@contractspec/integration.runtime 1.56.1 → 1.58.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (39) hide show
  1. package/dist/health.d.ts +14 -18
  2. package/dist/health.d.ts.map +1 -1
  3. package/dist/health.js +71 -68
  4. package/dist/index.d.ts +4 -8
  5. package/dist/index.d.ts.map +1 -0
  6. package/dist/index.js +828 -9
  7. package/dist/node/health.js +72 -0
  8. package/dist/node/index.js +827 -0
  9. package/dist/node/runtime.js +208 -0
  10. package/dist/node/secrets/env-secret-provider.js +158 -0
  11. package/dist/node/secrets/gcp-secret-manager.js +346 -0
  12. package/dist/node/secrets/index.js +549 -0
  13. package/dist/node/secrets/manager.js +182 -0
  14. package/dist/node/secrets/provider.js +73 -0
  15. package/dist/runtime.d.ts +86 -90
  16. package/dist/runtime.d.ts.map +1 -1
  17. package/dist/runtime.js +204 -182
  18. package/dist/secrets/env-secret-provider.d.ts +20 -23
  19. package/dist/secrets/env-secret-provider.d.ts.map +1 -1
  20. package/dist/secrets/env-secret-provider.js +157 -80
  21. package/dist/secrets/gcp-secret-manager.d.ts +25 -28
  22. package/dist/secrets/gcp-secret-manager.d.ts.map +1 -1
  23. package/dist/secrets/gcp-secret-manager.js +339 -222
  24. package/dist/secrets/index.d.ts +5 -5
  25. package/dist/secrets/index.d.ts.map +1 -0
  26. package/dist/secrets/index.js +549 -5
  27. package/dist/secrets/manager.d.ts +32 -35
  28. package/dist/secrets/manager.d.ts.map +1 -1
  29. package/dist/secrets/manager.js +180 -101
  30. package/dist/secrets/provider.d.ts +42 -45
  31. package/dist/secrets/provider.d.ts.map +1 -1
  32. package/dist/secrets/provider.js +69 -54
  33. package/package.json +76 -30
  34. package/dist/health.js.map +0 -1
  35. package/dist/runtime.js.map +0 -1
  36. package/dist/secrets/env-secret-provider.js.map +0 -1
  37. package/dist/secrets/gcp-secret-manager.js.map +0 -1
  38. package/dist/secrets/manager.js.map +0 -1
  39. package/dist/secrets/provider.js.map +0 -1
@@ -0,0 +1,208 @@
1
+ // src/runtime.ts
2
+ import { performance } from "node:perf_hooks";
3
+ var DEFAULT_MAX_ATTEMPTS = 3;
4
+ var DEFAULT_BACKOFF_MS = 250;
5
+
6
+ class IntegrationCallGuard {
7
+ secretProvider;
8
+ telemetry;
9
+ maxAttempts;
10
+ backoffMs;
11
+ shouldRetry;
12
+ sleep;
13
+ now;
14
+ constructor(secretProvider, options = {}) {
15
+ this.secretProvider = secretProvider;
16
+ this.telemetry = options.telemetry;
17
+ this.maxAttempts = Math.max(1, options.maxAttempts ?? DEFAULT_MAX_ATTEMPTS);
18
+ this.backoffMs = options.backoffMs ?? DEFAULT_BACKOFF_MS;
19
+ this.shouldRetry = options.shouldRetry ?? ((error) => typeof error === "object" && error !== null && ("retryable" in error) && Boolean(error.retryable));
20
+ this.sleep = options.sleep ?? ((ms) => ms <= 0 ? Promise.resolve() : new Promise((resolve) => setTimeout(resolve, ms)));
21
+ this.now = options.now ?? (() => new Date);
22
+ }
23
+ async executeWithGuards(slotId, operation, _input, resolvedConfig, executor) {
24
+ const integration = this.findIntegration(slotId, resolvedConfig);
25
+ if (!integration) {
26
+ return this.failure({
27
+ tenantId: resolvedConfig.tenantId,
28
+ appId: resolvedConfig.appId,
29
+ environment: resolvedConfig.environment,
30
+ blueprintName: resolvedConfig.blueprintName,
31
+ blueprintVersion: resolvedConfig.blueprintVersion,
32
+ configVersion: resolvedConfig.configVersion,
33
+ slotId,
34
+ operation
35
+ }, undefined, {
36
+ code: "SLOT_NOT_BOUND",
37
+ message: `Integration slot "${slotId}" is not bound for tenant "${resolvedConfig.tenantId}".`,
38
+ retryable: false
39
+ }, 0);
40
+ }
41
+ const status = integration.connection.status;
42
+ if (status === "disconnected" || status === "error") {
43
+ return this.failure(this.makeContext(slotId, operation, resolvedConfig), integration, {
44
+ code: "CONNECTION_NOT_READY",
45
+ message: `Integration connection "${integration.connection.meta.label}" is in status "${status}".`,
46
+ retryable: false
47
+ }, 0);
48
+ }
49
+ const secrets = await this.fetchSecrets(integration.connection);
50
+ let attempt = 0;
51
+ const started = performance.now();
52
+ while (attempt < this.maxAttempts) {
53
+ attempt += 1;
54
+ try {
55
+ const data = await executor(integration.connection, secrets);
56
+ const duration = performance.now() - started;
57
+ this.emitTelemetry(this.makeContext(slotId, operation, resolvedConfig), integration, "success", duration);
58
+ return {
59
+ success: true,
60
+ data,
61
+ metadata: {
62
+ latencyMs: duration,
63
+ connectionId: integration.connection.meta.id,
64
+ ownershipMode: integration.connection.ownershipMode,
65
+ attempts: attempt
66
+ }
67
+ };
68
+ } catch (error) {
69
+ const duration = performance.now() - started;
70
+ this.emitTelemetry(this.makeContext(slotId, operation, resolvedConfig), integration, "error", duration, this.errorCodeFor(error), error instanceof Error ? error.message : String(error));
71
+ const retryable = this.shouldRetry(error, attempt);
72
+ if (!retryable || attempt >= this.maxAttempts) {
73
+ return {
74
+ success: false,
75
+ error: {
76
+ code: this.errorCodeFor(error),
77
+ message: error instanceof Error ? error.message : String(error),
78
+ retryable,
79
+ cause: error
80
+ },
81
+ metadata: {
82
+ latencyMs: duration,
83
+ connectionId: integration.connection.meta.id,
84
+ ownershipMode: integration.connection.ownershipMode,
85
+ attempts: attempt
86
+ }
87
+ };
88
+ }
89
+ await this.sleep(this.backoffMs);
90
+ }
91
+ }
92
+ return {
93
+ success: false,
94
+ error: {
95
+ code: "UNKNOWN_ERROR",
96
+ message: "Integration call failed after retries.",
97
+ retryable: false
98
+ },
99
+ metadata: {
100
+ latencyMs: performance.now() - started,
101
+ connectionId: integration.connection.meta.id,
102
+ ownershipMode: integration.connection.ownershipMode,
103
+ attempts: this.maxAttempts
104
+ }
105
+ };
106
+ }
107
+ findIntegration(slotId, config) {
108
+ return config.integrations.find((integration) => integration.slot.slotId === slotId);
109
+ }
110
+ async fetchSecrets(connection) {
111
+ if (!this.secretProvider.canHandle(connection.secretRef)) {
112
+ throw new Error(`Secret provider "${this.secretProvider.id}" cannot handle reference "${connection.secretRef}".`);
113
+ }
114
+ const secret = await this.secretProvider.getSecret(connection.secretRef);
115
+ return this.parseSecret(secret);
116
+ }
117
+ parseSecret(secret) {
118
+ const text = new TextDecoder().decode(secret.data);
119
+ try {
120
+ const parsed = JSON.parse(text);
121
+ if (parsed && typeof parsed === "object" && !Array.isArray(parsed)) {
122
+ const entries = Object.entries(parsed).filter(([, value]) => typeof value === "string" || typeof value === "number" || typeof value === "boolean");
123
+ return Object.fromEntries(entries.map(([key, value]) => [key, String(value)]));
124
+ }
125
+ } catch {}
126
+ return { secret: text };
127
+ }
128
+ emitTelemetry(context, integration, status, durationMs, errorCode, errorMessage) {
129
+ if (!this.telemetry || !integration)
130
+ return;
131
+ this.telemetry.record({
132
+ tenantId: context.tenantId,
133
+ appId: context.appId,
134
+ environment: context.environment,
135
+ slotId: context.slotId,
136
+ integrationKey: integration.connection.meta.integrationKey,
137
+ integrationVersion: integration.connection.meta.integrationVersion,
138
+ connectionId: integration.connection.meta.id,
139
+ status,
140
+ durationMs,
141
+ errorCode,
142
+ errorMessage,
143
+ occurredAt: this.now(),
144
+ metadata: {
145
+ blueprint: `${context.blueprintName}.v${context.blueprintVersion}`,
146
+ configVersion: context.configVersion,
147
+ operation: context.operation
148
+ }
149
+ });
150
+ }
151
+ failure(context, integration, error, attempts) {
152
+ if (integration) {
153
+ this.emitTelemetry(context, integration, "error", 0, error.code, error.message);
154
+ }
155
+ return {
156
+ success: false,
157
+ error,
158
+ metadata: {
159
+ latencyMs: 0,
160
+ connectionId: integration?.connection.meta.id ?? "unknown",
161
+ ownershipMode: integration?.connection.ownershipMode ?? "managed",
162
+ attempts
163
+ }
164
+ };
165
+ }
166
+ makeContext(slotId, operation, config) {
167
+ return {
168
+ tenantId: config.tenantId,
169
+ appId: config.appId,
170
+ environment: config.environment,
171
+ blueprintName: config.blueprintName,
172
+ blueprintVersion: config.blueprintVersion,
173
+ configVersion: config.configVersion,
174
+ slotId,
175
+ operation
176
+ };
177
+ }
178
+ errorCodeFor(error) {
179
+ if (typeof error === "object" && error !== null && "code" in error && typeof error.code === "string") {
180
+ return error.code;
181
+ }
182
+ return "PROVIDER_ERROR";
183
+ }
184
+ }
185
+ function ensureConnectionReady(integration) {
186
+ const status = integration.connection.status;
187
+ if (status === "disconnected" || status === "error") {
188
+ throw new Error(`Integration connection "${integration.connection.meta.label}" is in status "${status}".`);
189
+ }
190
+ }
191
+ function connectionStatusLabel(status) {
192
+ switch (status) {
193
+ case "connected":
194
+ return "connected";
195
+ case "disconnected":
196
+ return "disconnected";
197
+ case "error":
198
+ return "error";
199
+ case "unknown":
200
+ default:
201
+ return "unknown";
202
+ }
203
+ }
204
+ export {
205
+ ensureConnectionReady,
206
+ connectionStatusLabel,
207
+ IntegrationCallGuard
208
+ };
@@ -0,0 +1,158 @@
1
+ // src/secrets/provider.ts
2
+ import { Buffer as Buffer2 } from "node:buffer";
3
+
4
+ class SecretProviderError extends Error {
5
+ provider;
6
+ reference;
7
+ code;
8
+ cause;
9
+ constructor(params) {
10
+ super(params.message);
11
+ this.name = "SecretProviderError";
12
+ this.provider = params.provider;
13
+ this.reference = params.reference;
14
+ this.code = params.code ?? "UNKNOWN";
15
+ this.cause = params.cause;
16
+ }
17
+ }
18
+ function parseSecretUri(reference) {
19
+ if (!reference) {
20
+ throw new SecretProviderError({
21
+ message: "Secret reference cannot be empty",
22
+ provider: "unknown",
23
+ reference,
24
+ code: "INVALID"
25
+ });
26
+ }
27
+ const [scheme, rest] = reference.split("://");
28
+ if (!scheme || !rest) {
29
+ throw new SecretProviderError({
30
+ message: `Invalid secret reference: ${reference}`,
31
+ provider: "unknown",
32
+ reference,
33
+ code: "INVALID"
34
+ });
35
+ }
36
+ const queryIndex = rest.indexOf("?");
37
+ if (queryIndex === -1) {
38
+ return {
39
+ provider: scheme,
40
+ path: rest
41
+ };
42
+ }
43
+ const path = rest.slice(0, queryIndex);
44
+ const query = rest.slice(queryIndex + 1);
45
+ const extras = Object.fromEntries(query.split("&").filter(Boolean).map((pair) => {
46
+ const [keyRaw, valueRaw] = pair.split("=");
47
+ const key = keyRaw ?? "";
48
+ const value = valueRaw ?? "";
49
+ return [decodeURIComponent(key), decodeURIComponent(value)];
50
+ }));
51
+ return {
52
+ provider: scheme,
53
+ path,
54
+ extras
55
+ };
56
+ }
57
+ function normalizeSecretPayload(payload) {
58
+ if (payload.data instanceof Uint8Array) {
59
+ return payload.data;
60
+ }
61
+ if (payload.encoding === "base64") {
62
+ return Buffer2.from(payload.data, "base64");
63
+ }
64
+ if (payload.encoding === "binary") {
65
+ return Buffer2.from(payload.data, "binary");
66
+ }
67
+ return Buffer2.from(payload.data, "utf-8");
68
+ }
69
+
70
+ // src/secrets/env-secret-provider.ts
71
+ class EnvSecretProvider {
72
+ id = "env";
73
+ aliases;
74
+ constructor(options = {}) {
75
+ this.aliases = options.aliases ?? {};
76
+ }
77
+ canHandle(reference) {
78
+ const envKey = this.resolveEnvKey(reference);
79
+ return envKey !== undefined && process.env[envKey] !== undefined;
80
+ }
81
+ async getSecret(reference) {
82
+ const envKey = this.resolveEnvKey(reference);
83
+ if (!envKey) {
84
+ throw new SecretProviderError({
85
+ message: `Unable to resolve environment variable for reference "${reference}".`,
86
+ provider: this.id,
87
+ reference,
88
+ code: "INVALID"
89
+ });
90
+ }
91
+ const value = process.env[envKey];
92
+ if (value === undefined) {
93
+ throw new SecretProviderError({
94
+ message: `Environment variable "${envKey}" not found for reference "${reference}".`,
95
+ provider: this.id,
96
+ reference,
97
+ code: "NOT_FOUND"
98
+ });
99
+ }
100
+ return {
101
+ data: Buffer.from(value, "utf-8"),
102
+ version: "current",
103
+ metadata: {
104
+ source: "env",
105
+ envKey
106
+ },
107
+ retrievedAt: new Date
108
+ };
109
+ }
110
+ async setSecret(reference, _payload) {
111
+ throw this.forbiddenError("setSecret", reference);
112
+ }
113
+ async rotateSecret(reference, _payload) {
114
+ throw this.forbiddenError("rotateSecret", reference);
115
+ }
116
+ async deleteSecret(reference) {
117
+ throw this.forbiddenError("deleteSecret", reference);
118
+ }
119
+ resolveEnvKey(reference) {
120
+ if (!reference) {
121
+ return;
122
+ }
123
+ if (this.aliases[reference]) {
124
+ return this.aliases[reference];
125
+ }
126
+ if (!reference.includes("://")) {
127
+ return reference;
128
+ }
129
+ try {
130
+ const parsed = parseSecretUri(reference);
131
+ if (parsed.provider === "env") {
132
+ return parsed.path;
133
+ }
134
+ if (parsed.extras?.env) {
135
+ return parsed.extras.env;
136
+ }
137
+ return this.deriveEnvKey(parsed.path);
138
+ } catch {
139
+ return reference;
140
+ }
141
+ }
142
+ deriveEnvKey(path) {
143
+ if (!path)
144
+ return;
145
+ return path.split(/[/:\-.]/).filter(Boolean).map((segment) => segment.replace(/[^a-zA-Z0-9]/g, "_").replace(/_{2,}/g, "_").toUpperCase()).join("_");
146
+ }
147
+ forbiddenError(operation, reference) {
148
+ return new SecretProviderError({
149
+ message: `EnvSecretProvider is read-only. "${operation}" is not allowed for ${reference}.`,
150
+ provider: this.id,
151
+ reference,
152
+ code: "FORBIDDEN"
153
+ });
154
+ }
155
+ }
156
+ export {
157
+ EnvSecretProvider
158
+ };
@@ -0,0 +1,346 @@
1
+ // src/secrets/provider.ts
2
+ import { Buffer } from "node:buffer";
3
+
4
+ class SecretProviderError extends Error {
5
+ provider;
6
+ reference;
7
+ code;
8
+ cause;
9
+ constructor(params) {
10
+ super(params.message);
11
+ this.name = "SecretProviderError";
12
+ this.provider = params.provider;
13
+ this.reference = params.reference;
14
+ this.code = params.code ?? "UNKNOWN";
15
+ this.cause = params.cause;
16
+ }
17
+ }
18
+ function parseSecretUri(reference) {
19
+ if (!reference) {
20
+ throw new SecretProviderError({
21
+ message: "Secret reference cannot be empty",
22
+ provider: "unknown",
23
+ reference,
24
+ code: "INVALID"
25
+ });
26
+ }
27
+ const [scheme, rest] = reference.split("://");
28
+ if (!scheme || !rest) {
29
+ throw new SecretProviderError({
30
+ message: `Invalid secret reference: ${reference}`,
31
+ provider: "unknown",
32
+ reference,
33
+ code: "INVALID"
34
+ });
35
+ }
36
+ const queryIndex = rest.indexOf("?");
37
+ if (queryIndex === -1) {
38
+ return {
39
+ provider: scheme,
40
+ path: rest
41
+ };
42
+ }
43
+ const path = rest.slice(0, queryIndex);
44
+ const query = rest.slice(queryIndex + 1);
45
+ const extras = Object.fromEntries(query.split("&").filter(Boolean).map((pair) => {
46
+ const [keyRaw, valueRaw] = pair.split("=");
47
+ const key = keyRaw ?? "";
48
+ const value = valueRaw ?? "";
49
+ return [decodeURIComponent(key), decodeURIComponent(value)];
50
+ }));
51
+ return {
52
+ provider: scheme,
53
+ path,
54
+ extras
55
+ };
56
+ }
57
+ function normalizeSecretPayload(payload) {
58
+ if (payload.data instanceof Uint8Array) {
59
+ return payload.data;
60
+ }
61
+ if (payload.encoding === "base64") {
62
+ return Buffer.from(payload.data, "base64");
63
+ }
64
+ if (payload.encoding === "binary") {
65
+ return Buffer.from(payload.data, "binary");
66
+ }
67
+ return Buffer.from(payload.data, "utf-8");
68
+ }
69
+
70
+ // src/secrets/gcp-secret-manager.ts
71
+ import {
72
+ SecretManagerServiceClient
73
+ } from "@google-cloud/secret-manager";
74
+ var DEFAULT_REPLICATION = {
75
+ automatic: {}
76
+ };
77
+
78
+ class GcpSecretManagerProvider {
79
+ id = "gcp-secret-manager";
80
+ client;
81
+ explicitProjectId;
82
+ replication;
83
+ constructor(options = {}) {
84
+ this.client = options.client ?? new SecretManagerServiceClient(options.clientOptions ?? {});
85
+ this.explicitProjectId = options.projectId;
86
+ this.replication = options.defaultReplication ?? DEFAULT_REPLICATION;
87
+ }
88
+ canHandle(reference) {
89
+ try {
90
+ const parsed = parseSecretUri(reference);
91
+ return parsed.provider === "gcp";
92
+ } catch {
93
+ return false;
94
+ }
95
+ }
96
+ async getSecret(reference, options, callOptions) {
97
+ const location = this.parseReference(reference);
98
+ const secretVersionName = this.buildVersionName(location, options?.version);
99
+ try {
100
+ const response = await this.client.accessSecretVersion({
101
+ name: secretVersionName
102
+ }, callOptions ?? {});
103
+ const [result] = response;
104
+ const payload = result.payload;
105
+ if (!payload?.data) {
106
+ throw new SecretProviderError({
107
+ message: `Secret payload empty for ${secretVersionName}`,
108
+ provider: this.id,
109
+ reference,
110
+ code: "UNKNOWN"
111
+ });
112
+ }
113
+ const version = extractVersionFromName(result.name ?? secretVersionName);
114
+ return {
115
+ data: payload.data,
116
+ version,
117
+ metadata: payload.dataCrc32c ? { crc32c: payload.dataCrc32c.toString() } : undefined,
118
+ retrievedAt: new Date
119
+ };
120
+ } catch (error) {
121
+ throw toSecretProviderError({
122
+ error,
123
+ provider: this.id,
124
+ reference,
125
+ operation: "access"
126
+ });
127
+ }
128
+ }
129
+ async setSecret(reference, payload) {
130
+ const location = this.parseReference(reference);
131
+ const { secretName } = this.buildNames(location);
132
+ const data = normalizeSecretPayload(payload);
133
+ await this.ensureSecretExists(location, payload);
134
+ try {
135
+ const response = await this.client.addSecretVersion({
136
+ parent: secretName,
137
+ payload: {
138
+ data
139
+ }
140
+ });
141
+ if (!response) {
142
+ throw new SecretProviderError({
143
+ message: `No version returned when adding secret version for ${secretName}`,
144
+ provider: this.id,
145
+ reference,
146
+ code: "UNKNOWN"
147
+ });
148
+ }
149
+ const [version] = response;
150
+ const versionName = version?.name ?? `${secretName}/versions/latest`;
151
+ return {
152
+ reference: `gcp://${versionName}`,
153
+ version: extractVersionFromName(versionName) ?? "latest"
154
+ };
155
+ } catch (error) {
156
+ throw toSecretProviderError({
157
+ error,
158
+ provider: this.id,
159
+ reference,
160
+ operation: "addSecretVersion"
161
+ });
162
+ }
163
+ }
164
+ async rotateSecret(reference, payload) {
165
+ return this.setSecret(reference, payload);
166
+ }
167
+ async deleteSecret(reference) {
168
+ const location = this.parseReference(reference);
169
+ const { secretName } = this.buildNames(location);
170
+ try {
171
+ await this.client.deleteSecret({
172
+ name: secretName
173
+ });
174
+ } catch (error) {
175
+ throw toSecretProviderError({
176
+ error,
177
+ provider: this.id,
178
+ reference,
179
+ operation: "delete"
180
+ });
181
+ }
182
+ }
183
+ parseReference(reference) {
184
+ const parsed = parseSecretUri(reference);
185
+ if (parsed.provider !== "gcp") {
186
+ throw new SecretProviderError({
187
+ message: `Unsupported secret provider: ${parsed.provider}`,
188
+ provider: this.id,
189
+ reference,
190
+ code: "INVALID"
191
+ });
192
+ }
193
+ const segments = parsed.path.split("/").filter(Boolean);
194
+ if (segments.length < 4 || segments[0] !== "projects") {
195
+ throw new SecretProviderError({
196
+ message: `Expected secret reference format gcp://projects/{project}/secrets/{secret}[(/versions/{version})] but received "${parsed.path}"`,
197
+ provider: this.id,
198
+ reference,
199
+ code: "INVALID"
200
+ });
201
+ }
202
+ const projectIdCandidate = segments[1] ?? this.explicitProjectId;
203
+ if (!projectIdCandidate) {
204
+ throw new SecretProviderError({
205
+ message: `Unable to resolve project or secret from reference "${parsed.path}"`,
206
+ provider: this.id,
207
+ reference,
208
+ code: "INVALID"
209
+ });
210
+ }
211
+ const indexOfSecrets = segments.indexOf("secrets");
212
+ if (indexOfSecrets === -1 || indexOfSecrets + 1 >= segments.length) {
213
+ throw new SecretProviderError({
214
+ message: `Unable to resolve project or secret from reference "${parsed.path}"`,
215
+ provider: this.id,
216
+ reference,
217
+ code: "INVALID"
218
+ });
219
+ }
220
+ const resolvedProjectId = projectIdCandidate;
221
+ const secretIdCandidate = segments[indexOfSecrets + 1];
222
+ if (!secretIdCandidate) {
223
+ throw new SecretProviderError({
224
+ message: `Unable to resolve secret ID from reference "${parsed.path}"`,
225
+ provider: this.id,
226
+ reference,
227
+ code: "INVALID"
228
+ });
229
+ }
230
+ const secretId = secretIdCandidate;
231
+ const indexOfVersions = segments.indexOf("versions");
232
+ const version = parsed.extras?.version ?? (indexOfVersions !== -1 && indexOfVersions + 1 < segments.length ? segments[indexOfVersions + 1] : undefined);
233
+ return {
234
+ projectId: resolvedProjectId,
235
+ secretId,
236
+ version
237
+ };
238
+ }
239
+ buildNames(location) {
240
+ const projectId = location.projectId ?? this.explicitProjectId;
241
+ if (!projectId) {
242
+ throw new SecretProviderError({
243
+ message: "Project ID must be provided either in reference or provider configuration",
244
+ provider: this.id,
245
+ reference: `gcp://projects//secrets/${location.secretId}`,
246
+ code: "INVALID"
247
+ });
248
+ }
249
+ const projectParent = `projects/${projectId}`;
250
+ const secretName = `${projectParent}/secrets/${location.secretId}`;
251
+ return {
252
+ projectParent,
253
+ secretName
254
+ };
255
+ }
256
+ buildVersionName(location, explicitVersion) {
257
+ const { secretName } = this.buildNames(location);
258
+ const version = explicitVersion ?? location.version ?? "latest";
259
+ return `${secretName}/versions/${version}`;
260
+ }
261
+ async ensureSecretExists(location, payload) {
262
+ const { secretName, projectParent } = this.buildNames(location);
263
+ try {
264
+ await this.client.getSecret({ name: secretName });
265
+ } catch (error) {
266
+ const providerError = toSecretProviderError({
267
+ error,
268
+ provider: this.id,
269
+ reference: `gcp://${secretName}`,
270
+ operation: "getSecret",
271
+ suppressThrow: true
272
+ });
273
+ if (!providerError || providerError.code !== "NOT_FOUND") {
274
+ if (providerError) {
275
+ throw providerError;
276
+ }
277
+ throw error;
278
+ }
279
+ try {
280
+ await this.client.createSecret({
281
+ parent: projectParent,
282
+ secretId: location.secretId,
283
+ secret: {
284
+ replication: this.replication,
285
+ labels: payload.labels
286
+ }
287
+ });
288
+ } catch (creationError) {
289
+ const creationProviderError = toSecretProviderError({
290
+ error: creationError,
291
+ provider: this.id,
292
+ reference: `gcp://${secretName}`,
293
+ operation: "createSecret"
294
+ });
295
+ throw creationProviderError;
296
+ }
297
+ }
298
+ }
299
+ }
300
+ function extractVersionFromName(name) {
301
+ const segments = name.split("/").filter(Boolean);
302
+ const index = segments.indexOf("versions");
303
+ if (index === -1 || index + 1 >= segments.length) {
304
+ return;
305
+ }
306
+ return segments[index + 1];
307
+ }
308
+ function toSecretProviderError(params) {
309
+ const { error, provider, reference, operation, suppressThrow } = params;
310
+ if (error instanceof SecretProviderError) {
311
+ return error;
312
+ }
313
+ const code = deriveErrorCode(error);
314
+ const message = error instanceof Error ? error.message : `Unknown error during ${operation}`;
315
+ const providerError = new SecretProviderError({
316
+ message,
317
+ provider,
318
+ reference,
319
+ code,
320
+ cause: error
321
+ });
322
+ if (suppressThrow) {
323
+ return providerError;
324
+ }
325
+ throw providerError;
326
+ }
327
+ function deriveErrorCode(error) {
328
+ if (typeof error !== "object" || error === null) {
329
+ return "UNKNOWN";
330
+ }
331
+ const errorAny = error;
332
+ const code = errorAny.code;
333
+ if (code === 5 || code === "NOT_FOUND")
334
+ return "NOT_FOUND";
335
+ if (code === 6 || code === "ALREADY_EXISTS")
336
+ return "INVALID";
337
+ if (code === 7 || code === "PERMISSION_DENIED" || code === 403) {
338
+ return "FORBIDDEN";
339
+ }
340
+ if (code === 3 || code === "INVALID_ARGUMENT")
341
+ return "INVALID";
342
+ return "UNKNOWN";
343
+ }
344
+ export {
345
+ GcpSecretManagerProvider
346
+ };