@friggframework/devtools 2.0.0--canary.400.bed3308.0 → 2.0.0--canary.404.e9d4980.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/frigg-cli/build-command/index.js +3 -18
- package/frigg-cli/deploy-command/index.js +3 -19
- package/frigg-cli/index.js +1 -73
- package/frigg-cli/install-command/index.js +2 -15
- package/frigg-cli/start-command/index.js +2 -17
- package/infrastructure/create-frigg-infrastructure.js +2 -2
- package/infrastructure/serverless-template.js +79 -529
- package/package.json +5 -9
- package/frigg-cli/.eslintrc.js +0 -141
- package/frigg-cli/__tests__/jest.config.js +0 -102
- package/frigg-cli/__tests__/unit/commands/build.test.js +0 -483
- package/frigg-cli/__tests__/unit/commands/install.test.js +0 -418
- package/frigg-cli/__tests__/unit/commands/ui.test.js +0 -592
- package/frigg-cli/__tests__/utils/command-tester.js +0 -170
- package/frigg-cli/__tests__/utils/mock-factory.js +0 -270
- package/frigg-cli/__tests__/utils/test-fixtures.js +0 -463
- package/frigg-cli/__tests__/utils/test-setup.js +0 -286
- package/frigg-cli/generate-command/__tests__/generate-command.test.js +0 -312
- package/frigg-cli/generate-command/azure-generator.js +0 -43
- package/frigg-cli/generate-command/gcp-generator.js +0 -47
- package/frigg-cli/generate-command/index.js +0 -350
- package/frigg-cli/generate-command/terraform-generator.js +0 -555
- package/frigg-cli/generate-iam-command.js +0 -115
- package/frigg-cli/package.json +0 -75
- package/frigg-cli/ui-command/index.js +0 -167
- package/frigg-cli/utils/app-resolver.js +0 -319
- package/frigg-cli/utils/backend-path.js +0 -38
- package/frigg-cli/utils/process-manager.js +0 -199
- package/frigg-cli/utils/repo-detection.js +0 -405
- package/infrastructure/AWS-DISCOVERY-TROUBLESHOOTING.md +0 -245
- package/infrastructure/AWS-IAM-CREDENTIAL-NEEDS.md +0 -620
- package/infrastructure/DEPLOYMENT-INSTRUCTIONS.md +0 -268
- package/infrastructure/GENERATE-IAM-DOCS.md +0 -253
- package/infrastructure/IAM-POLICY-TEMPLATES.md +0 -176
- package/infrastructure/README-TESTING.md +0 -332
- package/infrastructure/README.md +0 -421
- package/infrastructure/WEBSOCKET-CONFIGURATION.md +0 -105
- package/infrastructure/__tests__/fixtures/mock-aws-resources.js +0 -391
- package/infrastructure/__tests__/helpers/test-utils.js +0 -277
- package/infrastructure/aws-discovery.js +0 -568
- package/infrastructure/aws-discovery.test.js +0 -373
- package/infrastructure/build-time-discovery.js +0 -206
- package/infrastructure/build-time-discovery.test.js +0 -375
- package/infrastructure/frigg-deployment-iam-stack.yaml +0 -393
- package/infrastructure/iam-generator.js +0 -810
- package/infrastructure/iam-generator.test.js +0 -169
- package/infrastructure/iam-policy-basic.json +0 -236
- package/infrastructure/iam-policy-full.json +0 -305
- package/infrastructure/integration.test.js +0 -383
- package/infrastructure/run-discovery.js +0 -110
- package/infrastructure/serverless-template.test.js +0 -553
- package/management-ui/.eslintrc.js +0 -22
- package/management-ui/README.md +0 -203
- package/management-ui/components.json +0 -21
- package/management-ui/index.html +0 -13
- package/management-ui/merge-conflict-cleaner.py +0 -371
- package/management-ui/package-lock.json +0 -10997
- package/management-ui/package.json +0 -76
- package/management-ui/postcss.config.js +0 -6
- package/management-ui/server/api/backend.js +0 -256
- package/management-ui/server/api/cli.js +0 -315
- package/management-ui/server/api/codegen.js +0 -663
- package/management-ui/server/api/connections.js +0 -857
- package/management-ui/server/api/discovery.js +0 -185
- package/management-ui/server/api/environment/index.js +0 -1
- package/management-ui/server/api/environment/router.js +0 -378
- package/management-ui/server/api/environment.js +0 -328
- package/management-ui/server/api/integrations.js +0 -479
- package/management-ui/server/api/logs.js +0 -248
- package/management-ui/server/api/monitoring.js +0 -282
- package/management-ui/server/api/open-ide.js +0 -31
- package/management-ui/server/api/project.js +0 -553
- package/management-ui/server/api/users/sessions.js +0 -371
- package/management-ui/server/api/users/simulation.js +0 -254
- package/management-ui/server/api/users.js +0 -362
- package/management-ui/server/api-contract.md +0 -275
- package/management-ui/server/index.js +0 -428
- package/management-ui/server/middleware/errorHandler.js +0 -70
- package/management-ui/server/middleware/security.js +0 -32
- package/management-ui/server/processManager.js +0 -296
- package/management-ui/server/server.js +0 -188
- package/management-ui/server/services/aws-monitor.js +0 -413
- package/management-ui/server/services/npm-registry.js +0 -347
- package/management-ui/server/services/template-engine.js +0 -538
- package/management-ui/server/utils/cliIntegration.js +0 -220
- package/management-ui/server/utils/environment/auditLogger.js +0 -471
- package/management-ui/server/utils/environment/awsParameterStore.js +0 -264
- package/management-ui/server/utils/environment/encryption.js +0 -278
- package/management-ui/server/utils/environment/envFileManager.js +0 -286
- package/management-ui/server/utils/import-commonjs.js +0 -28
- package/management-ui/server/utils/response.js +0 -83
- package/management-ui/server/websocket/handler.js +0 -325
- package/management-ui/src/App.jsx +0 -51
- package/management-ui/src/assets/FriggLogo.svg +0 -1
- package/management-ui/src/components/AppRouter.jsx +0 -65
- package/management-ui/src/components/Button.jsx +0 -2
- package/management-ui/src/components/Card.jsx +0 -9
- package/management-ui/src/components/EnvironmentCompare.jsx +0 -400
- package/management-ui/src/components/EnvironmentEditor.jsx +0 -372
- package/management-ui/src/components/EnvironmentImportExport.jsx +0 -469
- package/management-ui/src/components/EnvironmentSchema.jsx +0 -491
- package/management-ui/src/components/EnvironmentSecurity.jsx +0 -463
- package/management-ui/src/components/ErrorBoundary.jsx +0 -73
- package/management-ui/src/components/IntegrationCard.jsx +0 -199
- package/management-ui/src/components/IntegrationCardEnhanced.jsx +0 -490
- package/management-ui/src/components/IntegrationExplorer.jsx +0 -379
- package/management-ui/src/components/IntegrationStatus.jsx +0 -235
- package/management-ui/src/components/Layout.jsx +0 -250
- package/management-ui/src/components/LoadingSpinner.jsx +0 -45
- package/management-ui/src/components/RepositoryPicker.jsx +0 -248
- package/management-ui/src/components/SessionMonitor.jsx +0 -255
- package/management-ui/src/components/StatusBadge.jsx +0 -70
- package/management-ui/src/components/UserContextSwitcher.jsx +0 -154
- package/management-ui/src/components/UserSimulation.jsx +0 -299
- package/management-ui/src/components/Welcome.jsx +0 -434
- package/management-ui/src/components/codegen/APIEndpointGenerator.jsx +0 -637
- package/management-ui/src/components/codegen/APIModuleSelector.jsx +0 -227
- package/management-ui/src/components/codegen/CodeGenerationWizard.jsx +0 -247
- package/management-ui/src/components/codegen/CodePreviewEditor.jsx +0 -316
- package/management-ui/src/components/codegen/DynamicModuleForm.jsx +0 -271
- package/management-ui/src/components/codegen/FormBuilder.jsx +0 -737
- package/management-ui/src/components/codegen/IntegrationGenerator.jsx +0 -855
- package/management-ui/src/components/codegen/ProjectScaffoldWizard.jsx +0 -797
- package/management-ui/src/components/codegen/SchemaBuilder.jsx +0 -303
- package/management-ui/src/components/codegen/TemplateSelector.jsx +0 -586
- package/management-ui/src/components/codegen/index.js +0 -10
- package/management-ui/src/components/connections/ConnectionConfigForm.jsx +0 -362
- package/management-ui/src/components/connections/ConnectionHealthMonitor.jsx +0 -182
- package/management-ui/src/components/connections/ConnectionTester.jsx +0 -200
- package/management-ui/src/components/connections/EntityRelationshipMapper.jsx +0 -292
- package/management-ui/src/components/connections/OAuthFlow.jsx +0 -204
- package/management-ui/src/components/connections/index.js +0 -5
- package/management-ui/src/components/index.js +0 -21
- package/management-ui/src/components/monitoring/APIGatewayMetrics.jsx +0 -222
- package/management-ui/src/components/monitoring/LambdaMetrics.jsx +0 -169
- package/management-ui/src/components/monitoring/MetricsChart.jsx +0 -197
- package/management-ui/src/components/monitoring/MonitoringDashboard.jsx +0 -393
- package/management-ui/src/components/monitoring/SQSMetrics.jsx +0 -246
- package/management-ui/src/components/monitoring/index.js +0 -6
- package/management-ui/src/components/monitoring/monitoring.css +0 -218
- package/management-ui/src/components/theme-provider.jsx +0 -52
- package/management-ui/src/components/theme-toggle.jsx +0 -39
- package/management-ui/src/components/ui/badge.tsx +0 -36
- package/management-ui/src/components/ui/button.test.jsx +0 -56
- package/management-ui/src/components/ui/button.tsx +0 -57
- package/management-ui/src/components/ui/card.tsx +0 -76
- package/management-ui/src/components/ui/dropdown-menu.tsx +0 -199
- package/management-ui/src/components/ui/select.tsx +0 -157
- package/management-ui/src/components/ui/skeleton.jsx +0 -15
- package/management-ui/src/hooks/useFrigg.jsx +0 -387
- package/management-ui/src/hooks/useSocket.jsx +0 -58
- package/management-ui/src/index.css +0 -194
- package/management-ui/src/lib/utils.ts +0 -6
- package/management-ui/src/main.jsx +0 -10
- package/management-ui/src/pages/CodeGeneration.jsx +0 -14
- package/management-ui/src/pages/Connections.jsx +0 -252
- package/management-ui/src/pages/ConnectionsEnhanced.jsx +0 -427
- package/management-ui/src/pages/Dashboard.jsx +0 -311
- package/management-ui/src/pages/Environment.jsx +0 -314
- package/management-ui/src/pages/IntegrationConfigure.jsx +0 -544
- package/management-ui/src/pages/IntegrationDiscovery.jsx +0 -479
- package/management-ui/src/pages/IntegrationTest.jsx +0 -494
- package/management-ui/src/pages/Integrations.jsx +0 -254
- package/management-ui/src/pages/Monitoring.jsx +0 -17
- package/management-ui/src/pages/Simulation.jsx +0 -155
- package/management-ui/src/pages/Users.jsx +0 -492
- package/management-ui/src/services/api.js +0 -41
- package/management-ui/src/services/apiModuleService.js +0 -193
- package/management-ui/src/services/websocket-handlers.js +0 -120
- package/management-ui/src/test/api/project.test.js +0 -273
- package/management-ui/src/test/components/Welcome.test.jsx +0 -378
- package/management-ui/src/test/mocks/server.js +0 -178
- package/management-ui/src/test/setup.js +0 -61
- package/management-ui/src/test/utils/test-utils.jsx +0 -134
- package/management-ui/src/utils/repository.js +0 -98
- package/management-ui/src/utils/repository.test.js +0 -118
- package/management-ui/src/workflows/phase2-integration-workflows.js +0 -884
- package/management-ui/tailwind.config.js +0 -63
- package/management-ui/tsconfig.json +0 -37
- package/management-ui/tsconfig.node.json +0 -10
- package/management-ui/vite.config.js +0 -26
- package/management-ui/vitest.config.js +0 -38
|
@@ -1,305 +0,0 @@
|
|
|
1
|
-
{
|
|
2
|
-
"Version": "2012-10-17",
|
|
3
|
-
"Statement": [
|
|
4
|
-
{
|
|
5
|
-
"Sid": "AWSDiscoveryPermissions",
|
|
6
|
-
"Effect": "Allow",
|
|
7
|
-
"Action": [
|
|
8
|
-
"sts:GetCallerIdentity",
|
|
9
|
-
"ec2:DescribeVpcs",
|
|
10
|
-
"ec2:DescribeSubnets",
|
|
11
|
-
"ec2:DescribeSecurityGroups",
|
|
12
|
-
"ec2:DescribeRouteTables",
|
|
13
|
-
"kms:ListKeys",
|
|
14
|
-
"kms:DescribeKey"
|
|
15
|
-
],
|
|
16
|
-
"Resource": "*"
|
|
17
|
-
},
|
|
18
|
-
{
|
|
19
|
-
"Sid": "CloudFormationFriggStacks",
|
|
20
|
-
"Effect": "Allow",
|
|
21
|
-
"Action": [
|
|
22
|
-
"cloudformation:CreateStack",
|
|
23
|
-
"cloudformation:UpdateStack",
|
|
24
|
-
"cloudformation:DeleteStack",
|
|
25
|
-
"cloudformation:DescribeStacks",
|
|
26
|
-
"cloudformation:DescribeStackEvents",
|
|
27
|
-
"cloudformation:DescribeStackResources",
|
|
28
|
-
"cloudformation:DescribeStackResource",
|
|
29
|
-
"cloudformation:ListStackResources",
|
|
30
|
-
"cloudformation:GetTemplate",
|
|
31
|
-
"cloudformation:ValidateTemplate",
|
|
32
|
-
"cloudformation:DescribeChangeSet",
|
|
33
|
-
"cloudformation:CreateChangeSet",
|
|
34
|
-
"cloudformation:DeleteChangeSet",
|
|
35
|
-
"cloudformation:ExecuteChangeSet"
|
|
36
|
-
],
|
|
37
|
-
"Resource": [
|
|
38
|
-
"arn:aws:cloudformation:*:*:stack/*frigg*/*"
|
|
39
|
-
]
|
|
40
|
-
},
|
|
41
|
-
{
|
|
42
|
-
"Sid": "S3DeploymentBucket",
|
|
43
|
-
"Effect": "Allow",
|
|
44
|
-
"Action": [
|
|
45
|
-
"s3:CreateBucket",
|
|
46
|
-
"s3:DeleteBucket",
|
|
47
|
-
"s3:PutObject",
|
|
48
|
-
"s3:GetObject",
|
|
49
|
-
"s3:DeleteObject",
|
|
50
|
-
"s3:PutBucketPolicy",
|
|
51
|
-
"s3:GetBucketPolicy",
|
|
52
|
-
"s3:DeleteBucketPolicy",
|
|
53
|
-
"s3:PutBucketVersioning",
|
|
54
|
-
"s3:GetBucketVersioning",
|
|
55
|
-
"s3:PutBucketPublicAccessBlock",
|
|
56
|
-
"s3:GetBucketPublicAccessBlock",
|
|
57
|
-
"s3:PutBucketTagging",
|
|
58
|
-
"s3:GetBucketTagging",
|
|
59
|
-
"s3:DeleteBucketTagging",
|
|
60
|
-
"s3:PutBucketEncryption",
|
|
61
|
-
"s3:GetBucketEncryption",
|
|
62
|
-
"s3:PutEncryptionConfiguration",
|
|
63
|
-
"s3:PutBucketNotification",
|
|
64
|
-
"s3:GetBucketNotification",
|
|
65
|
-
"s3:GetBucketLocation",
|
|
66
|
-
"s3:ListBucket",
|
|
67
|
-
"s3:GetBucketAcl",
|
|
68
|
-
"s3:PutBucketAcl"
|
|
69
|
-
],
|
|
70
|
-
"Resource": [
|
|
71
|
-
"arn:aws:s3:::*serverless*",
|
|
72
|
-
"arn:aws:s3:::*serverless*/*"
|
|
73
|
-
]
|
|
74
|
-
},
|
|
75
|
-
{
|
|
76
|
-
"Sid": "LambdaFriggFunctions",
|
|
77
|
-
"Effect": "Allow",
|
|
78
|
-
"Action": [
|
|
79
|
-
"lambda:CreateFunction",
|
|
80
|
-
"lambda:UpdateFunctionCode",
|
|
81
|
-
"lambda:UpdateFunctionConfiguration",
|
|
82
|
-
"lambda:DeleteFunction",
|
|
83
|
-
"lambda:GetFunction",
|
|
84
|
-
"lambda:ListFunctions",
|
|
85
|
-
"lambda:PublishVersion",
|
|
86
|
-
"lambda:CreateAlias",
|
|
87
|
-
"lambda:UpdateAlias",
|
|
88
|
-
"lambda:DeleteAlias",
|
|
89
|
-
"lambda:GetAlias",
|
|
90
|
-
"lambda:AddPermission",
|
|
91
|
-
"lambda:RemovePermission",
|
|
92
|
-
"lambda:GetPolicy",
|
|
93
|
-
"lambda:PutProvisionedConcurrencyConfig",
|
|
94
|
-
"lambda:DeleteProvisionedConcurrencyConfig",
|
|
95
|
-
"lambda:PutConcurrency",
|
|
96
|
-
"lambda:PutFunctionConcurrency",
|
|
97
|
-
"lambda:DeleteConcurrency",
|
|
98
|
-
"lambda:TagResource",
|
|
99
|
-
"lambda:UntagResource",
|
|
100
|
-
"lambda:ListVersionsByFunction"
|
|
101
|
-
],
|
|
102
|
-
"Resource": [
|
|
103
|
-
"arn:aws:lambda:*:*:function:*frigg*"
|
|
104
|
-
]
|
|
105
|
-
},
|
|
106
|
-
{
|
|
107
|
-
"Sid": "FriggLambdaEventSourceMapping",
|
|
108
|
-
"Effect": "Allow",
|
|
109
|
-
"Action": [
|
|
110
|
-
"lambda:CreateEventSourceMapping",
|
|
111
|
-
"lambda:DeleteEventSourceMapping",
|
|
112
|
-
"lambda:GetEventSourceMapping",
|
|
113
|
-
"lambda:UpdateEventSourceMapping",
|
|
114
|
-
"lambda:ListEventSourceMappings",
|
|
115
|
-
"lambda:TagResource",
|
|
116
|
-
"lambda:UntagResource",
|
|
117
|
-
"lambda:ListTags"
|
|
118
|
-
],
|
|
119
|
-
"Resource": [
|
|
120
|
-
"arn:aws:lambda:*:*:event-source-mapping:*"
|
|
121
|
-
]
|
|
122
|
-
},
|
|
123
|
-
{
|
|
124
|
-
"Sid": "IAMRolesForFriggLambda",
|
|
125
|
-
"Effect": "Allow",
|
|
126
|
-
"Action": [
|
|
127
|
-
"iam:CreateRole",
|
|
128
|
-
"iam:DeleteRole",
|
|
129
|
-
"iam:GetRole",
|
|
130
|
-
"iam:PassRole",
|
|
131
|
-
"iam:PutRolePolicy",
|
|
132
|
-
"iam:DeleteRolePolicy",
|
|
133
|
-
"iam:GetRolePolicy",
|
|
134
|
-
"iam:AttachRolePolicy",
|
|
135
|
-
"iam:DetachRolePolicy",
|
|
136
|
-
"iam:TagRole",
|
|
137
|
-
"iam:UntagRole"
|
|
138
|
-
],
|
|
139
|
-
"Resource": [
|
|
140
|
-
"arn:aws:iam::*:role/*frigg*",
|
|
141
|
-
"arn:aws:iam::*:role/*frigg*LambdaRole*"
|
|
142
|
-
]
|
|
143
|
-
},
|
|
144
|
-
{
|
|
145
|
-
"Sid": "IAMPolicyVersionPermissions",
|
|
146
|
-
"Effect": "Allow",
|
|
147
|
-
"Action": [
|
|
148
|
-
"iam:ListPolicyVersions"
|
|
149
|
-
],
|
|
150
|
-
"Resource": [
|
|
151
|
-
"arn:aws:iam::*:policy/*"
|
|
152
|
-
]
|
|
153
|
-
},
|
|
154
|
-
{
|
|
155
|
-
"Sid": "FriggMessagingServices",
|
|
156
|
-
"Effect": "Allow",
|
|
157
|
-
"Action": [
|
|
158
|
-
"sqs:CreateQueue",
|
|
159
|
-
"sqs:DeleteQueue",
|
|
160
|
-
"sqs:GetQueueAttributes",
|
|
161
|
-
"sqs:SetQueueAttributes",
|
|
162
|
-
"sqs:GetQueueUrl",
|
|
163
|
-
"sqs:TagQueue",
|
|
164
|
-
"sqs:UntagQueue"
|
|
165
|
-
],
|
|
166
|
-
"Resource": [
|
|
167
|
-
"arn:aws:sqs:*:*:*frigg*",
|
|
168
|
-
"arn:aws:sqs:*:*:internal-error-queue-*"
|
|
169
|
-
]
|
|
170
|
-
},
|
|
171
|
-
{
|
|
172
|
-
"Sid": "FriggSNSTopics",
|
|
173
|
-
"Effect": "Allow",
|
|
174
|
-
"Action": [
|
|
175
|
-
"sns:CreateTopic",
|
|
176
|
-
"sns:DeleteTopic",
|
|
177
|
-
"sns:GetTopicAttributes",
|
|
178
|
-
"sns:SetTopicAttributes",
|
|
179
|
-
"sns:Subscribe",
|
|
180
|
-
"sns:Unsubscribe",
|
|
181
|
-
"sns:ListSubscriptionsByTopic",
|
|
182
|
-
"sns:TagResource",
|
|
183
|
-
"sns:UntagResource"
|
|
184
|
-
],
|
|
185
|
-
"Resource": [
|
|
186
|
-
"arn:aws:sns:*:*:*frigg*"
|
|
187
|
-
]
|
|
188
|
-
},
|
|
189
|
-
{
|
|
190
|
-
"Sid": "FriggMonitoringAndLogs",
|
|
191
|
-
"Effect": "Allow",
|
|
192
|
-
"Action": [
|
|
193
|
-
"cloudwatch:PutMetricAlarm",
|
|
194
|
-
"cloudwatch:DeleteAlarms",
|
|
195
|
-
"cloudwatch:DescribeAlarms",
|
|
196
|
-
"logs:CreateLogGroup",
|
|
197
|
-
"logs:CreateLogStream",
|
|
198
|
-
"logs:DeleteLogGroup",
|
|
199
|
-
"logs:DescribeLogGroups",
|
|
200
|
-
"logs:DescribeLogStreams",
|
|
201
|
-
"logs:FilterLogEvents",
|
|
202
|
-
"logs:PutLogEvents",
|
|
203
|
-
"logs:PutRetentionPolicy",
|
|
204
|
-
"logs:TagResource",
|
|
205
|
-
"logs:UntagResource"
|
|
206
|
-
],
|
|
207
|
-
"Resource": [
|
|
208
|
-
"arn:aws:logs:*:*:log-group:/aws/lambda/*frigg*",
|
|
209
|
-
"arn:aws:logs:*:*:log-group:/aws/lambda/*frigg*:*",
|
|
210
|
-
"arn:aws:cloudwatch:*:*:alarm:*frigg*"
|
|
211
|
-
]
|
|
212
|
-
},
|
|
213
|
-
{
|
|
214
|
-
"Sid": "FriggAPIGateway",
|
|
215
|
-
"Effect": "Allow",
|
|
216
|
-
"Action": [
|
|
217
|
-
"apigateway:POST",
|
|
218
|
-
"apigateway:PUT",
|
|
219
|
-
"apigateway:DELETE",
|
|
220
|
-
"apigateway:GET",
|
|
221
|
-
"apigateway:PATCH"
|
|
222
|
-
],
|
|
223
|
-
"Resource": [
|
|
224
|
-
"arn:aws:apigateway:*::/restapis",
|
|
225
|
-
"arn:aws:apigateway:*::/restapis/*",
|
|
226
|
-
"arn:aws:apigateway:*::/domainnames",
|
|
227
|
-
"arn:aws:apigateway:*::/domainnames/*",
|
|
228
|
-
"arn:aws:apigateway:*::/tags/*"
|
|
229
|
-
]
|
|
230
|
-
},
|
|
231
|
-
{
|
|
232
|
-
"Sid": "FriggVPCDeploymentPermissions",
|
|
233
|
-
"Effect": "Allow",
|
|
234
|
-
"Action": [
|
|
235
|
-
"ec2:CreateVpcEndpoint",
|
|
236
|
-
"ec2:DeleteVpcEndpoint",
|
|
237
|
-
"ec2:DeleteVpcEndpoints",
|
|
238
|
-
"ec2:DescribeVpcEndpoints",
|
|
239
|
-
"ec2:ModifyVpcEndpoint",
|
|
240
|
-
"ec2:CreateNatGateway",
|
|
241
|
-
"ec2:DeleteNatGateway",
|
|
242
|
-
"ec2:DescribeNatGateways",
|
|
243
|
-
"ec2:AllocateAddress",
|
|
244
|
-
"ec2:ReleaseAddress",
|
|
245
|
-
"ec2:DescribeAddresses",
|
|
246
|
-
"ec2:AssociateAddress",
|
|
247
|
-
"ec2:DisassociateAddress",
|
|
248
|
-
"ec2:CreateRouteTable",
|
|
249
|
-
"ec2:DeleteRouteTable",
|
|
250
|
-
"ec2:DescribeRouteTables",
|
|
251
|
-
"ec2:CreateRoute",
|
|
252
|
-
"ec2:DeleteRoute",
|
|
253
|
-
"ec2:AssociateRouteTable",
|
|
254
|
-
"ec2:DisassociateRouteTable",
|
|
255
|
-
"ec2:CreateSecurityGroup",
|
|
256
|
-
"ec2:DeleteSecurityGroup",
|
|
257
|
-
"ec2:AuthorizeSecurityGroupEgress",
|
|
258
|
-
"ec2:AuthorizeSecurityGroupIngress",
|
|
259
|
-
"ec2:RevokeSecurityGroupEgress",
|
|
260
|
-
"ec2:RevokeSecurityGroupIngress",
|
|
261
|
-
"ec2:CreateTags",
|
|
262
|
-
"ec2:DeleteTags",
|
|
263
|
-
"ec2:DescribeTags"
|
|
264
|
-
],
|
|
265
|
-
"Resource": "*",
|
|
266
|
-
"Condition": {
|
|
267
|
-
"StringLike": {
|
|
268
|
-
"aws:RequestTag/Name": "*frigg*"
|
|
269
|
-
}
|
|
270
|
-
}
|
|
271
|
-
},
|
|
272
|
-
{
|
|
273
|
-
"Sid": "FriggKMSEncryptionPermissions",
|
|
274
|
-
"Effect": "Allow",
|
|
275
|
-
"Action": [
|
|
276
|
-
"kms:GenerateDataKey",
|
|
277
|
-
"kms:Decrypt"
|
|
278
|
-
],
|
|
279
|
-
"Resource": [
|
|
280
|
-
"arn:aws:kms:*:*:key/*"
|
|
281
|
-
],
|
|
282
|
-
"Condition": {
|
|
283
|
-
"StringEquals": {
|
|
284
|
-
"kms:ViaService": [
|
|
285
|
-
"lambda.*.amazonaws.com",
|
|
286
|
-
"s3.*.amazonaws.com"
|
|
287
|
-
]
|
|
288
|
-
}
|
|
289
|
-
}
|
|
290
|
-
},
|
|
291
|
-
{
|
|
292
|
-
"Sid": "FriggSSMParameterAccess",
|
|
293
|
-
"Effect": "Allow",
|
|
294
|
-
"Action": [
|
|
295
|
-
"ssm:GetParameter",
|
|
296
|
-
"ssm:GetParameters",
|
|
297
|
-
"ssm:GetParametersByPath"
|
|
298
|
-
],
|
|
299
|
-
"Resource": [
|
|
300
|
-
"arn:aws:ssm:*:*:parameter/*frigg*",
|
|
301
|
-
"arn:aws:ssm:*:*:parameter/*frigg*/*"
|
|
302
|
-
]
|
|
303
|
-
}
|
|
304
|
-
]
|
|
305
|
-
}
|
|
@@ -1,383 +0,0 @@
|
|
|
1
|
-
const fs = require('fs');
|
|
2
|
-
const { composeServerlessDefinition } = require('./serverless-template');
|
|
3
|
-
const { AWSDiscovery } = require('./aws-discovery');
|
|
4
|
-
const { BuildTimeDiscovery } = require('./build-time-discovery');
|
|
5
|
-
const FriggServerlessPlugin = require('../../serverless-plugin/index');
|
|
6
|
-
|
|
7
|
-
// Integration tests for end-to-end AWS discovery and serverless config generation
|
|
8
|
-
describe('VPC/KMS/SSM Integration Tests', () => {
|
|
9
|
-
let mockAWSDiscovery;
|
|
10
|
-
let buildTimeDiscovery;
|
|
11
|
-
|
|
12
|
-
const mockAWSResources = {
|
|
13
|
-
defaultVpcId: 'vpc-12345678',
|
|
14
|
-
defaultSecurityGroupId: 'sg-12345678',
|
|
15
|
-
privateSubnetId1: 'subnet-private-1',
|
|
16
|
-
privateSubnetId2: 'subnet-private-2',
|
|
17
|
-
privateRouteTableId: 'rtb-12345678',
|
|
18
|
-
defaultKmsKeyId: 'arn:aws:kms:us-east-1:123456789012:key/12345678-1234-1234-1234-123456789012'
|
|
19
|
-
};
|
|
20
|
-
|
|
21
|
-
beforeEach(() => {
|
|
22
|
-
// Mock AWSDiscovery to return consistent test data
|
|
23
|
-
mockAWSDiscovery = {
|
|
24
|
-
discoverResources: jest.fn().mockResolvedValue(mockAWSResources),
|
|
25
|
-
findDefaultVpc: jest.fn().mockResolvedValue({ VpcId: mockAWSResources.defaultVpcId }),
|
|
26
|
-
findPrivateSubnets: jest.fn().mockResolvedValue([
|
|
27
|
-
{ SubnetId: mockAWSResources.privateSubnetId1 },
|
|
28
|
-
{ SubnetId: mockAWSResources.privateSubnetId2 }
|
|
29
|
-
]),
|
|
30
|
-
findDefaultSecurityGroup: jest.fn().mockResolvedValue({ GroupId: mockAWSResources.defaultSecurityGroupId }),
|
|
31
|
-
findPrivateRouteTable: jest.fn().mockResolvedValue({ RouteTableId: mockAWSResources.privateRouteTableId }),
|
|
32
|
-
findDefaultKmsKey: jest.fn().mockResolvedValue(mockAWSResources.defaultKmsKeyId)
|
|
33
|
-
};
|
|
34
|
-
|
|
35
|
-
jest.doMock('./aws-discovery', () => ({
|
|
36
|
-
AWSDiscovery: jest.fn(() => mockAWSDiscovery)
|
|
37
|
-
}));
|
|
38
|
-
|
|
39
|
-
buildTimeDiscovery = new BuildTimeDiscovery('us-east-1');
|
|
40
|
-
});
|
|
41
|
-
|
|
42
|
-
afterEach(() => {
|
|
43
|
-
jest.clearAllMocks();
|
|
44
|
-
jest.resetModules();
|
|
45
|
-
});
|
|
46
|
-
|
|
47
|
-
describe('End-to-End Serverless Configuration Generation', () => {
|
|
48
|
-
it('should generate complete serverless config with VPC, KMS, and SSM enabled', async () => {
|
|
49
|
-
const appDefinition = {
|
|
50
|
-
name: 'test-frigg-app',
|
|
51
|
-
vpc: { enable: true },
|
|
52
|
-
encryption: { useDefaultKMSForFieldLevelEncryption: true },
|
|
53
|
-
ssm: { enable: true },
|
|
54
|
-
integrations: [{
|
|
55
|
-
Definition: {
|
|
56
|
-
name: 'testIntegration'
|
|
57
|
-
}
|
|
58
|
-
}]
|
|
59
|
-
};
|
|
60
|
-
|
|
61
|
-
// Run AWS discovery
|
|
62
|
-
const discoveredResources = await mockAWSDiscovery.discoverResources();
|
|
63
|
-
|
|
64
|
-
// Set environment variables as would happen in build
|
|
65
|
-
process.env.AWS_DISCOVERY_VPC_ID = discoveredResources.defaultVpcId;
|
|
66
|
-
process.env.AWS_DISCOVERY_SECURITY_GROUP_ID = discoveredResources.defaultSecurityGroupId;
|
|
67
|
-
process.env.AWS_DISCOVERY_SUBNET_ID_1 = discoveredResources.privateSubnetId1;
|
|
68
|
-
process.env.AWS_DISCOVERY_SUBNET_ID_2 = discoveredResources.privateSubnetId2;
|
|
69
|
-
process.env.AWS_DISCOVERY_ROUTE_TABLE_ID = discoveredResources.privateRouteTableId;
|
|
70
|
-
process.env.AWS_DISCOVERY_KMS_KEY_ID = discoveredResources.defaultKmsKeyId;
|
|
71
|
-
|
|
72
|
-
// Generate serverless configuration
|
|
73
|
-
const serverlessConfig = composeServerlessDefinition(appDefinition);
|
|
74
|
-
|
|
75
|
-
// Verify VPC configuration
|
|
76
|
-
expect(serverlessConfig.provider.vpc).toBe('${self:custom.vpc.${self:provider.stage}}');
|
|
77
|
-
expect(serverlessConfig.custom.vpc).toEqual({
|
|
78
|
-
'${self:provider.stage}': {
|
|
79
|
-
securityGroupIds: ['${env:AWS_DISCOVERY_SECURITY_GROUP_ID}'],
|
|
80
|
-
subnetIds: [
|
|
81
|
-
'${env:AWS_DISCOVERY_SUBNET_ID_1}',
|
|
82
|
-
'${env:AWS_DISCOVERY_SUBNET_ID_2}'
|
|
83
|
-
]
|
|
84
|
-
}
|
|
85
|
-
});
|
|
86
|
-
|
|
87
|
-
// Verify VPC Endpoint
|
|
88
|
-
expect(serverlessConfig.resources.Resources.VPCEndpointS3).toEqual({
|
|
89
|
-
Type: 'AWS::EC2::VPCEndpoint',
|
|
90
|
-
Properties: {
|
|
91
|
-
VpcId: '${env:AWS_DISCOVERY_VPC_ID}',
|
|
92
|
-
ServiceName: 'com.amazonaws.${self:provider.region}.s3',
|
|
93
|
-
VpcEndpointType: 'Gateway',
|
|
94
|
-
RouteTableIds: ['${env:AWS_DISCOVERY_ROUTE_TABLE_ID}']
|
|
95
|
-
}
|
|
96
|
-
});
|
|
97
|
-
|
|
98
|
-
// Verify KMS configuration
|
|
99
|
-
expect(serverlessConfig.plugins).toContain('serverless-kms-grants');
|
|
100
|
-
expect(serverlessConfig.provider.environment.KMS_KEY_ARN).toBe('${self:custom.kmsGrants.kmsKeyId}');
|
|
101
|
-
expect(serverlessConfig.custom.kmsGrants).toEqual({
|
|
102
|
-
kmsKeyId: '${env:AWS_DISCOVERY_KMS_KEY_ID}'
|
|
103
|
-
});
|
|
104
|
-
|
|
105
|
-
// Verify KMS IAM permissions
|
|
106
|
-
const kmsPermission = serverlessConfig.provider.iamRoleStatements.find(
|
|
107
|
-
statement => statement.Action.includes('kms:GenerateDataKey')
|
|
108
|
-
);
|
|
109
|
-
expect(kmsPermission).toBeDefined();
|
|
110
|
-
|
|
111
|
-
// Verify SSM configuration
|
|
112
|
-
expect(serverlessConfig.provider.layers).toEqual([
|
|
113
|
-
'arn:aws:lambda:${self:provider.region}:177933569100:layer:AWS-Parameters-and-Secrets-Lambda-Extension:11'
|
|
114
|
-
]);
|
|
115
|
-
expect(serverlessConfig.provider.environment.SSM_PARAMETER_PREFIX).toBe('/${self:service}/${self:provider.stage}');
|
|
116
|
-
|
|
117
|
-
// Verify SSM IAM permissions
|
|
118
|
-
const ssmPermission = serverlessConfig.provider.iamRoleStatements.find(
|
|
119
|
-
statement => statement.Action.includes('ssm:GetParameter')
|
|
120
|
-
);
|
|
121
|
-
expect(ssmPermission).toBeDefined();
|
|
122
|
-
|
|
123
|
-
// Verify integration resources
|
|
124
|
-
expect(serverlessConfig.functions.testIntegration).toBeDefined();
|
|
125
|
-
expect(serverlessConfig.functions.testIntegrationQueueWorker).toBeDefined();
|
|
126
|
-
expect(serverlessConfig.resources.Resources.TestIntegrationQueue).toBeDefined();
|
|
127
|
-
|
|
128
|
-
// Clean up environment
|
|
129
|
-
delete process.env.AWS_DISCOVERY_VPC_ID;
|
|
130
|
-
delete process.env.AWS_DISCOVERY_SECURITY_GROUP_ID;
|
|
131
|
-
delete process.env.AWS_DISCOVERY_SUBNET_ID_1;
|
|
132
|
-
delete process.env.AWS_DISCOVERY_SUBNET_ID_2;
|
|
133
|
-
delete process.env.AWS_DISCOVERY_ROUTE_TABLE_ID;
|
|
134
|
-
delete process.env.AWS_DISCOVERY_KMS_KEY_ID;
|
|
135
|
-
});
|
|
136
|
-
|
|
137
|
-
it('should generate config with only VPC enabled', async () => {
|
|
138
|
-
const appDefinition = {
|
|
139
|
-
name: 'vpc-only-app',
|
|
140
|
-
vpc: { enable: true },
|
|
141
|
-
integrations: []
|
|
142
|
-
};
|
|
143
|
-
|
|
144
|
-
process.env.AWS_DISCOVERY_VPC_ID = mockAWSResources.defaultVpcId;
|
|
145
|
-
process.env.AWS_DISCOVERY_SECURITY_GROUP_ID = mockAWSResources.defaultSecurityGroupId;
|
|
146
|
-
process.env.AWS_DISCOVERY_SUBNET_ID_1 = mockAWSResources.privateSubnetId1;
|
|
147
|
-
process.env.AWS_DISCOVERY_SUBNET_ID_2 = mockAWSResources.privateSubnetId2;
|
|
148
|
-
process.env.AWS_DISCOVERY_ROUTE_TABLE_ID = mockAWSResources.privateRouteTableId;
|
|
149
|
-
|
|
150
|
-
const serverlessConfig = composeServerlessDefinition(appDefinition);
|
|
151
|
-
|
|
152
|
-
// Should have VPC config
|
|
153
|
-
expect(serverlessConfig.provider.vpc).toBeDefined();
|
|
154
|
-
expect(serverlessConfig.custom.vpc).toBeDefined();
|
|
155
|
-
expect(serverlessConfig.resources.Resources.VPCEndpointS3).toBeDefined();
|
|
156
|
-
|
|
157
|
-
// Should not have KMS config
|
|
158
|
-
expect(serverlessConfig.plugins).not.toContain('serverless-kms-grants');
|
|
159
|
-
expect(serverlessConfig.provider.environment.KMS_KEY_ARN).toBeUndefined();
|
|
160
|
-
|
|
161
|
-
// Should not have SSM config
|
|
162
|
-
expect(serverlessConfig.provider.layers).toBeUndefined();
|
|
163
|
-
expect(serverlessConfig.provider.environment.SSM_PARAMETER_PREFIX).toBeUndefined();
|
|
164
|
-
|
|
165
|
-
// Clean up
|
|
166
|
-
delete process.env.AWS_DISCOVERY_VPC_ID;
|
|
167
|
-
delete process.env.AWS_DISCOVERY_SECURITY_GROUP_ID;
|
|
168
|
-
delete process.env.AWS_DISCOVERY_SUBNET_ID_1;
|
|
169
|
-
delete process.env.AWS_DISCOVERY_SUBNET_ID_2;
|
|
170
|
-
delete process.env.AWS_DISCOVERY_ROUTE_TABLE_ID;
|
|
171
|
-
});
|
|
172
|
-
|
|
173
|
-
it('should generate config with only KMS enabled', async () => {
|
|
174
|
-
const appDefinition = {
|
|
175
|
-
name: 'kms-only-app',
|
|
176
|
-
encryption: { useDefaultKMSForFieldLevelEncryption: true },
|
|
177
|
-
integrations: []
|
|
178
|
-
};
|
|
179
|
-
|
|
180
|
-
process.env.AWS_DISCOVERY_KMS_KEY_ID = mockAWSResources.defaultKmsKeyId;
|
|
181
|
-
|
|
182
|
-
const serverlessConfig = composeServerlessDefinition(appDefinition);
|
|
183
|
-
|
|
184
|
-
// Should have KMS config
|
|
185
|
-
expect(serverlessConfig.plugins).toContain('serverless-kms-grants');
|
|
186
|
-
expect(serverlessConfig.custom.kmsGrants).toBeDefined();
|
|
187
|
-
|
|
188
|
-
// Should not have VPC config
|
|
189
|
-
expect(serverlessConfig.provider.vpc).toBeUndefined();
|
|
190
|
-
|
|
191
|
-
// Should not have SSM config
|
|
192
|
-
expect(serverlessConfig.provider.layers).toBeUndefined();
|
|
193
|
-
|
|
194
|
-
delete process.env.AWS_DISCOVERY_KMS_KEY_ID;
|
|
195
|
-
});
|
|
196
|
-
});
|
|
197
|
-
|
|
198
|
-
describe('Plugin Integration', () => {
|
|
199
|
-
it('should trigger AWS discovery through serverless plugin', async () => {
|
|
200
|
-
const mockServerless = {
|
|
201
|
-
cli: { log: jest.fn() },
|
|
202
|
-
service: {
|
|
203
|
-
provider: {
|
|
204
|
-
name: 'aws',
|
|
205
|
-
region: 'us-east-1',
|
|
206
|
-
vpc: '${self:custom.vpc.${self:provider.stage}}'
|
|
207
|
-
},
|
|
208
|
-
plugins: ['serverless-kms-grants'],
|
|
209
|
-
custom: {},
|
|
210
|
-
functions: {}
|
|
211
|
-
},
|
|
212
|
-
processedInput: { commands: [] },
|
|
213
|
-
getProvider: jest.fn(() => ({})),
|
|
214
|
-
extendConfiguration: jest.fn()
|
|
215
|
-
};
|
|
216
|
-
|
|
217
|
-
const plugin = new FriggServerlessPlugin(mockServerless, { stage: 'test' });
|
|
218
|
-
|
|
219
|
-
// Mock BuildTimeDiscovery
|
|
220
|
-
const mockBuildTimeDiscovery = {
|
|
221
|
-
preBuildHook: jest.fn().mockResolvedValue(mockAWSResources)
|
|
222
|
-
};
|
|
223
|
-
|
|
224
|
-
jest.doMock('./build-time-discovery', () => ({
|
|
225
|
-
BuildTimeDiscovery: jest.fn(() => mockBuildTimeDiscovery)
|
|
226
|
-
}));
|
|
227
|
-
|
|
228
|
-
// Test the beforePackageInitialize hook
|
|
229
|
-
await plugin.beforePackageInitialize();
|
|
230
|
-
|
|
231
|
-
expect(mockBuildTimeDiscovery.preBuildHook).toHaveBeenCalledWith(
|
|
232
|
-
expect.objectContaining({
|
|
233
|
-
vpc: { enable: true },
|
|
234
|
-
encryption: { useDefaultKMSForFieldLevelEncryption: true }
|
|
235
|
-
}),
|
|
236
|
-
'us-east-1'
|
|
237
|
-
);
|
|
238
|
-
|
|
239
|
-
expect(mockServerless.cli.log).toHaveBeenCalledWith('AWS discovery completed successfully');
|
|
240
|
-
});
|
|
241
|
-
|
|
242
|
-
it('should handle plugin discovery failure gracefully', async () => {
|
|
243
|
-
const mockServerless = {
|
|
244
|
-
cli: { log: jest.fn() },
|
|
245
|
-
service: {
|
|
246
|
-
provider: {
|
|
247
|
-
name: 'aws',
|
|
248
|
-
region: 'us-east-1',
|
|
249
|
-
vpc: '${self:custom.vpc}'
|
|
250
|
-
},
|
|
251
|
-
plugins: [],
|
|
252
|
-
custom: {},
|
|
253
|
-
functions: {}
|
|
254
|
-
},
|
|
255
|
-
processedInput: { commands: [] },
|
|
256
|
-
getProvider: jest.fn(() => ({})),
|
|
257
|
-
extendConfiguration: jest.fn()
|
|
258
|
-
};
|
|
259
|
-
|
|
260
|
-
const plugin = new FriggServerlessPlugin(mockServerless, { stage: 'test' });
|
|
261
|
-
|
|
262
|
-
// Mock BuildTimeDiscovery to fail
|
|
263
|
-
const mockBuildTimeDiscovery = {
|
|
264
|
-
preBuildHook: jest.fn().mockRejectedValue(new Error('AWS API Error'))
|
|
265
|
-
};
|
|
266
|
-
|
|
267
|
-
jest.doMock('./build-time-discovery', () => ({
|
|
268
|
-
BuildTimeDiscovery: jest.fn(() => mockBuildTimeDiscovery)
|
|
269
|
-
}));
|
|
270
|
-
|
|
271
|
-
await plugin.beforePackageInitialize();
|
|
272
|
-
|
|
273
|
-
expect(mockServerless.cli.log).toHaveBeenCalledWith('AWS discovery failed, continuing with deployment...');
|
|
274
|
-
expect(mockServerless.cli.log).toHaveBeenCalledWith('Using fallback values for AWS resources');
|
|
275
|
-
|
|
276
|
-
// Verify fallback values are set
|
|
277
|
-
expect(process.env.AWS_DISCOVERY_VPC_ID).toBe('vpc-fallback');
|
|
278
|
-
expect(process.env.AWS_DISCOVERY_KMS_KEY_ID).toBe('arn:aws:kms:*:*:key/*');
|
|
279
|
-
});
|
|
280
|
-
});
|
|
281
|
-
|
|
282
|
-
describe('Template Variable Replacement', () => {
|
|
283
|
-
it('should replace environment variable placeholders with actual values', () => {
|
|
284
|
-
const template = `
|
|
285
|
-
provider:
|
|
286
|
-
vpc:
|
|
287
|
-
securityGroupIds:
|
|
288
|
-
- \${env:AWS_DISCOVERY_SECURITY_GROUP_ID}
|
|
289
|
-
subnetIds:
|
|
290
|
-
- \${env:AWS_DISCOVERY_SUBNET_ID_1}
|
|
291
|
-
- \${env:AWS_DISCOVERY_SUBNET_ID_2}
|
|
292
|
-
environment:
|
|
293
|
-
KMS_KEY_ARN: \${env:AWS_DISCOVERY_KMS_KEY_ID}
|
|
294
|
-
resources:
|
|
295
|
-
VPCEndpoint:
|
|
296
|
-
Properties:
|
|
297
|
-
VpcId: \${env:AWS_DISCOVERY_VPC_ID}
|
|
298
|
-
`;
|
|
299
|
-
|
|
300
|
-
// Set environment variables
|
|
301
|
-
process.env.AWS_DISCOVERY_VPC_ID = mockAWSResources.defaultVpcId;
|
|
302
|
-
process.env.AWS_DISCOVERY_SECURITY_GROUP_ID = mockAWSResources.defaultSecurityGroupId;
|
|
303
|
-
process.env.AWS_DISCOVERY_SUBNET_ID_1 = mockAWSResources.privateSubnetId1;
|
|
304
|
-
process.env.AWS_DISCOVERY_SUBNET_ID_2 = mockAWSResources.privateSubnetId2;
|
|
305
|
-
process.env.AWS_DISCOVERY_KMS_KEY_ID = mockAWSResources.defaultKmsKeyId;
|
|
306
|
-
|
|
307
|
-
// In a real deployment, serverless framework would resolve these environment variables
|
|
308
|
-
// For testing, we can verify the placeholders are correctly formatted
|
|
309
|
-
expect(template).toContain('${env:AWS_DISCOVERY_VPC_ID}');
|
|
310
|
-
expect(template).toContain('${env:AWS_DISCOVERY_SECURITY_GROUP_ID}');
|
|
311
|
-
expect(template).toContain('${env:AWS_DISCOVERY_SUBNET_ID_1}');
|
|
312
|
-
expect(template).toContain('${env:AWS_DISCOVERY_SUBNET_ID_2}');
|
|
313
|
-
expect(template).toContain('${env:AWS_DISCOVERY_KMS_KEY_ID}');
|
|
314
|
-
|
|
315
|
-
// Clean up
|
|
316
|
-
delete process.env.AWS_DISCOVERY_VPC_ID;
|
|
317
|
-
delete process.env.AWS_DISCOVERY_SECURITY_GROUP_ID;
|
|
318
|
-
delete process.env.AWS_DISCOVERY_SUBNET_ID_1;
|
|
319
|
-
delete process.env.AWS_DISCOVERY_SUBNET_ID_2;
|
|
320
|
-
delete process.env.AWS_DISCOVERY_KMS_KEY_ID;
|
|
321
|
-
});
|
|
322
|
-
});
|
|
323
|
-
|
|
324
|
-
describe('Error Scenarios', () => {
|
|
325
|
-
it('should handle AWS discovery timeout gracefully', async () => {
|
|
326
|
-
const mockFailingDiscovery = {
|
|
327
|
-
discoverResources: jest.fn().mockRejectedValue(new Error('Request timeout'))
|
|
328
|
-
};
|
|
329
|
-
|
|
330
|
-
jest.doMock('./aws-discovery', () => ({
|
|
331
|
-
AWSDiscovery: jest.fn(() => mockFailingDiscovery)
|
|
332
|
-
}));
|
|
333
|
-
|
|
334
|
-
const appDefinition = {
|
|
335
|
-
vpc: { enable: true },
|
|
336
|
-
integrations: []
|
|
337
|
-
};
|
|
338
|
-
|
|
339
|
-
await expect(buildTimeDiscovery.preBuildHook(appDefinition, 'us-east-1')).rejects.toThrow('Request timeout');
|
|
340
|
-
});
|
|
341
|
-
|
|
342
|
-
it('should handle partial AWS resource discovery', async () => {
|
|
343
|
-
const partialResources = {
|
|
344
|
-
defaultVpcId: 'vpc-12345678',
|
|
345
|
-
defaultSecurityGroupId: 'sg-12345678',
|
|
346
|
-
privateSubnetId1: 'subnet-1',
|
|
347
|
-
privateSubnetId2: 'subnet-1', // Same subnet used twice
|
|
348
|
-
privateRouteTableId: 'rtb-12345678',
|
|
349
|
-
defaultKmsKeyId: '*' // Fallback KMS key
|
|
350
|
-
};
|
|
351
|
-
|
|
352
|
-
mockAWSDiscovery.discoverResources.mockResolvedValue(partialResources);
|
|
353
|
-
|
|
354
|
-
const appDefinition = {
|
|
355
|
-
vpc: { enable: true },
|
|
356
|
-
encryption: { useDefaultKMSForFieldLevelEncryption: true },
|
|
357
|
-
integrations: []
|
|
358
|
-
};
|
|
359
|
-
|
|
360
|
-
const result = await buildTimeDiscovery.preBuildHook(appDefinition, 'us-east-1');
|
|
361
|
-
|
|
362
|
-
expect(result).toEqual(partialResources);
|
|
363
|
-
expect(result.privateSubnetId2).toBe(result.privateSubnetId1); // Should handle single subnet scenario
|
|
364
|
-
expect(result.defaultKmsKeyId).toBe('*'); // Should handle KMS fallback
|
|
365
|
-
});
|
|
366
|
-
});
|
|
367
|
-
|
|
368
|
-
describe('Multi-Region Support', () => {
|
|
369
|
-
it('should support different AWS regions', async () => {
|
|
370
|
-
const appDefinition = {
|
|
371
|
-
vpc: { enable: true },
|
|
372
|
-
integrations: []
|
|
373
|
-
};
|
|
374
|
-
|
|
375
|
-
const euWestDiscovery = new BuildTimeDiscovery('eu-west-1');
|
|
376
|
-
|
|
377
|
-
await euWestDiscovery.preBuildHook(appDefinition, 'eu-west-1');
|
|
378
|
-
|
|
379
|
-
// Verify that AWSDiscovery was instantiated with correct region
|
|
380
|
-
expect(mockAWSDiscovery.discoverResources).toHaveBeenCalled();
|
|
381
|
-
});
|
|
382
|
-
});
|
|
383
|
-
});
|