@effect-aws/client-secrets-manager 1.4.0 → 1.9.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (69) hide show
  1. package/Errors/package.json +6 -0
  2. package/SecretsManagerClientInstance/package.json +6 -0
  3. package/SecretsManagerService/package.json +6 -0
  4. package/SecretsManagerServiceConfig/package.json +6 -0
  5. package/{lib → dist/cjs}/Errors.d.ts +6 -11
  6. package/dist/cjs/Errors.d.ts.map +1 -0
  7. package/dist/cjs/Errors.js +20 -0
  8. package/dist/cjs/Errors.js.map +1 -0
  9. package/dist/cjs/SecretsManagerClientInstance.d.ts +24 -0
  10. package/dist/cjs/SecretsManagerClientInstance.d.ts.map +1 -0
  11. package/dist/cjs/SecretsManagerClientInstance.js +50 -0
  12. package/dist/cjs/SecretsManagerClientInstance.js.map +1 -0
  13. package/dist/cjs/SecretsManagerService.d.ts +133 -0
  14. package/dist/cjs/SecretsManagerService.d.ts.map +1 -0
  15. package/dist/cjs/SecretsManagerService.js +82 -0
  16. package/dist/cjs/SecretsManagerService.js.map +1 -0
  17. package/dist/cjs/SecretsManagerServiceConfig.d.ts +25 -0
  18. package/dist/cjs/SecretsManagerServiceConfig.d.ts.map +1 -0
  19. package/dist/cjs/SecretsManagerServiceConfig.js +35 -0
  20. package/dist/cjs/SecretsManagerServiceConfig.js.map +1 -0
  21. package/dist/cjs/index.d.ts +39 -0
  22. package/dist/cjs/index.d.ts.map +1 -0
  23. package/dist/cjs/index.js +56 -0
  24. package/dist/cjs/index.js.map +1 -0
  25. package/dist/dts/Errors.d.ts +19 -0
  26. package/dist/dts/Errors.d.ts.map +1 -0
  27. package/dist/dts/SecretsManagerClientInstance.d.ts +24 -0
  28. package/dist/dts/SecretsManagerClientInstance.d.ts.map +1 -0
  29. package/dist/dts/SecretsManagerService.d.ts +133 -0
  30. package/dist/dts/SecretsManagerService.d.ts.map +1 -0
  31. package/dist/dts/SecretsManagerServiceConfig.d.ts +25 -0
  32. package/dist/dts/SecretsManagerServiceConfig.d.ts.map +1 -0
  33. package/dist/dts/index.d.ts +39 -0
  34. package/dist/dts/index.d.ts.map +1 -0
  35. package/dist/esm/Errors.js +17 -0
  36. package/dist/esm/Errors.js.map +1 -0
  37. package/dist/esm/SecretsManagerClientInstance.js +23 -0
  38. package/dist/esm/SecretsManagerClientInstance.js.map +1 -0
  39. package/dist/esm/SecretsManagerService.js +55 -0
  40. package/dist/esm/SecretsManagerService.js.map +1 -0
  41. package/dist/esm/SecretsManagerServiceConfig.js +31 -0
  42. package/dist/esm/SecretsManagerServiceConfig.js.map +1 -0
  43. package/dist/esm/index.js +27 -0
  44. package/dist/esm/index.js.map +1 -0
  45. package/dist/esm/package.json +4 -0
  46. package/package.json +60 -43
  47. package/src/Errors.ts +47 -0
  48. package/src/SecretsManagerClientInstance.ts +33 -0
  49. package/src/SecretsManagerService.ts +490 -0
  50. package/src/SecretsManagerServiceConfig.ts +52 -0
  51. package/src/index.ts +44 -0
  52. package/CHANGELOG.md +0 -37
  53. package/docgen.json +0 -8
  54. package/lib/Errors.js +0 -20
  55. package/lib/SecretsManagerClientInstance.d.ts +0 -31
  56. package/lib/SecretsManagerClientInstance.js +0 -57
  57. package/lib/SecretsManagerClientInstanceConfig.d.ts +0 -23
  58. package/lib/SecretsManagerClientInstanceConfig.js +0 -44
  59. package/lib/SecretsManagerService.d.ts +0 -180
  60. package/lib/SecretsManagerService.js +0 -111
  61. package/lib/esm/Errors.js +0 -17
  62. package/lib/esm/SecretsManagerClientInstance.js +0 -30
  63. package/lib/esm/SecretsManagerClientInstanceConfig.js +0 -40
  64. package/lib/esm/SecretsManagerService.js +0 -107
  65. package/lib/esm/index.js +0 -5
  66. package/lib/index.d.ts +0 -4
  67. package/lib/index.js +0 -21
  68. package/project.json +0 -77
  69. package/vitest.config.ts +0 -3
@@ -0,0 +1,6 @@
1
+ {
2
+ "main": "../dist/cjs/Errors.js",
3
+ "module": "../dist/esm/Errors.js",
4
+ "types": "../dist/dts/Errors.d.ts",
5
+ "sideEffects": []
6
+ }
@@ -0,0 +1,6 @@
1
+ {
2
+ "main": "../dist/cjs/SecretsManagerClientInstance.js",
3
+ "module": "../dist/esm/SecretsManagerClientInstance.js",
4
+ "types": "../dist/dts/SecretsManagerClientInstance.d.ts",
5
+ "sideEffects": []
6
+ }
@@ -0,0 +1,6 @@
1
+ {
2
+ "main": "../dist/cjs/SecretsManagerService.js",
3
+ "module": "../dist/esm/SecretsManagerService.js",
4
+ "types": "../dist/dts/SecretsManagerService.d.ts",
5
+ "sideEffects": []
6
+ }
@@ -0,0 +1,6 @@
1
+ {
2
+ "main": "../dist/cjs/SecretsManagerServiceConfig.js",
3
+ "module": "../dist/esm/SecretsManagerServiceConfig.js",
4
+ "types": "../dist/dts/SecretsManagerServiceConfig.d.ts",
5
+ "sideEffects": []
6
+ }
@@ -1,11 +1,7 @@
1
1
  import type { DecryptionFailure, EncryptionFailure, InternalServiceError as InternalServiceException, InvalidNextTokenException, InvalidParameterException, InvalidRequestException, LimitExceededException, MalformedPolicyDocumentException, PreconditionNotMetException, PublicPolicyException, ResourceExistsException, ResourceNotFoundException } from "@aws-sdk/client-secrets-manager";
2
- import { Data } from "effect";
3
- export declare const AllServiceErrors: string[];
4
- export type TaggedException<T extends {
5
- name: string;
6
- }> = T & {
7
- readonly _tag: T["name"];
8
- };
2
+ import type { TaggedException } from "@effect-aws/commons";
3
+ import { SdkError as CommonSdkError } from "@effect-aws/commons";
4
+ export declare const AllServiceErrors: readonly ["DecryptionFailure", "EncryptionFailure", "InternalServiceError", "InvalidNextTokenException", "InvalidParameterException", "InvalidRequestException", "LimitExceededException", "MalformedPolicyDocumentException", "PreconditionNotMetException", "PublicPolicyException", "ResourceExistsException", "ResourceNotFoundException"];
9
5
  export type DecryptionError = TaggedException<DecryptionFailure>;
10
6
  export type EncryptionError = TaggedException<EncryptionFailure>;
11
7
  export type InternalServiceError = TaggedException<InternalServiceException>;
@@ -18,7 +14,6 @@ export type PreconditionNotMetError = TaggedException<PreconditionNotMetExceptio
18
14
  export type PublicPolicyError = TaggedException<PublicPolicyException>;
19
15
  export type ResourceExistsError = TaggedException<ResourceExistsException>;
20
16
  export type ResourceNotFoundError = TaggedException<ResourceNotFoundException>;
21
- export type SdkError = TaggedException<Error & {
22
- name: "SdkError";
23
- }>;
24
- export declare const SdkError: Data.Case.Constructor<SdkError, "_tag">;
17
+ export type SdkError = CommonSdkError;
18
+ export declare const SdkError: import("effect/Data").Case.Constructor<CommonSdkError, "_tag">;
19
+ //# sourceMappingURL=Errors.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"Errors.d.ts","sourceRoot":"","sources":["../../src/Errors.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EACV,iBAAiB,EACjB,iBAAiB,EACjB,oBAAoB,IAAI,wBAAwB,EAChD,yBAAyB,EACzB,yBAAyB,EACzB,uBAAuB,EACvB,sBAAsB,EACtB,gCAAgC,EAChC,2BAA2B,EAC3B,qBAAqB,EACrB,uBAAuB,EACvB,yBAAyB,EAC1B,MAAM,iCAAiC,CAAC;AACzC,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,qBAAqB,CAAC;AAC3D,OAAO,EAAE,QAAQ,IAAI,cAAc,EAAE,MAAM,qBAAqB,CAAC;AAEjE,eAAO,MAAM,gBAAgB,gVAanB,CAAC;AAEX,MAAM,MAAM,eAAe,GAAG,eAAe,CAAC,iBAAiB,CAAC,CAAC;AACjE,MAAM,MAAM,eAAe,GAAG,eAAe,CAAC,iBAAiB,CAAC,CAAC;AACjE,MAAM,MAAM,oBAAoB,GAAG,eAAe,CAAC,wBAAwB,CAAC,CAAC;AAC7E,MAAM,MAAM,qBAAqB,GAAG,eAAe,CAAC,yBAAyB,CAAC,CAAC;AAC/E,MAAM,MAAM,qBAAqB,GAAG,eAAe,CAAC,yBAAyB,CAAC,CAAC;AAC/E,MAAM,MAAM,mBAAmB,GAAG,eAAe,CAAC,uBAAuB,CAAC,CAAC;AAC3E,MAAM,MAAM,kBAAkB,GAAG,eAAe,CAAC,sBAAsB,CAAC,CAAC;AACzE,MAAM,MAAM,4BAA4B,GAAG,eAAe,CAAC,gCAAgC,CAAC,CAAC;AAC7F,MAAM,MAAM,uBAAuB,GAAG,eAAe,CAAC,2BAA2B,CAAC,CAAC;AACnF,MAAM,MAAM,iBAAiB,GAAG,eAAe,CAAC,qBAAqB,CAAC,CAAC;AACvE,MAAM,MAAM,mBAAmB,GAAG,eAAe,CAAC,uBAAuB,CAAC,CAAC;AAC3E,MAAM,MAAM,qBAAqB,GAAG,eAAe,CAAC,yBAAyB,CAAC,CAAC;AAE/E,MAAM,MAAM,QAAQ,GAAG,cAAc,CAAC;AACtC,eAAO,MAAM,QAAQ,gEAAiB,CAAC"}
@@ -0,0 +1,20 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.SdkError = exports.AllServiceErrors = void 0;
4
+ const commons_1 = require("@effect-aws/commons");
5
+ exports.AllServiceErrors = [
6
+ "DecryptionFailure",
7
+ "EncryptionFailure",
8
+ "InternalServiceError",
9
+ "InvalidNextTokenException",
10
+ "InvalidParameterException",
11
+ "InvalidRequestException",
12
+ "LimitExceededException",
13
+ "MalformedPolicyDocumentException",
14
+ "PreconditionNotMetException",
15
+ "PublicPolicyException",
16
+ "ResourceExistsException",
17
+ "ResourceNotFoundException",
18
+ ];
19
+ exports.SdkError = commons_1.SdkError;
20
+ //# sourceMappingURL=Errors.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"Errors.js","sourceRoot":"","sources":["../../src/Errors.ts"],"names":[],"mappings":";;;AAeA,iDAAiE;AAEpD,QAAA,gBAAgB,GAAG;IAC9B,mBAAmB;IACnB,mBAAmB;IACnB,sBAAsB;IACtB,2BAA2B;IAC3B,2BAA2B;IAC3B,yBAAyB;IACzB,wBAAwB;IACxB,kCAAkC;IAClC,6BAA6B;IAC7B,uBAAuB;IACvB,yBAAyB;IACzB,2BAA2B;CACnB,CAAC;AAgBE,QAAA,QAAQ,GAAG,kBAAc,CAAC"}
@@ -0,0 +1,24 @@
1
+ /**
2
+ * @since 1.0.0
3
+ */
4
+ import { SecretsManagerClient } from "@aws-sdk/client-secrets-manager";
5
+ import { Context, Effect, Layer } from "effect";
6
+ declare const SecretsManagerClientInstance_base: Context.TagClass<SecretsManagerClientInstance, "@effect-aws/client-secrets-manager/SecretsManagerClientInstance", SecretsManagerClient>;
7
+ /**
8
+ * @since 1.0.0
9
+ * @category tags
10
+ */
11
+ export declare class SecretsManagerClientInstance extends SecretsManagerClientInstance_base {
12
+ }
13
+ /**
14
+ * @since 1.0.0
15
+ * @category constructors
16
+ */
17
+ export declare const make: Effect.Effect<SecretsManagerClient, never, import("effect/Scope").Scope>;
18
+ /**
19
+ * @since 1.0.0
20
+ * @category layers
21
+ */
22
+ export declare const layer: Layer.Layer<SecretsManagerClientInstance, never, never>;
23
+ export {};
24
+ //# sourceMappingURL=SecretsManagerClientInstance.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"SecretsManagerClientInstance.d.ts","sourceRoot":"","sources":["../../src/SecretsManagerClientInstance.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,oBAAoB,EAAE,MAAM,iCAAiC,CAAC;AACvE,OAAO,EAAE,OAAO,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,QAAQ,CAAC;;AAGhD;;;GAGG;AACH,qBAAa,4BAA6B,SAAQ,iCAEK;CAAG;AAE1D;;;GAGG;AACH,eAAO,MAAM,IAAI,0EAOhB,CAAC;AAEF;;;GAGG;AACH,eAAO,MAAM,KAAK,yDAAmD,CAAC"}
@@ -0,0 +1,50 @@
1
+ "use strict";
2
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
+ if (k2 === undefined) k2 = k;
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
9
+ }) : (function(o, m, k, k2) {
10
+ if (k2 === undefined) k2 = k;
11
+ o[k2] = m[k];
12
+ }));
13
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
15
+ }) : function(o, v) {
16
+ o["default"] = v;
17
+ });
18
+ var __importStar = (this && this.__importStar) || function (mod) {
19
+ if (mod && mod.__esModule) return mod;
20
+ var result = {};
21
+ if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
22
+ __setModuleDefault(result, mod);
23
+ return result;
24
+ };
25
+ Object.defineProperty(exports, "__esModule", { value: true });
26
+ exports.layer = exports.make = exports.SecretsManagerClientInstance = void 0;
27
+ /**
28
+ * @since 1.0.0
29
+ */
30
+ const client_secrets_manager_1 = require("@aws-sdk/client-secrets-manager");
31
+ const effect_1 = require("effect");
32
+ const SecretsManagerServiceConfig = __importStar(require("./SecretsManagerServiceConfig.js"));
33
+ /**
34
+ * @since 1.0.0
35
+ * @category tags
36
+ */
37
+ class SecretsManagerClientInstance extends effect_1.Context.Tag("@effect-aws/client-secrets-manager/SecretsManagerClientInstance")() {
38
+ }
39
+ exports.SecretsManagerClientInstance = SecretsManagerClientInstance;
40
+ /**
41
+ * @since 1.0.0
42
+ * @category constructors
43
+ */
44
+ exports.make = effect_1.Effect.flatMap(SecretsManagerServiceConfig.toSecretsManagerClientConfig, (config) => effect_1.Effect.acquireRelease(effect_1.Effect.sync(() => new client_secrets_manager_1.SecretsManagerClient(config)), (client) => effect_1.Effect.sync(() => client.destroy())));
45
+ /**
46
+ * @since 1.0.0
47
+ * @category layers
48
+ */
49
+ exports.layer = effect_1.Layer.scoped(SecretsManagerClientInstance, exports.make);
50
+ //# sourceMappingURL=SecretsManagerClientInstance.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"SecretsManagerClientInstance.js","sourceRoot":"","sources":["../../src/SecretsManagerClientInstance.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;AAAA;;GAEG;AACH,4EAAuE;AACvE,mCAAgD;AAChD,8FAAgF;AAEhF;;;GAGG;AACH,MAAa,4BAA6B,SAAQ,gBAAO,CAAC,GAAG,CAC3D,iEAAiE,CAClE,EAAsD;CAAG;AAF1D,oEAE0D;AAE1D;;;GAGG;AACU,QAAA,IAAI,GAAG,eAAM,CAAC,OAAO,CAChC,2BAA2B,CAAC,4BAA4B,EACxD,CAAC,MAAM,EAAE,EAAE,CACT,eAAM,CAAC,cAAc,CACnB,eAAM,CAAC,IAAI,CAAC,GAAG,EAAE,CAAC,IAAI,6CAAoB,CAAC,MAAM,CAAC,CAAC,EACnD,CAAC,MAAM,EAAE,EAAE,CAAC,eAAM,CAAC,IAAI,CAAC,GAAG,EAAE,CAAC,MAAM,CAAC,OAAO,EAAE,CAAC,CAChD,CACJ,CAAC;AAEF;;;GAGG;AACU,QAAA,KAAK,GAAG,cAAK,CAAC,MAAM,CAAC,4BAA4B,EAAE,YAAI,CAAC,CAAC"}
@@ -0,0 +1,133 @@
1
+ /**
2
+ * @since 1.0.0
3
+ */
4
+ import { type BatchGetSecretValueCommandInput, type BatchGetSecretValueCommandOutput, type CancelRotateSecretCommandInput, type CancelRotateSecretCommandOutput, type CreateSecretCommandInput, type CreateSecretCommandOutput, type DeleteResourcePolicyCommandInput, type DeleteResourcePolicyCommandOutput, type DeleteSecretCommandInput, type DeleteSecretCommandOutput, type DescribeSecretCommandInput, type DescribeSecretCommandOutput, type GetRandomPasswordCommandInput, type GetRandomPasswordCommandOutput, type GetResourcePolicyCommandInput, type GetResourcePolicyCommandOutput, type GetSecretValueCommandInput, type GetSecretValueCommandOutput, type ListSecretsCommandInput, type ListSecretsCommandOutput, type ListSecretVersionIdsCommandInput, type ListSecretVersionIdsCommandOutput, type PutResourcePolicyCommandInput, type PutResourcePolicyCommandOutput, type PutSecretValueCommandInput, type PutSecretValueCommandOutput, type RemoveRegionsFromReplicationCommandInput, type RemoveRegionsFromReplicationCommandOutput, type ReplicateSecretToRegionsCommandInput, type ReplicateSecretToRegionsCommandOutput, type RestoreSecretCommandInput, type RestoreSecretCommandOutput, type RotateSecretCommandInput, type RotateSecretCommandOutput, type SecretsManagerClient, type SecretsManagerClientConfig, type StopReplicationToReplicaCommandInput, type StopReplicationToReplicaCommandOutput, type TagResourceCommandInput, type TagResourceCommandOutput, type UntagResourceCommandInput, type UntagResourceCommandOutput, type UpdateSecretCommandInput, type UpdateSecretCommandOutput, type UpdateSecretVersionStageCommandInput, type UpdateSecretVersionStageCommandOutput, type ValidateResourcePolicyCommandInput, type ValidateResourcePolicyCommandOutput } from "@aws-sdk/client-secrets-manager";
5
+ import type { HttpHandlerOptions, SdkError, ServiceLogger } from "@effect-aws/commons";
6
+ import { Effect, Layer } from "effect";
7
+ import type { DecryptionError, EncryptionError, InternalServiceError, InvalidNextTokenError, InvalidParameterError, InvalidRequestError, LimitExceededError, MalformedPolicyDocumentError, PreconditionNotMetError, PublicPolicyError, ResourceExistsError, ResourceNotFoundError } from "./Errors.js";
8
+ import * as Instance from "./SecretsManagerClientInstance.js";
9
+ interface SecretsManagerService$ {
10
+ readonly _: unique symbol;
11
+ /**
12
+ * @see {@link BatchGetSecretValueCommand}
13
+ */
14
+ batchGetSecretValue(args: BatchGetSecretValueCommandInput, options?: HttpHandlerOptions): Effect.Effect<BatchGetSecretValueCommandOutput, SdkError | DecryptionError | InternalServiceError | InvalidNextTokenError | InvalidParameterError | InvalidRequestError | ResourceNotFoundError>;
15
+ /**
16
+ * @see {@link CancelRotateSecretCommand}
17
+ */
18
+ cancelRotateSecret(args: CancelRotateSecretCommandInput, options?: HttpHandlerOptions): Effect.Effect<CancelRotateSecretCommandOutput, SdkError | InternalServiceError | InvalidParameterError | InvalidRequestError | ResourceNotFoundError>;
19
+ /**
20
+ * @see {@link CreateSecretCommand}
21
+ */
22
+ createSecret(args: CreateSecretCommandInput, options?: HttpHandlerOptions): Effect.Effect<CreateSecretCommandOutput, SdkError | DecryptionError | EncryptionError | InternalServiceError | InvalidParameterError | InvalidRequestError | LimitExceededError | MalformedPolicyDocumentError | PreconditionNotMetError | ResourceExistsError | ResourceNotFoundError>;
23
+ /**
24
+ * @see {@link DeleteResourcePolicyCommand}
25
+ */
26
+ deleteResourcePolicy(args: DeleteResourcePolicyCommandInput, options?: HttpHandlerOptions): Effect.Effect<DeleteResourcePolicyCommandOutput, SdkError | InternalServiceError | InvalidParameterError | InvalidRequestError | ResourceNotFoundError>;
27
+ /**
28
+ * @see {@link DeleteSecretCommand}
29
+ */
30
+ deleteSecret(args: DeleteSecretCommandInput, options?: HttpHandlerOptions): Effect.Effect<DeleteSecretCommandOutput, SdkError | InternalServiceError | InvalidParameterError | InvalidRequestError | ResourceNotFoundError>;
31
+ /**
32
+ * @see {@link DescribeSecretCommand}
33
+ */
34
+ describeSecret(args: DescribeSecretCommandInput, options?: HttpHandlerOptions): Effect.Effect<DescribeSecretCommandOutput, SdkError | InternalServiceError | InvalidParameterError | ResourceNotFoundError>;
35
+ /**
36
+ * @see {@link GetRandomPasswordCommand}
37
+ */
38
+ getRandomPassword(args: GetRandomPasswordCommandInput, options?: HttpHandlerOptions): Effect.Effect<GetRandomPasswordCommandOutput, SdkError | InternalServiceError | InvalidParameterError | InvalidRequestError>;
39
+ /**
40
+ * @see {@link GetResourcePolicyCommand}
41
+ */
42
+ getResourcePolicy(args: GetResourcePolicyCommandInput, options?: HttpHandlerOptions): Effect.Effect<GetResourcePolicyCommandOutput, SdkError | InternalServiceError | InvalidParameterError | InvalidRequestError | ResourceNotFoundError>;
43
+ /**
44
+ * @see {@link GetSecretValueCommand}
45
+ */
46
+ getSecretValue(args: GetSecretValueCommandInput, options?: HttpHandlerOptions): Effect.Effect<GetSecretValueCommandOutput, SdkError | DecryptionError | InternalServiceError | InvalidParameterError | InvalidRequestError | ResourceNotFoundError>;
47
+ /**
48
+ * @see {@link ListSecretVersionIdsCommand}
49
+ */
50
+ listSecretVersionIds(args: ListSecretVersionIdsCommandInput, options?: HttpHandlerOptions): Effect.Effect<ListSecretVersionIdsCommandOutput, SdkError | InternalServiceError | InvalidNextTokenError | InvalidParameterError | ResourceNotFoundError>;
51
+ /**
52
+ * @see {@link ListSecretsCommand}
53
+ */
54
+ listSecrets(args: ListSecretsCommandInput, options?: HttpHandlerOptions): Effect.Effect<ListSecretsCommandOutput, SdkError | InternalServiceError | InvalidNextTokenError | InvalidParameterError | InvalidRequestError>;
55
+ /**
56
+ * @see {@link PutResourcePolicyCommand}
57
+ */
58
+ putResourcePolicy(args: PutResourcePolicyCommandInput, options?: HttpHandlerOptions): Effect.Effect<PutResourcePolicyCommandOutput, SdkError | InternalServiceError | InvalidParameterError | InvalidRequestError | MalformedPolicyDocumentError | PublicPolicyError | ResourceNotFoundError>;
59
+ /**
60
+ * @see {@link PutSecretValueCommand}
61
+ */
62
+ putSecretValue(args: PutSecretValueCommandInput, options?: HttpHandlerOptions): Effect.Effect<PutSecretValueCommandOutput, SdkError | DecryptionError | EncryptionError | InternalServiceError | InvalidParameterError | InvalidRequestError | LimitExceededError | ResourceExistsError | ResourceNotFoundError>;
63
+ /**
64
+ * @see {@link RemoveRegionsFromReplicationCommand}
65
+ */
66
+ removeRegionsFromReplication(args: RemoveRegionsFromReplicationCommandInput, options?: HttpHandlerOptions): Effect.Effect<RemoveRegionsFromReplicationCommandOutput, SdkError | InternalServiceError | InvalidParameterError | InvalidRequestError | ResourceNotFoundError>;
67
+ /**
68
+ * @see {@link ReplicateSecretToRegionsCommand}
69
+ */
70
+ replicateSecretToRegions(args: ReplicateSecretToRegionsCommandInput, options?: HttpHandlerOptions): Effect.Effect<ReplicateSecretToRegionsCommandOutput, SdkError | InternalServiceError | InvalidParameterError | InvalidRequestError | ResourceNotFoundError>;
71
+ /**
72
+ * @see {@link RestoreSecretCommand}
73
+ */
74
+ restoreSecret(args: RestoreSecretCommandInput, options?: HttpHandlerOptions): Effect.Effect<RestoreSecretCommandOutput, SdkError | InternalServiceError | InvalidParameterError | InvalidRequestError | ResourceNotFoundError>;
75
+ /**
76
+ * @see {@link RotateSecretCommand}
77
+ */
78
+ rotateSecret(args: RotateSecretCommandInput, options?: HttpHandlerOptions): Effect.Effect<RotateSecretCommandOutput, SdkError | InternalServiceError | InvalidParameterError | InvalidRequestError | ResourceNotFoundError>;
79
+ /**
80
+ * @see {@link StopReplicationToReplicaCommand}
81
+ */
82
+ stopReplicationToReplica(args: StopReplicationToReplicaCommandInput, options?: HttpHandlerOptions): Effect.Effect<StopReplicationToReplicaCommandOutput, SdkError | InternalServiceError | InvalidParameterError | InvalidRequestError | ResourceNotFoundError>;
83
+ /**
84
+ * @see {@link TagResourceCommand}
85
+ */
86
+ tagResource(args: TagResourceCommandInput, options?: HttpHandlerOptions): Effect.Effect<TagResourceCommandOutput, SdkError | InternalServiceError | InvalidParameterError | InvalidRequestError | ResourceNotFoundError>;
87
+ /**
88
+ * @see {@link UntagResourceCommand}
89
+ */
90
+ untagResource(args: UntagResourceCommandInput, options?: HttpHandlerOptions): Effect.Effect<UntagResourceCommandOutput, SdkError | InternalServiceError | InvalidParameterError | InvalidRequestError | ResourceNotFoundError>;
91
+ /**
92
+ * @see {@link UpdateSecretCommand}
93
+ */
94
+ updateSecret(args: UpdateSecretCommandInput, options?: HttpHandlerOptions): Effect.Effect<UpdateSecretCommandOutput, SdkError | DecryptionError | EncryptionError | InternalServiceError | InvalidParameterError | InvalidRequestError | LimitExceededError | MalformedPolicyDocumentError | PreconditionNotMetError | ResourceExistsError | ResourceNotFoundError>;
95
+ /**
96
+ * @see {@link UpdateSecretVersionStageCommand}
97
+ */
98
+ updateSecretVersionStage(args: UpdateSecretVersionStageCommandInput, options?: HttpHandlerOptions): Effect.Effect<UpdateSecretVersionStageCommandOutput, SdkError | InternalServiceError | InvalidParameterError | InvalidRequestError | LimitExceededError | ResourceNotFoundError>;
99
+ /**
100
+ * @see {@link ValidateResourcePolicyCommand}
101
+ */
102
+ validateResourcePolicy(args: ValidateResourcePolicyCommandInput, options?: HttpHandlerOptions): Effect.Effect<ValidateResourcePolicyCommandOutput, SdkError | InternalServiceError | InvalidParameterError | InvalidRequestError | MalformedPolicyDocumentError | ResourceNotFoundError>;
103
+ }
104
+ /**
105
+ * @since 1.0.0
106
+ * @category constructors
107
+ */
108
+ export declare const makeSecretsManagerService: Effect.Effect<SecretsManagerService$, never, Instance.SecretsManagerClientInstance>;
109
+ declare const SecretsManagerService_base: import("effect/Context").TagClass<SecretsManagerService, "@effect-aws/client-secrets-manager/SecretsManagerService", SecretsManagerService$> & Effect.Tag.Proxy<SecretsManagerService, SecretsManagerService$> & {
110
+ use: <X>(body: (_: SecretsManagerService$) => X) => [X] extends [Effect.Effect<infer A, infer E, infer R>] ? Effect.Effect<A, E, SecretsManagerService | R> : [X] extends [PromiseLike<infer A_1>] ? Effect.Effect<A_1, import("effect/Cause").UnknownException, SecretsManagerService> : Effect.Effect<X, never, SecretsManagerService>;
111
+ };
112
+ /**
113
+ * @since 1.0.0
114
+ * @category models
115
+ */
116
+ export declare class SecretsManagerService extends SecretsManagerService_base {
117
+ static readonly defaultLayer: Layer.Layer<SecretsManagerService, never, never>;
118
+ static readonly layer: (config: SecretsManagerService.Config) => Layer.Layer<SecretsManagerService, never, never>;
119
+ static readonly baseLayer: (evaluate: (defaultConfig: SecretsManagerClientConfig) => SecretsManagerClient) => Layer.Layer<SecretsManagerService, never, never>;
120
+ }
121
+ /**
122
+ * @since 1.0.0
123
+ */
124
+ export declare namespace SecretsManagerService {
125
+ /**
126
+ * @since 1.0.0
127
+ */
128
+ interface Config extends Omit<SecretsManagerClientConfig, "logger"> {
129
+ readonly logger?: ServiceLogger.ServiceLoggerConstructorProps | true;
130
+ }
131
+ }
132
+ export {};
133
+ //# sourceMappingURL=SecretsManagerService.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"SecretsManagerService.d.ts","sourceRoot":"","sources":["../../src/SecretsManagerService.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAEL,KAAK,+BAA+B,EACpC,KAAK,gCAAgC,EAErC,KAAK,8BAA8B,EACnC,KAAK,+BAA+B,EAEpC,KAAK,wBAAwB,EAC7B,KAAK,yBAAyB,EAE9B,KAAK,gCAAgC,EACrC,KAAK,iCAAiC,EAEtC,KAAK,wBAAwB,EAC7B,KAAK,yBAAyB,EAE9B,KAAK,0BAA0B,EAC/B,KAAK,2BAA2B,EAEhC,KAAK,6BAA6B,EAClC,KAAK,8BAA8B,EAEnC,KAAK,6BAA6B,EAClC,KAAK,8BAA8B,EAEnC,KAAK,0BAA0B,EAC/B,KAAK,2BAA2B,EAEhC,KAAK,uBAAuB,EAC5B,KAAK,wBAAwB,EAE7B,KAAK,gCAAgC,EACrC,KAAK,iCAAiC,EAEtC,KAAK,6BAA6B,EAClC,KAAK,8BAA8B,EAEnC,KAAK,0BAA0B,EAC/B,KAAK,2BAA2B,EAEhC,KAAK,wCAAwC,EAC7C,KAAK,yCAAyC,EAE9C,KAAK,oCAAoC,EACzC,KAAK,qCAAqC,EAE1C,KAAK,yBAAyB,EAC9B,KAAK,0BAA0B,EAE/B,KAAK,wBAAwB,EAC7B,KAAK,yBAAyB,EAC9B,KAAK,oBAAoB,EACzB,KAAK,0BAA0B,EAE/B,KAAK,oCAAoC,EACzC,KAAK,qCAAqC,EAE1C,KAAK,uBAAuB,EAC5B,KAAK,wBAAwB,EAE7B,KAAK,yBAAyB,EAC9B,KAAK,0BAA0B,EAE/B,KAAK,wBAAwB,EAC7B,KAAK,yBAAyB,EAE9B,KAAK,oCAAoC,EACzC,KAAK,qCAAqC,EAE1C,KAAK,kCAAkC,EACvC,KAAK,mCAAmC,EACzC,MAAM,iCAAiC,CAAC;AACzC,OAAO,KAAK,EAAE,kBAAkB,EAAE,QAAQ,EAAE,aAAa,EAAE,MAAM,qBAAqB,CAAC;AAEvF,OAAO,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,QAAQ,CAAC;AACvC,OAAO,KAAK,EACV,eAAe,EACf,eAAe,EACf,oBAAoB,EACpB,qBAAqB,EACrB,qBAAqB,EACrB,mBAAmB,EACnB,kBAAkB,EAClB,4BAA4B,EAC5B,uBAAuB,EACvB,iBAAiB,EACjB,mBAAmB,EACnB,qBAAqB,EACtB,MAAM,aAAa,CAAC;AAErB,OAAO,KAAK,QAAQ,MAAM,mCAAmC,CAAC;AA6B9D,UAAU,sBAAsB;IAC9B,QAAQ,CAAC,CAAC,EAAE,OAAO,MAAM,CAAC;IAE1B;;OAEG;IACH,mBAAmB,CACjB,IAAI,EAAE,+BAA+B,EACrC,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,gCAAgC,EAC9B,QAAQ,GACR,eAAe,GACf,oBAAoB,GACpB,qBAAqB,GACrB,qBAAqB,GACrB,mBAAmB,GACnB,qBAAqB,CACxB,CAAC;IAEF;;OAEG;IACH,kBAAkB,CAChB,IAAI,EAAE,8BAA8B,EACpC,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,+BAA+B,EAC/B,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,mBAAmB,GAAG,qBAAqB,CACtG,CAAC;IAEF;;OAEG;IACH,YAAY,CACV,IAAI,EAAE,wBAAwB,EAC9B,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,yBAAyB,EACvB,QAAQ,GACR,eAAe,GACf,eAAe,GACf,oBAAoB,GACpB,qBAAqB,GACrB,mBAAmB,GACnB,kBAAkB,GAClB,4BAA4B,GAC5B,uBAAuB,GACvB,mBAAmB,GACnB,qBAAqB,CACxB,CAAC;IAEF;;OAEG;IACH,oBAAoB,CAClB,IAAI,EAAE,gCAAgC,EACtC,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,iCAAiC,EACjC,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,mBAAmB,GAAG,qBAAqB,CACtG,CAAC;IAEF;;OAEG;IACH,YAAY,CACV,IAAI,EAAE,wBAAwB,EAC9B,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,yBAAyB,EACzB,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,mBAAmB,GAAG,qBAAqB,CACtG,CAAC;IAEF;;OAEG;IACH,cAAc,CACZ,IAAI,EAAE,0BAA0B,EAChC,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,2BAA2B,EAC3B,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,qBAAqB,CAChF,CAAC;IAEF;;OAEG;IACH,iBAAiB,CACf,IAAI,EAAE,6BAA6B,EACnC,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,8BAA8B,EAC9B,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,mBAAmB,CAC9E,CAAC;IAEF;;OAEG;IACH,iBAAiB,CACf,IAAI,EAAE,6BAA6B,EACnC,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,8BAA8B,EAC9B,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,mBAAmB,GAAG,qBAAqB,CACtG,CAAC;IAEF;;OAEG;IACH,cAAc,CACZ,IAAI,EAAE,0BAA0B,EAChC,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,2BAA2B,EACzB,QAAQ,GACR,eAAe,GACf,oBAAoB,GACpB,qBAAqB,GACrB,mBAAmB,GACnB,qBAAqB,CACxB,CAAC;IAEF;;OAEG;IACH,oBAAoB,CAClB,IAAI,EAAE,gCAAgC,EACtC,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,iCAAiC,EACjC,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,qBAAqB,GAAG,qBAAqB,CACxG,CAAC;IAEF;;OAEG;IACH,WAAW,CACT,IAAI,EAAE,uBAAuB,EAC7B,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,wBAAwB,EACxB,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,qBAAqB,GAAG,mBAAmB,CACtG,CAAC;IAEF;;OAEG;IACH,iBAAiB,CACf,IAAI,EAAE,6BAA6B,EACnC,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,8BAA8B,EAC5B,QAAQ,GACR,oBAAoB,GACpB,qBAAqB,GACrB,mBAAmB,GACnB,4BAA4B,GAC5B,iBAAiB,GACjB,qBAAqB,CACxB,CAAC;IAEF;;OAEG;IACH,cAAc,CACZ,IAAI,EAAE,0BAA0B,EAChC,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,2BAA2B,EACzB,QAAQ,GACR,eAAe,GACf,eAAe,GACf,oBAAoB,GACpB,qBAAqB,GACrB,mBAAmB,GACnB,kBAAkB,GAClB,mBAAmB,GACnB,qBAAqB,CACxB,CAAC;IAEF;;OAEG;IACH,4BAA4B,CAC1B,IAAI,EAAE,wCAAwC,EAC9C,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,yCAAyC,EACzC,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,mBAAmB,GAAG,qBAAqB,CACtG,CAAC;IAEF;;OAEG;IACH,wBAAwB,CACtB,IAAI,EAAE,oCAAoC,EAC1C,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,qCAAqC,EACrC,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,mBAAmB,GAAG,qBAAqB,CACtG,CAAC;IAEF;;OAEG;IACH,aAAa,CACX,IAAI,EAAE,yBAAyB,EAC/B,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,0BAA0B,EAC1B,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,mBAAmB,GAAG,qBAAqB,CACtG,CAAC;IAEF;;OAEG;IACH,YAAY,CACV,IAAI,EAAE,wBAAwB,EAC9B,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,yBAAyB,EACzB,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,mBAAmB,GAAG,qBAAqB,CACtG,CAAC;IAEF;;OAEG;IACH,wBAAwB,CACtB,IAAI,EAAE,oCAAoC,EAC1C,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,qCAAqC,EACrC,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,mBAAmB,GAAG,qBAAqB,CACtG,CAAC;IAEF;;OAEG;IACH,WAAW,CACT,IAAI,EAAE,uBAAuB,EAC7B,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,wBAAwB,EACxB,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,mBAAmB,GAAG,qBAAqB,CACtG,CAAC;IAEF;;OAEG;IACH,aAAa,CACX,IAAI,EAAE,yBAAyB,EAC/B,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,0BAA0B,EAC1B,QAAQ,GAAG,oBAAoB,GAAG,qBAAqB,GAAG,mBAAmB,GAAG,qBAAqB,CACtG,CAAC;IAEF;;OAEG;IACH,YAAY,CACV,IAAI,EAAE,wBAAwB,EAC9B,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,yBAAyB,EACvB,QAAQ,GACR,eAAe,GACf,eAAe,GACf,oBAAoB,GACpB,qBAAqB,GACrB,mBAAmB,GACnB,kBAAkB,GAClB,4BAA4B,GAC5B,uBAAuB,GACvB,mBAAmB,GACnB,qBAAqB,CACxB,CAAC;IAEF;;OAEG;IACH,wBAAwB,CACtB,IAAI,EAAE,oCAAoC,EAC1C,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,qCAAqC,EACnC,QAAQ,GACR,oBAAoB,GACpB,qBAAqB,GACrB,mBAAmB,GACnB,kBAAkB,GAClB,qBAAqB,CACxB,CAAC;IAEF;;OAEG;IACH,sBAAsB,CACpB,IAAI,EAAE,kCAAkC,EACxC,OAAO,CAAC,EAAE,kBAAkB,GAC3B,MAAM,CAAC,MAAM,CACd,mCAAmC,EACjC,QAAQ,GACR,oBAAoB,GACpB,qBAAqB,GACrB,mBAAmB,GACnB,4BAA4B,GAC5B,qBAAqB,CACxB,CAAC;CACH;AAED;;;GAGG;AACH,eAAO,MAAM,yBAAyB,qFAWpC,CAAC;;;;AAEH;;;GAGG;AACH,qBAAa,qBAAsB,SAAQ,0BAGxC;IACD,MAAM,CAAC,QAAQ,CAAC,YAAY,mDAAqF;IACjH,MAAM,CAAC,QAAQ,CAAC,KAAK,WAAY,sBAAsB,MAAM,sDAIzD;IACJ,MAAM,CAAC,QAAQ,CAAC,SAAS,aACb,CAAC,aAAa,EAAE,0BAA0B,KAAK,oBAAoB,sDAS3E;CACL;AAED;;GAEG;AACH,MAAM,CAAC,OAAO,WAAW,qBAAqB,CAAC;IAC7C;;OAEG;IACH,UAAiB,MAAO,SAAQ,IAAI,CAAC,0BAA0B,EAAE,QAAQ,CAAC;QACxE,QAAQ,CAAC,MAAM,CAAC,EAAE,aAAa,CAAC,6BAA6B,GAAG,IAAI,CAAC;KACtE;CACF"}
@@ -0,0 +1,82 @@
1
+ "use strict";
2
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
+ if (k2 === undefined) k2 = k;
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
9
+ }) : (function(o, m, k, k2) {
10
+ if (k2 === undefined) k2 = k;
11
+ o[k2] = m[k];
12
+ }));
13
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
15
+ }) : function(o, v) {
16
+ o["default"] = v;
17
+ });
18
+ var __importStar = (this && this.__importStar) || function (mod) {
19
+ if (mod && mod.__esModule) return mod;
20
+ var result = {};
21
+ if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
22
+ __setModuleDefault(result, mod);
23
+ return result;
24
+ };
25
+ Object.defineProperty(exports, "__esModule", { value: true });
26
+ exports.SecretsManagerService = exports.makeSecretsManagerService = void 0;
27
+ /**
28
+ * @since 1.0.0
29
+ */
30
+ const client_secrets_manager_1 = require("@aws-sdk/client-secrets-manager");
31
+ const commons_1 = require("@effect-aws/commons");
32
+ const effect_1 = require("effect");
33
+ const Errors_js_1 = require("./Errors.js");
34
+ const Instance = __importStar(require("./SecretsManagerClientInstance.js"));
35
+ const SecretsManagerServiceConfig = __importStar(require("./SecretsManagerServiceConfig.js"));
36
+ const commands = {
37
+ BatchGetSecretValueCommand: client_secrets_manager_1.BatchGetSecretValueCommand,
38
+ CancelRotateSecretCommand: client_secrets_manager_1.CancelRotateSecretCommand,
39
+ CreateSecretCommand: client_secrets_manager_1.CreateSecretCommand,
40
+ DeleteResourcePolicyCommand: client_secrets_manager_1.DeleteResourcePolicyCommand,
41
+ DeleteSecretCommand: client_secrets_manager_1.DeleteSecretCommand,
42
+ DescribeSecretCommand: client_secrets_manager_1.DescribeSecretCommand,
43
+ GetRandomPasswordCommand: client_secrets_manager_1.GetRandomPasswordCommand,
44
+ GetResourcePolicyCommand: client_secrets_manager_1.GetResourcePolicyCommand,
45
+ GetSecretValueCommand: client_secrets_manager_1.GetSecretValueCommand,
46
+ ListSecretVersionIdsCommand: client_secrets_manager_1.ListSecretVersionIdsCommand,
47
+ ListSecretsCommand: client_secrets_manager_1.ListSecretsCommand,
48
+ PutResourcePolicyCommand: client_secrets_manager_1.PutResourcePolicyCommand,
49
+ PutSecretValueCommand: client_secrets_manager_1.PutSecretValueCommand,
50
+ RemoveRegionsFromReplicationCommand: client_secrets_manager_1.RemoveRegionsFromReplicationCommand,
51
+ ReplicateSecretToRegionsCommand: client_secrets_manager_1.ReplicateSecretToRegionsCommand,
52
+ RestoreSecretCommand: client_secrets_manager_1.RestoreSecretCommand,
53
+ RotateSecretCommand: client_secrets_manager_1.RotateSecretCommand,
54
+ StopReplicationToReplicaCommand: client_secrets_manager_1.StopReplicationToReplicaCommand,
55
+ TagResourceCommand: client_secrets_manager_1.TagResourceCommand,
56
+ UntagResourceCommand: client_secrets_manager_1.UntagResourceCommand,
57
+ UpdateSecretCommand: client_secrets_manager_1.UpdateSecretCommand,
58
+ UpdateSecretVersionStageCommand: client_secrets_manager_1.UpdateSecretVersionStageCommand,
59
+ ValidateResourcePolicyCommand: client_secrets_manager_1.ValidateResourcePolicyCommand,
60
+ };
61
+ /**
62
+ * @since 1.0.0
63
+ * @category constructors
64
+ */
65
+ exports.makeSecretsManagerService = effect_1.Effect.gen(function* () {
66
+ const client = yield* Instance.SecretsManagerClientInstance;
67
+ return commons_1.Service.fromClientAndCommands(client, commands, {
68
+ errorTags: Errors_js_1.AllServiceErrors,
69
+ resolveClientConfig: SecretsManagerServiceConfig.toSecretsManagerClientConfig,
70
+ });
71
+ });
72
+ /**
73
+ * @since 1.0.0
74
+ * @category models
75
+ */
76
+ class SecretsManagerService extends effect_1.Effect.Tag("@effect-aws/client-secrets-manager/SecretsManagerService")() {
77
+ static defaultLayer = effect_1.Layer.effect(this, exports.makeSecretsManagerService).pipe(effect_1.Layer.provide(Instance.layer));
78
+ static layer = (config) => effect_1.Layer.effect(this, exports.makeSecretsManagerService).pipe(effect_1.Layer.provide(Instance.layer), effect_1.Layer.provide(SecretsManagerServiceConfig.setSecretsManagerServiceConfig(config)));
79
+ static baseLayer = (evaluate) => effect_1.Layer.effect(this, exports.makeSecretsManagerService).pipe(effect_1.Layer.provide(effect_1.Layer.effect(Instance.SecretsManagerClientInstance, effect_1.Effect.map(SecretsManagerServiceConfig.toSecretsManagerClientConfig, evaluate))));
80
+ }
81
+ exports.SecretsManagerService = SecretsManagerService;
82
+ //# sourceMappingURL=SecretsManagerService.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"SecretsManagerService.js","sourceRoot":"","sources":["../../src/SecretsManagerService.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;AAAA;;GAEG;AACH,4EAwEyC;AAEzC,iDAA8C;AAC9C,mCAAuC;AAevC,2CAA+C;AAC/C,4EAA8D;AAC9D,8FAAgF;AAEhF,MAAM,QAAQ,GAAG;IACf,0BAA0B,EAA1B,mDAA0B;IAC1B,yBAAyB,EAAzB,kDAAyB;IACzB,mBAAmB,EAAnB,4CAAmB;IACnB,2BAA2B,EAA3B,oDAA2B;IAC3B,mBAAmB,EAAnB,4CAAmB;IACnB,qBAAqB,EAArB,8CAAqB;IACrB,wBAAwB,EAAxB,iDAAwB;IACxB,wBAAwB,EAAxB,iDAAwB;IACxB,qBAAqB,EAArB,8CAAqB;IACrB,2BAA2B,EAA3B,oDAA2B;IAC3B,kBAAkB,EAAlB,2CAAkB;IAClB,wBAAwB,EAAxB,iDAAwB;IACxB,qBAAqB,EAArB,8CAAqB;IACrB,mCAAmC,EAAnC,4DAAmC;IACnC,+BAA+B,EAA/B,wDAA+B;IAC/B,oBAAoB,EAApB,6CAAoB;IACpB,mBAAmB,EAAnB,4CAAmB;IACnB,+BAA+B,EAA/B,wDAA+B;IAC/B,kBAAkB,EAAlB,2CAAkB;IAClB,oBAAoB,EAApB,6CAAoB;IACpB,mBAAmB,EAAnB,4CAAmB;IACnB,+BAA+B,EAA/B,wDAA+B;IAC/B,6BAA6B,EAA7B,sDAA6B;CAC9B,CAAC;AA0TF;;;GAGG;AACU,QAAA,yBAAyB,GAAG,eAAM,CAAC,GAAG,CAAC,QAAQ,CAAC;IAC3D,MAAM,MAAM,GAAG,KAAK,CAAC,CAAC,QAAQ,CAAC,4BAA4B,CAAC;IAE5D,OAAO,iBAAO,CAAC,qBAAqB,CAClC,MAAM,EACN,QAAQ,EACR;QACE,SAAS,EAAE,4BAAgB;QAC3B,mBAAmB,EAAE,2BAA2B,CAAC,4BAA4B;KAC9E,CACF,CAAC;AACJ,CAAC,CAAC,CAAC;AAEH;;;GAGG;AACH,MAAa,qBAAsB,SAAQ,eAAM,CAAC,GAAG,CAAC,0DAA0D,CAAC,EAG9G;IACD,MAAM,CAAU,YAAY,GAAG,cAAK,CAAC,MAAM,CAAC,IAAI,EAAE,iCAAyB,CAAC,CAAC,IAAI,CAAC,cAAK,CAAC,OAAO,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC,CAAC;IACjH,MAAM,CAAU,KAAK,GAAG,CAAC,MAAoC,EAAE,EAAE,CAC/D,cAAK,CAAC,MAAM,CAAC,IAAI,EAAE,iCAAyB,CAAC,CAAC,IAAI,CAChD,cAAK,CAAC,OAAO,CAAC,QAAQ,CAAC,KAAK,CAAC,EAC7B,cAAK,CAAC,OAAO,CAAC,2BAA2B,CAAC,8BAA8B,CAAC,MAAM,CAAC,CAAC,CAClF,CAAC;IACJ,MAAM,CAAU,SAAS,GAAG,CAC1B,QAA6E,EAC7E,EAAE,CACF,cAAK,CAAC,MAAM,CAAC,IAAI,EAAE,iCAAyB,CAAC,CAAC,IAAI,CAChD,cAAK,CAAC,OAAO,CACX,cAAK,CAAC,MAAM,CACV,QAAQ,CAAC,4BAA4B,EACrC,eAAM,CAAC,GAAG,CAAC,2BAA2B,CAAC,4BAA4B,EAAE,QAAQ,CAAC,CAC/E,CACF,CACF,CAAC;;AApBN,sDAqBC"}
@@ -0,0 +1,25 @@
1
+ /**
2
+ * @since 1.0.0
3
+ */
4
+ import type { SecretsManagerClientConfig } from "@aws-sdk/client-secrets-manager";
5
+ import { Effect, Layer } from "effect";
6
+ import type { SecretsManagerService } from "./SecretsManagerService.js";
7
+ /**
8
+ * @since 1.0.0
9
+ * @category secrets-manager service config
10
+ */
11
+ export declare const withSecretsManagerServiceConfig: {
12
+ (config: SecretsManagerService.Config): <A, E, R>(effect: Effect.Effect<A, E, R>) => Effect.Effect<A, E, R>;
13
+ <A, E, R>(effect: Effect.Effect<A, E, R>, config: SecretsManagerService.Config): Effect.Effect<A, E, R>;
14
+ };
15
+ /**
16
+ * @since 1.0.0
17
+ * @category secrets-manager service config
18
+ */
19
+ export declare const setSecretsManagerServiceConfig: (config: SecretsManagerService.Config) => Layer.Layer<never, never, never>;
20
+ /**
21
+ * @since 1.0.0
22
+ * @category adapters
23
+ */
24
+ export declare const toSecretsManagerClientConfig: Effect.Effect<SecretsManagerClientConfig>;
25
+ //# sourceMappingURL=SecretsManagerServiceConfig.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"SecretsManagerServiceConfig.d.ts","sourceRoot":"","sources":["../../src/SecretsManagerServiceConfig.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,KAAK,EAAE,0BAA0B,EAAE,MAAM,iCAAiC,CAAC;AAElF,OAAO,EAAE,MAAM,EAAY,KAAK,EAAE,MAAM,QAAQ,CAAC;AAGjD,OAAO,KAAK,EAAE,qBAAqB,EAAE,MAAM,4BAA4B,CAAC;AAWxE;;;GAGG;AACH,eAAO,MAAM,+BAA+B,EAAE;IAC5C,CAAC,MAAM,EAAE,qBAAqB,CAAC,MAAM,GAAG,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,MAAM,EAAE,MAAM,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,KAAK,MAAM,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC;IAC5G,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,MAAM,EAAE,MAAM,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,EAAE,MAAM,EAAE,qBAAqB,CAAC,MAAM,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC;CAKzG,CAAC;AAEF;;;GAGG;AACH,eAAO,MAAM,8BAA8B,WAAY,sBAAsB,MAAM,qCAClB,CAAC;AAElE;;;GAGG;AACH,eAAO,MAAM,4BAA4B,EAAE,MAAM,CAAC,MAAM,CAAC,0BAA0B,CAQjF,CAAC"}
@@ -0,0 +1,35 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.toSecretsManagerClientConfig = exports.setSecretsManagerServiceConfig = exports.withSecretsManagerServiceConfig = void 0;
4
+ const commons_1 = require("@effect-aws/commons");
5
+ const effect_1 = require("effect");
6
+ const Function_1 = require("effect/Function");
7
+ const GlobalValue_1 = require("effect/GlobalValue");
8
+ /**
9
+ * @since 1.0.0
10
+ * @category secrets-manager service config
11
+ */
12
+ const currentSecretsManagerServiceConfig = (0, GlobalValue_1.globalValue)("@effect-aws/client-secrets-manager/currentSecretsManagerServiceConfig", () => effect_1.FiberRef.unsafeMake({}));
13
+ /**
14
+ * @since 1.0.0
15
+ * @category secrets-manager service config
16
+ */
17
+ exports.withSecretsManagerServiceConfig = (0, Function_1.dual)(2, (effect, config) => effect_1.Effect.locally(effect, currentSecretsManagerServiceConfig, config));
18
+ /**
19
+ * @since 1.0.0
20
+ * @category secrets-manager service config
21
+ */
22
+ const setSecretsManagerServiceConfig = (config) => effect_1.Layer.locallyScoped(currentSecretsManagerServiceConfig, config);
23
+ exports.setSecretsManagerServiceConfig = setSecretsManagerServiceConfig;
24
+ /**
25
+ * @since 1.0.0
26
+ * @category adapters
27
+ */
28
+ exports.toSecretsManagerClientConfig = effect_1.Effect.gen(function* () {
29
+ const { logger: serviceLogger, ...config } = yield* effect_1.FiberRef.get(currentSecretsManagerServiceConfig);
30
+ const logger = serviceLogger === true
31
+ ? yield* commons_1.ServiceLogger.toClientLogger(commons_1.ServiceLogger.defaultServiceLogger)
32
+ : (serviceLogger ? yield* commons_1.ServiceLogger.toClientLogger(commons_1.ServiceLogger.make(serviceLogger)) : undefined);
33
+ return { logger, ...config };
34
+ });
35
+ //# sourceMappingURL=SecretsManagerServiceConfig.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"SecretsManagerServiceConfig.js","sourceRoot":"","sources":["../../src/SecretsManagerServiceConfig.ts"],"names":[],"mappings":";;;AAIA,iDAAoD;AACpD,mCAAiD;AACjD,8CAAuC;AACvC,oDAAiD;AAGjD;;;GAGG;AACH,MAAM,kCAAkC,GAAG,IAAA,yBAAW,EACpD,uEAAuE,EACvE,GAAG,EAAE,CAAC,iBAAQ,CAAC,UAAU,CAA+B,EAAE,CAAC,CAC5D,CAAC;AAEF;;;GAGG;AACU,QAAA,+BAA+B,GAGxC,IAAA,eAAI,EACN,CAAC,EACD,CAAU,MAA8B,EAAE,MAAoC,EAA0B,EAAE,CACxG,eAAM,CAAC,OAAO,CAAC,MAAM,EAAE,kCAAkC,EAAE,MAAM,CAAC,CACrE,CAAC;AAEF;;;GAGG;AACI,MAAM,8BAA8B,GAAG,CAAC,MAAoC,EAAE,EAAE,CACrF,cAAK,CAAC,aAAa,CAAC,kCAAkC,EAAE,MAAM,CAAC,CAAC;AADrD,QAAA,8BAA8B,kCACuB;AAElE;;;GAGG;AACU,QAAA,4BAA4B,GAA8C,eAAM,CAAC,GAAG,CAAC,QAAQ,CAAC;IACzG,MAAM,EAAE,MAAM,EAAE,aAAa,EAAE,GAAG,MAAM,EAAE,GAAG,KAAK,CAAC,CAAC,iBAAQ,CAAC,GAAG,CAAC,kCAAkC,CAAC,CAAC;IAErG,MAAM,MAAM,GAAG,aAAa,KAAK,IAAI;QACnC,CAAC,CAAC,KAAK,CAAC,CAAC,uBAAa,CAAC,cAAc,CAAC,uBAAa,CAAC,oBAAoB,CAAC;QACzE,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,uBAAa,CAAC,cAAc,CAAC,uBAAa,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC;IAEzG,OAAO,EAAE,MAAM,EAAE,GAAG,MAAM,EAAE,CAAC;AAC/B,CAAC,CAAC,CAAC"}
@@ -0,0 +1,39 @@
1
+ /**
2
+ * @since 1.0.0
3
+ */
4
+ import { SecretsManagerService } from "./SecretsManagerService.js";
5
+ /**
6
+ * @since 1.0.0
7
+ */
8
+ export * from "./Errors.js";
9
+ /**
10
+ * @since 1.0.0
11
+ */
12
+ export * as SecretsManagerClientInstance from "./SecretsManagerClientInstance.js";
13
+ /**
14
+ * @since 1.0.0
15
+ */
16
+ export * as SecretsManagerServiceConfig from "./SecretsManagerServiceConfig.js";
17
+ /**
18
+ * @since 1.0.0
19
+ */
20
+ export * from "./SecretsManagerService.js";
21
+ /**
22
+ * @since 1.0.0
23
+ * @category exports
24
+ * @alias SecretsManagerService
25
+ */
26
+ export declare namespace SecretsManager {
27
+ /**
28
+ * @since 1.0.0
29
+ * @alias SecretsManagerService.Config
30
+ */
31
+ type Config = SecretsManagerService.Config;
32
+ }
33
+ /**
34
+ * @since 1.0.0
35
+ * @category exports
36
+ * @alias SecretsManagerService
37
+ */
38
+ export declare const SecretsManager: typeof SecretsManagerService;
39
+ //# sourceMappingURL=index.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,qBAAqB,EAAE,MAAM,4BAA4B,CAAC;AAEnE;;GAEG;AACH,cAAc,aAAa,CAAC;AAE5B;;GAEG;AACH,OAAO,KAAK,4BAA4B,MAAM,mCAAmC,CAAC;AAElF;;GAEG;AACH,OAAO,KAAK,2BAA2B,MAAM,kCAAkC,CAAC;AAEhF;;GAEG;AACH,cAAc,4BAA4B,CAAC;AAE3C;;;;GAIG;AACH,MAAM,CAAC,OAAO,WAAW,cAAc,CAAC;IACtC;;;OAGG;IACH,KAAY,MAAM,GAAG,qBAAqB,CAAC,MAAM,CAAC;CACnD;AAED;;;;GAIG;AACH,eAAO,MAAM,cAAc,8BAAwB,CAAC"}
@@ -0,0 +1,56 @@
1
+ "use strict";
2
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
+ if (k2 === undefined) k2 = k;
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
9
+ }) : (function(o, m, k, k2) {
10
+ if (k2 === undefined) k2 = k;
11
+ o[k2] = m[k];
12
+ }));
13
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
15
+ }) : function(o, v) {
16
+ o["default"] = v;
17
+ });
18
+ var __exportStar = (this && this.__exportStar) || function(m, exports) {
19
+ for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
20
+ };
21
+ var __importStar = (this && this.__importStar) || function (mod) {
22
+ if (mod && mod.__esModule) return mod;
23
+ var result = {};
24
+ if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
25
+ __setModuleDefault(result, mod);
26
+ return result;
27
+ };
28
+ Object.defineProperty(exports, "__esModule", { value: true });
29
+ exports.SecretsManager = exports.SecretsManagerServiceConfig = exports.SecretsManagerClientInstance = void 0;
30
+ /**
31
+ * @since 1.0.0
32
+ */
33
+ const SecretsManagerService_js_1 = require("./SecretsManagerService.js");
34
+ /**
35
+ * @since 1.0.0
36
+ */
37
+ __exportStar(require("./Errors.js"), exports);
38
+ /**
39
+ * @since 1.0.0
40
+ */
41
+ exports.SecretsManagerClientInstance = __importStar(require("./SecretsManagerClientInstance.js"));
42
+ /**
43
+ * @since 1.0.0
44
+ */
45
+ exports.SecretsManagerServiceConfig = __importStar(require("./SecretsManagerServiceConfig.js"));
46
+ /**
47
+ * @since 1.0.0
48
+ */
49
+ __exportStar(require("./SecretsManagerService.js"), exports);
50
+ /**
51
+ * @since 1.0.0
52
+ * @category exports
53
+ * @alias SecretsManagerService
54
+ */
55
+ exports.SecretsManager = SecretsManagerService_js_1.SecretsManagerService;
56
+ //# sourceMappingURL=index.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA;;GAEG;AACH,yEAAmE;AAEnE;;GAEG;AACH,8CAA4B;AAE5B;;GAEG;AACH,kGAAkF;AAElF;;GAEG;AACH,gGAAgF;AAEhF;;GAEG;AACH,6DAA2C;AAe3C;;;;GAIG;AACU,QAAA,cAAc,GAAG,gDAAqB,CAAC"}
@@ -0,0 +1,19 @@
1
+ import type { DecryptionFailure, EncryptionFailure, InternalServiceError as InternalServiceException, InvalidNextTokenException, InvalidParameterException, InvalidRequestException, LimitExceededException, MalformedPolicyDocumentException, PreconditionNotMetException, PublicPolicyException, ResourceExistsException, ResourceNotFoundException } from "@aws-sdk/client-secrets-manager";
2
+ import type { TaggedException } from "@effect-aws/commons";
3
+ import { SdkError as CommonSdkError } from "@effect-aws/commons";
4
+ export declare const AllServiceErrors: readonly ["DecryptionFailure", "EncryptionFailure", "InternalServiceError", "InvalidNextTokenException", "InvalidParameterException", "InvalidRequestException", "LimitExceededException", "MalformedPolicyDocumentException", "PreconditionNotMetException", "PublicPolicyException", "ResourceExistsException", "ResourceNotFoundException"];
5
+ export type DecryptionError = TaggedException<DecryptionFailure>;
6
+ export type EncryptionError = TaggedException<EncryptionFailure>;
7
+ export type InternalServiceError = TaggedException<InternalServiceException>;
8
+ export type InvalidNextTokenError = TaggedException<InvalidNextTokenException>;
9
+ export type InvalidParameterError = TaggedException<InvalidParameterException>;
10
+ export type InvalidRequestError = TaggedException<InvalidRequestException>;
11
+ export type LimitExceededError = TaggedException<LimitExceededException>;
12
+ export type MalformedPolicyDocumentError = TaggedException<MalformedPolicyDocumentException>;
13
+ export type PreconditionNotMetError = TaggedException<PreconditionNotMetException>;
14
+ export type PublicPolicyError = TaggedException<PublicPolicyException>;
15
+ export type ResourceExistsError = TaggedException<ResourceExistsException>;
16
+ export type ResourceNotFoundError = TaggedException<ResourceNotFoundException>;
17
+ export type SdkError = CommonSdkError;
18
+ export declare const SdkError: import("effect/Data").Case.Constructor<CommonSdkError, "_tag">;
19
+ //# sourceMappingURL=Errors.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"Errors.d.ts","sourceRoot":"","sources":["../../src/Errors.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EACV,iBAAiB,EACjB,iBAAiB,EACjB,oBAAoB,IAAI,wBAAwB,EAChD,yBAAyB,EACzB,yBAAyB,EACzB,uBAAuB,EACvB,sBAAsB,EACtB,gCAAgC,EAChC,2BAA2B,EAC3B,qBAAqB,EACrB,uBAAuB,EACvB,yBAAyB,EAC1B,MAAM,iCAAiC,CAAC;AACzC,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,qBAAqB,CAAC;AAC3D,OAAO,EAAE,QAAQ,IAAI,cAAc,EAAE,MAAM,qBAAqB,CAAC;AAEjE,eAAO,MAAM,gBAAgB,gVAanB,CAAC;AAEX,MAAM,MAAM,eAAe,GAAG,eAAe,CAAC,iBAAiB,CAAC,CAAC;AACjE,MAAM,MAAM,eAAe,GAAG,eAAe,CAAC,iBAAiB,CAAC,CAAC;AACjE,MAAM,MAAM,oBAAoB,GAAG,eAAe,CAAC,wBAAwB,CAAC,CAAC;AAC7E,MAAM,MAAM,qBAAqB,GAAG,eAAe,CAAC,yBAAyB,CAAC,CAAC;AAC/E,MAAM,MAAM,qBAAqB,GAAG,eAAe,CAAC,yBAAyB,CAAC,CAAC;AAC/E,MAAM,MAAM,mBAAmB,GAAG,eAAe,CAAC,uBAAuB,CAAC,CAAC;AAC3E,MAAM,MAAM,kBAAkB,GAAG,eAAe,CAAC,sBAAsB,CAAC,CAAC;AACzE,MAAM,MAAM,4BAA4B,GAAG,eAAe,CAAC,gCAAgC,CAAC,CAAC;AAC7F,MAAM,MAAM,uBAAuB,GAAG,eAAe,CAAC,2BAA2B,CAAC,CAAC;AACnF,MAAM,MAAM,iBAAiB,GAAG,eAAe,CAAC,qBAAqB,CAAC,CAAC;AACvE,MAAM,MAAM,mBAAmB,GAAG,eAAe,CAAC,uBAAuB,CAAC,CAAC;AAC3E,MAAM,MAAM,qBAAqB,GAAG,eAAe,CAAC,yBAAyB,CAAC,CAAC;AAE/E,MAAM,MAAM,QAAQ,GAAG,cAAc,CAAC;AACtC,eAAO,MAAM,QAAQ,gEAAiB,CAAC"}