npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2024 – Pkg Stats / Ryan Hefner

@mdhnpm/aws-ssm-parameters

v1.0.3

Published

Node module to get a list of parameters from AWS Parameter Store

Downloads

8

Readme

aws-ssm-parameters

Node module to easily retrieve multiple parameters from AWS parameter store.

The function takes two argument, an array of parameter names and AWS region. It returns a JSON object with parameter name as key and parameter value as value. See the usage example below.

The decrypt option is enabled. It works on all parameter types, SecureString, String, and StringList.

Output look like this:

{
  my.db.endpoint:'endpoint-url', 
  my.db.name: 'database-name',
  my.db.password: 'database-pw',
  my.db.usernme: 'database-username'
}

Installation

npm i @mdhnpm/aws-ssm-parameters

Prerequisites

It requires AWS Cli. It needs to be configured with the correct credentials (read access rights to AWS Parameter Store). Check out the official documentation for AWS Cli configuration.

To use this module in Lambda function. The function needs to have the permission for AWS parameter store access as below.

- Effect: Allow
  Action:
    - ssm:Describe*
    - ssm:Get*
  Resource: arn:aws:ssm:ap-southeast-2:<account no>:parameter/*

Example Code

'use strict';
 
const { getParameters } = require('@mdhnpm/aws-ssm-parameters');

// Input is an array of parameter names
const parameterNames = [
  'my.db.endpoint',
  'my.db.name',
  'my.db.password',
  'my.db.username'
];
 
const getParams = async () => {
  // Argument is (1) an array of parameter name & (2) AWS region
  const parameters = await getParameters(parameterNames, 'ap-southeast-2');
  console.log(parameters);
}

// The module creates a Json object 
// with parameter name as key and actual value as value
// Decrypt option is enabled. It works on secure string.
// {
//   my.db.endpoint:'endpoint-url', 
//   my.db.name: 'database-name',
//   my.db.password: 'database-pw',
//   my.db.usernme: 'database-username'
// }
getParams()

Lambda Function Use Case

Instead of adding the actual database credentials or API keys in the environment variable, we can add the parameter names and use this module to retrieve them. In this way, the lambda function does not need to be deployed every time the credential gets roatated.

Retrieval of parameters has computational costs. The parameter store also throttles requests when the volume is high. The best practice is to store the retrieved value globally and make sure the code only calls parameter store when it doesn't exist in the global scope (this is when the lambd execution container is on cold start) as well as retry logic when the credentials get roatated.

Source Code

Soucre code can be found at a GitHub repo, aws-ssm-parameters.