Research
Security News
Quasar RAT Disguised as an npm Package for Detecting Vulnerabilities in Ethereum Smart Contracts
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
@brightcove/node-config
Advanced tools
Encrypted yaml for manage configuration variables, similar to rails encrypted secrets
Manage your secrets with single entrypted file. Inspired in Rails encrypted secrets management
npm install @brightcove/node-config --save
# config.yaml
username: user
password': myPassword
NODE_MASTER_KEY=$MASTER_KEY npx @brightcove/node-config encrypt --path config.yaml
Only encrypted object values.
username: sGPi7jVJFORTBSOOKx5nMw==--eYed5TIh3D+9rjN/usOB0w==
password: +C4M+xFxOQXTyvPJ7QSJuQ==--eYed5TIh3D+9rjN/usOB0w==
NODE_MASTER_KEY=$MASTER_KEY npx @brightcove/node-config decrypt --path config.yaml
Create a config.yaml file
Example:
publicKey: publicValue # no-encrypt
myApiKey: apiKey
myApiSecret: apiSecret
or
{
"publicKey": "publicValue",
"myApiKey": "apiKey",
"myApiSecret": "apiSecret"
}
npx @brightcove/node-config init
OR use your own key
NODE_MASTER_KEY=$MASTER_KEY npx @brightcove/node-config init
Your config file it's encrypted, and generate config key file
Save the key value, and ignore this file in your version control.
echo config.yaml.key >> .gitignore
const { config } = require('@brightcove/node-config');
const apiKey = config.apiKey;
You can set a environment varible NODE_MASTER_KEY for decrypt secrets.
NODE_MASTER_KEY=my-credential-key server.js
The edit command allow to edit the file in a text editor; decrypting before open the file and encrypting after close the file.
EDITOR=nano npx @brightcove/node-config edit
Return the value of config based on process.env.NODE_CREDENTIALS_ENV or process.env.NODE_ENV Example:
default: &default
user: myuser
development:
<<: *default
key: password_development
production:
<<: *default
key: password_production
const vault = require('@brightcove/node-config');
vault.config;
// { development: { key: "password_development" }, production: { key: "password_production" } }
vault.env;
// { key: "password_development" }
us:
development:
key: development password for US country
NODE_CREDENTIALS_ENV=us.development node main.js
const vault = require('@brightcove/node-config');
vault.env;
// { key: "development password for US country" }
Some config it's not recomend set in config file, like production database password.
config file accept template variables for process env object
production:
database:
password: <%= process.env.DATABASE_PASSWORD %>
Command List
help help
init encrypt your config file and create a config key file
encrypt encrypt config file
decrypt decrypt config file
edit decrypt/encrypt in text editor
Options
-p, --path Path for config file
FAQs
Encrypted yaml for manage configuration variables, similar to rails encrypted secrets
The npm package @brightcove/node-config receives a total of 0 weekly downloads. As such, @brightcove/node-config popularity was classified as not popular.
We found that @brightcove/node-config demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
Security News
Research
A supply chain attack on Rspack's npm packages injected cryptomining malware, potentially impacting thousands of developers.
Research
Security News
Socket researchers discovered a malware campaign on npm delivering the Skuld infostealer via typosquatted packages, exposing sensitive data.