@stacksjs/ts-cloud 0.1.9 → 0.1.14

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (150) hide show
  1. package/README.md +39 -377
  2. package/dist/bin/cli.js +1047 -424
  3. package/dist/index.d.ts +36 -3
  4. package/dist/index.js +76430 -7096
  5. package/package.json +7 -8
  6. package/dist/aws/acm.d.ts +0 -129
  7. package/dist/aws/application-autoscaling.d.ts +0 -282
  8. package/dist/aws/bedrock.d.ts +0 -2292
  9. package/dist/aws/client.d.ts +0 -79
  10. package/dist/aws/cloudformation.d.ts +0 -105
  11. package/dist/aws/cloudfront.d.ts +0 -265
  12. package/dist/aws/cloudwatch-logs.d.ts +0 -48
  13. package/dist/aws/comprehend.d.ts +0 -505
  14. package/dist/aws/connect.d.ts +0 -377
  15. package/dist/aws/deploy-imap.d.ts +0 -14
  16. package/dist/aws/dynamodb.d.ts +0 -176
  17. package/dist/aws/ec2.d.ts +0 -272
  18. package/dist/aws/ecr.d.ts +0 -149
  19. package/dist/aws/ecs.d.ts +0 -162
  20. package/dist/aws/elasticache.d.ts +0 -71
  21. package/dist/aws/elbv2.d.ts +0 -248
  22. package/dist/aws/email.d.ts +0 -175
  23. package/dist/aws/eventbridge.d.ts +0 -142
  24. package/dist/aws/iam.d.ts +0 -638
  25. package/dist/aws/imap-server.d.ts +0 -119
  26. package/dist/aws/index.d.ts +0 -192
  27. package/dist/aws/kendra.d.ts +0 -782
  28. package/dist/aws/lambda.d.ts +0 -232
  29. package/dist/aws/opensearch.d.ts +0 -87
  30. package/dist/aws/personalize.d.ts +0 -516
  31. package/dist/aws/polly.d.ts +0 -214
  32. package/dist/aws/rds.d.ts +0 -240
  33. package/dist/aws/rekognition.d.ts +0 -543
  34. package/dist/aws/route53-domains.d.ts +0 -113
  35. package/dist/aws/route53.d.ts +0 -215
  36. package/dist/aws/s3.d.ts +0 -212
  37. package/dist/aws/scheduler.d.ts +0 -140
  38. package/dist/aws/secrets-manager.d.ts +0 -170
  39. package/dist/aws/ses.d.ts +0 -288
  40. package/dist/aws/setup-phone.d.ts +0 -0
  41. package/dist/aws/setup-sms.d.ts +0 -115
  42. package/dist/aws/sms.d.ts +0 -304
  43. package/dist/aws/smtp-server.d.ts +0 -61
  44. package/dist/aws/sns.d.ts +0 -117
  45. package/dist/aws/sqs.d.ts +0 -65
  46. package/dist/aws/ssm.d.ts +0 -179
  47. package/dist/aws/sts.d.ts +0 -15
  48. package/dist/aws/support.d.ts +0 -104
  49. package/dist/aws/test-imap.d.ts +0 -0
  50. package/dist/aws/textract.d.ts +0 -403
  51. package/dist/aws/transcribe.d.ts +0 -60
  52. package/dist/aws/translate.d.ts +0 -358
  53. package/dist/aws/voice.d.ts +0 -219
  54. package/dist/config.d.ts +0 -7
  55. package/dist/deploy/index.d.ts +0 -2
  56. package/dist/deploy/static-site-external-dns.d.ts +0 -51
  57. package/dist/deploy/static-site.d.ts +0 -71
  58. package/dist/dns/cloudflare.d.ts +0 -52
  59. package/dist/dns/godaddy.d.ts +0 -38
  60. package/dist/dns/index.d.ts +0 -45
  61. package/dist/dns/porkbun.d.ts +0 -18
  62. package/dist/dns/route53-adapter.d.ts +0 -38
  63. package/dist/dns/types.d.ts +0 -77
  64. package/dist/dns/validator.d.ts +0 -78
  65. package/dist/generators/index.d.ts +0 -1
  66. package/dist/generators/infrastructure.d.ts +0 -30
  67. package/dist/push/apns.d.ts +0 -60
  68. package/dist/push/fcm.d.ts +0 -117
  69. package/dist/push/index.d.ts +0 -14
  70. package/dist/security/pre-deploy-scanner.d.ts +0 -69
  71. package/dist/ssl/acme-client.d.ts +0 -67
  72. package/dist/ssl/index.d.ts +0 -2
  73. package/dist/ssl/letsencrypt.d.ts +0 -48
  74. package/dist/types.d.ts +0 -1
  75. package/dist/utils/cli.d.ts +0 -123
  76. package/dist/validation/index.d.ts +0 -1
  77. package/dist/validation/template.d.ts +0 -23
  78. package/src/aws/acm.ts +0 -768
  79. package/src/aws/application-autoscaling.ts +0 -845
  80. package/src/aws/bedrock.ts +0 -4074
  81. package/src/aws/client.ts +0 -891
  82. package/src/aws/cloudformation.ts +0 -896
  83. package/src/aws/cloudfront.ts +0 -1531
  84. package/src/aws/cloudwatch-logs.ts +0 -154
  85. package/src/aws/comprehend.ts +0 -839
  86. package/src/aws/connect.ts +0 -1056
  87. package/src/aws/deploy-imap.ts +0 -384
  88. package/src/aws/dynamodb.ts +0 -340
  89. package/src/aws/ec2.ts +0 -1385
  90. package/src/aws/ecr.ts +0 -621
  91. package/src/aws/ecs.ts +0 -615
  92. package/src/aws/elasticache.ts +0 -301
  93. package/src/aws/elbv2.ts +0 -942
  94. package/src/aws/email.ts +0 -928
  95. package/src/aws/eventbridge.ts +0 -248
  96. package/src/aws/iam.ts +0 -1689
  97. package/src/aws/imap-server.ts +0 -2100
  98. package/src/aws/index.ts +0 -213
  99. package/src/aws/kendra.ts +0 -1097
  100. package/src/aws/lambda.ts +0 -786
  101. package/src/aws/opensearch.ts +0 -158
  102. package/src/aws/personalize.ts +0 -977
  103. package/src/aws/polly.ts +0 -559
  104. package/src/aws/rds.ts +0 -888
  105. package/src/aws/rekognition.ts +0 -846
  106. package/src/aws/route53-domains.ts +0 -359
  107. package/src/aws/route53.ts +0 -1046
  108. package/src/aws/s3.ts +0 -2334
  109. package/src/aws/scheduler.ts +0 -571
  110. package/src/aws/secrets-manager.ts +0 -769
  111. package/src/aws/ses.ts +0 -1081
  112. package/src/aws/setup-phone.ts +0 -104
  113. package/src/aws/setup-sms.ts +0 -580
  114. package/src/aws/sms.ts +0 -1735
  115. package/src/aws/smtp-server.ts +0 -531
  116. package/src/aws/sns.ts +0 -758
  117. package/src/aws/sqs.ts +0 -382
  118. package/src/aws/ssm.ts +0 -807
  119. package/src/aws/sts.ts +0 -92
  120. package/src/aws/support.ts +0 -391
  121. package/src/aws/test-imap.ts +0 -86
  122. package/src/aws/textract.ts +0 -780
  123. package/src/aws/transcribe.ts +0 -108
  124. package/src/aws/translate.ts +0 -641
  125. package/src/aws/voice.ts +0 -1379
  126. package/src/config.ts +0 -35
  127. package/src/deploy/index.ts +0 -7
  128. package/src/deploy/static-site-external-dns.ts +0 -945
  129. package/src/deploy/static-site.ts +0 -1175
  130. package/src/dns/cloudflare.ts +0 -548
  131. package/src/dns/godaddy.ts +0 -412
  132. package/src/dns/index.ts +0 -205
  133. package/src/dns/porkbun.ts +0 -362
  134. package/src/dns/route53-adapter.ts +0 -414
  135. package/src/dns/types.ts +0 -119
  136. package/src/dns/validator.ts +0 -369
  137. package/src/generators/index.ts +0 -5
  138. package/src/generators/infrastructure.ts +0 -1660
  139. package/src/index.ts +0 -163
  140. package/src/push/apns.ts +0 -452
  141. package/src/push/fcm.ts +0 -506
  142. package/src/push/index.ts +0 -58
  143. package/src/security/pre-deploy-scanner.ts +0 -655
  144. package/src/ssl/acme-client.ts +0 -478
  145. package/src/ssl/index.ts +0 -7
  146. package/src/ssl/letsencrypt.ts +0 -747
  147. package/src/types.ts +0 -2
  148. package/src/utils/cli.ts +0 -398
  149. package/src/validation/index.ts +0 -5
  150. package/src/validation/template.ts +0 -405
@@ -1,384 +0,0 @@
1
- #!/usr/bin/env bun
2
- /**
3
- * Deploy IMAP-to-S3 bridge server to EC2 via SSM
4
- * Embeds all code directly in SSM commands to avoid S3 permission issues
5
- *
6
- * Security:
7
- * - Uses EC2 instance IAM role for AWS credentials (no hardcoded keys)
8
- * - Fetches IMAP passwords from AWS Secrets Manager at startup
9
- * - Secret name: stacks/mail-server/credentials
10
- * - Credentials are read from email config and synced to Secrets Manager
11
- */
12
-
13
- import { SSMClient } from './ssm'
14
- import { AWSClient } from './client'
15
- import * as fs from 'node:fs'
16
- import * as path from 'node:path'
17
-
18
- export interface MailboxConfig {
19
- email: string
20
- password?: string
21
- }
22
-
23
- export interface MailServerDeployConfig {
24
- instanceId: string
25
- region: string
26
- secretName: string
27
- domain: string
28
- bucket: string
29
- prefix: string
30
- /** Mailboxes can be simple strings or objects with optional passwords */
31
- mailboxes: Array<string | MailboxConfig>
32
- }
33
-
34
- /**
35
- * Normalize mailbox config to object format with password lookup
36
- * Supports:
37
- * - Simple usernames: 'chris' -> 'chris@{domain}', looks up MAIL_PASSWORD_CHRIS
38
- * - Full email strings: 'chris@stacksjs.com' -> looks up MAIL_PASSWORD_CHRIS
39
- * - Objects with email: { email: 'chris@stacksjs.com', password: '...' }
40
- * - Objects with address (deprecated): { address: 'chris@stacksjs.com' }
41
- */
42
- function normalizeMailbox(mailbox: string | MailboxConfig | { address: string, password?: string }, domain: string): MailboxConfig {
43
- if (typeof mailbox === 'string') {
44
- // If it's just a username (no @), append the domain
45
- const email = mailbox.includes('@') ? mailbox : `${mailbox}@${domain}`
46
- const username = email.split('@')[0].toUpperCase()
47
- const envKey = `MAIL_PASSWORD_${username}`
48
- const password = process.env[envKey]
49
- return { email, password }
50
- }
51
-
52
- // Handle both 'email' and 'address' fields (address is deprecated)
53
- let email = 'email' in mailbox ? mailbox.email : (mailbox as { address: string }).address
54
- if (!email) {
55
- throw new Error('Mailbox must have either "email" or "address" field')
56
- }
57
-
58
- // If it's just a username (no @), append the domain
59
- if (!email.includes('@')) {
60
- email = `${email}@${domain}`
61
- }
62
-
63
- // If object format but no password, try env lookup
64
- if (!mailbox.password) {
65
- const username = email.split('@')[0].toUpperCase()
66
- const envKey = `MAIL_PASSWORD_${username}`
67
- const password = process.env[envKey]
68
- return { email, password }
69
- }
70
- return { email, password: mailbox.password }
71
- }
72
-
73
- const defaultConfig: MailServerDeployConfig = {
74
- instanceId: 'i-032233d3e9839b78b',
75
- region: 'us-east-1',
76
- secretName: 'stacks/mail-server/credentials',
77
- domain: 'stacksjs.com',
78
- bucket: 'stacks-production-email',
79
- prefix: 'incoming/',
80
- mailboxes: [],
81
- }
82
-
83
- export async function deployImapServer(config: MailServerDeployConfig = defaultConfig): Promise<void> {
84
- console.log('Deploying IMAP-to-S3 bridge server to EC2...')
85
- console.log('')
86
-
87
- const ssm = new SSMClient(config.region)
88
- const awsClient = new AWSClient()
89
-
90
- // Normalize all mailboxes to object format with password lookup
91
- const normalizedMailboxes = config.mailboxes.map((m) => normalizeMailbox(m, config.domain))
92
-
93
- // Build credentials from normalized mailboxes
94
- const credentials: Record<string, string> = {}
95
- for (const mailbox of normalizedMailboxes) {
96
- // Extract username from email (chris@stacksjs.com -> chris)
97
- const username = mailbox.email.split('@')[0]
98
- if (mailbox.password) {
99
- credentials[username] = mailbox.password
100
- }
101
- }
102
-
103
- // Ensure the secret exists with IMAP credentials from config
104
- console.log('0. Ensuring credentials secret exists in Secrets Manager...')
105
- try {
106
- const existingSecretResult = await awsClient.request({
107
- service: 'secretsmanager',
108
- region: config.region,
109
- method: 'POST',
110
- path: '/',
111
- headers: {
112
- 'Content-Type': 'application/x-amz-json-1.1',
113
- 'X-Amz-Target': 'secretsmanager.GetSecretValue',
114
- },
115
- body: JSON.stringify({ SecretId: config.secretName }),
116
- })
117
- const existingSecret = existingSecretResult.SecretString || '{}'
118
- console.log(' Secret already exists')
119
-
120
- // Update if we have new credentials from config
121
- if (Object.keys(credentials).length > 0) {
122
- const existingCreds = JSON.parse(existingSecret)
123
- const mergedCreds = { ...existingCreds, ...credentials }
124
- await awsClient.request({
125
- service: 'secretsmanager',
126
- region: config.region,
127
- method: 'POST',
128
- path: '/',
129
- headers: {
130
- 'Content-Type': 'application/x-amz-json-1.1',
131
- 'X-Amz-Target': 'secretsmanager.PutSecretValue',
132
- },
133
- body: JSON.stringify({
134
- SecretId: config.secretName,
135
- SecretString: JSON.stringify(mergedCreds),
136
- }),
137
- })
138
- console.log(' Secret updated with config credentials')
139
- }
140
- }
141
- catch {
142
- // Create the secret with credentials from config
143
- console.log(' Creating secret...')
144
- if (Object.keys(credentials).length === 0) {
145
- console.warn(' WARNING: No passwords configured in mailboxes - logins will fail')
146
- console.warn(' Set MAIL_PASSWORD_<USER> environment variables in your config')
147
- }
148
- await awsClient.request({
149
- service: 'secretsmanager',
150
- region: config.region,
151
- method: 'POST',
152
- path: '/',
153
- headers: {
154
- 'Content-Type': 'application/x-amz-json-1.1',
155
- 'X-Amz-Target': 'secretsmanager.CreateSecret',
156
- },
157
- body: JSON.stringify({
158
- Name: config.secretName,
159
- Description: `IMAP mail server credentials for ${config.domain}`,
160
- SecretString: JSON.stringify(credentials),
161
- ClientRequestToken: crypto.randomUUID(),
162
- }),
163
- })
164
- console.log(' Secret created')
165
- }
166
-
167
- // Read the source files
168
- const imapServerCode = fs.readFileSync(path.join(__dirname, 'imap-server.ts'), 'utf-8')
169
- const s3ClientCode = fs.readFileSync(path.join(__dirname, 's3.ts'), 'utf-8')
170
- const clientCode = fs.readFileSync(path.join(__dirname, 'client.ts'), 'utf-8')
171
-
172
- // Build users config for server script from normalized mailboxes
173
- const usersConfig = normalizedMailboxes.map((m) => {
174
- const username = m.email.split('@')[0]
175
- return ` ${username}: {
176
- password: passwords.${username} || 'changeme',
177
- email: '${m.email}',
178
- },`
179
- }).join('\n')
180
-
181
- // Create the server startup script - fetches credentials from Secrets Manager using AWSClient directly
182
- const serverScript = `#!/usr/bin/env bun
183
- import * as fs from 'node:fs'
184
- import { startImapServer } from './imap-server'
185
- import { AWSClient } from './client'
186
-
187
- const SECRET_NAME = '${config.secretName}'
188
- const REGION = '${config.region}'
189
-
190
- async function main() {
191
- console.log('Starting IMAP-to-S3 bridge server...')
192
-
193
- // Fetch credentials from Secrets Manager using AWSClient directly (uses EC2 instance IAM role)
194
- console.log('Fetching credentials from Secrets Manager...')
195
- const client = new AWSClient()
196
- let passwords: Record<string, string> = {}
197
-
198
- try {
199
- const result = await client.request({
200
- service: 'secretsmanager',
201
- region: REGION,
202
- method: 'POST',
203
- path: '/',
204
- headers: {
205
- 'Content-Type': 'application/x-amz-json-1.1',
206
- 'X-Amz-Target': 'secretsmanager.GetSecretValue'
207
- },
208
- body: JSON.stringify({ SecretId: SECRET_NAME })
209
- })
210
- passwords = JSON.parse(result.SecretString || '{}')
211
- console.log('Credentials loaded for:', Object.keys(passwords).join(', '))
212
- }
213
- catch (error) {
214
- console.error('Failed to fetch credentials from Secrets Manager:', error)
215
- console.error('Using fallback empty passwords - logins will fail')
216
- }
217
-
218
- const hasTlsCerts = fs.existsSync('/etc/letsencrypt/live/mail.${config.domain}/privkey.pem')
219
- console.log('TLS certificates available:', hasTlsCerts)
220
-
221
- const server = await startImapServer({
222
- port: 143,
223
- sslPort: 993,
224
- host: '0.0.0.0',
225
- region: REGION,
226
- bucket: '${config.bucket}',
227
- prefix: '${config.prefix}',
228
- domain: '${config.domain}',
229
- users: {
230
- ${usersConfig}
231
- },
232
- tls: hasTlsCerts ? {
233
- key: '/etc/letsencrypt/live/mail.${config.domain}/privkey.pem',
234
- cert: '/etc/letsencrypt/live/mail.${config.domain}/fullchain.pem',
235
- } : undefined,
236
- })
237
-
238
- console.log('IMAP server running on port 143' + (hasTlsCerts ? ' and 993 (TLS)' : ''))
239
-
240
- process.on('SIGINT', async () => {
241
- console.log('Shutting down...')
242
- await server.stop()
243
- process.exit(0)
244
- })
245
-
246
- process.on('SIGTERM', async () => {
247
- console.log('Shutting down...')
248
- await server.stop()
249
- process.exit(0)
250
- })
251
- }
252
-
253
- main().catch(console.error)
254
- `
255
-
256
- // Create systemd service file - NO hardcoded credentials, uses IAM role
257
- const systemdService = `[Unit]
258
- Description=IMAP-to-S3 Bridge Server
259
- After=network.target
260
-
261
- [Service]
262
- Type=simple
263
- User=root
264
- WorkingDirectory=/opt/imap-server
265
- # AWS credentials come from EC2 instance IAM role - no hardcoded keys needed
266
- Environment="AWS_REGION=${config.region}"
267
- ExecStart=/root/.bun/bin/bun run /opt/imap-server/server.ts
268
- Restart=always
269
- RestartSec=10
270
-
271
- [Install]
272
- WantedBy=multi-user.target
273
- `
274
-
275
- // Step 1: Create directory structure
276
- console.log('1. Creating directory structure on EC2...')
277
- let result = await ssm.runShellCommand(config.instanceId, [
278
- 'mkdir -p /opt/imap-server',
279
- 'ls -la /opt/imap-server',
280
- ], { maxWaitMs: 60000 })
281
-
282
- if (!result.success) {
283
- console.error('Failed to create directory:', result.error)
284
- process.exit(1)
285
- }
286
- console.log(' Directory created')
287
-
288
- // Step 2: Write client.ts (base64 encode to handle special chars)
289
- console.log('2. Writing client.ts...')
290
- const clientBase64 = Buffer.from(clientCode).toString('base64')
291
- result = await ssm.runShellCommand(config.instanceId, [
292
- `echo '${clientBase64}' | base64 -d > /opt/imap-server/client.ts`,
293
- 'wc -l /opt/imap-server/client.ts',
294
- ], { maxWaitMs: 60000 })
295
-
296
- if (!result.success) {
297
- console.error('Failed to write client.ts:', result.error)
298
- process.exit(1)
299
- }
300
- console.log(' client.ts written')
301
-
302
- // Step 3: Write s3.ts
303
- console.log('3. Writing s3.ts...')
304
- const s3Base64 = Buffer.from(s3ClientCode).toString('base64')
305
- result = await ssm.runShellCommand(config.instanceId, [
306
- `echo '${s3Base64}' | base64 -d > /opt/imap-server/s3.ts`,
307
- 'wc -l /opt/imap-server/s3.ts',
308
- ], { maxWaitMs: 60000 })
309
-
310
- if (!result.success) {
311
- console.error('Failed to write s3.ts:', result.error)
312
- process.exit(1)
313
- }
314
- console.log(' s3.ts written')
315
-
316
- // Step 4: Write imap-server.ts
317
- console.log('4. Writing imap-server.ts...')
318
- const imapBase64 = Buffer.from(imapServerCode).toString('base64')
319
- result = await ssm.runShellCommand(config.instanceId, [
320
- `echo '${imapBase64}' | base64 -d > /opt/imap-server/imap-server.ts`,
321
- 'wc -l /opt/imap-server/imap-server.ts',
322
- ], { maxWaitMs: 60000 })
323
-
324
- if (!result.success) {
325
- console.error('Failed to write imap-server.ts:', result.error)
326
- process.exit(1)
327
- }
328
- console.log(' imap-server.ts written')
329
-
330
- // Step 5: Write server.ts
331
- console.log('5. Writing server.ts...')
332
- const serverBase64 = Buffer.from(serverScript).toString('base64')
333
- result = await ssm.runShellCommand(config.instanceId, [
334
- `echo '${serverBase64}' | base64 -d > /opt/imap-server/server.ts`,
335
- 'wc -l /opt/imap-server/server.ts',
336
- ], { maxWaitMs: 60000 })
337
-
338
- if (!result.success) {
339
- console.error('Failed to write server.ts:', result.error)
340
- process.exit(1)
341
- }
342
- console.log(' server.ts written')
343
-
344
- // Step 6: Write systemd service and start
345
- console.log('6. Setting up systemd service...')
346
- const serviceBase64 = Buffer.from(systemdService).toString('base64')
347
- result = await ssm.runShellCommand(config.instanceId, [
348
- `echo '${serviceBase64}' | base64 -d > /etc/systemd/system/imap-server.service`,
349
- 'systemctl daemon-reload',
350
- 'systemctl stop imap-server 2>/dev/null || true',
351
- 'systemctl enable imap-server',
352
- 'systemctl start imap-server',
353
- 'sleep 3',
354
- 'systemctl status imap-server --no-pager || true',
355
- 'ss -tlnp | grep -E ":143|:993" || netstat -tlnp | grep -E ":143|:993" || echo "Ports not yet listening"',
356
- ], { maxWaitMs: 120000 })
357
-
358
- console.log('')
359
- console.log('Service status:')
360
- console.log(result.output || result.error)
361
-
362
- console.log('')
363
- console.log('='.repeat(60))
364
- console.log('IMAP Server Deployment Complete!')
365
- console.log('='.repeat(60))
366
- console.log('')
367
- console.log('Mail.app Settings:')
368
- console.log(' Account Type: IMAP')
369
- console.log(` Incoming Server: mail.${config.domain}`)
370
- console.log(' Port: 143 (or 993 with SSL)')
371
- console.log(' Username: <email username>')
372
- console.log(' Password: <from Secrets Manager>')
373
- console.log('')
374
- console.log('Credentials are stored in AWS Secrets Manager:')
375
- console.log(` Secret: ${config.secretName}`)
376
- console.log('')
377
- }
378
-
379
- // Main entry point for standalone execution
380
- async function main() {
381
- await deployImapServer(defaultConfig)
382
- }
383
-
384
- main().catch(console.error)