@stacksjs/ts-cloud 0.1.9 → 0.1.11

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (83) hide show
  1. package/README.md +17 -17
  2. package/dist/aws/setup-sms.d.ts +1 -0
  3. package/dist/bin/cli.js +11 -11
  4. package/dist/config.d.ts +1 -1
  5. package/dist/generators/infrastructure.d.ts +2 -2
  6. package/dist/index.d.ts +3 -3
  7. package/dist/index.js +43 -43
  8. package/dist/types.d.ts +1 -1
  9. package/dist/validation/template.d.ts +1 -1
  10. package/package.json +5 -6
  11. package/src/aws/acm.ts +0 -768
  12. package/src/aws/application-autoscaling.ts +0 -845
  13. package/src/aws/bedrock.ts +0 -4074
  14. package/src/aws/client.ts +0 -891
  15. package/src/aws/cloudformation.ts +0 -896
  16. package/src/aws/cloudfront.ts +0 -1531
  17. package/src/aws/cloudwatch-logs.ts +0 -154
  18. package/src/aws/comprehend.ts +0 -839
  19. package/src/aws/connect.ts +0 -1056
  20. package/src/aws/deploy-imap.ts +0 -384
  21. package/src/aws/dynamodb.ts +0 -340
  22. package/src/aws/ec2.ts +0 -1385
  23. package/src/aws/ecr.ts +0 -621
  24. package/src/aws/ecs.ts +0 -615
  25. package/src/aws/elasticache.ts +0 -301
  26. package/src/aws/elbv2.ts +0 -942
  27. package/src/aws/email.ts +0 -928
  28. package/src/aws/eventbridge.ts +0 -248
  29. package/src/aws/iam.ts +0 -1689
  30. package/src/aws/imap-server.ts +0 -2100
  31. package/src/aws/index.ts +0 -213
  32. package/src/aws/kendra.ts +0 -1097
  33. package/src/aws/lambda.ts +0 -786
  34. package/src/aws/opensearch.ts +0 -158
  35. package/src/aws/personalize.ts +0 -977
  36. package/src/aws/polly.ts +0 -559
  37. package/src/aws/rds.ts +0 -888
  38. package/src/aws/rekognition.ts +0 -846
  39. package/src/aws/route53-domains.ts +0 -359
  40. package/src/aws/route53.ts +0 -1046
  41. package/src/aws/s3.ts +0 -2334
  42. package/src/aws/scheduler.ts +0 -571
  43. package/src/aws/secrets-manager.ts +0 -769
  44. package/src/aws/ses.ts +0 -1081
  45. package/src/aws/setup-phone.ts +0 -104
  46. package/src/aws/setup-sms.ts +0 -580
  47. package/src/aws/sms.ts +0 -1735
  48. package/src/aws/smtp-server.ts +0 -531
  49. package/src/aws/sns.ts +0 -758
  50. package/src/aws/sqs.ts +0 -382
  51. package/src/aws/ssm.ts +0 -807
  52. package/src/aws/sts.ts +0 -92
  53. package/src/aws/support.ts +0 -391
  54. package/src/aws/test-imap.ts +0 -86
  55. package/src/aws/textract.ts +0 -780
  56. package/src/aws/transcribe.ts +0 -108
  57. package/src/aws/translate.ts +0 -641
  58. package/src/aws/voice.ts +0 -1379
  59. package/src/config.ts +0 -35
  60. package/src/deploy/index.ts +0 -7
  61. package/src/deploy/static-site-external-dns.ts +0 -945
  62. package/src/deploy/static-site.ts +0 -1175
  63. package/src/dns/cloudflare.ts +0 -548
  64. package/src/dns/godaddy.ts +0 -412
  65. package/src/dns/index.ts +0 -205
  66. package/src/dns/porkbun.ts +0 -362
  67. package/src/dns/route53-adapter.ts +0 -414
  68. package/src/dns/types.ts +0 -119
  69. package/src/dns/validator.ts +0 -369
  70. package/src/generators/index.ts +0 -5
  71. package/src/generators/infrastructure.ts +0 -1660
  72. package/src/index.ts +0 -163
  73. package/src/push/apns.ts +0 -452
  74. package/src/push/fcm.ts +0 -506
  75. package/src/push/index.ts +0 -58
  76. package/src/security/pre-deploy-scanner.ts +0 -655
  77. package/src/ssl/acme-client.ts +0 -478
  78. package/src/ssl/index.ts +0 -7
  79. package/src/ssl/letsencrypt.ts +0 -747
  80. package/src/types.ts +0 -2
  81. package/src/utils/cli.ts +0 -398
  82. package/src/validation/index.ts +0 -5
  83. package/src/validation/template.ts +0 -405
@@ -1,384 +0,0 @@
1
- #!/usr/bin/env bun
2
- /**
3
- * Deploy IMAP-to-S3 bridge server to EC2 via SSM
4
- * Embeds all code directly in SSM commands to avoid S3 permission issues
5
- *
6
- * Security:
7
- * - Uses EC2 instance IAM role for AWS credentials (no hardcoded keys)
8
- * - Fetches IMAP passwords from AWS Secrets Manager at startup
9
- * - Secret name: stacks/mail-server/credentials
10
- * - Credentials are read from email config and synced to Secrets Manager
11
- */
12
-
13
- import { SSMClient } from './ssm'
14
- import { AWSClient } from './client'
15
- import * as fs from 'node:fs'
16
- import * as path from 'node:path'
17
-
18
- export interface MailboxConfig {
19
- email: string
20
- password?: string
21
- }
22
-
23
- export interface MailServerDeployConfig {
24
- instanceId: string
25
- region: string
26
- secretName: string
27
- domain: string
28
- bucket: string
29
- prefix: string
30
- /** Mailboxes can be simple strings or objects with optional passwords */
31
- mailboxes: Array<string | MailboxConfig>
32
- }
33
-
34
- /**
35
- * Normalize mailbox config to object format with password lookup
36
- * Supports:
37
- * - Simple usernames: 'chris' -> 'chris@{domain}', looks up MAIL_PASSWORD_CHRIS
38
- * - Full email strings: 'chris@stacksjs.com' -> looks up MAIL_PASSWORD_CHRIS
39
- * - Objects with email: { email: 'chris@stacksjs.com', password: '...' }
40
- * - Objects with address (deprecated): { address: 'chris@stacksjs.com' }
41
- */
42
- function normalizeMailbox(mailbox: string | MailboxConfig | { address: string, password?: string }, domain: string): MailboxConfig {
43
- if (typeof mailbox === 'string') {
44
- // If it's just a username (no @), append the domain
45
- const email = mailbox.includes('@') ? mailbox : `${mailbox}@${domain}`
46
- const username = email.split('@')[0].toUpperCase()
47
- const envKey = `MAIL_PASSWORD_${username}`
48
- const password = process.env[envKey]
49
- return { email, password }
50
- }
51
-
52
- // Handle both 'email' and 'address' fields (address is deprecated)
53
- let email = 'email' in mailbox ? mailbox.email : (mailbox as { address: string }).address
54
- if (!email) {
55
- throw new Error('Mailbox must have either "email" or "address" field')
56
- }
57
-
58
- // If it's just a username (no @), append the domain
59
- if (!email.includes('@')) {
60
- email = `${email}@${domain}`
61
- }
62
-
63
- // If object format but no password, try env lookup
64
- if (!mailbox.password) {
65
- const username = email.split('@')[0].toUpperCase()
66
- const envKey = `MAIL_PASSWORD_${username}`
67
- const password = process.env[envKey]
68
- return { email, password }
69
- }
70
- return { email, password: mailbox.password }
71
- }
72
-
73
- const defaultConfig: MailServerDeployConfig = {
74
- instanceId: 'i-032233d3e9839b78b',
75
- region: 'us-east-1',
76
- secretName: 'stacks/mail-server/credentials',
77
- domain: 'stacksjs.com',
78
- bucket: 'stacks-production-email',
79
- prefix: 'incoming/',
80
- mailboxes: [],
81
- }
82
-
83
- export async function deployImapServer(config: MailServerDeployConfig = defaultConfig): Promise<void> {
84
- console.log('Deploying IMAP-to-S3 bridge server to EC2...')
85
- console.log('')
86
-
87
- const ssm = new SSMClient(config.region)
88
- const awsClient = new AWSClient()
89
-
90
- // Normalize all mailboxes to object format with password lookup
91
- const normalizedMailboxes = config.mailboxes.map((m) => normalizeMailbox(m, config.domain))
92
-
93
- // Build credentials from normalized mailboxes
94
- const credentials: Record<string, string> = {}
95
- for (const mailbox of normalizedMailboxes) {
96
- // Extract username from email (chris@stacksjs.com -> chris)
97
- const username = mailbox.email.split('@')[0]
98
- if (mailbox.password) {
99
- credentials[username] = mailbox.password
100
- }
101
- }
102
-
103
- // Ensure the secret exists with IMAP credentials from config
104
- console.log('0. Ensuring credentials secret exists in Secrets Manager...')
105
- try {
106
- const existingSecretResult = await awsClient.request({
107
- service: 'secretsmanager',
108
- region: config.region,
109
- method: 'POST',
110
- path: '/',
111
- headers: {
112
- 'Content-Type': 'application/x-amz-json-1.1',
113
- 'X-Amz-Target': 'secretsmanager.GetSecretValue',
114
- },
115
- body: JSON.stringify({ SecretId: config.secretName }),
116
- })
117
- const existingSecret = existingSecretResult.SecretString || '{}'
118
- console.log(' Secret already exists')
119
-
120
- // Update if we have new credentials from config
121
- if (Object.keys(credentials).length > 0) {
122
- const existingCreds = JSON.parse(existingSecret)
123
- const mergedCreds = { ...existingCreds, ...credentials }
124
- await awsClient.request({
125
- service: 'secretsmanager',
126
- region: config.region,
127
- method: 'POST',
128
- path: '/',
129
- headers: {
130
- 'Content-Type': 'application/x-amz-json-1.1',
131
- 'X-Amz-Target': 'secretsmanager.PutSecretValue',
132
- },
133
- body: JSON.stringify({
134
- SecretId: config.secretName,
135
- SecretString: JSON.stringify(mergedCreds),
136
- }),
137
- })
138
- console.log(' Secret updated with config credentials')
139
- }
140
- }
141
- catch {
142
- // Create the secret with credentials from config
143
- console.log(' Creating secret...')
144
- if (Object.keys(credentials).length === 0) {
145
- console.warn(' WARNING: No passwords configured in mailboxes - logins will fail')
146
- console.warn(' Set MAIL_PASSWORD_<USER> environment variables in your config')
147
- }
148
- await awsClient.request({
149
- service: 'secretsmanager',
150
- region: config.region,
151
- method: 'POST',
152
- path: '/',
153
- headers: {
154
- 'Content-Type': 'application/x-amz-json-1.1',
155
- 'X-Amz-Target': 'secretsmanager.CreateSecret',
156
- },
157
- body: JSON.stringify({
158
- Name: config.secretName,
159
- Description: `IMAP mail server credentials for ${config.domain}`,
160
- SecretString: JSON.stringify(credentials),
161
- ClientRequestToken: crypto.randomUUID(),
162
- }),
163
- })
164
- console.log(' Secret created')
165
- }
166
-
167
- // Read the source files
168
- const imapServerCode = fs.readFileSync(path.join(__dirname, 'imap-server.ts'), 'utf-8')
169
- const s3ClientCode = fs.readFileSync(path.join(__dirname, 's3.ts'), 'utf-8')
170
- const clientCode = fs.readFileSync(path.join(__dirname, 'client.ts'), 'utf-8')
171
-
172
- // Build users config for server script from normalized mailboxes
173
- const usersConfig = normalizedMailboxes.map((m) => {
174
- const username = m.email.split('@')[0]
175
- return ` ${username}: {
176
- password: passwords.${username} || 'changeme',
177
- email: '${m.email}',
178
- },`
179
- }).join('\n')
180
-
181
- // Create the server startup script - fetches credentials from Secrets Manager using AWSClient directly
182
- const serverScript = `#!/usr/bin/env bun
183
- import * as fs from 'node:fs'
184
- import { startImapServer } from './imap-server'
185
- import { AWSClient } from './client'
186
-
187
- const SECRET_NAME = '${config.secretName}'
188
- const REGION = '${config.region}'
189
-
190
- async function main() {
191
- console.log('Starting IMAP-to-S3 bridge server...')
192
-
193
- // Fetch credentials from Secrets Manager using AWSClient directly (uses EC2 instance IAM role)
194
- console.log('Fetching credentials from Secrets Manager...')
195
- const client = new AWSClient()
196
- let passwords: Record<string, string> = {}
197
-
198
- try {
199
- const result = await client.request({
200
- service: 'secretsmanager',
201
- region: REGION,
202
- method: 'POST',
203
- path: '/',
204
- headers: {
205
- 'Content-Type': 'application/x-amz-json-1.1',
206
- 'X-Amz-Target': 'secretsmanager.GetSecretValue'
207
- },
208
- body: JSON.stringify({ SecretId: SECRET_NAME })
209
- })
210
- passwords = JSON.parse(result.SecretString || '{}')
211
- console.log('Credentials loaded for:', Object.keys(passwords).join(', '))
212
- }
213
- catch (error) {
214
- console.error('Failed to fetch credentials from Secrets Manager:', error)
215
- console.error('Using fallback empty passwords - logins will fail')
216
- }
217
-
218
- const hasTlsCerts = fs.existsSync('/etc/letsencrypt/live/mail.${config.domain}/privkey.pem')
219
- console.log('TLS certificates available:', hasTlsCerts)
220
-
221
- const server = await startImapServer({
222
- port: 143,
223
- sslPort: 993,
224
- host: '0.0.0.0',
225
- region: REGION,
226
- bucket: '${config.bucket}',
227
- prefix: '${config.prefix}',
228
- domain: '${config.domain}',
229
- users: {
230
- ${usersConfig}
231
- },
232
- tls: hasTlsCerts ? {
233
- key: '/etc/letsencrypt/live/mail.${config.domain}/privkey.pem',
234
- cert: '/etc/letsencrypt/live/mail.${config.domain}/fullchain.pem',
235
- } : undefined,
236
- })
237
-
238
- console.log('IMAP server running on port 143' + (hasTlsCerts ? ' and 993 (TLS)' : ''))
239
-
240
- process.on('SIGINT', async () => {
241
- console.log('Shutting down...')
242
- await server.stop()
243
- process.exit(0)
244
- })
245
-
246
- process.on('SIGTERM', async () => {
247
- console.log('Shutting down...')
248
- await server.stop()
249
- process.exit(0)
250
- })
251
- }
252
-
253
- main().catch(console.error)
254
- `
255
-
256
- // Create systemd service file - NO hardcoded credentials, uses IAM role
257
- const systemdService = `[Unit]
258
- Description=IMAP-to-S3 Bridge Server
259
- After=network.target
260
-
261
- [Service]
262
- Type=simple
263
- User=root
264
- WorkingDirectory=/opt/imap-server
265
- # AWS credentials come from EC2 instance IAM role - no hardcoded keys needed
266
- Environment="AWS_REGION=${config.region}"
267
- ExecStart=/root/.bun/bin/bun run /opt/imap-server/server.ts
268
- Restart=always
269
- RestartSec=10
270
-
271
- [Install]
272
- WantedBy=multi-user.target
273
- `
274
-
275
- // Step 1: Create directory structure
276
- console.log('1. Creating directory structure on EC2...')
277
- let result = await ssm.runShellCommand(config.instanceId, [
278
- 'mkdir -p /opt/imap-server',
279
- 'ls -la /opt/imap-server',
280
- ], { maxWaitMs: 60000 })
281
-
282
- if (!result.success) {
283
- console.error('Failed to create directory:', result.error)
284
- process.exit(1)
285
- }
286
- console.log(' Directory created')
287
-
288
- // Step 2: Write client.ts (base64 encode to handle special chars)
289
- console.log('2. Writing client.ts...')
290
- const clientBase64 = Buffer.from(clientCode).toString('base64')
291
- result = await ssm.runShellCommand(config.instanceId, [
292
- `echo '${clientBase64}' | base64 -d > /opt/imap-server/client.ts`,
293
- 'wc -l /opt/imap-server/client.ts',
294
- ], { maxWaitMs: 60000 })
295
-
296
- if (!result.success) {
297
- console.error('Failed to write client.ts:', result.error)
298
- process.exit(1)
299
- }
300
- console.log(' client.ts written')
301
-
302
- // Step 3: Write s3.ts
303
- console.log('3. Writing s3.ts...')
304
- const s3Base64 = Buffer.from(s3ClientCode).toString('base64')
305
- result = await ssm.runShellCommand(config.instanceId, [
306
- `echo '${s3Base64}' | base64 -d > /opt/imap-server/s3.ts`,
307
- 'wc -l /opt/imap-server/s3.ts',
308
- ], { maxWaitMs: 60000 })
309
-
310
- if (!result.success) {
311
- console.error('Failed to write s3.ts:', result.error)
312
- process.exit(1)
313
- }
314
- console.log(' s3.ts written')
315
-
316
- // Step 4: Write imap-server.ts
317
- console.log('4. Writing imap-server.ts...')
318
- const imapBase64 = Buffer.from(imapServerCode).toString('base64')
319
- result = await ssm.runShellCommand(config.instanceId, [
320
- `echo '${imapBase64}' | base64 -d > /opt/imap-server/imap-server.ts`,
321
- 'wc -l /opt/imap-server/imap-server.ts',
322
- ], { maxWaitMs: 60000 })
323
-
324
- if (!result.success) {
325
- console.error('Failed to write imap-server.ts:', result.error)
326
- process.exit(1)
327
- }
328
- console.log(' imap-server.ts written')
329
-
330
- // Step 5: Write server.ts
331
- console.log('5. Writing server.ts...')
332
- const serverBase64 = Buffer.from(serverScript).toString('base64')
333
- result = await ssm.runShellCommand(config.instanceId, [
334
- `echo '${serverBase64}' | base64 -d > /opt/imap-server/server.ts`,
335
- 'wc -l /opt/imap-server/server.ts',
336
- ], { maxWaitMs: 60000 })
337
-
338
- if (!result.success) {
339
- console.error('Failed to write server.ts:', result.error)
340
- process.exit(1)
341
- }
342
- console.log(' server.ts written')
343
-
344
- // Step 6: Write systemd service and start
345
- console.log('6. Setting up systemd service...')
346
- const serviceBase64 = Buffer.from(systemdService).toString('base64')
347
- result = await ssm.runShellCommand(config.instanceId, [
348
- `echo '${serviceBase64}' | base64 -d > /etc/systemd/system/imap-server.service`,
349
- 'systemctl daemon-reload',
350
- 'systemctl stop imap-server 2>/dev/null || true',
351
- 'systemctl enable imap-server',
352
- 'systemctl start imap-server',
353
- 'sleep 3',
354
- 'systemctl status imap-server --no-pager || true',
355
- 'ss -tlnp | grep -E ":143|:993" || netstat -tlnp | grep -E ":143|:993" || echo "Ports not yet listening"',
356
- ], { maxWaitMs: 120000 })
357
-
358
- console.log('')
359
- console.log('Service status:')
360
- console.log(result.output || result.error)
361
-
362
- console.log('')
363
- console.log('='.repeat(60))
364
- console.log('IMAP Server Deployment Complete!')
365
- console.log('='.repeat(60))
366
- console.log('')
367
- console.log('Mail.app Settings:')
368
- console.log(' Account Type: IMAP')
369
- console.log(` Incoming Server: mail.${config.domain}`)
370
- console.log(' Port: 143 (or 993 with SSL)')
371
- console.log(' Username: <email username>')
372
- console.log(' Password: <from Secrets Manager>')
373
- console.log('')
374
- console.log('Credentials are stored in AWS Secrets Manager:')
375
- console.log(` Secret: ${config.secretName}`)
376
- console.log('')
377
- }
378
-
379
- // Main entry point for standalone execution
380
- async function main() {
381
- await deployImapServer(defaultConfig)
382
- }
383
-
384
- main().catch(console.error)