@stacksjs/ts-cloud-core 0.1.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (251) hide show
  1. package/LICENSE.md +21 -0
  2. package/README.md +321 -0
  3. package/package.json +31 -0
  4. package/src/advanced-features.test.ts +465 -0
  5. package/src/aws/cloudformation.ts +421 -0
  6. package/src/aws/cloudfront.ts +158 -0
  7. package/src/aws/credentials.test.ts +132 -0
  8. package/src/aws/credentials.ts +545 -0
  9. package/src/aws/index.ts +87 -0
  10. package/src/aws/s3.test.ts +188 -0
  11. package/src/aws/s3.ts +1088 -0
  12. package/src/aws/signature.test.ts +670 -0
  13. package/src/aws/signature.ts +1155 -0
  14. package/src/backup/disaster-recovery.test.ts +726 -0
  15. package/src/backup/disaster-recovery.ts +500 -0
  16. package/src/backup/index.ts +34 -0
  17. package/src/backup/manager.test.ts +498 -0
  18. package/src/backup/manager.ts +432 -0
  19. package/src/cicd/circleci.ts +430 -0
  20. package/src/cicd/github-actions.ts +424 -0
  21. package/src/cicd/gitlab-ci.ts +255 -0
  22. package/src/cicd/index.ts +8 -0
  23. package/src/cli/history.ts +396 -0
  24. package/src/cli/index.ts +10 -0
  25. package/src/cli/progress.ts +458 -0
  26. package/src/cli/repl.ts +454 -0
  27. package/src/cli/suggestions.ts +327 -0
  28. package/src/cli/table.test.ts +319 -0
  29. package/src/cli/table.ts +332 -0
  30. package/src/cloudformation/builder.test.ts +327 -0
  31. package/src/cloudformation/builder.ts +378 -0
  32. package/src/cloudformation/builders/api-gateway.ts +449 -0
  33. package/src/cloudformation/builders/cache.ts +334 -0
  34. package/src/cloudformation/builders/cdn.ts +278 -0
  35. package/src/cloudformation/builders/compute.ts +485 -0
  36. package/src/cloudformation/builders/database.ts +392 -0
  37. package/src/cloudformation/builders/functions.ts +343 -0
  38. package/src/cloudformation/builders/messaging.ts +140 -0
  39. package/src/cloudformation/builders/monitoring.ts +300 -0
  40. package/src/cloudformation/builders/network.ts +264 -0
  41. package/src/cloudformation/builders/queue.ts +147 -0
  42. package/src/cloudformation/builders/security.ts +399 -0
  43. package/src/cloudformation/builders/storage.ts +285 -0
  44. package/src/cloudformation/index.ts +30 -0
  45. package/src/cloudformation/types.ts +173 -0
  46. package/src/compliance/aws-config.ts +543 -0
  47. package/src/compliance/cloudtrail.ts +376 -0
  48. package/src/compliance/compliance.test.ts +423 -0
  49. package/src/compliance/guardduty.ts +446 -0
  50. package/src/compliance/index.ts +66 -0
  51. package/src/compliance/security-hub.ts +456 -0
  52. package/src/containers/build-optimization.ts +416 -0
  53. package/src/containers/containers.test.ts +508 -0
  54. package/src/containers/image-scanning.ts +360 -0
  55. package/src/containers/index.ts +9 -0
  56. package/src/containers/registry.ts +293 -0
  57. package/src/containers/service-mesh.ts +520 -0
  58. package/src/database/database.test.ts +762 -0
  59. package/src/database/index.ts +9 -0
  60. package/src/database/migrations.ts +444 -0
  61. package/src/database/performance.ts +528 -0
  62. package/src/database/replicas.ts +534 -0
  63. package/src/database/users.ts +494 -0
  64. package/src/dependency-graph.ts +143 -0
  65. package/src/deployment/ab-testing.ts +582 -0
  66. package/src/deployment/blue-green.ts +452 -0
  67. package/src/deployment/canary.ts +500 -0
  68. package/src/deployment/deployment.test.ts +526 -0
  69. package/src/deployment/index.ts +61 -0
  70. package/src/deployment/progressive.ts +62 -0
  71. package/src/dns/dns.test.ts +641 -0
  72. package/src/dns/dnssec.ts +315 -0
  73. package/src/dns/index.ts +8 -0
  74. package/src/dns/resolver.ts +496 -0
  75. package/src/dns/routing.ts +593 -0
  76. package/src/email/advanced/analytics.ts +445 -0
  77. package/src/email/advanced/index.ts +11 -0
  78. package/src/email/advanced/rules.ts +465 -0
  79. package/src/email/advanced/scheduling.ts +352 -0
  80. package/src/email/advanced/search.ts +412 -0
  81. package/src/email/advanced/shared-mailboxes.ts +404 -0
  82. package/src/email/advanced/templates.ts +455 -0
  83. package/src/email/advanced/threading.ts +281 -0
  84. package/src/email/analytics.ts +467 -0
  85. package/src/email/bounce-handling.ts +425 -0
  86. package/src/email/email.test.ts +431 -0
  87. package/src/email/handlers/__tests__/inbound.test.ts +38 -0
  88. package/src/email/handlers/__tests__/outbound.test.ts +37 -0
  89. package/src/email/handlers/converter.ts +227 -0
  90. package/src/email/handlers/feedback.ts +228 -0
  91. package/src/email/handlers/inbound.ts +169 -0
  92. package/src/email/handlers/outbound.ts +178 -0
  93. package/src/email/index.ts +15 -0
  94. package/src/email/reputation.ts +303 -0
  95. package/src/email/templates.ts +352 -0
  96. package/src/errors/index.test.ts +434 -0
  97. package/src/errors/index.ts +416 -0
  98. package/src/health-checks/index.ts +40 -0
  99. package/src/index.ts +360 -0
  100. package/src/intrinsic-functions.ts +118 -0
  101. package/src/lambda/concurrency.ts +330 -0
  102. package/src/lambda/destinations.ts +345 -0
  103. package/src/lambda/dlq.ts +425 -0
  104. package/src/lambda/index.ts +11 -0
  105. package/src/lambda/lambda.test.ts +840 -0
  106. package/src/lambda/layers.ts +263 -0
  107. package/src/lambda/versions.ts +376 -0
  108. package/src/lambda/vpc.ts +399 -0
  109. package/src/local/config.ts +114 -0
  110. package/src/local/index.ts +6 -0
  111. package/src/local/mock-aws.ts +351 -0
  112. package/src/modules/ai.ts +340 -0
  113. package/src/modules/api.ts +478 -0
  114. package/src/modules/auth.ts +805 -0
  115. package/src/modules/cache.ts +417 -0
  116. package/src/modules/cdn.ts +1062 -0
  117. package/src/modules/communication.ts +1094 -0
  118. package/src/modules/compute.ts +3348 -0
  119. package/src/modules/database.ts +554 -0
  120. package/src/modules/deployment.ts +1079 -0
  121. package/src/modules/dns.ts +337 -0
  122. package/src/modules/email.ts +1538 -0
  123. package/src/modules/filesystem.ts +515 -0
  124. package/src/modules/index.ts +32 -0
  125. package/src/modules/messaging.ts +486 -0
  126. package/src/modules/monitoring.ts +2086 -0
  127. package/src/modules/network.ts +664 -0
  128. package/src/modules/parameter-store.ts +325 -0
  129. package/src/modules/permissions.ts +1081 -0
  130. package/src/modules/phone.ts +494 -0
  131. package/src/modules/queue.ts +1260 -0
  132. package/src/modules/redirects.ts +464 -0
  133. package/src/modules/registry.ts +699 -0
  134. package/src/modules/search.ts +401 -0
  135. package/src/modules/secrets.ts +416 -0
  136. package/src/modules/security.ts +731 -0
  137. package/src/modules/sms.ts +389 -0
  138. package/src/modules/storage.ts +1120 -0
  139. package/src/modules/workflow.ts +680 -0
  140. package/src/multi-account/config.ts +521 -0
  141. package/src/multi-account/index.ts +7 -0
  142. package/src/multi-account/manager.ts +427 -0
  143. package/src/multi-region/cross-region.ts +410 -0
  144. package/src/multi-region/index.ts +8 -0
  145. package/src/multi-region/manager.ts +483 -0
  146. package/src/multi-region/regions.ts +435 -0
  147. package/src/network-security/index.ts +48 -0
  148. package/src/observability/index.ts +9 -0
  149. package/src/observability/logs.ts +522 -0
  150. package/src/observability/metrics.ts +460 -0
  151. package/src/observability/observability.test.ts +782 -0
  152. package/src/observability/synthetics.ts +568 -0
  153. package/src/observability/xray.ts +358 -0
  154. package/src/phone/advanced/analytics.ts +349 -0
  155. package/src/phone/advanced/callbacks.ts +428 -0
  156. package/src/phone/advanced/index.ts +8 -0
  157. package/src/phone/advanced/ivr-builder.ts +504 -0
  158. package/src/phone/advanced/recording.ts +310 -0
  159. package/src/phone/handlers/__tests__/incoming-call.test.ts +40 -0
  160. package/src/phone/handlers/incoming-call.ts +117 -0
  161. package/src/phone/handlers/missed-call.ts +116 -0
  162. package/src/phone/handlers/voicemail.ts +179 -0
  163. package/src/phone/index.ts +9 -0
  164. package/src/presets/api-backend.ts +134 -0
  165. package/src/presets/data-pipeline.ts +204 -0
  166. package/src/presets/extend.test.ts +295 -0
  167. package/src/presets/extend.ts +297 -0
  168. package/src/presets/fullstack-app.ts +144 -0
  169. package/src/presets/index.ts +27 -0
  170. package/src/presets/jamstack.ts +135 -0
  171. package/src/presets/microservices.ts +167 -0
  172. package/src/presets/ml-api.ts +208 -0
  173. package/src/presets/nodejs-server.ts +104 -0
  174. package/src/presets/nodejs-serverless.ts +114 -0
  175. package/src/presets/realtime-app.ts +184 -0
  176. package/src/presets/static-site.ts +64 -0
  177. package/src/presets/traditional-web-app.ts +339 -0
  178. package/src/presets/wordpress.ts +138 -0
  179. package/src/preview/github.test.ts +249 -0
  180. package/src/preview/github.ts +297 -0
  181. package/src/preview/index.ts +37 -0
  182. package/src/preview/manager.test.ts +440 -0
  183. package/src/preview/manager.ts +326 -0
  184. package/src/preview/notifications.test.ts +582 -0
  185. package/src/preview/notifications.ts +341 -0
  186. package/src/queue/batch-processing.ts +402 -0
  187. package/src/queue/dlq-monitoring.ts +402 -0
  188. package/src/queue/fifo.ts +342 -0
  189. package/src/queue/index.ts +9 -0
  190. package/src/queue/management.ts +428 -0
  191. package/src/queue/queue.test.ts +429 -0
  192. package/src/resource-mgmt/index.ts +39 -0
  193. package/src/resource-naming.ts +62 -0
  194. package/src/s3/index.ts +523 -0
  195. package/src/schema/cloud-config.schema.json +554 -0
  196. package/src/schema/index.ts +68 -0
  197. package/src/security/certificate-manager.ts +492 -0
  198. package/src/security/index.ts +9 -0
  199. package/src/security/scanning.ts +545 -0
  200. package/src/security/secrets-manager.ts +476 -0
  201. package/src/security/secrets-rotation.ts +456 -0
  202. package/src/security/security.test.ts +738 -0
  203. package/src/sms/advanced/ab-testing.ts +389 -0
  204. package/src/sms/advanced/analytics.ts +336 -0
  205. package/src/sms/advanced/campaigns.ts +523 -0
  206. package/src/sms/advanced/chatbot.ts +224 -0
  207. package/src/sms/advanced/index.ts +10 -0
  208. package/src/sms/advanced/link-tracking.ts +248 -0
  209. package/src/sms/advanced/mms.ts +308 -0
  210. package/src/sms/handlers/__tests__/send.test.ts +40 -0
  211. package/src/sms/handlers/delivery-status.ts +133 -0
  212. package/src/sms/handlers/receive.ts +162 -0
  213. package/src/sms/handlers/send.ts +174 -0
  214. package/src/sms/index.ts +9 -0
  215. package/src/stack-diff.ts +389 -0
  216. package/src/static-site/index.ts +85 -0
  217. package/src/template-builder.ts +110 -0
  218. package/src/template-validator.ts +574 -0
  219. package/src/utils/cache.ts +291 -0
  220. package/src/utils/diff.ts +269 -0
  221. package/src/utils/hash.ts +227 -0
  222. package/src/utils/index.ts +8 -0
  223. package/src/utils/parallel.ts +294 -0
  224. package/src/validators/credentials.test.ts +274 -0
  225. package/src/validators/credentials.ts +233 -0
  226. package/src/validators/quotas.test.ts +434 -0
  227. package/src/validators/quotas.ts +217 -0
  228. package/test/ai.test.ts +327 -0
  229. package/test/api.test.ts +511 -0
  230. package/test/auth.test.ts +632 -0
  231. package/test/cache.test.ts +406 -0
  232. package/test/cdn.test.ts +247 -0
  233. package/test/compute.test.ts +861 -0
  234. package/test/database.test.ts +523 -0
  235. package/test/deployment.test.ts +499 -0
  236. package/test/dns.test.ts +270 -0
  237. package/test/email.test.ts +439 -0
  238. package/test/filesystem.test.ts +382 -0
  239. package/test/integration.test.ts +350 -0
  240. package/test/messaging.test.ts +514 -0
  241. package/test/monitoring.test.ts +634 -0
  242. package/test/network.test.ts +425 -0
  243. package/test/permissions.test.ts +488 -0
  244. package/test/queue.test.ts +484 -0
  245. package/test/registry.test.ts +306 -0
  246. package/test/security.test.ts +462 -0
  247. package/test/storage.test.ts +463 -0
  248. package/test/template-validator.test.ts +559 -0
  249. package/test/workflow.test.ts +592 -0
  250. package/tsconfig.json +16 -0
  251. package/tsconfig.tsbuildinfo +1 -0
@@ -0,0 +1,488 @@
1
+ import { describe, expect, it } from 'bun:test'
2
+ import { Permissions } from '../src/modules/permissions'
3
+ import { TemplateBuilder } from '../src/template-builder'
4
+
5
+ describe('Permissions Module', () => {
6
+ describe('createUser', () => {
7
+ it('should create IAM user with default settings', () => {
8
+ const { user, logicalId } = Permissions.createUser({
9
+ slug: 'my-app',
10
+ environment: 'production',
11
+ })
12
+
13
+ expect(user.Type).toBe('AWS::IAM::User')
14
+ expect(user.Properties.UserName).toBeDefined()
15
+ expect(user.Properties.Tags).toHaveLength(2)
16
+ expect(logicalId).toBeDefined()
17
+ })
18
+
19
+ it('should support custom user name', () => {
20
+ const { user } = Permissions.createUser({
21
+ slug: 'my-app',
22
+ environment: 'production',
23
+ userName: 'john-doe',
24
+ })
25
+
26
+ expect(user.Properties.UserName).toBe('john-doe')
27
+ })
28
+
29
+ it('should support groups', () => {
30
+ const { user } = Permissions.createUser({
31
+ slug: 'my-app',
32
+ environment: 'production',
33
+ groups: ['Developers', 'Admins'],
34
+ })
35
+
36
+ expect(user.Properties.Groups).toEqual(['Developers', 'Admins'])
37
+ })
38
+
39
+ it('should support managed policy ARNs', () => {
40
+ const { user } = Permissions.createUser({
41
+ slug: 'my-app',
42
+ environment: 'production',
43
+ managedPolicyArns: [Permissions.ManagedPolicies.S3ReadOnlyAccess],
44
+ })
45
+
46
+ expect(user.Properties.ManagedPolicyArns).toContain(Permissions.ManagedPolicies.S3ReadOnlyAccess)
47
+ })
48
+ })
49
+
50
+ describe('createRole', () => {
51
+ it('should create IAM role with service principal', () => {
52
+ const { role, logicalId } = Permissions.createRole({
53
+ slug: 'my-app',
54
+ environment: 'production',
55
+ servicePrincipal: Permissions.ServicePrincipals.Lambda,
56
+ })
57
+
58
+ expect(role.Type).toBe('AWS::IAM::Role')
59
+ expect(role.Properties.AssumeRolePolicyDocument.Statement[0].Principal.Service).toBe('lambda.amazonaws.com')
60
+ expect(role.Properties.AssumeRolePolicyDocument.Statement[0].Action).toBe('sts:AssumeRole')
61
+ expect(logicalId).toBeDefined()
62
+ })
63
+
64
+ it('should support custom role name', () => {
65
+ const { role } = Permissions.createRole({
66
+ slug: 'my-app',
67
+ environment: 'production',
68
+ roleName: 'CustomRole',
69
+ servicePrincipal: Permissions.ServicePrincipals.EC2,
70
+ })
71
+
72
+ expect(role.Properties.RoleName).toBe('CustomRole')
73
+ })
74
+
75
+ it('should support multiple service principals', () => {
76
+ const { role } = Permissions.createRole({
77
+ slug: 'my-app',
78
+ environment: 'production',
79
+ servicePrincipal: [Permissions.ServicePrincipals.Lambda, Permissions.ServicePrincipals.ECS],
80
+ })
81
+
82
+ expect(role.Properties.AssumeRolePolicyDocument.Statement[0].Principal.Service).toEqual([
83
+ 'lambda.amazonaws.com',
84
+ 'ecs.amazonaws.com',
85
+ ])
86
+ })
87
+
88
+ it('should support AWS principals', () => {
89
+ const { role } = Permissions.createRole({
90
+ slug: 'my-app',
91
+ environment: 'production',
92
+ awsPrincipal: 'arn:aws:iam::123456789012:root',
93
+ })
94
+
95
+ expect(role.Properties.AssumeRolePolicyDocument.Statement[0].Principal.AWS).toBe('arn:aws:iam::123456789012:root')
96
+ })
97
+
98
+ it('should support managed policy ARNs', () => {
99
+ const { role } = Permissions.createRole({
100
+ slug: 'my-app',
101
+ environment: 'production',
102
+ servicePrincipal: Permissions.ServicePrincipals.Lambda,
103
+ managedPolicyArns: [
104
+ Permissions.ManagedPolicies.LambdaBasicExecutionRole,
105
+ Permissions.ManagedPolicies.S3ReadOnlyAccess,
106
+ ],
107
+ })
108
+
109
+ expect(role.Properties.ManagedPolicyArns).toHaveLength(2)
110
+ expect(role.Properties.ManagedPolicyArns).toContain(Permissions.ManagedPolicies.LambdaBasicExecutionRole)
111
+ })
112
+ })
113
+
114
+ describe('createGroup', () => {
115
+ it('should create IAM group', () => {
116
+ const { group, logicalId } = Permissions.createGroup({
117
+ slug: 'my-app',
118
+ environment: 'production',
119
+ })
120
+
121
+ expect(group.Type).toBe('AWS::IAM::Group')
122
+ expect(group.Properties.GroupName).toBeDefined()
123
+ expect(logicalId).toBeDefined()
124
+ })
125
+
126
+ it('should support custom group name', () => {
127
+ const { group } = Permissions.createGroup({
128
+ slug: 'my-app',
129
+ environment: 'production',
130
+ groupName: 'Developers',
131
+ })
132
+
133
+ expect(group.Properties.GroupName).toBe('Developers')
134
+ })
135
+
136
+ it('should support managed policy ARNs', () => {
137
+ const { group } = Permissions.createGroup({
138
+ slug: 'my-app',
139
+ environment: 'production',
140
+ managedPolicyArns: [Permissions.ManagedPolicies.ReadOnlyAccess],
141
+ })
142
+
143
+ expect(group.Properties.ManagedPolicyArns).toContain(Permissions.ManagedPolicies.ReadOnlyAccess)
144
+ })
145
+ })
146
+
147
+ describe('createPolicy', () => {
148
+ it('should create managed policy', () => {
149
+ const { policy, logicalId } = Permissions.createPolicy({
150
+ slug: 'my-app',
151
+ environment: 'production',
152
+ statements: [
153
+ {
154
+ actions: ['s3:GetObject'],
155
+ resources: ['arn:aws:s3:::my-bucket/*'],
156
+ },
157
+ ],
158
+ })
159
+
160
+ expect(policy.Type).toBe('AWS::IAM::ManagedPolicy')
161
+ expect(policy.Properties.PolicyDocument.Statement).toHaveLength(1)
162
+ expect(policy.Properties.PolicyDocument.Statement[0].Effect).toBe('Allow')
163
+ expect(policy.Properties.PolicyDocument.Statement[0].Action).toEqual(['s3:GetObject'])
164
+ expect(policy.Properties.PolicyDocument.Statement[0].Resource).toEqual(['arn:aws:s3:::my-bucket/*'])
165
+ expect(logicalId).toBeDefined()
166
+ })
167
+
168
+ it('should support custom policy name', () => {
169
+ const { policy } = Permissions.createPolicy({
170
+ slug: 'my-app',
171
+ environment: 'production',
172
+ policyName: 'CustomPolicy',
173
+ statements: [
174
+ {
175
+ actions: 's3:*',
176
+ resources: '*',
177
+ },
178
+ ],
179
+ })
180
+
181
+ expect(policy.Properties.ManagedPolicyName).toBe('CustomPolicy')
182
+ })
183
+
184
+ it('should support description', () => {
185
+ const { policy } = Permissions.createPolicy({
186
+ slug: 'my-app',
187
+ environment: 'production',
188
+ description: 'Custom policy for S3 access',
189
+ statements: [
190
+ {
191
+ actions: 's3:GetObject',
192
+ resources: '*',
193
+ },
194
+ ],
195
+ })
196
+
197
+ expect(policy.Properties.Description).toBe('Custom policy for S3 access')
198
+ })
199
+
200
+ it('should support multiple statements', () => {
201
+ const { policy } = Permissions.createPolicy({
202
+ slug: 'my-app',
203
+ environment: 'production',
204
+ statements: [
205
+ {
206
+ sid: 'S3Access',
207
+ actions: ['s3:GetObject', 's3:PutObject'],
208
+ resources: ['arn:aws:s3:::my-bucket/*'],
209
+ },
210
+ {
211
+ sid: 'DynamoDBAccess',
212
+ actions: 'dynamodb:*',
213
+ resources: 'arn:aws:dynamodb:*:*:table/MyTable',
214
+ },
215
+ ],
216
+ })
217
+
218
+ expect(policy.Properties.PolicyDocument.Statement).toHaveLength(2)
219
+ expect(policy.Properties.PolicyDocument.Statement[0].Sid).toBe('S3Access')
220
+ expect(policy.Properties.PolicyDocument.Statement[1].Sid).toBe('DynamoDBAccess')
221
+ })
222
+
223
+ it('should support deny effect', () => {
224
+ const { policy } = Permissions.createPolicy({
225
+ slug: 'my-app',
226
+ environment: 'production',
227
+ statements: [
228
+ {
229
+ effect: 'Deny',
230
+ actions: 's3:DeleteBucket',
231
+ resources: '*',
232
+ },
233
+ ],
234
+ })
235
+
236
+ expect(policy.Properties.PolicyDocument.Statement[0].Effect).toBe('Deny')
237
+ })
238
+ })
239
+
240
+ describe('attachPolicyToRole', () => {
241
+ it('should attach managed policy to role', () => {
242
+ const { role } = Permissions.createRole({
243
+ slug: 'my-app',
244
+ environment: 'production',
245
+ servicePrincipal: Permissions.ServicePrincipals.Lambda,
246
+ })
247
+
248
+ Permissions.attachPolicyToRole(role, Permissions.ManagedPolicies.S3FullAccess)
249
+
250
+ expect(role.Properties.ManagedPolicyArns).toContain(Permissions.ManagedPolicies.S3FullAccess)
251
+ })
252
+
253
+ it('should not duplicate policies', () => {
254
+ const { role } = Permissions.createRole({
255
+ slug: 'my-app',
256
+ environment: 'production',
257
+ servicePrincipal: Permissions.ServicePrincipals.Lambda,
258
+ })
259
+
260
+ Permissions.attachPolicyToRole(role, Permissions.ManagedPolicies.S3FullAccess)
261
+ Permissions.attachPolicyToRole(role, Permissions.ManagedPolicies.S3FullAccess)
262
+
263
+ expect(role.Properties.ManagedPolicyArns).toHaveLength(1)
264
+ })
265
+ })
266
+
267
+ describe('attachPolicyToUser', () => {
268
+ it('should attach managed policy to user', () => {
269
+ const { user } = Permissions.createUser({
270
+ slug: 'my-app',
271
+ environment: 'production',
272
+ })
273
+
274
+ Permissions.attachPolicyToUser(user, Permissions.ManagedPolicies.DynamoDBReadOnlyAccess)
275
+
276
+ expect(user.Properties.ManagedPolicyArns).toContain(Permissions.ManagedPolicies.DynamoDBReadOnlyAccess)
277
+ })
278
+ })
279
+
280
+ describe('attachPolicyToGroup', () => {
281
+ it('should attach managed policy to group', () => {
282
+ const { group } = Permissions.createGroup({
283
+ slug: 'my-app',
284
+ environment: 'production',
285
+ })
286
+
287
+ Permissions.attachPolicyToGroup(group, Permissions.ManagedPolicies.ReadOnlyAccess)
288
+
289
+ expect(group.Properties.ManagedPolicyArns).toContain(Permissions.ManagedPolicies.ReadOnlyAccess)
290
+ })
291
+ })
292
+
293
+ describe('addInlinePolicyToRole', () => {
294
+ it('should add inline policy to role', () => {
295
+ const { role } = Permissions.createRole({
296
+ slug: 'my-app',
297
+ environment: 'production',
298
+ servicePrincipal: Permissions.ServicePrincipals.Lambda,
299
+ })
300
+
301
+ Permissions.addInlinePolicyToRole(role, 's3-access', [
302
+ {
303
+ actions: ['s3:GetObject', 's3:PutObject'],
304
+ resources: ['arn:aws:s3:::my-bucket/*'],
305
+ },
306
+ ])
307
+
308
+ expect(role.Properties.Policies).toHaveLength(1)
309
+ expect(role.Properties.Policies![0].PolicyName).toBe('s3-access')
310
+ expect(role.Properties.Policies![0].PolicyDocument.Statement[0].Action).toEqual(['s3:GetObject', 's3:PutObject'])
311
+ })
312
+ })
313
+
314
+ describe('addInlinePolicyToUser', () => {
315
+ it('should add inline policy to user', () => {
316
+ const { user } = Permissions.createUser({
317
+ slug: 'my-app',
318
+ environment: 'production',
319
+ })
320
+
321
+ Permissions.addInlinePolicyToUser(user, 'dynamodb-access', [
322
+ {
323
+ actions: 'dynamodb:Query',
324
+ resources: 'arn:aws:dynamodb:*:*:table/MyTable',
325
+ },
326
+ ])
327
+
328
+ expect(user.Properties.Policies).toHaveLength(1)
329
+ expect(user.Properties.Policies![0].PolicyName).toBe('dynamodb-access')
330
+ })
331
+ })
332
+
333
+ describe('createAccessKey', () => {
334
+ it('should create access key for user', () => {
335
+ const { accessKey, logicalId } = Permissions.createAccessKey('user-id', {
336
+ slug: 'my-app',
337
+ environment: 'production',
338
+ })
339
+
340
+ expect(accessKey.Type).toBe('AWS::IAM::AccessKey')
341
+ expect(accessKey.Properties.Status).toBe('Active')
342
+ expect(logicalId).toBeDefined()
343
+ })
344
+
345
+ it('should support inactive status', () => {
346
+ const { accessKey } = Permissions.createAccessKey('user-id', {
347
+ slug: 'my-app',
348
+ environment: 'production',
349
+ status: 'Inactive',
350
+ })
351
+
352
+ expect(accessKey.Properties.Status).toBe('Inactive')
353
+ })
354
+ })
355
+
356
+ describe('createInstanceProfile', () => {
357
+ it('should create instance profile', () => {
358
+ const { instanceProfile, logicalId } = Permissions.createInstanceProfile('role-id', {
359
+ slug: 'my-app',
360
+ environment: 'production',
361
+ })
362
+
363
+ expect(instanceProfile.Type).toBe('AWS::IAM::InstanceProfile')
364
+ expect(instanceProfile.Properties.InstanceProfileName).toBeDefined()
365
+ expect(logicalId).toBeDefined()
366
+ })
367
+
368
+ it('should support custom profile name', () => {
369
+ const { instanceProfile } = Permissions.createInstanceProfile('role-id', {
370
+ slug: 'my-app',
371
+ environment: 'production',
372
+ profileName: 'CustomProfile',
373
+ })
374
+
375
+ expect(instanceProfile.Properties.InstanceProfileName).toBe('CustomProfile')
376
+ })
377
+ })
378
+
379
+ describe('ManagedPolicies', () => {
380
+ it('should provide AWS managed policy ARNs', () => {
381
+ expect(Permissions.ManagedPolicies.AdministratorAccess).toBe('arn:aws:iam::aws:policy/AdministratorAccess')
382
+ expect(Permissions.ManagedPolicies.S3FullAccess).toBe('arn:aws:iam::aws:policy/AmazonS3FullAccess')
383
+ expect(Permissions.ManagedPolicies.LambdaBasicExecutionRole).toBe('arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole')
384
+ })
385
+ })
386
+
387
+ describe('ServicePrincipals', () => {
388
+ it('should provide service principal strings', () => {
389
+ expect(Permissions.ServicePrincipals.Lambda).toBe('lambda.amazonaws.com')
390
+ expect(Permissions.ServicePrincipals.EC2).toBe('ec2.amazonaws.com')
391
+ expect(Permissions.ServicePrincipals.ECS).toBe('ecs.amazonaws.com')
392
+ })
393
+ })
394
+
395
+ describe('Integration with TemplateBuilder', () => {
396
+ it('should create user with access key', () => {
397
+ const template = new TemplateBuilder('IAM User')
398
+
399
+ const { user, logicalId: userId } = Permissions.createUser({
400
+ slug: 'my-app',
401
+ environment: 'production',
402
+ userName: 'developer',
403
+ })
404
+
405
+ const { accessKey, logicalId: keyId } = Permissions.createAccessKey(userId, {
406
+ slug: 'my-app',
407
+ environment: 'production',
408
+ })
409
+
410
+ template.addResource(userId, user)
411
+ template.addResource(keyId, accessKey)
412
+
413
+ const result = template.build()
414
+
415
+ expect(Object.keys(result.Resources)).toHaveLength(2)
416
+ expect(result.Resources[userId].Type).toBe('AWS::IAM::User')
417
+ expect(result.Resources[keyId].Type).toBe('AWS::IAM::AccessKey')
418
+ })
419
+
420
+ it('should create Lambda execution role', () => {
421
+ const template = new TemplateBuilder('Lambda Role')
422
+
423
+ const { role, logicalId } = Permissions.createRole({
424
+ slug: 'my-app',
425
+ environment: 'production',
426
+ servicePrincipal: Permissions.ServicePrincipals.Lambda,
427
+ managedPolicyArns: [
428
+ Permissions.ManagedPolicies.LambdaBasicExecutionRole,
429
+ Permissions.ManagedPolicies.LambdaVPCAccessExecutionRole,
430
+ ],
431
+ })
432
+
433
+ template.addResource(logicalId, role)
434
+
435
+ const result = template.build()
436
+
437
+ expect(Object.keys(result.Resources)).toHaveLength(1)
438
+ expect(result.Resources[logicalId]!.Properties!.ManagedPolicyArns).toHaveLength(2)
439
+ })
440
+
441
+ it('should create custom policy and attach to role', () => {
442
+ const template = new TemplateBuilder('Custom Policy')
443
+
444
+ const { policy, logicalId: policyId } = Permissions.createPolicy({
445
+ slug: 'my-app',
446
+ environment: 'production',
447
+ policyName: 'S3BucketAccess',
448
+ statements: [
449
+ {
450
+ actions: ['s3:GetObject', 's3:PutObject'],
451
+ resources: ['arn:aws:s3:::my-bucket/*'],
452
+ },
453
+ ],
454
+ })
455
+
456
+ const { role, logicalId: roleId } = Permissions.createRole({
457
+ slug: 'my-app',
458
+ environment: 'production',
459
+ servicePrincipal: Permissions.ServicePrincipals.Lambda,
460
+ })
461
+
462
+ template.addResource(policyId, policy)
463
+ template.addResource(roleId, role)
464
+
465
+ const result = template.build()
466
+
467
+ expect(Object.keys(result.Resources)).toHaveLength(2)
468
+ expect(result.Resources[policyId].Type).toBe('AWS::IAM::ManagedPolicy')
469
+ })
470
+
471
+ it('should generate valid JSON template', () => {
472
+ const template = new TemplateBuilder('Permissions Test')
473
+
474
+ const { user, logicalId } = Permissions.createUser({
475
+ slug: 'test',
476
+ environment: 'development',
477
+ })
478
+
479
+ template.addResource(logicalId, user)
480
+
481
+ const json = template.toJSON()
482
+ const parsed = JSON.parse(json)
483
+
484
+ expect(parsed.Resources[logicalId].Type).toBe('AWS::IAM::User')
485
+ expect(parsed.Resources[logicalId].Properties.UserName).toBeDefined()
486
+ })
487
+ })
488
+ })