dbgate-api 7.0.4 → 7.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -1,8 +1,8 @@
1
1
  {
2
2
  "name": "dbgate-api",
3
3
  "main": "src/index.js",
4
- "version": "7.0.4",
5
- "homepage": "https://dbgate.org/",
4
+ "version": "7.1.0",
5
+ "homepage": "https://www.dbgate.io/",
6
6
  "repository": {
7
7
  "type": "git",
8
8
  "url": "https://github.com/dbgate/dbgate.git"
@@ -30,10 +30,11 @@
30
30
  "compare-versions": "^3.6.0",
31
31
  "cors": "^2.8.5",
32
32
  "cross-env": "^6.0.3",
33
- "dbgate-datalib": "^7.0.4",
33
+ "dbgate-datalib": "^7.1.0",
34
34
  "dbgate-query-splitter": "^4.11.9",
35
- "dbgate-sqltree": "^7.0.4",
36
- "dbgate-tools": "^7.0.4",
35
+ "dbgate-rest": "^7.1.0",
36
+ "dbgate-sqltree": "^7.1.0",
37
+ "dbgate-tools": "^7.1.0",
37
38
  "debug": "^4.3.4",
38
39
  "diff": "^5.0.0",
39
40
  "diff2html": "^3.4.13",
@@ -87,7 +88,7 @@
87
88
  "devDependencies": {
88
89
  "@types/fs-extra": "^9.0.11",
89
90
  "@types/lodash": "^4.14.149",
90
- "dbgate-types": "^7.0.4",
91
+ "dbgate-types": "^7.1.0",
91
92
  "env-cmd": "^10.1.0",
92
93
  "jsdoc-to-markdown": "^9.0.5",
93
94
  "node-loader": "^1.0.2",
@@ -55,6 +55,8 @@ function authMiddleware(req, res, next) {
55
55
  '/stream',
56
56
  '/storage/get-connections-for-login-page',
57
57
  '/storage/set-admin-password',
58
+ '/storage/request-password-reset',
59
+ '/storage/reset-password',
58
60
  '/auth/get-providers',
59
61
  '/connections/dblogin-web',
60
62
  '/connections/dblogin-app',
@@ -202,10 +202,10 @@ module.exports = {
202
202
 
203
203
  const storageConnections = await storage.connections(req);
204
204
  if (storageConnections) {
205
- return storageConnections;
205
+ return storageConnections.map(maskConnection);
206
206
  }
207
207
  if (portalConnections) {
208
- if (platformInfo.allowShellConnection) return portalConnections;
208
+ if (platformInfo.allowShellConnection) return portalConnections.map(x => encryptConnection(x));
209
209
  return portalConnections.map(maskConnection).filter(x => connectionHasPermission(x, loadedPermissions));
210
210
  }
211
211
  return (await this.datastore.find()).filter(x => connectionHasPermission(x, loadedPermissions));
@@ -243,13 +243,13 @@ module.exports = {
243
243
  subprocess.send({ ...connection, requestDbList });
244
244
  return new Promise((resolve, reject) => {
245
245
  let isWaitingForVolatile = false;
246
-
246
+
247
247
  const cleanup = () => {
248
248
  if (connection._id && pendingTestSubprocesses[connection._id]) {
249
249
  delete pendingTestSubprocesses[connection._id];
250
250
  }
251
251
  };
252
-
252
+
253
253
  subprocess.on('message', resp => {
254
254
  if (handleProcessCommunication(resp, subprocess)) return;
255
255
  // @ts-ignore
@@ -279,8 +279,8 @@ module.exports = {
279
279
  reject(new MissingCredentialsError(missingCredentialsDetail));
280
280
  }
281
281
  });
282
-
283
- subprocess.on('exit', (code) => {
282
+
283
+ subprocess.on('exit', code => {
284
284
  // If exit happens while waiting for volatile, that's expected
285
285
  if (isWaitingForVolatile && code === 0) {
286
286
  cleanup();
@@ -291,8 +291,8 @@ module.exports = {
291
291
  reject(new Error(`Test subprocess exited with code ${code}`));
292
292
  }
293
293
  });
294
-
295
- subprocess.on('error', (err) => {
294
+
295
+ subprocess.on('error', err => {
296
296
  cleanup();
297
297
  reject(err);
298
298
  });
@@ -327,7 +327,7 @@ module.exports = {
327
327
  return testRes;
328
328
  } else {
329
329
  volatileConnections[res._id] = res;
330
-
330
+
331
331
  // Check if there's a pending test subprocess waiting for this volatile connection
332
332
  const pendingTest = pendingTestSubprocesses[conid];
333
333
  if (pendingTest) {
@@ -335,7 +335,7 @@ module.exports = {
335
335
  try {
336
336
  // Send the volatile connection to the waiting subprocess
337
337
  subprocess.send({ ...res, requestDbList, isVolatileResolved: true });
338
-
338
+
339
339
  // Wait for the test result and emit it as an event
340
340
  subprocess.once('message', resp => {
341
341
  if (handleProcessCommunication(resp, subprocess)) return;
@@ -358,7 +358,7 @@ module.exports = {
358
358
  delete pendingTestSubprocesses[conid];
359
359
  }
360
360
  }
361
-
361
+
362
362
  return res;
363
363
  }
364
364
  },
@@ -484,12 +484,12 @@ module.exports = {
484
484
 
485
485
  const storageConnection = await storage.getConnection({ conid });
486
486
  if (storageConnection) {
487
- return storageConnection;
487
+ return mask ? maskConnection(storageConnection) : storageConnection;
488
488
  }
489
489
 
490
490
  if (portalConnections) {
491
491
  const res = portalConnections.find(x => x._id == conid) || null;
492
- return mask && !platformInfo.allowShellConnection ? maskConnection(res) : res;
492
+ return mask && !platformInfo.allowShellConnection ? maskConnection(res) : encryptConnection(res);
493
493
  }
494
494
  const res = await this.datastore.get(conid);
495
495
  return res || null;
@@ -165,6 +165,11 @@ module.exports = {
165
165
  if (!connection) {
166
166
  throw new Error(`databaseConnections: Connection with conid="${conid}" not found`);
167
167
  }
168
+
169
+ if (connection.engine?.endsWith('@rest')) {
170
+ return { isApiConnection: true };
171
+ }
172
+
168
173
  if (connection.passwordMode == 'askPassword' || connection.passwordMode == 'askUser') {
169
174
  throw new MissingCredentialsError({ conid, passwordMode: connection.passwordMode });
170
175
  }
@@ -0,0 +1,41 @@
1
+ module.exports = {
2
+ disconnect_meta: true,
3
+ async disconnect({ conid }, req) {
4
+ return null;
5
+ },
6
+
7
+ getApiInfo_meta: true,
8
+ async getApiInfo({ conid }, req) {
9
+ return null;
10
+ },
11
+
12
+ restStatus_meta: true,
13
+ async restStatus() {
14
+ return {};
15
+ },
16
+
17
+ ping_meta: true,
18
+ async ping({ conidArray, strmid }) {
19
+ return null;
20
+ },
21
+
22
+ refresh_meta: true,
23
+ async refresh({ conid, keepOpen }, req) {
24
+ return null;
25
+ },
26
+
27
+ testConnection_meta: true,
28
+ async testConnection({ conid }, req) {
29
+ return null;
30
+ },
31
+
32
+ execute_meta: true,
33
+ async execute({ conid, method, endpoint, parameters, server }, req) {
34
+ return null;
35
+ },
36
+
37
+ apiQuery_meta: true,
38
+ async apiQuery({ conid, server, query, variables }, req) {
39
+ return null;
40
+ },
41
+ };
@@ -172,7 +172,7 @@ module.exports = {
172
172
  byline(subprocess.stderr).on('data', pipeDispatcher('error'));
173
173
  subprocess.on('exit', code => {
174
174
  // console.log('... EXITED', code);
175
- this.rejectRequest(runid, { message: 'No data returned, maybe input data source is too big' });
175
+ this.rejectRequest(runid, { message: 'DBGM-00281 No data returned, maybe input data source is too big' });
176
176
  logger.info({ code, pid: subprocess.pid }, 'DBGM-00016 Exited process');
177
177
  socket.emit(`runner-done-${runid}`, code);
178
178
  this.opened = this.opened.filter(x => x.runid != runid);
@@ -225,7 +225,7 @@ module.exports = {
225
225
  subprocess.on('exit', code => {
226
226
  console.log('... EXITED', code);
227
227
  logger.info({ code, pid: subprocess.pid }, 'DBGM-00017 Exited process');
228
- this.dispatchMessage(runid, `Finished external process with code ${code}`);
228
+ this.dispatchMessage(runid, `DBGM-00282 Finished external process with code ${code}`);
229
229
  socket.emit(`runner-done-${runid}`, code);
230
230
  if (onFinished) {
231
231
  onFinished();
@@ -233,7 +233,7 @@ module.exports = {
233
233
  this.opened = this.opened.filter(x => x.runid != runid);
234
234
  });
235
235
  subprocess.on('spawn', () => {
236
- this.dispatchMessage(runid, `Started external process ${command}`);
236
+ this.dispatchMessage(runid, `DBGM-00283 Started external process ${command}`);
237
237
  });
238
238
  subprocess.on('error', error => {
239
239
  console.log('... ERROR subprocess', error);
@@ -279,7 +279,7 @@ module.exports = {
279
279
  if (script.type == 'json') {
280
280
  if (!platformInfo.isElectron) {
281
281
  if (!checkSecureDirectoriesInScript(script)) {
282
- return { errorMessage: 'Unallowed directories in script' };
282
+ return { errorMessage: 'DBGM-00284 Unallowed directories in script' };
283
283
  }
284
284
  }
285
285
 
@@ -299,10 +299,10 @@ module.exports = {
299
299
  action: 'script',
300
300
  severity: 'warn',
301
301
  detail: script,
302
- message: 'Scripts are not allowed',
302
+ message: 'DBGM-00285 Scripts are not allowed',
303
303
  });
304
304
 
305
- return { errorMessage: 'Shell scripting is not allowed' };
305
+ return { errorMessage: 'DBGM-00286 Shell scripting is not allowed' };
306
306
  }
307
307
 
308
308
  sendToAuditLog(req, {
@@ -312,7 +312,7 @@ module.exports = {
312
312
  action: 'script',
313
313
  severity: 'info',
314
314
  detail: script,
315
- message: 'Running JS script',
315
+ message: 'DBGM-00287 Running JS script',
316
316
  });
317
317
 
318
318
  return this.startCore(runid, scriptTemplate(script, false));
@@ -327,7 +327,7 @@ module.exports = {
327
327
  async cancel({ runid }) {
328
328
  const runner = this.opened.find(x => x.runid == runid);
329
329
  if (!runner) {
330
- throw new Error('Invalid runner');
330
+ throw new Error('DBGM-00288 Invalid runner');
331
331
  }
332
332
  runner.subprocess.kill();
333
333
  return { state: 'ok' };
@@ -353,7 +353,7 @@ module.exports = {
353
353
  async loadReader({ functionName, props }) {
354
354
  if (!platformInfo.isElectron) {
355
355
  if (props?.fileName && !checkSecureDirectories(props.fileName)) {
356
- return { errorMessage: 'Unallowed file' };
356
+ return { errorMessage: 'DBGM-00289 Unallowed file' };
357
357
  }
358
358
  }
359
359
  const prefix = extractShellApiPlugins(functionName)
@@ -371,7 +371,7 @@ module.exports = {
371
371
  scriptResult_meta: true,
372
372
  async scriptResult({ script }) {
373
373
  if (script.type != 'json') {
374
- return { errorMessage: 'Only JSON scripts are allowed' };
374
+ return { errorMessage: 'DBGM-00290 Only JSON scripts are allowed' };
375
375
  }
376
376
 
377
377
  const promise = new Promise(async (resolve, reject) => {
@@ -1,5 +1,5 @@
1
1
 
2
2
  module.exports = {
3
- version: '7.0.4',
4
- buildTime: '2026-02-09T14:41:37.801Z'
3
+ version: '7.1.0',
4
+ buildTime: '2026-02-24T14:20:19.939Z'
5
5
  };
package/src/main.js CHANGED
@@ -14,6 +14,7 @@ const socket = require('./utility/socket');
14
14
  const connections = require('./controllers/connections');
15
15
  const serverConnections = require('./controllers/serverConnections');
16
16
  const databaseConnections = require('./controllers/databaseConnections');
17
+ const restConnections = require('./controllers/restConnections');
17
18
  const metadata = require('./controllers/metadata');
18
19
  const sessions = require('./controllers/sessions');
19
20
  const runners = require('./controllers/runners');
@@ -267,6 +268,7 @@ function useAllControllers(app, electron) {
267
268
  useController(app, electron, '/auth', auth);
268
269
  useController(app, electron, '/cloud', cloud);
269
270
  useController(app, electron, '/team-files', teamFiles);
271
+ useController(app, electron, '/rest-connections', restConnections);
270
272
  }
271
273
 
272
274
  function setElectronSender(electronSender) {
@@ -1,6 +1,6 @@
1
1
  const childProcessChecker = require('../utility/childProcessChecker');
2
2
  const requireEngineDriver = require('../utility/requireEngineDriver');
3
- const { connectUtility } = require('../utility/connectUtility');
3
+ const { connectUtility, getRestAuthFromConnection } = require('../utility/connectUtility');
4
4
  const { handleProcessCommunication } = require('../utility/processComm');
5
5
  const { pickSafeConnectionInfo } = require('../utility/crypting');
6
6
  const _ = require('lodash');
@@ -29,6 +29,9 @@ function start() {
29
29
  try {
30
30
  const driver = requireEngineDriver(connection);
31
31
  const connectionChanged = driver?.beforeConnectionSave ? driver.beforeConnectionSave(connection) : connection;
32
+ if (driver?.databaseEngineTypes?.includes('rest')) {
33
+ connectionChanged.restAuth = getRestAuthFromConnection(connection);
34
+ }
32
35
 
33
36
  if (!connection.isVolatileResolved) {
34
37
  if (connectionChanged.useRedirectDbLogin) {
package/src/proc/index.js CHANGED
@@ -1,6 +1,7 @@
1
1
  const connectProcess = require('./connectProcess');
2
2
  const databaseConnectionProcess = require('./databaseConnectionProcess');
3
3
  const serverConnectionProcess = require('./serverConnectionProcess');
4
+ const restConnectionProcess = require('./restConnectionProcess');
4
5
  const sessionProcess = require('./sessionProcess');
5
6
  const jslDatastoreProcess = require('./jslDatastoreProcess');
6
7
  const sshForwardProcess = require('./sshForwardProcess');
@@ -9,6 +10,7 @@ module.exports = {
9
10
  connectProcess,
10
11
  databaseConnectionProcess,
11
12
  serverConnectionProcess,
13
+ restConnectionProcess,
12
14
  sessionProcess,
13
15
  jslDatastoreProcess,
14
16
  sshForwardProcess,
@@ -0,0 +1,7 @@
1
+ const childProcessChecker = require('../utility/childProcessChecker');
2
+
3
+ function start() {
4
+ childProcessChecker();
5
+ }
6
+
7
+ module.exports = { start };
@@ -4,7 +4,8 @@ const { pluginsdir, packagedPluginsDir, getPluginBackendPath } = require('../uti
4
4
  const platformInfo = require('../utility/platformInfo');
5
5
  const authProxy = require('../utility/authProxy');
6
6
  const { getLogger } = require('dbgate-tools');
7
- //
7
+ const { openApiDriver, graphQlDriver, oDataDriver } = require('dbgate-rest');
8
+ //
8
9
  const logger = getLogger('requirePlugin');
9
10
 
10
11
  const loadedPlugins = {};
@@ -13,16 +14,21 @@ const dbgateEnv = {
13
14
  dbgateApi: null,
14
15
  platformInfo,
15
16
  authProxy,
16
- isProApp: () =>{
17
+ isProApp: () => {
17
18
  const { isProApp } = require('../utility/checkLicense');
18
19
  return isProApp();
19
- }
20
+ },
20
21
  };
21
22
  function requirePlugin(packageName, requiredPlugin = null) {
22
23
  if (!packageName) throw new Error('Missing packageName in plugin');
23
24
  if (loadedPlugins[packageName]) return loadedPlugins[packageName];
24
25
 
25
26
  if (requiredPlugin == null) {
27
+ if (packageName.endsWith('@rest') || packageName === 'rest') {
28
+ return {
29
+ drivers: [openApiDriver, graphQlDriver, oDataDriver],
30
+ };
31
+ }
26
32
  let module;
27
33
  const modulePath = getPluginBackendPath(packageName);
28
34
  logger.info(`DBGM-00062 Loading module ${packageName} from ${modulePath}`);
@@ -2174,6 +2174,84 @@ module.exports = {
2174
2174
  ]
2175
2175
  }
2176
2176
  },
2177
+ {
2178
+ "pureName": "user_password_reset_tokens",
2179
+ "columns": [
2180
+ {
2181
+ "pureName": "user_password_reset_tokens",
2182
+ "columnName": "id",
2183
+ "dataType": "int",
2184
+ "autoIncrement": true,
2185
+ "notNull": true
2186
+ },
2187
+ {
2188
+ "pureName": "user_password_reset_tokens",
2189
+ "columnName": "user_id",
2190
+ "dataType": "int",
2191
+ "notNull": true
2192
+ },
2193
+ {
2194
+ "pureName": "user_password_reset_tokens",
2195
+ "columnName": "token",
2196
+ "dataType": "varchar(500)",
2197
+ "notNull": true
2198
+ },
2199
+ {
2200
+ "pureName": "user_password_reset_tokens",
2201
+ "columnName": "created_at",
2202
+ "dataType": "varchar(32)",
2203
+ "notNull": true
2204
+ },
2205
+ {
2206
+ "pureName": "user_password_reset_tokens",
2207
+ "columnName": "expires_at",
2208
+ "dataType": "varchar(32)",
2209
+ "notNull": true
2210
+ },
2211
+ {
2212
+ "pureName": "user_password_reset_tokens",
2213
+ "columnName": "used_at",
2214
+ "dataType": "varchar(32)",
2215
+ "notNull": false
2216
+ }
2217
+ ],
2218
+ "foreignKeys": [
2219
+ {
2220
+ "constraintType": "foreignKey",
2221
+ "constraintName": "FK_user_password_reset_tokens_user_id",
2222
+ "pureName": "user_password_reset_tokens",
2223
+ "refTableName": "users",
2224
+ "columns": [
2225
+ {
2226
+ "columnName": "user_id",
2227
+ "refColumnName": "id"
2228
+ }
2229
+ ]
2230
+ }
2231
+ ],
2232
+ "indexes": [
2233
+ {
2234
+ "constraintName": "idx_token",
2235
+ "pureName": "user_password_reset_tokens",
2236
+ "constraintType": "index",
2237
+ "columns": [
2238
+ {
2239
+ "columnName": "token"
2240
+ }
2241
+ ]
2242
+ }
2243
+ ],
2244
+ "primaryKey": {
2245
+ "pureName": "user_password_reset_tokens",
2246
+ "constraintType": "primaryKey",
2247
+ "constraintName": "PK_user_password_reset_tokens",
2248
+ "columns": [
2249
+ {
2250
+ "columnName": "id"
2251
+ }
2252
+ ]
2253
+ }
2254
+ },
2177
2255
  {
2178
2256
  "pureName": "user_permissions",
2179
2257
  "columns": [
@@ -1,9 +1,10 @@
1
1
  const fs = require('fs-extra');
2
- const { decryptConnection } = require('./crypting');
2
+ const { decryptConnection, decryptPasswordString } = require('./crypting');
3
3
  const { getSshTunnelProxy } = require('./sshTunnelProxy');
4
4
  const platformInfo = require('../utility/platformInfo');
5
5
  const connections = require('../controllers/connections');
6
6
  const _ = require('lodash');
7
+ const axios = require('axios');
7
8
 
8
9
  async function loadConnection(driver, storedConnection, connectionMode) {
9
10
  const { allowShellConnection, allowConnectionFromEnvVariables } = platformInfo;
@@ -131,12 +132,39 @@ async function connectUtility(driver, storedConnection, connectionMode, addition
131
132
  }
132
133
 
133
134
  connection.ssl = await extractConnectionSslParams(connection);
135
+ connection.axios = axios.default;
134
136
 
135
137
  const conn = await driver.connect({ conid: connectionLoaded?._id, ...connection, ...additionalOptions });
136
138
  return conn;
137
139
  }
138
140
 
141
+ function getRestAuthFromConnection(connection) {
142
+ if (!connection) return null;
143
+ if (connection.authType == 'basic') {
144
+ return {
145
+ type: 'basic',
146
+ user: connection.user,
147
+ password: decryptPasswordString(connection.password),
148
+ };
149
+ }
150
+ if (connection.authType == 'bearer') {
151
+ return {
152
+ type: 'bearer',
153
+ token: connection.authToken,
154
+ };
155
+ }
156
+ if (connection.authType == 'apikey') {
157
+ return {
158
+ type: 'apikey',
159
+ header: connection.apiKeyHeader,
160
+ value: connection.apiKeyValue,
161
+ };
162
+ }
163
+ return null;
164
+ }
165
+
139
166
  module.exports = {
140
167
  extractConnectionSslParams,
141
168
  connectUtility,
169
+ getRestAuthFromConnection,
142
170
  };
@@ -102,6 +102,26 @@ function decryptObjectPasswordField(obj, field, encryptor = null) {
102
102
  }
103
103
 
104
104
  const fieldsToEncrypt = ['password', 'sshPassword', 'sshKeyfilePassword', 'connectionDefinition'];
105
+ const additionalFieldsToMask = [
106
+ 'databaseUrl',
107
+ 'server',
108
+ 'port',
109
+ 'user',
110
+ 'sshBastionHost',
111
+ 'sshHost',
112
+ 'sshKeyFile',
113
+ 'sshLogin',
114
+ 'sshMode',
115
+ 'sshPort',
116
+ 'sslCaFile',
117
+ 'sslCertFilePassword',
118
+ 'sslKeyFile',
119
+ 'sslRejectUnauthorized',
120
+ 'secretAccessKey',
121
+ 'accessKeyId',
122
+ 'endpoint',
123
+ 'endpointKey',
124
+ ];
105
125
 
106
126
  function encryptConnection(connection, encryptor = null) {
107
127
  if (connection.passwordMode != 'saveRaw') {
@@ -114,7 +134,7 @@ function encryptConnection(connection, encryptor = null) {
114
134
 
115
135
  function maskConnection(connection) {
116
136
  if (!connection) return connection;
117
- return _.omit(connection, fieldsToEncrypt);
137
+ return _.omit(connection, [...fieldsToEncrypt, ...additionalFieldsToMask]);
118
138
  }
119
139
 
120
140
  function decryptConnection(connection) {
@@ -25,8 +25,14 @@ function extractConnectionsFromEnv(env) {
25
25
  socketPath: env[`SOCKET_PATH_${id}`],
26
26
  serviceName: env[`SERVICE_NAME_${id}`],
27
27
  authType: env[`AUTH_TYPE_${id}`] || (env[`SOCKET_PATH_${id}`] ? 'socket' : undefined),
28
- defaultDatabase: env[`DATABASE_${id}`] || (env[`FILE_${id}`] ? getDatabaseFileLabel(env[`FILE_${id}`]) : null),
29
- singleDatabase: !!env[`DATABASE_${id}`] || !!env[`FILE_${id}`],
28
+ defaultDatabase:
29
+ env[`DATABASE_${id}`] ||
30
+ (env[`FILE_${id}`]
31
+ ? getDatabaseFileLabel(env[`FILE_${id}`])
32
+ : env[`APISERVERURL1_${id}`]
33
+ ? '_api_database_'
34
+ : null),
35
+ singleDatabase: !!env[`DATABASE_${id}`] || !!env[`FILE_${id}`] || !!env[`APISERVERURL1_${id}`],
30
36
  displayName: env[`LABEL_${id}`],
31
37
  isReadOnly: env[`READONLY_${id}`],
32
38
  databases: env[`DBCONFIG_${id}`] ? safeJsonParse(env[`DBCONFIG_${id}`]) : null,
@@ -54,6 +60,11 @@ function extractConnectionsFromEnv(env) {
54
60
  sslKeyFile: env[`SSL_KEY_FILE_${id}`],
55
61
  sslRejectUnauthorized: env[`SSL_REJECT_UNAUTHORIZED_${id}`],
56
62
  trustServerCertificate: env[`SSL_TRUST_CERTIFICATE_${id}`],
63
+
64
+ apiServerUrl1: env[`APISERVERURL1_${id}`],
65
+ apiServerUrl2: env[`APISERVERURL2_${id}`],
66
+ apiKeyHeader: env[`APIKEYHEADER_${id}`],
67
+ apiKeyValue: env[`APIKEYVALUE_${id}`],
57
68
  }));
58
69
 
59
70
  return connections;