ac-awssecrets 3.0.1 → 3.0.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +20 -2
- package/package.json +6 -5
- package/test/test.js +4 -3
package/CHANGELOG.md
CHANGED
|
@@ -1,10 +1,28 @@
|
|
|
1
1
|
|
|
2
|
+
## [3.0.3](https://github.com/admiralcloud/ac-awssecrets/compare/v3.0.2..v3.0.3) (2026-03-19 12:06:19)
|
|
3
|
+
|
|
4
|
+
|
|
5
|
+
### Bug Fix
|
|
6
|
+
|
|
7
|
+
* **App:** Package updates | MP | [4210151b414fd574111be1cd373133a14c0b5d6f](https://github.com/admiralcloud/ac-awssecrets/commit/4210151b414fd574111be1cd373133a14c0b5d6f)
|
|
8
|
+
Package updates
|
|
9
|
+
Related issues:
|
|
10
|
+
|
|
11
|
+
## [3.0.2](https://github.com/admiralcloud/ac-awssecrets/compare/v3.0.1..v3.0.2) (2026-03-04 14:22:40)
|
|
12
|
+
|
|
13
|
+
|
|
14
|
+
### Bug Fix
|
|
15
|
+
|
|
16
|
+
* **App:** Package updates | MP | [c3e7ab4e089fe1331433bb5e6b145aa86fb1150d](https://github.com/admiralcloud/ac-awssecrets/commit/c3e7ab4e089fe1331433bb5e6b145aa86fb1150d)
|
|
17
|
+
Package updates
|
|
18
|
+
Related issues:
|
|
19
|
+
|
|
2
20
|
## [3.0.1](https://github.com/admiralcloud/ac-awssecrets/compare/v3.0.0..v3.0.1) (2026-02-26 13:23:41)
|
|
3
21
|
|
|
4
22
|
|
|
5
23
|
### Bug Fix
|
|
6
24
|
|
|
7
|
-
* **App:** Move test
|
|
25
|
+
* **App:** Move test conditions away from main code | MP | [f040449b34d716cb68ba6101fad0a3f53b736755](https://github.com/admiralcloud/ac-awssecrets/commit/f040449b34d716cb68ba6101fad0a3f53b736755)
|
|
8
26
|
Use mock endpoints for AWS in test and move special conditions for tests from main code.
|
|
9
27
|
Related issues:
|
|
10
28
|
* **Misc:** Init valueArray as array | MP | [5c1c027b77ff90df5a5f9d1982d64a39de6e2d28](https://github.com/admiralcloud/ac-awssecrets/commit/5c1c027b77ff90df5a5f9d1982d64a39de6e2d28)
|
|
@@ -190,7 +208,7 @@ Related issues: [undefined/undefined#master](undefined/browse/master)
|
|
|
190
208
|
|
|
191
209
|
### Feature
|
|
192
210
|
|
|
193
|
-
* **App:** Allow retrieving
|
|
211
|
+
* **App:** Allow retrieving parameters by path | MP | [3a2b7be3a3a7cff5132fcb3a19cab6cbb382beed](https://github.com/admiralcloud/ac-awssecrets/commit/3a2b7be3a3a7cff5132fcb3a19cab6cbb382beed)
|
|
194
212
|
You can fetch and add multiple parameter from they same path with one entry. See README for example
|
|
195
213
|
Related issues: [undefined/undefined#master](undefined/browse/master)
|
|
196
214
|
### Chores
|
package/package.json
CHANGED
|
@@ -3,10 +3,10 @@
|
|
|
3
3
|
"author": "Mark Poepping (https://www.admiralcloud.com)",
|
|
4
4
|
"license": "MIT",
|
|
5
5
|
"repository": "admiralcloud/ac-awssecrets",
|
|
6
|
-
"version": "3.0.
|
|
6
|
+
"version": "3.0.3",
|
|
7
7
|
"dependencies": {
|
|
8
|
-
"@aws-sdk/client-secrets-manager": "^3.
|
|
9
|
-
"@aws-sdk/client-ssm": "^3.
|
|
8
|
+
"@aws-sdk/client-secrets-manager": "^3.1012.0",
|
|
9
|
+
"@aws-sdk/client-ssm": "^3.1012.0"
|
|
10
10
|
},
|
|
11
11
|
"devDependencies": {
|
|
12
12
|
"ac-semantic-release": "^0.4.10",
|
|
@@ -15,7 +15,7 @@
|
|
|
15
15
|
"chai": "^4.x",
|
|
16
16
|
"eslint": "10.x",
|
|
17
17
|
"@eslint/js": "^10.0.1",
|
|
18
|
-
"globals": "^17.
|
|
18
|
+
"globals": "^17.4.0",
|
|
19
19
|
"mocha": "^11.7.5"
|
|
20
20
|
},
|
|
21
21
|
"scripts": {
|
|
@@ -27,7 +27,8 @@
|
|
|
27
27
|
},
|
|
28
28
|
"resolutions": {
|
|
29
29
|
"mocha/diff": "^8.0.3",
|
|
30
|
-
"minimatch": "^10.2.1"
|
|
30
|
+
"minimatch": "^10.2.1",
|
|
31
|
+
"mocha/serialize-javascript": "^7.0.3"
|
|
31
32
|
},
|
|
32
33
|
"packageManager": "yarn@1.22.22+sha512.a6b2f7906b721bba3d67d4aff083df04dad64c399707841b7acf00f6b133b7ac24255f2652fa22ae3534329dc6180534e98d17432037ff6fd140556e2bb3137e"
|
|
33
34
|
}
|
package/test/test.js
CHANGED
|
@@ -13,9 +13,9 @@ const secretsMock = mockClient(SecretsManagerClient)
|
|
|
13
13
|
const captureStream = (stream) => {
|
|
14
14
|
const oldWrite = stream.write
|
|
15
15
|
let buf = ''
|
|
16
|
-
stream.write = (chunk) => {
|
|
16
|
+
stream.write = (chunk, ...args) => {
|
|
17
17
|
buf += chunk.toString()
|
|
18
|
-
oldWrite.apply(stream,
|
|
18
|
+
oldWrite.apply(stream, [chunk, ...args])
|
|
19
19
|
}
|
|
20
20
|
return {
|
|
21
21
|
unhook: () => { stream.write = oldWrite },
|
|
@@ -480,10 +480,11 @@ describe('loadSecrets', () => {
|
|
|
480
480
|
secrets: [{ name: 'configVar1', key: '__proto__.polluted' }],
|
|
481
481
|
config
|
|
482
482
|
})
|
|
483
|
-
expect(
|
|
483
|
+
expect.fail('Should have thrown')
|
|
484
484
|
}
|
|
485
485
|
catch(e) {
|
|
486
486
|
expect(e.message).to.include('unsafe key segment')
|
|
487
|
+
expect(({}).polluted).to.be.undefined
|
|
487
488
|
}
|
|
488
489
|
})
|
|
489
490
|
})
|