ac-awssecrets 3.0.1 → 3.0.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -1,10 +1,28 @@
1
1
 
2
+ ## [3.0.3](https://github.com/admiralcloud/ac-awssecrets/compare/v3.0.2..v3.0.3) (2026-03-19 12:06:19)
3
+
4
+
5
+ ### Bug Fix
6
+
7
+ * **App:** Package updates | MP | [4210151b414fd574111be1cd373133a14c0b5d6f](https://github.com/admiralcloud/ac-awssecrets/commit/4210151b414fd574111be1cd373133a14c0b5d6f)
8
+ Package updates
9
+ Related issues:
10
+
11
+ ## [3.0.2](https://github.com/admiralcloud/ac-awssecrets/compare/v3.0.1..v3.0.2) (2026-03-04 14:22:40)
12
+
13
+
14
+ ### Bug Fix
15
+
16
+ * **App:** Package updates | MP | [c3e7ab4e089fe1331433bb5e6b145aa86fb1150d](https://github.com/admiralcloud/ac-awssecrets/commit/c3e7ab4e089fe1331433bb5e6b145aa86fb1150d)
17
+ Package updates
18
+ Related issues:
19
+
2
20
  ## [3.0.1](https://github.com/admiralcloud/ac-awssecrets/compare/v3.0.0..v3.0.1) (2026-02-26 13:23:41)
3
21
 
4
22
 
5
23
  ### Bug Fix
6
24
 
7
- * **App:** Move test condiitions away from main code | MP | [f040449b34d716cb68ba6101fad0a3f53b736755](https://github.com/admiralcloud/ac-awssecrets/commit/f040449b34d716cb68ba6101fad0a3f53b736755)
25
+ * **App:** Move test conditions away from main code | MP | [f040449b34d716cb68ba6101fad0a3f53b736755](https://github.com/admiralcloud/ac-awssecrets/commit/f040449b34d716cb68ba6101fad0a3f53b736755)
8
26
  Use mock endpoints for AWS in test and move special conditions for tests from main code.
9
27
  Related issues:
10
28
  * **Misc:** Init valueArray as array | MP | [5c1c027b77ff90df5a5f9d1982d64a39de6e2d28](https://github.com/admiralcloud/ac-awssecrets/commit/5c1c027b77ff90df5a5f9d1982d64a39de6e2d28)
@@ -190,7 +208,7 @@ Related issues: [undefined/undefined#master](undefined/browse/master)
190
208
 
191
209
  ### Feature
192
210
 
193
- * **App:** Allow retrieving paramters by path | MP | [3a2b7be3a3a7cff5132fcb3a19cab6cbb382beed](https://github.com/admiralcloud/ac-awssecrets/commit/3a2b7be3a3a7cff5132fcb3a19cab6cbb382beed)
211
+ * **App:** Allow retrieving parameters by path | MP | [3a2b7be3a3a7cff5132fcb3a19cab6cbb382beed](https://github.com/admiralcloud/ac-awssecrets/commit/3a2b7be3a3a7cff5132fcb3a19cab6cbb382beed)
194
212
  You can fetch and add multiple parameter from they same path with one entry. See README for example
195
213
  Related issues: [undefined/undefined#master](undefined/browse/master)
196
214
  ### Chores
package/package.json CHANGED
@@ -3,10 +3,10 @@
3
3
  "author": "Mark Poepping (https://www.admiralcloud.com)",
4
4
  "license": "MIT",
5
5
  "repository": "admiralcloud/ac-awssecrets",
6
- "version": "3.0.1",
6
+ "version": "3.0.3",
7
7
  "dependencies": {
8
- "@aws-sdk/client-secrets-manager": "^3.997.0",
9
- "@aws-sdk/client-ssm": "^3.997.0"
8
+ "@aws-sdk/client-secrets-manager": "^3.1012.0",
9
+ "@aws-sdk/client-ssm": "^3.1012.0"
10
10
  },
11
11
  "devDependencies": {
12
12
  "ac-semantic-release": "^0.4.10",
@@ -15,7 +15,7 @@
15
15
  "chai": "^4.x",
16
16
  "eslint": "10.x",
17
17
  "@eslint/js": "^10.0.1",
18
- "globals": "^17.3.0",
18
+ "globals": "^17.4.0",
19
19
  "mocha": "^11.7.5"
20
20
  },
21
21
  "scripts": {
@@ -27,7 +27,8 @@
27
27
  },
28
28
  "resolutions": {
29
29
  "mocha/diff": "^8.0.3",
30
- "minimatch": "^10.2.1"
30
+ "minimatch": "^10.2.1",
31
+ "mocha/serialize-javascript": "^7.0.3"
31
32
  },
32
33
  "packageManager": "yarn@1.22.22+sha512.a6b2f7906b721bba3d67d4aff083df04dad64c399707841b7acf00f6b133b7ac24255f2652fa22ae3534329dc6180534e98d17432037ff6fd140556e2bb3137e"
33
34
  }
package/test/test.js CHANGED
@@ -13,9 +13,9 @@ const secretsMock = mockClient(SecretsManagerClient)
13
13
  const captureStream = (stream) => {
14
14
  const oldWrite = stream.write
15
15
  let buf = ''
16
- stream.write = (chunk) => {
16
+ stream.write = (chunk, ...args) => {
17
17
  buf += chunk.toString()
18
- oldWrite.apply(stream, arguments)
18
+ oldWrite.apply(stream, [chunk, ...args])
19
19
  }
20
20
  return {
21
21
  unhook: () => { stream.write = oldWrite },
@@ -480,10 +480,11 @@ describe('loadSecrets', () => {
480
480
  secrets: [{ name: 'configVar1', key: '__proto__.polluted' }],
481
481
  config
482
482
  })
483
- expect(({}).polluted).to.be.undefined
483
+ expect.fail('Should have thrown')
484
484
  }
485
485
  catch(e) {
486
486
  expect(e.message).to.include('unsafe key segment')
487
+ expect(({}).polluted).to.be.undefined
487
488
  }
488
489
  })
489
490
  })