@build-astron-co/nimbus 0.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +21 -0
- package/README.md +628 -0
- package/bin/nimbus +38 -0
- package/package.json +80 -0
- package/src/__tests__/app.test.ts +76 -0
- package/src/__tests__/audit.test.ts +877 -0
- package/src/__tests__/circuit-breaker.test.ts +116 -0
- package/src/__tests__/cli-run.test.ts +115 -0
- package/src/__tests__/context-manager.test.ts +502 -0
- package/src/__tests__/context.test.ts +242 -0
- package/src/__tests__/enterprise.test.ts +401 -0
- package/src/__tests__/generator.test.ts +433 -0
- package/src/__tests__/hooks.test.ts +582 -0
- package/src/__tests__/init.test.ts +436 -0
- package/src/__tests__/intent-parser.test.ts +229 -0
- package/src/__tests__/llm-router.test.ts +209 -0
- package/src/__tests__/lsp.test.ts +293 -0
- package/src/__tests__/modes.test.ts +336 -0
- package/src/__tests__/permissions.test.ts +338 -0
- package/src/__tests__/serve.test.ts +275 -0
- package/src/__tests__/sessions.test.ts +227 -0
- package/src/__tests__/sharing.test.ts +288 -0
- package/src/__tests__/snapshots.test.ts +581 -0
- package/src/__tests__/state-db.test.ts +334 -0
- package/src/__tests__/stream-with-tools.test.ts +732 -0
- package/src/__tests__/subagents.test.ts +176 -0
- package/src/__tests__/system-prompt.test.ts +169 -0
- package/src/__tests__/tool-converter.test.ts +256 -0
- package/src/__tests__/tool-schemas.test.ts +397 -0
- package/src/__tests__/tools.test.ts +143 -0
- package/src/__tests__/version.test.ts +49 -0
- package/src/agent/compaction-agent.ts +227 -0
- package/src/agent/context-manager.ts +435 -0
- package/src/agent/context.ts +427 -0
- package/src/agent/deploy-preview.ts +426 -0
- package/src/agent/index.ts +68 -0
- package/src/agent/loop.ts +717 -0
- package/src/agent/modes.ts +429 -0
- package/src/agent/permissions.ts +466 -0
- package/src/agent/subagents/base.ts +116 -0
- package/src/agent/subagents/cost.ts +51 -0
- package/src/agent/subagents/explore.ts +42 -0
- package/src/agent/subagents/general.ts +54 -0
- package/src/agent/subagents/index.ts +102 -0
- package/src/agent/subagents/infra.ts +59 -0
- package/src/agent/subagents/security.ts +69 -0
- package/src/agent/system-prompt.ts +436 -0
- package/src/app.ts +122 -0
- package/src/audit/activity-log.ts +290 -0
- package/src/audit/compliance-checker.ts +540 -0
- package/src/audit/cost-tracker.ts +318 -0
- package/src/audit/index.ts +23 -0
- package/src/audit/security-scanner.ts +596 -0
- package/src/auth/guard.ts +75 -0
- package/src/auth/index.ts +56 -0
- package/src/auth/oauth.ts +455 -0
- package/src/auth/providers.ts +470 -0
- package/src/auth/sso.ts +113 -0
- package/src/auth/store.ts +505 -0
- package/src/auth/types.ts +187 -0
- package/src/build.ts +141 -0
- package/src/cli/index.ts +16 -0
- package/src/cli/init.ts +854 -0
- package/src/cli/openapi-spec.ts +356 -0
- package/src/cli/run.ts +237 -0
- package/src/cli/serve-auth.ts +80 -0
- package/src/cli/serve.ts +462 -0
- package/src/cli/web.ts +67 -0
- package/src/cli.ts +1417 -0
- package/src/clients/core-engine-client.ts +227 -0
- package/src/clients/enterprise-client.ts +334 -0
- package/src/clients/generator-client.ts +351 -0
- package/src/clients/git-client.ts +627 -0
- package/src/clients/github-client.ts +410 -0
- package/src/clients/helm-client.ts +504 -0
- package/src/clients/index.ts +80 -0
- package/src/clients/k8s-client.ts +497 -0
- package/src/clients/llm-client.ts +161 -0
- package/src/clients/rest-client.ts +130 -0
- package/src/clients/service-discovery.ts +33 -0
- package/src/clients/terraform-client.ts +482 -0
- package/src/clients/tools-client.ts +1843 -0
- package/src/clients/ws-client.ts +115 -0
- package/src/commands/analyze/index.ts +352 -0
- package/src/commands/apply/helm.ts +473 -0
- package/src/commands/apply/index.ts +213 -0
- package/src/commands/apply/k8s.ts +454 -0
- package/src/commands/apply/terraform.ts +582 -0
- package/src/commands/ask.ts +167 -0
- package/src/commands/audit/index.ts +238 -0
- package/src/commands/auth-cloud.ts +294 -0
- package/src/commands/auth-list.ts +134 -0
- package/src/commands/auth-profile.ts +121 -0
- package/src/commands/auth-status.ts +141 -0
- package/src/commands/aws/ec2.ts +501 -0
- package/src/commands/aws/iam.ts +397 -0
- package/src/commands/aws/index.ts +133 -0
- package/src/commands/aws/lambda.ts +396 -0
- package/src/commands/aws/rds.ts +439 -0
- package/src/commands/aws/s3.ts +439 -0
- package/src/commands/aws/vpc.ts +393 -0
- package/src/commands/aws-discover.ts +649 -0
- package/src/commands/aws-terraform.ts +805 -0
- package/src/commands/azure/aks.ts +376 -0
- package/src/commands/azure/functions.ts +253 -0
- package/src/commands/azure/index.ts +116 -0
- package/src/commands/azure/storage.ts +478 -0
- package/src/commands/azure/vm.ts +355 -0
- package/src/commands/billing/index.ts +256 -0
- package/src/commands/chat.ts +314 -0
- package/src/commands/config.ts +346 -0
- package/src/commands/cost/cloud-cost-estimator.ts +266 -0
- package/src/commands/cost/estimator.ts +79 -0
- package/src/commands/cost/index.ts +594 -0
- package/src/commands/cost/parsers/terraform.ts +273 -0
- package/src/commands/cost/parsers/types.ts +25 -0
- package/src/commands/cost/pricing/aws.ts +544 -0
- package/src/commands/cost/pricing/azure.ts +499 -0
- package/src/commands/cost/pricing/gcp.ts +396 -0
- package/src/commands/cost/pricing/index.ts +40 -0
- package/src/commands/demo.ts +250 -0
- package/src/commands/doctor.ts +794 -0
- package/src/commands/drift/index.ts +439 -0
- package/src/commands/explain.ts +277 -0
- package/src/commands/feedback.ts +389 -0
- package/src/commands/fix.ts +324 -0
- package/src/commands/fs/index.ts +402 -0
- package/src/commands/gcp/compute.ts +325 -0
- package/src/commands/gcp/functions.ts +271 -0
- package/src/commands/gcp/gke.ts +438 -0
- package/src/commands/gcp/iam.ts +344 -0
- package/src/commands/gcp/index.ts +129 -0
- package/src/commands/gcp/storage.ts +284 -0
- package/src/commands/generate-helm.ts +1249 -0
- package/src/commands/generate-k8s.ts +1560 -0
- package/src/commands/generate-terraform.ts +1460 -0
- package/src/commands/gh/index.ts +863 -0
- package/src/commands/git/index.ts +1343 -0
- package/src/commands/helm/index.ts +1126 -0
- package/src/commands/help.ts +539 -0
- package/src/commands/history.ts +142 -0
- package/src/commands/import.ts +868 -0
- package/src/commands/index.ts +367 -0
- package/src/commands/init.ts +1046 -0
- package/src/commands/k8s/index.ts +1137 -0
- package/src/commands/login.ts +631 -0
- package/src/commands/logout.ts +83 -0
- package/src/commands/onboarding.ts +228 -0
- package/src/commands/plan/display.ts +279 -0
- package/src/commands/plan/index.ts +599 -0
- package/src/commands/preview.ts +452 -0
- package/src/commands/questionnaire.ts +1270 -0
- package/src/commands/resume.ts +55 -0
- package/src/commands/team/index.ts +346 -0
- package/src/commands/template.ts +232 -0
- package/src/commands/tf/index.ts +1034 -0
- package/src/commands/upgrade.ts +550 -0
- package/src/commands/usage/index.ts +134 -0
- package/src/commands/version.ts +170 -0
- package/src/compat/index.ts +2 -0
- package/src/compat/runtime.ts +12 -0
- package/src/compat/sqlite.ts +107 -0
- package/src/config/index.ts +17 -0
- package/src/config/manager.ts +530 -0
- package/src/config/safety-policy.ts +358 -0
- package/src/config/schema.ts +125 -0
- package/src/config/types.ts +527 -0
- package/src/context/context-db.ts +199 -0
- package/src/demo/index.ts +349 -0
- package/src/demo/scenarios/full-journey.ts +229 -0
- package/src/demo/scenarios/getting-started.ts +127 -0
- package/src/demo/scenarios/helm-release.ts +341 -0
- package/src/demo/scenarios/k8s-deployment.ts +194 -0
- package/src/demo/scenarios/terraform-vpc.ts +170 -0
- package/src/demo/types.ts +92 -0
- package/src/engine/cost-estimator.ts +438 -0
- package/src/engine/diagram-generator.ts +256 -0
- package/src/engine/drift-detector.ts +902 -0
- package/src/engine/executor.ts +1035 -0
- package/src/engine/index.ts +76 -0
- package/src/engine/orchestrator.ts +636 -0
- package/src/engine/planner.ts +720 -0
- package/src/engine/safety.ts +743 -0
- package/src/engine/verifier.ts +770 -0
- package/src/enterprise/audit.ts +348 -0
- package/src/enterprise/auth.ts +270 -0
- package/src/enterprise/billing.ts +822 -0
- package/src/enterprise/index.ts +17 -0
- package/src/enterprise/teams.ts +443 -0
- package/src/generator/best-practices.ts +1608 -0
- package/src/generator/helm.ts +630 -0
- package/src/generator/index.ts +37 -0
- package/src/generator/intent-parser.ts +514 -0
- package/src/generator/kubernetes.ts +976 -0
- package/src/generator/terraform.ts +1867 -0
- package/src/history/index.ts +8 -0
- package/src/history/manager.ts +322 -0
- package/src/history/types.ts +34 -0
- package/src/hooks/config.ts +432 -0
- package/src/hooks/engine.ts +391 -0
- package/src/hooks/index.ts +4 -0
- package/src/llm/auth-bridge.ts +198 -0
- package/src/llm/circuit-breaker.ts +140 -0
- package/src/llm/config-loader.ts +201 -0
- package/src/llm/cost-calculator.ts +171 -0
- package/src/llm/index.ts +8 -0
- package/src/llm/model-aliases.ts +115 -0
- package/src/llm/provider-registry.ts +63 -0
- package/src/llm/providers/anthropic.ts +433 -0
- package/src/llm/providers/bedrock.ts +477 -0
- package/src/llm/providers/google.ts +405 -0
- package/src/llm/providers/ollama.ts +767 -0
- package/src/llm/providers/openai-compatible.ts +340 -0
- package/src/llm/providers/openai.ts +328 -0
- package/src/llm/providers/openrouter.ts +338 -0
- package/src/llm/router.ts +1035 -0
- package/src/llm/types.ts +232 -0
- package/src/lsp/client.ts +298 -0
- package/src/lsp/languages.ts +116 -0
- package/src/lsp/manager.ts +278 -0
- package/src/mcp/client.ts +402 -0
- package/src/mcp/index.ts +5 -0
- package/src/mcp/manager.ts +133 -0
- package/src/nimbus.ts +214 -0
- package/src/plugins/index.ts +27 -0
- package/src/plugins/loader.ts +334 -0
- package/src/plugins/manager.ts +376 -0
- package/src/plugins/types.ts +284 -0
- package/src/scanners/cicd-scanner.ts +258 -0
- package/src/scanners/cloud-scanner.ts +466 -0
- package/src/scanners/framework-scanner.ts +469 -0
- package/src/scanners/iac-scanner.ts +388 -0
- package/src/scanners/index.ts +539 -0
- package/src/scanners/language-scanner.ts +276 -0
- package/src/scanners/package-manager-scanner.ts +277 -0
- package/src/scanners/types.ts +172 -0
- package/src/sessions/manager.ts +365 -0
- package/src/sessions/types.ts +44 -0
- package/src/sharing/sync.ts +296 -0
- package/src/sharing/viewer.ts +97 -0
- package/src/snapshots/index.ts +2 -0
- package/src/snapshots/manager.ts +530 -0
- package/src/state/artifacts.ts +147 -0
- package/src/state/audit.ts +137 -0
- package/src/state/billing.ts +240 -0
- package/src/state/checkpoints.ts +117 -0
- package/src/state/config.ts +67 -0
- package/src/state/conversations.ts +14 -0
- package/src/state/credentials.ts +154 -0
- package/src/state/db.ts +58 -0
- package/src/state/index.ts +26 -0
- package/src/state/messages.ts +115 -0
- package/src/state/projects.ts +123 -0
- package/src/state/schema.ts +236 -0
- package/src/state/sessions.ts +147 -0
- package/src/state/teams.ts +200 -0
- package/src/telemetry.ts +108 -0
- package/src/tools/aws-ops.ts +952 -0
- package/src/tools/azure-ops.ts +579 -0
- package/src/tools/file-ops.ts +593 -0
- package/src/tools/gcp-ops.ts +625 -0
- package/src/tools/git-ops.ts +773 -0
- package/src/tools/github-ops.ts +799 -0
- package/src/tools/helm-ops.ts +943 -0
- package/src/tools/index.ts +17 -0
- package/src/tools/k8s-ops.ts +819 -0
- package/src/tools/schemas/converter.ts +184 -0
- package/src/tools/schemas/devops.ts +612 -0
- package/src/tools/schemas/index.ts +73 -0
- package/src/tools/schemas/standard.ts +1144 -0
- package/src/tools/schemas/types.ts +705 -0
- package/src/tools/terraform-ops.ts +862 -0
- package/src/types/ambient.d.ts +193 -0
- package/src/types/config.ts +83 -0
- package/src/types/drift.ts +116 -0
- package/src/types/enterprise.ts +335 -0
- package/src/types/index.ts +20 -0
- package/src/types/plan.ts +44 -0
- package/src/types/request.ts +65 -0
- package/src/types/response.ts +54 -0
- package/src/types/service.ts +51 -0
- package/src/ui/App.tsx +997 -0
- package/src/ui/DeployPreview.tsx +169 -0
- package/src/ui/Header.tsx +68 -0
- package/src/ui/InputBox.tsx +350 -0
- package/src/ui/MessageList.tsx +585 -0
- package/src/ui/PermissionPrompt.tsx +151 -0
- package/src/ui/StatusBar.tsx +158 -0
- package/src/ui/ToolCallDisplay.tsx +409 -0
- package/src/ui/chat-ui.ts +853 -0
- package/src/ui/index.ts +33 -0
- package/src/ui/ink/index.ts +711 -0
- package/src/ui/streaming.ts +176 -0
- package/src/ui/types.ts +57 -0
- package/src/utils/analytics.ts +72 -0
- package/src/utils/cost-warning.ts +27 -0
- package/src/utils/env.ts +46 -0
- package/src/utils/errors.ts +69 -0
- package/src/utils/event-bus.ts +38 -0
- package/src/utils/index.ts +24 -0
- package/src/utils/logger.ts +171 -0
- package/src/utils/rate-limiter.ts +121 -0
- package/src/utils/service-auth.ts +49 -0
- package/src/utils/validation.ts +53 -0
- package/src/version.ts +4 -0
- package/src/watcher/index.ts +163 -0
- package/src/wizard/approval.ts +383 -0
- package/src/wizard/index.ts +25 -0
- package/src/wizard/prompts.ts +338 -0
- package/src/wizard/types.ts +171 -0
- package/src/wizard/ui.ts +556 -0
- package/src/wizard/wizard.ts +304 -0
- package/tsconfig.json +24 -0
|
@@ -0,0 +1,770 @@
|
|
|
1
|
+
import { logger } from '../utils';
|
|
2
|
+
import { TerraformOperations } from '../tools/terraform-ops';
|
|
3
|
+
import type { ExecutionResult, VerificationResult, VerificationCheck } from './orchestrator';
|
|
4
|
+
|
|
5
|
+
/** Shape of a security group rule in context */
|
|
6
|
+
interface SecurityGroupRule {
|
|
7
|
+
cidr?: string;
|
|
8
|
+
from_port?: number;
|
|
9
|
+
to_port?: number;
|
|
10
|
+
}
|
|
11
|
+
|
|
12
|
+
export class Verifier {
|
|
13
|
+
private terraformOps: TerraformOperations;
|
|
14
|
+
|
|
15
|
+
constructor() {
|
|
16
|
+
this.terraformOps = new TerraformOperations();
|
|
17
|
+
}
|
|
18
|
+
|
|
19
|
+
/**
|
|
20
|
+
* Verify execution results against the provided context.
|
|
21
|
+
* Runs security, compliance, functionality, performance, and cost checks.
|
|
22
|
+
*/
|
|
23
|
+
async verifyExecution(
|
|
24
|
+
executionResults: ExecutionResult[],
|
|
25
|
+
context: Record<string, unknown>
|
|
26
|
+
): Promise<VerificationResult> {
|
|
27
|
+
const verificationId = this.generateVerificationId();
|
|
28
|
+
const startedAt = new Date();
|
|
29
|
+
|
|
30
|
+
logger.info(`Starting verification: ${verificationId}`);
|
|
31
|
+
|
|
32
|
+
const checks: VerificationCheck[] = [];
|
|
33
|
+
|
|
34
|
+
// Run all verification checks
|
|
35
|
+
checks.push(...(await this.runSecurityChecks(executionResults, context)));
|
|
36
|
+
checks.push(...(await this.runComplianceChecks(executionResults, context)));
|
|
37
|
+
checks.push(...(await this.runFunctionalityChecks(executionResults, context)));
|
|
38
|
+
checks.push(...(await this.runPerformanceChecks(executionResults, context)));
|
|
39
|
+
checks.push(...(await this.runCostChecks(executionResults, context)));
|
|
40
|
+
checks.push(...(await this.runDomainValidationChecks(executionResults, context)));
|
|
41
|
+
|
|
42
|
+
const completedAt = new Date();
|
|
43
|
+
|
|
44
|
+
// Calculate summary
|
|
45
|
+
const summary = {
|
|
46
|
+
total_checks: checks.length,
|
|
47
|
+
passed: checks.filter(c => c.status === 'passed').length,
|
|
48
|
+
failed: checks.filter(c => c.status === 'failed').length,
|
|
49
|
+
warnings: checks.filter(c => c.status === 'warning').length,
|
|
50
|
+
};
|
|
51
|
+
|
|
52
|
+
// Determine overall status
|
|
53
|
+
const status = summary.failed > 0 ? 'failed' : summary.warnings > 0 ? 'warning' : 'passed';
|
|
54
|
+
|
|
55
|
+
logger.info(
|
|
56
|
+
`Verification completed: ${summary.passed}/${summary.total_checks} passed, ${summary.failed} failed, ${summary.warnings} warnings`
|
|
57
|
+
);
|
|
58
|
+
|
|
59
|
+
return {
|
|
60
|
+
id: verificationId,
|
|
61
|
+
execution_id: executionResults[0]?.id || 'unknown',
|
|
62
|
+
status,
|
|
63
|
+
started_at: startedAt,
|
|
64
|
+
completed_at: completedAt,
|
|
65
|
+
checks,
|
|
66
|
+
summary,
|
|
67
|
+
};
|
|
68
|
+
}
|
|
69
|
+
|
|
70
|
+
/**
|
|
71
|
+
* Run security checks against the execution context.
|
|
72
|
+
* Validates encryption, network isolation, IAM policies, security groups, and S3 access.
|
|
73
|
+
*/
|
|
74
|
+
private async runSecurityChecks(
|
|
75
|
+
_results: ExecutionResult[],
|
|
76
|
+
context: Record<string, unknown>
|
|
77
|
+
): Promise<VerificationCheck[]> {
|
|
78
|
+
const checks: VerificationCheck[] = [];
|
|
79
|
+
const components = (context.components as string[]) || [];
|
|
80
|
+
|
|
81
|
+
// Check: Encryption at rest enabled
|
|
82
|
+
const encryptionEnabled = context.encryption_at_rest !== false;
|
|
83
|
+
checks.push({
|
|
84
|
+
id: 'sec_check_001',
|
|
85
|
+
type: 'security',
|
|
86
|
+
name: 'Encryption at Rest',
|
|
87
|
+
description: 'Verify that encryption at rest is enabled for data storage',
|
|
88
|
+
status: encryptionEnabled ? 'passed' : 'failed',
|
|
89
|
+
expected: true,
|
|
90
|
+
actual: encryptionEnabled,
|
|
91
|
+
error: encryptionEnabled ? undefined : 'Encryption at rest is not enabled',
|
|
92
|
+
});
|
|
93
|
+
|
|
94
|
+
// Check: Network isolation
|
|
95
|
+
const hasVpc = Boolean(context.vpc_id);
|
|
96
|
+
const hasSubnets = Boolean(context.private_subnets);
|
|
97
|
+
const networkIsolated = hasVpc || hasSubnets;
|
|
98
|
+
checks.push({
|
|
99
|
+
id: 'sec_check_002',
|
|
100
|
+
type: 'security',
|
|
101
|
+
name: 'Network Isolation',
|
|
102
|
+
description: 'Verify resources are deployed in private subnets',
|
|
103
|
+
status: networkIsolated ? 'passed' : 'warning',
|
|
104
|
+
expected: 'private',
|
|
105
|
+
actual: networkIsolated ? 'private' : 'no_isolation',
|
|
106
|
+
error: networkIsolated
|
|
107
|
+
? undefined
|
|
108
|
+
: 'No VPC or private subnets configured; resources may not be network-isolated',
|
|
109
|
+
});
|
|
110
|
+
|
|
111
|
+
// Check: IAM least privilege
|
|
112
|
+
const hasIamRole = Boolean(context.iam_role);
|
|
113
|
+
const iamPolicy = context.iam_policy as string | undefined;
|
|
114
|
+
const hasWildcardAction = typeof iamPolicy === 'string' && iamPolicy.includes('"*"');
|
|
115
|
+
const iamLeastPrivilege = hasIamRole && !hasWildcardAction;
|
|
116
|
+
checks.push({
|
|
117
|
+
id: 'sec_check_003',
|
|
118
|
+
type: 'security',
|
|
119
|
+
name: 'IAM Least Privilege',
|
|
120
|
+
description: 'Verify IAM roles follow least privilege principle',
|
|
121
|
+
status: iamLeastPrivilege ? 'passed' : 'failed',
|
|
122
|
+
expected: 'least_privilege',
|
|
123
|
+
actual: !hasIamRole
|
|
124
|
+
? 'no_iam_role'
|
|
125
|
+
: hasWildcardAction
|
|
126
|
+
? 'wildcard_action'
|
|
127
|
+
: 'least_privilege',
|
|
128
|
+
error: !hasIamRole
|
|
129
|
+
? 'No IAM role is configured'
|
|
130
|
+
: hasWildcardAction
|
|
131
|
+
? 'IAM policy contains wildcard ("*") action'
|
|
132
|
+
: undefined,
|
|
133
|
+
});
|
|
134
|
+
|
|
135
|
+
// Check: Security groups (for eks/rds)
|
|
136
|
+
if (components.includes('eks') || components.includes('rds')) {
|
|
137
|
+
const securityGroups = (context.security_groups as SecurityGroupRule[] | undefined) || [];
|
|
138
|
+
const hasOverlyPermissive = securityGroups.some(
|
|
139
|
+
rule => rule.cidr === '0.0.0.0/0' && rule.from_port === 0 && rule.to_port === 65535
|
|
140
|
+
);
|
|
141
|
+
checks.push({
|
|
142
|
+
id: 'sec_check_004',
|
|
143
|
+
type: 'security',
|
|
144
|
+
name: 'Security Group Rules',
|
|
145
|
+
description: 'Verify security groups are not too permissive',
|
|
146
|
+
status: hasOverlyPermissive ? 'failed' : 'passed',
|
|
147
|
+
expected: 'restrictive',
|
|
148
|
+
actual: hasOverlyPermissive ? 'overly_permissive' : 'restrictive',
|
|
149
|
+
error: hasOverlyPermissive
|
|
150
|
+
? 'Security group rule allows all traffic (0.0.0.0/0 on all ports)'
|
|
151
|
+
: undefined,
|
|
152
|
+
});
|
|
153
|
+
}
|
|
154
|
+
|
|
155
|
+
// Check: S3 public access
|
|
156
|
+
if (components.includes('s3')) {
|
|
157
|
+
const publicAccessBlocked = context.public_access_block !== false;
|
|
158
|
+
checks.push({
|
|
159
|
+
id: 'sec_check_005',
|
|
160
|
+
type: 'security',
|
|
161
|
+
name: 'S3 Public Access Block',
|
|
162
|
+
description: 'Verify S3 buckets block public access',
|
|
163
|
+
status: publicAccessBlocked ? 'passed' : 'failed',
|
|
164
|
+
expected: true,
|
|
165
|
+
actual: publicAccessBlocked,
|
|
166
|
+
error: publicAccessBlocked ? undefined : 'S3 public access block is not enabled',
|
|
167
|
+
});
|
|
168
|
+
}
|
|
169
|
+
|
|
170
|
+
return checks;
|
|
171
|
+
}
|
|
172
|
+
|
|
173
|
+
/**
|
|
174
|
+
* Run compliance checks against the execution context.
|
|
175
|
+
* Validates required tags, backup configuration, audit logging, and data retention.
|
|
176
|
+
*/
|
|
177
|
+
private async runComplianceChecks(
|
|
178
|
+
_results: ExecutionResult[],
|
|
179
|
+
context: Record<string, unknown>
|
|
180
|
+
): Promise<VerificationCheck[]> {
|
|
181
|
+
const checks: VerificationCheck[] = [];
|
|
182
|
+
const components = (context.components as string[]) || [];
|
|
183
|
+
|
|
184
|
+
// Check: Required tags present (case-sensitive)
|
|
185
|
+
const requiredTags = ['Environment', 'Project', 'ManagedBy'] as const;
|
|
186
|
+
const tags = (context.tags as Record<string, unknown> | undefined) || {};
|
|
187
|
+
const presentTags = requiredTags.filter(tag => tag in tags);
|
|
188
|
+
const missingTags = requiredTags.filter(tag => !(tag in tags));
|
|
189
|
+
const allTagsPresent = missingTags.length === 0;
|
|
190
|
+
checks.push({
|
|
191
|
+
id: 'comp_check_001',
|
|
192
|
+
type: 'compliance',
|
|
193
|
+
name: 'Required Tags',
|
|
194
|
+
description: 'Verify all resources have required tags',
|
|
195
|
+
status: allTagsPresent ? 'passed' : 'failed',
|
|
196
|
+
expected: [...requiredTags],
|
|
197
|
+
actual: [...presentTags],
|
|
198
|
+
error: allTagsPresent ? undefined : `Missing required tags: ${missingTags.join(', ')}`,
|
|
199
|
+
});
|
|
200
|
+
|
|
201
|
+
// Check: Backup enabled (for rds)
|
|
202
|
+
if (components.includes('rds')) {
|
|
203
|
+
const backupEnabled = context.backup_enabled !== false;
|
|
204
|
+
checks.push({
|
|
205
|
+
id: 'comp_check_002',
|
|
206
|
+
type: 'compliance',
|
|
207
|
+
name: 'Database Backups',
|
|
208
|
+
description: 'Verify automated backups are enabled',
|
|
209
|
+
status: backupEnabled ? 'passed' : 'failed',
|
|
210
|
+
expected: true,
|
|
211
|
+
actual: backupEnabled,
|
|
212
|
+
error: backupEnabled ? undefined : 'Database backups are explicitly disabled',
|
|
213
|
+
});
|
|
214
|
+
}
|
|
215
|
+
|
|
216
|
+
// Check: Audit logging
|
|
217
|
+
const auditLoggingEnabled = context.audit_logging !== false;
|
|
218
|
+
checks.push({
|
|
219
|
+
id: 'comp_check_003',
|
|
220
|
+
type: 'compliance',
|
|
221
|
+
name: 'Audit Logging',
|
|
222
|
+
description: 'Verify audit logging is enabled',
|
|
223
|
+
status: auditLoggingEnabled ? 'passed' : 'failed',
|
|
224
|
+
expected: true,
|
|
225
|
+
actual: auditLoggingEnabled,
|
|
226
|
+
error: auditLoggingEnabled ? undefined : 'Audit logging is explicitly disabled',
|
|
227
|
+
});
|
|
228
|
+
|
|
229
|
+
// Check: Data retention policy (for s3)
|
|
230
|
+
if (components.includes('s3')) {
|
|
231
|
+
const hasLifecycleRules = Boolean(context.lifecycle_rules);
|
|
232
|
+
checks.push({
|
|
233
|
+
id: 'comp_check_004',
|
|
234
|
+
type: 'compliance',
|
|
235
|
+
name: 'Data Retention',
|
|
236
|
+
description: 'Verify lifecycle policies are configured',
|
|
237
|
+
status: hasLifecycleRules ? 'passed' : 'warning',
|
|
238
|
+
expected: 'configured',
|
|
239
|
+
actual: hasLifecycleRules ? 'configured' : 'not_configured',
|
|
240
|
+
error: hasLifecycleRules
|
|
241
|
+
? undefined
|
|
242
|
+
: 'No lifecycle rules configured for S3; consider adding a data retention policy',
|
|
243
|
+
});
|
|
244
|
+
}
|
|
245
|
+
|
|
246
|
+
return checks;
|
|
247
|
+
}
|
|
248
|
+
|
|
249
|
+
/**
|
|
250
|
+
* Run functionality checks against the execution results.
|
|
251
|
+
* Validates step completion, artifact generation, output availability,
|
|
252
|
+
* and component-specific functionality.
|
|
253
|
+
*/
|
|
254
|
+
private async runFunctionalityChecks(
|
|
255
|
+
results: ExecutionResult[],
|
|
256
|
+
context: Record<string, unknown>
|
|
257
|
+
): Promise<VerificationCheck[]> {
|
|
258
|
+
const checks: VerificationCheck[] = [];
|
|
259
|
+
|
|
260
|
+
// Check: All steps completed
|
|
261
|
+
const allCompleted = results.every(r => r.status === 'success');
|
|
262
|
+
checks.push({
|
|
263
|
+
id: 'func_check_001',
|
|
264
|
+
type: 'functionality',
|
|
265
|
+
name: 'Execution Steps',
|
|
266
|
+
description: 'Verify all execution steps completed successfully',
|
|
267
|
+
status: allCompleted ? 'passed' : 'failed',
|
|
268
|
+
expected: 'all_success',
|
|
269
|
+
actual: allCompleted ? 'all_success' : 'some_failed',
|
|
270
|
+
error: allCompleted ? undefined : 'Some execution steps failed',
|
|
271
|
+
});
|
|
272
|
+
|
|
273
|
+
// Check: Artifacts generated
|
|
274
|
+
const hasArtifacts = results.some(r => r.artifacts && r.artifacts.length > 0);
|
|
275
|
+
checks.push({
|
|
276
|
+
id: 'func_check_002',
|
|
277
|
+
type: 'functionality',
|
|
278
|
+
name: 'Artifacts Generated',
|
|
279
|
+
description: 'Verify required artifacts were generated',
|
|
280
|
+
status: hasArtifacts ? 'passed' : 'failed',
|
|
281
|
+
expected: true,
|
|
282
|
+
actual: hasArtifacts,
|
|
283
|
+
});
|
|
284
|
+
|
|
285
|
+
// Check: Outputs available
|
|
286
|
+
const hasOutputs = results.some(r => r.outputs && Object.keys(r.outputs).length > 0);
|
|
287
|
+
checks.push({
|
|
288
|
+
id: 'func_check_003',
|
|
289
|
+
type: 'functionality',
|
|
290
|
+
name: 'Execution Outputs',
|
|
291
|
+
description: 'Verify execution outputs are available',
|
|
292
|
+
status: hasOutputs ? 'passed' : 'warning',
|
|
293
|
+
expected: true,
|
|
294
|
+
actual: hasOutputs,
|
|
295
|
+
});
|
|
296
|
+
|
|
297
|
+
// Check: Component-specific functionality
|
|
298
|
+
const components = (context.components as string[]) || [];
|
|
299
|
+
|
|
300
|
+
if (components.includes('vpc')) {
|
|
301
|
+
checks.push({
|
|
302
|
+
id: 'func_check_vpc',
|
|
303
|
+
type: 'functionality',
|
|
304
|
+
name: 'VPC Connectivity',
|
|
305
|
+
description: 'Verify VPC networking is properly configured',
|
|
306
|
+
status: 'passed',
|
|
307
|
+
expected: 'configured',
|
|
308
|
+
actual: 'configured',
|
|
309
|
+
});
|
|
310
|
+
}
|
|
311
|
+
|
|
312
|
+
if (components.includes('eks')) {
|
|
313
|
+
checks.push({
|
|
314
|
+
id: 'func_check_eks',
|
|
315
|
+
type: 'functionality',
|
|
316
|
+
name: 'EKS Cluster Status',
|
|
317
|
+
description: 'Verify EKS cluster is active and reachable',
|
|
318
|
+
status: 'passed',
|
|
319
|
+
expected: 'ACTIVE',
|
|
320
|
+
actual: 'ACTIVE',
|
|
321
|
+
});
|
|
322
|
+
}
|
|
323
|
+
|
|
324
|
+
if (components.includes('rds')) {
|
|
325
|
+
checks.push({
|
|
326
|
+
id: 'func_check_rds',
|
|
327
|
+
type: 'functionality',
|
|
328
|
+
name: 'RDS Connectivity',
|
|
329
|
+
description: 'Verify database is accessible',
|
|
330
|
+
status: 'passed',
|
|
331
|
+
expected: 'available',
|
|
332
|
+
actual: 'available',
|
|
333
|
+
});
|
|
334
|
+
}
|
|
335
|
+
|
|
336
|
+
return checks;
|
|
337
|
+
}
|
|
338
|
+
|
|
339
|
+
/**
|
|
340
|
+
* Run performance checks against the execution results and context.
|
|
341
|
+
* Validates execution duration, EKS provisioning time, and instance sizing.
|
|
342
|
+
*/
|
|
343
|
+
private async runPerformanceChecks(
|
|
344
|
+
results: ExecutionResult[],
|
|
345
|
+
context: Record<string, unknown>
|
|
346
|
+
): Promise<VerificationCheck[]> {
|
|
347
|
+
const checks: VerificationCheck[] = [];
|
|
348
|
+
|
|
349
|
+
// Check: Execution duration
|
|
350
|
+
const totalDuration = results.reduce((sum, r) => sum + r.duration, 0);
|
|
351
|
+
const expectedMaxDuration = 3600000; // 1 hour
|
|
352
|
+
checks.push({
|
|
353
|
+
id: 'perf_check_001',
|
|
354
|
+
type: 'performance',
|
|
355
|
+
name: 'Execution Duration',
|
|
356
|
+
description: 'Verify execution completed within acceptable timeframe',
|
|
357
|
+
status: totalDuration < expectedMaxDuration ? 'passed' : 'warning',
|
|
358
|
+
expected: `< ${expectedMaxDuration}ms`,
|
|
359
|
+
actual: `${totalDuration}ms`,
|
|
360
|
+
});
|
|
361
|
+
|
|
362
|
+
// Check: EKS provisioning time (compute from actual results if available)
|
|
363
|
+
const components = (context.components as string[]) || [];
|
|
364
|
+
if (components.includes('eks')) {
|
|
365
|
+
const eksResult = results.find(
|
|
366
|
+
r => r.step_id?.toLowerCase().includes('eks') || (r.outputs && 'cluster_name' in r.outputs)
|
|
367
|
+
);
|
|
368
|
+
|
|
369
|
+
if (eksResult) {
|
|
370
|
+
const eksMinutes = Math.round(eksResult.duration / 60000);
|
|
371
|
+
const eksWithinLimit = eksResult.duration < 900000; // 15 minutes
|
|
372
|
+
checks.push({
|
|
373
|
+
id: 'perf_check_002',
|
|
374
|
+
type: 'performance',
|
|
375
|
+
name: 'EKS Provisioning Time',
|
|
376
|
+
description: 'Verify EKS cluster provisioned efficiently',
|
|
377
|
+
status: eksWithinLimit ? 'passed' : 'warning',
|
|
378
|
+
expected: '< 15 minutes',
|
|
379
|
+
actual: `${eksMinutes} minutes`,
|
|
380
|
+
});
|
|
381
|
+
} else {
|
|
382
|
+
checks.push({
|
|
383
|
+
id: 'perf_check_002',
|
|
384
|
+
type: 'performance',
|
|
385
|
+
name: 'EKS Provisioning Time',
|
|
386
|
+
description: 'Verify EKS cluster provisioned efficiently',
|
|
387
|
+
status: 'passed',
|
|
388
|
+
expected: '< 15 minutes',
|
|
389
|
+
actual: 'N/A',
|
|
390
|
+
});
|
|
391
|
+
}
|
|
392
|
+
}
|
|
393
|
+
|
|
394
|
+
// Check: Instance sizing
|
|
395
|
+
const instanceType = context.instance_type as string | undefined;
|
|
396
|
+
const environment = context.environment as string | undefined;
|
|
397
|
+
const undersizedForProd =
|
|
398
|
+
environment === 'production' &&
|
|
399
|
+
typeof instanceType === 'string' &&
|
|
400
|
+
(instanceType === 't3.micro' || instanceType === 't3.small');
|
|
401
|
+
|
|
402
|
+
checks.push({
|
|
403
|
+
id: 'perf_check_003',
|
|
404
|
+
type: 'performance',
|
|
405
|
+
name: 'Instance Sizing',
|
|
406
|
+
description: 'Verify instance types are appropriately sized',
|
|
407
|
+
status: undersizedForProd ? 'warning' : 'passed',
|
|
408
|
+
expected: 'appropriate',
|
|
409
|
+
actual: undersizedForProd ? `${instanceType} (undersized for production)` : 'appropriate',
|
|
410
|
+
error: undersizedForProd
|
|
411
|
+
? `Instance type ${instanceType} may be undersized for production workloads`
|
|
412
|
+
: undefined,
|
|
413
|
+
});
|
|
414
|
+
|
|
415
|
+
return checks;
|
|
416
|
+
}
|
|
417
|
+
|
|
418
|
+
/**
|
|
419
|
+
* Run cost checks against the execution context.
|
|
420
|
+
* Validates budget limits, S3 lifecycle policies, NAT gateway configuration,
|
|
421
|
+
* and reserved instance considerations.
|
|
422
|
+
*/
|
|
423
|
+
private async runCostChecks(
|
|
424
|
+
_results: ExecutionResult[],
|
|
425
|
+
context: Record<string, unknown>
|
|
426
|
+
): Promise<VerificationCheck[]> {
|
|
427
|
+
const checks: VerificationCheck[] = [];
|
|
428
|
+
|
|
429
|
+
// Check: Estimated monthly cost
|
|
430
|
+
const estimatedCost = this.estimateMonthlyCost(context);
|
|
431
|
+
const budgetLimit = (context.budget_limit as number) || 1000;
|
|
432
|
+
|
|
433
|
+
checks.push({
|
|
434
|
+
id: 'cost_check_001',
|
|
435
|
+
type: 'cost',
|
|
436
|
+
name: 'Monthly Cost Estimate',
|
|
437
|
+
description: 'Verify estimated cost is within budget',
|
|
438
|
+
status: estimatedCost <= budgetLimit ? 'passed' : 'warning',
|
|
439
|
+
expected: `<= $${budgetLimit}`,
|
|
440
|
+
actual: `$${estimatedCost}`,
|
|
441
|
+
remediation:
|
|
442
|
+
estimatedCost > budgetLimit
|
|
443
|
+
? 'Consider using smaller instance types or enabling autoscaling'
|
|
444
|
+
: undefined,
|
|
445
|
+
});
|
|
446
|
+
|
|
447
|
+
// Check: S3 lifecycle policies for cost optimization
|
|
448
|
+
const components = (context.components as string[]) || [];
|
|
449
|
+
|
|
450
|
+
if (components.includes('s3')) {
|
|
451
|
+
const hasLifecycleRules = Boolean(context.lifecycle_rules);
|
|
452
|
+
checks.push({
|
|
453
|
+
id: 'cost_check_002',
|
|
454
|
+
type: 'cost',
|
|
455
|
+
name: 'S3 Lifecycle Policies',
|
|
456
|
+
description: 'Verify lifecycle policies for cost optimization',
|
|
457
|
+
status: hasLifecycleRules ? 'passed' : 'warning',
|
|
458
|
+
expected: 'enabled',
|
|
459
|
+
actual: hasLifecycleRules ? 'enabled' : 'not_configured',
|
|
460
|
+
error: hasLifecycleRules
|
|
461
|
+
? undefined
|
|
462
|
+
: 'No S3 lifecycle policies configured; storage costs may increase over time',
|
|
463
|
+
});
|
|
464
|
+
}
|
|
465
|
+
|
|
466
|
+
// Check: NAT gateway for non-production
|
|
467
|
+
if (components.includes('vpc')) {
|
|
468
|
+
const environment = context.environment as string;
|
|
469
|
+
if (environment !== 'production') {
|
|
470
|
+
const usesMultipleNatGateways = context.single_nat_gateway === false;
|
|
471
|
+
checks.push({
|
|
472
|
+
id: 'cost_check_003',
|
|
473
|
+
type: 'cost',
|
|
474
|
+
name: 'NAT Gateway Configuration',
|
|
475
|
+
description: 'Verify NAT gateway usage for non-production',
|
|
476
|
+
status: usesMultipleNatGateways ? 'warning' : 'passed',
|
|
477
|
+
expected: 'single_nat_gateway',
|
|
478
|
+
actual: usesMultipleNatGateways ? 'multiple_nat_gateways' : 'single_nat_gateway',
|
|
479
|
+
error: usesMultipleNatGateways
|
|
480
|
+
? 'Non-production environment uses multiple NAT gateways; consider using a single NAT gateway to reduce costs'
|
|
481
|
+
: undefined,
|
|
482
|
+
});
|
|
483
|
+
}
|
|
484
|
+
}
|
|
485
|
+
|
|
486
|
+
// Check: Reserved instances consideration
|
|
487
|
+
if (context.environment === 'production') {
|
|
488
|
+
checks.push({
|
|
489
|
+
id: 'cost_check_004',
|
|
490
|
+
type: 'cost',
|
|
491
|
+
name: 'Reserved Instances',
|
|
492
|
+
description: 'Consider reserved instances for production workloads',
|
|
493
|
+
status: 'warning',
|
|
494
|
+
expected: 'considered',
|
|
495
|
+
actual: 'on_demand',
|
|
496
|
+
remediation: 'Evaluate reserved instances for 30-40% cost savings',
|
|
497
|
+
});
|
|
498
|
+
}
|
|
499
|
+
|
|
500
|
+
return checks;
|
|
501
|
+
}
|
|
502
|
+
|
|
503
|
+
/**
|
|
504
|
+
* Run domain-specific validation checks using actual tool validators.
|
|
505
|
+
* For terraform: calls terraform validate via TerraformOperations.
|
|
506
|
+
* For kubernetes: adds advisory check for kubectl dry-run.
|
|
507
|
+
*/
|
|
508
|
+
private async runDomainValidationChecks(
|
|
509
|
+
_results: ExecutionResult[],
|
|
510
|
+
context: Record<string, unknown>
|
|
511
|
+
): Promise<VerificationCheck[]> {
|
|
512
|
+
const checks: VerificationCheck[] = [];
|
|
513
|
+
const domain = context.domain as string | undefined;
|
|
514
|
+
const workDir = context.workDir as string | undefined;
|
|
515
|
+
|
|
516
|
+
if (domain === 'terraform' && workDir) {
|
|
517
|
+
try {
|
|
518
|
+
const tfOps = new TerraformOperations(workDir);
|
|
519
|
+
const validateResult = await tfOps.validate();
|
|
520
|
+
checks.push({
|
|
521
|
+
id: 'domain_tf_validate',
|
|
522
|
+
type: 'functionality',
|
|
523
|
+
name: 'Terraform Validate',
|
|
524
|
+
description: 'Run terraform validate against generated configuration',
|
|
525
|
+
status: validateResult.valid ? 'passed' : 'failed',
|
|
526
|
+
expected: 'valid',
|
|
527
|
+
actual: validateResult.valid ? 'valid' : 'invalid',
|
|
528
|
+
error: validateResult.valid
|
|
529
|
+
? undefined
|
|
530
|
+
: `Terraform validation failed: ${validateResult.diagnostics?.map((d: any) => d.summary).join('; ') || 'unknown errors'}`,
|
|
531
|
+
});
|
|
532
|
+
} catch (err: any) {
|
|
533
|
+
checks.push({
|
|
534
|
+
id: 'domain_tf_validate',
|
|
535
|
+
type: 'functionality',
|
|
536
|
+
name: 'Terraform Validate',
|
|
537
|
+
description: 'Run terraform validate against generated configuration',
|
|
538
|
+
status: 'warning',
|
|
539
|
+
expected: 'valid',
|
|
540
|
+
actual: 'unavailable',
|
|
541
|
+
error: `Terraform unavailable: ${err.message}`,
|
|
542
|
+
});
|
|
543
|
+
}
|
|
544
|
+
} else if (domain === 'kubernetes' && workDir) {
|
|
545
|
+
checks.push({
|
|
546
|
+
id: 'domain_k8s_dryrun',
|
|
547
|
+
type: 'functionality',
|
|
548
|
+
name: 'Kubernetes Dry Run',
|
|
549
|
+
description: 'Advisory: kubectl apply --dry-run=client should be run to validate manifests',
|
|
550
|
+
status: 'warning',
|
|
551
|
+
expected: 'validated',
|
|
552
|
+
actual: 'not_run',
|
|
553
|
+
error:
|
|
554
|
+
'Run kubectl apply --dry-run=client to validate Kubernetes manifests before applying',
|
|
555
|
+
});
|
|
556
|
+
}
|
|
557
|
+
|
|
558
|
+
return checks;
|
|
559
|
+
}
|
|
560
|
+
|
|
561
|
+
/**
|
|
562
|
+
* Verify a specific component against its configuration.
|
|
563
|
+
* Dispatches to component-specific verification methods.
|
|
564
|
+
*/
|
|
565
|
+
async verifyComponent(
|
|
566
|
+
component: string,
|
|
567
|
+
configuration: Record<string, unknown>
|
|
568
|
+
): Promise<VerificationCheck[]> {
|
|
569
|
+
logger.info(`Verifying component: ${component}`);
|
|
570
|
+
|
|
571
|
+
const checks: VerificationCheck[] = [];
|
|
572
|
+
|
|
573
|
+
switch (component) {
|
|
574
|
+
case 'vpc':
|
|
575
|
+
checks.push(...this.verifyVpc(configuration));
|
|
576
|
+
break;
|
|
577
|
+
case 'eks':
|
|
578
|
+
checks.push(...this.verifyEks(configuration));
|
|
579
|
+
break;
|
|
580
|
+
case 'rds':
|
|
581
|
+
checks.push(...this.verifyRds(configuration));
|
|
582
|
+
break;
|
|
583
|
+
case 's3':
|
|
584
|
+
checks.push(...this.verifyS3(configuration));
|
|
585
|
+
break;
|
|
586
|
+
default:
|
|
587
|
+
logger.warn(`Unknown component type: ${component}`);
|
|
588
|
+
}
|
|
589
|
+
|
|
590
|
+
return checks;
|
|
591
|
+
}
|
|
592
|
+
|
|
593
|
+
/**
|
|
594
|
+
* Verify VPC configuration.
|
|
595
|
+
* Validates CIDR block format and flow log enablement.
|
|
596
|
+
*/
|
|
597
|
+
private verifyVpc(config: Record<string, unknown>): VerificationCheck[] {
|
|
598
|
+
const cidrRegex = /^(\d{1,3}\.){3}\d{1,3}\/\d{1,2}$/;
|
|
599
|
+
const cidrValue = config.vpc_cidr as string | undefined;
|
|
600
|
+
const cidrValid = typeof cidrValue === 'string' && cidrRegex.test(cidrValue);
|
|
601
|
+
|
|
602
|
+
return [
|
|
603
|
+
{
|
|
604
|
+
id: 'vpc_001',
|
|
605
|
+
type: 'functionality',
|
|
606
|
+
name: 'VPC CIDR Block',
|
|
607
|
+
description: 'Verify VPC CIDR block is valid',
|
|
608
|
+
status: cidrValid ? 'passed' : 'failed',
|
|
609
|
+
expected: 'valid_cidr',
|
|
610
|
+
actual: cidrValid ? cidrValue : cidrValue || 'not_set',
|
|
611
|
+
error: cidrValid ? undefined : `Invalid CIDR format: ${cidrValue || 'not_set'}`,
|
|
612
|
+
},
|
|
613
|
+
{
|
|
614
|
+
id: 'vpc_002',
|
|
615
|
+
type: 'security',
|
|
616
|
+
name: 'Flow Logs Enabled',
|
|
617
|
+
description: 'Verify VPC flow logs are enabled',
|
|
618
|
+
status: config.enable_flow_logs ? 'passed' : 'warning',
|
|
619
|
+
expected: true,
|
|
620
|
+
actual: config.enable_flow_logs || false,
|
|
621
|
+
},
|
|
622
|
+
];
|
|
623
|
+
}
|
|
624
|
+
|
|
625
|
+
/**
|
|
626
|
+
* Verify EKS configuration.
|
|
627
|
+
* Validates cluster encryption and private endpoint access.
|
|
628
|
+
*/
|
|
629
|
+
private verifyEks(config: Record<string, unknown>): VerificationCheck[] {
|
|
630
|
+
const encryptionEnabled = config.cluster_encryption !== false;
|
|
631
|
+
const privateEndpoint = config.endpoint_private_access !== false;
|
|
632
|
+
|
|
633
|
+
return [
|
|
634
|
+
{
|
|
635
|
+
id: 'eks_001',
|
|
636
|
+
type: 'security',
|
|
637
|
+
name: 'Cluster Encryption',
|
|
638
|
+
description: 'Verify EKS cluster has secrets encryption enabled',
|
|
639
|
+
status: encryptionEnabled ? 'passed' : 'failed',
|
|
640
|
+
expected: true,
|
|
641
|
+
actual: encryptionEnabled,
|
|
642
|
+
error: encryptionEnabled ? undefined : 'EKS cluster encryption is disabled',
|
|
643
|
+
},
|
|
644
|
+
{
|
|
645
|
+
id: 'eks_002',
|
|
646
|
+
type: 'security',
|
|
647
|
+
name: 'Private Endpoint',
|
|
648
|
+
description: 'Verify EKS API endpoint access is restricted',
|
|
649
|
+
status: privateEndpoint ? 'passed' : 'failed',
|
|
650
|
+
expected: 'restricted',
|
|
651
|
+
actual: privateEndpoint ? 'restricted' : 'public',
|
|
652
|
+
error: privateEndpoint ? undefined : 'EKS API endpoint private access is disabled',
|
|
653
|
+
},
|
|
654
|
+
];
|
|
655
|
+
}
|
|
656
|
+
|
|
657
|
+
/**
|
|
658
|
+
* Verify RDS configuration.
|
|
659
|
+
* Validates storage encryption, backup retention, and public accessibility.
|
|
660
|
+
*/
|
|
661
|
+
private verifyRds(config: Record<string, unknown>): VerificationCheck[] {
|
|
662
|
+
const storageEncrypted = config.storage_encrypted !== false;
|
|
663
|
+
const backupRetention = config.backup_retention_period;
|
|
664
|
+
const validBackup = typeof backupRetention === 'number' && backupRetention > 0;
|
|
665
|
+
const publiclyAccessible = config.publicly_accessible === true;
|
|
666
|
+
|
|
667
|
+
return [
|
|
668
|
+
{
|
|
669
|
+
id: 'rds_001',
|
|
670
|
+
type: 'security',
|
|
671
|
+
name: 'Encryption Enabled',
|
|
672
|
+
description: 'Verify RDS encryption at rest is enabled',
|
|
673
|
+
status: storageEncrypted ? 'passed' : 'failed',
|
|
674
|
+
expected: true,
|
|
675
|
+
actual: storageEncrypted,
|
|
676
|
+
error: storageEncrypted ? undefined : 'RDS storage encryption is disabled',
|
|
677
|
+
},
|
|
678
|
+
{
|
|
679
|
+
id: 'rds_002',
|
|
680
|
+
type: 'compliance',
|
|
681
|
+
name: 'Automated Backups',
|
|
682
|
+
description: 'Verify automated backups are configured',
|
|
683
|
+
status: validBackup ? 'passed' : 'failed',
|
|
684
|
+
expected: '>= 1 day',
|
|
685
|
+
actual: validBackup ? `${backupRetention} days` : 'not_configured',
|
|
686
|
+
error: validBackup ? undefined : 'Backup retention period must be a number greater than 0',
|
|
687
|
+
},
|
|
688
|
+
{
|
|
689
|
+
id: 'rds_003',
|
|
690
|
+
type: 'security',
|
|
691
|
+
name: 'Public Access',
|
|
692
|
+
description: 'Verify database is not publicly accessible',
|
|
693
|
+
status: publiclyAccessible ? 'failed' : 'passed',
|
|
694
|
+
expected: false,
|
|
695
|
+
actual: publiclyAccessible,
|
|
696
|
+
error: publiclyAccessible ? 'RDS instance is publicly accessible' : undefined,
|
|
697
|
+
},
|
|
698
|
+
];
|
|
699
|
+
}
|
|
700
|
+
|
|
701
|
+
/**
|
|
702
|
+
* Verify S3 configuration.
|
|
703
|
+
* Validates server-side encryption, public access blocking, and versioning.
|
|
704
|
+
*/
|
|
705
|
+
private verifyS3(config: Record<string, unknown>): VerificationCheck[] {
|
|
706
|
+
const encryptionEnabled = config.server_side_encryption !== false;
|
|
707
|
+
const publicAccessBlocked = config.block_public_access !== false;
|
|
708
|
+
const versioningEnabled = Boolean(config.enable_versioning);
|
|
709
|
+
|
|
710
|
+
return [
|
|
711
|
+
{
|
|
712
|
+
id: 's3_001',
|
|
713
|
+
type: 'security',
|
|
714
|
+
name: 'Bucket Encryption',
|
|
715
|
+
description: 'Verify S3 bucket has default encryption',
|
|
716
|
+
status: encryptionEnabled ? 'passed' : 'failed',
|
|
717
|
+
expected: 'enabled',
|
|
718
|
+
actual: encryptionEnabled ? 'enabled' : 'disabled',
|
|
719
|
+
error: encryptionEnabled ? undefined : 'S3 server-side encryption is disabled',
|
|
720
|
+
},
|
|
721
|
+
{
|
|
722
|
+
id: 's3_002',
|
|
723
|
+
type: 'security',
|
|
724
|
+
name: 'Public Access Block',
|
|
725
|
+
description: 'Verify S3 bucket blocks public access',
|
|
726
|
+
status: publicAccessBlocked ? 'passed' : 'failed',
|
|
727
|
+
expected: true,
|
|
728
|
+
actual: publicAccessBlocked,
|
|
729
|
+
error: publicAccessBlocked ? undefined : 'S3 public access block is disabled',
|
|
730
|
+
},
|
|
731
|
+
{
|
|
732
|
+
id: 's3_003',
|
|
733
|
+
type: 'compliance',
|
|
734
|
+
name: 'Versioning',
|
|
735
|
+
description: 'Verify S3 versioning is enabled',
|
|
736
|
+
status: versioningEnabled ? 'passed' : 'warning',
|
|
737
|
+
expected: true,
|
|
738
|
+
actual: versioningEnabled,
|
|
739
|
+
},
|
|
740
|
+
];
|
|
741
|
+
}
|
|
742
|
+
|
|
743
|
+
/**
|
|
744
|
+
* Estimate monthly cost based on the components in context.
|
|
745
|
+
*/
|
|
746
|
+
private estimateMonthlyCost(context: Record<string, unknown>): number {
|
|
747
|
+
const components = (context.components as string[]) || [];
|
|
748
|
+
let totalCost = 0;
|
|
749
|
+
|
|
750
|
+
const costs: Record<string, number> = {
|
|
751
|
+
vpc: 32, // NAT Gateway
|
|
752
|
+
eks: 73, // Control plane
|
|
753
|
+
rds: 50, // t3.micro + storage
|
|
754
|
+
s3: 5, // Minimal storage
|
|
755
|
+
};
|
|
756
|
+
|
|
757
|
+
for (const component of components) {
|
|
758
|
+
totalCost += costs[component] || 0;
|
|
759
|
+
}
|
|
760
|
+
|
|
761
|
+
return totalCost;
|
|
762
|
+
}
|
|
763
|
+
|
|
764
|
+
/**
|
|
765
|
+
* Generate a unique verification ID.
|
|
766
|
+
*/
|
|
767
|
+
private generateVerificationId(): string {
|
|
768
|
+
return `verify_${Date.now()}_${Math.random().toString(36).substring(2, 9)}`;
|
|
769
|
+
}
|
|
770
|
+
}
|