@friggframework/devtools 2.0.0--canary.461.ec909cf.0 → 2.0.0--canary.461.9483dbe.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (71) hide show
  1. package/frigg-cli/__tests__/unit/commands/build.test.js +6 -6
  2. package/frigg-cli/build-command/index.js +1 -1
  3. package/frigg-cli/deploy-command/index.js +6 -6
  4. package/frigg-cli/generate-command/index.js +2 -2
  5. package/frigg-cli/generate-iam-command.js +10 -10
  6. package/frigg-cli/start-command/index.js +1 -1
  7. package/frigg-cli/start-command/start-command.test.js +3 -3
  8. package/frigg-cli/utils/database-validator.js +14 -21
  9. package/infrastructure/REFACTOR.md +532 -0
  10. package/infrastructure/TRANSFORMATION-VISUAL.md +239 -0
  11. package/infrastructure/__tests__/postgres-config.test.js +1 -1
  12. package/infrastructure/create-frigg-infrastructure.js +1 -1
  13. package/infrastructure/{DEPLOYMENT-INSTRUCTIONS.md → docs/deployment-instructions.md} +3 -3
  14. package/infrastructure/{IAM-POLICY-TEMPLATES.md → docs/iam-policy-templates.md} +9 -10
  15. package/infrastructure/domains/database/aurora-discovery.js +81 -0
  16. package/infrastructure/domains/database/aurora-discovery.test.js +188 -0
  17. package/infrastructure/domains/integration/integration-builder.js +178 -0
  18. package/infrastructure/domains/integration/integration-builder.test.js +362 -0
  19. package/infrastructure/domains/integration/websocket-builder.js +69 -0
  20. package/infrastructure/domains/integration/websocket-builder.test.js +195 -0
  21. package/infrastructure/domains/networking/vpc-discovery.test.js +257 -0
  22. package/infrastructure/domains/parameters/ssm-builder.js +79 -0
  23. package/infrastructure/domains/parameters/ssm-builder.test.js +188 -0
  24. package/infrastructure/domains/parameters/ssm-discovery.js +84 -0
  25. package/infrastructure/domains/parameters/ssm-discovery.test.js +210 -0
  26. package/infrastructure/{iam-generator.js → domains/security/iam-generator.js} +2 -2
  27. package/infrastructure/domains/security/kms-builder.js +169 -0
  28. package/infrastructure/domains/security/kms-builder.test.js +354 -0
  29. package/infrastructure/domains/security/kms-discovery.js +80 -0
  30. package/infrastructure/domains/security/kms-discovery.test.js +176 -0
  31. package/infrastructure/domains/shared/base-builder.js +112 -0
  32. package/infrastructure/domains/shared/builder-orchestrator.js +212 -0
  33. package/infrastructure/domains/shared/builder-orchestrator.test.js +213 -0
  34. package/infrastructure/domains/shared/environment-builder.js +118 -0
  35. package/infrastructure/domains/shared/environment-builder.test.js +246 -0
  36. package/infrastructure/domains/shared/providers/aws-provider-adapter.test.js +366 -0
  37. package/infrastructure/domains/shared/providers/azure-provider-adapter.stub.js +93 -0
  38. package/infrastructure/domains/shared/providers/cloud-provider-adapter.js +136 -0
  39. package/infrastructure/domains/shared/providers/gcp-provider-adapter.stub.js +82 -0
  40. package/infrastructure/domains/shared/providers/provider-factory.js +108 -0
  41. package/infrastructure/domains/shared/providers/provider-factory.test.js +170 -0
  42. package/infrastructure/domains/shared/resource-discovery.js +132 -0
  43. package/infrastructure/domains/shared/resource-discovery.test.js +410 -0
  44. package/infrastructure/domains/shared/utilities/base-definition-factory.js +2 -3
  45. package/infrastructure/domains/shared/utilities/base-definition-factory.js.bak +338 -0
  46. package/infrastructure/domains/shared/utilities/base-definition-factory.test.js +248 -0
  47. package/infrastructure/domains/shared/utilities/handler-path-resolver.test.js +259 -0
  48. package/infrastructure/domains/shared/utilities/prisma-layer-manager.js +55 -0
  49. package/infrastructure/domains/shared/utilities/prisma-layer-manager.test.js +134 -0
  50. package/infrastructure/domains/shared/validation/env-validator.test.js +173 -0
  51. package/infrastructure/esbuild.config.js +53 -0
  52. package/infrastructure/infrastructure-composer.js +85 -0
  53. package/infrastructure/scripts/build-prisma-layer.js +60 -47
  54. package/infrastructure/{build-time-discovery.test.js → scripts/build-time-discovery.test.js} +5 -4
  55. package/layers/prisma/nodejs/package.json +8 -0
  56. package/management-ui/server/utils/environment/awsParameterStore.js +29 -18
  57. package/package.json +8 -8
  58. package/infrastructure/aws-discovery.js +0 -1704
  59. package/infrastructure/aws-discovery.test.js +0 -1666
  60. package/infrastructure/serverless-template.js +0 -2804
  61. package/infrastructure/serverless-template.test.js +0 -1897
  62. /package/infrastructure/{POSTGRES-CONFIGURATION.md → docs/POSTGRES-CONFIGURATION.md} +0 -0
  63. /package/infrastructure/{WEBSOCKET-CONFIGURATION.md → docs/WEBSOCKET-CONFIGURATION.md} +0 -0
  64. /package/infrastructure/{GENERATE-IAM-DOCS.md → docs/generate-iam-command.md} +0 -0
  65. /package/infrastructure/{iam-generator.test.js → domains/security/iam-generator.test.js} +0 -0
  66. /package/infrastructure/{frigg-deployment-iam-stack.yaml → domains/security/templates/frigg-deployment-iam-stack.yaml} +0 -0
  67. /package/infrastructure/{iam-policy-basic.json → domains/security/templates/iam-policy-basic.json} +0 -0
  68. /package/infrastructure/{iam-policy-full.json → domains/security/templates/iam-policy-full.json} +0 -0
  69. /package/infrastructure/{env-validator.js → domains/shared/validation/env-validator.js} +0 -0
  70. /package/infrastructure/{build-time-discovery.js → scripts/build-time-discovery.js} +0 -0
  71. /package/infrastructure/{run-discovery.js → scripts/run-discovery.js} +0 -0
@@ -0,0 +1,354 @@
1
+ /**
2
+ * Tests for KMS Builder
3
+ *
4
+ * Tests KMS key creation and configuration
5
+ */
6
+
7
+ const { KmsBuilder } = require('./kms-builder');
8
+ const { ValidationResult } = require('../shared/base-builder');
9
+
10
+ describe('KmsBuilder', () => {
11
+ let kmsBuilder;
12
+
13
+ beforeEach(() => {
14
+ kmsBuilder = new KmsBuilder();
15
+ delete process.env.FRIGG_SKIP_AWS_DISCOVERY;
16
+ });
17
+
18
+ afterEach(() => {
19
+ delete process.env.FRIGG_SKIP_AWS_DISCOVERY;
20
+ });
21
+
22
+ describe('shouldExecute()', () => {
23
+ it('should return true when encryption method is kms', () => {
24
+ const appDefinition = {
25
+ encryption: {
26
+ fieldLevelEncryptionMethod: 'kms',
27
+ },
28
+ };
29
+
30
+ expect(kmsBuilder.shouldExecute(appDefinition)).toBe(true);
31
+ });
32
+
33
+ it('should return false when encryption method is aes', () => {
34
+ const appDefinition = {
35
+ encryption: {
36
+ fieldLevelEncryptionMethod: 'aes',
37
+ },
38
+ };
39
+
40
+ expect(kmsBuilder.shouldExecute(appDefinition)).toBe(false);
41
+ });
42
+
43
+ it('should return false when encryption is not defined', () => {
44
+ const appDefinition = {};
45
+
46
+ expect(kmsBuilder.shouldExecute(appDefinition)).toBe(false);
47
+ });
48
+
49
+ it('should return false when fieldLevelEncryptionMethod is not defined', () => {
50
+ const appDefinition = {
51
+ encryption: {},
52
+ };
53
+
54
+ expect(kmsBuilder.shouldExecute(appDefinition)).toBe(false);
55
+ });
56
+
57
+ it('should return false when FRIGG_SKIP_AWS_DISCOVERY is set (local mode)', () => {
58
+ process.env.FRIGG_SKIP_AWS_DISCOVERY = 'true';
59
+ const appDefinition = {
60
+ encryption: {
61
+ fieldLevelEncryptionMethod: 'kms',
62
+ },
63
+ };
64
+
65
+ expect(kmsBuilder.shouldExecute(appDefinition)).toBe(false);
66
+ });
67
+ });
68
+
69
+ describe('validate()', () => {
70
+ it('should pass validation for valid KMS config', () => {
71
+ const appDefinition = {
72
+ encryption: {
73
+ fieldLevelEncryptionMethod: 'kms',
74
+ createResourceIfNoneFound: true,
75
+ },
76
+ };
77
+
78
+ const result = kmsBuilder.validate(appDefinition);
79
+
80
+ expect(result).toBeInstanceOf(ValidationResult);
81
+ expect(result.valid).toBe(true);
82
+ expect(result.errors).toEqual([]);
83
+ });
84
+
85
+ it('should pass validation when createResourceIfNoneFound is boolean', () => {
86
+ const appDefinition = {
87
+ encryption: {
88
+ fieldLevelEncryptionMethod: 'kms',
89
+ createResourceIfNoneFound: false,
90
+ },
91
+ };
92
+
93
+ const result = kmsBuilder.validate(appDefinition);
94
+
95
+ expect(result.valid).toBe(true);
96
+ });
97
+
98
+ it('should error if encryption configuration is missing', () => {
99
+ const appDefinition = {};
100
+
101
+ const result = kmsBuilder.validate(appDefinition);
102
+
103
+ expect(result.valid).toBe(false);
104
+ expect(result.errors).toContain('Encryption configuration is missing');
105
+ });
106
+
107
+ it('should pass when encryption method is not kms', () => {
108
+ const appDefinition = {
109
+ encryption: {
110
+ fieldLevelEncryptionMethod: 'aes',
111
+ },
112
+ };
113
+
114
+ const result = kmsBuilder.validate(appDefinition);
115
+
116
+ expect(result.valid).toBe(true);
117
+ });
118
+
119
+ it('should error when createResourceIfNoneFound is not boolean', () => {
120
+ const appDefinition = {
121
+ encryption: {
122
+ fieldLevelEncryptionMethod: 'kms',
123
+ createResourceIfNoneFound: 'yes',
124
+ },
125
+ };
126
+
127
+ const result = kmsBuilder.validate(appDefinition);
128
+
129
+ expect(result.valid).toBe(false);
130
+ expect(result.errors).toContain(
131
+ 'encryption.createResourceIfNoneFound must be a boolean'
132
+ );
133
+ });
134
+ });
135
+
136
+ describe('build() - with discovered key', () => {
137
+ it('should use discovered KMS key', async () => {
138
+ const appDefinition = {
139
+ encryption: {
140
+ fieldLevelEncryptionMethod: 'kms',
141
+ },
142
+ };
143
+
144
+ const discoveredResources = {
145
+ defaultKmsKeyId: 'arn:aws:kms:us-east-1:123456:key/abc-123',
146
+ };
147
+
148
+ const result = await kmsBuilder.build(appDefinition, discoveredResources);
149
+
150
+ expect(result.environment.KMS_KEY_ARN).toBe('arn:aws:kms:us-east-1:123456:key/abc-123');
151
+ expect(result.pluginConfig.kmsGrants.kmsKeyId).toBe('arn:aws:kms:us-east-1:123456:key/abc-123');
152
+ });
153
+
154
+ it('should add IAM permissions for KMS operations', async () => {
155
+ const appDefinition = {
156
+ encryption: {
157
+ fieldLevelEncryptionMethod: 'kms',
158
+ },
159
+ };
160
+
161
+ const discoveredResources = {
162
+ defaultKmsKeyId: 'arn:aws:kms:us-east-1:123456:key/abc',
163
+ };
164
+
165
+ const result = await kmsBuilder.build(appDefinition, discoveredResources);
166
+
167
+ expect(result.iamStatements).toHaveLength(1);
168
+ expect(result.iamStatements[0]).toEqual({
169
+ Effect: 'Allow',
170
+ Action: ['kms:GenerateDataKey', 'kms:Decrypt'],
171
+ Resource: 'arn:aws:kms:us-east-1:123456:key/abc',
172
+ });
173
+ });
174
+
175
+ it('should enable serverless-kms-grants plugin', async () => {
176
+ const appDefinition = {
177
+ encryption: {
178
+ fieldLevelEncryptionMethod: 'kms',
179
+ },
180
+ };
181
+
182
+ const discoveredResources = {
183
+ defaultKmsKeyId: 'arn:aws:kms:us-east-1:123456:key/abc',
184
+ };
185
+
186
+ const result = await kmsBuilder.build(appDefinition, discoveredResources);
187
+
188
+ expect(result.plugins).toContain('serverless-kms-grants');
189
+ });
190
+ });
191
+
192
+ describe('build() - create new key', () => {
193
+ it('should create new KMS key when none found and createResourceIfNoneFound is true', async () => {
194
+ const appDefinition = {
195
+ encryption: {
196
+ fieldLevelEncryptionMethod: 'kms',
197
+ createResourceIfNoneFound: true,
198
+ },
199
+ };
200
+
201
+ const discoveredResources = {
202
+ defaultKmsKeyId: null,
203
+ };
204
+
205
+ const result = await kmsBuilder.build(appDefinition, discoveredResources);
206
+
207
+ expect(result.resources.FriggKMSKey).toBeDefined();
208
+ expect(result.resources.FriggKMSKey.Type).toBe('AWS::KMS::Key');
209
+ });
210
+
211
+ it('should create KMS key alias', async () => {
212
+ const appDefinition = {
213
+ encryption: {
214
+ fieldLevelEncryptionMethod: 'kms',
215
+ createResourceIfNoneFound: true,
216
+ },
217
+ };
218
+
219
+ const discoveredResources = {};
220
+
221
+ const result = await kmsBuilder.build(appDefinition, discoveredResources);
222
+
223
+ expect(result.resources.FriggKMSKeyAlias).toBeDefined();
224
+ expect(result.resources.FriggKMSKeyAlias.Type).toBe('AWS::KMS::Alias');
225
+ });
226
+
227
+ it('should enable key rotation for new keys', async () => {
228
+ const appDefinition = {
229
+ encryption: {
230
+ fieldLevelEncryptionMethod: 'kms',
231
+ createResourceIfNoneFound: true,
232
+ },
233
+ };
234
+
235
+ const result = await kmsBuilder.build(appDefinition, {});
236
+
237
+ expect(result.resources.FriggKMSKey.Properties.EnableKeyRotation).toBe(true);
238
+ });
239
+
240
+ it('should use CloudFormation reference for new key', async () => {
241
+ const appDefinition = {
242
+ encryption: {
243
+ fieldLevelEncryptionMethod: 'kms',
244
+ createResourceIfNoneFound: true,
245
+ },
246
+ };
247
+
248
+ const result = await kmsBuilder.build(appDefinition, {});
249
+
250
+ expect(result.environment.KMS_KEY_ARN).toEqual({
251
+ 'Fn::GetAtt': ['FriggKMSKey', 'Arn'],
252
+ });
253
+ });
254
+
255
+ it('should set DeletionPolicy to Retain for key resources', async () => {
256
+ const appDefinition = {
257
+ encryption: {
258
+ fieldLevelEncryptionMethod: 'kms',
259
+ createResourceIfNoneFound: true,
260
+ },
261
+ };
262
+
263
+ const result = await kmsBuilder.build(appDefinition, {});
264
+
265
+ expect(result.resources.FriggKMSKey.DeletionPolicy).toBe('Retain');
266
+ expect(result.resources.FriggKMSKey.UpdateReplacePolicy).toBe('Retain');
267
+ });
268
+ });
269
+
270
+ describe('getDependencies()', () => {
271
+ it('should have no dependencies', () => {
272
+ const deps = kmsBuilder.getDependencies();
273
+
274
+ expect(deps).toEqual([]);
275
+ });
276
+ });
277
+
278
+ describe('getName()', () => {
279
+ it('should return KmsBuilder', () => {
280
+ expect(kmsBuilder.getName()).toBe('KmsBuilder');
281
+ });
282
+ });
283
+
284
+ describe('Key policies', () => {
285
+ it('should create key policy allowing root account admin', async () => {
286
+ const appDefinition = {
287
+ encryption: {
288
+ fieldLevelEncryptionMethod: 'kms',
289
+ createResourceIfNoneFound: true,
290
+ },
291
+ };
292
+
293
+ const result = await kmsBuilder.build(appDefinition, {});
294
+
295
+ const policy = result.resources.FriggKMSKey.Properties.KeyPolicy;
296
+ const rootStatement = policy.Statement.find(s => s.Sid === 'AllowRootAccountAdmin');
297
+
298
+ expect(rootStatement).toBeDefined();
299
+ expect(rootStatement.Action).toBe('kms:*');
300
+ });
301
+
302
+ it('should create key policy allowing Lambda service', async () => {
303
+ const appDefinition = {
304
+ encryption: {
305
+ fieldLevelEncryptionMethod: 'kms',
306
+ createResourceIfNoneFound: true,
307
+ },
308
+ };
309
+
310
+ const result = await kmsBuilder.build(appDefinition, {});
311
+
312
+ const policy = result.resources.FriggKMSKey.Properties.KeyPolicy;
313
+ const lambdaStatement = policy.Statement.find(s => s.Sid === 'AllowLambdaService');
314
+
315
+ expect(lambdaStatement).toBeDefined();
316
+ expect(lambdaStatement.Action).toContain('kms:GenerateDataKey');
317
+ expect(lambdaStatement.Action).toContain('kms:Decrypt');
318
+ });
319
+ });
320
+
321
+ describe('Error handling', () => {
322
+ it('should fallback to environment variable when no key discovered and createResourceIfNoneFound is false', async () => {
323
+ const appDefinition = {
324
+ encryption: {
325
+ fieldLevelEncryptionMethod: 'kms',
326
+ createResourceIfNoneFound: false,
327
+ },
328
+ };
329
+
330
+ const discoveredResources = {
331
+ defaultKmsKeyId: null,
332
+ };
333
+
334
+ const result = await kmsBuilder.build(appDefinition, discoveredResources);
335
+
336
+ expect(result.environment.KMS_KEY_ARN).toBe('${env:AWS_DISCOVERY_KMS_KEY_ID}');
337
+ });
338
+
339
+ it('should fallback to environment variable when createResourceIfNoneFound not specified', async () => {
340
+ const appDefinition = {
341
+ encryption: {
342
+ fieldLevelEncryptionMethod: 'kms',
343
+ },
344
+ };
345
+
346
+ const discoveredResources = {};
347
+
348
+ const result = await kmsBuilder.build(appDefinition, discoveredResources);
349
+
350
+ expect(result.environment.KMS_KEY_ARN).toBe('${env:AWS_DISCOVERY_KMS_KEY_ID}');
351
+ });
352
+ });
353
+ });
354
+
@@ -0,0 +1,80 @@
1
+ /**
2
+ * KMS Discovery Service
3
+ *
4
+ * Domain Service - Hexagonal Architecture
5
+ *
6
+ * Discovers KMS encryption keys using the cloud provider adapter.
7
+ * Adds domain-specific validation and key selection logic.
8
+ */
9
+
10
+ class KmsDiscovery {
11
+ /**
12
+ * @param {CloudProviderAdapter} provider - Cloud provider adapter instance
13
+ */
14
+ constructor(provider) {
15
+ this.provider = provider;
16
+ }
17
+
18
+ /**
19
+ * Discover KMS encryption keys
20
+ *
21
+ * @param {Object} config - Discovery configuration
22
+ * @param {string} [config.keyId] - Specific key ID to discover
23
+ * @param {string} [config.keyAlias] - Key alias to search for
24
+ * @param {string} [config.serviceName] - Service name for filtering
25
+ * @param {string} [config.stage] - Deployment stage
26
+ * @returns {Promise<Object>} Discovered KMS key resources
27
+ */
28
+ async discover(config) {
29
+ console.log('🔍 Discovering KMS keys...');
30
+
31
+ try {
32
+ const rawResources = await this.provider.discoverKmsKeys(config);
33
+
34
+ const result = {
35
+ kmsKeyId: null,
36
+ kmsKeyArn: null,
37
+ kmsKeyAlias: null,
38
+ keys: rawResources.keys,
39
+ aliases: rawResources.aliases,
40
+ };
41
+
42
+ // Use default key if found
43
+ if (rawResources.defaultKey) {
44
+ result.kmsKeyId = rawResources.defaultKey.Arn;
45
+ result.kmsKeyArn = rawResources.defaultKey.Arn;
46
+ result.defaultKmsKeyId = rawResources.defaultKey.Arn;
47
+
48
+ // Find alias for this key
49
+ const keyAlias = rawResources.aliases.find(
50
+ a => a.TargetKeyId === rawResources.defaultKey.KeyId
51
+ );
52
+ if (keyAlias) {
53
+ result.kmsKeyAlias = keyAlias.AliasName;
54
+ }
55
+
56
+ console.log(` ✓ Found KMS key: ${result.kmsKeyId}`);
57
+ if (result.kmsKeyAlias) {
58
+ console.log(` ✓ Key alias: ${result.kmsKeyAlias}`);
59
+ }
60
+ } else {
61
+ console.log(' ℹ No KMS key found');
62
+ }
63
+
64
+ return result;
65
+ } catch (error) {
66
+ console.error(' ✗ KMS discovery failed:', error.message);
67
+ return {
68
+ kmsKeyId: null,
69
+ kmsKeyArn: null,
70
+ defaultKmsKeyId: null,
71
+ kmsKeyAlias: null,
72
+ };
73
+ }
74
+ }
75
+ }
76
+
77
+ module.exports = {
78
+ KmsDiscovery,
79
+ };
80
+
@@ -0,0 +1,176 @@
1
+ /**
2
+ * Tests for KMS Discovery Service
3
+ *
4
+ * Tests KMS encryption key discovery with mocked cloud provider
5
+ */
6
+
7
+ const { KmsDiscovery } = require('./kms-discovery');
8
+
9
+ describe('KmsDiscovery', () => {
10
+ let mockProvider;
11
+ let kmsDiscovery;
12
+
13
+ beforeEach(() => {
14
+ mockProvider = {
15
+ discoverKmsKeys: jest.fn(),
16
+ getName: jest.fn().mockReturnValue('aws'),
17
+ };
18
+ kmsDiscovery = new KmsDiscovery(mockProvider);
19
+ });
20
+
21
+ describe('discover()', () => {
22
+ it('should delegate to provider and transform results', async () => {
23
+ const mockProviderResponse = {
24
+ keys: [
25
+ {
26
+ KeyId: 'key-123',
27
+ Arn: 'arn:aws:kms:us-east-1:123456:key/key-123',
28
+ Enabled: true,
29
+ },
30
+ ],
31
+ aliases: [
32
+ {
33
+ AliasName: 'alias/frigg-key',
34
+ TargetKeyId: 'key-123',
35
+ },
36
+ ],
37
+ defaultKey: {
38
+ KeyId: 'key-123',
39
+ Arn: 'arn:aws:kms:us-east-1:123456:key/key-123',
40
+ Enabled: true,
41
+ },
42
+ };
43
+
44
+ mockProvider.discoverKmsKeys.mockResolvedValue(mockProviderResponse);
45
+
46
+ const result = await kmsDiscovery.discover({});
47
+
48
+ expect(mockProvider.discoverKmsKeys).toHaveBeenCalledWith({});
49
+ expect(result.kmsKeyId).toBe('arn:aws:kms:us-east-1:123456:key/key-123');
50
+ expect(result.kmsKeyArn).toBe('arn:aws:kms:us-east-1:123456:key/key-123');
51
+ expect(result.defaultKmsKeyId).toBe('arn:aws:kms:us-east-1:123456:key/key-123');
52
+ expect(result.kmsKeyAlias).toBe('alias/frigg-key');
53
+ });
54
+
55
+ it('should handle no KMS keys found', async () => {
56
+ mockProvider.discoverKmsKeys.mockResolvedValue({
57
+ keys: [],
58
+ aliases: [],
59
+ defaultKey: null,
60
+ });
61
+
62
+ const result = await kmsDiscovery.discover({});
63
+
64
+ expect(result.kmsKeyId).toBeNull();
65
+ expect(result.kmsKeyArn).toBeNull();
66
+ expect(result.defaultKmsKeyId).toBeNull();
67
+ expect(result.kmsKeyAlias).toBeNull();
68
+ });
69
+
70
+ it('should handle KMS key without alias', async () => {
71
+ mockProvider.discoverKmsKeys.mockResolvedValue({
72
+ keys: [
73
+ {
74
+ KeyId: 'key-456',
75
+ Arn: 'arn:aws:kms:us-east-1:123456:key/key-456',
76
+ Enabled: true,
77
+ },
78
+ ],
79
+ aliases: [],
80
+ defaultKey: {
81
+ KeyId: 'key-456',
82
+ Arn: 'arn:aws:kms:us-east-1:123456:key/key-456',
83
+ Enabled: true,
84
+ },
85
+ });
86
+
87
+ const result = await kmsDiscovery.discover({});
88
+
89
+ expect(result.kmsKeyId).toBe('arn:aws:kms:us-east-1:123456:key/key-456');
90
+ expect(result.kmsKeyAlias).toBeNull();
91
+ });
92
+
93
+ it('should pass config to provider', async () => {
94
+ mockProvider.discoverKmsKeys.mockResolvedValue({
95
+ keys: [],
96
+ aliases: [],
97
+ defaultKey: null,
98
+ });
99
+
100
+ const config = {
101
+ keyId: 'key-specific',
102
+ keyAlias: 'alias/custom',
103
+ serviceName: 'test-service',
104
+ };
105
+
106
+ await kmsDiscovery.discover(config);
107
+
108
+ expect(mockProvider.discoverKmsKeys).toHaveBeenCalledWith(config);
109
+ });
110
+
111
+ it('should handle discovery errors gracefully', async () => {
112
+ mockProvider.discoverKmsKeys.mockRejectedValue(new Error('KMS API Error'));
113
+
114
+ const result = await kmsDiscovery.discover({});
115
+
116
+ expect(result.kmsKeyId).toBeNull();
117
+ expect(result.kmsKeyArn).toBeNull();
118
+ expect(result.defaultKmsKeyId).toBeNull();
119
+ expect(result.kmsKeyAlias).toBeNull();
120
+ });
121
+
122
+ it('should find alias for discovered key', async () => {
123
+ mockProvider.discoverKmsKeys.mockResolvedValue({
124
+ keys: [
125
+ {
126
+ KeyId: 'key-789',
127
+ Arn: 'arn:aws:kms:eu-west-1:123456:key/key-789',
128
+ Enabled: true,
129
+ },
130
+ ],
131
+ aliases: [
132
+ {
133
+ AliasName: 'alias/other-key',
134
+ TargetKeyId: 'key-999',
135
+ },
136
+ {
137
+ AliasName: 'alias/my-key',
138
+ TargetKeyId: 'key-789',
139
+ },
140
+ ],
141
+ defaultKey: {
142
+ KeyId: 'key-789',
143
+ Arn: 'arn:aws:kms:eu-west-1:123456:key/key-789',
144
+ Enabled: true,
145
+ },
146
+ });
147
+
148
+ const result = await kmsDiscovery.discover({});
149
+
150
+ expect(result.kmsKeyAlias).toBe('alias/my-key');
151
+ });
152
+
153
+ it('should return all keys and aliases for reference', async () => {
154
+ const mockKeys = [
155
+ { KeyId: 'key-1', Arn: 'arn:1', Enabled: true },
156
+ { KeyId: 'key-2', Arn: 'arn:2', Enabled: true },
157
+ ];
158
+ const mockAliases = [
159
+ { AliasName: 'alias/one', TargetKeyId: 'key-1' },
160
+ { AliasName: 'alias/two', TargetKeyId: 'key-2' },
161
+ ];
162
+
163
+ mockProvider.discoverKmsKeys.mockResolvedValue({
164
+ keys: mockKeys,
165
+ aliases: mockAliases,
166
+ defaultKey: mockKeys[0],
167
+ });
168
+
169
+ const result = await kmsDiscovery.discover({});
170
+
171
+ expect(result.keys).toEqual(mockKeys);
172
+ expect(result.aliases).toEqual(mockAliases);
173
+ });
174
+ });
175
+ });
176
+