npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

@seek/aws-codedeploy-hooks

v3.0.0

Published

Runtime helpers for working with AWS CodeDeploy Hooks

Readme

@seek/aws-codedeploy-hooks

npm package Node.js version

Runtime helpers for working with AWS CodeDeploy Hooks.

Usage

isHttpHook

Whether the HTTP request originated from AWS CodeDeploy Hooks.

This can be used to customise smoke test handling. When recovering a system with unhealthy dependencies, it may be desirable to expedite recovery efforts by skipping pre-deployment checks, while continuing to run the checks as per usual on subsequent health check polling.

const smokeTest = (req: Request) => {
  if (process.env.SKIP_SMOKE && isHttpHook(req)) {
    // Expedite deployment even if dependencies are unhealthy.
    return;
  }

  // Run dependency checks otherwise.
  return checkDependencies();
};

Checks for a user-agent header that starts with either:

  • aws-codedeploy-hook-BeforeAllowTraffic/
  • gantry-codedeploy-hook-BeforeAllowTraffic-

Compatible with Gantry v2.3.7 and newer.

SKIP_SMOKE will require additional setup. Consider setting the environment variable on your API based on the surrounding CI environment, like the build message or an explicit environment variable against the build.

For example, your Gantry resource file could look like this:

kind: Service
env:
  SKIP_SMOKE: '{{ with env "BUILDKITE_MESSAGE" | lower }}{{ if contains "[skip smoke]" . }}true{{ else }}false{{ end }}{{ end }}'

Or, some magic to handle combinations like [skip ci dev-deploy smoke]:

kind: Service
env:
  SKIP_SMOKE: '{{ with env "BUILDKITE_MESSAGE" | lower }}{{ if regexMatch "\\[skip\\b[^\\]]*\\bsmoke\\b[^\\]]*\\]" . }}true{{ else }}false{{ end }}{{ end }}'

With these in place, you can push a new commit or manually create a new build that includes [skip smoke] somewhere in its title:

[skip smoke] Re-deploy for disaster recovery
Re-deploy for disaster recovery [sKiP SmOkE]

# you can also work with multiple directives if you chose the magic approach
[skip ci smoke] Re-deploy for disaster recovery
Please [skip smoke dev-deploy] work

The resulting Buildkite build will set process.env.SKIP_SMOKE = true on the ECS task and enable it to skip pre-deployment checks.

isLambdaHook

Whether the Lambda invocation originated from AWS CodeDeploy Hooks.

This can be used to customise smoke test handling. When recovering a system with unhealthy dependencies, it may be desirable to expedite recovery efforts by skipping pre-deployment checks, while continuing to run the checks as per usual on subsequent health check polling.

const handler = (event: Event, ctx: Context) => {
  if (!Object.entries(event).length) {
    if (process.env.SKIP_SMOKE && isLambdaHook(event, ctx)) {
      // Expedite deployment even if dependencies are unhealthy.
      return;
    }

    // Run dependency checks otherwise.
    return checkDependencies();
  }

  // Run application logic.
  // ...
};

Checks for:

  • An empty event object
  • A custom user-agent in context that starts with aws-codedeploy-hook-BeforeAllowTraffic/

SKIP_SMOKE will require additional setup. Consider setting the environment variable on your Lambda function based on the surrounding CI environment:

import { containsSkipDirective } from '@seek/aws-codedeploy-hooks';

const lambdaEnvironment = {
  SKIP_SMOKE: containsSkipDirective(process.env.BUILDKITE_MESSAGE, 'smoke')
    ? 'true'
    : undefined,
  // ... other environment variables
};

With this in place, you can push a new commit or manually create a new build that includes [skip smoke] somewhere in its title:

[skip smoke] Re-deploy for disaster recovery
Re-deploy for disaster recovery [sKiP SmOkE]

# you can also work with multiple directives
[skip ci smoke] Re-deploy for disaster recovery
Please [skip smoke dev-deploy] work

The resulting Buildkite build will set process.env.SKIP_SMOKE = true on the Lambda function and enable it to skip pre-deployment checks.

smokeTest.koaMiddleware

A Koa middleware that executes a smoke test function to check whether the application is broadly operational and ready to serve requests.

The skipHook option skips synchronous validation of the smoke test function during pre-deployment checks from an AWS CodeDeploy hook. This may be used when a build needs to be expedited in a disaster recovery scenario or when a dependency is known to be unhealthy.

import { Env } from 'skuba-dive';
import Router from '@koa/router';
import { createLogger } from '@seek/logger';

const config = {
  skipHook: Env.boolean('SKIP_SMOKE', { default: false }),
};

const logger = createLogger();

export const router = new Router().get(
  '/smoke',
  smokeTest.koaMiddleware({ logger, skipHook: config.skipHook }, async () => {
    // Run dependency checks.
    await checkDependencies();
  }),
);

Uses isHttpHook under the hood.