rds_ssm_connect 1.8.0 → 1.8.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/connect.js CHANGED
@@ -14,7 +14,7 @@ import {
14
14
  } from './configLoader.js'
15
15
 
16
16
  // Package info for version checking
17
- const packageJson = { name: 'rds_ssm_connect', version: '1.8.0' }
17
+ const packageJson = { name: 'rds_ssm_connect', version: '1.8.1' }
18
18
 
19
19
  const execAsync = promisify(exec)
20
20
 
@@ -505,12 +505,12 @@ function getLocalPort(ENV, projectConfig) {
505
505
  async function getConnectionCredentials(ENV, projectConfig) {
506
506
  const { region, secretPrefix, database } = projectConfig
507
507
 
508
- const secretsListCommand = `aws-vault exec ${ENV} -- aws secretsmanager list-secrets --region ${region} --query "SecretList[?starts_with(Name, '${secretPrefix}')].Name | [0]" --output text`
508
+ const secretsListCommand = `aws-vault exec ${ENV} -- aws secretsmanager list-secrets --region ${region} --query "SecretList[?contains(Name, '${secretPrefix}')].Name | [0]" --output text`
509
509
  const SECRET_NAME = await runCommand(secretsListCommand)
510
510
 
511
511
  if (!SECRET_NAME || SECRET_NAME === 'None') {
512
512
  throw new Error(
513
- `No secret found with name starting with '${secretPrefix}'.`,
513
+ `No secret found with name containing '${secretPrefix}'.`,
514
514
  )
515
515
  }
516
516
 
@@ -985,7 +985,7 @@ async function main() {
985
985
 
986
986
  // Get RDS credentials from Secrets Manager
987
987
  console.log('\n⏳ Getting credentials...')
988
- const secretsListCommand = `aws-vault exec ${ENV} -- aws secretsmanager list-secrets --region ${region} --query "SecretList[?starts_with(Name, '${secretPrefix}')].Name | [0]" --output text`
988
+ const secretsListCommand = `aws-vault exec ${ENV} -- aws secretsmanager list-secrets --region ${region} --query "SecretList[?contains(Name, '${secretPrefix}')].Name | [0]" --output text`
989
989
  const SECRET_NAME = await runCommand(secretsListCommand)
990
990
 
991
991
  if (!SECRET_NAME || SECRET_NAME === 'None') {
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "rds_ssm_connect",
3
- "version": "1.8.0",
3
+ "version": "1.8.1",
4
4
  "type": "module",
5
5
  "repository": {
6
6
  "type": "git",
@@ -3057,7 +3057,7 @@ checksum = "20675572f6f24e9e76ef639bc5552774ed45f1c30e2951e1e99c59888861c539"
3057
3057
 
3058
3058
  [[package]]
3059
3059
  name = "rds-ssm-connect"
3060
- version = "1.7.17"
3060
+ version = "1.8.0"
3061
3061
  dependencies = [
3062
3062
  "reqwest 0.12.28",
3063
3063
  "semver",
@@ -1,6 +1,6 @@
1
1
  [package]
2
2
  name = "rds-ssm-connect"
3
- version = "1.8.0"
3
+ version = "1.8.1"
4
4
  description = "Secure RDS connections through AWS SSM"
5
5
  authors = ["Iaroslav Pyrogov"]
6
6
  edition = "2024"
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "$schema": "https://schema.tauri.app/config/2",
3
3
  "productName": "RDS SSM Connect",
4
- "version": "1.8.0",
4
+ "version": "1.8.1",
5
5
  "identifier": "com.rds-ssm-connect.desktop",
6
6
  "build": {
7
7
  "beforeDevCommand": "npm run dev:vite",