@effect-aws/client-secrets-manager 1.3.0 → 1.9.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/Errors/package.json +6 -0
- package/LICENSE +1 -1
- package/SecretsManagerClientInstance/package.json +6 -0
- package/SecretsManagerService/package.json +6 -0
- package/SecretsManagerServiceConfig/package.json +6 -0
- package/{lib → dist/cjs}/Errors.d.ts +6 -11
- package/dist/cjs/Errors.d.ts.map +1 -0
- package/dist/cjs/Errors.js +20 -0
- package/dist/cjs/Errors.js.map +1 -0
- package/dist/cjs/SecretsManagerClientInstance.d.ts +24 -0
- package/dist/cjs/SecretsManagerClientInstance.d.ts.map +1 -0
- package/dist/cjs/SecretsManagerClientInstance.js +50 -0
- package/dist/cjs/SecretsManagerClientInstance.js.map +1 -0
- package/{lib → dist/cjs}/SecretsManagerService.d.ts +16 -38
- package/dist/cjs/SecretsManagerService.d.ts.map +1 -0
- package/dist/cjs/SecretsManagerService.js +79 -0
- package/dist/cjs/SecretsManagerService.js.map +1 -0
- package/dist/cjs/SecretsManagerServiceConfig.d.ts +25 -0
- package/dist/cjs/SecretsManagerServiceConfig.d.ts.map +1 -0
- package/dist/cjs/SecretsManagerServiceConfig.js +35 -0
- package/dist/cjs/SecretsManagerServiceConfig.js.map +1 -0
- package/dist/cjs/index.d.ts +39 -0
- package/dist/cjs/index.d.ts.map +1 -0
- package/dist/cjs/index.js +56 -0
- package/dist/cjs/index.js.map +1 -0
- package/dist/dts/Errors.d.ts +19 -0
- package/dist/dts/Errors.d.ts.map +1 -0
- package/dist/dts/SecretsManagerClientInstance.d.ts +24 -0
- package/dist/dts/SecretsManagerClientInstance.d.ts.map +1 -0
- package/dist/dts/SecretsManagerService.d.ts +158 -0
- package/dist/dts/SecretsManagerService.d.ts.map +1 -0
- package/dist/dts/SecretsManagerServiceConfig.d.ts +25 -0
- package/dist/dts/SecretsManagerServiceConfig.d.ts.map +1 -0
- package/dist/dts/index.d.ts +39 -0
- package/dist/dts/index.d.ts.map +1 -0
- package/dist/esm/Errors.js +17 -0
- package/dist/esm/Errors.js.map +1 -0
- package/dist/esm/SecretsManagerClientInstance.js +23 -0
- package/dist/esm/SecretsManagerClientInstance.js.map +1 -0
- package/dist/esm/SecretsManagerService.js +52 -0
- package/dist/esm/SecretsManagerService.js.map +1 -0
- package/dist/esm/SecretsManagerServiceConfig.js +31 -0
- package/dist/esm/SecretsManagerServiceConfig.js.map +1 -0
- package/dist/esm/index.js +27 -0
- package/dist/esm/index.js.map +1 -0
- package/dist/esm/package.json +4 -0
- package/package.json +60 -43
- package/src/Errors.ts +47 -0
- package/src/SecretsManagerClientInstance.ts +33 -0
- package/src/SecretsManagerService.ts +483 -0
- package/src/SecretsManagerServiceConfig.ts +52 -0
- package/src/index.ts +44 -0
- package/CHANGELOG.md +0 -31
- package/docgen.json +0 -8
- package/lib/Errors.js +0 -20
- package/lib/SecretsManagerClientInstance.d.ts +0 -31
- package/lib/SecretsManagerClientInstance.js +0 -57
- package/lib/SecretsManagerClientInstanceConfig.d.ts +0 -23
- package/lib/SecretsManagerClientInstanceConfig.js +0 -44
- package/lib/SecretsManagerService.js +0 -111
- package/lib/esm/Errors.js +0 -17
- package/lib/esm/SecretsManagerClientInstance.js +0 -30
- package/lib/esm/SecretsManagerClientInstanceConfig.js +0 -40
- package/lib/esm/SecretsManagerService.js +0 -107
- package/lib/esm/index.js +0 -5
- package/lib/index.d.ts +0 -4
- package/lib/index.js +0 -21
- package/project.json +0 -77
- package/vitest.config.ts +0 -3
package/LICENSE
CHANGED
|
@@ -1,11 +1,7 @@
|
|
|
1
1
|
import type { DecryptionFailure, EncryptionFailure, InternalServiceError as InternalServiceException, InvalidNextTokenException, InvalidParameterException, InvalidRequestException, LimitExceededException, MalformedPolicyDocumentException, PreconditionNotMetException, PublicPolicyException, ResourceExistsException, ResourceNotFoundException } from "@aws-sdk/client-secrets-manager";
|
|
2
|
-
import {
|
|
3
|
-
|
|
4
|
-
export
|
|
5
|
-
name: string;
|
|
6
|
-
}> = T & {
|
|
7
|
-
readonly _tag: T["name"];
|
|
8
|
-
};
|
|
2
|
+
import type { TaggedException } from "@effect-aws/commons";
|
|
3
|
+
import { SdkError as CommonSdkError } from "@effect-aws/commons";
|
|
4
|
+
export declare const AllServiceErrors: readonly ["DecryptionFailure", "EncryptionFailure", "InternalServiceError", "InvalidNextTokenException", "InvalidParameterException", "InvalidRequestException", "LimitExceededException", "MalformedPolicyDocumentException", "PreconditionNotMetException", "PublicPolicyException", "ResourceExistsException", "ResourceNotFoundException"];
|
|
9
5
|
export type DecryptionError = TaggedException<DecryptionFailure>;
|
|
10
6
|
export type EncryptionError = TaggedException<EncryptionFailure>;
|
|
11
7
|
export type InternalServiceError = TaggedException<InternalServiceException>;
|
|
@@ -18,7 +14,6 @@ export type PreconditionNotMetError = TaggedException<PreconditionNotMetExceptio
|
|
|
18
14
|
export type PublicPolicyError = TaggedException<PublicPolicyException>;
|
|
19
15
|
export type ResourceExistsError = TaggedException<ResourceExistsException>;
|
|
20
16
|
export type ResourceNotFoundError = TaggedException<ResourceNotFoundException>;
|
|
21
|
-
export type SdkError =
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
export declare const SdkError: Data.Case.Constructor<SdkError, "_tag">;
|
|
17
|
+
export type SdkError = CommonSdkError;
|
|
18
|
+
export declare const SdkError: import("effect/Data").Case.Constructor<CommonSdkError, "_tag">;
|
|
19
|
+
//# sourceMappingURL=Errors.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"Errors.d.ts","sourceRoot":"","sources":["../../src/Errors.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EACV,iBAAiB,EACjB,iBAAiB,EACjB,oBAAoB,IAAI,wBAAwB,EAChD,yBAAyB,EACzB,yBAAyB,EACzB,uBAAuB,EACvB,sBAAsB,EACtB,gCAAgC,EAChC,2BAA2B,EAC3B,qBAAqB,EACrB,uBAAuB,EACvB,yBAAyB,EAC1B,MAAM,iCAAiC,CAAC;AACzC,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,qBAAqB,CAAC;AAC3D,OAAO,EAAE,QAAQ,IAAI,cAAc,EAAE,MAAM,qBAAqB,CAAC;AAEjE,eAAO,MAAM,gBAAgB,gVAanB,CAAC;AAEX,MAAM,MAAM,eAAe,GAAG,eAAe,CAAC,iBAAiB,CAAC,CAAC;AACjE,MAAM,MAAM,eAAe,GAAG,eAAe,CAAC,iBAAiB,CAAC,CAAC;AACjE,MAAM,MAAM,oBAAoB,GAAG,eAAe,CAAC,wBAAwB,CAAC,CAAC;AAC7E,MAAM,MAAM,qBAAqB,GAAG,eAAe,CAAC,yBAAyB,CAAC,CAAC;AAC/E,MAAM,MAAM,qBAAqB,GAAG,eAAe,CAAC,yBAAyB,CAAC,CAAC;AAC/E,MAAM,MAAM,mBAAmB,GAAG,eAAe,CAAC,uBAAuB,CAAC,CAAC;AAC3E,MAAM,MAAM,kBAAkB,GAAG,eAAe,CAAC,sBAAsB,CAAC,CAAC;AACzE,MAAM,MAAM,4BAA4B,GAAG,eAAe,CAAC,gCAAgC,CAAC,CAAC;AAC7F,MAAM,MAAM,uBAAuB,GAAG,eAAe,CAAC,2BAA2B,CAAC,CAAC;AACnF,MAAM,MAAM,iBAAiB,GAAG,eAAe,CAAC,qBAAqB,CAAC,CAAC;AACvE,MAAM,MAAM,mBAAmB,GAAG,eAAe,CAAC,uBAAuB,CAAC,CAAC;AAC3E,MAAM,MAAM,qBAAqB,GAAG,eAAe,CAAC,yBAAyB,CAAC,CAAC;AAE/E,MAAM,MAAM,QAAQ,GAAG,cAAc,CAAC;AACtC,eAAO,MAAM,QAAQ,gEAAiB,CAAC"}
|
|
@@ -0,0 +1,20 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.SdkError = exports.AllServiceErrors = void 0;
|
|
4
|
+
const commons_1 = require("@effect-aws/commons");
|
|
5
|
+
exports.AllServiceErrors = [
|
|
6
|
+
"DecryptionFailure",
|
|
7
|
+
"EncryptionFailure",
|
|
8
|
+
"InternalServiceError",
|
|
9
|
+
"InvalidNextTokenException",
|
|
10
|
+
"InvalidParameterException",
|
|
11
|
+
"InvalidRequestException",
|
|
12
|
+
"LimitExceededException",
|
|
13
|
+
"MalformedPolicyDocumentException",
|
|
14
|
+
"PreconditionNotMetException",
|
|
15
|
+
"PublicPolicyException",
|
|
16
|
+
"ResourceExistsException",
|
|
17
|
+
"ResourceNotFoundException",
|
|
18
|
+
];
|
|
19
|
+
exports.SdkError = commons_1.SdkError;
|
|
20
|
+
//# sourceMappingURL=Errors.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"Errors.js","sourceRoot":"","sources":["../../src/Errors.ts"],"names":[],"mappings":";;;AAeA,iDAAiE;AAEpD,QAAA,gBAAgB,GAAG;IAC9B,mBAAmB;IACnB,mBAAmB;IACnB,sBAAsB;IACtB,2BAA2B;IAC3B,2BAA2B;IAC3B,yBAAyB;IACzB,wBAAwB;IACxB,kCAAkC;IAClC,6BAA6B;IAC7B,uBAAuB;IACvB,yBAAyB;IACzB,2BAA2B;CACnB,CAAC;AAgBE,QAAA,QAAQ,GAAG,kBAAc,CAAC"}
|
|
@@ -0,0 +1,24 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* @since 1.0.0
|
|
3
|
+
*/
|
|
4
|
+
import { SecretsManagerClient } from "@aws-sdk/client-secrets-manager";
|
|
5
|
+
import { Context, Effect, Layer } from "effect";
|
|
6
|
+
declare const SecretsManagerClientInstance_base: Context.TagClass<SecretsManagerClientInstance, "@effect-aws/client-secrets-manager/SecretsManagerClientInstance", SecretsManagerClient>;
|
|
7
|
+
/**
|
|
8
|
+
* @since 1.0.0
|
|
9
|
+
* @category tags
|
|
10
|
+
*/
|
|
11
|
+
export declare class SecretsManagerClientInstance extends SecretsManagerClientInstance_base {
|
|
12
|
+
}
|
|
13
|
+
/**
|
|
14
|
+
* @since 1.0.0
|
|
15
|
+
* @category constructors
|
|
16
|
+
*/
|
|
17
|
+
export declare const make: Effect.Effect<SecretsManagerClient, never, import("effect/Scope").Scope>;
|
|
18
|
+
/**
|
|
19
|
+
* @since 1.0.0
|
|
20
|
+
* @category layers
|
|
21
|
+
*/
|
|
22
|
+
export declare const layer: Layer.Layer<SecretsManagerClientInstance, never, never>;
|
|
23
|
+
export {};
|
|
24
|
+
//# sourceMappingURL=SecretsManagerClientInstance.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"SecretsManagerClientInstance.d.ts","sourceRoot":"","sources":["../../src/SecretsManagerClientInstance.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,oBAAoB,EAAE,MAAM,iCAAiC,CAAC;AACvE,OAAO,EAAE,OAAO,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,QAAQ,CAAC;;AAGhD;;;GAGG;AACH,qBAAa,4BAA6B,SAAQ,iCAEK;CAAG;AAE1D;;;GAGG;AACH,eAAO,MAAM,IAAI,0EAOhB,CAAC;AAEF;;;GAGG;AACH,eAAO,MAAM,KAAK,yDAAmD,CAAC"}
|
|
@@ -0,0 +1,50 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
+
if (k2 === undefined) k2 = k;
|
|
4
|
+
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
+
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
+
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
+
}
|
|
8
|
+
Object.defineProperty(o, k2, desc);
|
|
9
|
+
}) : (function(o, m, k, k2) {
|
|
10
|
+
if (k2 === undefined) k2 = k;
|
|
11
|
+
o[k2] = m[k];
|
|
12
|
+
}));
|
|
13
|
+
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
+
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
+
}) : function(o, v) {
|
|
16
|
+
o["default"] = v;
|
|
17
|
+
});
|
|
18
|
+
var __importStar = (this && this.__importStar) || function (mod) {
|
|
19
|
+
if (mod && mod.__esModule) return mod;
|
|
20
|
+
var result = {};
|
|
21
|
+
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
|
|
22
|
+
__setModuleDefault(result, mod);
|
|
23
|
+
return result;
|
|
24
|
+
};
|
|
25
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
26
|
+
exports.layer = exports.make = exports.SecretsManagerClientInstance = void 0;
|
|
27
|
+
/**
|
|
28
|
+
* @since 1.0.0
|
|
29
|
+
*/
|
|
30
|
+
const client_secrets_manager_1 = require("@aws-sdk/client-secrets-manager");
|
|
31
|
+
const effect_1 = require("effect");
|
|
32
|
+
const SecretsManagerServiceConfig = __importStar(require("./SecretsManagerServiceConfig.js"));
|
|
33
|
+
/**
|
|
34
|
+
* @since 1.0.0
|
|
35
|
+
* @category tags
|
|
36
|
+
*/
|
|
37
|
+
class SecretsManagerClientInstance extends effect_1.Context.Tag("@effect-aws/client-secrets-manager/SecretsManagerClientInstance")() {
|
|
38
|
+
}
|
|
39
|
+
exports.SecretsManagerClientInstance = SecretsManagerClientInstance;
|
|
40
|
+
/**
|
|
41
|
+
* @since 1.0.0
|
|
42
|
+
* @category constructors
|
|
43
|
+
*/
|
|
44
|
+
exports.make = effect_1.Effect.flatMap(SecretsManagerServiceConfig.toSecretsManagerClientConfig, (config) => effect_1.Effect.acquireRelease(effect_1.Effect.sync(() => new client_secrets_manager_1.SecretsManagerClient(config)), (client) => effect_1.Effect.sync(() => client.destroy())));
|
|
45
|
+
/**
|
|
46
|
+
* @since 1.0.0
|
|
47
|
+
* @category layers
|
|
48
|
+
*/
|
|
49
|
+
exports.layer = effect_1.Layer.scoped(SecretsManagerClientInstance, exports.make);
|
|
50
|
+
//# sourceMappingURL=SecretsManagerClientInstance.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"SecretsManagerClientInstance.js","sourceRoot":"","sources":["../../src/SecretsManagerClientInstance.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;AAAA;;GAEG;AACH,4EAAuE;AACvE,mCAAgD;AAChD,8FAAgF;AAEhF;;;GAGG;AACH,MAAa,4BAA6B,SAAQ,gBAAO,CAAC,GAAG,CAC3D,iEAAiE,CAClE,EAAsD;CAAG;AAF1D,oEAE0D;AAE1D;;;GAGG;AACU,QAAA,IAAI,GAAG,eAAM,CAAC,OAAO,CAChC,2BAA2B,CAAC,4BAA4B,EACxD,CAAC,MAAM,EAAE,EAAE,CACT,eAAM,CAAC,cAAc,CACnB,eAAM,CAAC,IAAI,CAAC,GAAG,EAAE,CAAC,IAAI,6CAAoB,CAAC,MAAM,CAAC,CAAC,EACnD,CAAC,MAAM,EAAE,EAAE,CAAC,eAAM,CAAC,IAAI,CAAC,GAAG,EAAE,CAAC,MAAM,CAAC,OAAO,EAAE,CAAC,CAChD,CACJ,CAAC;AAEF;;;GAGG;AACU,QAAA,KAAK,GAAG,cAAK,CAAC,MAAM,CAAC,4BAA4B,EAAE,YAAI,CAAC,CAAC"}
|
|
@@ -1,21 +1,11 @@
|
|
|
1
1
|
/**
|
|
2
2
|
* @since 1.0.0
|
|
3
3
|
*/
|
|
4
|
-
import { type
|
|
4
|
+
import { type BatchGetSecretValueCommandInput, type BatchGetSecretValueCommandOutput, type CancelRotateSecretCommandInput, type CancelRotateSecretCommandOutput, type CreateSecretCommandInput, type CreateSecretCommandOutput, type DeleteResourcePolicyCommandInput, type DeleteResourcePolicyCommandOutput, type DeleteSecretCommandInput, type DeleteSecretCommandOutput, type DescribeSecretCommandInput, type DescribeSecretCommandOutput, type GetRandomPasswordCommandInput, type GetRandomPasswordCommandOutput, type GetResourcePolicyCommandInput, type GetResourcePolicyCommandOutput, type GetSecretValueCommandInput, type GetSecretValueCommandOutput, type ListSecretsCommandInput, type ListSecretsCommandOutput, type ListSecretVersionIdsCommandInput, type ListSecretVersionIdsCommandOutput, type PutResourcePolicyCommandInput, type PutResourcePolicyCommandOutput, type PutSecretValueCommandInput, type PutSecretValueCommandOutput, type RemoveRegionsFromReplicationCommandInput, type RemoveRegionsFromReplicationCommandOutput, type ReplicateSecretToRegionsCommandInput, type ReplicateSecretToRegionsCommandOutput, type RestoreSecretCommandInput, type RestoreSecretCommandOutput, type RotateSecretCommandInput, type RotateSecretCommandOutput, type SecretsManagerClient, type SecretsManagerClientConfig, type StopReplicationToReplicaCommandInput, type StopReplicationToReplicaCommandOutput, type TagResourceCommandInput, type TagResourceCommandOutput, type UntagResourceCommandInput, type UntagResourceCommandOutput, type UpdateSecretCommandInput, type UpdateSecretCommandOutput, type UpdateSecretVersionStageCommandInput, type UpdateSecretVersionStageCommandOutput, type ValidateResourcePolicyCommandInput, type ValidateResourcePolicyCommandOutput } from "@aws-sdk/client-secrets-manager";
|
|
5
|
+
import type { HttpHandlerOptions, SdkError, ServiceLogger } from "@effect-aws/commons";
|
|
5
6
|
import { Effect, Layer } from "effect";
|
|
6
|
-
import { DecryptionError, EncryptionError, InternalServiceError, InvalidNextTokenError, InvalidParameterError, InvalidRequestError, LimitExceededError, MalformedPolicyDocumentError, PreconditionNotMetError, PublicPolicyError, ResourceExistsError, ResourceNotFoundError
|
|
7
|
-
import
|
|
8
|
-
import { SecretsManagerClientInstanceConfig } from "./SecretsManagerClientInstanceConfig";
|
|
9
|
-
/**
|
|
10
|
-
* @since 1.0.0
|
|
11
|
-
*/
|
|
12
|
-
export interface HttpHandlerOptions {
|
|
13
|
-
/**
|
|
14
|
-
* The maximum time in milliseconds that the connection phase of a request
|
|
15
|
-
* may take before the connection attempt is abandoned.
|
|
16
|
-
*/
|
|
17
|
-
requestTimeout?: number;
|
|
18
|
-
}
|
|
7
|
+
import type { DecryptionError, EncryptionError, InternalServiceError, InvalidNextTokenError, InvalidParameterError, InvalidRequestError, LimitExceededError, MalformedPolicyDocumentError, PreconditionNotMetError, PublicPolicyError, ResourceExistsError, ResourceNotFoundError } from "./Errors.js";
|
|
8
|
+
import * as Instance from "./SecretsManagerClientInstance.js";
|
|
19
9
|
interface SecretsManagerService$ {
|
|
20
10
|
readonly _: unique symbol;
|
|
21
11
|
/**
|
|
@@ -115,7 +105,7 @@ interface SecretsManagerService$ {
|
|
|
115
105
|
* @since 1.0.0
|
|
116
106
|
* @category constructors
|
|
117
107
|
*/
|
|
118
|
-
export declare const makeSecretsManagerService: Effect.Effect<SecretsManagerService$, never, SecretsManagerClientInstance>;
|
|
108
|
+
export declare const makeSecretsManagerService: Effect.Effect<SecretsManagerService$, never, Instance.SecretsManagerClientInstance>;
|
|
119
109
|
declare const SecretsManagerService_base: import("effect/Context").TagClass<SecretsManagerService, "@effect-aws/client-secrets-manager/SecretsManagerService", SecretsManagerService$> & {
|
|
120
110
|
readonly _: Effect.Effect<SecretsManagerService$["_"], never, SecretsManagerService>;
|
|
121
111
|
batchGetSecretValue: (args: BatchGetSecretValueCommandInput, options?: HttpHandlerOptions | undefined) => Effect.Effect<BatchGetSecretValueCommandOutput, DecryptionError | InternalServiceError | InvalidNextTokenError | InvalidParameterError | InvalidRequestError | ResourceNotFoundError | SdkError, SecretsManagerService>;
|
|
@@ -142,7 +132,7 @@ declare const SecretsManagerService_base: import("effect/Context").TagClass<Secr
|
|
|
142
132
|
updateSecretVersionStage: (args: UpdateSecretVersionStageCommandInput, options?: HttpHandlerOptions | undefined) => Effect.Effect<UpdateSecretVersionStageCommandOutput, InternalServiceError | InvalidParameterError | InvalidRequestError | LimitExceededError | ResourceNotFoundError | SdkError, SecretsManagerService>;
|
|
143
133
|
validateResourcePolicy: (args: ValidateResourcePolicyCommandInput, options?: HttpHandlerOptions | undefined) => Effect.Effect<ValidateResourcePolicyCommandOutput, InternalServiceError | InvalidParameterError | InvalidRequestError | MalformedPolicyDocumentError | ResourceNotFoundError | SdkError, SecretsManagerService>;
|
|
144
134
|
} & {
|
|
145
|
-
use: <X>(body: (_: SecretsManagerService$) => X) => X extends Effect.Effect<infer A, infer E, infer R> ? Effect.Effect<A, E,
|
|
135
|
+
use: <X>(body: (_: SecretsManagerService$) => X) => X extends Effect.Effect<infer A, infer E, infer R> ? Effect.Effect<A, E, SecretsManagerService | R> : Effect.Effect<X, never, SecretsManagerService>;
|
|
146
136
|
};
|
|
147
137
|
/**
|
|
148
138
|
* @since 1.0.0
|
|
@@ -150,31 +140,19 @@ declare const SecretsManagerService_base: import("effect/Context").TagClass<Secr
|
|
|
150
140
|
*/
|
|
151
141
|
export declare class SecretsManagerService extends SecretsManagerService_base {
|
|
152
142
|
static readonly defaultLayer: Layer.Layer<SecretsManagerService, never, never>;
|
|
153
|
-
static readonly layer: (config:
|
|
143
|
+
static readonly layer: (config: SecretsManagerService.Config) => Layer.Layer<SecretsManagerService, never, never>;
|
|
154
144
|
static readonly baseLayer: (evaluate: (defaultConfig: SecretsManagerClientConfig) => SecretsManagerClient) => Layer.Layer<SecretsManagerService, never, never>;
|
|
155
145
|
}
|
|
156
146
|
/**
|
|
157
147
|
* @since 1.0.0
|
|
158
|
-
* @category models
|
|
159
|
-
* @alias SecretsManagerService
|
|
160
|
-
*/
|
|
161
|
-
export declare const SecretsManager: typeof SecretsManagerService;
|
|
162
|
-
/**
|
|
163
|
-
* @since 1.0.0
|
|
164
|
-
* @category layers
|
|
165
|
-
* @deprecated use SecretsManager.baseLayer instead
|
|
166
148
|
*/
|
|
167
|
-
export declare
|
|
168
|
-
/**
|
|
169
|
-
|
|
170
|
-
|
|
171
|
-
|
|
172
|
-
|
|
173
|
-
|
|
174
|
-
|
|
175
|
-
* @since 1.0.0
|
|
176
|
-
* @category layers
|
|
177
|
-
* @deprecated use SecretsManager.defaultLayer instead
|
|
178
|
-
*/
|
|
179
|
-
export declare const DefaultSecretsManagerServiceLayer: Layer.Layer<SecretsManagerService, never, never>;
|
|
149
|
+
export declare namespace SecretsManagerService {
|
|
150
|
+
/**
|
|
151
|
+
* @since 1.0.0
|
|
152
|
+
*/
|
|
153
|
+
interface Config extends Omit<SecretsManagerClientConfig, "logger"> {
|
|
154
|
+
readonly logger?: ServiceLogger.ServiceLoggerConstructorProps | true;
|
|
155
|
+
}
|
|
156
|
+
}
|
|
180
157
|
export {};
|
|
158
|
+
//# sourceMappingURL=SecretsManagerService.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"SecretsManagerService.d.ts","sourceRoot":"","sources":["../../src/SecretsManagerService.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAEL,KAAK,+BAA+B,EACpC,KAAK,gCAAgC,EAErC,KAAK,8BAA8B,EACnC,KAAK,+BAA+B,EAEpC,KAAK,wBAAwB,EAC7B,KAAK,yBAAyB,EAE9B,KAAK,gCAAgC,EACrC,KAAK,iCAAiC,EAEtC,KAAK,wBAAwB,EAC7B,KAAK,yBAAyB,EAE9B,KAAK,0BAA0B,EAC/B,KAAK,2BAA2B,EAEhC,KAAK,6BAA6B,EAClC,KAAK,8BAA8B,EAEnC,KAAK,6BAA6B,EAClC,KAAK,8BAA8B,EAEnC,KAAK,0BAA0B,EAC/B,KAAK,2BAA2B,EAEhC,KAAK,uBAAuB,EAC5B,KAAK,wBAAwB,EAE7B,KAAK,gCAAgC,EACrC,KAAK,iCAAiC,EAEtC,KAAK,6BAA6B,EAClC,KAAK,8BAA8B,EAEnC,KAAK,0BAA0B,EAC/B,KAAK,2BAA2B,EAEhC,KAAK,wCAAwC,EAC7C,KAAK,yCAAyC,EAE9C,KAAK,oCAAoC,EACzC,KAAK,qCAAqC,EAE1C,KAAK,yBAAyB,EAC9B,KAAK,0BAA0B,EAE/B,KAAK,wBAAwB,EAC7B,KAAK,yBAAyB,EAC9B,KAAK,oBAAoB,EACzB,KAAK,0BAA0B,EAE/B,KAAK,oCAAoC,EACzC,KAAK,qCAAqC,EAE1C,KAAK,uBAAuB,EAC5B,KAAK,wBAAwB,EAE7B,KAAK,yBAAyB,EAC9B,KAAK,0BAA0B,EAE/B,KAAK,wBAAwB,EAC7B,KAAK,yBAAyB,EAE9B,KAAK,oCAAoC,EACzC,KAAK,qCAAqC,EAE1C,KAAK,kCAAkC,EACvC,KAAK,mCAAmC,EACzC,MAAM,iCAAiC,CAAC;AACzC,OAAO,KAAK,EAAE,kBAAkB,EAAE,QAAQ,EAAE,aAAa,EAAE,MAAM,qBAAqB,CAAC;AAEvF,OAAO,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,QAAQ,CAAC;AACvC,OAAO,KAAK,EACV,eAAe,EACf,eAAe,EACf,oBAAoB,EACpB,qBAAqB,EACrB,qBAAqB,EACrB,mBAAmB,EACnB,kBAAkB,EAClB,4BAA4B,EAC5B,uBAAuB,EACvB,iBAAiB,EACjB,mBAAmB,EACnB,qBAAqB,EACtB,MAAM,aAAa,CAAC;AAErB,OAAO,KAAK,QAAQ,MAAM,mCAAmC,CAAC;AA6B9D,UAAU,sBAAsB;IAC9B,QAAQ,CAAC,CAAC,EAAE,OAAO,MAAM,CAAC;IAE1B;;OAEG;IACH,mBAAmB,CACjB,IAAI,EAAE,+BAA+B,EACrC,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,gCAAgC,EAC9B,QAAQ,GACR,eAAe,GACf,oBAAoB,GACpB,qBAAqB,GACrB,qBAAqB,GACrB,mBAAmB,GACnB,qBAAqB,CACxB,CAAC;IAEF;;OAEG;IACH,kBAAkB,CAChB,IAAI,EAAE,8BAA8B,EACpC,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,+BAA+B,EAC/B,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,mBAAmB,GAAG,qBAAqB,CACtG,CAAC;IAEF;;OAEG;IACH,YAAY,CACV,IAAI,EAAE,wBAAwB,EAC9B,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,yBAAyB,EACvB,QAAQ,GACR,eAAe,GACf,eAAe,GACf,oBAAoB,GACpB,qBAAqB,GACrB,mBAAmB,GACnB,kBAAkB,GAClB,4BAA4B,GAC5B,uBAAuB,GACvB,mBAAmB,GACnB,qBAAqB,CACxB,CAAC;IAEF;;OAEG;IACH,oBAAoB,CAClB,IAAI,EAAE,gCAAgC,EACtC,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,iCAAiC,EACjC,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,mBAAmB,GAAG,qBAAqB,CACtG,CAAC;IAEF;;OAEG;IACH,YAAY,CACV,IAAI,EAAE,wBAAwB,EAC9B,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,yBAAyB,EACzB,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,mBAAmB,GAAG,qBAAqB,CACtG,CAAC;IAEF;;OAEG;IACH,cAAc,CACZ,IAAI,EAAE,0BAA0B,EAChC,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,2BAA2B,EAC3B,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,qBAAqB,CAChF,CAAC;IAEF;;OAEG;IACH,iBAAiB,CACf,IAAI,EAAE,6BAA6B,EACnC,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,8BAA8B,EAC9B,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,mBAAmB,CAC9E,CAAC;IAEF;;OAEG;IACH,iBAAiB,CACf,IAAI,EAAE,6BAA6B,EACnC,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,8BAA8B,EAC9B,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,mBAAmB,GAAG,qBAAqB,CACtG,CAAC;IAEF;;OAEG;IACH,cAAc,CACZ,IAAI,EAAE,0BAA0B,EAChC,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,2BAA2B,EACzB,QAAQ,GACR,eAAe,GACf,oBAAoB,GACpB,qBAAqB,GACrB,mBAAmB,GACnB,qBAAqB,CACxB,CAAC;IAEF;;OAEG;IACH,oBAAoB,CAClB,IAAI,EAAE,gCAAgC,EACtC,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,iCAAiC,EACjC,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,qBAAqB,GAAG,qBAAqB,CACxG,CAAC;IAEF;;OAEG;IACH,WAAW,CACT,IAAI,EAAE,uBAAuB,EAC7B,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,wBAAwB,EACxB,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,qBAAqB,GAAG,mBAAmB,CACtG,CAAC;IAEF;;OAEG;IACH,iBAAiB,CACf,IAAI,EAAE,6BAA6B,EACnC,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,8BAA8B,EAC5B,QAAQ,GACR,oBAAoB,GACpB,qBAAqB,GACrB,mBAAmB,GACnB,4BAA4B,GAC5B,iBAAiB,GACjB,qBAAqB,CACxB,CAAC;IAEF;;OAEG;IACH,cAAc,CACZ,IAAI,EAAE,0BAA0B,EAChC,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,2BAA2B,EACzB,QAAQ,GACR,eAAe,GACf,eAAe,GACf,oBAAoB,GACpB,qBAAqB,GACrB,mBAAmB,GACnB,kBAAkB,GAClB,mBAAmB,GACnB,qBAAqB,CACxB,CAAC;IAEF;;OAEG;IACH,4BAA4B,CAC1B,IAAI,EAAE,wCAAwC,EAC9C,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,yCAAyC,EACzC,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,mBAAmB,GAAG,qBAAqB,CACtG,CAAC;IAEF;;OAEG;IACH,wBAAwB,CACtB,IAAI,EAAE,oCAAoC,EAC1C,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,qCAAqC,EACrC,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,mBAAmB,GAAG,qBAAqB,CACtG,CAAC;IAEF;;OAEG;IACH,aAAa,CACX,IAAI,EAAE,yBAAyB,EAC/B,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,0BAA0B,EAC1B,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,mBAAmB,GAAG,qBAAqB,CACtG,CAAC;IAEF;;OAEG;IACH,YAAY,CACV,IAAI,EAAE,wBAAwB,EAC9B,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,yBAAyB,EACzB,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,mBAAmB,GAAG,qBAAqB,CACtG,CAAC;IAEF;;OAEG;IACH,wBAAwB,CACtB,IAAI,EAAE,oCAAoC,EAC1C,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,qCAAqC,EACrC,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,mBAAmB,GAAG,qBAAqB,CACtG,CAAC;IAEF;;OAEG;IACH,WAAW,CACT,IAAI,EAAE,uBAAuB,EAC7B,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,wBAAwB,EACxB,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,mBAAmB,GAAG,qBAAqB,CACtG,CAAC;IAEF;;OAEG;IACH,aAAa,CACX,IAAI,EAAE,yBAAyB,EAC/B,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,0BAA0B,EAC1B,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,mBAAmB,GAAG,qBAAqB,CACtG,CAAC;IAEF;;OAEG;IACH,YAAY,CACV,IAAI,EAAE,wBAAwB,EAC9B,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,yBAAyB,EACvB,QAAQ,GACR,eAAe,GACf,eAAe,GACf,oBAAoB,GACpB,qBAAqB,GACrB,mBAAmB,GACnB,kBAAkB,GAClB,4BAA4B,GAC5B,uBAAuB,GACvB,mBAAmB,GACnB,qBAAqB,CACxB,CAAC;IAEF;;OAEG;IACH,wBAAwB,CACtB,IAAI,EAAE,oCAAoC,EAC1C,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,qCAAqC,EACnC,QAAQ,GACR,oBAAoB,GACpB,qBAAqB,GACrB,mBAAmB,GACnB,kBAAkB,GAClB,qBAAqB,CACxB,CAAC;IAEF;;OAEG;IACH,sBAAsB,CACpB,IAAI,EAAE,kCAAkC,EACxC,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,mCAAmC,EACjC,QAAQ,GACR,oBAAoB,GACpB,qBAAqB,GACrB,mBAAmB,GACnB,4BAA4B,GAC5B,qBAAqB,CACxB,CAAC;CACH;AAED;;;GAGG;AACH,eAAO,MAAM,yBAAyB,qFAIpC,CAAC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAEH;;;GAGG;AACH,qBAAa,qBAAsB,SAAQ,0BAGxC;IACD,MAAM,CAAC,QAAQ,CAAC,YAAY,mDAAqF;IACjH,MAAM,CAAC,QAAQ,CAAC,KAAK,WAAY,sBAAsB,MAAM,sDAIzD;IACJ,MAAM,CAAC,QAAQ,CAAC,SAAS,aACb,CAAC,aAAa,EAAE,0BAA0B,KAAK,oBAAoB,sDAS3E;CACL;AAED;;GAEG;AACH,MAAM,CAAC,OAAO,WAAW,qBAAqB,CAAC;IAC7C;;OAEG;IACH,UAAiB,MAAO,SAAQ,IAAI,CAAC,0BAA0B,EAAE,QAAQ,CAAC;QACxE,QAAQ,CAAC,MAAM,CAAC,EAAE,aAAa,CAAC,6BAA6B,GAAG,IAAI,CAAC;KACtE;CACF"}
|
|
@@ -0,0 +1,79 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
+
if (k2 === undefined) k2 = k;
|
|
4
|
+
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
+
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
+
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
+
}
|
|
8
|
+
Object.defineProperty(o, k2, desc);
|
|
9
|
+
}) : (function(o, m, k, k2) {
|
|
10
|
+
if (k2 === undefined) k2 = k;
|
|
11
|
+
o[k2] = m[k];
|
|
12
|
+
}));
|
|
13
|
+
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
+
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
+
}) : function(o, v) {
|
|
16
|
+
o["default"] = v;
|
|
17
|
+
});
|
|
18
|
+
var __importStar = (this && this.__importStar) || function (mod) {
|
|
19
|
+
if (mod && mod.__esModule) return mod;
|
|
20
|
+
var result = {};
|
|
21
|
+
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
|
|
22
|
+
__setModuleDefault(result, mod);
|
|
23
|
+
return result;
|
|
24
|
+
};
|
|
25
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
26
|
+
exports.SecretsManagerService = exports.makeSecretsManagerService = void 0;
|
|
27
|
+
/**
|
|
28
|
+
* @since 1.0.0
|
|
29
|
+
*/
|
|
30
|
+
const client_secrets_manager_1 = require("@aws-sdk/client-secrets-manager");
|
|
31
|
+
const commons_1 = require("@effect-aws/commons");
|
|
32
|
+
const effect_1 = require("effect");
|
|
33
|
+
const Errors_js_1 = require("./Errors.js");
|
|
34
|
+
const Instance = __importStar(require("./SecretsManagerClientInstance.js"));
|
|
35
|
+
const SecretsManagerServiceConfig = __importStar(require("./SecretsManagerServiceConfig.js"));
|
|
36
|
+
const commands = {
|
|
37
|
+
BatchGetSecretValueCommand: client_secrets_manager_1.BatchGetSecretValueCommand,
|
|
38
|
+
CancelRotateSecretCommand: client_secrets_manager_1.CancelRotateSecretCommand,
|
|
39
|
+
CreateSecretCommand: client_secrets_manager_1.CreateSecretCommand,
|
|
40
|
+
DeleteResourcePolicyCommand: client_secrets_manager_1.DeleteResourcePolicyCommand,
|
|
41
|
+
DeleteSecretCommand: client_secrets_manager_1.DeleteSecretCommand,
|
|
42
|
+
DescribeSecretCommand: client_secrets_manager_1.DescribeSecretCommand,
|
|
43
|
+
GetRandomPasswordCommand: client_secrets_manager_1.GetRandomPasswordCommand,
|
|
44
|
+
GetResourcePolicyCommand: client_secrets_manager_1.GetResourcePolicyCommand,
|
|
45
|
+
GetSecretValueCommand: client_secrets_manager_1.GetSecretValueCommand,
|
|
46
|
+
ListSecretVersionIdsCommand: client_secrets_manager_1.ListSecretVersionIdsCommand,
|
|
47
|
+
ListSecretsCommand: client_secrets_manager_1.ListSecretsCommand,
|
|
48
|
+
PutResourcePolicyCommand: client_secrets_manager_1.PutResourcePolicyCommand,
|
|
49
|
+
PutSecretValueCommand: client_secrets_manager_1.PutSecretValueCommand,
|
|
50
|
+
RemoveRegionsFromReplicationCommand: client_secrets_manager_1.RemoveRegionsFromReplicationCommand,
|
|
51
|
+
ReplicateSecretToRegionsCommand: client_secrets_manager_1.ReplicateSecretToRegionsCommand,
|
|
52
|
+
RestoreSecretCommand: client_secrets_manager_1.RestoreSecretCommand,
|
|
53
|
+
RotateSecretCommand: client_secrets_manager_1.RotateSecretCommand,
|
|
54
|
+
StopReplicationToReplicaCommand: client_secrets_manager_1.StopReplicationToReplicaCommand,
|
|
55
|
+
TagResourceCommand: client_secrets_manager_1.TagResourceCommand,
|
|
56
|
+
UntagResourceCommand: client_secrets_manager_1.UntagResourceCommand,
|
|
57
|
+
UpdateSecretCommand: client_secrets_manager_1.UpdateSecretCommand,
|
|
58
|
+
UpdateSecretVersionStageCommand: client_secrets_manager_1.UpdateSecretVersionStageCommand,
|
|
59
|
+
ValidateResourcePolicyCommand: client_secrets_manager_1.ValidateResourcePolicyCommand,
|
|
60
|
+
};
|
|
61
|
+
/**
|
|
62
|
+
* @since 1.0.0
|
|
63
|
+
* @category constructors
|
|
64
|
+
*/
|
|
65
|
+
exports.makeSecretsManagerService = effect_1.Effect.gen(function* () {
|
|
66
|
+
const client = yield* Instance.SecretsManagerClientInstance;
|
|
67
|
+
return commons_1.Service.fromClientAndCommands(client, commands, Errors_js_1.AllServiceErrors);
|
|
68
|
+
});
|
|
69
|
+
/**
|
|
70
|
+
* @since 1.0.0
|
|
71
|
+
* @category models
|
|
72
|
+
*/
|
|
73
|
+
class SecretsManagerService extends effect_1.Effect.Tag("@effect-aws/client-secrets-manager/SecretsManagerService")() {
|
|
74
|
+
static defaultLayer = effect_1.Layer.effect(this, exports.makeSecretsManagerService).pipe(effect_1.Layer.provide(Instance.layer));
|
|
75
|
+
static layer = (config) => effect_1.Layer.effect(this, exports.makeSecretsManagerService).pipe(effect_1.Layer.provide(Instance.layer), effect_1.Layer.provide(SecretsManagerServiceConfig.setSecretsManagerServiceConfig(config)));
|
|
76
|
+
static baseLayer = (evaluate) => effect_1.Layer.effect(this, exports.makeSecretsManagerService).pipe(effect_1.Layer.provide(effect_1.Layer.effect(Instance.SecretsManagerClientInstance, effect_1.Effect.map(SecretsManagerServiceConfig.toSecretsManagerClientConfig, evaluate))));
|
|
77
|
+
}
|
|
78
|
+
exports.SecretsManagerService = SecretsManagerService;
|
|
79
|
+
//# sourceMappingURL=SecretsManagerService.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"SecretsManagerService.js","sourceRoot":"","sources":["../../src/SecretsManagerService.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;AAAA;;GAEG;AACH,4EAwEyC;AAEzC,iDAA8C;AAC9C,mCAAuC;AAevC,2CAA+C;AAC/C,4EAA8D;AAC9D,8FAAgF;AAEhF,MAAM,QAAQ,GAAG;IACf,0BAA0B,EAA1B,mDAA0B;IAC1B,yBAAyB,EAAzB,kDAAyB;IACzB,mBAAmB,EAAnB,4CAAmB;IACnB,2BAA2B,EAA3B,oDAA2B;IAC3B,mBAAmB,EAAnB,4CAAmB;IACnB,qBAAqB,EAArB,8CAAqB;IACrB,wBAAwB,EAAxB,iDAAwB;IACxB,wBAAwB,EAAxB,iDAAwB;IACxB,qBAAqB,EAArB,8CAAqB;IACrB,2BAA2B,EAA3B,oDAA2B;IAC3B,kBAAkB,EAAlB,2CAAkB;IAClB,wBAAwB,EAAxB,iDAAwB;IACxB,qBAAqB,EAArB,8CAAqB;IACrB,mCAAmC,EAAnC,4DAAmC;IACnC,+BAA+B,EAA/B,wDAA+B;IAC/B,oBAAoB,EAApB,6CAAoB;IACpB,mBAAmB,EAAnB,4CAAmB;IACnB,+BAA+B,EAA/B,wDAA+B;IAC/B,kBAAkB,EAAlB,2CAAkB;IAClB,oBAAoB,EAApB,6CAAoB;IACpB,mBAAmB,EAAnB,4CAAmB;IACnB,+BAA+B,EAA/B,wDAA+B;IAC/B,6BAA6B,EAA7B,sDAA6B;CAC9B,CAAC;AA0TF;;;GAGG;AACU,QAAA,yBAAyB,GAAG,eAAM,CAAC,GAAG,CAAC,QAAQ,CAAC;IAC3D,MAAM,MAAM,GAAG,KAAK,CAAC,CAAC,QAAQ,CAAC,4BAA4B,CAAC;IAE5D,OAAO,iBAAO,CAAC,qBAAqB,CAAyB,MAAM,EAAE,QAAQ,EAAE,4BAAgB,CAAC,CAAC;AACnG,CAAC,CAAC,CAAC;AAEH;;;GAGG;AACH,MAAa,qBAAsB,SAAQ,eAAM,CAAC,GAAG,CAAC,0DAA0D,CAAC,EAG9G;IACD,MAAM,CAAU,YAAY,GAAG,cAAK,CAAC,MAAM,CAAC,IAAI,EAAE,iCAAyB,CAAC,CAAC,IAAI,CAAC,cAAK,CAAC,OAAO,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC,CAAC;IACjH,MAAM,CAAU,KAAK,GAAG,CAAC,MAAoC,EAAE,EAAE,CAC/D,cAAK,CAAC,MAAM,CAAC,IAAI,EAAE,iCAAyB,CAAC,CAAC,IAAI,CAChD,cAAK,CAAC,OAAO,CAAC,QAAQ,CAAC,KAAK,CAAC,EAC7B,cAAK,CAAC,OAAO,CAAC,2BAA2B,CAAC,8BAA8B,CAAC,MAAM,CAAC,CAAC,CAClF,CAAC;IACJ,MAAM,CAAU,SAAS,GAAG,CAC1B,QAA6E,EAC7E,EAAE,CACF,cAAK,CAAC,MAAM,CAAC,IAAI,EAAE,iCAAyB,CAAC,CAAC,IAAI,CAChD,cAAK,CAAC,OAAO,CACX,cAAK,CAAC,MAAM,CACV,QAAQ,CAAC,4BAA4B,EACrC,eAAM,CAAC,GAAG,CAAC,2BAA2B,CAAC,4BAA4B,EAAE,QAAQ,CAAC,CAC/E,CACF,CACF,CAAC;;AApBN,sDAqBC"}
|
|
@@ -0,0 +1,25 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* @since 1.0.0
|
|
3
|
+
*/
|
|
4
|
+
import type { SecretsManagerClientConfig } from "@aws-sdk/client-secrets-manager";
|
|
5
|
+
import { Effect, Layer } from "effect";
|
|
6
|
+
import type { SecretsManagerService } from "./SecretsManagerService.js";
|
|
7
|
+
/**
|
|
8
|
+
* @since 1.0.0
|
|
9
|
+
* @category secrets-manager service config
|
|
10
|
+
*/
|
|
11
|
+
export declare const withSecretsManagerServiceConfig: {
|
|
12
|
+
(config: SecretsManagerService.Config): <A, E, R>(effect: Effect.Effect<A, E, R>) => Effect.Effect<A, E, R>;
|
|
13
|
+
<A, E, R>(effect: Effect.Effect<A, E, R>, config: SecretsManagerService.Config): Effect.Effect<A, E, R>;
|
|
14
|
+
};
|
|
15
|
+
/**
|
|
16
|
+
* @since 1.0.0
|
|
17
|
+
* @category secrets-manager service config
|
|
18
|
+
*/
|
|
19
|
+
export declare const setSecretsManagerServiceConfig: (config: SecretsManagerService.Config) => Layer.Layer<never, never, never>;
|
|
20
|
+
/**
|
|
21
|
+
* @since 1.0.0
|
|
22
|
+
* @category adapters
|
|
23
|
+
*/
|
|
24
|
+
export declare const toSecretsManagerClientConfig: Effect.Effect<SecretsManagerClientConfig>;
|
|
25
|
+
//# sourceMappingURL=SecretsManagerServiceConfig.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"SecretsManagerServiceConfig.d.ts","sourceRoot":"","sources":["../../src/SecretsManagerServiceConfig.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,KAAK,EAAE,0BAA0B,EAAE,MAAM,iCAAiC,CAAC;AAElF,OAAO,EAAE,MAAM,EAAY,KAAK,EAAE,MAAM,QAAQ,CAAC;AAGjD,OAAO,KAAK,EAAE,qBAAqB,EAAE,MAAM,4BAA4B,CAAC;AAWxE;;;GAGG;AACH,eAAO,MAAM,+BAA+B,EAAE;IAC5C,CAAC,MAAM,EAAE,qBAAqB,CAAC,MAAM,GAAG,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,MAAM,EAAE,MAAM,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,KAAK,MAAM,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC;IAC5G,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,MAAM,EAAE,MAAM,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,EAAE,MAAM,EAAE,qBAAqB,CAAC,MAAM,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC;CAKzG,CAAC;AAEF;;;GAGG;AACH,eAAO,MAAM,8BAA8B,WAAY,sBAAsB,MAAM,qCAClB,CAAC;AAElE;;;GAGG;AACH,eAAO,MAAM,4BAA4B,EAAE,MAAM,CAAC,MAAM,CAAC,0BAA0B,CAQjF,CAAC"}
|
|
@@ -0,0 +1,35 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.toSecretsManagerClientConfig = exports.setSecretsManagerServiceConfig = exports.withSecretsManagerServiceConfig = void 0;
|
|
4
|
+
const commons_1 = require("@effect-aws/commons");
|
|
5
|
+
const effect_1 = require("effect");
|
|
6
|
+
const Function_1 = require("effect/Function");
|
|
7
|
+
const GlobalValue_1 = require("effect/GlobalValue");
|
|
8
|
+
/**
|
|
9
|
+
* @since 1.0.0
|
|
10
|
+
* @category secrets-manager service config
|
|
11
|
+
*/
|
|
12
|
+
const currentSecretsManagerServiceConfig = (0, GlobalValue_1.globalValue)("@effect-aws/client-secrets-manager/currentSecretsManagerServiceConfig", () => effect_1.FiberRef.unsafeMake({}));
|
|
13
|
+
/**
|
|
14
|
+
* @since 1.0.0
|
|
15
|
+
* @category secrets-manager service config
|
|
16
|
+
*/
|
|
17
|
+
exports.withSecretsManagerServiceConfig = (0, Function_1.dual)(2, (effect, config) => effect_1.Effect.locally(effect, currentSecretsManagerServiceConfig, config));
|
|
18
|
+
/**
|
|
19
|
+
* @since 1.0.0
|
|
20
|
+
* @category secrets-manager service config
|
|
21
|
+
*/
|
|
22
|
+
const setSecretsManagerServiceConfig = (config) => effect_1.Layer.locallyScoped(currentSecretsManagerServiceConfig, config);
|
|
23
|
+
exports.setSecretsManagerServiceConfig = setSecretsManagerServiceConfig;
|
|
24
|
+
/**
|
|
25
|
+
* @since 1.0.0
|
|
26
|
+
* @category adapters
|
|
27
|
+
*/
|
|
28
|
+
exports.toSecretsManagerClientConfig = effect_1.Effect.gen(function* () {
|
|
29
|
+
const { logger: serviceLogger, ...config } = yield* effect_1.FiberRef.get(currentSecretsManagerServiceConfig);
|
|
30
|
+
const logger = serviceLogger === true
|
|
31
|
+
? yield* commons_1.ServiceLogger.toClientLogger(commons_1.ServiceLogger.defaultServiceLogger)
|
|
32
|
+
: (serviceLogger ? yield* commons_1.ServiceLogger.toClientLogger(commons_1.ServiceLogger.make(serviceLogger)) : undefined);
|
|
33
|
+
return { logger, ...config };
|
|
34
|
+
});
|
|
35
|
+
//# sourceMappingURL=SecretsManagerServiceConfig.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"SecretsManagerServiceConfig.js","sourceRoot":"","sources":["../../src/SecretsManagerServiceConfig.ts"],"names":[],"mappings":";;;AAIA,iDAAoD;AACpD,mCAAiD;AACjD,8CAAuC;AACvC,oDAAiD;AAGjD;;;GAGG;AACH,MAAM,kCAAkC,GAAG,IAAA,yBAAW,EACpD,uEAAuE,EACvE,GAAG,EAAE,CAAC,iBAAQ,CAAC,UAAU,CAA+B,EAAE,CAAC,CAC5D,CAAC;AAEF;;;GAGG;AACU,QAAA,+BAA+B,GAGxC,IAAA,eAAI,EACN,CAAC,EACD,CAAU,MAA8B,EAAE,MAAoC,EAA0B,EAAE,CACxG,eAAM,CAAC,OAAO,CAAC,MAAM,EAAE,kCAAkC,EAAE,MAAM,CAAC,CACrE,CAAC;AAEF;;;GAGG;AACI,MAAM,8BAA8B,GAAG,CAAC,MAAoC,EAAE,EAAE,CACrF,cAAK,CAAC,aAAa,CAAC,kCAAkC,EAAE,MAAM,CAAC,CAAC;AADrD,QAAA,8BAA8B,kCACuB;AAElE;;;GAGG;AACU,QAAA,4BAA4B,GAA8C,eAAM,CAAC,GAAG,CAAC,QAAQ,CAAC;IACzG,MAAM,EAAE,MAAM,EAAE,aAAa,EAAE,GAAG,MAAM,EAAE,GAAG,KAAK,CAAC,CAAC,iBAAQ,CAAC,GAAG,CAAC,kCAAkC,CAAC,CAAC;IAErG,MAAM,MAAM,GAAG,aAAa,KAAK,IAAI;QACnC,CAAC,CAAC,KAAK,CAAC,CAAC,uBAAa,CAAC,cAAc,CAAC,uBAAa,CAAC,oBAAoB,CAAC;QACzE,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,uBAAa,CAAC,cAAc,CAAC,uBAAa,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC;IAEzG,OAAO,EAAE,MAAM,EAAE,GAAG,MAAM,EAAE,CAAC;AAC/B,CAAC,CAAC,CAAC"}
|
|
@@ -0,0 +1,39 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* @since 1.0.0
|
|
3
|
+
*/
|
|
4
|
+
import { SecretsManagerService } from "./SecretsManagerService.js";
|
|
5
|
+
/**
|
|
6
|
+
* @since 1.0.0
|
|
7
|
+
*/
|
|
8
|
+
export * from "./Errors.js";
|
|
9
|
+
/**
|
|
10
|
+
* @since 1.0.0
|
|
11
|
+
*/
|
|
12
|
+
export * as SecretsManagerClientInstance from "./SecretsManagerClientInstance.js";
|
|
13
|
+
/**
|
|
14
|
+
* @since 1.0.0
|
|
15
|
+
*/
|
|
16
|
+
export * as SecretsManagerServiceConfig from "./SecretsManagerServiceConfig.js";
|
|
17
|
+
/**
|
|
18
|
+
* @since 1.0.0
|
|
19
|
+
*/
|
|
20
|
+
export * from "./SecretsManagerService.js";
|
|
21
|
+
/**
|
|
22
|
+
* @since 1.0.0
|
|
23
|
+
* @category exports
|
|
24
|
+
* @alias SecretsManagerService
|
|
25
|
+
*/
|
|
26
|
+
export declare namespace SecretsManager {
|
|
27
|
+
/**
|
|
28
|
+
* @since 1.0.0
|
|
29
|
+
* @alias SecretsManagerService.Config
|
|
30
|
+
*/
|
|
31
|
+
type Config = SecretsManagerService.Config;
|
|
32
|
+
}
|
|
33
|
+
/**
|
|
34
|
+
* @since 1.0.0
|
|
35
|
+
* @category exports
|
|
36
|
+
* @alias SecretsManagerService
|
|
37
|
+
*/
|
|
38
|
+
export declare const SecretsManager: typeof SecretsManagerService;
|
|
39
|
+
//# sourceMappingURL=index.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,qBAAqB,EAAE,MAAM,4BAA4B,CAAC;AAEnE;;GAEG;AACH,cAAc,aAAa,CAAC;AAE5B;;GAEG;AACH,OAAO,KAAK,4BAA4B,MAAM,mCAAmC,CAAC;AAElF;;GAEG;AACH,OAAO,KAAK,2BAA2B,MAAM,kCAAkC,CAAC;AAEhF;;GAEG;AACH,cAAc,4BAA4B,CAAC;AAE3C;;;;GAIG;AACH,MAAM,CAAC,OAAO,WAAW,cAAc,CAAC;IACtC;;;OAGG;IACH,KAAY,MAAM,GAAG,qBAAqB,CAAC,MAAM,CAAC;CACnD;AAED;;;;GAIG;AACH,eAAO,MAAM,cAAc,8BAAwB,CAAC"}
|
|
@@ -0,0 +1,56 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
+
if (k2 === undefined) k2 = k;
|
|
4
|
+
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
+
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
+
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
+
}
|
|
8
|
+
Object.defineProperty(o, k2, desc);
|
|
9
|
+
}) : (function(o, m, k, k2) {
|
|
10
|
+
if (k2 === undefined) k2 = k;
|
|
11
|
+
o[k2] = m[k];
|
|
12
|
+
}));
|
|
13
|
+
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
+
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
+
}) : function(o, v) {
|
|
16
|
+
o["default"] = v;
|
|
17
|
+
});
|
|
18
|
+
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
19
|
+
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
20
|
+
};
|
|
21
|
+
var __importStar = (this && this.__importStar) || function (mod) {
|
|
22
|
+
if (mod && mod.__esModule) return mod;
|
|
23
|
+
var result = {};
|
|
24
|
+
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
|
|
25
|
+
__setModuleDefault(result, mod);
|
|
26
|
+
return result;
|
|
27
|
+
};
|
|
28
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
29
|
+
exports.SecretsManager = exports.SecretsManagerServiceConfig = exports.SecretsManagerClientInstance = void 0;
|
|
30
|
+
/**
|
|
31
|
+
* @since 1.0.0
|
|
32
|
+
*/
|
|
33
|
+
const SecretsManagerService_js_1 = require("./SecretsManagerService.js");
|
|
34
|
+
/**
|
|
35
|
+
* @since 1.0.0
|
|
36
|
+
*/
|
|
37
|
+
__exportStar(require("./Errors.js"), exports);
|
|
38
|
+
/**
|
|
39
|
+
* @since 1.0.0
|
|
40
|
+
*/
|
|
41
|
+
exports.SecretsManagerClientInstance = __importStar(require("./SecretsManagerClientInstance.js"));
|
|
42
|
+
/**
|
|
43
|
+
* @since 1.0.0
|
|
44
|
+
*/
|
|
45
|
+
exports.SecretsManagerServiceConfig = __importStar(require("./SecretsManagerServiceConfig.js"));
|
|
46
|
+
/**
|
|
47
|
+
* @since 1.0.0
|
|
48
|
+
*/
|
|
49
|
+
__exportStar(require("./SecretsManagerService.js"), exports);
|
|
50
|
+
/**
|
|
51
|
+
* @since 1.0.0
|
|
52
|
+
* @category exports
|
|
53
|
+
* @alias SecretsManagerService
|
|
54
|
+
*/
|
|
55
|
+
exports.SecretsManager = SecretsManagerService_js_1.SecretsManagerService;
|
|
56
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA;;GAEG;AACH,yEAAmE;AAEnE;;GAEG;AACH,8CAA4B;AAE5B;;GAEG;AACH,kGAAkF;AAElF;;GAEG;AACH,gGAAgF;AAEhF;;GAEG;AACH,6DAA2C;AAe3C;;;;GAIG;AACU,QAAA,cAAc,GAAG,gDAAqB,CAAC"}
|
|
@@ -0,0 +1,19 @@
|
|
|
1
|
+
import type { DecryptionFailure, EncryptionFailure, InternalServiceError as InternalServiceException, InvalidNextTokenException, InvalidParameterException, InvalidRequestException, LimitExceededException, MalformedPolicyDocumentException, PreconditionNotMetException, PublicPolicyException, ResourceExistsException, ResourceNotFoundException } from "@aws-sdk/client-secrets-manager";
|
|
2
|
+
import type { TaggedException } from "@effect-aws/commons";
|
|
3
|
+
import { SdkError as CommonSdkError } from "@effect-aws/commons";
|
|
4
|
+
export declare const AllServiceErrors: readonly ["DecryptionFailure", "EncryptionFailure", "InternalServiceError", "InvalidNextTokenException", "InvalidParameterException", "InvalidRequestException", "LimitExceededException", "MalformedPolicyDocumentException", "PreconditionNotMetException", "PublicPolicyException", "ResourceExistsException", "ResourceNotFoundException"];
|
|
5
|
+
export type DecryptionError = TaggedException<DecryptionFailure>;
|
|
6
|
+
export type EncryptionError = TaggedException<EncryptionFailure>;
|
|
7
|
+
export type InternalServiceError = TaggedException<InternalServiceException>;
|
|
8
|
+
export type InvalidNextTokenError = TaggedException<InvalidNextTokenException>;
|
|
9
|
+
export type InvalidParameterError = TaggedException<InvalidParameterException>;
|
|
10
|
+
export type InvalidRequestError = TaggedException<InvalidRequestException>;
|
|
11
|
+
export type LimitExceededError = TaggedException<LimitExceededException>;
|
|
12
|
+
export type MalformedPolicyDocumentError = TaggedException<MalformedPolicyDocumentException>;
|
|
13
|
+
export type PreconditionNotMetError = TaggedException<PreconditionNotMetException>;
|
|
14
|
+
export type PublicPolicyError = TaggedException<PublicPolicyException>;
|
|
15
|
+
export type ResourceExistsError = TaggedException<ResourceExistsException>;
|
|
16
|
+
export type ResourceNotFoundError = TaggedException<ResourceNotFoundException>;
|
|
17
|
+
export type SdkError = CommonSdkError;
|
|
18
|
+
export declare const SdkError: import("effect/Data").Case.Constructor<CommonSdkError, "_tag">;
|
|
19
|
+
//# sourceMappingURL=Errors.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"Errors.d.ts","sourceRoot":"","sources":["../../src/Errors.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EACV,iBAAiB,EACjB,iBAAiB,EACjB,oBAAoB,IAAI,wBAAwB,EAChD,yBAAyB,EACzB,yBAAyB,EACzB,uBAAuB,EACvB,sBAAsB,EACtB,gCAAgC,EAChC,2BAA2B,EAC3B,qBAAqB,EACrB,uBAAuB,EACvB,yBAAyB,EAC1B,MAAM,iCAAiC,CAAC;AACzC,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,qBAAqB,CAAC;AAC3D,OAAO,EAAE,QAAQ,IAAI,cAAc,EAAE,MAAM,qBAAqB,CAAC;AAEjE,eAAO,MAAM,gBAAgB,gVAanB,CAAC;AAEX,MAAM,MAAM,eAAe,GAAG,eAAe,CAAC,iBAAiB,CAAC,CAAC;AACjE,MAAM,MAAM,eAAe,GAAG,eAAe,CAAC,iBAAiB,CAAC,CAAC;AACjE,MAAM,MAAM,oBAAoB,GAAG,eAAe,CAAC,wBAAwB,CAAC,CAAC;AAC7E,MAAM,MAAM,qBAAqB,GAAG,eAAe,CAAC,yBAAyB,CAAC,CAAC;AAC/E,MAAM,MAAM,qBAAqB,GAAG,eAAe,CAAC,yBAAyB,CAAC,CAAC;AAC/E,MAAM,MAAM,mBAAmB,GAAG,eAAe,CAAC,uBAAuB,CAAC,CAAC;AAC3E,MAAM,MAAM,kBAAkB,GAAG,eAAe,CAAC,sBAAsB,CAAC,CAAC;AACzE,MAAM,MAAM,4BAA4B,GAAG,eAAe,CAAC,gCAAgC,CAAC,CAAC;AAC7F,MAAM,MAAM,uBAAuB,GAAG,eAAe,CAAC,2BAA2B,CAAC,CAAC;AACnF,MAAM,MAAM,iBAAiB,GAAG,eAAe,CAAC,qBAAqB,CAAC,CAAC;AACvE,MAAM,MAAM,mBAAmB,GAAG,eAAe,CAAC,uBAAuB,CAAC,CAAC;AAC3E,MAAM,MAAM,qBAAqB,GAAG,eAAe,CAAC,yBAAyB,CAAC,CAAC;AAE/E,MAAM,MAAM,QAAQ,GAAG,cAAc,CAAC;AACtC,eAAO,MAAM,QAAQ,gEAAiB,CAAC"}
|
|
@@ -0,0 +1,24 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* @since 1.0.0
|
|
3
|
+
*/
|
|
4
|
+
import { SecretsManagerClient } from "@aws-sdk/client-secrets-manager";
|
|
5
|
+
import { Context, Effect, Layer } from "effect";
|
|
6
|
+
declare const SecretsManagerClientInstance_base: Context.TagClass<SecretsManagerClientInstance, "@effect-aws/client-secrets-manager/SecretsManagerClientInstance", SecretsManagerClient>;
|
|
7
|
+
/**
|
|
8
|
+
* @since 1.0.0
|
|
9
|
+
* @category tags
|
|
10
|
+
*/
|
|
11
|
+
export declare class SecretsManagerClientInstance extends SecretsManagerClientInstance_base {
|
|
12
|
+
}
|
|
13
|
+
/**
|
|
14
|
+
* @since 1.0.0
|
|
15
|
+
* @category constructors
|
|
16
|
+
*/
|
|
17
|
+
export declare const make: Effect.Effect<SecretsManagerClient, never, import("effect/Scope").Scope>;
|
|
18
|
+
/**
|
|
19
|
+
* @since 1.0.0
|
|
20
|
+
* @category layers
|
|
21
|
+
*/
|
|
22
|
+
export declare const layer: Layer.Layer<SecretsManagerClientInstance, never, never>;
|
|
23
|
+
export {};
|
|
24
|
+
//# sourceMappingURL=SecretsManagerClientInstance.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"SecretsManagerClientInstance.d.ts","sourceRoot":"","sources":["../../src/SecretsManagerClientInstance.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,oBAAoB,EAAE,MAAM,iCAAiC,CAAC;AACvE,OAAO,EAAE,OAAO,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,QAAQ,CAAC;;AAGhD;;;GAGG;AACH,qBAAa,4BAA6B,SAAQ,iCAEK;CAAG;AAE1D;;;GAGG;AACH,eAAO,MAAM,IAAI,0EAOhB,CAAC;AAEF;;;GAGG;AACH,eAAO,MAAM,KAAK,yDAAmD,CAAC"}
|