@lokalise/aws-config
v8.0.0
Published
Very opinionated TypeScript library for managing AWS configuration, resource naming, tagging, event routing, and integration with @message-queue-toolkit/sns and @message-queue-toolkit/sqs.
Downloads
24,278
Maintainers
Keywords
Readme
@lokalise/aws-config
Very opinionated TypeScript library for managing AWS configuration, resource naming, tagging, event routing, and integration with @message-queue-toolkit/sns and @message-queue-toolkit/sqs.
Usage
AWS Configuration
Read AWS configuration from environment variables using ConfigScope:
import { getAwsConfig } from '@lokalise/aws-config';
const awsConfig = getAwsConfig();Using with envase
For applications using the envase library for configuration management,
use getEnvaseAwsConfig() to get schema and computed fragments that can be composed into your application's
createConfig() call:
import { createConfig, envvar } from 'envase';
import { z } from 'zod';
import { getEnvaseAwsConfig } from '@lokalise/aws-config';
const awsConfig = getEnvaseAwsConfig();
// Spread fragments into your config (flat structure)
const config = createConfig(process.env, {
schema: {
...awsConfig.schema,
appName: envvar('APP_NAME', z.string()),
port: envvar('PORT', z.coerce.number().default(3000)),
},
computed: {
...awsConfig.computed,
},
});
// Access typed configuration
console.log(config.region); // string
console.log(config.credentials); // AwsCredentialIdentity | Provider<AwsCredentialIdentity>
console.log(config.appName); // stringNested AWS Namespace
When nesting AWS config under a namespace, wrap the computed resolver to access nested raw values:
const awsConfig = getEnvaseAwsConfig();
const config = createConfig(process.env, {
schema: {
aws: awsConfig.schema,
appName: envvar('APP_NAME', z.string()),
},
computed: {
aws: {
credentials: (raw: { aws: { accessKeyId?: string; secretAccessKey?: string } }) =>
awsConfig.computed.credentials(raw.aws),
},
},
});
console.log(config.aws.region); // string
console.log(config.aws.credentials); // resolved credentialsThe schema includes Zod validation with:
- Required
regionfield (must be non-empty string) - Optional
kmsKeyIdfield (defaults to empty string) - Optional
allowedSourceOwnerfield - Optional
endpointfield with URL validation - Optional
resourcePrefixwith max length validation (10 characters) - Optional
accessKeyIdandsecretAccessKeyfields for credential resolution
Credentials Resolution
The computed.credentials resolver handles credential resolution:
- If both
accessKeyIdandsecretAccessKeyare present: returns static credentials - Otherwise: returns a credential provider chain (token file, instance metadata, env, INI)
Environment Variable Constants
For consistency, you can use the exported environment variable name constants:
import { AWS_CONFIG_ENV_VARS } from '@lokalise/aws-config';
// AWS_CONFIG_ENV_VARS.REGION === 'AWS_REGION'
// AWS_CONFIG_ENV_VARS.KMS_KEY_ID === 'AWS_KMS_KEY_ID'
// AWS_CONFIG_ENV_VARS.ALLOWED_SOURCE_OWNER === 'AWS_ALLOWED_SOURCE_OWNER'
// AWS_CONFIG_ENV_VARS.ENDPOINT === 'AWS_ENDPOINT'
// AWS_CONFIG_ENV_VARS.RESOURCE_PREFIX === 'AWS_RESOURCE_PREFIX'
// AWS_CONFIG_ENV_VARS.ACCESS_KEY_ID === 'AWS_ACCESS_KEY_ID'
// AWS_CONFIG_ENV_VARS.SECRET_ACCESS_KEY === 'AWS_SECRET_ACCESS_KEY'Environment Variables
Set the following environment variables:
AWS_REGION(required): AWS region where resources will be created and requests are sent (e.g.,us-east-1).AWS_KMS_KEY_ID(optional): ID or ARN of the AWS KMS key used to encrypt SNS topics and SQS queues. If omitted, the default AWS-managed key is used.AWS_ALLOWED_SOURCE_OWNER(optional): AWS account ID permitted as the source owner for cross-account SNS subscriptions, helping restrict unauthorized message publishers.AWS_ENDPOINT(optional): Custom endpoint URL for AWS services, commonly used for local testing with tools like LocalStack (e.g.,http://localhost:4566).AWS_RESOURCE_PREFIX(optional): Prefix applied to all AWS resource names to avoid naming collisions or support multi-tenancy. See Resource Prefix below for details. Maximum allowed prefix length is 10 characters.AWS_ACCESS_KEY_ID&AWS_SECRET_ACCESS_KEY(optional): AWS credentials for programmatic access. If unset, the AWS SDK's default credential provider chain (environment variables, shared credentials file, EC2 instance metadata, etc.) is used.
Resource Prefix
Apply the configured resource prefix:
import { applyAwsResourcePrefix } from '@lokalise/aws-config';
const fullName = applyAwsResourcePrefix('my-resource', awsConfig);How it works:
The resource prefix is defined by the AWS_RESOURCE_PREFIX environment variable. When set, it is prepended to resource
names using an underscore. For example:
applyAwsResourcePrefix('orders', awsConfig) // returns 'tenant123_orders' when AWS_RESOURCE_PREFIX='tenant123'This helps:
- Prevent naming collisions across environments, accounts, or tenants
- Support multi-tenancy by isolating each tenant's resources
If no prefix is provided, the original resource name is returned unchanged. Note that the prefix contributes to the total resource name length, which must comply with AWS service limits.
Tagging AWS Resources
Generate standardized tags for SNS and SQS:
import { getSnsTags, getSqsTags, type AwsTagsParams } from '@lokalise/aws-config';
const tagParams: AwsTagsParams = {
appEnv: 'production',
system: 'backend',
owner: 'team-x',
project: 'project-y',
service: 'my-service',
};
const snsTags = getSnsTags(tagParams);
const sqsTags = getSqsTags(tagParams);Event Routing Configuration (SNS Topics)
Define SNS topics and their associated SQS queues for event-driven architecture:
import type { EventRoutingConfig } from '@lokalise/aws-config';
const routingConfig: EventRoutingConfig = {
// internal topic example (managed and created by your application)
ordersTopic: {
topicName: 'orders',
owner: 'team-x',
service: 'order-service',
queues: {
orderCreated: { queueName: 'order-created', owner: 'team-x', service: 'order-service' },
},
externalAppsWithSubscribePermissions: ['other-app'],
},
// external topic example (managed outside your application)
externalTopic: {
topicName: 'external-events',
isExternal: true,
queues: {
eventQueue: { queueName: 'event-queue', owner: 'team-x', service: 'order-service' },
},
},
};Internal vs. External Topics
Internal Topics (default)
- You own and manage the SNS topic.
TopicConfigmust includeowner,service, and optionallyexternalAppsWithSubscribePermissions.- At runtime, the
MessageQueueToolkitSnsOptionsResolverwill resolve consumer/publisher options with a CreateTopic command (with name prefixing, tags, KMS settings) and set up subscriptions for your queues and any external apps.
External Topics (
isExternal: true)- The SNS topic is pre‑existing and managed outside your application.
TopicConfigincludestopicName,isExternal: true, and yourqueues, but must omitowner,service, andexternalAppsWithSubscribePermissions.- At runtime, the resolver will return consumer/publisher options with a
LocatorConfigfor the existing topic by name and subscribe your queues. No topic creation or tagging is attempted.
Under the hood, the TypeScript union enforces this shape.
Command Configuration (SQS Queues)
Define SQS queues for command-based messaging patterns:
import type { CommandConfig } from '@lokalise/aws-config';
const commandConfig: CommandConfig = {
// internal queue example (managed and created by your application)
processOrder: {
queueName: 'process-order',
owner: 'team-x',
service: 'order-service',
},
sendNotification: {
queueName: 'send-notification',
owner: 'team-y',
service: 'notification-service',
},
// external queue example (managed outside your application)
externalCommand: {
queueName: 'external-command-queue',
isExternal: true,
},
};Internal vs. External Queues
Internal Queues (default)
- You own and manage the SQS queue.
QueueConfigmust includeownerandservice.- At runtime, the
MessageQueueToolkitSqsOptionsResolverwill resolve consumer/publisher options with a CreateQueue command (with name prefixing, tags, KMS settings, DLQ configuration).
External Queues (
isExternal: true)- The SQS queue is pre‑existing and managed outside your application.
QueueConfigincludesqueueNameandisExternal: true, but must omitownerandservice.- At runtime, the resolver will return consumer/publisher options with a
LocatorConfigfor the existing queue by name. - No queue creation or tagging is attempted.
Message Queue Toolkit SNS Resolver
Automatically build publisher and consumer options with @message-queue-toolkit/sns:
import { MessageQueueToolkitSnsOptionsResolver } from '@lokalise/aws-config';
import { getAwsConfig } from '@lokalise/aws-config';
import { logger } from '@lokalise/node-core';
const awsConfig = getAwsConfig();
const resolver = new MessageQueueToolkitSnsOptionsResolver(routingConfig, {
appEnv: 'production',
system: 'backend',
project: 'order-project',
validateNamePatterns: true,
});
const publishOpts = resolver.resolvePublisherBuildOptions({
topicName: 'ordersTopic',
awsConfig,
logger,
messageSchemas: { /* your schemas… */ },
logMessages: true,
});
const consumeOpts = resolver.resolveConsumerBuildOptions({
topicName: 'ordersTopic',
queueName: 'orderCreated',
awsConfig,
logger,
handlers: [ /* your handlers… */ ],
concurrentConsumersAmount: 2,
batchSize: 10,
logMessages: false,
});Message Queue Toolkit SQS Resolver
Automatically build publisher and consumer options with @message-queue-toolkit/sqs:
import { MessageQueueToolkitSqsOptionsResolver } from '@lokalise/aws-config';
import { getAwsConfig } from '@lokalise/aws-config';
import { logger } from '@lokalise/node-core';
const awsConfig = getAwsConfig();
const resolver = new MessageQueueToolkitSqsOptionsResolver(commandConfig, {
appEnv: 'production',
system: 'backend',
project: 'order-project',
validateNamePatterns: true,
});
const publishOpts = resolver.resolvePublisherOptions('processOrder', {
awsConfig,
logger,
messageSchemas: { /* your schemas… */ },
logMessages: true,
});
const consumeOpts = resolver.resolveConsumerOptions('processOrder', {
awsConfig,
logger,
handlers: [ /* your handlers… */ ],
concurrentConsumersAmount: 2,
batchSize: 10,
logMessages: false,
});Request Context Pre-handler
When processing messages, both resolvers automatically inject a request context pre-handler to each handler.
This pre-handler populates a requestContext object with:
reqId: the message metadata correlation IDlogger: a child logger instance scoped with the correlation ID (underx-request-id)
Please refer to @message-queue-toolkit documentation for more details on how to use the pre-handler output in your
event handlers.
Resource Name Validation
Both resolvers support optional resource name validation via the validateNamePatterns configuration option.
When enabled, it validates that your topic and queue names follow Lokalise naming conventions:
const resolver = new MessageQueueToolkitSnsOptionsResolver(routingConfig, {
appEnv: 'production',
system: 'backend',
project: 'my-project',
validateNamePatterns: true, // Enable validation
});Naming Conventions:
Topics: Must follow the pattern
<project>-<moduleOrFlowName>- Valid examples:
my-project-user_service,my-project-orders - Module/flow names must be lowercase with optional underscores as separators
- Maximum length: 246 characters
- Note:
<project>_<moduleOrFlowName>is temporarily allowed for backwards compatibility
- Valid examples:
Queues: Must follow the pattern
<project>-<flow>-<service>(-<module>)?- Valid examples:
my-project-orders-processor,my-project-user_service-handler-validator - Requires at least 2 segments after project: flow and service
- Optional third segment for module name
- All segments must be lowercase with optional underscores as separators
- Maximum length: 64 characters
- Valid examples:
When validation is enabled, the resolver will throw descriptive errors during construction if any resource names don't match these patterns. This helps catch naming issues early and ensures consistency across your AWS resources.
Opinionated Defaults
Both MessageQueueToolkitSnsOptionsResolver and MessageQueueToolkitSqsOptionsResolver apply opinionated defaults to reduce boilerplate:
- Default message type field:
'type', used for filtering and routing messages. - Publisher:
updateAttributesIfExists:true(updates tags and config on existing resources).forceTagUpdate: Defaults totruein development environments,falsein all other environments. When enabled, existing resources with mismatched tags will be updated to match the configured tags.- Applies standardized tags, see tags section above.
- Consumer:
- Dead-letter queue automatically created with suffix
-dlq,redrivePolicy.maxReceiveCount = 5, retention = 7 days. maxRetryDuration: 2 days for in-flight message retries.heartbeatInterval: 20 seconds for visibility timeout heartbeats.updateAttributesIfExists:true(updates tags/config if resource exists).- Resource prefixing and tagging applied uniformly to topics and queues.
- In test mode (
isTest = true):- Skips DLQ creation.
- Sets
deleteIfExists: trueto remove resources after tests. terminateVisibilityTimeout:truefor immediate retries.
- Dead-letter queue automatically created with suffix
