Skip to content

Latest commit

 

History

History
384 lines (302 loc) · 13.5 KB

File metadata and controls

384 lines (302 loc) · 13.5 KB

@lokalise/aws-config

Very opinionated TypeScript library for managing AWS configuration, resource naming, tagging, event routing, and integration with @message-queue-toolkit/sns and @message-queue-toolkit/sqs.

Usage

AWS Configuration

Read AWS configuration from environment variables using ConfigScope:

import { getAwsConfig } from '@lokalise/aws-config';

const awsConfig = getAwsConfig();

Using with envase (nested config)

For applications using envase that nest AWS config under a key like aws, pass { path: 'aws' } so the computed resolvers access fullParsedConfig.aws instead of fullParsedConfig:

import { createConfig, envvar } from 'envase';
import { z } from 'zod';
import { getEnvaseAwsConfig } from '@lokalise/aws-config';

const awsConfig = getEnvaseAwsConfig({ path: 'aws' });

const config = createConfig(process.env, {
  schema: {
    aws: awsConfig.schema,
    appName: envvar('APP_NAME', z.string()),
  },
  computed: {
    aws: awsConfig.computed,
  },
});

console.log(config.aws.region); // string
console.log(config.aws.credentials); // AwsCredentialIdentity | Provider<AwsCredentialIdentity>
console.log(config.appName); // string

Using with envase (flat config)

When AWS fields don't need to be namespaced, omit path and spread the fragments at root level:

import { createConfig, envvar } from 'envase';
import { z } from 'zod';
import { getEnvaseAwsConfig } from '@lokalise/aws-config';

const awsConfig = getEnvaseAwsConfig();

const config = createConfig(process.env, {
  schema: {
    ...awsConfig.schema,
    appName: envvar('APP_NAME', z.string()),
  },
  computed: {
    ...awsConfig.computed,
  },
});

console.log(config.region); // string
console.log(config.credentials); // AwsCredentialIdentity | Provider<AwsCredentialIdentity>

Schema validation

The schema includes Zod validation with:

  • Required region field (must be non-empty string)
  • Optional kmsKeyId field (defaults to empty string)
  • Optional allowedSourceOwner field
  • Optional endpoint field with URL validation
  • Optional resourcePrefix with max length validation (10 characters)
  • Optional accessKeyId and secretAccessKey fields for credential resolution

Credentials resolution

The computed.credentials resolver handles credential resolution:

  • If both accessKeyId and secretAccessKey are present: returns static credentials
  • Otherwise: returns a credential provider chain (token file, instance metadata, env, INI)

Environment Variable Constants

For consistency, you can use the exported environment variable name constants:

import { AWS_CONFIG_ENV_VARS } from '@lokalise/aws-config';

// AWS_CONFIG_ENV_VARS.REGION === 'AWS_REGION'
// AWS_CONFIG_ENV_VARS.KMS_KEY_ID === 'AWS_KMS_KEY_ID'
// AWS_CONFIG_ENV_VARS.ALLOWED_SOURCE_OWNER === 'AWS_ALLOWED_SOURCE_OWNER'
// AWS_CONFIG_ENV_VARS.ENDPOINT === 'AWS_ENDPOINT'
// AWS_CONFIG_ENV_VARS.RESOURCE_PREFIX === 'AWS_RESOURCE_PREFIX'
// AWS_CONFIG_ENV_VARS.ACCESS_KEY_ID === 'AWS_ACCESS_KEY_ID'
// AWS_CONFIG_ENV_VARS.SECRET_ACCESS_KEY === 'AWS_SECRET_ACCESS_KEY'

Environment Variables

Set the following environment variables:

  • AWS_REGION (required): AWS region where resources will be created and requests are sent (e.g., us-east-1).
  • AWS_KMS_KEY_ID (optional): ID or ARN of the AWS KMS key used to encrypt SNS topics and SQS queues. If omitted, the default AWS-managed key is used.
  • AWS_ALLOWED_SOURCE_OWNER (optional): AWS account ID permitted as the source owner for cross-account SNS subscriptions, helping restrict unauthorized message publishers.
  • AWS_ENDPOINT (optional): Custom endpoint URL for AWS services, commonly used for local testing with tools like LocalStack (e.g., http://localhost:4566).
  • AWS_RESOURCE_PREFIX (optional): Prefix applied to all AWS resource names to avoid naming collisions or support multi-tenancy. See Resource Prefix below for details. Maximum allowed prefix length is 10 characters.
  • AWS_ACCESS_KEY_ID & AWS_SECRET_ACCESS_KEY (optional): AWS credentials for programmatic access. If unset, the AWS SDK's default credential provider chain (environment variables, shared credentials file, EC2 instance metadata, etc.) is used.

Resource Prefix

Apply the configured resource prefix:

import { applyAwsResourcePrefix } from '@lokalise/aws-config';

const fullName = applyAwsResourcePrefix('my-resource', awsConfig);

How it works:
The resource prefix is defined by the AWS_RESOURCE_PREFIX environment variable. When set, it is prepended to resource names using an underscore. For example:

applyAwsResourcePrefix('orders', awsConfig) // returns 'tenant123_orders' when AWS_RESOURCE_PREFIX='tenant123'

This helps:

  • Prevent naming collisions across environments, accounts, or tenants
  • Support multi-tenancy by isolating each tenant's resources

If no prefix is provided, the original resource name is returned unchanged. Note that the prefix contributes to the total resource name length, which must comply with AWS service limits.

Tagging AWS Resources

Generate standardized tags for SNS and SQS:

import { getSnsTags, getSqsTags, type AwsTagsParams } from '@lokalise/aws-config';

const tagParams: AwsTagsParams = {
  appEnv: 'production',
  system: 'backend',
  owner: 'team-x',
  project: 'project-y',
  service: 'my-service',
};

const snsTags = getSnsTags(tagParams);
const sqsTags = getSqsTags(tagParams);

Event Routing Configuration (SNS Topics)

Define SNS topics and their associated SQS queues for event-driven architecture:

import type { EventRoutingConfig } from '@lokalise/aws-config';

const routingConfig: EventRoutingConfig = {
  // internal topic example (managed and created by your application)
  ordersTopic: {
    topicName: 'orders',
    owner: 'team-x',
    service: 'order-service',
    queues: {
      orderCreated: { queueName: 'order-created', owner: 'team-x', service: 'order-service' },
    },
    externalAppsWithSubscribePermissions: ['other-app'],
  },
  // external topic example (managed outside your application)
  externalTopic: {
    topicName: 'external-events',
    isExternal: true,
    queues: {
      eventQueue: { queueName: 'event-queue', owner: 'team-x', service: 'order-service' },
    },
  },
};

Internal vs. External Topics

  • Internal Topics (default)

    • You own and manage the SNS topic.
    • TopicConfig must include owner, service, and optionally externalAppsWithSubscribePermissions.
    • At runtime, the MessageQueueToolkitSnsOptionsResolver will resolve consumer/publisher options with a CreateTopic command (with name prefixing, tags, KMS settings) and set up subscriptions for your queues and any external apps.
  • External Topics (isExternal: true)

    • The SNS topic is pre‑existing and managed outside your application.
    • TopicConfig includes topicName, isExternal: true, and your queues, but must omit owner, service, and externalAppsWithSubscribePermissions.
    • At runtime, the resolver will return consumer/publisher options with a LocatorConfig for the existing topic by name and subscribe your queues. No topic creation or tagging is attempted.

Under the hood, the TypeScript union enforces this shape.

Command Configuration (SQS Queues)

Define SQS queues for command-based messaging patterns:

import type { CommandConfig } from '@lokalise/aws-config';

const commandConfig: CommandConfig = {
  // internal queue example (managed and created by your application)
  processOrder: {
    queueName: 'process-order',
    owner: 'team-x',
    service: 'order-service',
  },
  sendNotification: {
    queueName: 'send-notification',
    owner: 'team-y',
    service: 'notification-service',
  },
  // external queue example (managed outside your application)
  externalCommand: {
    queueName: 'external-command-queue',
    isExternal: true,
  },
};

Internal vs. External Queues

  • Internal Queues (default)

    • You own and manage the SQS queue.
    • QueueConfig must include owner and service.
    • At runtime, the MessageQueueToolkitSqsOptionsResolver will resolve consumer/publisher options with a CreateQueue command (with name prefixing, tags, KMS settings, DLQ configuration).
  • External Queues (isExternal: true)

    • The SQS queue is pre‑existing and managed outside your application.
    • QueueConfig includes queueName and isExternal: true, but must omit owner and service.
    • At runtime, the resolver will return consumer/publisher options with a LocatorConfig for the existing queue by name.
    • No queue creation or tagging is attempted.

Message Queue Toolkit SNS Resolver

Automatically build publisher and consumer options with @message-queue-toolkit/sns:

import { MessageQueueToolkitSnsOptionsResolver } from '@lokalise/aws-config';
import { getAwsConfig } from '@lokalise/aws-config';
import { logger } from '@lokalise/node-core';

const awsConfig = getAwsConfig();
const resolver = new MessageQueueToolkitSnsOptionsResolver(routingConfig, {
  appEnv: 'production',
  system: 'backend',
  project: 'order-project',
  validateNamePatterns: true,
});

const publishOpts = resolver.resolvePublisherBuildOptions({
  topicName: 'ordersTopic',
  awsConfig,
  logger,
  messageSchemas: { /* your schemas… */ },
  logMessages: true,
});

const consumeOpts = resolver.resolveConsumerBuildOptions({
  topicName: 'ordersTopic',
  queueName: 'orderCreated',
  awsConfig,
  logger,
  handlers: [ /* your handlers… */ ],
  concurrentConsumersAmount: 2,
  batchSize: 10,
  logMessages: false,
});

Message Queue Toolkit SQS Resolver

Automatically build publisher and consumer options with @message-queue-toolkit/sqs:

import { MessageQueueToolkitSqsOptionsResolver } from '@lokalise/aws-config';
import { getAwsConfig } from '@lokalise/aws-config';
import { logger } from '@lokalise/node-core';

const awsConfig = getAwsConfig();
const resolver = new MessageQueueToolkitSqsOptionsResolver(commandConfig, {
  appEnv: 'production',
  system: 'backend',
  project: 'order-project',
  validateNamePatterns: true,
});

const publishOpts = resolver.resolvePublisherOptions('processOrder', {
  awsConfig,
  logger,
  messageSchemas: { /* your schemas… */ },
  logMessages: true,
});

const consumeOpts = resolver.resolveConsumerOptions('processOrder', {
  awsConfig,
  logger,
  handlers: [ /* your handlers… */ ],
  concurrentConsumersAmount: 2,
  batchSize: 10,
  logMessages: false,
});

Request Context Pre-handler

When processing messages, both resolvers automatically inject a request context pre-handler to each handler. This pre-handler populates a requestContext object with:

  • reqId: the message metadata correlation ID
  • logger: a child logger instance scoped with the correlation ID (under x-request-id)

Please refer to @message-queue-toolkit documentation for more details on how to use the pre-handler output in your event handlers.

Resource Name Validation

Both resolvers support optional resource name validation via the validateNamePatterns configuration option. When enabled, it validates that your topic and queue names follow Lokalise naming conventions:

const resolver = new MessageQueueToolkitSnsOptionsResolver(routingConfig, {
  appEnv: 'production',
  system: 'backend',
  project: 'my-project',
  validateNamePatterns: true, // Enable validation
});

Naming Conventions:

  • Topics: Must follow the pattern <project>-<moduleOrFlowName>

    • Valid examples: my-project-user_service, my-project-orders
    • Module/flow names must be lowercase with optional underscores as separators
    • Maximum length: 246 characters
    • Note: <project>_<moduleOrFlowName> is temporarily allowed for backwards compatibility
  • Queues: Must follow the pattern <project>-<flow>-<service>(-<module>)?

    • Valid examples: my-project-orders-processor, my-project-user_service-handler-validator
    • Requires at least 2 segments after project: flow and service
    • Optional third segment for module name
    • All segments must be lowercase with optional underscores as separators
    • Maximum length: 64 characters

When validation is enabled, the resolver will throw descriptive errors during construction if any resource names don't match these patterns. This helps catch naming issues early and ensures consistency across your AWS resources.

Opinionated Defaults

Both MessageQueueToolkitSnsOptionsResolver and MessageQueueToolkitSqsOptionsResolver apply opinionated defaults to reduce boilerplate:

  • Default message type field: 'type', used for filtering and routing messages.
  • Publisher:
    • updateAttributesIfExists: true (updates tags and config on existing resources).
    • forceTagUpdate: Defaults to true in development environments, false in all other environments. When enabled, existing resources with mismatched tags will be updated to match the configured tags.
    • Applies standardized tags, see tags section above.
  • Consumer:
    • Dead-letter queue automatically created with suffix -dlq, redrivePolicy.maxReceiveCount = 5, retention = 7 days.
    • maxRetryDuration: 2 days for in-flight message retries.
    • heartbeatInterval: 20 seconds for visibility timeout heartbeats.
    • updateAttributesIfExists: true (updates tags/config if resource exists).
    • Resource prefixing and tagging applied uniformly to topics and queues.
    • In test mode (isTest = true):
      • Skips DLQ creation.
      • Sets deleteIfExists: true to remove resources after tests.
      • terminateVisibilityTimeout: true for immediate retries.