ac-awssecrets 3.0.1 → 3.0.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -1,10 +1,19 @@
1
1
 
2
+ ## [3.0.2](https://github.com/admiralcloud/ac-awssecrets/compare/v3.0.1..v3.0.2) (2026-03-04 14:22:40)
3
+
4
+
5
+ ### Bug Fix
6
+
7
+ * **App:** Package updates | MP | [c3e7ab4e089fe1331433bb5e6b145aa86fb1150d](https://github.com/admiralcloud/ac-awssecrets/commit/c3e7ab4e089fe1331433bb5e6b145aa86fb1150d)
8
+ Package updates
9
+ Related issues:
10
+
2
11
  ## [3.0.1](https://github.com/admiralcloud/ac-awssecrets/compare/v3.0.0..v3.0.1) (2026-02-26 13:23:41)
3
12
 
4
13
 
5
14
  ### Bug Fix
6
15
 
7
- * **App:** Move test condiitions away from main code | MP | [f040449b34d716cb68ba6101fad0a3f53b736755](https://github.com/admiralcloud/ac-awssecrets/commit/f040449b34d716cb68ba6101fad0a3f53b736755)
16
+ * **App:** Move test conditions away from main code | MP | [f040449b34d716cb68ba6101fad0a3f53b736755](https://github.com/admiralcloud/ac-awssecrets/commit/f040449b34d716cb68ba6101fad0a3f53b736755)
8
17
  Use mock endpoints for AWS in test and move special conditions for tests from main code.
9
18
  Related issues:
10
19
  * **Misc:** Init valueArray as array | MP | [5c1c027b77ff90df5a5f9d1982d64a39de6e2d28](https://github.com/admiralcloud/ac-awssecrets/commit/5c1c027b77ff90df5a5f9d1982d64a39de6e2d28)
@@ -190,7 +199,7 @@ Related issues: [undefined/undefined#master](undefined/browse/master)
190
199
 
191
200
  ### Feature
192
201
 
193
- * **App:** Allow retrieving paramters by path | MP | [3a2b7be3a3a7cff5132fcb3a19cab6cbb382beed](https://github.com/admiralcloud/ac-awssecrets/commit/3a2b7be3a3a7cff5132fcb3a19cab6cbb382beed)
202
+ * **App:** Allow retrieving parameters by path | MP | [3a2b7be3a3a7cff5132fcb3a19cab6cbb382beed](https://github.com/admiralcloud/ac-awssecrets/commit/3a2b7be3a3a7cff5132fcb3a19cab6cbb382beed)
194
203
  You can fetch and add multiple parameter from they same path with one entry. See README for example
195
204
  Related issues: [undefined/undefined#master](undefined/browse/master)
196
205
  ### Chores
package/package.json CHANGED
@@ -3,10 +3,10 @@
3
3
  "author": "Mark Poepping (https://www.admiralcloud.com)",
4
4
  "license": "MIT",
5
5
  "repository": "admiralcloud/ac-awssecrets",
6
- "version": "3.0.1",
6
+ "version": "3.0.2",
7
7
  "dependencies": {
8
- "@aws-sdk/client-secrets-manager": "^3.997.0",
9
- "@aws-sdk/client-ssm": "^3.997.0"
8
+ "@aws-sdk/client-secrets-manager": "^3.1001.0",
9
+ "@aws-sdk/client-ssm": "^3.1001.0"
10
10
  },
11
11
  "devDependencies": {
12
12
  "ac-semantic-release": "^0.4.10",
@@ -15,7 +15,7 @@
15
15
  "chai": "^4.x",
16
16
  "eslint": "10.x",
17
17
  "@eslint/js": "^10.0.1",
18
- "globals": "^17.3.0",
18
+ "globals": "^17.4.0",
19
19
  "mocha": "^11.7.5"
20
20
  },
21
21
  "scripts": {
@@ -27,7 +27,8 @@
27
27
  },
28
28
  "resolutions": {
29
29
  "mocha/diff": "^8.0.3",
30
- "minimatch": "^10.2.1"
30
+ "minimatch": "^10.2.1",
31
+ "mocha/serialize-javascript": "^7.0.3"
31
32
  },
32
33
  "packageManager": "yarn@1.22.22+sha512.a6b2f7906b721bba3d67d4aff083df04dad64c399707841b7acf00f6b133b7ac24255f2652fa22ae3534329dc6180534e98d17432037ff6fd140556e2bb3137e"
33
34
  }
package/test/test.js CHANGED
@@ -13,9 +13,9 @@ const secretsMock = mockClient(SecretsManagerClient)
13
13
  const captureStream = (stream) => {
14
14
  const oldWrite = stream.write
15
15
  let buf = ''
16
- stream.write = (chunk) => {
16
+ stream.write = (chunk, ...args) => {
17
17
  buf += chunk.toString()
18
- oldWrite.apply(stream, arguments)
18
+ oldWrite.apply(stream, [chunk, ...args])
19
19
  }
20
20
  return {
21
21
  unhook: () => { stream.write = oldWrite },
@@ -480,10 +480,11 @@ describe('loadSecrets', () => {
480
480
  secrets: [{ name: 'configVar1', key: '__proto__.polluted' }],
481
481
  config
482
482
  })
483
- expect(({}).polluted).to.be.undefined
483
+ expect.fail('Should have thrown')
484
484
  }
485
485
  catch(e) {
486
486
  expect(e.message).to.include('unsafe key segment')
487
+ expect(({}).polluted).to.be.undefined
487
488
  }
488
489
  })
489
490
  })