@stacksjs/ts-cloud 0.1.8 → 0.1.9
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/bin/cli.js +1 -1
- package/package.json +18 -16
- package/src/aws/acm.ts +768 -0
- package/src/aws/application-autoscaling.ts +845 -0
- package/src/aws/bedrock.ts +4074 -0
- package/src/aws/client.ts +891 -0
- package/src/aws/cloudformation.ts +896 -0
- package/src/aws/cloudfront.ts +1531 -0
- package/src/aws/cloudwatch-logs.ts +154 -0
- package/src/aws/comprehend.ts +839 -0
- package/src/aws/connect.ts +1056 -0
- package/src/aws/deploy-imap.ts +384 -0
- package/src/aws/dynamodb.ts +340 -0
- package/src/aws/ec2.ts +1385 -0
- package/src/aws/ecr.ts +621 -0
- package/src/aws/ecs.ts +615 -0
- package/src/aws/elasticache.ts +301 -0
- package/src/aws/elbv2.ts +942 -0
- package/src/aws/email.ts +928 -0
- package/src/aws/eventbridge.ts +248 -0
- package/src/aws/iam.ts +1689 -0
- package/src/aws/imap-server.ts +2100 -0
- package/src/aws/index.ts +213 -0
- package/src/aws/kendra.ts +1097 -0
- package/src/aws/lambda.ts +786 -0
- package/src/aws/opensearch.ts +158 -0
- package/src/aws/personalize.ts +977 -0
- package/src/aws/polly.ts +559 -0
- package/src/aws/rds.ts +888 -0
- package/src/aws/rekognition.ts +846 -0
- package/src/aws/route53-domains.ts +359 -0
- package/src/aws/route53.ts +1046 -0
- package/src/aws/s3.ts +2334 -0
- package/src/aws/scheduler.ts +571 -0
- package/src/aws/secrets-manager.ts +769 -0
- package/src/aws/ses.ts +1081 -0
- package/src/aws/setup-phone.ts +104 -0
- package/src/aws/setup-sms.ts +580 -0
- package/src/aws/sms.ts +1735 -0
- package/src/aws/smtp-server.ts +531 -0
- package/src/aws/sns.ts +758 -0
- package/src/aws/sqs.ts +382 -0
- package/src/aws/ssm.ts +807 -0
- package/src/aws/sts.ts +92 -0
- package/src/aws/support.ts +391 -0
- package/src/aws/test-imap.ts +86 -0
- package/src/aws/textract.ts +780 -0
- package/src/aws/transcribe.ts +108 -0
- package/src/aws/translate.ts +641 -0
- package/src/aws/voice.ts +1379 -0
- package/src/config.ts +35 -0
- package/src/deploy/index.ts +7 -0
- package/src/deploy/static-site-external-dns.ts +945 -0
- package/src/deploy/static-site.ts +1175 -0
- package/src/dns/cloudflare.ts +548 -0
- package/src/dns/godaddy.ts +412 -0
- package/src/dns/index.ts +205 -0
- package/src/dns/porkbun.ts +362 -0
- package/src/dns/route53-adapter.ts +414 -0
- package/src/dns/types.ts +119 -0
- package/src/dns/validator.ts +369 -0
- package/src/generators/index.ts +5 -0
- package/src/generators/infrastructure.ts +1660 -0
- package/src/index.ts +163 -0
- package/src/push/apns.ts +452 -0
- package/src/push/fcm.ts +506 -0
- package/src/push/index.ts +58 -0
- package/src/security/pre-deploy-scanner.ts +655 -0
- package/src/ssl/acme-client.ts +478 -0
- package/src/ssl/index.ts +7 -0
- package/src/ssl/letsencrypt.ts +747 -0
- package/src/types.ts +2 -0
- package/src/utils/cli.ts +398 -0
- package/src/validation/index.ts +5 -0
- package/src/validation/template.ts +405 -0
|
@@ -0,0 +1,369 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Unified DNS Validator for ACM Certificates
|
|
3
|
+
* Works with any DNS provider (Route53, Porkbun, GoDaddy, etc.)
|
|
4
|
+
*/
|
|
5
|
+
|
|
6
|
+
import { ACMClient } from '../aws/acm'
|
|
7
|
+
import type { DnsProvider, DnsProviderConfig } from './types'
|
|
8
|
+
import { createDnsProvider } from './index'
|
|
9
|
+
|
|
10
|
+
export interface ValidationRecord {
|
|
11
|
+
domainName: string
|
|
12
|
+
recordName: string
|
|
13
|
+
recordType: string
|
|
14
|
+
recordValue: string
|
|
15
|
+
}
|
|
16
|
+
|
|
17
|
+
export interface CertificateValidationResult {
|
|
18
|
+
certificateArn: string
|
|
19
|
+
validationRecords: ValidationRecord[]
|
|
20
|
+
isNew: boolean
|
|
21
|
+
status: 'pending' | 'issued' | 'failed'
|
|
22
|
+
}
|
|
23
|
+
|
|
24
|
+
/**
|
|
25
|
+
* Unified DNS Validator
|
|
26
|
+
* Handles ACM certificate validation with any DNS provider
|
|
27
|
+
*/
|
|
28
|
+
export class UnifiedDnsValidator {
|
|
29
|
+
private acm: ACMClient
|
|
30
|
+
private dnsProvider: DnsProvider
|
|
31
|
+
|
|
32
|
+
constructor(
|
|
33
|
+
dnsProvider: DnsProvider | DnsProviderConfig,
|
|
34
|
+
acmRegion: string = 'us-east-1',
|
|
35
|
+
) {
|
|
36
|
+
this.acm = new ACMClient(acmRegion)
|
|
37
|
+
|
|
38
|
+
if ('provider' in dnsProvider) {
|
|
39
|
+
this.dnsProvider = createDnsProvider(dnsProvider)
|
|
40
|
+
}
|
|
41
|
+
else {
|
|
42
|
+
this.dnsProvider = dnsProvider
|
|
43
|
+
}
|
|
44
|
+
}
|
|
45
|
+
|
|
46
|
+
/**
|
|
47
|
+
* Get the DNS provider being used
|
|
48
|
+
*/
|
|
49
|
+
getProvider(): DnsProvider {
|
|
50
|
+
return this.dnsProvider
|
|
51
|
+
}
|
|
52
|
+
|
|
53
|
+
/**
|
|
54
|
+
* Request a certificate and create DNS validation records
|
|
55
|
+
*/
|
|
56
|
+
async requestAndValidate(params: {
|
|
57
|
+
domainName: string
|
|
58
|
+
subjectAlternativeNames?: string[]
|
|
59
|
+
waitForValidation?: boolean
|
|
60
|
+
maxWaitMinutes?: number
|
|
61
|
+
}): Promise<CertificateValidationResult> {
|
|
62
|
+
const {
|
|
63
|
+
domainName,
|
|
64
|
+
subjectAlternativeNames = [],
|
|
65
|
+
waitForValidation = false,
|
|
66
|
+
maxWaitMinutes = 30,
|
|
67
|
+
} = params
|
|
68
|
+
|
|
69
|
+
// Request certificate from ACM
|
|
70
|
+
const { CertificateArn } = await this.acm.requestCertificate({
|
|
71
|
+
DomainName: domainName,
|
|
72
|
+
SubjectAlternativeNames: subjectAlternativeNames.length > 0
|
|
73
|
+
? [domainName, ...subjectAlternativeNames]
|
|
74
|
+
: undefined,
|
|
75
|
+
ValidationMethod: 'DNS',
|
|
76
|
+
})
|
|
77
|
+
|
|
78
|
+
// Wait for validation options to be available
|
|
79
|
+
await this.waitForValidationOptions(CertificateArn)
|
|
80
|
+
|
|
81
|
+
// Get DNS validation records
|
|
82
|
+
const validationRecords = await this.acm.getDnsValidationRecords(CertificateArn)
|
|
83
|
+
|
|
84
|
+
// Create DNS records using the configured provider
|
|
85
|
+
for (const record of validationRecords) {
|
|
86
|
+
const result = await this.dnsProvider.upsertRecord(domainName, {
|
|
87
|
+
name: record.recordName,
|
|
88
|
+
type: record.recordType as any,
|
|
89
|
+
content: record.recordValue,
|
|
90
|
+
ttl: 300,
|
|
91
|
+
})
|
|
92
|
+
|
|
93
|
+
if (!result.success) {
|
|
94
|
+
console.warn(`Failed to create validation record for ${record.domainName}: ${result.message}`)
|
|
95
|
+
}
|
|
96
|
+
}
|
|
97
|
+
|
|
98
|
+
// Wait for certificate validation if requested
|
|
99
|
+
let status: 'pending' | 'issued' | 'failed' = 'pending'
|
|
100
|
+
|
|
101
|
+
if (waitForValidation) {
|
|
102
|
+
const cert = await this.acm.waitForCertificateValidation(
|
|
103
|
+
CertificateArn,
|
|
104
|
+
maxWaitMinutes * 2,
|
|
105
|
+
30000,
|
|
106
|
+
)
|
|
107
|
+
|
|
108
|
+
status = cert?.Status === 'ISSUED' ? 'issued' : 'failed'
|
|
109
|
+
}
|
|
110
|
+
|
|
111
|
+
return {
|
|
112
|
+
certificateArn: CertificateArn,
|
|
113
|
+
validationRecords: validationRecords.map(r => ({
|
|
114
|
+
domainName: r.domainName,
|
|
115
|
+
recordName: r.recordName,
|
|
116
|
+
recordType: r.recordType,
|
|
117
|
+
recordValue: r.recordValue,
|
|
118
|
+
})),
|
|
119
|
+
isNew: true,
|
|
120
|
+
status,
|
|
121
|
+
}
|
|
122
|
+
}
|
|
123
|
+
|
|
124
|
+
/**
|
|
125
|
+
* Create validation records for an existing certificate
|
|
126
|
+
*/
|
|
127
|
+
async createValidationRecords(params: {
|
|
128
|
+
certificateArn: string
|
|
129
|
+
domain: string
|
|
130
|
+
}): Promise<{
|
|
131
|
+
success: boolean
|
|
132
|
+
records: ValidationRecord[]
|
|
133
|
+
errors: string[]
|
|
134
|
+
}> {
|
|
135
|
+
const { certificateArn, domain } = params
|
|
136
|
+
const errors: string[] = []
|
|
137
|
+
|
|
138
|
+
// Get validation records from ACM
|
|
139
|
+
const validationRecords = await this.acm.getDnsValidationRecords(certificateArn)
|
|
140
|
+
|
|
141
|
+
// Create DNS records
|
|
142
|
+
for (const record of validationRecords) {
|
|
143
|
+
const result = await this.dnsProvider.upsertRecord(domain, {
|
|
144
|
+
name: record.recordName,
|
|
145
|
+
type: record.recordType as any,
|
|
146
|
+
content: record.recordValue,
|
|
147
|
+
ttl: 300,
|
|
148
|
+
})
|
|
149
|
+
|
|
150
|
+
if (!result.success) {
|
|
151
|
+
errors.push(`Failed to create record for ${record.domainName}: ${result.message}`)
|
|
152
|
+
}
|
|
153
|
+
}
|
|
154
|
+
|
|
155
|
+
return {
|
|
156
|
+
success: errors.length === 0,
|
|
157
|
+
records: validationRecords.map(r => ({
|
|
158
|
+
domainName: r.domainName,
|
|
159
|
+
recordName: r.recordName,
|
|
160
|
+
recordType: r.recordType,
|
|
161
|
+
recordValue: r.recordValue,
|
|
162
|
+
})),
|
|
163
|
+
errors,
|
|
164
|
+
}
|
|
165
|
+
}
|
|
166
|
+
|
|
167
|
+
/**
|
|
168
|
+
* Delete validation records (cleanup after certificate is issued)
|
|
169
|
+
*/
|
|
170
|
+
async deleteValidationRecords(params: {
|
|
171
|
+
certificateArn: string
|
|
172
|
+
domain: string
|
|
173
|
+
}): Promise<{
|
|
174
|
+
success: boolean
|
|
175
|
+
errors: string[]
|
|
176
|
+
}> {
|
|
177
|
+
const { certificateArn, domain } = params
|
|
178
|
+
const errors: string[] = []
|
|
179
|
+
|
|
180
|
+
// Get validation records from ACM
|
|
181
|
+
const validationRecords = await this.acm.getDnsValidationRecords(certificateArn)
|
|
182
|
+
|
|
183
|
+
// Delete DNS records
|
|
184
|
+
for (const record of validationRecords) {
|
|
185
|
+
const result = await this.dnsProvider.deleteRecord(domain, {
|
|
186
|
+
name: record.recordName,
|
|
187
|
+
type: record.recordType as any,
|
|
188
|
+
content: record.recordValue,
|
|
189
|
+
})
|
|
190
|
+
|
|
191
|
+
if (!result.success) {
|
|
192
|
+
errors.push(`Failed to delete record for ${record.domainName}: ${result.message}`)
|
|
193
|
+
}
|
|
194
|
+
}
|
|
195
|
+
|
|
196
|
+
return {
|
|
197
|
+
success: errors.length === 0,
|
|
198
|
+
errors,
|
|
199
|
+
}
|
|
200
|
+
}
|
|
201
|
+
|
|
202
|
+
/**
|
|
203
|
+
* Find or create a certificate for a domain
|
|
204
|
+
*/
|
|
205
|
+
async findOrCreateCertificate(params: {
|
|
206
|
+
domainName: string
|
|
207
|
+
subjectAlternativeNames?: string[]
|
|
208
|
+
waitForValidation?: boolean
|
|
209
|
+
maxWaitMinutes?: number
|
|
210
|
+
}): Promise<CertificateValidationResult> {
|
|
211
|
+
const { domainName, subjectAlternativeNames = [], waitForValidation = true, maxWaitMinutes } = params
|
|
212
|
+
|
|
213
|
+
// Try to find existing certificate
|
|
214
|
+
const existing = await this.acm.findCertificateByDomain(domainName)
|
|
215
|
+
|
|
216
|
+
if (existing && existing.Status === 'ISSUED') {
|
|
217
|
+
// Check if the existing certificate covers all required SANs
|
|
218
|
+
const existingSans = existing.SubjectAlternativeNames || [existing.DomainName]
|
|
219
|
+
const hasWildcard = existingSans.some(san => san === `*.${domainName}`)
|
|
220
|
+
const allSansCovered = subjectAlternativeNames.every(san =>
|
|
221
|
+
existingSans.includes(san) || hasWildcard,
|
|
222
|
+
)
|
|
223
|
+
|
|
224
|
+
if (allSansCovered) {
|
|
225
|
+
return {
|
|
226
|
+
certificateArn: existing.CertificateArn,
|
|
227
|
+
validationRecords: [],
|
|
228
|
+
isNew: false,
|
|
229
|
+
status: 'issued',
|
|
230
|
+
}
|
|
231
|
+
}
|
|
232
|
+
// Existing cert doesn't cover all SANs, request a new one
|
|
233
|
+
console.log(`Existing certificate doesn't cover all required SANs, requesting new certificate...`)
|
|
234
|
+
}
|
|
235
|
+
|
|
236
|
+
// Request new certificate
|
|
237
|
+
return this.requestAndValidate({
|
|
238
|
+
domainName,
|
|
239
|
+
subjectAlternativeNames,
|
|
240
|
+
waitForValidation,
|
|
241
|
+
maxWaitMinutes,
|
|
242
|
+
})
|
|
243
|
+
}
|
|
244
|
+
|
|
245
|
+
/**
|
|
246
|
+
* Request certificate with common SANs (www and wildcard)
|
|
247
|
+
*/
|
|
248
|
+
async requestCertificateWithCommonSans(params: {
|
|
249
|
+
domainName: string
|
|
250
|
+
includeWww?: boolean
|
|
251
|
+
includeWildcard?: boolean
|
|
252
|
+
additionalSans?: string[]
|
|
253
|
+
waitForValidation?: boolean
|
|
254
|
+
}): Promise<CertificateValidationResult> {
|
|
255
|
+
const {
|
|
256
|
+
domainName,
|
|
257
|
+
includeWww = true,
|
|
258
|
+
includeWildcard = false,
|
|
259
|
+
additionalSans = [],
|
|
260
|
+
waitForValidation = false,
|
|
261
|
+
} = params
|
|
262
|
+
|
|
263
|
+
const sans: string[] = []
|
|
264
|
+
|
|
265
|
+
if (includeWww) {
|
|
266
|
+
sans.push(`www.${domainName}`)
|
|
267
|
+
}
|
|
268
|
+
|
|
269
|
+
if (includeWildcard) {
|
|
270
|
+
sans.push(`*.${domainName}`)
|
|
271
|
+
}
|
|
272
|
+
|
|
273
|
+
sans.push(...additionalSans)
|
|
274
|
+
|
|
275
|
+
return this.requestAndValidate({
|
|
276
|
+
domainName,
|
|
277
|
+
subjectAlternativeNames: sans,
|
|
278
|
+
waitForValidation,
|
|
279
|
+
})
|
|
280
|
+
}
|
|
281
|
+
|
|
282
|
+
/**
|
|
283
|
+
* Wait for validation options to become available
|
|
284
|
+
*/
|
|
285
|
+
private async waitForValidationOptions(
|
|
286
|
+
certificateArn: string,
|
|
287
|
+
maxAttempts = 30,
|
|
288
|
+
): Promise<void> {
|
|
289
|
+
for (let i = 0; i < maxAttempts; i++) {
|
|
290
|
+
const cert = await this.acm.describeCertificate({ CertificateArn: certificateArn })
|
|
291
|
+
|
|
292
|
+
if (
|
|
293
|
+
cert.DomainValidationOptions
|
|
294
|
+
&& cert.DomainValidationOptions.length > 0
|
|
295
|
+
&& cert.DomainValidationOptions[0].ResourceRecord
|
|
296
|
+
) {
|
|
297
|
+
return
|
|
298
|
+
}
|
|
299
|
+
|
|
300
|
+
await new Promise(resolve => setTimeout(resolve, 2000))
|
|
301
|
+
}
|
|
302
|
+
|
|
303
|
+
throw new Error('Timeout waiting for DNS validation options')
|
|
304
|
+
}
|
|
305
|
+
|
|
306
|
+
/**
|
|
307
|
+
* Get the status of a certificate
|
|
308
|
+
*/
|
|
309
|
+
async getCertificateStatus(certificateArn: string): Promise<{
|
|
310
|
+
status: string
|
|
311
|
+
domainValidations: Array<{
|
|
312
|
+
domain: string
|
|
313
|
+
status: string
|
|
314
|
+
}>
|
|
315
|
+
}> {
|
|
316
|
+
const cert = await this.acm.describeCertificate({ CertificateArn: certificateArn })
|
|
317
|
+
|
|
318
|
+
return {
|
|
319
|
+
status: cert.Status,
|
|
320
|
+
domainValidations: (cert.DomainValidationOptions || []).map(opt => ({
|
|
321
|
+
domain: opt.DomainName,
|
|
322
|
+
status: opt.ValidationStatus || 'UNKNOWN',
|
|
323
|
+
})),
|
|
324
|
+
}
|
|
325
|
+
}
|
|
326
|
+
}
|
|
327
|
+
|
|
328
|
+
/**
|
|
329
|
+
* Helper function to create a validator with Porkbun
|
|
330
|
+
*/
|
|
331
|
+
export function createPorkbunValidator(
|
|
332
|
+
apiKey: string,
|
|
333
|
+
secretKey: string,
|
|
334
|
+
acmRegion?: string,
|
|
335
|
+
): UnifiedDnsValidator {
|
|
336
|
+
return new UnifiedDnsValidator(
|
|
337
|
+
{ provider: 'porkbun', apiKey, secretKey },
|
|
338
|
+
acmRegion,
|
|
339
|
+
)
|
|
340
|
+
}
|
|
341
|
+
|
|
342
|
+
/**
|
|
343
|
+
* Helper function to create a validator with GoDaddy
|
|
344
|
+
*/
|
|
345
|
+
export function createGoDaddyValidator(
|
|
346
|
+
apiKey: string,
|
|
347
|
+
apiSecret: string,
|
|
348
|
+
acmRegion?: string,
|
|
349
|
+
environment?: 'production' | 'ote',
|
|
350
|
+
): UnifiedDnsValidator {
|
|
351
|
+
return new UnifiedDnsValidator(
|
|
352
|
+
{ provider: 'godaddy', apiKey, apiSecret, environment },
|
|
353
|
+
acmRegion,
|
|
354
|
+
)
|
|
355
|
+
}
|
|
356
|
+
|
|
357
|
+
/**
|
|
358
|
+
* Helper function to create a validator with Route53
|
|
359
|
+
*/
|
|
360
|
+
export function createRoute53Validator(
|
|
361
|
+
region?: string,
|
|
362
|
+
hostedZoneId?: string,
|
|
363
|
+
acmRegion?: string,
|
|
364
|
+
): UnifiedDnsValidator {
|
|
365
|
+
return new UnifiedDnsValidator(
|
|
366
|
+
{ provider: 'route53', region, hostedZoneId },
|
|
367
|
+
acmRegion || region,
|
|
368
|
+
)
|
|
369
|
+
}
|