@stacksjs/ts-cloud-core 0.1.3 → 0.1.7

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (458) hide show
  1. package/README.md +98 -13
  2. package/dist/advanced-features.test.d.ts +0 -0
  3. package/dist/aws/cloudformation.d.ts +69 -0
  4. package/dist/aws/cloudfront.d.ts +21 -0
  5. package/dist/aws/credentials.d.ts +66 -0
  6. package/dist/aws/credentials.test.d.ts +0 -0
  7. package/{src/aws/index.ts → dist/aws/index.d.ts} +37 -51
  8. package/dist/aws/s3.d.ts +130 -0
  9. package/dist/aws/s3.test.d.ts +0 -0
  10. package/dist/aws/signature.d.ts +101 -0
  11. package/dist/aws/signature.test.d.ts +0 -0
  12. package/dist/backup/disaster-recovery.d.ts +98 -0
  13. package/dist/backup/disaster-recovery.test.d.ts +0 -0
  14. package/{src/backup/index.ts → dist/backup/index.d.ts} +10 -20
  15. package/dist/backup/manager.d.ts +112 -0
  16. package/dist/backup/manager.test.d.ts +0 -0
  17. package/dist/cicd/circleci.d.ts +47 -0
  18. package/dist/cicd/github-actions.d.ts +55 -0
  19. package/dist/cicd/gitlab-ci.d.ts +46 -0
  20. package/dist/cicd/index.d.ts +3 -0
  21. package/dist/cli/history.d.ts +66 -0
  22. package/dist/cli/index.d.ts +5 -0
  23. package/dist/cli/progress.d.ts +97 -0
  24. package/dist/cli/repl.d.ts +76 -0
  25. package/dist/cli/suggestions.d.ts +67 -0
  26. package/dist/cli/table.d.ts +70 -0
  27. package/dist/cli/table.test.d.ts +0 -0
  28. package/dist/cloudformation/builder.d.ts +59 -0
  29. package/dist/cloudformation/builder.test.d.ts +0 -0
  30. package/dist/cloudformation/builders/api-gateway.d.ts +30 -0
  31. package/dist/cloudformation/builders/cache.d.ts +35 -0
  32. package/dist/cloudformation/builders/cdn.d.ts +34 -0
  33. package/dist/cloudformation/builders/compute.d.ts +66 -0
  34. package/dist/cloudformation/builders/database.d.ts +61 -0
  35. package/dist/cloudformation/builders/functions.d.ts +32 -0
  36. package/dist/cloudformation/builders/messaging.d.ts +17 -0
  37. package/dist/cloudformation/builders/monitoring.d.ts +36 -0
  38. package/dist/cloudformation/builders/network.d.ts +14 -0
  39. package/dist/cloudformation/builders/queue.d.ts +8 -0
  40. package/dist/cloudformation/builders/security.d.ts +31 -0
  41. package/dist/cloudformation/builders/storage.d.ts +8 -0
  42. package/dist/cloudformation/index.d.ts +24 -0
  43. package/dist/cloudformation/types.d.ts +132 -0
  44. package/dist/compliance/aws-config.d.ts +88 -0
  45. package/dist/compliance/cloudtrail.d.ts +96 -0
  46. package/dist/compliance/compliance.test.d.ts +0 -0
  47. package/dist/compliance/guardduty.d.ts +110 -0
  48. package/{src/compliance/index.ts → dist/compliance/index.d.ts} +20 -36
  49. package/dist/compliance/security-hub.d.ts +110 -0
  50. package/dist/containers/build-optimization.d.ts +110 -0
  51. package/dist/containers/containers.test.d.ts +0 -0
  52. package/dist/containers/image-scanning.d.ts +96 -0
  53. package/dist/containers/index.d.ts +4 -0
  54. package/dist/containers/registry.d.ts +99 -0
  55. package/dist/containers/service-mesh.d.ts +206 -0
  56. package/dist/database/database.test.d.ts +0 -0
  57. package/dist/database/index.d.ts +4 -0
  58. package/dist/database/migrations.d.ts +102 -0
  59. package/dist/database/performance.d.ts +168 -0
  60. package/dist/database/replicas.d.ts +146 -0
  61. package/dist/database/users.d.ts +102 -0
  62. package/dist/dependency-graph.d.ts +19 -0
  63. package/dist/deployment/ab-testing.d.ts +114 -0
  64. package/dist/deployment/blue-green.d.ts +98 -0
  65. package/dist/deployment/canary.d.ts +103 -0
  66. package/dist/deployment/deployment.test.d.ts +0 -0
  67. package/{src/deployment/index.ts → dist/deployment/index.d.ts} +20 -36
  68. package/dist/deployment/progressive.d.ts +34 -0
  69. package/dist/dns/dns.test.d.ts +0 -0
  70. package/dist/dns/dnssec.d.ts +75 -0
  71. package/dist/dns/index.d.ts +3 -0
  72. package/dist/dns/resolver.d.ts +150 -0
  73. package/dist/dns/routing.d.ts +217 -0
  74. package/dist/email/advanced/analytics.d.ts +78 -0
  75. package/dist/email/advanced/index.d.ts +7 -0
  76. package/dist/email/advanced/rules.d.ts +60 -0
  77. package/dist/email/advanced/scheduling.d.ts +63 -0
  78. package/dist/email/advanced/search.d.ts +76 -0
  79. package/dist/email/advanced/shared-mailboxes.d.ts +66 -0
  80. package/dist/email/advanced/templates.d.ts +39 -0
  81. package/dist/email/advanced/threading.d.ts +53 -0
  82. package/dist/email/analytics.d.ts +144 -0
  83. package/dist/email/bounce-handling.d.ts +120 -0
  84. package/dist/email/email.test.d.ts +0 -0
  85. package/dist/email/handlers/__tests__/inbound.test.d.ts +0 -0
  86. package/dist/email/handlers/__tests__/outbound.test.d.ts +0 -0
  87. package/{src/email/handlers/converter.ts → dist/email/handlers/converter.d.ts} +3 -5
  88. package/{src/email/handlers/feedback.ts → dist/email/handlers/feedback.d.ts} +3 -5
  89. package/{src/email/handlers/inbound.ts → dist/email/handlers/inbound.d.ts} +3 -5
  90. package/{src/email/handlers/outbound.ts → dist/email/handlers/outbound.d.ts} +3 -5
  91. package/dist/email/index.d.ts +6 -0
  92. package/dist/email/reputation.d.ts +97 -0
  93. package/dist/email/templates.d.ts +82 -0
  94. package/dist/errors/index.d.ts +186 -0
  95. package/dist/errors/index.test.d.ts +0 -0
  96. package/dist/health-checks/index.d.ts +35 -0
  97. package/dist/index.d.ts +256 -0
  98. package/dist/index.js +63499 -0
  99. package/dist/intrinsic-functions.d.ts +37 -0
  100. package/dist/lambda/concurrency.d.ts +98 -0
  101. package/dist/lambda/destinations.d.ts +99 -0
  102. package/dist/lambda/dlq.d.ts +109 -0
  103. package/dist/lambda/index.d.ts +6 -0
  104. package/dist/lambda/lambda.test.d.ts +0 -0
  105. package/dist/lambda/layers.d.ts +81 -0
  106. package/dist/lambda/versions.d.ts +91 -0
  107. package/dist/lambda/vpc.d.ts +116 -0
  108. package/dist/local/config.d.ts +44 -0
  109. package/dist/local/index.d.ts +2 -0
  110. package/dist/local/mock-aws.d.ts +60 -0
  111. package/dist/modules/ai.d.ts +47 -0
  112. package/dist/modules/api.d.ts +98 -0
  113. package/dist/modules/auth.d.ts +165 -0
  114. package/dist/modules/cache.d.ts +73 -0
  115. package/dist/modules/cdn.d.ts +125 -0
  116. package/dist/modules/communication.d.ts +98 -0
  117. package/dist/modules/compute.d.ts +309 -0
  118. package/dist/modules/database.d.ts +105 -0
  119. package/dist/modules/deployment.d.ts +181 -0
  120. package/dist/modules/dns.d.ts +45 -0
  121. package/dist/modules/email.d.ts +217 -0
  122. package/dist/modules/filesystem.d.ts +94 -0
  123. package/dist/modules/index.d.ts +27 -0
  124. package/dist/modules/messaging.d.ts +108 -0
  125. package/dist/modules/monitoring.d.ts +127 -0
  126. package/dist/modules/network.d.ts +102 -0
  127. package/dist/modules/parameter-store.d.ts +33 -0
  128. package/dist/modules/permissions.d.ts +132 -0
  129. package/dist/modules/phone.d.ts +80 -0
  130. package/dist/modules/queue.d.ts +210 -0
  131. package/dist/modules/redirects.d.ts +59 -0
  132. package/dist/modules/registry.d.ts +73 -0
  133. package/dist/modules/search.d.ts +56 -0
  134. package/dist/modules/secrets.d.ts +80 -0
  135. package/dist/modules/security.d.ts +100 -0
  136. package/dist/modules/sms.d.ts +52 -0
  137. package/dist/modules/storage.d.ts +160 -0
  138. package/dist/modules/workflow.d.ts +205 -0
  139. package/dist/multi-account/config.d.ts +315 -0
  140. package/dist/multi-account/index.d.ts +2 -0
  141. package/dist/multi-account/manager.d.ts +100 -0
  142. package/dist/multi-region/cross-region.d.ts +114 -0
  143. package/dist/multi-region/index.d.ts +3 -0
  144. package/dist/multi-region/manager.d.ts +72 -0
  145. package/dist/multi-region/regions.d.ts +98 -0
  146. package/dist/network-security/index.d.ts +39 -0
  147. package/dist/observability/index.d.ts +4 -0
  148. package/dist/observability/logs.d.ts +129 -0
  149. package/dist/observability/metrics.d.ts +153 -0
  150. package/dist/observability/observability.test.d.ts +0 -0
  151. package/dist/observability/synthetics.d.ts +146 -0
  152. package/dist/observability/xray.d.ts +129 -0
  153. package/dist/phone/advanced/analytics.d.ts +66 -0
  154. package/dist/phone/advanced/callbacks.d.ts +50 -0
  155. package/dist/phone/advanced/index.d.ts +4 -0
  156. package/dist/phone/advanced/ivr-builder.d.ts +83 -0
  157. package/dist/phone/advanced/recording.d.ts +48 -0
  158. package/dist/phone/handlers/__tests__/incoming-call.test.d.ts +0 -0
  159. package/{src/phone/handlers/incoming-call.ts → dist/phone/handlers/incoming-call.d.ts} +3 -5
  160. package/{src/phone/handlers/missed-call.ts → dist/phone/handlers/missed-call.d.ts} +3 -5
  161. package/{src/phone/handlers/voicemail.ts → dist/phone/handlers/voicemail.d.ts} +3 -5
  162. package/dist/phone/index.d.ts +2 -0
  163. package/dist/presets/api-backend.d.ts +11 -0
  164. package/dist/presets/data-pipeline.d.ts +11 -0
  165. package/{src/presets/extend.ts → dist/presets/extend.d.ts} +11 -114
  166. package/dist/presets/extend.test.d.ts +0 -0
  167. package/dist/presets/fullstack-app.d.ts +12 -0
  168. package/dist/presets/index.d.ts +24 -0
  169. package/dist/presets/jamstack.d.ts +12 -0
  170. package/dist/presets/microservices.d.ts +18 -0
  171. package/dist/presets/ml-api.d.ts +13 -0
  172. package/dist/presets/nodejs-server.d.ts +14 -0
  173. package/dist/presets/nodejs-serverless.d.ts +14 -0
  174. package/dist/presets/realtime-app.d.ts +11 -0
  175. package/dist/presets/static-site.d.ts +12 -0
  176. package/dist/presets/traditional-web-app.d.ts +16 -0
  177. package/dist/presets/wordpress.d.ts +12 -0
  178. package/dist/preview/github.d.ts +32 -0
  179. package/dist/preview/github.test.d.ts +0 -0
  180. package/{src/preview/index.ts → dist/preview/index.d.ts} +16 -26
  181. package/dist/preview/manager.d.ts +58 -0
  182. package/dist/preview/manager.test.d.ts +0 -0
  183. package/dist/preview/notifications.d.ts +55 -0
  184. package/dist/preview/notifications.test.d.ts +0 -0
  185. package/dist/queue/batch-processing.d.ts +87 -0
  186. package/dist/queue/dlq-monitoring.d.ts +95 -0
  187. package/dist/queue/fifo.d.ts +90 -0
  188. package/dist/queue/index.d.ts +4 -0
  189. package/dist/queue/management.d.ts +105 -0
  190. package/dist/queue/queue.test.d.ts +0 -0
  191. package/dist/resource-mgmt/index.d.ts +29 -0
  192. package/dist/resource-naming.d.ts +26 -0
  193. package/dist/s3/index.d.ts +173 -0
  194. package/dist/schema/index.d.ts +9 -0
  195. package/dist/security/certificate-manager.d.ts +121 -0
  196. package/dist/security/index.d.ts +4 -0
  197. package/dist/security/scanning.d.ts +147 -0
  198. package/dist/security/secrets-manager.d.ts +144 -0
  199. package/dist/security/secrets-rotation.d.ts +115 -0
  200. package/dist/security/security.test.d.ts +0 -0
  201. package/dist/sms/advanced/ab-testing.d.ts +54 -0
  202. package/dist/sms/advanced/analytics.d.ts +56 -0
  203. package/dist/sms/advanced/campaigns.d.ts +82 -0
  204. package/dist/sms/advanced/chatbot.d.ts +48 -0
  205. package/dist/sms/advanced/index.d.ts +6 -0
  206. package/dist/sms/advanced/link-tracking.d.ts +42 -0
  207. package/dist/sms/advanced/mms.d.ts +35 -0
  208. package/dist/sms/handlers/__tests__/send.test.d.ts +0 -0
  209. package/{src/sms/handlers/delivery-status.ts → dist/sms/handlers/delivery-status.d.ts} +3 -5
  210. package/{src/sms/handlers/receive.ts → dist/sms/handlers/receive.d.ts} +3 -5
  211. package/{src/sms/handlers/send.ts → dist/sms/handlers/send.d.ts} +3 -5
  212. package/dist/sms/index.d.ts +2 -0
  213. package/dist/stack-diff.d.ts +34 -0
  214. package/dist/static-site/index.d.ts +49 -0
  215. package/dist/template-builder.d.ts +14 -0
  216. package/dist/template-validator.d.ts +24 -0
  217. package/dist/utils/cache.d.ts +55 -0
  218. package/dist/utils/diff.d.ts +48 -0
  219. package/dist/utils/hash.d.ts +58 -0
  220. package/dist/utils/index.d.ts +4 -0
  221. package/dist/utils/parallel.d.ts +60 -0
  222. package/dist/validators/credentials.d.ts +23 -0
  223. package/dist/validators/credentials.test.d.ts +0 -0
  224. package/dist/validators/quotas.d.ts +60 -0
  225. package/dist/validators/quotas.test.d.ts +0 -0
  226. package/package.json +13 -4
  227. package/src/advanced-features.test.ts +0 -465
  228. package/src/aws/cloudformation.ts +0 -421
  229. package/src/aws/cloudfront.ts +0 -158
  230. package/src/aws/credentials.test.ts +0 -132
  231. package/src/aws/credentials.ts +0 -545
  232. package/src/aws/s3.test.ts +0 -188
  233. package/src/aws/s3.ts +0 -1088
  234. package/src/aws/signature.test.ts +0 -670
  235. package/src/aws/signature.ts +0 -1155
  236. package/src/backup/disaster-recovery.test.ts +0 -726
  237. package/src/backup/disaster-recovery.ts +0 -500
  238. package/src/backup/manager.test.ts +0 -498
  239. package/src/backup/manager.ts +0 -432
  240. package/src/cicd/circleci.ts +0 -430
  241. package/src/cicd/github-actions.ts +0 -424
  242. package/src/cicd/gitlab-ci.ts +0 -255
  243. package/src/cicd/index.ts +0 -8
  244. package/src/cli/history.ts +0 -396
  245. package/src/cli/index.ts +0 -10
  246. package/src/cli/progress.ts +0 -458
  247. package/src/cli/repl.ts +0 -454
  248. package/src/cli/suggestions.ts +0 -327
  249. package/src/cli/table.test.ts +0 -319
  250. package/src/cli/table.ts +0 -332
  251. package/src/cloudformation/builder.test.ts +0 -327
  252. package/src/cloudformation/builder.ts +0 -378
  253. package/src/cloudformation/builders/api-gateway.ts +0 -449
  254. package/src/cloudformation/builders/cache.ts +0 -334
  255. package/src/cloudformation/builders/cdn.ts +0 -278
  256. package/src/cloudformation/builders/compute.ts +0 -485
  257. package/src/cloudformation/builders/database.ts +0 -392
  258. package/src/cloudformation/builders/functions.ts +0 -343
  259. package/src/cloudformation/builders/messaging.ts +0 -140
  260. package/src/cloudformation/builders/monitoring.ts +0 -300
  261. package/src/cloudformation/builders/network.ts +0 -264
  262. package/src/cloudformation/builders/queue.ts +0 -147
  263. package/src/cloudformation/builders/security.ts +0 -399
  264. package/src/cloudformation/builders/storage.ts +0 -285
  265. package/src/cloudformation/index.ts +0 -30
  266. package/src/cloudformation/types.ts +0 -173
  267. package/src/compliance/aws-config.ts +0 -543
  268. package/src/compliance/cloudtrail.ts +0 -376
  269. package/src/compliance/compliance.test.ts +0 -423
  270. package/src/compliance/guardduty.ts +0 -446
  271. package/src/compliance/security-hub.ts +0 -456
  272. package/src/containers/build-optimization.ts +0 -416
  273. package/src/containers/containers.test.ts +0 -508
  274. package/src/containers/image-scanning.ts +0 -360
  275. package/src/containers/index.ts +0 -9
  276. package/src/containers/registry.ts +0 -293
  277. package/src/containers/service-mesh.ts +0 -520
  278. package/src/database/database.test.ts +0 -762
  279. package/src/database/index.ts +0 -9
  280. package/src/database/migrations.ts +0 -444
  281. package/src/database/performance.ts +0 -528
  282. package/src/database/replicas.ts +0 -534
  283. package/src/database/users.ts +0 -494
  284. package/src/dependency-graph.ts +0 -143
  285. package/src/deployment/ab-testing.ts +0 -582
  286. package/src/deployment/blue-green.ts +0 -452
  287. package/src/deployment/canary.ts +0 -500
  288. package/src/deployment/deployment.test.ts +0 -526
  289. package/src/deployment/progressive.ts +0 -62
  290. package/src/dns/dns.test.ts +0 -641
  291. package/src/dns/dnssec.ts +0 -315
  292. package/src/dns/index.ts +0 -8
  293. package/src/dns/resolver.ts +0 -496
  294. package/src/dns/routing.ts +0 -593
  295. package/src/email/advanced/analytics.ts +0 -445
  296. package/src/email/advanced/index.ts +0 -11
  297. package/src/email/advanced/rules.ts +0 -465
  298. package/src/email/advanced/scheduling.ts +0 -352
  299. package/src/email/advanced/search.ts +0 -412
  300. package/src/email/advanced/shared-mailboxes.ts +0 -404
  301. package/src/email/advanced/templates.ts +0 -455
  302. package/src/email/advanced/threading.ts +0 -281
  303. package/src/email/analytics.ts +0 -467
  304. package/src/email/bounce-handling.ts +0 -425
  305. package/src/email/email.test.ts +0 -431
  306. package/src/email/handlers/__tests__/inbound.test.ts +0 -38
  307. package/src/email/handlers/__tests__/outbound.test.ts +0 -37
  308. package/src/email/index.ts +0 -15
  309. package/src/email/reputation.ts +0 -303
  310. package/src/email/templates.ts +0 -352
  311. package/src/errors/index.test.ts +0 -434
  312. package/src/errors/index.ts +0 -416
  313. package/src/health-checks/index.ts +0 -40
  314. package/src/index.ts +0 -360
  315. package/src/intrinsic-functions.ts +0 -118
  316. package/src/lambda/concurrency.ts +0 -330
  317. package/src/lambda/destinations.ts +0 -345
  318. package/src/lambda/dlq.ts +0 -425
  319. package/src/lambda/index.ts +0 -11
  320. package/src/lambda/lambda.test.ts +0 -840
  321. package/src/lambda/layers.ts +0 -263
  322. package/src/lambda/versions.ts +0 -376
  323. package/src/lambda/vpc.ts +0 -399
  324. package/src/local/config.ts +0 -114
  325. package/src/local/index.ts +0 -6
  326. package/src/local/mock-aws.ts +0 -351
  327. package/src/modules/ai.ts +0 -340
  328. package/src/modules/api.ts +0 -478
  329. package/src/modules/auth.ts +0 -805
  330. package/src/modules/cache.ts +0 -417
  331. package/src/modules/cdn.ts +0 -1062
  332. package/src/modules/communication.ts +0 -1094
  333. package/src/modules/compute.ts +0 -3348
  334. package/src/modules/database.ts +0 -554
  335. package/src/modules/deployment.ts +0 -1079
  336. package/src/modules/dns.ts +0 -337
  337. package/src/modules/email.ts +0 -1538
  338. package/src/modules/filesystem.ts +0 -515
  339. package/src/modules/index.ts +0 -32
  340. package/src/modules/messaging.ts +0 -486
  341. package/src/modules/monitoring.ts +0 -2086
  342. package/src/modules/network.ts +0 -664
  343. package/src/modules/parameter-store.ts +0 -325
  344. package/src/modules/permissions.ts +0 -1081
  345. package/src/modules/phone.ts +0 -494
  346. package/src/modules/queue.ts +0 -1260
  347. package/src/modules/redirects.ts +0 -464
  348. package/src/modules/registry.ts +0 -699
  349. package/src/modules/search.ts +0 -401
  350. package/src/modules/secrets.ts +0 -416
  351. package/src/modules/security.ts +0 -731
  352. package/src/modules/sms.ts +0 -389
  353. package/src/modules/storage.ts +0 -1120
  354. package/src/modules/workflow.ts +0 -680
  355. package/src/multi-account/config.ts +0 -521
  356. package/src/multi-account/index.ts +0 -7
  357. package/src/multi-account/manager.ts +0 -427
  358. package/src/multi-region/cross-region.ts +0 -410
  359. package/src/multi-region/index.ts +0 -8
  360. package/src/multi-region/manager.ts +0 -483
  361. package/src/multi-region/regions.ts +0 -435
  362. package/src/network-security/index.ts +0 -48
  363. package/src/observability/index.ts +0 -9
  364. package/src/observability/logs.ts +0 -522
  365. package/src/observability/metrics.ts +0 -460
  366. package/src/observability/observability.test.ts +0 -782
  367. package/src/observability/synthetics.ts +0 -568
  368. package/src/observability/xray.ts +0 -358
  369. package/src/phone/advanced/analytics.ts +0 -349
  370. package/src/phone/advanced/callbacks.ts +0 -428
  371. package/src/phone/advanced/index.ts +0 -8
  372. package/src/phone/advanced/ivr-builder.ts +0 -504
  373. package/src/phone/advanced/recording.ts +0 -310
  374. package/src/phone/handlers/__tests__/incoming-call.test.ts +0 -40
  375. package/src/phone/index.ts +0 -9
  376. package/src/presets/api-backend.ts +0 -134
  377. package/src/presets/data-pipeline.ts +0 -204
  378. package/src/presets/extend.test.ts +0 -295
  379. package/src/presets/fullstack-app.ts +0 -144
  380. package/src/presets/index.ts +0 -27
  381. package/src/presets/jamstack.ts +0 -135
  382. package/src/presets/microservices.ts +0 -167
  383. package/src/presets/ml-api.ts +0 -208
  384. package/src/presets/nodejs-server.ts +0 -104
  385. package/src/presets/nodejs-serverless.ts +0 -114
  386. package/src/presets/realtime-app.ts +0 -184
  387. package/src/presets/static-site.ts +0 -64
  388. package/src/presets/traditional-web-app.ts +0 -339
  389. package/src/presets/wordpress.ts +0 -138
  390. package/src/preview/github.test.ts +0 -249
  391. package/src/preview/github.ts +0 -297
  392. package/src/preview/manager.test.ts +0 -440
  393. package/src/preview/manager.ts +0 -326
  394. package/src/preview/notifications.test.ts +0 -582
  395. package/src/preview/notifications.ts +0 -341
  396. package/src/queue/batch-processing.ts +0 -402
  397. package/src/queue/dlq-monitoring.ts +0 -402
  398. package/src/queue/fifo.ts +0 -342
  399. package/src/queue/index.ts +0 -9
  400. package/src/queue/management.ts +0 -428
  401. package/src/queue/queue.test.ts +0 -429
  402. package/src/resource-mgmt/index.ts +0 -39
  403. package/src/resource-naming.ts +0 -62
  404. package/src/s3/index.ts +0 -523
  405. package/src/schema/cloud-config.schema.json +0 -554
  406. package/src/schema/index.ts +0 -68
  407. package/src/security/certificate-manager.ts +0 -492
  408. package/src/security/index.ts +0 -9
  409. package/src/security/scanning.ts +0 -545
  410. package/src/security/secrets-manager.ts +0 -476
  411. package/src/security/secrets-rotation.ts +0 -456
  412. package/src/security/security.test.ts +0 -738
  413. package/src/sms/advanced/ab-testing.ts +0 -389
  414. package/src/sms/advanced/analytics.ts +0 -336
  415. package/src/sms/advanced/campaigns.ts +0 -523
  416. package/src/sms/advanced/chatbot.ts +0 -224
  417. package/src/sms/advanced/index.ts +0 -10
  418. package/src/sms/advanced/link-tracking.ts +0 -248
  419. package/src/sms/advanced/mms.ts +0 -308
  420. package/src/sms/handlers/__tests__/send.test.ts +0 -40
  421. package/src/sms/index.ts +0 -9
  422. package/src/stack-diff.ts +0 -389
  423. package/src/static-site/index.ts +0 -85
  424. package/src/template-builder.ts +0 -110
  425. package/src/template-validator.ts +0 -574
  426. package/src/utils/cache.ts +0 -291
  427. package/src/utils/diff.ts +0 -269
  428. package/src/utils/hash.ts +0 -227
  429. package/src/utils/index.ts +0 -8
  430. package/src/utils/parallel.ts +0 -294
  431. package/src/validators/credentials.test.ts +0 -274
  432. package/src/validators/credentials.ts +0 -233
  433. package/src/validators/quotas.test.ts +0 -434
  434. package/src/validators/quotas.ts +0 -217
  435. package/test/ai.test.ts +0 -327
  436. package/test/api.test.ts +0 -511
  437. package/test/auth.test.ts +0 -632
  438. package/test/cache.test.ts +0 -406
  439. package/test/cdn.test.ts +0 -247
  440. package/test/compute.test.ts +0 -861
  441. package/test/database.test.ts +0 -523
  442. package/test/deployment.test.ts +0 -499
  443. package/test/dns.test.ts +0 -270
  444. package/test/email.test.ts +0 -439
  445. package/test/filesystem.test.ts +0 -382
  446. package/test/integration.test.ts +0 -350
  447. package/test/messaging.test.ts +0 -514
  448. package/test/monitoring.test.ts +0 -634
  449. package/test/network.test.ts +0 -425
  450. package/test/permissions.test.ts +0 -488
  451. package/test/queue.test.ts +0 -484
  452. package/test/registry.test.ts +0 -306
  453. package/test/security.test.ts +0 -462
  454. package/test/storage.test.ts +0 -463
  455. package/test/template-validator.test.ts +0 -559
  456. package/test/workflow.test.ts +0 -592
  457. package/tsconfig.json +0 -16
  458. package/tsconfig.tsbuildinfo +0 -1
@@ -1,1081 +0,0 @@
1
- import type {
2
- IAMAccessKey,
3
- IAMGroup,
4
- IAMInstanceProfile,
5
- IAMManagedPolicy,
6
- IAMRole,
7
- IAMUser,
8
- } from '@stacksjs/ts-cloud-aws-types'
9
- import type { EnvironmentType } from '@stacksjs/ts-cloud-types'
10
- import { Fn } from '../intrinsic-functions'
11
- import { generateLogicalId, generateResourceName } from '../resource-naming'
12
-
13
- export interface PolicyStatement {
14
- sid?: string
15
- effect?: 'Allow' | 'Deny'
16
- actions: string | string[]
17
- resources: string | string[]
18
- conditions?: Record<string, unknown>
19
- }
20
-
21
- export interface UserOptions {
22
- slug: string
23
- environment: EnvironmentType
24
- userName?: string
25
- groups?: string[]
26
- managedPolicyArns?: string[]
27
- }
28
-
29
- export interface RoleOptions {
30
- slug: string
31
- environment: EnvironmentType
32
- roleName?: string
33
- servicePrincipal?: string | string[]
34
- awsPrincipal?: string | string[]
35
- managedPolicyArns?: string[]
36
- }
37
-
38
- export interface GroupOptions {
39
- slug: string
40
- environment: EnvironmentType
41
- groupName?: string
42
- managedPolicyArns?: string[]
43
- }
44
-
45
- export interface ManagedPolicyOptions {
46
- slug: string
47
- environment: EnvironmentType
48
- policyName?: string
49
- description?: string
50
- statements: PolicyStatement[]
51
- }
52
-
53
- /**
54
- * Permissions Module - IAM (Identity and Access Management)
55
- * Provides clean API for creating users, roles, policies, and groups
56
- */
57
- export class Permissions {
58
- /**
59
- * Create an IAM user
60
- */
61
- static createUser(options: UserOptions): {
62
- user: IAMUser
63
- logicalId: string
64
- } {
65
- const {
66
- slug,
67
- environment,
68
- userName,
69
- groups,
70
- managedPolicyArns,
71
- } = options
72
-
73
- const resourceName = userName || generateResourceName({
74
- slug,
75
- environment,
76
- resourceType: 'user',
77
- })
78
-
79
- const logicalId = generateLogicalId(resourceName)
80
-
81
- const user: IAMUser = {
82
- Type: 'AWS::IAM::User',
83
- Properties: {
84
- UserName: resourceName,
85
- Tags: [
86
- { Key: 'Name', Value: resourceName },
87
- { Key: 'Environment', Value: environment },
88
- ],
89
- },
90
- }
91
-
92
- if (groups && groups.length > 0) {
93
- user.Properties.Groups = groups
94
- }
95
-
96
- if (managedPolicyArns && managedPolicyArns.length > 0) {
97
- user.Properties.ManagedPolicyArns = managedPolicyArns
98
- }
99
-
100
- return { user, logicalId }
101
- }
102
-
103
- /**
104
- * Create an IAM role
105
- */
106
- static createRole(options: RoleOptions): {
107
- role: IAMRole
108
- logicalId: string
109
- } {
110
- const {
111
- slug,
112
- environment,
113
- roleName,
114
- servicePrincipal,
115
- awsPrincipal,
116
- managedPolicyArns,
117
- } = options
118
-
119
- const resourceName = roleName || generateResourceName({
120
- slug,
121
- environment,
122
- resourceType: 'role',
123
- })
124
-
125
- const logicalId = generateLogicalId(resourceName)
126
-
127
- const principal: IAMRole['Properties']['AssumeRolePolicyDocument']['Statement'][0]['Principal'] = {}
128
-
129
- if (servicePrincipal) {
130
- principal.Service = servicePrincipal
131
- }
132
-
133
- if (awsPrincipal) {
134
- principal.AWS = awsPrincipal
135
- }
136
-
137
- const role: IAMRole = {
138
- Type: 'AWS::IAM::Role',
139
- Properties: {
140
- RoleName: resourceName,
141
- AssumeRolePolicyDocument: {
142
- Version: '2012-10-17',
143
- Statement: [
144
- {
145
- Effect: 'Allow',
146
- Principal: principal,
147
- Action: 'sts:AssumeRole',
148
- },
149
- ],
150
- },
151
- Tags: [
152
- { Key: 'Name', Value: resourceName },
153
- { Key: 'Environment', Value: environment },
154
- ],
155
- },
156
- }
157
-
158
- if (managedPolicyArns && managedPolicyArns.length > 0) {
159
- role.Properties.ManagedPolicyArns = managedPolicyArns
160
- }
161
-
162
- return { role, logicalId }
163
- }
164
-
165
- /**
166
- * Create an IAM group
167
- */
168
- static createGroup(options: GroupOptions): {
169
- group: IAMGroup
170
- logicalId: string
171
- } {
172
- const {
173
- slug,
174
- environment,
175
- groupName,
176
- managedPolicyArns,
177
- } = options
178
-
179
- const resourceName = groupName || generateResourceName({
180
- slug,
181
- environment,
182
- resourceType: 'group',
183
- })
184
-
185
- const logicalId = generateLogicalId(resourceName)
186
-
187
- const group: IAMGroup = {
188
- Type: 'AWS::IAM::Group',
189
- Properties: {
190
- GroupName: resourceName,
191
- },
192
- }
193
-
194
- if (managedPolicyArns && managedPolicyArns.length > 0) {
195
- group.Properties.ManagedPolicyArns = managedPolicyArns
196
- }
197
-
198
- return { group, logicalId }
199
- }
200
-
201
- /**
202
- * Create a managed policy
203
- */
204
- static createPolicy(options: ManagedPolicyOptions): {
205
- policy: IAMManagedPolicy
206
- logicalId: string
207
- } {
208
- const {
209
- slug,
210
- environment,
211
- policyName,
212
- description,
213
- statements,
214
- } = options
215
-
216
- const resourceName = policyName || generateResourceName({
217
- slug,
218
- environment,
219
- resourceType: 'policy',
220
- })
221
-
222
- const logicalId = generateLogicalId(resourceName)
223
-
224
- const policyStatements = statements.map(stmt => ({
225
- Sid: stmt.sid,
226
- Effect: stmt.effect || 'Allow',
227
- Action: stmt.actions,
228
- Resource: stmt.resources,
229
- Condition: stmt.conditions,
230
- }))
231
-
232
- const policy: IAMManagedPolicy = {
233
- Type: 'AWS::IAM::ManagedPolicy',
234
- Properties: {
235
- ManagedPolicyName: resourceName,
236
- Description: description || `Managed policy for ${resourceName}`,
237
- PolicyDocument: {
238
- Version: '2012-10-17',
239
- Statement: policyStatements,
240
- },
241
- },
242
- }
243
-
244
- return { policy, logicalId }
245
- }
246
-
247
- /**
248
- * Attach a policy to a role
249
- */
250
- static attachPolicyToRole(
251
- role: IAMRole,
252
- policyArn: string,
253
- ): IAMRole {
254
- if (!role.Properties.ManagedPolicyArns) {
255
- role.Properties.ManagedPolicyArns = []
256
- }
257
-
258
- if (!role.Properties.ManagedPolicyArns.includes(policyArn)) {
259
- role.Properties.ManagedPolicyArns.push(policyArn)
260
- }
261
-
262
- return role
263
- }
264
-
265
- /**
266
- * Attach a policy to a user
267
- */
268
- static attachPolicyToUser(
269
- user: IAMUser,
270
- policyArn: string,
271
- ): IAMUser {
272
- if (!user.Properties.ManagedPolicyArns) {
273
- user.Properties.ManagedPolicyArns = []
274
- }
275
-
276
- if (!user.Properties.ManagedPolicyArns.includes(policyArn)) {
277
- user.Properties.ManagedPolicyArns.push(policyArn)
278
- }
279
-
280
- return user
281
- }
282
-
283
- /**
284
- * Attach a policy to a group
285
- */
286
- static attachPolicyToGroup(
287
- group: IAMGroup,
288
- policyArn: string,
289
- ): IAMGroup {
290
- if (!group.Properties.ManagedPolicyArns) {
291
- group.Properties.ManagedPolicyArns = []
292
- }
293
-
294
- if (!group.Properties.ManagedPolicyArns.includes(policyArn)) {
295
- group.Properties.ManagedPolicyArns.push(policyArn)
296
- }
297
-
298
- return group
299
- }
300
-
301
- /**
302
- * Add inline policy to a role
303
- */
304
- static addInlinePolicyToRole(
305
- role: IAMRole,
306
- policyName: string,
307
- statements: PolicyStatement[],
308
- ): IAMRole {
309
- if (!role.Properties.Policies) {
310
- role.Properties.Policies = []
311
- }
312
-
313
- const policyStatements = statements.map(stmt => ({
314
- Effect: stmt.effect || 'Allow',
315
- Action: stmt.actions,
316
- Resource: stmt.resources,
317
- }))
318
-
319
- role.Properties.Policies.push({
320
- PolicyName: policyName,
321
- PolicyDocument: {
322
- Version: '2012-10-17',
323
- Statement: policyStatements,
324
- },
325
- })
326
-
327
- return role
328
- }
329
-
330
- /**
331
- * Add inline policy to a user
332
- */
333
- static addInlinePolicyToUser(
334
- user: IAMUser,
335
- policyName: string,
336
- statements: PolicyStatement[],
337
- ): IAMUser {
338
- if (!user.Properties.Policies) {
339
- user.Properties.Policies = []
340
- }
341
-
342
- const policyStatements = statements.map(stmt => ({
343
- Effect: stmt.effect || 'Allow',
344
- Action: stmt.actions,
345
- Resource: stmt.resources,
346
- }))
347
-
348
- user.Properties.Policies.push({
349
- PolicyName: policyName,
350
- PolicyDocument: {
351
- Version: '2012-10-17',
352
- Statement: policyStatements,
353
- },
354
- })
355
-
356
- return user
357
- }
358
-
359
- /**
360
- * Create an access key for programmatic access
361
- */
362
- static createAccessKey(
363
- userLogicalId: string,
364
- options: {
365
- slug: string
366
- environment: EnvironmentType
367
- status?: 'Active' | 'Inactive'
368
- },
369
- ): {
370
- accessKey: IAMAccessKey
371
- logicalId: string
372
- } {
373
- const { slug, environment, status = 'Active' } = options
374
-
375
- const resourceName = generateResourceName({
376
- slug,
377
- environment,
378
- resourceType: 'access-key',
379
- })
380
-
381
- const logicalId = generateLogicalId(resourceName)
382
-
383
- const accessKey: IAMAccessKey = {
384
- Type: 'AWS::IAM::AccessKey',
385
- Properties: {
386
- UserName: Fn.Ref(userLogicalId) as unknown as string,
387
- Status: status,
388
- },
389
- }
390
-
391
- return { accessKey, logicalId }
392
- }
393
-
394
- /**
395
- * Create an instance profile for EC2
396
- */
397
- static createInstanceProfile(
398
- roleLogicalId: string,
399
- options: {
400
- slug: string
401
- environment: EnvironmentType
402
- profileName?: string
403
- },
404
- ): {
405
- instanceProfile: IAMInstanceProfile
406
- logicalId: string
407
- } {
408
- const { slug, environment, profileName } = options
409
-
410
- const resourceName = profileName || generateResourceName({
411
- slug,
412
- environment,
413
- resourceType: 'instance-profile',
414
- })
415
-
416
- const logicalId = generateLogicalId(resourceName)
417
-
418
- const instanceProfile: IAMInstanceProfile = {
419
- Type: 'AWS::IAM::InstanceProfile',
420
- Properties: {
421
- InstanceProfileName: resourceName,
422
- Roles: [Fn.Ref(roleLogicalId) as unknown as string],
423
- },
424
- }
425
-
426
- return { instanceProfile, logicalId }
427
- }
428
-
429
- /**
430
- * AWS Managed Policies (common)
431
- */
432
- static readonly ManagedPolicies = {
433
- // Administrator Access
434
- AdministratorAccess: 'arn:aws:iam::aws:policy/AdministratorAccess',
435
-
436
- // Power User
437
- PowerUserAccess: 'arn:aws:iam::aws:policy/PowerUserAccess',
438
-
439
- // Read Only
440
- ReadOnlyAccess: 'arn:aws:iam::aws:policy/ReadOnlyAccess',
441
-
442
- // S3
443
- S3FullAccess: 'arn:aws:iam::aws:policy/AmazonS3FullAccess',
444
- S3ReadOnlyAccess: 'arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess',
445
-
446
- // DynamoDB
447
- DynamoDBFullAccess: 'arn:aws:iam::aws:policy/AmazonDynamoDBFullAccess',
448
- DynamoDBReadOnlyAccess: 'arn:aws:iam::aws:policy/AmazonDynamoDBReadOnlyAccess',
449
-
450
- // RDS
451
- RDSFullAccess: 'arn:aws:iam::aws:policy/AmazonRDSFullAccess',
452
- RDSReadOnlyAccess: 'arn:aws:iam::aws:policy/AmazonRDSReadOnlyAccess',
453
-
454
- // Lambda
455
- LambdaFullAccess: 'arn:aws:iam::aws:policy/AWSLambda_FullAccess',
456
- LambdaReadOnlyAccess: 'arn:aws:iam::aws:policy/AWSLambda_ReadOnlyAccess',
457
- LambdaBasicExecutionRole: 'arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole',
458
- LambdaVPCAccessExecutionRole: 'arn:aws:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole',
459
-
460
- // EC2
461
- EC2FullAccess: 'arn:aws:iam::aws:policy/AmazonEC2FullAccess',
462
- EC2ReadOnlyAccess: 'arn:aws:iam::aws:policy/AmazonEC2ReadOnlyAccess',
463
- EC2ContainerRegistryReadOnly: 'arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly',
464
- EC2ContainerRegistryPowerUser: 'arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryPowerUser',
465
-
466
- // ECS
467
- ECSTaskExecutionRole: 'arn:aws:iam::aws:policy/service-role/AmazonECSTaskExecutionRolePolicy',
468
- ECSFullAccess: 'arn:aws:iam::aws:policy/AmazonECS_FullAccess',
469
-
470
- // CloudWatch
471
- CloudWatchFullAccess: 'arn:aws:iam::aws:policy/CloudWatchFullAccess',
472
- CloudWatchLogsFullAccess: 'arn:aws:iam::aws:policy/CloudWatchLogsFullAccess',
473
-
474
- // SES
475
- SESFullAccess: 'arn:aws:iam::aws:policy/AmazonSESFullAccess',
476
-
477
- // SNS
478
- SNSFullAccess: 'arn:aws:iam::aws:policy/AmazonSNSFullAccess',
479
-
480
- // SQS
481
- SQSFullAccess: 'arn:aws:iam::aws:policy/AmazonSQSFullAccess',
482
-
483
- // Secrets Manager
484
- SecretsManagerReadWrite: 'arn:aws:iam::aws:policy/SecretsManagerReadWrite',
485
- } as const
486
-
487
- /**
488
- * Common service principals
489
- */
490
- static readonly ServicePrincipals = {
491
- Lambda: 'lambda.amazonaws.com',
492
- EC2: 'ec2.amazonaws.com',
493
- ECS: 'ecs.amazonaws.com',
494
- ECSTaskExecution: 'ecs-tasks.amazonaws.com',
495
- APIGateway: 'apigateway.amazonaws.com',
496
- Events: 'events.amazonaws.com',
497
- States: 'states.amazonaws.com',
498
- CodeBuild: 'codebuild.amazonaws.com',
499
- CodeDeploy: 'codedeploy.amazonaws.com',
500
- CloudFormation: 'cloudformation.amazonaws.com',
501
- } as const
502
-
503
- /**
504
- * Create a CI/CD user with deployment permissions
505
- */
506
- static createCiCdUser(options: {
507
- slug: string
508
- environment: EnvironmentType
509
- permissions: {
510
- s3Buckets?: string[]
511
- cloudFrontDistributions?: string[]
512
- ecrRepositories?: string[]
513
- ecsServices?: string[]
514
- cloudFormationStacks?: string[]
515
- lambdaFunctions?: string[]
516
- secretsManagerSecrets?: string[]
517
- }
518
- createAccessKey?: boolean
519
- }): {
520
- user: IAMUser
521
- accessKey?: IAMAccessKey
522
- policy: IAMManagedPolicy
523
- userLogicalId: string
524
- accessKeyLogicalId?: string
525
- policyLogicalId: string
526
- resources: Record<string, any>
527
- } {
528
- const {
529
- slug,
530
- environment,
531
- permissions,
532
- createAccessKey = true,
533
- } = options
534
-
535
- const resources: Record<string, any> = {}
536
-
537
- // Build policy statements based on permissions
538
- const statements: PolicyStatement[] = []
539
-
540
- // S3 permissions
541
- if (permissions.s3Buckets && permissions.s3Buckets.length > 0) {
542
- statements.push({
543
- sid: 'S3Access',
544
- actions: [
545
- 's3:GetBucketLocation',
546
- 's3:ListBucket',
547
- 's3:GetObject',
548
- 's3:PutObject',
549
- 's3:DeleteObject',
550
- 's3:ListBucketMultipartUploads',
551
- 's3:AbortMultipartUpload',
552
- ],
553
- resources: [
554
- ...permissions.s3Buckets,
555
- ...permissions.s3Buckets.map(b => `${b}/*`),
556
- ],
557
- })
558
- }
559
-
560
- // CloudFront permissions
561
- if (permissions.cloudFrontDistributions && permissions.cloudFrontDistributions.length > 0) {
562
- statements.push({
563
- sid: 'CloudFrontAccess',
564
- actions: [
565
- 'cloudfront:CreateInvalidation',
566
- 'cloudfront:GetInvalidation',
567
- 'cloudfront:ListInvalidations',
568
- 'cloudfront:GetDistribution',
569
- ],
570
- resources: permissions.cloudFrontDistributions,
571
- })
572
- }
573
-
574
- // ECR permissions
575
- if (permissions.ecrRepositories && permissions.ecrRepositories.length > 0) {
576
- statements.push({
577
- sid: 'ECRAccess',
578
- actions: [
579
- 'ecr:GetAuthorizationToken',
580
- 'ecr:BatchCheckLayerAvailability',
581
- 'ecr:GetDownloadUrlForLayer',
582
- 'ecr:GetRepositoryPolicy',
583
- 'ecr:DescribeRepositories',
584
- 'ecr:ListImages',
585
- 'ecr:DescribeImages',
586
- 'ecr:BatchGetImage',
587
- 'ecr:InitiateLayerUpload',
588
- 'ecr:UploadLayerPart',
589
- 'ecr:CompleteLayerUpload',
590
- 'ecr:PutImage',
591
- ],
592
- resources: permissions.ecrRepositories,
593
- })
594
-
595
- // ECR login requires permission on all resources
596
- statements.push({
597
- sid: 'ECRLogin',
598
- actions: ['ecr:GetAuthorizationToken'],
599
- resources: '*',
600
- })
601
- }
602
-
603
- // ECS permissions
604
- if (permissions.ecsServices && permissions.ecsServices.length > 0) {
605
- statements.push({
606
- sid: 'ECSAccess',
607
- actions: [
608
- 'ecs:DescribeServices',
609
- 'ecs:DescribeTaskDefinition',
610
- 'ecs:DescribeTasks',
611
- 'ecs:ListTasks',
612
- 'ecs:RegisterTaskDefinition',
613
- 'ecs:UpdateService',
614
- 'ecs:RunTask',
615
- 'ecs:StopTask',
616
- ],
617
- resources: permissions.ecsServices,
618
- })
619
-
620
- // Task definition registration requires broader permissions
621
- statements.push({
622
- sid: 'ECSTaskDefinitions',
623
- actions: [
624
- 'ecs:RegisterTaskDefinition',
625
- 'ecs:DeregisterTaskDefinition',
626
- ],
627
- resources: '*',
628
- })
629
-
630
- // IAM PassRole for ECS
631
- statements.push({
632
- sid: 'ECSPassRole',
633
- actions: ['iam:PassRole'],
634
- resources: '*',
635
- conditions: {
636
- StringLike: {
637
- 'iam:PassedToService': 'ecs-tasks.amazonaws.com',
638
- },
639
- },
640
- })
641
- }
642
-
643
- // CloudFormation permissions
644
- if (permissions.cloudFormationStacks && permissions.cloudFormationStacks.length > 0) {
645
- statements.push({
646
- sid: 'CloudFormationAccess',
647
- actions: [
648
- 'cloudformation:CreateStack',
649
- 'cloudformation:UpdateStack',
650
- 'cloudformation:DeleteStack',
651
- 'cloudformation:DescribeStacks',
652
- 'cloudformation:DescribeStackEvents',
653
- 'cloudformation:DescribeStackResources',
654
- 'cloudformation:GetTemplate',
655
- 'cloudformation:ListStackResources',
656
- 'cloudformation:ValidateTemplate',
657
- ],
658
- resources: permissions.cloudFormationStacks,
659
- })
660
- }
661
-
662
- // Lambda permissions
663
- if (permissions.lambdaFunctions && permissions.lambdaFunctions.length > 0) {
664
- statements.push({
665
- sid: 'LambdaAccess',
666
- actions: [
667
- 'lambda:GetFunction',
668
- 'lambda:UpdateFunctionCode',
669
- 'lambda:UpdateFunctionConfiguration',
670
- 'lambda:PublishVersion',
671
- 'lambda:UpdateAlias',
672
- 'lambda:CreateAlias',
673
- ],
674
- resources: permissions.lambdaFunctions,
675
- })
676
- }
677
-
678
- // Secrets Manager permissions
679
- if (permissions.secretsManagerSecrets && permissions.secretsManagerSecrets.length > 0) {
680
- statements.push({
681
- sid: 'SecretsManagerAccess',
682
- actions: [
683
- 'secretsmanager:GetSecretValue',
684
- 'secretsmanager:DescribeSecret',
685
- ],
686
- resources: permissions.secretsManagerSecrets,
687
- })
688
- }
689
-
690
- // Create the policy
691
- const { policy, logicalId: policyLogicalId } = Permissions.createPolicy({
692
- slug,
693
- environment,
694
- policyName: generateResourceName({
695
- slug,
696
- environment,
697
- resourceType: 'cicd-policy',
698
- }),
699
- description: `CI/CD deployment policy for ${slug} (${environment})`,
700
- statements,
701
- })
702
- resources[policyLogicalId] = policy
703
-
704
- // Create the user
705
- const { user, logicalId: userLogicalId } = Permissions.createUser({
706
- slug,
707
- environment,
708
- userName: generateResourceName({
709
- slug,
710
- environment,
711
- resourceType: 'cicd-user',
712
- }),
713
- managedPolicyArns: [Fn.Ref(policyLogicalId) as unknown as string],
714
- })
715
- resources[userLogicalId] = user
716
-
717
- // Create access key if requested
718
- let accessKey: IAMAccessKey | undefined
719
- let accessKeyLogicalId: string | undefined
720
-
721
- if (createAccessKey) {
722
- const keyResult = Permissions.createAccessKey(userLogicalId, { slug, environment })
723
- accessKey = keyResult.accessKey
724
- accessKeyLogicalId = keyResult.logicalId
725
- resources[accessKeyLogicalId] = accessKey
726
- }
727
-
728
- return {
729
- user,
730
- accessKey,
731
- policy,
732
- userLogicalId,
733
- accessKeyLogicalId,
734
- policyLogicalId,
735
- resources,
736
- }
737
- }
738
-
739
- /**
740
- * Create a cross-account access role
741
- */
742
- static createCrossAccountRole(options: {
743
- slug: string
744
- environment: EnvironmentType
745
- trustedAccountIds: string[]
746
- externalId?: string
747
- permissions: PolicyStatement[]
748
- maxSessionDuration?: number
749
- }): {
750
- role: IAMRole
751
- policy: IAMManagedPolicy
752
- roleLogicalId: string
753
- policyLogicalId: string
754
- resources: Record<string, any>
755
- } {
756
- const {
757
- slug,
758
- environment,
759
- trustedAccountIds,
760
- externalId,
761
- permissions,
762
- maxSessionDuration = 3600,
763
- } = options
764
-
765
- const resources: Record<string, any> = {}
766
-
767
- // Create the policy
768
- const { policy, logicalId: policyLogicalId } = Permissions.createPolicy({
769
- slug,
770
- environment,
771
- policyName: generateResourceName({
772
- slug,
773
- environment,
774
- resourceType: 'cross-account-policy',
775
- }),
776
- description: `Cross-account access policy for ${slug} (${environment})`,
777
- statements: permissions,
778
- })
779
- resources[policyLogicalId] = policy
780
-
781
- const resourceName = generateResourceName({
782
- slug,
783
- environment,
784
- resourceType: 'cross-account-role',
785
- })
786
-
787
- const roleLogicalId = generateLogicalId(resourceName)
788
-
789
- // Build trust policy
790
- const conditions: Record<string, any> = {}
791
- if (externalId) {
792
- conditions.StringEquals = {
793
- 'sts:ExternalId': externalId,
794
- }
795
- }
796
-
797
- const role: IAMRole = {
798
- Type: 'AWS::IAM::Role',
799
- Properties: {
800
- RoleName: resourceName,
801
- MaxSessionDuration: maxSessionDuration,
802
- AssumeRolePolicyDocument: {
803
- Version: '2012-10-17',
804
- Statement: [{
805
- Effect: 'Allow',
806
- Principal: {
807
- AWS: trustedAccountIds.map(id => `arn:aws:iam::${id}:root`),
808
- },
809
- Action: 'sts:AssumeRole',
810
- ...(Object.keys(conditions).length > 0 ? { Condition: conditions } : {}),
811
- }],
812
- },
813
- ManagedPolicyArns: [Fn.Ref(policyLogicalId) as unknown as string],
814
- Tags: [
815
- { Key: 'Name', Value: resourceName },
816
- { Key: 'Environment', Value: environment },
817
- { Key: 'Purpose', Value: 'Cross-Account Access' },
818
- ],
819
- },
820
- }
821
- resources[roleLogicalId] = role
822
-
823
- return {
824
- role,
825
- policy,
826
- roleLogicalId,
827
- policyLogicalId,
828
- resources,
829
- }
830
- }
831
-
832
- /**
833
- * Create a CLI access user with minimal permissions
834
- */
835
- static createCliUser(options: {
836
- slug: string
837
- environment: EnvironmentType
838
- permissions?: 'readonly' | 'deploy' | 'admin'
839
- }): {
840
- user: IAMUser
841
- accessKey: IAMAccessKey
842
- policy?: IAMManagedPolicy
843
- userLogicalId: string
844
- accessKeyLogicalId: string
845
- policyLogicalId?: string
846
- resources: Record<string, any>
847
- } {
848
- const {
849
- slug,
850
- environment,
851
- permissions = 'readonly',
852
- } = options
853
-
854
- const resources: Record<string, any> = {}
855
-
856
- // Define statements based on permission level
857
- let statements: PolicyStatement[] = []
858
- let managedPolicyArns: string[] = []
859
-
860
- switch (permissions) {
861
- case 'readonly':
862
- managedPolicyArns = [Permissions.ManagedPolicies.ReadOnlyAccess]
863
- break
864
-
865
- case 'deploy':
866
- statements = [
867
- {
868
- sid: 'S3Deploy',
869
- actions: ['s3:*'],
870
- resources: '*',
871
- },
872
- {
873
- sid: 'CloudFrontDeploy',
874
- actions: ['cloudfront:*'],
875
- resources: '*',
876
- },
877
- {
878
- sid: 'ECSDeploy',
879
- actions: ['ecs:*'],
880
- resources: '*',
881
- },
882
- {
883
- sid: 'ECRDeploy',
884
- actions: ['ecr:*'],
885
- resources: '*',
886
- },
887
- {
888
- sid: 'LambdaDeploy',
889
- actions: ['lambda:*'],
890
- resources: '*',
891
- },
892
- {
893
- sid: 'CloudFormationDeploy',
894
- actions: ['cloudformation:*'],
895
- resources: '*',
896
- },
897
- {
898
- sid: 'IAMPassRole',
899
- actions: ['iam:PassRole'],
900
- resources: '*',
901
- },
902
- ]
903
- break
904
-
905
- case 'admin':
906
- managedPolicyArns = [Permissions.ManagedPolicies.AdministratorAccess]
907
- break
908
- }
909
-
910
- // Create policy if needed
911
- let policy: IAMManagedPolicy | undefined
912
- let policyLogicalId: string | undefined
913
-
914
- if (statements.length > 0) {
915
- const policyResult = Permissions.createPolicy({
916
- slug,
917
- environment,
918
- policyName: generateResourceName({
919
- slug,
920
- environment,
921
- resourceType: 'cli-policy',
922
- }),
923
- description: `CLI access policy for ${slug} (${environment})`,
924
- statements,
925
- })
926
- policy = policyResult.policy
927
- policyLogicalId = policyResult.logicalId
928
- resources[policyLogicalId] = policy
929
- managedPolicyArns = [Fn.Ref(policyLogicalId) as unknown as string]
930
- }
931
-
932
- // Create user
933
- const { user, logicalId: userLogicalId } = Permissions.createUser({
934
- slug,
935
- environment,
936
- userName: generateResourceName({
937
- slug,
938
- environment,
939
- resourceType: 'cli-user',
940
- }),
941
- managedPolicyArns,
942
- })
943
- resources[userLogicalId] = user
944
-
945
- // Create access key
946
- const { accessKey, logicalId: accessKeyLogicalId } = Permissions.createAccessKey(
947
- userLogicalId,
948
- { slug, environment },
949
- )
950
- resources[accessKeyLogicalId] = accessKey
951
-
952
- return {
953
- user,
954
- accessKey,
955
- policy,
956
- userLogicalId,
957
- accessKeyLogicalId,
958
- policyLogicalId,
959
- resources,
960
- }
961
- }
962
-
963
- /**
964
- * Common CI/CD policy templates
965
- */
966
- static readonly CiCdPolicies = {
967
- /**
968
- * S3 static site deployment policy
969
- */
970
- s3Deployment: (bucketArns: string[]): PolicyStatement[] => [
971
- {
972
- sid: 'S3ListBuckets',
973
- actions: ['s3:ListBucket', 's3:GetBucketLocation'],
974
- resources: bucketArns,
975
- },
976
- {
977
- sid: 'S3Objects',
978
- actions: ['s3:GetObject', 's3:PutObject', 's3:DeleteObject'],
979
- resources: bucketArns.map(arn => `${arn}/*`),
980
- },
981
- ],
982
-
983
- /**
984
- * CloudFront invalidation policy
985
- */
986
- cloudFrontInvalidation: (distributionArns: string[]): PolicyStatement[] => [
987
- {
988
- sid: 'CloudFrontInvalidation',
989
- actions: [
990
- 'cloudfront:CreateInvalidation',
991
- 'cloudfront:GetInvalidation',
992
- 'cloudfront:ListInvalidations',
993
- ],
994
- resources: distributionArns,
995
- },
996
- ],
997
-
998
- /**
999
- * ECS deployment policy
1000
- */
1001
- ecsDeployment: (): PolicyStatement[] => [
1002
- {
1003
- sid: 'ECSServices',
1004
- actions: [
1005
- 'ecs:DescribeServices',
1006
- 'ecs:UpdateService',
1007
- 'ecs:DescribeTaskDefinition',
1008
- 'ecs:RegisterTaskDefinition',
1009
- ],
1010
- resources: '*',
1011
- },
1012
- {
1013
- sid: 'ECSPassRole',
1014
- actions: ['iam:PassRole'],
1015
- resources: '*',
1016
- conditions: {
1017
- StringLike: {
1018
- 'iam:PassedToService': 'ecs-tasks.amazonaws.com',
1019
- },
1020
- },
1021
- },
1022
- ],
1023
-
1024
- /**
1025
- * ECR push policy
1026
- */
1027
- ecrPush: (repositoryArns: string[]): PolicyStatement[] => [
1028
- {
1029
- sid: 'ECRAuth',
1030
- actions: ['ecr:GetAuthorizationToken'],
1031
- resources: '*',
1032
- },
1033
- {
1034
- sid: 'ECRPush',
1035
- actions: [
1036
- 'ecr:BatchCheckLayerAvailability',
1037
- 'ecr:GetDownloadUrlForLayer',
1038
- 'ecr:BatchGetImage',
1039
- 'ecr:InitiateLayerUpload',
1040
- 'ecr:UploadLayerPart',
1041
- 'ecr:CompleteLayerUpload',
1042
- 'ecr:PutImage',
1043
- ],
1044
- resources: repositoryArns,
1045
- },
1046
- ],
1047
-
1048
- /**
1049
- * Lambda deployment policy
1050
- */
1051
- lambdaDeployment: (functionArns: string[]): PolicyStatement[] => [
1052
- {
1053
- sid: 'LambdaDeploy',
1054
- actions: [
1055
- 'lambda:GetFunction',
1056
- 'lambda:UpdateFunctionCode',
1057
- 'lambda:UpdateFunctionConfiguration',
1058
- 'lambda:PublishVersion',
1059
- ],
1060
- resources: functionArns,
1061
- },
1062
- ],
1063
-
1064
- /**
1065
- * CloudFormation deployment policy
1066
- */
1067
- cloudFormationDeployment: (stackArns: string[]): PolicyStatement[] => [
1068
- {
1069
- sid: 'CloudFormationDeploy',
1070
- actions: [
1071
- 'cloudformation:CreateStack',
1072
- 'cloudformation:UpdateStack',
1073
- 'cloudformation:DescribeStacks',
1074
- 'cloudformation:DescribeStackEvents',
1075
- 'cloudformation:GetTemplate',
1076
- ],
1077
- resources: stackArns,
1078
- },
1079
- ],
1080
- }
1081
- }