npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

compose-env-aws-ssm

v0.1.1

Published

AWS Systems Manager Parameter Store source adapter for compose-env

Readme

compose-env-aws-ssm

AWS Systems Manager Parameter Store source adapter for compose-env.

npm License: MIT


Installation

npm install compose-env-aws-ssm @aws-sdk/client-ssm

compose-env must also be installed in your project.


Usage

import { defineConfig, source } from 'compose-env'
import { awsSSMSource } from 'compose-env-aws-ssm'

const config = await defineConfig(
  {
    DATABASE_URL: { type: 'url',    required: true, secret: true },
    PORT:         { type: 'port',   default: 3000 },
    API_KEY:      { type: 'string', required: true, secret: true },
  },
  {
    sources: [
      awsSSMSource('/myapp/prod/'),
      source.env(),
    ],
  },
)

Parameters stored in SSM under /myapp/prod/ are loaded automatically. The path prefix is stripped and / separators in nested paths are replaced with __:

| SSM parameter name | Resolved key | |--------------------------|------------------| | /myapp/prod/DATABASE_URL | DATABASE_URL | | /myapp/prod/db/port | DB__PORT |


Key Normalization

By default, keys are uppercased (uppercase: true). Disable this if your SSM parameter names are already exact env var names and you need case preserved:

awsSSMSource('/myapp/prod/', { uppercase: false })

Options

| Option | Type | Default | Description | |-------------|-----------|---------------------------------------|-----------------------------------------------------------------------------| | region | string | process.env.AWS_REGION or us-east-1 | AWS region to use. | | uppercase | boolean | true | Uppercase key names. Nested / separators become __ (double underscore). |


Authentication

Authentication is handled by the AWS SDK's default credential chain. The following are supported automatically:

  • Environment variablesAWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, AWS_SESSION_TOKEN
  • IAM roles — EC2 instance profiles, ECS task roles, Lambda execution roles
  • AWS profiles~/.aws/credentials and AWS_PROFILE

All parameters are fetched with WithDecryption: true, so SecureString parameters are decrypted automatically if your IAM role has ssm:GetParametersByPath and kms:Decrypt permissions.


Required IAM Permissions

{
  "Effect": "Allow",
  "Action": ["ssm:GetParametersByPath"],
  "Resource": "arn:aws:ssm:REGION:ACCOUNT_ID:parameter/myapp/prod/*"
}

For SecureString parameters, also allow kms:Decrypt on the relevant KMS key.


Source Priority

Sources are resolved in the order they are listed. Place awsSSMSource before or after source.env() depending on which should take precedence:

// SSM overrides local .env files
sources: [source.env(), awsSSMSource('/myapp/prod/')]

// Local .env files override SSM (useful for local development)
sources: [awsSSMSource('/myapp/prod/'), source.env()]