A library enabling users to interact with AWS resources for k6.io
This is an AWS client library for k6. It intends to allow interacting with a subset of AWS services in the context of k6 load test script.
At the moment, this library provides the following:
S3Client
: allows to list buckets and bucket's objects, as well as uploading, downloading, and deletion of objects.SecretsManager
: allows to list, get, create, update and delete secrets from the AWS secrets manager service.SQS
: allows to list queues and send messages from AWS SQS.KMS
: allows to list KMS keys and generate a unique symmetric data key for use outside of AWS KMSSSM
: allows to retrieve a parameter from AWS Systems ManagerV4 signature
: allows to sign requests to amazon AWS servicesKinesisClient
: allows all APIs for Kinesis available by AWS.
We welcome contributions from the community! Please read our contributing guide and code of conduct before getting started.
Consult the S3Client
dedicated k6 documentation page for more details on its methods and how to use it.
import { check } from 'k6';
import exec from 'k6/execution';
import http from 'k6/http';
import { AWSConfig, S3Client } from 'https://jslib.k6.io/aws/0.9.0/s3.js';
const awsConfig = new AWSConfig(
__ENV.AWS_REGION,
__ENV.AWS_ACCESS_KEY_ID,
__ENV.AWS_SECRET_ACCESS_KEY
);
const s3 = new S3Client(awsConfig);
const testBucketName = 'test-jslib-aws';
const testInputFileKey = 'productIDs.json';
const testOutputFileKey = `results-${Date.now()}.json`;
export async function setup() {
// If our test bucket does not exist, abort the execution.
const buckets = await s3.listBuckets();
if (buckets.filter((b) => b.name === testBucketName).length == 0) {
exec.test.abort();
}
// If our test object does not exist, abort the execution.
const objects = await s3.listObjects(testBucketName);
if (objects.filter((o) => o.key === testInputFileKey).length == 0) {
exec.test.abort();
}
// Download the S3 object containing our test data
const inputObject = await s3.getObject(testBucketName, testInputFileKey);
// Let's return the downloaded S3 object's data from the
// setup function to allow the default function to use it.
return {
productIDs: JSON.parse(inputObject.data),
};
}
export default async function (data) {
// Pick a random product ID from our test data
const randomProductID = data.productIDs[Math.floor(Math.random() * data.productIDs.length)];
// Query our ecommerce website's product page using the ID
const res = await http.asyncRequest("GET", `http://your.website.com/product/${randomProductID}/`);
check(res, { 'is status 200': res.status === 200 });
}
export async function handleSummary(data) {
// Once the load test is over, let's upload the results to our
// S3 bucket. This is executed after teardown.
await s3.putObject(testBucketName, testOutputFileKey, JSON.stringify(data));
}
Consult the SecretsManagerClient
dedicated k6 documentation page for more details on its methods and how to use it.
import exec from 'k6/execution'
import { AWSConfig, SecretsManagerClient } from 'https://jslib.k6.io/aws/0.9.0/secrets-manager.js'
const awsConfig = new AWSConfig(
__ENV.AWS_REGION,
__ENV.AWS_ACCESS_KEY_ID,
__ENV.AWS_SECRET_ACCESS_KEY
)
const secretsManager = new SecretsManagerClient(awsConfig)
const testSecretName = 'jslib-test-secret'
const testSecretValue = 'jslib-test-value'
export default async function () {
// Let's make sure our test secret is created
const testSecret = await secretsManager.createSecret(
testSecretName,
testSecretValue,
'this is a test secret, delete me.'
)
// List the secrets the AWS authentication configuration
// gives us access to, and verify the creation was successful.
const secrets = await secretsManager.listSecrets()
if (!secrets.filter((s) => s.name === testSecret.name).length == 0) {
exec.test.abort('test secret not found')
}
// Now that we know the secret exist, let's update its value
const newTestSecretValue = 'new-test-value'
await secretsManager.putSecretValue(testSecretName, newTestSecretValue)
// Let's get its value and verify it was indeed updated
const updatedSecret = await secretsManager.getSecret(testSecretName)
if (updatedSecret.secretString !== newTestSecretValue) {
exec.test.abort('unable to update test secret')
}
// Finally, let's delete our test secret and verify it worked
await secretsManager.deleteSecret(updatedSecret.name, { noRecovery: true })
}
Consult the SQSClient
dedicated k6 documentation page for more details on its methods and how to use it.
import { check } from 'k6';
import exec from 'k6/execution';
import http from 'k6/http';
import { AWSConfig, SQSClient } from 'https://jslib.k6.io/aws/0.9.0/sqs.js';
const awsConfig = new AWSConfig({
region: __ENV.AWS_REGION,
accessKeyId: __ENV.AWS_ACCESS_KEY_ID,
secretAccessKey: __ENV.AWS_SECRET_ACCESS_KEY,
sessionToken: __ENV.AWS_SESSION_TOKEN,
});
const sqs = new SQSClient(awsConfig);
const testQueue = 'https://sqs.us-east-1.amazonaws.com/000000000/test-queue';
export default async function () {
// If our test queue does not exist, abort the execution.
const queuesResponse = await sqs.listQueues()
if (queuesResponse.queueUrls.filter((q) => q === testQueue).length == 0) {
exec.test.abort()
}
// Send message to test queue
await sqs.sendMessage(testQueue, JSON.stringify({value: '123'}));
}
Consult the KMS
dedicated k6 documentation page for more details on its methods and how to use it.
import exec from 'k6/execution'
import { AWSConfig, KMSClient } from '../build/kms.js'
const awsConfig = new AWSConfig({
region: __ENV.AWS_REGION,
accessKeyId: __ENV.AWS_ACCESS_KEY_ID,
secretAccessKey: __ENV.AWS_SECRET_ACCESS_KEY,
})
const KMS = new KMSClient(awsConfig)
const KeyId = 'alias/TestKey'
export default async function () {
// Currently, the keys need to be created before hand
// First let's list the keys we have available
const keys = await KMS.listKeys()
if (keys.length == 0) {
exec.test.abort('test keys not found')
}
const key = keys.filter((s) => s.keyId === KeyId)
if (!key) {
exec.test.abort('target test key not found')
}
//Run generateDataKey call on the key, with the default 32 byte size
const dataKey = await KMS.generateDataKey(key.keyId)
if (dataKey.ciphertextBlobText == undefined) {
exec.test.abort('data key not generated')
}
}
Consult the SystemsManagerClient
dedicated k6 documentation page for more details on its methods and how to use it.
import exec from 'k6/execution'
import { AWSConfig, SystemsManagerClient } from 'https://jslib.k6.io/aws/0.9.0/ssm.js';
const awsConfig = new AWSConfig({
region: __ENV.AWS_REGION,
accessKeyId: __ENV.AWS_ACCESS_KEY_ID,
secretAccessKey: __ENV.AWS_SECRET_ACCESS_KEY,
sessionToken: __ENV.AWS_SESSION_TOKEN,
})
const systemsManager = new SystemsManagerClient(awsConfig)
const testParameterName = 'jslib-test-parameter'
const testParameterValue = 'jslib-test-value'
const testParameterSecretName = 'jslib-test-parameter-secret'
// this value was created with --type SecureString
const testParameterSecretValue = 'jslib-test-secret-value'
export default async function () {
// Currently the parameter needs to be created before hand
// Let's get its value
// getParameter returns an parameter object: e.g. {parameter: {name: string, value: string...}}
const parameter = await systemsManager.getParameter(testParameterName)
if (parameter.value !== testParameterValue) {
exec.test.abort('test parameter not found')
}
// Let's get the secret value with decryption
// destructure the parameter object to get to the values you want
const {
parameter: { value: encryptedParameterValue },
} = systemsManager.getParameter(testParameterSecretName, true)
if (encryptedParameterValue !== testParameterSecretValue) {
exec.test.abort('encrypted test parameter not found')
}
}
Consult the KinesisClient
dedicated k6 documentation page for more details on its methods and how to use it.
import exec from 'k6/execution'
import encoding from 'k6/encoding';
import { fail } from 'k6';
import { AWSConfig, KinesisClient } from 'https://jslib.k6.io/aws/0.9.0/kinesis.js'
const awsConfig = new AWSConfig({
region: __ENV.AWS_REGION,
accessKeyId: __ENV.AWS_ACCESS_KEY_ID,
secretAccessKey: __ENV.AWS_SECRET_ACCESS_KEY,
sessionToken: __ENV.AWS_SESSION_TOKEN,
})
const kinesis = new KinesisClient(awsConfig)
export default async function () {
// List the streamds the AWS authentication configuration
// gives us access to.
const streams = await kinesis.listStreams()
if (streams.StreamNames.filter((s) => s === dummyStream).length == 0) {
fail(`Stream ${dummyStream} does not exist`)
}
// Create our test stream
await kinesis.createStream(dummyStream, {
ShardCount: 10,
StreamModeDetails: {
StreamMode: 'PROVISIONED',
},
})
// Put some records in it
const records = await kinesis.putRecords({
StreamName: dummyStream,
Records: [
{
Data: encoding.b64encode(JSON.stringify({ this: 'is', a: 'test' })),
PartitionKey: 'partitionKey1',
},
{
Data: encoding.b64encode(JSON.stringify([{ this: 'is', second: 'test' }])),
PartitionKey: 'partitionKey2',
},
],
})
// List the streams' shards
const shards = await kinesis.listShards(dummyStream).Shards.map((shard) => shard.ShardId)
// For each shard, read all the data
shards.map(async (shard) => {
const iterator = await kinesis.getShardIterator(dummyStream, shardId, `TRIM_HORIZON`)
while (true) {
const res = await kinesis.getRecords({ ShardIterator: iterator })
iterator = res.NextShardIterator
if (!res.MillisBehindLatest || res.MillisBehindLatest == `0`) {
break
}
}
})
// Delete the stream
await kinesis.deleteStream({ StreamName: dummyStream })
}
The scope of this library has been kept minimal and limited to the use cases we, and our clients, need. If the library doesn't cater to your needs just yet, feel free to add it, and open a pull-request. We welcome contributions.
# Install the local dependencies
npm install
# Bundle it in preparation for a publication
npm run-script webpack
# Run the tests
npm test
- Build.
- Use the
./build/aws.js
to make a PR to jslib.k6.io.
k6-jslib-aws is developped by the k6 core development team. Maintainers of this jslib specifically are the following:
- Théo Crevon, core k6 developer @oleiade