@stacksjs/ts-cloud 0.1.7 → 0.1.9

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (77) hide show
  1. package/dist/aws/s3.d.ts +1 -1
  2. package/dist/bin/cli.js +223 -222
  3. package/dist/index.js +132 -132
  4. package/package.json +18 -16
  5. package/src/aws/acm.ts +768 -0
  6. package/src/aws/application-autoscaling.ts +845 -0
  7. package/src/aws/bedrock.ts +4074 -0
  8. package/src/aws/client.ts +891 -0
  9. package/src/aws/cloudformation.ts +896 -0
  10. package/src/aws/cloudfront.ts +1531 -0
  11. package/src/aws/cloudwatch-logs.ts +154 -0
  12. package/src/aws/comprehend.ts +839 -0
  13. package/src/aws/connect.ts +1056 -0
  14. package/src/aws/deploy-imap.ts +384 -0
  15. package/src/aws/dynamodb.ts +340 -0
  16. package/src/aws/ec2.ts +1385 -0
  17. package/src/aws/ecr.ts +621 -0
  18. package/src/aws/ecs.ts +615 -0
  19. package/src/aws/elasticache.ts +301 -0
  20. package/src/aws/elbv2.ts +942 -0
  21. package/src/aws/email.ts +928 -0
  22. package/src/aws/eventbridge.ts +248 -0
  23. package/src/aws/iam.ts +1689 -0
  24. package/src/aws/imap-server.ts +2100 -0
  25. package/src/aws/index.ts +213 -0
  26. package/src/aws/kendra.ts +1097 -0
  27. package/src/aws/lambda.ts +786 -0
  28. package/src/aws/opensearch.ts +158 -0
  29. package/src/aws/personalize.ts +977 -0
  30. package/src/aws/polly.ts +559 -0
  31. package/src/aws/rds.ts +888 -0
  32. package/src/aws/rekognition.ts +846 -0
  33. package/src/aws/route53-domains.ts +359 -0
  34. package/src/aws/route53.ts +1046 -0
  35. package/src/aws/s3.ts +2334 -0
  36. package/src/aws/scheduler.ts +571 -0
  37. package/src/aws/secrets-manager.ts +769 -0
  38. package/src/aws/ses.ts +1081 -0
  39. package/src/aws/setup-phone.ts +104 -0
  40. package/src/aws/setup-sms.ts +580 -0
  41. package/src/aws/sms.ts +1735 -0
  42. package/src/aws/smtp-server.ts +531 -0
  43. package/src/aws/sns.ts +758 -0
  44. package/src/aws/sqs.ts +382 -0
  45. package/src/aws/ssm.ts +807 -0
  46. package/src/aws/sts.ts +92 -0
  47. package/src/aws/support.ts +391 -0
  48. package/src/aws/test-imap.ts +86 -0
  49. package/src/aws/textract.ts +780 -0
  50. package/src/aws/transcribe.ts +108 -0
  51. package/src/aws/translate.ts +641 -0
  52. package/src/aws/voice.ts +1379 -0
  53. package/src/config.ts +35 -0
  54. package/src/deploy/index.ts +7 -0
  55. package/src/deploy/static-site-external-dns.ts +945 -0
  56. package/src/deploy/static-site.ts +1175 -0
  57. package/src/dns/cloudflare.ts +548 -0
  58. package/src/dns/godaddy.ts +412 -0
  59. package/src/dns/index.ts +205 -0
  60. package/src/dns/porkbun.ts +362 -0
  61. package/src/dns/route53-adapter.ts +414 -0
  62. package/src/dns/types.ts +119 -0
  63. package/src/dns/validator.ts +369 -0
  64. package/src/generators/index.ts +5 -0
  65. package/src/generators/infrastructure.ts +1660 -0
  66. package/src/index.ts +163 -0
  67. package/src/push/apns.ts +452 -0
  68. package/src/push/fcm.ts +506 -0
  69. package/src/push/index.ts +58 -0
  70. package/src/security/pre-deploy-scanner.ts +655 -0
  71. package/src/ssl/acme-client.ts +478 -0
  72. package/src/ssl/index.ts +7 -0
  73. package/src/ssl/letsencrypt.ts +747 -0
  74. package/src/types.ts +2 -0
  75. package/src/utils/cli.ts +398 -0
  76. package/src/validation/index.ts +5 -0
  77. package/src/validation/template.ts +405 -0
@@ -0,0 +1,369 @@
1
+ /**
2
+ * Unified DNS Validator for ACM Certificates
3
+ * Works with any DNS provider (Route53, Porkbun, GoDaddy, etc.)
4
+ */
5
+
6
+ import { ACMClient } from '../aws/acm'
7
+ import type { DnsProvider, DnsProviderConfig } from './types'
8
+ import { createDnsProvider } from './index'
9
+
10
+ export interface ValidationRecord {
11
+ domainName: string
12
+ recordName: string
13
+ recordType: string
14
+ recordValue: string
15
+ }
16
+
17
+ export interface CertificateValidationResult {
18
+ certificateArn: string
19
+ validationRecords: ValidationRecord[]
20
+ isNew: boolean
21
+ status: 'pending' | 'issued' | 'failed'
22
+ }
23
+
24
+ /**
25
+ * Unified DNS Validator
26
+ * Handles ACM certificate validation with any DNS provider
27
+ */
28
+ export class UnifiedDnsValidator {
29
+ private acm: ACMClient
30
+ private dnsProvider: DnsProvider
31
+
32
+ constructor(
33
+ dnsProvider: DnsProvider | DnsProviderConfig,
34
+ acmRegion: string = 'us-east-1',
35
+ ) {
36
+ this.acm = new ACMClient(acmRegion)
37
+
38
+ if ('provider' in dnsProvider) {
39
+ this.dnsProvider = createDnsProvider(dnsProvider)
40
+ }
41
+ else {
42
+ this.dnsProvider = dnsProvider
43
+ }
44
+ }
45
+
46
+ /**
47
+ * Get the DNS provider being used
48
+ */
49
+ getProvider(): DnsProvider {
50
+ return this.dnsProvider
51
+ }
52
+
53
+ /**
54
+ * Request a certificate and create DNS validation records
55
+ */
56
+ async requestAndValidate(params: {
57
+ domainName: string
58
+ subjectAlternativeNames?: string[]
59
+ waitForValidation?: boolean
60
+ maxWaitMinutes?: number
61
+ }): Promise<CertificateValidationResult> {
62
+ const {
63
+ domainName,
64
+ subjectAlternativeNames = [],
65
+ waitForValidation = false,
66
+ maxWaitMinutes = 30,
67
+ } = params
68
+
69
+ // Request certificate from ACM
70
+ const { CertificateArn } = await this.acm.requestCertificate({
71
+ DomainName: domainName,
72
+ SubjectAlternativeNames: subjectAlternativeNames.length > 0
73
+ ? [domainName, ...subjectAlternativeNames]
74
+ : undefined,
75
+ ValidationMethod: 'DNS',
76
+ })
77
+
78
+ // Wait for validation options to be available
79
+ await this.waitForValidationOptions(CertificateArn)
80
+
81
+ // Get DNS validation records
82
+ const validationRecords = await this.acm.getDnsValidationRecords(CertificateArn)
83
+
84
+ // Create DNS records using the configured provider
85
+ for (const record of validationRecords) {
86
+ const result = await this.dnsProvider.upsertRecord(domainName, {
87
+ name: record.recordName,
88
+ type: record.recordType as any,
89
+ content: record.recordValue,
90
+ ttl: 300,
91
+ })
92
+
93
+ if (!result.success) {
94
+ console.warn(`Failed to create validation record for ${record.domainName}: ${result.message}`)
95
+ }
96
+ }
97
+
98
+ // Wait for certificate validation if requested
99
+ let status: 'pending' | 'issued' | 'failed' = 'pending'
100
+
101
+ if (waitForValidation) {
102
+ const cert = await this.acm.waitForCertificateValidation(
103
+ CertificateArn,
104
+ maxWaitMinutes * 2,
105
+ 30000,
106
+ )
107
+
108
+ status = cert?.Status === 'ISSUED' ? 'issued' : 'failed'
109
+ }
110
+
111
+ return {
112
+ certificateArn: CertificateArn,
113
+ validationRecords: validationRecords.map(r => ({
114
+ domainName: r.domainName,
115
+ recordName: r.recordName,
116
+ recordType: r.recordType,
117
+ recordValue: r.recordValue,
118
+ })),
119
+ isNew: true,
120
+ status,
121
+ }
122
+ }
123
+
124
+ /**
125
+ * Create validation records for an existing certificate
126
+ */
127
+ async createValidationRecords(params: {
128
+ certificateArn: string
129
+ domain: string
130
+ }): Promise<{
131
+ success: boolean
132
+ records: ValidationRecord[]
133
+ errors: string[]
134
+ }> {
135
+ const { certificateArn, domain } = params
136
+ const errors: string[] = []
137
+
138
+ // Get validation records from ACM
139
+ const validationRecords = await this.acm.getDnsValidationRecords(certificateArn)
140
+
141
+ // Create DNS records
142
+ for (const record of validationRecords) {
143
+ const result = await this.dnsProvider.upsertRecord(domain, {
144
+ name: record.recordName,
145
+ type: record.recordType as any,
146
+ content: record.recordValue,
147
+ ttl: 300,
148
+ })
149
+
150
+ if (!result.success) {
151
+ errors.push(`Failed to create record for ${record.domainName}: ${result.message}`)
152
+ }
153
+ }
154
+
155
+ return {
156
+ success: errors.length === 0,
157
+ records: validationRecords.map(r => ({
158
+ domainName: r.domainName,
159
+ recordName: r.recordName,
160
+ recordType: r.recordType,
161
+ recordValue: r.recordValue,
162
+ })),
163
+ errors,
164
+ }
165
+ }
166
+
167
+ /**
168
+ * Delete validation records (cleanup after certificate is issued)
169
+ */
170
+ async deleteValidationRecords(params: {
171
+ certificateArn: string
172
+ domain: string
173
+ }): Promise<{
174
+ success: boolean
175
+ errors: string[]
176
+ }> {
177
+ const { certificateArn, domain } = params
178
+ const errors: string[] = []
179
+
180
+ // Get validation records from ACM
181
+ const validationRecords = await this.acm.getDnsValidationRecords(certificateArn)
182
+
183
+ // Delete DNS records
184
+ for (const record of validationRecords) {
185
+ const result = await this.dnsProvider.deleteRecord(domain, {
186
+ name: record.recordName,
187
+ type: record.recordType as any,
188
+ content: record.recordValue,
189
+ })
190
+
191
+ if (!result.success) {
192
+ errors.push(`Failed to delete record for ${record.domainName}: ${result.message}`)
193
+ }
194
+ }
195
+
196
+ return {
197
+ success: errors.length === 0,
198
+ errors,
199
+ }
200
+ }
201
+
202
+ /**
203
+ * Find or create a certificate for a domain
204
+ */
205
+ async findOrCreateCertificate(params: {
206
+ domainName: string
207
+ subjectAlternativeNames?: string[]
208
+ waitForValidation?: boolean
209
+ maxWaitMinutes?: number
210
+ }): Promise<CertificateValidationResult> {
211
+ const { domainName, subjectAlternativeNames = [], waitForValidation = true, maxWaitMinutes } = params
212
+
213
+ // Try to find existing certificate
214
+ const existing = await this.acm.findCertificateByDomain(domainName)
215
+
216
+ if (existing && existing.Status === 'ISSUED') {
217
+ // Check if the existing certificate covers all required SANs
218
+ const existingSans = existing.SubjectAlternativeNames || [existing.DomainName]
219
+ const hasWildcard = existingSans.some(san => san === `*.${domainName}`)
220
+ const allSansCovered = subjectAlternativeNames.every(san =>
221
+ existingSans.includes(san) || hasWildcard,
222
+ )
223
+
224
+ if (allSansCovered) {
225
+ return {
226
+ certificateArn: existing.CertificateArn,
227
+ validationRecords: [],
228
+ isNew: false,
229
+ status: 'issued',
230
+ }
231
+ }
232
+ // Existing cert doesn't cover all SANs, request a new one
233
+ console.log(`Existing certificate doesn't cover all required SANs, requesting new certificate...`)
234
+ }
235
+
236
+ // Request new certificate
237
+ return this.requestAndValidate({
238
+ domainName,
239
+ subjectAlternativeNames,
240
+ waitForValidation,
241
+ maxWaitMinutes,
242
+ })
243
+ }
244
+
245
+ /**
246
+ * Request certificate with common SANs (www and wildcard)
247
+ */
248
+ async requestCertificateWithCommonSans(params: {
249
+ domainName: string
250
+ includeWww?: boolean
251
+ includeWildcard?: boolean
252
+ additionalSans?: string[]
253
+ waitForValidation?: boolean
254
+ }): Promise<CertificateValidationResult> {
255
+ const {
256
+ domainName,
257
+ includeWww = true,
258
+ includeWildcard = false,
259
+ additionalSans = [],
260
+ waitForValidation = false,
261
+ } = params
262
+
263
+ const sans: string[] = []
264
+
265
+ if (includeWww) {
266
+ sans.push(`www.${domainName}`)
267
+ }
268
+
269
+ if (includeWildcard) {
270
+ sans.push(`*.${domainName}`)
271
+ }
272
+
273
+ sans.push(...additionalSans)
274
+
275
+ return this.requestAndValidate({
276
+ domainName,
277
+ subjectAlternativeNames: sans,
278
+ waitForValidation,
279
+ })
280
+ }
281
+
282
+ /**
283
+ * Wait for validation options to become available
284
+ */
285
+ private async waitForValidationOptions(
286
+ certificateArn: string,
287
+ maxAttempts = 30,
288
+ ): Promise<void> {
289
+ for (let i = 0; i < maxAttempts; i++) {
290
+ const cert = await this.acm.describeCertificate({ CertificateArn: certificateArn })
291
+
292
+ if (
293
+ cert.DomainValidationOptions
294
+ && cert.DomainValidationOptions.length > 0
295
+ && cert.DomainValidationOptions[0].ResourceRecord
296
+ ) {
297
+ return
298
+ }
299
+
300
+ await new Promise(resolve => setTimeout(resolve, 2000))
301
+ }
302
+
303
+ throw new Error('Timeout waiting for DNS validation options')
304
+ }
305
+
306
+ /**
307
+ * Get the status of a certificate
308
+ */
309
+ async getCertificateStatus(certificateArn: string): Promise<{
310
+ status: string
311
+ domainValidations: Array<{
312
+ domain: string
313
+ status: string
314
+ }>
315
+ }> {
316
+ const cert = await this.acm.describeCertificate({ CertificateArn: certificateArn })
317
+
318
+ return {
319
+ status: cert.Status,
320
+ domainValidations: (cert.DomainValidationOptions || []).map(opt => ({
321
+ domain: opt.DomainName,
322
+ status: opt.ValidationStatus || 'UNKNOWN',
323
+ })),
324
+ }
325
+ }
326
+ }
327
+
328
+ /**
329
+ * Helper function to create a validator with Porkbun
330
+ */
331
+ export function createPorkbunValidator(
332
+ apiKey: string,
333
+ secretKey: string,
334
+ acmRegion?: string,
335
+ ): UnifiedDnsValidator {
336
+ return new UnifiedDnsValidator(
337
+ { provider: 'porkbun', apiKey, secretKey },
338
+ acmRegion,
339
+ )
340
+ }
341
+
342
+ /**
343
+ * Helper function to create a validator with GoDaddy
344
+ */
345
+ export function createGoDaddyValidator(
346
+ apiKey: string,
347
+ apiSecret: string,
348
+ acmRegion?: string,
349
+ environment?: 'production' | 'ote',
350
+ ): UnifiedDnsValidator {
351
+ return new UnifiedDnsValidator(
352
+ { provider: 'godaddy', apiKey, apiSecret, environment },
353
+ acmRegion,
354
+ )
355
+ }
356
+
357
+ /**
358
+ * Helper function to create a validator with Route53
359
+ */
360
+ export function createRoute53Validator(
361
+ region?: string,
362
+ hostedZoneId?: string,
363
+ acmRegion?: string,
364
+ ): UnifiedDnsValidator {
365
+ return new UnifiedDnsValidator(
366
+ { provider: 'route53', region, hostedZoneId },
367
+ acmRegion || region,
368
+ )
369
+ }
@@ -0,0 +1,5 @@
1
+ /**
2
+ * Infrastructure Generators
3
+ */
4
+
5
+ export * from './infrastructure'