@stacksjs/ts-cloud 0.1.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (117) hide show
  1. package/LICENSE.md +21 -0
  2. package/README.md +321 -0
  3. package/bin/cli.ts +133 -0
  4. package/bin/commands/analytics.ts +328 -0
  5. package/bin/commands/api.ts +379 -0
  6. package/bin/commands/assets.ts +221 -0
  7. package/bin/commands/audit.ts +501 -0
  8. package/bin/commands/backup.ts +682 -0
  9. package/bin/commands/cache.ts +294 -0
  10. package/bin/commands/cdn.ts +281 -0
  11. package/bin/commands/config.ts +202 -0
  12. package/bin/commands/container.ts +105 -0
  13. package/bin/commands/cost.ts +208 -0
  14. package/bin/commands/database.ts +401 -0
  15. package/bin/commands/deploy.ts +674 -0
  16. package/bin/commands/domain.ts +397 -0
  17. package/bin/commands/email.ts +423 -0
  18. package/bin/commands/environment.ts +285 -0
  19. package/bin/commands/events.ts +424 -0
  20. package/bin/commands/firewall.ts +145 -0
  21. package/bin/commands/function.ts +116 -0
  22. package/bin/commands/generate.ts +280 -0
  23. package/bin/commands/git.ts +139 -0
  24. package/bin/commands/iam.ts +464 -0
  25. package/bin/commands/index.ts +48 -0
  26. package/bin/commands/init.ts +120 -0
  27. package/bin/commands/logs.ts +148 -0
  28. package/bin/commands/network.ts +579 -0
  29. package/bin/commands/notify.ts +489 -0
  30. package/bin/commands/queue.ts +407 -0
  31. package/bin/commands/scheduler.ts +370 -0
  32. package/bin/commands/secrets.ts +54 -0
  33. package/bin/commands/server.ts +629 -0
  34. package/bin/commands/shared.ts +97 -0
  35. package/bin/commands/ssl.ts +138 -0
  36. package/bin/commands/stack.ts +325 -0
  37. package/bin/commands/status.ts +385 -0
  38. package/bin/commands/storage.ts +450 -0
  39. package/bin/commands/team.ts +96 -0
  40. package/bin/commands/tunnel.ts +489 -0
  41. package/bin/commands/utils.ts +202 -0
  42. package/build.ts +15 -0
  43. package/cloud +2 -0
  44. package/package.json +99 -0
  45. package/src/aws/acm.ts +768 -0
  46. package/src/aws/application-autoscaling.ts +845 -0
  47. package/src/aws/bedrock.ts +4074 -0
  48. package/src/aws/client.ts +878 -0
  49. package/src/aws/cloudformation.ts +896 -0
  50. package/src/aws/cloudfront.ts +1531 -0
  51. package/src/aws/cloudwatch-logs.ts +154 -0
  52. package/src/aws/comprehend.ts +839 -0
  53. package/src/aws/connect.ts +1056 -0
  54. package/src/aws/deploy-imap.ts +384 -0
  55. package/src/aws/dynamodb.ts +340 -0
  56. package/src/aws/ec2.ts +1385 -0
  57. package/src/aws/ecr.ts +621 -0
  58. package/src/aws/ecs.ts +615 -0
  59. package/src/aws/elasticache.ts +301 -0
  60. package/src/aws/elbv2.ts +942 -0
  61. package/src/aws/email.ts +928 -0
  62. package/src/aws/eventbridge.ts +248 -0
  63. package/src/aws/iam.ts +1689 -0
  64. package/src/aws/imap-server.ts +2100 -0
  65. package/src/aws/index.ts +213 -0
  66. package/src/aws/kendra.ts +1097 -0
  67. package/src/aws/lambda.ts +786 -0
  68. package/src/aws/opensearch.ts +158 -0
  69. package/src/aws/personalize.ts +977 -0
  70. package/src/aws/polly.ts +559 -0
  71. package/src/aws/rds.ts +888 -0
  72. package/src/aws/rekognition.ts +846 -0
  73. package/src/aws/route53-domains.ts +359 -0
  74. package/src/aws/route53.ts +1046 -0
  75. package/src/aws/s3.ts +2318 -0
  76. package/src/aws/scheduler.ts +571 -0
  77. package/src/aws/secrets-manager.ts +769 -0
  78. package/src/aws/ses.ts +1081 -0
  79. package/src/aws/setup-phone.ts +104 -0
  80. package/src/aws/setup-sms.ts +580 -0
  81. package/src/aws/sms.ts +1735 -0
  82. package/src/aws/smtp-server.ts +531 -0
  83. package/src/aws/sns.ts +758 -0
  84. package/src/aws/sqs.ts +382 -0
  85. package/src/aws/ssm.ts +807 -0
  86. package/src/aws/sts.ts +92 -0
  87. package/src/aws/support.ts +391 -0
  88. package/src/aws/test-imap.ts +86 -0
  89. package/src/aws/textract.ts +780 -0
  90. package/src/aws/transcribe.ts +108 -0
  91. package/src/aws/translate.ts +641 -0
  92. package/src/aws/voice.ts +1379 -0
  93. package/src/config.ts +35 -0
  94. package/src/deploy/index.ts +7 -0
  95. package/src/deploy/static-site-external-dns.ts +906 -0
  96. package/src/deploy/static-site.ts +1125 -0
  97. package/src/dns/godaddy.ts +412 -0
  98. package/src/dns/index.ts +183 -0
  99. package/src/dns/porkbun.ts +362 -0
  100. package/src/dns/route53-adapter.ts +414 -0
  101. package/src/dns/types.ts +114 -0
  102. package/src/dns/validator.ts +369 -0
  103. package/src/generators/index.ts +5 -0
  104. package/src/generators/infrastructure.ts +1660 -0
  105. package/src/index.ts +163 -0
  106. package/src/push/apns.ts +452 -0
  107. package/src/push/fcm.ts +506 -0
  108. package/src/push/index.ts +58 -0
  109. package/src/ssl/acme-client.ts +478 -0
  110. package/src/ssl/index.ts +7 -0
  111. package/src/ssl/letsencrypt.ts +747 -0
  112. package/src/types.ts +2 -0
  113. package/src/utils/cli.ts +398 -0
  114. package/src/validation/index.ts +5 -0
  115. package/src/validation/template.ts +405 -0
  116. package/test/index.test.ts +128 -0
  117. package/tsconfig.json +18 -0
@@ -0,0 +1,501 @@
1
+ import type { CLI } from '@stacksjs/clapp'
2
+ import * as cli from '../../src/utils/cli'
3
+ import { loadValidatedConfig } from './shared'
4
+
5
+ // CloudTrail client will be created inline since it may not exist
6
+ async function getCloudTrailClient(region: string) {
7
+ const { AWSClient } = await import('../../src/aws/client')
8
+
9
+ class CloudTrailClient {
10
+ private client: InstanceType<typeof AWSClient>
11
+ private region: string
12
+
13
+ constructor(region: string) {
14
+ this.region = region
15
+ this.client = new AWSClient()
16
+ }
17
+
18
+ private async jsonRpcRequest(action: string, params: Record<string, any>): Promise<any> {
19
+ return this.client.request({
20
+ service: 'cloudtrail',
21
+ region: this.region,
22
+ method: 'POST',
23
+ path: '/',
24
+ headers: {
25
+ 'Content-Type': 'application/x-amz-json-1.1',
26
+ 'X-Amz-Target': `com.amazonaws.cloudtrail.v20131101.CloudTrail_20131101.${action}`,
27
+ },
28
+ body: JSON.stringify(params),
29
+ })
30
+ }
31
+
32
+ async describeTrails() {
33
+ return this.jsonRpcRequest('DescribeTrails', {})
34
+ }
35
+
36
+ async getTrailStatus(name: string) {
37
+ return this.jsonRpcRequest('GetTrailStatus', { Name: name })
38
+ }
39
+
40
+ async lookupEvents(params: {
41
+ LookupAttributes?: Array<{ AttributeKey: string; AttributeValue: string }>
42
+ StartTime?: Date
43
+ EndTime?: Date
44
+ MaxResults?: number
45
+ }) {
46
+ return this.jsonRpcRequest('LookupEvents', {
47
+ ...params,
48
+ StartTime: params.StartTime?.toISOString(),
49
+ EndTime: params.EndTime?.toISOString(),
50
+ })
51
+ }
52
+
53
+ async getEventSelectors(trailName: string) {
54
+ return this.jsonRpcRequest('GetEventSelectors', { TrailName: trailName })
55
+ }
56
+
57
+ async createTrail(params: {
58
+ Name: string
59
+ S3BucketName: string
60
+ S3KeyPrefix?: string
61
+ IncludeGlobalServiceEvents?: boolean
62
+ IsMultiRegionTrail?: boolean
63
+ EnableLogFileValidation?: boolean
64
+ }) {
65
+ return this.jsonRpcRequest('CreateTrail', params)
66
+ }
67
+
68
+ async startLogging(name: string) {
69
+ return this.jsonRpcRequest('StartLogging', { Name: name })
70
+ }
71
+
72
+ async stopLogging(name: string) {
73
+ return this.jsonRpcRequest('StopLogging', { Name: name })
74
+ }
75
+
76
+ async deleteTrail(name: string) {
77
+ return this.jsonRpcRequest('DeleteTrail', { Name: name })
78
+ }
79
+ }
80
+
81
+ return new CloudTrailClient(region)
82
+ }
83
+
84
+ export function registerAuditCommands(app: CLI): void {
85
+ app
86
+ .command('audit:trails', 'List CloudTrail trails')
87
+ .option('--region <region>', 'AWS region')
88
+ .action(async (options: { region?: string }) => {
89
+ cli.header('CloudTrail Trails')
90
+
91
+ try {
92
+ const config = await loadValidatedConfig()
93
+ const region = options.region || config.project.region || 'us-east-1'
94
+ const cloudtrail = await getCloudTrailClient(region)
95
+
96
+ const spinner = new cli.Spinner('Fetching trails...')
97
+ spinner.start()
98
+
99
+ const result = await cloudtrail.describeTrails()
100
+ const trails = result.trailList || []
101
+
102
+ spinner.succeed(`Found ${trails.length} trail(s)`)
103
+
104
+ if (trails.length === 0) {
105
+ cli.info('No CloudTrail trails found')
106
+ cli.info('Use `cloud audit:create` to create a new trail')
107
+ return
108
+ }
109
+
110
+ cli.table(
111
+ ['Name', 'Multi-Region', 'S3 Bucket', 'Log Validation', 'Home Region'],
112
+ trails.map((trail: any) => [
113
+ trail.Name || 'N/A',
114
+ trail.IsMultiRegionTrail ? 'Yes' : 'No',
115
+ trail.S3BucketName || 'N/A',
116
+ trail.LogFileValidationEnabled ? 'Yes' : 'No',
117
+ trail.HomeRegion || 'N/A',
118
+ ]),
119
+ )
120
+ }
121
+ catch (error: any) {
122
+ cli.error(`Failed to list trails: ${error.message}`)
123
+ process.exit(1)
124
+ }
125
+ })
126
+
127
+ app
128
+ .command('audit:trail <trailName>', 'Show CloudTrail trail details')
129
+ .option('--region <region>', 'AWS region')
130
+ .action(async (trailName: string, options: { region?: string }) => {
131
+ cli.header(`CloudTrail: ${trailName}`)
132
+
133
+ try {
134
+ const config = await loadValidatedConfig()
135
+ const region = options.region || config.project.region || 'us-east-1'
136
+ const cloudtrail = await getCloudTrailClient(region)
137
+
138
+ const spinner = new cli.Spinner('Fetching trail details...')
139
+ spinner.start()
140
+
141
+ const [trailsResult, statusResult] = await Promise.all([
142
+ cloudtrail.describeTrails(),
143
+ cloudtrail.getTrailStatus(trailName),
144
+ ])
145
+
146
+ const trail = (trailsResult.trailList || []).find((t: any) => t.Name === trailName)
147
+
148
+ if (!trail) {
149
+ spinner.fail('Trail not found')
150
+ return
151
+ }
152
+
153
+ spinner.succeed('Trail details loaded')
154
+
155
+ cli.info('\nTrail Configuration:')
156
+ cli.info(` Name: ${trail.Name}`)
157
+ cli.info(` ARN: ${trail.TrailARN}`)
158
+ cli.info(` Home Region: ${trail.HomeRegion}`)
159
+ cli.info(` Multi-Region: ${trail.IsMultiRegionTrail ? 'Yes' : 'No'}`)
160
+ cli.info(` Organization Trail: ${trail.IsOrganizationTrail ? 'Yes' : 'No'}`)
161
+
162
+ cli.info('\nStorage:')
163
+ cli.info(` S3 Bucket: ${trail.S3BucketName}`)
164
+ if (trail.S3KeyPrefix) {
165
+ cli.info(` S3 Prefix: ${trail.S3KeyPrefix}`)
166
+ }
167
+ cli.info(` Log Validation: ${trail.LogFileValidationEnabled ? 'Enabled' : 'Disabled'}`)
168
+
169
+ if (trail.CloudWatchLogsLogGroupArn) {
170
+ cli.info('\nCloudWatch Logs:')
171
+ cli.info(` Log Group: ${trail.CloudWatchLogsLogGroupArn}`)
172
+ }
173
+
174
+ if (trail.KMSKeyId) {
175
+ cli.info('\nEncryption:')
176
+ cli.info(` KMS Key: ${trail.KMSKeyId}`)
177
+ }
178
+
179
+ cli.info('\nStatus:')
180
+ cli.info(` Logging: ${statusResult.IsLogging ? 'Active' : 'Stopped'}`)
181
+
182
+ if (statusResult.LatestDeliveryTime) {
183
+ cli.info(` Latest Delivery: ${new Date(statusResult.LatestDeliveryTime).toLocaleString()}`)
184
+ }
185
+
186
+ if (statusResult.LatestDeliveryError) {
187
+ cli.warn(` Latest Error: ${statusResult.LatestDeliveryError}`)
188
+ }
189
+
190
+ // Get event selectors
191
+ try {
192
+ const selectors = await cloudtrail.getEventSelectors(trailName)
193
+
194
+ if (selectors.EventSelectors && selectors.EventSelectors.length > 0) {
195
+ cli.info('\nEvent Selectors:')
196
+ for (const selector of selectors.EventSelectors) {
197
+ cli.info(` - Read/Write: ${selector.ReadWriteType}`)
198
+ cli.info(` Management Events: ${selector.IncludeManagementEvents ? 'Yes' : 'No'}`)
199
+ if (selector.DataResources && selector.DataResources.length > 0) {
200
+ cli.info(` Data Resources: ${selector.DataResources.length} configured`)
201
+ }
202
+ }
203
+ }
204
+ }
205
+ catch {
206
+ // Event selectors might not be available for all trails
207
+ }
208
+ }
209
+ catch (error: any) {
210
+ cli.error(`Failed to get trail: ${error.message}`)
211
+ process.exit(1)
212
+ }
213
+ })
214
+
215
+ app
216
+ .command('audit:events', 'Look up recent CloudTrail events')
217
+ .option('--region <region>', 'AWS region')
218
+ .option('--user <username>', 'Filter by IAM user')
219
+ .option('--event <eventName>', 'Filter by event name')
220
+ .option('--resource <resourceName>', 'Filter by resource name')
221
+ .option('--hours <number>', 'Hours to look back', { default: '24' })
222
+ .option('--limit <number>', 'Maximum events to return', { default: '50' })
223
+ .action(async (options: {
224
+ region?: string
225
+ user?: string
226
+ event?: string
227
+ resource?: string
228
+ hours: string
229
+ limit: string
230
+ }) => {
231
+ cli.header('CloudTrail Events')
232
+
233
+ try {
234
+ const config = await loadValidatedConfig()
235
+ const region = options.region || config.project.region || 'us-east-1'
236
+ const cloudtrail = await getCloudTrailClient(region)
237
+
238
+ const spinner = new cli.Spinner('Looking up events...')
239
+ spinner.start()
240
+
241
+ const endTime = new Date()
242
+ const startTime = new Date(endTime.getTime() - Number.parseInt(options.hours) * 60 * 60 * 1000)
243
+
244
+ const lookupParams: any = {
245
+ StartTime: startTime,
246
+ EndTime: endTime,
247
+ MaxResults: Number.parseInt(options.limit),
248
+ }
249
+
250
+ if (options.user) {
251
+ lookupParams.LookupAttributes = [{
252
+ AttributeKey: 'Username',
253
+ AttributeValue: options.user,
254
+ }]
255
+ }
256
+ else if (options.event) {
257
+ lookupParams.LookupAttributes = [{
258
+ AttributeKey: 'EventName',
259
+ AttributeValue: options.event,
260
+ }]
261
+ }
262
+ else if (options.resource) {
263
+ lookupParams.LookupAttributes = [{
264
+ AttributeKey: 'ResourceName',
265
+ AttributeValue: options.resource,
266
+ }]
267
+ }
268
+
269
+ const result = await cloudtrail.lookupEvents(lookupParams)
270
+ const events = result.Events || []
271
+
272
+ spinner.succeed(`Found ${events.length} event(s)`)
273
+
274
+ if (events.length === 0) {
275
+ cli.info('No events found matching criteria')
276
+ return
277
+ }
278
+
279
+ cli.table(
280
+ ['Time', 'Event', 'User', 'Source IP', 'Resources'],
281
+ events.map((event: any) => [
282
+ event.EventTime ? new Date(event.EventTime).toLocaleString() : 'N/A',
283
+ event.EventName || 'N/A',
284
+ event.Username || 'N/A',
285
+ event.SourceIPAddress || 'N/A',
286
+ (event.Resources || []).map((r: any) => r.ResourceName).join(', ').substring(0, 30) || '-',
287
+ ]),
288
+ )
289
+ }
290
+ catch (error: any) {
291
+ cli.error(`Failed to lookup events: ${error.message}`)
292
+ process.exit(1)
293
+ }
294
+ })
295
+
296
+ app
297
+ .command('audit:event <eventId>', 'Show CloudTrail event details')
298
+ .option('--region <region>', 'AWS region')
299
+ .action(async (eventId: string, options: { region?: string }) => {
300
+ cli.header(`Event: ${eventId}`)
301
+
302
+ try {
303
+ const config = await loadValidatedConfig()
304
+ const region = options.region || config.project.region || 'us-east-1'
305
+ const cloudtrail = await getCloudTrailClient(region)
306
+
307
+ const spinner = new cli.Spinner('Fetching event...')
308
+ spinner.start()
309
+
310
+ // Look up event by ID
311
+ const result = await cloudtrail.lookupEvents({
312
+ LookupAttributes: [{
313
+ AttributeKey: 'EventId',
314
+ AttributeValue: eventId,
315
+ }],
316
+ MaxResults: 1,
317
+ })
318
+
319
+ const event = result.Events?.[0]
320
+
321
+ if (!event) {
322
+ spinner.fail('Event not found')
323
+ return
324
+ }
325
+
326
+ spinner.succeed('Event loaded')
327
+
328
+ cli.info('\nEvent Information:')
329
+ cli.info(` Event ID: ${event.EventId}`)
330
+ cli.info(` Event Name: ${event.EventName}`)
331
+ cli.info(` Event Time: ${event.EventTime ? new Date(event.EventTime).toLocaleString() : 'N/A'}`)
332
+ cli.info(` Event Source: ${event.EventSource}`)
333
+ cli.info(` Username: ${event.Username}`)
334
+ cli.info(` Source IP: ${event.SourceIPAddress}`)
335
+ cli.info(` Access Key: ${event.AccessKeyId || 'N/A'}`)
336
+
337
+ if (event.Resources && event.Resources.length > 0) {
338
+ cli.info('\nResources:')
339
+ for (const resource of event.Resources) {
340
+ cli.info(` - ${resource.ResourceType}: ${resource.ResourceName}`)
341
+ }
342
+ }
343
+
344
+ if (event.CloudTrailEvent) {
345
+ cli.info('\nFull Event Record:')
346
+ const fullEvent = JSON.parse(event.CloudTrailEvent)
347
+ console.log(JSON.stringify(fullEvent, null, 2))
348
+ }
349
+ }
350
+ catch (error: any) {
351
+ cli.error(`Failed to get event: ${error.message}`)
352
+ process.exit(1)
353
+ }
354
+ })
355
+
356
+ app
357
+ .command('audit:create <trailName>', 'Create a new CloudTrail trail')
358
+ .option('--region <region>', 'AWS region', { default: 'us-east-1' })
359
+ .option('--bucket <name>', 'S3 bucket for logs')
360
+ .option('--prefix <prefix>', 'S3 key prefix')
361
+ .option('--multi-region', 'Enable multi-region trail')
362
+ .option('--validation', 'Enable log file validation')
363
+ .option('--global-events', 'Include global service events')
364
+ .action(async (trailName: string, options: {
365
+ region: string
366
+ bucket?: string
367
+ prefix?: string
368
+ multiRegion?: boolean
369
+ validation?: boolean
370
+ globalEvents?: boolean
371
+ }) => {
372
+ cli.header('Create CloudTrail Trail')
373
+
374
+ try {
375
+ if (!options.bucket) {
376
+ cli.error('--bucket is required')
377
+ return
378
+ }
379
+
380
+ const cloudtrail = await getCloudTrailClient(options.region)
381
+
382
+ cli.info(`Trail Name: ${trailName}`)
383
+ cli.info(`S3 Bucket: ${options.bucket}`)
384
+ cli.info(`Multi-Region: ${options.multiRegion ? 'Yes' : 'No'}`)
385
+ cli.info(`Log Validation: ${options.validation ? 'Yes' : 'No'}`)
386
+ cli.info(`Global Events: ${options.globalEvents ? 'Yes' : 'No'}`)
387
+
388
+ const confirmed = await cli.confirm('\nCreate this trail?', true)
389
+ if (!confirmed) {
390
+ cli.info('Operation cancelled')
391
+ return
392
+ }
393
+
394
+ const spinner = new cli.Spinner('Creating trail...')
395
+ spinner.start()
396
+
397
+ const result = await cloudtrail.createTrail({
398
+ Name: trailName,
399
+ S3BucketName: options.bucket,
400
+ S3KeyPrefix: options.prefix,
401
+ IsMultiRegionTrail: options.multiRegion,
402
+ EnableLogFileValidation: options.validation,
403
+ IncludeGlobalServiceEvents: options.globalEvents ?? true,
404
+ })
405
+
406
+ spinner.text = 'Starting logging...'
407
+ await cloudtrail.startLogging(trailName)
408
+
409
+ spinner.succeed('Trail created and logging started')
410
+
411
+ cli.success(`\nTrail ARN: ${result.TrailARN}`)
412
+ cli.info(`S3 Bucket: ${result.S3BucketName}`)
413
+ }
414
+ catch (error: any) {
415
+ cli.error(`Failed to create trail: ${error.message}`)
416
+ process.exit(1)
417
+ }
418
+ })
419
+
420
+ app
421
+ .command('audit:start <trailName>', 'Start CloudTrail logging')
422
+ .option('--region <region>', 'AWS region', { default: 'us-east-1' })
423
+ .action(async (trailName: string, options: { region: string }) => {
424
+ cli.header('Start CloudTrail Logging')
425
+
426
+ try {
427
+ const cloudtrail = await getCloudTrailClient(options.region)
428
+
429
+ const spinner = new cli.Spinner('Starting logging...')
430
+ spinner.start()
431
+
432
+ await cloudtrail.startLogging(trailName)
433
+
434
+ spinner.succeed('Logging started')
435
+ }
436
+ catch (error: any) {
437
+ cli.error(`Failed to start logging: ${error.message}`)
438
+ process.exit(1)
439
+ }
440
+ })
441
+
442
+ app
443
+ .command('audit:stop <trailName>', 'Stop CloudTrail logging')
444
+ .option('--region <region>', 'AWS region', { default: 'us-east-1' })
445
+ .action(async (trailName: string, options: { region: string }) => {
446
+ cli.header('Stop CloudTrail Logging')
447
+
448
+ try {
449
+ const cloudtrail = await getCloudTrailClient(options.region)
450
+
451
+ cli.warn(`This will stop logging for trail: ${trailName}`)
452
+
453
+ const confirmed = await cli.confirm('\nStop logging?', false)
454
+ if (!confirmed) {
455
+ cli.info('Operation cancelled')
456
+ return
457
+ }
458
+
459
+ const spinner = new cli.Spinner('Stopping logging...')
460
+ spinner.start()
461
+
462
+ await cloudtrail.stopLogging(trailName)
463
+
464
+ spinner.succeed('Logging stopped')
465
+ }
466
+ catch (error: any) {
467
+ cli.error(`Failed to stop logging: ${error.message}`)
468
+ process.exit(1)
469
+ }
470
+ })
471
+
472
+ app
473
+ .command('audit:delete <trailName>', 'Delete a CloudTrail trail')
474
+ .option('--region <region>', 'AWS region', { default: 'us-east-1' })
475
+ .action(async (trailName: string, options: { region: string }) => {
476
+ cli.header('Delete CloudTrail Trail')
477
+
478
+ try {
479
+ const cloudtrail = await getCloudTrailClient(options.region)
480
+
481
+ cli.warn(`This will permanently delete trail: ${trailName}`)
482
+
483
+ const confirmed = await cli.confirm('\nDelete this trail?', false)
484
+ if (!confirmed) {
485
+ cli.info('Operation cancelled')
486
+ return
487
+ }
488
+
489
+ const spinner = new cli.Spinner('Deleting trail...')
490
+ spinner.start()
491
+
492
+ await cloudtrail.deleteTrail(trailName)
493
+
494
+ spinner.succeed('Trail deleted')
495
+ }
496
+ catch (error: any) {
497
+ cli.error(`Failed to delete trail: ${error.message}`)
498
+ process.exit(1)
499
+ }
500
+ })
501
+ }