feat(bootstrap): custom template generator with compute-variant policies#162
Open
scottschreckengaust wants to merge 4 commits into
Open
feat(bootstrap): custom template generator with compute-variant policies#162scottschreckengaust wants to merge 4 commits into
scottschreckengaust wants to merge 4 commits into
Conversation
…v1.1.0 Move bedrock-agentcore:* from observability policy into dedicated compute-agentcore policy. Add compute-ecs policy from DEPLOYMENT_ROLES.md. This enables per-compute-variant bootstrap configuration. Closes: part of #123 Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
…upport Generates a custom CDK bootstrap template that replaces AdministratorAccess with inline least-privilege policies. Supports per-compute-variant selection via ComputeTypes parameter. Adds PolicyVersion/Hash/Set CF outputs. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
…p command mise //cdk:bootstrap now uses the custom least-privilege template. mise //cdk:bootstrap:generate regenerates all artifacts (policies JSON, template YAML, version/hash files) from source. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
CI yarn install deduplicates transitive deps (yaml, uuid) which mutates the lockfile if it wasn't committed in deduplicated form. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
12 tasks
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Closes #123
Generates a custom CDK bootstrap CloudFormation template that replaces
AdministratorAccesswith inline least-privilege policies. Introduces per-compute-variant policy selection viaComputeTypesparameter.Stack position
PR 4 for #120 — least-privilege CDK bootstrap policies as code
Prior: Policies as typed TypeScript (#158, merged)
This PR: Custom template + compute variants + mise tasks
Next: Resource-action-map for synth-time validation (#124)
What changed
New policies (extracted/added)
compute-agentcore.ts—bedrock-agentcore:*extracted from observability (was conflating compute-runtime with observability concerns)compute-ecs.ts— ECS Fargate permissions from DEPLOYMENT_ROLES.md (previously deferred)1.1.0(policy set changed)Template generator (
cdk/scripts/generate-bootstrap-template.ts)ComputeTypesparameter (default:agentcore) — operator-controlled ceilingcompute-ecsis CF-conditional (IncludeComputeEcs)BootstrapPolicyVersion,BootstrapPolicyHash,BootstrapPolicySetBootstrapVariantto 'ABCA: Least-Privilege Bootstrap'Mise tasks
mise //cdk:bootstrap— now uses custom templatemise //cdk:bootstrap:generate— regenerates all artifacts from sourceArchitecture: sufficiency model
Bootstrap is account-level (one CDKToolkit per account/region). Multiple stacks share it.
deployed PolicySet ⊇ app's required setTest plan
tsc --noEmitcompiles cleanlyReferences: RFC #120, ADR-002 (#133)
🤖 Generated with Claude Code