@lssm/integration.runtime 0.0.0-canary-20251217060834 → 0.0.0-canary-20251217063201
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/health.d.ts +21 -0
- package/dist/health.js +1 -0
- package/dist/index.d.ts +8 -0
- package/dist/index.js +1 -0
- package/dist/runtime.d.ts +99 -0
- package/dist/runtime.js +1 -0
- package/dist/secrets/env-secret-provider.d.ts +31 -0
- package/dist/secrets/env-secret-provider.js +1 -0
- package/dist/secrets/gcp-secret-manager.d.ts +32 -0
- package/dist/secrets/gcp-secret-manager.js +1 -0
- package/dist/secrets/index.d.ts +5 -0
- package/dist/secrets/index.js +1 -0
- package/dist/secrets/manager.d.ts +47 -0
- package/dist/secrets/manager.js +1 -0
- package/dist/secrets/provider.d.ts +52 -0
- package/dist/secrets/provider.js +1 -0
- package/package.json +13 -13
- package/dist/index.d.mts +0 -267
- package/dist/index.mjs +0 -714
package/dist/health.d.ts
ADDED
|
@@ -0,0 +1,21 @@
|
|
|
1
|
+
import { IntegrationContext, IntegrationTelemetryEmitter } from "./runtime.js";
|
|
2
|
+
import { IntegrationConnectionHealth } from "@lssm/lib.contracts/integrations/connection";
|
|
3
|
+
|
|
4
|
+
//#region src/health.d.ts
|
|
5
|
+
interface IntegrationHealthCheckResult extends IntegrationConnectionHealth {
|
|
6
|
+
metadata?: Record<string, string>;
|
|
7
|
+
}
|
|
8
|
+
type IntegrationHealthCheckExecutor = (context: IntegrationContext) => Promise<void>;
|
|
9
|
+
interface IntegrationHealthServiceOptions {
|
|
10
|
+
telemetry?: IntegrationTelemetryEmitter;
|
|
11
|
+
now?: () => Date;
|
|
12
|
+
}
|
|
13
|
+
declare class IntegrationHealthService {
|
|
14
|
+
private readonly telemetry?;
|
|
15
|
+
private readonly nowFn;
|
|
16
|
+
constructor(options?: IntegrationHealthServiceOptions);
|
|
17
|
+
check(context: IntegrationContext, executor: IntegrationHealthCheckExecutor): Promise<IntegrationHealthCheckResult>;
|
|
18
|
+
private emitTelemetry;
|
|
19
|
+
}
|
|
20
|
+
//#endregion
|
|
21
|
+
export { IntegrationHealthCheckExecutor, IntegrationHealthCheckResult, IntegrationHealthService, IntegrationHealthServiceOptions };
|
package/dist/health.js
ADDED
|
@@ -0,0 +1 @@
|
|
|
1
|
+
var e=class{telemetry;nowFn;constructor(e={}){this.telemetry=e.telemetry,this.nowFn=e.now??(()=>new Date)}async check(e,n){let r=this.nowFn();try{await n(e);let t=this.nowFn(),i={status:`connected`,checkedAt:t,latencyMs:t.getTime()-r.getTime()};return this.emitTelemetry(e,i,`success`),i}catch(n){let i=this.nowFn(),a=n instanceof Error?n.message:`Unknown error`,o=t(n),s={status:`error`,checkedAt:i,latencyMs:i.getTime()-r.getTime(),errorMessage:a,errorCode:o};return this.emitTelemetry(e,s,`error`,o,a),s}}emitTelemetry(e,t,n,r,i){this.telemetry&&this.telemetry.record({tenantId:e.tenantId,appId:e.appId,environment:e.environment,slotId:e.slotId,integrationKey:e.spec.meta.key,integrationVersion:e.spec.meta.version,connectionId:e.connection.meta.id,status:n,durationMs:t.latencyMs,errorCode:r,errorMessage:i,occurredAt:t.checkedAt??this.nowFn(),metadata:{...e.trace?{blueprint:`${e.trace.blueprintName}.v${e.trace.blueprintVersion}`,configVersion:e.trace.configVersion}:{},status:t.status}})}};function t(e){if(!e||typeof e!=`object`)return;let t=e;if(t.code!=null)return String(t.code)}export{e as IntegrationHealthService};
|
package/dist/index.d.ts
ADDED
|
@@ -0,0 +1,8 @@
|
|
|
1
|
+
import { ParsedSecretUri, SecretFetchOptions, SecretPayloadEncoding, SecretProvider, SecretProviderError, SecretReference, SecretRotationResult, SecretValue, SecretWritePayload, normalizeSecretPayload, parseSecretUri } from "./secrets/provider.js";
|
|
2
|
+
import { IntegrationCallContext, IntegrationCallError, IntegrationCallGuard, IntegrationCallGuardOptions, IntegrationCallResult, IntegrationContext, IntegrationInvocationStatus, IntegrationTelemetryEmitter, IntegrationTelemetryEvent, IntegrationTraceMetadata, connectionStatusLabel, ensureConnectionReady } from "./runtime.js";
|
|
3
|
+
import { IntegrationHealthCheckExecutor, IntegrationHealthCheckResult, IntegrationHealthService, IntegrationHealthServiceOptions } from "./health.js";
|
|
4
|
+
import { GcpSecretManagerProvider } from "./secrets/gcp-secret-manager.js";
|
|
5
|
+
import { EnvSecretProvider } from "./secrets/env-secret-provider.js";
|
|
6
|
+
import { SecretProviderManager, SecretProviderManagerOptions } from "./secrets/manager.js";
|
|
7
|
+
import "./secrets/index.js";
|
|
8
|
+
export { EnvSecretProvider, GcpSecretManagerProvider, IntegrationCallContext, IntegrationCallError, IntegrationCallGuard, IntegrationCallGuardOptions, IntegrationCallResult, IntegrationContext, IntegrationHealthCheckExecutor, IntegrationHealthCheckResult, IntegrationHealthService, IntegrationHealthServiceOptions, IntegrationInvocationStatus, IntegrationTelemetryEmitter, IntegrationTelemetryEvent, IntegrationTraceMetadata, ParsedSecretUri, SecretFetchOptions, SecretPayloadEncoding, SecretProvider, SecretProviderError, SecretProviderManager, SecretProviderManagerOptions, SecretReference, SecretRotationResult, SecretValue, SecretWritePayload, connectionStatusLabel, ensureConnectionReady, normalizeSecretPayload, parseSecretUri };
|
package/dist/index.js
ADDED
|
@@ -0,0 +1 @@
|
|
|
1
|
+
import{IntegrationHealthService as e}from"./health.js";import{IntegrationCallGuard as t,connectionStatusLabel as n,ensureConnectionReady as r}from"./runtime.js";import{SecretProviderError as i,normalizeSecretPayload as a,parseSecretUri as o}from"./secrets/provider.js";import{GcpSecretManagerProvider as s}from"./secrets/gcp-secret-manager.js";import{EnvSecretProvider as c}from"./secrets/env-secret-provider.js";import{SecretProviderManager as l}from"./secrets/manager.js";import"./secrets/index.js";export{c as EnvSecretProvider,s as GcpSecretManagerProvider,t as IntegrationCallGuard,e as IntegrationHealthService,i as SecretProviderError,l as SecretProviderManager,n as connectionStatusLabel,r as ensureConnectionReady,a as normalizeSecretPayload,o as parseSecretUri};
|
|
@@ -0,0 +1,99 @@
|
|
|
1
|
+
import { SecretProvider } from "./secrets/provider.js";
|
|
2
|
+
import { ConnectionStatus, IntegrationConnection } from "@lssm/lib.contracts/integrations/connection";
|
|
3
|
+
import { ResolvedAppConfig, ResolvedIntegration } from "@lssm/lib.contracts/app-config/runtime";
|
|
4
|
+
import { IntegrationSpec } from "@lssm/lib.contracts/integrations/spec";
|
|
5
|
+
|
|
6
|
+
//#region src/runtime.d.ts
|
|
7
|
+
interface IntegrationTraceMetadata {
|
|
8
|
+
blueprintName: string;
|
|
9
|
+
blueprintVersion: number;
|
|
10
|
+
configVersion: number;
|
|
11
|
+
}
|
|
12
|
+
interface IntegrationTelemetryEvent {
|
|
13
|
+
tenantId: string;
|
|
14
|
+
appId: string;
|
|
15
|
+
environment?: string;
|
|
16
|
+
slotId?: string;
|
|
17
|
+
integrationKey: string;
|
|
18
|
+
integrationVersion: number;
|
|
19
|
+
connectionId: string;
|
|
20
|
+
status: 'success' | 'error';
|
|
21
|
+
durationMs?: number;
|
|
22
|
+
errorCode?: string;
|
|
23
|
+
errorMessage?: string;
|
|
24
|
+
occurredAt: Date;
|
|
25
|
+
metadata?: Record<string, string | number | boolean>;
|
|
26
|
+
}
|
|
27
|
+
interface IntegrationTelemetryEmitter {
|
|
28
|
+
record(event: IntegrationTelemetryEvent): Promise<void> | void;
|
|
29
|
+
}
|
|
30
|
+
type IntegrationInvocationStatus = 'success' | 'error';
|
|
31
|
+
interface IntegrationContext {
|
|
32
|
+
tenantId: string;
|
|
33
|
+
appId: string;
|
|
34
|
+
environment?: string;
|
|
35
|
+
slotId?: string;
|
|
36
|
+
spec: IntegrationSpec;
|
|
37
|
+
connection: IntegrationConnection;
|
|
38
|
+
secretProvider: SecretProvider;
|
|
39
|
+
secretReference: string;
|
|
40
|
+
trace: IntegrationTraceMetadata;
|
|
41
|
+
config?: Record<string, unknown>;
|
|
42
|
+
}
|
|
43
|
+
interface IntegrationCallContext {
|
|
44
|
+
tenantId: string;
|
|
45
|
+
appId: string;
|
|
46
|
+
environment?: string;
|
|
47
|
+
blueprintName: string;
|
|
48
|
+
blueprintVersion: number;
|
|
49
|
+
configVersion: number;
|
|
50
|
+
slotId: string;
|
|
51
|
+
operation: string;
|
|
52
|
+
}
|
|
53
|
+
interface IntegrationCallError {
|
|
54
|
+
code: string;
|
|
55
|
+
message: string;
|
|
56
|
+
retryable: boolean;
|
|
57
|
+
cause?: unknown;
|
|
58
|
+
}
|
|
59
|
+
interface IntegrationCallResult<T> {
|
|
60
|
+
success: boolean;
|
|
61
|
+
data?: T;
|
|
62
|
+
error?: IntegrationCallError;
|
|
63
|
+
metadata: {
|
|
64
|
+
latencyMs: number;
|
|
65
|
+
connectionId: string;
|
|
66
|
+
ownershipMode: IntegrationConnection['ownershipMode'];
|
|
67
|
+
attempts: number;
|
|
68
|
+
};
|
|
69
|
+
}
|
|
70
|
+
interface IntegrationCallGuardOptions {
|
|
71
|
+
telemetry?: IntegrationTelemetryEmitter;
|
|
72
|
+
maxAttempts?: number;
|
|
73
|
+
backoffMs?: number;
|
|
74
|
+
shouldRetry?: (error: unknown, attempt: number) => boolean;
|
|
75
|
+
sleep?: (ms: number) => Promise<void>;
|
|
76
|
+
now?: () => Date;
|
|
77
|
+
}
|
|
78
|
+
declare class IntegrationCallGuard {
|
|
79
|
+
private readonly secretProvider;
|
|
80
|
+
private readonly telemetry?;
|
|
81
|
+
private readonly maxAttempts;
|
|
82
|
+
private readonly backoffMs;
|
|
83
|
+
private readonly shouldRetry;
|
|
84
|
+
private readonly sleep;
|
|
85
|
+
private readonly now;
|
|
86
|
+
constructor(secretProvider: SecretProvider, options?: IntegrationCallGuardOptions);
|
|
87
|
+
executeWithGuards<T>(slotId: string, operation: string, _input: unknown, resolvedConfig: ResolvedAppConfig, executor: (connection: IntegrationConnection, secrets: Record<string, string>) => Promise<T>): Promise<IntegrationCallResult<T>>;
|
|
88
|
+
private findIntegration;
|
|
89
|
+
private fetchSecrets;
|
|
90
|
+
private parseSecret;
|
|
91
|
+
private emitTelemetry;
|
|
92
|
+
private failure;
|
|
93
|
+
private makeContext;
|
|
94
|
+
private errorCodeFor;
|
|
95
|
+
}
|
|
96
|
+
declare function ensureConnectionReady(integration: ResolvedIntegration): void;
|
|
97
|
+
declare function connectionStatusLabel(status: ConnectionStatus): string;
|
|
98
|
+
//#endregion
|
|
99
|
+
export { IntegrationCallContext, IntegrationCallError, IntegrationCallGuard, IntegrationCallGuardOptions, IntegrationCallResult, IntegrationContext, IntegrationInvocationStatus, IntegrationTelemetryEmitter, IntegrationTelemetryEvent, IntegrationTraceMetadata, connectionStatusLabel, ensureConnectionReady };
|
package/dist/runtime.js
ADDED
|
@@ -0,0 +1 @@
|
|
|
1
|
+
import{performance as e}from"node:perf_hooks";var t=class{telemetry;maxAttempts;backoffMs;shouldRetry;sleep;now;constructor(e,t={}){this.secretProvider=e,this.telemetry=t.telemetry,this.maxAttempts=Math.max(1,t.maxAttempts??3),this.backoffMs=t.backoffMs??250,this.shouldRetry=t.shouldRetry??(e=>typeof e==`object`&&!!e&&`retryable`in e&&!!e.retryable),this.sleep=t.sleep??(e=>e<=0?Promise.resolve():new Promise(t=>setTimeout(t,e))),this.now=t.now??(()=>new Date)}async executeWithGuards(t,n,r,i,a){let o=this.findIntegration(t,i);if(!o)return this.failure({tenantId:i.tenantId,appId:i.appId,environment:i.environment,blueprintName:i.blueprintName,blueprintVersion:i.blueprintVersion,configVersion:i.configVersion,slotId:t,operation:n},void 0,{code:`SLOT_NOT_BOUND`,message:`Integration slot "${t}" is not bound for tenant "${i.tenantId}".`,retryable:!1},0);let s=o.connection.status;if(s===`disconnected`||s===`error`)return this.failure(this.makeContext(t,n,i),o,{code:`CONNECTION_NOT_READY`,message:`Integration connection "${o.connection.meta.label}" is in status "${s}".`,retryable:!1},0);let c=await this.fetchSecrets(o.connection),l=0,u=e.now();for(;l<this.maxAttempts;){l+=1;try{let r=await a(o.connection,c),s=e.now()-u;return this.emitTelemetry(this.makeContext(t,n,i),o,`success`,s),{success:!0,data:r,metadata:{latencyMs:s,connectionId:o.connection.meta.id,ownershipMode:o.connection.ownershipMode,attempts:l}}}catch(r){let a=e.now()-u;this.emitTelemetry(this.makeContext(t,n,i),o,`error`,a,this.errorCodeFor(r),r instanceof Error?r.message:String(r));let s=this.shouldRetry(r,l);if(!s||l>=this.maxAttempts)return{success:!1,error:{code:this.errorCodeFor(r),message:r instanceof Error?r.message:String(r),retryable:s,cause:r},metadata:{latencyMs:a,connectionId:o.connection.meta.id,ownershipMode:o.connection.ownershipMode,attempts:l}};await this.sleep(this.backoffMs)}}return{success:!1,error:{code:`UNKNOWN_ERROR`,message:`Integration call failed after retries.`,retryable:!1},metadata:{latencyMs:e.now()-u,connectionId:o.connection.meta.id,ownershipMode:o.connection.ownershipMode,attempts:this.maxAttempts}}}findIntegration(e,t){return t.integrations.find(t=>t.slot.slotId===e)}async fetchSecrets(e){if(!this.secretProvider.canHandle(e.secretRef))throw Error(`Secret provider "${this.secretProvider.id}" cannot handle reference "${e.secretRef}".`);let t=await this.secretProvider.getSecret(e.secretRef);return this.parseSecret(t)}parseSecret(e){let t=new TextDecoder().decode(e.data);try{let e=JSON.parse(t);if(e&&typeof e==`object`&&!Array.isArray(e)){let t=Object.entries(e).filter(([,e])=>typeof e==`string`||typeof e==`number`||typeof e==`boolean`);return Object.fromEntries(t.map(([e,t])=>[e,String(t)]))}}catch{}return{secret:t}}emitTelemetry(e,t,n,r,i,a){!this.telemetry||!t||this.telemetry.record({tenantId:e.tenantId,appId:e.appId,environment:e.environment,slotId:e.slotId,integrationKey:t.connection.meta.integrationKey,integrationVersion:t.connection.meta.integrationVersion,connectionId:t.connection.meta.id,status:n,durationMs:r,errorCode:i,errorMessage:a,occurredAt:this.now(),metadata:{blueprint:`${e.blueprintName}.v${e.blueprintVersion}`,configVersion:e.configVersion,operation:e.operation}})}failure(e,t,n,r){return t&&this.emitTelemetry(e,t,`error`,0,n.code,n.message),{success:!1,error:n,metadata:{latencyMs:0,connectionId:t?.connection.meta.id??`unknown`,ownershipMode:t?.connection.ownershipMode??`managed`,attempts:r}}}makeContext(e,t,n){return{tenantId:n.tenantId,appId:n.appId,environment:n.environment,blueprintName:n.blueprintName,blueprintVersion:n.blueprintVersion,configVersion:n.configVersion,slotId:e,operation:t}}errorCodeFor(e){return typeof e==`object`&&e&&`code`in e&&typeof e.code==`string`?e.code:`PROVIDER_ERROR`}};function n(e){let t=e.connection.status;if(t===`disconnected`||t===`error`)throw Error(`Integration connection "${e.connection.meta.label}" is in status "${t}".`)}function r(e){switch(e){case`connected`:return`connected`;case`disconnected`:return`disconnected`;case`error`:return`error`;case`unknown`:default:return`unknown`}}export{t as IntegrationCallGuard,r as connectionStatusLabel,n as ensureConnectionReady};
|
|
@@ -0,0 +1,31 @@
|
|
|
1
|
+
import { SecretProvider, SecretReference, SecretRotationResult, SecretValue, SecretWritePayload } from "./provider.js";
|
|
2
|
+
|
|
3
|
+
//#region src/secrets/env-secret-provider.d.ts
|
|
4
|
+
interface EnvSecretProviderOptions {
|
|
5
|
+
/**
|
|
6
|
+
* Optional map to alias secret references to environment variable names.
|
|
7
|
+
* Useful when referencing secrets from other providers (e.g. gcp://...)
|
|
8
|
+
* while still allowing local overrides.
|
|
9
|
+
*/
|
|
10
|
+
aliases?: Record<string, string>;
|
|
11
|
+
}
|
|
12
|
+
/**
|
|
13
|
+
* Environment-variable backed secret provider. Read-only by design.
|
|
14
|
+
* Allows overriding other secret providers by deriving environment variable
|
|
15
|
+
* names from secret references (or by using explicit aliases).
|
|
16
|
+
*/
|
|
17
|
+
declare class EnvSecretProvider implements SecretProvider {
|
|
18
|
+
readonly id = "env";
|
|
19
|
+
private readonly aliases;
|
|
20
|
+
constructor(options?: EnvSecretProviderOptions);
|
|
21
|
+
canHandle(reference: SecretReference): boolean;
|
|
22
|
+
getSecret(reference: SecretReference): Promise<SecretValue>;
|
|
23
|
+
setSecret(reference: SecretReference, _payload: SecretWritePayload): Promise<SecretRotationResult>;
|
|
24
|
+
rotateSecret(reference: SecretReference, _payload: SecretWritePayload): Promise<SecretRotationResult>;
|
|
25
|
+
deleteSecret(reference: SecretReference): Promise<void>;
|
|
26
|
+
private resolveEnvKey;
|
|
27
|
+
private deriveEnvKey;
|
|
28
|
+
private forbiddenError;
|
|
29
|
+
}
|
|
30
|
+
//#endregion
|
|
31
|
+
export { EnvSecretProvider };
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
import{SecretProviderError as e,parseSecretUri as t}from"./provider.js";var n=class{id=`env`;aliases;constructor(e={}){this.aliases=e.aliases??{}}canHandle(e){let t=this.resolveEnvKey(e);return t!==void 0&&process.env[t]!==void 0}async getSecret(t){let n=this.resolveEnvKey(t);if(!n)throw new e({message:`Unable to resolve environment variable for reference "${t}".`,provider:this.id,reference:t,code:`INVALID`});let r=process.env[n];if(r===void 0)throw new e({message:`Environment variable "${n}" not found for reference "${t}".`,provider:this.id,reference:t,code:`NOT_FOUND`});return{data:Buffer.from(r,`utf-8`),version:`current`,metadata:{source:`env`,envKey:n},retrievedAt:new Date}}async setSecret(e,t){throw this.forbiddenError(`setSecret`,e)}async rotateSecret(e,t){throw this.forbiddenError(`rotateSecret`,e)}async deleteSecret(e){throw this.forbiddenError(`deleteSecret`,e)}resolveEnvKey(e){if(e){if(this.aliases[e])return this.aliases[e];if(!e.includes(`://`))return e;try{let n=t(e);return n.provider===`env`?n.path:n.extras?.env?n.extras.env:this.deriveEnvKey(n.path)}catch{return e}}}deriveEnvKey(e){if(e)return e.split(/[\/:\-\.]/).filter(Boolean).map(e=>e.replace(/[^a-zA-Z0-9]/g,`_`).replace(/_{2,}/g,`_`).toUpperCase()).join(`_`)}forbiddenError(t,n){return new e({message:`EnvSecretProvider is read-only. "${t}" is not allowed for ${n}.`,provider:this.id,reference:n,code:`FORBIDDEN`})}};export{n as EnvSecretProvider};
|
|
@@ -0,0 +1,32 @@
|
|
|
1
|
+
import { SecretProvider, SecretReference, SecretRotationResult, SecretValue, SecretWritePayload } from "./provider.js";
|
|
2
|
+
import { SecretManagerServiceClient, protos } from "@google-cloud/secret-manager";
|
|
3
|
+
import { CallOptions } from "google-gax";
|
|
4
|
+
|
|
5
|
+
//#region src/secrets/gcp-secret-manager.d.ts
|
|
6
|
+
type SecretManagerClient = SecretManagerServiceClient;
|
|
7
|
+
interface GcpSecretManagerProviderOptions {
|
|
8
|
+
projectId?: string;
|
|
9
|
+
client?: SecretManagerClient;
|
|
10
|
+
clientOptions?: ConstructorParameters<typeof SecretManagerServiceClient>[0];
|
|
11
|
+
defaultReplication?: protos.google.cloud.secretmanager.v1.IReplication;
|
|
12
|
+
}
|
|
13
|
+
declare class GcpSecretManagerProvider implements SecretProvider {
|
|
14
|
+
readonly id = "gcp-secret-manager";
|
|
15
|
+
private readonly client;
|
|
16
|
+
private readonly explicitProjectId?;
|
|
17
|
+
private readonly replication;
|
|
18
|
+
constructor(options?: GcpSecretManagerProviderOptions);
|
|
19
|
+
canHandle(reference: SecretReference): boolean;
|
|
20
|
+
getSecret(reference: SecretReference, options?: {
|
|
21
|
+
version?: string;
|
|
22
|
+
}, callOptions?: CallOptions): Promise<SecretValue>;
|
|
23
|
+
setSecret(reference: SecretReference, payload: SecretWritePayload): Promise<SecretRotationResult>;
|
|
24
|
+
rotateSecret(reference: SecretReference, payload: SecretWritePayload): Promise<SecretRotationResult>;
|
|
25
|
+
deleteSecret(reference: SecretReference): Promise<void>;
|
|
26
|
+
private parseReference;
|
|
27
|
+
private buildNames;
|
|
28
|
+
private buildVersionName;
|
|
29
|
+
private ensureSecretExists;
|
|
30
|
+
}
|
|
31
|
+
//#endregion
|
|
32
|
+
export { GcpSecretManagerProvider };
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
import{SecretProviderError as e,normalizeSecretPayload as t,parseSecretUri as n}from"./provider.js";import{SecretManagerServiceClient as r,protos as i}from"@google-cloud/secret-manager";const a={automatic:{}};var o=class{id=`gcp-secret-manager`;client;explicitProjectId;replication;constructor(e={}){this.client=e.client??new r(e.clientOptions??{}),this.explicitProjectId=e.projectId,this.replication=e.defaultReplication??a}canHandle(e){try{return n(e).provider===`gcp`}catch{return!1}}async getSecret(t,n,r){let i=this.parseReference(t),a=this.buildVersionName(i,n?.version);try{let[n]=await this.client.accessSecretVersion({name:a},r??{}),i=n.payload;if(!i?.data)throw new e({message:`Secret payload empty for ${a}`,provider:this.id,reference:t,code:`UNKNOWN`});let o=s(n.name??a);return{data:i.data,version:o,metadata:i.dataCrc32c?{crc32c:i.dataCrc32c.toString()}:void 0,retrievedAt:new Date}}catch(e){throw c({error:e,provider:this.id,reference:t,operation:`access`})}}async setSecret(n,r){let i=this.parseReference(n),{secretName:a}=this.buildNames(i),o=t(r);await this.ensureSecretExists(i,r);try{let t=await this.client.addSecretVersion({parent:a,payload:{data:o}});if(!t)throw new e({message:`No version returned when adding secret version for ${a}`,provider:this.id,reference:n,code:`UNKNOWN`});let[r]=t,i=r?.name??`${a}/versions/latest`;return{reference:`gcp://${i}`,version:s(i)??`latest`}}catch(e){throw c({error:e,provider:this.id,reference:n,operation:`addSecretVersion`})}}async rotateSecret(e,t){return this.setSecret(e,t)}async deleteSecret(e){let t=this.parseReference(e),{secretName:n}=this.buildNames(t);try{await this.client.deleteSecret({name:n})}catch(t){throw c({error:t,provider:this.id,reference:e,operation:`delete`})}}parseReference(t){let r=n(t);if(r.provider!==`gcp`)throw new e({message:`Unsupported secret provider: ${r.provider}`,provider:this.id,reference:t,code:`INVALID`});let i=r.path.split(`/`).filter(Boolean);if(i.length<4||i[0]!==`projects`)throw new e({message:`Expected secret reference format gcp://projects/{project}/secrets/{secret}[(/versions/{version})] but received "${r.path}"`,provider:this.id,reference:t,code:`INVALID`});let a=i[1]??this.explicitProjectId;if(!a)throw new e({message:`Unable to resolve project or secret from reference "${r.path}"`,provider:this.id,reference:t,code:`INVALID`});let o=i.indexOf(`secrets`);if(o===-1||o+1>=i.length)throw new e({message:`Unable to resolve project or secret from reference "${r.path}"`,provider:this.id,reference:t,code:`INVALID`});let s=a,c=i[o+1];if(!c)throw new e({message:`Unable to resolve secret ID from reference "${r.path}"`,provider:this.id,reference:t,code:`INVALID`});let l=c,u=i.indexOf(`versions`);return{projectId:s,secretId:l,version:r.extras?.version??(u!==-1&&u+1<i.length?i[u+1]:void 0)}}buildNames(t){let n=t.projectId??this.explicitProjectId;if(!n)throw new e({message:`Project ID must be provided either in reference or provider configuration`,provider:this.id,reference:`gcp://projects//secrets/${t.secretId}`,code:`INVALID`});let r=`projects/${n}`;return{projectParent:r,secretName:`${r}/secrets/${t.secretId}`}}buildVersionName(e,t){let{secretName:n}=this.buildNames(e);return`${n}/versions/${t??e.version??`latest`}`}async ensureSecretExists(e,t){let{secretName:n,projectParent:r}=this.buildNames(e);try{await this.client.getSecret({name:n})}catch(i){let a=c({error:i,provider:this.id,reference:`gcp://${n}`,operation:`getSecret`,suppressThrow:!0});if(!a||a.code!==`NOT_FOUND`)throw a||i;try{await this.client.createSecret({parent:r,secretId:e.secretId,secret:{replication:this.replication,labels:t.labels}})}catch(e){throw c({error:e,provider:this.id,reference:`gcp://${n}`,operation:`createSecret`})}}}};function s(e){let t=e.split(`/`).filter(Boolean),n=t.indexOf(`versions`);if(!(n===-1||n+1>=t.length))return t[n+1]}function c(t){let{error:n,provider:r,reference:i,operation:a,suppressThrow:o}=t;if(n instanceof e)return n;let s=l(n),c=new e({message:n instanceof Error?n.message:`Unknown error during ${a}`,provider:r,reference:i,code:s,cause:n});if(o)return c;throw c}function l(e){if(typeof e!=`object`||!e)return`UNKNOWN`;let t=e.code;return t===5||t===`NOT_FOUND`?`NOT_FOUND`:t===6||t===`ALREADY_EXISTS`?`INVALID`:t===7||t===`PERMISSION_DENIED`||t===403?`FORBIDDEN`:t===3||t===`INVALID_ARGUMENT`?`INVALID`:`UNKNOWN`}export{o as GcpSecretManagerProvider};
|
|
@@ -0,0 +1,5 @@
|
|
|
1
|
+
import { ParsedSecretUri, SecretFetchOptions, SecretPayloadEncoding, SecretProvider, SecretProviderError, SecretReference, SecretRotationResult, SecretValue, SecretWritePayload, normalizeSecretPayload, parseSecretUri } from "./provider.js";
|
|
2
|
+
import { GcpSecretManagerProvider } from "./gcp-secret-manager.js";
|
|
3
|
+
import { EnvSecretProvider } from "./env-secret-provider.js";
|
|
4
|
+
import { SecretProviderManager, SecretProviderManagerOptions } from "./manager.js";
|
|
5
|
+
export { EnvSecretProvider, GcpSecretManagerProvider, ParsedSecretUri, SecretFetchOptions, SecretPayloadEncoding, SecretProvider, SecretProviderError, SecretProviderManager, SecretProviderManagerOptions, SecretReference, SecretRotationResult, SecretValue, SecretWritePayload, normalizeSecretPayload, parseSecretUri };
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
import{SecretProviderError as e,normalizeSecretPayload as t,parseSecretUri as n}from"./provider.js";import{GcpSecretManagerProvider as r}from"./gcp-secret-manager.js";import{EnvSecretProvider as i}from"./env-secret-provider.js";import{SecretProviderManager as a}from"./manager.js";export{i as EnvSecretProvider,r as GcpSecretManagerProvider,e as SecretProviderError,a as SecretProviderManager,t as normalizeSecretPayload,n as parseSecretUri};
|
|
@@ -0,0 +1,47 @@
|
|
|
1
|
+
import { SecretProvider, SecretReference, SecretRotationResult, SecretValue, SecretWritePayload } from "./provider.js";
|
|
2
|
+
|
|
3
|
+
//#region src/secrets/manager.d.ts
|
|
4
|
+
interface RegisterOptions {
|
|
5
|
+
/**
|
|
6
|
+
* Larger priority values are attempted first. Defaults to 0.
|
|
7
|
+
*/
|
|
8
|
+
priority?: number;
|
|
9
|
+
}
|
|
10
|
+
interface SecretProviderManagerOptions {
|
|
11
|
+
/**
|
|
12
|
+
* Override manager identifier. Defaults to "secret-provider-manager".
|
|
13
|
+
*/
|
|
14
|
+
id?: string;
|
|
15
|
+
/**
|
|
16
|
+
* Providers to pre-register. They are registered in array order with
|
|
17
|
+
* descending priority (first entry wins ties).
|
|
18
|
+
*/
|
|
19
|
+
providers?: {
|
|
20
|
+
provider: SecretProvider;
|
|
21
|
+
priority?: number;
|
|
22
|
+
}[];
|
|
23
|
+
}
|
|
24
|
+
/**
|
|
25
|
+
* Composite secret provider that delegates to registered providers.
|
|
26
|
+
* Providers are attempted in order of descending priority, respecting the
|
|
27
|
+
* registration order for ties. This enables privileged overrides (e.g.
|
|
28
|
+
* environment variables) while still supporting durable backends like GCP
|
|
29
|
+
* Secret Manager.
|
|
30
|
+
*/
|
|
31
|
+
declare class SecretProviderManager implements SecretProvider {
|
|
32
|
+
readonly id: string;
|
|
33
|
+
private readonly providers;
|
|
34
|
+
private registrationCounter;
|
|
35
|
+
constructor(options?: SecretProviderManagerOptions);
|
|
36
|
+
register(provider: SecretProvider, options?: RegisterOptions): this;
|
|
37
|
+
canHandle(reference: SecretReference): boolean;
|
|
38
|
+
getSecret(reference: SecretReference, options?: SecretFetchOptions): Promise<SecretValue>;
|
|
39
|
+
setSecret(reference: SecretReference, payload: SecretWritePayload): Promise<SecretRotationResult>;
|
|
40
|
+
rotateSecret(reference: SecretReference, payload: SecretWritePayload): Promise<SecretRotationResult>;
|
|
41
|
+
deleteSecret(reference: SecretReference): Promise<void>;
|
|
42
|
+
private delegateToFirst;
|
|
43
|
+
private composeError;
|
|
44
|
+
}
|
|
45
|
+
type SecretFetchOptions = Parameters<SecretProvider['getSecret']>[1];
|
|
46
|
+
//#endregion
|
|
47
|
+
export { SecretProviderManager, SecretProviderManagerOptions };
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
import{SecretProviderError as e}from"./provider.js";var t=class{id;providers=[];registrationCounter=0;constructor(e={}){this.id=e.id??`secret-provider-manager`;let t=e.providers??[];for(let e of t)this.register(e.provider,{priority:e.priority})}register(e,t={}){return this.providers.push({provider:e,priority:t.priority??0,order:this.registrationCounter++}),this.providers.sort((e,t)=>e.priority===t.priority?e.order-t.order:t.priority-e.priority),this}canHandle(e){return this.providers.some(({provider:t})=>n(t,e))}async getSecret(t,r){let i=[];for(let{provider:a}of this.providers)if(n(a,t))try{return await a.getSecret(t,r)}catch(t){if(t instanceof e){if(i.push(t),t.code!==`NOT_FOUND`)break;continue}throw t}throw this.composeError(`getSecret`,t,i,r?.version)}async setSecret(e,t){return this.delegateToFirst(`setSecret`,e,n=>n.setSecret(e,t))}async rotateSecret(e,t){return this.delegateToFirst(`rotateSecret`,e,n=>n.rotateSecret(e,t))}async deleteSecret(e){await this.delegateToFirst(`deleteSecret`,e,t=>t.deleteSecret(e))}async delegateToFirst(t,r,i){let a=[];for(let{provider:t}of this.providers)if(n(t,r))try{return await i(t)}catch(t){if(t instanceof e){a.push(t);continue}throw t}throw this.composeError(t,r,a)}composeError(t,n,r,i){if(r.length===1){let[e]=r;if(e)return e}let a=[`No registered secret provider could ${t}`,`reference "${n}"`];return i&&a.push(`(version: ${i})`),r.length>1&&a.push(`Attempts: ${r.map(e=>`${e.provider}:${e.code}`).join(`, `)}`),new e({message:a.join(` `),provider:this.id,reference:n,code:r.length>0?r[r.length-1].code:`UNKNOWN`,cause:r})}};function n(e,t){try{return e.canHandle(t)}catch{return!1}}export{t as SecretProviderManager};
|
|
@@ -0,0 +1,52 @@
|
|
|
1
|
+
//#region src/secrets/provider.d.ts
|
|
2
|
+
type SecretReference = string;
|
|
3
|
+
interface SecretValue {
|
|
4
|
+
data: Uint8Array;
|
|
5
|
+
version?: string;
|
|
6
|
+
metadata?: Record<string, string>;
|
|
7
|
+
retrievedAt: Date;
|
|
8
|
+
}
|
|
9
|
+
interface SecretFetchOptions {
|
|
10
|
+
version?: string;
|
|
11
|
+
}
|
|
12
|
+
type SecretPayloadEncoding = 'utf-8' | 'base64' | 'binary';
|
|
13
|
+
interface SecretWritePayload {
|
|
14
|
+
data: string | Uint8Array;
|
|
15
|
+
encoding?: SecretPayloadEncoding;
|
|
16
|
+
contentType?: string;
|
|
17
|
+
labels?: Record<string, string>;
|
|
18
|
+
}
|
|
19
|
+
interface SecretRotationResult {
|
|
20
|
+
reference: SecretReference;
|
|
21
|
+
version: string;
|
|
22
|
+
}
|
|
23
|
+
interface SecretProvider {
|
|
24
|
+
readonly id: string;
|
|
25
|
+
canHandle(reference: SecretReference): boolean;
|
|
26
|
+
getSecret(reference: SecretReference, options?: SecretFetchOptions): Promise<SecretValue>;
|
|
27
|
+
setSecret(reference: SecretReference, payload: SecretWritePayload): Promise<SecretRotationResult>;
|
|
28
|
+
rotateSecret(reference: SecretReference, payload: SecretWritePayload): Promise<SecretRotationResult>;
|
|
29
|
+
deleteSecret(reference: SecretReference): Promise<void>;
|
|
30
|
+
}
|
|
31
|
+
interface ParsedSecretUri {
|
|
32
|
+
provider: string;
|
|
33
|
+
path: string;
|
|
34
|
+
extras?: Record<string, string>;
|
|
35
|
+
}
|
|
36
|
+
declare class SecretProviderError extends Error {
|
|
37
|
+
readonly provider: string;
|
|
38
|
+
readonly reference: SecretReference;
|
|
39
|
+
readonly code: 'NOT_FOUND' | 'FORBIDDEN' | 'INVALID' | 'UNKNOWN';
|
|
40
|
+
readonly cause?: unknown;
|
|
41
|
+
constructor(params: {
|
|
42
|
+
message: string;
|
|
43
|
+
provider: string;
|
|
44
|
+
reference: SecretReference;
|
|
45
|
+
code?: SecretProviderError['code'];
|
|
46
|
+
cause?: unknown;
|
|
47
|
+
});
|
|
48
|
+
}
|
|
49
|
+
declare function parseSecretUri(reference: SecretReference): ParsedSecretUri;
|
|
50
|
+
declare function normalizeSecretPayload(payload: SecretWritePayload): Uint8Array;
|
|
51
|
+
//#endregion
|
|
52
|
+
export { ParsedSecretUri, SecretFetchOptions, SecretPayloadEncoding, SecretProvider, SecretProviderError, SecretReference, SecretRotationResult, SecretValue, SecretWritePayload, normalizeSecretPayload, parseSecretUri };
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
import{Buffer as e}from"node:buffer";var t=class extends Error{provider;reference;code;cause;constructor(e){super(e.message),this.name=`SecretProviderError`,this.provider=e.provider,this.reference=e.reference,this.code=e.code??`UNKNOWN`,this.cause=e.cause}};function n(e){if(!e)throw new t({message:`Secret reference cannot be empty`,provider:`unknown`,reference:e,code:`INVALID`});let[n,r]=e.split(`://`);if(!n||!r)throw new t({message:`Invalid secret reference: ${e}`,provider:`unknown`,reference:e,code:`INVALID`});let i=r.indexOf(`?`);if(i===-1)return{provider:n,path:r};let a=r.slice(0,i),o=r.slice(i+1);return{provider:n,path:a,extras:Object.fromEntries(o.split(`&`).filter(Boolean).map(e=>{let[t,n]=e.split(`=`),r=t??``,i=n??``;return[decodeURIComponent(r),decodeURIComponent(i)]}))}}function r(t){return t.data instanceof Uint8Array?t.data:t.encoding===`base64`?e.from(t.data,`base64`):t.encoding===`binary`?e.from(t.data,`binary`):e.from(t.data,`utf-8`)}export{t as SecretProviderError,r as normalizeSecretPayload,n as parseSecretUri};
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@lssm/integration.runtime",
|
|
3
|
-
"version": "0.0.0-canary-
|
|
3
|
+
"version": "0.0.0-canary-20251217063201",
|
|
4
4
|
"type": "module",
|
|
5
5
|
"main": "./dist/index.js",
|
|
6
6
|
"module": "./dist/index.js",
|
|
@@ -23,26 +23,26 @@
|
|
|
23
23
|
"test": "bun test"
|
|
24
24
|
},
|
|
25
25
|
"dependencies": {
|
|
26
|
-
"@lssm/lib.contracts": "0.0.0-canary-
|
|
27
|
-
"@lssm/lib.logger": "0.0.0-canary-
|
|
26
|
+
"@lssm/lib.contracts": "0.0.0-canary-20251217063201",
|
|
27
|
+
"@lssm/lib.logger": "0.0.0-canary-20251217063201",
|
|
28
28
|
"@google-cloud/secret-manager": "^6.1.1",
|
|
29
29
|
"google-gax": "^5.0.0"
|
|
30
30
|
},
|
|
31
31
|
"devDependencies": {
|
|
32
|
-
"@lssm/tool.tsdown": "0.0.0-canary-
|
|
33
|
-
"@lssm/tool.typescript": "0.0.0-canary-
|
|
32
|
+
"@lssm/tool.tsdown": "0.0.0-canary-20251217063201",
|
|
33
|
+
"@lssm/tool.typescript": "0.0.0-canary-20251217063201",
|
|
34
34
|
"tsdown": "^0.17.4",
|
|
35
35
|
"typescript": "^5.9.3"
|
|
36
36
|
},
|
|
37
37
|
"exports": {
|
|
38
|
-
".": "./
|
|
39
|
-
"./health": "./
|
|
40
|
-
"./runtime": "./
|
|
41
|
-
"./secrets": "./
|
|
42
|
-
"./secrets/env-secret-provider": "./
|
|
43
|
-
"./secrets/gcp-secret-manager": "./
|
|
44
|
-
"./secrets/manager": "./
|
|
45
|
-
"./secrets/provider": "./
|
|
38
|
+
".": "./dist/index.js",
|
|
39
|
+
"./health": "./dist/health.js",
|
|
40
|
+
"./runtime": "./dist/runtime.js",
|
|
41
|
+
"./secrets": "./dist/secrets/index.js",
|
|
42
|
+
"./secrets/env-secret-provider": "./dist/secrets/env-secret-provider.js",
|
|
43
|
+
"./secrets/gcp-secret-manager": "./dist/secrets/gcp-secret-manager.js",
|
|
44
|
+
"./secrets/manager": "./dist/secrets/manager.js",
|
|
45
|
+
"./secrets/provider": "./dist/secrets/provider.js",
|
|
46
46
|
"./*": "./*"
|
|
47
47
|
},
|
|
48
48
|
"publishConfig": {
|