reg-publish-s3app-plugin
v1.0.2
Published
Fetch and publish snapshot images to AWS S3 and provides ability to accept/reject changes in reg-suit report on s3
Downloads
5
Readme
reg-publish-s3app-plugin
reg-suit plugin to fetch and publish snapshot images to AWS S3. This plugin is an extended version of reg-publish-s3-plugin
. This plugin provides the facility to approve or reject changes in comparison reports in s3. By using this plugin you can do the below tasks.
- Approve the changed image and make new image as expected image.
- Reject the changed image and make the previous image as expected image.
- Add the new image as expected image.
- Ignore the new image from reg-suit report.
- Recover the deleted image.
- Delete the image permanently that is deleted by reg-suit.
Install
npm i reg-publish-s3app-plugin -D
reg-suit prepare -p publish-s3app
AWS Credentials
This plugin needs AWS credentials to access S3. You can set them by the following 2 methods.
Environment values
export AWS_ACCESS_KEY_ID=<your-access-key>
export AWS_SECRET_ACCESS_KEY=<your-secret-key>
Create INI file
Create a file at ~/.aws/credentials
and edit it. For example:
[default]
aws_access_key_id = <your-access-key>
aws_secret_access_key = <your-secret-key>
Configure
{
bucketName: string;
acl?: string;
sse?: boolean | string;
customDomain?: string;
pathPrefix?: string;
}
bucketName
- Required - AWS S3 bucket name to publish the snapshot images to.acl
- Optional - Specify ACL property. By default,public-read
.sse
- Optional - Specify server-side encryption property. Defaultfalse
. If you settrue
, this plugin send with--sse="AES256
.customDomain
- Optional - Set if you have your domain and host S3 on it. If set, the HTML report will be published with this custom domain(e.g.https://your-sub.example.com/...
).pathPrefix
- Optional - Specify paths. For example if you setsome_dir
, the report is published with URL such ashttps://your-backet-name.s3.amazonaws.com/some_dir/xxxxxxxxx/index.html
.
Accept / Reject changes in reg-suit report on s3.
To accept or reject changes in reg-suit s3 report, open reg-suit report in browser and use aws Identity pool id
for authentication.
To create the s3 Identity pool ID, please follow below steps.
- Login to https://aws.amazon.com/
- Sign in to AWS Management Console
- Click on
Cognito
link - Click on
Manage Identity Pools
button - Click on
Create new Identity pool
button - Enter
Identity pool name
- Check on
Enable access to unauthenticated identities
- Click on create pool and allow access
- Now select platform as java script and look for IdentityPoolId. The value of IdentityPoolId should be like
us-east-2:*******
. This IdentityPoolId can be used to make any changes in the reg-suit s3 report. - Now go to aws IAM module
- Click on Roles
- Look for Cognito_
your_cognito_pool_name
Unauth_Role and click on it - Click on
Attach policies
button and search forAmazonS3FullAccess
- Select
AmazonS3FullAccess
and click onAttach Policy
button. - Now you can use your IdentityPoolId (
same that was created in step 9
) to make changes in reg-suit report in s3.