firebase-tools
Version:
Command-Line Interface for Firebase
113 lines (112 loc) • 5.41 kB
JavaScript
Object.defineProperty(exports, "__esModule", { value: true });
exports.printManualIamConfig = exports.mergeBindings = exports.testIamPermissions = exports.testResourceIamPermissions = exports.getRole = exports.listServiceAccountKeys = exports.deleteServiceAccount = exports.createServiceAccountKey = exports.getServiceAccount = exports.createServiceAccount = exports.getDefaultCloudBuildServiceAgent = void 0;
const api_1 = require("../api");
const logger_1 = require("../logger");
const apiv2_1 = require("../apiv2");
const utils = require("../utils");
const apiClient = new apiv2_1.Client({ urlPrefix: (0, api_1.iamOrigin)(), apiVersion: "v1" });
function getDefaultCloudBuildServiceAgent(projectNumber) {
return `${projectNumber}@cloudbuild.gserviceaccount.com`;
}
exports.getDefaultCloudBuildServiceAgent = getDefaultCloudBuildServiceAgent;
async function createServiceAccount(projectId, accountId, description, displayName) {
const response = await apiClient.post(`/projects/${projectId}/serviceAccounts`, {
accountId,
serviceAccount: {
displayName,
description,
},
}, { skipLog: { resBody: true } });
return response.body;
}
exports.createServiceAccount = createServiceAccount;
async function getServiceAccount(projectId, serviceAccountName) {
const response = await apiClient.get(`/projects/${projectId}/serviceAccounts/${serviceAccountName}@${projectId}.iam.gserviceaccount.com`);
return response.body;
}
exports.getServiceAccount = getServiceAccount;
async function createServiceAccountKey(projectId, serviceAccountName) {
const response = await apiClient.post(`/projects/${projectId}/serviceAccounts/${serviceAccountName}@${projectId}.iam.gserviceaccount.com/keys`, {
keyAlgorithm: "KEY_ALG_UNSPECIFIED",
privateKeyType: "TYPE_GOOGLE_CREDENTIALS_FILE",
});
return response.body;
}
exports.createServiceAccountKey = createServiceAccountKey;
async function deleteServiceAccount(projectId, accountEmail) {
await apiClient.delete(`/projects/${projectId}/serviceAccounts/${accountEmail}`, {
resolveOnHTTPError: true,
});
}
exports.deleteServiceAccount = deleteServiceAccount;
async function listServiceAccountKeys(projectId, serviceAccountName) {
const response = await apiClient.get(`/projects/${projectId}/serviceAccounts/${serviceAccountName}@${projectId}.iam.gserviceaccount.com/keys`);
return response.body.keys;
}
exports.listServiceAccountKeys = listServiceAccountKeys;
async function getRole(role) {
const response = await apiClient.get(`/roles/${role}`, {
retryCodes: [500, 503],
});
return response.body;
}
exports.getRole = getRole;
async function testResourceIamPermissions(origin, apiVersion, resourceName, permissions, quotaUser = "") {
const localClient = new apiv2_1.Client({ urlPrefix: origin, apiVersion });
if (process.env.FIREBASE_SKIP_INFORMATIONAL_IAM) {
logger_1.logger.debug(`[iam] skipping informational check of permissions ${JSON.stringify(permissions)} on resource ${resourceName}`);
return { allowed: Array.from(permissions).sort(), missing: [], passed: true };
}
const headers = {};
if (quotaUser) {
headers["x-goog-quota-user"] = quotaUser;
}
const response = await localClient.post(`/${resourceName}:testIamPermissions`, { permissions }, { headers });
const allowed = new Set(response.body.permissions || []);
const missing = new Set(permissions);
for (const p of allowed) {
missing.delete(p);
}
return {
allowed: Array.from(allowed).sort(),
missing: Array.from(missing).sort(),
passed: missing.size === 0,
};
}
exports.testResourceIamPermissions = testResourceIamPermissions;
async function testIamPermissions(projectId, permissions) {
return testResourceIamPermissions((0, api_1.resourceManagerOrigin)(), "v1", `projects/${projectId}`, permissions, `projects/${projectId}`);
}
exports.testIamPermissions = testIamPermissions;
function mergeBindings(policy, requiredBindings) {
let updated = false;
for (const requiredBinding of requiredBindings) {
const match = policy.bindings.find((b) => b.role === requiredBinding.role);
if (!match) {
updated = true;
policy.bindings.push(requiredBinding);
continue;
}
for (const requiredMember of requiredBinding.members) {
if (!match.members.find((m) => m === requiredMember)) {
updated = true;
match.members.push(requiredMember);
}
}
}
return updated;
}
exports.mergeBindings = mergeBindings;
function printManualIamConfig(requiredBindings, projectId, prefix) {
utils.logLabeledBullet(prefix, "Failed to verify the project has the correct IAM bindings for a successful deployment.", "warn");
utils.logLabeledBullet(prefix, "You can either re-run this command as a project owner or manually run the following set of `gcloud` commands:", "warn");
for (const binding of requiredBindings) {
for (const member of binding.members) {
utils.logLabeledBullet(prefix, `\`gcloud projects add-iam-policy-binding ${projectId} ` +
`--member=${member} ` +
`--role=${binding.role}\``, "warn");
}
}
}
exports.printManualIamConfig = printManualIamConfig;
;