@stacksjs/ts-cloud 0.1.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE.md +21 -0
- package/README.md +321 -0
- package/bin/cli.ts +133 -0
- package/bin/commands/analytics.ts +328 -0
- package/bin/commands/api.ts +379 -0
- package/bin/commands/assets.ts +221 -0
- package/bin/commands/audit.ts +501 -0
- package/bin/commands/backup.ts +682 -0
- package/bin/commands/cache.ts +294 -0
- package/bin/commands/cdn.ts +281 -0
- package/bin/commands/config.ts +202 -0
- package/bin/commands/container.ts +105 -0
- package/bin/commands/cost.ts +208 -0
- package/bin/commands/database.ts +401 -0
- package/bin/commands/deploy.ts +674 -0
- package/bin/commands/domain.ts +397 -0
- package/bin/commands/email.ts +423 -0
- package/bin/commands/environment.ts +285 -0
- package/bin/commands/events.ts +424 -0
- package/bin/commands/firewall.ts +145 -0
- package/bin/commands/function.ts +116 -0
- package/bin/commands/generate.ts +280 -0
- package/bin/commands/git.ts +139 -0
- package/bin/commands/iam.ts +464 -0
- package/bin/commands/index.ts +48 -0
- package/bin/commands/init.ts +120 -0
- package/bin/commands/logs.ts +148 -0
- package/bin/commands/network.ts +579 -0
- package/bin/commands/notify.ts +489 -0
- package/bin/commands/queue.ts +407 -0
- package/bin/commands/scheduler.ts +370 -0
- package/bin/commands/secrets.ts +54 -0
- package/bin/commands/server.ts +629 -0
- package/bin/commands/shared.ts +97 -0
- package/bin/commands/ssl.ts +138 -0
- package/bin/commands/stack.ts +325 -0
- package/bin/commands/status.ts +385 -0
- package/bin/commands/storage.ts +450 -0
- package/bin/commands/team.ts +96 -0
- package/bin/commands/tunnel.ts +489 -0
- package/bin/commands/utils.ts +202 -0
- package/build.ts +15 -0
- package/cloud +2 -0
- package/package.json +99 -0
- package/src/aws/acm.ts +768 -0
- package/src/aws/application-autoscaling.ts +845 -0
- package/src/aws/bedrock.ts +4074 -0
- package/src/aws/client.ts +878 -0
- package/src/aws/cloudformation.ts +896 -0
- package/src/aws/cloudfront.ts +1531 -0
- package/src/aws/cloudwatch-logs.ts +154 -0
- package/src/aws/comprehend.ts +839 -0
- package/src/aws/connect.ts +1056 -0
- package/src/aws/deploy-imap.ts +384 -0
- package/src/aws/dynamodb.ts +340 -0
- package/src/aws/ec2.ts +1385 -0
- package/src/aws/ecr.ts +621 -0
- package/src/aws/ecs.ts +615 -0
- package/src/aws/elasticache.ts +301 -0
- package/src/aws/elbv2.ts +942 -0
- package/src/aws/email.ts +928 -0
- package/src/aws/eventbridge.ts +248 -0
- package/src/aws/iam.ts +1689 -0
- package/src/aws/imap-server.ts +2100 -0
- package/src/aws/index.ts +213 -0
- package/src/aws/kendra.ts +1097 -0
- package/src/aws/lambda.ts +786 -0
- package/src/aws/opensearch.ts +158 -0
- package/src/aws/personalize.ts +977 -0
- package/src/aws/polly.ts +559 -0
- package/src/aws/rds.ts +888 -0
- package/src/aws/rekognition.ts +846 -0
- package/src/aws/route53-domains.ts +359 -0
- package/src/aws/route53.ts +1046 -0
- package/src/aws/s3.ts +2318 -0
- package/src/aws/scheduler.ts +571 -0
- package/src/aws/secrets-manager.ts +769 -0
- package/src/aws/ses.ts +1081 -0
- package/src/aws/setup-phone.ts +104 -0
- package/src/aws/setup-sms.ts +580 -0
- package/src/aws/sms.ts +1735 -0
- package/src/aws/smtp-server.ts +531 -0
- package/src/aws/sns.ts +758 -0
- package/src/aws/sqs.ts +382 -0
- package/src/aws/ssm.ts +807 -0
- package/src/aws/sts.ts +92 -0
- package/src/aws/support.ts +391 -0
- package/src/aws/test-imap.ts +86 -0
- package/src/aws/textract.ts +780 -0
- package/src/aws/transcribe.ts +108 -0
- package/src/aws/translate.ts +641 -0
- package/src/aws/voice.ts +1379 -0
- package/src/config.ts +35 -0
- package/src/deploy/index.ts +7 -0
- package/src/deploy/static-site-external-dns.ts +906 -0
- package/src/deploy/static-site.ts +1125 -0
- package/src/dns/godaddy.ts +412 -0
- package/src/dns/index.ts +183 -0
- package/src/dns/porkbun.ts +362 -0
- package/src/dns/route53-adapter.ts +414 -0
- package/src/dns/types.ts +114 -0
- package/src/dns/validator.ts +369 -0
- package/src/generators/index.ts +5 -0
- package/src/generators/infrastructure.ts +1660 -0
- package/src/index.ts +163 -0
- package/src/push/apns.ts +452 -0
- package/src/push/fcm.ts +506 -0
- package/src/push/index.ts +58 -0
- package/src/ssl/acme-client.ts +478 -0
- package/src/ssl/index.ts +7 -0
- package/src/ssl/letsencrypt.ts +747 -0
- package/src/types.ts +2 -0
- package/src/utils/cli.ts +398 -0
- package/src/validation/index.ts +5 -0
- package/src/validation/template.ts +405 -0
- package/test/index.test.ts +128 -0
- package/tsconfig.json +18 -0
|
@@ -0,0 +1,501 @@
|
|
|
1
|
+
import type { CLI } from '@stacksjs/clapp'
|
|
2
|
+
import * as cli from '../../src/utils/cli'
|
|
3
|
+
import { loadValidatedConfig } from './shared'
|
|
4
|
+
|
|
5
|
+
// CloudTrail client will be created inline since it may not exist
|
|
6
|
+
async function getCloudTrailClient(region: string) {
|
|
7
|
+
const { AWSClient } = await import('../../src/aws/client')
|
|
8
|
+
|
|
9
|
+
class CloudTrailClient {
|
|
10
|
+
private client: InstanceType<typeof AWSClient>
|
|
11
|
+
private region: string
|
|
12
|
+
|
|
13
|
+
constructor(region: string) {
|
|
14
|
+
this.region = region
|
|
15
|
+
this.client = new AWSClient()
|
|
16
|
+
}
|
|
17
|
+
|
|
18
|
+
private async jsonRpcRequest(action: string, params: Record<string, any>): Promise<any> {
|
|
19
|
+
return this.client.request({
|
|
20
|
+
service: 'cloudtrail',
|
|
21
|
+
region: this.region,
|
|
22
|
+
method: 'POST',
|
|
23
|
+
path: '/',
|
|
24
|
+
headers: {
|
|
25
|
+
'Content-Type': 'application/x-amz-json-1.1',
|
|
26
|
+
'X-Amz-Target': `com.amazonaws.cloudtrail.v20131101.CloudTrail_20131101.${action}`,
|
|
27
|
+
},
|
|
28
|
+
body: JSON.stringify(params),
|
|
29
|
+
})
|
|
30
|
+
}
|
|
31
|
+
|
|
32
|
+
async describeTrails() {
|
|
33
|
+
return this.jsonRpcRequest('DescribeTrails', {})
|
|
34
|
+
}
|
|
35
|
+
|
|
36
|
+
async getTrailStatus(name: string) {
|
|
37
|
+
return this.jsonRpcRequest('GetTrailStatus', { Name: name })
|
|
38
|
+
}
|
|
39
|
+
|
|
40
|
+
async lookupEvents(params: {
|
|
41
|
+
LookupAttributes?: Array<{ AttributeKey: string; AttributeValue: string }>
|
|
42
|
+
StartTime?: Date
|
|
43
|
+
EndTime?: Date
|
|
44
|
+
MaxResults?: number
|
|
45
|
+
}) {
|
|
46
|
+
return this.jsonRpcRequest('LookupEvents', {
|
|
47
|
+
...params,
|
|
48
|
+
StartTime: params.StartTime?.toISOString(),
|
|
49
|
+
EndTime: params.EndTime?.toISOString(),
|
|
50
|
+
})
|
|
51
|
+
}
|
|
52
|
+
|
|
53
|
+
async getEventSelectors(trailName: string) {
|
|
54
|
+
return this.jsonRpcRequest('GetEventSelectors', { TrailName: trailName })
|
|
55
|
+
}
|
|
56
|
+
|
|
57
|
+
async createTrail(params: {
|
|
58
|
+
Name: string
|
|
59
|
+
S3BucketName: string
|
|
60
|
+
S3KeyPrefix?: string
|
|
61
|
+
IncludeGlobalServiceEvents?: boolean
|
|
62
|
+
IsMultiRegionTrail?: boolean
|
|
63
|
+
EnableLogFileValidation?: boolean
|
|
64
|
+
}) {
|
|
65
|
+
return this.jsonRpcRequest('CreateTrail', params)
|
|
66
|
+
}
|
|
67
|
+
|
|
68
|
+
async startLogging(name: string) {
|
|
69
|
+
return this.jsonRpcRequest('StartLogging', { Name: name })
|
|
70
|
+
}
|
|
71
|
+
|
|
72
|
+
async stopLogging(name: string) {
|
|
73
|
+
return this.jsonRpcRequest('StopLogging', { Name: name })
|
|
74
|
+
}
|
|
75
|
+
|
|
76
|
+
async deleteTrail(name: string) {
|
|
77
|
+
return this.jsonRpcRequest('DeleteTrail', { Name: name })
|
|
78
|
+
}
|
|
79
|
+
}
|
|
80
|
+
|
|
81
|
+
return new CloudTrailClient(region)
|
|
82
|
+
}
|
|
83
|
+
|
|
84
|
+
export function registerAuditCommands(app: CLI): void {
|
|
85
|
+
app
|
|
86
|
+
.command('audit:trails', 'List CloudTrail trails')
|
|
87
|
+
.option('--region <region>', 'AWS region')
|
|
88
|
+
.action(async (options: { region?: string }) => {
|
|
89
|
+
cli.header('CloudTrail Trails')
|
|
90
|
+
|
|
91
|
+
try {
|
|
92
|
+
const config = await loadValidatedConfig()
|
|
93
|
+
const region = options.region || config.project.region || 'us-east-1'
|
|
94
|
+
const cloudtrail = await getCloudTrailClient(region)
|
|
95
|
+
|
|
96
|
+
const spinner = new cli.Spinner('Fetching trails...')
|
|
97
|
+
spinner.start()
|
|
98
|
+
|
|
99
|
+
const result = await cloudtrail.describeTrails()
|
|
100
|
+
const trails = result.trailList || []
|
|
101
|
+
|
|
102
|
+
spinner.succeed(`Found ${trails.length} trail(s)`)
|
|
103
|
+
|
|
104
|
+
if (trails.length === 0) {
|
|
105
|
+
cli.info('No CloudTrail trails found')
|
|
106
|
+
cli.info('Use `cloud audit:create` to create a new trail')
|
|
107
|
+
return
|
|
108
|
+
}
|
|
109
|
+
|
|
110
|
+
cli.table(
|
|
111
|
+
['Name', 'Multi-Region', 'S3 Bucket', 'Log Validation', 'Home Region'],
|
|
112
|
+
trails.map((trail: any) => [
|
|
113
|
+
trail.Name || 'N/A',
|
|
114
|
+
trail.IsMultiRegionTrail ? 'Yes' : 'No',
|
|
115
|
+
trail.S3BucketName || 'N/A',
|
|
116
|
+
trail.LogFileValidationEnabled ? 'Yes' : 'No',
|
|
117
|
+
trail.HomeRegion || 'N/A',
|
|
118
|
+
]),
|
|
119
|
+
)
|
|
120
|
+
}
|
|
121
|
+
catch (error: any) {
|
|
122
|
+
cli.error(`Failed to list trails: ${error.message}`)
|
|
123
|
+
process.exit(1)
|
|
124
|
+
}
|
|
125
|
+
})
|
|
126
|
+
|
|
127
|
+
app
|
|
128
|
+
.command('audit:trail <trailName>', 'Show CloudTrail trail details')
|
|
129
|
+
.option('--region <region>', 'AWS region')
|
|
130
|
+
.action(async (trailName: string, options: { region?: string }) => {
|
|
131
|
+
cli.header(`CloudTrail: ${trailName}`)
|
|
132
|
+
|
|
133
|
+
try {
|
|
134
|
+
const config = await loadValidatedConfig()
|
|
135
|
+
const region = options.region || config.project.region || 'us-east-1'
|
|
136
|
+
const cloudtrail = await getCloudTrailClient(region)
|
|
137
|
+
|
|
138
|
+
const spinner = new cli.Spinner('Fetching trail details...')
|
|
139
|
+
spinner.start()
|
|
140
|
+
|
|
141
|
+
const [trailsResult, statusResult] = await Promise.all([
|
|
142
|
+
cloudtrail.describeTrails(),
|
|
143
|
+
cloudtrail.getTrailStatus(trailName),
|
|
144
|
+
])
|
|
145
|
+
|
|
146
|
+
const trail = (trailsResult.trailList || []).find((t: any) => t.Name === trailName)
|
|
147
|
+
|
|
148
|
+
if (!trail) {
|
|
149
|
+
spinner.fail('Trail not found')
|
|
150
|
+
return
|
|
151
|
+
}
|
|
152
|
+
|
|
153
|
+
spinner.succeed('Trail details loaded')
|
|
154
|
+
|
|
155
|
+
cli.info('\nTrail Configuration:')
|
|
156
|
+
cli.info(` Name: ${trail.Name}`)
|
|
157
|
+
cli.info(` ARN: ${trail.TrailARN}`)
|
|
158
|
+
cli.info(` Home Region: ${trail.HomeRegion}`)
|
|
159
|
+
cli.info(` Multi-Region: ${trail.IsMultiRegionTrail ? 'Yes' : 'No'}`)
|
|
160
|
+
cli.info(` Organization Trail: ${trail.IsOrganizationTrail ? 'Yes' : 'No'}`)
|
|
161
|
+
|
|
162
|
+
cli.info('\nStorage:')
|
|
163
|
+
cli.info(` S3 Bucket: ${trail.S3BucketName}`)
|
|
164
|
+
if (trail.S3KeyPrefix) {
|
|
165
|
+
cli.info(` S3 Prefix: ${trail.S3KeyPrefix}`)
|
|
166
|
+
}
|
|
167
|
+
cli.info(` Log Validation: ${trail.LogFileValidationEnabled ? 'Enabled' : 'Disabled'}`)
|
|
168
|
+
|
|
169
|
+
if (trail.CloudWatchLogsLogGroupArn) {
|
|
170
|
+
cli.info('\nCloudWatch Logs:')
|
|
171
|
+
cli.info(` Log Group: ${trail.CloudWatchLogsLogGroupArn}`)
|
|
172
|
+
}
|
|
173
|
+
|
|
174
|
+
if (trail.KMSKeyId) {
|
|
175
|
+
cli.info('\nEncryption:')
|
|
176
|
+
cli.info(` KMS Key: ${trail.KMSKeyId}`)
|
|
177
|
+
}
|
|
178
|
+
|
|
179
|
+
cli.info('\nStatus:')
|
|
180
|
+
cli.info(` Logging: ${statusResult.IsLogging ? 'Active' : 'Stopped'}`)
|
|
181
|
+
|
|
182
|
+
if (statusResult.LatestDeliveryTime) {
|
|
183
|
+
cli.info(` Latest Delivery: ${new Date(statusResult.LatestDeliveryTime).toLocaleString()}`)
|
|
184
|
+
}
|
|
185
|
+
|
|
186
|
+
if (statusResult.LatestDeliveryError) {
|
|
187
|
+
cli.warn(` Latest Error: ${statusResult.LatestDeliveryError}`)
|
|
188
|
+
}
|
|
189
|
+
|
|
190
|
+
// Get event selectors
|
|
191
|
+
try {
|
|
192
|
+
const selectors = await cloudtrail.getEventSelectors(trailName)
|
|
193
|
+
|
|
194
|
+
if (selectors.EventSelectors && selectors.EventSelectors.length > 0) {
|
|
195
|
+
cli.info('\nEvent Selectors:')
|
|
196
|
+
for (const selector of selectors.EventSelectors) {
|
|
197
|
+
cli.info(` - Read/Write: ${selector.ReadWriteType}`)
|
|
198
|
+
cli.info(` Management Events: ${selector.IncludeManagementEvents ? 'Yes' : 'No'}`)
|
|
199
|
+
if (selector.DataResources && selector.DataResources.length > 0) {
|
|
200
|
+
cli.info(` Data Resources: ${selector.DataResources.length} configured`)
|
|
201
|
+
}
|
|
202
|
+
}
|
|
203
|
+
}
|
|
204
|
+
}
|
|
205
|
+
catch {
|
|
206
|
+
// Event selectors might not be available for all trails
|
|
207
|
+
}
|
|
208
|
+
}
|
|
209
|
+
catch (error: any) {
|
|
210
|
+
cli.error(`Failed to get trail: ${error.message}`)
|
|
211
|
+
process.exit(1)
|
|
212
|
+
}
|
|
213
|
+
})
|
|
214
|
+
|
|
215
|
+
app
|
|
216
|
+
.command('audit:events', 'Look up recent CloudTrail events')
|
|
217
|
+
.option('--region <region>', 'AWS region')
|
|
218
|
+
.option('--user <username>', 'Filter by IAM user')
|
|
219
|
+
.option('--event <eventName>', 'Filter by event name')
|
|
220
|
+
.option('--resource <resourceName>', 'Filter by resource name')
|
|
221
|
+
.option('--hours <number>', 'Hours to look back', { default: '24' })
|
|
222
|
+
.option('--limit <number>', 'Maximum events to return', { default: '50' })
|
|
223
|
+
.action(async (options: {
|
|
224
|
+
region?: string
|
|
225
|
+
user?: string
|
|
226
|
+
event?: string
|
|
227
|
+
resource?: string
|
|
228
|
+
hours: string
|
|
229
|
+
limit: string
|
|
230
|
+
}) => {
|
|
231
|
+
cli.header('CloudTrail Events')
|
|
232
|
+
|
|
233
|
+
try {
|
|
234
|
+
const config = await loadValidatedConfig()
|
|
235
|
+
const region = options.region || config.project.region || 'us-east-1'
|
|
236
|
+
const cloudtrail = await getCloudTrailClient(region)
|
|
237
|
+
|
|
238
|
+
const spinner = new cli.Spinner('Looking up events...')
|
|
239
|
+
spinner.start()
|
|
240
|
+
|
|
241
|
+
const endTime = new Date()
|
|
242
|
+
const startTime = new Date(endTime.getTime() - Number.parseInt(options.hours) * 60 * 60 * 1000)
|
|
243
|
+
|
|
244
|
+
const lookupParams: any = {
|
|
245
|
+
StartTime: startTime,
|
|
246
|
+
EndTime: endTime,
|
|
247
|
+
MaxResults: Number.parseInt(options.limit),
|
|
248
|
+
}
|
|
249
|
+
|
|
250
|
+
if (options.user) {
|
|
251
|
+
lookupParams.LookupAttributes = [{
|
|
252
|
+
AttributeKey: 'Username',
|
|
253
|
+
AttributeValue: options.user,
|
|
254
|
+
}]
|
|
255
|
+
}
|
|
256
|
+
else if (options.event) {
|
|
257
|
+
lookupParams.LookupAttributes = [{
|
|
258
|
+
AttributeKey: 'EventName',
|
|
259
|
+
AttributeValue: options.event,
|
|
260
|
+
}]
|
|
261
|
+
}
|
|
262
|
+
else if (options.resource) {
|
|
263
|
+
lookupParams.LookupAttributes = [{
|
|
264
|
+
AttributeKey: 'ResourceName',
|
|
265
|
+
AttributeValue: options.resource,
|
|
266
|
+
}]
|
|
267
|
+
}
|
|
268
|
+
|
|
269
|
+
const result = await cloudtrail.lookupEvents(lookupParams)
|
|
270
|
+
const events = result.Events || []
|
|
271
|
+
|
|
272
|
+
spinner.succeed(`Found ${events.length} event(s)`)
|
|
273
|
+
|
|
274
|
+
if (events.length === 0) {
|
|
275
|
+
cli.info('No events found matching criteria')
|
|
276
|
+
return
|
|
277
|
+
}
|
|
278
|
+
|
|
279
|
+
cli.table(
|
|
280
|
+
['Time', 'Event', 'User', 'Source IP', 'Resources'],
|
|
281
|
+
events.map((event: any) => [
|
|
282
|
+
event.EventTime ? new Date(event.EventTime).toLocaleString() : 'N/A',
|
|
283
|
+
event.EventName || 'N/A',
|
|
284
|
+
event.Username || 'N/A',
|
|
285
|
+
event.SourceIPAddress || 'N/A',
|
|
286
|
+
(event.Resources || []).map((r: any) => r.ResourceName).join(', ').substring(0, 30) || '-',
|
|
287
|
+
]),
|
|
288
|
+
)
|
|
289
|
+
}
|
|
290
|
+
catch (error: any) {
|
|
291
|
+
cli.error(`Failed to lookup events: ${error.message}`)
|
|
292
|
+
process.exit(1)
|
|
293
|
+
}
|
|
294
|
+
})
|
|
295
|
+
|
|
296
|
+
app
|
|
297
|
+
.command('audit:event <eventId>', 'Show CloudTrail event details')
|
|
298
|
+
.option('--region <region>', 'AWS region')
|
|
299
|
+
.action(async (eventId: string, options: { region?: string }) => {
|
|
300
|
+
cli.header(`Event: ${eventId}`)
|
|
301
|
+
|
|
302
|
+
try {
|
|
303
|
+
const config = await loadValidatedConfig()
|
|
304
|
+
const region = options.region || config.project.region || 'us-east-1'
|
|
305
|
+
const cloudtrail = await getCloudTrailClient(region)
|
|
306
|
+
|
|
307
|
+
const spinner = new cli.Spinner('Fetching event...')
|
|
308
|
+
spinner.start()
|
|
309
|
+
|
|
310
|
+
// Look up event by ID
|
|
311
|
+
const result = await cloudtrail.lookupEvents({
|
|
312
|
+
LookupAttributes: [{
|
|
313
|
+
AttributeKey: 'EventId',
|
|
314
|
+
AttributeValue: eventId,
|
|
315
|
+
}],
|
|
316
|
+
MaxResults: 1,
|
|
317
|
+
})
|
|
318
|
+
|
|
319
|
+
const event = result.Events?.[0]
|
|
320
|
+
|
|
321
|
+
if (!event) {
|
|
322
|
+
spinner.fail('Event not found')
|
|
323
|
+
return
|
|
324
|
+
}
|
|
325
|
+
|
|
326
|
+
spinner.succeed('Event loaded')
|
|
327
|
+
|
|
328
|
+
cli.info('\nEvent Information:')
|
|
329
|
+
cli.info(` Event ID: ${event.EventId}`)
|
|
330
|
+
cli.info(` Event Name: ${event.EventName}`)
|
|
331
|
+
cli.info(` Event Time: ${event.EventTime ? new Date(event.EventTime).toLocaleString() : 'N/A'}`)
|
|
332
|
+
cli.info(` Event Source: ${event.EventSource}`)
|
|
333
|
+
cli.info(` Username: ${event.Username}`)
|
|
334
|
+
cli.info(` Source IP: ${event.SourceIPAddress}`)
|
|
335
|
+
cli.info(` Access Key: ${event.AccessKeyId || 'N/A'}`)
|
|
336
|
+
|
|
337
|
+
if (event.Resources && event.Resources.length > 0) {
|
|
338
|
+
cli.info('\nResources:')
|
|
339
|
+
for (const resource of event.Resources) {
|
|
340
|
+
cli.info(` - ${resource.ResourceType}: ${resource.ResourceName}`)
|
|
341
|
+
}
|
|
342
|
+
}
|
|
343
|
+
|
|
344
|
+
if (event.CloudTrailEvent) {
|
|
345
|
+
cli.info('\nFull Event Record:')
|
|
346
|
+
const fullEvent = JSON.parse(event.CloudTrailEvent)
|
|
347
|
+
console.log(JSON.stringify(fullEvent, null, 2))
|
|
348
|
+
}
|
|
349
|
+
}
|
|
350
|
+
catch (error: any) {
|
|
351
|
+
cli.error(`Failed to get event: ${error.message}`)
|
|
352
|
+
process.exit(1)
|
|
353
|
+
}
|
|
354
|
+
})
|
|
355
|
+
|
|
356
|
+
app
|
|
357
|
+
.command('audit:create <trailName>', 'Create a new CloudTrail trail')
|
|
358
|
+
.option('--region <region>', 'AWS region', { default: 'us-east-1' })
|
|
359
|
+
.option('--bucket <name>', 'S3 bucket for logs')
|
|
360
|
+
.option('--prefix <prefix>', 'S3 key prefix')
|
|
361
|
+
.option('--multi-region', 'Enable multi-region trail')
|
|
362
|
+
.option('--validation', 'Enable log file validation')
|
|
363
|
+
.option('--global-events', 'Include global service events')
|
|
364
|
+
.action(async (trailName: string, options: {
|
|
365
|
+
region: string
|
|
366
|
+
bucket?: string
|
|
367
|
+
prefix?: string
|
|
368
|
+
multiRegion?: boolean
|
|
369
|
+
validation?: boolean
|
|
370
|
+
globalEvents?: boolean
|
|
371
|
+
}) => {
|
|
372
|
+
cli.header('Create CloudTrail Trail')
|
|
373
|
+
|
|
374
|
+
try {
|
|
375
|
+
if (!options.bucket) {
|
|
376
|
+
cli.error('--bucket is required')
|
|
377
|
+
return
|
|
378
|
+
}
|
|
379
|
+
|
|
380
|
+
const cloudtrail = await getCloudTrailClient(options.region)
|
|
381
|
+
|
|
382
|
+
cli.info(`Trail Name: ${trailName}`)
|
|
383
|
+
cli.info(`S3 Bucket: ${options.bucket}`)
|
|
384
|
+
cli.info(`Multi-Region: ${options.multiRegion ? 'Yes' : 'No'}`)
|
|
385
|
+
cli.info(`Log Validation: ${options.validation ? 'Yes' : 'No'}`)
|
|
386
|
+
cli.info(`Global Events: ${options.globalEvents ? 'Yes' : 'No'}`)
|
|
387
|
+
|
|
388
|
+
const confirmed = await cli.confirm('\nCreate this trail?', true)
|
|
389
|
+
if (!confirmed) {
|
|
390
|
+
cli.info('Operation cancelled')
|
|
391
|
+
return
|
|
392
|
+
}
|
|
393
|
+
|
|
394
|
+
const spinner = new cli.Spinner('Creating trail...')
|
|
395
|
+
spinner.start()
|
|
396
|
+
|
|
397
|
+
const result = await cloudtrail.createTrail({
|
|
398
|
+
Name: trailName,
|
|
399
|
+
S3BucketName: options.bucket,
|
|
400
|
+
S3KeyPrefix: options.prefix,
|
|
401
|
+
IsMultiRegionTrail: options.multiRegion,
|
|
402
|
+
EnableLogFileValidation: options.validation,
|
|
403
|
+
IncludeGlobalServiceEvents: options.globalEvents ?? true,
|
|
404
|
+
})
|
|
405
|
+
|
|
406
|
+
spinner.text = 'Starting logging...'
|
|
407
|
+
await cloudtrail.startLogging(trailName)
|
|
408
|
+
|
|
409
|
+
spinner.succeed('Trail created and logging started')
|
|
410
|
+
|
|
411
|
+
cli.success(`\nTrail ARN: ${result.TrailARN}`)
|
|
412
|
+
cli.info(`S3 Bucket: ${result.S3BucketName}`)
|
|
413
|
+
}
|
|
414
|
+
catch (error: any) {
|
|
415
|
+
cli.error(`Failed to create trail: ${error.message}`)
|
|
416
|
+
process.exit(1)
|
|
417
|
+
}
|
|
418
|
+
})
|
|
419
|
+
|
|
420
|
+
app
|
|
421
|
+
.command('audit:start <trailName>', 'Start CloudTrail logging')
|
|
422
|
+
.option('--region <region>', 'AWS region', { default: 'us-east-1' })
|
|
423
|
+
.action(async (trailName: string, options: { region: string }) => {
|
|
424
|
+
cli.header('Start CloudTrail Logging')
|
|
425
|
+
|
|
426
|
+
try {
|
|
427
|
+
const cloudtrail = await getCloudTrailClient(options.region)
|
|
428
|
+
|
|
429
|
+
const spinner = new cli.Spinner('Starting logging...')
|
|
430
|
+
spinner.start()
|
|
431
|
+
|
|
432
|
+
await cloudtrail.startLogging(trailName)
|
|
433
|
+
|
|
434
|
+
spinner.succeed('Logging started')
|
|
435
|
+
}
|
|
436
|
+
catch (error: any) {
|
|
437
|
+
cli.error(`Failed to start logging: ${error.message}`)
|
|
438
|
+
process.exit(1)
|
|
439
|
+
}
|
|
440
|
+
})
|
|
441
|
+
|
|
442
|
+
app
|
|
443
|
+
.command('audit:stop <trailName>', 'Stop CloudTrail logging')
|
|
444
|
+
.option('--region <region>', 'AWS region', { default: 'us-east-1' })
|
|
445
|
+
.action(async (trailName: string, options: { region: string }) => {
|
|
446
|
+
cli.header('Stop CloudTrail Logging')
|
|
447
|
+
|
|
448
|
+
try {
|
|
449
|
+
const cloudtrail = await getCloudTrailClient(options.region)
|
|
450
|
+
|
|
451
|
+
cli.warn(`This will stop logging for trail: ${trailName}`)
|
|
452
|
+
|
|
453
|
+
const confirmed = await cli.confirm('\nStop logging?', false)
|
|
454
|
+
if (!confirmed) {
|
|
455
|
+
cli.info('Operation cancelled')
|
|
456
|
+
return
|
|
457
|
+
}
|
|
458
|
+
|
|
459
|
+
const spinner = new cli.Spinner('Stopping logging...')
|
|
460
|
+
spinner.start()
|
|
461
|
+
|
|
462
|
+
await cloudtrail.stopLogging(trailName)
|
|
463
|
+
|
|
464
|
+
spinner.succeed('Logging stopped')
|
|
465
|
+
}
|
|
466
|
+
catch (error: any) {
|
|
467
|
+
cli.error(`Failed to stop logging: ${error.message}`)
|
|
468
|
+
process.exit(1)
|
|
469
|
+
}
|
|
470
|
+
})
|
|
471
|
+
|
|
472
|
+
app
|
|
473
|
+
.command('audit:delete <trailName>', 'Delete a CloudTrail trail')
|
|
474
|
+
.option('--region <region>', 'AWS region', { default: 'us-east-1' })
|
|
475
|
+
.action(async (trailName: string, options: { region: string }) => {
|
|
476
|
+
cli.header('Delete CloudTrail Trail')
|
|
477
|
+
|
|
478
|
+
try {
|
|
479
|
+
const cloudtrail = await getCloudTrailClient(options.region)
|
|
480
|
+
|
|
481
|
+
cli.warn(`This will permanently delete trail: ${trailName}`)
|
|
482
|
+
|
|
483
|
+
const confirmed = await cli.confirm('\nDelete this trail?', false)
|
|
484
|
+
if (!confirmed) {
|
|
485
|
+
cli.info('Operation cancelled')
|
|
486
|
+
return
|
|
487
|
+
}
|
|
488
|
+
|
|
489
|
+
const spinner = new cli.Spinner('Deleting trail...')
|
|
490
|
+
spinner.start()
|
|
491
|
+
|
|
492
|
+
await cloudtrail.deleteTrail(trailName)
|
|
493
|
+
|
|
494
|
+
spinner.succeed('Trail deleted')
|
|
495
|
+
}
|
|
496
|
+
catch (error: any) {
|
|
497
|
+
cli.error(`Failed to delete trail: ${error.message}`)
|
|
498
|
+
process.exit(1)
|
|
499
|
+
}
|
|
500
|
+
})
|
|
501
|
+
}
|