@effect-aws/secrets-manager 1.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md ADDED
@@ -0,0 +1,8 @@
1
+ # @effect-aws/secrets-manager
2
+
3
+ ## 1.0.0
4
+
5
+ ### Major Changes
6
+
7
+ - [`234a5e2`](https://github.com/floydspace/effect-aws/commit/234a5e2d76b8cf12c180ef88584956eaeb039e89) Thanks [@floydspace](https://github.com/floydspace)! - Implement `fromSecretsManager` ConfigProvider constructor, fetching configuration from AWS Secrets Manager service.
8
+ Closes [#55](https://github.com/floydspace/effect-aws/issues/55)
package/LICENSE ADDED
@@ -0,0 +1,19 @@
1
+ Copyright (c) 2024 Victor Korzunin
2
+
3
+ Permission is hereby granted, free of charge, to any person obtaining a copy
4
+ of this software and associated documentation files (the "Software"), to deal
5
+ in the Software without restriction, including without limitation the rights
6
+ to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
7
+ copies of the Software, and to permit persons to whom the Software is
8
+ furnished to do so, subject to the following conditions:
9
+
10
+ The above copyright notice and this permission notice shall be included in all
11
+ copies or substantial portions of the Software.
12
+
13
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
14
+ IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
15
+ FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
16
+ AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
17
+ LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
18
+ OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
19
+ SOFTWARE.
package/README.md ADDED
@@ -0,0 +1,66 @@
1
+ # @effect-aws/secrets-manager
2
+
3
+ This package provides a `fromSecretsManager` [ConfigProvider](https://effect.website/docs/guides/configuration) constructor function.
4
+ You can use it to read secrets from AWS Secrets Manager as a `Config` schema.
5
+
6
+ The config primitive name must match the secret Name or ARN in Secrets Manager.
7
+ For example, `Config.string("my_secret_name")` or `Config.string("arn:aws:secretsmanager:eu-central-1:123456789012:secret:my_secret_name-AbCdEf")`.
8
+
9
+ ## Installation
10
+
11
+ ```bash
12
+ npm install --save @effect-aws/secrets-manager @effect-aws/client-secrets-manager
13
+ ```
14
+
15
+ ## Usage
16
+
17
+ With default service layer:
18
+
19
+ ```typescript
20
+ import { Effect, Config, Console } from "effect";
21
+ import { fromSecretsManager } from "@effect-aws/secrets-manager";
22
+
23
+ const program = Effect.gen(function* () {
24
+ const secret: string = yield* Config.string("my_secret_name");
25
+
26
+ yield* Console.log("Secret from Secrets Manager: ", secret);
27
+ });
28
+
29
+ program.pipe(
30
+ Effect.provide(Layer.setConfigProvider(fromSecretsManager())),
31
+ Effect.runPromise,
32
+ );
33
+ ```
34
+
35
+ With custom service layer:
36
+
37
+ ```typescript
38
+ import { Effect, Config, Console, Layer } from "effect";
39
+ import { SecretsManagerClient } from "@aws-sdk/client-secrets-manager";
40
+ import {
41
+ BaseSecretsManagerServiceLayer,
42
+ SecretsManagerClientInstance,
43
+ } from "@effect-aws/client-secrets-manager";
44
+ import { fromSecretsManager } from "@effect-aws/secrets-manager";
45
+
46
+ const program = Effect.gen(function* () {
47
+ const secret: string = yield* Config.string("my_secret_name");
48
+
49
+ yield* Console.log("Secret from Secrets Manager: ", secret);
50
+ });
51
+
52
+ const SecretsManagerClientInstanceLayer = Layer.succeed(
53
+ SecretsManagerClientInstance,
54
+ new SecretsManagerClient({ region: "eu-central-1" }),
55
+ );
56
+
57
+ const serviceLayer = Layer.provide(
58
+ BaseSecretsManagerServiceLayer,
59
+ SecretsManagerClientInstanceLayer,
60
+ );
61
+
62
+ program.pipe(
63
+ Effect.provide(Layer.setConfigProvider(fromSecretsManager({ serviceLayer }))),
64
+ Effect.runPromise,
65
+ );
66
+ ```
package/docgen.json ADDED
@@ -0,0 +1,8 @@
1
+ {
2
+ "$schema": "../../node_modules/@effect/docgen/schema.json",
3
+ "exclude": [
4
+ "src/index.ts",
5
+ "src/Errors.ts"
6
+ ],
7
+ "//": "~~ Generated by projen. To modify, edit .projenrc.js and run \"npx projen\"."
8
+ }
@@ -0,0 +1,12 @@
1
+ import { SecretsManagerService } from "@effect-aws/client-secrets-manager";
2
+ import { ConfigProvider, Layer } from "effect";
3
+ /**
4
+ * A config provider that loads configuration from AWS Secrets Manager.
5
+ *
6
+ * @since 1.0.0
7
+ * @category constructors
8
+ */
9
+ export declare const fromSecretsManager: (config?: {
10
+ pathDelim?: string;
11
+ serviceLayer?: Layer.Layer<SecretsManagerService, never, never>;
12
+ }) => ConfigProvider.ConfigProvider;
@@ -0,0 +1,49 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.fromSecretsManager = void 0;
4
+ const client_secrets_manager_1 = require("@effect-aws/client-secrets-manager");
5
+ const effect_1 = require("effect");
6
+ /**
7
+ * A config provider that loads configuration from AWS Secrets Manager.
8
+ *
9
+ * @since 1.0.0
10
+ * @category constructors
11
+ */
12
+ const fromSecretsManager = (config) => {
13
+ const { pathDelim, serviceLayer } = Object.assign({}, { pathDelim: "_", serviceLayer: client_secrets_manager_1.DefaultSecretsManagerServiceLayer }, config);
14
+ const makePathString = (path) => (0, effect_1.pipe)(path, effect_1.Array.join(pathDelim));
15
+ const unmakePathString = (pathString) => pathString.split(pathDelim);
16
+ const load = (path, primitive) => {
17
+ const pathString = makePathString(path);
18
+ return client_secrets_manager_1.SecretsManagerService.getSecretValue({ SecretId: pathString }).pipe(effect_1.Effect.flatMap((value) => effect_1.Option.fromNullable(value.SecretString)), effect_1.Effect.catchTag("ResourceNotFoundException", () => effect_1.Effect.fail(effect_1.ConfigError.MissingData(path, `Expected ${pathString} to exist in AWS Secrets Manager`))), effect_1.Effect.catchTag("NoSuchElementException", () => effect_1.Effect.fail(effect_1.ConfigError.MissingData(path, `Expected ${pathString} to exist in AWS Secrets Manager`))), effect_1.Effect.catchTag("InvalidParameterException", () => effect_1.Effect.fail(effect_1.ConfigError.InvalidData(path, "Invalid parameter provided to AWS Secrets Manager"))), effect_1.Effect.catchTag("InvalidRequestException", () => effect_1.Effect.fail(effect_1.ConfigError.InvalidData(path, "Invalid request to AWS Secrets Manager"))), effect_1.Effect.catchAllCause((cause) => effect_1.Cause.isFailType(cause) && effect_1.ConfigError.isConfigError(cause.error)
19
+ ? effect_1.Effect.fail(cause.error)
20
+ : effect_1.Effect.fail(effect_1.ConfigError.SourceUnavailable(path, "Failed to load configuration from AWS Secrets Manager", cause))), effect_1.Effect.flatMap((value) => (0, effect_1.pipe)(primitive.parse(value), effect_1.Effect.mapBoth({
21
+ onFailure: effect_1.ConfigError.prefixed(path),
22
+ onSuccess: effect_1.Array.of,
23
+ }))), effect_1.Effect.provide(serviceLayer));
24
+ };
25
+ const enumerateChildren = (path) => client_secrets_manager_1.SecretsManagerService.listSecrets({}).pipe(effect_1.Effect.flatMap((secrets) => effect_1.Option.fromNullable(secrets.SecretList)), effect_1.Effect.map(effect_1.Array.map((secret) => effect_1.Option.fromNullable(secret.Name))), effect_1.Effect.flatMap(effect_1.Option.all), effect_1.Effect.orDie, effect_1.Effect.map((keys) => {
26
+ const keyPaths = keys.map(unmakePathString);
27
+ const filteredKeyPaths = keyPaths
28
+ .filter((keyPath) => {
29
+ for (let i = 0; i < path.length; i++) {
30
+ const pathComponent = (0, effect_1.pipe)(path, effect_1.Array.unsafeGet(i));
31
+ const currentElement = keyPath[i];
32
+ if (currentElement === undefined ||
33
+ pathComponent !== currentElement) {
34
+ return false;
35
+ }
36
+ }
37
+ return true;
38
+ })
39
+ .flatMap((keyPath) => keyPath.slice(path.length, path.length + 1));
40
+ return effect_1.HashSet.fromIterable(filteredKeyPaths);
41
+ }), effect_1.Effect.provide(serviceLayer));
42
+ return effect_1.ConfigProvider.fromFlat(effect_1.ConfigProvider.makeFlat({
43
+ load,
44
+ enumerateChildren,
45
+ patch: effect_1.ConfigProviderPathPatch.empty,
46
+ }));
47
+ };
48
+ exports.fromSecretsManager = fromSecretsManager;
49
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"ConfigProvider.js","sourceRoot":"","sources":["../src/ConfigProvider.ts"],"names":[],"mappings":";;;AAAA,+EAG4C;AAC5C,mCAYgB;AAEhB;;;;;GAKG;AACI,MAAM,kBAAkB,GAAG,CAAC,MAGlC,EAAiC,EAAE;IAClC,MAAM,EAAE,SAAS,EAAE,YAAY,EAAE,GAAG,MAAM,CAAC,MAAM,CAC/C,EAAE,EACF,EAAE,SAAS,EAAE,GAAG,EAAE,YAAY,EAAE,0DAAiC,EAAE,EACnE,MAAM,CACP,CAAC;IACF,MAAM,cAAc,GAAG,CAAC,IAA2B,EAAU,EAAE,CAC7D,IAAA,aAAI,EAAC,IAAI,EAAE,cAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC;IACpC,MAAM,gBAAgB,GAAG,CAAC,UAAkB,EAAyB,EAAE,CACrE,UAAU,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC;IAE9B,MAAM,IAAI,GAAG,CACX,IAA2B,EAC3B,SAAqC,EACa,EAAE;QACpD,MAAM,UAAU,GAAG,cAAc,CAAC,IAAI,CAAC,CAAC;QACxC,OAAO,8CAAqB,CAAC,cAAc,CAAC,EAAE,QAAQ,EAAE,UAAU,EAAE,CAAC,CAAC,IAAI,CACxE,eAAM,CAAC,OAAO,CAAC,CAAC,KAAK,EAAE,EAAE,CAAC,eAAM,CAAC,YAAY,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,EAClE,eAAM,CAAC,QAAQ,CAAC,2BAA2B,EAAE,GAAG,EAAE,CAChD,eAAM,CAAC,IAAI,CACT,oBAAW,CAAC,WAAW,CACrB,IAAqB,EACrB,YAAY,UAAU,kCAAkC,CACzD,CACF,CACF,EACD,eAAM,CAAC,QAAQ,CAAC,wBAAwB,EAAE,GAAG,EAAE,CAC7C,eAAM,CAAC,IAAI,CACT,oBAAW,CAAC,WAAW,CACrB,IAAqB,EACrB,YAAY,UAAU,kCAAkC,CACzD,CACF,CACF,EACD,eAAM,CAAC,QAAQ,CAAC,2BAA2B,EAAE,GAAG,EAAE,CAChD,eAAM,CAAC,IAAI,CACT,oBAAW,CAAC,WAAW,CACrB,IAAqB,EACrB,mDAAmD,CACpD,CACF,CACF,EACD,eAAM,CAAC,QAAQ,CAAC,yBAAyB,EAAE,GAAG,EAAE,CAC9C,eAAM,CAAC,IAAI,CACT,oBAAW,CAAC,WAAW,CACrB,IAAqB,EACrB,wCAAwC,CACzC,CACF,CACF,EACD,eAAM,CAAC,aAAa,CAAC,CAAC,KAAK,EAAE,EAAE,CAC7B,cAAK,CAAC,UAAU,CAAC,KAAK,CAAC,IAAI,oBAAW,CAAC,aAAa,CAAC,KAAK,CAAC,KAAK,CAAC;YAC/D,CAAC,CAAC,eAAM,CAAC,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC;YAC1B,CAAC,CAAC,eAAM,CAAC,IAAI,CACT,oBAAW,CAAC,iBAAiB,CAC3B,IAAqB,EACrB,uDAAuD,EACvD,KAAK,CACN,CACF,CACN,EACD,eAAM,CAAC,OAAO,CAAC,CAAC,KAAK,EAAE,EAAE,CACvB,IAAA,aAAI,EACF,SAAS,CAAC,KAAK,CAAC,KAAK,CAAC,EACtB,eAAM,CAAC,OAAO,CAAC;YACb,SAAS,EAAE,oBAAW,CAAC,QAAQ,CAAC,IAAqB,CAAC;YACtD,SAAS,EAAE,cAAK,CAAC,EAAE;SACpB,CAAC,CACH,CACF,EACD,eAAM,CAAC,OAAO,CAAC,YAAY,CAAC,CAC7B,CAAC;IACJ,CAAC,CAAC;IAEF,MAAM,iBAAiB,GAAG,CACxB,IAA2B,EACsC,EAAE,CACnE,8CAAqB,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC,IAAI,CACxC,eAAM,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,eAAM,CAAC,YAAY,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,EACpE,eAAM,CAAC,GAAG,CAAC,cAAK,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,eAAM,CAAC,YAAY,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,EACnE,eAAM,CAAC,OAAO,CAAC,eAAM,CAAC,GAAG,CAAC,EAC1B,eAAM,CAAC,KAAK,EACZ,eAAM,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE;QAClB,MAAM,QAAQ,GAAG,IAAI,CAAC,GAAG,CAAC,gBAAgB,CAAC,CAAC;QAC5C,MAAM,gBAAgB,GAAG,QAAQ;aAC9B,MAAM,CAAC,CAAC,OAAO,EAAE,EAAE;YAClB,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,IAAI,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;gBACrC,MAAM,aAAa,GAAG,IAAA,aAAI,EAAC,IAAI,EAAE,cAAK,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC;gBACrD,MAAM,cAAc,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;gBAClC,IACE,cAAc,KAAK,SAAS;oBAC5B,aAAa,KAAK,cAAc,EAChC,CAAC;oBACD,OAAO,KAAK,CAAC;gBACf,CAAC;YACH,CAAC;YACD,OAAO,IAAI,CAAC;QACd,CAAC,CAAC;aACD,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,CAAC;QACrE,OAAO,gBAAO,CAAC,YAAY,CAAC,gBAAgB,CAAC,CAAC;IAChD,CAAC,CAAC,EACF,eAAM,CAAC,OAAO,CAAC,YAAY,CAAC,CAC7B,CAAC;IAEJ,OAAO,uBAAc,CAAC,QAAQ,CAC5B,uBAAc,CAAC,QAAQ,CAAC;QACtB,IAAI;QACJ,iBAAiB;QACjB,KAAK,EAAE,gCAAuB,CAAC,KAAK;KACrC,CAAC,CACH,CAAC;AACJ,CAAC,CAAC;AAlHW,QAAA,kBAAkB,sBAkH7B","sourcesContent":["import {\n  DefaultSecretsManagerServiceLayer,\n  SecretsManagerService,\n} from \"@effect-aws/client-secrets-manager\";\nimport {\n  Array,\n  Cause,\n  Config,\n  ConfigError,\n  ConfigProvider,\n  ConfigProviderPathPatch,\n  Effect,\n  HashSet,\n  Layer,\n  Option,\n  pipe,\n} from \"effect\";\n\n/**\n * A config provider that loads configuration from AWS Secrets Manager.\n *\n * @since 1.0.0\n * @category constructors\n */\nexport const fromSecretsManager = (config?: {\n  pathDelim?: string;\n  serviceLayer?: Layer.Layer<SecretsManagerService, never, never>;\n}): ConfigProvider.ConfigProvider => {\n  const { pathDelim, serviceLayer } = Object.assign(\n    {},\n    { pathDelim: \"_\", serviceLayer: DefaultSecretsManagerServiceLayer },\n    config,\n  );\n  const makePathString = (path: ReadonlyArray<string>): string =>\n    pipe(path, Array.join(pathDelim));\n  const unmakePathString = (pathString: string): ReadonlyArray<string> =>\n    pathString.split(pathDelim);\n\n  const load = <A>(\n    path: ReadonlyArray<string>,\n    primitive: Config.Config.Primitive<A>,\n  ): Effect.Effect<Array<A>, ConfigError.ConfigError> => {\n    const pathString = makePathString(path);\n    return SecretsManagerService.getSecretValue({ SecretId: pathString }).pipe(\n      Effect.flatMap((value) => Option.fromNullable(value.SecretString)),\n      Effect.catchTag(\"ResourceNotFoundException\", () =>\n        Effect.fail(\n          ConfigError.MissingData(\n            path as Array<string>,\n            `Expected ${pathString} to exist in AWS Secrets Manager`,\n          ),\n        ),\n      ),\n      Effect.catchTag(\"NoSuchElementException\", () =>\n        Effect.fail(\n          ConfigError.MissingData(\n            path as Array<string>,\n            `Expected ${pathString} to exist in AWS Secrets Manager`,\n          ),\n        ),\n      ),\n      Effect.catchTag(\"InvalidParameterException\", () =>\n        Effect.fail(\n          ConfigError.InvalidData(\n            path as Array<string>,\n            \"Invalid parameter provided to AWS Secrets Manager\",\n          ),\n        ),\n      ),\n      Effect.catchTag(\"InvalidRequestException\", () =>\n        Effect.fail(\n          ConfigError.InvalidData(\n            path as Array<string>,\n            \"Invalid request to AWS Secrets Manager\",\n          ),\n        ),\n      ),\n      Effect.catchAllCause((cause) =>\n        Cause.isFailType(cause) && ConfigError.isConfigError(cause.error)\n          ? Effect.fail(cause.error)\n          : Effect.fail(\n              ConfigError.SourceUnavailable(\n                path as Array<string>,\n                \"Failed to load configuration from AWS Secrets Manager\",\n                cause,\n              ),\n            ),\n      ),\n      Effect.flatMap((value) =>\n        pipe(\n          primitive.parse(value),\n          Effect.mapBoth({\n            onFailure: ConfigError.prefixed(path as Array<string>),\n            onSuccess: Array.of,\n          }),\n        ),\n      ),\n      Effect.provide(serviceLayer),\n    );\n  };\n\n  const enumerateChildren = (\n    path: ReadonlyArray<string>,\n  ): Effect.Effect<HashSet.HashSet<string>, ConfigError.ConfigError> =>\n    SecretsManagerService.listSecrets({}).pipe(\n      Effect.flatMap((secrets) => Option.fromNullable(secrets.SecretList)),\n      Effect.map(Array.map((secret) => Option.fromNullable(secret.Name))),\n      Effect.flatMap(Option.all),\n      Effect.orDie,\n      Effect.map((keys) => {\n        const keyPaths = keys.map(unmakePathString);\n        const filteredKeyPaths = keyPaths\n          .filter((keyPath) => {\n            for (let i = 0; i < path.length; i++) {\n              const pathComponent = pipe(path, Array.unsafeGet(i));\n              const currentElement = keyPath[i];\n              if (\n                currentElement === undefined ||\n                pathComponent !== currentElement\n              ) {\n                return false;\n              }\n            }\n            return true;\n          })\n          .flatMap((keyPath) => keyPath.slice(path.length, path.length + 1));\n        return HashSet.fromIterable(filteredKeyPaths);\n      }),\n      Effect.provide(serviceLayer),\n    );\n\n  return ConfigProvider.fromFlat(\n    ConfigProvider.makeFlat({\n      load,\n      enumerateChildren,\n      patch: ConfigProviderPathPatch.empty,\n    }),\n  );\n};\n"]}
@@ -0,0 +1,45 @@
1
+ import { DefaultSecretsManagerServiceLayer, SecretsManagerService, } from "@effect-aws/client-secrets-manager";
2
+ import { Array, Cause, ConfigError, ConfigProvider, ConfigProviderPathPatch, Effect, HashSet, Option, pipe, } from "effect";
3
+ /**
4
+ * A config provider that loads configuration from AWS Secrets Manager.
5
+ *
6
+ * @since 1.0.0
7
+ * @category constructors
8
+ */
9
+ export const fromSecretsManager = (config) => {
10
+ const { pathDelim, serviceLayer } = Object.assign({}, { pathDelim: "_", serviceLayer: DefaultSecretsManagerServiceLayer }, config);
11
+ const makePathString = (path) => pipe(path, Array.join(pathDelim));
12
+ const unmakePathString = (pathString) => pathString.split(pathDelim);
13
+ const load = (path, primitive) => {
14
+ const pathString = makePathString(path);
15
+ return SecretsManagerService.getSecretValue({ SecretId: pathString }).pipe(Effect.flatMap((value) => Option.fromNullable(value.SecretString)), Effect.catchTag("ResourceNotFoundException", () => Effect.fail(ConfigError.MissingData(path, `Expected ${pathString} to exist in AWS Secrets Manager`))), Effect.catchTag("NoSuchElementException", () => Effect.fail(ConfigError.MissingData(path, `Expected ${pathString} to exist in AWS Secrets Manager`))), Effect.catchTag("InvalidParameterException", () => Effect.fail(ConfigError.InvalidData(path, "Invalid parameter provided to AWS Secrets Manager"))), Effect.catchTag("InvalidRequestException", () => Effect.fail(ConfigError.InvalidData(path, "Invalid request to AWS Secrets Manager"))), Effect.catchAllCause((cause) => Cause.isFailType(cause) && ConfigError.isConfigError(cause.error)
16
+ ? Effect.fail(cause.error)
17
+ : Effect.fail(ConfigError.SourceUnavailable(path, "Failed to load configuration from AWS Secrets Manager", cause))), Effect.flatMap((value) => pipe(primitive.parse(value), Effect.mapBoth({
18
+ onFailure: ConfigError.prefixed(path),
19
+ onSuccess: Array.of,
20
+ }))), Effect.provide(serviceLayer));
21
+ };
22
+ const enumerateChildren = (path) => SecretsManagerService.listSecrets({}).pipe(Effect.flatMap((secrets) => Option.fromNullable(secrets.SecretList)), Effect.map(Array.map((secret) => Option.fromNullable(secret.Name))), Effect.flatMap(Option.all), Effect.orDie, Effect.map((keys) => {
23
+ const keyPaths = keys.map(unmakePathString);
24
+ const filteredKeyPaths = keyPaths
25
+ .filter((keyPath) => {
26
+ for (let i = 0; i < path.length; i++) {
27
+ const pathComponent = pipe(path, Array.unsafeGet(i));
28
+ const currentElement = keyPath[i];
29
+ if (currentElement === undefined ||
30
+ pathComponent !== currentElement) {
31
+ return false;
32
+ }
33
+ }
34
+ return true;
35
+ })
36
+ .flatMap((keyPath) => keyPath.slice(path.length, path.length + 1));
37
+ return HashSet.fromIterable(filteredKeyPaths);
38
+ }), Effect.provide(serviceLayer));
39
+ return ConfigProvider.fromFlat(ConfigProvider.makeFlat({
40
+ load,
41
+ enumerateChildren,
42
+ patch: ConfigProviderPathPatch.empty,
43
+ }));
44
+ };
45
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"ConfigProvider.js","sourceRoot":"","sources":["../../src/ConfigProvider.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,iCAAiC,EACjC,qBAAqB,GACtB,MAAM,oCAAoC,CAAC;AAC5C,OAAO,EACL,KAAK,EACL,KAAK,EAEL,WAAW,EACX,cAAc,EACd,uBAAuB,EACvB,MAAM,EACN,OAAO,EAEP,MAAM,EACN,IAAI,GACL,MAAM,QAAQ,CAAC;AAEhB;;;;;GAKG;AACH,MAAM,CAAC,MAAM,kBAAkB,GAAG,CAAC,MAGlC,EAAiC,EAAE;IAClC,MAAM,EAAE,SAAS,EAAE,YAAY,EAAE,GAAG,MAAM,CAAC,MAAM,CAC/C,EAAE,EACF,EAAE,SAAS,EAAE,GAAG,EAAE,YAAY,EAAE,iCAAiC,EAAE,EACnE,MAAM,CACP,CAAC;IACF,MAAM,cAAc,GAAG,CAAC,IAA2B,EAAU,EAAE,CAC7D,IAAI,CAAC,IAAI,EAAE,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC;IACpC,MAAM,gBAAgB,GAAG,CAAC,UAAkB,EAAyB,EAAE,CACrE,UAAU,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC;IAE9B,MAAM,IAAI,GAAG,CACX,IAA2B,EAC3B,SAAqC,EACa,EAAE;QACpD,MAAM,UAAU,GAAG,cAAc,CAAC,IAAI,CAAC,CAAC;QACxC,OAAO,qBAAqB,CAAC,cAAc,CAAC,EAAE,QAAQ,EAAE,UAAU,EAAE,CAAC,CAAC,IAAI,CACxE,MAAM,CAAC,OAAO,CAAC,CAAC,KAAK,EAAE,EAAE,CAAC,MAAM,CAAC,YAAY,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,EAClE,MAAM,CAAC,QAAQ,CAAC,2BAA2B,EAAE,GAAG,EAAE,CAChD,MAAM,CAAC,IAAI,CACT,WAAW,CAAC,WAAW,CACrB,IAAqB,EACrB,YAAY,UAAU,kCAAkC,CACzD,CACF,CACF,EACD,MAAM,CAAC,QAAQ,CAAC,wBAAwB,EAAE,GAAG,EAAE,CAC7C,MAAM,CAAC,IAAI,CACT,WAAW,CAAC,WAAW,CACrB,IAAqB,EACrB,YAAY,UAAU,kCAAkC,CACzD,CACF,CACF,EACD,MAAM,CAAC,QAAQ,CAAC,2BAA2B,EAAE,GAAG,EAAE,CAChD,MAAM,CAAC,IAAI,CACT,WAAW,CAAC,WAAW,CACrB,IAAqB,EACrB,mDAAmD,CACpD,CACF,CACF,EACD,MAAM,CAAC,QAAQ,CAAC,yBAAyB,EAAE,GAAG,EAAE,CAC9C,MAAM,CAAC,IAAI,CACT,WAAW,CAAC,WAAW,CACrB,IAAqB,EACrB,wCAAwC,CACzC,CACF,CACF,EACD,MAAM,CAAC,aAAa,CAAC,CAAC,KAAK,EAAE,EAAE,CAC7B,KAAK,CAAC,UAAU,CAAC,KAAK,CAAC,IAAI,WAAW,CAAC,aAAa,CAAC,KAAK,CAAC,KAAK,CAAC;YAC/D,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC;YAC1B,CAAC,CAAC,MAAM,CAAC,IAAI,CACT,WAAW,CAAC,iBAAiB,CAC3B,IAAqB,EACrB,uDAAuD,EACvD,KAAK,CACN,CACF,CACN,EACD,MAAM,CAAC,OAAO,CAAC,CAAC,KAAK,EAAE,EAAE,CACvB,IAAI,CACF,SAAS,CAAC,KAAK,CAAC,KAAK,CAAC,EACtB,MAAM,CAAC,OAAO,CAAC;YACb,SAAS,EAAE,WAAW,CAAC,QAAQ,CAAC,IAAqB,CAAC;YACtD,SAAS,EAAE,KAAK,CAAC,EAAE;SACpB,CAAC,CACH,CACF,EACD,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,CAC7B,CAAC;IACJ,CAAC,CAAC;IAEF,MAAM,iBAAiB,GAAG,CACxB,IAA2B,EACsC,EAAE,CACnE,qBAAqB,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC,IAAI,CACxC,MAAM,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,MAAM,CAAC,YAAY,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,EACpE,MAAM,CAAC,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,MAAM,CAAC,YAAY,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,EACnE,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,GAAG,CAAC,EAC1B,MAAM,CAAC,KAAK,EACZ,MAAM,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE;QAClB,MAAM,QAAQ,GAAG,IAAI,CAAC,GAAG,CAAC,gBAAgB,CAAC,CAAC;QAC5C,MAAM,gBAAgB,GAAG,QAAQ;aAC9B,MAAM,CAAC,CAAC,OAAO,EAAE,EAAE;YAClB,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,IAAI,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;gBACrC,MAAM,aAAa,GAAG,IAAI,CAAC,IAAI,EAAE,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC;gBACrD,MAAM,cAAc,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;gBAClC,IACE,cAAc,KAAK,SAAS;oBAC5B,aAAa,KAAK,cAAc,EAChC,CAAC;oBACD,OAAO,KAAK,CAAC;gBACf,CAAC;YACH,CAAC;YACD,OAAO,IAAI,CAAC;QACd,CAAC,CAAC;aACD,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,CAAC;QACrE,OAAO,OAAO,CAAC,YAAY,CAAC,gBAAgB,CAAC,CAAC;IAChD,CAAC,CAAC,EACF,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,CAC7B,CAAC;IAEJ,OAAO,cAAc,CAAC,QAAQ,CAC5B,cAAc,CAAC,QAAQ,CAAC;QACtB,IAAI;QACJ,iBAAiB;QACjB,KAAK,EAAE,uBAAuB,CAAC,KAAK;KACrC,CAAC,CACH,CAAC;AACJ,CAAC,CAAC","sourcesContent":["import {\n  DefaultSecretsManagerServiceLayer,\n  SecretsManagerService,\n} from \"@effect-aws/client-secrets-manager\";\nimport {\n  Array,\n  Cause,\n  Config,\n  ConfigError,\n  ConfigProvider,\n  ConfigProviderPathPatch,\n  Effect,\n  HashSet,\n  Layer,\n  Option,\n  pipe,\n} from \"effect\";\n\n/**\n * A config provider that loads configuration from AWS Secrets Manager.\n *\n * @since 1.0.0\n * @category constructors\n */\nexport const fromSecretsManager = (config?: {\n  pathDelim?: string;\n  serviceLayer?: Layer.Layer<SecretsManagerService, never, never>;\n}): ConfigProvider.ConfigProvider => {\n  const { pathDelim, serviceLayer } = Object.assign(\n    {},\n    { pathDelim: \"_\", serviceLayer: DefaultSecretsManagerServiceLayer },\n    config,\n  );\n  const makePathString = (path: ReadonlyArray<string>): string =>\n    pipe(path, Array.join(pathDelim));\n  const unmakePathString = (pathString: string): ReadonlyArray<string> =>\n    pathString.split(pathDelim);\n\n  const load = <A>(\n    path: ReadonlyArray<string>,\n    primitive: Config.Config.Primitive<A>,\n  ): Effect.Effect<Array<A>, ConfigError.ConfigError> => {\n    const pathString = makePathString(path);\n    return SecretsManagerService.getSecretValue({ SecretId: pathString }).pipe(\n      Effect.flatMap((value) => Option.fromNullable(value.SecretString)),\n      Effect.catchTag(\"ResourceNotFoundException\", () =>\n        Effect.fail(\n          ConfigError.MissingData(\n            path as Array<string>,\n            `Expected ${pathString} to exist in AWS Secrets Manager`,\n          ),\n        ),\n      ),\n      Effect.catchTag(\"NoSuchElementException\", () =>\n        Effect.fail(\n          ConfigError.MissingData(\n            path as Array<string>,\n            `Expected ${pathString} to exist in AWS Secrets Manager`,\n          ),\n        ),\n      ),\n      Effect.catchTag(\"InvalidParameterException\", () =>\n        Effect.fail(\n          ConfigError.InvalidData(\n            path as Array<string>,\n            \"Invalid parameter provided to AWS Secrets Manager\",\n          ),\n        ),\n      ),\n      Effect.catchTag(\"InvalidRequestException\", () =>\n        Effect.fail(\n          ConfigError.InvalidData(\n            path as Array<string>,\n            \"Invalid request to AWS Secrets Manager\",\n          ),\n        ),\n      ),\n      Effect.catchAllCause((cause) =>\n        Cause.isFailType(cause) && ConfigError.isConfigError(cause.error)\n          ? Effect.fail(cause.error)\n          : Effect.fail(\n              ConfigError.SourceUnavailable(\n                path as Array<string>,\n                \"Failed to load configuration from AWS Secrets Manager\",\n                cause,\n              ),\n            ),\n      ),\n      Effect.flatMap((value) =>\n        pipe(\n          primitive.parse(value),\n          Effect.mapBoth({\n            onFailure: ConfigError.prefixed(path as Array<string>),\n            onSuccess: Array.of,\n          }),\n        ),\n      ),\n      Effect.provide(serviceLayer),\n    );\n  };\n\n  const enumerateChildren = (\n    path: ReadonlyArray<string>,\n  ): Effect.Effect<HashSet.HashSet<string>, ConfigError.ConfigError> =>\n    SecretsManagerService.listSecrets({}).pipe(\n      Effect.flatMap((secrets) => Option.fromNullable(secrets.SecretList)),\n      Effect.map(Array.map((secret) => Option.fromNullable(secret.Name))),\n      Effect.flatMap(Option.all),\n      Effect.orDie,\n      Effect.map((keys) => {\n        const keyPaths = keys.map(unmakePathString);\n        const filteredKeyPaths = keyPaths\n          .filter((keyPath) => {\n            for (let i = 0; i < path.length; i++) {\n              const pathComponent = pipe(path, Array.unsafeGet(i));\n              const currentElement = keyPath[i];\n              if (\n                currentElement === undefined ||\n                pathComponent !== currentElement\n              ) {\n                return false;\n              }\n            }\n            return true;\n          })\n          .flatMap((keyPath) => keyPath.slice(path.length, path.length + 1));\n        return HashSet.fromIterable(filteredKeyPaths);\n      }),\n      Effect.provide(serviceLayer),\n    );\n\n  return ConfigProvider.fromFlat(\n    ConfigProvider.makeFlat({\n      load,\n      enumerateChildren,\n      patch: ConfigProviderPathPatch.empty,\n    }),\n  );\n};\n"]}
@@ -0,0 +1,2 @@
1
+ export * from "./ConfigProvider";
2
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi9zcmMvaW5kZXgudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBQUEsY0FBYyxrQkFBa0IsQ0FBQyIsInNvdXJjZXNDb250ZW50IjpbImV4cG9ydCAqIGZyb20gXCIuL0NvbmZpZ1Byb3ZpZGVyXCI7XG4iXX0=
package/lib/index.d.ts ADDED
@@ -0,0 +1 @@
1
+ export * from "./ConfigProvider";
package/lib/index.js ADDED
@@ -0,0 +1,18 @@
1
+ "use strict";
2
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
+ if (k2 === undefined) k2 = k;
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
9
+ }) : (function(o, m, k, k2) {
10
+ if (k2 === undefined) k2 = k;
11
+ o[k2] = m[k];
12
+ }));
13
+ var __exportStar = (this && this.__exportStar) || function(m, exports) {
14
+ for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
15
+ };
16
+ Object.defineProperty(exports, "__esModule", { value: true });
17
+ __exportStar(require("./ConfigProvider"), exports);
18
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi9zcmMvaW5kZXgudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7Ozs7Ozs7Ozs7Ozs7OztBQUFBLG1EQUFpQyIsInNvdXJjZXNDb250ZW50IjpbImV4cG9ydCAqIGZyb20gXCIuL0NvbmZpZ1Byb3ZpZGVyXCI7XG4iXX0=
package/package.json ADDED
@@ -0,0 +1,52 @@
1
+ {
2
+ "name": "@effect-aws/secrets-manager",
3
+ "author": {
4
+ "name": "Victor Korzunin",
5
+ "email": "ifloydrose@gmail.com",
6
+ "organization": false
7
+ },
8
+ "devDependencies": {
9
+ "@aws-sdk/client-secrets-manager": "^3",
10
+ "@effect-aws/client-secrets-manager": "1.1.0",
11
+ "@fluffy-spoon/substitute": "^1.208.0",
12
+ "@types/node": "^18",
13
+ "@typescript-eslint/eslint-plugin": "^7",
14
+ "@typescript-eslint/parser": "^7",
15
+ "effect": "3.0.0",
16
+ "eslint": "^8",
17
+ "eslint-config-prettier": "^9.1.0",
18
+ "eslint-import-resolver-typescript": "^3.6.1",
19
+ "eslint-plugin-import": "^2.29.1",
20
+ "eslint-plugin-prettier": "^5.2.1",
21
+ "prettier": "^3.2.5",
22
+ "typescript": "^5.4.2"
23
+ },
24
+ "peerDependencies": {
25
+ "@effect-aws/client-secrets-manager": "^1.1.0",
26
+ "effect": ">=3.0.0 <4.0.0"
27
+ },
28
+ "main": "lib/index.js",
29
+ "license": "MIT",
30
+ "homepage": "https://floydspace.github.io/effect-aws",
31
+ "publishConfig": {
32
+ "access": "public"
33
+ },
34
+ "version": "1.0.0",
35
+ "types": "lib/index.d.ts",
36
+ "module": "lib/esm/index.js",
37
+ "sideEffects": [],
38
+ "//": "~~ Generated by projen. To modify, edit .projenrc.js and run \"npx projen\".",
39
+ "scripts": {
40
+ "build": "npx projen build",
41
+ "compile": "npx projen compile",
42
+ "default": "npx projen default",
43
+ "eslint": "npx projen eslint",
44
+ "package": "npx projen package",
45
+ "post-compile": "npx projen post-compile",
46
+ "pre-compile": "npx projen pre-compile",
47
+ "test": "npx projen test",
48
+ "test:watch": "npx projen test:watch",
49
+ "watch": "npx projen watch",
50
+ "docgen": "docgen"
51
+ }
52
+ }
package/project.json ADDED
@@ -0,0 +1,80 @@
1
+ {
2
+ "name": "@effect-aws/secrets-manager",
3
+ "root": "packages/secrets-manager",
4
+ "targets": {
5
+ "default": {
6
+ "executor": "nx:run-commands",
7
+ "options": {
8
+ "command": "pnpm exec projen default",
9
+ "cwd": "packages/secrets-manager"
10
+ }
11
+ },
12
+ "pre-compile": {
13
+ "executor": "nx:run-commands",
14
+ "options": {
15
+ "command": "pnpm exec projen pre-compile",
16
+ "cwd": "packages/secrets-manager"
17
+ }
18
+ },
19
+ "compile": {
20
+ "executor": "nx:run-commands",
21
+ "options": {
22
+ "command": "pnpm exec projen compile",
23
+ "cwd": "packages/secrets-manager"
24
+ }
25
+ },
26
+ "post-compile": {
27
+ "executor": "nx:run-commands",
28
+ "options": {
29
+ "command": "pnpm exec projen post-compile",
30
+ "cwd": "packages/secrets-manager"
31
+ }
32
+ },
33
+ "test": {
34
+ "executor": "nx:run-commands",
35
+ "options": {
36
+ "command": "pnpm exec projen test",
37
+ "cwd": "packages/secrets-manager"
38
+ }
39
+ },
40
+ "package": {
41
+ "executor": "nx:run-commands",
42
+ "options": {
43
+ "command": "pnpm exec projen package",
44
+ "cwd": "packages/secrets-manager"
45
+ }
46
+ },
47
+ "build": {
48
+ "executor": "nx:run-commands",
49
+ "options": {
50
+ "command": "pnpm exec projen build",
51
+ "cwd": "packages/secrets-manager"
52
+ }
53
+ },
54
+ "watch": {
55
+ "executor": "nx:run-commands",
56
+ "options": {
57
+ "command": "pnpm exec projen watch",
58
+ "cwd": "packages/secrets-manager"
59
+ }
60
+ },
61
+ "eslint": {
62
+ "executor": "nx:run-commands",
63
+ "options": {
64
+ "command": "pnpm exec projen eslint",
65
+ "cwd": "packages/secrets-manager"
66
+ }
67
+ },
68
+ "test:watch": {
69
+ "executor": "nx:run-commands",
70
+ "options": {
71
+ "command": "pnpm exec projen test:watch",
72
+ "cwd": "packages/secrets-manager"
73
+ }
74
+ }
75
+ },
76
+ "implicitDependencies": [
77
+ "@effect-aws/client-secrets-manager"
78
+ ],
79
+ "//": "~~ Generated by projen. To modify, edit .projenrc.js and run \"npx projen\"."
80
+ }