secvault 3.3.0 → 3.3.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 710d3e06fdda8db93c2e7ca401e8eaa9aa973b5c350dba8773a15a41458c71df
4
- data.tar.gz: 123cf43f089b2880f4c80035253510c97aaff711193c41e40b768605702a06db
3
+ metadata.gz: d6e3a1b58dbac30cfc365c2f1ba49ffc377545cdb1cd3916ee16d215c846f978
4
+ data.tar.gz: dfaee92c1baa0b9b7139efae1b18ed6bb94cc1ed25fa8799c81517b07b434555
5
5
  SHA512:
6
- metadata.gz: 257a70771cad2fe8581071a9aad9a3abc18fabf176d1ed902fd9962657a8a15a1e8a8d966b9a00912e4aa58eb129f4e1d3ba754d6e319aab4c2f0d05ffcd5a31
7
- data.tar.gz: 5783d0e4fa433d1beb8984e7d8a7d5946502249b4449e5e6ba97f2eedadf1063ec1982e11327757ee593aa9198a3203461ee1a59f3cb01356b1a800ba0aadbd7
6
+ metadata.gz: 7e0e14d5b20e639b47ab19e0c3b6ca9995dc1ce39dec420d9fdaba04fbd78575bbb2cb1c7599c94bc02fcfe6b0fc2e547aee324bb0d7a08a1843461138e54809
7
+ data.tar.gz: 620ab870be5ba3793ac9906d8f16133dc6d7bbb48c45f08c782bb1345190bf16c3ea24c043bf671e2dbdf269914ada7e7e08e1f811619d92f4ee615e6c10d19c
@@ -48,38 +48,38 @@ module Secvault
48
48
  class EarlyLoader
49
49
  class << self
50
50
  def setup_early_secrets(app)
51
- puts "[Secvault Debug] setup_early_secrets called" unless Rails.env.production?
51
+ puts "[Secvault Debug] setup_early_secrets called" if debug_secvault?
52
52
 
53
53
  if Rails.application.respond_to?(:secrets) && !Rails.application.secrets.empty?
54
- puts "[Secvault Debug] Secrets already exist, skipping early load" unless Rails.env.production?
54
+ puts "[Secvault Debug] Secrets already exist, skipping early load" if debug_secvault?
55
55
  return
56
56
  end
57
57
 
58
58
  # Look for Secvault configuration in the app
59
59
  secrets_config = find_secvault_config(app)
60
- puts "[Secvault Debug] Found config: #{secrets_config&.keys}" unless Rails.env.production?
60
+ puts "[Secvault Debug] Found config: #{secrets_config&.keys}" if debug_secvault?
61
61
  return unless secrets_config
62
62
 
63
63
  begin
64
64
  # Load secrets using the configuration found
65
65
  all_secrets = Secvault::Secrets.parse(secrets_config[:files], env: Rails.env)
66
- puts "[Secvault Debug] Loaded secrets keys: #{all_secrets.keys}" unless Rails.env.production?
66
+ puts "[Secvault Debug] Loaded secrets keys: #{all_secrets.keys}" if debug_secvault?
67
67
 
68
68
  # Set up Rails.application.secrets immediately
69
69
  Rails.application.define_singleton_method(:secrets) do
70
70
  @secrets ||= begin
71
71
  current_secrets = ActiveSupport::OrderedOptions.new
72
72
  current_secrets.merge!(all_secrets)
73
- puts "[Secvault Debug] Returning secrets with encryption: #{current_secrets.encryption}" unless Rails.env.production?
73
+ puts "[Secvault Debug] Returning secrets with encryption: #{current_secrets.encryption}" if debug_secvault?
74
74
  current_secrets
75
75
  end
76
76
  end
77
77
 
78
78
  # Test the secrets immediately
79
79
  test_encryption = Rails.application.secrets.encryption
80
- puts "[Secvault Debug] Test access - encryption: #{test_encryption.class} - #{test_encryption}" unless Rails.env.production?
80
+ puts "[Secvault Debug] Test access - encryption: #{test_encryption.class} - #{test_encryption}" if debug_secvault?
81
81
 
82
- Rails.logger&.info "[Secvault] Early secrets loaded from #{secrets_config[:files].size} files" unless Rails.env.production?
82
+ Rails.logger&.info "[Secvault] Early secrets loaded from #{secrets_config[:files].size} files" if debug_secvault?
83
83
  rescue => e
84
84
  Rails.logger&.warn "[Secvault] Failed to load early secrets: #{e.message}"
85
85
  end
@@ -150,6 +150,10 @@ module Secvault
150
150
  Rails.logger&.warn "[Secvault] Failed to parse config file #{config_file}: #{e.message}"
151
151
  nil
152
152
  end
153
+
154
+ def debug_secvault?
155
+ ENV["DEBUG_SECVAULT"] == "true"
156
+ end
153
157
  end
154
158
  end
155
159
  end
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module Secvault
4
- VERSION = "3.3.0"
4
+ VERSION = "3.3.1"
5
5
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: secvault
3
3
  version: !ruby/object:Gem::Version
4
- version: 3.3.0
4
+ version: 3.3.1
5
5
  platform: ruby
6
6
  authors:
7
7
  - Unnikrishnan KP
8
- autorequire:
8
+ autorequire:
9
9
  bindir: exe
10
10
  cert_chain: []
11
- date: 2025-09-30 00:00:00.000000000 Z
11
+ date: 2026-03-09 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: rails
@@ -80,7 +80,7 @@ metadata:
80
80
  homepage_uri: https://github.com/unnitallman/secvault
81
81
  source_code_uri: https://github.com/unnitallman/secvault
82
82
  changelog_uri: https://github.com/unnitallman/secvault/blob/main/CHANGELOG.md
83
- post_install_message:
83
+ post_install_message:
84
84
  rdoc_options: []
85
85
  require_paths:
86
86
  - lib
@@ -95,8 +95,8 @@ required_rubygems_version: !ruby/object:Gem::Requirement
95
95
  - !ruby/object:Gem::Version
96
96
  version: '0'
97
97
  requirements: []
98
- rubygems_version: 3.5.10
99
- signing_key:
98
+ rubygems_version: 3.0.3.1
99
+ signing_key:
100
100
  specification_version: 4
101
101
  summary: Simple Rails secrets.yml functionality for Rails 7.1+, 7.2+ and Rails 8.0+
102
102
  test_files: []