@lssm/lib.contracts 0.0.0-canary-20251217063201 → 0.0.0-canary-20251217073102

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (239) hide show
  1. package/dist/app-config/app-config.feature.js +53 -1
  2. package/dist/app-config/contracts.d.ts +50 -50
  3. package/dist/app-config/contracts.js +396 -1
  4. package/dist/app-config/docs/app-config.docblock.js +22 -220
  5. package/dist/app-config/events.d.ts +27 -27
  6. package/dist/app-config/events.js +168 -1
  7. package/dist/app-config/index.js +8 -1
  8. package/dist/app-config/lifecycle-contracts.d.ts +80 -80
  9. package/dist/app-config/lifecycle-contracts.js +441 -1
  10. package/dist/app-config/runtime.js +617 -1
  11. package/dist/app-config/spec.js +36 -1
  12. package/dist/app-config/validation.js +538 -1
  13. package/dist/capabilities/docs/capabilities.docblock.js +22 -1
  14. package/dist/capabilities/openbanking.js +92 -1
  15. package/dist/capabilities.js +50 -1
  16. package/dist/client/index.js +9 -1
  17. package/dist/client/react/drivers/rn-reusables.js +21 -1
  18. package/dist/client/react/drivers/shadcn.js +11 -1
  19. package/dist/client/react/feature-render.js +43 -1
  20. package/dist/client/react/form-render.js +298 -1
  21. package/dist/client/react/index.js +8 -1
  22. package/dist/contract-registry/index.js +3 -1
  23. package/dist/contract-registry/schemas.js +61 -1
  24. package/dist/contracts-adapter-hydration.js +41 -1
  25. package/dist/contracts-adapter-input.js +77 -1
  26. package/dist/data-views/docs/data-views.docblock.js +22 -1
  27. package/dist/data-views/query-generator.js +48 -1
  28. package/dist/data-views/runtime.js +39 -1
  29. package/dist/data-views.js +35 -1
  30. package/dist/docs/PUBLISHING.docblock.js +17 -76
  31. package/dist/docs/accessibility_wcag_compliance_specs.docblock.js +17 -350
  32. package/dist/docs/index.js +33 -1
  33. package/dist/docs/meta.docs.js +15 -2
  34. package/dist/docs/presentations.js +77 -1
  35. package/dist/docs/registry.js +51 -1
  36. package/dist/docs/tech/PHASE_1_QUICKSTART.docblock.js +17 -383
  37. package/dist/docs/tech/PHASE_2_AI_NATIVE_OPERATIONS.docblock.js +17 -68
  38. package/dist/docs/tech/PHASE_3_AUTO_EVOLUTION.docblock.js +17 -140
  39. package/dist/docs/tech/PHASE_4_PERSONALIZATION_ENGINE.docblock.js +17 -86
  40. package/dist/docs/tech/PHASE_5_ZERO_TOUCH_OPERATIONS.docblock.js +17 -1
  41. package/dist/docs/tech/auth/better-auth-nextjs.docblock.js +25 -2
  42. package/dist/docs/tech/contracts/README.docblock.js +21 -1
  43. package/dist/docs/tech/contracts/create-subscription.docblock.js +21 -1
  44. package/dist/docs/tech/contracts/graphql-typed-outputs.docblock.js +21 -180
  45. package/dist/docs/tech/contracts/migrations.docblock.js +21 -1
  46. package/dist/docs/tech/contracts/openapi-export.docblock.js +22 -2
  47. package/dist/docs/tech/contracts/ops-to-presentation-linking.docblock.js +19 -60
  48. package/dist/docs/tech/contracts/overlays.docblock.js +21 -68
  49. package/dist/docs/tech/contracts/tests.docblock.js +21 -132
  50. package/dist/docs/tech/contracts/themes.docblock.js +21 -1
  51. package/dist/docs/tech/contracts/vertical-pocket-family-office.docblock.js +21 -106
  52. package/dist/docs/tech/lifecycle-stage-system.docblock.js +17 -213
  53. package/dist/docs/tech/llm/llm-integration.docblock.js +74 -5
  54. package/dist/docs/tech/mcp-endpoints.docblock.js +38 -1
  55. package/dist/docs/tech/presentation-runtime.docblock.js +17 -1
  56. package/dist/docs/tech/schema/README.docblock.js +21 -262
  57. package/dist/docs/tech/studio/learning-events.docblock.js +49 -1
  58. package/dist/docs/tech/studio/learning-journeys.docblock.js +25 -2
  59. package/dist/docs/tech/studio/platform-admin-panel.docblock.js +24 -2
  60. package/dist/docs/tech/studio/project-access-teams.docblock.js +26 -16
  61. package/dist/docs/tech/studio/project-routing.docblock.js +68 -1
  62. package/dist/docs/tech/studio/sandbox-unlogged.docblock.js +23 -2
  63. package/dist/docs/tech/studio/team-invitations.docblock.js +41 -36
  64. package/dist/docs/tech/studio/workspace-ops.docblock.js +48 -1
  65. package/dist/docs/tech/studio/workspaces.docblock.js +24 -2
  66. package/dist/docs/tech/telemetry-ingest.docblock.js +37 -3
  67. package/dist/docs/tech/templates/runtime.docblock.js +21 -1
  68. package/dist/docs/tech/vscode-extension.docblock.js +37 -3
  69. package/dist/docs/tech/workflows/overview.docblock.js +21 -1
  70. package/dist/docs/tech-contracts.docs.js +19 -2
  71. package/dist/events.js +12 -1
  72. package/dist/experiments/docs/experiments.docblock.js +22 -128
  73. package/dist/experiments/evaluator.js +101 -1
  74. package/dist/experiments/spec.js +33 -1
  75. package/dist/features.js +68 -1
  76. package/dist/forms/docs/forms.docblock.js +22 -1
  77. package/dist/forms.js +119 -1
  78. package/dist/index.js +107 -1
  79. package/dist/install.js +40 -1
  80. package/dist/integrations/contracts.d.ts +102 -102
  81. package/dist/integrations/contracts.js +388 -1
  82. package/dist/integrations/docs/integrations.docblock.js +95 -1
  83. package/dist/integrations/health.js +69 -1
  84. package/dist/integrations/index.js +23 -1
  85. package/dist/integrations/openbanking/contracts/accounts.d.ts +66 -66
  86. package/dist/integrations/openbanking/contracts/accounts.js +237 -1
  87. package/dist/integrations/openbanking/contracts/balances.d.ts +34 -34
  88. package/dist/integrations/openbanking/contracts/balances.js +167 -1
  89. package/dist/integrations/openbanking/contracts/index.js +12 -1
  90. package/dist/integrations/openbanking/contracts/transactions.d.ts +48 -48
  91. package/dist/integrations/openbanking/contracts/transactions.js +218 -1
  92. package/dist/integrations/openbanking/guards.js +32 -1
  93. package/dist/integrations/openbanking/models.d.ts +55 -55
  94. package/dist/integrations/openbanking/models.js +242 -1
  95. package/dist/integrations/openbanking/openbanking.feature.js +68 -1
  96. package/dist/integrations/openbanking/telemetry.js +39 -1
  97. package/dist/integrations/providers/elevenlabs.js +56 -1
  98. package/dist/integrations/providers/gcs-storage.js +79 -1
  99. package/dist/integrations/providers/gmail.js +91 -1
  100. package/dist/integrations/providers/google-calendar.js +70 -1
  101. package/dist/integrations/providers/impls/elevenlabs-voice.js +95 -1
  102. package/dist/integrations/providers/impls/gcs-storage.js +88 -1
  103. package/dist/integrations/providers/impls/gmail-inbound.js +200 -1
  104. package/dist/integrations/providers/impls/gmail-outbound.js +104 -5
  105. package/dist/integrations/providers/impls/google-calendar.js +154 -1
  106. package/dist/integrations/providers/impls/index.js +16 -1
  107. package/dist/integrations/providers/impls/mistral-embedding.js +41 -1
  108. package/dist/integrations/providers/impls/mistral-llm.js +247 -1
  109. package/dist/integrations/providers/impls/postmark-email.js +55 -1
  110. package/dist/integrations/providers/impls/powens-client.js +171 -1
  111. package/dist/integrations/providers/impls/powens-openbanking.js +218 -1
  112. package/dist/integrations/providers/impls/provider-factory.js +142 -1
  113. package/dist/integrations/providers/impls/qdrant-vector.js +69 -1
  114. package/dist/integrations/providers/impls/stripe-payments.js +202 -1
  115. package/dist/integrations/providers/impls/twilio-sms.js +58 -1
  116. package/dist/integrations/providers/index.js +13 -1
  117. package/dist/integrations/providers/mistral.js +72 -1
  118. package/dist/integrations/providers/postmark.js +72 -1
  119. package/dist/integrations/providers/powens.js +120 -1
  120. package/dist/integrations/providers/qdrant.js +77 -1
  121. package/dist/integrations/providers/registry.js +34 -1
  122. package/dist/integrations/providers/stripe.js +87 -1
  123. package/dist/integrations/providers/twilio-sms.js +65 -1
  124. package/dist/integrations/runtime.js +186 -1
  125. package/dist/integrations/secrets/aws-secret-manager.js +231 -1
  126. package/dist/integrations/secrets/env-secret-provider.js +81 -1
  127. package/dist/integrations/secrets/gcp-secret-manager.js +229 -1
  128. package/dist/integrations/secrets/index.js +8 -1
  129. package/dist/integrations/secrets/manager.js +103 -1
  130. package/dist/integrations/secrets/provider.js +58 -1
  131. package/dist/integrations/secrets/scaleway-secret-manager.js +247 -1
  132. package/dist/integrations/spec.js +39 -1
  133. package/dist/jobs/define-job.js +16 -1
  134. package/dist/jobs/gcp-cloud-tasks.js +53 -1
  135. package/dist/jobs/gcp-pubsub.js +39 -1
  136. package/dist/jobs/handlers/gmail-sync-handler.js +9 -1
  137. package/dist/jobs/handlers/index.js +12 -1
  138. package/dist/jobs/handlers/ping-handler.js +15 -1
  139. package/dist/jobs/handlers/storage-document-handler.js +14 -1
  140. package/dist/jobs/index.js +4 -1
  141. package/dist/jobs/memory-queue.js +71 -1
  142. package/dist/jobs/queue.js +33 -1
  143. package/dist/jobs/scaleway-sqs-queue.js +153 -1
  144. package/dist/jsonschema.d.ts +3 -3
  145. package/dist/jsonschema.js +32 -1
  146. package/dist/knowledge/contracts.d.ts +66 -66
  147. package/dist/knowledge/contracts.js +317 -1
  148. package/dist/knowledge/docs/knowledge.docblock.js +22 -138
  149. package/dist/knowledge/index.js +10 -1
  150. package/dist/knowledge/ingestion/document-processor.js +54 -1
  151. package/dist/knowledge/ingestion/embedding-service.js +25 -1
  152. package/dist/knowledge/ingestion/gmail-adapter.js +50 -5
  153. package/dist/knowledge/ingestion/index.js +7 -1
  154. package/dist/knowledge/ingestion/storage-adapter.js +26 -1
  155. package/dist/knowledge/ingestion/vector-indexer.js +32 -1
  156. package/dist/knowledge/query/index.js +3 -1
  157. package/dist/knowledge/query/service.js +64 -2
  158. package/dist/knowledge/runtime.js +49 -1
  159. package/dist/knowledge/spaces/email-threads.js +38 -1
  160. package/dist/knowledge/spaces/financial-docs.js +38 -1
  161. package/dist/knowledge/spaces/financial-overview.js +42 -1
  162. package/dist/knowledge/spaces/index.js +8 -1
  163. package/dist/knowledge/spaces/product-canon.js +38 -1
  164. package/dist/knowledge/spaces/support-faq.js +41 -1
  165. package/dist/knowledge/spaces/uploaded-docs.js +38 -1
  166. package/dist/knowledge/spec.js +39 -1
  167. package/dist/llm/exporters.js +541 -8
  168. package/dist/llm/index.js +4 -1
  169. package/dist/llm/prompts.js +246 -56
  170. package/dist/markdown.js +116 -3
  171. package/dist/migrations.js +33 -1
  172. package/dist/onboarding-base.d.ts +29 -29
  173. package/dist/onboarding-base.js +196 -1
  174. package/dist/openapi.js +75 -1
  175. package/dist/openbanking/docs/openbanking.docblock.js +22 -109
  176. package/dist/ownership.js +40 -1
  177. package/dist/policy/docs/policy.docblock.js +22 -1
  178. package/dist/policy/engine.js +223 -1
  179. package/dist/policy/opa-adapter.js +71 -1
  180. package/dist/policy/spec.js +33 -1
  181. package/dist/presentations/docs/presentations-conventions.docblock.js +21 -7
  182. package/dist/presentations.backcompat.js +47 -1
  183. package/dist/presentations.d.ts +3 -3
  184. package/dist/presentations.js +66 -1
  185. package/dist/presentations.v2.js +278 -6
  186. package/dist/prompt.js +10 -1
  187. package/dist/promptRegistry.js +34 -1
  188. package/dist/regenerator/docs/regenerator.docblock.js +22 -184
  189. package/dist/regenerator/executor.js +86 -1
  190. package/dist/regenerator/index.js +6 -1
  191. package/dist/regenerator/service.js +92 -1
  192. package/dist/regenerator/sinks.js +32 -1
  193. package/dist/regenerator/utils.js +51 -1
  194. package/dist/registry.js +208 -1
  195. package/dist/resources.js +47 -1
  196. package/dist/schema/dist/EnumType.js +2 -1
  197. package/dist/schema/dist/FieldType.js +49 -1
  198. package/dist/schema/dist/ScalarTypeEnum.js +236 -1
  199. package/dist/schema/dist/SchemaModel.js +39 -1
  200. package/dist/schema/dist/entity/defineEntity.js +1 -1
  201. package/dist/schema/dist/entity/index.js +2 -1
  202. package/dist/schema/dist/entity/types.js +1 -1
  203. package/dist/schema/dist/index.js +6 -1
  204. package/dist/schema-to-markdown.js +214 -10
  205. package/dist/server/graphql-pothos.js +128 -1
  206. package/dist/server/index.js +10 -1
  207. package/dist/server/mcp/createMcpServer.js +28 -1
  208. package/dist/server/mcp/registerPresentations.js +151 -1
  209. package/dist/server/mcp/registerPrompts.js +36 -2
  210. package/dist/server/mcp/registerResources.js +35 -1
  211. package/dist/server/mcp/registerTools.js +22 -1
  212. package/dist/server/provider-mcp.js +3 -1
  213. package/dist/server/rest-elysia.js +20 -1
  214. package/dist/server/rest-express.js +39 -1
  215. package/dist/server/rest-generic.js +125 -1
  216. package/dist/server/rest-next-app.js +38 -1
  217. package/dist/server/rest-next-mcp.js +45 -1
  218. package/dist/server/rest-next-pages.js +25 -1
  219. package/dist/spec.js +35 -1
  220. package/dist/telemetry/anomaly.js +48 -1
  221. package/dist/telemetry/docs/telemetry.docblock.js +22 -139
  222. package/dist/telemetry/index.js +5 -1
  223. package/dist/telemetry/spec.js +69 -1
  224. package/dist/telemetry/tracker.js +76 -1
  225. package/dist/tests/index.js +4 -1
  226. package/dist/tests/runner.js +150 -1
  227. package/dist/tests/spec.js +33 -1
  228. package/dist/themes.js +39 -1
  229. package/dist/workflow/adapters/db-adapter.js +83 -1
  230. package/dist/workflow/adapters/file-adapter.js +11 -1
  231. package/dist/workflow/adapters/index.js +5 -1
  232. package/dist/workflow/adapters/memory-store.js +58 -1
  233. package/dist/workflow/expression.js +98 -1
  234. package/dist/workflow/index.js +9 -1
  235. package/dist/workflow/runner.js +337 -1
  236. package/dist/workflow/sla-monitor.js +47 -1
  237. package/dist/workflow/spec.js +32 -1
  238. package/dist/workflow/validation.js +175 -1
  239. package/package.json +11 -4
@@ -1 +1,229 @@
1
- import{SecretProviderError as e,normalizeSecretPayload as t,parseSecretUri as n}from"./provider.js";import{SecretManagerServiceClient as r,protos as i}from"@google-cloud/secret-manager";const a={automatic:{}};var o=class{id=`gcp-secret-manager`;client;explicitProjectId;replication;constructor(e={}){this.client=e.client??new r(e.clientOptions??{}),this.explicitProjectId=e.projectId,this.replication=e.defaultReplication??a}canHandle(e){try{return n(e).provider===`gcp`}catch{return!1}}async getSecret(t,n,r){let i=this.parseReference(t),a=this.buildVersionName(i,n?.version);try{let[n]=await this.client.accessSecretVersion({name:a},r??{}),i=n.payload;if(!i?.data)throw new e({message:`Secret payload empty for ${a}`,provider:this.id,reference:t,code:`UNKNOWN`});let o=s(n.name??a);return{data:i.data,version:o,metadata:i.dataCrc32c?{crc32c:i.dataCrc32c.toString()}:void 0,retrievedAt:new Date}}catch(e){throw c({error:e,provider:this.id,reference:t,operation:`access`})}}async setSecret(n,r){let i=this.parseReference(n),{secretName:a}=this.buildNames(i),o=t(r);await this.ensureSecretExists(i,r);try{let t=await this.client.addSecretVersion({parent:a,payload:{data:o}});if(!t)throw new e({message:`No version returned when adding secret version for ${a}`,provider:this.id,reference:n,code:`UNKNOWN`});let[r]=t,i=r?.name??`${a}/versions/latest`;return{reference:`gcp://${i}`,version:s(i)??`latest`}}catch(e){throw c({error:e,provider:this.id,reference:n,operation:`addSecretVersion`})}}async rotateSecret(e,t){return this.setSecret(e,t)}async deleteSecret(e){let t=this.parseReference(e),{secretName:n}=this.buildNames(t);try{await this.client.deleteSecret({name:n})}catch(t){throw c({error:t,provider:this.id,reference:e,operation:`delete`})}}parseReference(t){let r=n(t);if(r.provider!==`gcp`)throw new e({message:`Unsupported secret provider: ${r.provider}`,provider:this.id,reference:t,code:`INVALID`});let i=r.path.split(`/`).filter(Boolean);if(i.length<4||i[0]!==`projects`)throw new e({message:`Expected secret reference format gcp://projects/{project}/secrets/{secret}[(/versions/{version})] but received "${r.path}"`,provider:this.id,reference:t,code:`INVALID`});let a=i[1]??this.explicitProjectId;if(!a)throw new e({message:`Unable to resolve project or secret from reference "${r.path}"`,provider:this.id,reference:t,code:`INVALID`});let o=i.indexOf(`secrets`);if(o===-1||o+1>=i.length)throw new e({message:`Unable to resolve project or secret from reference "${r.path}"`,provider:this.id,reference:t,code:`INVALID`});let s=a,c=i[o+1];if(!c)throw new e({message:`Unable to resolve secret ID from reference "${r.path}"`,provider:this.id,reference:t,code:`INVALID`});let l=c,u=i.indexOf(`versions`);return{projectId:s,secretId:l,version:r.extras?.version??(u!==-1&&u+1<i.length?i[u+1]:void 0)}}buildNames(t){let n=t.projectId??this.explicitProjectId;if(!n)throw new e({message:`Project ID must be provided either in reference or provider configuration`,provider:this.id,reference:`gcp://projects//secrets/${t.secretId}`,code:`INVALID`});let r=`projects/${n}`;return{projectParent:r,secretName:`${r}/secrets/${t.secretId}`}}buildVersionName(e,t){let{secretName:n}=this.buildNames(e);return`${n}/versions/${t??e.version??`latest`}`}async ensureSecretExists(e,t){let{secretName:n,projectParent:r}=this.buildNames(e);try{await this.client.getSecret({name:n})}catch(i){let a=c({error:i,provider:this.id,reference:`gcp://${n}`,operation:`getSecret`,suppressThrow:!0});if(!a||a.code!==`NOT_FOUND`)throw a||i;try{await this.client.createSecret({parent:r,secretId:e.secretId,secret:{replication:this.replication,labels:t.labels}})}catch(e){throw c({error:e,provider:this.id,reference:`gcp://${n}`,operation:`createSecret`})}}}};function s(e){let t=e.split(`/`).filter(Boolean),n=t.indexOf(`versions`);if(!(n===-1||n+1>=t.length))return t[n+1]}function c(t){let{error:n,provider:r,reference:i,operation:a,suppressThrow:o}=t;if(n instanceof e)return n;let s=l(n),c=new e({message:n instanceof Error?n.message:`Unknown error during ${a}`,provider:r,reference:i,code:s,cause:n});if(o)return c;throw c}function l(e){if(typeof e!=`object`||!e)return`UNKNOWN`;let t=e.code;return t===5||t===`NOT_FOUND`?`NOT_FOUND`:t===6||t===`ALREADY_EXISTS`?`INVALID`:t===7||t===`PERMISSION_DENIED`||t===403?`FORBIDDEN`:t===3||t===`INVALID_ARGUMENT`?`INVALID`:`UNKNOWN`}export{o as GcpSecretManagerProvider};
1
+ import { SecretProviderError, normalizeSecretPayload, parseSecretUri } from "./provider.js";
2
+ import { SecretManagerServiceClient, protos } from "@google-cloud/secret-manager";
3
+
4
+ //#region src/integrations/secrets/gcp-secret-manager.ts
5
+ const DEFAULT_REPLICATION = { automatic: {} };
6
+ var GcpSecretManagerProvider = class {
7
+ id = "gcp-secret-manager";
8
+ client;
9
+ explicitProjectId;
10
+ replication;
11
+ constructor(options = {}) {
12
+ this.client = options.client ?? new SecretManagerServiceClient(options.clientOptions ?? {});
13
+ this.explicitProjectId = options.projectId;
14
+ this.replication = options.defaultReplication ?? DEFAULT_REPLICATION;
15
+ }
16
+ canHandle(reference) {
17
+ try {
18
+ return parseSecretUri(reference).provider === "gcp";
19
+ } catch {
20
+ return false;
21
+ }
22
+ }
23
+ async getSecret(reference, options, callOptions) {
24
+ const location = this.parseReference(reference);
25
+ const secretVersionName = this.buildVersionName(location, options?.version);
26
+ try {
27
+ const [result] = await this.client.accessSecretVersion({ name: secretVersionName }, callOptions ?? {});
28
+ const payload = result.payload;
29
+ if (!payload?.data) throw new SecretProviderError({
30
+ message: `Secret payload empty for ${secretVersionName}`,
31
+ provider: this.id,
32
+ reference,
33
+ code: "UNKNOWN"
34
+ });
35
+ const version = extractVersionFromName(result.name ?? secretVersionName);
36
+ return {
37
+ data: payload.data,
38
+ version,
39
+ metadata: payload.dataCrc32c ? { crc32c: payload.dataCrc32c.toString() } : void 0,
40
+ retrievedAt: /* @__PURE__ */ new Date()
41
+ };
42
+ } catch (error) {
43
+ throw toSecretProviderError({
44
+ error,
45
+ provider: this.id,
46
+ reference,
47
+ operation: "access"
48
+ });
49
+ }
50
+ }
51
+ async setSecret(reference, payload) {
52
+ const location = this.parseReference(reference);
53
+ const { secretName } = this.buildNames(location);
54
+ const data = normalizeSecretPayload(payload);
55
+ await this.ensureSecretExists(location, payload);
56
+ try {
57
+ const response = await this.client.addSecretVersion({
58
+ parent: secretName,
59
+ payload: { data }
60
+ });
61
+ if (!response) throw new SecretProviderError({
62
+ message: `No version returned when adding secret version for ${secretName}`,
63
+ provider: this.id,
64
+ reference,
65
+ code: "UNKNOWN"
66
+ });
67
+ const [version] = response;
68
+ const versionName = version?.name ?? `${secretName}/versions/latest`;
69
+ return {
70
+ reference: `gcp://${versionName}`,
71
+ version: extractVersionFromName(versionName) ?? "latest"
72
+ };
73
+ } catch (error) {
74
+ throw toSecretProviderError({
75
+ error,
76
+ provider: this.id,
77
+ reference,
78
+ operation: "addSecretVersion"
79
+ });
80
+ }
81
+ }
82
+ async rotateSecret(reference, payload) {
83
+ return this.setSecret(reference, payload);
84
+ }
85
+ async deleteSecret(reference) {
86
+ const location = this.parseReference(reference);
87
+ const { secretName } = this.buildNames(location);
88
+ try {
89
+ await this.client.deleteSecret({ name: secretName });
90
+ } catch (error) {
91
+ throw toSecretProviderError({
92
+ error,
93
+ provider: this.id,
94
+ reference,
95
+ operation: "delete"
96
+ });
97
+ }
98
+ }
99
+ parseReference(reference) {
100
+ const parsed = parseSecretUri(reference);
101
+ if (parsed.provider !== "gcp") throw new SecretProviderError({
102
+ message: `Unsupported secret provider: ${parsed.provider}`,
103
+ provider: this.id,
104
+ reference,
105
+ code: "INVALID"
106
+ });
107
+ const segments = parsed.path.split("/").filter(Boolean);
108
+ if (segments.length < 4 || segments[0] !== "projects") throw new SecretProviderError({
109
+ message: `Expected secret reference format gcp://projects/{project}/secrets/{secret}[(/versions/{version})] but received "${parsed.path}"`,
110
+ provider: this.id,
111
+ reference,
112
+ code: "INVALID"
113
+ });
114
+ const projectIdCandidate = segments[1] ?? this.explicitProjectId;
115
+ if (!projectIdCandidate) throw new SecretProviderError({
116
+ message: `Unable to resolve project or secret from reference "${parsed.path}"`,
117
+ provider: this.id,
118
+ reference,
119
+ code: "INVALID"
120
+ });
121
+ const indexOfSecrets = segments.indexOf("secrets");
122
+ if (indexOfSecrets === -1 || indexOfSecrets + 1 >= segments.length) throw new SecretProviderError({
123
+ message: `Unable to resolve project or secret from reference "${parsed.path}"`,
124
+ provider: this.id,
125
+ reference,
126
+ code: "INVALID"
127
+ });
128
+ const resolvedProjectId = projectIdCandidate;
129
+ const secretIdCandidate = segments[indexOfSecrets + 1];
130
+ if (!secretIdCandidate) throw new SecretProviderError({
131
+ message: `Unable to resolve secret ID from reference "${parsed.path}"`,
132
+ provider: this.id,
133
+ reference,
134
+ code: "INVALID"
135
+ });
136
+ const secretId = secretIdCandidate;
137
+ const indexOfVersions = segments.indexOf("versions");
138
+ return {
139
+ projectId: resolvedProjectId,
140
+ secretId,
141
+ version: parsed.extras?.version ?? (indexOfVersions !== -1 && indexOfVersions + 1 < segments.length ? segments[indexOfVersions + 1] : void 0)
142
+ };
143
+ }
144
+ buildNames(location) {
145
+ const projectId = location.projectId ?? this.explicitProjectId;
146
+ if (!projectId) throw new SecretProviderError({
147
+ message: "Project ID must be provided either in reference or provider configuration",
148
+ provider: this.id,
149
+ reference: `gcp://projects//secrets/${location.secretId}`,
150
+ code: "INVALID"
151
+ });
152
+ const projectParent = `projects/${projectId}`;
153
+ return {
154
+ projectParent,
155
+ secretName: `${projectParent}/secrets/${location.secretId}`
156
+ };
157
+ }
158
+ buildVersionName(location, explicitVersion) {
159
+ const { secretName } = this.buildNames(location);
160
+ return `${secretName}/versions/${explicitVersion ?? location.version ?? "latest"}`;
161
+ }
162
+ async ensureSecretExists(location, payload) {
163
+ const { secretName, projectParent } = this.buildNames(location);
164
+ try {
165
+ await this.client.getSecret({ name: secretName });
166
+ } catch (error) {
167
+ const providerError = toSecretProviderError({
168
+ error,
169
+ provider: this.id,
170
+ reference: `gcp://${secretName}`,
171
+ operation: "getSecret",
172
+ suppressThrow: true
173
+ });
174
+ if (!providerError || providerError.code !== "NOT_FOUND") {
175
+ if (providerError) throw providerError;
176
+ throw error;
177
+ }
178
+ try {
179
+ await this.client.createSecret({
180
+ parent: projectParent,
181
+ secretId: location.secretId,
182
+ secret: {
183
+ replication: this.replication,
184
+ labels: payload.labels
185
+ }
186
+ });
187
+ } catch (creationError) {
188
+ throw toSecretProviderError({
189
+ error: creationError,
190
+ provider: this.id,
191
+ reference: `gcp://${secretName}`,
192
+ operation: "createSecret"
193
+ });
194
+ }
195
+ }
196
+ }
197
+ };
198
+ function extractVersionFromName(name) {
199
+ const segments = name.split("/").filter(Boolean);
200
+ const index = segments.indexOf("versions");
201
+ if (index === -1 || index + 1 >= segments.length) return;
202
+ return segments[index + 1];
203
+ }
204
+ function toSecretProviderError(params) {
205
+ const { error, provider, reference, operation, suppressThrow } = params;
206
+ if (error instanceof SecretProviderError) return error;
207
+ const code = deriveErrorCode(error);
208
+ const providerError = new SecretProviderError({
209
+ message: error instanceof Error ? error.message : `Unknown error during ${operation}`,
210
+ provider,
211
+ reference,
212
+ code,
213
+ cause: error
214
+ });
215
+ if (suppressThrow) return providerError;
216
+ throw providerError;
217
+ }
218
+ function deriveErrorCode(error) {
219
+ if (typeof error !== "object" || error === null) return "UNKNOWN";
220
+ const code = error.code;
221
+ if (code === 5 || code === "NOT_FOUND") return "NOT_FOUND";
222
+ if (code === 6 || code === "ALREADY_EXISTS") return "INVALID";
223
+ if (code === 7 || code === "PERMISSION_DENIED" || code === 403) return "FORBIDDEN";
224
+ if (code === 3 || code === "INVALID_ARGUMENT") return "INVALID";
225
+ return "UNKNOWN";
226
+ }
227
+
228
+ //#endregion
229
+ export { GcpSecretManagerProvider };
@@ -1 +1,8 @@
1
- import{SecretProviderError as e,normalizeSecretPayload as t,parseSecretUri as n}from"./provider.js";import{AwsSecretsManagerProvider as r}from"./aws-secret-manager.js";import{EnvSecretProvider as i}from"./env-secret-provider.js";import{GcpSecretManagerProvider as a}from"./gcp-secret-manager.js";import{ScalewaySecretManagerProvider as o}from"./scaleway-secret-manager.js";import{SecretProviderManager as s}from"./manager.js";export{r as AwsSecretsManagerProvider,i as EnvSecretProvider,a as GcpSecretManagerProvider,o as ScalewaySecretManagerProvider,e as SecretProviderError,s as SecretProviderManager,t as normalizeSecretPayload,n as parseSecretUri};
1
+ import { SecretProviderError, normalizeSecretPayload, parseSecretUri } from "./provider.js";
2
+ import { AwsSecretsManagerProvider } from "./aws-secret-manager.js";
3
+ import { EnvSecretProvider } from "./env-secret-provider.js";
4
+ import { GcpSecretManagerProvider } from "./gcp-secret-manager.js";
5
+ import { ScalewaySecretManagerProvider } from "./scaleway-secret-manager.js";
6
+ import { SecretProviderManager } from "./manager.js";
7
+
8
+ export { AwsSecretsManagerProvider, EnvSecretProvider, GcpSecretManagerProvider, ScalewaySecretManagerProvider, SecretProviderError, SecretProviderManager, normalizeSecretPayload, parseSecretUri };
@@ -1 +1,103 @@
1
- import{SecretProviderError as e}from"./provider.js";var t=class{id;providers=[];registrationCounter=0;constructor(e={}){this.id=e.id??`secret-provider-manager`;let t=e.providers??[];for(let e of t)this.register(e.provider,{priority:e.priority})}register(e,t={}){return this.providers.push({provider:e,priority:t.priority??0,order:this.registrationCounter++}),this.providers.sort((e,t)=>e.priority===t.priority?e.order-t.order:t.priority-e.priority),this}canHandle(e){return this.providers.some(({provider:t})=>n(t,e))}async getSecret(t,r){let i=[];for(let{provider:a}of this.providers)if(n(a,t))try{return await a.getSecret(t,r)}catch(t){if(t instanceof e){if(i.push(t),t.code!==`NOT_FOUND`)break;continue}throw t}throw this.composeError(`getSecret`,t,i,r?.version)}async setSecret(e,t){return this.delegateToFirst(`setSecret`,e,n=>n.setSecret(e,t))}async rotateSecret(e,t){return this.delegateToFirst(`rotateSecret`,e,n=>n.rotateSecret(e,t))}async deleteSecret(e){await this.delegateToFirst(`deleteSecret`,e,t=>t.deleteSecret(e))}async delegateToFirst(t,r,i){let a=[];for(let{provider:t}of this.providers)if(n(t,r))try{return await i(t)}catch(t){if(t instanceof e){a.push(t);continue}throw t}throw this.composeError(t,r,a)}composeError(t,n,r,i){if(r.length===1){let[e]=r;if(e)return e}let a=[`No registered secret provider could ${t}`,`reference "${n}"`];return i&&a.push(`(version: ${i})`),r.length>1&&a.push(`Attempts: ${r.map(e=>`${e.provider}:${e.code}`).join(`, `)}`),new e({message:a.join(` `),provider:this.id,reference:n,code:r.length>0?r[r.length-1].code:`UNKNOWN`,cause:r})}};function n(e,t){try{return e.canHandle(t)}catch{return!1}}export{t as SecretProviderManager};
1
+ import { SecretProviderError } from "./provider.js";
2
+
3
+ //#region src/integrations/secrets/manager.ts
4
+ /**
5
+ * Composite secret provider that delegates to registered providers.
6
+ * Providers are attempted in order of descending priority, respecting the
7
+ * registration order for ties. This enables privileged overrides (e.g.
8
+ * environment variables) while still supporting durable backends like GCP
9
+ * Secret Manager.
10
+ */
11
+ var SecretProviderManager = class {
12
+ id;
13
+ providers = [];
14
+ registrationCounter = 0;
15
+ constructor(options = {}) {
16
+ this.id = options.id ?? "secret-provider-manager";
17
+ const initialProviders = options.providers ?? [];
18
+ for (const entry of initialProviders) this.register(entry.provider, { priority: entry.priority });
19
+ }
20
+ register(provider, options = {}) {
21
+ this.providers.push({
22
+ provider,
23
+ priority: options.priority ?? 0,
24
+ order: this.registrationCounter++
25
+ });
26
+ this.providers.sort((a, b) => {
27
+ if (a.priority !== b.priority) return b.priority - a.priority;
28
+ return a.order - b.order;
29
+ });
30
+ return this;
31
+ }
32
+ canHandle(reference) {
33
+ return this.providers.some(({ provider }) => safeCanHandle(provider, reference));
34
+ }
35
+ async getSecret(reference, options) {
36
+ const errors = [];
37
+ for (const { provider } of this.providers) {
38
+ if (!safeCanHandle(provider, reference)) continue;
39
+ try {
40
+ return await provider.getSecret(reference, options);
41
+ } catch (error) {
42
+ if (error instanceof SecretProviderError) {
43
+ errors.push(error);
44
+ if (error.code !== "NOT_FOUND") break;
45
+ continue;
46
+ }
47
+ throw error;
48
+ }
49
+ }
50
+ throw this.composeError("getSecret", reference, errors, options?.version);
51
+ }
52
+ async setSecret(reference, payload) {
53
+ return this.delegateToFirst("setSecret", reference, (provider) => provider.setSecret(reference, payload));
54
+ }
55
+ async rotateSecret(reference, payload) {
56
+ return this.delegateToFirst("rotateSecret", reference, (provider) => provider.rotateSecret(reference, payload));
57
+ }
58
+ async deleteSecret(reference) {
59
+ await this.delegateToFirst("deleteSecret", reference, (provider) => provider.deleteSecret(reference));
60
+ }
61
+ async delegateToFirst(operation, reference, invoker) {
62
+ const errors = [];
63
+ for (const { provider } of this.providers) {
64
+ if (!safeCanHandle(provider, reference)) continue;
65
+ try {
66
+ return await invoker(provider);
67
+ } catch (error) {
68
+ if (error instanceof SecretProviderError) {
69
+ errors.push(error);
70
+ continue;
71
+ }
72
+ throw error;
73
+ }
74
+ }
75
+ throw this.composeError(operation, reference, errors);
76
+ }
77
+ composeError(operation, reference, errors, version) {
78
+ if (errors.length === 1) {
79
+ const [singleError] = errors;
80
+ if (singleError) return singleError;
81
+ }
82
+ const messageParts = [`No registered secret provider could ${operation}`, `reference "${reference}"`];
83
+ if (version) messageParts.push(`(version: ${version})`);
84
+ if (errors.length > 1) messageParts.push(`Attempts: ${errors.map((error) => `${error.provider}:${error.code}`).join(", ")}`);
85
+ return new SecretProviderError({
86
+ message: messageParts.join(" "),
87
+ provider: this.id,
88
+ reference,
89
+ code: errors.length > 0 ? errors[errors.length - 1].code : "UNKNOWN",
90
+ cause: errors
91
+ });
92
+ }
93
+ };
94
+ function safeCanHandle(provider, reference) {
95
+ try {
96
+ return provider.canHandle(reference);
97
+ } catch {
98
+ return false;
99
+ }
100
+ }
101
+
102
+ //#endregion
103
+ export { SecretProviderManager };
@@ -1 +1,58 @@
1
- import{Buffer as e}from"node:buffer";var t=class extends Error{provider;reference;code;cause;constructor(e){super(e.message),this.name=`SecretProviderError`,this.provider=e.provider,this.reference=e.reference,this.code=e.code??`UNKNOWN`,this.cause=e.cause}};function n(e){if(!e)throw new t({message:`Secret reference cannot be empty`,provider:`unknown`,reference:e,code:`INVALID`});let[n,r]=e.split(`://`);if(!n||!r)throw new t({message:`Invalid secret reference: ${e}`,provider:`unknown`,reference:e,code:`INVALID`});let i=r.indexOf(`?`);if(i===-1)return{provider:n,path:r};let a=r.slice(0,i),o=r.slice(i+1);return{provider:n,path:a,extras:Object.fromEntries(o.split(`&`).filter(Boolean).map(e=>{let[t,n]=e.split(`=`),r=t??``,i=n??``;return[decodeURIComponent(r),decodeURIComponent(i)]}))}}function r(t){return t.data instanceof Uint8Array?t.data:t.encoding===`base64`?e.from(t.data,`base64`):t.encoding===`binary`?e.from(t.data,`binary`):e.from(t.data,`utf-8`)}export{t as SecretProviderError,r as normalizeSecretPayload,n as parseSecretUri};
1
+ import { Buffer } from "node:buffer";
2
+
3
+ //#region src/integrations/secrets/provider.ts
4
+ var SecretProviderError = class extends Error {
5
+ provider;
6
+ reference;
7
+ code;
8
+ cause;
9
+ constructor(params) {
10
+ super(params.message);
11
+ this.name = "SecretProviderError";
12
+ this.provider = params.provider;
13
+ this.reference = params.reference;
14
+ this.code = params.code ?? "UNKNOWN";
15
+ this.cause = params.cause;
16
+ }
17
+ };
18
+ function parseSecretUri(reference) {
19
+ if (!reference) throw new SecretProviderError({
20
+ message: "Secret reference cannot be empty",
21
+ provider: "unknown",
22
+ reference,
23
+ code: "INVALID"
24
+ });
25
+ const [scheme, rest] = reference.split("://");
26
+ if (!scheme || !rest) throw new SecretProviderError({
27
+ message: `Invalid secret reference: ${reference}`,
28
+ provider: "unknown",
29
+ reference,
30
+ code: "INVALID"
31
+ });
32
+ const queryIndex = rest.indexOf("?");
33
+ if (queryIndex === -1) return {
34
+ provider: scheme,
35
+ path: rest
36
+ };
37
+ const path = rest.slice(0, queryIndex);
38
+ const query = rest.slice(queryIndex + 1);
39
+ return {
40
+ provider: scheme,
41
+ path,
42
+ extras: Object.fromEntries(query.split("&").filter(Boolean).map((pair) => {
43
+ const [keyRaw, valueRaw] = pair.split("=");
44
+ const key = keyRaw ?? "";
45
+ const value = valueRaw ?? "";
46
+ return [decodeURIComponent(key), decodeURIComponent(value)];
47
+ }))
48
+ };
49
+ }
50
+ function normalizeSecretPayload(payload) {
51
+ if (payload.data instanceof Uint8Array) return payload.data;
52
+ if (payload.encoding === "base64") return Buffer.from(payload.data, "base64");
53
+ if (payload.encoding === "binary") return Buffer.from(payload.data, "binary");
54
+ return Buffer.from(payload.data, "utf-8");
55
+ }
56
+
57
+ //#endregion
58
+ export { SecretProviderError, normalizeSecretPayload, parseSecretUri };
@@ -1 +1,247 @@
1
- import{SecretProviderError as e,normalizeSecretPayload as t,parseSecretUri as n}from"./provider.js";import{Buffer as r}from"node:buffer";const i=/^[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}$/i;var a=class{id=`scaleway-secret-manager`;token;defaultRegion;defaultProjectId;baseUrl;fetchFn;constructor(e={}){this.token=e.token??process.env.SCW_SECRET_KEY??process.env.SCALEWAY_SECRET_KEY??``,this.defaultRegion=e.defaultRegion??process.env.SCW_DEFAULT_REGION??process.env.SCW_REGION,this.defaultProjectId=e.defaultProjectId??process.env.SCW_DEFAULT_PROJECT_ID??process.env.SCW_PROJECT_ID,this.baseUrl=e.baseUrl??`https://api.scaleway.com`,this.fetchFn=e.fetch??fetch}canHandle(e){try{let t=n(e);return t.provider===`scw`&&(t.path===`secret-manager`||t.path.startsWith(`secret-manager/`))}catch{return!1}}async getSecret(t,n){let a=this.parseReference(t);if(!this.token)throw new e({message:`Scaleway secret manager token is missing (set SCW_SECRET_KEY / SCALEWAY_SECRET_KEY).`,provider:this.id,reference:t,code:`FORBIDDEN`});if(!i.test(a.secretIdOrName))throw new e({message:`Scaleway getSecret requires a secretId (uuid) reference, not a secret name.`,provider:this.id,reference:t,code:`INVALID`});let s=n?.version??a.revision??`latest`,c=`${this.baseUrl}/secret-manager/v1beta1/regions/${encodeURIComponent(a.region)}/secrets/${encodeURIComponent(a.secretIdOrName)}/versions/${encodeURIComponent(s)}/access`,u=await this.fetchFn(c,{method:`GET`,headers:{"X-Auth-Token":this.token}});if(!u.ok)throw await l({response:u,provider:this.id,reference:t,operation:`getSecret`});let d=o(await u.json());return{data:r.from(d,`base64`),version:s,metadata:{region:a.region,secretId:a.secretIdOrName},retrievedAt:new Date}}async setSecret(n,a){let o=this.parseReference(n);if(!this.token)throw new e({message:`Scaleway secret manager token is missing (set SCW_SECRET_KEY / SCALEWAY_SECRET_KEY).`,provider:this.id,reference:n,code:`FORBIDDEN`});let s=t(a),c=r.from(s).toString(`base64`),l=i.test(o.secretIdOrName)?o.secretIdOrName:await this.createSecret({region:o.region,name:o.secretIdOrName,reference:n}),u=await this.createSecretVersion({region:o.region,secretId:l,dataB64:c,reference:n});return{reference:this.buildReference(o.region,l,{version:u}),version:u}}async rotateSecret(e,t){return this.setSecret(e,t)}async deleteSecret(t){let n=this.parseReference(t);if(!this.token)throw new e({message:`Scaleway secret manager token is missing (set SCW_SECRET_KEY / SCALEWAY_SECRET_KEY).`,provider:this.id,reference:t,code:`FORBIDDEN`});if(!i.test(n.secretIdOrName))throw new e({message:`Scaleway deleteSecret requires a secretId (uuid) reference, not a secret name.`,provider:this.id,reference:t,code:`INVALID`});let r=`${this.baseUrl}/secret-manager/v1beta1/regions/${encodeURIComponent(n.region)}/secrets/${encodeURIComponent(n.secretIdOrName)}`,a=await this.fetchFn(r,{method:`DELETE`,headers:{"X-Auth-Token":this.token}});if(!a.ok)throw await l({response:a,provider:this.id,reference:t,operation:`deleteSecret`})}parseReference(t){let r=n(t);if(r.provider!==`scw`)throw new e({message:`Unsupported secret provider: ${r.provider}`,provider:this.id,reference:t,code:`INVALID`});let i=r.path.split(`/`).filter(Boolean);if(i.length<2||i[0]!==`secret-manager`)throw new e({message:`Expected secret reference format scw://secret-manager/{region}/{secretIdOrName}[?version=...]`,provider:this.id,reference:t,code:`INVALID`});let a=i[1]??this.defaultRegion;if(!a)throw new e({message:`Scaleway region must be provided either in reference (scw://secret-manager/{region}/...) or via SCW_DEFAULT_REGION/SCW_REGION.`,provider:this.id,reference:t,code:`INVALID`});let o=i.slice(2).join(`/`);if(!o)throw new e({message:`Unable to resolve secret id/name from reference "${r.path}"`,provider:this.id,reference:t,code:`INVALID`});return{region:a,secretIdOrName:o,revision:r.extras?.version}}async createSecret(t){let n=this.defaultProjectId;if(!n)throw new e({message:`Scaleway project id is required to create secrets by name (set SCW_DEFAULT_PROJECT_ID/SCW_PROJECT_ID).`,provider:this.id,reference:t.reference,code:`INVALID`});let r=`${this.baseUrl}/secret-manager/v1beta1/regions/${encodeURIComponent(t.region)}/secrets`,i=await this.fetchFn(r,{method:`POST`,headers:{"Content-Type":`application/json`,"X-Auth-Token":this.token},body:JSON.stringify({name:t.name,project_id:n})});if(!i.ok)throw await l({response:i,provider:this.id,reference:t.reference,operation:`createSecret`});return s(await i.json())}async createSecretVersion(e){let t=`${this.baseUrl}/secret-manager/v1beta1/regions/${encodeURIComponent(e.region)}/secrets/${encodeURIComponent(e.secretId)}/versions`,n=await this.fetchFn(t,{method:`POST`,headers:{"Content-Type":`application/json`,"X-Auth-Token":this.token},body:JSON.stringify({data:e.dataB64})});if(!n.ok)throw await l({response:n,provider:this.id,reference:e.reference,operation:`createSecretVersion`});return c(await n.json())??`latest`}buildReference(e,t,n){let r=`scw://secret-manager/${e}/${t}`,i=n?Object.entries(n).filter(([,e])=>!!e).map(([e,t])=>`${encodeURIComponent(e)}=${encodeURIComponent(t)}`).join(`&`):``;return i?`${r}?${i}`:r}};function o(e){if(!e||typeof e!=`object`)throw Error(`Invalid scaleway secret payload`);let t=e;if(typeof t.data==`string`&&t.data)return t.data;throw Error(`Scaleway secret payload is missing data`)}function s(e){if(!e||typeof e!=`object`)throw Error(`Invalid scaleway createSecret payload`);let t=e;if(typeof t.id==`string`&&t.id)return t.id;throw Error(`Scaleway createSecret response is missing id`)}function c(e){if(!e||typeof e!=`object`)return;let t=e;if(typeof t.revision==`number`)return String(t.revision);if(typeof t.revision==`string`&&t.revision)return t.revision;if(typeof t.id==`string`&&t.id)return t.id}async function l(t){let{response:n,provider:r,reference:i,operation:a}=t,o=n.status===404?`NOT_FOUND`:n.status===401||n.status===403?`FORBIDDEN`:n.status>=400&&n.status<500?`INVALID`:`UNKNOWN`,s=await u(n);return new e({message:s?`Scaleway Secret Manager ${a} failed (${n.status}): ${s}`:`Scaleway Secret Manager ${a} failed (${n.status})`,provider:r,reference:i,code:o})}async function u(e){try{let t=(await e.text()).trim();return t.length?t:void 0}catch{return}}export{a as ScalewaySecretManagerProvider};
1
+ import { SecretProviderError, normalizeSecretPayload, parseSecretUri } from "./provider.js";
2
+ import { Buffer } from "node:buffer";
3
+
4
+ //#region src/integrations/secrets/scaleway-secret-manager.ts
5
+ const UUID_V4_LIKE = /^[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}$/i;
6
+ var ScalewaySecretManagerProvider = class {
7
+ id = "scaleway-secret-manager";
8
+ token;
9
+ defaultRegion;
10
+ defaultProjectId;
11
+ baseUrl;
12
+ fetchFn;
13
+ constructor(options = {}) {
14
+ this.token = options.token ?? process.env.SCW_SECRET_KEY ?? process.env.SCALEWAY_SECRET_KEY ?? "";
15
+ this.defaultRegion = options.defaultRegion ?? process.env.SCW_DEFAULT_REGION ?? process.env.SCW_REGION;
16
+ this.defaultProjectId = options.defaultProjectId ?? process.env.SCW_DEFAULT_PROJECT_ID ?? process.env.SCW_PROJECT_ID;
17
+ this.baseUrl = options.baseUrl ?? "https://api.scaleway.com";
18
+ this.fetchFn = options.fetch ?? fetch;
19
+ }
20
+ canHandle(reference) {
21
+ try {
22
+ const parsed = parseSecretUri(reference);
23
+ return parsed.provider === "scw" && (parsed.path === "secret-manager" || parsed.path.startsWith("secret-manager/"));
24
+ } catch {
25
+ return false;
26
+ }
27
+ }
28
+ async getSecret(reference, options) {
29
+ const location = this.parseReference(reference);
30
+ if (!this.token) throw new SecretProviderError({
31
+ message: "Scaleway secret manager token is missing (set SCW_SECRET_KEY / SCALEWAY_SECRET_KEY).",
32
+ provider: this.id,
33
+ reference,
34
+ code: "FORBIDDEN"
35
+ });
36
+ if (!UUID_V4_LIKE.test(location.secretIdOrName)) throw new SecretProviderError({
37
+ message: "Scaleway getSecret requires a secretId (uuid) reference, not a secret name.",
38
+ provider: this.id,
39
+ reference,
40
+ code: "INVALID"
41
+ });
42
+ const revision = options?.version ?? location.revision ?? "latest";
43
+ const url = `${this.baseUrl}/secret-manager/v1beta1/regions/${encodeURIComponent(location.region)}/secrets/${encodeURIComponent(location.secretIdOrName)}/versions/${encodeURIComponent(revision)}/access`;
44
+ const response = await this.fetchFn(url, {
45
+ method: "GET",
46
+ headers: { "X-Auth-Token": this.token }
47
+ });
48
+ if (!response.ok) throw await toScalewayError({
49
+ response,
50
+ provider: this.id,
51
+ reference,
52
+ operation: "getSecret"
53
+ });
54
+ const dataB64 = extractScalewayData(await response.json());
55
+ return {
56
+ data: Buffer.from(dataB64, "base64"),
57
+ version: revision,
58
+ metadata: {
59
+ region: location.region,
60
+ secretId: location.secretIdOrName
61
+ },
62
+ retrievedAt: /* @__PURE__ */ new Date()
63
+ };
64
+ }
65
+ async setSecret(reference, payload) {
66
+ const location = this.parseReference(reference);
67
+ if (!this.token) throw new SecretProviderError({
68
+ message: "Scaleway secret manager token is missing (set SCW_SECRET_KEY / SCALEWAY_SECRET_KEY).",
69
+ provider: this.id,
70
+ reference,
71
+ code: "FORBIDDEN"
72
+ });
73
+ const bytes = normalizeSecretPayload(payload);
74
+ const encoded = Buffer.from(bytes).toString("base64");
75
+ const secretId = UUID_V4_LIKE.test(location.secretIdOrName) ? location.secretIdOrName : await this.createSecret({
76
+ region: location.region,
77
+ name: location.secretIdOrName,
78
+ reference
79
+ });
80
+ const version = await this.createSecretVersion({
81
+ region: location.region,
82
+ secretId,
83
+ dataB64: encoded,
84
+ reference
85
+ });
86
+ return {
87
+ reference: this.buildReference(location.region, secretId, { version }),
88
+ version
89
+ };
90
+ }
91
+ async rotateSecret(reference, payload) {
92
+ return this.setSecret(reference, payload);
93
+ }
94
+ async deleteSecret(reference) {
95
+ const location = this.parseReference(reference);
96
+ if (!this.token) throw new SecretProviderError({
97
+ message: "Scaleway secret manager token is missing (set SCW_SECRET_KEY / SCALEWAY_SECRET_KEY).",
98
+ provider: this.id,
99
+ reference,
100
+ code: "FORBIDDEN"
101
+ });
102
+ if (!UUID_V4_LIKE.test(location.secretIdOrName)) throw new SecretProviderError({
103
+ message: "Scaleway deleteSecret requires a secretId (uuid) reference, not a secret name.",
104
+ provider: this.id,
105
+ reference,
106
+ code: "INVALID"
107
+ });
108
+ const url = `${this.baseUrl}/secret-manager/v1beta1/regions/${encodeURIComponent(location.region)}/secrets/${encodeURIComponent(location.secretIdOrName)}`;
109
+ const response = await this.fetchFn(url, {
110
+ method: "DELETE",
111
+ headers: { "X-Auth-Token": this.token }
112
+ });
113
+ if (!response.ok) throw await toScalewayError({
114
+ response,
115
+ provider: this.id,
116
+ reference,
117
+ operation: "deleteSecret"
118
+ });
119
+ }
120
+ parseReference(reference) {
121
+ const parsed = parseSecretUri(reference);
122
+ if (parsed.provider !== "scw") throw new SecretProviderError({
123
+ message: `Unsupported secret provider: ${parsed.provider}`,
124
+ provider: this.id,
125
+ reference,
126
+ code: "INVALID"
127
+ });
128
+ const segments = parsed.path.split("/").filter(Boolean);
129
+ if (segments.length < 2 || segments[0] !== "secret-manager") throw new SecretProviderError({
130
+ message: "Expected secret reference format scw://secret-manager/{region}/{secretIdOrName}[?version=...]",
131
+ provider: this.id,
132
+ reference,
133
+ code: "INVALID"
134
+ });
135
+ const region = segments[1] ?? this.defaultRegion;
136
+ if (!region) throw new SecretProviderError({
137
+ message: "Scaleway region must be provided either in reference (scw://secret-manager/{region}/...) or via SCW_DEFAULT_REGION/SCW_REGION.",
138
+ provider: this.id,
139
+ reference,
140
+ code: "INVALID"
141
+ });
142
+ const secretIdOrName = segments.slice(2).join("/");
143
+ if (!secretIdOrName) throw new SecretProviderError({
144
+ message: `Unable to resolve secret id/name from reference "${parsed.path}"`,
145
+ provider: this.id,
146
+ reference,
147
+ code: "INVALID"
148
+ });
149
+ return {
150
+ region,
151
+ secretIdOrName,
152
+ revision: parsed.extras?.version
153
+ };
154
+ }
155
+ async createSecret(params) {
156
+ const projectId = this.defaultProjectId;
157
+ if (!projectId) throw new SecretProviderError({
158
+ message: "Scaleway project id is required to create secrets by name (set SCW_DEFAULT_PROJECT_ID/SCW_PROJECT_ID).",
159
+ provider: this.id,
160
+ reference: params.reference,
161
+ code: "INVALID"
162
+ });
163
+ const url = `${this.baseUrl}/secret-manager/v1beta1/regions/${encodeURIComponent(params.region)}/secrets`;
164
+ const response = await this.fetchFn(url, {
165
+ method: "POST",
166
+ headers: {
167
+ "Content-Type": "application/json",
168
+ "X-Auth-Token": this.token
169
+ },
170
+ body: JSON.stringify({
171
+ name: params.name,
172
+ project_id: projectId
173
+ })
174
+ });
175
+ if (!response.ok) throw await toScalewayError({
176
+ response,
177
+ provider: this.id,
178
+ reference: params.reference,
179
+ operation: "createSecret"
180
+ });
181
+ return extractScalewaySecretId(await response.json());
182
+ }
183
+ async createSecretVersion(params) {
184
+ const url = `${this.baseUrl}/secret-manager/v1beta1/regions/${encodeURIComponent(params.region)}/secrets/${encodeURIComponent(params.secretId)}/versions`;
185
+ const response = await this.fetchFn(url, {
186
+ method: "POST",
187
+ headers: {
188
+ "Content-Type": "application/json",
189
+ "X-Auth-Token": this.token
190
+ },
191
+ body: JSON.stringify({ data: params.dataB64 })
192
+ });
193
+ if (!response.ok) throw await toScalewayError({
194
+ response,
195
+ provider: this.id,
196
+ reference: params.reference,
197
+ operation: "createSecretVersion"
198
+ });
199
+ return extractScalewayRevision(await response.json()) ?? "latest";
200
+ }
201
+ buildReference(region, secretId, extras) {
202
+ const base = `scw://secret-manager/${region}/${secretId}`;
203
+ const query = extras ? Object.entries(extras).filter(([, value]) => Boolean(value)).map(([key, value]) => `${encodeURIComponent(key)}=${encodeURIComponent(value)}`).join("&") : "";
204
+ return query ? `${base}?${query}` : base;
205
+ }
206
+ };
207
+ function extractScalewayData(payload) {
208
+ if (!payload || typeof payload !== "object") throw new Error("Invalid scaleway secret payload");
209
+ const record = payload;
210
+ if (typeof record.data === "string" && record.data) return record.data;
211
+ throw new Error("Scaleway secret payload is missing data");
212
+ }
213
+ function extractScalewaySecretId(payload) {
214
+ if (!payload || typeof payload !== "object") throw new Error("Invalid scaleway createSecret payload");
215
+ const record = payload;
216
+ if (typeof record.id === "string" && record.id) return record.id;
217
+ throw new Error("Scaleway createSecret response is missing id");
218
+ }
219
+ function extractScalewayRevision(payload) {
220
+ if (!payload || typeof payload !== "object") return;
221
+ const record = payload;
222
+ if (typeof record.revision === "number") return String(record.revision);
223
+ if (typeof record.revision === "string" && record.revision) return record.revision;
224
+ if (typeof record.id === "string" && record.id) return record.id;
225
+ }
226
+ async function toScalewayError(params) {
227
+ const { response, provider, reference, operation } = params;
228
+ const code = response.status === 404 ? "NOT_FOUND" : response.status === 401 || response.status === 403 ? "FORBIDDEN" : response.status >= 400 && response.status < 500 ? "INVALID" : "UNKNOWN";
229
+ const bodyText = await safeReadBody(response);
230
+ return new SecretProviderError({
231
+ message: bodyText ? `Scaleway Secret Manager ${operation} failed (${response.status}): ${bodyText}` : `Scaleway Secret Manager ${operation} failed (${response.status})`,
232
+ provider,
233
+ reference,
234
+ code
235
+ });
236
+ }
237
+ async function safeReadBody(response) {
238
+ try {
239
+ const trimmed = (await response.text()).trim();
240
+ return trimmed.length ? trimmed : void 0;
241
+ } catch {
242
+ return;
243
+ }
244
+ }
245
+
246
+ //#endregion
247
+ export { ScalewaySecretManagerProvider };