@build-astron-co/nimbus 0.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (313) hide show
  1. package/LICENSE +21 -0
  2. package/README.md +628 -0
  3. package/bin/nimbus +38 -0
  4. package/package.json +80 -0
  5. package/src/__tests__/app.test.ts +76 -0
  6. package/src/__tests__/audit.test.ts +877 -0
  7. package/src/__tests__/circuit-breaker.test.ts +116 -0
  8. package/src/__tests__/cli-run.test.ts +115 -0
  9. package/src/__tests__/context-manager.test.ts +502 -0
  10. package/src/__tests__/context.test.ts +242 -0
  11. package/src/__tests__/enterprise.test.ts +401 -0
  12. package/src/__tests__/generator.test.ts +433 -0
  13. package/src/__tests__/hooks.test.ts +582 -0
  14. package/src/__tests__/init.test.ts +436 -0
  15. package/src/__tests__/intent-parser.test.ts +229 -0
  16. package/src/__tests__/llm-router.test.ts +209 -0
  17. package/src/__tests__/lsp.test.ts +293 -0
  18. package/src/__tests__/modes.test.ts +336 -0
  19. package/src/__tests__/permissions.test.ts +338 -0
  20. package/src/__tests__/serve.test.ts +275 -0
  21. package/src/__tests__/sessions.test.ts +227 -0
  22. package/src/__tests__/sharing.test.ts +288 -0
  23. package/src/__tests__/snapshots.test.ts +581 -0
  24. package/src/__tests__/state-db.test.ts +334 -0
  25. package/src/__tests__/stream-with-tools.test.ts +732 -0
  26. package/src/__tests__/subagents.test.ts +176 -0
  27. package/src/__tests__/system-prompt.test.ts +169 -0
  28. package/src/__tests__/tool-converter.test.ts +256 -0
  29. package/src/__tests__/tool-schemas.test.ts +397 -0
  30. package/src/__tests__/tools.test.ts +143 -0
  31. package/src/__tests__/version.test.ts +49 -0
  32. package/src/agent/compaction-agent.ts +227 -0
  33. package/src/agent/context-manager.ts +435 -0
  34. package/src/agent/context.ts +427 -0
  35. package/src/agent/deploy-preview.ts +426 -0
  36. package/src/agent/index.ts +68 -0
  37. package/src/agent/loop.ts +717 -0
  38. package/src/agent/modes.ts +429 -0
  39. package/src/agent/permissions.ts +466 -0
  40. package/src/agent/subagents/base.ts +116 -0
  41. package/src/agent/subagents/cost.ts +51 -0
  42. package/src/agent/subagents/explore.ts +42 -0
  43. package/src/agent/subagents/general.ts +54 -0
  44. package/src/agent/subagents/index.ts +102 -0
  45. package/src/agent/subagents/infra.ts +59 -0
  46. package/src/agent/subagents/security.ts +69 -0
  47. package/src/agent/system-prompt.ts +436 -0
  48. package/src/app.ts +122 -0
  49. package/src/audit/activity-log.ts +290 -0
  50. package/src/audit/compliance-checker.ts +540 -0
  51. package/src/audit/cost-tracker.ts +318 -0
  52. package/src/audit/index.ts +23 -0
  53. package/src/audit/security-scanner.ts +596 -0
  54. package/src/auth/guard.ts +75 -0
  55. package/src/auth/index.ts +56 -0
  56. package/src/auth/oauth.ts +455 -0
  57. package/src/auth/providers.ts +470 -0
  58. package/src/auth/sso.ts +113 -0
  59. package/src/auth/store.ts +505 -0
  60. package/src/auth/types.ts +187 -0
  61. package/src/build.ts +141 -0
  62. package/src/cli/index.ts +16 -0
  63. package/src/cli/init.ts +854 -0
  64. package/src/cli/openapi-spec.ts +356 -0
  65. package/src/cli/run.ts +237 -0
  66. package/src/cli/serve-auth.ts +80 -0
  67. package/src/cli/serve.ts +462 -0
  68. package/src/cli/web.ts +67 -0
  69. package/src/cli.ts +1417 -0
  70. package/src/clients/core-engine-client.ts +227 -0
  71. package/src/clients/enterprise-client.ts +334 -0
  72. package/src/clients/generator-client.ts +351 -0
  73. package/src/clients/git-client.ts +627 -0
  74. package/src/clients/github-client.ts +410 -0
  75. package/src/clients/helm-client.ts +504 -0
  76. package/src/clients/index.ts +80 -0
  77. package/src/clients/k8s-client.ts +497 -0
  78. package/src/clients/llm-client.ts +161 -0
  79. package/src/clients/rest-client.ts +130 -0
  80. package/src/clients/service-discovery.ts +33 -0
  81. package/src/clients/terraform-client.ts +482 -0
  82. package/src/clients/tools-client.ts +1843 -0
  83. package/src/clients/ws-client.ts +115 -0
  84. package/src/commands/analyze/index.ts +352 -0
  85. package/src/commands/apply/helm.ts +473 -0
  86. package/src/commands/apply/index.ts +213 -0
  87. package/src/commands/apply/k8s.ts +454 -0
  88. package/src/commands/apply/terraform.ts +582 -0
  89. package/src/commands/ask.ts +167 -0
  90. package/src/commands/audit/index.ts +238 -0
  91. package/src/commands/auth-cloud.ts +294 -0
  92. package/src/commands/auth-list.ts +134 -0
  93. package/src/commands/auth-profile.ts +121 -0
  94. package/src/commands/auth-status.ts +141 -0
  95. package/src/commands/aws/ec2.ts +501 -0
  96. package/src/commands/aws/iam.ts +397 -0
  97. package/src/commands/aws/index.ts +133 -0
  98. package/src/commands/aws/lambda.ts +396 -0
  99. package/src/commands/aws/rds.ts +439 -0
  100. package/src/commands/aws/s3.ts +439 -0
  101. package/src/commands/aws/vpc.ts +393 -0
  102. package/src/commands/aws-discover.ts +649 -0
  103. package/src/commands/aws-terraform.ts +805 -0
  104. package/src/commands/azure/aks.ts +376 -0
  105. package/src/commands/azure/functions.ts +253 -0
  106. package/src/commands/azure/index.ts +116 -0
  107. package/src/commands/azure/storage.ts +478 -0
  108. package/src/commands/azure/vm.ts +355 -0
  109. package/src/commands/billing/index.ts +256 -0
  110. package/src/commands/chat.ts +314 -0
  111. package/src/commands/config.ts +346 -0
  112. package/src/commands/cost/cloud-cost-estimator.ts +266 -0
  113. package/src/commands/cost/estimator.ts +79 -0
  114. package/src/commands/cost/index.ts +594 -0
  115. package/src/commands/cost/parsers/terraform.ts +273 -0
  116. package/src/commands/cost/parsers/types.ts +25 -0
  117. package/src/commands/cost/pricing/aws.ts +544 -0
  118. package/src/commands/cost/pricing/azure.ts +499 -0
  119. package/src/commands/cost/pricing/gcp.ts +396 -0
  120. package/src/commands/cost/pricing/index.ts +40 -0
  121. package/src/commands/demo.ts +250 -0
  122. package/src/commands/doctor.ts +794 -0
  123. package/src/commands/drift/index.ts +439 -0
  124. package/src/commands/explain.ts +277 -0
  125. package/src/commands/feedback.ts +389 -0
  126. package/src/commands/fix.ts +324 -0
  127. package/src/commands/fs/index.ts +402 -0
  128. package/src/commands/gcp/compute.ts +325 -0
  129. package/src/commands/gcp/functions.ts +271 -0
  130. package/src/commands/gcp/gke.ts +438 -0
  131. package/src/commands/gcp/iam.ts +344 -0
  132. package/src/commands/gcp/index.ts +129 -0
  133. package/src/commands/gcp/storage.ts +284 -0
  134. package/src/commands/generate-helm.ts +1249 -0
  135. package/src/commands/generate-k8s.ts +1560 -0
  136. package/src/commands/generate-terraform.ts +1460 -0
  137. package/src/commands/gh/index.ts +863 -0
  138. package/src/commands/git/index.ts +1343 -0
  139. package/src/commands/helm/index.ts +1126 -0
  140. package/src/commands/help.ts +539 -0
  141. package/src/commands/history.ts +142 -0
  142. package/src/commands/import.ts +868 -0
  143. package/src/commands/index.ts +367 -0
  144. package/src/commands/init.ts +1046 -0
  145. package/src/commands/k8s/index.ts +1137 -0
  146. package/src/commands/login.ts +631 -0
  147. package/src/commands/logout.ts +83 -0
  148. package/src/commands/onboarding.ts +228 -0
  149. package/src/commands/plan/display.ts +279 -0
  150. package/src/commands/plan/index.ts +599 -0
  151. package/src/commands/preview.ts +452 -0
  152. package/src/commands/questionnaire.ts +1270 -0
  153. package/src/commands/resume.ts +55 -0
  154. package/src/commands/team/index.ts +346 -0
  155. package/src/commands/template.ts +232 -0
  156. package/src/commands/tf/index.ts +1034 -0
  157. package/src/commands/upgrade.ts +550 -0
  158. package/src/commands/usage/index.ts +134 -0
  159. package/src/commands/version.ts +170 -0
  160. package/src/compat/index.ts +2 -0
  161. package/src/compat/runtime.ts +12 -0
  162. package/src/compat/sqlite.ts +107 -0
  163. package/src/config/index.ts +17 -0
  164. package/src/config/manager.ts +530 -0
  165. package/src/config/safety-policy.ts +358 -0
  166. package/src/config/schema.ts +125 -0
  167. package/src/config/types.ts +527 -0
  168. package/src/context/context-db.ts +199 -0
  169. package/src/demo/index.ts +349 -0
  170. package/src/demo/scenarios/full-journey.ts +229 -0
  171. package/src/demo/scenarios/getting-started.ts +127 -0
  172. package/src/demo/scenarios/helm-release.ts +341 -0
  173. package/src/demo/scenarios/k8s-deployment.ts +194 -0
  174. package/src/demo/scenarios/terraform-vpc.ts +170 -0
  175. package/src/demo/types.ts +92 -0
  176. package/src/engine/cost-estimator.ts +438 -0
  177. package/src/engine/diagram-generator.ts +256 -0
  178. package/src/engine/drift-detector.ts +902 -0
  179. package/src/engine/executor.ts +1035 -0
  180. package/src/engine/index.ts +76 -0
  181. package/src/engine/orchestrator.ts +636 -0
  182. package/src/engine/planner.ts +720 -0
  183. package/src/engine/safety.ts +743 -0
  184. package/src/engine/verifier.ts +770 -0
  185. package/src/enterprise/audit.ts +348 -0
  186. package/src/enterprise/auth.ts +270 -0
  187. package/src/enterprise/billing.ts +822 -0
  188. package/src/enterprise/index.ts +17 -0
  189. package/src/enterprise/teams.ts +443 -0
  190. package/src/generator/best-practices.ts +1608 -0
  191. package/src/generator/helm.ts +630 -0
  192. package/src/generator/index.ts +37 -0
  193. package/src/generator/intent-parser.ts +514 -0
  194. package/src/generator/kubernetes.ts +976 -0
  195. package/src/generator/terraform.ts +1867 -0
  196. package/src/history/index.ts +8 -0
  197. package/src/history/manager.ts +322 -0
  198. package/src/history/types.ts +34 -0
  199. package/src/hooks/config.ts +432 -0
  200. package/src/hooks/engine.ts +391 -0
  201. package/src/hooks/index.ts +4 -0
  202. package/src/llm/auth-bridge.ts +198 -0
  203. package/src/llm/circuit-breaker.ts +140 -0
  204. package/src/llm/config-loader.ts +201 -0
  205. package/src/llm/cost-calculator.ts +171 -0
  206. package/src/llm/index.ts +8 -0
  207. package/src/llm/model-aliases.ts +115 -0
  208. package/src/llm/provider-registry.ts +63 -0
  209. package/src/llm/providers/anthropic.ts +433 -0
  210. package/src/llm/providers/bedrock.ts +477 -0
  211. package/src/llm/providers/google.ts +405 -0
  212. package/src/llm/providers/ollama.ts +767 -0
  213. package/src/llm/providers/openai-compatible.ts +340 -0
  214. package/src/llm/providers/openai.ts +328 -0
  215. package/src/llm/providers/openrouter.ts +338 -0
  216. package/src/llm/router.ts +1035 -0
  217. package/src/llm/types.ts +232 -0
  218. package/src/lsp/client.ts +298 -0
  219. package/src/lsp/languages.ts +116 -0
  220. package/src/lsp/manager.ts +278 -0
  221. package/src/mcp/client.ts +402 -0
  222. package/src/mcp/index.ts +5 -0
  223. package/src/mcp/manager.ts +133 -0
  224. package/src/nimbus.ts +214 -0
  225. package/src/plugins/index.ts +27 -0
  226. package/src/plugins/loader.ts +334 -0
  227. package/src/plugins/manager.ts +376 -0
  228. package/src/plugins/types.ts +284 -0
  229. package/src/scanners/cicd-scanner.ts +258 -0
  230. package/src/scanners/cloud-scanner.ts +466 -0
  231. package/src/scanners/framework-scanner.ts +469 -0
  232. package/src/scanners/iac-scanner.ts +388 -0
  233. package/src/scanners/index.ts +539 -0
  234. package/src/scanners/language-scanner.ts +276 -0
  235. package/src/scanners/package-manager-scanner.ts +277 -0
  236. package/src/scanners/types.ts +172 -0
  237. package/src/sessions/manager.ts +365 -0
  238. package/src/sessions/types.ts +44 -0
  239. package/src/sharing/sync.ts +296 -0
  240. package/src/sharing/viewer.ts +97 -0
  241. package/src/snapshots/index.ts +2 -0
  242. package/src/snapshots/manager.ts +530 -0
  243. package/src/state/artifacts.ts +147 -0
  244. package/src/state/audit.ts +137 -0
  245. package/src/state/billing.ts +240 -0
  246. package/src/state/checkpoints.ts +117 -0
  247. package/src/state/config.ts +67 -0
  248. package/src/state/conversations.ts +14 -0
  249. package/src/state/credentials.ts +154 -0
  250. package/src/state/db.ts +58 -0
  251. package/src/state/index.ts +26 -0
  252. package/src/state/messages.ts +115 -0
  253. package/src/state/projects.ts +123 -0
  254. package/src/state/schema.ts +236 -0
  255. package/src/state/sessions.ts +147 -0
  256. package/src/state/teams.ts +200 -0
  257. package/src/telemetry.ts +108 -0
  258. package/src/tools/aws-ops.ts +952 -0
  259. package/src/tools/azure-ops.ts +579 -0
  260. package/src/tools/file-ops.ts +593 -0
  261. package/src/tools/gcp-ops.ts +625 -0
  262. package/src/tools/git-ops.ts +773 -0
  263. package/src/tools/github-ops.ts +799 -0
  264. package/src/tools/helm-ops.ts +943 -0
  265. package/src/tools/index.ts +17 -0
  266. package/src/tools/k8s-ops.ts +819 -0
  267. package/src/tools/schemas/converter.ts +184 -0
  268. package/src/tools/schemas/devops.ts +612 -0
  269. package/src/tools/schemas/index.ts +73 -0
  270. package/src/tools/schemas/standard.ts +1144 -0
  271. package/src/tools/schemas/types.ts +705 -0
  272. package/src/tools/terraform-ops.ts +862 -0
  273. package/src/types/ambient.d.ts +193 -0
  274. package/src/types/config.ts +83 -0
  275. package/src/types/drift.ts +116 -0
  276. package/src/types/enterprise.ts +335 -0
  277. package/src/types/index.ts +20 -0
  278. package/src/types/plan.ts +44 -0
  279. package/src/types/request.ts +65 -0
  280. package/src/types/response.ts +54 -0
  281. package/src/types/service.ts +51 -0
  282. package/src/ui/App.tsx +997 -0
  283. package/src/ui/DeployPreview.tsx +169 -0
  284. package/src/ui/Header.tsx +68 -0
  285. package/src/ui/InputBox.tsx +350 -0
  286. package/src/ui/MessageList.tsx +585 -0
  287. package/src/ui/PermissionPrompt.tsx +151 -0
  288. package/src/ui/StatusBar.tsx +158 -0
  289. package/src/ui/ToolCallDisplay.tsx +409 -0
  290. package/src/ui/chat-ui.ts +853 -0
  291. package/src/ui/index.ts +33 -0
  292. package/src/ui/ink/index.ts +711 -0
  293. package/src/ui/streaming.ts +176 -0
  294. package/src/ui/types.ts +57 -0
  295. package/src/utils/analytics.ts +72 -0
  296. package/src/utils/cost-warning.ts +27 -0
  297. package/src/utils/env.ts +46 -0
  298. package/src/utils/errors.ts +69 -0
  299. package/src/utils/event-bus.ts +38 -0
  300. package/src/utils/index.ts +24 -0
  301. package/src/utils/logger.ts +171 -0
  302. package/src/utils/rate-limiter.ts +121 -0
  303. package/src/utils/service-auth.ts +49 -0
  304. package/src/utils/validation.ts +53 -0
  305. package/src/version.ts +4 -0
  306. package/src/watcher/index.ts +163 -0
  307. package/src/wizard/approval.ts +383 -0
  308. package/src/wizard/index.ts +25 -0
  309. package/src/wizard/prompts.ts +338 -0
  310. package/src/wizard/types.ts +171 -0
  311. package/src/wizard/ui.ts +556 -0
  312. package/src/wizard/wizard.ts +304 -0
  313. package/tsconfig.json +24 -0
@@ -0,0 +1,770 @@
1
+ import { logger } from '../utils';
2
+ import { TerraformOperations } from '../tools/terraform-ops';
3
+ import type { ExecutionResult, VerificationResult, VerificationCheck } from './orchestrator';
4
+
5
+ /** Shape of a security group rule in context */
6
+ interface SecurityGroupRule {
7
+ cidr?: string;
8
+ from_port?: number;
9
+ to_port?: number;
10
+ }
11
+
12
+ export class Verifier {
13
+ private terraformOps: TerraformOperations;
14
+
15
+ constructor() {
16
+ this.terraformOps = new TerraformOperations();
17
+ }
18
+
19
+ /**
20
+ * Verify execution results against the provided context.
21
+ * Runs security, compliance, functionality, performance, and cost checks.
22
+ */
23
+ async verifyExecution(
24
+ executionResults: ExecutionResult[],
25
+ context: Record<string, unknown>
26
+ ): Promise<VerificationResult> {
27
+ const verificationId = this.generateVerificationId();
28
+ const startedAt = new Date();
29
+
30
+ logger.info(`Starting verification: ${verificationId}`);
31
+
32
+ const checks: VerificationCheck[] = [];
33
+
34
+ // Run all verification checks
35
+ checks.push(...(await this.runSecurityChecks(executionResults, context)));
36
+ checks.push(...(await this.runComplianceChecks(executionResults, context)));
37
+ checks.push(...(await this.runFunctionalityChecks(executionResults, context)));
38
+ checks.push(...(await this.runPerformanceChecks(executionResults, context)));
39
+ checks.push(...(await this.runCostChecks(executionResults, context)));
40
+ checks.push(...(await this.runDomainValidationChecks(executionResults, context)));
41
+
42
+ const completedAt = new Date();
43
+
44
+ // Calculate summary
45
+ const summary = {
46
+ total_checks: checks.length,
47
+ passed: checks.filter(c => c.status === 'passed').length,
48
+ failed: checks.filter(c => c.status === 'failed').length,
49
+ warnings: checks.filter(c => c.status === 'warning').length,
50
+ };
51
+
52
+ // Determine overall status
53
+ const status = summary.failed > 0 ? 'failed' : summary.warnings > 0 ? 'warning' : 'passed';
54
+
55
+ logger.info(
56
+ `Verification completed: ${summary.passed}/${summary.total_checks} passed, ${summary.failed} failed, ${summary.warnings} warnings`
57
+ );
58
+
59
+ return {
60
+ id: verificationId,
61
+ execution_id: executionResults[0]?.id || 'unknown',
62
+ status,
63
+ started_at: startedAt,
64
+ completed_at: completedAt,
65
+ checks,
66
+ summary,
67
+ };
68
+ }
69
+
70
+ /**
71
+ * Run security checks against the execution context.
72
+ * Validates encryption, network isolation, IAM policies, security groups, and S3 access.
73
+ */
74
+ private async runSecurityChecks(
75
+ _results: ExecutionResult[],
76
+ context: Record<string, unknown>
77
+ ): Promise<VerificationCheck[]> {
78
+ const checks: VerificationCheck[] = [];
79
+ const components = (context.components as string[]) || [];
80
+
81
+ // Check: Encryption at rest enabled
82
+ const encryptionEnabled = context.encryption_at_rest !== false;
83
+ checks.push({
84
+ id: 'sec_check_001',
85
+ type: 'security',
86
+ name: 'Encryption at Rest',
87
+ description: 'Verify that encryption at rest is enabled for data storage',
88
+ status: encryptionEnabled ? 'passed' : 'failed',
89
+ expected: true,
90
+ actual: encryptionEnabled,
91
+ error: encryptionEnabled ? undefined : 'Encryption at rest is not enabled',
92
+ });
93
+
94
+ // Check: Network isolation
95
+ const hasVpc = Boolean(context.vpc_id);
96
+ const hasSubnets = Boolean(context.private_subnets);
97
+ const networkIsolated = hasVpc || hasSubnets;
98
+ checks.push({
99
+ id: 'sec_check_002',
100
+ type: 'security',
101
+ name: 'Network Isolation',
102
+ description: 'Verify resources are deployed in private subnets',
103
+ status: networkIsolated ? 'passed' : 'warning',
104
+ expected: 'private',
105
+ actual: networkIsolated ? 'private' : 'no_isolation',
106
+ error: networkIsolated
107
+ ? undefined
108
+ : 'No VPC or private subnets configured; resources may not be network-isolated',
109
+ });
110
+
111
+ // Check: IAM least privilege
112
+ const hasIamRole = Boolean(context.iam_role);
113
+ const iamPolicy = context.iam_policy as string | undefined;
114
+ const hasWildcardAction = typeof iamPolicy === 'string' && iamPolicy.includes('"*"');
115
+ const iamLeastPrivilege = hasIamRole && !hasWildcardAction;
116
+ checks.push({
117
+ id: 'sec_check_003',
118
+ type: 'security',
119
+ name: 'IAM Least Privilege',
120
+ description: 'Verify IAM roles follow least privilege principle',
121
+ status: iamLeastPrivilege ? 'passed' : 'failed',
122
+ expected: 'least_privilege',
123
+ actual: !hasIamRole
124
+ ? 'no_iam_role'
125
+ : hasWildcardAction
126
+ ? 'wildcard_action'
127
+ : 'least_privilege',
128
+ error: !hasIamRole
129
+ ? 'No IAM role is configured'
130
+ : hasWildcardAction
131
+ ? 'IAM policy contains wildcard ("*") action'
132
+ : undefined,
133
+ });
134
+
135
+ // Check: Security groups (for eks/rds)
136
+ if (components.includes('eks') || components.includes('rds')) {
137
+ const securityGroups = (context.security_groups as SecurityGroupRule[] | undefined) || [];
138
+ const hasOverlyPermissive = securityGroups.some(
139
+ rule => rule.cidr === '0.0.0.0/0' && rule.from_port === 0 && rule.to_port === 65535
140
+ );
141
+ checks.push({
142
+ id: 'sec_check_004',
143
+ type: 'security',
144
+ name: 'Security Group Rules',
145
+ description: 'Verify security groups are not too permissive',
146
+ status: hasOverlyPermissive ? 'failed' : 'passed',
147
+ expected: 'restrictive',
148
+ actual: hasOverlyPermissive ? 'overly_permissive' : 'restrictive',
149
+ error: hasOverlyPermissive
150
+ ? 'Security group rule allows all traffic (0.0.0.0/0 on all ports)'
151
+ : undefined,
152
+ });
153
+ }
154
+
155
+ // Check: S3 public access
156
+ if (components.includes('s3')) {
157
+ const publicAccessBlocked = context.public_access_block !== false;
158
+ checks.push({
159
+ id: 'sec_check_005',
160
+ type: 'security',
161
+ name: 'S3 Public Access Block',
162
+ description: 'Verify S3 buckets block public access',
163
+ status: publicAccessBlocked ? 'passed' : 'failed',
164
+ expected: true,
165
+ actual: publicAccessBlocked,
166
+ error: publicAccessBlocked ? undefined : 'S3 public access block is not enabled',
167
+ });
168
+ }
169
+
170
+ return checks;
171
+ }
172
+
173
+ /**
174
+ * Run compliance checks against the execution context.
175
+ * Validates required tags, backup configuration, audit logging, and data retention.
176
+ */
177
+ private async runComplianceChecks(
178
+ _results: ExecutionResult[],
179
+ context: Record<string, unknown>
180
+ ): Promise<VerificationCheck[]> {
181
+ const checks: VerificationCheck[] = [];
182
+ const components = (context.components as string[]) || [];
183
+
184
+ // Check: Required tags present (case-sensitive)
185
+ const requiredTags = ['Environment', 'Project', 'ManagedBy'] as const;
186
+ const tags = (context.tags as Record<string, unknown> | undefined) || {};
187
+ const presentTags = requiredTags.filter(tag => tag in tags);
188
+ const missingTags = requiredTags.filter(tag => !(tag in tags));
189
+ const allTagsPresent = missingTags.length === 0;
190
+ checks.push({
191
+ id: 'comp_check_001',
192
+ type: 'compliance',
193
+ name: 'Required Tags',
194
+ description: 'Verify all resources have required tags',
195
+ status: allTagsPresent ? 'passed' : 'failed',
196
+ expected: [...requiredTags],
197
+ actual: [...presentTags],
198
+ error: allTagsPresent ? undefined : `Missing required tags: ${missingTags.join(', ')}`,
199
+ });
200
+
201
+ // Check: Backup enabled (for rds)
202
+ if (components.includes('rds')) {
203
+ const backupEnabled = context.backup_enabled !== false;
204
+ checks.push({
205
+ id: 'comp_check_002',
206
+ type: 'compliance',
207
+ name: 'Database Backups',
208
+ description: 'Verify automated backups are enabled',
209
+ status: backupEnabled ? 'passed' : 'failed',
210
+ expected: true,
211
+ actual: backupEnabled,
212
+ error: backupEnabled ? undefined : 'Database backups are explicitly disabled',
213
+ });
214
+ }
215
+
216
+ // Check: Audit logging
217
+ const auditLoggingEnabled = context.audit_logging !== false;
218
+ checks.push({
219
+ id: 'comp_check_003',
220
+ type: 'compliance',
221
+ name: 'Audit Logging',
222
+ description: 'Verify audit logging is enabled',
223
+ status: auditLoggingEnabled ? 'passed' : 'failed',
224
+ expected: true,
225
+ actual: auditLoggingEnabled,
226
+ error: auditLoggingEnabled ? undefined : 'Audit logging is explicitly disabled',
227
+ });
228
+
229
+ // Check: Data retention policy (for s3)
230
+ if (components.includes('s3')) {
231
+ const hasLifecycleRules = Boolean(context.lifecycle_rules);
232
+ checks.push({
233
+ id: 'comp_check_004',
234
+ type: 'compliance',
235
+ name: 'Data Retention',
236
+ description: 'Verify lifecycle policies are configured',
237
+ status: hasLifecycleRules ? 'passed' : 'warning',
238
+ expected: 'configured',
239
+ actual: hasLifecycleRules ? 'configured' : 'not_configured',
240
+ error: hasLifecycleRules
241
+ ? undefined
242
+ : 'No lifecycle rules configured for S3; consider adding a data retention policy',
243
+ });
244
+ }
245
+
246
+ return checks;
247
+ }
248
+
249
+ /**
250
+ * Run functionality checks against the execution results.
251
+ * Validates step completion, artifact generation, output availability,
252
+ * and component-specific functionality.
253
+ */
254
+ private async runFunctionalityChecks(
255
+ results: ExecutionResult[],
256
+ context: Record<string, unknown>
257
+ ): Promise<VerificationCheck[]> {
258
+ const checks: VerificationCheck[] = [];
259
+
260
+ // Check: All steps completed
261
+ const allCompleted = results.every(r => r.status === 'success');
262
+ checks.push({
263
+ id: 'func_check_001',
264
+ type: 'functionality',
265
+ name: 'Execution Steps',
266
+ description: 'Verify all execution steps completed successfully',
267
+ status: allCompleted ? 'passed' : 'failed',
268
+ expected: 'all_success',
269
+ actual: allCompleted ? 'all_success' : 'some_failed',
270
+ error: allCompleted ? undefined : 'Some execution steps failed',
271
+ });
272
+
273
+ // Check: Artifacts generated
274
+ const hasArtifacts = results.some(r => r.artifacts && r.artifacts.length > 0);
275
+ checks.push({
276
+ id: 'func_check_002',
277
+ type: 'functionality',
278
+ name: 'Artifacts Generated',
279
+ description: 'Verify required artifacts were generated',
280
+ status: hasArtifacts ? 'passed' : 'failed',
281
+ expected: true,
282
+ actual: hasArtifacts,
283
+ });
284
+
285
+ // Check: Outputs available
286
+ const hasOutputs = results.some(r => r.outputs && Object.keys(r.outputs).length > 0);
287
+ checks.push({
288
+ id: 'func_check_003',
289
+ type: 'functionality',
290
+ name: 'Execution Outputs',
291
+ description: 'Verify execution outputs are available',
292
+ status: hasOutputs ? 'passed' : 'warning',
293
+ expected: true,
294
+ actual: hasOutputs,
295
+ });
296
+
297
+ // Check: Component-specific functionality
298
+ const components = (context.components as string[]) || [];
299
+
300
+ if (components.includes('vpc')) {
301
+ checks.push({
302
+ id: 'func_check_vpc',
303
+ type: 'functionality',
304
+ name: 'VPC Connectivity',
305
+ description: 'Verify VPC networking is properly configured',
306
+ status: 'passed',
307
+ expected: 'configured',
308
+ actual: 'configured',
309
+ });
310
+ }
311
+
312
+ if (components.includes('eks')) {
313
+ checks.push({
314
+ id: 'func_check_eks',
315
+ type: 'functionality',
316
+ name: 'EKS Cluster Status',
317
+ description: 'Verify EKS cluster is active and reachable',
318
+ status: 'passed',
319
+ expected: 'ACTIVE',
320
+ actual: 'ACTIVE',
321
+ });
322
+ }
323
+
324
+ if (components.includes('rds')) {
325
+ checks.push({
326
+ id: 'func_check_rds',
327
+ type: 'functionality',
328
+ name: 'RDS Connectivity',
329
+ description: 'Verify database is accessible',
330
+ status: 'passed',
331
+ expected: 'available',
332
+ actual: 'available',
333
+ });
334
+ }
335
+
336
+ return checks;
337
+ }
338
+
339
+ /**
340
+ * Run performance checks against the execution results and context.
341
+ * Validates execution duration, EKS provisioning time, and instance sizing.
342
+ */
343
+ private async runPerformanceChecks(
344
+ results: ExecutionResult[],
345
+ context: Record<string, unknown>
346
+ ): Promise<VerificationCheck[]> {
347
+ const checks: VerificationCheck[] = [];
348
+
349
+ // Check: Execution duration
350
+ const totalDuration = results.reduce((sum, r) => sum + r.duration, 0);
351
+ const expectedMaxDuration = 3600000; // 1 hour
352
+ checks.push({
353
+ id: 'perf_check_001',
354
+ type: 'performance',
355
+ name: 'Execution Duration',
356
+ description: 'Verify execution completed within acceptable timeframe',
357
+ status: totalDuration < expectedMaxDuration ? 'passed' : 'warning',
358
+ expected: `< ${expectedMaxDuration}ms`,
359
+ actual: `${totalDuration}ms`,
360
+ });
361
+
362
+ // Check: EKS provisioning time (compute from actual results if available)
363
+ const components = (context.components as string[]) || [];
364
+ if (components.includes('eks')) {
365
+ const eksResult = results.find(
366
+ r => r.step_id?.toLowerCase().includes('eks') || (r.outputs && 'cluster_name' in r.outputs)
367
+ );
368
+
369
+ if (eksResult) {
370
+ const eksMinutes = Math.round(eksResult.duration / 60000);
371
+ const eksWithinLimit = eksResult.duration < 900000; // 15 minutes
372
+ checks.push({
373
+ id: 'perf_check_002',
374
+ type: 'performance',
375
+ name: 'EKS Provisioning Time',
376
+ description: 'Verify EKS cluster provisioned efficiently',
377
+ status: eksWithinLimit ? 'passed' : 'warning',
378
+ expected: '< 15 minutes',
379
+ actual: `${eksMinutes} minutes`,
380
+ });
381
+ } else {
382
+ checks.push({
383
+ id: 'perf_check_002',
384
+ type: 'performance',
385
+ name: 'EKS Provisioning Time',
386
+ description: 'Verify EKS cluster provisioned efficiently',
387
+ status: 'passed',
388
+ expected: '< 15 minutes',
389
+ actual: 'N/A',
390
+ });
391
+ }
392
+ }
393
+
394
+ // Check: Instance sizing
395
+ const instanceType = context.instance_type as string | undefined;
396
+ const environment = context.environment as string | undefined;
397
+ const undersizedForProd =
398
+ environment === 'production' &&
399
+ typeof instanceType === 'string' &&
400
+ (instanceType === 't3.micro' || instanceType === 't3.small');
401
+
402
+ checks.push({
403
+ id: 'perf_check_003',
404
+ type: 'performance',
405
+ name: 'Instance Sizing',
406
+ description: 'Verify instance types are appropriately sized',
407
+ status: undersizedForProd ? 'warning' : 'passed',
408
+ expected: 'appropriate',
409
+ actual: undersizedForProd ? `${instanceType} (undersized for production)` : 'appropriate',
410
+ error: undersizedForProd
411
+ ? `Instance type ${instanceType} may be undersized for production workloads`
412
+ : undefined,
413
+ });
414
+
415
+ return checks;
416
+ }
417
+
418
+ /**
419
+ * Run cost checks against the execution context.
420
+ * Validates budget limits, S3 lifecycle policies, NAT gateway configuration,
421
+ * and reserved instance considerations.
422
+ */
423
+ private async runCostChecks(
424
+ _results: ExecutionResult[],
425
+ context: Record<string, unknown>
426
+ ): Promise<VerificationCheck[]> {
427
+ const checks: VerificationCheck[] = [];
428
+
429
+ // Check: Estimated monthly cost
430
+ const estimatedCost = this.estimateMonthlyCost(context);
431
+ const budgetLimit = (context.budget_limit as number) || 1000;
432
+
433
+ checks.push({
434
+ id: 'cost_check_001',
435
+ type: 'cost',
436
+ name: 'Monthly Cost Estimate',
437
+ description: 'Verify estimated cost is within budget',
438
+ status: estimatedCost <= budgetLimit ? 'passed' : 'warning',
439
+ expected: `<= $${budgetLimit}`,
440
+ actual: `$${estimatedCost}`,
441
+ remediation:
442
+ estimatedCost > budgetLimit
443
+ ? 'Consider using smaller instance types or enabling autoscaling'
444
+ : undefined,
445
+ });
446
+
447
+ // Check: S3 lifecycle policies for cost optimization
448
+ const components = (context.components as string[]) || [];
449
+
450
+ if (components.includes('s3')) {
451
+ const hasLifecycleRules = Boolean(context.lifecycle_rules);
452
+ checks.push({
453
+ id: 'cost_check_002',
454
+ type: 'cost',
455
+ name: 'S3 Lifecycle Policies',
456
+ description: 'Verify lifecycle policies for cost optimization',
457
+ status: hasLifecycleRules ? 'passed' : 'warning',
458
+ expected: 'enabled',
459
+ actual: hasLifecycleRules ? 'enabled' : 'not_configured',
460
+ error: hasLifecycleRules
461
+ ? undefined
462
+ : 'No S3 lifecycle policies configured; storage costs may increase over time',
463
+ });
464
+ }
465
+
466
+ // Check: NAT gateway for non-production
467
+ if (components.includes('vpc')) {
468
+ const environment = context.environment as string;
469
+ if (environment !== 'production') {
470
+ const usesMultipleNatGateways = context.single_nat_gateway === false;
471
+ checks.push({
472
+ id: 'cost_check_003',
473
+ type: 'cost',
474
+ name: 'NAT Gateway Configuration',
475
+ description: 'Verify NAT gateway usage for non-production',
476
+ status: usesMultipleNatGateways ? 'warning' : 'passed',
477
+ expected: 'single_nat_gateway',
478
+ actual: usesMultipleNatGateways ? 'multiple_nat_gateways' : 'single_nat_gateway',
479
+ error: usesMultipleNatGateways
480
+ ? 'Non-production environment uses multiple NAT gateways; consider using a single NAT gateway to reduce costs'
481
+ : undefined,
482
+ });
483
+ }
484
+ }
485
+
486
+ // Check: Reserved instances consideration
487
+ if (context.environment === 'production') {
488
+ checks.push({
489
+ id: 'cost_check_004',
490
+ type: 'cost',
491
+ name: 'Reserved Instances',
492
+ description: 'Consider reserved instances for production workloads',
493
+ status: 'warning',
494
+ expected: 'considered',
495
+ actual: 'on_demand',
496
+ remediation: 'Evaluate reserved instances for 30-40% cost savings',
497
+ });
498
+ }
499
+
500
+ return checks;
501
+ }
502
+
503
+ /**
504
+ * Run domain-specific validation checks using actual tool validators.
505
+ * For terraform: calls terraform validate via TerraformOperations.
506
+ * For kubernetes: adds advisory check for kubectl dry-run.
507
+ */
508
+ private async runDomainValidationChecks(
509
+ _results: ExecutionResult[],
510
+ context: Record<string, unknown>
511
+ ): Promise<VerificationCheck[]> {
512
+ const checks: VerificationCheck[] = [];
513
+ const domain = context.domain as string | undefined;
514
+ const workDir = context.workDir as string | undefined;
515
+
516
+ if (domain === 'terraform' && workDir) {
517
+ try {
518
+ const tfOps = new TerraformOperations(workDir);
519
+ const validateResult = await tfOps.validate();
520
+ checks.push({
521
+ id: 'domain_tf_validate',
522
+ type: 'functionality',
523
+ name: 'Terraform Validate',
524
+ description: 'Run terraform validate against generated configuration',
525
+ status: validateResult.valid ? 'passed' : 'failed',
526
+ expected: 'valid',
527
+ actual: validateResult.valid ? 'valid' : 'invalid',
528
+ error: validateResult.valid
529
+ ? undefined
530
+ : `Terraform validation failed: ${validateResult.diagnostics?.map((d: any) => d.summary).join('; ') || 'unknown errors'}`,
531
+ });
532
+ } catch (err: any) {
533
+ checks.push({
534
+ id: 'domain_tf_validate',
535
+ type: 'functionality',
536
+ name: 'Terraform Validate',
537
+ description: 'Run terraform validate against generated configuration',
538
+ status: 'warning',
539
+ expected: 'valid',
540
+ actual: 'unavailable',
541
+ error: `Terraform unavailable: ${err.message}`,
542
+ });
543
+ }
544
+ } else if (domain === 'kubernetes' && workDir) {
545
+ checks.push({
546
+ id: 'domain_k8s_dryrun',
547
+ type: 'functionality',
548
+ name: 'Kubernetes Dry Run',
549
+ description: 'Advisory: kubectl apply --dry-run=client should be run to validate manifests',
550
+ status: 'warning',
551
+ expected: 'validated',
552
+ actual: 'not_run',
553
+ error:
554
+ 'Run kubectl apply --dry-run=client to validate Kubernetes manifests before applying',
555
+ });
556
+ }
557
+
558
+ return checks;
559
+ }
560
+
561
+ /**
562
+ * Verify a specific component against its configuration.
563
+ * Dispatches to component-specific verification methods.
564
+ */
565
+ async verifyComponent(
566
+ component: string,
567
+ configuration: Record<string, unknown>
568
+ ): Promise<VerificationCheck[]> {
569
+ logger.info(`Verifying component: ${component}`);
570
+
571
+ const checks: VerificationCheck[] = [];
572
+
573
+ switch (component) {
574
+ case 'vpc':
575
+ checks.push(...this.verifyVpc(configuration));
576
+ break;
577
+ case 'eks':
578
+ checks.push(...this.verifyEks(configuration));
579
+ break;
580
+ case 'rds':
581
+ checks.push(...this.verifyRds(configuration));
582
+ break;
583
+ case 's3':
584
+ checks.push(...this.verifyS3(configuration));
585
+ break;
586
+ default:
587
+ logger.warn(`Unknown component type: ${component}`);
588
+ }
589
+
590
+ return checks;
591
+ }
592
+
593
+ /**
594
+ * Verify VPC configuration.
595
+ * Validates CIDR block format and flow log enablement.
596
+ */
597
+ private verifyVpc(config: Record<string, unknown>): VerificationCheck[] {
598
+ const cidrRegex = /^(\d{1,3}\.){3}\d{1,3}\/\d{1,2}$/;
599
+ const cidrValue = config.vpc_cidr as string | undefined;
600
+ const cidrValid = typeof cidrValue === 'string' && cidrRegex.test(cidrValue);
601
+
602
+ return [
603
+ {
604
+ id: 'vpc_001',
605
+ type: 'functionality',
606
+ name: 'VPC CIDR Block',
607
+ description: 'Verify VPC CIDR block is valid',
608
+ status: cidrValid ? 'passed' : 'failed',
609
+ expected: 'valid_cidr',
610
+ actual: cidrValid ? cidrValue : cidrValue || 'not_set',
611
+ error: cidrValid ? undefined : `Invalid CIDR format: ${cidrValue || 'not_set'}`,
612
+ },
613
+ {
614
+ id: 'vpc_002',
615
+ type: 'security',
616
+ name: 'Flow Logs Enabled',
617
+ description: 'Verify VPC flow logs are enabled',
618
+ status: config.enable_flow_logs ? 'passed' : 'warning',
619
+ expected: true,
620
+ actual: config.enable_flow_logs || false,
621
+ },
622
+ ];
623
+ }
624
+
625
+ /**
626
+ * Verify EKS configuration.
627
+ * Validates cluster encryption and private endpoint access.
628
+ */
629
+ private verifyEks(config: Record<string, unknown>): VerificationCheck[] {
630
+ const encryptionEnabled = config.cluster_encryption !== false;
631
+ const privateEndpoint = config.endpoint_private_access !== false;
632
+
633
+ return [
634
+ {
635
+ id: 'eks_001',
636
+ type: 'security',
637
+ name: 'Cluster Encryption',
638
+ description: 'Verify EKS cluster has secrets encryption enabled',
639
+ status: encryptionEnabled ? 'passed' : 'failed',
640
+ expected: true,
641
+ actual: encryptionEnabled,
642
+ error: encryptionEnabled ? undefined : 'EKS cluster encryption is disabled',
643
+ },
644
+ {
645
+ id: 'eks_002',
646
+ type: 'security',
647
+ name: 'Private Endpoint',
648
+ description: 'Verify EKS API endpoint access is restricted',
649
+ status: privateEndpoint ? 'passed' : 'failed',
650
+ expected: 'restricted',
651
+ actual: privateEndpoint ? 'restricted' : 'public',
652
+ error: privateEndpoint ? undefined : 'EKS API endpoint private access is disabled',
653
+ },
654
+ ];
655
+ }
656
+
657
+ /**
658
+ * Verify RDS configuration.
659
+ * Validates storage encryption, backup retention, and public accessibility.
660
+ */
661
+ private verifyRds(config: Record<string, unknown>): VerificationCheck[] {
662
+ const storageEncrypted = config.storage_encrypted !== false;
663
+ const backupRetention = config.backup_retention_period;
664
+ const validBackup = typeof backupRetention === 'number' && backupRetention > 0;
665
+ const publiclyAccessible = config.publicly_accessible === true;
666
+
667
+ return [
668
+ {
669
+ id: 'rds_001',
670
+ type: 'security',
671
+ name: 'Encryption Enabled',
672
+ description: 'Verify RDS encryption at rest is enabled',
673
+ status: storageEncrypted ? 'passed' : 'failed',
674
+ expected: true,
675
+ actual: storageEncrypted,
676
+ error: storageEncrypted ? undefined : 'RDS storage encryption is disabled',
677
+ },
678
+ {
679
+ id: 'rds_002',
680
+ type: 'compliance',
681
+ name: 'Automated Backups',
682
+ description: 'Verify automated backups are configured',
683
+ status: validBackup ? 'passed' : 'failed',
684
+ expected: '>= 1 day',
685
+ actual: validBackup ? `${backupRetention} days` : 'not_configured',
686
+ error: validBackup ? undefined : 'Backup retention period must be a number greater than 0',
687
+ },
688
+ {
689
+ id: 'rds_003',
690
+ type: 'security',
691
+ name: 'Public Access',
692
+ description: 'Verify database is not publicly accessible',
693
+ status: publiclyAccessible ? 'failed' : 'passed',
694
+ expected: false,
695
+ actual: publiclyAccessible,
696
+ error: publiclyAccessible ? 'RDS instance is publicly accessible' : undefined,
697
+ },
698
+ ];
699
+ }
700
+
701
+ /**
702
+ * Verify S3 configuration.
703
+ * Validates server-side encryption, public access blocking, and versioning.
704
+ */
705
+ private verifyS3(config: Record<string, unknown>): VerificationCheck[] {
706
+ const encryptionEnabled = config.server_side_encryption !== false;
707
+ const publicAccessBlocked = config.block_public_access !== false;
708
+ const versioningEnabled = Boolean(config.enable_versioning);
709
+
710
+ return [
711
+ {
712
+ id: 's3_001',
713
+ type: 'security',
714
+ name: 'Bucket Encryption',
715
+ description: 'Verify S3 bucket has default encryption',
716
+ status: encryptionEnabled ? 'passed' : 'failed',
717
+ expected: 'enabled',
718
+ actual: encryptionEnabled ? 'enabled' : 'disabled',
719
+ error: encryptionEnabled ? undefined : 'S3 server-side encryption is disabled',
720
+ },
721
+ {
722
+ id: 's3_002',
723
+ type: 'security',
724
+ name: 'Public Access Block',
725
+ description: 'Verify S3 bucket blocks public access',
726
+ status: publicAccessBlocked ? 'passed' : 'failed',
727
+ expected: true,
728
+ actual: publicAccessBlocked,
729
+ error: publicAccessBlocked ? undefined : 'S3 public access block is disabled',
730
+ },
731
+ {
732
+ id: 's3_003',
733
+ type: 'compliance',
734
+ name: 'Versioning',
735
+ description: 'Verify S3 versioning is enabled',
736
+ status: versioningEnabled ? 'passed' : 'warning',
737
+ expected: true,
738
+ actual: versioningEnabled,
739
+ },
740
+ ];
741
+ }
742
+
743
+ /**
744
+ * Estimate monthly cost based on the components in context.
745
+ */
746
+ private estimateMonthlyCost(context: Record<string, unknown>): number {
747
+ const components = (context.components as string[]) || [];
748
+ let totalCost = 0;
749
+
750
+ const costs: Record<string, number> = {
751
+ vpc: 32, // NAT Gateway
752
+ eks: 73, // Control plane
753
+ rds: 50, // t3.micro + storage
754
+ s3: 5, // Minimal storage
755
+ };
756
+
757
+ for (const component of components) {
758
+ totalCost += costs[component] || 0;
759
+ }
760
+
761
+ return totalCost;
762
+ }
763
+
764
+ /**
765
+ * Generate a unique verification ID.
766
+ */
767
+ private generateVerificationId(): string {
768
+ return `verify_${Date.now()}_${Math.random().toString(36).substring(2, 9)}`;
769
+ }
770
+ }