@gugananuvem/aws-local-simulator 1.0.15 → 1.0.16

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (77) hide show
  1. package/README.md +789 -594
  2. package/bin/aws-local-simulator.js +63 -63
  3. package/package.json +2 -2
  4. package/src/config/config-loader.js +114 -114
  5. package/src/config/default-config.js +68 -68
  6. package/src/config/env-loader.js +68 -68
  7. package/src/index.js +146 -146
  8. package/src/index.mjs +123 -123
  9. package/src/server.js +227 -227
  10. package/src/services/apigateway/index.js +75 -73
  11. package/src/services/apigateway/server.js +570 -507
  12. package/src/services/apigateway/simulator.js +1261 -1261
  13. package/src/services/athena/index.js +75 -75
  14. package/src/services/athena/server.js +101 -101
  15. package/src/services/athena/simulador.js +998 -998
  16. package/src/services/athena/simulator.js +346 -346
  17. package/src/services/cloudformation/index.js +106 -106
  18. package/src/services/cloudformation/server.js +417 -417
  19. package/src/services/cloudformation/simulador.js +1045 -1045
  20. package/src/services/cloudtrail/index.js +84 -84
  21. package/src/services/cloudtrail/server.js +235 -235
  22. package/src/services/cloudtrail/simulador.js +719 -719
  23. package/src/services/cloudwatch/index.js +84 -84
  24. package/src/services/cloudwatch/server.js +366 -366
  25. package/src/services/cloudwatch/simulador.js +1173 -1173
  26. package/src/services/cognito/index.js +79 -79
  27. package/src/services/cognito/server.js +301 -301
  28. package/src/services/cognito/simulator.js +1655 -1655
  29. package/src/services/config/index.js +96 -96
  30. package/src/services/config/server.js +215 -215
  31. package/src/services/config/simulador.js +1260 -1260
  32. package/src/services/dynamodb/index.js +74 -74
  33. package/src/services/dynamodb/server.js +125 -125
  34. package/src/services/dynamodb/simulator.js +630 -630
  35. package/src/services/ecs/index.js +65 -65
  36. package/src/services/ecs/server.js +235 -235
  37. package/src/services/ecs/simulator.js +844 -844
  38. package/src/services/eventbridge/index.js +89 -89
  39. package/src/services/eventbridge/server.js +209 -209
  40. package/src/services/eventbridge/simulator.js +684 -684
  41. package/src/services/index.js +45 -45
  42. package/src/services/kms/index.js +75 -75
  43. package/src/services/kms/server.js +67 -67
  44. package/src/services/kms/simulator.js +324 -324
  45. package/src/services/lambda/handler-loader.js +183 -183
  46. package/src/services/lambda/index.js +78 -78
  47. package/src/services/lambda/route-registry.js +274 -274
  48. package/src/services/lambda/server.js +145 -145
  49. package/src/services/lambda/simulator.js +199 -199
  50. package/src/services/parameter-store/index.js +80 -80
  51. package/src/services/parameter-store/server.js +50 -50
  52. package/src/services/parameter-store/simulator.js +201 -201
  53. package/src/services/s3/index.js +73 -73
  54. package/src/services/s3/server.js +329 -329
  55. package/src/services/s3/simulator.js +565 -565
  56. package/src/services/secret-manager/index.js +80 -80
  57. package/src/services/secret-manager/server.js +50 -50
  58. package/src/services/secret-manager/simulator.js +171 -171
  59. package/src/services/sns/index.js +89 -89
  60. package/src/services/sns/server.js +580 -580
  61. package/src/services/sns/simulator.js +1482 -1482
  62. package/src/services/sqs/index.js +98 -93
  63. package/src/services/sqs/server.js +349 -349
  64. package/src/services/sqs/simulator.js +441 -441
  65. package/src/services/sts/index.js +37 -37
  66. package/src/services/sts/server.js +144 -144
  67. package/src/services/sts/simulator.js +69 -69
  68. package/src/services/xray/index.js +83 -83
  69. package/src/services/xray/server.js +308 -308
  70. package/src/services/xray/simulador.js +994 -994
  71. package/src/template/aws-config-template.js +87 -87
  72. package/src/template/aws-config-template.mjs +90 -90
  73. package/src/template/config-template.json +203 -203
  74. package/src/utils/aws-config.js +91 -91
  75. package/src/utils/cloudtrail-audit.js +129 -129
  76. package/src/utils/local-store.js +83 -83
  77. package/src/utils/logger.js +59 -59
@@ -1,80 +1,80 @@
1
- 'use strict';
2
-
3
- /**
4
- * @fileoverview Secrets Manager Service
5
- * Porta padrão: 4001
6
- */
7
-
8
- const http = require('http');
9
- const path = require('path');
10
- const { SecretManagerSimulator } = require('./simulator');
11
- const { SecretManagerServer } = require('./server');
12
- const LocalStore = require('../../utils/local-store');
13
-
14
- class SecretManagerService {
15
- constructor(config) {
16
- this.config = config;
17
- this.logger = require('../../utils/logger');
18
- this.name = 'secret-manager';
19
- this.port = config?.ports?.secretManager || config?.services?.secretManager?.port || 4001;
20
- this.store = null;
21
- this.simulator = null;
22
- this.httpServer = null;
23
- this.isRunning = false;
24
- }
25
-
26
- async initialize() {
27
- this.logger.debug(`Inicializando Secrets Manager Service na porta ${this.port}...`);
28
- const dataDir = process.env.AWS_LOCAL_SIMULATOR_DATA_DIR;
29
- this.store = new LocalStore(path.join(dataDir, 'secret-manager'));
30
- this.simulator = new SecretManagerSimulator(this.store, this.logger, this.config);
31
- await this.simulator.initialize();
32
- this.app = new SecretManagerServer(this.simulator, this.logger, this.config).getApp();
33
- this.logger.debug('Secrets Manager Service inicializado');
34
- }
35
-
36
- injectDependencies(server) {
37
- const ct = server.getService('cloudtrail');
38
- if (ct?.simulator) this.simulator.audit.setTrail(ct.simulator);
39
- }
40
-
41
- async start() {
42
- if (this.isRunning) return;
43
- return new Promise((resolve, reject) => {
44
- this.httpServer = http.createServer(this.app);
45
- this.httpServer.listen(this.port, () => {
46
- this.isRunning = true;
47
- this.logger.debug(`Secrets Manager rodando na porta ${this.port}`);
48
- resolve();
49
- });
50
- this.httpServer.on('error', reject);
51
- });
52
- }
53
-
54
- async stop() {
55
- if (!this.isRunning || !this.httpServer) return;
56
- return new Promise((resolve) => {
57
- this.httpServer.close(() => {
58
- this.isRunning = false;
59
- resolve();
60
- });
61
- });
62
- }
63
-
64
- async reset() {
65
- await this.simulator.reset();
66
- }
67
-
68
- getStatus() {
69
- return {
70
- running: this.isRunning,
71
- port: this.port,
72
- endpoint: `http://localhost:${this.port}`,
73
- secrets: this.simulator?.secrets.size || 0,
74
- };
75
- }
76
-
77
- getSimulator() { return this.simulator; }
78
- }
79
-
80
- module.exports = { SecretManagerService };
1
+ 'use strict';
2
+
3
+ /**
4
+ * @fileoverview Secrets Manager Service
5
+ * Porta padrão: 4001
6
+ */
7
+
8
+ const http = require('http');
9
+ const path = require('path');
10
+ const { SecretManagerSimulator } = require('./simulator');
11
+ const { SecretManagerServer } = require('./server');
12
+ const LocalStore = require('../../utils/local-store');
13
+
14
+ class SecretManagerService {
15
+ constructor(config) {
16
+ this.config = config;
17
+ this.logger = require('../../utils/logger');
18
+ this.name = 'secret-manager';
19
+ this.port = config?.ports?.secretManager || config?.services?.secretManager?.port || 4001;
20
+ this.store = null;
21
+ this.simulator = null;
22
+ this.httpServer = null;
23
+ this.isRunning = false;
24
+ }
25
+
26
+ async initialize() {
27
+ this.logger.debug(`Inicializando Secrets Manager Service na porta ${this.port}...`);
28
+ const dataDir = process.env.AWS_LOCAL_SIMULATOR_DATA_DIR;
29
+ this.store = new LocalStore(path.join(dataDir, 'secret-manager'));
30
+ this.simulator = new SecretManagerSimulator(this.store, this.logger, this.config);
31
+ await this.simulator.initialize();
32
+ this.app = new SecretManagerServer(this.simulator, this.logger, this.config).getApp();
33
+ this.logger.debug('Secrets Manager Service inicializado');
34
+ }
35
+
36
+ injectDependencies(server) {
37
+ const ct = server.getService('cloudtrail');
38
+ if (ct?.simulator) this.simulator.audit.setTrail(ct.simulator);
39
+ }
40
+
41
+ async start() {
42
+ if (this.isRunning) return;
43
+ return new Promise((resolve, reject) => {
44
+ this.httpServer = http.createServer(this.app);
45
+ this.httpServer.listen(this.port, () => {
46
+ this.isRunning = true;
47
+ this.logger.debug(`Secrets Manager rodando na porta ${this.port}`);
48
+ resolve();
49
+ });
50
+ this.httpServer.on('error', reject);
51
+ });
52
+ }
53
+
54
+ async stop() {
55
+ if (!this.isRunning || !this.httpServer) return;
56
+ return new Promise((resolve) => {
57
+ this.httpServer.close(() => {
58
+ this.isRunning = false;
59
+ resolve();
60
+ });
61
+ });
62
+ }
63
+
64
+ async reset() {
65
+ await this.simulator.reset();
66
+ }
67
+
68
+ getStatus() {
69
+ return {
70
+ running: this.isRunning,
71
+ port: this.port,
72
+ endpoint: `http://localhost:${this.port}`,
73
+ secrets: this.simulator?.secrets.size || 0,
74
+ };
75
+ }
76
+
77
+ getSimulator() { return this.simulator; }
78
+ }
79
+
80
+ module.exports = { SecretManagerService };
@@ -1,50 +1,50 @@
1
- 'use strict';
2
-
3
- const express = require('express');
4
- const cors = require('cors');
5
-
6
- class SecretManagerServer {
7
- constructor(simulator, logger, config) {
8
- this.simulator = simulator; this.logger = logger; this.config = config;
9
- this.app = express();
10
- this._setupMiddleware(); this._setupRoutes();
11
- }
12
- _setupMiddleware() {
13
- if (this.config.cors?.enabled !== false) this.app.use(cors({ origin: this.config.cors?.origin || '*' }));
14
- this.app.use(express.json({ limit: '5mb', type: ['application/json', 'application/x-amz-json-1.1'] }));
15
- }
16
- _getOperation(target) {
17
- const map = {
18
- 'secretsmanager.CreateSecret': 'createSecret',
19
- 'secretsmanager.GetSecretValue': 'getSecretValue',
20
- 'secretsmanager.PutSecretValue': 'putSecretValue',
21
- 'secretsmanager.UpdateSecret': 'updateSecret',
22
- 'secretsmanager.DeleteSecret': 'deleteSecret',
23
- 'secretsmanager.RestoreSecret': 'restoreSecret',
24
- 'secretsmanager.ListSecrets': 'listSecrets',
25
- 'secretsmanager.DescribeSecret': 'describeSecret',
26
- 'secretsmanager.RotateSecret': 'rotateSecret',
27
- 'secretsmanager.TagResource': 'tagResource',
28
- 'secretsmanager.UntagResource': 'untagResource',
29
- };
30
- return map[target];
31
- }
32
- _setupRoutes() {
33
- this.app.get('/__admin/health', (req, res) => res.json({ status: 'healthy', service: 'secret-manager', timestamp: new Date().toISOString() }));
34
- this.app.post('/', async (req, res) => {
35
- const target = req.headers['x-amz-target'];
36
- const operation = this._getOperation(target);
37
- if (!operation) return res.status(400).json({ __type: 'UnknownOperationException', message: `Unknown: ${target}` });
38
- try {
39
- const result = await this.simulator[operation](req.body || {});
40
- res.json(result || {});
41
- } catch (err) {
42
- this.logger.error(`SecretsManager ${target}: ${err.message}`, 'secret-manager');
43
- res.status(err.code === 'ResourceNotFoundException' ? 404 : 400).json({ __type: err.code || 'InternalServiceError', Message: err.message });
44
- }
45
- });
46
- }
47
- getApp() { return this.app; }
48
- }
49
-
50
- module.exports = { SecretManagerServer };
1
+ 'use strict';
2
+
3
+ const express = require('express');
4
+ const cors = require('cors');
5
+
6
+ class SecretManagerServer {
7
+ constructor(simulator, logger, config) {
8
+ this.simulator = simulator; this.logger = logger; this.config = config;
9
+ this.app = express();
10
+ this._setupMiddleware(); this._setupRoutes();
11
+ }
12
+ _setupMiddleware() {
13
+ if (this.config.cors?.enabled !== false) this.app.use(cors({ origin: this.config.cors?.origin || '*' }));
14
+ this.app.use(express.json({ limit: '5mb', type: ['application/json', 'application/x-amz-json-1.1'] }));
15
+ }
16
+ _getOperation(target) {
17
+ const map = {
18
+ 'secretsmanager.CreateSecret': 'createSecret',
19
+ 'secretsmanager.GetSecretValue': 'getSecretValue',
20
+ 'secretsmanager.PutSecretValue': 'putSecretValue',
21
+ 'secretsmanager.UpdateSecret': 'updateSecret',
22
+ 'secretsmanager.DeleteSecret': 'deleteSecret',
23
+ 'secretsmanager.RestoreSecret': 'restoreSecret',
24
+ 'secretsmanager.ListSecrets': 'listSecrets',
25
+ 'secretsmanager.DescribeSecret': 'describeSecret',
26
+ 'secretsmanager.RotateSecret': 'rotateSecret',
27
+ 'secretsmanager.TagResource': 'tagResource',
28
+ 'secretsmanager.UntagResource': 'untagResource',
29
+ };
30
+ return map[target];
31
+ }
32
+ _setupRoutes() {
33
+ this.app.get('/__admin/health', (req, res) => res.json({ status: 'healthy', service: 'secret-manager', timestamp: new Date().toISOString() }));
34
+ this.app.post('/', async (req, res) => {
35
+ const target = req.headers['x-amz-target'];
36
+ const operation = this._getOperation(target);
37
+ if (!operation) return res.status(400).json({ __type: 'UnknownOperationException', message: `Unknown: ${target}` });
38
+ try {
39
+ const result = await this.simulator[operation](req.body || {});
40
+ res.json(result || {});
41
+ } catch (err) {
42
+ this.logger.error(`SecretsManager ${target}: ${err.message}`, 'secret-manager');
43
+ res.status(err.code === 'ResourceNotFoundException' ? 404 : 400).json({ __type: err.code || 'InternalServiceError', Message: err.message });
44
+ }
45
+ });
46
+ }
47
+ getApp() { return this.app; }
48
+ }
49
+
50
+ module.exports = { SecretManagerServer };
@@ -1,171 +1,171 @@
1
- 'use strict';
2
-
3
- const crypto = require('crypto');
4
- const { v4: uuidv4 } = require('uuid');
5
- const { CloudTrailAudit } = require('../../utils/cloudtrail-audit');
6
-
7
- /**
8
- * Secrets Manager Simulator
9
- */
10
- class SecretManagerSimulator {
11
- constructor(store, logger, config) {
12
- this.store = store; this.logger = logger; this.config = config;
13
- this.secrets = new Map();
14
- this.audit = new CloudTrailAudit('secretsmanager.amazonaws.com');
15
- }
16
-
17
- async initialize() {
18
- try {
19
- const secrets = await this.store.read('secret-manager/secrets');
20
- if (Array.isArray(secrets)) for (const s of secrets) this.secrets.set(s.Name, s);
21
- this.logger.info('SecretsManager: dados carregados', 'secret-manager');
22
- } catch { this.logger.debug('SecretsManager: sem dados anteriores', 'secret-manager'); }
23
- }
24
-
25
- async _persist() { await this.store.write('secret-manager/secrets', null, Array.from(this.secrets.values())); }
26
-
27
- _requireSecret(id) {
28
- const s = this.secrets.get(id) || Array.from(this.secrets.values()).find(s => s.ARN === id);
29
- if (!s) { const err = new Error(`Secret not found: ${id}`); err.code = 'ResourceNotFoundException'; throw err; }
30
- return s;
31
- }
32
-
33
- async createSecret(params) {
34
- const { Name, SecretString, SecretBinary, Description, Tags = [], KmsKeyId } = params;
35
- if (this.secrets.has(Name)) { const err = new Error(`Secret already exists: ${Name}`); err.code = 'ResourceExistsException'; throw err; }
36
- const secretId = uuidv4();
37
- const secret = {
38
- ARN: `arn:aws:secretsmanager:local:000000000000:secret:${Name}-${secretId.slice(0, 6)}`,
39
- Name, Description: Description || '', Tags,
40
- KmsKeyId: KmsKeyId || 'aws/secretsmanager',
41
- CreatedDate: new Date().toISOString(),
42
- LastChangedDate: new Date().toISOString(),
43
- LastAccessedDate: null,
44
- RotationEnabled: false,
45
- VersionsToStages: { [secretId]: ['AWSCURRENT'] },
46
- _versions: { [secretId]: { SecretString, SecretBinary, CreatedDate: new Date().toISOString() } }
47
- };
48
- this.secrets.set(Name, secret);
49
- await this._persist();
50
- this.logger.info(`SecretsManager: secret criado: ${Name}`, 'secret-manager');
51
- this.audit.record({ eventName: 'CreateSecret', readOnly: false, resources: [{ ARN: secret.ARN, type: 'AWS::SecretsManager::Secret' }], requestParameters: { name: Name } });
52
- return { ARN: secret.ARN, Name, VersionId: secretId };
53
- }
54
-
55
- async getSecretValue(params) {
56
- const { SecretId, VersionId, VersionStage = 'AWSCURRENT' } = params;
57
- const secret = this._requireSecret(SecretId);
58
- secret.LastAccessedDate = new Date().toISOString();
59
- let versionId = VersionId;
60
- if (!versionId) {
61
- versionId = Object.entries(secret.VersionsToStages).find(([, stages]) => stages.includes(VersionStage))?.[0];
62
- }
63
- const version = versionId ? secret._versions[versionId] : null;
64
- if (!version) { const err = new Error('Secret version not found'); err.code = 'ResourceNotFoundException'; throw err; }
65
- this.audit.record({ eventName: 'GetSecretValue', readOnly: true, isDataEvent: true, resources: [{ ARN: secret.ARN, type: 'AWS::SecretsManager::Secret' }], requestParameters: { secretId: SecretId } });
66
- return {
67
- ARN: secret.ARN, Name: secret.Name, VersionId: versionId,
68
- SecretString: version.SecretString, SecretBinary: version.SecretBinary,
69
- VersionStages: secret.VersionsToStages[versionId] || [],
70
- CreatedDate: version.CreatedDate
71
- };
72
- }
73
-
74
- async putSecretValue(params) {
75
- const { SecretId, SecretString, SecretBinary, VersionStages = ['AWSCURRENT'] } = params;
76
- const secret = this._requireSecret(SecretId);
77
- const versionId = uuidv4();
78
- // Move AWSCURRENT to AWSPREVIOUS
79
- for (const [vid, stages] of Object.entries(secret.VersionsToStages)) {
80
- if (stages.includes('AWSCURRENT')) {
81
- secret.VersionsToStages[vid] = stages.filter(s => s !== 'AWSCURRENT').concat(['AWSPREVIOUS']);
82
- }
83
- }
84
- secret._versions[versionId] = { SecretString, SecretBinary, CreatedDate: new Date().toISOString() };
85
- secret.VersionsToStages[versionId] = VersionStages;
86
- secret.LastChangedDate = new Date().toISOString();
87
- await this._persist();
88
- return { ARN: secret.ARN, Name: secret.Name, VersionId: versionId, VersionStages };
89
- }
90
-
91
- async updateSecret(params) {
92
- const { SecretId, SecretString, SecretBinary, Description, KmsKeyId } = params;
93
- const secret = this._requireSecret(SecretId);
94
- if (Description !== undefined) secret.Description = Description;
95
- if (KmsKeyId !== undefined) secret.KmsKeyId = KmsKeyId;
96
- if (SecretString !== undefined || SecretBinary !== undefined) {
97
- return this.putSecretValue({ SecretId, SecretString, SecretBinary });
98
- }
99
- await this._persist();
100
- return { ARN: secret.ARN, Name: secret.Name };
101
- }
102
-
103
- async deleteSecret(params) {
104
- const { SecretId, RecoveryWindowInDays = 30, ForceDeleteWithoutRecovery } = params;
105
- const secret = this._requireSecret(SecretId);
106
- const deletionDate = ForceDeleteWithoutRecovery ? new Date().toISOString() : new Date(Date.now() + RecoveryWindowInDays * 86400000).toISOString();
107
- secret.DeletedDate = new Date().toISOString();
108
- secret.DeletionDate = deletionDate;
109
- if (ForceDeleteWithoutRecovery) this.secrets.delete(secret.Name);
110
- await this._persist();
111
- this.audit.record({ eventName: 'DeleteSecret', readOnly: false, resources: [{ ARN: secret.ARN, type: 'AWS::SecretsManager::Secret' }], requestParameters: { secretId: SecretId } });
112
- return { ARN: secret.ARN, Name: secret.Name, DeletionDate: deletionDate };
113
- }
114
-
115
- async restoreSecret(params) {
116
- const secret = this._requireSecret(params.SecretId);
117
- delete secret.DeletedDate; delete secret.DeletionDate;
118
- await this._persist();
119
- return { ARN: secret.ARN, Name: secret.Name };
120
- }
121
-
122
- async listSecrets(params) {
123
- const { MaxResults = 100, NextToken, Filters = [] } = params || {};
124
- let secrets = Array.from(this.secrets.values());
125
- for (const filter of Filters) {
126
- if (filter.Key === 'name') secrets = secrets.filter(s => filter.Values.some(v => s.Name.includes(v)));
127
- }
128
- let startIdx = 0;
129
- if (NextToken) startIdx = parseInt(NextToken);
130
- const slice = secrets.slice(startIdx, startIdx + MaxResults);
131
- return {
132
- SecretList: slice.map(s => ({ ARN: s.ARN, Name: s.Name, Description: s.Description, CreatedDate: s.CreatedDate, LastChangedDate: s.LastChangedDate, Tags: s.Tags })),
133
- NextToken: secrets.length > startIdx + MaxResults ? String(startIdx + MaxResults) : undefined
134
- };
135
- }
136
-
137
- async describeSecret(params) {
138
- const secret = this._requireSecret(params.SecretId);
139
- const { _versions, ...clean } = secret;
140
- return clean;
141
- }
142
-
143
- async rotateSecret(params) {
144
- const { SecretId, RotationLambdaARN, RotationRules } = params;
145
- const secret = this._requireSecret(SecretId);
146
- secret.RotationEnabled = true;
147
- secret.RotationLambdaARN = RotationLambdaARN;
148
- secret.RotationRules = RotationRules;
149
- secret.LastRotatedDate = new Date().toISOString();
150
- await this._persist();
151
- return { ARN: secret.ARN, Name: secret.Name };
152
- }
153
-
154
- async tagResource(params) {
155
- const { SecretId, Tags } = params;
156
- const secret = this._requireSecret(SecretId);
157
- for (const tag of Tags) { const existing = secret.Tags.findIndex(t => t.Key === tag.Key); if (existing >= 0) secret.Tags[existing] = tag; else secret.Tags.push(tag); }
158
- await this._persist(); return {};
159
- }
160
-
161
- async untagResource(params) {
162
- const { SecretId, TagKeys } = params;
163
- const secret = this._requireSecret(SecretId);
164
- secret.Tags = secret.Tags.filter(t => !TagKeys.includes(t.Key));
165
- await this._persist(); return {};
166
- }
167
-
168
- async reset() { this.secrets.clear(); await this.store.clear('secret-manager'); }
169
- }
170
-
171
- module.exports = { SecretManagerSimulator };
1
+ 'use strict';
2
+
3
+ const crypto = require('crypto');
4
+ const { v4: uuidv4 } = require('uuid');
5
+ const { CloudTrailAudit } = require('../../utils/cloudtrail-audit');
6
+
7
+ /**
8
+ * Secrets Manager Simulator
9
+ */
10
+ class SecretManagerSimulator {
11
+ constructor(store, logger, config) {
12
+ this.store = store; this.logger = logger; this.config = config;
13
+ this.secrets = new Map();
14
+ this.audit = new CloudTrailAudit('secretsmanager.amazonaws.com');
15
+ }
16
+
17
+ async initialize() {
18
+ try {
19
+ const secrets = await this.store.read('secret-manager/secrets');
20
+ if (Array.isArray(secrets)) for (const s of secrets) this.secrets.set(s.Name, s);
21
+ this.logger.info('SecretsManager: dados carregados', 'secret-manager');
22
+ } catch { this.logger.debug('SecretsManager: sem dados anteriores', 'secret-manager'); }
23
+ }
24
+
25
+ async _persist() { await this.store.write('secret-manager/secrets', null, Array.from(this.secrets.values())); }
26
+
27
+ _requireSecret(id) {
28
+ const s = this.secrets.get(id) || Array.from(this.secrets.values()).find(s => s.ARN === id);
29
+ if (!s) { const err = new Error(`Secret not found: ${id}`); err.code = 'ResourceNotFoundException'; throw err; }
30
+ return s;
31
+ }
32
+
33
+ async createSecret(params) {
34
+ const { Name, SecretString, SecretBinary, Description, Tags = [], KmsKeyId } = params;
35
+ if (this.secrets.has(Name)) { const err = new Error(`Secret already exists: ${Name}`); err.code = 'ResourceExistsException'; throw err; }
36
+ const secretId = uuidv4();
37
+ const secret = {
38
+ ARN: `arn:aws:secretsmanager:local:000000000000:secret:${Name}-${secretId.slice(0, 6)}`,
39
+ Name, Description: Description || '', Tags,
40
+ KmsKeyId: KmsKeyId || 'aws/secretsmanager',
41
+ CreatedDate: new Date().toISOString(),
42
+ LastChangedDate: new Date().toISOString(),
43
+ LastAccessedDate: null,
44
+ RotationEnabled: false,
45
+ VersionsToStages: { [secretId]: ['AWSCURRENT'] },
46
+ _versions: { [secretId]: { SecretString, SecretBinary, CreatedDate: new Date().toISOString() } }
47
+ };
48
+ this.secrets.set(Name, secret);
49
+ await this._persist();
50
+ this.logger.info(`SecretsManager: secret criado: ${Name}`, 'secret-manager');
51
+ this.audit.record({ eventName: 'CreateSecret', readOnly: false, resources: [{ ARN: secret.ARN, type: 'AWS::SecretsManager::Secret' }], requestParameters: { name: Name } });
52
+ return { ARN: secret.ARN, Name, VersionId: secretId };
53
+ }
54
+
55
+ async getSecretValue(params) {
56
+ const { SecretId, VersionId, VersionStage = 'AWSCURRENT' } = params;
57
+ const secret = this._requireSecret(SecretId);
58
+ secret.LastAccessedDate = new Date().toISOString();
59
+ let versionId = VersionId;
60
+ if (!versionId) {
61
+ versionId = Object.entries(secret.VersionsToStages).find(([, stages]) => stages.includes(VersionStage))?.[0];
62
+ }
63
+ const version = versionId ? secret._versions[versionId] : null;
64
+ if (!version) { const err = new Error('Secret version not found'); err.code = 'ResourceNotFoundException'; throw err; }
65
+ this.audit.record({ eventName: 'GetSecretValue', readOnly: true, isDataEvent: true, resources: [{ ARN: secret.ARN, type: 'AWS::SecretsManager::Secret' }], requestParameters: { secretId: SecretId } });
66
+ return {
67
+ ARN: secret.ARN, Name: secret.Name, VersionId: versionId,
68
+ SecretString: version.SecretString, SecretBinary: version.SecretBinary,
69
+ VersionStages: secret.VersionsToStages[versionId] || [],
70
+ CreatedDate: version.CreatedDate
71
+ };
72
+ }
73
+
74
+ async putSecretValue(params) {
75
+ const { SecretId, SecretString, SecretBinary, VersionStages = ['AWSCURRENT'] } = params;
76
+ const secret = this._requireSecret(SecretId);
77
+ const versionId = uuidv4();
78
+ // Move AWSCURRENT to AWSPREVIOUS
79
+ for (const [vid, stages] of Object.entries(secret.VersionsToStages)) {
80
+ if (stages.includes('AWSCURRENT')) {
81
+ secret.VersionsToStages[vid] = stages.filter(s => s !== 'AWSCURRENT').concat(['AWSPREVIOUS']);
82
+ }
83
+ }
84
+ secret._versions[versionId] = { SecretString, SecretBinary, CreatedDate: new Date().toISOString() };
85
+ secret.VersionsToStages[versionId] = VersionStages;
86
+ secret.LastChangedDate = new Date().toISOString();
87
+ await this._persist();
88
+ return { ARN: secret.ARN, Name: secret.Name, VersionId: versionId, VersionStages };
89
+ }
90
+
91
+ async updateSecret(params) {
92
+ const { SecretId, SecretString, SecretBinary, Description, KmsKeyId } = params;
93
+ const secret = this._requireSecret(SecretId);
94
+ if (Description !== undefined) secret.Description = Description;
95
+ if (KmsKeyId !== undefined) secret.KmsKeyId = KmsKeyId;
96
+ if (SecretString !== undefined || SecretBinary !== undefined) {
97
+ return this.putSecretValue({ SecretId, SecretString, SecretBinary });
98
+ }
99
+ await this._persist();
100
+ return { ARN: secret.ARN, Name: secret.Name };
101
+ }
102
+
103
+ async deleteSecret(params) {
104
+ const { SecretId, RecoveryWindowInDays = 30, ForceDeleteWithoutRecovery } = params;
105
+ const secret = this._requireSecret(SecretId);
106
+ const deletionDate = ForceDeleteWithoutRecovery ? new Date().toISOString() : new Date(Date.now() + RecoveryWindowInDays * 86400000).toISOString();
107
+ secret.DeletedDate = new Date().toISOString();
108
+ secret.DeletionDate = deletionDate;
109
+ if (ForceDeleteWithoutRecovery) this.secrets.delete(secret.Name);
110
+ await this._persist();
111
+ this.audit.record({ eventName: 'DeleteSecret', readOnly: false, resources: [{ ARN: secret.ARN, type: 'AWS::SecretsManager::Secret' }], requestParameters: { secretId: SecretId } });
112
+ return { ARN: secret.ARN, Name: secret.Name, DeletionDate: deletionDate };
113
+ }
114
+
115
+ async restoreSecret(params) {
116
+ const secret = this._requireSecret(params.SecretId);
117
+ delete secret.DeletedDate; delete secret.DeletionDate;
118
+ await this._persist();
119
+ return { ARN: secret.ARN, Name: secret.Name };
120
+ }
121
+
122
+ async listSecrets(params) {
123
+ const { MaxResults = 100, NextToken, Filters = [] } = params || {};
124
+ let secrets = Array.from(this.secrets.values());
125
+ for (const filter of Filters) {
126
+ if (filter.Key === 'name') secrets = secrets.filter(s => filter.Values.some(v => s.Name.includes(v)));
127
+ }
128
+ let startIdx = 0;
129
+ if (NextToken) startIdx = parseInt(NextToken);
130
+ const slice = secrets.slice(startIdx, startIdx + MaxResults);
131
+ return {
132
+ SecretList: slice.map(s => ({ ARN: s.ARN, Name: s.Name, Description: s.Description, CreatedDate: s.CreatedDate, LastChangedDate: s.LastChangedDate, Tags: s.Tags })),
133
+ NextToken: secrets.length > startIdx + MaxResults ? String(startIdx + MaxResults) : undefined
134
+ };
135
+ }
136
+
137
+ async describeSecret(params) {
138
+ const secret = this._requireSecret(params.SecretId);
139
+ const { _versions, ...clean } = secret;
140
+ return clean;
141
+ }
142
+
143
+ async rotateSecret(params) {
144
+ const { SecretId, RotationLambdaARN, RotationRules } = params;
145
+ const secret = this._requireSecret(SecretId);
146
+ secret.RotationEnabled = true;
147
+ secret.RotationLambdaARN = RotationLambdaARN;
148
+ secret.RotationRules = RotationRules;
149
+ secret.LastRotatedDate = new Date().toISOString();
150
+ await this._persist();
151
+ return { ARN: secret.ARN, Name: secret.Name };
152
+ }
153
+
154
+ async tagResource(params) {
155
+ const { SecretId, Tags } = params;
156
+ const secret = this._requireSecret(SecretId);
157
+ for (const tag of Tags) { const existing = secret.Tags.findIndex(t => t.Key === tag.Key); if (existing >= 0) secret.Tags[existing] = tag; else secret.Tags.push(tag); }
158
+ await this._persist(); return {};
159
+ }
160
+
161
+ async untagResource(params) {
162
+ const { SecretId, TagKeys } = params;
163
+ const secret = this._requireSecret(SecretId);
164
+ secret.Tags = secret.Tags.filter(t => !TagKeys.includes(t.Key));
165
+ await this._persist(); return {};
166
+ }
167
+
168
+ async reset() { this.secrets.clear(); await this.store.clear('secret-manager'); }
169
+ }
170
+
171
+ module.exports = { SecretManagerSimulator };