Comparing version
@@ -19,3 +19,3 @@ #!/usr/bin/env node | ||
const destinationFile = join(outputFolder, '.env') | ||
const AGE_PUBLIC_KEY = process?.env?.AGE_PUBLIC_KEY | ||
const AGE_PRIVATE_KEY = process?.env?.AGE_PRIVATE_KEY | ||
@@ -25,3 +25,3 @@ console.log(` | ||
============= | ||
AGE_PUBLIC_KEY: ${AGE_PUBLIC_KEY?.length > 0 ? 'yes' : 'no'} | ||
AGE_PRIVATE_KEY: ${AGE_PRIVATE_KEY?.length > 0 ? 'yes' : 'no'} | ||
SOPS_AGE_KEY_FILE: ${SOPS_AGE_KEY_FILE} | ||
@@ -32,9 +32,12 @@ sourceFile: ${sourceFile} | ||
if (AGE_PUBLIC_KEY?.length > 0) { | ||
execSync(`sops --decrypt --age ${AGE_PUBLIC_KEY} ${sourceFile} > ${destinationFile}`) | ||
} else { | ||
execSync(`sops --decrypt --age $(cat ${SOPS_AGE_KEY_FILE} | grep -oEi "public key: (.*)" | grep -oEi "\\b(\\w+)$") ${sourceFile} > ${destinationFile}`) | ||
if (AGE_PRIVATE_KEY?.length > 0) { | ||
const sopsDir = `${require('os').homedir()}/.sops` | ||
if (!existsSync(sopsDir)) { | ||
mkdirSync(sopsDir) | ||
} | ||
writeFileSync(SOPS_AGE_KEY_FILE, process.env.AGE_PRIVATE_KEY) | ||
} | ||
execSync(`sops --decrypt --age $(cat ${SOPS_AGE_KEY_FILE} | grep -oEi "public key: (.*)" | grep -oEi "\\b(\\w+)$") ${sourceFile} > ${destinationFile}`) | ||
console.log('encrypt', process.argv, sourceFile) |
{ | ||
"name": "env-sops", | ||
"version": "1.0.12", | ||
"version": "1.0.13", | ||
"description": "Package to help encrypt/decrypt ENV files", | ||
@@ -5,0 +5,0 @@ "main": "index.js", |
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
19992
0.44%81
3.85%7
16.67%