@contractspec/integration.runtime 1.56.1 → 1.58.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/health.d.ts +14 -18
- package/dist/health.d.ts.map +1 -1
- package/dist/health.js +71 -68
- package/dist/index.d.ts +4 -8
- package/dist/index.d.ts.map +1 -0
- package/dist/index.js +828 -9
- package/dist/node/health.js +72 -0
- package/dist/node/index.js +827 -0
- package/dist/node/runtime.js +208 -0
- package/dist/node/secrets/env-secret-provider.js +158 -0
- package/dist/node/secrets/gcp-secret-manager.js +346 -0
- package/dist/node/secrets/index.js +549 -0
- package/dist/node/secrets/manager.js +182 -0
- package/dist/node/secrets/provider.js +73 -0
- package/dist/runtime.d.ts +86 -90
- package/dist/runtime.d.ts.map +1 -1
- package/dist/runtime.js +204 -182
- package/dist/secrets/env-secret-provider.d.ts +20 -23
- package/dist/secrets/env-secret-provider.d.ts.map +1 -1
- package/dist/secrets/env-secret-provider.js +157 -80
- package/dist/secrets/gcp-secret-manager.d.ts +25 -28
- package/dist/secrets/gcp-secret-manager.d.ts.map +1 -1
- package/dist/secrets/gcp-secret-manager.js +339 -222
- package/dist/secrets/index.d.ts +5 -5
- package/dist/secrets/index.d.ts.map +1 -0
- package/dist/secrets/index.js +549 -5
- package/dist/secrets/manager.d.ts +32 -35
- package/dist/secrets/manager.d.ts.map +1 -1
- package/dist/secrets/manager.js +180 -101
- package/dist/secrets/provider.d.ts +42 -45
- package/dist/secrets/provider.d.ts.map +1 -1
- package/dist/secrets/provider.js +69 -54
- package/package.json +76 -30
- package/dist/health.js.map +0 -1
- package/dist/runtime.js.map +0 -1
- package/dist/secrets/env-secret-provider.js.map +0 -1
- package/dist/secrets/gcp-secret-manager.js.map +0 -1
- package/dist/secrets/manager.js.map +0 -1
- package/dist/secrets/provider.js.map +0 -1
|
@@ -1,230 +1,347 @@
|
|
|
1
|
-
|
|
2
|
-
|
|
1
|
+
// @bun
|
|
2
|
+
// src/secrets/provider.ts
|
|
3
|
+
import { Buffer } from "buffer";
|
|
3
4
|
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
42
|
-
|
|
43
|
-
|
|
44
|
-
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
50
|
-
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
|
|
54
|
-
|
|
55
|
-
|
|
56
|
-
|
|
57
|
-
|
|
58
|
-
|
|
59
|
-
|
|
60
|
-
|
|
61
|
-
|
|
62
|
-
|
|
63
|
-
|
|
64
|
-
|
|
65
|
-
|
|
66
|
-
|
|
67
|
-
|
|
68
|
-
|
|
69
|
-
|
|
70
|
-
|
|
71
|
-
|
|
72
|
-
|
|
73
|
-
|
|
74
|
-
|
|
75
|
-
|
|
76
|
-
provider: this.id,
|
|
77
|
-
reference,
|
|
78
|
-
operation: "addSecretVersion"
|
|
79
|
-
});
|
|
80
|
-
}
|
|
81
|
-
}
|
|
82
|
-
async rotateSecret(reference, payload) {
|
|
83
|
-
return this.setSecret(reference, payload);
|
|
84
|
-
}
|
|
85
|
-
async deleteSecret(reference) {
|
|
86
|
-
const location = this.parseReference(reference);
|
|
87
|
-
const { secretName } = this.buildNames(location);
|
|
88
|
-
try {
|
|
89
|
-
await this.client.deleteSecret({ name: secretName });
|
|
90
|
-
} catch (error) {
|
|
91
|
-
throw toSecretProviderError({
|
|
92
|
-
error,
|
|
93
|
-
provider: this.id,
|
|
94
|
-
reference,
|
|
95
|
-
operation: "delete"
|
|
96
|
-
});
|
|
97
|
-
}
|
|
98
|
-
}
|
|
99
|
-
parseReference(reference) {
|
|
100
|
-
const parsed = parseSecretUri(reference);
|
|
101
|
-
if (parsed.provider !== "gcp") throw new SecretProviderError({
|
|
102
|
-
message: `Unsupported secret provider: ${parsed.provider}`,
|
|
103
|
-
provider: this.id,
|
|
104
|
-
reference,
|
|
105
|
-
code: "INVALID"
|
|
106
|
-
});
|
|
107
|
-
const segments = parsed.path.split("/").filter(Boolean);
|
|
108
|
-
if (segments.length < 4 || segments[0] !== "projects") throw new SecretProviderError({
|
|
109
|
-
message: `Expected secret reference format gcp://projects/{project}/secrets/{secret}[(/versions/{version})] but received "${parsed.path}"`,
|
|
110
|
-
provider: this.id,
|
|
111
|
-
reference,
|
|
112
|
-
code: "INVALID"
|
|
113
|
-
});
|
|
114
|
-
const projectIdCandidate = segments[1] ?? this.explicitProjectId;
|
|
115
|
-
if (!projectIdCandidate) throw new SecretProviderError({
|
|
116
|
-
message: `Unable to resolve project or secret from reference "${parsed.path}"`,
|
|
117
|
-
provider: this.id,
|
|
118
|
-
reference,
|
|
119
|
-
code: "INVALID"
|
|
120
|
-
});
|
|
121
|
-
const indexOfSecrets = segments.indexOf("secrets");
|
|
122
|
-
if (indexOfSecrets === -1 || indexOfSecrets + 1 >= segments.length) throw new SecretProviderError({
|
|
123
|
-
message: `Unable to resolve project or secret from reference "${parsed.path}"`,
|
|
124
|
-
provider: this.id,
|
|
125
|
-
reference,
|
|
126
|
-
code: "INVALID"
|
|
127
|
-
});
|
|
128
|
-
const resolvedProjectId = projectIdCandidate;
|
|
129
|
-
const secretIdCandidate = segments[indexOfSecrets + 1];
|
|
130
|
-
if (!secretIdCandidate) throw new SecretProviderError({
|
|
131
|
-
message: `Unable to resolve secret ID from reference "${parsed.path}"`,
|
|
132
|
-
provider: this.id,
|
|
133
|
-
reference,
|
|
134
|
-
code: "INVALID"
|
|
135
|
-
});
|
|
136
|
-
const secretId = secretIdCandidate;
|
|
137
|
-
const indexOfVersions = segments.indexOf("versions");
|
|
138
|
-
return {
|
|
139
|
-
projectId: resolvedProjectId,
|
|
140
|
-
secretId,
|
|
141
|
-
version: parsed.extras?.version ?? (indexOfVersions !== -1 && indexOfVersions + 1 < segments.length ? segments[indexOfVersions + 1] : void 0)
|
|
142
|
-
};
|
|
143
|
-
}
|
|
144
|
-
buildNames(location) {
|
|
145
|
-
const projectId = location.projectId ?? this.explicitProjectId;
|
|
146
|
-
if (!projectId) throw new SecretProviderError({
|
|
147
|
-
message: "Project ID must be provided either in reference or provider configuration",
|
|
148
|
-
provider: this.id,
|
|
149
|
-
reference: `gcp://projects//secrets/${location.secretId}`,
|
|
150
|
-
code: "INVALID"
|
|
151
|
-
});
|
|
152
|
-
const projectParent = `projects/${projectId}`;
|
|
153
|
-
return {
|
|
154
|
-
projectParent,
|
|
155
|
-
secretName: `${projectParent}/secrets/${location.secretId}`
|
|
156
|
-
};
|
|
157
|
-
}
|
|
158
|
-
buildVersionName(location, explicitVersion) {
|
|
159
|
-
const { secretName } = this.buildNames(location);
|
|
160
|
-
return `${secretName}/versions/${explicitVersion ?? location.version ?? "latest"}`;
|
|
161
|
-
}
|
|
162
|
-
async ensureSecretExists(location, payload) {
|
|
163
|
-
const { secretName, projectParent } = this.buildNames(location);
|
|
164
|
-
try {
|
|
165
|
-
await this.client.getSecret({ name: secretName });
|
|
166
|
-
} catch (error) {
|
|
167
|
-
const providerError = toSecretProviderError({
|
|
168
|
-
error,
|
|
169
|
-
provider: this.id,
|
|
170
|
-
reference: `gcp://${secretName}`,
|
|
171
|
-
operation: "getSecret",
|
|
172
|
-
suppressThrow: true
|
|
173
|
-
});
|
|
174
|
-
if (!providerError || providerError.code !== "NOT_FOUND") {
|
|
175
|
-
if (providerError) throw providerError;
|
|
176
|
-
throw error;
|
|
177
|
-
}
|
|
178
|
-
try {
|
|
179
|
-
await this.client.createSecret({
|
|
180
|
-
parent: projectParent,
|
|
181
|
-
secretId: location.secretId,
|
|
182
|
-
secret: {
|
|
183
|
-
replication: this.replication,
|
|
184
|
-
labels: payload.labels
|
|
185
|
-
}
|
|
186
|
-
});
|
|
187
|
-
} catch (creationError) {
|
|
188
|
-
throw toSecretProviderError({
|
|
189
|
-
error: creationError,
|
|
190
|
-
provider: this.id,
|
|
191
|
-
reference: `gcp://${secretName}`,
|
|
192
|
-
operation: "createSecret"
|
|
193
|
-
});
|
|
194
|
-
}
|
|
195
|
-
}
|
|
196
|
-
}
|
|
5
|
+
class SecretProviderError extends Error {
|
|
6
|
+
provider;
|
|
7
|
+
reference;
|
|
8
|
+
code;
|
|
9
|
+
cause;
|
|
10
|
+
constructor(params) {
|
|
11
|
+
super(params.message);
|
|
12
|
+
this.name = "SecretProviderError";
|
|
13
|
+
this.provider = params.provider;
|
|
14
|
+
this.reference = params.reference;
|
|
15
|
+
this.code = params.code ?? "UNKNOWN";
|
|
16
|
+
this.cause = params.cause;
|
|
17
|
+
}
|
|
18
|
+
}
|
|
19
|
+
function parseSecretUri(reference) {
|
|
20
|
+
if (!reference) {
|
|
21
|
+
throw new SecretProviderError({
|
|
22
|
+
message: "Secret reference cannot be empty",
|
|
23
|
+
provider: "unknown",
|
|
24
|
+
reference,
|
|
25
|
+
code: "INVALID"
|
|
26
|
+
});
|
|
27
|
+
}
|
|
28
|
+
const [scheme, rest] = reference.split("://");
|
|
29
|
+
if (!scheme || !rest) {
|
|
30
|
+
throw new SecretProviderError({
|
|
31
|
+
message: `Invalid secret reference: ${reference}`,
|
|
32
|
+
provider: "unknown",
|
|
33
|
+
reference,
|
|
34
|
+
code: "INVALID"
|
|
35
|
+
});
|
|
36
|
+
}
|
|
37
|
+
const queryIndex = rest.indexOf("?");
|
|
38
|
+
if (queryIndex === -1) {
|
|
39
|
+
return {
|
|
40
|
+
provider: scheme,
|
|
41
|
+
path: rest
|
|
42
|
+
};
|
|
43
|
+
}
|
|
44
|
+
const path = rest.slice(0, queryIndex);
|
|
45
|
+
const query = rest.slice(queryIndex + 1);
|
|
46
|
+
const extras = Object.fromEntries(query.split("&").filter(Boolean).map((pair) => {
|
|
47
|
+
const [keyRaw, valueRaw] = pair.split("=");
|
|
48
|
+
const key = keyRaw ?? "";
|
|
49
|
+
const value = valueRaw ?? "";
|
|
50
|
+
return [decodeURIComponent(key), decodeURIComponent(value)];
|
|
51
|
+
}));
|
|
52
|
+
return {
|
|
53
|
+
provider: scheme,
|
|
54
|
+
path,
|
|
55
|
+
extras
|
|
56
|
+
};
|
|
57
|
+
}
|
|
58
|
+
function normalizeSecretPayload(payload) {
|
|
59
|
+
if (payload.data instanceof Uint8Array) {
|
|
60
|
+
return payload.data;
|
|
61
|
+
}
|
|
62
|
+
if (payload.encoding === "base64") {
|
|
63
|
+
return Buffer.from(payload.data, "base64");
|
|
64
|
+
}
|
|
65
|
+
if (payload.encoding === "binary") {
|
|
66
|
+
return Buffer.from(payload.data, "binary");
|
|
67
|
+
}
|
|
68
|
+
return Buffer.from(payload.data, "utf-8");
|
|
69
|
+
}
|
|
70
|
+
|
|
71
|
+
// src/secrets/gcp-secret-manager.ts
|
|
72
|
+
import {
|
|
73
|
+
SecretManagerServiceClient
|
|
74
|
+
} from "@google-cloud/secret-manager";
|
|
75
|
+
var DEFAULT_REPLICATION = {
|
|
76
|
+
automatic: {}
|
|
197
77
|
};
|
|
78
|
+
|
|
79
|
+
class GcpSecretManagerProvider {
|
|
80
|
+
id = "gcp-secret-manager";
|
|
81
|
+
client;
|
|
82
|
+
explicitProjectId;
|
|
83
|
+
replication;
|
|
84
|
+
constructor(options = {}) {
|
|
85
|
+
this.client = options.client ?? new SecretManagerServiceClient(options.clientOptions ?? {});
|
|
86
|
+
this.explicitProjectId = options.projectId;
|
|
87
|
+
this.replication = options.defaultReplication ?? DEFAULT_REPLICATION;
|
|
88
|
+
}
|
|
89
|
+
canHandle(reference) {
|
|
90
|
+
try {
|
|
91
|
+
const parsed = parseSecretUri(reference);
|
|
92
|
+
return parsed.provider === "gcp";
|
|
93
|
+
} catch {
|
|
94
|
+
return false;
|
|
95
|
+
}
|
|
96
|
+
}
|
|
97
|
+
async getSecret(reference, options, callOptions) {
|
|
98
|
+
const location = this.parseReference(reference);
|
|
99
|
+
const secretVersionName = this.buildVersionName(location, options?.version);
|
|
100
|
+
try {
|
|
101
|
+
const response = await this.client.accessSecretVersion({
|
|
102
|
+
name: secretVersionName
|
|
103
|
+
}, callOptions ?? {});
|
|
104
|
+
const [result] = response;
|
|
105
|
+
const payload = result.payload;
|
|
106
|
+
if (!payload?.data) {
|
|
107
|
+
throw new SecretProviderError({
|
|
108
|
+
message: `Secret payload empty for ${secretVersionName}`,
|
|
109
|
+
provider: this.id,
|
|
110
|
+
reference,
|
|
111
|
+
code: "UNKNOWN"
|
|
112
|
+
});
|
|
113
|
+
}
|
|
114
|
+
const version = extractVersionFromName(result.name ?? secretVersionName);
|
|
115
|
+
return {
|
|
116
|
+
data: payload.data,
|
|
117
|
+
version,
|
|
118
|
+
metadata: payload.dataCrc32c ? { crc32c: payload.dataCrc32c.toString() } : undefined,
|
|
119
|
+
retrievedAt: new Date
|
|
120
|
+
};
|
|
121
|
+
} catch (error) {
|
|
122
|
+
throw toSecretProviderError({
|
|
123
|
+
error,
|
|
124
|
+
provider: this.id,
|
|
125
|
+
reference,
|
|
126
|
+
operation: "access"
|
|
127
|
+
});
|
|
128
|
+
}
|
|
129
|
+
}
|
|
130
|
+
async setSecret(reference, payload) {
|
|
131
|
+
const location = this.parseReference(reference);
|
|
132
|
+
const { secretName } = this.buildNames(location);
|
|
133
|
+
const data = normalizeSecretPayload(payload);
|
|
134
|
+
await this.ensureSecretExists(location, payload);
|
|
135
|
+
try {
|
|
136
|
+
const response = await this.client.addSecretVersion({
|
|
137
|
+
parent: secretName,
|
|
138
|
+
payload: {
|
|
139
|
+
data
|
|
140
|
+
}
|
|
141
|
+
});
|
|
142
|
+
if (!response) {
|
|
143
|
+
throw new SecretProviderError({
|
|
144
|
+
message: `No version returned when adding secret version for ${secretName}`,
|
|
145
|
+
provider: this.id,
|
|
146
|
+
reference,
|
|
147
|
+
code: "UNKNOWN"
|
|
148
|
+
});
|
|
149
|
+
}
|
|
150
|
+
const [version] = response;
|
|
151
|
+
const versionName = version?.name ?? `${secretName}/versions/latest`;
|
|
152
|
+
return {
|
|
153
|
+
reference: `gcp://${versionName}`,
|
|
154
|
+
version: extractVersionFromName(versionName) ?? "latest"
|
|
155
|
+
};
|
|
156
|
+
} catch (error) {
|
|
157
|
+
throw toSecretProviderError({
|
|
158
|
+
error,
|
|
159
|
+
provider: this.id,
|
|
160
|
+
reference,
|
|
161
|
+
operation: "addSecretVersion"
|
|
162
|
+
});
|
|
163
|
+
}
|
|
164
|
+
}
|
|
165
|
+
async rotateSecret(reference, payload) {
|
|
166
|
+
return this.setSecret(reference, payload);
|
|
167
|
+
}
|
|
168
|
+
async deleteSecret(reference) {
|
|
169
|
+
const location = this.parseReference(reference);
|
|
170
|
+
const { secretName } = this.buildNames(location);
|
|
171
|
+
try {
|
|
172
|
+
await this.client.deleteSecret({
|
|
173
|
+
name: secretName
|
|
174
|
+
});
|
|
175
|
+
} catch (error) {
|
|
176
|
+
throw toSecretProviderError({
|
|
177
|
+
error,
|
|
178
|
+
provider: this.id,
|
|
179
|
+
reference,
|
|
180
|
+
operation: "delete"
|
|
181
|
+
});
|
|
182
|
+
}
|
|
183
|
+
}
|
|
184
|
+
parseReference(reference) {
|
|
185
|
+
const parsed = parseSecretUri(reference);
|
|
186
|
+
if (parsed.provider !== "gcp") {
|
|
187
|
+
throw new SecretProviderError({
|
|
188
|
+
message: `Unsupported secret provider: ${parsed.provider}`,
|
|
189
|
+
provider: this.id,
|
|
190
|
+
reference,
|
|
191
|
+
code: "INVALID"
|
|
192
|
+
});
|
|
193
|
+
}
|
|
194
|
+
const segments = parsed.path.split("/").filter(Boolean);
|
|
195
|
+
if (segments.length < 4 || segments[0] !== "projects") {
|
|
196
|
+
throw new SecretProviderError({
|
|
197
|
+
message: `Expected secret reference format gcp://projects/{project}/secrets/{secret}[(/versions/{version})] but received "${parsed.path}"`,
|
|
198
|
+
provider: this.id,
|
|
199
|
+
reference,
|
|
200
|
+
code: "INVALID"
|
|
201
|
+
});
|
|
202
|
+
}
|
|
203
|
+
const projectIdCandidate = segments[1] ?? this.explicitProjectId;
|
|
204
|
+
if (!projectIdCandidate) {
|
|
205
|
+
throw new SecretProviderError({
|
|
206
|
+
message: `Unable to resolve project or secret from reference "${parsed.path}"`,
|
|
207
|
+
provider: this.id,
|
|
208
|
+
reference,
|
|
209
|
+
code: "INVALID"
|
|
210
|
+
});
|
|
211
|
+
}
|
|
212
|
+
const indexOfSecrets = segments.indexOf("secrets");
|
|
213
|
+
if (indexOfSecrets === -1 || indexOfSecrets + 1 >= segments.length) {
|
|
214
|
+
throw new SecretProviderError({
|
|
215
|
+
message: `Unable to resolve project or secret from reference "${parsed.path}"`,
|
|
216
|
+
provider: this.id,
|
|
217
|
+
reference,
|
|
218
|
+
code: "INVALID"
|
|
219
|
+
});
|
|
220
|
+
}
|
|
221
|
+
const resolvedProjectId = projectIdCandidate;
|
|
222
|
+
const secretIdCandidate = segments[indexOfSecrets + 1];
|
|
223
|
+
if (!secretIdCandidate) {
|
|
224
|
+
throw new SecretProviderError({
|
|
225
|
+
message: `Unable to resolve secret ID from reference "${parsed.path}"`,
|
|
226
|
+
provider: this.id,
|
|
227
|
+
reference,
|
|
228
|
+
code: "INVALID"
|
|
229
|
+
});
|
|
230
|
+
}
|
|
231
|
+
const secretId = secretIdCandidate;
|
|
232
|
+
const indexOfVersions = segments.indexOf("versions");
|
|
233
|
+
const version = parsed.extras?.version ?? (indexOfVersions !== -1 && indexOfVersions + 1 < segments.length ? segments[indexOfVersions + 1] : undefined);
|
|
234
|
+
return {
|
|
235
|
+
projectId: resolvedProjectId,
|
|
236
|
+
secretId,
|
|
237
|
+
version
|
|
238
|
+
};
|
|
239
|
+
}
|
|
240
|
+
buildNames(location) {
|
|
241
|
+
const projectId = location.projectId ?? this.explicitProjectId;
|
|
242
|
+
if (!projectId) {
|
|
243
|
+
throw new SecretProviderError({
|
|
244
|
+
message: "Project ID must be provided either in reference or provider configuration",
|
|
245
|
+
provider: this.id,
|
|
246
|
+
reference: `gcp://projects//secrets/${location.secretId}`,
|
|
247
|
+
code: "INVALID"
|
|
248
|
+
});
|
|
249
|
+
}
|
|
250
|
+
const projectParent = `projects/${projectId}`;
|
|
251
|
+
const secretName = `${projectParent}/secrets/${location.secretId}`;
|
|
252
|
+
return {
|
|
253
|
+
projectParent,
|
|
254
|
+
secretName
|
|
255
|
+
};
|
|
256
|
+
}
|
|
257
|
+
buildVersionName(location, explicitVersion) {
|
|
258
|
+
const { secretName } = this.buildNames(location);
|
|
259
|
+
const version = explicitVersion ?? location.version ?? "latest";
|
|
260
|
+
return `${secretName}/versions/${version}`;
|
|
261
|
+
}
|
|
262
|
+
async ensureSecretExists(location, payload) {
|
|
263
|
+
const { secretName, projectParent } = this.buildNames(location);
|
|
264
|
+
try {
|
|
265
|
+
await this.client.getSecret({ name: secretName });
|
|
266
|
+
} catch (error) {
|
|
267
|
+
const providerError = toSecretProviderError({
|
|
268
|
+
error,
|
|
269
|
+
provider: this.id,
|
|
270
|
+
reference: `gcp://${secretName}`,
|
|
271
|
+
operation: "getSecret",
|
|
272
|
+
suppressThrow: true
|
|
273
|
+
});
|
|
274
|
+
if (!providerError || providerError.code !== "NOT_FOUND") {
|
|
275
|
+
if (providerError) {
|
|
276
|
+
throw providerError;
|
|
277
|
+
}
|
|
278
|
+
throw error;
|
|
279
|
+
}
|
|
280
|
+
try {
|
|
281
|
+
await this.client.createSecret({
|
|
282
|
+
parent: projectParent,
|
|
283
|
+
secretId: location.secretId,
|
|
284
|
+
secret: {
|
|
285
|
+
replication: this.replication,
|
|
286
|
+
labels: payload.labels
|
|
287
|
+
}
|
|
288
|
+
});
|
|
289
|
+
} catch (creationError) {
|
|
290
|
+
const creationProviderError = toSecretProviderError({
|
|
291
|
+
error: creationError,
|
|
292
|
+
provider: this.id,
|
|
293
|
+
reference: `gcp://${secretName}`,
|
|
294
|
+
operation: "createSecret"
|
|
295
|
+
});
|
|
296
|
+
throw creationProviderError;
|
|
297
|
+
}
|
|
298
|
+
}
|
|
299
|
+
}
|
|
300
|
+
}
|
|
198
301
|
function extractVersionFromName(name) {
|
|
199
|
-
|
|
200
|
-
|
|
201
|
-
|
|
202
|
-
|
|
302
|
+
const segments = name.split("/").filter(Boolean);
|
|
303
|
+
const index = segments.indexOf("versions");
|
|
304
|
+
if (index === -1 || index + 1 >= segments.length) {
|
|
305
|
+
return;
|
|
306
|
+
}
|
|
307
|
+
return segments[index + 1];
|
|
203
308
|
}
|
|
204
309
|
function toSecretProviderError(params) {
|
|
205
|
-
|
|
206
|
-
|
|
207
|
-
|
|
208
|
-
|
|
209
|
-
|
|
210
|
-
|
|
211
|
-
|
|
212
|
-
|
|
213
|
-
|
|
214
|
-
|
|
215
|
-
|
|
216
|
-
|
|
310
|
+
const { error, provider, reference, operation, suppressThrow } = params;
|
|
311
|
+
if (error instanceof SecretProviderError) {
|
|
312
|
+
return error;
|
|
313
|
+
}
|
|
314
|
+
const code = deriveErrorCode(error);
|
|
315
|
+
const message = error instanceof Error ? error.message : `Unknown error during ${operation}`;
|
|
316
|
+
const providerError = new SecretProviderError({
|
|
317
|
+
message,
|
|
318
|
+
provider,
|
|
319
|
+
reference,
|
|
320
|
+
code,
|
|
321
|
+
cause: error
|
|
322
|
+
});
|
|
323
|
+
if (suppressThrow) {
|
|
324
|
+
return providerError;
|
|
325
|
+
}
|
|
326
|
+
throw providerError;
|
|
217
327
|
}
|
|
218
328
|
function deriveErrorCode(error) {
|
|
219
|
-
|
|
220
|
-
|
|
221
|
-
|
|
222
|
-
|
|
223
|
-
|
|
224
|
-
|
|
225
|
-
|
|
329
|
+
if (typeof error !== "object" || error === null) {
|
|
330
|
+
return "UNKNOWN";
|
|
331
|
+
}
|
|
332
|
+
const errorAny = error;
|
|
333
|
+
const code = errorAny.code;
|
|
334
|
+
if (code === 5 || code === "NOT_FOUND")
|
|
335
|
+
return "NOT_FOUND";
|
|
336
|
+
if (code === 6 || code === "ALREADY_EXISTS")
|
|
337
|
+
return "INVALID";
|
|
338
|
+
if (code === 7 || code === "PERMISSION_DENIED" || code === 403) {
|
|
339
|
+
return "FORBIDDEN";
|
|
340
|
+
}
|
|
341
|
+
if (code === 3 || code === "INVALID_ARGUMENT")
|
|
342
|
+
return "INVALID";
|
|
343
|
+
return "UNKNOWN";
|
|
226
344
|
}
|
|
227
|
-
|
|
228
|
-
|
|
229
|
-
|
|
230
|
-
//# sourceMappingURL=gcp-secret-manager.js.map
|
|
345
|
+
export {
|
|
346
|
+
GcpSecretManagerProvider
|
|
347
|
+
};
|
package/dist/secrets/index.d.ts
CHANGED
|
@@ -1,5 +1,5 @@
|
|
|
1
|
-
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
1
|
+
export * from './provider';
|
|
2
|
+
export * from './gcp-secret-manager';
|
|
3
|
+
export * from './env-secret-provider';
|
|
4
|
+
export * from './manager';
|
|
5
|
+
//# sourceMappingURL=index.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/secrets/index.ts"],"names":[],"mappings":"AAAA,cAAc,YAAY,CAAC;AAC3B,cAAc,sBAAsB,CAAC;AACrC,cAAc,uBAAuB,CAAC;AACtC,cAAc,WAAW,CAAC"}
|