@stacksjs/ts-cloud-core 0.1.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (251) hide show
  1. package/LICENSE.md +21 -0
  2. package/README.md +321 -0
  3. package/package.json +31 -0
  4. package/src/advanced-features.test.ts +465 -0
  5. package/src/aws/cloudformation.ts +421 -0
  6. package/src/aws/cloudfront.ts +158 -0
  7. package/src/aws/credentials.test.ts +132 -0
  8. package/src/aws/credentials.ts +545 -0
  9. package/src/aws/index.ts +87 -0
  10. package/src/aws/s3.test.ts +188 -0
  11. package/src/aws/s3.ts +1088 -0
  12. package/src/aws/signature.test.ts +670 -0
  13. package/src/aws/signature.ts +1155 -0
  14. package/src/backup/disaster-recovery.test.ts +726 -0
  15. package/src/backup/disaster-recovery.ts +500 -0
  16. package/src/backup/index.ts +34 -0
  17. package/src/backup/manager.test.ts +498 -0
  18. package/src/backup/manager.ts +432 -0
  19. package/src/cicd/circleci.ts +430 -0
  20. package/src/cicd/github-actions.ts +424 -0
  21. package/src/cicd/gitlab-ci.ts +255 -0
  22. package/src/cicd/index.ts +8 -0
  23. package/src/cli/history.ts +396 -0
  24. package/src/cli/index.ts +10 -0
  25. package/src/cli/progress.ts +458 -0
  26. package/src/cli/repl.ts +454 -0
  27. package/src/cli/suggestions.ts +327 -0
  28. package/src/cli/table.test.ts +319 -0
  29. package/src/cli/table.ts +332 -0
  30. package/src/cloudformation/builder.test.ts +327 -0
  31. package/src/cloudformation/builder.ts +378 -0
  32. package/src/cloudformation/builders/api-gateway.ts +449 -0
  33. package/src/cloudformation/builders/cache.ts +334 -0
  34. package/src/cloudformation/builders/cdn.ts +278 -0
  35. package/src/cloudformation/builders/compute.ts +485 -0
  36. package/src/cloudformation/builders/database.ts +392 -0
  37. package/src/cloudformation/builders/functions.ts +343 -0
  38. package/src/cloudformation/builders/messaging.ts +140 -0
  39. package/src/cloudformation/builders/monitoring.ts +300 -0
  40. package/src/cloudformation/builders/network.ts +264 -0
  41. package/src/cloudformation/builders/queue.ts +147 -0
  42. package/src/cloudformation/builders/security.ts +399 -0
  43. package/src/cloudformation/builders/storage.ts +285 -0
  44. package/src/cloudformation/index.ts +30 -0
  45. package/src/cloudformation/types.ts +173 -0
  46. package/src/compliance/aws-config.ts +543 -0
  47. package/src/compliance/cloudtrail.ts +376 -0
  48. package/src/compliance/compliance.test.ts +423 -0
  49. package/src/compliance/guardduty.ts +446 -0
  50. package/src/compliance/index.ts +66 -0
  51. package/src/compliance/security-hub.ts +456 -0
  52. package/src/containers/build-optimization.ts +416 -0
  53. package/src/containers/containers.test.ts +508 -0
  54. package/src/containers/image-scanning.ts +360 -0
  55. package/src/containers/index.ts +9 -0
  56. package/src/containers/registry.ts +293 -0
  57. package/src/containers/service-mesh.ts +520 -0
  58. package/src/database/database.test.ts +762 -0
  59. package/src/database/index.ts +9 -0
  60. package/src/database/migrations.ts +444 -0
  61. package/src/database/performance.ts +528 -0
  62. package/src/database/replicas.ts +534 -0
  63. package/src/database/users.ts +494 -0
  64. package/src/dependency-graph.ts +143 -0
  65. package/src/deployment/ab-testing.ts +582 -0
  66. package/src/deployment/blue-green.ts +452 -0
  67. package/src/deployment/canary.ts +500 -0
  68. package/src/deployment/deployment.test.ts +526 -0
  69. package/src/deployment/index.ts +61 -0
  70. package/src/deployment/progressive.ts +62 -0
  71. package/src/dns/dns.test.ts +641 -0
  72. package/src/dns/dnssec.ts +315 -0
  73. package/src/dns/index.ts +8 -0
  74. package/src/dns/resolver.ts +496 -0
  75. package/src/dns/routing.ts +593 -0
  76. package/src/email/advanced/analytics.ts +445 -0
  77. package/src/email/advanced/index.ts +11 -0
  78. package/src/email/advanced/rules.ts +465 -0
  79. package/src/email/advanced/scheduling.ts +352 -0
  80. package/src/email/advanced/search.ts +412 -0
  81. package/src/email/advanced/shared-mailboxes.ts +404 -0
  82. package/src/email/advanced/templates.ts +455 -0
  83. package/src/email/advanced/threading.ts +281 -0
  84. package/src/email/analytics.ts +467 -0
  85. package/src/email/bounce-handling.ts +425 -0
  86. package/src/email/email.test.ts +431 -0
  87. package/src/email/handlers/__tests__/inbound.test.ts +38 -0
  88. package/src/email/handlers/__tests__/outbound.test.ts +37 -0
  89. package/src/email/handlers/converter.ts +227 -0
  90. package/src/email/handlers/feedback.ts +228 -0
  91. package/src/email/handlers/inbound.ts +169 -0
  92. package/src/email/handlers/outbound.ts +178 -0
  93. package/src/email/index.ts +15 -0
  94. package/src/email/reputation.ts +303 -0
  95. package/src/email/templates.ts +352 -0
  96. package/src/errors/index.test.ts +434 -0
  97. package/src/errors/index.ts +416 -0
  98. package/src/health-checks/index.ts +40 -0
  99. package/src/index.ts +360 -0
  100. package/src/intrinsic-functions.ts +118 -0
  101. package/src/lambda/concurrency.ts +330 -0
  102. package/src/lambda/destinations.ts +345 -0
  103. package/src/lambda/dlq.ts +425 -0
  104. package/src/lambda/index.ts +11 -0
  105. package/src/lambda/lambda.test.ts +840 -0
  106. package/src/lambda/layers.ts +263 -0
  107. package/src/lambda/versions.ts +376 -0
  108. package/src/lambda/vpc.ts +399 -0
  109. package/src/local/config.ts +114 -0
  110. package/src/local/index.ts +6 -0
  111. package/src/local/mock-aws.ts +351 -0
  112. package/src/modules/ai.ts +340 -0
  113. package/src/modules/api.ts +478 -0
  114. package/src/modules/auth.ts +805 -0
  115. package/src/modules/cache.ts +417 -0
  116. package/src/modules/cdn.ts +1062 -0
  117. package/src/modules/communication.ts +1094 -0
  118. package/src/modules/compute.ts +3348 -0
  119. package/src/modules/database.ts +554 -0
  120. package/src/modules/deployment.ts +1079 -0
  121. package/src/modules/dns.ts +337 -0
  122. package/src/modules/email.ts +1538 -0
  123. package/src/modules/filesystem.ts +515 -0
  124. package/src/modules/index.ts +32 -0
  125. package/src/modules/messaging.ts +486 -0
  126. package/src/modules/monitoring.ts +2086 -0
  127. package/src/modules/network.ts +664 -0
  128. package/src/modules/parameter-store.ts +325 -0
  129. package/src/modules/permissions.ts +1081 -0
  130. package/src/modules/phone.ts +494 -0
  131. package/src/modules/queue.ts +1260 -0
  132. package/src/modules/redirects.ts +464 -0
  133. package/src/modules/registry.ts +699 -0
  134. package/src/modules/search.ts +401 -0
  135. package/src/modules/secrets.ts +416 -0
  136. package/src/modules/security.ts +731 -0
  137. package/src/modules/sms.ts +389 -0
  138. package/src/modules/storage.ts +1120 -0
  139. package/src/modules/workflow.ts +680 -0
  140. package/src/multi-account/config.ts +521 -0
  141. package/src/multi-account/index.ts +7 -0
  142. package/src/multi-account/manager.ts +427 -0
  143. package/src/multi-region/cross-region.ts +410 -0
  144. package/src/multi-region/index.ts +8 -0
  145. package/src/multi-region/manager.ts +483 -0
  146. package/src/multi-region/regions.ts +435 -0
  147. package/src/network-security/index.ts +48 -0
  148. package/src/observability/index.ts +9 -0
  149. package/src/observability/logs.ts +522 -0
  150. package/src/observability/metrics.ts +460 -0
  151. package/src/observability/observability.test.ts +782 -0
  152. package/src/observability/synthetics.ts +568 -0
  153. package/src/observability/xray.ts +358 -0
  154. package/src/phone/advanced/analytics.ts +349 -0
  155. package/src/phone/advanced/callbacks.ts +428 -0
  156. package/src/phone/advanced/index.ts +8 -0
  157. package/src/phone/advanced/ivr-builder.ts +504 -0
  158. package/src/phone/advanced/recording.ts +310 -0
  159. package/src/phone/handlers/__tests__/incoming-call.test.ts +40 -0
  160. package/src/phone/handlers/incoming-call.ts +117 -0
  161. package/src/phone/handlers/missed-call.ts +116 -0
  162. package/src/phone/handlers/voicemail.ts +179 -0
  163. package/src/phone/index.ts +9 -0
  164. package/src/presets/api-backend.ts +134 -0
  165. package/src/presets/data-pipeline.ts +204 -0
  166. package/src/presets/extend.test.ts +295 -0
  167. package/src/presets/extend.ts +297 -0
  168. package/src/presets/fullstack-app.ts +144 -0
  169. package/src/presets/index.ts +27 -0
  170. package/src/presets/jamstack.ts +135 -0
  171. package/src/presets/microservices.ts +167 -0
  172. package/src/presets/ml-api.ts +208 -0
  173. package/src/presets/nodejs-server.ts +104 -0
  174. package/src/presets/nodejs-serverless.ts +114 -0
  175. package/src/presets/realtime-app.ts +184 -0
  176. package/src/presets/static-site.ts +64 -0
  177. package/src/presets/traditional-web-app.ts +339 -0
  178. package/src/presets/wordpress.ts +138 -0
  179. package/src/preview/github.test.ts +249 -0
  180. package/src/preview/github.ts +297 -0
  181. package/src/preview/index.ts +37 -0
  182. package/src/preview/manager.test.ts +440 -0
  183. package/src/preview/manager.ts +326 -0
  184. package/src/preview/notifications.test.ts +582 -0
  185. package/src/preview/notifications.ts +341 -0
  186. package/src/queue/batch-processing.ts +402 -0
  187. package/src/queue/dlq-monitoring.ts +402 -0
  188. package/src/queue/fifo.ts +342 -0
  189. package/src/queue/index.ts +9 -0
  190. package/src/queue/management.ts +428 -0
  191. package/src/queue/queue.test.ts +429 -0
  192. package/src/resource-mgmt/index.ts +39 -0
  193. package/src/resource-naming.ts +62 -0
  194. package/src/s3/index.ts +523 -0
  195. package/src/schema/cloud-config.schema.json +554 -0
  196. package/src/schema/index.ts +68 -0
  197. package/src/security/certificate-manager.ts +492 -0
  198. package/src/security/index.ts +9 -0
  199. package/src/security/scanning.ts +545 -0
  200. package/src/security/secrets-manager.ts +476 -0
  201. package/src/security/secrets-rotation.ts +456 -0
  202. package/src/security/security.test.ts +738 -0
  203. package/src/sms/advanced/ab-testing.ts +389 -0
  204. package/src/sms/advanced/analytics.ts +336 -0
  205. package/src/sms/advanced/campaigns.ts +523 -0
  206. package/src/sms/advanced/chatbot.ts +224 -0
  207. package/src/sms/advanced/index.ts +10 -0
  208. package/src/sms/advanced/link-tracking.ts +248 -0
  209. package/src/sms/advanced/mms.ts +308 -0
  210. package/src/sms/handlers/__tests__/send.test.ts +40 -0
  211. package/src/sms/handlers/delivery-status.ts +133 -0
  212. package/src/sms/handlers/receive.ts +162 -0
  213. package/src/sms/handlers/send.ts +174 -0
  214. package/src/sms/index.ts +9 -0
  215. package/src/stack-diff.ts +389 -0
  216. package/src/static-site/index.ts +85 -0
  217. package/src/template-builder.ts +110 -0
  218. package/src/template-validator.ts +574 -0
  219. package/src/utils/cache.ts +291 -0
  220. package/src/utils/diff.ts +269 -0
  221. package/src/utils/hash.ts +227 -0
  222. package/src/utils/index.ts +8 -0
  223. package/src/utils/parallel.ts +294 -0
  224. package/src/validators/credentials.test.ts +274 -0
  225. package/src/validators/credentials.ts +233 -0
  226. package/src/validators/quotas.test.ts +434 -0
  227. package/src/validators/quotas.ts +217 -0
  228. package/test/ai.test.ts +327 -0
  229. package/test/api.test.ts +511 -0
  230. package/test/auth.test.ts +632 -0
  231. package/test/cache.test.ts +406 -0
  232. package/test/cdn.test.ts +247 -0
  233. package/test/compute.test.ts +861 -0
  234. package/test/database.test.ts +523 -0
  235. package/test/deployment.test.ts +499 -0
  236. package/test/dns.test.ts +270 -0
  237. package/test/email.test.ts +439 -0
  238. package/test/filesystem.test.ts +382 -0
  239. package/test/integration.test.ts +350 -0
  240. package/test/messaging.test.ts +514 -0
  241. package/test/monitoring.test.ts +634 -0
  242. package/test/network.test.ts +425 -0
  243. package/test/permissions.test.ts +488 -0
  244. package/test/queue.test.ts +484 -0
  245. package/test/registry.test.ts +306 -0
  246. package/test/security.test.ts +462 -0
  247. package/test/storage.test.ts +463 -0
  248. package/test/template-validator.test.ts +559 -0
  249. package/test/workflow.test.ts +592 -0
  250. package/tsconfig.json +16 -0
  251. package/tsconfig.tsbuildinfo +1 -0
@@ -0,0 +1,861 @@
1
+ import { describe, expect, it } from 'bun:test'
2
+ import { Compute } from '../src/modules/compute'
3
+ import { TemplateBuilder } from '../src/template-builder'
4
+
5
+ describe('Compute Module', () => {
6
+ describe('Server Mode (EC2)', () => {
7
+ describe('createServer', () => {
8
+ it('should create EC2 instance with default settings', () => {
9
+ const { instance, logicalId } = Compute.createServer({
10
+ slug: 'my-app',
11
+ environment: 'production',
12
+ })
13
+
14
+ expect(instance.Type).toBe('AWS::EC2::Instance')
15
+ expect(instance.Properties.InstanceType).toBe('t3.micro')
16
+ expect(instance.Properties.BlockDeviceMappings).toBeDefined()
17
+ expect(instance.Properties.BlockDeviceMappings?.[0].Ebs?.VolumeSize).toBe(20)
18
+ expect(instance.Properties.BlockDeviceMappings?.[0].Ebs?.VolumeType).toBe('gp3')
19
+ expect(instance.Properties.BlockDeviceMappings?.[0].Ebs?.Encrypted).toBe(true)
20
+ expect(logicalId).toBeDefined()
21
+ })
22
+
23
+ it('should create EC2 instance with custom instance type', () => {
24
+ const { instance } = Compute.createServer({
25
+ slug: 'my-app',
26
+ environment: 'production',
27
+ instanceType: 't3.large',
28
+ })
29
+
30
+ expect(instance.Properties.InstanceType).toBe('t3.large')
31
+ })
32
+
33
+ it('should create EC2 instance with custom volume', () => {
34
+ const { instance } = Compute.createServer({
35
+ slug: 'my-app',
36
+ environment: 'production',
37
+ volumeSize: 100,
38
+ volumeType: 'gp2',
39
+ encrypted: false,
40
+ })
41
+
42
+ expect(instance.Properties.BlockDeviceMappings?.[0].Ebs?.VolumeSize).toBe(100)
43
+ expect(instance.Properties.BlockDeviceMappings?.[0].Ebs?.VolumeType).toBe('gp2')
44
+ expect(instance.Properties.BlockDeviceMappings?.[0].Ebs?.Encrypted).toBe(false)
45
+ })
46
+
47
+ it('should include key pair when provided', () => {
48
+ const { instance } = Compute.createServer({
49
+ slug: 'my-app',
50
+ environment: 'production',
51
+ keyName: 'my-keypair',
52
+ })
53
+
54
+ expect(instance.Properties.KeyName).toBe('my-keypair')
55
+ })
56
+
57
+ it('should include security groups when provided', () => {
58
+ const { instance } = Compute.createServer({
59
+ slug: 'my-app',
60
+ environment: 'production',
61
+ securityGroupIds: ['sg-123', 'sg-456'],
62
+ })
63
+
64
+ expect(instance.Properties.SecurityGroupIds).toEqual(['sg-123', 'sg-456'])
65
+ })
66
+
67
+ it('should encode user data', () => {
68
+ const userData = '#!/bin/bash\necho "Hello World"'
69
+ const { instance } = Compute.createServer({
70
+ slug: 'my-app',
71
+ environment: 'production',
72
+ userData,
73
+ })
74
+
75
+ expect(instance.Properties.UserData).toBeDefined()
76
+ expect(instance.Properties.UserData).toMatchObject({ 'Fn::Base64': userData })
77
+ })
78
+ })
79
+
80
+ describe('createSecurityGroup', () => {
81
+ it('should create security group with default settings', () => {
82
+ const { securityGroup, logicalId } = Compute.createSecurityGroup({
83
+ slug: 'my-app',
84
+ environment: 'production',
85
+ })
86
+
87
+ expect(securityGroup.Type).toBe('AWS::EC2::SecurityGroup')
88
+ expect(securityGroup.Properties.GroupDescription).toContain('my-app')
89
+ expect(logicalId).toBeDefined()
90
+ })
91
+
92
+ it('should create security group with ingress rules', () => {
93
+ const { securityGroup } = Compute.createSecurityGroup({
94
+ slug: 'my-app',
95
+ environment: 'production',
96
+ ingress: [
97
+ { protocol: 'tcp', fromPort: 80, toPort: 80, cidr: '0.0.0.0/0' },
98
+ { protocol: 'tcp', fromPort: 443, toPort: 443, cidr: '0.0.0.0/0' },
99
+ ],
100
+ })
101
+
102
+ expect(securityGroup.Properties.SecurityGroupIngress).toHaveLength(2)
103
+ expect(securityGroup.Properties.SecurityGroupIngress?.[0].FromPort).toBe(80)
104
+ expect(securityGroup.Properties.SecurityGroupIngress?.[1].FromPort).toBe(443)
105
+ })
106
+
107
+ it('should create security group with egress rules', () => {
108
+ const { securityGroup } = Compute.createSecurityGroup({
109
+ slug: 'my-app',
110
+ environment: 'production',
111
+ egress: [
112
+ { protocol: '-1', cidr: '0.0.0.0/0' },
113
+ ],
114
+ })
115
+
116
+ expect(securityGroup.Properties.SecurityGroupEgress).toHaveLength(1)
117
+ expect(securityGroup.Properties.SecurityGroupEgress?.[0].IpProtocol).toBe('-1')
118
+ })
119
+ })
120
+
121
+ describe('createWebServerSecurityGroup', () => {
122
+ it('should create web server security group with HTTP, HTTPS, SSH', () => {
123
+ const { securityGroup } = Compute.createWebServerSecurityGroup('my-app', 'production')
124
+
125
+ expect(securityGroup.Properties.GroupDescription).toContain('web servers')
126
+ expect(securityGroup.Properties.SecurityGroupIngress).toHaveLength(3)
127
+ expect(securityGroup.Properties.SecurityGroupEgress).toHaveLength(1)
128
+
129
+ const ingress = securityGroup.Properties.SecurityGroupIngress!
130
+ expect(ingress.find(r => r.FromPort === 80)).toBeDefined() // HTTP
131
+ expect(ingress.find(r => r.FromPort === 443)).toBeDefined() // HTTPS
132
+ expect(ingress.find(r => r.FromPort === 22)).toBeDefined() // SSH
133
+ })
134
+ })
135
+ })
136
+
137
+ describe('Load Balancer', () => {
138
+ describe('createLoadBalancer', () => {
139
+ it('should create ALB with default settings', () => {
140
+ const { loadBalancer, logicalId } = Compute.createLoadBalancer({
141
+ slug: 'my-app',
142
+ environment: 'production',
143
+ subnets: ['subnet-123', 'subnet-456'],
144
+ })
145
+
146
+ expect(loadBalancer.Type).toBe('AWS::ElasticLoadBalancingV2::LoadBalancer')
147
+ expect(loadBalancer.Properties.Scheme).toBe('internet-facing')
148
+ expect(loadBalancer.Properties.Type).toBe('application')
149
+ expect(loadBalancer.Properties.Subnets).toEqual(['subnet-123', 'subnet-456'])
150
+ expect(logicalId).toBeDefined()
151
+ })
152
+
153
+ it('should create internal ALB', () => {
154
+ const { loadBalancer } = Compute.createLoadBalancer({
155
+ slug: 'my-app',
156
+ environment: 'production',
157
+ scheme: 'internal',
158
+ subnets: ['subnet-123'],
159
+ })
160
+
161
+ expect(loadBalancer.Properties.Scheme).toBe('internal')
162
+ })
163
+
164
+ it('should include security groups when provided', () => {
165
+ const { loadBalancer } = Compute.createLoadBalancer({
166
+ slug: 'my-app',
167
+ environment: 'production',
168
+ subnets: ['subnet-123'],
169
+ securityGroups: ['sg-123'],
170
+ })
171
+
172
+ expect(loadBalancer.Properties.SecurityGroups).toEqual(['sg-123'])
173
+ })
174
+ })
175
+
176
+ describe('createTargetGroup', () => {
177
+ it('should create target group with default settings', () => {
178
+ const { targetGroup, logicalId } = Compute.createTargetGroup({
179
+ slug: 'my-app',
180
+ environment: 'production',
181
+ port: 8080,
182
+ vpcId: 'vpc-123',
183
+ })
184
+
185
+ expect(targetGroup.Type).toBe('AWS::ElasticLoadBalancingV2::TargetGroup')
186
+ expect(targetGroup.Properties.Port).toBe(8080)
187
+ expect(targetGroup.Properties.Protocol).toBe('HTTP')
188
+ expect(targetGroup.Properties.TargetType).toBe('ip')
189
+ expect(targetGroup.Properties.HealthCheckEnabled).toBe(true)
190
+ expect(targetGroup.Properties.HealthCheckPath).toBe('/')
191
+ expect(logicalId).toBeDefined()
192
+ })
193
+
194
+ it('should configure custom health check', () => {
195
+ const { targetGroup } = Compute.createTargetGroup({
196
+ slug: 'my-app',
197
+ environment: 'production',
198
+ port: 3000,
199
+ vpcId: 'vpc-123',
200
+ healthCheckPath: '/health',
201
+ healthCheckInterval: 60,
202
+ healthCheckTimeout: 10,
203
+ healthyThreshold: 3,
204
+ unhealthyThreshold: 5,
205
+ })
206
+
207
+ expect(targetGroup.Properties.HealthCheckPath).toBe('/health')
208
+ expect(targetGroup.Properties.HealthCheckIntervalSeconds).toBe(60)
209
+ expect(targetGroup.Properties.HealthCheckTimeoutSeconds).toBe(10)
210
+ expect(targetGroup.Properties.HealthyThresholdCount).toBe(3)
211
+ expect(targetGroup.Properties.UnhealthyThresholdCount).toBe(5)
212
+ })
213
+
214
+ it('should support instance target type', () => {
215
+ const { targetGroup } = Compute.createTargetGroup({
216
+ slug: 'my-app',
217
+ environment: 'production',
218
+ port: 80,
219
+ vpcId: 'vpc-123',
220
+ targetType: 'instance',
221
+ })
222
+
223
+ expect(targetGroup.Properties.TargetType).toBe('instance')
224
+ })
225
+ })
226
+
227
+ describe('createListener', () => {
228
+ it('should create HTTP listener', () => {
229
+ const { listener, logicalId } = Compute.createListener('alb-id', {
230
+ port: 80,
231
+ protocol: 'HTTP',
232
+ defaultTargetGroupArn: 'arn:aws:elasticloadbalancing:us-east-1:123456789:targetgroup/my-tg',
233
+ })
234
+
235
+ expect(listener.Type).toBe('AWS::ElasticLoadBalancingV2::Listener')
236
+ expect(listener.Properties.Port).toBe(80)
237
+ expect(listener.Properties.Protocol).toBe('HTTP')
238
+ expect(listener.Properties.DefaultActions[0].Type).toBe('forward')
239
+ expect(logicalId).toBeDefined()
240
+ })
241
+
242
+ it('should create HTTPS listener with certificate', () => {
243
+ const { listener } = Compute.createListener('alb-id', {
244
+ port: 443,
245
+ protocol: 'HTTPS',
246
+ certificateArn: 'arn:aws:acm:us-east-1:123456789:certificate/abc',
247
+ defaultTargetGroupArn: 'arn:aws:elasticloadbalancing:us-east-1:123456789:targetgroup/my-tg',
248
+ })
249
+
250
+ expect(listener.Properties.Protocol).toBe('HTTPS')
251
+ expect(listener.Properties.Certificates).toHaveLength(1)
252
+ expect(listener.Properties.Certificates?.[0].CertificateArn).toBe('arn:aws:acm:us-east-1:123456789:certificate/abc')
253
+ expect(listener.Properties.SslPolicy).toBeDefined()
254
+ })
255
+ })
256
+ })
257
+
258
+ describe('Serverless Mode (ECS Fargate)', () => {
259
+ describe('createEcsCluster', () => {
260
+ it('should create ECS cluster', () => {
261
+ const { cluster, logicalId } = Compute.createEcsCluster('my-app', 'production')
262
+
263
+ expect(cluster.Type).toBe('AWS::ECS::Cluster')
264
+ expect(cluster.Properties?.ClusterName).toContain('my-app')
265
+ expect(cluster.Properties?.ClusterName).toContain('production')
266
+ expect(logicalId).toBeDefined()
267
+ })
268
+ })
269
+
270
+ describe('createFargateService', () => {
271
+ it('should create complete Fargate service with all resources', () => {
272
+ const result = Compute.createFargateService({
273
+ slug: 'my-app',
274
+ environment: 'production',
275
+ image: 'nginx:latest',
276
+ cpu: '512',
277
+ memory: '1024',
278
+ desiredCount: 2,
279
+ containerPort: 80,
280
+ subnets: ['subnet-123'],
281
+ securityGroups: ['sg-123'],
282
+ })
283
+
284
+ // Cluster
285
+ expect(result.cluster.Type).toBe('AWS::ECS::Cluster')
286
+ expect(result.clusterLogicalId).toBeDefined()
287
+
288
+ // Task Definition
289
+ expect(result.taskDefinition.Type).toBe('AWS::ECS::TaskDefinition')
290
+ expect(result.taskDefinition.Properties.Cpu).toBe('512')
291
+ expect(result.taskDefinition.Properties.Memory).toBe('1024')
292
+ expect(result.taskDefinition.Properties.RequiresCompatibilities).toContain('FARGATE')
293
+ expect(result.taskDefinition.Properties.NetworkMode).toBe('awsvpc')
294
+ expect(result.taskDefinitionLogicalId).toBeDefined()
295
+
296
+ // Container
297
+ const container = result.taskDefinition.Properties.ContainerDefinitions[0]
298
+ expect(container.Image).toBe('nginx:latest')
299
+ expect(container.PortMappings?.[0].ContainerPort).toBe(80)
300
+
301
+ // Service
302
+ expect(result.service.Type).toBe('AWS::ECS::Service')
303
+ expect(result.service.Properties.DesiredCount).toBe(2)
304
+ expect(result.service.Properties.LaunchType).toBe('FARGATE')
305
+ expect(result.serviceLogicalId).toBeDefined()
306
+
307
+ // IAM Roles
308
+ expect(result.taskRole.Type).toBe('AWS::IAM::Role')
309
+ expect(result.executionRole.Type).toBe('AWS::IAM::Role')
310
+ expect(result.taskRoleLogicalId).toBeDefined()
311
+ expect(result.executionRoleLogicalId).toBeDefined()
312
+ })
313
+
314
+ it('should include environment variables', () => {
315
+ const result = Compute.createFargateService({
316
+ slug: 'my-app',
317
+ environment: 'production',
318
+ image: 'my-image',
319
+ subnets: ['subnet-123'],
320
+ securityGroups: ['sg-123'],
321
+ environmentVariables: {
322
+ NODE_ENV: 'production',
323
+ API_KEY: 'secret',
324
+ },
325
+ })
326
+
327
+ const container = result.taskDefinition.Properties.ContainerDefinitions[0]
328
+ expect(container.Environment).toHaveLength(2)
329
+ expect(container.Environment?.find(e => e.Name === 'NODE_ENV')?.Value).toBe('production')
330
+ expect(container.Environment?.find(e => e.Name === 'API_KEY')?.Value).toBe('secret')
331
+ })
332
+
333
+ it('should include secrets', () => {
334
+ const result = Compute.createFargateService({
335
+ slug: 'my-app',
336
+ environment: 'production',
337
+ image: 'my-image',
338
+ subnets: ['subnet-123'],
339
+ securityGroups: ['sg-123'],
340
+ secrets: [
341
+ { name: 'DB_PASSWORD', valueFrom: 'arn:aws:secretsmanager:us-east-1:123:secret:db-pass' },
342
+ ],
343
+ })
344
+
345
+ const container = result.taskDefinition.Properties.ContainerDefinitions[0]
346
+ expect(container.Secrets).toHaveLength(1)
347
+ expect(container.Secrets?.[0].Name).toBe('DB_PASSWORD')
348
+ })
349
+
350
+ it('should configure health check', () => {
351
+ const result = Compute.createFargateService({
352
+ slug: 'my-app',
353
+ environment: 'production',
354
+ image: 'my-image',
355
+ subnets: ['subnet-123'],
356
+ securityGroups: ['sg-123'],
357
+ healthCheck: {
358
+ command: ['CMD-SHELL', 'curl -f http://localhost/ || exit 1'],
359
+ interval: 60,
360
+ timeout: 10,
361
+ retries: 5,
362
+ },
363
+ })
364
+
365
+ const container = result.taskDefinition.Properties.ContainerDefinitions[0]
366
+ expect(container.HealthCheck).toBeDefined()
367
+ expect(container.HealthCheck?.Command).toEqual(['CMD-SHELL', 'curl -f http://localhost/ || exit 1'])
368
+ expect(container.HealthCheck?.Interval).toBe(60)
369
+ expect(container.HealthCheck?.Timeout).toBe(10)
370
+ expect(container.HealthCheck?.Retries).toBe(5)
371
+ })
372
+
373
+ it('should configure logging', () => {
374
+ const result = Compute.createFargateService({
375
+ slug: 'my-app',
376
+ environment: 'production',
377
+ image: 'my-image',
378
+ subnets: ['subnet-123'],
379
+ securityGroups: ['sg-123'],
380
+ logGroup: '/ecs/my-app',
381
+ })
382
+
383
+ const container = result.taskDefinition.Properties.ContainerDefinitions[0]
384
+ expect(container.LogConfiguration?.LogDriver).toBe('awslogs')
385
+ expect(container.LogConfiguration?.Options?.['awslogs-group']).toBe('/ecs/my-app')
386
+ })
387
+
388
+ it('should attach to load balancer when target group provided', () => {
389
+ const result = Compute.createFargateService({
390
+ slug: 'my-app',
391
+ environment: 'production',
392
+ image: 'my-image',
393
+ subnets: ['subnet-123'],
394
+ securityGroups: ['sg-123'],
395
+ targetGroupArn: 'arn:aws:elasticloadbalancing:us-east-1:123:targetgroup/my-tg',
396
+ })
397
+
398
+ expect(result.service.Properties.LoadBalancers).toHaveLength(1)
399
+ expect(result.service.Properties.LoadBalancers?.[0].TargetGroupArn).toBe('arn:aws:elasticloadbalancing:us-east-1:123:targetgroup/my-tg')
400
+ })
401
+ })
402
+ })
403
+
404
+ describe('Serverless Mode (Lambda)', () => {
405
+ describe('createLambdaFunction', () => {
406
+ it('should create Lambda function with basic settings', () => {
407
+ const { lambdaFunction, role, logicalId, roleLogicalId } = Compute.createLambdaFunction({
408
+ slug: 'my-function',
409
+ environment: 'production',
410
+ runtime: 'nodejs20.x',
411
+ handler: 'index.handler',
412
+ code: {
413
+ zipFile: 'exports.handler = async () => ({ statusCode: 200 })',
414
+ },
415
+ })
416
+
417
+ expect(lambdaFunction.Type).toBe('AWS::Lambda::Function')
418
+ expect(lambdaFunction.Properties.Runtime).toBe('nodejs20.x')
419
+ expect(lambdaFunction.Properties.Handler).toBe('index.handler')
420
+ expect(lambdaFunction.Properties.Timeout).toBe(30)
421
+ expect(lambdaFunction.Properties.MemorySize).toBe(128)
422
+ expect(logicalId).toBeDefined()
423
+
424
+ expect(role.Type).toBe('AWS::IAM::Role')
425
+ expect(role.Properties.ManagedPolicyArns).toContain('arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole')
426
+ expect(roleLogicalId).toBeDefined()
427
+ })
428
+
429
+ it('should create Lambda with custom timeout and memory', () => {
430
+ const { lambdaFunction } = Compute.createLambdaFunction({
431
+ slug: 'my-function',
432
+ environment: 'production',
433
+ runtime: 'python3.11',
434
+ handler: 'lambda_function.lambda_handler',
435
+ code: { s3Bucket: 'my-bucket', s3Key: 'lambda.zip' },
436
+ timeout: 300,
437
+ memorySize: 1024,
438
+ })
439
+
440
+ expect(lambdaFunction.Properties.Timeout).toBe(300)
441
+ expect(lambdaFunction.Properties.MemorySize).toBe(1024)
442
+ })
443
+
444
+ it('should include environment variables', () => {
445
+ const { lambdaFunction } = Compute.createLambdaFunction({
446
+ slug: 'my-function',
447
+ environment: 'production',
448
+ runtime: 'nodejs20.x',
449
+ handler: 'index.handler',
450
+ code: { zipFile: 'code' },
451
+ environmentVariables: {
452
+ TABLE_NAME: 'users',
453
+ REGION: 'us-east-1',
454
+ },
455
+ })
456
+
457
+ expect(lambdaFunction.Properties.Environment?.Variables).toEqual({
458
+ TABLE_NAME: 'users',
459
+ REGION: 'us-east-1',
460
+ })
461
+ })
462
+
463
+ it('should configure VPC when provided', () => {
464
+ const { lambdaFunction, role } = Compute.createLambdaFunction({
465
+ slug: 'my-function',
466
+ environment: 'production',
467
+ runtime: 'nodejs20.x',
468
+ handler: 'index.handler',
469
+ code: { zipFile: 'code' },
470
+ vpcConfig: {
471
+ securityGroupIds: ['sg-123'],
472
+ subnetIds: ['subnet-123', 'subnet-456'],
473
+ },
474
+ })
475
+
476
+ expect(lambdaFunction.Properties.VpcConfig).toBeDefined()
477
+ expect(lambdaFunction.Properties.VpcConfig?.SecurityGroupIds).toEqual(['sg-123'])
478
+ expect(lambdaFunction.Properties.VpcConfig?.SubnetIds).toEqual(['subnet-123', 'subnet-456'])
479
+
480
+ // Should include VPC execution role
481
+ expect(role.Properties.ManagedPolicyArns).toContain('arn:aws:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole')
482
+ })
483
+ })
484
+ })
485
+
486
+ describe('User Data Scripts', () => {
487
+ describe('generateNodeServerUserData', () => {
488
+ it('should generate Node.js server setup script', () => {
489
+ const userData = Compute.generateNodeServerUserData({
490
+ nodeVersion: '20',
491
+ appRepo: 'https://github.com/user/app.git',
492
+ environment: {
493
+ NODE_ENV: 'production',
494
+ PORT: '3000',
495
+ },
496
+ })
497
+
498
+ expect(userData).toContain('#!/bin/bash')
499
+ expect(userData).toContain('nodejs')
500
+ expect(userData).toContain('pm2')
501
+ expect(userData).toContain('caddy')
502
+ expect(userData).toContain('NODE_ENV')
503
+ expect(userData).toContain('PORT')
504
+ expect(userData).toContain('github.com/user/app.git')
505
+ })
506
+ })
507
+
508
+ describe('generateBunServerUserData', () => {
509
+ it('should generate Bun server setup script', () => {
510
+ const userData = Compute.generateBunServerUserData({
511
+ appRepo: 'https://github.com/user/app.git',
512
+ environment: {
513
+ NODE_ENV: 'production',
514
+ },
515
+ })
516
+
517
+ expect(userData).toContain('#!/bin/bash')
518
+ expect(userData).toContain('bun.sh/install')
519
+ expect(userData).toContain('caddy')
520
+ expect(userData).toContain('systemd')
521
+ expect(userData).toContain('NODE_ENV')
522
+ expect(userData).toContain('github.com/user/app.git')
523
+ })
524
+ })
525
+ })
526
+
527
+ describe('Integration with TemplateBuilder', () => {
528
+ it('should create complete server infrastructure', () => {
529
+ const template = new TemplateBuilder('Server Infrastructure')
530
+
531
+ // Security group
532
+ const { securityGroup, logicalId: sgId } = Compute.createWebServerSecurityGroup('my-app', 'production')
533
+ template.addResource(sgId, securityGroup)
534
+
535
+ // EC2 instance
536
+ const { instance, logicalId: instanceId } = Compute.createServer({
537
+ slug: 'my-app',
538
+ environment: 'production',
539
+ instanceType: 't3.small',
540
+ keyName: 'my-key',
541
+ securityGroupIds: [sgId],
542
+ userData: Compute.generateBunServerUserData({
543
+ appRepo: 'https://github.com/user/app.git',
544
+ }),
545
+ })
546
+ template.addResource(instanceId, instance)
547
+
548
+ const result = template.build()
549
+
550
+ expect(Object.keys(result.Resources)).toHaveLength(2)
551
+ expect(result.Resources[sgId].Type).toBe('AWS::EC2::SecurityGroup')
552
+ expect(result.Resources[instanceId].Type).toBe('AWS::EC2::Instance')
553
+ })
554
+
555
+ it('should create complete Fargate infrastructure with ALB', () => {
556
+ const template = new TemplateBuilder('Fargate Infrastructure')
557
+
558
+ // Load balancer
559
+ const { loadBalancer, logicalId: albId } = Compute.createLoadBalancer({
560
+ slug: 'my-app',
561
+ environment: 'production',
562
+ subnets: ['subnet-123', 'subnet-456'],
563
+ securityGroups: ['sg-alb'],
564
+ })
565
+ template.addResource(albId, loadBalancer)
566
+
567
+ // Target group
568
+ const { targetGroup, logicalId: tgId } = Compute.createTargetGroup({
569
+ slug: 'my-app',
570
+ environment: 'production',
571
+ port: 8080,
572
+ vpcId: 'vpc-123',
573
+ healthCheckPath: '/health',
574
+ })
575
+ template.addResource(tgId, targetGroup)
576
+
577
+ // Listener
578
+ const { listener, logicalId: listenerId } = Compute.createListener(albId, {
579
+ port: 80,
580
+ defaultTargetGroupArn: 'arn:aws:elasticloadbalancing:us-east-1:123:targetgroup/my-tg',
581
+ })
582
+ template.addResource(listenerId, listener)
583
+
584
+ // Fargate service
585
+ const fargateResult = Compute.createFargateService({
586
+ slug: 'my-app',
587
+ environment: 'production',
588
+ image: 'my-app:latest',
589
+ cpu: '256',
590
+ memory: '512',
591
+ containerPort: 8080,
592
+ subnets: ['subnet-123'],
593
+ securityGroups: ['sg-123'],
594
+ environmentVariables: {
595
+ NODE_ENV: 'production',
596
+ },
597
+ logGroup: '/ecs/my-app',
598
+ })
599
+
600
+ template.addResource(fargateResult.clusterLogicalId, fargateResult.cluster)
601
+ template.addResource(fargateResult.taskDefinitionLogicalId, fargateResult.taskDefinition)
602
+ template.addResource(fargateResult.serviceLogicalId, fargateResult.service)
603
+ template.addResource(fargateResult.taskRoleLogicalId, fargateResult.taskRole)
604
+ template.addResource(fargateResult.executionRoleLogicalId, fargateResult.executionRole)
605
+
606
+ const result = template.build()
607
+
608
+ // ALB + TG + Listener + Cluster + TaskDef + Service + TaskRole + ExecRole = 8 resources
609
+ expect(Object.keys(result.Resources)).toHaveLength(8)
610
+ expect(result.Resources[albId].Type).toBe('AWS::ElasticLoadBalancingV2::LoadBalancer')
611
+ expect(result.Resources[tgId].Type).toBe('AWS::ElasticLoadBalancingV2::TargetGroup')
612
+ expect(result.Resources[fargateResult.clusterLogicalId].Type).toBe('AWS::ECS::Cluster')
613
+ expect(result.Resources[fargateResult.taskDefinitionLogicalId].Type).toBe('AWS::ECS::TaskDefinition')
614
+ expect(result.Resources[fargateResult.serviceLogicalId].Type).toBe('AWS::ECS::Service')
615
+ })
616
+
617
+ it('should generate valid JSON template', () => {
618
+ const template = new TemplateBuilder('Compute Test')
619
+
620
+ const { lambdaFunction, role, logicalId, roleLogicalId } = Compute.createLambdaFunction({
621
+ slug: 'test-function',
622
+ environment: 'development',
623
+ runtime: 'nodejs20.x',
624
+ handler: 'index.handler',
625
+ code: { zipFile: 'exports.handler = async () => ({ statusCode: 200 })' },
626
+ })
627
+
628
+ template.addResource(logicalId, lambdaFunction)
629
+ template.addResource(roleLogicalId, role)
630
+
631
+ const json = template.toJSON()
632
+ const parsed = JSON.parse(json)
633
+
634
+ expect(parsed.Resources[logicalId].Type).toBe('AWS::Lambda::Function')
635
+ expect(parsed.Resources[roleLogicalId].Type).toBe('AWS::IAM::Role')
636
+ })
637
+ })
638
+
639
+ describe('Auto Scaling', () => {
640
+ describe('createLaunchConfiguration', () => {
641
+ it('should create a launch configuration', () => {
642
+ const { launchConfiguration, logicalId } = Compute.createLaunchConfiguration({
643
+ slug: 'test-app',
644
+ environment: 'production',
645
+ imageId: 'ami-12345678',
646
+ instanceType: 't3.micro',
647
+ })
648
+
649
+ expect(launchConfiguration.Type).toBe('AWS::AutoScaling::LaunchConfiguration')
650
+ expect(launchConfiguration.Properties.ImageId).toBe('ami-12345678')
651
+ expect(launchConfiguration.Properties.InstanceType).toBe('t3.micro')
652
+ expect(launchConfiguration.Properties.BlockDeviceMappings).toBeDefined()
653
+ expect(launchConfiguration.Properties.BlockDeviceMappings?.[0].Ebs?.VolumeSize).toBe(20)
654
+ expect(launchConfiguration.Properties.BlockDeviceMappings?.[0].Ebs?.Encrypted).toBe(true)
655
+ expect(logicalId).toBe('TestAppProductionLaunchConfig')
656
+ })
657
+
658
+ it('should include security groups when provided', () => {
659
+ const { launchConfiguration } = Compute.createLaunchConfiguration({
660
+ slug: 'test-app',
661
+ environment: 'production',
662
+ imageId: 'ami-12345678',
663
+ instanceType: 't3.micro',
664
+ securityGroups: [{ Ref: 'WebServerSecurityGroup' }],
665
+ })
666
+
667
+ expect(launchConfiguration.Properties.SecurityGroups).toEqual([{ Ref: 'WebServerSecurityGroup' }])
668
+ })
669
+
670
+ it('should include user data when provided', () => {
671
+ const { launchConfiguration } = Compute.createLaunchConfiguration({
672
+ slug: 'test-app',
673
+ environment: 'production',
674
+ imageId: 'ami-12345678',
675
+ instanceType: 't3.micro',
676
+ userData: '#!/bin/bash\necho "Hello"',
677
+ })
678
+
679
+ expect(launchConfiguration.Properties.UserData).toBeDefined()
680
+ expect(launchConfiguration.Properties.UserData).toHaveProperty('Fn::Base64')
681
+ })
682
+ })
683
+
684
+ describe('createAutoScalingGroup', () => {
685
+ it('should create an auto scaling group', () => {
686
+ const { autoScalingGroup, logicalId } = Compute.createAutoScalingGroup({
687
+ slug: 'test-app',
688
+ environment: 'production',
689
+ launchConfigurationName: { Ref: 'MyLaunchConfig' },
690
+ minSize: 2,
691
+ maxSize: 4,
692
+ })
693
+
694
+ expect(autoScalingGroup.Type).toBe('AWS::AutoScaling::AutoScalingGroup')
695
+ expect(autoScalingGroup.Properties.MinSize).toBe(2)
696
+ expect(autoScalingGroup.Properties.MaxSize).toBe(4)
697
+ expect(autoScalingGroup.Properties.LaunchConfigurationName).toEqual({ Ref: 'MyLaunchConfig' })
698
+ expect(autoScalingGroup.Properties.Tags).toBeDefined()
699
+ expect(logicalId).toBe('TestAppProductionAsg')
700
+ })
701
+
702
+ it('should set desired capacity when provided', () => {
703
+ const { autoScalingGroup } = Compute.createAutoScalingGroup({
704
+ slug: 'test-app',
705
+ environment: 'production',
706
+ launchConfigurationName: { Ref: 'MyLaunchConfig' },
707
+ minSize: 2,
708
+ maxSize: 4,
709
+ desiredCapacity: 3,
710
+ })
711
+
712
+ expect(autoScalingGroup.Properties.DesiredCapacity).toBe(3)
713
+ })
714
+
715
+ it('should include VPC subnets when provided', () => {
716
+ const { autoScalingGroup } = Compute.createAutoScalingGroup({
717
+ slug: 'test-app',
718
+ environment: 'production',
719
+ launchConfigurationName: { Ref: 'MyLaunchConfig' },
720
+ minSize: 2,
721
+ maxSize: 4,
722
+ vpcZoneIdentifier: ['subnet-123', 'subnet-456'],
723
+ })
724
+
725
+ expect(autoScalingGroup.Properties.VPCZoneIdentifier).toEqual(['subnet-123', 'subnet-456'])
726
+ })
727
+
728
+ it('should include target groups when provided', () => {
729
+ const { autoScalingGroup } = Compute.createAutoScalingGroup({
730
+ slug: 'test-app',
731
+ environment: 'production',
732
+ launchConfigurationName: { Ref: 'MyLaunchConfig' },
733
+ minSize: 2,
734
+ maxSize: 4,
735
+ targetGroupArns: [{ Ref: 'MyTargetGroup' }],
736
+ })
737
+
738
+ expect(autoScalingGroup.Properties.TargetGroupARNs).toEqual([{ Ref: 'MyTargetGroup' }])
739
+ })
740
+
741
+ it('should include rolling update policy', () => {
742
+ const { autoScalingGroup } = Compute.createAutoScalingGroup({
743
+ slug: 'test-app',
744
+ environment: 'production',
745
+ launchConfigurationName: { Ref: 'MyLaunchConfig' },
746
+ minSize: 2,
747
+ maxSize: 4,
748
+ })
749
+
750
+ expect(autoScalingGroup.UpdatePolicy).toBeDefined()
751
+ expect(autoScalingGroup.UpdatePolicy?.AutoScalingRollingUpdate).toBeDefined()
752
+ expect(autoScalingGroup.UpdatePolicy?.AutoScalingRollingUpdate?.MaxBatchSize).toBe(1)
753
+ })
754
+ })
755
+
756
+ describe('createScalingPolicy', () => {
757
+ it('should create a CPU-based scaling policy', () => {
758
+ const { scalingPolicy, logicalId } = Compute.createScalingPolicy({
759
+ slug: 'test-app',
760
+ environment: 'production',
761
+ autoScalingGroupName: { Ref: 'MyASG' },
762
+ })
763
+
764
+ expect(scalingPolicy.Type).toBe('AWS::AutoScaling::ScalingPolicy')
765
+ expect(scalingPolicy.Properties.PolicyType).toBe('TargetTrackingScaling')
766
+ expect(scalingPolicy.Properties.AutoScalingGroupName).toEqual({ Ref: 'MyASG' })
767
+ expect(scalingPolicy.Properties.TargetTrackingConfiguration).toBeDefined()
768
+ expect(scalingPolicy.Properties.TargetTrackingConfiguration?.TargetValue).toBe(70)
769
+ expect(scalingPolicy.Properties.TargetTrackingConfiguration?.PredefinedMetricSpecification?.PredefinedMetricType).toBe('ASGAverageCPUUtilization')
770
+ expect(logicalId).toBe('TestAppProductionScalingPolicy')
771
+ })
772
+
773
+ it('should allow custom target value', () => {
774
+ const { scalingPolicy } = Compute.createScalingPolicy({
775
+ slug: 'test-app',
776
+ environment: 'production',
777
+ autoScalingGroupName: { Ref: 'MyASG' },
778
+ targetValue: 80,
779
+ })
780
+
781
+ expect(scalingPolicy.Properties.TargetTrackingConfiguration?.TargetValue).toBe(80)
782
+ })
783
+
784
+ it('should allow custom metric type', () => {
785
+ const { scalingPolicy } = Compute.createScalingPolicy({
786
+ slug: 'test-app',
787
+ environment: 'production',
788
+ autoScalingGroupName: { Ref: 'MyASG' },
789
+ predefinedMetricType: 'ALBRequestCountPerTarget',
790
+ })
791
+
792
+ expect(scalingPolicy.Properties.TargetTrackingConfiguration?.PredefinedMetricSpecification?.PredefinedMetricType).toBe('ALBRequestCountPerTarget')
793
+ })
794
+ })
795
+
796
+ describe('AutoScaling presets', () => {
797
+ it('should create small web server auto scaling', () => {
798
+ const { autoScalingGroup } = Compute.AutoScaling.smallWebServer(
799
+ 'test-app',
800
+ 'production',
801
+ { Ref: 'MyLaunchConfig' },
802
+ ['subnet-123', 'subnet-456'],
803
+ )
804
+
805
+ expect(autoScalingGroup.Properties.MinSize).toBe(2)
806
+ expect(autoScalingGroup.Properties.MaxSize).toBe(4)
807
+ expect(autoScalingGroup.Properties.DesiredCapacity).toBe(2)
808
+ })
809
+
810
+ it('should create medium web server auto scaling', () => {
811
+ const { autoScalingGroup } = Compute.AutoScaling.mediumWebServer(
812
+ 'test-app',
813
+ 'production',
814
+ { Ref: 'MyLaunchConfig' },
815
+ ['subnet-123', 'subnet-456'],
816
+ )
817
+
818
+ expect(autoScalingGroup.Properties.MinSize).toBe(3)
819
+ expect(autoScalingGroup.Properties.MaxSize).toBe(10)
820
+ expect(autoScalingGroup.Properties.DesiredCapacity).toBe(3)
821
+ })
822
+
823
+ it('should create large web server auto scaling', () => {
824
+ const { autoScalingGroup } = Compute.AutoScaling.largeWebServer(
825
+ 'test-app',
826
+ 'production',
827
+ { Ref: 'MyLaunchConfig' },
828
+ ['subnet-123', 'subnet-456'],
829
+ )
830
+
831
+ expect(autoScalingGroup.Properties.MinSize).toBe(5)
832
+ expect(autoScalingGroup.Properties.MaxSize).toBe(20)
833
+ expect(autoScalingGroup.Properties.DesiredCapacity).toBe(5)
834
+ })
835
+
836
+ it('should create CPU scaling policy', () => {
837
+ const { scalingPolicy } = Compute.AutoScaling.cpuScaling(
838
+ 'test-app',
839
+ 'production',
840
+ { Ref: 'MyASG' },
841
+ 75,
842
+ )
843
+
844
+ expect(scalingPolicy.Properties.TargetTrackingConfiguration?.PredefinedMetricSpecification?.PredefinedMetricType).toBe('ASGAverageCPUUtilization')
845
+ expect(scalingPolicy.Properties.TargetTrackingConfiguration?.TargetValue).toBe(75)
846
+ })
847
+
848
+ it('should create request count scaling policy', () => {
849
+ const { scalingPolicy } = Compute.AutoScaling.requestCountScaling(
850
+ 'test-app',
851
+ 'production',
852
+ { Ref: 'MyASG' },
853
+ 500,
854
+ )
855
+
856
+ expect(scalingPolicy.Properties.TargetTrackingConfiguration?.PredefinedMetricSpecification?.PredefinedMetricType).toBe('ALBRequestCountPerTarget')
857
+ expect(scalingPolicy.Properties.TargetTrackingConfiguration?.TargetValue).toBe(500)
858
+ })
859
+ })
860
+ })
861
+ })