You're Invited:Meet the Socket Team at BlackHat and DEF CON in Las Vegas, Aug 4-6.RSVP
Socket
Book a DemoInstallSign in
Socket

hashi-vault-js

Package Overview
Dependencies
Maintainers
2
Versions
40
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

hashi-vault-js - npm Package Compare versions

Comparing version

to
0.4.8

6

CHANGELOG.md

@@ -5,2 +5,8 @@ # Hashi Vault JS

* `0.4.8`
* Fixed security vulnerability (npm audit fix)
* Improved documentation
* Upgraded development env to Vault server `1.9.2` and node engine `v16`
* Upgraded all dependencies (`Axios` and `Jest`)
* `0.4.7`

@@ -7,0 +13,0 @@ * Upgraded development env to Vault server `1.8.5`

12

package.json
{
"name": "hashi-vault-js",
"version": "0.4.7",
"version": "0.4.8",
"description": "A node.js module to interact with the Hashicorp Vault API.",

@@ -35,3 +35,4 @@ "main": "Vault.js",

"Richard <richie765@> (https://github.com/Richie765)",
"Artico Bandurini <articobandurini> (https://github.com/articobandurini)"
"Artico Bandurini <articobandurini@> (https://github.com/articobandurini)",
"Ordinary IT9 <hkgnobody@> (https://github.com/hkgnobody)"
],

@@ -43,7 +44,10 @@ "license": "EPL-2.0",

"homepage": "https://github.com/rod4n4m1/hashi-vault-js#readme",
"engines": {
"node": ">=12"
},
"dependencies": {
"axios": ">=0.21.1"
"axios": "^0.24.0"
},
"devDependencies": {
"jest": "^27.0.4"
"jest": "^27.4.7"
},

@@ -50,0 +54,0 @@ "jest": {

# Hashi Vault JS
<img alt="David" src="https://img.shields.io/david/rod4n4m1/hashi-vault-js">
<img alt="GitHub code size in bytes" src="https://img.shields.io/github/languages/code-size/rod4n4m1/hashi-vault-js">
<img alt="npm" src="https://img.shields.io/npm/dm/hashi-vault-js">
<img alt="NPM" src="https://img.shields.io/npm/l/hashi-vault-js">
<img alt="GitHub contributors" src="https://img.shields.io/github/contributors/rod4n4m1/hashi-vault-js">
![GitHub issues](https://img.shields.io/github/issues/rod4n4m1/hashi-vault-js)
![GitHub code size in bytes](https://img.shields.io/github/languages/code-size/rod4n4m1/hashi-vault-js)
![GitHub repo file count](https://img.shields.io/github/directory-file-count/rod4n4m1/hashi-vault-js)
![GitHub top language](https://img.shields.io/github/languages/top/rod4n4m1/hashi-vault-js)
![GitHub contributors](https://img.shields.io/github/contributors/rod4n4m1/hashi-vault-js)
![GitHub package.json dependency version (prod)](https://img.shields.io/github/package-json/dependency-version/rod4n4m1/hashi-vault-js/axios)
![npm](https://img.shields.io/npm/dm/hashi-vault-js)
![NPM](https://img.shields.io/npm/l/hashi-vault-js)
This module provides a set of functions to help **JavaScript** Developers working with HashiCorp Vault to authenticate and access API endpoints using **JavaScript** _promises_.
This package is **NOT** affected by the _log4shell_ [CVE-2021-44228](https://nvd.nist.gov/vuln/detail/CVE-2021-44228) vulnerability!
## Requirements (MacOS/Windows)
* NodeJs
* Minimum: v10.x
* Recommended: **v12.x**
* Minimum: v12.x
* Recommended: **v16.x**
* npm
* Tested on: **v6.20.x**
* HashiCorp Vault
* Minimum: v1.6.x
* Accepted: v1.7.x
* Recommended: **v1.8.x**
* Minimum: v1.7.x
* Accepted: v1.8.x
* Recommended: **v1.9.x**

@@ -111,3 +116,3 @@ **Note:** Depending on your Windows setup [windows-build-tools](https://www.npmjs.com/package/windows-build-tools) may need to be installed first. Also, for MacOS users, you should have **xcode-select** or entire Xcode App installed.

Perform a login on the Vault with role-id/secret-id pair (AppRole login) and get a valid client token:
Perform a login on the Vault with role-id/secret-id pair, (AppRole login) and get a valid client token:

@@ -118,3 +123,3 @@ ```javascript

Perform a login on the Vault with LDAP username/password pair and get a valid client token:
Perform a login on the Vault with LDAP username/password pair, and get a valid client token:

@@ -125,3 +130,3 @@ ```javascript

Perform a login on the Vault with Userpass username/password pair and get a valid client token:
Perform a login on the Vault with Userpass username/password pair, and get a valid client token:

@@ -296,3 +301,4 @@ ```javascript

* Richard <richie765@>
* Artico Bandurini <articobandurini>
* Artico Bandurini <articobandurini@>
* Ordinary IT9 <hkgnobody@>

@@ -299,0 +305,0 @@ ### License

Sorry, the diff of this file is not supported yet