├── test ├── fleetmgmt-project.test.d.ts ├── fleetmgmt-project.test.ts └── fleetmgmt-project.test.js ├── .gitignore ├── bin ├── fleetmgmt-project.d.ts ├── fleetmgmt-project.ts └── fleetmgmt-project.js ├── figures ├── authors │ ├── Alec.png │ ├── 김진형.JPG │ └── 이승범.jpg ├── sequence_diagram.png ├── system_architecture_msk.png └── system_architecture_msk_English.png ├── lib ├── rule │ ├── rule-keys.json │ ├── key-policy.json │ └── rule-policy.json ├── aws-iot-core-rule-infra-stack.d.ts ├── aws-iot-core-provisioning-infra-stack.d.ts ├── aws-vpc-msk-infra-stack.d.ts ├── device │ ├── device-cc-policy.json │ ├── device-policy.json │ └── provisioning-template.json ├── lambda │ ├── verify-devices-lambda.py │ └── get-bootstrapbrokers-lambda.py ├── aws-vpc-msk-infra-stack.ts ├── aws-iot-core-rule-infra-stack.ts ├── aws-iot-core-provisioning-infra-stack.ts ├── aws-vpc-msk-infra-stack.js ├── aws-iot-core-rule-infra-stack.js └── aws-iot-core-provisioning-infra-stack.js ├── jest.config.js ├── end.sh ├── CODE_OF_CONDUCT.md ├── config ├── config.d.ts ├── config.ts └── config.js ├── .github └── dependabot.yml ├── package.json ├── tsconfig.json ├── LICENSE ├── start.sh ├── cdk.json ├── CONTRIBUTING.md └── README.md /test/fleetmgmt-project.test.d.ts: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /.gitignore: -------------------------------------------------------------------------------- 1 | node_modules/ 2 | cdk.out/ -------------------------------------------------------------------------------- /bin/fleetmgmt-project.d.ts: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env node 2 | import 'source-map-support/register'; 3 | -------------------------------------------------------------------------------- /figures/authors/Alec.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aws-samples/42dot-cdk-fleetmanagement-system/main/figures/authors/Alec.png -------------------------------------------------------------------------------- /figures/authors/김진형.JPG: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aws-samples/42dot-cdk-fleetmanagement-system/main/figures/authors/김진형.JPG -------------------------------------------------------------------------------- /figures/authors/이승범.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aws-samples/42dot-cdk-fleetmanagement-system/main/figures/authors/이승범.jpg -------------------------------------------------------------------------------- /lib/rule/rule-keys.json: -------------------------------------------------------------------------------- 1 | { 2 | "testRules": [ 3 | "rule1", 4 | "rule2", 5 | "rule3" 6 | ] 7 | } 8 | -------------------------------------------------------------------------------- /figures/sequence_diagram.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aws-samples/42dot-cdk-fleetmanagement-system/main/figures/sequence_diagram.png -------------------------------------------------------------------------------- /figures/system_architecture_msk.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aws-samples/42dot-cdk-fleetmanagement-system/main/figures/system_architecture_msk.png -------------------------------------------------------------------------------- /figures/system_architecture_msk_English.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aws-samples/42dot-cdk-fleetmanagement-system/main/figures/system_architecture_msk_English.png -------------------------------------------------------------------------------- /jest.config.js: -------------------------------------------------------------------------------- 1 | module.exports = { 2 | testEnvironment: 'node', 3 | roots: ['/test'], 4 | testMatch: ['**/*.test.ts'], 5 | transform: { 6 | '^.+\\.tsx?$': 'ts-jest' 7 | } 8 | }; 9 | -------------------------------------------------------------------------------- /end.sh: -------------------------------------------------------------------------------- 1 | cdk destroy AwsIotCoreRuleInfraStack --require-approval never --force 2 | cdk destroy AwsIotCoreProvisioningInfraStack --require-approval never --force 3 | cdk destroy AwsVpcMskInfraStack --require-approval never --force 4 | 5 | -------------------------------------------------------------------------------- /lib/aws-iot-core-rule-infra-stack.d.ts: -------------------------------------------------------------------------------- 1 | import { Stack, StackProps } from "aws-cdk-lib"; 2 | import { Construct } from "constructs"; 3 | export declare class AwsIotCoreRuleInfraStack extends Stack { 4 | constructor(scope: Construct, id: string, props?: StackProps); 5 | } 6 | -------------------------------------------------------------------------------- /lib/aws-iot-core-provisioning-infra-stack.d.ts: -------------------------------------------------------------------------------- 1 | import { Stack, StackProps } from "aws-cdk-lib"; 2 | import { Construct } from "constructs"; 3 | export declare class AwsIotCoreProvisioningInfraStack extends Stack { 4 | constructor(scope: Construct, id: string, props?: StackProps); 5 | } 6 | -------------------------------------------------------------------------------- /CODE_OF_CONDUCT.md: -------------------------------------------------------------------------------- 1 | ## Code of Conduct 2 | This project has adopted the [Amazon Open Source Code of Conduct](https://aws.github.io/code-of-conduct). 3 | For more information see the [Code of Conduct FAQ](https://aws.github.io/code-of-conduct-faq) or contact 4 | opensource-codeofconduct@amazon.com with any additional questions or comments. 5 | -------------------------------------------------------------------------------- /lib/aws-vpc-msk-infra-stack.d.ts: -------------------------------------------------------------------------------- 1 | import { Stack, StackProps, aws_ec2 as ec2 } from "aws-cdk-lib"; 2 | import { Construct } from "constructs"; 3 | export declare class AwsVpcMskInfraStack extends Stack { 4 | vpc: ec2.CfnVPC; 5 | constructor(scope: Construct, id: string, props?: StackProps); 6 | subnet_creation(subnet_name: string, subnet_cidr: string): ec2.CfnSubnet; 7 | } 8 | -------------------------------------------------------------------------------- /lib/rule/key-policy.json: -------------------------------------------------------------------------------- 1 | { 2 | "Id": "msk-encryption-policy", 3 | "Version": "2012-10-17", 4 | "Statement": [ 5 | { 6 | "Sid": "Enable IAM User Permissions", 7 | "Effect": "Allow", 8 | "Principal": { 9 | "AWS": "" 10 | }, 11 | "Action": "kms:*", 12 | "Resource": "*" 13 | } 14 | ] 15 | } -------------------------------------------------------------------------------- /config/config.d.ts: -------------------------------------------------------------------------------- 1 | declare const Config: { 2 | aws: { 3 | account: string; 4 | region: string; 5 | }; 6 | app: { 7 | service: string; 8 | application: string; 9 | environment: string; 10 | }; 11 | s3BucketName: string; 12 | vpc: { 13 | cidr: string; 14 | }; 15 | security_group: string[]; 16 | msk: { 17 | clusterName: string; 18 | }; 19 | }; 20 | export { Config }; 21 | -------------------------------------------------------------------------------- /lib/device/device-cc-policy.json: -------------------------------------------------------------------------------- 1 | { 2 | "Version": "2012-10-17", 3 | "Statement": [ 4 | { 5 | "Effect": "Allow", 6 | "Action": ["iot:Connect", "iot:RetainPublish"], 7 | "Resource": "*" 8 | }, 9 | { 10 | "Effect": "Allow", 11 | "Action": ["iot:Publish","iot:Receive", "iot:RetainPublish"], 12 | "Resource": [""] 13 | }, 14 | { 15 | "Effect": "Allow", 16 | "Action": "iot:Subscribe", 17 | "Resource": [""] 18 | } 19 | ] 20 | } -------------------------------------------------------------------------------- /lib/device/device-policy.json: -------------------------------------------------------------------------------- 1 | { 2 | "Version": "2012-10-17", 3 | "Statement": [ 4 | { 5 | "Effect": "Allow", 6 | "Action": "iot:Connect", 7 | "Resource": "*" 8 | }, 9 | { 10 | "Effect": "Allow", 11 | "Action": [ 12 | "iot:Publish", 13 | "iot:Receive", 14 | "iot:RetainPublish" 15 | ], 16 | "Resource": [""] 17 | }, 18 | { 19 | "Effect": "Allow", 20 | "Action": "iot:Subscribe", 21 | "Resource": [""] 22 | } 23 | ] 24 | } -------------------------------------------------------------------------------- /.github/dependabot.yml: -------------------------------------------------------------------------------- 1 | # To get started with Dependabot version updates, you'll need to specify which 2 | # package ecosystems to update and where the package manifests are located. 3 | # Please see the documentation for all configuration options: 4 | # https://docs.github.com/code-security/dependabot/dependabot-version-updates/configuration-options-for-the-dependabot.yml-file 5 | 6 | version: 2 7 | updates: 8 | - package-ecosystem: "" # See documentation for possible values 9 | directory: "/" # Location of package manifests 10 | schedule: 11 | interval: "weekly" 12 | -------------------------------------------------------------------------------- /config/config.ts: -------------------------------------------------------------------------------- 1 | const Config = { 2 | aws: { 3 | account: "<>", 4 | region: "<>", 5 | }, 6 | 7 | app: { 8 | service: 'fleetmgmt', 9 | application: 'iot', 10 | environment: 'dev' 11 | }, 12 | s3BucketName : "cdk-s3-test-bucket", 13 | 14 | // Assume that you have created a VPC with two subnets and a security group 15 | vpc: { 16 | cidr: '10.51' 17 | }, 18 | security_group: ['10.42.0.0/23', 'fleetmgmt'], 19 | 20 | msk: { 21 | clusterName: "cdk-iot-msk-cluster", 22 | } 23 | }; 24 | export { Config }; 25 | -------------------------------------------------------------------------------- /test/fleetmgmt-project.test.ts: -------------------------------------------------------------------------------- 1 | // import * as cdk from 'aws-cdk-lib'; 2 | // import { Template } from 'aws-cdk-lib/assertions'; 3 | // import * as CdkTestProject from '../lib/cdk-test-project-stack'; 4 | 5 | // example test. To run these tests, uncomment this file along with the 6 | // example resource in lib/cdk-test-project-stack.ts 7 | test('SQS Queue Created', () => { 8 | // const app = new cdk.App(); 9 | // // WHEN 10 | // const stack = new CdkTestProject.CdkTestProjectStack(app, 'MyTestStack'); 11 | // // THEN 12 | // const template = Template.fromStack(stack); 13 | 14 | // template.hasResourceProperties('AWS::SQS::Queue', { 15 | // VisibilityTimeout: 300 16 | // }); 17 | }); 18 | -------------------------------------------------------------------------------- /config/config.js: -------------------------------------------------------------------------------- 1 | "use strict"; 2 | Object.defineProperty(exports, "__esModule", { value: true }); 3 | exports.Config = void 0; 4 | const Config = { 5 | aws: { 6 | account: "<>", 7 | region: "<>", 8 | }, 9 | app: { 10 | service: 'fleetmgmt', 11 | application: 'iot', 12 | environment: 'dev' 13 | }, 14 | s3BucketName: "cdk-s3-test-bucket", 15 | // Assume that you have created a VPC with two subnets and a security group 16 | vpc: { 17 | cidr: '10.51' 18 | }, 19 | security_group: ['10.42.0.0/23', 'fleetmgmt'], 20 | msk: { 21 | clusterName: "cdk-iot-msk-cluster", 22 | } 23 | }; 24 | exports.Config = Config; 25 | -------------------------------------------------------------------------------- /package.json: -------------------------------------------------------------------------------- 1 | { 2 | "name": "fleetmgmt-project", 3 | "version": "0.1.0", 4 | "bin": { 5 | "fleet-management-project": "bin/fleetmgmt-project.js" 6 | }, 7 | "scripts": { 8 | "build": "tsc", 9 | "watch": "tsc -w", 10 | "test": "jest", 11 | "cdk": "cdk" 12 | }, 13 | "devDependencies": { 14 | "@types/jest": "^29.5.5", 15 | "@types/node": "20.6.3", 16 | "aws-cdk": "2.99.1", 17 | "jest": "^29.7.0", 18 | "ts-jest": "^29.1.1", 19 | "ts-node": "^10.9.1", 20 | "typescript": "~5.2.2" 21 | }, 22 | "dependencies": { 23 | "@aws-sdk/client-kafka": "^3.624.0", 24 | "0g": "^0.0.9", 25 | "aws-cdk-lib": "^2.99.1", 26 | "constructs": "^10.0.0", 27 | "path": "^0.12.7", 28 | "source-map-support": "^0.5.21" 29 | } 30 | } 31 | -------------------------------------------------------------------------------- /tsconfig.json: -------------------------------------------------------------------------------- 1 | { 2 | "compilerOptions": { 3 | "target": "ES2020", 4 | "module": "commonjs", 5 | "lib": [ 6 | "es2020", 7 | "dom" 8 | ], 9 | "declaration": true, 10 | "strict": true, 11 | "noImplicitAny": true, 12 | "strictNullChecks": true, 13 | "noImplicitThis": true, 14 | "alwaysStrict": true, 15 | "noUnusedLocals": false, 16 | "noUnusedParameters": false, 17 | "noImplicitReturns": true, 18 | "noFallthroughCasesInSwitch": false, 19 | "inlineSourceMap": true, 20 | "inlineSources": true, 21 | "experimentalDecorators": true, 22 | "strictPropertyInitialization": false, 23 | "typeRoots": [ 24 | "./node_modules/@types" 25 | ], 26 | "resolveJsonModule": true, 27 | "esModuleInterop": true 28 | }, 29 | "exclude": [ 30 | "node_modules", 31 | "cdk.out" 32 | ] 33 | } 34 | -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | MIT No Attribution 2 | 3 | Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. 4 | 5 | Permission is hereby granted, free of charge, to any person obtaining a copy of 6 | this software and associated documentation files (the "Software"), to deal in 7 | the Software without restriction, including without limitation the rights to 8 | use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of 9 | the Software, and to permit persons to whom the Software is furnished to do so. 10 | 11 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 12 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS 13 | FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR 14 | COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER 15 | IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN 16 | CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. 17 | 18 | -------------------------------------------------------------------------------- /bin/fleetmgmt-project.ts: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env node 2 | import 'source-map-support/register'; 3 | import * as cdk from 'aws-cdk-lib'; 4 | import {AwsVpcMskInfraStack} from "../lib/aws-vpc-msk-infra-stack"; 5 | import { Config } from "../config/config"; 6 | import {AwsIotCoreProvisioningInfraStack} from "../lib/aws-iot-core-provisioning-infra-stack"; 7 | import {AwsIotCoreRuleInfraStack} from "../lib/aws-iot-core-rule-infra-stack"; 8 | 9 | const app = new cdk.App(); 10 | 11 | new AwsIotCoreProvisioningInfraStack(app, "AwsIotCoreProvisioningInfraStack", { 12 | env: { 13 | account: Config.aws.account, 14 | region: Config.aws.region, 15 | }, 16 | }); 17 | 18 | new AwsIotCoreRuleInfraStack(app, "AwsIotCoreRuleInfraStack", { 19 | env: { 20 | account: Config.aws.account, 21 | region: Config.aws.region, 22 | }, 23 | }); 24 | 25 | 26 | new AwsVpcMskInfraStack(app, "AwsVpcMskInfraStack", { 27 | env: { 28 | account: Config.aws.account, 29 | region: Config.aws.region 30 | } 31 | }) -------------------------------------------------------------------------------- /lib/device/provisioning-template.json: -------------------------------------------------------------------------------- 1 | { 2 | "Parameters": { 3 | "SerialNumber": { 4 | "Type": "String" 5 | }, 6 | "AWS::IoT::Certificate::Id": { 7 | "Type": "String" 8 | } 9 | }, 10 | "Resources": { 11 | "certificate": { 12 | "Properties": { 13 | "CertificateId": { 14 | "Ref": "AWS::IoT::Certificate::Id" 15 | }, 16 | "Status": "Active" 17 | }, 18 | "Type": "AWS::IoT::Certificate" 19 | }, 20 | "policy": { 21 | "Properties": { 22 | "PolicyName": "" 23 | }, 24 | "Type": "AWS::IoT::Policy" 25 | }, 26 | "thing": { 27 | "Type": "AWS::IoT::Thing", 28 | "OverrideSettings": { 29 | "AttributePayload": "MERGE", 30 | "ThingGroups": "DO_NOTHING", 31 | "ThingTypeName": "REPLACE" 32 | }, 33 | "Properties": { 34 | "AttributePayload": {}, 35 | "ThingGroups": [], 36 | "ThingName": { 37 | "Fn::Join": [ 38 | "", 39 | [ 40 | "test-thing-", 41 | { 42 | "Ref": "SerialNumber" 43 | } 44 | ] 45 | ] 46 | } 47 | } 48 | } 49 | } 50 | } -------------------------------------------------------------------------------- /lib/rule/rule-policy.json: -------------------------------------------------------------------------------- 1 | { 2 | "Version": "2012-10-17", 3 | "Statement": [ 4 | { 5 | "Action": [ 6 | "ec2:CreateNetworkInterface", 7 | "ec2:CreateNetworkInterfacePermission", 8 | "ec2:DeleteNetworkInterface", 9 | "ec2:DescribeNetworkInterfaces", 10 | "ec2:DescribeSecurityGroups", 11 | "ec2:DescribeSubnets", 12 | "ec2:DescribeVpcAttribute", 13 | "ec2:DescribeVpcs", 14 | "ec2:DescribeSecurityGroups" 15 | ], 16 | "Resource": "*", 17 | "Effect": "Allow" 18 | }, 19 | { 20 | "Effect": "Allow", 21 | "Action": [ 22 | "secretsmanager:DescribeSecret", 23 | "secretsmanager:GetSecretValue" 24 | ], 25 | "Resource": "arn:aws:secretsmanager:ap-northeast-2:1234567890:secret:AmazonMSK_*" 26 | }, 27 | { 28 | "Effect": "Allow", 29 | "Action": [ 30 | "kms:Decrypt", 31 | "kms:Encrypt", 32 | "kms:GenerateDataKey", 33 | "kms:DescribeKey" 34 | ], 35 | "Resource": "*" 36 | } 37 | 38 | ] 39 | } 40 | -------------------------------------------------------------------------------- /start.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | # Reset terminal input settings 4 | stty sane 5 | 6 | # Prompt for AWS account_id and region_name 7 | echo "Please provide the following details:" 8 | echo "Enter AWS account_id: " 9 | read account_id 10 | echo "Enter AWS region_name: " 11 | read region_name 12 | 13 | # Function to update the configuration files 14 | update_config_file() { 15 | local file=$1 16 | local account_id=$2 17 | local region_name=$3 18 | 19 | if [ -f "$file" ]; then 20 | sed -i.bak "s/account: \".*\"/account: \"$account_id\"/" "$file" && rm "${file}.bak" 21 | sed -i.bak "s/region: \".*\"/region: \"$region_name\"/" "$file" && rm "${file}.bak" 22 | echo "$file has been updated successfully." 23 | else 24 | echo "Error: $file not found." 25 | fi 26 | } 27 | 28 | # Update config.ts file 29 | update_config_file "config/config.ts" "$account_id" "$region_name" 30 | 31 | # Update config.js file 32 | update_config_file "config/config.js" "$account_id" "$region_name" 33 | 34 | echo "config.ts and config.js have been updated successfully." 35 | cdk bootstrap aws://$account_id/$region_name 36 | echo "deploy cdk stacks" 37 | cdk deploy AwsVpcMskInfraStack --require-approval never 38 | cdk deploy AwsIotCoreProvisioningInfraStack --require-approval never 39 | cdk deploy AwsIotCoreRuleInfraStack --require-approval never -------------------------------------------------------------------------------- /lib/lambda/verify-devices-lambda.py: -------------------------------------------------------------------------------- 1 | import json 2 | import logging 3 | import sys 4 | 5 | # Configure logging 6 | logger = logging.getLogger() 7 | 8 | for h in logger.handlers: 9 | logger.removeHandler(h) 10 | h = logging.StreamHandler(sys.stdout) 11 | 12 | FORMAT = "[%(asctime)s - %(levelname)s - %(filename)s:%(lineno)s - %(funcName)s - %(message)s" 13 | h.setFormatter(logging.Formatter(FORMAT)) 14 | 15 | logger.addHandler(h) 16 | logger.setLevel(logging.INFO) 17 | 18 | SERIAL_STARTSWITH = "297468" 19 | 20 | 21 | def verify_serial(serial_number): 22 | if serial_number.startswith(SERIAL_STARTSWITH): 23 | logger.info("serial_number {} verification succeeded - starts with {}".format(serial_number, SERIAL_STARTSWITH)) 24 | return True 25 | 26 | logger.error("serial_number {} verification failed - does not start with {}".format(serial_number, SERIAL_STARTSWITH)) 27 | return False 28 | 29 | 30 | def lambda_handler(event, context): 31 | response = {'allowProvisioning': False} 32 | logger.info("event: {}".format(json.dumps(event, indent=2))) 33 | 34 | if not "SerialNumber" in event["parameters"]: 35 | logger.error("SerialNumber not provided") 36 | else: 37 | serial_number = event["parameters"]["SerialNumber"] 38 | if verify_serial(serial_number): 39 | response = {'allowProvisioning': True} 40 | 41 | logger.info("response: {}".format(response)) 42 | return response 43 | -------------------------------------------------------------------------------- /lib/lambda/get-bootstrapbrokers-lambda.py: -------------------------------------------------------------------------------- 1 | import boto3 2 | import os 3 | import json 4 | import urllib.request 5 | 6 | def send_response(event, context, response_status, response_data): 7 | print("event") 8 | print(event) 9 | print("context") 10 | print(context) 11 | response_body = json.dumps({ 12 | "Status": response_status, 13 | "Reason": "See the details in CloudWatch Log Stream: " + context.log_stream_name, 14 | "PhysicalResourceId": context.log_stream_name, 15 | "StackId": event['StackId'], 16 | "RequestId": event['RequestId'], 17 | "LogicalResourceId": event['LogicalResourceId'], 18 | "Data": response_data 19 | }) 20 | print(response_body) 21 | 22 | response_url = event['ResponseURL'] 23 | data = response_body.encode('utf-8') 24 | headers = {'content-type': '', 'content-length': str(len(data))} 25 | 26 | req = urllib.request.Request(response_url, data, headers, method='PUT') 27 | with urllib.request.urlopen(req) as f: 28 | print("Status code:", f.status) 29 | 30 | def lambda_handler(event, context): 31 | client = boto3.client('kafka') 32 | cluster_arn = os.environ['CLUSTER_ARN'] 33 | 34 | try: 35 | response = client.get_bootstrap_brokers(ClusterArn=cluster_arn) 36 | bootstrap_broker_string = response['BootstrapBrokerStringSaslScram'] 37 | 38 | # CloudFormation에 성공 응답 보내기 39 | send_response(event, context, "SUCCESS", {"BootstrapBrokerString": bootstrap_broker_string}) 40 | except Exception as e: 41 | print(f"Error getting bootstrap brokers: {str(e)}") 42 | # CloudFormation에 실패 응답 보내기 43 | send_response(event, context, "FAILED", {"Error": str(e)}) 44 | -------------------------------------------------------------------------------- /test/fleetmgmt-project.test.js: -------------------------------------------------------------------------------- 1 | "use strict"; 2 | // import * as cdk from 'aws-cdk-lib'; 3 | // import { Template } from 'aws-cdk-lib/assertions'; 4 | // import * as CdkTestProject from '../lib/fleet-management-project-stack'; 5 | // example test. To run these tests, uncomment this file along with the 6 | // example resource in lib/fleet-management-project-stack.ts 7 | test('SQS Queue Created', () => { 8 | // const app = new cdk.App(); 9 | // // WHEN 10 | // const stack = new CdkTestProject.CdkTestProjectStack(app, 'MyTestStack'); 11 | // // THEN 12 | // const template = Template.fromStack(stack); 13 | // template.hasResourceProperties('AWS::SQS::Queue', { 14 | // VisibilityTimeout: 300 15 | // }); 16 | }); 17 | //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiY2RrLXRlc3QtcHJvamVjdC50ZXN0LmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiY2RrLXRlc3QtcHJvamVjdC50ZXN0LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7QUFBQSxzQ0FBc0M7QUFDdEMscURBQXFEO0FBQ3JELG1FQUFtRTtBQUVuRSx1RUFBdUU7QUFDdkUsb0RBQW9EO0FBQ3BELElBQUksQ0FBQyxtQkFBbUIsRUFBRSxHQUFHLEVBQUU7SUFDL0IsK0JBQStCO0lBQy9CLGNBQWM7SUFDZCw4RUFBOEU7SUFDOUUsY0FBYztJQUNkLGdEQUFnRDtJQUVoRCx3REFBd0Q7SUFDeEQsNkJBQTZCO0lBQzdCLFFBQVE7QUFDUixDQUFDLENBQUMsQ0FBQyIsInNvdXJjZXNDb250ZW50IjpbIi8vIGltcG9ydCAqIGFzIGNkayBmcm9tICdhd3MtY2RrLWxpYic7XG4vLyBpbXBvcnQgeyBUZW1wbGF0ZSB9IGZyb20gJ2F3cy1jZGstbGliL2Fzc2VydGlvbnMnO1xuLy8gaW1wb3J0ICogYXMgQ2RrVGVzdFByb2plY3QgZnJvbSAnLi4vbGliL2Nkay10ZXN0LXByb2plY3Qtc3RhY2snO1xuXG4vLyBleGFtcGxlIHRlc3QuIFRvIHJ1biB0aGVzZSB0ZXN0cywgdW5jb21tZW50IHRoaXMgZmlsZSBhbG9uZyB3aXRoIHRoZVxuLy8gZXhhbXBsZSByZXNvdXJjZSBpbiBsaWIvY2RrLXRlc3QtcHJvamVjdC1zdGFjay50c1xudGVzdCgnU1FTIFF1ZXVlIENyZWF0ZWQnLCAoKSA9PiB7XG4vLyAgIGNvbnN0IGFwcCA9IG5ldyBjZGsuQXBwKCk7XG4vLyAgICAgLy8gV0hFTlxuLy8gICBjb25zdCBzdGFjayA9IG5ldyBDZGtUZXN0UHJvamVjdC5DZGtUZXN0UHJvamVjdFN0YWNrKGFwcCwgJ015VGVzdFN0YWNrJyk7XG4vLyAgICAgLy8gVEhFTlxuLy8gICBjb25zdCB0ZW1wbGF0ZSA9IFRlbXBsYXRlLmZyb21TdGFjayhzdGFjayk7XG5cbi8vICAgdGVtcGxhdGUuaGFzUmVzb3VyY2VQcm9wZXJ0aWVzKCdBV1M6OlNRUzo6UXVldWUnLCB7XG4vLyAgICAgVmlzaWJpbGl0eVRpbWVvdXQ6IDMwMFxuLy8gICB9KTtcbn0pO1xuIl19 -------------------------------------------------------------------------------- /cdk.json: -------------------------------------------------------------------------------- 1 | { 2 | "app": "npx ts-node --prefer-ts-exts bin/fleetmgmt-project.ts", 3 | "watch": { 4 | "include": [ 5 | "**" 6 | ], 7 | "exclude": [ 8 | "README.md", 9 | "cdk*.json", 10 | "**/*.d.ts", 11 | "**/*.js", 12 | "tsconfig.json", 13 | "package*.json", 14 | "yarn.lock", 15 | "node_modules", 16 | "test" 17 | ] 18 | }, 19 | "context": { 20 | "@aws-cdk/aws-lambda:recognizeLayerVersion": true, 21 | "@aws-cdk/core:checkSecretUsage": true, 22 | "@aws-cdk/core:target-partitions": [ 23 | "aws", 24 | "aws-cn" 25 | ], 26 | "@aws-cdk-containers/ecs-service-extensions:enableDefaultLogDriver": true, 27 | "@aws-cdk/aws-ec2:uniqueImdsv2TemplateName": true, 28 | "@aws-cdk/aws-ecs:arnFormatIncludesClusterName": true, 29 | "@aws-cdk/aws-iam:minimizePolicies": true, 30 | "@aws-cdk/core:validateSnapshotRemovalPolicy": true, 31 | "@aws-cdk/aws-codepipeline:crossAccountKeyAliasStackSafeResourceName": true, 32 | "@aws-cdk/aws-s3:createDefaultLoggingPolicy": true, 33 | "@aws-cdk/aws-sns-subscriptions:restrictSqsDescryption": true, 34 | "@aws-cdk/aws-apigateway:disableCloudWatchRole": true, 35 | "@aws-cdk/core:enablePartitionLiterals": true, 36 | "@aws-cdk/aws-events:eventsTargetQueueSameAccount": true, 37 | "@aws-cdk/aws-iam:standardizedServicePrincipals": true, 38 | "@aws-cdk/aws-ecs:disableExplicitDeploymentControllerForCircuitBreaker": true, 39 | "@aws-cdk/aws-iam:importedRoleStackSafeDefaultPolicyName": true, 40 | "@aws-cdk/aws-s3:serverAccessLogsUseBucketPolicy": true, 41 | "@aws-cdk/aws-route53-patters:useCertificate": true, 42 | "@aws-cdk/customresources:installLatestAwsSdkDefault": false, 43 | "@aws-cdk/aws-rds:databaseProxyUniqueResourceName": true, 44 | "@aws-cdk/aws-codedeploy:removeAlarmsFromDeploymentGroup": true, 45 | "@aws-cdk/aws-apigateway:authorizerChangeDeploymentLogicalId": true, 46 | "@aws-cdk/aws-ec2:launchTemplateDefaultUserData": true, 47 | "@aws-cdk/aws-secretsmanager:useAttachedSecretResourcePolicyForSecretTargetAttachments": true, 48 | "@aws-cdk/aws-redshift:columnId": true, 49 | "@aws-cdk/aws-stepfunctions-tasks:enableEmrServicePolicyV2": true, 50 | "@aws-cdk/aws-ec2:restrictDefaultSecurityGroup": true, 51 | "@aws-cdk/aws-apigateway:requestValidatorUniqueId": true, 52 | "@aws-cdk/aws-kms:aliasNameRef": true, 53 | "@aws-cdk/aws-autoscaling:generateLaunchTemplateInsteadOfLaunchConfig": true, 54 | "@aws-cdk/core:includePrefixInUniqueNameGeneration": true, 55 | "@aws-cdk/aws-efs:denyAnonymousAccess": true, 56 | "@aws-cdk/aws-opensearchservice:enableOpensearchMultiAzWithStandby": true, 57 | "@aws-cdk/aws-lambda-nodejs:useLatestRuntimeVersion": true, 58 | "@aws-cdk/aws-efs:mountTargetOrderInsensitiveLogicalId": true, 59 | "@aws-cdk/aws-rds:auroraClusterChangeScopeOfInstanceParameterGroupWithEachParameters": true, 60 | "@aws-cdk/aws-appsync:useArnForSourceApiAssociationIdentifier": true, 61 | "@aws-cdk/aws-rds:preventRenderingDeprecatedCredentials": true 62 | } 63 | } 64 | -------------------------------------------------------------------------------- /CONTRIBUTING.md: -------------------------------------------------------------------------------- 1 | # Contributing Guidelines 2 | 3 | Thank you for your interest in contributing to our project. Whether it's a bug report, new feature, correction, or additional 4 | documentation, we greatly value feedback and contributions from our community. 5 | 6 | Please read through this document before submitting any issues or pull requests to ensure we have all the necessary 7 | information to effectively respond to your bug report or contribution. 8 | 9 | 10 | ## Reporting Bugs/Feature Requests 11 | 12 | We welcome you to use the GitHub issue tracker to report bugs or suggest features. 13 | 14 | When filing an issue, please check existing open, or recently closed, issues to make sure somebody else hasn't already 15 | reported the issue. Please try to include as much information as you can. Details like these are incredibly useful: 16 | 17 | * A reproducible test case or series of steps 18 | * The version of our code being used 19 | * Any modifications you've made relevant to the bug 20 | * Anything unusual about your environment or deployment 21 | 22 | 23 | ## Contributing via Pull Requests 24 | Contributions via pull requests are much appreciated. Before sending us a pull request, please ensure that: 25 | 26 | 1. You are working against the latest source on the *main* branch. 27 | 2. You check existing open, and recently merged, pull requests to make sure someone else hasn't addressed the problem already. 28 | 3. You open an issue to discuss any significant work - we would hate for your time to be wasted. 29 | 30 | To send us a pull request, please: 31 | 32 | 1. Fork the repository. 33 | 2. Modify the source; please focus on the specific change you are contributing. If you also reformat all the code, it will be hard for us to focus on your change. 34 | 3. Ensure local tests pass. 35 | 4. Commit to your fork using clear commit messages. 36 | 5. Send us a pull request, answering any default questions in the pull request interface. 37 | 6. Pay attention to any automated CI failures reported in the pull request, and stay involved in the conversation. 38 | 39 | GitHub provides additional document on [forking a repository](https://help.github.com/articles/fork-a-repo/) and 40 | [creating a pull request](https://help.github.com/articles/creating-a-pull-request/). 41 | 42 | 43 | ## Finding contributions to work on 44 | Looking at the existing issues is a great way to find something to contribute on. As our projects, by default, use the default GitHub issue labels (enhancement/bug/duplicate/help wanted/invalid/question/wontfix), looking at any 'help wanted' issues is a great place to start. 45 | 46 | 47 | ## Code of Conduct 48 | This project has adopted the [Amazon Open Source Code of Conduct](https://aws.github.io/code-of-conduct). 49 | For more information see the [Code of Conduct FAQ](https://aws.github.io/code-of-conduct-faq) or contact 50 | opensource-codeofconduct@amazon.com with any additional questions or comments. 51 | 52 | 53 | ## Security issue notifications 54 | If you discover a potential security issue in this project we ask that you notify AWS/Amazon Security via our [vulnerability reporting page](http://aws.amazon.com/security/vulnerability-reporting/). Please do **not** create a public github issue. 55 | 56 | 57 | ## Licensing 58 | 59 | See the [LICENSE](LICENSE) file for our project's licensing. We will ask you to confirm the licensing of your contribution. 60 | -------------------------------------------------------------------------------- /bin/fleetmgmt-project.js: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env node 2 | "use strict"; 3 | var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { 4 | if (k2 === undefined) k2 = k; 5 | var desc = Object.getOwnPropertyDescriptor(m, k); 6 | if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) { 7 | desc = { enumerable: true, get: function() { return m[k]; } }; 8 | } 9 | Object.defineProperty(o, k2, desc); 10 | }) : (function(o, m, k, k2) { 11 | if (k2 === undefined) k2 = k; 12 | o[k2] = m[k]; 13 | })); 14 | var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { 15 | Object.defineProperty(o, "default", { enumerable: true, value: v }); 16 | }) : function(o, v) { 17 | o["default"] = v; 18 | }); 19 | var __importStar = (this && this.__importStar) || function (mod) { 20 | if (mod && mod.__esModule) return mod; 21 | var result = {}; 22 | if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); 23 | __setModuleDefault(result, mod); 24 | return result; 25 | }; 26 | Object.defineProperty(exports, "__esModule", { value: true }); 27 | require("source-map-support/register"); 28 | const cdk = __importStar(require("aws-cdk-lib")); 29 | const aws_vpc_msk_infra_stack_1 = require("../lib/aws-vpc-msk-infra-stack"); 30 | const config_1 = require("../config/config"); 31 | const aws_iot_core_provisioning_infra_stack_1 = require("../lib/aws-iot-core-provisioning-infra-stack"); 32 | const aws_iot_core_rule_infra_stack_1 = require("../lib/aws-iot-core-rule-infra-stack"); 33 | const app = new cdk.App(); 34 | new aws_iot_core_provisioning_infra_stack_1.AwsIotCoreProvisioningInfraStack(app, "AwsIotCoreProvisioningInfraStack", { 35 | env: { 36 | account: config_1.Config.aws.account, 37 | region: config_1.Config.aws.region, 38 | }, 39 | }); 40 | new aws_iot_core_rule_infra_stack_1.AwsIotCoreRuleInfraStack(app, "AwsIotCoreRuleInfraStack", { 41 | env: { 42 | account: config_1.Config.aws.account, 43 | region: config_1.Config.aws.region, 44 | }, 45 | }); 46 | new aws_vpc_msk_infra_stack_1.AwsVpcMskInfraStack(app, "AwsVpcMskInfraStack", { 47 | env: { 48 | account: config_1.Config.aws.account, 49 | region: config_1.Config.aws.region 50 | } 51 | }); 52 | //# sourceMappingURL=data:application/json;base64,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 -------------------------------------------------------------------------------- /lib/aws-vpc-msk-infra-stack.ts: -------------------------------------------------------------------------------- 1 | import { 2 | Stack, 3 | StackProps, 4 | aws_ec2 as ec2, 5 | aws_msk as msk, 6 | aws_lambda as lambda, 7 | aws_iam as iam, 8 | CfnOutput, 9 | } from "aws-cdk-lib"; 10 | import { Construct } from "constructs"; 11 | import {Config} from "../config/config"; 12 | import { CustomResource } from 'aws-cdk-lib'; 13 | import path from "path"; 14 | 15 | export class AwsVpcMskInfraStack extends Stack { 16 | vpc: ec2.CfnVPC; 17 | constructor(scope: Construct, id: string, props?: StackProps) { 18 | super(scope, id, props); 19 | 20 | // Create vpc 21 | this.vpc = new ec2.CfnVPC( // TODO: 무엇을 위한 vpc 인지 확인하기 22 | this, "vpc", { 23 | cidrBlock: Config.vpc.cidr + '.0.0/16', 24 | enableDnsHostnames: true, 25 | enableDnsSupport: true, 26 | instanceTenancy: 'default', 27 | tags: [ { key: "Config.app.service" + "-" + Config.app.environment + "-vpc", value: Config.app.service + '-' + Config.app.environment} ] 28 | }); 29 | 30 | new CfnOutput(this, 'vpcId', { 31 | exportName: Config.app.service + '-' + Config.app.environment + '-vpc-Id', 32 | value: this.vpc.ref, 33 | }) 34 | 35 | 36 | // Create two private subnets 37 | const subnet_private01a: ec2.CfnSubnet = this.subnet_creation('private01a', '.96.0/20'); 38 | const subnet_private01b: ec2.CfnSubnet = this.subnet_creation('private01b', '.112.0/20'); 39 | 40 | // Create Security Group 41 | let securityGroup = new ec2.CfnSecurityGroup( // TODO: 무엇을 위한 vpc 인지 확인하기 42 | this, Config.app.service + "-" + Config.app.environment + "-msk-security-group", { 43 | vpcId: this.vpc.ref, 44 | groupDescription: Config.app.service + '-' + Config.app.environment + '-msk-' + Config.msk.clusterName, 45 | groupName: Config.app.service + '-' + Config.app.environment + '-msk-' + Config.msk.clusterName, 46 | securityGroupIngress: [{ 47 | ipProtocol: "TCP", 48 | fromPort: 2181, 49 | toPort: 2181, 50 | cidrIp: Config.security_group[0], 51 | description: Config.security_group[0] 52 | }], 53 | // tags: [{ key: 'Name', value: Config.app.service + '-' + Config.app.environment + '-msk-' + Config.msk.clusterName, }], 54 | }); 55 | 56 | new CfnOutput(this, 'securityGroup', { 57 | exportName: Config.app.service + '-' + Config.app.environment + '-securityGroup-Id', 58 | value: securityGroup.attrGroupId, 59 | }) 60 | 61 | // Create MSK cluster 62 | let mskCluster = new msk.CfnCluster( 63 | this, Config.app.service + "-" + Config.app.environment + "-msk-cluster", { 64 | brokerNodeGroupInfo: { 65 | clientSubnets: [subnet_private01a.ref, subnet_private01b.ref], 66 | instanceType: 'kafka.t3.small', 67 | securityGroups: [securityGroup.ref], 68 | // the properties below are optional 69 | storageInfo: { ebsStorageInfo: { volumeSize: 1 }} 70 | }, 71 | clusterName: Config.app.service + '-' + Config.app.environment + '-msk-' + Config.msk.clusterName, 72 | kafkaVersion: '2.8.1', 73 | numberOfBrokerNodes: 2, 74 | 75 | // the properties below are optional 76 | clientAuthentication: {sasl: {scram: {enabled: true,},},} 77 | }); 78 | 79 | // Create lambda function, to get bootstrapbrokers 80 | const lambdaGetBootstrapBrokers = new lambda.Function( 81 | this, 82 | Config.app.service + "-" + Config.app.environment + "-get-bootstrapbrokers-lambda", 83 | { 84 | handler: 'get-bootstrapbrokers-lambda.lambda_handler', // Python handler format 85 | code: lambda.Code.fromAsset(path.join(__dirname, 'lambda')), // Update the path to your Python code 86 | runtime: lambda.Runtime.PYTHON_3_9, // Change to Python runtime 87 | description : "Lambda for get bootstrapbrokers", 88 | functionName: Config.app.service + "-" + Config.app.environment + "-get-bootstrapbrokers-lambda", 89 | environment: { 90 | CLUSTER_ARN: mskCluster.attrArn, 91 | }, 92 | }); 93 | 94 | lambdaGetBootstrapBrokers.addToRolePolicy(new iam.PolicyStatement({ 95 | actions: ['kafka:GetBootstrapBrokers'], 96 | resources: [mskCluster.attrArn], 97 | })); 98 | 99 | const getBootstrapBrokers = new CustomResource( 100 | this, Config.app.service + "-" + Config.app.environment + 101 | "-get-bootstrapbrokers", 102 | { 103 | serviceToken: lambdaGetBootstrapBrokers.functionArn, 104 | } 105 | ); 106 | 107 | // get bootstrapBroker string 108 | const bootstrapBrokerString = getBootstrapBrokers.getAtt('BootstrapBrokerString').toString(); 109 | 110 | 111 | new CfnOutput(this, 'mskCluster', { 112 | exportName: Config.app.service + '-' + Config.app.environment + '-msk-' + Config.msk.clusterName + "-BootstrapBrokers", 113 | value: bootstrapBrokerString, 114 | }) 115 | } 116 | 117 | subnet_creation(subnet_name: string, subnet_cidr: string): ec2.CfnSubnet 118 | { 119 | const subnet_group = subnet_name.slice(0, -1); 120 | const az = subnet_name.slice(-1); 121 | const subnet = new ec2.CfnSubnet(this, 'subnet' + subnet_name, { 122 | availabilityZone: this.region + az, 123 | cidrBlock: Config.vpc.cidr + subnet_cidr, 124 | vpcId: this.vpc.ref, 125 | tags: [{key: 'Name', value: Config.app.service + '-' + Config.app.environment + '-' + subnet_group + '-' + az}] 126 | }); 127 | 128 | new CfnOutput(this, 'subnet' + subnet_name + 'output', { 129 | exportName: Config.app.service + '-' + Config.app.environment + '-subnet-' + subnet_name, 130 | value: subnet.ref 131 | }) 132 | 133 | return subnet; 134 | } 135 | } -------------------------------------------------------------------------------- /lib/aws-iot-core-rule-infra-stack.ts: -------------------------------------------------------------------------------- 1 | import { 2 | Stack, 3 | StackProps, 4 | aws_iot as iot, 5 | aws_iam as iam, 6 | aws_secretsmanager as secretsmanager, 7 | aws_kms as kms, 8 | Fn, 9 | } from "aws-cdk-lib"; 10 | import { Construct } from "constructs"; 11 | import rulePolicyJson from "./rule/rule-policy.json"; 12 | import { Config } from "../config/config"; 13 | import ruleKeysJson from "./rule/rule-keys.json"; 14 | import keyPolicyJson from "./rule/key-policy.json"; 15 | 16 | 17 | export class AwsIotCoreRuleInfraStack extends Stack { 18 | constructor(scope: Construct, id: string, props?: StackProps) { 19 | super(scope, id, props); 20 | 21 | // Import VPC and Subnet 22 | // const vpc = ec2.Vpc.fromLookup(this, 'vpc', { isDefault: false, tags: { key: "Config.app.service" + "-" + Config.app.environment + "-vpc", value: Config.app.service + '-' + Config.app.environment}}); 23 | const vpcId = Fn.importValue(Config.app.service + '-' + Config.app.environment + '-vpc-Id'); 24 | const securityGroup = Fn.importValue(Config.app.service + '-' + Config.app.environment + '-securityGroup-Id'); 25 | 26 | const subnet_private01a = Fn.importValue(Config.app.service + '-' + Config.app.environment + "-subnet-private01a"); 27 | const subnet_private01b = Fn.importValue(Config.app.service + '-' + Config.app.environment + "-subnet-private01b"); 28 | 29 | const mskCluster_bootstrap_brokers = Fn.importValue(Config.app.service + '-' + Config.app.environment + '-msk-' + Config.msk.clusterName + "-BootstrapBrokers"); 30 | 31 | // For rules in IoT Core, please refer to this https://ap-northeast-2.console.aws.amazon.com/iot/home?region=ap-northeast-2#/rulehub 32 | // For role/policy for rules, please refer to https://docs.aws.amazon.com/iot/latest/developerguide/iot-create-role.html 33 | 34 | // Create role for Rule engine 35 | let roleRuleEngine = new iam.Role( 36 | this, Config.app.service + "-" + Config.app.environment + "-rule-engine-role", { 37 | assumedBy: new iam.ServicePrincipal("iot.amazonaws.com"), 38 | description: "AWS I AM role for IoT rule engine", 39 | roleName: Config.app.service + "-" + Config.app.environment + "-rule-engine-role", 40 | } 41 | ); 42 | 43 | // Create policy for rule engine 44 | let iotCoreRolePolicy = iam.PolicyDocument.fromJson(rulePolicyJson); 45 | 46 | let ruleEnginePolicy = new iam.Policy( 47 | this, 48 | Config.app.service + 49 | "-" + 50 | Config.app.environment + 51 | "-iot-core-role-policy", 52 | { 53 | document: iotCoreRolePolicy, 54 | policyName: "iotCoreRolePolicy", 55 | } 56 | ); 57 | 58 | ruleEnginePolicy.attachToRole(roleRuleEngine) 59 | 60 | //Create Topic Rule Destination for Kafka, replace security group, subnet, and VPC values with your own 61 | let cfnTopicRuleDestination = new iot.CfnTopicRuleDestination( 62 | this, 63 | "MyCfnTopicRuleDestination", 64 | /* all optional props */ { 65 | vpcProperties: { 66 | roleArn: roleRuleEngine.roleArn, 67 | securityGroups: [securityGroup], 68 | subnetIds: [subnet_private01a, subnet_private01b], 69 | vpcId: vpcId, 70 | }, 71 | } 72 | ); 73 | 74 | //CDK Unable to infer the rule destination requires IAM policies. Manually adding dependency 75 | cfnTopicRuleDestination.node.addDependency(ruleEnginePolicy) 76 | 77 | 78 | //Create KMS key for secret encryption 79 | keyPolicyJson.Statement[0].Principal.AWS = "arn:aws:iam::" + Config.aws.account + ":root" 80 | 81 | const key = new kms.CfnKey(this, "Key", { 82 | enabled: true, 83 | enableKeyRotation: false, 84 | keyPolicy: keyPolicyJson, 85 | keySpec: "SYMMETRIC_DEFAULT", 86 | keyUsage: "ENCRYPT_DECRYPT", 87 | }); 88 | 89 | new kms.CfnAlias(this, "KeyAlias", { 90 | aliasName: "alias/" + Config.app.application + "-" + Config.app.environment + "-msk", targetKeyId: key.ref 91 | }); 92 | 93 | //Create AWS Secrets Manager Password for MSK connection 94 | const iotSecret = new secretsmanager.CfnSecret(this, "IoTSecret", { 95 | name: 96 | "AmazonMSK_" + Config.app.application + "-" + Config.app.environment, 97 | kmsKeyId: key.ref, 98 | generateSecretString: { 99 | passwordLength: 20, 100 | excludeCharacters: "]/'", 101 | generateStringKey: "password", 102 | secretStringTemplate: JSON.stringify({username: "test-kafka"}), 103 | }, 104 | }); 105 | 106 | // Get rules from ruleKeysJson 107 | let testRuleKeys = ruleKeysJson.testRules; 108 | 109 | // Create Rules in IoT Core to send to MSK 110 | testRuleKeys.forEach((key) => { 111 | new iot.CfnTopicRule( 112 | this, Config.app.service + "-" + Config.app.environment + `-topic-rule-${key}`, 113 | { 114 | topicRulePayload: { 115 | actions: [ 116 | { 117 | kafka: { 118 | clientProperties: { 119 | acks: "1", 120 | //Replace placeholder Kafka bootstrap Servers with your own 121 | "bootstrap.servers": mskCluster_bootstrap_brokers, 122 | "security.protocol": "SASL_SSL", 123 | "sasl.mechanism": "SCRAM-SHA-512", 124 | "sasl.scram.username": 125 | "${get_secret('AmazonMSK_iot','SecretString','username'," + 126 | `'${roleRuleEngine.roleArn}')}`, 127 | "sasl.scram.password": 128 | "${get_secret('AmazonMSK_iot','SecretString','password'," + 129 | `'${roleRuleEngine.roleArn}')}`, 130 | }, 131 | destinationArn: cfnTopicRuleDestination.attrArn, 132 | topic: `test-msk-topic.${key}` 133 | }, 134 | }, 135 | ], 136 | sql: `SELECT * FROM 'test-rule/${key}'`, 137 | }, 138 | // iot does not allow rule '-' (dash). 139 | ruleName: `test_rule_${key}`, 140 | } 141 | ); 142 | }); 143 | } 144 | } 145 | -------------------------------------------------------------------------------- /lib/aws-iot-core-provisioning-infra-stack.ts: -------------------------------------------------------------------------------- 1 | import { 2 | Stack, 3 | StackProps, 4 | RemovalPolicy, 5 | aws_s3_deployment, 6 | aws_lambda as lambda, 7 | aws_iot as iot, 8 | aws_iam as iam, 9 | aws_s3 as s3 10 | } from "aws-cdk-lib"; 11 | import { 12 | AwsCustomResource, 13 | AwsCustomResourcePolicy, 14 | PhysicalResourceId, 15 | } from "aws-cdk-lib/custom-resources"; 16 | import { Construct } from "constructs"; 17 | import testDevicePolicyJson from "./device/device-policy.json"; 18 | import testProvisioningTemplateJson from "./device/provisioning-template.json"; 19 | import * as path from "path"; 20 | import { Config } from "../config/config"; 21 | import testDeviceClaimCertificatePolicyJson from "./device/device-cc-policy.json"; 22 | 23 | export class AwsIotCoreProvisioningInfraStack extends Stack { 24 | constructor(scope: Construct, id: string, props?: StackProps) { 25 | super(scope, id, props); 26 | 27 | // Modify testDevicePolicyJson according to Configs and create device policy for device policy 28 | testDevicePolicyJson.Statement[1].Resource = [ 29 | `arn:aws:iot:${Config.aws.region}:${Config.aws.account}:topic/$aws/rules/*`, 30 | `arn:aws:iot:${Config.aws.region}:${Config.aws.account}:topic/` + '${iot:ClientId}' 31 | ] 32 | testDevicePolicyJson.Statement[2].Resource = [ 33 | `arn:aws:iot:${Config.aws.region}:${Config.aws.account}:topicfilter/` + '${iot:ClientId}' 34 | ] 35 | 36 | let testDevicePolicy = new iot.CfnPolicy( 37 | this, Config.app.service + "-" + Config.app.environment + "device-policy", 38 | { 39 | policyDocument: testDevicePolicyJson, 40 | policyName: Config.app.service + "-" + Config.app.environment + "-device-policy", 41 | } 42 | ); 43 | 44 | 45 | // Create role for pre-provisioning lambda for verification of devices 46 | let rolePreProvisioningLambda = new iam.Role( 47 | this, Config.app.service + "-" + Config.app.environment + "-pre-provisioning-lambda-role", 48 | { 49 | assumedBy: new iam.ServicePrincipal("lambda.amazonaws.com"), 50 | description: "AWS IAM role for pre-provisioning lambda", 51 | roleName: Config.app.service + "-" + Config.app.environment + "-pre-provisioning-lambda-role", 52 | } 53 | ); 54 | 55 | 56 | // Crate lambda for pre-provisioning hook and add permission for invoke 57 | let lambdaPreProvisioningHook = new lambda.Function( 58 | this, Config.app.service + "-" + Config.app.environment + 59 | "-pre-provisioning-hook-lambda", 60 | { 61 | code: lambda.Code.fromAsset(path.join(__dirname, "lambda")), 62 | handler: "verify-devices-lambda.lambda_handler", 63 | runtime: lambda.Runtime.PYTHON_3_9, 64 | role: rolePreProvisioningLambda, 65 | description: "Lambda for pre-provisioning hook", 66 | functionName: Config.app.service + "-" + Config.app.environment + "-pre-provisioning-hook-lambda", 67 | } 68 | ); 69 | 70 | lambdaPreProvisioningHook.addPermission("InvokePermission", { 71 | principal: new iam.ServicePrincipal("iot.amazonaws.com"), 72 | action: "lambda:InvokeFunction", 73 | }); 74 | 75 | 76 | // Crate role for provisioning templates and add AWSIoTThingsRegistration policy 77 | let roleProvisioning = new iam.Role( 78 | this, Config.app.service + "-" + Config.app.environment + "-provisioning-template-role", 79 | { 80 | assumedBy: new iam.ServicePrincipal("iot.amazonaws.com"), 81 | description: "AWS IAM role for provisioning services", 82 | roleName: Config.app.service + "-" + Config.app.environment + "-provisioning-template-role", 83 | } 84 | ); 85 | 86 | roleProvisioning.addManagedPolicy( 87 | iam.ManagedPolicy.fromAwsManagedPolicyName( 88 | "service-role/AWSIoTThingsRegistration" 89 | ) 90 | ); 91 | 92 | // Create provisioning template 93 | testProvisioningTemplateJson.Resources.policy.Properties.PolicyName = testDevicePolicy.policyName! 94 | 95 | let testProvisioningTemplate = new iot.CfnProvisioningTemplate( 96 | this, Config.app.service + "-" + Config.app.environment + "-provision-template", 97 | { 98 | provisioningRoleArn: roleProvisioning.roleArn, 99 | templateBody: JSON.stringify(testProvisioningTemplateJson), 100 | enabled: true, 101 | preProvisioningHook: { 102 | "payloadVersion": "2020-04-01", 103 | "targetArn": lambdaPreProvisioningHook.functionArn 104 | }, 105 | description: "AWS IoT Provisioning Template", 106 | templateName: Config.app.service + "-" + Config.app.environment + "-provision-template", 107 | } 108 | ); 109 | 110 | // Modify testDeviceClaimCertificatePolicyJson and create vehicle gateway policy for Claim Certificate 111 | let templateTopicCreate = `arn:aws:iot:${Config.aws.region}:${Config.aws.account}:topic/$aws/certificates/create/*` 112 | let templateTopicProvisioning = `arn:aws:iot:${Config.aws.region}:${Config.aws.account}:topic/$aws/provisioning-templates/${testProvisioningTemplate.templateName}/provision/*` 113 | testDeviceClaimCertificatePolicyJson.Statement[1].Resource = [templateTopicCreate, templateTopicProvisioning] 114 | 115 | let templateTopicFilterCreate = `arn:aws:iot:${Config.aws.region}:${Config.aws.account}:topicfilter/$aws/certificates/create/*` 116 | let templateTopicFilterProvisioning = `arn:aws:iot:${Config.aws.region}:${Config.aws.account}:topicfilter/$aws/provisioning-templates/${testProvisioningTemplate.templateName}/provision/*` 117 | testDeviceClaimCertificatePolicyJson.Statement[2].Resource = [templateTopicFilterCreate, templateTopicFilterProvisioning] 118 | 119 | let testDeviceClaimCertificatePolicy = new iot.CfnPolicy( 120 | this, Config.app.service + "-" + Config.app.environment + "-claim-certificate-policy", 121 | { 122 | policyDocument: testDeviceClaimCertificatePolicyJson, 123 | policyName: Config.app.service + "-" + Config.app.environment + "-claim-certificate-policy", 124 | } 125 | ); 126 | 127 | // Create claim certificate by using AwsCustomResource 128 | let createKeysAndCertificateForClaimCertificate = new AwsCustomResource( 129 | this, Config.app.service + "-" + Config.app.environment + "-create-keys-and-certificate-for-claim-certificate", 130 | { 131 | onUpdate: { 132 | service: "Iot", 133 | action: "createKeysAndCertificate", 134 | parameters: {setAsActive: true}, 135 | physicalResourceId: PhysicalResourceId.fromResponse("certificateId"), 136 | outputPaths: ["certificateArn", "certificatePem", "keyPair.PublicKey", "keyPair.PrivateKey"], 137 | }, 138 | policy: AwsCustomResourcePolicy.fromSdkCalls({resources: AwsCustomResourcePolicy.ANY_RESOURCE}), 139 | } 140 | ); 141 | 142 | 143 | // Attach policy to claim certificate 144 | let PolicyPrincipalAttachmentForClaimCertificate = 145 | new iot.CfnPolicyPrincipalAttachment( 146 | this, Config.app.service + "-" + Config.app.environment + "policy-principal-attachment", { 147 | policyName: testDeviceClaimCertificatePolicy.policyName!, 148 | principal: createKeysAndCertificateForClaimCertificate.getResponseField("certificateArn"), 149 | } 150 | ); 151 | 152 | //TODO: Cfn bucket 활용하기 153 | let cdkTestS3Bucket = new s3.Bucket(this, 'cdkTestS3Bucket', { 154 | blockPublicAccess: s3.BlockPublicAccess.BLOCK_ALL, 155 | versioned: true, 156 | removalPolicy: RemovalPolicy.DESTROY, 157 | autoDeleteObjects: true, 158 | bucketName: Config.app.service + "-" + Config.app.environment + "-" + Config.aws.account + "-" + Config.s3BucketName 159 | }); 160 | 161 | // Save the vehicle-gateway certificates and keys to S3 162 | let keyDeploymentForDeviceClaimCertificate = new aws_s3_deployment.BucketDeployment( 163 | this, Config.app.service + "-" + Config.app.environment + "put-key-to-s3", 164 | { 165 | destinationBucket: cdkTestS3Bucket, 166 | sources: [ 167 | aws_s3_deployment.Source.data( 168 | "claim-certificate/claim.pem", 169 | createKeysAndCertificateForClaimCertificate.getResponseField( 170 | "certificatePem" 171 | ) 172 | ), 173 | aws_s3_deployment.Source.data( 174 | "claim-certificate/claim.public.key", 175 | createKeysAndCertificateForClaimCertificate.getResponseField( 176 | "keyPair.PublicKey" 177 | ) 178 | ), 179 | aws_s3_deployment.Source.data( 180 | "claim-certificate/claim.private.key", 181 | createKeysAndCertificateForClaimCertificate.getResponseField( 182 | "keyPair.PrivateKey" 183 | ) 184 | ), 185 | ], 186 | } 187 | ); 188 | } 189 | } 190 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Introduction 2 | CASE, the mega-trend keyword for the automotive industry, can be summarized as Connectivity, Autonomous, Sharing, and Electrification. 3 | Among them, connectivity is the foundation that enables cars that are integrated with IT technology to develop into living spaces that are connected to the world and move, and to provide various mobility services. 4 | As the number of connected vehicles in mobility services increases rapidly, fleet management systems (FMS) need to be configured to meet various needs. 5 | In this post, we'll share how 42dot addressed these challenges with AWS IoT Core and AWS CDK. 6 | 7 | ## About 42dot 8 | 42dot is the Global Software Center of Hyundai Motor Group, realizing freedom of movement in a connected world where everything moves by itself through software-defined vehicles (SDVs) based on service-defined and safety-designed values. 9 | 42dot developed AKit, an integrated solution for implementing autonomous driving technology, and TAP!, an integrated platform for autonomous mobility, and obtained the first autonomous driving paid transportation license in Korea. 10 | Currently, it operates an integrated autonomous transportation service in Sangam and Cheonggyecheon, Seoul, where anyone can call not only 42dot's autonomous vehicles but also autonomous vehicles from various companies through the TAP! application. 11 | 42dot is leveraging AWS IoT to easily and securely connect and manage its fleet management system (FMS) vehicle devices to the cloud. It is using AWS CDKs as coded infrastructure tools to automate the deployment of IoT infrastructure for different requirements. 12 | 13 | ## Introduction to AWS IoT Core 14 | AWS IoT Core is an AWS IoT service that allows you to connect and manage IoT devices and integrate with other AWS services. 15 | AWS IoT Core provides the [IoT Device SDK](https://docs.aws.amazon.com/iot/latest/developerguide/iot-sdks.html), and devices developed based on it can easily use IoT Core. 16 | IoT Core is responsible for communicating with devices and plays a central role in AWS IoT services, hence the word "Core". IoT Core provides message routing so that it can be used with storage like S3 and data pipelines like MSK. 17 | You can also utilize services like [Greengrass](https://aws.amazon.com/greengrass/), [FleetWise](https://aws.amazon.com/iot-fleetwise/), and [SiteWise](https://aws.amazon.com/iot-sitewise/) that come with AWS IoT to increase the efficiency of operating and managing IoT devices. 18 | 19 | ## Introduction to CDK 20 | The [AWS Cloud Development Kit](https://aws.amazon.com/cdk/) (hereafter AWS CDK) is an open source software development framework that allows you to define cloud application resources using familiar programming languages. 21 | This approach to managing infrastructure through code is called Infrastructure as a Code, or IaC for short. 22 | The CDK creates the resources by converting all written code into [CloudFormation](https://aws.amazon.com/cloudformation/) templates. 23 | For those looking to implement IaC for the first time on AWS, the CDK provided by AWS is a great first point of departure. 24 | 25 | # Prerequisites 26 | [An AWS Account](https://console.aws.amazon.com/console/home) 27 | 28 | [npm](https://www.npmjs.com/get-npm) 29 | - You can install the CDK via npm. 30 | 31 | [AWS CDK](https://docs.aws.amazon.com/cdk/latest/guide/getting_started.html), [AWS IoT Core](https://aws.amazon.com/iot-core/getting-started/?nc=sn&loc=5&dn=1) 32 | - This article explains how to apply CDK to build IoT Core infrastructure. For basic usage of CDK and IoT, please refer to the above link. 33 | 34 | [Provisioning of IoT Core](https://docs.aws.amazon.com/iot/latest/developerguide/iot-provision.html) 35 | - Refer to the above link for specific instructions on how to create certificates and policies required to use IoT Core. 36 | 37 | [Setting tsconfig.json to use Json as a document type](https://www.typescriptlang.org/tsconfig#resolveJsonModule) 38 | - Please add the settings guided in the link to `tsconfig.json` in order to use Json files as objects within Typescript. 39 | 40 | # Sample Scenario and System Architecture 41 | ![](figures/system_architecture_msk_English.png) 42 | The figure above shows a simple system architecture utilizing CDK. The behavioral scenario of this architecture is as follows. 43 | 44 | > A device mounted on a vehicle sends vehicle data to the IoT Core using the MQTT protocol. 45 | > After receiving the message, IoT Core forwards the message to MSK (Managed Streaming for Apache Kafka) through the Basic ingest function. 46 | 47 | Basic ingest is one of the Message Routing features provided by IoT Core, which allows you to conveniently send messages to other AWS services without incurring messaging costs. 48 | In this article, we will implement how to create a certificate and register it with IoT Core using the provisioning method of IoT Core, which is the provisioning method by claim, which is the method to use when it is difficult to provision unique credentials. 49 | 50 | ## Infrastructure required to implement the scenario 51 | ### Install CDK and bootstrap 52 | Use th e code below to install the CDK and create a CDK project. 53 | 54 | ``` 55 | git clone https://github.com/aws-samples/42dot-cdk-fleetmanagement-system 56 | cd 42dot-cdk-fleetmanagement-system 57 | npm install 58 | cdk --version 59 | chmod +x start.sh 60 | ./start.sh 61 | ``` 62 | 63 | ### Infrastructure Stacks 64 | To implement the above architecture, we define the following two infrastructure resource stacks 65 | `AwsVpcMskInfraStack` 66 | A stack for declaring VPC, subnet, security group and MSK cluster. 67 | 68 | `AwsIotCoreProvisioningInfraStack` 69 | A stack for implementing a template for the enrollment of AWS IoT Things with claim certificates, the issuance of persistent certificates, and the accompanying provisioning service. 70 | This stack also includes stack for issuing and storing claim certificates. The resulting certificate is shipped with the device firmware and requests the issuance and provisioning of a permanent certificate upon first use. 71 | 72 | `AwsIotCoreRuleInfraStack` 73 | A stack for forwarding and storing messages reported by devices. 74 | This stack also defines an IoT Rule in IoT Core and set it up to forward messages to MSK via Basic ingest. 75 | 76 | 77 | # Walkthrough 78 | 79 | ## Step 1: Creating VPC and MSK Cluster 80 | In `AwsVpcMskInfraStack` 81 | 1. VPC Creation 82 | - Declares a VPC for use with MSK, configuring DNS support and instance tenancy, and assigns it tags based on configuration settings. 83 | 2. Subnets 84 | - Creates two private subnets within the VPC intended for the MSK cluster allocation. 85 | 3. Security Group 86 | - Establishes a security group for the MSK cluster, specifying ingress rules for communication within the cluster. 87 | 4. MSK Cluster 88 | - Utilizes the previously defined subnets and security group to declare the MSK cluster, setting up broker node group information, cluster name, Kafka version, and authentication methods. 89 | 5. Getting Bootstrap Brokers 90 | - Employs an AWS Lambda function to retrieve the bootstrap brokers information from the created MSK cluster. 91 | - This is facilitated by using a CustomResource from the aws-cdk-lib, making it straightforward to obtain this information. 92 | 93 | ## Step 2: Device Policy and Security Setup 94 | In `AwsIotCoreProvisioningInfraStack` 95 | 96 | 1. Device Policy Customization 97 | - Modifies a predefined JSON policy ([`device/device-policy.json`](lib/device/device-policy.json)) based on configuration, creating an IoT device policy that allows topic publishing and subscription. 98 | 2. Lambda Role for Pre-Provisioning 99 | - Establishes an IAM role with permissions for AWS Lambda to verify devices during the pre-provisioning phase. 100 | 101 | ## Step 3: Lambda Function and Provisioning Template 102 | In `AwsIotCoreProvisioningInfraStack` 103 | 104 | 1. Pre-Provisioning Hook Lambda 105 | - Deploys a Lambda function ([`lib/lambda/verify-devices-lambda`](/lib/lambda/verify-devices-lambda.py)) to facilitate device verification, equipped with a specific IAM role and permissions to invoke the function from IoT. 106 | 2. Provisioning Template 107 | - Utilizes provisioning-template.json to define a provisioning template that includes the device policy and a pre-provisioning hook, enabling automated device provisioning. 108 | 109 | ## Step 4: Claim Certificate and Data Storage 110 | In `AwsIotCoreProvisioningInfraStack` 111 | 112 | 1. S3 Bucket for Certificate Storage 113 | - Creates an S3 bucket to securely store claim certificates and keys, configuring it with strict access blocks and auto-deletion policies for security. 114 | 2. Claim Certificate Policy 115 | - Defines and applies a policy to allow certificate claims, ensuring devices can securely communicate with AWS IoT Core. 116 | 3. Certificate Generation and Storage 117 | - Uses AwsCustomResource to call the CreateKeysAndCertificate API, generating a claim certificate and storing it in the S3 bucket. The certificate is then linked to the policy, completing the provisioning process. 118 | 119 | ## Step 5. Declaring message transfer to MSK via AWS IoT Core Rule engine 120 | In `AwsIotCoreRuleInfraStack` 121 | 122 | 1. IAM Role and Policy for Rule Engine: 123 | - Establishes an IAM role for the IoT Rule Engine, allowing it to route messages based on predefined rules. 124 | - A specific policy ([`lib/rule/rule-policy.json`](lib/rule/rule-policy.json)) grants necessary permissions for message forwarding to Amazon MSK. 125 | 2. Configuration of TopicRuleDestination: 126 | - Configures a TopicRuleDestination with security, networking settings (VPC, subnets, and security group), and associates it with the rule engine's IAM role, ensuring messages are securely routed to the correct MSK cluster. 127 | 3. Encryption Keys and Secret Management: 128 | - Utilizes AWS KMS to create encryption keys ([`lib/rule/key-policy.json`](lib/rule/key-policy.json)) for securing message content. 129 | - AWS Secrets Manager stores the MSK credentials, using the KMS key for encryption, to safely handle connection details to MSK. 130 | 4. IoT Core Rules for Message Routing: 131 | - Defines rules ([`lib/rule/rule-keys.json`](lib/rule/rule-keys.json)) in AWS IoT Core for routing messages to MSK topics. 132 | - Each rule specifies the SQL statement for message selection and the action to forward messages to MSK, including topic names and credentials fetched securely from AWS Secrets Manager. 133 | 134 | ## Step 6. Declaring the Stack in your app 135 | Inside [`bin/cdk-test-project`](/bin/cdk-test-project.ts), declare the stacks we declared earlier - `AwsVpcMskInfraStack`, `AwsIotCoreProvisioningInfraStack`, `AwsIoTCoreRuleInfraStack`. 136 | 137 | ## Step 7. Deploy the stack 138 | Having done that, you can try configuring it with the `AWS CloudFormation` template via the `cdk synth` command. 139 | 140 | ``` 141 | cdk synth 142 | ``` 143 | 144 | The `cdk diff` command allows you to compare previously deployed resources with those defined by the current code. 145 | 146 | ``` 147 | cdk diff 148 | ``` 149 | 150 | The `cdk deploy` command deploys the configured resource code to AWS CloudFormation and creates the resources in order. 151 | You can optionally deploy one or all of the stacks. 152 | 153 | ``` 154 | cdk deploy # If there is only one stack 155 | cdk deploy STACK_NAME # If you only want to deploy one specific stack among multiple stacks 156 | cdk deploy --all # Deploy all multiple stacks 157 | ``` 158 | 159 | Now you're all set. When your IoT device sends a message in line with the `test-rule/${key}` topic, 160 | AWS IoT forwards it directly to the `.${key}` topic. 161 | This ability to forward messages to other AWS services through a simple rule definition is called basic ingest. 162 | The advantage of utilizing Basic ingest is that you are not charged for it, and there are no costs associated with forwarding messages to other AWS services. 163 | 164 | 165 | # Cleaning up 166 | To remove all stacks deployed so far, use the following command 167 | 168 | ``` 169 | ./end.sh 170 | ``` 171 | 172 | 173 | # Conclusion 174 | In this post, we've configured the infrastructure from device registration to data storage using IoT Core using CDK. 175 | The CDK is a tool provided by AWS that guarantees high compatibility and can be a fundamental tool for building an AWS service-based architecture as an IaC. 176 | IoT services have many components that need to be prepared in advance in the cloud infrastructure and are sensitive to change history because there are many decisions and changes that need to be made based on the behavior observed by equipment operators and service developers. 177 | Managing this in code allows you to quickly deploy the infrastructure you need based on your environment and reduces human error. 178 | This concludes the post. -------------------------------------------------------------------------------- /lib/aws-vpc-msk-infra-stack.js: -------------------------------------------------------------------------------- 1 | "use strict"; 2 | Object.defineProperty(exports, "__esModule", { value: true }); 3 | exports.AwsVpcMskInfraStack = void 0; 4 | const aws_cdk_lib_1 = require("aws-cdk-lib"); 5 | const config_1 = require("../config/config"); 6 | const custom_resources_1 = require("aws-cdk-lib/custom-resources"); 7 | // import * as sqs from 'aws-cdk-lib/aws-sqs'; 8 | class AwsVpcMskInfraStack extends aws_cdk_lib_1.Stack { 9 | constructor(scope, id, props) { 10 | super(scope, id, props); 11 | // Create vpc 12 | this.vpc = new aws_cdk_lib_1.aws_ec2.CfnVPC(// TODO: 무엇을 위한 vpc 인지 확인하기 13 | this, "vpc", { 14 | cidrBlock: config_1.Config.vpc.cidr + '.0.0/16', 15 | enableDnsHostnames: true, 16 | enableDnsSupport: true, 17 | instanceTenancy: 'default', 18 | tags: [{ key: "Config.app.service" + "-" + config_1.Config.app.environment + "-vpc", value: config_1.Config.app.service + '-' + config_1.Config.app.environment }] 19 | }); 20 | new aws_cdk_lib_1.CfnOutput(this, 'vpcId', { 21 | exportName: config_1.Config.app.service + '-' + config_1.Config.app.environment + '-vpc-Id', 22 | value: this.vpc.ref, 23 | }); 24 | // Create two private subnets 25 | const subnet_private_01_a = this.subnet_creation('private01a', '.96.0/20'); 26 | const subnet_private_01_c = this.subnet_creation('private01c', '.112.0/20'); 27 | // Create Security Group 28 | let securityGroup = new aws_cdk_lib_1.aws_ec2.CfnSecurityGroup(// TODO: 무엇을 위한 vpc 인지 확인하기 29 | this, config_1.Config.app.service + "-" + config_1.Config.app.environment + "-msk-security-group", { 30 | vpcId: this.vpc.ref, 31 | groupDescription: config_1.Config.app.service + '-' + config_1.Config.app.environment + '-msk-' + config_1.Config.msk.clusterName, 32 | groupName: config_1.Config.app.service + '-' + config_1.Config.app.environment + '-msk-' + config_1.Config.msk.clusterName, 33 | securityGroupIngress: [{ 34 | ipProtocol: "TCP", 35 | fromPort: 2181, 36 | toPort: 2181, 37 | cidrIp: config_1.Config.security_group[0], 38 | description: config_1.Config.security_group[0] 39 | }], 40 | // tags: [{ key: 'Name', value: Config.app.service + '-' + Config.app.environment + '-msk-' + Config.msk.clusterName, }], 41 | }); 42 | new aws_cdk_lib_1.CfnOutput(this, 'securityGroup', { 43 | exportName: config_1.Config.app.service + '-' + config_1.Config.app.environment + '-securityGroup-Id', 44 | value: securityGroup.attrGroupId, 45 | }); 46 | // Create MSK cluster 47 | let mskCluster = new aws_cdk_lib_1.aws_msk.CfnCluster(this, config_1.Config.app.service + "-" + config_1.Config.app.environment + "-msk-cluster", { 48 | brokerNodeGroupInfo: { 49 | clientSubnets: [subnet_private_01_a.ref, subnet_private_01_c.ref], 50 | instanceType: 'kafka.t3.small', 51 | securityGroups: [securityGroup.ref], 52 | // the properties below are optional 53 | storageInfo: { ebsStorageInfo: { volumeSize: 1 } } 54 | }, 55 | clusterName: config_1.Config.app.service + '-' + config_1.Config.app.environment + '-msk-' + config_1.Config.msk.clusterName, 56 | kafkaVersion: '2.8.1', 57 | numberOfBrokerNodes: 2, 58 | // the properties below are optional 59 | clientAuthentication: { sasl: { scram: { enabled: true, }, }, } 60 | }); 61 | // TODO: https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/clients/client-kafka/classes/getbootstrapbrokerscommand.html 62 | let getBootStrapBrokers = new custom_resources_1.AwsCustomResource(this, config_1.Config.app.service + "-" + config_1.Config.app.environment + "-get-bootstrap-servers", { 63 | onUpdate: { 64 | service: "client-msk", 65 | action: "GetBootstrapBrokers", 66 | parameters: { ClusterArn: mskCluster.attrArn }, 67 | physicalResourceId: custom_resources_1.PhysicalResourceId.of(mskCluster.attrArn), 68 | }, 69 | policy: custom_resources_1.AwsCustomResourcePolicy.fromSdkCalls({ resources: custom_resources_1.AwsCustomResourcePolicy.ANY_RESOURCE }), 70 | //TODO: 안될 경우 ChatGPT의 조언대로 변경 가능 71 | // policy: AwsCustomResourcePolicy.fromStatements([ 72 | // new iam.PolicyStatement({ 73 | // actions: ['msk:GetBootstrapBrokers'], 74 | // resources: ['*'], 75 | // }), 76 | // ]), 77 | }); 78 | const bootstrapBrokerString = getBootStrapBrokers.getResponseField("BootstrapBrokerString"); 79 | console.log("bootstrapBrokerString: " + bootstrapBrokerString); 80 | // Use AWS SDK to fetch bootstrap brokers 81 | new aws_cdk_lib_1.CfnOutput(this, 'mskCluster', { 82 | exportName: config_1.Config.app.service + '-' + config_1.Config.app.environment + '-msk-' + config_1.Config.msk.clusterName + "-BootstrapBrokers", 83 | value: bootstrapBrokerString, 84 | }); 85 | } 86 | subnet_creation(subnet_name, subnet_cidr) { 87 | const subnet_group = subnet_name.slice(0, -1); 88 | const az = subnet_name.slice(-1); 89 | const subnet = new aws_cdk_lib_1.aws_ec2.CfnSubnet(this, 'subnet' + subnet_name, { 90 | availabilityZone: this.region + az, 91 | cidrBlock: config_1.Config.vpc.cidr + subnet_cidr, 92 | vpcId: this.vpc.ref, 93 | tags: [{ key: 'Name', value: config_1.Config.app.service + '-' + config_1.Config.app.environment + '-' + subnet_group + '-' + az }] 94 | }); 95 | new aws_cdk_lib_1.CfnOutput(this, 'subnet' + subnet_name + 'output', { 96 | exportName: config_1.Config.app.service + '-' + config_1.Config.app.environment + '-subnet-' + subnet_name, 97 | value: subnet.ref 98 | }); 99 | return subnet; 100 | } 101 | } 102 | exports.AwsVpcMskInfraStack = AwsVpcMskInfraStack; 103 | //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"aws-vpc-msk-infra-stack.js","sourceRoot":"","sources":["aws-vpc-msk-infra-stack.ts"],"names":[],"mappings":";;;AAAA,6CAMqB;AAErB,6CAAwC;AACxC,mEAA4G;AAE5G,8CAA8C;AAE9C,MAAa,mBAAoB,SAAQ,mBAAK;IAE1C,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAkB;QACxD,KAAK,CAAC,KAAK,EAAE,EAAE,EAAE,KAAK,CAAC,CAAC;QAExB,aAAa;QACb,IAAI,CAAC,GAAG,GAAG,IAAI,qBAAG,CAAC,MAAM,CAAE,2BAA2B;QAClD,IAAI,EAAE,KAAK,EAAE;YACT,SAAS,EAAE,eAAM,CAAC,GAAG,CAAC,IAAI,GAAG,SAAS;YACtC,kBAAkB,EAAE,IAAI;YACxB,gBAAgB,EAAE,IAAI;YACtB,eAAe,EAAE,SAAS;YAC1B,IAAI,EAAE,CAAE,EAAE,GAAG,EAAE,oBAAoB,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,MAAM,EAAE,KAAK,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,EAAC,CAAE;SAC3I,CAAC,CAAC;QAEP,IAAI,uBAAS,CAAC,IAAI,EAAE,OAAO,EAAE;YACzB,UAAU,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,SAAS;YACzE,KAAK,EAAE,IAAI,CAAC,GAAG,CAAC,GAAG;SACtB,CAAC,CAAA;QAGF,6BAA6B;QAC7B,MAAM,mBAAmB,GAAkB,IAAI,CAAC,eAAe,CAAC,YAAY,EAAE,UAAU,CAAC,CAAC;QAC1F,MAAM,mBAAmB,GAAkB,IAAI,CAAC,eAAe,CAAC,YAAY,EAAE,WAAW,CAAC,CAAC;QAE3F,wBAAwB;QACxB,IAAI,aAAa,GAAG,IAAI,qBAAG,CAAC,gBAAgB,CAAE,2BAA2B;QACrE,IAAI,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,qBAAqB,EAAE;YAC7E,KAAK,EAAE,IAAI,CAAC,GAAG,CAAC,GAAG;YACnB,gBAAgB,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,OAAO,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW;YACtG,SAAS,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,OAAO,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW;YAC/F,oBAAoB,EAAE,CAAC;oBACnB,UAAU,EAAE,KAAK;oBACjB,QAAQ,EAAE,IAAI;oBACd,MAAM,EAAE,IAAI;oBACZ,MAAM,EAAE,eAAM,CAAC,cAAc,CAAC,CAAC,CAAC;oBAChC,WAAW,EAAE,eAAM,CAAC,cAAc,CAAC,CAAC,CAAC;iBACxC,CAAC;YACF,yHAAyH;SAC5H,CAAC,CAAC;QAEP,IAAI,uBAAS,CAAC,IAAI,EAAE,eAAe,EAAE;YACjC,UAAU,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,mBAAmB;YACnF,KAAK,EAAE,aAAa,CAAC,WAAW;SACnC,CAAC,CAAA;QAEF,qBAAqB;QACrB,IAAI,UAAU,GAAG,IAAI,qBAAG,CAAC,UAAU,CAC/B,IAAI,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,cAAc,EAAE;YACtE,mBAAmB,EAAE;gBACjB,aAAa,EAAE,CAAC,mBAAmB,CAAC,GAAG,EAAE,mBAAmB,CAAC,GAAG,CAAC;gBACjE,YAAY,EAAE,gBAAgB;gBAC9B,cAAc,EAAE,CAAC,aAAa,CAAC,GAAG,CAAC;gBACnC,oCAAoC;gBACpC,WAAW,EAAE,EAAE,cAAc,EAAE,EAAE,UAAU,EAAE,CAAC,EAAE,EAAC;aACpD;YACD,WAAW,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,OAAO,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW;YACjG,YAAY,EAAE,OAAO;YACrB,mBAAmB,EAAE,CAAC;YAEtB,oCAAoC;YACpC,oBAAoB,EAAE,EAAC,IAAI,EAAE,EAAC,KAAK,EAAE,EAAC,OAAO,EAAE,IAAI,GAAE,GAAE,GAAE;SAC5D,CAAC,CAAC;QAEP,4HAA4H;QAC5H,IAAI,mBAAmB,GAAG,IAAI,oCAAiB,CAC3C,IAAI,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,wBAAwB,EAClF;YACI,QAAQ,EAAE;gBACN,OAAO,EAAE,YAAY;gBACrB,MAAM,EAAE,qBAAqB;gBAC7B,UAAU,EAAE,EAAC,UAAU,EAAE,UAAU,CAAC,OAAO,EAAC;gBAC5C,kBAAkB,EAAE,qCAAkB,CAAC,EAAE,CAAC,UAAU,CAAC,OAAO,CAAC;aAChE;YACD,MAAM,EAAE,0CAAuB,CAAC,YAAY,CAAC,EAAC,SAAS,EAAE,0CAAuB,CAAC,YAAY,EAAC,CAAC;YAC/F,kCAAkC;YAClC,mDAAmD;YACnD,gCAAgC;YAChC,gDAAgD;YAChD,4BAA4B;YAC5B,UAAU;YACV,MAAM;SAET,CACJ,CAAC;QACF,MAAM,qBAAqB,GAAG,mBAAmB,CAAC,gBAAgB,CAAC,uBAAuB,CAAC,CAAC;QAC5F,OAAO,CAAC,GAAG,CAAC,yBAAyB,GAAG,qBAAqB,CAAC,CAAC;QAE/D,yCAAyC;QAEzC,IAAI,uBAAS,CAAC,IAAI,EAAE,YAAY,EAAE;YAC9B,UAAU,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,OAAO,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,mBAAmB;YACtH,KAAK,EAAE,qBAAqB;SAC/B,CAAC,CAAA;IACN,CAAC;IACD,eAAe,CAAC,WAAmB,EAAE,WAAmB;QAEpD,MAAM,YAAY,GAAG,WAAW,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC;QAC9C,MAAM,EAAE,GAAG,WAAW,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC;QACjC,MAAM,MAAM,GAAG,IAAI,qBAAG,CAAC,SAAS,CAAC,IAAI,EAAE,QAAQ,GAAG,WAAW,EAAE;YAC3D,gBAAgB,EAAE,IAAI,CAAC,MAAM,GAAG,EAAE;YAClC,SAAS,EAAE,eAAM,CAAC,GAAG,CAAC,IAAI,GAAG,WAAW;YACxC,KAAK,EAAE,IAAI,CAAC,GAAG,CAAC,GAAG;YACnB,IAAI,EAAE,CAAC,EAAC,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,GAAG,GAAG,YAAY,GAAG,GAAG,GAAG,EAAE,EAAC,CAAC;SAClH,CAAC,CAAC;QAEH,IAAI,uBAAS,CAAC,IAAI,EAAE,QAAQ,GAAG,WAAW,GAAG,QAAQ,EAAE;YACnD,UAAU,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,UAAU,GAAG,WAAW;YACxF,KAAK,EAAE,MAAM,CAAC,GAAG;SACpB,CAAC,CAAA;QAEF,OAAO,MAAM,CAAC;IAClB,CAAC;CACJ;AAjHD,kDAiHC","sourcesContent":["import {\n    Stack,\n    StackProps,\n    aws_ec2 as ec2,\n    aws_msk as msk,\n    CfnOutput,\n} from \"aws-cdk-lib\";\nimport { Construct } from \"constructs\";\nimport {Config} from \"../config/config\";\nimport {AwsCustomResource, AwsCustomResourcePolicy, PhysicalResourceId} from \"aws-cdk-lib/custom-resources\";\n\n// import * as sqs from 'aws-cdk-lib/aws-sqs';\n\nexport class AwsVpcMskInfraStack extends Stack {\n    vpc: ec2.CfnVPC;\n    constructor(scope: Construct, id: string, props?: StackProps) {\n        super(scope, id, props);\n\n        // Create vpc\n        this.vpc = new ec2.CfnVPC( // TODO: 무엇을 위한 vpc 인지 확인하기\n            this, \"vpc\", {\n                cidrBlock: Config.vpc.cidr + '.0.0/16',\n                enableDnsHostnames: true,\n                enableDnsSupport: true,\n                instanceTenancy: 'default',\n                tags: [ { key: \"Config.app.service\" + \"-\" + Config.app.environment + \"-vpc\", value: Config.app.service + '-' + Config.app.environment} ]\n            });\n\n        new CfnOutput(this, 'vpcId', {\n            exportName: Config.app.service + '-' + Config.app.environment + '-vpc-Id',\n            value: this.vpc.ref,\n        })\n\n\n        // Create two private subnets\n        const subnet_private_01_a: ec2.CfnSubnet = this.subnet_creation('private01a', '.96.0/20');\n        const subnet_private_01_c: ec2.CfnSubnet = this.subnet_creation('private01c', '.112.0/20');\n\n        // Create Security Group\n        let securityGroup = new ec2.CfnSecurityGroup( // TODO: 무엇을 위한 vpc 인지 확인하기\n            this, Config.app.service + \"-\" + Config.app.environment + \"-msk-security-group\", {\n                vpcId: this.vpc.ref,\n                groupDescription: Config.app.service + '-' + Config.app.environment + '-msk-' + Config.msk.clusterName,\n                groupName: Config.app.service + '-' + Config.app.environment + '-msk-' + Config.msk.clusterName,\n                securityGroupIngress: [{\n                    ipProtocol: \"TCP\",\n                    fromPort: 2181,\n                    toPort: 2181,\n                    cidrIp: Config.security_group[0],\n                    description: Config.security_group[0]\n                }],\n                // tags: [{ key: 'Name', value: Config.app.service + '-' + Config.app.environment + '-msk-' + Config.msk.clusterName, }],\n            });\n\n        new CfnOutput(this, 'securityGroup', {\n            exportName: Config.app.service + '-' + Config.app.environment + '-securityGroup-Id',\n            value: securityGroup.attrGroupId,\n        })\n\n        // Create MSK cluster\n        let mskCluster = new msk.CfnCluster(\n            this, Config.app.service + \"-\" + Config.app.environment + \"-msk-cluster\", {\n                brokerNodeGroupInfo: {\n                    clientSubnets: [subnet_private_01_a.ref, subnet_private_01_c.ref],\n                    instanceType: 'kafka.t3.small',\n                    securityGroups: [securityGroup.ref],\n                    // the properties below are optional\n                    storageInfo: { ebsStorageInfo: { volumeSize: 1 }}\n                },\n                clusterName: Config.app.service + '-' + Config.app.environment + '-msk-' + Config.msk.clusterName,\n                kafkaVersion: '2.8.1',\n                numberOfBrokerNodes: 2,\n\n                // the properties below are optional\n                clientAuthentication: {sasl: {scram: {enabled: true,},},}\n            });\n\n        // TODO: https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/clients/client-kafka/classes/getbootstrapbrokerscommand.html\n        let getBootStrapBrokers = new AwsCustomResource(\n            this, Config.app.service + \"-\" + Config.app.environment + \"-get-bootstrap-servers\",\n            {\n                onUpdate: {\n                    service: \"client-msk\",\n                    action: \"GetBootstrapBrokers\",\n                    parameters: {ClusterArn: mskCluster.attrArn},\n                    physicalResourceId: PhysicalResourceId.of(mskCluster.attrArn),\n                },\n                policy: AwsCustomResourcePolicy.fromSdkCalls({resources: AwsCustomResourcePolicy.ANY_RESOURCE}),\n                //TODO: 안될 경우 ChatGPT의 조언대로  변경 가능\n                // policy: AwsCustomResourcePolicy.fromStatements([\n                //     new iam.PolicyStatement({\n                //         actions: ['msk:GetBootstrapBrokers'],\n                //         resources: ['*'],\n                //     }),\n                // ]),\n\n            }\n        );\n        const bootstrapBrokerString = getBootStrapBrokers.getResponseField(\"BootstrapBrokerString\");\n        console.log(\"bootstrapBrokerString: \" + bootstrapBrokerString);\n\n        // Use AWS SDK to fetch bootstrap brokers\n\n        new CfnOutput(this, 'mskCluster', {\n            exportName: Config.app.service + '-' + Config.app.environment + '-msk-' + Config.msk.clusterName + \"-BootstrapBrokers\",\n            value: bootstrapBrokerString,\n        })\n    }\n    subnet_creation(subnet_name: string, subnet_cidr: string): ec2.CfnSubnet\n    {\n        const subnet_group = subnet_name.slice(0, -1);\n        const az = subnet_name.slice(-1);\n        const subnet = new ec2.CfnSubnet(this, 'subnet' + subnet_name, {\n            availabilityZone: this.region + az,\n            cidrBlock: Config.vpc.cidr + subnet_cidr,\n            vpcId: this.vpc.ref,\n            tags: [{key: 'Name', value: Config.app.service + '-' + Config.app.environment + '-' + subnet_group + '-' + az}]\n        });\n\n        new CfnOutput(this, 'subnet' + subnet_name + 'output', {\n            exportName: Config.app.service + '-' + Config.app.environment + '-subnet-' + subnet_name,\n            value: subnet.ref\n        })\n\n        return subnet;\n    }\n}"]} -------------------------------------------------------------------------------- /lib/aws-iot-core-rule-infra-stack.js: -------------------------------------------------------------------------------- 1 | "use strict"; 2 | var __importDefault = (this && this.__importDefault) || function (mod) { 3 | return (mod && mod.__esModule) ? mod : { "default": mod }; 4 | }; 5 | Object.defineProperty(exports, "__esModule", { value: true }); 6 | exports.AwsIotCoreRuleInfraStack = void 0; 7 | const aws_cdk_lib_1 = require("aws-cdk-lib"); 8 | const rule_policy_json_1 = __importDefault(require("./rule/rule-policy.json")); 9 | const config_1 = require("../config/config"); 10 | const rule_keys_json_1 = __importDefault(require("./rule/rule-keys.json")); 11 | const key_policy_json_1 = __importDefault(require("./rule/key-policy.json")); 12 | class AwsIotCoreRuleInfraStack extends aws_cdk_lib_1.Stack { 13 | constructor(scope, id, props) { 14 | super(scope, id, props); 15 | // Import VPC and Subnet 16 | // const vpc = ec2.Vpc.fromLookup(this, 'vpc', { isDefault: false, tags: { key: "Config.app.service" + "-" + Config.app.environment + "-vpc", value: Config.app.service + '-' + Config.app.environment}}); 17 | const vpcId = aws_cdk_lib_1.Fn.importValue(config_1.Config.app.service + '-' + config_1.Config.app.environment + '-vpc-Id'); 18 | const securityGroup = aws_cdk_lib_1.Fn.importValue(config_1.Config.app.service + '-' + config_1.Config.app.environment + '-securityGroup-Id'); 19 | const subnet_private02a = aws_cdk_lib_1.Fn.importValue(config_1.Config.app.service + '-' + config_1.Config.app.environment + '-subnet-private02a'); 20 | const subnet_private02b = aws_cdk_lib_1.Fn.importValue(config_1.Config.app.service + '-' + config_1.Config.app.environment + '-subnet-private02b'); 21 | const mskCluster_bootstrap_brokers = aws_cdk_lib_1.Fn.importValue(config_1.Config.app.service + '-' + config_1.Config.app.environment + '-msk-' + config_1.Config.msk.clusterName + "-BootstrapBrokers"); 22 | // For rules in IoT Core, please refer to this https://ap-northeast-2.console.aws.amazon.com/iot/home?region=ap-northeast-2#/rulehub 23 | // For role/policy for rules, please refer to https://docs.aws.amazon.com/iot/latest/developerguide/iot-create-role.html 24 | // Create role for Rule engine 25 | let roleRuleEngine = new aws_cdk_lib_1.aws_iam.Role(this, config_1.Config.app.service + "-" + config_1.Config.app.environment + "-rule-engine-role", { 26 | assumedBy: new aws_cdk_lib_1.aws_iam.ServicePrincipal("iot.amazonaws.com"), 27 | description: "AWS I AM role for IoT rule engine", 28 | roleName: config_1.Config.app.service + "-" + config_1.Config.app.environment + "-rule-engine-role", 29 | }); 30 | // Create policy for rule engine 31 | let iotCoreRolePolicy = aws_cdk_lib_1.aws_iam.PolicyDocument.fromJson(rule_policy_json_1.default); 32 | let ruleEnginePolicy = new aws_cdk_lib_1.aws_iam.Policy(this, config_1.Config.app.service + 33 | "-" + 34 | config_1.Config.app.environment + 35 | "-iot-core-role-policy", { 36 | document: iotCoreRolePolicy, 37 | policyName: "iotCoreRolePolicy", 38 | }); 39 | ruleEnginePolicy.attachToRole(roleRuleEngine); 40 | //Create Topic Rule Destination for Kafka, replace security group, subnet, and VPC values with your own 41 | let cfnTopicRuleDestination = new aws_cdk_lib_1.aws_iot.CfnTopicRuleDestination(this, "MyCfnTopicRuleDestination", 42 | /* all optional props */ { 43 | vpcProperties: { 44 | roleArn: roleRuleEngine.roleArn, 45 | securityGroups: [securityGroup], 46 | subnetIds: [subnet_private02a, subnet_private02b], 47 | vpcId: vpcId, 48 | }, 49 | }); 50 | //CDK Unable to infer the rule destination requires IAM policies. Manually adding dependency 51 | cfnTopicRuleDestination.node.addDependency(ruleEnginePolicy); 52 | //Create KMS key for secret encryption 53 | key_policy_json_1.default.Statement[0].Principal.AWS = "arn:aws:iam::" + config_1.Config.aws.account + ":root"; 54 | const key = new aws_cdk_lib_1.aws_kms.CfnKey(this, "Key", { 55 | enabled: true, 56 | enableKeyRotation: false, 57 | keyPolicy: key_policy_json_1.default, 58 | keySpec: "SYMMETRIC_DEFAULT", 59 | keyUsage: "ENCRYPT_DECRYPT", 60 | }); 61 | new aws_cdk_lib_1.aws_kms.CfnAlias(this, "KeyAlias", { 62 | aliasName: "alias/" + config_1.Config.app.application + "-" + config_1.Config.app.environment + "-msk", targetKeyId: key.ref 63 | }); 64 | //Create AWS Secrets Manager Password for MSK connection 65 | const iotSecret = new aws_cdk_lib_1.aws_secretsmanager.CfnSecret(this, "IoTSecret", { 66 | name: "AmazonMSK_" + config_1.Config.app.application + "-" + config_1.Config.app.environment, 67 | kmsKeyId: key.ref, 68 | generateSecretString: { 69 | passwordLength: 20, 70 | excludeCharacters: "]/'", 71 | generateStringKey: "password", 72 | secretStringTemplate: JSON.stringify({ username: "test-kafka" }), 73 | }, 74 | }); 75 | // Get rules from ruleKeysJson 76 | let testRuleKeys = rule_keys_json_1.default.testRules; 77 | // Create Rules in IoT Core to send to S3 and MSK 78 | testRuleKeys.forEach((key) => { 79 | new aws_cdk_lib_1.aws_iot.CfnTopicRule(this, config_1.Config.app.service + "-" + config_1.Config.app.environment + `-topic-rule-${key}`, { 80 | topicRulePayload: { 81 | actions: [ 82 | { 83 | kafka: { 84 | clientProperties: { 85 | acks: "1", 86 | //Replace placeholder Kafka bootstrap Servers with your own 87 | "bootstrap.servers": mskCluster_bootstrap_brokers, 88 | "security.protocol": "SASL_SSL", 89 | "sasl.mechanism": "SCRAM-SHA-512", 90 | "sasl.scram.username": "${get_secret('AmazonMSK_iot','SecretString','username'," + 91 | `'${roleRuleEngine.roleArn}')}`, 92 | "sasl.scram.password": "${get_secret('AmazonMSK_iot','SecretString','password'," + 93 | `'${roleRuleEngine.roleArn}')}`, 94 | }, 95 | destinationArn: cfnTopicRuleDestination.attrArn, 96 | topic: `test-msk-topic.${key}` 97 | }, 98 | }, 99 | ], 100 | sql: `SELECT * FROM 'test-rule/${key}'`, 101 | }, 102 | // iot does not allow rule '-' (dash). 103 | ruleName: `test_rule_${key}`, 104 | }); 105 | }); 106 | } 107 | } 108 | exports.AwsIotCoreRuleInfraStack = AwsIotCoreRuleInfraStack; 109 | //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"aws-iot-core-rule-infra-stack.js","sourceRoot":"","sources":["aws-iot-core-rule-infra-stack.ts"],"names":[],"mappings":";;;;;;AAAA,6CASqB;AAErB,+EAAqD;AACrD,6CAA0C;AAC1C,2EAAiD;AACjD,6EAAmD;AAGnD,MAAa,wBAAyB,SAAQ,mBAAK;IAC/C,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAkB;QACxD,KAAK,CAAC,KAAK,EAAE,EAAE,EAAE,KAAK,CAAC,CAAC;QAExB,wBAAwB;QACxB,0MAA0M;QAC1M,MAAM,KAAK,GAAG,gBAAE,CAAC,WAAW,CAAC,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,SAAS,CAAC,CAAC;QAC5F,MAAM,aAAa,GAAG,gBAAE,CAAC,WAAW,CAAC,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,mBAAmB,CAAC,CAAC;QAE9G,MAAM,iBAAiB,GAAG,gBAAE,CAAC,WAAW,CAAC,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,oBAAoB,CAAC,CAAC;QACnH,MAAM,iBAAiB,GAAG,gBAAE,CAAC,WAAW,CAAC,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,oBAAoB,CAAC,CAAC;QAEnH,MAAM,4BAA4B,GAAG,gBAAE,CAAC,WAAW,CAAC,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,OAAO,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,mBAAmB,CAAC,CAAC;QAEhK,oIAAoI;QACpI,wHAAwH;QAExH,+BAA+B;QAC/B,IAAI,cAAc,GAAG,IAAI,qBAAG,CAAC,IAAI,CAC7B,IAAI,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,mBAAmB,EAAE;YAC3E,SAAS,EAAE,IAAI,qBAAG,CAAC,gBAAgB,CAAC,mBAAmB,CAAC;YACxD,WAAW,EAAE,mCAAmC;YAChD,QAAQ,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,mBAAmB;SACpF,CACJ,CAAC;QAEF,gCAAgC;QAChC,IAAI,iBAAiB,GAAG,qBAAG,CAAC,cAAc,CAAC,QAAQ,CAAC,0BAAc,CAAC,CAAC;QAEpE,IAAI,gBAAgB,GAAG,IAAI,qBAAG,CAAC,MAAM,CACjC,IAAI,EACJ,eAAM,CAAC,GAAG,CAAC,OAAO;YAClB,GAAG;YACH,eAAM,CAAC,GAAG,CAAC,WAAW;YACtB,uBAAuB,EACvB;YACI,QAAQ,EAAE,iBAAiB;YAC3B,UAAU,EAAE,mBAAmB;SAClC,CACJ,CAAC;QAEF,gBAAgB,CAAC,YAAY,CAAC,cAAc,CAAC,CAAA;QAE7C,uGAAuG;QACvG,IAAI,uBAAuB,GAAG,IAAI,qBAAG,CAAC,uBAAuB,CACzD,IAAI,EACJ,2BAA2B;QAC3B,wBAAwB,CAAC;YACrB,aAAa,EAAE;gBACX,OAAO,EAAE,cAAc,CAAC,OAAO;gBAC/B,cAAc,EAAE,CAAC,aAAa,CAAC;gBAC/B,SAAS,EAAE,CAAC,iBAAiB,EAAE,iBAAiB,CAAC;gBACjD,KAAK,EAAE,KAAK;aACf;SACJ,CACJ,CAAC;QAEF,4FAA4F;QAC5F,uBAAuB,CAAC,IAAI,CAAC,aAAa,CAAC,gBAAgB,CAAC,CAAA;QAG5D,sCAAsC;QACtC,yBAAa,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,GAAG,GAAG,eAAe,GAAG,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,OAAO,CAAA;QAEzF,MAAM,GAAG,GAAG,IAAI,qBAAG,CAAC,MAAM,CAAC,IAAI,EAAE,KAAK,EAAE;YACpC,OAAO,EAAE,IAAI;YACb,iBAAiB,EAAE,KAAK;YACxB,SAAS,EAAE,yBAAa;YACxB,OAAO,EAAE,mBAAmB;YAC5B,QAAQ,EAAE,iBAAiB;SAC9B,CAAC,CAAC;QAEH,IAAI,qBAAG,CAAC,QAAQ,CAAC,IAAI,EAAE,UAAU,EAAE;YAC/B,SAAS,EAAE,QAAQ,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,MAAM,EAAE,WAAW,EAAE,GAAG,CAAC,GAAG;SAC7G,CAAC,CAAC;QAEH,wDAAwD;QACxD,MAAM,SAAS,GAAG,IAAI,gCAAc,CAAC,SAAS,CAAC,IAAI,EAAE,WAAW,EAAE;YAC9D,IAAI,EACA,YAAY,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW;YACxE,QAAQ,EAAE,GAAG,CAAC,GAAG;YACjB,oBAAoB,EAAE;gBAClB,cAAc,EAAE,EAAE;gBAClB,iBAAiB,EAAE,KAAK;gBACxB,iBAAiB,EAAE,UAAU;gBAC7B,oBAAoB,EAAE,IAAI,CAAC,SAAS,CAAC,EAAC,QAAQ,EAAE,YAAY,EAAC,CAAC;aACjE;SACJ,CAAC,CAAC;QAEH,8BAA8B;QAC9B,IAAI,YAAY,GAAG,wBAAY,CAAC,SAAS,CAAC;QAE1C,iDAAiD;QACjD,YAAY,CAAC,OAAO,CAAC,CAAC,GAAG,EAAE,EAAE;YACzB,IAAI,qBAAG,CAAC,YAAY,CAChB,IAAI,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,eAAe,GAAG,EAAE,EAC9E;gBACI,gBAAgB,EAAE;oBACd,OAAO,EAAE;wBACL;4BACI,KAAK,EAAE;gCACH,gBAAgB,EAAE;oCACd,IAAI,EAAE,GAAG;oCACT,2DAA2D;oCAC3D,mBAAmB,EAAE,4BAA4B;oCACjD,mBAAmB,EAAE,UAAU;oCAC/B,gBAAgB,EAAE,eAAe;oCACjC,qBAAqB,EACjB,yDAAyD;wCACzD,IAAI,cAAc,CAAC,OAAO,KAAK;oCACnC,qBAAqB,EACjB,yDAAyD;wCACzD,IAAI,cAAc,CAAC,OAAO,KAAK;iCACtC;gCACD,cAAc,EAAE,uBAAuB,CAAC,OAAO;gCAC/C,KAAK,EAAE,kBAAkB,GAAG,EAAE;6BACjC;yBACJ;qBACJ;oBACD,GAAG,EAAE,4BAA4B,GAAG,GAAG;iBAC1C;gBACD,sCAAsC;gBACtC,QAAQ,EAAE,aAAa,GAAG,EAAE;aAC/B,CACJ,CAAC;QACN,CAAC,CAAC,CAAC;IACP,CAAC;CACJ;AA/HD,4DA+HC","sourcesContent":["import {\n    Stack,\n    StackProps,\n    aws_iot as iot,\n    aws_iam as iam,\n    aws_secretsmanager as secretsmanager,\n    aws_kms as kms,\n    aws_ec2 as ec2,\n    Fn,\n} from \"aws-cdk-lib\";\nimport { Construct } from \"constructs\";\nimport rulePolicyJson from \"./rule/rule-policy.json\";\nimport { Config } from \"../config/config\";\nimport ruleKeysJson from \"./rule/rule-keys.json\";\nimport keyPolicyJson from \"./rule/key-policy.json\";\n\n\nexport class AwsIotCoreRuleInfraStack extends Stack {\n    constructor(scope: Construct, id: string, props?: StackProps) {\n        super(scope, id, props);\n\n        // Import VPC and Subnet\n        // const vpc = ec2.Vpc.fromLookup(this, 'vpc', { isDefault: false, tags: { key: \"Config.app.service\" + \"-\" + Config.app.environment + \"-vpc\", value: Config.app.service + '-' + Config.app.environment}});\n        const vpcId = Fn.importValue(Config.app.service + '-' + Config.app.environment + '-vpc-Id');\n        const securityGroup = Fn.importValue(Config.app.service + '-' + Config.app.environment + '-securityGroup-Id');\n\n        const subnet_private02a = Fn.importValue(Config.app.service + '-' + Config.app.environment + '-subnet-private02a');\n        const subnet_private02b = Fn.importValue(Config.app.service + '-' + Config.app.environment + '-subnet-private02b');\n\n        const mskCluster_bootstrap_brokers = Fn.importValue(Config.app.service + '-' + Config.app.environment + '-msk-' + Config.msk.clusterName + \"-BootstrapBrokers\");\n\n        // For rules in IoT Core, please refer to this https://ap-northeast-2.console.aws.amazon.com/iot/home?region=ap-northeast-2#/rulehub\n        // For role/policy for rules, please refer to https://docs.aws.amazon.com/iot/latest/developerguide/iot-create-role.html\n\n        //  Create role for Rule engine\n        let roleRuleEngine = new iam.Role(\n            this, Config.app.service + \"-\" + Config.app.environment + \"-rule-engine-role\", {\n                assumedBy: new iam.ServicePrincipal(\"iot.amazonaws.com\"),\n                description: \"AWS I AM role for IoT rule engine\",\n                roleName: Config.app.service + \"-\" + Config.app.environment + \"-rule-engine-role\",\n            }\n        );\n\n        // Create policy for rule engine\n        let iotCoreRolePolicy = iam.PolicyDocument.fromJson(rulePolicyJson);\n\n        let ruleEnginePolicy = new iam.Policy(\n            this,\n            Config.app.service +\n            \"-\" +\n            Config.app.environment +\n            \"-iot-core-role-policy\",\n            {\n                document: iotCoreRolePolicy,\n                policyName: \"iotCoreRolePolicy\",\n            }\n        );\n\n        ruleEnginePolicy.attachToRole(roleRuleEngine)\n\n        //Create Topic Rule Destination for Kafka, replace security group, subnet, and VPC values with your own\n        let cfnTopicRuleDestination = new iot.CfnTopicRuleDestination(\n            this,\n            \"MyCfnTopicRuleDestination\",\n            /* all optional props */ {\n                vpcProperties: {\n                    roleArn: roleRuleEngine.roleArn,\n                    securityGroups: [securityGroup],\n                    subnetIds: [subnet_private02a, subnet_private02b],\n                    vpcId: vpcId,\n                },\n            }\n        );\n\n        //CDK Unable to infer the rule destination requires IAM policies. Manually adding dependency\n        cfnTopicRuleDestination.node.addDependency(ruleEnginePolicy)\n\n\n        //Create KMS key for secret encryption\n        keyPolicyJson.Statement[0].Principal.AWS = \"arn:aws:iam::\" + Config.aws.account + \":root\"\n\n        const key = new kms.CfnKey(this, \"Key\", {\n            enabled: true,\n            enableKeyRotation: false,\n            keyPolicy: keyPolicyJson,\n            keySpec: \"SYMMETRIC_DEFAULT\",\n            keyUsage: \"ENCRYPT_DECRYPT\",\n        });\n\n        new kms.CfnAlias(this, \"KeyAlias\", {\n            aliasName: \"alias/\" + Config.app.application + \"-\" + Config.app.environment + \"-msk\", targetKeyId: key.ref\n        });\n\n        //Create AWS Secrets Manager Password for MSK connection\n        const iotSecret = new secretsmanager.CfnSecret(this, \"IoTSecret\", {\n            name:\n                \"AmazonMSK_\" + Config.app.application + \"-\" + Config.app.environment,\n            kmsKeyId: key.ref,\n            generateSecretString: {\n                passwordLength: 20,\n                excludeCharacters: \"]/'\",\n                generateStringKey: \"password\",\n                secretStringTemplate: JSON.stringify({username: \"test-kafka\"}),\n            },\n        });\n\n        // Get rules from ruleKeysJson\n        let testRuleKeys = ruleKeysJson.testRules;\n\n        // Create Rules in IoT Core to send to S3 and MSK\n        testRuleKeys.forEach((key) => {\n            new iot.CfnTopicRule(\n                this, Config.app.service + \"-\" + Config.app.environment + `-topic-rule-${key}`,\n                {\n                    topicRulePayload: {\n                        actions: [\n                            {\n                                kafka: {\n                                    clientProperties: {\n                                        acks: \"1\",\n                                        //Replace placeholder Kafka bootstrap Servers with your own\n                                        \"bootstrap.servers\": mskCluster_bootstrap_brokers,\n                                        \"security.protocol\": \"SASL_SSL\",\n                                        \"sasl.mechanism\": \"SCRAM-SHA-512\",\n                                        \"sasl.scram.username\":\n                                            \"${get_secret('AmazonMSK_iot','SecretString','username',\" +\n                                            `'${roleRuleEngine.roleArn}')}`,\n                                        \"sasl.scram.password\":\n                                            \"${get_secret('AmazonMSK_iot','SecretString','password',\" +\n                                            `'${roleRuleEngine.roleArn}')}`,\n                                    },\n                                    destinationArn: cfnTopicRuleDestination.attrArn,\n                                    topic: `test-msk-topic.${key}`\n                                },\n                            },\n                        ],\n                        sql: `SELECT * FROM 'test-rule/${key}'`,\n                    },\n                    // iot does not allow rule '-' (dash).\n                    ruleName: `test_rule_${key}`,\n                }\n            );\n        });\n    }\n}\n"]} -------------------------------------------------------------------------------- /lib/aws-iot-core-provisioning-infra-stack.js: -------------------------------------------------------------------------------- 1 | "use strict"; 2 | var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { 3 | if (k2 === undefined) k2 = k; 4 | var desc = Object.getOwnPropertyDescriptor(m, k); 5 | if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) { 6 | desc = { enumerable: true, get: function() { return m[k]; } }; 7 | } 8 | Object.defineProperty(o, k2, desc); 9 | }) : (function(o, m, k, k2) { 10 | if (k2 === undefined) k2 = k; 11 | o[k2] = m[k]; 12 | })); 13 | var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { 14 | Object.defineProperty(o, "default", { enumerable: true, value: v }); 15 | }) : function(o, v) { 16 | o["default"] = v; 17 | }); 18 | var __importStar = (this && this.__importStar) || function (mod) { 19 | if (mod && mod.__esModule) return mod; 20 | var result = {}; 21 | if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); 22 | __setModuleDefault(result, mod); 23 | return result; 24 | }; 25 | var __importDefault = (this && this.__importDefault) || function (mod) { 26 | return (mod && mod.__esModule) ? mod : { "default": mod }; 27 | }; 28 | Object.defineProperty(exports, "__esModule", { value: true }); 29 | exports.AwsIotCoreProvisioningInfraStack = void 0; 30 | const aws_cdk_lib_1 = require("aws-cdk-lib"); 31 | const custom_resources_1 = require("aws-cdk-lib/custom-resources"); 32 | const device_policy_json_1 = __importDefault(require("./device/device-policy.json")); 33 | const provisioning_template_json_1 = __importDefault(require("./device/provisioning-template.json")); 34 | const path = __importStar(require("path")); 35 | const config_1 = require("../config/config"); 36 | const device_cc_policy_json_1 = __importDefault(require("./device/device-cc-policy.json")); 37 | class AwsIotCoreProvisioningInfraStack extends aws_cdk_lib_1.Stack { 38 | constructor(scope, id, props) { 39 | super(scope, id, props); 40 | // Modify testDevicePolicyJson according to Configs and create device policy for device policy 41 | device_policy_json_1.default.Statement[1].Resource = [ 42 | `arn:aws:iot:${config_1.Config.aws.region}:${config_1.Config.aws.account}:topic/$aws/rules/*`, 43 | `arn:aws:iot:${config_1.Config.aws.region}:${config_1.Config.aws.account}:topic/` + '${iot:ClientId}' 44 | ]; 45 | device_policy_json_1.default.Statement[2].Resource = [ 46 | `arn:aws:iot:${config_1.Config.aws.region}:${config_1.Config.aws.account}:topicfilter/` + '${iot:ClientId}' 47 | ]; 48 | let testDevicePolicy = new aws_cdk_lib_1.aws_iot.CfnPolicy(this, config_1.Config.app.service + "-" + config_1.Config.app.environment + "device-policy", { 49 | policyDocument: device_policy_json_1.default, 50 | policyName: config_1.Config.app.service + "-" + config_1.Config.app.environment + "-device-policy", 51 | }); 52 | // Create role for pre-provisioning lambda for verification of devices 53 | let rolePreProvisioningLambda = new aws_cdk_lib_1.aws_iam.Role(this, config_1.Config.app.service + "-" + config_1.Config.app.environment + "-pre-provisioning-lambda-role", { 54 | assumedBy: new aws_cdk_lib_1.aws_iam.ServicePrincipal("lambda.amazonaws.com"), 55 | description: "AWS IAM role for pre-provisioning lambda", 56 | roleName: config_1.Config.app.service + "-" + config_1.Config.app.environment + "-pre-provisioning-lambda-role", 57 | }); 58 | // Crate lambda for pre-provisioning hook and add permission for invoke 59 | let lambdaPreProvisioningHook = new aws_cdk_lib_1.aws_lambda.Function(this, config_1.Config.app.service + "-" + config_1.Config.app.environment + 60 | "-pre-provisioning-hook-lambda", { 61 | code: aws_cdk_lib_1.aws_lambda.Code.fromAsset(path.join(__dirname, "device")), 62 | handler: "lambda_function.lambda_handler", 63 | runtime: aws_cdk_lib_1.aws_lambda.Runtime.PYTHON_3_9, 64 | role: rolePreProvisioningLambda, 65 | description: "Lambda for pre-provisioning hook", 66 | functionName: config_1.Config.app.service + "-" + config_1.Config.app.environment + "-pre-provisioning-hook-lambda", 67 | }); 68 | lambdaPreProvisioningHook.addPermission("InvokePermission", { 69 | principal: new aws_cdk_lib_1.aws_iam.ServicePrincipal("iot.amazonaws.com"), 70 | action: "lambda:InvokeFunction", 71 | }); 72 | // Crate role for provisioning templates and add AWSIoTThingsRegistration policy 73 | let roleProvisioning = new aws_cdk_lib_1.aws_iam.Role(this, config_1.Config.app.service + "-" + config_1.Config.app.environment + "-provisioning-template-role", { 74 | assumedBy: new aws_cdk_lib_1.aws_iam.ServicePrincipal("iot.amazonaws.com"), 75 | description: "AWS IAM role for provisioning services", 76 | roleName: config_1.Config.app.service + "-" + config_1.Config.app.environment + "-provisioning-template-role", 77 | }); 78 | roleProvisioning.addManagedPolicy(aws_cdk_lib_1.aws_iam.ManagedPolicy.fromAwsManagedPolicyName("service-role/AWSIoTThingsRegistration")); 79 | // Create provisioning template 80 | provisioning_template_json_1.default.Resources.policy.Properties.PolicyName = testDevicePolicy.policyName; 81 | let testProvisioningTemplate = new aws_cdk_lib_1.aws_iot.CfnProvisioningTemplate(this, config_1.Config.app.service + "-" + config_1.Config.app.environment + "-provision-template", { 82 | provisioningRoleArn: roleProvisioning.roleArn, 83 | templateBody: JSON.stringify(provisioning_template_json_1.default), 84 | enabled: true, 85 | preProvisioningHook: { 86 | "payloadVersion": "2020-04-01", 87 | "targetArn": lambdaPreProvisioningHook.functionArn 88 | }, 89 | description: "AWS IoT Provisioning Template", 90 | templateName: config_1.Config.app.service + "-" + config_1.Config.app.environment + "-provision-template", 91 | }); 92 | // Modify testDeviceClaimCertificatePolicyJson and create vehicle gateway policy for Claim Certificate 93 | let templateTopicCreate = `arn:aws:iot:${config_1.Config.aws.region}:${config_1.Config.aws.account}:topic/$aws/certificates/create/*`; 94 | let templateTopicProvisioning = `arn:aws:iot:${config_1.Config.aws.region}:${config_1.Config.aws.account}:topic/$aws/provisioning-templates/${testProvisioningTemplate.templateName}/provision/*`; 95 | device_cc_policy_json_1.default.Statement[1].Resource = [templateTopicCreate, templateTopicProvisioning]; 96 | let templateTopicFilterCreate = `arn:aws:iot:${config_1.Config.aws.region}:${config_1.Config.aws.account}:topicfilter/$aws/certificates/create/*`; 97 | let templateTopicFilterProvisioning = `arn:aws:iot:${config_1.Config.aws.region}:${config_1.Config.aws.account}:topicfilter/$aws/provisioning-templates/${testProvisioningTemplate.templateName}/provision/*`; 98 | device_cc_policy_json_1.default.Statement[2].Resource = [templateTopicFilterCreate, templateTopicFilterProvisioning]; 99 | let testDeviceClaimCertificatePolicy = new aws_cdk_lib_1.aws_iot.CfnPolicy(this, config_1.Config.app.service + "-" + config_1.Config.app.environment + "-claim-certificate-policy", { 100 | policyDocument: device_cc_policy_json_1.default, 101 | policyName: config_1.Config.app.service + "-" + config_1.Config.app.environment + "-claim-certificate-policy", 102 | }); 103 | // Create claim certificate by using AwsCustomResource 104 | let createKeysAndCertificateForClaimCertificate = new custom_resources_1.AwsCustomResource(this, config_1.Config.app.service + "-" + config_1.Config.app.environment + "-create-keys-and-certificate-for-claim-certificate", { 105 | onUpdate: { 106 | service: "Iot", 107 | action: "createKeysAndCertificate", 108 | parameters: { setAsActive: true }, 109 | physicalResourceId: custom_resources_1.PhysicalResourceId.fromResponse("certificateId"), 110 | outputPaths: ["certificateArn", "certificatePem", "keyPair.PublicKey", "keyPair.PrivateKey"], 111 | }, 112 | policy: custom_resources_1.AwsCustomResourcePolicy.fromSdkCalls({ resources: custom_resources_1.AwsCustomResourcePolicy.ANY_RESOURCE }), 113 | }); 114 | // Attach policy to claim certificate 115 | let PolicyPrincipalAttachmentForClaimCertificate = new aws_cdk_lib_1.aws_iot.CfnPolicyPrincipalAttachment(this, config_1.Config.app.service + "-" + config_1.Config.app.environment + "policy-principal-attachment", { 116 | policyName: testDeviceClaimCertificatePolicy.policyName, 117 | principal: createKeysAndCertificateForClaimCertificate.getResponseField("certificateArn"), 118 | }); 119 | let cdkTestS3Bucket = new aws_cdk_lib_1.aws_s3.Bucket(this, 'cdkTestS3Bucket', { 120 | blockPublicAccess: aws_cdk_lib_1.aws_s3.BlockPublicAccess.BLOCK_ALL, 121 | versioned: true, 122 | removalPolicy: aws_cdk_lib_1.RemovalPolicy.RETAIN_ON_UPDATE_OR_DELETE, 123 | // autoDeleteObjects: true, 124 | bucketName: config_1.Config.s3BucketName 125 | }); 126 | // Save the vehicle-gateway certificates and keys to S3 127 | let keyDeploymentForDeviceClaimCertificate = new aws_cdk_lib_1.aws_s3_deployment.BucketDeployment(this, config_1.Config.app.service + "-" + config_1.Config.app.environment + "put-key-to-s3", { 128 | destinationBucket: cdkTestS3Bucket, 129 | sources: [ 130 | aws_cdk_lib_1.aws_s3_deployment.Source.data("claim-certificate/claim.pem", createKeysAndCertificateForClaimCertificate.getResponseField("certificatePem")), 131 | aws_cdk_lib_1.aws_s3_deployment.Source.data("claim-certificate/claim.public.key", createKeysAndCertificateForClaimCertificate.getResponseField("keyPair.PublicKey")), 132 | aws_cdk_lib_1.aws_s3_deployment.Source.data("claim-certificate/claim.private.key", createKeysAndCertificateForClaimCertificate.getResponseField("keyPair.PrivateKey")), 133 | ], 134 | }); 135 | } 136 | } 137 | exports.AwsIotCoreProvisioningInfraStack = AwsIotCoreProvisioningInfraStack; 138 | //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"aws-iot-core-provisioning-infra-stack.js","sourceRoot":"","sources":["aws-iot-core-provisioning-infra-stack.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,6CASqB;AACrB,mEAIsC;AAEtC,qFAA+D;AAC/D,qGAA+E;AAC/E,2CAA6B;AAC7B,6CAA0C;AAC1C,2FAAkF;AAElF,MAAa,gCAAiC,SAAQ,mBAAK;IACvD,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAkB;QACxD,KAAK,CAAC,KAAK,EAAE,EAAE,EAAE,KAAK,CAAC,CAAC;QAExB,8FAA8F;QAC9F,4BAAoB,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,QAAQ,GAAG;YACzC,eAAe,eAAM,CAAC,GAAG,CAAC,MAAM,IAAI,eAAM,CAAC,GAAG,CAAC,OAAO,qBAAqB;YAC3E,eAAe,eAAM,CAAC,GAAG,CAAC,MAAM,IAAI,eAAM,CAAC,GAAG,CAAC,OAAO,SAAS,GAAG,iBAAiB;SACtF,CAAA;QACD,4BAAoB,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,QAAQ,GAAG;YACzC,eAAe,eAAM,CAAC,GAAG,CAAC,MAAM,IAAI,eAAM,CAAC,GAAG,CAAC,OAAO,eAAe,GAAG,iBAAiB;SAC5F,CAAA;QAED,IAAI,gBAAgB,GAAG,IAAI,qBAAG,CAAC,SAAS,CACpC,IAAI,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,eAAe,EACzE;YACI,cAAc,EAAE,4BAAoB;YACpC,UAAU,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,gBAAgB;SACnF,CACJ,CAAC;QAGF,sEAAsE;QACtE,IAAI,yBAAyB,GAAG,IAAI,qBAAG,CAAC,IAAI,CACxC,IAAI,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,+BAA+B,EACzF;YACI,SAAS,EAAE,IAAI,qBAAG,CAAC,gBAAgB,CAAC,sBAAsB,CAAC;YAC3D,WAAW,EAAE,0CAA0C;YACvD,QAAQ,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,+BAA+B;SAChG,CACJ,CAAC;QAGF,uEAAuE;QACvE,IAAI,yBAAyB,GAAG,IAAI,wBAAM,CAAC,QAAQ,CAC/C,IAAI,EACJ,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW;YACjD,+BAA+B,EAC/B;YACI,IAAI,EAAE,wBAAM,CAAC,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,QAAQ,CAAC,CAAC;YAC3D,OAAO,EAAE,gCAAgC;YACzC,OAAO,EAAE,wBAAM,CAAC,OAAO,CAAC,UAAU;YAClC,IAAI,EAAE,yBAAyB;YAC/B,WAAW,EAAE,kCAAkC;YAC/C,YAAY,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,+BAA+B;SACpG,CACJ,CAAC;QAEF,yBAAyB,CAAC,aAAa,CAAC,kBAAkB,EAAE;YACxD,SAAS,EAAE,IAAI,qBAAG,CAAC,gBAAgB,CAAC,mBAAmB,CAAC;YACxD,MAAM,EAAE,uBAAuB;SAClC,CAAC,CAAC;QAGH,gFAAgF;QAChF,IAAI,gBAAgB,GAAG,IAAI,qBAAG,CAAC,IAAI,CAC/B,IAAI,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,6BAA6B,EACvF;YACI,SAAS,EAAE,IAAI,qBAAG,CAAC,gBAAgB,CAAC,mBAAmB,CAAC;YACxD,WAAW,EAAE,wCAAwC;YACrD,QAAQ,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,6BAA6B;SAC9F,CACJ,CAAC;QAEF,gBAAgB,CAAC,gBAAgB,CAC7B,qBAAG,CAAC,aAAa,CAAC,wBAAwB,CACtC,uCAAuC,CAC1C,CACJ,CAAC;QAEF,+BAA+B;QAC/B,oCAA4B,CAAC,SAAS,CAAC,MAAM,CAAC,UAAU,CAAC,UAAU,GAAG,gBAAgB,CAAC,UAAW,CAAA;QAElG,IAAI,wBAAwB,GAAG,IAAI,qBAAG,CAAC,uBAAuB,CAC1D,IAAI,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,qBAAqB,EAC/E;YACI,mBAAmB,EAAE,gBAAgB,CAAC,OAAO;YAC7C,YAAY,EAAE,IAAI,CAAC,SAAS,CAAC,oCAA4B,CAAC;YAC1D,OAAO,EAAE,IAAI;YACb,mBAAmB,EAAE;gBACjB,gBAAgB,EAAE,YAAY;gBAC9B,WAAW,EAAE,yBAAyB,CAAC,WAAW;aACrD;YACD,WAAW,EAAE,+BAA+B;YAC5C,YAAY,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,qBAAqB;SAC1F,CACJ,CAAC;QAEF,sGAAsG;QACtG,IAAI,mBAAmB,GAAG,eAAe,eAAM,CAAC,GAAG,CAAC,MAAM,IAAI,eAAM,CAAC,GAAG,CAAC,OAAO,mCAAmC,CAAA;QACnH,IAAI,yBAAyB,GAAG,eAAe,eAAM,CAAC,GAAG,CAAC,MAAM,IAAI,eAAM,CAAC,GAAG,CAAC,OAAO,sCAAsC,wBAAwB,CAAC,YAAY,cAAc,CAAA;QAC/K,+BAAoC,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,QAAQ,GAAG,CAAC,mBAAmB,EAAE,yBAAyB,CAAC,CAAA;QAE7G,IAAI,yBAAyB,GAAG,eAAe,eAAM,CAAC,GAAG,CAAC,MAAM,IAAI,eAAM,CAAC,GAAG,CAAC,OAAO,yCAAyC,CAAA;QAC/H,IAAI,+BAA+B,GAAG,eAAe,eAAM,CAAC,GAAG,CAAC,MAAM,IAAI,eAAM,CAAC,GAAG,CAAC,OAAO,4CAA4C,wBAAwB,CAAC,YAAY,cAAc,CAAA;QAC3L,+BAAoC,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,QAAQ,GAAG,CAAC,yBAAyB,EAAE,+BAA+B,CAAC,CAAA;QAEzH,IAAI,gCAAgC,GAAG,IAAI,qBAAG,CAAC,SAAS,CACpD,IAAI,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,2BAA2B,EACrF;YACI,cAAc,EAAE,+BAAoC;YACpD,UAAU,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,2BAA2B;SAC9F,CACJ,CAAC;QAEF,sDAAsD;QACtD,IAAI,2CAA2C,GAAG,IAAI,oCAAiB,CACnE,IAAI,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,oDAAoD,EAC9G;YACI,QAAQ,EAAE;gBACN,OAAO,EAAE,KAAK;gBACd,MAAM,EAAE,0BAA0B;gBAClC,UAAU,EAAE,EAAC,WAAW,EAAE,IAAI,EAAC;gBAC/B,kBAAkB,EAAE,qCAAkB,CAAC,YAAY,CAAC,eAAe,CAAC;gBACpE,WAAW,EAAE,CAAC,gBAAgB,EAAE,gBAAgB,EAAE,mBAAmB,EAAE,oBAAoB,CAAC;aAC/F;YACD,MAAM,EAAE,0CAAuB,CAAC,YAAY,CAAC,EAAC,SAAS,EAAE,0CAAuB,CAAC,YAAY,EAAC,CAAC;SAClG,CACJ,CAAC;QAGF,qCAAqC;QACrC,IAAI,4CAA4C,GAC5C,IAAI,qBAAG,CAAC,4BAA4B,CAChC,IAAI,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,6BAA6B,EAAE;YACrF,UAAU,EAAE,gCAAgC,CAAC,UAAW;YACxD,SAAS,EAAE,2CAA2C,CAAC,gBAAgB,CAAC,gBAAgB,CAAC;SAC5F,CACJ,CAAC;QAEN,IAAI,eAAe,GAAG,IAAI,oBAAE,CAAC,MAAM,CAAC,IAAI,EAAE,iBAAiB,EAAE;YACzD,iBAAiB,EAAE,oBAAE,CAAC,iBAAiB,CAAC,SAAS;YACjD,SAAS,EAAE,IAAI;YACf,aAAa,EAAE,2BAAa,CAAC,0BAA0B;YACvD,2BAA2B;YAC3B,UAAU,EAAE,eAAM,CAAC,YAAY;SAClC,CAAC,CAAC;QAEH,uDAAuD;QACvD,IAAI,sCAAsC,GAAG,IAAI,+BAAiB,CAAC,gBAAgB,CAC/E,IAAI,EAAE,eAAM,CAAC,GAAG,CAAC,OAAO,GAAG,GAAG,GAAG,eAAM,CAAC,GAAG,CAAC,WAAW,GAAG,eAAe,EACzE;YACI,iBAAiB,EAAE,eAAe;YAClC,OAAO,EAAE;gBACL,+BAAiB,CAAC,MAAM,CAAC,IAAI,CACzB,6BAA6B,EAC7B,2CAA2C,CAAC,gBAAgB,CACxD,gBAAgB,CACnB,CACJ;gBACD,+BAAiB,CAAC,MAAM,CAAC,IAAI,CACzB,oCAAoC,EACpC,2CAA2C,CAAC,gBAAgB,CACxD,mBAAmB,CACtB,CACJ;gBACD,+BAAiB,CAAC,MAAM,CAAC,IAAI,CACzB,qCAAqC,EACrC,2CAA2C,CAAC,gBAAgB,CACxD,oBAAoB,CACvB,CACJ;aACJ;SACJ,CACJ,CAAC;IACN,CAAC;CACJ;AAtKD,4EAsKC","sourcesContent":["import {\n    Stack,\n    StackProps,\n    RemovalPolicy,\n    aws_s3_deployment,\n    aws_lambda as lambda,\n    aws_iot as iot,\n    aws_iam as iam,\n    aws_s3 as s3\n} from \"aws-cdk-lib\";\nimport {\n    AwsCustomResource,\n    AwsCustomResourcePolicy,\n    PhysicalResourceId,\n} from \"aws-cdk-lib/custom-resources\";\nimport { Construct } from \"constructs\";\nimport testDevicePolicyJson from \"./device/device-policy.json\";\nimport testProvisioningTemplateJson from \"./device/provisioning-template.json\";\nimport * as path from \"path\";\nimport { Config } from \"../config/config\";\nimport testDeviceClaimCertificatePolicyJson from \"./device/device-cc-policy.json\";\n\nexport class AwsIotCoreProvisioningInfraStack extends Stack {\n    constructor(scope: Construct, id: string, props?: StackProps) {\n        super(scope, id, props);\n\n        // Modify testDevicePolicyJson according to Configs and create device policy for device policy\n        testDevicePolicyJson.Statement[1].Resource = [\n            `arn:aws:iot:${Config.aws.region}:${Config.aws.account}:topic/$aws/rules/*`,\n            `arn:aws:iot:${Config.aws.region}:${Config.aws.account}:topic/` + '${iot:ClientId}'\n        ]\n        testDevicePolicyJson.Statement[2].Resource = [\n            `arn:aws:iot:${Config.aws.region}:${Config.aws.account}:topicfilter/` + '${iot:ClientId}'\n        ]\n\n        let testDevicePolicy = new iot.CfnPolicy(\n            this, Config.app.service + \"-\" + Config.app.environment + \"device-policy\",\n            {\n                policyDocument: testDevicePolicyJson,\n                policyName: Config.app.service + \"-\" + Config.app.environment + \"-device-policy\",\n            }\n        );\n\n\n        // Create role for pre-provisioning lambda for verification of devices\n        let rolePreProvisioningLambda = new iam.Role(\n            this, Config.app.service + \"-\" + Config.app.environment + \"-pre-provisioning-lambda-role\",\n            {\n                assumedBy: new iam.ServicePrincipal(\"lambda.amazonaws.com\"),\n                description: \"AWS IAM role for pre-provisioning lambda\",\n                roleName: Config.app.service + \"-\" + Config.app.environment + \"-pre-provisioning-lambda-role\",\n            }\n        );\n\n\n        // Crate lambda for pre-provisioning hook and add permission for invoke\n        let lambdaPreProvisioningHook = new lambda.Function(\n            this,\n            Config.app.service + \"-\" + Config.app.environment +\n            \"-pre-provisioning-hook-lambda\",\n            {\n                code: lambda.Code.fromAsset(path.join(__dirname, \"device\")),\n                handler: \"lambda_function.lambda_handler\",\n                runtime: lambda.Runtime.PYTHON_3_9,\n                role: rolePreProvisioningLambda,\n                description: \"Lambda for pre-provisioning hook\",\n                functionName: Config.app.service + \"-\" + Config.app.environment + \"-pre-provisioning-hook-lambda\",\n            }\n        );\n\n        lambdaPreProvisioningHook.addPermission(\"InvokePermission\", {\n            principal: new iam.ServicePrincipal(\"iot.amazonaws.com\"),\n            action: \"lambda:InvokeFunction\",\n        });\n\n\n        // Crate role for provisioning templates and add AWSIoTThingsRegistration policy\n        let roleProvisioning = new iam.Role(\n            this, Config.app.service + \"-\" + Config.app.environment + \"-provisioning-template-role\",\n            {\n                assumedBy: new iam.ServicePrincipal(\"iot.amazonaws.com\"),\n                description: \"AWS IAM role for provisioning services\",\n                roleName: Config.app.service + \"-\" + Config.app.environment + \"-provisioning-template-role\",\n            }\n        );\n\n        roleProvisioning.addManagedPolicy(\n            iam.ManagedPolicy.fromAwsManagedPolicyName(\n                \"service-role/AWSIoTThingsRegistration\"\n            )\n        );\n\n        // Create provisioning template\n        testProvisioningTemplateJson.Resources.policy.Properties.PolicyName = testDevicePolicy.policyName!\n\n        let testProvisioningTemplate = new iot.CfnProvisioningTemplate(\n            this, Config.app.service + \"-\" + Config.app.environment + \"-provision-template\",\n            {\n                provisioningRoleArn: roleProvisioning.roleArn,\n                templateBody: JSON.stringify(testProvisioningTemplateJson),\n                enabled: true,\n                preProvisioningHook: {\n                    \"payloadVersion\": \"2020-04-01\",\n                    \"targetArn\": lambdaPreProvisioningHook.functionArn\n                },\n                description: \"AWS IoT Provisioning Template\",\n                templateName: Config.app.service + \"-\" + Config.app.environment + \"-provision-template\",\n            }\n        );\n\n        // Modify testDeviceClaimCertificatePolicyJson and create vehicle gateway policy for Claim Certificate\n        let templateTopicCreate = `arn:aws:iot:${Config.aws.region}:${Config.aws.account}:topic/$aws/certificates/create/*`\n        let templateTopicProvisioning = `arn:aws:iot:${Config.aws.region}:${Config.aws.account}:topic/$aws/provisioning-templates/${testProvisioningTemplate.templateName}/provision/*`\n        testDeviceClaimCertificatePolicyJson.Statement[1].Resource = [templateTopicCreate, templateTopicProvisioning]\n\n        let templateTopicFilterCreate = `arn:aws:iot:${Config.aws.region}:${Config.aws.account}:topicfilter/$aws/certificates/create/*`\n        let templateTopicFilterProvisioning = `arn:aws:iot:${Config.aws.region}:${Config.aws.account}:topicfilter/$aws/provisioning-templates/${testProvisioningTemplate.templateName}/provision/*`\n        testDeviceClaimCertificatePolicyJson.Statement[2].Resource = [templateTopicFilterCreate, templateTopicFilterProvisioning]\n\n        let testDeviceClaimCertificatePolicy = new iot.CfnPolicy(\n            this, Config.app.service + \"-\" + Config.app.environment + \"-claim-certificate-policy\",\n            {\n                policyDocument: testDeviceClaimCertificatePolicyJson,\n                policyName: Config.app.service + \"-\" + Config.app.environment + \"-claim-certificate-policy\",\n            }\n        );\n\n        // Create claim certificate by using AwsCustomResource\n        let createKeysAndCertificateForClaimCertificate = new AwsCustomResource(\n            this, Config.app.service + \"-\" + Config.app.environment + \"-create-keys-and-certificate-for-claim-certificate\",\n            {\n                onUpdate: {\n                    service: \"Iot\",\n                    action: \"createKeysAndCertificate\",\n                    parameters: {setAsActive: true},\n                    physicalResourceId: PhysicalResourceId.fromResponse(\"certificateId\"),\n                    outputPaths: [\"certificateArn\", \"certificatePem\", \"keyPair.PublicKey\", \"keyPair.PrivateKey\"],\n                },\n                policy: AwsCustomResourcePolicy.fromSdkCalls({resources: AwsCustomResourcePolicy.ANY_RESOURCE}),\n            }\n        );\n\n\n        // Attach policy to claim certificate\n        let PolicyPrincipalAttachmentForClaimCertificate =\n            new iot.CfnPolicyPrincipalAttachment(\n                this, Config.app.service + \"-\" + Config.app.environment + \"policy-principal-attachment\", {\n                    policyName: testDeviceClaimCertificatePolicy.policyName!,\n                    principal: createKeysAndCertificateForClaimCertificate.getResponseField(\"certificateArn\"),\n                }\n            );\n\n        let cdkTestS3Bucket = new s3.Bucket(this, 'cdkTestS3Bucket', {\n            blockPublicAccess: s3.BlockPublicAccess.BLOCK_ALL,\n            versioned: true,\n            removalPolicy: RemovalPolicy.RETAIN_ON_UPDATE_OR_DELETE,\n            // autoDeleteObjects: true,\n            bucketName: Config.s3BucketName\n        });\n\n        // Save the vehicle-gateway certificates and keys to S3\n        let keyDeploymentForDeviceClaimCertificate = new aws_s3_deployment.BucketDeployment(\n            this, Config.app.service + \"-\" + Config.app.environment + \"put-key-to-s3\",\n            {\n                destinationBucket: cdkTestS3Bucket,\n                sources: [\n                    aws_s3_deployment.Source.data(\n                        \"claim-certificate/claim.pem\",\n                        createKeysAndCertificateForClaimCertificate.getResponseField(\n                            \"certificatePem\"\n                        )\n                    ),\n                    aws_s3_deployment.Source.data(\n                        \"claim-certificate/claim.public.key\",\n                        createKeysAndCertificateForClaimCertificate.getResponseField(\n                            \"keyPair.PublicKey\"\n                        )\n                    ),\n                    aws_s3_deployment.Source.data(\n                        \"claim-certificate/claim.private.key\",\n                        createKeysAndCertificateForClaimCertificate.getResponseField(\n                            \"keyPair.PrivateKey\"\n                        )\n                    ),\n                ],\n            }\n        );\n    }\n}\n"]} --------------------------------------------------------------------------------