@effect-aws/secrets-manager 1.3.3 → 2.0.0-beta.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/LICENSE CHANGED
@@ -1,4 +1,4 @@
1
- Copyright (c) 2025 Victor Korzunin
1
+ Copyright (c) 2026 Victor Korzunin
2
2
 
3
3
  Permission is hereby granted, free of charge, to any person obtaining a copy
4
4
  of this software and associated documentation files (the "Software"), to deal
@@ -2,7 +2,7 @@
2
2
  * @since 1.0.0
3
3
  */
4
4
  import { SecretsManagerService } from "@effect-aws/client-secrets-manager";
5
- import { ConfigProvider, Effect, Layer } from "effect";
5
+ import { ConfigProvider, Effect } from "effect";
6
6
  /**
7
7
  * @since 1.2.0
8
8
  * @category models
@@ -18,16 +18,14 @@ export interface FromSecretsManagerConfig {
18
18
  *
19
19
  * @deprecated Use `ConfigProvider.withSecretsManagerConfigProvider` or `ConfigProvider.setSecretsManagerConfigProvider` instead.
20
20
  */
21
- export declare const fromSecretsManager: (config?: Partial<FromSecretsManagerConfig> & {
22
- serviceLayer?: Layer.Layer<SecretsManagerService>;
23
- }) => ConfigProvider.ConfigProvider;
21
+ export declare const fromSecretsManager: (config?: Partial<FromSecretsManagerConfig>) => Effect.Effect<ConfigProvider.ConfigProvider, never, SecretsManagerService>;
24
22
  /**
25
23
  * Sets the current `ConfigProvider` that loads configuration from AWS Secrets Manager.
26
24
  *
27
25
  * @since 1.2.0
28
26
  * @category config
29
27
  */
30
- export declare const setSecretsManagerConfigProvider: (config?: Partial<FromSecretsManagerConfig>) => Layer.Layer<never, never, SecretsManagerService>;
28
+ export declare const setSecretsManagerConfigProvider: (config?: Partial<FromSecretsManagerConfig>) => import("effect/Layer").Layer<never, never, SecretsManagerService>;
31
29
  /**
32
30
  * Executes the specified workflow with the secrets manager configuration provider.
33
31
  *
@@ -1 +1 @@
1
- {"version":3,"file":"ConfigProvider.d.ts","sourceRoot":"","sources":["../../src/ConfigProvider.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,qBAAqB,EAAE,MAAM,oCAAoC,CAAC;AAE3E,OAAO,EAIL,cAAc,EAEd,MAAM,EAEN,KAAK,EAGN,MAAM,QAAQ,CAAC;AAEhB;;;GAGG;AACH,MAAM,WAAW,wBAAwB;IACvC,QAAQ,CAAC,SAAS,EAAE,MAAM,CAAC;CAC5B;AAED;;;;;;;GAOG;AACH,eAAO,MAAM,kBAAkB,YACpB,QAAQ,wBAAwB,CAAC,GAAG;IAAE,YAAY,CAAC,EAAE,MAAM,KAAK,CAAC,qBAAqB,CAAC,CAAA;CAAE,KACjG,eAAe,cAyGjB,CAAC;AAEF;;;;;GAKG;AACH,eAAO,MAAM,+BAA+B,YAAa,QAAQ,wBAAwB,CAAC,qDAU7D,CAAC;AAE9B;;;;;GAKG;AACH,eAAO,MAAM,gCAAgC,YAAa,QAAQ,wBAAwB,CAAC,8GAClC,CAAC"}
1
+ {"version":3,"file":"ConfigProvider.d.ts","sourceRoot":"","sources":["../../src/ConfigProvider.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,qBAAqB,EAAE,MAAM,oCAAoC,CAAC;AAC3E,OAAO,EAAS,cAAc,EAAE,MAAM,EAAgB,MAAM,QAAQ,CAAC;AAErE;;;GAGG;AACH,MAAM,WAAW,wBAAwB;IACvC,QAAQ,CAAC,SAAS,EAAE,MAAM,CAAC;CAC5B;AAED;;;;;;;GAOG;AACH,eAAO,MAAM,kBAAkB,EAAE,CAAC,MAAM,CAAC,EAAE,OAAO,CAAC,wBAAwB,CAAC,KAAK,MAAM,CAAC,MAAM,CAC5F,cAAc,CAAC,cAAc,EAC7B,KAAK,EACL,qBAAqB,CAyBpB,CAAC;AAEJ;;;;;GAKG;AACH,eAAO,MAAM,+BAA+B,YAAa,QAAQ,wBAAwB,CAAC,sEACxC,CAAC;AAEnD;;;;;GAKG;AACH,eAAO,MAAM,gCAAgC,YAAa,QAAQ,wBAAwB,CAAC,8GAClC,CAAC"}
@@ -1,12 +1,3 @@
1
- /**
2
- * @since 1.0.0
3
- */
4
- import { fromSecretsManager } from "./ConfigProvider.js";
5
- export {
6
- /**
7
- * @since 1.0.0
8
- */
9
- fromSecretsManager, };
10
1
  /**
11
2
  * @since 1.2.0
12
3
  */
@@ -1 +1 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,kBAAkB,EAAE,MAAM,qBAAqB,CAAC;AAEzD,OAAO;AACL;;GAEG;AACH,kBAAkB,GACnB,CAAC;AAEF;;GAEG;AACH,OAAO,KAAK,cAAc,MAAM,qBAAqB,CAAC"}
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,KAAK,cAAc,MAAM,qBAAqB,CAAC"}
@@ -2,7 +2,7 @@
2
2
  * @since 1.0.0
3
3
  */
4
4
  import { SecretsManagerService } from "@effect-aws/client-secrets-manager";
5
- import { Array, Cause, ConfigError, ConfigProvider, ConfigProviderPathPatch, Effect, HashSet, Layer, Option, pipe, } from "effect";
5
+ import { Array, ConfigProvider, Effect, Option, pipe } from "effect";
6
6
  /**
7
7
  * A config provider that loads configuration from AWS Secrets Manager.
8
8
  *
@@ -11,56 +11,26 @@ import { Array, Cause, ConfigError, ConfigProvider, ConfigProviderPathPatch, Eff
11
11
  *
12
12
  * @deprecated Use `ConfigProvider.withSecretsManagerConfigProvider` or `ConfigProvider.setSecretsManagerConfigProvider` instead.
13
13
  */
14
- export const fromSecretsManager = (config) => {
15
- const { pathDelim, serviceLayer } = Object.assign({}, { pathDelim: "_", serviceLayer: SecretsManagerService.defaultLayer }, config);
14
+ export const fromSecretsManager = Effect
15
+ .fnUntraced(function* (config) {
16
+ const { pathDelim } = Object.assign({}, { pathDelim: "_" }, config);
16
17
  const makePathString = (path) => pipe(path, Array.join(pathDelim));
17
- const unmakePathString = (pathString) => pathString.split(pathDelim);
18
- const load = (path, primitive) => {
19
- const pathString = makePathString(path);
20
- return SecretsManagerService.getSecretValue({ SecretId: pathString }).pipe(Effect.flatMap((value) => Option.fromNullable(value.SecretString)), Effect.catchTag("ResourceNotFoundException", () => Effect.fail(ConfigError.MissingData(path, `Expected ${pathString} to exist in AWS Secrets Manager`))), Effect.catchTag("NoSuchElementException", () => Effect.fail(ConfigError.MissingData(path, `Expected ${pathString} to exist in AWS Secrets Manager`))), Effect.catchTag("InvalidParameterException", () => Effect.fail(ConfigError.InvalidData(path, "Invalid parameter provided to AWS Secrets Manager"))), Effect.catchTag("InvalidRequestException", () => Effect.fail(ConfigError.InvalidData(path, "Invalid request to AWS Secrets Manager"))), Effect.catchAllCause((cause) => Cause.isFailType(cause) && ConfigError.isConfigError(cause.error)
21
- ? Effect.fail(cause.error)
22
- : Effect.fail(ConfigError.SourceUnavailable(path, "Failed to load configuration from AWS Secrets Manager", cause))), Effect.flatMap((value) => pipe(primitive.parse(value), Effect.mapBoth({
23
- onFailure: ConfigError.prefixed(path),
24
- onSuccess: Array.of,
25
- }))), Effect.provide(serviceLayer));
26
- };
27
- const enumerateChildren = (path) => SecretsManagerService.listSecrets({}).pipe(Effect.flatMap((secrets) => Option.fromNullable(secrets.SecretList)), Effect.map(Array.map((secret) => Option.fromNullable(secret.Name))), Effect.flatMap(Option.all), Effect.orDie, Effect.map((keys) => {
28
- const keyPaths = keys.map(unmakePathString);
29
- const filteredKeyPaths = keyPaths
30
- .filter((keyPath) => {
31
- for (let i = 0; i < path.length; i++) {
32
- const pathComponent = pipe(path, Array.unsafeGet(i));
33
- const currentElement = keyPath[i];
34
- if (currentElement === undefined ||
35
- pathComponent !== currentElement) {
36
- return false;
37
- }
38
- }
39
- return true;
40
- })
41
- .flatMap((keyPath) => keyPath.slice(path.length, path.length + 1));
42
- return HashSet.fromIterable(filteredKeyPaths);
43
- }), Effect.provide(serviceLayer));
44
- return ConfigProvider.fromFlat(ConfigProvider.makeFlat({
45
- load,
46
- enumerateChildren,
47
- patch: ConfigProviderPathPatch.empty,
48
- }));
49
- };
18
+ const svc = yield* SecretsManagerService;
19
+ return ConfigProvider.make((path) => {
20
+ const pathString = makePathString(path.map(String));
21
+ return svc.getSecretValue({ SecretId: pathString }).pipe(Effect.map((value) => Option.fromNullishOr(value.SecretString)), Effect.catchTag("ResourceNotFoundException", () => Effect.succeedNone), Effect.map(Option.map(ConfigProvider.makeValue)), Effect.map(Option.getOrUndefined), Effect.mapError((cause) => new ConfigProvider.SourceError({
22
+ message: "Failed to load configuration from AWS Secrets Manager",
23
+ cause,
24
+ })));
25
+ });
26
+ });
50
27
  /**
51
28
  * Sets the current `ConfigProvider` that loads configuration from AWS Secrets Manager.
52
29
  *
53
30
  * @since 1.2.0
54
31
  * @category config
55
32
  */
56
- export const setSecretsManagerConfigProvider = (config) => Effect.gen(function* () {
57
- const service = yield* SecretsManagerService;
58
- const provider = fromSecretsManager({
59
- ...config,
60
- serviceLayer: Layer.succeed(SecretsManagerService, service),
61
- });
62
- return Layer.setConfigProvider(provider);
63
- }).pipe(Layer.unwrapEffect);
33
+ export const setSecretsManagerConfigProvider = (config) => ConfigProvider.layer(fromSecretsManager(config));
64
34
  /**
65
35
  * Executes the specified workflow with the secrets manager configuration provider.
66
36
  *
@@ -1 +1 @@
1
- {"version":3,"file":"ConfigProvider.js","sourceRoot":"","sources":["../../src/ConfigProvider.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,qBAAqB,EAAE,MAAM,oCAAoC,CAAC;AAE3E,OAAO,EACL,KAAK,EACL,KAAK,EACL,WAAW,EACX,cAAc,EACd,uBAAuB,EACvB,MAAM,EACN,OAAO,EACP,KAAK,EACL,MAAM,EACN,IAAI,GACL,MAAM,QAAQ,CAAC;AAUhB;;;;;;;GAOG;AACH,MAAM,CAAC,MAAM,kBAAkB,GAAG,CAChC,MAAkG,EACnE,EAAE;IACjC,MAAM,EAAE,SAAS,EAAE,YAAY,EAAE,GAAG,MAAM,CAAC,MAAM,CAC/C,EAAE,EACF,EAAE,SAAS,EAAE,GAAG,EAAE,YAAY,EAAE,qBAAqB,CAAC,YAAY,EAAE,EACpE,MAAM,CACP,CAAC;IACF,MAAM,cAAc,GAAG,CAAC,IAA2B,EAAU,EAAE,CAAC,IAAI,CAAC,IAAI,EAAE,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC;IAClG,MAAM,gBAAgB,GAAG,CAAC,UAAkB,EAAyB,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC;IAEpG,MAAM,IAAI,GAAG,CACX,IAA2B,EAC3B,SAAqC,EACa,EAAE;QACpD,MAAM,UAAU,GAAG,cAAc,CAAC,IAAI,CAAC,CAAC;QACxC,OAAO,qBAAqB,CAAC,cAAc,CAAC,EAAE,QAAQ,EAAE,UAAU,EAAE,CAAC,CAAC,IAAI,CACxE,MAAM,CAAC,OAAO,CAAC,CAAC,KAAK,EAAE,EAAE,CAAC,MAAM,CAAC,YAAY,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,EAClE,MAAM,CAAC,QAAQ,CAAC,2BAA2B,EAAE,GAAG,EAAE,CAChD,MAAM,CAAC,IAAI,CACT,WAAW,CAAC,WAAW,CACrB,IAAqB,EACrB,YAAY,UAAU,kCAAkC,CACzD,CACF,CAAC,EACJ,MAAM,CAAC,QAAQ,CAAC,wBAAwB,EAAE,GAAG,EAAE,CAC7C,MAAM,CAAC,IAAI,CACT,WAAW,CAAC,WAAW,CACrB,IAAqB,EACrB,YAAY,UAAU,kCAAkC,CACzD,CACF,CAAC,EACJ,MAAM,CAAC,QAAQ,CAAC,2BAA2B,EAAE,GAAG,EAAE,CAChD,MAAM,CAAC,IAAI,CACT,WAAW,CAAC,WAAW,CACrB,IAAqB,EACrB,mDAAmD,CACpD,CACF,CAAC,EACJ,MAAM,CAAC,QAAQ,CAAC,yBAAyB,EAAE,GAAG,EAAE,CAC9C,MAAM,CAAC,IAAI,CACT,WAAW,CAAC,WAAW,CACrB,IAAqB,EACrB,wCAAwC,CACzC,CACF,CAAC,EACJ,MAAM,CAAC,aAAa,CAAC,CAAC,KAAK,EAAE,EAAE,CAC7B,KAAK,CAAC,UAAU,CAAC,KAAK,CAAC,IAAI,WAAW,CAAC,aAAa,CAAC,KAAK,CAAC,KAAK,CAAC;YAC/D,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC;YAC1B,CAAC,CAAC,MAAM,CAAC,IAAI,CACX,WAAW,CAAC,iBAAiB,CAC3B,IAAqB,EACrB,uDAAuD,EACvD,KAAK,CACN,CACF,CACJ,EACD,MAAM,CAAC,OAAO,CAAC,CAAC,KAAK,EAAE,EAAE,CACvB,IAAI,CACF,SAAS,CAAC,KAAK,CAAC,KAAK,CAAC,EACtB,MAAM,CAAC,OAAO,CAAC;YACb,SAAS,EAAE,WAAW,CAAC,QAAQ,CAAC,IAAqB,CAAC;YACtD,SAAS,EAAE,KAAK,CAAC,EAAE;SACpB,CAAC,CACH,CACF,EACD,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,CAC7B,CAAC;IACJ,CAAC,CAAC;IAEF,MAAM,iBAAiB,GAAG,CACxB,IAA2B,EACsC,EAAE,CACnE,qBAAqB,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC,IAAI,CACxC,MAAM,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,MAAM,CAAC,YAAY,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,EACpE,MAAM,CAAC,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,MAAM,CAAC,YAAY,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,EACnE,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,GAAG,CAAC,EAC1B,MAAM,CAAC,KAAK,EACZ,MAAM,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE;QAClB,MAAM,QAAQ,GAAG,IAAI,CAAC,GAAG,CAAC,gBAAgB,CAAC,CAAC;QAC5C,MAAM,gBAAgB,GAAG,QAAQ;aAC9B,MAAM,CAAC,CAAC,OAAO,EAAE,EAAE;YAClB,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,IAAI,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;gBACrC,MAAM,aAAa,GAAG,IAAI,CAAC,IAAI,EAAE,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC;gBACrD,MAAM,cAAc,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;gBAClC,IACE,cAAc,KAAK,SAAS;oBAC5B,aAAa,KAAK,cAAc,EAChC,CAAC;oBACD,OAAO,KAAK,CAAC;gBACf,CAAC;YACH,CAAC;YACD,OAAO,IAAI,CAAC;QACd,CAAC,CAAC;aACD,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,CAAC;QACrE,OAAO,OAAO,CAAC,YAAY,CAAC,gBAAgB,CAAC,CAAC;IAChD,CAAC,CAAC,EACF,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,CAC7B,CAAC;IAEJ,OAAO,cAAc,CAAC,QAAQ,CAC5B,cAAc,CAAC,QAAQ,CAAC;QACtB,IAAI;QACJ,iBAAiB;QACjB,KAAK,EAAE,uBAAuB,CAAC,KAAK;KACrC,CAAC,CACH,CAAC;AACJ,CAAC,CAAC;AAEF;;;;;GAKG;AACH,MAAM,CAAC,MAAM,+BAA+B,GAAG,CAAC,MAA0C,EAAE,EAAE,CAC5F,MAAM,CAAC,GAAG,CAAC,QAAQ,CAAC;IAClB,MAAM,OAAO,GAAG,KAAK,CAAC,CAAC,qBAAqB,CAAC;IAE7C,MAAM,QAAQ,GAAG,kBAAkB,CAAC;QAClC,GAAG,MAAM;QACT,YAAY,EAAE,KAAK,CAAC,OAAO,CAAC,qBAAqB,EAAE,OAAO,CAAC;KAC5D,CAAC,CAAC;IAEH,OAAO,KAAK,CAAC,iBAAiB,CAAC,QAAQ,CAAC,CAAC;AAC3C,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC;AAE9B;;;;;GAKG;AACH,MAAM,CAAC,MAAM,gCAAgC,GAAG,CAAC,MAA0C,EAAE,EAAE,CAC7F,MAAM,CAAC,OAAO,CAAC,+BAA+B,CAAC,MAAM,CAAC,CAAC,CAAC"}
1
+ {"version":3,"file":"ConfigProvider.js","sourceRoot":"","sources":["../../src/ConfigProvider.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,qBAAqB,EAAE,MAAM,oCAAoC,CAAC;AAC3E,OAAO,EAAE,KAAK,EAAE,cAAc,EAAE,MAAM,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,QAAQ,CAAC;AAUrE;;;;;;;GAOG;AACH,MAAM,CAAC,MAAM,kBAAkB,GAI3B,MAAM;KACP,UAAU,CACT,QAAQ,CAAC,EAAC,MAAM;IACd,MAAM,EAAE,SAAS,EAAE,GAAG,MAAM,CAAC,MAAM,CAAC,EAAE,EAAE,EAAE,SAAS,EAAE,GAAG,EAAE,EAAE,MAAM,CAAC,CAAC;IACpE,MAAM,cAAc,GAAG,CAAC,IAA2B,EAAU,EAAE,CAAC,IAAI,CAAC,IAAI,EAAE,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC;IAElG,MAAM,GAAG,GAAG,KAAK,CAAC,CAAC,qBAAqB,CAAC;IAEzC,OAAO,cAAc,CAAC,IAAI,CAAC,CAAC,IAAI,EAAE,EAAE;QAClC,MAAM,UAAU,GAAG,cAAc,CAAC,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC;QACpD,OAAO,GAAG,CAAC,cAAc,CAAC,EAAE,QAAQ,EAAE,UAAU,EAAE,CAAC,CAAC,IAAI,CACtD,MAAM,CAAC,GAAG,CAAC,CAAC,KAAK,EAAE,EAAE,CAAC,MAAM,CAAC,aAAa,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,EAC/D,MAAM,CAAC,QAAQ,CAAC,2BAA2B,EAAE,GAAG,EAAE,CAAC,MAAM,CAAC,WAAW,CAAC,EACtE,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC,EAChD,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,cAAc,CAAC,EACjC,MAAM,CAAC,QAAQ,CAAC,CAAC,KAAK,EAAE,EAAE,CACxB,IAAI,cAAc,CAAC,WAAW,CAAC;YAC7B,OAAO,EAAE,uDAAuD;YAChE,KAAK;SACN,CAAC,CACH,CACF,CAAC;IACJ,CAAC,CAAC,CAAC;AACL,CAAC,CACF,CAAC;AAEJ;;;;;GAKG;AACH,MAAM,CAAC,MAAM,+BAA+B,GAAG,CAAC,MAA0C,EAAE,EAAE,CAC5F,cAAc,CAAC,KAAK,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC,CAAC;AAEnD;;;;;GAKG;AACH,MAAM,CAAC,MAAM,gCAAgC,GAAG,CAAC,MAA0C,EAAE,EAAE,CAC7F,MAAM,CAAC,OAAO,CAAC,+BAA+B,CAAC,MAAM,CAAC,CAAC,CAAC"}
package/dist/esm/index.js CHANGED
@@ -1,12 +1,3 @@
1
- /**
2
- * @since 1.0.0
3
- */
4
- import { fromSecretsManager } from "./ConfigProvider.js";
5
- export {
6
- /**
7
- * @since 1.0.0
8
- */
9
- fromSecretsManager, };
10
1
  /**
11
2
  * @since 1.2.0
12
3
  */
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,kBAAkB,EAAE,MAAM,qBAAqB,CAAC;AAEzD,OAAO;AACL;;GAEG;AACH,kBAAkB,GACnB,CAAC;AAEF;;GAEG;AACH,OAAO,KAAK,cAAc,MAAM,qBAAqB,CAAC"}
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,KAAK,cAAc,MAAM,qBAAqB,CAAC"}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@effect-aws/secrets-manager",
3
- "version": "1.3.3",
3
+ "version": "2.0.0-beta.0",
4
4
  "description": "Effectful AWS Secrets Manager functions",
5
5
  "license": "MIT",
6
6
  "repository": {
@@ -15,23 +15,20 @@
15
15
  },
16
16
  "homepage": "https://floydspace.github.io/effect-aws/docs/secrets-manager",
17
17
  "peerDependencies": {
18
- "effect": ">=3.0.4 <4.0.0",
19
- "@effect-aws/client-secrets-manager": "^1.10.9"
18
+ "effect": ">=4.0.0 <5.0.0",
19
+ "@effect-aws/client-secrets-manager": "^2.0.0-beta.0"
20
20
  },
21
- "main": "./dist/cjs/index.js",
22
21
  "module": "./dist/esm/index.js",
23
22
  "types": "./dist/dts/index.d.ts",
24
23
  "exports": {
25
24
  "./package.json": "./package.json",
26
25
  ".": {
27
26
  "types": "./dist/dts/index.d.ts",
28
- "import": "./dist/esm/index.js",
29
- "default": "./dist/cjs/index.js"
27
+ "import": "./dist/esm/index.js"
30
28
  },
31
29
  "./ConfigProvider": {
32
30
  "types": "./dist/dts/ConfigProvider.d.ts",
33
- "import": "./dist/esm/ConfigProvider.js",
34
- "default": "./dist/cjs/ConfigProvider.js"
31
+ "import": "./dist/esm/ConfigProvider.js"
35
32
  }
36
33
  },
37
34
  "typesVersions": {
@@ -2,19 +2,7 @@
2
2
  * @since 1.0.0
3
3
  */
4
4
  import { SecretsManagerService } from "@effect-aws/client-secrets-manager";
5
- import type { Config } from "effect";
6
- import {
7
- Array,
8
- Cause,
9
- ConfigError,
10
- ConfigProvider,
11
- ConfigProviderPathPatch,
12
- Effect,
13
- HashSet,
14
- Layer,
15
- Option,
16
- pipe,
17
- } from "effect";
5
+ import { Array, ConfigProvider, Effect, Option, pipe } from "effect";
18
6
 
19
7
  /**
20
8
  * @since 1.2.0
@@ -32,114 +20,35 @@ export interface FromSecretsManagerConfig {
32
20
  *
33
21
  * @deprecated Use `ConfigProvider.withSecretsManagerConfigProvider` or `ConfigProvider.setSecretsManagerConfigProvider` instead.
34
22
  */
35
- export const fromSecretsManager = (
36
- config?: Partial<FromSecretsManagerConfig> & { serviceLayer?: Layer.Layer<SecretsManagerService> },
37
- ): ConfigProvider.ConfigProvider => {
38
- const { pathDelim, serviceLayer } = Object.assign(
39
- {},
40
- { pathDelim: "_", serviceLayer: SecretsManagerService.defaultLayer },
41
- config,
42
- );
43
- const makePathString = (path: ReadonlyArray<string>): string => pipe(path, Array.join(pathDelim));
44
- const unmakePathString = (pathString: string): ReadonlyArray<string> => pathString.split(pathDelim);
23
+ export const fromSecretsManager: (config?: Partial<FromSecretsManagerConfig>) => Effect.Effect<
24
+ ConfigProvider.ConfigProvider,
25
+ never,
26
+ SecretsManagerService
27
+ > = Effect
28
+ .fnUntraced(
29
+ function*(config) {
30
+ const { pathDelim } = Object.assign({}, { pathDelim: "_" }, config);
31
+ const makePathString = (path: ReadonlyArray<string>): string => pipe(path, Array.join(pathDelim));
45
32
 
46
- const load = <A>(
47
- path: ReadonlyArray<string>,
48
- primitive: Config.Config.Primitive<A>,
49
- ): Effect.Effect<Array<A>, ConfigError.ConfigError> => {
50
- const pathString = makePathString(path);
51
- return SecretsManagerService.getSecretValue({ SecretId: pathString }).pipe(
52
- Effect.flatMap((value) => Option.fromNullable(value.SecretString)),
53
- Effect.catchTag("ResourceNotFoundException", () =>
54
- Effect.fail(
55
- ConfigError.MissingData(
56
- path as Array<string>,
57
- `Expected ${pathString} to exist in AWS Secrets Manager`,
58
- ),
59
- )),
60
- Effect.catchTag("NoSuchElementException", () =>
61
- Effect.fail(
62
- ConfigError.MissingData(
63
- path as Array<string>,
64
- `Expected ${pathString} to exist in AWS Secrets Manager`,
65
- ),
66
- )),
67
- Effect.catchTag("InvalidParameterException", () =>
68
- Effect.fail(
69
- ConfigError.InvalidData(
70
- path as Array<string>,
71
- "Invalid parameter provided to AWS Secrets Manager",
72
- ),
73
- )),
74
- Effect.catchTag("InvalidRequestException", () =>
75
- Effect.fail(
76
- ConfigError.InvalidData(
77
- path as Array<string>,
78
- "Invalid request to AWS Secrets Manager",
79
- ),
80
- )),
81
- Effect.catchAllCause((cause) =>
82
- Cause.isFailType(cause) && ConfigError.isConfigError(cause.error)
83
- ? Effect.fail(cause.error)
84
- : Effect.fail(
85
- ConfigError.SourceUnavailable(
86
- path as Array<string>,
87
- "Failed to load configuration from AWS Secrets Manager",
88
- cause,
89
- ),
90
- )
91
- ),
92
- Effect.flatMap((value) =>
93
- pipe(
94
- primitive.parse(value),
95
- Effect.mapBoth({
96
- onFailure: ConfigError.prefixed(path as Array<string>),
97
- onSuccess: Array.of,
98
- }),
99
- )
100
- ),
101
- Effect.provide(serviceLayer),
102
- );
103
- };
33
+ const svc = yield* SecretsManagerService;
104
34
 
105
- const enumerateChildren = (
106
- path: ReadonlyArray<string>,
107
- ): Effect.Effect<HashSet.HashSet<string>, ConfigError.ConfigError> =>
108
- SecretsManagerService.listSecrets({}).pipe(
109
- Effect.flatMap((secrets) => Option.fromNullable(secrets.SecretList)),
110
- Effect.map(Array.map((secret) => Option.fromNullable(secret.Name))),
111
- Effect.flatMap(Option.all),
112
- Effect.orDie,
113
- Effect.map((keys) => {
114
- const keyPaths = keys.map(unmakePathString);
115
- const filteredKeyPaths = keyPaths
116
- .filter((keyPath) => {
117
- for (let i = 0; i < path.length; i++) {
118
- const pathComponent = pipe(path, Array.unsafeGet(i));
119
- const currentElement = keyPath[i];
120
- if (
121
- currentElement === undefined ||
122
- pathComponent !== currentElement
123
- ) {
124
- return false;
125
- }
126
- }
127
- return true;
128
- })
129
- .flatMap((keyPath) => keyPath.slice(path.length, path.length + 1));
130
- return HashSet.fromIterable(filteredKeyPaths);
131
- }),
132
- Effect.provide(serviceLayer),
133
- );
134
-
135
- return ConfigProvider.fromFlat(
136
- ConfigProvider.makeFlat({
137
- load,
138
- enumerateChildren,
139
- patch: ConfigProviderPathPatch.empty,
140
- }),
35
+ return ConfigProvider.make((path) => {
36
+ const pathString = makePathString(path.map(String));
37
+ return svc.getSecretValue({ SecretId: pathString }).pipe(
38
+ Effect.map((value) => Option.fromNullishOr(value.SecretString)),
39
+ Effect.catchTag("ResourceNotFoundException", () => Effect.succeedNone),
40
+ Effect.map(Option.map(ConfigProvider.makeValue)),
41
+ Effect.map(Option.getOrUndefined),
42
+ Effect.mapError((cause) =>
43
+ new ConfigProvider.SourceError({
44
+ message: "Failed to load configuration from AWS Secrets Manager",
45
+ cause,
46
+ })
47
+ ),
48
+ );
49
+ });
50
+ },
141
51
  );
142
- };
143
52
 
144
53
  /**
145
54
  * Sets the current `ConfigProvider` that loads configuration from AWS Secrets Manager.
@@ -148,16 +57,7 @@ export const fromSecretsManager = (
148
57
  * @category config
149
58
  */
150
59
  export const setSecretsManagerConfigProvider = (config?: Partial<FromSecretsManagerConfig>) =>
151
- Effect.gen(function*() {
152
- const service = yield* SecretsManagerService;
153
-
154
- const provider = fromSecretsManager({
155
- ...config,
156
- serviceLayer: Layer.succeed(SecretsManagerService, service),
157
- });
158
-
159
- return Layer.setConfigProvider(provider);
160
- }).pipe(Layer.unwrapEffect);
60
+ ConfigProvider.layer(fromSecretsManager(config));
161
61
 
162
62
  /**
163
63
  * Executes the specified workflow with the secrets manager configuration provider.
package/src/index.ts CHANGED
@@ -1,15 +1,3 @@
1
- /**
2
- * @since 1.0.0
3
- */
4
- import { fromSecretsManager } from "./ConfigProvider.js";
5
-
6
- export {
7
- /**
8
- * @since 1.0.0
9
- */
10
- fromSecretsManager,
11
- };
12
-
13
1
  /**
14
2
  * @since 1.2.0
15
3
  */
@@ -1,38 +0,0 @@
1
- /**
2
- * @since 1.0.0
3
- */
4
- import { SecretsManagerService } from "@effect-aws/client-secrets-manager";
5
- import { ConfigProvider, Effect, Layer } from "effect";
6
- /**
7
- * @since 1.2.0
8
- * @category models
9
- */
10
- export interface FromSecretsManagerConfig {
11
- readonly pathDelim: string;
12
- }
13
- /**
14
- * A config provider that loads configuration from AWS Secrets Manager.
15
- *
16
- * @since 1.0.0
17
- * @category constructors
18
- *
19
- * @deprecated Use `ConfigProvider.withSecretsManagerConfigProvider` or `ConfigProvider.setSecretsManagerConfigProvider` instead.
20
- */
21
- export declare const fromSecretsManager: (config?: Partial<FromSecretsManagerConfig> & {
22
- serviceLayer?: Layer.Layer<SecretsManagerService>;
23
- }) => ConfigProvider.ConfigProvider;
24
- /**
25
- * Sets the current `ConfigProvider` that loads configuration from AWS Secrets Manager.
26
- *
27
- * @since 1.2.0
28
- * @category config
29
- */
30
- export declare const setSecretsManagerConfigProvider: (config?: Partial<FromSecretsManagerConfig>) => Layer.Layer<never, never, SecretsManagerService>;
31
- /**
32
- * Executes the specified workflow with the secrets manager configuration provider.
33
- *
34
- * @since 1.2.0
35
- * @category config
36
- */
37
- export declare const withSecretsManagerConfigProvider: (config?: Partial<FromSecretsManagerConfig>) => <A, E, R>(self: Effect.Effect<A, E, R>) => Effect.Effect<A, E, SecretsManagerService | Exclude<R, never>>;
38
- //# sourceMappingURL=ConfigProvider.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"ConfigProvider.d.ts","sourceRoot":"","sources":["../../src/ConfigProvider.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,qBAAqB,EAAE,MAAM,oCAAoC,CAAC;AAE3E,OAAO,EAIL,cAAc,EAEd,MAAM,EAEN,KAAK,EAGN,MAAM,QAAQ,CAAC;AAEhB;;;GAGG;AACH,MAAM,WAAW,wBAAwB;IACvC,QAAQ,CAAC,SAAS,EAAE,MAAM,CAAC;CAC5B;AAED;;;;;;;GAOG;AACH,eAAO,MAAM,kBAAkB,YACpB,QAAQ,wBAAwB,CAAC,GAAG;IAAE,YAAY,CAAC,EAAE,MAAM,KAAK,CAAC,qBAAqB,CAAC,CAAA;CAAE,KACjG,eAAe,cAyGjB,CAAC;AAEF;;;;;GAKG;AACH,eAAO,MAAM,+BAA+B,YAAa,QAAQ,wBAAwB,CAAC,qDAU7D,CAAC;AAE9B;;;;;GAKG;AACH,eAAO,MAAM,gCAAgC,YAAa,QAAQ,wBAAwB,CAAC,8GAClC,CAAC"}
@@ -1,77 +0,0 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.withSecretsManagerConfigProvider = exports.setSecretsManagerConfigProvider = exports.fromSecretsManager = void 0;
4
- /**
5
- * @since 1.0.0
6
- */
7
- const client_secrets_manager_1 = require("@effect-aws/client-secrets-manager");
8
- const effect_1 = require("effect");
9
- /**
10
- * A config provider that loads configuration from AWS Secrets Manager.
11
- *
12
- * @since 1.0.0
13
- * @category constructors
14
- *
15
- * @deprecated Use `ConfigProvider.withSecretsManagerConfigProvider` or `ConfigProvider.setSecretsManagerConfigProvider` instead.
16
- */
17
- const fromSecretsManager = (config) => {
18
- const { pathDelim, serviceLayer } = Object.assign({}, { pathDelim: "_", serviceLayer: client_secrets_manager_1.SecretsManagerService.defaultLayer }, config);
19
- const makePathString = (path) => (0, effect_1.pipe)(path, effect_1.Array.join(pathDelim));
20
- const unmakePathString = (pathString) => pathString.split(pathDelim);
21
- const load = (path, primitive) => {
22
- const pathString = makePathString(path);
23
- return client_secrets_manager_1.SecretsManagerService.getSecretValue({ SecretId: pathString }).pipe(effect_1.Effect.flatMap((value) => effect_1.Option.fromNullable(value.SecretString)), effect_1.Effect.catchTag("ResourceNotFoundException", () => effect_1.Effect.fail(effect_1.ConfigError.MissingData(path, `Expected ${pathString} to exist in AWS Secrets Manager`))), effect_1.Effect.catchTag("NoSuchElementException", () => effect_1.Effect.fail(effect_1.ConfigError.MissingData(path, `Expected ${pathString} to exist in AWS Secrets Manager`))), effect_1.Effect.catchTag("InvalidParameterException", () => effect_1.Effect.fail(effect_1.ConfigError.InvalidData(path, "Invalid parameter provided to AWS Secrets Manager"))), effect_1.Effect.catchTag("InvalidRequestException", () => effect_1.Effect.fail(effect_1.ConfigError.InvalidData(path, "Invalid request to AWS Secrets Manager"))), effect_1.Effect.catchAllCause((cause) => effect_1.Cause.isFailType(cause) && effect_1.ConfigError.isConfigError(cause.error)
24
- ? effect_1.Effect.fail(cause.error)
25
- : effect_1.Effect.fail(effect_1.ConfigError.SourceUnavailable(path, "Failed to load configuration from AWS Secrets Manager", cause))), effect_1.Effect.flatMap((value) => (0, effect_1.pipe)(primitive.parse(value), effect_1.Effect.mapBoth({
26
- onFailure: effect_1.ConfigError.prefixed(path),
27
- onSuccess: effect_1.Array.of,
28
- }))), effect_1.Effect.provide(serviceLayer));
29
- };
30
- const enumerateChildren = (path) => client_secrets_manager_1.SecretsManagerService.listSecrets({}).pipe(effect_1.Effect.flatMap((secrets) => effect_1.Option.fromNullable(secrets.SecretList)), effect_1.Effect.map(effect_1.Array.map((secret) => effect_1.Option.fromNullable(secret.Name))), effect_1.Effect.flatMap(effect_1.Option.all), effect_1.Effect.orDie, effect_1.Effect.map((keys) => {
31
- const keyPaths = keys.map(unmakePathString);
32
- const filteredKeyPaths = keyPaths
33
- .filter((keyPath) => {
34
- for (let i = 0; i < path.length; i++) {
35
- const pathComponent = (0, effect_1.pipe)(path, effect_1.Array.unsafeGet(i));
36
- const currentElement = keyPath[i];
37
- if (currentElement === undefined ||
38
- pathComponent !== currentElement) {
39
- return false;
40
- }
41
- }
42
- return true;
43
- })
44
- .flatMap((keyPath) => keyPath.slice(path.length, path.length + 1));
45
- return effect_1.HashSet.fromIterable(filteredKeyPaths);
46
- }), effect_1.Effect.provide(serviceLayer));
47
- return effect_1.ConfigProvider.fromFlat(effect_1.ConfigProvider.makeFlat({
48
- load,
49
- enumerateChildren,
50
- patch: effect_1.ConfigProviderPathPatch.empty,
51
- }));
52
- };
53
- exports.fromSecretsManager = fromSecretsManager;
54
- /**
55
- * Sets the current `ConfigProvider` that loads configuration from AWS Secrets Manager.
56
- *
57
- * @since 1.2.0
58
- * @category config
59
- */
60
- const setSecretsManagerConfigProvider = (config) => effect_1.Effect.gen(function* () {
61
- const service = yield* client_secrets_manager_1.SecretsManagerService;
62
- const provider = (0, exports.fromSecretsManager)({
63
- ...config,
64
- serviceLayer: effect_1.Layer.succeed(client_secrets_manager_1.SecretsManagerService, service),
65
- });
66
- return effect_1.Layer.setConfigProvider(provider);
67
- }).pipe(effect_1.Layer.unwrapEffect);
68
- exports.setSecretsManagerConfigProvider = setSecretsManagerConfigProvider;
69
- /**
70
- * Executes the specified workflow with the secrets manager configuration provider.
71
- *
72
- * @since 1.2.0
73
- * @category config
74
- */
75
- const withSecretsManagerConfigProvider = (config) => effect_1.Effect.provide((0, exports.setSecretsManagerConfigProvider)(config));
76
- exports.withSecretsManagerConfigProvider = withSecretsManagerConfigProvider;
77
- //# sourceMappingURL=ConfigProvider.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"ConfigProvider.js","sourceRoot":"","sources":["../../src/ConfigProvider.ts"],"names":[],"mappings":";;;AAAA;;GAEG;AACH,+EAA2E;AAE3E,mCAWgB;AAUhB;;;;;;;GAOG;AACI,MAAM,kBAAkB,GAAG,CAChC,MAAkG,EACnE,EAAE;IACjC,MAAM,EAAE,SAAS,EAAE,YAAY,EAAE,GAAG,MAAM,CAAC,MAAM,CAC/C,EAAE,EACF,EAAE,SAAS,EAAE,GAAG,EAAE,YAAY,EAAE,8CAAqB,CAAC,YAAY,EAAE,EACpE,MAAM,CACP,CAAC;IACF,MAAM,cAAc,GAAG,CAAC,IAA2B,EAAU,EAAE,CAAC,IAAA,aAAI,EAAC,IAAI,EAAE,cAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC;IAClG,MAAM,gBAAgB,GAAG,CAAC,UAAkB,EAAyB,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC;IAEpG,MAAM,IAAI,GAAG,CACX,IAA2B,EAC3B,SAAqC,EACa,EAAE;QACpD,MAAM,UAAU,GAAG,cAAc,CAAC,IAAI,CAAC,CAAC;QACxC,OAAO,8CAAqB,CAAC,cAAc,CAAC,EAAE,QAAQ,EAAE,UAAU,EAAE,CAAC,CAAC,IAAI,CACxE,eAAM,CAAC,OAAO,CAAC,CAAC,KAAK,EAAE,EAAE,CAAC,eAAM,CAAC,YAAY,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,EAClE,eAAM,CAAC,QAAQ,CAAC,2BAA2B,EAAE,GAAG,EAAE,CAChD,eAAM,CAAC,IAAI,CACT,oBAAW,CAAC,WAAW,CACrB,IAAqB,EACrB,YAAY,UAAU,kCAAkC,CACzD,CACF,CAAC,EACJ,eAAM,CAAC,QAAQ,CAAC,wBAAwB,EAAE,GAAG,EAAE,CAC7C,eAAM,CAAC,IAAI,CACT,oBAAW,CAAC,WAAW,CACrB,IAAqB,EACrB,YAAY,UAAU,kCAAkC,CACzD,CACF,CAAC,EACJ,eAAM,CAAC,QAAQ,CAAC,2BAA2B,EAAE,GAAG,EAAE,CAChD,eAAM,CAAC,IAAI,CACT,oBAAW,CAAC,WAAW,CACrB,IAAqB,EACrB,mDAAmD,CACpD,CACF,CAAC,EACJ,eAAM,CAAC,QAAQ,CAAC,yBAAyB,EAAE,GAAG,EAAE,CAC9C,eAAM,CAAC,IAAI,CACT,oBAAW,CAAC,WAAW,CACrB,IAAqB,EACrB,wCAAwC,CACzC,CACF,CAAC,EACJ,eAAM,CAAC,aAAa,CAAC,CAAC,KAAK,EAAE,EAAE,CAC7B,cAAK,CAAC,UAAU,CAAC,KAAK,CAAC,IAAI,oBAAW,CAAC,aAAa,CAAC,KAAK,CAAC,KAAK,CAAC;YAC/D,CAAC,CAAC,eAAM,CAAC,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC;YAC1B,CAAC,CAAC,eAAM,CAAC,IAAI,CACX,oBAAW,CAAC,iBAAiB,CAC3B,IAAqB,EACrB,uDAAuD,EACvD,KAAK,CACN,CACF,CACJ,EACD,eAAM,CAAC,OAAO,CAAC,CAAC,KAAK,EAAE,EAAE,CACvB,IAAA,aAAI,EACF,SAAS,CAAC,KAAK,CAAC,KAAK,CAAC,EACtB,eAAM,CAAC,OAAO,CAAC;YACb,SAAS,EAAE,oBAAW,CAAC,QAAQ,CAAC,IAAqB,CAAC;YACtD,SAAS,EAAE,cAAK,CAAC,EAAE;SACpB,CAAC,CACH,CACF,EACD,eAAM,CAAC,OAAO,CAAC,YAAY,CAAC,CAC7B,CAAC;IACJ,CAAC,CAAC;IAEF,MAAM,iBAAiB,GAAG,CACxB,IAA2B,EACsC,EAAE,CACnE,8CAAqB,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC,IAAI,CACxC,eAAM,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,eAAM,CAAC,YAAY,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,EACpE,eAAM,CAAC,GAAG,CAAC,cAAK,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,eAAM,CAAC,YAAY,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,EACnE,eAAM,CAAC,OAAO,CAAC,eAAM,CAAC,GAAG,CAAC,EAC1B,eAAM,CAAC,KAAK,EACZ,eAAM,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE;QAClB,MAAM,QAAQ,GAAG,IAAI,CAAC,GAAG,CAAC,gBAAgB,CAAC,CAAC;QAC5C,MAAM,gBAAgB,GAAG,QAAQ;aAC9B,MAAM,CAAC,CAAC,OAAO,EAAE,EAAE;YAClB,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,IAAI,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;gBACrC,MAAM,aAAa,GAAG,IAAA,aAAI,EAAC,IAAI,EAAE,cAAK,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC;gBACrD,MAAM,cAAc,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;gBAClC,IACE,cAAc,KAAK,SAAS;oBAC5B,aAAa,KAAK,cAAc,EAChC,CAAC;oBACD,OAAO,KAAK,CAAC;gBACf,CAAC;YACH,CAAC;YACD,OAAO,IAAI,CAAC;QACd,CAAC,CAAC;aACD,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,CAAC;QACrE,OAAO,gBAAO,CAAC,YAAY,CAAC,gBAAgB,CAAC,CAAC;IAChD,CAAC,CAAC,EACF,eAAM,CAAC,OAAO,CAAC,YAAY,CAAC,CAC7B,CAAC;IAEJ,OAAO,uBAAc,CAAC,QAAQ,CAC5B,uBAAc,CAAC,QAAQ,CAAC;QACtB,IAAI;QACJ,iBAAiB;QACjB,KAAK,EAAE,gCAAuB,CAAC,KAAK;KACrC,CAAC,CACH,CAAC;AACJ,CAAC,CAAC;AA3GW,QAAA,kBAAkB,sBA2G7B;AAEF;;;;;GAKG;AACI,MAAM,+BAA+B,GAAG,CAAC,MAA0C,EAAE,EAAE,CAC5F,eAAM,CAAC,GAAG,CAAC,QAAQ,CAAC;IAClB,MAAM,OAAO,GAAG,KAAK,CAAC,CAAC,8CAAqB,CAAC;IAE7C,MAAM,QAAQ,GAAG,IAAA,0BAAkB,EAAC;QAClC,GAAG,MAAM;QACT,YAAY,EAAE,cAAK,CAAC,OAAO,CAAC,8CAAqB,EAAE,OAAO,CAAC;KAC5D,CAAC,CAAC;IAEH,OAAO,cAAK,CAAC,iBAAiB,CAAC,QAAQ,CAAC,CAAC;AAC3C,CAAC,CAAC,CAAC,IAAI,CAAC,cAAK,CAAC,YAAY,CAAC,CAAC;AAVjB,QAAA,+BAA+B,mCAUd;AAE9B;;;;;GAKG;AACI,MAAM,gCAAgC,GAAG,CAAC,MAA0C,EAAE,EAAE,CAC7F,eAAM,CAAC,OAAO,CAAC,IAAA,uCAA+B,EAAC,MAAM,CAAC,CAAC,CAAC;AAD7C,QAAA,gCAAgC,oCACa"}
@@ -1,14 +0,0 @@
1
- /**
2
- * @since 1.0.0
3
- */
4
- import { fromSecretsManager } from "./ConfigProvider.js";
5
- export {
6
- /**
7
- * @since 1.0.0
8
- */
9
- fromSecretsManager, };
10
- /**
11
- * @since 1.2.0
12
- */
13
- export * as ConfigProvider from "./ConfigProvider.js";
14
- //# sourceMappingURL=index.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,kBAAkB,EAAE,MAAM,qBAAqB,CAAC;AAEzD,OAAO;AACL;;GAEG;AACH,kBAAkB,GACnB,CAAC;AAEF;;GAEG;AACH,OAAO,KAAK,cAAc,MAAM,qBAAqB,CAAC"}
package/dist/cjs/index.js DELETED
@@ -1,36 +0,0 @@
1
- "use strict";
2
- var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
- if (k2 === undefined) k2 = k;
4
- var desc = Object.getOwnPropertyDescriptor(m, k);
5
- if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
- desc = { enumerable: true, get: function() { return m[k]; } };
7
- }
8
- Object.defineProperty(o, k2, desc);
9
- }) : (function(o, m, k, k2) {
10
- if (k2 === undefined) k2 = k;
11
- o[k2] = m[k];
12
- }));
13
- var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
- Object.defineProperty(o, "default", { enumerable: true, value: v });
15
- }) : function(o, v) {
16
- o["default"] = v;
17
- });
18
- var __importStar = (this && this.__importStar) || function (mod) {
19
- if (mod && mod.__esModule) return mod;
20
- var result = {};
21
- if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
22
- __setModuleDefault(result, mod);
23
- return result;
24
- };
25
- Object.defineProperty(exports, "__esModule", { value: true });
26
- exports.ConfigProvider = exports.fromSecretsManager = void 0;
27
- /**
28
- * @since 1.0.0
29
- */
30
- const ConfigProvider_js_1 = require("./ConfigProvider.js");
31
- Object.defineProperty(exports, "fromSecretsManager", { enumerable: true, get: function () { return ConfigProvider_js_1.fromSecretsManager; } });
32
- /**
33
- * @since 1.2.0
34
- */
35
- exports.ConfigProvider = __importStar(require("./ConfigProvider.js"));
36
- //# sourceMappingURL=index.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;AAAA;;GAEG;AACH,2DAAyD;AAMvD,mGANO,sCAAkB,OAMP;AAGpB;;GAEG;AACH,sEAAsD"}