@effect-aws/secrets-manager 1.3.3 → 2.0.0-beta.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +1 -1
- package/dist/dts/ConfigProvider.d.ts +3 -5
- package/dist/dts/ConfigProvider.d.ts.map +1 -1
- package/dist/dts/index.d.ts +0 -9
- package/dist/dts/index.d.ts.map +1 -1
- package/dist/esm/ConfigProvider.js +14 -44
- package/dist/esm/ConfigProvider.js.map +1 -1
- package/dist/esm/index.js +0 -9
- package/dist/esm/index.js.map +1 -1
- package/package.json +5 -8
- package/src/ConfigProvider.ts +28 -128
- package/src/index.ts +0 -12
- package/dist/cjs/ConfigProvider.d.ts +0 -38
- package/dist/cjs/ConfigProvider.d.ts.map +0 -1
- package/dist/cjs/ConfigProvider.js +0 -77
- package/dist/cjs/ConfigProvider.js.map +0 -1
- package/dist/cjs/index.d.ts +0 -14
- package/dist/cjs/index.d.ts.map +0 -1
- package/dist/cjs/index.js +0 -36
- package/dist/cjs/index.js.map +0 -1
package/LICENSE
CHANGED
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
* @since 1.0.0
|
|
3
3
|
*/
|
|
4
4
|
import { SecretsManagerService } from "@effect-aws/client-secrets-manager";
|
|
5
|
-
import { ConfigProvider, Effect
|
|
5
|
+
import { ConfigProvider, Effect } from "effect";
|
|
6
6
|
/**
|
|
7
7
|
* @since 1.2.0
|
|
8
8
|
* @category models
|
|
@@ -18,16 +18,14 @@ export interface FromSecretsManagerConfig {
|
|
|
18
18
|
*
|
|
19
19
|
* @deprecated Use `ConfigProvider.withSecretsManagerConfigProvider` or `ConfigProvider.setSecretsManagerConfigProvider` instead.
|
|
20
20
|
*/
|
|
21
|
-
export declare const fromSecretsManager: (config?: Partial<FromSecretsManagerConfig>
|
|
22
|
-
serviceLayer?: Layer.Layer<SecretsManagerService>;
|
|
23
|
-
}) => ConfigProvider.ConfigProvider;
|
|
21
|
+
export declare const fromSecretsManager: (config?: Partial<FromSecretsManagerConfig>) => Effect.Effect<ConfigProvider.ConfigProvider, never, SecretsManagerService>;
|
|
24
22
|
/**
|
|
25
23
|
* Sets the current `ConfigProvider` that loads configuration from AWS Secrets Manager.
|
|
26
24
|
*
|
|
27
25
|
* @since 1.2.0
|
|
28
26
|
* @category config
|
|
29
27
|
*/
|
|
30
|
-
export declare const setSecretsManagerConfigProvider: (config?: Partial<FromSecretsManagerConfig>) => Layer.Layer<never, never, SecretsManagerService>;
|
|
28
|
+
export declare const setSecretsManagerConfigProvider: (config?: Partial<FromSecretsManagerConfig>) => import("effect/Layer").Layer<never, never, SecretsManagerService>;
|
|
31
29
|
/**
|
|
32
30
|
* Executes the specified workflow with the secrets manager configuration provider.
|
|
33
31
|
*
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"ConfigProvider.d.ts","sourceRoot":"","sources":["../../src/ConfigProvider.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,qBAAqB,EAAE,MAAM,oCAAoC,CAAC;
|
|
1
|
+
{"version":3,"file":"ConfigProvider.d.ts","sourceRoot":"","sources":["../../src/ConfigProvider.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,qBAAqB,EAAE,MAAM,oCAAoC,CAAC;AAC3E,OAAO,EAAS,cAAc,EAAE,MAAM,EAAgB,MAAM,QAAQ,CAAC;AAErE;;;GAGG;AACH,MAAM,WAAW,wBAAwB;IACvC,QAAQ,CAAC,SAAS,EAAE,MAAM,CAAC;CAC5B;AAED;;;;;;;GAOG;AACH,eAAO,MAAM,kBAAkB,EAAE,CAAC,MAAM,CAAC,EAAE,OAAO,CAAC,wBAAwB,CAAC,KAAK,MAAM,CAAC,MAAM,CAC5F,cAAc,CAAC,cAAc,EAC7B,KAAK,EACL,qBAAqB,CAyBpB,CAAC;AAEJ;;;;;GAKG;AACH,eAAO,MAAM,+BAA+B,YAAa,QAAQ,wBAAwB,CAAC,sEACxC,CAAC;AAEnD;;;;;GAKG;AACH,eAAO,MAAM,gCAAgC,YAAa,QAAQ,wBAAwB,CAAC,8GAClC,CAAC"}
|
package/dist/dts/index.d.ts
CHANGED
package/dist/dts/index.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,KAAK,cAAc,MAAM,qBAAqB,CAAC"}
|
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
* @since 1.0.0
|
|
3
3
|
*/
|
|
4
4
|
import { SecretsManagerService } from "@effect-aws/client-secrets-manager";
|
|
5
|
-
import { Array,
|
|
5
|
+
import { Array, ConfigProvider, Effect, Option, pipe } from "effect";
|
|
6
6
|
/**
|
|
7
7
|
* A config provider that loads configuration from AWS Secrets Manager.
|
|
8
8
|
*
|
|
@@ -11,56 +11,26 @@ import { Array, Cause, ConfigError, ConfigProvider, ConfigProviderPathPatch, Eff
|
|
|
11
11
|
*
|
|
12
12
|
* @deprecated Use `ConfigProvider.withSecretsManagerConfigProvider` or `ConfigProvider.setSecretsManagerConfigProvider` instead.
|
|
13
13
|
*/
|
|
14
|
-
export const fromSecretsManager =
|
|
15
|
-
|
|
14
|
+
export const fromSecretsManager = Effect
|
|
15
|
+
.fnUntraced(function* (config) {
|
|
16
|
+
const { pathDelim } = Object.assign({}, { pathDelim: "_" }, config);
|
|
16
17
|
const makePathString = (path) => pipe(path, Array.join(pathDelim));
|
|
17
|
-
const
|
|
18
|
-
|
|
19
|
-
const pathString = makePathString(path);
|
|
20
|
-
return
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
};
|
|
27
|
-
const enumerateChildren = (path) => SecretsManagerService.listSecrets({}).pipe(Effect.flatMap((secrets) => Option.fromNullable(secrets.SecretList)), Effect.map(Array.map((secret) => Option.fromNullable(secret.Name))), Effect.flatMap(Option.all), Effect.orDie, Effect.map((keys) => {
|
|
28
|
-
const keyPaths = keys.map(unmakePathString);
|
|
29
|
-
const filteredKeyPaths = keyPaths
|
|
30
|
-
.filter((keyPath) => {
|
|
31
|
-
for (let i = 0; i < path.length; i++) {
|
|
32
|
-
const pathComponent = pipe(path, Array.unsafeGet(i));
|
|
33
|
-
const currentElement = keyPath[i];
|
|
34
|
-
if (currentElement === undefined ||
|
|
35
|
-
pathComponent !== currentElement) {
|
|
36
|
-
return false;
|
|
37
|
-
}
|
|
38
|
-
}
|
|
39
|
-
return true;
|
|
40
|
-
})
|
|
41
|
-
.flatMap((keyPath) => keyPath.slice(path.length, path.length + 1));
|
|
42
|
-
return HashSet.fromIterable(filteredKeyPaths);
|
|
43
|
-
}), Effect.provide(serviceLayer));
|
|
44
|
-
return ConfigProvider.fromFlat(ConfigProvider.makeFlat({
|
|
45
|
-
load,
|
|
46
|
-
enumerateChildren,
|
|
47
|
-
patch: ConfigProviderPathPatch.empty,
|
|
48
|
-
}));
|
|
49
|
-
};
|
|
18
|
+
const svc = yield* SecretsManagerService;
|
|
19
|
+
return ConfigProvider.make((path) => {
|
|
20
|
+
const pathString = makePathString(path.map(String));
|
|
21
|
+
return svc.getSecretValue({ SecretId: pathString }).pipe(Effect.map((value) => Option.fromNullishOr(value.SecretString)), Effect.catchTag("ResourceNotFoundException", () => Effect.succeedNone), Effect.map(Option.map(ConfigProvider.makeValue)), Effect.map(Option.getOrUndefined), Effect.mapError((cause) => new ConfigProvider.SourceError({
|
|
22
|
+
message: "Failed to load configuration from AWS Secrets Manager",
|
|
23
|
+
cause,
|
|
24
|
+
})));
|
|
25
|
+
});
|
|
26
|
+
});
|
|
50
27
|
/**
|
|
51
28
|
* Sets the current `ConfigProvider` that loads configuration from AWS Secrets Manager.
|
|
52
29
|
*
|
|
53
30
|
* @since 1.2.0
|
|
54
31
|
* @category config
|
|
55
32
|
*/
|
|
56
|
-
export const setSecretsManagerConfigProvider = (config) =>
|
|
57
|
-
const service = yield* SecretsManagerService;
|
|
58
|
-
const provider = fromSecretsManager({
|
|
59
|
-
...config,
|
|
60
|
-
serviceLayer: Layer.succeed(SecretsManagerService, service),
|
|
61
|
-
});
|
|
62
|
-
return Layer.setConfigProvider(provider);
|
|
63
|
-
}).pipe(Layer.unwrapEffect);
|
|
33
|
+
export const setSecretsManagerConfigProvider = (config) => ConfigProvider.layer(fromSecretsManager(config));
|
|
64
34
|
/**
|
|
65
35
|
* Executes the specified workflow with the secrets manager configuration provider.
|
|
66
36
|
*
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"ConfigProvider.js","sourceRoot":"","sources":["../../src/ConfigProvider.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,qBAAqB,EAAE,MAAM,oCAAoC,CAAC;
|
|
1
|
+
{"version":3,"file":"ConfigProvider.js","sourceRoot":"","sources":["../../src/ConfigProvider.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,qBAAqB,EAAE,MAAM,oCAAoC,CAAC;AAC3E,OAAO,EAAE,KAAK,EAAE,cAAc,EAAE,MAAM,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,QAAQ,CAAC;AAUrE;;;;;;;GAOG;AACH,MAAM,CAAC,MAAM,kBAAkB,GAI3B,MAAM;KACP,UAAU,CACT,QAAQ,CAAC,EAAC,MAAM;IACd,MAAM,EAAE,SAAS,EAAE,GAAG,MAAM,CAAC,MAAM,CAAC,EAAE,EAAE,EAAE,SAAS,EAAE,GAAG,EAAE,EAAE,MAAM,CAAC,CAAC;IACpE,MAAM,cAAc,GAAG,CAAC,IAA2B,EAAU,EAAE,CAAC,IAAI,CAAC,IAAI,EAAE,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC;IAElG,MAAM,GAAG,GAAG,KAAK,CAAC,CAAC,qBAAqB,CAAC;IAEzC,OAAO,cAAc,CAAC,IAAI,CAAC,CAAC,IAAI,EAAE,EAAE;QAClC,MAAM,UAAU,GAAG,cAAc,CAAC,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC;QACpD,OAAO,GAAG,CAAC,cAAc,CAAC,EAAE,QAAQ,EAAE,UAAU,EAAE,CAAC,CAAC,IAAI,CACtD,MAAM,CAAC,GAAG,CAAC,CAAC,KAAK,EAAE,EAAE,CAAC,MAAM,CAAC,aAAa,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,EAC/D,MAAM,CAAC,QAAQ,CAAC,2BAA2B,EAAE,GAAG,EAAE,CAAC,MAAM,CAAC,WAAW,CAAC,EACtE,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC,EAChD,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,cAAc,CAAC,EACjC,MAAM,CAAC,QAAQ,CAAC,CAAC,KAAK,EAAE,EAAE,CACxB,IAAI,cAAc,CAAC,WAAW,CAAC;YAC7B,OAAO,EAAE,uDAAuD;YAChE,KAAK;SACN,CAAC,CACH,CACF,CAAC;IACJ,CAAC,CAAC,CAAC;AACL,CAAC,CACF,CAAC;AAEJ;;;;;GAKG;AACH,MAAM,CAAC,MAAM,+BAA+B,GAAG,CAAC,MAA0C,EAAE,EAAE,CAC5F,cAAc,CAAC,KAAK,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC,CAAC;AAEnD;;;;;GAKG;AACH,MAAM,CAAC,MAAM,gCAAgC,GAAG,CAAC,MAA0C,EAAE,EAAE,CAC7F,MAAM,CAAC,OAAO,CAAC,+BAA+B,CAAC,MAAM,CAAC,CAAC,CAAC"}
|
package/dist/esm/index.js
CHANGED
package/dist/esm/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,KAAK,cAAc,MAAM,qBAAqB,CAAC"}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@effect-aws/secrets-manager",
|
|
3
|
-
"version": "
|
|
3
|
+
"version": "2.0.0-beta.0",
|
|
4
4
|
"description": "Effectful AWS Secrets Manager functions",
|
|
5
5
|
"license": "MIT",
|
|
6
6
|
"repository": {
|
|
@@ -15,23 +15,20 @@
|
|
|
15
15
|
},
|
|
16
16
|
"homepage": "https://floydspace.github.io/effect-aws/docs/secrets-manager",
|
|
17
17
|
"peerDependencies": {
|
|
18
|
-
"effect": ">=
|
|
19
|
-
"@effect-aws/client-secrets-manager": "^
|
|
18
|
+
"effect": ">=4.0.0 <5.0.0",
|
|
19
|
+
"@effect-aws/client-secrets-manager": "^2.0.0-beta.0"
|
|
20
20
|
},
|
|
21
|
-
"main": "./dist/cjs/index.js",
|
|
22
21
|
"module": "./dist/esm/index.js",
|
|
23
22
|
"types": "./dist/dts/index.d.ts",
|
|
24
23
|
"exports": {
|
|
25
24
|
"./package.json": "./package.json",
|
|
26
25
|
".": {
|
|
27
26
|
"types": "./dist/dts/index.d.ts",
|
|
28
|
-
"import": "./dist/esm/index.js"
|
|
29
|
-
"default": "./dist/cjs/index.js"
|
|
27
|
+
"import": "./dist/esm/index.js"
|
|
30
28
|
},
|
|
31
29
|
"./ConfigProvider": {
|
|
32
30
|
"types": "./dist/dts/ConfigProvider.d.ts",
|
|
33
|
-
"import": "./dist/esm/ConfigProvider.js"
|
|
34
|
-
"default": "./dist/cjs/ConfigProvider.js"
|
|
31
|
+
"import": "./dist/esm/ConfigProvider.js"
|
|
35
32
|
}
|
|
36
33
|
},
|
|
37
34
|
"typesVersions": {
|
package/src/ConfigProvider.ts
CHANGED
|
@@ -2,19 +2,7 @@
|
|
|
2
2
|
* @since 1.0.0
|
|
3
3
|
*/
|
|
4
4
|
import { SecretsManagerService } from "@effect-aws/client-secrets-manager";
|
|
5
|
-
import
|
|
6
|
-
import {
|
|
7
|
-
Array,
|
|
8
|
-
Cause,
|
|
9
|
-
ConfigError,
|
|
10
|
-
ConfigProvider,
|
|
11
|
-
ConfigProviderPathPatch,
|
|
12
|
-
Effect,
|
|
13
|
-
HashSet,
|
|
14
|
-
Layer,
|
|
15
|
-
Option,
|
|
16
|
-
pipe,
|
|
17
|
-
} from "effect";
|
|
5
|
+
import { Array, ConfigProvider, Effect, Option, pipe } from "effect";
|
|
18
6
|
|
|
19
7
|
/**
|
|
20
8
|
* @since 1.2.0
|
|
@@ -32,114 +20,35 @@ export interface FromSecretsManagerConfig {
|
|
|
32
20
|
*
|
|
33
21
|
* @deprecated Use `ConfigProvider.withSecretsManagerConfigProvider` or `ConfigProvider.setSecretsManagerConfigProvider` instead.
|
|
34
22
|
*/
|
|
35
|
-
export const fromSecretsManager
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
config
|
|
42
|
-
|
|
43
|
-
|
|
44
|
-
const unmakePathString = (pathString: string): ReadonlyArray<string> => pathString.split(pathDelim);
|
|
23
|
+
export const fromSecretsManager: (config?: Partial<FromSecretsManagerConfig>) => Effect.Effect<
|
|
24
|
+
ConfigProvider.ConfigProvider,
|
|
25
|
+
never,
|
|
26
|
+
SecretsManagerService
|
|
27
|
+
> = Effect
|
|
28
|
+
.fnUntraced(
|
|
29
|
+
function*(config) {
|
|
30
|
+
const { pathDelim } = Object.assign({}, { pathDelim: "_" }, config);
|
|
31
|
+
const makePathString = (path: ReadonlyArray<string>): string => pipe(path, Array.join(pathDelim));
|
|
45
32
|
|
|
46
|
-
|
|
47
|
-
path: ReadonlyArray<string>,
|
|
48
|
-
primitive: Config.Config.Primitive<A>,
|
|
49
|
-
): Effect.Effect<Array<A>, ConfigError.ConfigError> => {
|
|
50
|
-
const pathString = makePathString(path);
|
|
51
|
-
return SecretsManagerService.getSecretValue({ SecretId: pathString }).pipe(
|
|
52
|
-
Effect.flatMap((value) => Option.fromNullable(value.SecretString)),
|
|
53
|
-
Effect.catchTag("ResourceNotFoundException", () =>
|
|
54
|
-
Effect.fail(
|
|
55
|
-
ConfigError.MissingData(
|
|
56
|
-
path as Array<string>,
|
|
57
|
-
`Expected ${pathString} to exist in AWS Secrets Manager`,
|
|
58
|
-
),
|
|
59
|
-
)),
|
|
60
|
-
Effect.catchTag("NoSuchElementException", () =>
|
|
61
|
-
Effect.fail(
|
|
62
|
-
ConfigError.MissingData(
|
|
63
|
-
path as Array<string>,
|
|
64
|
-
`Expected ${pathString} to exist in AWS Secrets Manager`,
|
|
65
|
-
),
|
|
66
|
-
)),
|
|
67
|
-
Effect.catchTag("InvalidParameterException", () =>
|
|
68
|
-
Effect.fail(
|
|
69
|
-
ConfigError.InvalidData(
|
|
70
|
-
path as Array<string>,
|
|
71
|
-
"Invalid parameter provided to AWS Secrets Manager",
|
|
72
|
-
),
|
|
73
|
-
)),
|
|
74
|
-
Effect.catchTag("InvalidRequestException", () =>
|
|
75
|
-
Effect.fail(
|
|
76
|
-
ConfigError.InvalidData(
|
|
77
|
-
path as Array<string>,
|
|
78
|
-
"Invalid request to AWS Secrets Manager",
|
|
79
|
-
),
|
|
80
|
-
)),
|
|
81
|
-
Effect.catchAllCause((cause) =>
|
|
82
|
-
Cause.isFailType(cause) && ConfigError.isConfigError(cause.error)
|
|
83
|
-
? Effect.fail(cause.error)
|
|
84
|
-
: Effect.fail(
|
|
85
|
-
ConfigError.SourceUnavailable(
|
|
86
|
-
path as Array<string>,
|
|
87
|
-
"Failed to load configuration from AWS Secrets Manager",
|
|
88
|
-
cause,
|
|
89
|
-
),
|
|
90
|
-
)
|
|
91
|
-
),
|
|
92
|
-
Effect.flatMap((value) =>
|
|
93
|
-
pipe(
|
|
94
|
-
primitive.parse(value),
|
|
95
|
-
Effect.mapBoth({
|
|
96
|
-
onFailure: ConfigError.prefixed(path as Array<string>),
|
|
97
|
-
onSuccess: Array.of,
|
|
98
|
-
}),
|
|
99
|
-
)
|
|
100
|
-
),
|
|
101
|
-
Effect.provide(serviceLayer),
|
|
102
|
-
);
|
|
103
|
-
};
|
|
33
|
+
const svc = yield* SecretsManagerService;
|
|
104
34
|
|
|
105
|
-
|
|
106
|
-
|
|
107
|
-
|
|
108
|
-
|
|
109
|
-
|
|
110
|
-
|
|
111
|
-
|
|
112
|
-
|
|
113
|
-
|
|
114
|
-
|
|
115
|
-
|
|
116
|
-
|
|
117
|
-
|
|
118
|
-
|
|
119
|
-
|
|
120
|
-
|
|
121
|
-
currentElement === undefined ||
|
|
122
|
-
pathComponent !== currentElement
|
|
123
|
-
) {
|
|
124
|
-
return false;
|
|
125
|
-
}
|
|
126
|
-
}
|
|
127
|
-
return true;
|
|
128
|
-
})
|
|
129
|
-
.flatMap((keyPath) => keyPath.slice(path.length, path.length + 1));
|
|
130
|
-
return HashSet.fromIterable(filteredKeyPaths);
|
|
131
|
-
}),
|
|
132
|
-
Effect.provide(serviceLayer),
|
|
133
|
-
);
|
|
134
|
-
|
|
135
|
-
return ConfigProvider.fromFlat(
|
|
136
|
-
ConfigProvider.makeFlat({
|
|
137
|
-
load,
|
|
138
|
-
enumerateChildren,
|
|
139
|
-
patch: ConfigProviderPathPatch.empty,
|
|
140
|
-
}),
|
|
35
|
+
return ConfigProvider.make((path) => {
|
|
36
|
+
const pathString = makePathString(path.map(String));
|
|
37
|
+
return svc.getSecretValue({ SecretId: pathString }).pipe(
|
|
38
|
+
Effect.map((value) => Option.fromNullishOr(value.SecretString)),
|
|
39
|
+
Effect.catchTag("ResourceNotFoundException", () => Effect.succeedNone),
|
|
40
|
+
Effect.map(Option.map(ConfigProvider.makeValue)),
|
|
41
|
+
Effect.map(Option.getOrUndefined),
|
|
42
|
+
Effect.mapError((cause) =>
|
|
43
|
+
new ConfigProvider.SourceError({
|
|
44
|
+
message: "Failed to load configuration from AWS Secrets Manager",
|
|
45
|
+
cause,
|
|
46
|
+
})
|
|
47
|
+
),
|
|
48
|
+
);
|
|
49
|
+
});
|
|
50
|
+
},
|
|
141
51
|
);
|
|
142
|
-
};
|
|
143
52
|
|
|
144
53
|
/**
|
|
145
54
|
* Sets the current `ConfigProvider` that loads configuration from AWS Secrets Manager.
|
|
@@ -148,16 +57,7 @@ export const fromSecretsManager = (
|
|
|
148
57
|
* @category config
|
|
149
58
|
*/
|
|
150
59
|
export const setSecretsManagerConfigProvider = (config?: Partial<FromSecretsManagerConfig>) =>
|
|
151
|
-
|
|
152
|
-
const service = yield* SecretsManagerService;
|
|
153
|
-
|
|
154
|
-
const provider = fromSecretsManager({
|
|
155
|
-
...config,
|
|
156
|
-
serviceLayer: Layer.succeed(SecretsManagerService, service),
|
|
157
|
-
});
|
|
158
|
-
|
|
159
|
-
return Layer.setConfigProvider(provider);
|
|
160
|
-
}).pipe(Layer.unwrapEffect);
|
|
60
|
+
ConfigProvider.layer(fromSecretsManager(config));
|
|
161
61
|
|
|
162
62
|
/**
|
|
163
63
|
* Executes the specified workflow with the secrets manager configuration provider.
|
package/src/index.ts
CHANGED
|
@@ -1,38 +0,0 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* @since 1.0.0
|
|
3
|
-
*/
|
|
4
|
-
import { SecretsManagerService } from "@effect-aws/client-secrets-manager";
|
|
5
|
-
import { ConfigProvider, Effect, Layer } from "effect";
|
|
6
|
-
/**
|
|
7
|
-
* @since 1.2.0
|
|
8
|
-
* @category models
|
|
9
|
-
*/
|
|
10
|
-
export interface FromSecretsManagerConfig {
|
|
11
|
-
readonly pathDelim: string;
|
|
12
|
-
}
|
|
13
|
-
/**
|
|
14
|
-
* A config provider that loads configuration from AWS Secrets Manager.
|
|
15
|
-
*
|
|
16
|
-
* @since 1.0.0
|
|
17
|
-
* @category constructors
|
|
18
|
-
*
|
|
19
|
-
* @deprecated Use `ConfigProvider.withSecretsManagerConfigProvider` or `ConfigProvider.setSecretsManagerConfigProvider` instead.
|
|
20
|
-
*/
|
|
21
|
-
export declare const fromSecretsManager: (config?: Partial<FromSecretsManagerConfig> & {
|
|
22
|
-
serviceLayer?: Layer.Layer<SecretsManagerService>;
|
|
23
|
-
}) => ConfigProvider.ConfigProvider;
|
|
24
|
-
/**
|
|
25
|
-
* Sets the current `ConfigProvider` that loads configuration from AWS Secrets Manager.
|
|
26
|
-
*
|
|
27
|
-
* @since 1.2.0
|
|
28
|
-
* @category config
|
|
29
|
-
*/
|
|
30
|
-
export declare const setSecretsManagerConfigProvider: (config?: Partial<FromSecretsManagerConfig>) => Layer.Layer<never, never, SecretsManagerService>;
|
|
31
|
-
/**
|
|
32
|
-
* Executes the specified workflow with the secrets manager configuration provider.
|
|
33
|
-
*
|
|
34
|
-
* @since 1.2.0
|
|
35
|
-
* @category config
|
|
36
|
-
*/
|
|
37
|
-
export declare const withSecretsManagerConfigProvider: (config?: Partial<FromSecretsManagerConfig>) => <A, E, R>(self: Effect.Effect<A, E, R>) => Effect.Effect<A, E, SecretsManagerService | Exclude<R, never>>;
|
|
38
|
-
//# sourceMappingURL=ConfigProvider.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"ConfigProvider.d.ts","sourceRoot":"","sources":["../../src/ConfigProvider.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,qBAAqB,EAAE,MAAM,oCAAoC,CAAC;AAE3E,OAAO,EAIL,cAAc,EAEd,MAAM,EAEN,KAAK,EAGN,MAAM,QAAQ,CAAC;AAEhB;;;GAGG;AACH,MAAM,WAAW,wBAAwB;IACvC,QAAQ,CAAC,SAAS,EAAE,MAAM,CAAC;CAC5B;AAED;;;;;;;GAOG;AACH,eAAO,MAAM,kBAAkB,YACpB,QAAQ,wBAAwB,CAAC,GAAG;IAAE,YAAY,CAAC,EAAE,MAAM,KAAK,CAAC,qBAAqB,CAAC,CAAA;CAAE,KACjG,eAAe,cAyGjB,CAAC;AAEF;;;;;GAKG;AACH,eAAO,MAAM,+BAA+B,YAAa,QAAQ,wBAAwB,CAAC,qDAU7D,CAAC;AAE9B;;;;;GAKG;AACH,eAAO,MAAM,gCAAgC,YAAa,QAAQ,wBAAwB,CAAC,8GAClC,CAAC"}
|
|
@@ -1,77 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.withSecretsManagerConfigProvider = exports.setSecretsManagerConfigProvider = exports.fromSecretsManager = void 0;
|
|
4
|
-
/**
|
|
5
|
-
* @since 1.0.0
|
|
6
|
-
*/
|
|
7
|
-
const client_secrets_manager_1 = require("@effect-aws/client-secrets-manager");
|
|
8
|
-
const effect_1 = require("effect");
|
|
9
|
-
/**
|
|
10
|
-
* A config provider that loads configuration from AWS Secrets Manager.
|
|
11
|
-
*
|
|
12
|
-
* @since 1.0.0
|
|
13
|
-
* @category constructors
|
|
14
|
-
*
|
|
15
|
-
* @deprecated Use `ConfigProvider.withSecretsManagerConfigProvider` or `ConfigProvider.setSecretsManagerConfigProvider` instead.
|
|
16
|
-
*/
|
|
17
|
-
const fromSecretsManager = (config) => {
|
|
18
|
-
const { pathDelim, serviceLayer } = Object.assign({}, { pathDelim: "_", serviceLayer: client_secrets_manager_1.SecretsManagerService.defaultLayer }, config);
|
|
19
|
-
const makePathString = (path) => (0, effect_1.pipe)(path, effect_1.Array.join(pathDelim));
|
|
20
|
-
const unmakePathString = (pathString) => pathString.split(pathDelim);
|
|
21
|
-
const load = (path, primitive) => {
|
|
22
|
-
const pathString = makePathString(path);
|
|
23
|
-
return client_secrets_manager_1.SecretsManagerService.getSecretValue({ SecretId: pathString }).pipe(effect_1.Effect.flatMap((value) => effect_1.Option.fromNullable(value.SecretString)), effect_1.Effect.catchTag("ResourceNotFoundException", () => effect_1.Effect.fail(effect_1.ConfigError.MissingData(path, `Expected ${pathString} to exist in AWS Secrets Manager`))), effect_1.Effect.catchTag("NoSuchElementException", () => effect_1.Effect.fail(effect_1.ConfigError.MissingData(path, `Expected ${pathString} to exist in AWS Secrets Manager`))), effect_1.Effect.catchTag("InvalidParameterException", () => effect_1.Effect.fail(effect_1.ConfigError.InvalidData(path, "Invalid parameter provided to AWS Secrets Manager"))), effect_1.Effect.catchTag("InvalidRequestException", () => effect_1.Effect.fail(effect_1.ConfigError.InvalidData(path, "Invalid request to AWS Secrets Manager"))), effect_1.Effect.catchAllCause((cause) => effect_1.Cause.isFailType(cause) && effect_1.ConfigError.isConfigError(cause.error)
|
|
24
|
-
? effect_1.Effect.fail(cause.error)
|
|
25
|
-
: effect_1.Effect.fail(effect_1.ConfigError.SourceUnavailable(path, "Failed to load configuration from AWS Secrets Manager", cause))), effect_1.Effect.flatMap((value) => (0, effect_1.pipe)(primitive.parse(value), effect_1.Effect.mapBoth({
|
|
26
|
-
onFailure: effect_1.ConfigError.prefixed(path),
|
|
27
|
-
onSuccess: effect_1.Array.of,
|
|
28
|
-
}))), effect_1.Effect.provide(serviceLayer));
|
|
29
|
-
};
|
|
30
|
-
const enumerateChildren = (path) => client_secrets_manager_1.SecretsManagerService.listSecrets({}).pipe(effect_1.Effect.flatMap((secrets) => effect_1.Option.fromNullable(secrets.SecretList)), effect_1.Effect.map(effect_1.Array.map((secret) => effect_1.Option.fromNullable(secret.Name))), effect_1.Effect.flatMap(effect_1.Option.all), effect_1.Effect.orDie, effect_1.Effect.map((keys) => {
|
|
31
|
-
const keyPaths = keys.map(unmakePathString);
|
|
32
|
-
const filteredKeyPaths = keyPaths
|
|
33
|
-
.filter((keyPath) => {
|
|
34
|
-
for (let i = 0; i < path.length; i++) {
|
|
35
|
-
const pathComponent = (0, effect_1.pipe)(path, effect_1.Array.unsafeGet(i));
|
|
36
|
-
const currentElement = keyPath[i];
|
|
37
|
-
if (currentElement === undefined ||
|
|
38
|
-
pathComponent !== currentElement) {
|
|
39
|
-
return false;
|
|
40
|
-
}
|
|
41
|
-
}
|
|
42
|
-
return true;
|
|
43
|
-
})
|
|
44
|
-
.flatMap((keyPath) => keyPath.slice(path.length, path.length + 1));
|
|
45
|
-
return effect_1.HashSet.fromIterable(filteredKeyPaths);
|
|
46
|
-
}), effect_1.Effect.provide(serviceLayer));
|
|
47
|
-
return effect_1.ConfigProvider.fromFlat(effect_1.ConfigProvider.makeFlat({
|
|
48
|
-
load,
|
|
49
|
-
enumerateChildren,
|
|
50
|
-
patch: effect_1.ConfigProviderPathPatch.empty,
|
|
51
|
-
}));
|
|
52
|
-
};
|
|
53
|
-
exports.fromSecretsManager = fromSecretsManager;
|
|
54
|
-
/**
|
|
55
|
-
* Sets the current `ConfigProvider` that loads configuration from AWS Secrets Manager.
|
|
56
|
-
*
|
|
57
|
-
* @since 1.2.0
|
|
58
|
-
* @category config
|
|
59
|
-
*/
|
|
60
|
-
const setSecretsManagerConfigProvider = (config) => effect_1.Effect.gen(function* () {
|
|
61
|
-
const service = yield* client_secrets_manager_1.SecretsManagerService;
|
|
62
|
-
const provider = (0, exports.fromSecretsManager)({
|
|
63
|
-
...config,
|
|
64
|
-
serviceLayer: effect_1.Layer.succeed(client_secrets_manager_1.SecretsManagerService, service),
|
|
65
|
-
});
|
|
66
|
-
return effect_1.Layer.setConfigProvider(provider);
|
|
67
|
-
}).pipe(effect_1.Layer.unwrapEffect);
|
|
68
|
-
exports.setSecretsManagerConfigProvider = setSecretsManagerConfigProvider;
|
|
69
|
-
/**
|
|
70
|
-
* Executes the specified workflow with the secrets manager configuration provider.
|
|
71
|
-
*
|
|
72
|
-
* @since 1.2.0
|
|
73
|
-
* @category config
|
|
74
|
-
*/
|
|
75
|
-
const withSecretsManagerConfigProvider = (config) => effect_1.Effect.provide((0, exports.setSecretsManagerConfigProvider)(config));
|
|
76
|
-
exports.withSecretsManagerConfigProvider = withSecretsManagerConfigProvider;
|
|
77
|
-
//# sourceMappingURL=ConfigProvider.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"ConfigProvider.js","sourceRoot":"","sources":["../../src/ConfigProvider.ts"],"names":[],"mappings":";;;AAAA;;GAEG;AACH,+EAA2E;AAE3E,mCAWgB;AAUhB;;;;;;;GAOG;AACI,MAAM,kBAAkB,GAAG,CAChC,MAAkG,EACnE,EAAE;IACjC,MAAM,EAAE,SAAS,EAAE,YAAY,EAAE,GAAG,MAAM,CAAC,MAAM,CAC/C,EAAE,EACF,EAAE,SAAS,EAAE,GAAG,EAAE,YAAY,EAAE,8CAAqB,CAAC,YAAY,EAAE,EACpE,MAAM,CACP,CAAC;IACF,MAAM,cAAc,GAAG,CAAC,IAA2B,EAAU,EAAE,CAAC,IAAA,aAAI,EAAC,IAAI,EAAE,cAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC;IAClG,MAAM,gBAAgB,GAAG,CAAC,UAAkB,EAAyB,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC;IAEpG,MAAM,IAAI,GAAG,CACX,IAA2B,EAC3B,SAAqC,EACa,EAAE;QACpD,MAAM,UAAU,GAAG,cAAc,CAAC,IAAI,CAAC,CAAC;QACxC,OAAO,8CAAqB,CAAC,cAAc,CAAC,EAAE,QAAQ,EAAE,UAAU,EAAE,CAAC,CAAC,IAAI,CACxE,eAAM,CAAC,OAAO,CAAC,CAAC,KAAK,EAAE,EAAE,CAAC,eAAM,CAAC,YAAY,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,EAClE,eAAM,CAAC,QAAQ,CAAC,2BAA2B,EAAE,GAAG,EAAE,CAChD,eAAM,CAAC,IAAI,CACT,oBAAW,CAAC,WAAW,CACrB,IAAqB,EACrB,YAAY,UAAU,kCAAkC,CACzD,CACF,CAAC,EACJ,eAAM,CAAC,QAAQ,CAAC,wBAAwB,EAAE,GAAG,EAAE,CAC7C,eAAM,CAAC,IAAI,CACT,oBAAW,CAAC,WAAW,CACrB,IAAqB,EACrB,YAAY,UAAU,kCAAkC,CACzD,CACF,CAAC,EACJ,eAAM,CAAC,QAAQ,CAAC,2BAA2B,EAAE,GAAG,EAAE,CAChD,eAAM,CAAC,IAAI,CACT,oBAAW,CAAC,WAAW,CACrB,IAAqB,EACrB,mDAAmD,CACpD,CACF,CAAC,EACJ,eAAM,CAAC,QAAQ,CAAC,yBAAyB,EAAE,GAAG,EAAE,CAC9C,eAAM,CAAC,IAAI,CACT,oBAAW,CAAC,WAAW,CACrB,IAAqB,EACrB,wCAAwC,CACzC,CACF,CAAC,EACJ,eAAM,CAAC,aAAa,CAAC,CAAC,KAAK,EAAE,EAAE,CAC7B,cAAK,CAAC,UAAU,CAAC,KAAK,CAAC,IAAI,oBAAW,CAAC,aAAa,CAAC,KAAK,CAAC,KAAK,CAAC;YAC/D,CAAC,CAAC,eAAM,CAAC,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC;YAC1B,CAAC,CAAC,eAAM,CAAC,IAAI,CACX,oBAAW,CAAC,iBAAiB,CAC3B,IAAqB,EACrB,uDAAuD,EACvD,KAAK,CACN,CACF,CACJ,EACD,eAAM,CAAC,OAAO,CAAC,CAAC,KAAK,EAAE,EAAE,CACvB,IAAA,aAAI,EACF,SAAS,CAAC,KAAK,CAAC,KAAK,CAAC,EACtB,eAAM,CAAC,OAAO,CAAC;YACb,SAAS,EAAE,oBAAW,CAAC,QAAQ,CAAC,IAAqB,CAAC;YACtD,SAAS,EAAE,cAAK,CAAC,EAAE;SACpB,CAAC,CACH,CACF,EACD,eAAM,CAAC,OAAO,CAAC,YAAY,CAAC,CAC7B,CAAC;IACJ,CAAC,CAAC;IAEF,MAAM,iBAAiB,GAAG,CACxB,IAA2B,EACsC,EAAE,CACnE,8CAAqB,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC,IAAI,CACxC,eAAM,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,eAAM,CAAC,YAAY,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,EACpE,eAAM,CAAC,GAAG,CAAC,cAAK,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,eAAM,CAAC,YAAY,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,EACnE,eAAM,CAAC,OAAO,CAAC,eAAM,CAAC,GAAG,CAAC,EAC1B,eAAM,CAAC,KAAK,EACZ,eAAM,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE;QAClB,MAAM,QAAQ,GAAG,IAAI,CAAC,GAAG,CAAC,gBAAgB,CAAC,CAAC;QAC5C,MAAM,gBAAgB,GAAG,QAAQ;aAC9B,MAAM,CAAC,CAAC,OAAO,EAAE,EAAE;YAClB,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,IAAI,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;gBACrC,MAAM,aAAa,GAAG,IAAA,aAAI,EAAC,IAAI,EAAE,cAAK,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC;gBACrD,MAAM,cAAc,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;gBAClC,IACE,cAAc,KAAK,SAAS;oBAC5B,aAAa,KAAK,cAAc,EAChC,CAAC;oBACD,OAAO,KAAK,CAAC;gBACf,CAAC;YACH,CAAC;YACD,OAAO,IAAI,CAAC;QACd,CAAC,CAAC;aACD,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,CAAC;QACrE,OAAO,gBAAO,CAAC,YAAY,CAAC,gBAAgB,CAAC,CAAC;IAChD,CAAC,CAAC,EACF,eAAM,CAAC,OAAO,CAAC,YAAY,CAAC,CAC7B,CAAC;IAEJ,OAAO,uBAAc,CAAC,QAAQ,CAC5B,uBAAc,CAAC,QAAQ,CAAC;QACtB,IAAI;QACJ,iBAAiB;QACjB,KAAK,EAAE,gCAAuB,CAAC,KAAK;KACrC,CAAC,CACH,CAAC;AACJ,CAAC,CAAC;AA3GW,QAAA,kBAAkB,sBA2G7B;AAEF;;;;;GAKG;AACI,MAAM,+BAA+B,GAAG,CAAC,MAA0C,EAAE,EAAE,CAC5F,eAAM,CAAC,GAAG,CAAC,QAAQ,CAAC;IAClB,MAAM,OAAO,GAAG,KAAK,CAAC,CAAC,8CAAqB,CAAC;IAE7C,MAAM,QAAQ,GAAG,IAAA,0BAAkB,EAAC;QAClC,GAAG,MAAM;QACT,YAAY,EAAE,cAAK,CAAC,OAAO,CAAC,8CAAqB,EAAE,OAAO,CAAC;KAC5D,CAAC,CAAC;IAEH,OAAO,cAAK,CAAC,iBAAiB,CAAC,QAAQ,CAAC,CAAC;AAC3C,CAAC,CAAC,CAAC,IAAI,CAAC,cAAK,CAAC,YAAY,CAAC,CAAC;AAVjB,QAAA,+BAA+B,mCAUd;AAE9B;;;;;GAKG;AACI,MAAM,gCAAgC,GAAG,CAAC,MAA0C,EAAE,EAAE,CAC7F,eAAM,CAAC,OAAO,CAAC,IAAA,uCAA+B,EAAC,MAAM,CAAC,CAAC,CAAC;AAD7C,QAAA,gCAAgC,oCACa"}
|
package/dist/cjs/index.d.ts
DELETED
|
@@ -1,14 +0,0 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* @since 1.0.0
|
|
3
|
-
*/
|
|
4
|
-
import { fromSecretsManager } from "./ConfigProvider.js";
|
|
5
|
-
export {
|
|
6
|
-
/**
|
|
7
|
-
* @since 1.0.0
|
|
8
|
-
*/
|
|
9
|
-
fromSecretsManager, };
|
|
10
|
-
/**
|
|
11
|
-
* @since 1.2.0
|
|
12
|
-
*/
|
|
13
|
-
export * as ConfigProvider from "./ConfigProvider.js";
|
|
14
|
-
//# sourceMappingURL=index.d.ts.map
|
package/dist/cjs/index.d.ts.map
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,kBAAkB,EAAE,MAAM,qBAAqB,CAAC;AAEzD,OAAO;AACL;;GAEG;AACH,kBAAkB,GACnB,CAAC;AAEF;;GAEG;AACH,OAAO,KAAK,cAAc,MAAM,qBAAqB,CAAC"}
|
package/dist/cjs/index.js
DELETED
|
@@ -1,36 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
-
if (k2 === undefined) k2 = k;
|
|
4
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
-
}
|
|
8
|
-
Object.defineProperty(o, k2, desc);
|
|
9
|
-
}) : (function(o, m, k, k2) {
|
|
10
|
-
if (k2 === undefined) k2 = k;
|
|
11
|
-
o[k2] = m[k];
|
|
12
|
-
}));
|
|
13
|
-
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
-
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
-
}) : function(o, v) {
|
|
16
|
-
o["default"] = v;
|
|
17
|
-
});
|
|
18
|
-
var __importStar = (this && this.__importStar) || function (mod) {
|
|
19
|
-
if (mod && mod.__esModule) return mod;
|
|
20
|
-
var result = {};
|
|
21
|
-
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
|
|
22
|
-
__setModuleDefault(result, mod);
|
|
23
|
-
return result;
|
|
24
|
-
};
|
|
25
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
26
|
-
exports.ConfigProvider = exports.fromSecretsManager = void 0;
|
|
27
|
-
/**
|
|
28
|
-
* @since 1.0.0
|
|
29
|
-
*/
|
|
30
|
-
const ConfigProvider_js_1 = require("./ConfigProvider.js");
|
|
31
|
-
Object.defineProperty(exports, "fromSecretsManager", { enumerable: true, get: function () { return ConfigProvider_js_1.fromSecretsManager; } });
|
|
32
|
-
/**
|
|
33
|
-
* @since 1.2.0
|
|
34
|
-
*/
|
|
35
|
-
exports.ConfigProvider = __importStar(require("./ConfigProvider.js"));
|
|
36
|
-
//# sourceMappingURL=index.js.map
|
package/dist/cjs/index.js.map
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;AAAA;;GAEG;AACH,2DAAyD;AAMvD,mGANO,sCAAkB,OAMP;AAGpB;;GAEG;AACH,sEAAsD"}
|