rds_ssm_connect 1.8.0 → 1.8.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/connect.js +4 -4
- package/package.json +1 -1
- package/src-tauri/Cargo.lock +1 -1
- package/src-tauri/Cargo.toml +1 -1
- package/src-tauri/tauri.conf.json +1 -1
package/connect.js
CHANGED
|
@@ -14,7 +14,7 @@ import {
|
|
|
14
14
|
} from './configLoader.js'
|
|
15
15
|
|
|
16
16
|
// Package info for version checking
|
|
17
|
-
const packageJson = { name: 'rds_ssm_connect', version: '1.8.
|
|
17
|
+
const packageJson = { name: 'rds_ssm_connect', version: '1.8.1' }
|
|
18
18
|
|
|
19
19
|
const execAsync = promisify(exec)
|
|
20
20
|
|
|
@@ -505,12 +505,12 @@ function getLocalPort(ENV, projectConfig) {
|
|
|
505
505
|
async function getConnectionCredentials(ENV, projectConfig) {
|
|
506
506
|
const { region, secretPrefix, database } = projectConfig
|
|
507
507
|
|
|
508
|
-
const secretsListCommand = `aws-vault exec ${ENV} -- aws secretsmanager list-secrets --region ${region} --query "SecretList[?
|
|
508
|
+
const secretsListCommand = `aws-vault exec ${ENV} -- aws secretsmanager list-secrets --region ${region} --query "SecretList[?contains(Name, '${secretPrefix}')].Name | [0]" --output text`
|
|
509
509
|
const SECRET_NAME = await runCommand(secretsListCommand)
|
|
510
510
|
|
|
511
511
|
if (!SECRET_NAME || SECRET_NAME === 'None') {
|
|
512
512
|
throw new Error(
|
|
513
|
-
`No secret found with name
|
|
513
|
+
`No secret found with name containing '${secretPrefix}'.`,
|
|
514
514
|
)
|
|
515
515
|
}
|
|
516
516
|
|
|
@@ -985,7 +985,7 @@ async function main() {
|
|
|
985
985
|
|
|
986
986
|
// Get RDS credentials from Secrets Manager
|
|
987
987
|
console.log('\n⏳ Getting credentials...')
|
|
988
|
-
const secretsListCommand = `aws-vault exec ${ENV} -- aws secretsmanager list-secrets --region ${region} --query "SecretList[?
|
|
988
|
+
const secretsListCommand = `aws-vault exec ${ENV} -- aws secretsmanager list-secrets --region ${region} --query "SecretList[?contains(Name, '${secretPrefix}')].Name | [0]" --output text`
|
|
989
989
|
const SECRET_NAME = await runCommand(secretsListCommand)
|
|
990
990
|
|
|
991
991
|
if (!SECRET_NAME || SECRET_NAME === 'None') {
|
package/package.json
CHANGED
package/src-tauri/Cargo.lock
CHANGED
package/src-tauri/Cargo.toml
CHANGED