@csermet/multiprovider
Version:
cloud-graph provider plugin for AWS used to fetch AWS cloud data.
80 lines (79 loc) • 3.31 kB
JavaScript
;
var __importDefault = (this && this.__importDefault) || function (mod) {
return (mod && mod.__esModule) ? mod : { "default": mod };
};
Object.defineProperty(exports, "__esModule", { value: true });
const secretsmanager_1 = __importDefault(require("aws-sdk/clients/secretsmanager"));
const sdk_1 = __importDefault(require("@cloudgraph/sdk"));
const groupBy_1 = __importDefault(require("lodash/groupBy"));
const isEmpty_1 = __importDefault(require("lodash/isEmpty"));
const logger_1 = __importDefault(require("../../properties/logger"));
const format_1 = require("../../utils/format");
const errorLog_1 = __importDefault(require("../../utils/errorLog"));
const utils_1 = require("../../utils");
const lt = { ...logger_1.default };
const { logger } = sdk_1.default;
const serviceName = 'SecretsManager';
const errorLog = new errorLog_1.default(serviceName);
const endpoint = utils_1.initTestEndpoint(serviceName);
const getSecretDetails = async (sm, secretId) => new Promise(resolve => {
sm.describeSecret({
SecretId: secretId,
}, (err, data) => {
if (err) {
errorLog.generateAwsErrorLog({
functionName: 'sm:describeSecret',
err,
});
}
if (!isEmpty_1.default(data)) {
resolve(data);
}
resolve({});
});
});
exports.default = async ({ regions, config, }) => new Promise(async (resolve) => {
const smData = [];
const regionPromises = [];
const secretsDetailsPromises = [];
regions.split(',').map(region => {
const regionPromise = new Promise(resolveSecretsManagerData => {
new secretsmanager_1.default({ ...config, region, endpoint }).listSecrets({}, (err, data) => {
if (err) {
errorLog.generateAwsErrorLog({
functionName: 'sm:listSecrets',
err,
});
}
if (isEmpty_1.default(data)) {
return resolveSecretsManagerData();
}
const { SecretList: secrets = [] } = data;
if (isEmpty_1.default(secrets)) {
return resolveSecretsManagerData();
}
logger.debug(lt.fetchedSecretsManager(secrets.length));
smData.push(...secrets.map(({ Tags, ...secret }) => ({
...secret,
region,
Tags: format_1.convertAwsTagsToTagMap(Tags),
})));
resolveSecretsManagerData();
});
});
regionPromises.push(regionPromise);
});
await Promise.all(regionPromises);
smData.map(({ ARN: arn, region }, idx) => {
const sm = new secretsmanager_1.default({ ...config, region, endpoint });
const secretDetailsPromise = new Promise(async (resolveSecretDetails) => {
const secretDetails = await getSecretDetails(sm, arn);
smData[idx].ReplicationStatus = secretDetails?.ReplicationStatus || [];
resolveSecretDetails();
});
secretsDetailsPromises.push(secretDetailsPromise);
});
await Promise.all(secretsDetailsPromises);
errorLog.reset();
resolve(groupBy_1.default(smData, 'region'));
});