = "secretmanager.secretAccessor";
- async function ensureSecretManagerApiEnabled(options) {
- const projectId = (0, projectUtils_1.needProjectId)(options);
- return await (0, ensureApiEnabled_1.ensure)(projectId, "secretmanager.googleapis.com", "extensions", options.markdown);
- }
- exports.ensureSecretManagerApiEnabled = ensureSecretManagerApiEnabled;
- function usesSecrets(spec) {
- return spec.params && !!spec.params.find((p) => p.type === types_1.ParamType.SECRET);
- }
- exports.usesSecrets = usesSecrets;
- async function grantFirexServiceAgentSecretAdminRole(secret) {
- const projectNumber = await (0, getProjectNumber_1.getProjectNumber)({ projectId: secret.projectId });
- const firexSaProjectId = utils.envOverride("FIREBASE_EXTENSIONS_SA_PROJECT_ID", "gcp-sa-firebasemods");
- const saEmail = `service-${projectNumber}@${firexSaProjectId}.iam.gserviceaccount.com`;
- return secretManagerApi.ensureServiceAgentRole(secret, [saEmail], "roles/secretmanager.admin");
- }
- exports.grantFirexServiceAgentSecretAdminRole = grantFirexServiceAgentSecretAdminRole;
- async function getManagedSecrets(instance) {
- return (await Promise.all(getActiveSecrets(instance.config.source.spec, instance.config.params).map(async (secretResourceName) => {
- const secret = secretManagerApi.parseSecretResourceName(secretResourceName);
- const labels = (await secretManagerApi.getSecret(secret.projectId, secret.name)).labels;
- if (labels && labels[exports.SECRET_LABEL]) {
- return secretResourceName;
- }
- return Promise.resolve("");
- }))).filter((secretId) => !!secretId);
- }
- exports.getManagedSecrets = getManagedSecrets;
- function getActiveSecrets(spec, params) {
- return spec.params
- .map((p) => (p.type === types_1.ParamType.SECRET ? params[p.param] : ""))
- .filter((pv) => !!pv);
- }
- exports.getActiveSecrets = getActiveSecrets;
- function getSecretLabels(instanceId) {
- const labels = {};
- labels[exports.SECRET_LABEL] = instanceId;
- return labels;
- }
- exports.getSecretLabels = getSecretLabels;
- function prettySecretName(secretResourceName) {
- const nameTokens = secretResourceName.split("/");
- if (nameTokens.length !== 4 && nameTokens.length !== 6) {
- logger_1.logger.debug(`unable to parse secret secretResourceName: ${secretResourceName}`);
- return secretResourceName;
- }
- return nameTokens.slice(0, 4).join("/");
- }
- exports.prettySecretName = prettySecretName;
|