@contractspec/lib.contracts-integrations 2.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (240) hide show
  1. package/README.md +3 -0
  2. package/dist/index.d.ts +11 -0
  3. package/dist/index.js +3676 -0
  4. package/dist/integrations/binding.d.ts +14 -0
  5. package/dist/integrations/binding.js +1 -0
  6. package/dist/integrations/connection.d.ts +47 -0
  7. package/dist/integrations/connection.js +1 -0
  8. package/dist/integrations/docs/integrations.docblock.d.ts +2 -0
  9. package/dist/integrations/docs/integrations.docblock.js +110 -0
  10. package/dist/integrations/health.d.ts +17 -0
  11. package/dist/integrations/health.js +73 -0
  12. package/dist/integrations/health.test.d.ts +1 -0
  13. package/dist/integrations/index.d.ts +11 -0
  14. package/dist/integrations/index.js +3264 -0
  15. package/dist/integrations/integrations.capability.d.ts +1 -0
  16. package/dist/integrations/integrations.capability.js +18 -0
  17. package/dist/integrations/integrations.feature.d.ts +5 -0
  18. package/dist/integrations/integrations.feature.js +33 -0
  19. package/dist/integrations/meeting-recorder/contracts/index.d.ts +7 -0
  20. package/dist/integrations/meeting-recorder/contracts/index.js +474 -0
  21. package/dist/integrations/meeting-recorder/contracts/meetings.d.ts +451 -0
  22. package/dist/integrations/meeting-recorder/contracts/meetings.js +219 -0
  23. package/dist/integrations/meeting-recorder/contracts/transcripts.d.ts +166 -0
  24. package/dist/integrations/meeting-recorder/contracts/transcripts.js +287 -0
  25. package/dist/integrations/meeting-recorder/contracts/webhooks.d.ts +85 -0
  26. package/dist/integrations/meeting-recorder/contracts/webhooks.js +172 -0
  27. package/dist/integrations/meeting-recorder/meeting-recorder.capability.d.ts +1 -0
  28. package/dist/integrations/meeting-recorder/meeting-recorder.capability.js +18 -0
  29. package/dist/integrations/meeting-recorder/meeting-recorder.feature.d.ts +5 -0
  30. package/dist/integrations/meeting-recorder/meeting-recorder.feature.js +33 -0
  31. package/dist/integrations/meeting-recorder/models.d.ts +402 -0
  32. package/dist/integrations/meeting-recorder/models.js +122 -0
  33. package/dist/integrations/meeting-recorder/telemetry.d.ts +13 -0
  34. package/dist/integrations/meeting-recorder/telemetry.js +54 -0
  35. package/dist/integrations/openbanking/contracts/accounts.d.ts +282 -0
  36. package/dist/integrations/openbanking/contracts/accounts.js +328 -0
  37. package/dist/integrations/openbanking/contracts/balances.d.ts +158 -0
  38. package/dist/integrations/openbanking/contracts/balances.js +292 -0
  39. package/dist/integrations/openbanking/contracts/index.d.ts +7 -0
  40. package/dist/integrations/openbanking/contracts/index.js +644 -0
  41. package/dist/integrations/openbanking/contracts/transactions.d.ts +206 -0
  42. package/dist/integrations/openbanking/contracts/transactions.js +298 -0
  43. package/dist/integrations/openbanking/guards.d.ts +8 -0
  44. package/dist/integrations/openbanking/guards.js +42 -0
  45. package/dist/integrations/openbanking/guards.test.d.ts +1 -0
  46. package/dist/integrations/openbanking/models.d.ts +223 -0
  47. package/dist/integrations/openbanking/models.js +110 -0
  48. package/dist/integrations/openbanking/openbanking.capability.d.ts +1 -0
  49. package/dist/integrations/openbanking/openbanking.capability.js +18 -0
  50. package/dist/integrations/openbanking/openbanking.feature.d.ts +5 -0
  51. package/dist/integrations/openbanking/openbanking.feature.js +35 -0
  52. package/dist/integrations/openbanking/telemetry.d.ts +12 -0
  53. package/dist/integrations/openbanking/telemetry.js +51 -0
  54. package/dist/integrations/operations.d.ts +430 -0
  55. package/dist/integrations/operations.js +297 -0
  56. package/dist/integrations/operations.test.d.ts +1 -0
  57. package/dist/integrations/providers/analytics-reader.d.ts +103 -0
  58. package/dist/integrations/providers/analytics-reader.js +1 -0
  59. package/dist/integrations/providers/analytics-writer.d.ts +6 -0
  60. package/dist/integrations/providers/analytics-writer.js +1 -0
  61. package/dist/integrations/providers/analytics.d.ts +47 -0
  62. package/dist/integrations/providers/analytics.js +1 -0
  63. package/dist/integrations/providers/calendar.d.ts +75 -0
  64. package/dist/integrations/providers/calendar.js +1 -0
  65. package/dist/integrations/providers/database.d.ts +12 -0
  66. package/dist/integrations/providers/database.js +1 -0
  67. package/dist/integrations/providers/elevenlabs.d.ts +3 -0
  68. package/dist/integrations/providers/elevenlabs.js +86 -0
  69. package/dist/integrations/providers/email.d.ts +83 -0
  70. package/dist/integrations/providers/email.js +1 -0
  71. package/dist/integrations/providers/embedding.d.ts +21 -0
  72. package/dist/integrations/providers/embedding.js +1 -0
  73. package/dist/integrations/providers/fal.d.ts +3 -0
  74. package/dist/integrations/providers/fal.js +112 -0
  75. package/dist/integrations/providers/fathom.d.ts +3 -0
  76. package/dist/integrations/providers/fathom.js +126 -0
  77. package/dist/integrations/providers/fireflies.d.ts +3 -0
  78. package/dist/integrations/providers/fireflies.js +106 -0
  79. package/dist/integrations/providers/gcs-storage.d.ts +3 -0
  80. package/dist/integrations/providers/gcs-storage.js +97 -0
  81. package/dist/integrations/providers/gmail.d.ts +3 -0
  82. package/dist/integrations/providers/gmail.js +109 -0
  83. package/dist/integrations/providers/google-calendar.d.ts +3 -0
  84. package/dist/integrations/providers/google-calendar.js +92 -0
  85. package/dist/integrations/providers/gradium.d.ts +3 -0
  86. package/dist/integrations/providers/gradium.js +110 -0
  87. package/dist/integrations/providers/granola.d.ts +3 -0
  88. package/dist/integrations/providers/granola.js +107 -0
  89. package/dist/integrations/providers/index.d.ts +38 -0
  90. package/dist/integrations/providers/index.js +2094 -0
  91. package/dist/integrations/providers/jira.d.ts +3 -0
  92. package/dist/integrations/providers/jira.js +108 -0
  93. package/dist/integrations/providers/linear.d.ts +3 -0
  94. package/dist/integrations/providers/linear.js +107 -0
  95. package/dist/integrations/providers/llm.d.ts +79 -0
  96. package/dist/integrations/providers/llm.js +1 -0
  97. package/dist/integrations/providers/meeting-recorder.d.ts +129 -0
  98. package/dist/integrations/providers/meeting-recorder.js +1 -0
  99. package/dist/integrations/providers/mistral.d.ts +3 -0
  100. package/dist/integrations/providers/mistral.js +94 -0
  101. package/dist/integrations/providers/notion.d.ts +3 -0
  102. package/dist/integrations/providers/notion.js +113 -0
  103. package/dist/integrations/providers/openbanking.d.ts +125 -0
  104. package/dist/integrations/providers/openbanking.js +1 -0
  105. package/dist/integrations/providers/payments.d.ts +106 -0
  106. package/dist/integrations/providers/payments.js +1 -0
  107. package/dist/integrations/providers/posthog-llm-telemetry.d.ts +51 -0
  108. package/dist/integrations/providers/posthog-llm-telemetry.js +176 -0
  109. package/dist/integrations/providers/posthog.d.ts +3 -0
  110. package/dist/integrations/providers/posthog.js +106 -0
  111. package/dist/integrations/providers/postmark.d.ts +3 -0
  112. package/dist/integrations/providers/postmark.js +98 -0
  113. package/dist/integrations/providers/powens.d.ts +3 -0
  114. package/dist/integrations/providers/powens.js +124 -0
  115. package/dist/integrations/providers/project-management.d.ts +32 -0
  116. package/dist/integrations/providers/project-management.js +1 -0
  117. package/dist/integrations/providers/providers.test.d.ts +1 -0
  118. package/dist/integrations/providers/qdrant.d.ts +3 -0
  119. package/dist/integrations/providers/qdrant.js +101 -0
  120. package/dist/integrations/providers/registry.d.ts +6 -0
  121. package/dist/integrations/providers/registry.js +1878 -0
  122. package/dist/integrations/providers/sms.d.ts +31 -0
  123. package/dist/integrations/providers/sms.js +1 -0
  124. package/dist/integrations/providers/storage.d.ts +57 -0
  125. package/dist/integrations/providers/storage.js +1 -0
  126. package/dist/integrations/providers/stripe.d.ts +3 -0
  127. package/dist/integrations/providers/stripe.js +105 -0
  128. package/dist/integrations/providers/supabase-postgres.d.ts +3 -0
  129. package/dist/integrations/providers/supabase-postgres.js +87 -0
  130. package/dist/integrations/providers/supabase-vector.d.ts +3 -0
  131. package/dist/integrations/providers/supabase-vector.js +107 -0
  132. package/dist/integrations/providers/tldv.d.ts +3 -0
  133. package/dist/integrations/providers/tldv.js +106 -0
  134. package/dist/integrations/providers/twilio-sms.d.ts +3 -0
  135. package/dist/integrations/providers/twilio-sms.js +91 -0
  136. package/dist/integrations/providers/vector-store.d.ts +39 -0
  137. package/dist/integrations/providers/vector-store.js +1 -0
  138. package/dist/integrations/providers/voice.d.ts +31 -0
  139. package/dist/integrations/providers/voice.js +1 -0
  140. package/dist/integrations/runtime.d.ts +95 -0
  141. package/dist/integrations/runtime.js +209 -0
  142. package/dist/integrations/runtime.test.d.ts +1 -0
  143. package/dist/integrations/secrets/aws-secret-manager.d.ts +28 -0
  144. package/dist/integrations/secrets/aws-secret-manager.js +346 -0
  145. package/dist/integrations/secrets/env-secret-provider.d.ts +28 -0
  146. package/dist/integrations/secrets/env-secret-provider.js +159 -0
  147. package/dist/integrations/secrets/gcp-secret-manager.d.ts +29 -0
  148. package/dist/integrations/secrets/gcp-secret-manager.js +347 -0
  149. package/dist/integrations/secrets/index.d.ts +6 -0
  150. package/dist/integrations/secrets/index.js +1129 -0
  151. package/dist/integrations/secrets/manager.d.ts +44 -0
  152. package/dist/integrations/secrets/manager.js +183 -0
  153. package/dist/integrations/secrets/provider.d.ts +49 -0
  154. package/dist/integrations/secrets/provider.js +74 -0
  155. package/dist/integrations/secrets/provider.test.d.ts +1 -0
  156. package/dist/integrations/secrets/scaleway-secret-manager.d.ts +35 -0
  157. package/dist/integrations/secrets/scaleway-secret-manager.js +375 -0
  158. package/dist/integrations/secrets-types.d.ts +14 -0
  159. package/dist/integrations/secrets-types.js +1 -0
  160. package/dist/integrations/spec.d.ts +72 -0
  161. package/dist/integrations/spec.js +22 -0
  162. package/dist/integrations/spec.test.d.ts +1 -0
  163. package/dist/node/index.js +3675 -0
  164. package/dist/node/integrations/binding.js +0 -0
  165. package/dist/node/integrations/connection.js +0 -0
  166. package/dist/node/integrations/docs/integrations.docblock.js +109 -0
  167. package/dist/node/integrations/health.js +72 -0
  168. package/dist/node/integrations/index.js +3263 -0
  169. package/dist/node/integrations/integrations.capability.js +17 -0
  170. package/dist/node/integrations/integrations.feature.js +32 -0
  171. package/dist/node/integrations/meeting-recorder/contracts/index.js +473 -0
  172. package/dist/node/integrations/meeting-recorder/contracts/meetings.js +218 -0
  173. package/dist/node/integrations/meeting-recorder/contracts/transcripts.js +286 -0
  174. package/dist/node/integrations/meeting-recorder/contracts/webhooks.js +171 -0
  175. package/dist/node/integrations/meeting-recorder/meeting-recorder.capability.js +17 -0
  176. package/dist/node/integrations/meeting-recorder/meeting-recorder.feature.js +32 -0
  177. package/dist/node/integrations/meeting-recorder/models.js +121 -0
  178. package/dist/node/integrations/meeting-recorder/telemetry.js +53 -0
  179. package/dist/node/integrations/openbanking/contracts/accounts.js +327 -0
  180. package/dist/node/integrations/openbanking/contracts/balances.js +291 -0
  181. package/dist/node/integrations/openbanking/contracts/index.js +643 -0
  182. package/dist/node/integrations/openbanking/contracts/transactions.js +297 -0
  183. package/dist/node/integrations/openbanking/guards.js +41 -0
  184. package/dist/node/integrations/openbanking/models.js +109 -0
  185. package/dist/node/integrations/openbanking/openbanking.capability.js +17 -0
  186. package/dist/node/integrations/openbanking/openbanking.feature.js +34 -0
  187. package/dist/node/integrations/openbanking/telemetry.js +50 -0
  188. package/dist/node/integrations/operations.js +296 -0
  189. package/dist/node/integrations/providers/analytics-reader.js +0 -0
  190. package/dist/node/integrations/providers/analytics-writer.js +0 -0
  191. package/dist/node/integrations/providers/analytics.js +0 -0
  192. package/dist/node/integrations/providers/calendar.js +0 -0
  193. package/dist/node/integrations/providers/database.js +0 -0
  194. package/dist/node/integrations/providers/elevenlabs.js +85 -0
  195. package/dist/node/integrations/providers/email.js +0 -0
  196. package/dist/node/integrations/providers/embedding.js +0 -0
  197. package/dist/node/integrations/providers/fal.js +111 -0
  198. package/dist/node/integrations/providers/fathom.js +125 -0
  199. package/dist/node/integrations/providers/fireflies.js +105 -0
  200. package/dist/node/integrations/providers/gcs-storage.js +96 -0
  201. package/dist/node/integrations/providers/gmail.js +108 -0
  202. package/dist/node/integrations/providers/google-calendar.js +91 -0
  203. package/dist/node/integrations/providers/gradium.js +109 -0
  204. package/dist/node/integrations/providers/granola.js +106 -0
  205. package/dist/node/integrations/providers/index.js +2093 -0
  206. package/dist/node/integrations/providers/jira.js +107 -0
  207. package/dist/node/integrations/providers/linear.js +106 -0
  208. package/dist/node/integrations/providers/llm.js +0 -0
  209. package/dist/node/integrations/providers/meeting-recorder.js +0 -0
  210. package/dist/node/integrations/providers/mistral.js +93 -0
  211. package/dist/node/integrations/providers/notion.js +112 -0
  212. package/dist/node/integrations/providers/openbanking.js +0 -0
  213. package/dist/node/integrations/providers/payments.js +0 -0
  214. package/dist/node/integrations/providers/posthog-llm-telemetry.js +175 -0
  215. package/dist/node/integrations/providers/posthog.js +105 -0
  216. package/dist/node/integrations/providers/postmark.js +97 -0
  217. package/dist/node/integrations/providers/powens.js +123 -0
  218. package/dist/node/integrations/providers/project-management.js +0 -0
  219. package/dist/node/integrations/providers/qdrant.js +100 -0
  220. package/dist/node/integrations/providers/registry.js +1877 -0
  221. package/dist/node/integrations/providers/sms.js +0 -0
  222. package/dist/node/integrations/providers/storage.js +0 -0
  223. package/dist/node/integrations/providers/stripe.js +104 -0
  224. package/dist/node/integrations/providers/supabase-postgres.js +86 -0
  225. package/dist/node/integrations/providers/supabase-vector.js +106 -0
  226. package/dist/node/integrations/providers/tldv.js +105 -0
  227. package/dist/node/integrations/providers/twilio-sms.js +90 -0
  228. package/dist/node/integrations/providers/vector-store.js +0 -0
  229. package/dist/node/integrations/providers/voice.js +0 -0
  230. package/dist/node/integrations/runtime.js +208 -0
  231. package/dist/node/integrations/secrets/aws-secret-manager.js +345 -0
  232. package/dist/node/integrations/secrets/env-secret-provider.js +158 -0
  233. package/dist/node/integrations/secrets/gcp-secret-manager.js +346 -0
  234. package/dist/node/integrations/secrets/index.js +1128 -0
  235. package/dist/node/integrations/secrets/manager.js +182 -0
  236. package/dist/node/integrations/secrets/provider.js +73 -0
  237. package/dist/node/integrations/secrets/scaleway-secret-manager.js +374 -0
  238. package/dist/node/integrations/secrets-types.js +0 -0
  239. package/dist/node/integrations/spec.js +21 -0
  240. package/package.json +1029 -0
@@ -0,0 +1,1128 @@
1
+ // src/integrations/secrets/provider.ts
2
+ import { Buffer as Buffer2 } from "node:buffer";
3
+
4
+ class SecretProviderError extends Error {
5
+ provider;
6
+ reference;
7
+ code;
8
+ cause;
9
+ constructor(params) {
10
+ super(params.message);
11
+ this.name = "SecretProviderError";
12
+ this.provider = params.provider;
13
+ this.reference = params.reference;
14
+ this.code = params.code ?? "UNKNOWN";
15
+ this.cause = params.cause;
16
+ }
17
+ }
18
+ function parseSecretUri(reference) {
19
+ if (!reference) {
20
+ throw new SecretProviderError({
21
+ message: "Secret reference cannot be empty",
22
+ provider: "unknown",
23
+ reference,
24
+ code: "INVALID"
25
+ });
26
+ }
27
+ const [scheme, rest] = reference.split("://");
28
+ if (!scheme || !rest) {
29
+ throw new SecretProviderError({
30
+ message: `Invalid secret reference: ${reference}`,
31
+ provider: "unknown",
32
+ reference,
33
+ code: "INVALID"
34
+ });
35
+ }
36
+ const queryIndex = rest.indexOf("?");
37
+ if (queryIndex === -1) {
38
+ return {
39
+ provider: scheme,
40
+ path: rest
41
+ };
42
+ }
43
+ const path = rest.slice(0, queryIndex);
44
+ const query = rest.slice(queryIndex + 1);
45
+ const extras = Object.fromEntries(query.split("&").filter(Boolean).map((pair) => {
46
+ const [keyRaw, valueRaw] = pair.split("=");
47
+ const key = keyRaw ?? "";
48
+ const value = valueRaw ?? "";
49
+ return [decodeURIComponent(key), decodeURIComponent(value)];
50
+ }));
51
+ return {
52
+ provider: scheme,
53
+ path,
54
+ extras
55
+ };
56
+ }
57
+ function normalizeSecretPayload(payload) {
58
+ if (payload.data instanceof Uint8Array) {
59
+ return payload.data;
60
+ }
61
+ if (payload.encoding === "base64") {
62
+ return Buffer2.from(payload.data, "base64");
63
+ }
64
+ if (payload.encoding === "binary") {
65
+ return Buffer2.from(payload.data, "binary");
66
+ }
67
+ return Buffer2.from(payload.data, "utf-8");
68
+ }
69
+
70
+ // src/integrations/secrets/aws-secret-manager.ts
71
+ import { Buffer as Buffer3 } from "node:buffer";
72
+ import {
73
+ CreateSecretCommand,
74
+ DeleteSecretCommand,
75
+ GetSecretValueCommand,
76
+ PutSecretValueCommand,
77
+ SecretsManagerClient
78
+ } from "@aws-sdk/client-secrets-manager";
79
+ var DEFAULT_DELETE_RECOVERY_DAYS = 7;
80
+
81
+ class AwsSecretsManagerProvider {
82
+ id = "aws-secrets-manager";
83
+ explicitRegion;
84
+ injectedClient;
85
+ clientConfig;
86
+ clientsByRegion = new Map;
87
+ constructor(options = {}) {
88
+ this.explicitRegion = options.region;
89
+ this.injectedClient = options.client;
90
+ this.clientConfig = options.clientConfig;
91
+ }
92
+ canHandle(reference) {
93
+ try {
94
+ const parsed = parseSecretUri(reference);
95
+ return parsed.provider === "aws" && (parsed.path === "secretsmanager" || parsed.path.startsWith("secretsmanager/"));
96
+ } catch {
97
+ return false;
98
+ }
99
+ }
100
+ async getSecret(reference, options) {
101
+ const location = this.parseReference(reference);
102
+ const client = this.getClient(location.region);
103
+ const requestedVersion = options?.version ?? location.stage ?? location.version;
104
+ const input = {
105
+ SecretId: location.secretId,
106
+ ...this.buildVersionSelector(requestedVersion)
107
+ };
108
+ try {
109
+ const result = await client.send(new GetSecretValueCommand(input));
110
+ const data = extractAwsSecretBytes(result, reference, this.id);
111
+ return {
112
+ data,
113
+ version: typeof result.VersionId === "string" && result.VersionId ? result.VersionId : requestedVersion,
114
+ metadata: {
115
+ region: location.region,
116
+ secretId: location.secretId,
117
+ ...requestedVersion ? { requestedVersion } : {}
118
+ },
119
+ retrievedAt: new Date
120
+ };
121
+ } catch (error) {
122
+ throw toAwsSecretProviderError({
123
+ error,
124
+ provider: this.id,
125
+ reference,
126
+ operation: "getSecret"
127
+ });
128
+ }
129
+ }
130
+ async setSecret(reference, payload) {
131
+ const location = this.parseReference(reference);
132
+ const client = this.getClient(location.region);
133
+ const bytes = normalizeSecretPayload(payload);
134
+ try {
135
+ const result = await client.send(new PutSecretValueCommand({
136
+ SecretId: location.secretId,
137
+ SecretBinary: bytes
138
+ }));
139
+ const versionId = typeof result.VersionId === "string" && result.VersionId ? result.VersionId : "latest";
140
+ return {
141
+ reference: this.buildReference(location.region, location.secretId, {
142
+ version: versionId
143
+ }),
144
+ version: versionId
145
+ };
146
+ } catch (error) {
147
+ if (!isAwsNotFound(error)) {
148
+ throw toAwsSecretProviderError({
149
+ error,
150
+ provider: this.id,
151
+ reference,
152
+ operation: "putSecretValue"
153
+ });
154
+ }
155
+ if (looksLikeAwsArn(location.secretId)) {
156
+ throw new SecretProviderError({
157
+ message: `Secret not found: ${location.secretId}`,
158
+ provider: this.id,
159
+ reference,
160
+ code: "NOT_FOUND",
161
+ cause: error
162
+ });
163
+ }
164
+ try {
165
+ const created = await client.send(new CreateSecretCommand({
166
+ Name: location.secretId,
167
+ SecretBinary: bytes
168
+ }));
169
+ const versionId = typeof created.VersionId === "string" && created.VersionId ? created.VersionId : "latest";
170
+ return {
171
+ reference: this.buildReference(location.region, location.secretId, {
172
+ version: versionId
173
+ }),
174
+ version: versionId
175
+ };
176
+ } catch (creationError) {
177
+ throw toAwsSecretProviderError({
178
+ error: creationError,
179
+ provider: this.id,
180
+ reference,
181
+ operation: "createSecret"
182
+ });
183
+ }
184
+ }
185
+ }
186
+ async rotateSecret(reference, payload) {
187
+ return this.setSecret(reference, payload);
188
+ }
189
+ async deleteSecret(reference) {
190
+ const location = this.parseReference(reference);
191
+ const client = this.getClient(location.region);
192
+ try {
193
+ await client.send(new DeleteSecretCommand({
194
+ SecretId: location.secretId,
195
+ RecoveryWindowInDays: DEFAULT_DELETE_RECOVERY_DAYS
196
+ }));
197
+ } catch (error) {
198
+ throw toAwsSecretProviderError({
199
+ error,
200
+ provider: this.id,
201
+ reference,
202
+ operation: "deleteSecret"
203
+ });
204
+ }
205
+ }
206
+ getClient(region) {
207
+ if (this.injectedClient) {
208
+ return this.injectedClient;
209
+ }
210
+ const cached = this.clientsByRegion.get(region);
211
+ if (cached) {
212
+ return cached;
213
+ }
214
+ const client = new SecretsManagerClient({
215
+ ...this.clientConfig ?? {},
216
+ region
217
+ });
218
+ this.clientsByRegion.set(region, client);
219
+ return client;
220
+ }
221
+ parseReference(reference) {
222
+ const parsed = parseSecretUri(reference);
223
+ if (parsed.provider !== "aws") {
224
+ throw new SecretProviderError({
225
+ message: `Unsupported secret provider: ${parsed.provider}`,
226
+ provider: this.id,
227
+ reference,
228
+ code: "INVALID"
229
+ });
230
+ }
231
+ const segments = parsed.path.split("/").filter(Boolean);
232
+ if (segments.length < 3 || segments[0] !== "secretsmanager") {
233
+ throw new SecretProviderError({
234
+ message: "Expected secret reference format aws://secretsmanager/{region}/{secretIdOrArn}[?version=...]",
235
+ provider: this.id,
236
+ reference,
237
+ code: "INVALID"
238
+ });
239
+ }
240
+ const regionCandidate = segments[1];
241
+ const region = this.resolveRegion(regionCandidate);
242
+ const secretId = segments.slice(2).join("/");
243
+ if (!secretId) {
244
+ throw new SecretProviderError({
245
+ message: `Unable to resolve secret id from reference "${parsed.path}"`,
246
+ provider: this.id,
247
+ reference,
248
+ code: "INVALID"
249
+ });
250
+ }
251
+ return {
252
+ region,
253
+ secretId,
254
+ version: parsed.extras?.version,
255
+ stage: parsed.extras?.stage
256
+ };
257
+ }
258
+ resolveRegion(regionCandidate) {
259
+ const region = regionCandidate ?? this.explicitRegion ?? process.env.AWS_REGION ?? process.env.AWS_DEFAULT_REGION;
260
+ if (!region) {
261
+ throw new SecretProviderError({
262
+ message: "AWS region must be provided either in reference (aws://secretsmanager/{region}/...) or via AWS_REGION/AWS_DEFAULT_REGION.",
263
+ provider: this.id,
264
+ reference: "aws://secretsmanager//",
265
+ code: "INVALID"
266
+ });
267
+ }
268
+ return region;
269
+ }
270
+ buildVersionSelector(version) {
271
+ if (!version)
272
+ return {};
273
+ if (version === "latest" || version === "current") {
274
+ return { VersionStage: "AWSCURRENT" };
275
+ }
276
+ if (version.startsWith("AWS")) {
277
+ return { VersionStage: version };
278
+ }
279
+ return { VersionId: version };
280
+ }
281
+ buildReference(region, secretId, extras) {
282
+ const base = `aws://secretsmanager/${region}/${secretId}`;
283
+ const query = extras ? Object.entries(extras).filter(([, value]) => Boolean(value)).map(([key, value]) => `${encodeURIComponent(key)}=${encodeURIComponent(value)}`).join("&") : "";
284
+ return query ? `${base}?${query}` : base;
285
+ }
286
+ }
287
+ function extractAwsSecretBytes(result, reference, provider) {
288
+ if (!result || typeof result !== "object") {
289
+ throw new SecretProviderError({
290
+ message: "Invalid AWS Secrets Manager response",
291
+ provider,
292
+ reference,
293
+ code: "UNKNOWN",
294
+ cause: result
295
+ });
296
+ }
297
+ const record = result;
298
+ if (record.SecretBinary instanceof Uint8Array) {
299
+ return record.SecretBinary;
300
+ }
301
+ if (typeof record.SecretBinary === "string") {
302
+ return Buffer3.from(record.SecretBinary, "base64");
303
+ }
304
+ if (typeof record.SecretString === "string") {
305
+ return Buffer3.from(record.SecretString, "utf-8");
306
+ }
307
+ throw new SecretProviderError({
308
+ message: "AWS secret value is empty",
309
+ provider,
310
+ reference,
311
+ code: "NOT_FOUND",
312
+ cause: result
313
+ });
314
+ }
315
+ function looksLikeAwsArn(secretId) {
316
+ return secretId.startsWith("arn:aws:secretsmanager:");
317
+ }
318
+ function isAwsNotFound(error) {
319
+ if (!error || typeof error !== "object")
320
+ return false;
321
+ const err = error;
322
+ if (typeof err.$metadata?.httpStatusCode === "number") {
323
+ return err.$metadata.httpStatusCode === 404;
324
+ }
325
+ return err.name === "ResourceNotFoundException";
326
+ }
327
+ function toAwsSecretProviderError(params) {
328
+ const { error, provider, reference, operation } = params;
329
+ if (error instanceof SecretProviderError) {
330
+ return error;
331
+ }
332
+ const httpStatusCode = typeof error === "object" && error !== null && "$metadata" in error && typeof error.$metadata === "object" && error.$metadata?.httpStatusCode;
333
+ const code = httpStatusCode === 404 ? "NOT_FOUND" : httpStatusCode === 401 || httpStatusCode === 403 ? "FORBIDDEN" : httpStatusCode === 400 ? "INVALID" : "UNKNOWN";
334
+ const message = error instanceof Error ? error.message : `Unknown error during ${operation}`;
335
+ return new SecretProviderError({
336
+ message,
337
+ provider,
338
+ reference,
339
+ code,
340
+ cause: error
341
+ });
342
+ }
343
+
344
+ // src/integrations/secrets/env-secret-provider.ts
345
+ class EnvSecretProvider {
346
+ id = "env";
347
+ aliases;
348
+ constructor(options = {}) {
349
+ this.aliases = options.aliases ?? {};
350
+ }
351
+ canHandle(reference) {
352
+ const envKey = this.resolveEnvKey(reference);
353
+ return envKey !== undefined && process.env[envKey] !== undefined;
354
+ }
355
+ async getSecret(reference) {
356
+ const envKey = this.resolveEnvKey(reference);
357
+ if (!envKey) {
358
+ throw new SecretProviderError({
359
+ message: `Unable to resolve environment variable for reference "${reference}".`,
360
+ provider: this.id,
361
+ reference,
362
+ code: "INVALID"
363
+ });
364
+ }
365
+ const value = process.env[envKey];
366
+ if (value === undefined) {
367
+ throw new SecretProviderError({
368
+ message: `Environment variable "${envKey}" not found for reference "${reference}".`,
369
+ provider: this.id,
370
+ reference,
371
+ code: "NOT_FOUND"
372
+ });
373
+ }
374
+ return {
375
+ data: Buffer.from(value, "utf-8"),
376
+ version: "current",
377
+ metadata: {
378
+ source: "env",
379
+ envKey
380
+ },
381
+ retrievedAt: new Date
382
+ };
383
+ }
384
+ async setSecret(reference, _payload) {
385
+ throw this.forbiddenError("setSecret", reference);
386
+ }
387
+ async rotateSecret(reference, _payload) {
388
+ throw this.forbiddenError("rotateSecret", reference);
389
+ }
390
+ async deleteSecret(reference) {
391
+ throw this.forbiddenError("deleteSecret", reference);
392
+ }
393
+ resolveEnvKey(reference) {
394
+ if (!reference) {
395
+ return;
396
+ }
397
+ if (this.aliases[reference]) {
398
+ return this.aliases[reference];
399
+ }
400
+ if (!reference.includes("://")) {
401
+ return reference;
402
+ }
403
+ try {
404
+ const parsed = parseSecretUri(reference);
405
+ if (parsed.provider === "env") {
406
+ return parsed.path;
407
+ }
408
+ if (parsed.extras?.env) {
409
+ return parsed.extras.env;
410
+ }
411
+ return this.deriveEnvKey(parsed.path);
412
+ } catch {
413
+ return reference;
414
+ }
415
+ }
416
+ deriveEnvKey(path) {
417
+ if (!path)
418
+ return;
419
+ return path.split(/[\/:\-\.]/).filter(Boolean).map((segment) => segment.replace(/[^a-zA-Z0-9]/g, "_").replace(/_{2,}/g, "_").toUpperCase()).join("_");
420
+ }
421
+ forbiddenError(operation, reference) {
422
+ return new SecretProviderError({
423
+ message: `EnvSecretProvider is read-only. "${operation}" is not allowed for ${reference}.`,
424
+ provider: this.id,
425
+ reference,
426
+ code: "FORBIDDEN"
427
+ });
428
+ }
429
+ }
430
+
431
+ // src/integrations/secrets/gcp-secret-manager.ts
432
+ import {
433
+ SecretManagerServiceClient
434
+ } from "@google-cloud/secret-manager";
435
+ var DEFAULT_REPLICATION = {
436
+ automatic: {}
437
+ };
438
+
439
+ class GcpSecretManagerProvider {
440
+ id = "gcp-secret-manager";
441
+ client;
442
+ explicitProjectId;
443
+ replication;
444
+ constructor(options = {}) {
445
+ this.client = options.client ?? new SecretManagerServiceClient(options.clientOptions ?? {});
446
+ this.explicitProjectId = options.projectId;
447
+ this.replication = options.defaultReplication ?? DEFAULT_REPLICATION;
448
+ }
449
+ canHandle(reference) {
450
+ try {
451
+ const parsed = parseSecretUri(reference);
452
+ return parsed.provider === "gcp";
453
+ } catch {
454
+ return false;
455
+ }
456
+ }
457
+ async getSecret(reference, options, callOptions) {
458
+ const location = this.parseReference(reference);
459
+ const secretVersionName = this.buildVersionName(location, options?.version);
460
+ try {
461
+ const response = await this.client.accessSecretVersion({
462
+ name: secretVersionName
463
+ }, callOptions ?? {});
464
+ const [result] = response;
465
+ const payload = result.payload;
466
+ if (!payload?.data) {
467
+ throw new SecretProviderError({
468
+ message: `Secret payload empty for ${secretVersionName}`,
469
+ provider: this.id,
470
+ reference,
471
+ code: "UNKNOWN"
472
+ });
473
+ }
474
+ const version = extractVersionFromName(result.name ?? secretVersionName);
475
+ return {
476
+ data: payload.data,
477
+ version,
478
+ metadata: payload.dataCrc32c ? { crc32c: payload.dataCrc32c.toString() } : undefined,
479
+ retrievedAt: new Date
480
+ };
481
+ } catch (error) {
482
+ throw toSecretProviderError({
483
+ error,
484
+ provider: this.id,
485
+ reference,
486
+ operation: "access"
487
+ });
488
+ }
489
+ }
490
+ async setSecret(reference, payload) {
491
+ const location = this.parseReference(reference);
492
+ const { secretName } = this.buildNames(location);
493
+ const data = normalizeSecretPayload(payload);
494
+ await this.ensureSecretExists(location, payload);
495
+ try {
496
+ const response = await this.client.addSecretVersion({
497
+ parent: secretName,
498
+ payload: {
499
+ data
500
+ }
501
+ });
502
+ if (!response) {
503
+ throw new SecretProviderError({
504
+ message: `No version returned when adding secret version for ${secretName}`,
505
+ provider: this.id,
506
+ reference,
507
+ code: "UNKNOWN"
508
+ });
509
+ }
510
+ const [version] = response;
511
+ const versionName = version?.name ?? `${secretName}/versions/latest`;
512
+ return {
513
+ reference: `gcp://${versionName}`,
514
+ version: extractVersionFromName(versionName) ?? "latest"
515
+ };
516
+ } catch (error) {
517
+ throw toSecretProviderError({
518
+ error,
519
+ provider: this.id,
520
+ reference,
521
+ operation: "addSecretVersion"
522
+ });
523
+ }
524
+ }
525
+ async rotateSecret(reference, payload) {
526
+ return this.setSecret(reference, payload);
527
+ }
528
+ async deleteSecret(reference) {
529
+ const location = this.parseReference(reference);
530
+ const { secretName } = this.buildNames(location);
531
+ try {
532
+ await this.client.deleteSecret({
533
+ name: secretName
534
+ });
535
+ } catch (error) {
536
+ throw toSecretProviderError({
537
+ error,
538
+ provider: this.id,
539
+ reference,
540
+ operation: "delete"
541
+ });
542
+ }
543
+ }
544
+ parseReference(reference) {
545
+ const parsed = parseSecretUri(reference);
546
+ if (parsed.provider !== "gcp") {
547
+ throw new SecretProviderError({
548
+ message: `Unsupported secret provider: ${parsed.provider}`,
549
+ provider: this.id,
550
+ reference,
551
+ code: "INVALID"
552
+ });
553
+ }
554
+ const segments = parsed.path.split("/").filter(Boolean);
555
+ if (segments.length < 4 || segments[0] !== "projects") {
556
+ throw new SecretProviderError({
557
+ message: `Expected secret reference format gcp://projects/{project}/secrets/{secret}[(/versions/{version})] but received "${parsed.path}"`,
558
+ provider: this.id,
559
+ reference,
560
+ code: "INVALID"
561
+ });
562
+ }
563
+ const projectIdCandidate = segments[1] ?? this.explicitProjectId;
564
+ if (!projectIdCandidate) {
565
+ throw new SecretProviderError({
566
+ message: `Unable to resolve project or secret from reference "${parsed.path}"`,
567
+ provider: this.id,
568
+ reference,
569
+ code: "INVALID"
570
+ });
571
+ }
572
+ const indexOfSecrets = segments.indexOf("secrets");
573
+ if (indexOfSecrets === -1 || indexOfSecrets + 1 >= segments.length) {
574
+ throw new SecretProviderError({
575
+ message: `Unable to resolve project or secret from reference "${parsed.path}"`,
576
+ provider: this.id,
577
+ reference,
578
+ code: "INVALID"
579
+ });
580
+ }
581
+ const resolvedProjectId = projectIdCandidate;
582
+ const secretIdCandidate = segments[indexOfSecrets + 1];
583
+ if (!secretIdCandidate) {
584
+ throw new SecretProviderError({
585
+ message: `Unable to resolve secret ID from reference "${parsed.path}"`,
586
+ provider: this.id,
587
+ reference,
588
+ code: "INVALID"
589
+ });
590
+ }
591
+ const secretId = secretIdCandidate;
592
+ const indexOfVersions = segments.indexOf("versions");
593
+ const version = parsed.extras?.version ?? (indexOfVersions !== -1 && indexOfVersions + 1 < segments.length ? segments[indexOfVersions + 1] : undefined);
594
+ return {
595
+ projectId: resolvedProjectId,
596
+ secretId,
597
+ version
598
+ };
599
+ }
600
+ buildNames(location) {
601
+ const projectId = location.projectId ?? this.explicitProjectId;
602
+ if (!projectId) {
603
+ throw new SecretProviderError({
604
+ message: "Project ID must be provided either in reference or provider configuration",
605
+ provider: this.id,
606
+ reference: `gcp://projects//secrets/${location.secretId}`,
607
+ code: "INVALID"
608
+ });
609
+ }
610
+ const projectParent = `projects/${projectId}`;
611
+ const secretName = `${projectParent}/secrets/${location.secretId}`;
612
+ return {
613
+ projectParent,
614
+ secretName
615
+ };
616
+ }
617
+ buildVersionName(location, explicitVersion) {
618
+ const { secretName } = this.buildNames(location);
619
+ const version = explicitVersion ?? location.version ?? "latest";
620
+ return `${secretName}/versions/${version}`;
621
+ }
622
+ async ensureSecretExists(location, payload) {
623
+ const { secretName, projectParent } = this.buildNames(location);
624
+ try {
625
+ await this.client.getSecret({ name: secretName });
626
+ } catch (error) {
627
+ const providerError = toSecretProviderError({
628
+ error,
629
+ provider: this.id,
630
+ reference: `gcp://${secretName}`,
631
+ operation: "getSecret",
632
+ suppressThrow: true
633
+ });
634
+ if (!providerError || providerError.code !== "NOT_FOUND") {
635
+ if (providerError) {
636
+ throw providerError;
637
+ }
638
+ throw error;
639
+ }
640
+ try {
641
+ await this.client.createSecret({
642
+ parent: projectParent,
643
+ secretId: location.secretId,
644
+ secret: {
645
+ replication: this.replication,
646
+ labels: payload.labels
647
+ }
648
+ });
649
+ } catch (creationError) {
650
+ const creationProviderError = toSecretProviderError({
651
+ error: creationError,
652
+ provider: this.id,
653
+ reference: `gcp://${secretName}`,
654
+ operation: "createSecret"
655
+ });
656
+ throw creationProviderError;
657
+ }
658
+ }
659
+ }
660
+ }
661
+ function extractVersionFromName(name) {
662
+ const segments = name.split("/").filter(Boolean);
663
+ const index = segments.indexOf("versions");
664
+ if (index === -1 || index + 1 >= segments.length) {
665
+ return;
666
+ }
667
+ return segments[index + 1];
668
+ }
669
+ function toSecretProviderError(params) {
670
+ const { error, provider, reference, operation, suppressThrow } = params;
671
+ if (error instanceof SecretProviderError) {
672
+ return error;
673
+ }
674
+ const code = deriveErrorCode(error);
675
+ const message = error instanceof Error ? error.message : `Unknown error during ${operation}`;
676
+ const providerError = new SecretProviderError({
677
+ message,
678
+ provider,
679
+ reference,
680
+ code,
681
+ cause: error
682
+ });
683
+ if (suppressThrow) {
684
+ return providerError;
685
+ }
686
+ throw providerError;
687
+ }
688
+ function deriveErrorCode(error) {
689
+ if (typeof error !== "object" || error === null) {
690
+ return "UNKNOWN";
691
+ }
692
+ const errorAny = error;
693
+ const code = errorAny.code;
694
+ if (code === 5 || code === "NOT_FOUND")
695
+ return "NOT_FOUND";
696
+ if (code === 6 || code === "ALREADY_EXISTS")
697
+ return "INVALID";
698
+ if (code === 7 || code === "PERMISSION_DENIED" || code === 403) {
699
+ return "FORBIDDEN";
700
+ }
701
+ if (code === 3 || code === "INVALID_ARGUMENT")
702
+ return "INVALID";
703
+ return "UNKNOWN";
704
+ }
705
+
706
+ // src/integrations/secrets/scaleway-secret-manager.ts
707
+ import { Buffer as Buffer4 } from "node:buffer";
708
+ var UUID_V4_LIKE = /^[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}$/i;
709
+
710
+ class ScalewaySecretManagerProvider {
711
+ id = "scaleway-secret-manager";
712
+ token;
713
+ defaultRegion;
714
+ defaultProjectId;
715
+ baseUrl;
716
+ fetchFn;
717
+ constructor(options = {}) {
718
+ this.token = options.token ?? process.env.SCW_SECRET_KEY ?? process.env.SCALEWAY_SECRET_KEY ?? "";
719
+ this.defaultRegion = options.defaultRegion ?? process.env.SCW_DEFAULT_REGION ?? process.env.SCW_REGION;
720
+ this.defaultProjectId = options.defaultProjectId ?? process.env.SCW_DEFAULT_PROJECT_ID ?? process.env.SCW_PROJECT_ID;
721
+ this.baseUrl = options.baseUrl ?? "https://api.scaleway.com";
722
+ this.fetchFn = options.fetch ?? fetch;
723
+ }
724
+ canHandle(reference) {
725
+ try {
726
+ const parsed = parseSecretUri(reference);
727
+ return parsed.provider === "scw" && (parsed.path === "secret-manager" || parsed.path.startsWith("secret-manager/"));
728
+ } catch {
729
+ return false;
730
+ }
731
+ }
732
+ async getSecret(reference, options) {
733
+ const location = this.parseReference(reference);
734
+ if (!this.token) {
735
+ throw new SecretProviderError({
736
+ message: "Scaleway secret manager token is missing (set SCW_SECRET_KEY / SCALEWAY_SECRET_KEY).",
737
+ provider: this.id,
738
+ reference,
739
+ code: "FORBIDDEN"
740
+ });
741
+ }
742
+ if (!UUID_V4_LIKE.test(location.secretIdOrName)) {
743
+ throw new SecretProviderError({
744
+ message: "Scaleway getSecret requires a secretId (uuid) reference, not a secret name.",
745
+ provider: this.id,
746
+ reference,
747
+ code: "INVALID"
748
+ });
749
+ }
750
+ const revision = options?.version ?? location.revision ?? "latest";
751
+ const url = `${this.baseUrl}/secret-manager/v1beta1/regions/${encodeURIComponent(location.region)}/secrets/${encodeURIComponent(location.secretIdOrName)}/versions/${encodeURIComponent(revision)}/access`;
752
+ const response = await this.fetchFn(url, {
753
+ method: "GET",
754
+ headers: {
755
+ "X-Auth-Token": this.token
756
+ }
757
+ });
758
+ if (!response.ok) {
759
+ throw await toScalewayError({
760
+ response,
761
+ provider: this.id,
762
+ reference,
763
+ operation: "getSecret"
764
+ });
765
+ }
766
+ const payload = await response.json();
767
+ const dataB64 = extractScalewayData(payload);
768
+ return {
769
+ data: Buffer4.from(dataB64, "base64"),
770
+ version: revision,
771
+ metadata: {
772
+ region: location.region,
773
+ secretId: location.secretIdOrName
774
+ },
775
+ retrievedAt: new Date
776
+ };
777
+ }
778
+ async setSecret(reference, payload) {
779
+ const location = this.parseReference(reference);
780
+ if (!this.token) {
781
+ throw new SecretProviderError({
782
+ message: "Scaleway secret manager token is missing (set SCW_SECRET_KEY / SCALEWAY_SECRET_KEY).",
783
+ provider: this.id,
784
+ reference,
785
+ code: "FORBIDDEN"
786
+ });
787
+ }
788
+ const bytes = normalizeSecretPayload(payload);
789
+ const encoded = Buffer4.from(bytes).toString("base64");
790
+ const secretId = UUID_V4_LIKE.test(location.secretIdOrName) ? location.secretIdOrName : await this.createSecret({
791
+ region: location.region,
792
+ name: location.secretIdOrName,
793
+ reference
794
+ });
795
+ const version = await this.createSecretVersion({
796
+ region: location.region,
797
+ secretId,
798
+ dataB64: encoded,
799
+ reference
800
+ });
801
+ return {
802
+ reference: this.buildReference(location.region, secretId, {
803
+ version
804
+ }),
805
+ version
806
+ };
807
+ }
808
+ async rotateSecret(reference, payload) {
809
+ return this.setSecret(reference, payload);
810
+ }
811
+ async deleteSecret(reference) {
812
+ const location = this.parseReference(reference);
813
+ if (!this.token) {
814
+ throw new SecretProviderError({
815
+ message: "Scaleway secret manager token is missing (set SCW_SECRET_KEY / SCALEWAY_SECRET_KEY).",
816
+ provider: this.id,
817
+ reference,
818
+ code: "FORBIDDEN"
819
+ });
820
+ }
821
+ if (!UUID_V4_LIKE.test(location.secretIdOrName)) {
822
+ throw new SecretProviderError({
823
+ message: "Scaleway deleteSecret requires a secretId (uuid) reference, not a secret name.",
824
+ provider: this.id,
825
+ reference,
826
+ code: "INVALID"
827
+ });
828
+ }
829
+ const url = `${this.baseUrl}/secret-manager/v1beta1/regions/${encodeURIComponent(location.region)}/secrets/${encodeURIComponent(location.secretIdOrName)}`;
830
+ const response = await this.fetchFn(url, {
831
+ method: "DELETE",
832
+ headers: {
833
+ "X-Auth-Token": this.token
834
+ }
835
+ });
836
+ if (!response.ok) {
837
+ throw await toScalewayError({
838
+ response,
839
+ provider: this.id,
840
+ reference,
841
+ operation: "deleteSecret"
842
+ });
843
+ }
844
+ }
845
+ parseReference(reference) {
846
+ const parsed = parseSecretUri(reference);
847
+ if (parsed.provider !== "scw") {
848
+ throw new SecretProviderError({
849
+ message: `Unsupported secret provider: ${parsed.provider}`,
850
+ provider: this.id,
851
+ reference,
852
+ code: "INVALID"
853
+ });
854
+ }
855
+ const segments = parsed.path.split("/").filter(Boolean);
856
+ if (segments.length < 2 || segments[0] !== "secret-manager") {
857
+ throw new SecretProviderError({
858
+ message: "Expected secret reference format scw://secret-manager/{region}/{secretIdOrName}[?version=...]",
859
+ provider: this.id,
860
+ reference,
861
+ code: "INVALID"
862
+ });
863
+ }
864
+ const region = segments[1] ?? this.defaultRegion;
865
+ if (!region) {
866
+ throw new SecretProviderError({
867
+ message: "Scaleway region must be provided either in reference (scw://secret-manager/{region}/...) or via SCW_DEFAULT_REGION/SCW_REGION.",
868
+ provider: this.id,
869
+ reference,
870
+ code: "INVALID"
871
+ });
872
+ }
873
+ const secretIdOrName = segments.slice(2).join("/");
874
+ if (!secretIdOrName) {
875
+ throw new SecretProviderError({
876
+ message: `Unable to resolve secret id/name from reference "${parsed.path}"`,
877
+ provider: this.id,
878
+ reference,
879
+ code: "INVALID"
880
+ });
881
+ }
882
+ return {
883
+ region,
884
+ secretIdOrName,
885
+ revision: parsed.extras?.version
886
+ };
887
+ }
888
+ async createSecret(params) {
889
+ const projectId = this.defaultProjectId;
890
+ if (!projectId) {
891
+ throw new SecretProviderError({
892
+ message: "Scaleway project id is required to create secrets by name (set SCW_DEFAULT_PROJECT_ID/SCW_PROJECT_ID).",
893
+ provider: this.id,
894
+ reference: params.reference,
895
+ code: "INVALID"
896
+ });
897
+ }
898
+ const url = `${this.baseUrl}/secret-manager/v1beta1/regions/${encodeURIComponent(params.region)}/secrets`;
899
+ const response = await this.fetchFn(url, {
900
+ method: "POST",
901
+ headers: {
902
+ "Content-Type": "application/json",
903
+ "X-Auth-Token": this.token
904
+ },
905
+ body: JSON.stringify({
906
+ name: params.name,
907
+ project_id: projectId
908
+ })
909
+ });
910
+ if (!response.ok) {
911
+ throw await toScalewayError({
912
+ response,
913
+ provider: this.id,
914
+ reference: params.reference,
915
+ operation: "createSecret"
916
+ });
917
+ }
918
+ const payload = await response.json();
919
+ const secretId = extractScalewaySecretId(payload);
920
+ return secretId;
921
+ }
922
+ async createSecretVersion(params) {
923
+ const url = `${this.baseUrl}/secret-manager/v1beta1/regions/${encodeURIComponent(params.region)}/secrets/${encodeURIComponent(params.secretId)}/versions`;
924
+ const response = await this.fetchFn(url, {
925
+ method: "POST",
926
+ headers: {
927
+ "Content-Type": "application/json",
928
+ "X-Auth-Token": this.token
929
+ },
930
+ body: JSON.stringify({
931
+ data: params.dataB64
932
+ })
933
+ });
934
+ if (!response.ok) {
935
+ throw await toScalewayError({
936
+ response,
937
+ provider: this.id,
938
+ reference: params.reference,
939
+ operation: "createSecretVersion"
940
+ });
941
+ }
942
+ const payload = await response.json();
943
+ return extractScalewayRevision(payload) ?? "latest";
944
+ }
945
+ buildReference(region, secretId, extras) {
946
+ const base = `scw://secret-manager/${region}/${secretId}`;
947
+ const query = extras ? Object.entries(extras).filter(([, value]) => Boolean(value)).map(([key, value]) => `${encodeURIComponent(key)}=${encodeURIComponent(value)}`).join("&") : "";
948
+ return query ? `${base}?${query}` : base;
949
+ }
950
+ }
951
+ function extractScalewayData(payload) {
952
+ if (!payload || typeof payload !== "object") {
953
+ throw new Error("Invalid scaleway secret payload");
954
+ }
955
+ const record = payload;
956
+ if (typeof record.data === "string" && record.data) {
957
+ return record.data;
958
+ }
959
+ throw new Error("Scaleway secret payload is missing data");
960
+ }
961
+ function extractScalewaySecretId(payload) {
962
+ if (!payload || typeof payload !== "object") {
963
+ throw new Error("Invalid scaleway createSecret payload");
964
+ }
965
+ const record = payload;
966
+ if (typeof record.id === "string" && record.id) {
967
+ return record.id;
968
+ }
969
+ throw new Error("Scaleway createSecret response is missing id");
970
+ }
971
+ function extractScalewayRevision(payload) {
972
+ if (!payload || typeof payload !== "object") {
973
+ return;
974
+ }
975
+ const record = payload;
976
+ if (typeof record.revision === "number") {
977
+ return String(record.revision);
978
+ }
979
+ if (typeof record.revision === "string" && record.revision) {
980
+ return record.revision;
981
+ }
982
+ if (typeof record.id === "string" && record.id) {
983
+ return record.id;
984
+ }
985
+ return;
986
+ }
987
+ async function toScalewayError(params) {
988
+ const { response, provider, reference, operation } = params;
989
+ const code = response.status === 404 ? "NOT_FOUND" : response.status === 401 || response.status === 403 ? "FORBIDDEN" : response.status >= 400 && response.status < 500 ? "INVALID" : "UNKNOWN";
990
+ const bodyText = await safeReadBody(response);
991
+ const message = bodyText ? `Scaleway Secret Manager ${operation} failed (${response.status}): ${bodyText}` : `Scaleway Secret Manager ${operation} failed (${response.status})`;
992
+ return new SecretProviderError({
993
+ message,
994
+ provider,
995
+ reference,
996
+ code
997
+ });
998
+ }
999
+ async function safeReadBody(response) {
1000
+ try {
1001
+ const text = await response.text();
1002
+ const trimmed = text.trim();
1003
+ return trimmed.length ? trimmed : undefined;
1004
+ } catch {
1005
+ return;
1006
+ }
1007
+ }
1008
+
1009
+ // src/integrations/secrets/manager.ts
1010
+ class SecretProviderManager {
1011
+ id;
1012
+ providers = [];
1013
+ registrationCounter = 0;
1014
+ constructor(options = {}) {
1015
+ this.id = options.id ?? "secret-provider-manager";
1016
+ const initialProviders = options.providers ?? [];
1017
+ for (const entry of initialProviders) {
1018
+ this.register(entry.provider, { priority: entry.priority });
1019
+ }
1020
+ }
1021
+ register(provider, options = {}) {
1022
+ this.providers.push({
1023
+ provider,
1024
+ priority: options.priority ?? 0,
1025
+ order: this.registrationCounter++
1026
+ });
1027
+ this.providers.sort((a, b) => {
1028
+ if (a.priority !== b.priority) {
1029
+ return b.priority - a.priority;
1030
+ }
1031
+ return a.order - b.order;
1032
+ });
1033
+ return this;
1034
+ }
1035
+ canHandle(reference) {
1036
+ return this.providers.some(({ provider }) => safeCanHandle(provider, reference));
1037
+ }
1038
+ async getSecret(reference, options) {
1039
+ const errors = [];
1040
+ for (const { provider } of this.providers) {
1041
+ if (!safeCanHandle(provider, reference)) {
1042
+ continue;
1043
+ }
1044
+ try {
1045
+ return await provider.getSecret(reference, options);
1046
+ } catch (error) {
1047
+ if (error instanceof SecretProviderError) {
1048
+ errors.push(error);
1049
+ if (error.code !== "NOT_FOUND") {
1050
+ break;
1051
+ }
1052
+ continue;
1053
+ }
1054
+ throw error;
1055
+ }
1056
+ }
1057
+ throw this.composeError("getSecret", reference, errors, options?.version);
1058
+ }
1059
+ async setSecret(reference, payload) {
1060
+ return this.delegateToFirst("setSecret", reference, (provider) => provider.setSecret(reference, payload));
1061
+ }
1062
+ async rotateSecret(reference, payload) {
1063
+ return this.delegateToFirst("rotateSecret", reference, (provider) => provider.rotateSecret(reference, payload));
1064
+ }
1065
+ async deleteSecret(reference) {
1066
+ await this.delegateToFirst("deleteSecret", reference, (provider) => provider.deleteSecret(reference));
1067
+ }
1068
+ async delegateToFirst(operation, reference, invoker) {
1069
+ const errors = [];
1070
+ for (const { provider } of this.providers) {
1071
+ if (!safeCanHandle(provider, reference)) {
1072
+ continue;
1073
+ }
1074
+ try {
1075
+ return await invoker(provider);
1076
+ } catch (error) {
1077
+ if (error instanceof SecretProviderError) {
1078
+ errors.push(error);
1079
+ continue;
1080
+ }
1081
+ throw error;
1082
+ }
1083
+ }
1084
+ throw this.composeError(operation, reference, errors);
1085
+ }
1086
+ composeError(operation, reference, errors, version) {
1087
+ if (errors.length === 1) {
1088
+ const [singleError] = errors;
1089
+ if (singleError) {
1090
+ return singleError;
1091
+ }
1092
+ }
1093
+ const messageParts = [
1094
+ `No registered secret provider could ${operation}`,
1095
+ `reference "${reference}"`
1096
+ ];
1097
+ if (version) {
1098
+ messageParts.push(`(version: ${version})`);
1099
+ }
1100
+ if (errors.length > 1) {
1101
+ messageParts.push(`Attempts: ${errors.map((error) => `${error.provider}:${error.code}`).join(", ")}`);
1102
+ }
1103
+ return new SecretProviderError({
1104
+ message: messageParts.join(" "),
1105
+ provider: this.id,
1106
+ reference,
1107
+ code: errors.length > 0 ? errors[errors.length - 1]?.code ?? "UNKNOWN" : "UNKNOWN",
1108
+ cause: errors
1109
+ });
1110
+ }
1111
+ }
1112
+ function safeCanHandle(provider, reference) {
1113
+ try {
1114
+ return provider.canHandle(reference);
1115
+ } catch {
1116
+ return false;
1117
+ }
1118
+ }
1119
+ export {
1120
+ parseSecretUri,
1121
+ normalizeSecretPayload,
1122
+ SecretProviderManager,
1123
+ SecretProviderError,
1124
+ ScalewaySecretManagerProvider,
1125
+ GcpSecretManagerProvider,
1126
+ EnvSecretProvider,
1127
+ AwsSecretsManagerProvider
1128
+ };