Skip to content

Commit

Permalink
Merge pull request #1115 from aligent/chore/fixing-merge-conflicts
Browse files Browse the repository at this point in the history
Chore/fixing merge conflicts
  • Loading branch information
TheOrangePuff authored Oct 17, 2023
2 parents cec245a + 8deb1ba commit 0183256
Showing 1 changed file with 14 additions and 9 deletions.
23 changes: 14 additions & 9 deletions packages/static-hosting/lib/static-hosting.ts
Original file line number Diff line number Diff line change
Expand Up @@ -21,6 +21,7 @@ import {
IResponseHeadersPolicy,
LambdaEdgeEventType,
OriginAccessIdentity,
IDistribution,
} from "aws-cdk-lib/aws-cloudfront";
import { HttpOrigin, S3Origin } from "aws-cdk-lib/aws-cloudfront-origins";
import {
Expand All @@ -37,6 +38,7 @@ import {
Bucket,
BucketEncryption,
BucketProps,
IBucket,
} from "aws-cdk-lib/aws-s3";
import { CSP } from "../types/csp";
import { PathRemapFunction } from "./path-remap";
Expand Down Expand Up @@ -119,6 +121,9 @@ export interface ResponseHeaderMappings {
type Writeable<T> = { -readonly [P in keyof T]: T[P] };

export class StaticHosting extends Construct {
public readonly distribution: IDistribution;
public readonly bucket: IBucket;

private staticFiles = [
"js",
"css",
Expand Down Expand Up @@ -172,7 +177,7 @@ export class StaticHosting extends Construct {
});
}

const bucket = new Bucket(this, "ContentBucket", {
this.bucket = new Bucket(this, "ContentBucket", {
bucketName: siteName,
encryption: BucketEncryption.S3_MANAGED,
blockPublicAccess: BlockPublicAccess.BLOCK_ALL,
Expand All @@ -185,11 +190,11 @@ export class StaticHosting extends Construct {
comment: "Allow CloudFront to access S3",
});

bucket.grantRead(oai);
this.bucket.grantRead(oai);

new CfnOutput(this, "Bucket", {
description: "BucketName",
value: bucket.bucketName,
value: this.bucket.bucketName,
exportName: `${exportPrefix}BucketName`,
});

Expand All @@ -212,7 +217,7 @@ export class StaticHosting extends Construct {
: undefined;

if (publisherGroup) {
bucket.grantReadWrite(publisherGroup);
this.bucket.grantReadWrite(publisherGroup);

new CfnOutput(this, "PublisherGroupName", {
description: "PublisherGroup",
Expand Down Expand Up @@ -245,7 +250,7 @@ export class StaticHosting extends Construct {
});
}

const s3Origin = new S3Origin(bucket, {
const s3Origin = new S3Origin(this.bucket, {
originAccessIdentity: oai,
});
let backendOrigin = undefined;
Expand Down Expand Up @@ -394,7 +399,7 @@ export class StaticHosting extends Construct {
"cloudfront:ListInvalidations",
],
resources: [
`arn:aws:cloudfront::*:distribution/${distribution.distributionId}`,
`arn:aws:cloudfront::*:distribution/${this.distribution.distributionId}`,
],
});

Expand All @@ -409,12 +414,12 @@ export class StaticHosting extends Construct {
}
new CfnOutput(this, "DistributionId", {
description: "DistributionId",
value: distribution.distributionId,
value: this.distribution.distributionId,
exportName: `${exportPrefix}DistributionID`,
});
new CfnOutput(this, "DistributionDomainName", {
description: "DistributionDomainName",
value: distribution.distributionDomainName,
value: this.distribution.distributionDomainName,
exportName: `${exportPrefix}DistributionName`,
});

Expand All @@ -425,7 +430,7 @@ export class StaticHosting extends Construct {

new ARecord(this, "SiteAliasRecord", {
recordName: siteName,
target: RecordTarget.fromAlias(new CloudFrontTarget(distribution)),
target: RecordTarget.fromAlias(new CloudFrontTarget(this.distribution)),
zone: zone,
});
}
Expand Down

0 comments on commit 0183256

Please sign in to comment.