@stacksjs/ts-cloud-core 0.1.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE.md +21 -0
- package/README.md +321 -0
- package/package.json +31 -0
- package/src/advanced-features.test.ts +465 -0
- package/src/aws/cloudformation.ts +421 -0
- package/src/aws/cloudfront.ts +158 -0
- package/src/aws/credentials.test.ts +132 -0
- package/src/aws/credentials.ts +545 -0
- package/src/aws/index.ts +87 -0
- package/src/aws/s3.test.ts +188 -0
- package/src/aws/s3.ts +1088 -0
- package/src/aws/signature.test.ts +670 -0
- package/src/aws/signature.ts +1155 -0
- package/src/backup/disaster-recovery.test.ts +726 -0
- package/src/backup/disaster-recovery.ts +500 -0
- package/src/backup/index.ts +34 -0
- package/src/backup/manager.test.ts +498 -0
- package/src/backup/manager.ts +432 -0
- package/src/cicd/circleci.ts +430 -0
- package/src/cicd/github-actions.ts +424 -0
- package/src/cicd/gitlab-ci.ts +255 -0
- package/src/cicd/index.ts +8 -0
- package/src/cli/history.ts +396 -0
- package/src/cli/index.ts +10 -0
- package/src/cli/progress.ts +458 -0
- package/src/cli/repl.ts +454 -0
- package/src/cli/suggestions.ts +327 -0
- package/src/cli/table.test.ts +319 -0
- package/src/cli/table.ts +332 -0
- package/src/cloudformation/builder.test.ts +327 -0
- package/src/cloudformation/builder.ts +378 -0
- package/src/cloudformation/builders/api-gateway.ts +449 -0
- package/src/cloudformation/builders/cache.ts +334 -0
- package/src/cloudformation/builders/cdn.ts +278 -0
- package/src/cloudformation/builders/compute.ts +485 -0
- package/src/cloudformation/builders/database.ts +392 -0
- package/src/cloudformation/builders/functions.ts +343 -0
- package/src/cloudformation/builders/messaging.ts +140 -0
- package/src/cloudformation/builders/monitoring.ts +300 -0
- package/src/cloudformation/builders/network.ts +264 -0
- package/src/cloudformation/builders/queue.ts +147 -0
- package/src/cloudformation/builders/security.ts +399 -0
- package/src/cloudformation/builders/storage.ts +285 -0
- package/src/cloudformation/index.ts +30 -0
- package/src/cloudformation/types.ts +173 -0
- package/src/compliance/aws-config.ts +543 -0
- package/src/compliance/cloudtrail.ts +376 -0
- package/src/compliance/compliance.test.ts +423 -0
- package/src/compliance/guardduty.ts +446 -0
- package/src/compliance/index.ts +66 -0
- package/src/compliance/security-hub.ts +456 -0
- package/src/containers/build-optimization.ts +416 -0
- package/src/containers/containers.test.ts +508 -0
- package/src/containers/image-scanning.ts +360 -0
- package/src/containers/index.ts +9 -0
- package/src/containers/registry.ts +293 -0
- package/src/containers/service-mesh.ts +520 -0
- package/src/database/database.test.ts +762 -0
- package/src/database/index.ts +9 -0
- package/src/database/migrations.ts +444 -0
- package/src/database/performance.ts +528 -0
- package/src/database/replicas.ts +534 -0
- package/src/database/users.ts +494 -0
- package/src/dependency-graph.ts +143 -0
- package/src/deployment/ab-testing.ts +582 -0
- package/src/deployment/blue-green.ts +452 -0
- package/src/deployment/canary.ts +500 -0
- package/src/deployment/deployment.test.ts +526 -0
- package/src/deployment/index.ts +61 -0
- package/src/deployment/progressive.ts +62 -0
- package/src/dns/dns.test.ts +641 -0
- package/src/dns/dnssec.ts +315 -0
- package/src/dns/index.ts +8 -0
- package/src/dns/resolver.ts +496 -0
- package/src/dns/routing.ts +593 -0
- package/src/email/advanced/analytics.ts +445 -0
- package/src/email/advanced/index.ts +11 -0
- package/src/email/advanced/rules.ts +465 -0
- package/src/email/advanced/scheduling.ts +352 -0
- package/src/email/advanced/search.ts +412 -0
- package/src/email/advanced/shared-mailboxes.ts +404 -0
- package/src/email/advanced/templates.ts +455 -0
- package/src/email/advanced/threading.ts +281 -0
- package/src/email/analytics.ts +467 -0
- package/src/email/bounce-handling.ts +425 -0
- package/src/email/email.test.ts +431 -0
- package/src/email/handlers/__tests__/inbound.test.ts +38 -0
- package/src/email/handlers/__tests__/outbound.test.ts +37 -0
- package/src/email/handlers/converter.ts +227 -0
- package/src/email/handlers/feedback.ts +228 -0
- package/src/email/handlers/inbound.ts +169 -0
- package/src/email/handlers/outbound.ts +178 -0
- package/src/email/index.ts +15 -0
- package/src/email/reputation.ts +303 -0
- package/src/email/templates.ts +352 -0
- package/src/errors/index.test.ts +434 -0
- package/src/errors/index.ts +416 -0
- package/src/health-checks/index.ts +40 -0
- package/src/index.ts +360 -0
- package/src/intrinsic-functions.ts +118 -0
- package/src/lambda/concurrency.ts +330 -0
- package/src/lambda/destinations.ts +345 -0
- package/src/lambda/dlq.ts +425 -0
- package/src/lambda/index.ts +11 -0
- package/src/lambda/lambda.test.ts +840 -0
- package/src/lambda/layers.ts +263 -0
- package/src/lambda/versions.ts +376 -0
- package/src/lambda/vpc.ts +399 -0
- package/src/local/config.ts +114 -0
- package/src/local/index.ts +6 -0
- package/src/local/mock-aws.ts +351 -0
- package/src/modules/ai.ts +340 -0
- package/src/modules/api.ts +478 -0
- package/src/modules/auth.ts +805 -0
- package/src/modules/cache.ts +417 -0
- package/src/modules/cdn.ts +1062 -0
- package/src/modules/communication.ts +1094 -0
- package/src/modules/compute.ts +3348 -0
- package/src/modules/database.ts +554 -0
- package/src/modules/deployment.ts +1079 -0
- package/src/modules/dns.ts +337 -0
- package/src/modules/email.ts +1538 -0
- package/src/modules/filesystem.ts +515 -0
- package/src/modules/index.ts +32 -0
- package/src/modules/messaging.ts +486 -0
- package/src/modules/monitoring.ts +2086 -0
- package/src/modules/network.ts +664 -0
- package/src/modules/parameter-store.ts +325 -0
- package/src/modules/permissions.ts +1081 -0
- package/src/modules/phone.ts +494 -0
- package/src/modules/queue.ts +1260 -0
- package/src/modules/redirects.ts +464 -0
- package/src/modules/registry.ts +699 -0
- package/src/modules/search.ts +401 -0
- package/src/modules/secrets.ts +416 -0
- package/src/modules/security.ts +731 -0
- package/src/modules/sms.ts +389 -0
- package/src/modules/storage.ts +1120 -0
- package/src/modules/workflow.ts +680 -0
- package/src/multi-account/config.ts +521 -0
- package/src/multi-account/index.ts +7 -0
- package/src/multi-account/manager.ts +427 -0
- package/src/multi-region/cross-region.ts +410 -0
- package/src/multi-region/index.ts +8 -0
- package/src/multi-region/manager.ts +483 -0
- package/src/multi-region/regions.ts +435 -0
- package/src/network-security/index.ts +48 -0
- package/src/observability/index.ts +9 -0
- package/src/observability/logs.ts +522 -0
- package/src/observability/metrics.ts +460 -0
- package/src/observability/observability.test.ts +782 -0
- package/src/observability/synthetics.ts +568 -0
- package/src/observability/xray.ts +358 -0
- package/src/phone/advanced/analytics.ts +349 -0
- package/src/phone/advanced/callbacks.ts +428 -0
- package/src/phone/advanced/index.ts +8 -0
- package/src/phone/advanced/ivr-builder.ts +504 -0
- package/src/phone/advanced/recording.ts +310 -0
- package/src/phone/handlers/__tests__/incoming-call.test.ts +40 -0
- package/src/phone/handlers/incoming-call.ts +117 -0
- package/src/phone/handlers/missed-call.ts +116 -0
- package/src/phone/handlers/voicemail.ts +179 -0
- package/src/phone/index.ts +9 -0
- package/src/presets/api-backend.ts +134 -0
- package/src/presets/data-pipeline.ts +204 -0
- package/src/presets/extend.test.ts +295 -0
- package/src/presets/extend.ts +297 -0
- package/src/presets/fullstack-app.ts +144 -0
- package/src/presets/index.ts +27 -0
- package/src/presets/jamstack.ts +135 -0
- package/src/presets/microservices.ts +167 -0
- package/src/presets/ml-api.ts +208 -0
- package/src/presets/nodejs-server.ts +104 -0
- package/src/presets/nodejs-serverless.ts +114 -0
- package/src/presets/realtime-app.ts +184 -0
- package/src/presets/static-site.ts +64 -0
- package/src/presets/traditional-web-app.ts +339 -0
- package/src/presets/wordpress.ts +138 -0
- package/src/preview/github.test.ts +249 -0
- package/src/preview/github.ts +297 -0
- package/src/preview/index.ts +37 -0
- package/src/preview/manager.test.ts +440 -0
- package/src/preview/manager.ts +326 -0
- package/src/preview/notifications.test.ts +582 -0
- package/src/preview/notifications.ts +341 -0
- package/src/queue/batch-processing.ts +402 -0
- package/src/queue/dlq-monitoring.ts +402 -0
- package/src/queue/fifo.ts +342 -0
- package/src/queue/index.ts +9 -0
- package/src/queue/management.ts +428 -0
- package/src/queue/queue.test.ts +429 -0
- package/src/resource-mgmt/index.ts +39 -0
- package/src/resource-naming.ts +62 -0
- package/src/s3/index.ts +523 -0
- package/src/schema/cloud-config.schema.json +554 -0
- package/src/schema/index.ts +68 -0
- package/src/security/certificate-manager.ts +492 -0
- package/src/security/index.ts +9 -0
- package/src/security/scanning.ts +545 -0
- package/src/security/secrets-manager.ts +476 -0
- package/src/security/secrets-rotation.ts +456 -0
- package/src/security/security.test.ts +738 -0
- package/src/sms/advanced/ab-testing.ts +389 -0
- package/src/sms/advanced/analytics.ts +336 -0
- package/src/sms/advanced/campaigns.ts +523 -0
- package/src/sms/advanced/chatbot.ts +224 -0
- package/src/sms/advanced/index.ts +10 -0
- package/src/sms/advanced/link-tracking.ts +248 -0
- package/src/sms/advanced/mms.ts +308 -0
- package/src/sms/handlers/__tests__/send.test.ts +40 -0
- package/src/sms/handlers/delivery-status.ts +133 -0
- package/src/sms/handlers/receive.ts +162 -0
- package/src/sms/handlers/send.ts +174 -0
- package/src/sms/index.ts +9 -0
- package/src/stack-diff.ts +389 -0
- package/src/static-site/index.ts +85 -0
- package/src/template-builder.ts +110 -0
- package/src/template-validator.ts +574 -0
- package/src/utils/cache.ts +291 -0
- package/src/utils/diff.ts +269 -0
- package/src/utils/hash.ts +227 -0
- package/src/utils/index.ts +8 -0
- package/src/utils/parallel.ts +294 -0
- package/src/validators/credentials.test.ts +274 -0
- package/src/validators/credentials.ts +233 -0
- package/src/validators/quotas.test.ts +434 -0
- package/src/validators/quotas.ts +217 -0
- package/test/ai.test.ts +327 -0
- package/test/api.test.ts +511 -0
- package/test/auth.test.ts +632 -0
- package/test/cache.test.ts +406 -0
- package/test/cdn.test.ts +247 -0
- package/test/compute.test.ts +861 -0
- package/test/database.test.ts +523 -0
- package/test/deployment.test.ts +499 -0
- package/test/dns.test.ts +270 -0
- package/test/email.test.ts +439 -0
- package/test/filesystem.test.ts +382 -0
- package/test/integration.test.ts +350 -0
- package/test/messaging.test.ts +514 -0
- package/test/monitoring.test.ts +634 -0
- package/test/network.test.ts +425 -0
- package/test/permissions.test.ts +488 -0
- package/test/queue.test.ts +484 -0
- package/test/registry.test.ts +306 -0
- package/test/security.test.ts +462 -0
- package/test/storage.test.ts +463 -0
- package/test/template-validator.test.ts +559 -0
- package/test/workflow.test.ts +592 -0
- package/tsconfig.json +16 -0
- package/tsconfig.tsbuildinfo +1 -0
|
@@ -0,0 +1,670 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* AWS Signature V4 Tests
|
|
3
|
+
*/
|
|
4
|
+
|
|
5
|
+
import { describe, expect, it } from 'bun:test'
|
|
6
|
+
import {
|
|
7
|
+
signRequest,
|
|
8
|
+
signRequestAsync,
|
|
9
|
+
detectServiceRegion,
|
|
10
|
+
createPresignedUrl,
|
|
11
|
+
createPresignedUrlAsync,
|
|
12
|
+
isNodeCryptoAvailable,
|
|
13
|
+
isWebCryptoAvailable,
|
|
14
|
+
} from './signature'
|
|
15
|
+
|
|
16
|
+
describe('AWS Signature V4', () => {
|
|
17
|
+
const testOptions = {
|
|
18
|
+
accessKeyId: 'AKIAIOSFODNN7EXAMPLE',
|
|
19
|
+
secretAccessKey: 'wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY',
|
|
20
|
+
}
|
|
21
|
+
|
|
22
|
+
it('should sign a GET request', () => {
|
|
23
|
+
const signed = signRequest({
|
|
24
|
+
method: 'GET',
|
|
25
|
+
url: 'https://s3.us-east-1.amazonaws.com/examplebucket',
|
|
26
|
+
service: 's3',
|
|
27
|
+
region: 'us-east-1',
|
|
28
|
+
...testOptions,
|
|
29
|
+
})
|
|
30
|
+
|
|
31
|
+
expect(signed.headers['authorization']).toBeDefined()
|
|
32
|
+
expect(signed.headers['x-amz-date']).toBeDefined()
|
|
33
|
+
expect(signed.headers['authorization']).toContain('AWS4-HMAC-SHA256')
|
|
34
|
+
expect(signed.headers['authorization']).toContain('Credential=')
|
|
35
|
+
expect(signed.headers['authorization']).toContain('SignedHeaders=')
|
|
36
|
+
expect(signed.headers['authorization']).toContain('Signature=')
|
|
37
|
+
})
|
|
38
|
+
|
|
39
|
+
it('should sign a POST request with body', () => {
|
|
40
|
+
const body = JSON.stringify({ key: 'value' })
|
|
41
|
+
|
|
42
|
+
const signed = signRequest({
|
|
43
|
+
method: 'POST',
|
|
44
|
+
url: 'https://dynamodb.us-east-1.amazonaws.com/',
|
|
45
|
+
service: 'dynamodb',
|
|
46
|
+
region: 'us-east-1',
|
|
47
|
+
...testOptions,
|
|
48
|
+
body,
|
|
49
|
+
headers: {
|
|
50
|
+
'content-type': 'application/x-amz-json-1.0',
|
|
51
|
+
},
|
|
52
|
+
})
|
|
53
|
+
|
|
54
|
+
expect(signed.headers['authorization']).toBeDefined()
|
|
55
|
+
expect(signed.headers['x-amz-date']).toBeDefined()
|
|
56
|
+
expect(signed.headers['content-type']).toBe('application/x-amz-json-1.0')
|
|
57
|
+
expect(signed.body).toBe(body)
|
|
58
|
+
})
|
|
59
|
+
|
|
60
|
+
it('should include session token if provided', () => {
|
|
61
|
+
const signed = signRequest({
|
|
62
|
+
method: 'GET',
|
|
63
|
+
url: 'https://s3.us-east-1.amazonaws.com/bucket',
|
|
64
|
+
service: 's3',
|
|
65
|
+
region: 'us-east-1',
|
|
66
|
+
...testOptions,
|
|
67
|
+
sessionToken: 'FwoGZXIvYXdzEBYaDCx3T3A...EXAMPLE',
|
|
68
|
+
})
|
|
69
|
+
|
|
70
|
+
expect(signed.headers['x-amz-security-token']).toBe('FwoGZXIvYXdzEBYaDCx3T3A...EXAMPLE')
|
|
71
|
+
})
|
|
72
|
+
|
|
73
|
+
it('should handle query parameters in URL', () => {
|
|
74
|
+
const signed = signRequest({
|
|
75
|
+
method: 'GET',
|
|
76
|
+
url: 'https://s3.us-east-1.amazonaws.com/bucket?prefix=test&max-keys=10',
|
|
77
|
+
service: 's3',
|
|
78
|
+
region: 'us-east-1',
|
|
79
|
+
...testOptions,
|
|
80
|
+
})
|
|
81
|
+
|
|
82
|
+
expect(signed.headers['authorization']).toBeDefined()
|
|
83
|
+
expect(signed.url).toContain('prefix=test')
|
|
84
|
+
expect(signed.url).toContain('max-keys=10')
|
|
85
|
+
})
|
|
86
|
+
|
|
87
|
+
it('should preserve custom headers', () => {
|
|
88
|
+
const signed = signRequest({
|
|
89
|
+
method: 'GET',
|
|
90
|
+
url: 'https://s3.us-east-1.amazonaws.com/bucket',
|
|
91
|
+
service: 's3',
|
|
92
|
+
region: 'us-east-1',
|
|
93
|
+
...testOptions,
|
|
94
|
+
headers: {
|
|
95
|
+
'x-custom-header': 'custom-value',
|
|
96
|
+
},
|
|
97
|
+
})
|
|
98
|
+
|
|
99
|
+
expect(signed.headers['x-custom-header']).toBe('custom-value')
|
|
100
|
+
expect(signed.headers['authorization']).toBeDefined()
|
|
101
|
+
})
|
|
102
|
+
|
|
103
|
+
it('should use correct service in signature', () => {
|
|
104
|
+
const signed = signRequest({
|
|
105
|
+
method: 'POST',
|
|
106
|
+
url: 'https://cloudformation.us-east-1.amazonaws.com/',
|
|
107
|
+
service: 'cloudformation',
|
|
108
|
+
region: 'us-east-1',
|
|
109
|
+
...testOptions,
|
|
110
|
+
})
|
|
111
|
+
|
|
112
|
+
expect(signed.headers['authorization']).toContain('cloudformation')
|
|
113
|
+
})
|
|
114
|
+
|
|
115
|
+
it('should use correct region in signature', () => {
|
|
116
|
+
const signed = signRequest({
|
|
117
|
+
method: 'GET',
|
|
118
|
+
url: 'https://s3.eu-west-1.amazonaws.com/bucket',
|
|
119
|
+
service: 's3',
|
|
120
|
+
region: 'eu-west-1',
|
|
121
|
+
...testOptions,
|
|
122
|
+
})
|
|
123
|
+
|
|
124
|
+
expect(signed.headers['authorization']).toContain('eu-west-1')
|
|
125
|
+
})
|
|
126
|
+
|
|
127
|
+
it('should generate different signatures for different requests', () => {
|
|
128
|
+
const signed1 = signRequest({
|
|
129
|
+
method: 'GET',
|
|
130
|
+
url: 'https://s3.us-east-1.amazonaws.com/bucket1',
|
|
131
|
+
service: 's3',
|
|
132
|
+
region: 'us-east-1',
|
|
133
|
+
...testOptions,
|
|
134
|
+
})
|
|
135
|
+
|
|
136
|
+
const signed2 = signRequest({
|
|
137
|
+
method: 'GET',
|
|
138
|
+
url: 'https://s3.us-east-1.amazonaws.com/bucket2',
|
|
139
|
+
service: 's3',
|
|
140
|
+
region: 'us-east-1',
|
|
141
|
+
...testOptions,
|
|
142
|
+
})
|
|
143
|
+
|
|
144
|
+
expect(signed1.headers['authorization']).not.toBe(signed2.headers['authorization'])
|
|
145
|
+
})
|
|
146
|
+
|
|
147
|
+
it('should handle empty body', () => {
|
|
148
|
+
const signed = signRequest({
|
|
149
|
+
method: 'POST',
|
|
150
|
+
url: 'https://cloudformation.us-east-1.amazonaws.com/',
|
|
151
|
+
service: 'cloudformation',
|
|
152
|
+
region: 'us-east-1',
|
|
153
|
+
...testOptions,
|
|
154
|
+
})
|
|
155
|
+
|
|
156
|
+
expect(signed.headers['authorization']).toBeDefined()
|
|
157
|
+
})
|
|
158
|
+
|
|
159
|
+
it('should format timestamp correctly', () => {
|
|
160
|
+
const signed = signRequest({
|
|
161
|
+
method: 'GET',
|
|
162
|
+
url: 'https://s3.us-east-1.amazonaws.com/bucket',
|
|
163
|
+
service: 's3',
|
|
164
|
+
region: 'us-east-1',
|
|
165
|
+
...testOptions,
|
|
166
|
+
})
|
|
167
|
+
|
|
168
|
+
// x-amz-date should be in format: YYYYMMDDTHHMMSSZ
|
|
169
|
+
expect(signed.headers['x-amz-date']).toMatch(/^\d{8}T\d{6}Z$/)
|
|
170
|
+
})
|
|
171
|
+
})
|
|
172
|
+
|
|
173
|
+
describe('Service Auto-Detection', () => {
|
|
174
|
+
it('should detect S3 service and region', () => {
|
|
175
|
+
const result = detectServiceRegion('https://s3.us-west-2.amazonaws.com/bucket')
|
|
176
|
+
expect(result.service).toBe('s3')
|
|
177
|
+
expect(result.region).toBe('us-west-2')
|
|
178
|
+
})
|
|
179
|
+
|
|
180
|
+
it('should detect DynamoDB service and region', () => {
|
|
181
|
+
const result = detectServiceRegion('https://dynamodb.eu-west-1.amazonaws.com/')
|
|
182
|
+
expect(result.service).toBe('dynamodb')
|
|
183
|
+
expect(result.region).toBe('eu-west-1')
|
|
184
|
+
})
|
|
185
|
+
|
|
186
|
+
it('should detect CloudFormation service and region', () => {
|
|
187
|
+
const result = detectServiceRegion('https://cloudformation.ap-northeast-1.amazonaws.com/')
|
|
188
|
+
expect(result.service).toBe('cloudformation')
|
|
189
|
+
expect(result.region).toBe('ap-northeast-1')
|
|
190
|
+
})
|
|
191
|
+
|
|
192
|
+
it('should detect Lambda service and region', () => {
|
|
193
|
+
const result = detectServiceRegion('https://lambda.us-east-1.amazonaws.com/')
|
|
194
|
+
expect(result.service).toBe('lambda')
|
|
195
|
+
expect(result.region).toBe('us-east-1')
|
|
196
|
+
})
|
|
197
|
+
|
|
198
|
+
it('should detect STS service and region', () => {
|
|
199
|
+
const result = detectServiceRegion('https://sts.us-east-1.amazonaws.com/')
|
|
200
|
+
expect(result.service).toBe('sts')
|
|
201
|
+
expect(result.region).toBe('us-east-1')
|
|
202
|
+
})
|
|
203
|
+
|
|
204
|
+
it('should handle global S3 endpoint', () => {
|
|
205
|
+
const result = detectServiceRegion('https://s3.amazonaws.com/bucket')
|
|
206
|
+
expect(result.service).toBe('s3')
|
|
207
|
+
expect(result.region).toBe('us-east-1')
|
|
208
|
+
})
|
|
209
|
+
|
|
210
|
+
it('should handle S3 accelerate endpoint', () => {
|
|
211
|
+
const result = detectServiceRegion('https://bucket.s3-accelerate.amazonaws.com/')
|
|
212
|
+
expect(result.service).toBe('s3')
|
|
213
|
+
})
|
|
214
|
+
|
|
215
|
+
it('should detect Lambda function URL', () => {
|
|
216
|
+
const result = detectServiceRegion('https://abc123.lambda-url.us-east-1.on.aws/')
|
|
217
|
+
expect(result.service).toBe('lambda')
|
|
218
|
+
expect(result.region).toBe('us-east-1')
|
|
219
|
+
})
|
|
220
|
+
|
|
221
|
+
it('should detect Cloudflare R2', () => {
|
|
222
|
+
const result = detectServiceRegion('https://account.r2.cloudflarestorage.com/bucket')
|
|
223
|
+
expect(result.service).toBe('s3')
|
|
224
|
+
expect(result.region).toBe('auto')
|
|
225
|
+
})
|
|
226
|
+
|
|
227
|
+
it('should detect Backblaze B2', () => {
|
|
228
|
+
const result = detectServiceRegion('https://s3.us-west-004.backblazeb2.com/bucket')
|
|
229
|
+
expect(result.service).toBe('s3')
|
|
230
|
+
expect(result.region).toBe('us-west-004')
|
|
231
|
+
})
|
|
232
|
+
|
|
233
|
+
it('should handle dualstack endpoints', () => {
|
|
234
|
+
const result = detectServiceRegion('https://s3.dualstack.us-west-2.amazonaws.com/bucket')
|
|
235
|
+
expect(result.service).toBe('s3')
|
|
236
|
+
expect(result.region).toBe('us-west-2')
|
|
237
|
+
})
|
|
238
|
+
|
|
239
|
+
it('should handle us-gov region', () => {
|
|
240
|
+
const result = detectServiceRegion('https://s3.us-gov.amazonaws.com/bucket')
|
|
241
|
+
expect(result.service).toBe('s3')
|
|
242
|
+
expect(result.region).toBe('us-gov-west-1')
|
|
243
|
+
})
|
|
244
|
+
|
|
245
|
+
it('should map special service names', () => {
|
|
246
|
+
const result = detectServiceRegion('https://email.us-east-1.amazonaws.com/')
|
|
247
|
+
expect(result.service).toBe('ses')
|
|
248
|
+
})
|
|
249
|
+
|
|
250
|
+
it('should auto-detect when signing without explicit service/region', () => {
|
|
251
|
+
const testOptions = {
|
|
252
|
+
accessKeyId: 'AKIAIOSFODNN7EXAMPLE',
|
|
253
|
+
secretAccessKey: 'wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY',
|
|
254
|
+
}
|
|
255
|
+
|
|
256
|
+
const signed = signRequest({
|
|
257
|
+
method: 'GET',
|
|
258
|
+
url: 'https://s3.us-west-2.amazonaws.com/bucket/key',
|
|
259
|
+
...testOptions,
|
|
260
|
+
})
|
|
261
|
+
|
|
262
|
+
expect(signed.headers['authorization']).toContain('us-west-2')
|
|
263
|
+
expect(signed.headers['authorization']).toContain('s3')
|
|
264
|
+
})
|
|
265
|
+
})
|
|
266
|
+
|
|
267
|
+
describe('Query String Signing (Presigned URLs)', () => {
|
|
268
|
+
const testOptions = {
|
|
269
|
+
accessKeyId: 'AKIAIOSFODNN7EXAMPLE',
|
|
270
|
+
secretAccessKey: 'wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY',
|
|
271
|
+
}
|
|
272
|
+
|
|
273
|
+
it('should sign request using query string', () => {
|
|
274
|
+
const signed = signRequest({
|
|
275
|
+
method: 'GET',
|
|
276
|
+
url: 'https://s3.us-east-1.amazonaws.com/bucket/key',
|
|
277
|
+
service: 's3',
|
|
278
|
+
region: 'us-east-1',
|
|
279
|
+
...testOptions,
|
|
280
|
+
signQuery: true,
|
|
281
|
+
})
|
|
282
|
+
|
|
283
|
+
// Should have signature in URL, not headers
|
|
284
|
+
expect(signed.url).toContain('X-Amz-Signature=')
|
|
285
|
+
expect(signed.url).toContain('X-Amz-Algorithm=AWS4-HMAC-SHA256')
|
|
286
|
+
expect(signed.url).toContain('X-Amz-Credential=')
|
|
287
|
+
expect(signed.url).toContain('X-Amz-Date=')
|
|
288
|
+
expect(signed.url).toContain('X-Amz-Expires=')
|
|
289
|
+
expect(signed.url).toContain('X-Amz-SignedHeaders=host')
|
|
290
|
+
expect(signed.headers['authorization']).toBeUndefined()
|
|
291
|
+
})
|
|
292
|
+
|
|
293
|
+
it('should include session token in query string', () => {
|
|
294
|
+
const signed = signRequest({
|
|
295
|
+
method: 'GET',
|
|
296
|
+
url: 'https://s3.us-east-1.amazonaws.com/bucket/key',
|
|
297
|
+
service: 's3',
|
|
298
|
+
region: 'us-east-1',
|
|
299
|
+
...testOptions,
|
|
300
|
+
sessionToken: 'SESSION_TOKEN_EXAMPLE',
|
|
301
|
+
signQuery: true,
|
|
302
|
+
})
|
|
303
|
+
|
|
304
|
+
expect(signed.url).toContain('X-Amz-Security-Token=SESSION_TOKEN_EXAMPLE')
|
|
305
|
+
})
|
|
306
|
+
|
|
307
|
+
it('should respect custom expiration time', () => {
|
|
308
|
+
const signed = signRequest({
|
|
309
|
+
method: 'GET',
|
|
310
|
+
url: 'https://s3.us-east-1.amazonaws.com/bucket/key',
|
|
311
|
+
service: 's3',
|
|
312
|
+
region: 'us-east-1',
|
|
313
|
+
...testOptions,
|
|
314
|
+
signQuery: true,
|
|
315
|
+
expiresIn: 3600,
|
|
316
|
+
})
|
|
317
|
+
|
|
318
|
+
expect(signed.url).toContain('X-Amz-Expires=3600')
|
|
319
|
+
})
|
|
320
|
+
|
|
321
|
+
it('should use default expiration of 24 hours', () => {
|
|
322
|
+
const signed = signRequest({
|
|
323
|
+
method: 'GET',
|
|
324
|
+
url: 'https://s3.us-east-1.amazonaws.com/bucket/key',
|
|
325
|
+
service: 's3',
|
|
326
|
+
region: 'us-east-1',
|
|
327
|
+
...testOptions,
|
|
328
|
+
signQuery: true,
|
|
329
|
+
})
|
|
330
|
+
|
|
331
|
+
expect(signed.url).toContain('X-Amz-Expires=86400')
|
|
332
|
+
})
|
|
333
|
+
|
|
334
|
+
it('should add UNSIGNED-PAYLOAD for S3', () => {
|
|
335
|
+
const signed = signRequest({
|
|
336
|
+
method: 'GET',
|
|
337
|
+
url: 'https://s3.us-east-1.amazonaws.com/bucket/key',
|
|
338
|
+
service: 's3',
|
|
339
|
+
region: 'us-east-1',
|
|
340
|
+
...testOptions,
|
|
341
|
+
signQuery: true,
|
|
342
|
+
})
|
|
343
|
+
|
|
344
|
+
expect(signed.url).toContain('X-Amz-Content-Sha256=UNSIGNED-PAYLOAD')
|
|
345
|
+
})
|
|
346
|
+
})
|
|
347
|
+
|
|
348
|
+
describe('createPresignedUrl', () => {
|
|
349
|
+
const testOptions = {
|
|
350
|
+
accessKeyId: 'AKIAIOSFODNN7EXAMPLE',
|
|
351
|
+
secretAccessKey: 'wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY',
|
|
352
|
+
}
|
|
353
|
+
|
|
354
|
+
it('should create a presigned URL for S3 GET', () => {
|
|
355
|
+
const url = createPresignedUrl({
|
|
356
|
+
url: 'https://s3.us-east-1.amazonaws.com/bucket/key.txt',
|
|
357
|
+
...testOptions,
|
|
358
|
+
})
|
|
359
|
+
|
|
360
|
+
expect(url).toContain('X-Amz-Signature=')
|
|
361
|
+
expect(url).toContain('bucket/key.txt')
|
|
362
|
+
})
|
|
363
|
+
|
|
364
|
+
it('should create a presigned URL for S3 PUT', () => {
|
|
365
|
+
const url = createPresignedUrl({
|
|
366
|
+
url: 'https://s3.us-east-1.amazonaws.com/bucket/upload.txt',
|
|
367
|
+
method: 'PUT',
|
|
368
|
+
...testOptions,
|
|
369
|
+
})
|
|
370
|
+
|
|
371
|
+
expect(url).toContain('X-Amz-Signature=')
|
|
372
|
+
})
|
|
373
|
+
|
|
374
|
+
it('should use custom expiration', () => {
|
|
375
|
+
const url = createPresignedUrl({
|
|
376
|
+
url: 'https://s3.us-east-1.amazonaws.com/bucket/key',
|
|
377
|
+
expiresIn: 300, // 5 minutes
|
|
378
|
+
...testOptions,
|
|
379
|
+
})
|
|
380
|
+
|
|
381
|
+
expect(url).toContain('X-Amz-Expires=300')
|
|
382
|
+
})
|
|
383
|
+
|
|
384
|
+
it('should clamp expiration to max 7 days', () => {
|
|
385
|
+
const url = createPresignedUrl({
|
|
386
|
+
url: 'https://s3.us-east-1.amazonaws.com/bucket/key',
|
|
387
|
+
expiresIn: 999999999, // Way more than 7 days
|
|
388
|
+
...testOptions,
|
|
389
|
+
})
|
|
390
|
+
|
|
391
|
+
expect(url).toContain('X-Amz-Expires=604800') // 7 days in seconds
|
|
392
|
+
})
|
|
393
|
+
|
|
394
|
+
it('should auto-detect service and region', () => {
|
|
395
|
+
const url = createPresignedUrl({
|
|
396
|
+
url: 'https://s3.eu-west-1.amazonaws.com/bucket/key',
|
|
397
|
+
...testOptions,
|
|
398
|
+
})
|
|
399
|
+
|
|
400
|
+
expect(url).toContain('eu-west-1')
|
|
401
|
+
expect(url).toContain('s3')
|
|
402
|
+
})
|
|
403
|
+
|
|
404
|
+
it('should work with special characters in key', () => {
|
|
405
|
+
const url = createPresignedUrl({
|
|
406
|
+
url: 'https://s3.us-east-1.amazonaws.com/bucket/path/to/file with spaces.txt',
|
|
407
|
+
...testOptions,
|
|
408
|
+
})
|
|
409
|
+
|
|
410
|
+
expect(url).toContain('X-Amz-Signature=')
|
|
411
|
+
// URL should be properly encoded
|
|
412
|
+
expect(url).toContain('file%20with%20spaces.txt')
|
|
413
|
+
})
|
|
414
|
+
})
|
|
415
|
+
|
|
416
|
+
describe('Retry Logic', () => {
|
|
417
|
+
// Note: These are unit tests for the retry logic structure
|
|
418
|
+
// Integration tests would require mocking fetch
|
|
419
|
+
|
|
420
|
+
it('should support retry options in signature options', () => {
|
|
421
|
+
// This test verifies the types compile correctly
|
|
422
|
+
const options = {
|
|
423
|
+
method: 'GET',
|
|
424
|
+
url: 'https://s3.us-east-1.amazonaws.com/bucket',
|
|
425
|
+
service: 's3',
|
|
426
|
+
region: 'us-east-1',
|
|
427
|
+
accessKeyId: 'AKIAIOSFODNN7EXAMPLE',
|
|
428
|
+
secretAccessKey: 'wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY',
|
|
429
|
+
}
|
|
430
|
+
|
|
431
|
+
// Should compile and work
|
|
432
|
+
const signed = signRequest(options)
|
|
433
|
+
expect(signed.headers['authorization']).toBeDefined()
|
|
434
|
+
})
|
|
435
|
+
})
|
|
436
|
+
|
|
437
|
+
describe('Custom DateTime', () => {
|
|
438
|
+
const testOptions = {
|
|
439
|
+
accessKeyId: 'AKIAIOSFODNN7EXAMPLE',
|
|
440
|
+
secretAccessKey: 'wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY',
|
|
441
|
+
}
|
|
442
|
+
|
|
443
|
+
it('should use custom datetime when provided', () => {
|
|
444
|
+
const customDatetime = '20240101T120000Z'
|
|
445
|
+
|
|
446
|
+
const signed = signRequest({
|
|
447
|
+
method: 'GET',
|
|
448
|
+
url: 'https://s3.us-east-1.amazonaws.com/bucket',
|
|
449
|
+
service: 's3',
|
|
450
|
+
region: 'us-east-1',
|
|
451
|
+
...testOptions,
|
|
452
|
+
datetime: customDatetime,
|
|
453
|
+
})
|
|
454
|
+
|
|
455
|
+
expect(signed.headers['x-amz-date']).toBe(customDatetime)
|
|
456
|
+
expect(signed.headers['authorization']).toContain('20240101')
|
|
457
|
+
})
|
|
458
|
+
|
|
459
|
+
it('should use custom datetime in async version', async () => {
|
|
460
|
+
const customDatetime = '20240101T120000Z'
|
|
461
|
+
|
|
462
|
+
const signed = await signRequestAsync({
|
|
463
|
+
method: 'GET',
|
|
464
|
+
url: 'https://s3.us-east-1.amazonaws.com/bucket',
|
|
465
|
+
service: 's3',
|
|
466
|
+
region: 'us-east-1',
|
|
467
|
+
...testOptions,
|
|
468
|
+
datetime: customDatetime,
|
|
469
|
+
})
|
|
470
|
+
|
|
471
|
+
expect(signed.headers['x-amz-date']).toBe(customDatetime)
|
|
472
|
+
expect(signed.headers['authorization']).toContain('20240101')
|
|
473
|
+
})
|
|
474
|
+
|
|
475
|
+
it('should produce identical signatures with same datetime', () => {
|
|
476
|
+
const customDatetime = '20240615T143000Z'
|
|
477
|
+
|
|
478
|
+
const signed1 = signRequest({
|
|
479
|
+
method: 'GET',
|
|
480
|
+
url: 'https://s3.us-east-1.amazonaws.com/bucket/key',
|
|
481
|
+
service: 's3',
|
|
482
|
+
region: 'us-east-1',
|
|
483
|
+
...testOptions,
|
|
484
|
+
datetime: customDatetime,
|
|
485
|
+
})
|
|
486
|
+
|
|
487
|
+
const signed2 = signRequest({
|
|
488
|
+
method: 'GET',
|
|
489
|
+
url: 'https://s3.us-east-1.amazonaws.com/bucket/key',
|
|
490
|
+
service: 's3',
|
|
491
|
+
region: 'us-east-1',
|
|
492
|
+
...testOptions,
|
|
493
|
+
datetime: customDatetime,
|
|
494
|
+
})
|
|
495
|
+
|
|
496
|
+
// Same datetime should produce identical signatures
|
|
497
|
+
expect(signed1.headers['authorization']).toBe(signed2.headers['authorization'])
|
|
498
|
+
})
|
|
499
|
+
|
|
500
|
+
it('should produce different signatures with different datetimes', () => {
|
|
501
|
+
const signed1 = signRequest({
|
|
502
|
+
method: 'GET',
|
|
503
|
+
url: 'https://s3.us-east-1.amazonaws.com/bucket/key',
|
|
504
|
+
service: 's3',
|
|
505
|
+
region: 'us-east-1',
|
|
506
|
+
...testOptions,
|
|
507
|
+
datetime: '20240101T120000Z',
|
|
508
|
+
})
|
|
509
|
+
|
|
510
|
+
const signed2 = signRequest({
|
|
511
|
+
method: 'GET',
|
|
512
|
+
url: 'https://s3.us-east-1.amazonaws.com/bucket/key',
|
|
513
|
+
service: 's3',
|
|
514
|
+
region: 'us-east-1',
|
|
515
|
+
...testOptions,
|
|
516
|
+
datetime: '20240102T120000Z',
|
|
517
|
+
})
|
|
518
|
+
|
|
519
|
+
expect(signed1.headers['authorization']).not.toBe(signed2.headers['authorization'])
|
|
520
|
+
})
|
|
521
|
+
})
|
|
522
|
+
|
|
523
|
+
describe('Request Timeout', () => {
|
|
524
|
+
it('should support timeout option in retry options', () => {
|
|
525
|
+
// This verifies the type compiles correctly
|
|
526
|
+
const retryOptions = {
|
|
527
|
+
maxRetries: 3,
|
|
528
|
+
timeoutMs: 5000,
|
|
529
|
+
}
|
|
530
|
+
|
|
531
|
+
expect(retryOptions.timeoutMs).toBe(5000)
|
|
532
|
+
})
|
|
533
|
+
})
|
|
534
|
+
|
|
535
|
+
describe('Browser Compatibility (Async Functions)', () => {
|
|
536
|
+
const testOptions = {
|
|
537
|
+
accessKeyId: 'AKIAIOSFODNN7EXAMPLE',
|
|
538
|
+
secretAccessKey: 'wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY',
|
|
539
|
+
}
|
|
540
|
+
|
|
541
|
+
it('should detect Node.js crypto availability', () => {
|
|
542
|
+
// In Bun/Node.js, this should be true
|
|
543
|
+
expect(isNodeCryptoAvailable()).toBe(true)
|
|
544
|
+
})
|
|
545
|
+
|
|
546
|
+
it('should detect Web Crypto API availability', () => {
|
|
547
|
+
// In Bun/Node.js 15+, this should be true
|
|
548
|
+
expect(isWebCryptoAvailable()).toBe(true)
|
|
549
|
+
})
|
|
550
|
+
|
|
551
|
+
it('should sign a GET request async', async () => {
|
|
552
|
+
const signed = await signRequestAsync({
|
|
553
|
+
method: 'GET',
|
|
554
|
+
url: 'https://s3.us-east-1.amazonaws.com/examplebucket',
|
|
555
|
+
service: 's3',
|
|
556
|
+
region: 'us-east-1',
|
|
557
|
+
...testOptions,
|
|
558
|
+
})
|
|
559
|
+
|
|
560
|
+
expect(signed.headers['authorization']).toBeDefined()
|
|
561
|
+
expect(signed.headers['x-amz-date']).toBeDefined()
|
|
562
|
+
expect(signed.headers['authorization']).toContain('AWS4-HMAC-SHA256')
|
|
563
|
+
expect(signed.headers['authorization']).toContain('Credential=')
|
|
564
|
+
expect(signed.headers['authorization']).toContain('SignedHeaders=')
|
|
565
|
+
expect(signed.headers['authorization']).toContain('Signature=')
|
|
566
|
+
})
|
|
567
|
+
|
|
568
|
+
it('should sign a POST request with body async', async () => {
|
|
569
|
+
const body = JSON.stringify({ key: 'value' })
|
|
570
|
+
|
|
571
|
+
const signed = await signRequestAsync({
|
|
572
|
+
method: 'POST',
|
|
573
|
+
url: 'https://dynamodb.us-east-1.amazonaws.com/',
|
|
574
|
+
service: 'dynamodb',
|
|
575
|
+
region: 'us-east-1',
|
|
576
|
+
...testOptions,
|
|
577
|
+
body,
|
|
578
|
+
headers: {
|
|
579
|
+
'content-type': 'application/x-amz-json-1.0',
|
|
580
|
+
},
|
|
581
|
+
})
|
|
582
|
+
|
|
583
|
+
expect(signed.headers['authorization']).toBeDefined()
|
|
584
|
+
expect(signed.headers['x-amz-date']).toBeDefined()
|
|
585
|
+
expect(signed.headers['content-type']).toBe('application/x-amz-json-1.0')
|
|
586
|
+
expect(signed.body).toBe(body)
|
|
587
|
+
})
|
|
588
|
+
|
|
589
|
+
it('should include session token async', async () => {
|
|
590
|
+
const signed = await signRequestAsync({
|
|
591
|
+
method: 'GET',
|
|
592
|
+
url: 'https://s3.us-east-1.amazonaws.com/bucket',
|
|
593
|
+
service: 's3',
|
|
594
|
+
region: 'us-east-1',
|
|
595
|
+
...testOptions,
|
|
596
|
+
sessionToken: 'FwoGZXIvYXdzEBYaDCx3T3A...EXAMPLE',
|
|
597
|
+
})
|
|
598
|
+
|
|
599
|
+
expect(signed.headers['x-amz-security-token']).toBe('FwoGZXIvYXdzEBYaDCx3T3A...EXAMPLE')
|
|
600
|
+
})
|
|
601
|
+
|
|
602
|
+
it('should auto-detect service and region async', async () => {
|
|
603
|
+
const signed = await signRequestAsync({
|
|
604
|
+
method: 'GET',
|
|
605
|
+
url: 'https://s3.us-west-2.amazonaws.com/bucket/key',
|
|
606
|
+
...testOptions,
|
|
607
|
+
})
|
|
608
|
+
|
|
609
|
+
expect(signed.headers['authorization']).toContain('us-west-2')
|
|
610
|
+
expect(signed.headers['authorization']).toContain('s3')
|
|
611
|
+
})
|
|
612
|
+
|
|
613
|
+
it('should create presigned URL async', async () => {
|
|
614
|
+
const url = await createPresignedUrlAsync({
|
|
615
|
+
url: 'https://s3.us-east-1.amazonaws.com/bucket/key.txt',
|
|
616
|
+
...testOptions,
|
|
617
|
+
})
|
|
618
|
+
|
|
619
|
+
expect(url).toContain('X-Amz-Signature=')
|
|
620
|
+
expect(url).toContain('bucket/key.txt')
|
|
621
|
+
})
|
|
622
|
+
|
|
623
|
+
it('should create presigned URL with custom expiration async', async () => {
|
|
624
|
+
const url = await createPresignedUrlAsync({
|
|
625
|
+
url: 'https://s3.us-east-1.amazonaws.com/bucket/key',
|
|
626
|
+
expiresIn: 300, // 5 minutes
|
|
627
|
+
...testOptions,
|
|
628
|
+
})
|
|
629
|
+
|
|
630
|
+
expect(url).toContain('X-Amz-Expires=300')
|
|
631
|
+
})
|
|
632
|
+
|
|
633
|
+
it('should produce same signature as sync version', async () => {
|
|
634
|
+
// Use a fixed timestamp to compare (by using the same request params)
|
|
635
|
+
const baseOptions = {
|
|
636
|
+
method: 'GET',
|
|
637
|
+
url: 'https://s3.us-east-1.amazonaws.com/bucket/key',
|
|
638
|
+
service: 's3',
|
|
639
|
+
region: 'us-east-1',
|
|
640
|
+
...testOptions,
|
|
641
|
+
}
|
|
642
|
+
|
|
643
|
+
const syncSigned = signRequest(baseOptions)
|
|
644
|
+
const asyncSigned = await signRequestAsync(baseOptions)
|
|
645
|
+
|
|
646
|
+
// Both should have valid signatures (different due to timestamp)
|
|
647
|
+
expect(syncSigned.headers['authorization']).toContain('AWS4-HMAC-SHA256')
|
|
648
|
+
expect(asyncSigned.headers['authorization']).toContain('AWS4-HMAC-SHA256')
|
|
649
|
+
expect(syncSigned.headers['authorization']).toContain('Credential=AKIAIOSFODNN7EXAMPLE')
|
|
650
|
+
expect(asyncSigned.headers['authorization']).toContain('Credential=AKIAIOSFODNN7EXAMPLE')
|
|
651
|
+
})
|
|
652
|
+
|
|
653
|
+
it('should sign with query string async', async () => {
|
|
654
|
+
const signed = await signRequestAsync({
|
|
655
|
+
method: 'GET',
|
|
656
|
+
url: 'https://s3.us-east-1.amazonaws.com/bucket/key',
|
|
657
|
+
service: 's3',
|
|
658
|
+
region: 'us-east-1',
|
|
659
|
+
...testOptions,
|
|
660
|
+
signQuery: true,
|
|
661
|
+
})
|
|
662
|
+
|
|
663
|
+
expect(signed.url).toContain('X-Amz-Signature=')
|
|
664
|
+
expect(signed.url).toContain('X-Amz-Algorithm=AWS4-HMAC-SHA256')
|
|
665
|
+
expect(signed.url).toContain('X-Amz-Credential=')
|
|
666
|
+
expect(signed.url).toContain('X-Amz-Date=')
|
|
667
|
+
expect(signed.url).toContain('X-Amz-Expires=')
|
|
668
|
+
expect(signed.headers['authorization']).toBeUndefined()
|
|
669
|
+
})
|
|
670
|
+
})
|