@build-astron-co/nimbus 0.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +21 -0
- package/README.md +628 -0
- package/bin/nimbus +38 -0
- package/package.json +80 -0
- package/src/__tests__/app.test.ts +76 -0
- package/src/__tests__/audit.test.ts +877 -0
- package/src/__tests__/circuit-breaker.test.ts +116 -0
- package/src/__tests__/cli-run.test.ts +115 -0
- package/src/__tests__/context-manager.test.ts +502 -0
- package/src/__tests__/context.test.ts +242 -0
- package/src/__tests__/enterprise.test.ts +401 -0
- package/src/__tests__/generator.test.ts +433 -0
- package/src/__tests__/hooks.test.ts +582 -0
- package/src/__tests__/init.test.ts +436 -0
- package/src/__tests__/intent-parser.test.ts +229 -0
- package/src/__tests__/llm-router.test.ts +209 -0
- package/src/__tests__/lsp.test.ts +293 -0
- package/src/__tests__/modes.test.ts +336 -0
- package/src/__tests__/permissions.test.ts +338 -0
- package/src/__tests__/serve.test.ts +275 -0
- package/src/__tests__/sessions.test.ts +227 -0
- package/src/__tests__/sharing.test.ts +288 -0
- package/src/__tests__/snapshots.test.ts +581 -0
- package/src/__tests__/state-db.test.ts +334 -0
- package/src/__tests__/stream-with-tools.test.ts +732 -0
- package/src/__tests__/subagents.test.ts +176 -0
- package/src/__tests__/system-prompt.test.ts +169 -0
- package/src/__tests__/tool-converter.test.ts +256 -0
- package/src/__tests__/tool-schemas.test.ts +397 -0
- package/src/__tests__/tools.test.ts +143 -0
- package/src/__tests__/version.test.ts +49 -0
- package/src/agent/compaction-agent.ts +227 -0
- package/src/agent/context-manager.ts +435 -0
- package/src/agent/context.ts +427 -0
- package/src/agent/deploy-preview.ts +426 -0
- package/src/agent/index.ts +68 -0
- package/src/agent/loop.ts +717 -0
- package/src/agent/modes.ts +429 -0
- package/src/agent/permissions.ts +466 -0
- package/src/agent/subagents/base.ts +116 -0
- package/src/agent/subagents/cost.ts +51 -0
- package/src/agent/subagents/explore.ts +42 -0
- package/src/agent/subagents/general.ts +54 -0
- package/src/agent/subagents/index.ts +102 -0
- package/src/agent/subagents/infra.ts +59 -0
- package/src/agent/subagents/security.ts +69 -0
- package/src/agent/system-prompt.ts +436 -0
- package/src/app.ts +122 -0
- package/src/audit/activity-log.ts +290 -0
- package/src/audit/compliance-checker.ts +540 -0
- package/src/audit/cost-tracker.ts +318 -0
- package/src/audit/index.ts +23 -0
- package/src/audit/security-scanner.ts +596 -0
- package/src/auth/guard.ts +75 -0
- package/src/auth/index.ts +56 -0
- package/src/auth/oauth.ts +455 -0
- package/src/auth/providers.ts +470 -0
- package/src/auth/sso.ts +113 -0
- package/src/auth/store.ts +505 -0
- package/src/auth/types.ts +187 -0
- package/src/build.ts +141 -0
- package/src/cli/index.ts +16 -0
- package/src/cli/init.ts +854 -0
- package/src/cli/openapi-spec.ts +356 -0
- package/src/cli/run.ts +237 -0
- package/src/cli/serve-auth.ts +80 -0
- package/src/cli/serve.ts +462 -0
- package/src/cli/web.ts +67 -0
- package/src/cli.ts +1417 -0
- package/src/clients/core-engine-client.ts +227 -0
- package/src/clients/enterprise-client.ts +334 -0
- package/src/clients/generator-client.ts +351 -0
- package/src/clients/git-client.ts +627 -0
- package/src/clients/github-client.ts +410 -0
- package/src/clients/helm-client.ts +504 -0
- package/src/clients/index.ts +80 -0
- package/src/clients/k8s-client.ts +497 -0
- package/src/clients/llm-client.ts +161 -0
- package/src/clients/rest-client.ts +130 -0
- package/src/clients/service-discovery.ts +33 -0
- package/src/clients/terraform-client.ts +482 -0
- package/src/clients/tools-client.ts +1843 -0
- package/src/clients/ws-client.ts +115 -0
- package/src/commands/analyze/index.ts +352 -0
- package/src/commands/apply/helm.ts +473 -0
- package/src/commands/apply/index.ts +213 -0
- package/src/commands/apply/k8s.ts +454 -0
- package/src/commands/apply/terraform.ts +582 -0
- package/src/commands/ask.ts +167 -0
- package/src/commands/audit/index.ts +238 -0
- package/src/commands/auth-cloud.ts +294 -0
- package/src/commands/auth-list.ts +134 -0
- package/src/commands/auth-profile.ts +121 -0
- package/src/commands/auth-status.ts +141 -0
- package/src/commands/aws/ec2.ts +501 -0
- package/src/commands/aws/iam.ts +397 -0
- package/src/commands/aws/index.ts +133 -0
- package/src/commands/aws/lambda.ts +396 -0
- package/src/commands/aws/rds.ts +439 -0
- package/src/commands/aws/s3.ts +439 -0
- package/src/commands/aws/vpc.ts +393 -0
- package/src/commands/aws-discover.ts +649 -0
- package/src/commands/aws-terraform.ts +805 -0
- package/src/commands/azure/aks.ts +376 -0
- package/src/commands/azure/functions.ts +253 -0
- package/src/commands/azure/index.ts +116 -0
- package/src/commands/azure/storage.ts +478 -0
- package/src/commands/azure/vm.ts +355 -0
- package/src/commands/billing/index.ts +256 -0
- package/src/commands/chat.ts +314 -0
- package/src/commands/config.ts +346 -0
- package/src/commands/cost/cloud-cost-estimator.ts +266 -0
- package/src/commands/cost/estimator.ts +79 -0
- package/src/commands/cost/index.ts +594 -0
- package/src/commands/cost/parsers/terraform.ts +273 -0
- package/src/commands/cost/parsers/types.ts +25 -0
- package/src/commands/cost/pricing/aws.ts +544 -0
- package/src/commands/cost/pricing/azure.ts +499 -0
- package/src/commands/cost/pricing/gcp.ts +396 -0
- package/src/commands/cost/pricing/index.ts +40 -0
- package/src/commands/demo.ts +250 -0
- package/src/commands/doctor.ts +794 -0
- package/src/commands/drift/index.ts +439 -0
- package/src/commands/explain.ts +277 -0
- package/src/commands/feedback.ts +389 -0
- package/src/commands/fix.ts +324 -0
- package/src/commands/fs/index.ts +402 -0
- package/src/commands/gcp/compute.ts +325 -0
- package/src/commands/gcp/functions.ts +271 -0
- package/src/commands/gcp/gke.ts +438 -0
- package/src/commands/gcp/iam.ts +344 -0
- package/src/commands/gcp/index.ts +129 -0
- package/src/commands/gcp/storage.ts +284 -0
- package/src/commands/generate-helm.ts +1249 -0
- package/src/commands/generate-k8s.ts +1560 -0
- package/src/commands/generate-terraform.ts +1460 -0
- package/src/commands/gh/index.ts +863 -0
- package/src/commands/git/index.ts +1343 -0
- package/src/commands/helm/index.ts +1126 -0
- package/src/commands/help.ts +539 -0
- package/src/commands/history.ts +142 -0
- package/src/commands/import.ts +868 -0
- package/src/commands/index.ts +367 -0
- package/src/commands/init.ts +1046 -0
- package/src/commands/k8s/index.ts +1137 -0
- package/src/commands/login.ts +631 -0
- package/src/commands/logout.ts +83 -0
- package/src/commands/onboarding.ts +228 -0
- package/src/commands/plan/display.ts +279 -0
- package/src/commands/plan/index.ts +599 -0
- package/src/commands/preview.ts +452 -0
- package/src/commands/questionnaire.ts +1270 -0
- package/src/commands/resume.ts +55 -0
- package/src/commands/team/index.ts +346 -0
- package/src/commands/template.ts +232 -0
- package/src/commands/tf/index.ts +1034 -0
- package/src/commands/upgrade.ts +550 -0
- package/src/commands/usage/index.ts +134 -0
- package/src/commands/version.ts +170 -0
- package/src/compat/index.ts +2 -0
- package/src/compat/runtime.ts +12 -0
- package/src/compat/sqlite.ts +107 -0
- package/src/config/index.ts +17 -0
- package/src/config/manager.ts +530 -0
- package/src/config/safety-policy.ts +358 -0
- package/src/config/schema.ts +125 -0
- package/src/config/types.ts +527 -0
- package/src/context/context-db.ts +199 -0
- package/src/demo/index.ts +349 -0
- package/src/demo/scenarios/full-journey.ts +229 -0
- package/src/demo/scenarios/getting-started.ts +127 -0
- package/src/demo/scenarios/helm-release.ts +341 -0
- package/src/demo/scenarios/k8s-deployment.ts +194 -0
- package/src/demo/scenarios/terraform-vpc.ts +170 -0
- package/src/demo/types.ts +92 -0
- package/src/engine/cost-estimator.ts +438 -0
- package/src/engine/diagram-generator.ts +256 -0
- package/src/engine/drift-detector.ts +902 -0
- package/src/engine/executor.ts +1035 -0
- package/src/engine/index.ts +76 -0
- package/src/engine/orchestrator.ts +636 -0
- package/src/engine/planner.ts +720 -0
- package/src/engine/safety.ts +743 -0
- package/src/engine/verifier.ts +770 -0
- package/src/enterprise/audit.ts +348 -0
- package/src/enterprise/auth.ts +270 -0
- package/src/enterprise/billing.ts +822 -0
- package/src/enterprise/index.ts +17 -0
- package/src/enterprise/teams.ts +443 -0
- package/src/generator/best-practices.ts +1608 -0
- package/src/generator/helm.ts +630 -0
- package/src/generator/index.ts +37 -0
- package/src/generator/intent-parser.ts +514 -0
- package/src/generator/kubernetes.ts +976 -0
- package/src/generator/terraform.ts +1867 -0
- package/src/history/index.ts +8 -0
- package/src/history/manager.ts +322 -0
- package/src/history/types.ts +34 -0
- package/src/hooks/config.ts +432 -0
- package/src/hooks/engine.ts +391 -0
- package/src/hooks/index.ts +4 -0
- package/src/llm/auth-bridge.ts +198 -0
- package/src/llm/circuit-breaker.ts +140 -0
- package/src/llm/config-loader.ts +201 -0
- package/src/llm/cost-calculator.ts +171 -0
- package/src/llm/index.ts +8 -0
- package/src/llm/model-aliases.ts +115 -0
- package/src/llm/provider-registry.ts +63 -0
- package/src/llm/providers/anthropic.ts +433 -0
- package/src/llm/providers/bedrock.ts +477 -0
- package/src/llm/providers/google.ts +405 -0
- package/src/llm/providers/ollama.ts +767 -0
- package/src/llm/providers/openai-compatible.ts +340 -0
- package/src/llm/providers/openai.ts +328 -0
- package/src/llm/providers/openrouter.ts +338 -0
- package/src/llm/router.ts +1035 -0
- package/src/llm/types.ts +232 -0
- package/src/lsp/client.ts +298 -0
- package/src/lsp/languages.ts +116 -0
- package/src/lsp/manager.ts +278 -0
- package/src/mcp/client.ts +402 -0
- package/src/mcp/index.ts +5 -0
- package/src/mcp/manager.ts +133 -0
- package/src/nimbus.ts +214 -0
- package/src/plugins/index.ts +27 -0
- package/src/plugins/loader.ts +334 -0
- package/src/plugins/manager.ts +376 -0
- package/src/plugins/types.ts +284 -0
- package/src/scanners/cicd-scanner.ts +258 -0
- package/src/scanners/cloud-scanner.ts +466 -0
- package/src/scanners/framework-scanner.ts +469 -0
- package/src/scanners/iac-scanner.ts +388 -0
- package/src/scanners/index.ts +539 -0
- package/src/scanners/language-scanner.ts +276 -0
- package/src/scanners/package-manager-scanner.ts +277 -0
- package/src/scanners/types.ts +172 -0
- package/src/sessions/manager.ts +365 -0
- package/src/sessions/types.ts +44 -0
- package/src/sharing/sync.ts +296 -0
- package/src/sharing/viewer.ts +97 -0
- package/src/snapshots/index.ts +2 -0
- package/src/snapshots/manager.ts +530 -0
- package/src/state/artifacts.ts +147 -0
- package/src/state/audit.ts +137 -0
- package/src/state/billing.ts +240 -0
- package/src/state/checkpoints.ts +117 -0
- package/src/state/config.ts +67 -0
- package/src/state/conversations.ts +14 -0
- package/src/state/credentials.ts +154 -0
- package/src/state/db.ts +58 -0
- package/src/state/index.ts +26 -0
- package/src/state/messages.ts +115 -0
- package/src/state/projects.ts +123 -0
- package/src/state/schema.ts +236 -0
- package/src/state/sessions.ts +147 -0
- package/src/state/teams.ts +200 -0
- package/src/telemetry.ts +108 -0
- package/src/tools/aws-ops.ts +952 -0
- package/src/tools/azure-ops.ts +579 -0
- package/src/tools/file-ops.ts +593 -0
- package/src/tools/gcp-ops.ts +625 -0
- package/src/tools/git-ops.ts +773 -0
- package/src/tools/github-ops.ts +799 -0
- package/src/tools/helm-ops.ts +943 -0
- package/src/tools/index.ts +17 -0
- package/src/tools/k8s-ops.ts +819 -0
- package/src/tools/schemas/converter.ts +184 -0
- package/src/tools/schemas/devops.ts +612 -0
- package/src/tools/schemas/index.ts +73 -0
- package/src/tools/schemas/standard.ts +1144 -0
- package/src/tools/schemas/types.ts +705 -0
- package/src/tools/terraform-ops.ts +862 -0
- package/src/types/ambient.d.ts +193 -0
- package/src/types/config.ts +83 -0
- package/src/types/drift.ts +116 -0
- package/src/types/enterprise.ts +335 -0
- package/src/types/index.ts +20 -0
- package/src/types/plan.ts +44 -0
- package/src/types/request.ts +65 -0
- package/src/types/response.ts +54 -0
- package/src/types/service.ts +51 -0
- package/src/ui/App.tsx +997 -0
- package/src/ui/DeployPreview.tsx +169 -0
- package/src/ui/Header.tsx +68 -0
- package/src/ui/InputBox.tsx +350 -0
- package/src/ui/MessageList.tsx +585 -0
- package/src/ui/PermissionPrompt.tsx +151 -0
- package/src/ui/StatusBar.tsx +158 -0
- package/src/ui/ToolCallDisplay.tsx +409 -0
- package/src/ui/chat-ui.ts +853 -0
- package/src/ui/index.ts +33 -0
- package/src/ui/ink/index.ts +711 -0
- package/src/ui/streaming.ts +176 -0
- package/src/ui/types.ts +57 -0
- package/src/utils/analytics.ts +72 -0
- package/src/utils/cost-warning.ts +27 -0
- package/src/utils/env.ts +46 -0
- package/src/utils/errors.ts +69 -0
- package/src/utils/event-bus.ts +38 -0
- package/src/utils/index.ts +24 -0
- package/src/utils/logger.ts +171 -0
- package/src/utils/rate-limiter.ts +121 -0
- package/src/utils/service-auth.ts +49 -0
- package/src/utils/validation.ts +53 -0
- package/src/version.ts +4 -0
- package/src/watcher/index.ts +163 -0
- package/src/wizard/approval.ts +383 -0
- package/src/wizard/index.ts +25 -0
- package/src/wizard/prompts.ts +338 -0
- package/src/wizard/types.ts +171 -0
- package/src/wizard/ui.ts +556 -0
- package/src/wizard/wizard.ts +304 -0
- package/tsconfig.json +24 -0
|
@@ -0,0 +1,868 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Import Command
|
|
3
|
+
*
|
|
4
|
+
* Import existing cloud resources into Terraform state
|
|
5
|
+
*/
|
|
6
|
+
|
|
7
|
+
import { ui } from '../wizard/ui';
|
|
8
|
+
import { select, input, multiSelect } from '../wizard/prompts';
|
|
9
|
+
import * as fs from 'node:fs';
|
|
10
|
+
import * as path from 'node:path';
|
|
11
|
+
import { execSync } from 'node:child_process';
|
|
12
|
+
|
|
13
|
+
// ==========================================
|
|
14
|
+
// Types
|
|
15
|
+
// ==========================================
|
|
16
|
+
|
|
17
|
+
export interface ImportOptions {
|
|
18
|
+
/** Cloud provider: aws, gcp, azure */
|
|
19
|
+
provider?: 'aws' | 'gcp' | 'azure';
|
|
20
|
+
/** Resource type to import */
|
|
21
|
+
resourceType?: string;
|
|
22
|
+
/** Resource ID to import */
|
|
23
|
+
resourceId?: string;
|
|
24
|
+
/** Output directory for generated Terraform */
|
|
25
|
+
output?: string;
|
|
26
|
+
/** Non-interactive mode */
|
|
27
|
+
nonInteractive?: boolean;
|
|
28
|
+
/** Region */
|
|
29
|
+
region?: string;
|
|
30
|
+
}
|
|
31
|
+
|
|
32
|
+
interface DiscoveredResource {
|
|
33
|
+
id: string;
|
|
34
|
+
name: string;
|
|
35
|
+
type: string;
|
|
36
|
+
region: string;
|
|
37
|
+
tags?: Record<string, string>;
|
|
38
|
+
arn?: string;
|
|
39
|
+
}
|
|
40
|
+
|
|
41
|
+
interface ImportableResource {
|
|
42
|
+
terraformType: string;
|
|
43
|
+
cloudType: string;
|
|
44
|
+
description: string;
|
|
45
|
+
provider: 'aws' | 'gcp' | 'azure';
|
|
46
|
+
}
|
|
47
|
+
|
|
48
|
+
// ==========================================
|
|
49
|
+
// Constants
|
|
50
|
+
// ==========================================
|
|
51
|
+
|
|
52
|
+
const IMPORTABLE_RESOURCES: ImportableResource[] = [
|
|
53
|
+
// AWS
|
|
54
|
+
{
|
|
55
|
+
terraformType: 'aws_vpc',
|
|
56
|
+
cloudType: 'vpc',
|
|
57
|
+
description: 'Virtual Private Cloud',
|
|
58
|
+
provider: 'aws',
|
|
59
|
+
},
|
|
60
|
+
{ terraformType: 'aws_subnet', cloudType: 'subnet', description: 'VPC Subnet', provider: 'aws' },
|
|
61
|
+
{
|
|
62
|
+
terraformType: 'aws_security_group',
|
|
63
|
+
cloudType: 'security-group',
|
|
64
|
+
description: 'Security Group',
|
|
65
|
+
provider: 'aws',
|
|
66
|
+
},
|
|
67
|
+
{ terraformType: 'aws_instance', cloudType: 'ec2', description: 'EC2 Instance', provider: 'aws' },
|
|
68
|
+
{
|
|
69
|
+
terraformType: 'aws_db_instance',
|
|
70
|
+
cloudType: 'rds',
|
|
71
|
+
description: 'RDS Database',
|
|
72
|
+
provider: 'aws',
|
|
73
|
+
},
|
|
74
|
+
{ terraformType: 'aws_s3_bucket', cloudType: 's3', description: 'S3 Bucket', provider: 'aws' },
|
|
75
|
+
{
|
|
76
|
+
terraformType: 'aws_lambda_function',
|
|
77
|
+
cloudType: 'lambda',
|
|
78
|
+
description: 'Lambda Function',
|
|
79
|
+
provider: 'aws',
|
|
80
|
+
},
|
|
81
|
+
{
|
|
82
|
+
terraformType: 'aws_iam_role',
|
|
83
|
+
cloudType: 'iam-role',
|
|
84
|
+
description: 'IAM Role',
|
|
85
|
+
provider: 'aws',
|
|
86
|
+
},
|
|
87
|
+
{
|
|
88
|
+
terraformType: 'aws_eks_cluster',
|
|
89
|
+
cloudType: 'eks',
|
|
90
|
+
description: 'EKS Cluster',
|
|
91
|
+
provider: 'aws',
|
|
92
|
+
},
|
|
93
|
+
{
|
|
94
|
+
terraformType: 'aws_elasticache_cluster',
|
|
95
|
+
cloudType: 'elasticache',
|
|
96
|
+
description: 'ElastiCache Cluster',
|
|
97
|
+
provider: 'aws',
|
|
98
|
+
},
|
|
99
|
+
|
|
100
|
+
// GCP
|
|
101
|
+
{
|
|
102
|
+
terraformType: 'google_compute_network',
|
|
103
|
+
cloudType: 'vpc',
|
|
104
|
+
description: 'VPC Network',
|
|
105
|
+
provider: 'gcp',
|
|
106
|
+
},
|
|
107
|
+
{
|
|
108
|
+
terraformType: 'google_compute_subnetwork',
|
|
109
|
+
cloudType: 'subnet',
|
|
110
|
+
description: 'VPC Subnet',
|
|
111
|
+
provider: 'gcp',
|
|
112
|
+
},
|
|
113
|
+
{
|
|
114
|
+
terraformType: 'google_compute_instance',
|
|
115
|
+
cloudType: 'gce',
|
|
116
|
+
description: 'Compute Instance',
|
|
117
|
+
provider: 'gcp',
|
|
118
|
+
},
|
|
119
|
+
{
|
|
120
|
+
terraformType: 'google_sql_database_instance',
|
|
121
|
+
cloudType: 'cloudsql',
|
|
122
|
+
description: 'Cloud SQL Instance',
|
|
123
|
+
provider: 'gcp',
|
|
124
|
+
},
|
|
125
|
+
{
|
|
126
|
+
terraformType: 'google_storage_bucket',
|
|
127
|
+
cloudType: 'gcs',
|
|
128
|
+
description: 'Cloud Storage Bucket',
|
|
129
|
+
provider: 'gcp',
|
|
130
|
+
},
|
|
131
|
+
{
|
|
132
|
+
terraformType: 'google_cloudfunctions_function',
|
|
133
|
+
cloudType: 'functions',
|
|
134
|
+
description: 'Cloud Function',
|
|
135
|
+
provider: 'gcp',
|
|
136
|
+
},
|
|
137
|
+
{
|
|
138
|
+
terraformType: 'google_container_cluster',
|
|
139
|
+
cloudType: 'gke',
|
|
140
|
+
description: 'GKE Cluster',
|
|
141
|
+
provider: 'gcp',
|
|
142
|
+
},
|
|
143
|
+
|
|
144
|
+
// Azure
|
|
145
|
+
{
|
|
146
|
+
terraformType: 'azurerm_virtual_network',
|
|
147
|
+
cloudType: 'vnet',
|
|
148
|
+
description: 'Virtual Network',
|
|
149
|
+
provider: 'azure',
|
|
150
|
+
},
|
|
151
|
+
{
|
|
152
|
+
terraformType: 'azurerm_subnet',
|
|
153
|
+
cloudType: 'subnet',
|
|
154
|
+
description: 'Subnet',
|
|
155
|
+
provider: 'azure',
|
|
156
|
+
},
|
|
157
|
+
{
|
|
158
|
+
terraformType: 'azurerm_virtual_machine',
|
|
159
|
+
cloudType: 'vm',
|
|
160
|
+
description: 'Virtual Machine',
|
|
161
|
+
provider: 'azure',
|
|
162
|
+
},
|
|
163
|
+
{
|
|
164
|
+
terraformType: 'azurerm_sql_database',
|
|
165
|
+
cloudType: 'sql',
|
|
166
|
+
description: 'SQL Database',
|
|
167
|
+
provider: 'azure',
|
|
168
|
+
},
|
|
169
|
+
{
|
|
170
|
+
terraformType: 'azurerm_storage_account',
|
|
171
|
+
cloudType: 'storage',
|
|
172
|
+
description: 'Storage Account',
|
|
173
|
+
provider: 'azure',
|
|
174
|
+
},
|
|
175
|
+
{
|
|
176
|
+
terraformType: 'azurerm_function_app',
|
|
177
|
+
cloudType: 'functions',
|
|
178
|
+
description: 'Function App',
|
|
179
|
+
provider: 'azure',
|
|
180
|
+
},
|
|
181
|
+
{
|
|
182
|
+
terraformType: 'azurerm_kubernetes_cluster',
|
|
183
|
+
cloudType: 'aks',
|
|
184
|
+
description: 'AKS Cluster',
|
|
185
|
+
provider: 'azure',
|
|
186
|
+
},
|
|
187
|
+
];
|
|
188
|
+
|
|
189
|
+
// ==========================================
|
|
190
|
+
// Parsers
|
|
191
|
+
// ==========================================
|
|
192
|
+
|
|
193
|
+
/**
|
|
194
|
+
* Parse import options
|
|
195
|
+
*/
|
|
196
|
+
export function parseImportOptions(args: string[]): ImportOptions {
|
|
197
|
+
const options: ImportOptions = {};
|
|
198
|
+
|
|
199
|
+
for (let i = 0; i < args.length; i++) {
|
|
200
|
+
const arg = args[i];
|
|
201
|
+
if (arg === '--provider' && args[i + 1]) {
|
|
202
|
+
options.provider = args[++i] as 'aws' | 'gcp' | 'azure';
|
|
203
|
+
} else if (arg === '--resource-type' && args[i + 1]) {
|
|
204
|
+
options.resourceType = args[++i];
|
|
205
|
+
} else if (arg === '--resource-id' && args[i + 1]) {
|
|
206
|
+
options.resourceId = args[++i];
|
|
207
|
+
} else if (arg === '--output' && args[i + 1]) {
|
|
208
|
+
options.output = args[++i];
|
|
209
|
+
} else if (arg === '-o' && args[i + 1]) {
|
|
210
|
+
options.output = args[++i];
|
|
211
|
+
} else if (arg === '--region' && args[i + 1]) {
|
|
212
|
+
options.region = args[++i];
|
|
213
|
+
} else if (arg === '--non-interactive' || arg === '-y') {
|
|
214
|
+
options.nonInteractive = true;
|
|
215
|
+
} else if (!arg.startsWith('-') && !options.provider) {
|
|
216
|
+
options.provider = arg as 'aws' | 'gcp' | 'azure';
|
|
217
|
+
}
|
|
218
|
+
}
|
|
219
|
+
|
|
220
|
+
return options;
|
|
221
|
+
}
|
|
222
|
+
|
|
223
|
+
// ==========================================
|
|
224
|
+
// Discovery Functions
|
|
225
|
+
// ==========================================
|
|
226
|
+
|
|
227
|
+
/**
|
|
228
|
+
* Discover AWS resources
|
|
229
|
+
*/
|
|
230
|
+
function discoverAwsResources(resourceType: string, region: string): DiscoveredResource[] {
|
|
231
|
+
const resources: DiscoveredResource[] = [];
|
|
232
|
+
|
|
233
|
+
try {
|
|
234
|
+
switch (resourceType) {
|
|
235
|
+
case 'vpc': {
|
|
236
|
+
const output = execSync(
|
|
237
|
+
`aws ec2 describe-vpcs --region ${region} --query 'Vpcs[*].{id:VpcId,name:Tags[?Key==\`Name\`].Value|[0]}' --output json`,
|
|
238
|
+
{ encoding: 'utf-8', stdio: ['pipe', 'pipe', 'pipe'] }
|
|
239
|
+
);
|
|
240
|
+
const vpcs = JSON.parse(output);
|
|
241
|
+
for (const vpc of vpcs) {
|
|
242
|
+
resources.push({
|
|
243
|
+
id: vpc.id,
|
|
244
|
+
name: vpc.name || vpc.id,
|
|
245
|
+
type: 'aws_vpc',
|
|
246
|
+
region,
|
|
247
|
+
});
|
|
248
|
+
}
|
|
249
|
+
break;
|
|
250
|
+
}
|
|
251
|
+
case 's3': {
|
|
252
|
+
const output = execSync(`aws s3api list-buckets --query 'Buckets[*].Name' --output json`, {
|
|
253
|
+
encoding: 'utf-8',
|
|
254
|
+
stdio: ['pipe', 'pipe', 'pipe'],
|
|
255
|
+
});
|
|
256
|
+
const buckets = JSON.parse(output);
|
|
257
|
+
for (const bucket of buckets) {
|
|
258
|
+
resources.push({
|
|
259
|
+
id: bucket,
|
|
260
|
+
name: bucket,
|
|
261
|
+
type: 'aws_s3_bucket',
|
|
262
|
+
region: 'global',
|
|
263
|
+
});
|
|
264
|
+
}
|
|
265
|
+
break;
|
|
266
|
+
}
|
|
267
|
+
case 'ec2': {
|
|
268
|
+
const output = execSync(
|
|
269
|
+
`aws ec2 describe-instances --region ${region} --query 'Reservations[*].Instances[*].{id:InstanceId,name:Tags[?Key==\`Name\`].Value|[0],state:State.Name}' --output json`,
|
|
270
|
+
{ encoding: 'utf-8', stdio: ['pipe', 'pipe', 'pipe'] }
|
|
271
|
+
);
|
|
272
|
+
const reservations = JSON.parse(output);
|
|
273
|
+
for (const instances of reservations) {
|
|
274
|
+
for (const instance of instances) {
|
|
275
|
+
if (instance.state !== 'terminated') {
|
|
276
|
+
resources.push({
|
|
277
|
+
id: instance.id,
|
|
278
|
+
name: instance.name || instance.id,
|
|
279
|
+
type: 'aws_instance',
|
|
280
|
+
region,
|
|
281
|
+
});
|
|
282
|
+
}
|
|
283
|
+
}
|
|
284
|
+
}
|
|
285
|
+
break;
|
|
286
|
+
}
|
|
287
|
+
case 'rds': {
|
|
288
|
+
const output = execSync(
|
|
289
|
+
`aws rds describe-db-instances --region ${region} --query 'DBInstances[*].{id:DBInstanceIdentifier,arn:DBInstanceArn}' --output json`,
|
|
290
|
+
{ encoding: 'utf-8', stdio: ['pipe', 'pipe', 'pipe'] }
|
|
291
|
+
);
|
|
292
|
+
const instances = JSON.parse(output);
|
|
293
|
+
for (const db of instances) {
|
|
294
|
+
resources.push({
|
|
295
|
+
id: db.id,
|
|
296
|
+
name: db.id,
|
|
297
|
+
type: 'aws_db_instance',
|
|
298
|
+
region,
|
|
299
|
+
arn: db.arn,
|
|
300
|
+
});
|
|
301
|
+
}
|
|
302
|
+
break;
|
|
303
|
+
}
|
|
304
|
+
case 'security-group': {
|
|
305
|
+
const output = execSync(
|
|
306
|
+
`aws ec2 describe-security-groups --region ${region} --query 'SecurityGroups[*].{id:GroupId,name:GroupName}' --output json`,
|
|
307
|
+
{ encoding: 'utf-8', stdio: ['pipe', 'pipe', 'pipe'] }
|
|
308
|
+
);
|
|
309
|
+
const groups = JSON.parse(output);
|
|
310
|
+
for (const sg of groups) {
|
|
311
|
+
resources.push({
|
|
312
|
+
id: sg.id,
|
|
313
|
+
name: sg.name,
|
|
314
|
+
type: 'aws_security_group',
|
|
315
|
+
region,
|
|
316
|
+
});
|
|
317
|
+
}
|
|
318
|
+
break;
|
|
319
|
+
}
|
|
320
|
+
}
|
|
321
|
+
} catch (error) {
|
|
322
|
+
// AWS CLI not available or not authenticated
|
|
323
|
+
}
|
|
324
|
+
|
|
325
|
+
return resources;
|
|
326
|
+
}
|
|
327
|
+
|
|
328
|
+
/**
|
|
329
|
+
* Discover GCP resources
|
|
330
|
+
*/
|
|
331
|
+
function discoverGcpResources(resourceType: string, project?: string): DiscoveredResource[] {
|
|
332
|
+
const resources: DiscoveredResource[] = [];
|
|
333
|
+
const projectFlag = project ? `--project=${project}` : '';
|
|
334
|
+
|
|
335
|
+
try {
|
|
336
|
+
switch (resourceType) {
|
|
337
|
+
case 'vpc': {
|
|
338
|
+
const output = execSync(`gcloud compute networks list ${projectFlag} --format=json`, {
|
|
339
|
+
encoding: 'utf-8',
|
|
340
|
+
stdio: ['pipe', 'pipe', 'pipe'],
|
|
341
|
+
});
|
|
342
|
+
const networks = JSON.parse(output);
|
|
343
|
+
for (const net of networks) {
|
|
344
|
+
resources.push({
|
|
345
|
+
id: net.name,
|
|
346
|
+
name: net.name,
|
|
347
|
+
type: 'google_compute_network',
|
|
348
|
+
region: 'global',
|
|
349
|
+
});
|
|
350
|
+
}
|
|
351
|
+
break;
|
|
352
|
+
}
|
|
353
|
+
case 'gce': {
|
|
354
|
+
const output = execSync(`gcloud compute instances list ${projectFlag} --format=json`, {
|
|
355
|
+
encoding: 'utf-8',
|
|
356
|
+
stdio: ['pipe', 'pipe', 'pipe'],
|
|
357
|
+
});
|
|
358
|
+
const instances = JSON.parse(output);
|
|
359
|
+
for (const inst of instances) {
|
|
360
|
+
const zone = inst.zone?.split('/').pop() || 'unknown';
|
|
361
|
+
resources.push({
|
|
362
|
+
id: inst.name,
|
|
363
|
+
name: inst.name,
|
|
364
|
+
type: 'google_compute_instance',
|
|
365
|
+
region: zone,
|
|
366
|
+
});
|
|
367
|
+
}
|
|
368
|
+
break;
|
|
369
|
+
}
|
|
370
|
+
case 'cloudsql': {
|
|
371
|
+
const output = execSync(`gcloud sql instances list ${projectFlag} --format=json`, {
|
|
372
|
+
encoding: 'utf-8',
|
|
373
|
+
stdio: ['pipe', 'pipe', 'pipe'],
|
|
374
|
+
});
|
|
375
|
+
const instances = JSON.parse(output);
|
|
376
|
+
for (const db of instances) {
|
|
377
|
+
resources.push({
|
|
378
|
+
id: db.name,
|
|
379
|
+
name: db.name,
|
|
380
|
+
type: 'google_sql_database_instance',
|
|
381
|
+
region: db.region || 'unknown',
|
|
382
|
+
});
|
|
383
|
+
}
|
|
384
|
+
break;
|
|
385
|
+
}
|
|
386
|
+
case 'gcs': {
|
|
387
|
+
const output = execSync(`gcloud storage buckets list ${projectFlag} --format=json`, {
|
|
388
|
+
encoding: 'utf-8',
|
|
389
|
+
stdio: ['pipe', 'pipe', 'pipe'],
|
|
390
|
+
});
|
|
391
|
+
const buckets = JSON.parse(output);
|
|
392
|
+
for (const bucket of buckets) {
|
|
393
|
+
const name = bucket.name || bucket.id?.replace('projects/_/buckets/', '') || 'unknown';
|
|
394
|
+
resources.push({
|
|
395
|
+
id: name,
|
|
396
|
+
name,
|
|
397
|
+
type: 'google_storage_bucket',
|
|
398
|
+
region: bucket.location || 'global',
|
|
399
|
+
});
|
|
400
|
+
}
|
|
401
|
+
break;
|
|
402
|
+
}
|
|
403
|
+
}
|
|
404
|
+
} catch (error) {
|
|
405
|
+
// gcloud CLI not available or not authenticated
|
|
406
|
+
}
|
|
407
|
+
|
|
408
|
+
return resources;
|
|
409
|
+
}
|
|
410
|
+
|
|
411
|
+
/**
|
|
412
|
+
* Discover Azure resources
|
|
413
|
+
*/
|
|
414
|
+
function discoverAzureResources(resourceType: string, subscription?: string): DiscoveredResource[] {
|
|
415
|
+
const resources: DiscoveredResource[] = [];
|
|
416
|
+
const subFlag = subscription ? `--subscription "${subscription}"` : '';
|
|
417
|
+
|
|
418
|
+
try {
|
|
419
|
+
switch (resourceType) {
|
|
420
|
+
case 'vm': {
|
|
421
|
+
const output = execSync(`az vm list ${subFlag} -o json`, {
|
|
422
|
+
encoding: 'utf-8',
|
|
423
|
+
stdio: ['pipe', 'pipe', 'pipe'],
|
|
424
|
+
});
|
|
425
|
+
const vms = JSON.parse(output);
|
|
426
|
+
for (const vm of vms) {
|
|
427
|
+
resources.push({
|
|
428
|
+
id: vm.id,
|
|
429
|
+
name: vm.name,
|
|
430
|
+
type: 'azurerm_virtual_machine',
|
|
431
|
+
region: vm.location || 'unknown',
|
|
432
|
+
});
|
|
433
|
+
}
|
|
434
|
+
break;
|
|
435
|
+
}
|
|
436
|
+
case 'vnet': {
|
|
437
|
+
const output = execSync(`az network vnet list ${subFlag} -o json`, {
|
|
438
|
+
encoding: 'utf-8',
|
|
439
|
+
stdio: ['pipe', 'pipe', 'pipe'],
|
|
440
|
+
});
|
|
441
|
+
const vnets = JSON.parse(output);
|
|
442
|
+
for (const vnet of vnets) {
|
|
443
|
+
resources.push({
|
|
444
|
+
id: vnet.id,
|
|
445
|
+
name: vnet.name,
|
|
446
|
+
type: 'azurerm_virtual_network',
|
|
447
|
+
region: vnet.location || 'unknown',
|
|
448
|
+
});
|
|
449
|
+
}
|
|
450
|
+
break;
|
|
451
|
+
}
|
|
452
|
+
case 'sql': {
|
|
453
|
+
const output = execSync(`az sql server list ${subFlag} -o json`, {
|
|
454
|
+
encoding: 'utf-8',
|
|
455
|
+
stdio: ['pipe', 'pipe', 'pipe'],
|
|
456
|
+
});
|
|
457
|
+
const servers = JSON.parse(output);
|
|
458
|
+
for (const server of servers) {
|
|
459
|
+
resources.push({
|
|
460
|
+
id: server.id,
|
|
461
|
+
name: server.name,
|
|
462
|
+
type: 'azurerm_sql_database',
|
|
463
|
+
region: server.location || 'unknown',
|
|
464
|
+
});
|
|
465
|
+
}
|
|
466
|
+
break;
|
|
467
|
+
}
|
|
468
|
+
case 'storage': {
|
|
469
|
+
const output = execSync(`az storage account list ${subFlag} -o json`, {
|
|
470
|
+
encoding: 'utf-8',
|
|
471
|
+
stdio: ['pipe', 'pipe', 'pipe'],
|
|
472
|
+
});
|
|
473
|
+
const accounts = JSON.parse(output);
|
|
474
|
+
for (const acct of accounts) {
|
|
475
|
+
resources.push({
|
|
476
|
+
id: acct.id,
|
|
477
|
+
name: acct.name,
|
|
478
|
+
type: 'azurerm_storage_account',
|
|
479
|
+
region: acct.location || 'unknown',
|
|
480
|
+
});
|
|
481
|
+
}
|
|
482
|
+
break;
|
|
483
|
+
}
|
|
484
|
+
}
|
|
485
|
+
} catch (error) {
|
|
486
|
+
// az CLI not available or not authenticated
|
|
487
|
+
}
|
|
488
|
+
|
|
489
|
+
return resources;
|
|
490
|
+
}
|
|
491
|
+
|
|
492
|
+
/**
|
|
493
|
+
* Generate Terraform import block
|
|
494
|
+
*/
|
|
495
|
+
function generateImportBlock(resource: DiscoveredResource, terraformName: string): string {
|
|
496
|
+
return `import {
|
|
497
|
+
to = ${resource.type}.${terraformName}
|
|
498
|
+
id = "${resource.id}"
|
|
499
|
+
}
|
|
500
|
+
`;
|
|
501
|
+
}
|
|
502
|
+
|
|
503
|
+
/**
|
|
504
|
+
* Generate Terraform resource skeleton
|
|
505
|
+
*/
|
|
506
|
+
function generateResourceSkeleton(resource: DiscoveredResource, terraformName: string): string {
|
|
507
|
+
const lines = [`resource "${resource.type}" "${terraformName}" {`];
|
|
508
|
+
|
|
509
|
+
switch (resource.type) {
|
|
510
|
+
case 'aws_vpc':
|
|
511
|
+
lines.push(' # cidr_block = "10.0.0.0/16"');
|
|
512
|
+
lines.push(' # enable_dns_hostnames = true');
|
|
513
|
+
lines.push(' # enable_dns_support = true');
|
|
514
|
+
break;
|
|
515
|
+
case 'aws_s3_bucket':
|
|
516
|
+
lines.push(` bucket = "${resource.id}"`);
|
|
517
|
+
break;
|
|
518
|
+
case 'aws_instance':
|
|
519
|
+
lines.push(' # ami = "ami-..."');
|
|
520
|
+
lines.push(' # instance_type = "t3.micro"');
|
|
521
|
+
break;
|
|
522
|
+
case 'aws_db_instance':
|
|
523
|
+
lines.push(` identifier = "${resource.id}"`);
|
|
524
|
+
lines.push(' # instance_class = "db.t3.micro"');
|
|
525
|
+
lines.push(' # engine = "mysql"');
|
|
526
|
+
break;
|
|
527
|
+
case 'aws_security_group':
|
|
528
|
+
lines.push(` name = "${resource.name}"`);
|
|
529
|
+
lines.push(' # vpc_id = aws_vpc.main.id');
|
|
530
|
+
break;
|
|
531
|
+
// GCP resources
|
|
532
|
+
case 'google_compute_network':
|
|
533
|
+
lines.push(` name = "${resource.id}"`);
|
|
534
|
+
lines.push(' auto_create_subnetworks = false');
|
|
535
|
+
break;
|
|
536
|
+
case 'google_compute_instance':
|
|
537
|
+
lines.push(` name = "${resource.id}"`);
|
|
538
|
+
lines.push(' # machine_type = "e2-medium"');
|
|
539
|
+
lines.push(` # zone = "${resource.region}"`);
|
|
540
|
+
break;
|
|
541
|
+
case 'google_sql_database_instance':
|
|
542
|
+
lines.push(` name = "${resource.id}"`);
|
|
543
|
+
lines.push(' # database_version = "MYSQL_8_0"');
|
|
544
|
+
lines.push(` # region = "${resource.region}"`);
|
|
545
|
+
break;
|
|
546
|
+
case 'google_storage_bucket':
|
|
547
|
+
lines.push(` name = "${resource.id}"`);
|
|
548
|
+
lines.push(` location = "${resource.region}"`);
|
|
549
|
+
break;
|
|
550
|
+
// Azure resources
|
|
551
|
+
case 'azurerm_virtual_network':
|
|
552
|
+
lines.push(` name = "${resource.name}"`);
|
|
553
|
+
lines.push(` location = "${resource.region}"`);
|
|
554
|
+
lines.push(' # resource_group_name = "my-rg"');
|
|
555
|
+
lines.push(' # address_space = ["10.0.0.0/16"]');
|
|
556
|
+
break;
|
|
557
|
+
case 'azurerm_virtual_machine':
|
|
558
|
+
lines.push(` name = "${resource.name}"`);
|
|
559
|
+
lines.push(` location = "${resource.region}"`);
|
|
560
|
+
lines.push(' # resource_group_name = "my-rg"');
|
|
561
|
+
lines.push(' # vm_size = "Standard_DS1_v2"');
|
|
562
|
+
break;
|
|
563
|
+
case 'azurerm_sql_database':
|
|
564
|
+
lines.push(` name = "${resource.name}"`);
|
|
565
|
+
lines.push(' # server_name = "my-sql-server"');
|
|
566
|
+
lines.push(' # resource_group_name = "my-rg"');
|
|
567
|
+
break;
|
|
568
|
+
case 'azurerm_storage_account':
|
|
569
|
+
lines.push(` name = "${resource.name}"`);
|
|
570
|
+
lines.push(` location = "${resource.region}"`);
|
|
571
|
+
lines.push(' # resource_group_name = "my-rg"');
|
|
572
|
+
lines.push(' # account_tier = "Standard"');
|
|
573
|
+
lines.push(' # account_replication_type = "LRS"');
|
|
574
|
+
break;
|
|
575
|
+
default:
|
|
576
|
+
// Generate sensible stubs for unknown resource types using available metadata
|
|
577
|
+
if (resource.name) {
|
|
578
|
+
lines.push(` name = "${resource.name}"`);
|
|
579
|
+
}
|
|
580
|
+
if (resource.region) {
|
|
581
|
+
lines.push(` location = "${resource.region}"`);
|
|
582
|
+
}
|
|
583
|
+
lines.push('');
|
|
584
|
+
lines.push(' # Nimbus could not determine the exact attributes for this resource type.');
|
|
585
|
+
lines.push(` # Resource type: ${resource.type}`);
|
|
586
|
+
lines.push(` # Resource ID: ${resource.id}`);
|
|
587
|
+
lines.push(' #');
|
|
588
|
+
lines.push(' # Next steps:');
|
|
589
|
+
lines.push(' # 1. Run: terraform plan');
|
|
590
|
+
lines.push(' # 2. Review the plan output for required attributes.');
|
|
591
|
+
lines.push(' # 3. Add any missing attributes below with placeholder values.');
|
|
592
|
+
lines.push(' #');
|
|
593
|
+
lines.push(' # Common attributes for most resources:');
|
|
594
|
+
lines.push(' # description = "REPLACE_ME"');
|
|
595
|
+
lines.push(' # tags = {');
|
|
596
|
+
lines.push(' # Environment = "production"');
|
|
597
|
+
lines.push(' # ManagedBy = "terraform"');
|
|
598
|
+
lines.push(' # }');
|
|
599
|
+
}
|
|
600
|
+
|
|
601
|
+
if (resource.name && resource.name !== resource.id) {
|
|
602
|
+
lines.push('');
|
|
603
|
+
lines.push(' tags = {');
|
|
604
|
+
lines.push(` Name = "${resource.name}"`);
|
|
605
|
+
lines.push(' }');
|
|
606
|
+
}
|
|
607
|
+
|
|
608
|
+
lines.push('}');
|
|
609
|
+
return lines.join('\n');
|
|
610
|
+
}
|
|
611
|
+
|
|
612
|
+
// ==========================================
|
|
613
|
+
// Command
|
|
614
|
+
// ==========================================
|
|
615
|
+
|
|
616
|
+
/**
|
|
617
|
+
* Import command
|
|
618
|
+
*/
|
|
619
|
+
export async function importCommand(options: ImportOptions): Promise<void> {
|
|
620
|
+
ui.header('Nimbus Import', 'Import existing cloud resources into Terraform');
|
|
621
|
+
|
|
622
|
+
// Select provider
|
|
623
|
+
let provider = options.provider;
|
|
624
|
+
if (!provider) {
|
|
625
|
+
provider = (await select({
|
|
626
|
+
message: 'Select cloud provider:',
|
|
627
|
+
options: [
|
|
628
|
+
{ label: 'AWS', value: 'aws', description: 'Amazon Web Services' },
|
|
629
|
+
{ label: 'GCP', value: 'gcp', description: 'Google Cloud Platform' },
|
|
630
|
+
{ label: 'Azure', value: 'azure', description: 'Microsoft Azure' },
|
|
631
|
+
],
|
|
632
|
+
})) as 'aws' | 'gcp' | 'azure';
|
|
633
|
+
}
|
|
634
|
+
|
|
635
|
+
// Get region/project/subscription
|
|
636
|
+
let region = options.region;
|
|
637
|
+
if (!region) {
|
|
638
|
+
if (provider === 'aws') {
|
|
639
|
+
region = await input({
|
|
640
|
+
message: 'AWS Region:',
|
|
641
|
+
defaultValue: process.env.AWS_DEFAULT_REGION || 'us-east-1',
|
|
642
|
+
});
|
|
643
|
+
} else if (provider === 'gcp') {
|
|
644
|
+
region = await input({
|
|
645
|
+
message: 'GCP Project ID:',
|
|
646
|
+
defaultValue: process.env.GCLOUD_PROJECT || process.env.GOOGLE_CLOUD_PROJECT || '',
|
|
647
|
+
});
|
|
648
|
+
} else if (provider === 'azure') {
|
|
649
|
+
region = await input({
|
|
650
|
+
message: 'Azure Subscription ID (optional):',
|
|
651
|
+
defaultValue: process.env.AZURE_SUBSCRIPTION_ID || '',
|
|
652
|
+
});
|
|
653
|
+
}
|
|
654
|
+
}
|
|
655
|
+
|
|
656
|
+
// Get available resource types for this provider
|
|
657
|
+
const providerResources = IMPORTABLE_RESOURCES.filter(r => r.provider === provider);
|
|
658
|
+
|
|
659
|
+
// Select resource type
|
|
660
|
+
let resourceType = options.resourceType;
|
|
661
|
+
if (!resourceType) {
|
|
662
|
+
resourceType = (await select({
|
|
663
|
+
message: 'Select resource type to import:',
|
|
664
|
+
options: providerResources.map(r => ({
|
|
665
|
+
label: r.description,
|
|
666
|
+
value: r.cloudType,
|
|
667
|
+
description: r.terraformType,
|
|
668
|
+
})),
|
|
669
|
+
})) as string;
|
|
670
|
+
}
|
|
671
|
+
|
|
672
|
+
const resourceInfo = providerResources.find(r => r.cloudType === resourceType);
|
|
673
|
+
if (!resourceInfo) {
|
|
674
|
+
ui.error(`Unknown resource type: ${resourceType}`);
|
|
675
|
+
return;
|
|
676
|
+
}
|
|
677
|
+
|
|
678
|
+
ui.newLine();
|
|
679
|
+
ui.startSpinner({ message: `Discovering ${resourceInfo.description}s...` });
|
|
680
|
+
|
|
681
|
+
// Discover resources
|
|
682
|
+
let discovered: DiscoveredResource[] = [];
|
|
683
|
+
|
|
684
|
+
if (provider === 'aws') {
|
|
685
|
+
discovered = discoverAwsResources(resourceType, region || 'us-east-1');
|
|
686
|
+
} else if (provider === 'gcp') {
|
|
687
|
+
discovered = discoverGcpResources(resourceType, region);
|
|
688
|
+
} else if (provider === 'azure') {
|
|
689
|
+
discovered = discoverAzureResources(resourceType, region);
|
|
690
|
+
}
|
|
691
|
+
|
|
692
|
+
if (discovered.length === 0) {
|
|
693
|
+
ui.stopSpinnerSuccess('Discovery complete');
|
|
694
|
+
ui.warning(`No ${resourceInfo.description}s found`);
|
|
695
|
+
ui.info(`Make sure you have the correct ${provider.toUpperCase()} credentials configured`);
|
|
696
|
+
return;
|
|
697
|
+
}
|
|
698
|
+
|
|
699
|
+
ui.stopSpinnerSuccess(`Found ${discovered.length} ${resourceInfo.description}(s)`);
|
|
700
|
+
|
|
701
|
+
// Display discovered resources
|
|
702
|
+
ui.newLine();
|
|
703
|
+
ui.section('Discovered Resources');
|
|
704
|
+
|
|
705
|
+
for (const resource of discovered) {
|
|
706
|
+
ui.print(` ${ui.color('•', 'blue')} ${resource.name || resource.id}`);
|
|
707
|
+
ui.print(` ${ui.dim('ID:')} ${resource.id}`);
|
|
708
|
+
if (resource.region !== 'global') {
|
|
709
|
+
ui.print(` ${ui.dim('Region:')} ${resource.region}`);
|
|
710
|
+
}
|
|
711
|
+
}
|
|
712
|
+
|
|
713
|
+
// Select resources to import
|
|
714
|
+
ui.newLine();
|
|
715
|
+
const selectedIds = await multiSelect({
|
|
716
|
+
message: 'Select resources to import:',
|
|
717
|
+
options: discovered.map(r => ({
|
|
718
|
+
label: r.name || r.id,
|
|
719
|
+
value: r.id,
|
|
720
|
+
description: r.id,
|
|
721
|
+
})),
|
|
722
|
+
});
|
|
723
|
+
|
|
724
|
+
if (selectedIds.length === 0) {
|
|
725
|
+
ui.info('No resources selected');
|
|
726
|
+
return;
|
|
727
|
+
}
|
|
728
|
+
|
|
729
|
+
const selectedResources = discovered.filter(r => selectedIds.includes(r.id));
|
|
730
|
+
|
|
731
|
+
// Output directory
|
|
732
|
+
const outputDir =
|
|
733
|
+
options.output ||
|
|
734
|
+
(await input({
|
|
735
|
+
message: 'Output directory:',
|
|
736
|
+
defaultValue: './terraform',
|
|
737
|
+
}));
|
|
738
|
+
|
|
739
|
+
// Create output directory
|
|
740
|
+
if (!fs.existsSync(outputDir)) {
|
|
741
|
+
fs.mkdirSync(outputDir, { recursive: true });
|
|
742
|
+
}
|
|
743
|
+
|
|
744
|
+
// Generate Terraform files
|
|
745
|
+
ui.newLine();
|
|
746
|
+
ui.startSpinner({ message: 'Generating Terraform configuration...' });
|
|
747
|
+
|
|
748
|
+
const importBlocks: string[] = [];
|
|
749
|
+
const resourceBlocks: string[] = [];
|
|
750
|
+
|
|
751
|
+
for (const resource of selectedResources) {
|
|
752
|
+
// Generate a terraform-friendly name
|
|
753
|
+
const tfName = (resource.name || resource.id)
|
|
754
|
+
.toLowerCase()
|
|
755
|
+
.replace(/[^a-z0-9]/g, '_')
|
|
756
|
+
.replace(/_+/g, '_')
|
|
757
|
+
.replace(/^_|_$/g, '');
|
|
758
|
+
|
|
759
|
+
importBlocks.push(generateImportBlock(resource, tfName));
|
|
760
|
+
resourceBlocks.push(generateResourceSkeleton(resource, tfName));
|
|
761
|
+
}
|
|
762
|
+
|
|
763
|
+
// Write import.tf
|
|
764
|
+
const importFile = path.join(outputDir, 'import.tf');
|
|
765
|
+
const importContent = `# Terraform Import Configuration
|
|
766
|
+
# Generated by Nimbus
|
|
767
|
+
# Run: terraform init && terraform plan
|
|
768
|
+
|
|
769
|
+
${importBlocks.join('\n')}
|
|
770
|
+
`;
|
|
771
|
+
fs.writeFileSync(importFile, importContent);
|
|
772
|
+
|
|
773
|
+
// Write resources.tf
|
|
774
|
+
const resourceFile = path.join(outputDir, 'imported_resources.tf');
|
|
775
|
+
const resourceContent = `# Imported Resources
|
|
776
|
+
# Generated by Nimbus
|
|
777
|
+
#
|
|
778
|
+
# How to use this file:
|
|
779
|
+
# 1. Run: terraform init
|
|
780
|
+
# 2. Run: terraform plan -generate-config-out=generated.tf
|
|
781
|
+
# This will auto-generate configuration for imported resources.
|
|
782
|
+
# 3. Merge the generated attributes into the resource blocks below.
|
|
783
|
+
# 4. Run: terraform plan (verify no unexpected changes)
|
|
784
|
+
# 5. Run: terraform apply (lock the state)
|
|
785
|
+
#
|
|
786
|
+
# Example attributes you may need to fill in per resource:
|
|
787
|
+
# - name, location/region, tags
|
|
788
|
+
# - Provider-specific required fields (e.g., ami + instance_type for aws_instance)
|
|
789
|
+
#
|
|
790
|
+
# Tip: Use 'terraform state show <resource_address>' after import to see all current attributes.
|
|
791
|
+
|
|
792
|
+
${resourceBlocks.join('\n\n')}
|
|
793
|
+
`;
|
|
794
|
+
fs.writeFileSync(resourceFile, resourceContent);
|
|
795
|
+
|
|
796
|
+
// Check if provider.tf exists, if not create it
|
|
797
|
+
const providerFile = path.join(outputDir, 'provider.tf');
|
|
798
|
+
if (!fs.existsSync(providerFile)) {
|
|
799
|
+
let providerContent = '';
|
|
800
|
+
if (provider === 'aws') {
|
|
801
|
+
providerContent = `terraform {
|
|
802
|
+
required_providers {
|
|
803
|
+
aws = {
|
|
804
|
+
source = "hashicorp/aws"
|
|
805
|
+
version = "~> 5.0"
|
|
806
|
+
}
|
|
807
|
+
}
|
|
808
|
+
}
|
|
809
|
+
|
|
810
|
+
provider "aws" {
|
|
811
|
+
region = "${region || 'us-east-1'}"
|
|
812
|
+
}
|
|
813
|
+
`;
|
|
814
|
+
} else if (provider === 'gcp') {
|
|
815
|
+
providerContent = `terraform {
|
|
816
|
+
required_providers {
|
|
817
|
+
google = {
|
|
818
|
+
source = "hashicorp/google"
|
|
819
|
+
version = "~> 5.0"
|
|
820
|
+
}
|
|
821
|
+
}
|
|
822
|
+
}
|
|
823
|
+
|
|
824
|
+
provider "google" {
|
|
825
|
+
project = "${region || 'my-project'}"
|
|
826
|
+
}
|
|
827
|
+
`;
|
|
828
|
+
} else if (provider === 'azure') {
|
|
829
|
+
providerContent = `terraform {
|
|
830
|
+
required_providers {
|
|
831
|
+
azurerm = {
|
|
832
|
+
source = "hashicorp/azurerm"
|
|
833
|
+
version = "~> 3.0"
|
|
834
|
+
}
|
|
835
|
+
}
|
|
836
|
+
}
|
|
837
|
+
|
|
838
|
+
provider "azurerm" {
|
|
839
|
+
features {}
|
|
840
|
+
}
|
|
841
|
+
`;
|
|
842
|
+
}
|
|
843
|
+
fs.writeFileSync(providerFile, providerContent);
|
|
844
|
+
}
|
|
845
|
+
|
|
846
|
+
ui.stopSpinnerSuccess('Configuration generated');
|
|
847
|
+
|
|
848
|
+
// Summary
|
|
849
|
+
ui.newLine();
|
|
850
|
+
ui.success(`Generated Terraform configuration for ${selectedResources.length} resource(s)`);
|
|
851
|
+
ui.newLine();
|
|
852
|
+
ui.print(' Files created:');
|
|
853
|
+
ui.print(` ${ui.dim('•')} ${importFile}`);
|
|
854
|
+
ui.print(` ${ui.dim('•')} ${resourceFile}`);
|
|
855
|
+
ui.newLine();
|
|
856
|
+
|
|
857
|
+
ui.section('Next Steps');
|
|
858
|
+
ui.print(' 1. Review the generated configuration');
|
|
859
|
+
ui.print(` 2. Run ${ui.color(`cd ${outputDir}`, 'cyan')}`);
|
|
860
|
+
ui.print(` 3. Run ${ui.color('terraform init', 'cyan')}`);
|
|
861
|
+
ui.print(` 4. Run ${ui.color('terraform plan', 'cyan')} to import and verify`);
|
|
862
|
+
ui.print(' 5. Fill in any missing required attributes');
|
|
863
|
+
ui.print(` 6. Run ${ui.color('terraform apply', 'cyan')} to complete the import`);
|
|
864
|
+
ui.newLine();
|
|
865
|
+
|
|
866
|
+
ui.warning('Important: Review the generated resources.tf file and fill in required attributes');
|
|
867
|
+
ui.info('After import, run "terraform state show <resource>" to see the actual configuration');
|
|
868
|
+
}
|