Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

@socialgouv/sre-seal

Package Overview
Dependencies
Maintainers
3
Versions
71
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@socialgouv/sre-seal - npm Package Compare versions

Comparing version 1.8.4 to 1.8.5

6

bin/index.js

@@ -39,3 +39,3 @@ #!/usr/bin/env node

.describe("context", "k8s context")
.default("context", "dev2")
.default("context", "dev")
// use existing seal file

@@ -46,4 +46,4 @@ .nargs("from", 1)

.check((argv, options) => {
if (argv.context === "prod2" && (!argv.namespace || !argv.name)) {
throw new Error("--name and --namespace are mandatory for prod2");
if (argv.context === "prod" && (!argv.namespace || !argv.name)) {
throw new Error("--name and --namespace are mandatory for prod");
return false;

@@ -50,0 +50,0 @@ }

{
"name": "@socialgouv/sre-seal",
"version": "1.8.4",
"version": "1.8.5",
"preferGlobal": true,

@@ -22,3 +22,3 @@ "main": "./src/index.js",

},
"gitHead": "bd91bb2985fbeea5295c4920e7bf0192c30b226c"
"gitHead": "1e4c40a952aff1697dcff591886f64f234b2f402"
}

@@ -15,3 +15,3 @@ # @socialgouv/sre-seal

--name k8s secret name (optional in dev) [default: "some-secret-name"]
--context k8s context [default: "dev2"]
--context k8s context [default: "dev"]
--from path to existing seal file

@@ -30,3 +30,3 @@ ```

# Prod secrets have mandatories namespace and secret name
cat values.yml | sre-seal --context prod2 --namespace project --name secret-name > sealed.yml
cat values.yml | sre-seal --context prod --namespace project --name secret-name > sealed.yml

@@ -47,3 +47,3 @@ # Add new secret to some existing secret file with `--from`

//namespace: "cdtn-admin",
context: "dev2", // or prod2 with namespace
context: "dev", // or prod with namespace
secrets: {

@@ -50,0 +50,0 @@ PGRST_JWT_SECRET: "FyH2ETW8zulPobZ9j6wr3jWM5OtsK2zR84NLBIb0",

@@ -6,4 +6,4 @@ const execa = require("execa");

const sealedSecretsUrls = {
prod2: "https://kubeseal.prod2.fabrique.social.gouv.fr/v1/cert.pem",
dev2: "https://kubeseal.dev2.fabrique.social.gouv.fr/v1/cert.pem",
prod: "https://kubeseal.prod2.fabrique.social.gouv.fr/v1/cert.pem",
dev: "https://kubeseal.dev2.fabrique.social.gouv.fr/v1/cert.pem",
};

@@ -14,3 +14,3 @@

const args = [["--raw", "--context", context]];
if (context === "prod2") {
if (context === "prod") {
args.push(["--name", name]);

@@ -17,0 +17,0 @@ args.push(["--namespace", namespace]);

@@ -20,3 +20,3 @@ const createSealedSecret = require("./createSealedSecret");

).then((encrypteds) => {
const annotations = context === "prod2" ? {} : clusterWideAnnotations;
const annotations = context === "prod" ? {} : clusterWideAnnotations;
return createSealedSecret({

@@ -23,0 +23,0 @@ namespace,

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc