@codemowers/oidc-key-manager 0.2.2 → 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +24 -24
- package/bin/dev.cmd +2 -2
- package/bin/run.cmd +3 -3
- package/dist/commands/initialize.d.ts +3 -3
- package/dist/commands/initialize.js +1 -1
- package/dist/commands/rotate.d.ts +7 -7
- package/dist/commands/rotate.js +1 -1
- package/dist/helpers/common-flags.d.ts +3 -3
- package/dist/helpers/common-flags.js +1 -1
- package/oclif.manifest.json +105 -77
- package/package.json +68 -68
package/README.md
CHANGED
|
@@ -1,27 +1,27 @@
|
|
|
1
|
-
oidc-key-manager
|
|
2
|
-
=================
|
|
3
|
-
|
|
4
|
-
CLI to manage secret keys required by oidc-gateway
|
|
5
|
-
|
|
1
|
+
oidc-key-manager
|
|
2
|
+
=================
|
|
3
|
+
|
|
4
|
+
CLI to manage secret keys required by oidc-gateway
|
|
5
|
+
|
|
6
6
|
<!-- toc -->
|
|
7
7
|
* [Usage](#usage)
|
|
8
8
|
* [Commands](#commands)
|
|
9
|
-
<!-- tocstop -->
|
|
10
|
-
# Usage
|
|
9
|
+
<!-- tocstop -->
|
|
10
|
+
# Usage
|
|
11
11
|
<!-- usage -->
|
|
12
12
|
```sh-session
|
|
13
13
|
$ npm install -g @codemowers/oidc-key-manager
|
|
14
14
|
$ key-manager COMMAND
|
|
15
15
|
running command...
|
|
16
16
|
$ key-manager (--version)
|
|
17
|
-
@codemowers/oidc-key-manager/0.
|
|
17
|
+
@codemowers/oidc-key-manager/1.0.0 linux-x64 node-v20.12.0
|
|
18
18
|
$ key-manager --help [COMMAND]
|
|
19
19
|
USAGE
|
|
20
20
|
$ key-manager COMMAND
|
|
21
21
|
...
|
|
22
22
|
```
|
|
23
|
-
<!-- usagestop -->
|
|
24
|
-
# Commands
|
|
23
|
+
<!-- usagestop -->
|
|
24
|
+
# Commands
|
|
25
25
|
<!-- commands -->
|
|
26
26
|
* [`key-manager initialize`](#key-manager-initialize)
|
|
27
27
|
* [`key-manager rotate`](#key-manager-rotate)
|
|
@@ -39,7 +39,7 @@ FLAGS
|
|
|
39
39
|
<options: local|cluster>
|
|
40
40
|
-n, --namespace=<value> namespace, defaults to current namespace if service account is used
|
|
41
41
|
-s, --secret=<value> [default: oidc-keys] secret name
|
|
42
|
-
|
|
42
|
+
--recreate recreate the secret if it exists
|
|
43
43
|
|
|
44
44
|
GLOBAL FLAGS
|
|
45
45
|
--json Format output as json.
|
|
@@ -57,7 +57,7 @@ EXAMPLES
|
|
|
57
57
|
$ key-manager initialize --namespace <kube namespace> --secret <secret name> --recreate
|
|
58
58
|
```
|
|
59
59
|
|
|
60
|
-
_See code: [
|
|
60
|
+
_See code: [src/commands/initialize.ts](https://github.com/codemowers/oidc-key-manager/blob/v1.0.0/src/commands/initialize.ts)_
|
|
61
61
|
|
|
62
62
|
## `key-manager rotate`
|
|
63
63
|
|
|
@@ -70,17 +70,17 @@ USAGE
|
|
|
70
70
|
--restart-deployment <value>]
|
|
71
71
|
|
|
72
72
|
FLAGS
|
|
73
|
-
-c, --config=<option>
|
|
74
|
-
|
|
75
|
-
-n, --namespace=<value>
|
|
76
|
-
-s, --secret=<value>
|
|
77
|
-
|
|
78
|
-
|
|
79
|
-
|
|
80
|
-
|
|
81
|
-
|
|
82
|
-
|
|
83
|
-
|
|
73
|
+
-c, --config=<option> (required) use local or in-cluster Kubernetes config
|
|
74
|
+
<options: local|cluster>
|
|
75
|
+
-n, --namespace=<value> namespace, defaults to current namespace if service account is used
|
|
76
|
+
-s, --secret=<value> [default: oidc-keys] secret name
|
|
77
|
+
--both rotate both JWKs and cookie keys
|
|
78
|
+
--cookie-keys rotate cookie keys
|
|
79
|
+
--jwks rotate JWKs
|
|
80
|
+
--max-number-of-cookie-keys=<value> [default: 3]
|
|
81
|
+
--max-number-of-jwks=<value> [default: 3]
|
|
82
|
+
--restart-deployment=<value> Kubernetes deployment name to restart while rotating
|
|
83
|
+
--restart-deployment-backoff=<value> [default: 60] Seconds to wait for deployment to restart
|
|
84
84
|
|
|
85
85
|
DESCRIPTION
|
|
86
86
|
Append new JWK|cookie key|both and rotate the array, optionally restarting the deployment
|
|
@@ -89,5 +89,5 @@ EXAMPLES
|
|
|
89
89
|
$ key-manager rotate
|
|
90
90
|
```
|
|
91
91
|
|
|
92
|
-
_See code: [
|
|
92
|
+
_See code: [src/commands/rotate.ts](https://github.com/codemowers/oidc-key-manager/blob/v1.0.0/src/commands/rotate.ts)_
|
|
93
93
|
<!-- commandsstop -->
|
package/bin/dev.cmd
CHANGED
|
@@ -1,3 +1,3 @@
|
|
|
1
|
-
@echo off
|
|
2
|
-
|
|
1
|
+
@echo off
|
|
2
|
+
|
|
3
3
|
node "%~dp0\dev" %*
|
package/bin/run.cmd
CHANGED
|
@@ -1,3 +1,3 @@
|
|
|
1
|
-
@echo off
|
|
2
|
-
|
|
3
|
-
node "%~dp0\run" %*
|
|
1
|
+
@echo off
|
|
2
|
+
|
|
3
|
+
node "%~dp0\run" %*
|
|
@@ -5,9 +5,9 @@ export default class Initialize extends Command {
|
|
|
5
5
|
static examples: string[];
|
|
6
6
|
static flags: {
|
|
7
7
|
recreate: import("@oclif/core/lib/interfaces").BooleanFlag<boolean>;
|
|
8
|
-
namespace: import("@oclif/core/lib/interfaces").OptionFlag<string | undefined, import("@oclif/core/lib/interfaces
|
|
9
|
-
secret: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces
|
|
10
|
-
config: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces
|
|
8
|
+
namespace: import("@oclif/core/lib/interfaces").OptionFlag<string | undefined, import("@oclif/core/lib/interfaces").CustomOptions>;
|
|
9
|
+
secret: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces").CustomOptions>;
|
|
10
|
+
config: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces").CustomOptions>;
|
|
11
11
|
};
|
|
12
12
|
static args: {};
|
|
13
13
|
run(): Promise<void>;
|
|
@@ -23,7 +23,6 @@ class Initialize extends core_1.Command {
|
|
|
23
23
|
await kubeApiService.createSecret(secret);
|
|
24
24
|
}
|
|
25
25
|
}
|
|
26
|
-
exports.default = Initialize;
|
|
27
26
|
Initialize.description = 'Initialize the secret with initial keys';
|
|
28
27
|
Initialize.enableJsonFlag = true;
|
|
29
28
|
Initialize.examples = [
|
|
@@ -37,3 +36,4 @@ Initialize.flags = {
|
|
|
37
36
|
recreate: core_1.Flags.boolean({ description: 'recreate the secret if it exists', aliases: ['recreate'], required: false }),
|
|
38
37
|
};
|
|
39
38
|
Initialize.args = {};
|
|
39
|
+
exports.default = Initialize;
|
|
@@ -6,13 +6,13 @@ export default class Rotate extends Command {
|
|
|
6
6
|
both: import("@oclif/core/lib/interfaces").BooleanFlag<boolean>;
|
|
7
7
|
jwks: import("@oclif/core/lib/interfaces").BooleanFlag<boolean>;
|
|
8
8
|
'cookie-keys': import("@oclif/core/lib/interfaces").BooleanFlag<boolean>;
|
|
9
|
-
'max-number-of-jwks': import("@oclif/core/lib/interfaces").OptionFlag<number, import("@oclif/core/lib/interfaces
|
|
10
|
-
'max-number-of-cookie-keys': import("@oclif/core/lib/interfaces").OptionFlag<number, import("@oclif/core/lib/interfaces
|
|
11
|
-
'restart-deployment': import("@oclif/core/lib/interfaces").OptionFlag<string | undefined, import("@oclif/core/lib/interfaces
|
|
12
|
-
'restart-deployment-backoff': import("@oclif/core/lib/interfaces").OptionFlag<number, import("@oclif/core/lib/interfaces
|
|
13
|
-
namespace: import("@oclif/core/lib/interfaces").OptionFlag<string | undefined, import("@oclif/core/lib/interfaces
|
|
14
|
-
secret: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces
|
|
15
|
-
config: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces
|
|
9
|
+
'max-number-of-jwks': import("@oclif/core/lib/interfaces").OptionFlag<number, import("@oclif/core/lib/interfaces").CustomOptions>;
|
|
10
|
+
'max-number-of-cookie-keys': import("@oclif/core/lib/interfaces").OptionFlag<number, import("@oclif/core/lib/interfaces").CustomOptions>;
|
|
11
|
+
'restart-deployment': import("@oclif/core/lib/interfaces").OptionFlag<string | undefined, import("@oclif/core/lib/interfaces").CustomOptions>;
|
|
12
|
+
'restart-deployment-backoff': import("@oclif/core/lib/interfaces").OptionFlag<number, import("@oclif/core/lib/interfaces").CustomOptions>;
|
|
13
|
+
namespace: import("@oclif/core/lib/interfaces").OptionFlag<string | undefined, import("@oclif/core/lib/interfaces").CustomOptions>;
|
|
14
|
+
secret: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces").CustomOptions>;
|
|
15
|
+
config: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces").CustomOptions>;
|
|
16
16
|
};
|
|
17
17
|
static args: {};
|
|
18
18
|
run(): Promise<void>;
|
package/dist/commands/rotate.js
CHANGED
|
@@ -55,7 +55,6 @@ class Rotate extends core_1.Command {
|
|
|
55
55
|
this.log('Keys rotated' + (restarted ? '' : ', but deployment not restarted'));
|
|
56
56
|
}
|
|
57
57
|
}
|
|
58
|
-
exports.default = Rotate;
|
|
59
58
|
Rotate.description = 'Append new JWK|cookie key|both and rotate the array, optionally restarting the deployment';
|
|
60
59
|
Rotate.examples = [
|
|
61
60
|
'<%= config.bin %> <%= command.id %>',
|
|
@@ -71,3 +70,4 @@ Rotate.flags = {
|
|
|
71
70
|
'restart-deployment-backoff': core_1.Flags.integer({ description: 'Seconds to wait for deployment to restart', default: 60, dependsOn: ['restart-deployment'] }),
|
|
72
71
|
};
|
|
73
72
|
Rotate.args = {};
|
|
73
|
+
exports.default = Rotate;
|
|
@@ -8,8 +8,8 @@ export declare enum ConfigType {
|
|
|
8
8
|
InCluster = "cluster"
|
|
9
9
|
}
|
|
10
10
|
declare const _default: {
|
|
11
|
-
namespace: import("@oclif/core/lib/interfaces").OptionFlag<string | undefined, import("@oclif/core/lib/interfaces
|
|
12
|
-
secret: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces
|
|
13
|
-
config: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces
|
|
11
|
+
namespace: import("@oclif/core/lib/interfaces").OptionFlag<string | undefined, import("@oclif/core/lib/interfaces").CustomOptions>;
|
|
12
|
+
secret: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces").CustomOptions>;
|
|
13
|
+
config: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces").CustomOptions>;
|
|
14
14
|
};
|
|
15
15
|
export default _default;
|
|
@@ -6,7 +6,7 @@ var ConfigType;
|
|
|
6
6
|
(function (ConfigType) {
|
|
7
7
|
ConfigType["Local"] = "local";
|
|
8
8
|
ConfigType["InCluster"] = "cluster";
|
|
9
|
-
})(ConfigType
|
|
9
|
+
})(ConfigType || (exports.ConfigType = ConfigType = {}));
|
|
10
10
|
exports.default = {
|
|
11
11
|
namespace: core_1.Flags.string({ char: 'n', description: 'namespace, defaults to current namespace if service account is used', aliases: ['namespace'], required: false }),
|
|
12
12
|
secret: core_1.Flags.string({ char: 's', description: 'secret name', aliases: ['secret'], default: 'oidc-keys', required: false }),
|
package/oclif.manifest.json
CHANGED
|
@@ -1,14 +1,9 @@
|
|
|
1
1
|
{
|
|
2
|
-
"version": "0.2.2",
|
|
3
2
|
"commands": {
|
|
4
3
|
"initialize": {
|
|
5
|
-
"id": "initialize",
|
|
6
|
-
"description": "Initialize the secret with initial keys",
|
|
7
|
-
"strict": true,
|
|
8
|
-
"pluginName": "@codemowers/oidc-key-manager",
|
|
9
|
-
"pluginAlias": "@codemowers/oidc-key-manager",
|
|
10
|
-
"pluginType": "core",
|
|
11
4
|
"aliases": [],
|
|
5
|
+
"args": {},
|
|
6
|
+
"description": "Initialize the secret with initial keys",
|
|
12
7
|
"examples": [
|
|
13
8
|
"<%= config.bin %> <%= command.id %>",
|
|
14
9
|
"<%= config.bin %> <%= command.id %>",
|
|
@@ -17,161 +12,194 @@
|
|
|
17
12
|
],
|
|
18
13
|
"flags": {
|
|
19
14
|
"json": {
|
|
20
|
-
"name": "json",
|
|
21
|
-
"type": "boolean",
|
|
22
15
|
"description": "Format output as json.",
|
|
23
16
|
"helpGroup": "GLOBAL",
|
|
24
|
-
"
|
|
17
|
+
"name": "json",
|
|
18
|
+
"allowNo": false,
|
|
19
|
+
"type": "boolean"
|
|
25
20
|
},
|
|
26
21
|
"namespace": {
|
|
27
|
-
"
|
|
28
|
-
|
|
22
|
+
"aliases": [
|
|
23
|
+
"namespace"
|
|
24
|
+
],
|
|
29
25
|
"char": "n",
|
|
30
26
|
"description": "namespace, defaults to current namespace if service account is used",
|
|
27
|
+
"name": "namespace",
|
|
31
28
|
"required": false,
|
|
29
|
+
"hasDynamicHelp": false,
|
|
32
30
|
"multiple": false,
|
|
33
|
-
"
|
|
34
|
-
"namespace"
|
|
35
|
-
]
|
|
31
|
+
"type": "option"
|
|
36
32
|
},
|
|
37
33
|
"secret": {
|
|
38
|
-
"
|
|
39
|
-
|
|
34
|
+
"aliases": [
|
|
35
|
+
"secret"
|
|
36
|
+
],
|
|
40
37
|
"char": "s",
|
|
41
38
|
"description": "secret name",
|
|
39
|
+
"name": "secret",
|
|
42
40
|
"required": false,
|
|
43
|
-
"multiple": false,
|
|
44
41
|
"default": "oidc-keys",
|
|
45
|
-
"
|
|
46
|
-
|
|
47
|
-
|
|
42
|
+
"hasDynamicHelp": false,
|
|
43
|
+
"multiple": false,
|
|
44
|
+
"type": "option"
|
|
48
45
|
},
|
|
49
46
|
"config": {
|
|
50
|
-
"
|
|
51
|
-
|
|
47
|
+
"aliases": [
|
|
48
|
+
"config"
|
|
49
|
+
],
|
|
52
50
|
"char": "c",
|
|
53
51
|
"description": "use local or in-cluster Kubernetes config",
|
|
52
|
+
"name": "config",
|
|
54
53
|
"required": true,
|
|
54
|
+
"hasDynamicHelp": false,
|
|
55
55
|
"multiple": false,
|
|
56
56
|
"options": [
|
|
57
57
|
"local",
|
|
58
58
|
"cluster"
|
|
59
59
|
],
|
|
60
|
-
"
|
|
61
|
-
"config"
|
|
62
|
-
]
|
|
60
|
+
"type": "option"
|
|
63
61
|
},
|
|
64
62
|
"recreate": {
|
|
65
|
-
"
|
|
66
|
-
|
|
63
|
+
"aliases": [
|
|
64
|
+
"recreate"
|
|
65
|
+
],
|
|
67
66
|
"description": "recreate the secret if it exists",
|
|
67
|
+
"name": "recreate",
|
|
68
68
|
"required": false,
|
|
69
69
|
"allowNo": false,
|
|
70
|
-
"
|
|
71
|
-
"recreate"
|
|
72
|
-
]
|
|
70
|
+
"type": "boolean"
|
|
73
71
|
}
|
|
74
72
|
},
|
|
75
|
-
"
|
|
76
|
-
|
|
77
|
-
|
|
78
|
-
"id": "rotate",
|
|
79
|
-
"description": "Append new JWK|cookie key|both and rotate the array, optionally restarting the deployment",
|
|
80
|
-
"strict": true,
|
|
81
|
-
"pluginName": "@codemowers/oidc-key-manager",
|
|
73
|
+
"hasDynamicHelp": false,
|
|
74
|
+
"hiddenAliases": [],
|
|
75
|
+
"id": "initialize",
|
|
82
76
|
"pluginAlias": "@codemowers/oidc-key-manager",
|
|
77
|
+
"pluginName": "@codemowers/oidc-key-manager",
|
|
83
78
|
"pluginType": "core",
|
|
79
|
+
"strict": true,
|
|
80
|
+
"enableJsonFlag": true,
|
|
81
|
+
"isESM": false,
|
|
82
|
+
"relativePath": [
|
|
83
|
+
"dist",
|
|
84
|
+
"commands",
|
|
85
|
+
"initialize.js"
|
|
86
|
+
]
|
|
87
|
+
},
|
|
88
|
+
"rotate": {
|
|
84
89
|
"aliases": [],
|
|
90
|
+
"args": {},
|
|
91
|
+
"description": "Append new JWK|cookie key|both and rotate the array, optionally restarting the deployment",
|
|
85
92
|
"examples": [
|
|
86
93
|
"<%= config.bin %> <%= command.id %>"
|
|
87
94
|
],
|
|
88
95
|
"flags": {
|
|
89
96
|
"namespace": {
|
|
90
|
-
"
|
|
91
|
-
|
|
97
|
+
"aliases": [
|
|
98
|
+
"namespace"
|
|
99
|
+
],
|
|
92
100
|
"char": "n",
|
|
93
101
|
"description": "namespace, defaults to current namespace if service account is used",
|
|
102
|
+
"name": "namespace",
|
|
94
103
|
"required": false,
|
|
104
|
+
"hasDynamicHelp": false,
|
|
95
105
|
"multiple": false,
|
|
96
|
-
"
|
|
97
|
-
"namespace"
|
|
98
|
-
]
|
|
106
|
+
"type": "option"
|
|
99
107
|
},
|
|
100
108
|
"secret": {
|
|
101
|
-
"
|
|
102
|
-
|
|
109
|
+
"aliases": [
|
|
110
|
+
"secret"
|
|
111
|
+
],
|
|
103
112
|
"char": "s",
|
|
104
113
|
"description": "secret name",
|
|
114
|
+
"name": "secret",
|
|
105
115
|
"required": false,
|
|
106
|
-
"multiple": false,
|
|
107
116
|
"default": "oidc-keys",
|
|
108
|
-
"
|
|
109
|
-
|
|
110
|
-
|
|
117
|
+
"hasDynamicHelp": false,
|
|
118
|
+
"multiple": false,
|
|
119
|
+
"type": "option"
|
|
111
120
|
},
|
|
112
121
|
"config": {
|
|
113
|
-
"
|
|
114
|
-
|
|
122
|
+
"aliases": [
|
|
123
|
+
"config"
|
|
124
|
+
],
|
|
115
125
|
"char": "c",
|
|
116
126
|
"description": "use local or in-cluster Kubernetes config",
|
|
127
|
+
"name": "config",
|
|
117
128
|
"required": true,
|
|
129
|
+
"hasDynamicHelp": false,
|
|
118
130
|
"multiple": false,
|
|
119
131
|
"options": [
|
|
120
132
|
"local",
|
|
121
133
|
"cluster"
|
|
122
134
|
],
|
|
123
|
-
"
|
|
124
|
-
"config"
|
|
125
|
-
]
|
|
135
|
+
"type": "option"
|
|
126
136
|
},
|
|
127
137
|
"both": {
|
|
128
|
-
"name": "both",
|
|
129
|
-
"type": "boolean",
|
|
130
138
|
"description": "rotate both JWKs and cookie keys",
|
|
131
|
-
"
|
|
139
|
+
"name": "both",
|
|
140
|
+
"allowNo": false,
|
|
141
|
+
"type": "boolean"
|
|
132
142
|
},
|
|
133
143
|
"jwks": {
|
|
134
|
-
"name": "jwks",
|
|
135
|
-
"type": "boolean",
|
|
136
144
|
"description": "rotate JWKs",
|
|
137
|
-
"
|
|
145
|
+
"name": "jwks",
|
|
146
|
+
"allowNo": false,
|
|
147
|
+
"type": "boolean"
|
|
138
148
|
},
|
|
139
149
|
"cookie-keys": {
|
|
140
|
-
"name": "cookie-keys",
|
|
141
|
-
"type": "boolean",
|
|
142
150
|
"description": "rotate cookie keys",
|
|
143
|
-
"
|
|
151
|
+
"name": "cookie-keys",
|
|
152
|
+
"allowNo": false,
|
|
153
|
+
"type": "boolean"
|
|
144
154
|
},
|
|
145
155
|
"max-number-of-jwks": {
|
|
146
156
|
"name": "max-number-of-jwks",
|
|
147
|
-
"
|
|
157
|
+
"default": 3,
|
|
158
|
+
"hasDynamicHelp": false,
|
|
148
159
|
"multiple": false,
|
|
149
|
-
"
|
|
160
|
+
"type": "option"
|
|
150
161
|
},
|
|
151
162
|
"max-number-of-cookie-keys": {
|
|
152
163
|
"name": "max-number-of-cookie-keys",
|
|
153
|
-
"
|
|
164
|
+
"default": 3,
|
|
165
|
+
"hasDynamicHelp": false,
|
|
154
166
|
"multiple": false,
|
|
155
|
-
"
|
|
167
|
+
"type": "option"
|
|
156
168
|
},
|
|
157
169
|
"restart-deployment": {
|
|
158
|
-
"name": "restart-deployment",
|
|
159
|
-
"type": "option",
|
|
160
170
|
"description": "Kubernetes deployment name to restart while rotating",
|
|
161
|
-
"
|
|
171
|
+
"name": "restart-deployment",
|
|
172
|
+
"hasDynamicHelp": false,
|
|
173
|
+
"multiple": false,
|
|
174
|
+
"type": "option"
|
|
162
175
|
},
|
|
163
176
|
"restart-deployment-backoff": {
|
|
164
|
-
"name": "restart-deployment-backoff",
|
|
165
|
-
"type": "option",
|
|
166
|
-
"description": "Seconds to wait for deployment to restart",
|
|
167
|
-
"multiple": false,
|
|
168
177
|
"dependsOn": [
|
|
169
178
|
"restart-deployment"
|
|
170
179
|
],
|
|
171
|
-
"
|
|
180
|
+
"description": "Seconds to wait for deployment to restart",
|
|
181
|
+
"name": "restart-deployment-backoff",
|
|
182
|
+
"default": 60,
|
|
183
|
+
"hasDynamicHelp": false,
|
|
184
|
+
"multiple": false,
|
|
185
|
+
"type": "option"
|
|
172
186
|
}
|
|
173
187
|
},
|
|
174
|
-
"
|
|
188
|
+
"hasDynamicHelp": false,
|
|
189
|
+
"hiddenAliases": [],
|
|
190
|
+
"id": "rotate",
|
|
191
|
+
"pluginAlias": "@codemowers/oidc-key-manager",
|
|
192
|
+
"pluginName": "@codemowers/oidc-key-manager",
|
|
193
|
+
"pluginType": "core",
|
|
194
|
+
"strict": true,
|
|
195
|
+
"enableJsonFlag": false,
|
|
196
|
+
"isESM": false,
|
|
197
|
+
"relativePath": [
|
|
198
|
+
"dist",
|
|
199
|
+
"commands",
|
|
200
|
+
"rotate.js"
|
|
201
|
+
]
|
|
175
202
|
}
|
|
176
|
-
}
|
|
203
|
+
},
|
|
204
|
+
"version": "1.0.0"
|
|
177
205
|
}
|
package/package.json
CHANGED
|
@@ -1,68 +1,68 @@
|
|
|
1
|
-
{
|
|
2
|
-
"name": "@codemowers/oidc-key-manager",
|
|
3
|
-
"version": "0.
|
|
4
|
-
"description": "CLI to manage secret keys required by oidc-gateway",
|
|
5
|
-
"author": "Erki Aas",
|
|
6
|
-
"bin": {
|
|
7
|
-
"key-manager": "./bin/run"
|
|
8
|
-
},
|
|
9
|
-
"homepage": "https://github.com/codemowers/oidc-key-manager",
|
|
10
|
-
"license": "MIT",
|
|
11
|
-
"main": "dist/index.js",
|
|
12
|
-
"repository": "codemowers/oidc-key-manager",
|
|
13
|
-
"files": [
|
|
14
|
-
"/bin",
|
|
15
|
-
"/dist",
|
|
16
|
-
"/npm-shrinkwrap.json",
|
|
17
|
-
"/oclif.manifest.json"
|
|
18
|
-
],
|
|
19
|
-
"dependencies": {
|
|
20
|
-
"@kubernetes/client-node": "^0.
|
|
21
|
-
"@oclif/core": "^
|
|
22
|
-
"@oclif/plugin-help": "^
|
|
23
|
-
"@oclif/plugin-plugins": "^2.4.7",
|
|
24
|
-
"@types/jsrsasign": "^10.5.
|
|
25
|
-
"jsrsasign": "^
|
|
26
|
-
},
|
|
27
|
-
"devDependencies": {
|
|
28
|
-
"@oclif/test": "^2.
|
|
29
|
-
"@types/chai": "^4",
|
|
30
|
-
"@types/mocha": "^
|
|
31
|
-
"@types/node": "^
|
|
32
|
-
"chai": "^
|
|
33
|
-
"eslint": "^
|
|
34
|
-
"eslint-config-oclif": "^
|
|
35
|
-
"eslint-config-oclif-typescript": "^
|
|
36
|
-
"mocha": "^
|
|
37
|
-
"oclif": "^
|
|
38
|
-
"shx": "^0.3.4",
|
|
39
|
-
"ts-node": "^10.9.
|
|
40
|
-
"tslib": "^2.
|
|
41
|
-
"typescript": "^4.
|
|
42
|
-
},
|
|
43
|
-
"oclif": {
|
|
44
|
-
"bin": "key-manager",
|
|
45
|
-
"dirname": "key-manager",
|
|
46
|
-
"commands": "./dist/commands",
|
|
47
|
-
"topicSeparator": " ",
|
|
48
|
-
"topics": {
|
|
49
|
-
"hello": {
|
|
50
|
-
"description": "Say hello to the world and others"
|
|
51
|
-
}
|
|
52
|
-
}
|
|
53
|
-
},
|
|
54
|
-
"scripts": {
|
|
55
|
-
"build": "shx rm -rf dist && tsc -b",
|
|
56
|
-
"lint": "eslint . --ext .ts --config .eslintrc",
|
|
57
|
-
"postpack": "shx rm -f oclif.manifest.json",
|
|
58
|
-
"posttest": "npm run lint",
|
|
59
|
-
"prepack": "npm run build && oclif manifest && oclif readme",
|
|
60
|
-
"test": "mocha --forbid-only \"test/**/*.test.ts\"",
|
|
61
|
-
"version": "oclif readme && git add README.md"
|
|
62
|
-
},
|
|
63
|
-
"engines": {
|
|
64
|
-
"node": ">=12.0.0"
|
|
65
|
-
},
|
|
66
|
-
"bugs": "https://github.com/codemowers/oidc-key-manager/issues",
|
|
67
|
-
"types": "dist/index.d.ts"
|
|
68
|
-
}
|
|
1
|
+
{
|
|
2
|
+
"name": "@codemowers/oidc-key-manager",
|
|
3
|
+
"version": "1.0.0",
|
|
4
|
+
"description": "CLI to manage secret keys required by oidc-gateway",
|
|
5
|
+
"author": "Erki Aas",
|
|
6
|
+
"bin": {
|
|
7
|
+
"key-manager": "./bin/run"
|
|
8
|
+
},
|
|
9
|
+
"homepage": "https://github.com/codemowers/oidc-key-manager",
|
|
10
|
+
"license": "MIT",
|
|
11
|
+
"main": "dist/index.js",
|
|
12
|
+
"repository": "codemowers/oidc-key-manager",
|
|
13
|
+
"files": [
|
|
14
|
+
"/bin",
|
|
15
|
+
"/dist",
|
|
16
|
+
"/npm-shrinkwrap.json",
|
|
17
|
+
"/oclif.manifest.json"
|
|
18
|
+
],
|
|
19
|
+
"dependencies": {
|
|
20
|
+
"@kubernetes/client-node": "^0.20.0",
|
|
21
|
+
"@oclif/core": "^3.26.0",
|
|
22
|
+
"@oclif/plugin-help": "^6.0.20",
|
|
23
|
+
"@oclif/plugin-plugins": "^2.4.7",
|
|
24
|
+
"@types/jsrsasign": "^10.5.13",
|
|
25
|
+
"jsrsasign": "^11.1.0"
|
|
26
|
+
},
|
|
27
|
+
"devDependencies": {
|
|
28
|
+
"@oclif/test": "^3.2.8",
|
|
29
|
+
"@types/chai": "^4.3.14",
|
|
30
|
+
"@types/mocha": "^10.0.6",
|
|
31
|
+
"@types/node": "^20.12.2",
|
|
32
|
+
"chai": "^5.1.0",
|
|
33
|
+
"eslint": "^8.57.0",
|
|
34
|
+
"eslint-config-oclif": "^5.1.1",
|
|
35
|
+
"eslint-config-oclif-typescript": "^2.0.1",
|
|
36
|
+
"mocha": "^10.4.0",
|
|
37
|
+
"oclif": "^4.7.5",
|
|
38
|
+
"shx": "^0.3.4",
|
|
39
|
+
"ts-node": "^10.9.2",
|
|
40
|
+
"tslib": "^2.6.2",
|
|
41
|
+
"typescript": "^5.4.3"
|
|
42
|
+
},
|
|
43
|
+
"oclif": {
|
|
44
|
+
"bin": "key-manager",
|
|
45
|
+
"dirname": "key-manager",
|
|
46
|
+
"commands": "./dist/commands",
|
|
47
|
+
"topicSeparator": " ",
|
|
48
|
+
"topics": {
|
|
49
|
+
"hello": {
|
|
50
|
+
"description": "Say hello to the world and others"
|
|
51
|
+
}
|
|
52
|
+
}
|
|
53
|
+
},
|
|
54
|
+
"scripts": {
|
|
55
|
+
"build": "shx rm -rf dist && tsc -b",
|
|
56
|
+
"lint": "eslint . --ext .ts --config .eslintrc",
|
|
57
|
+
"postpack": "shx rm -f oclif.manifest.json",
|
|
58
|
+
"posttest": "npm run lint",
|
|
59
|
+
"prepack": "npm run build && oclif manifest && oclif readme",
|
|
60
|
+
"test": "mocha --forbid-only \"test/**/*.test.ts\"",
|
|
61
|
+
"version": "oclif readme && git add README.md"
|
|
62
|
+
},
|
|
63
|
+
"engines": {
|
|
64
|
+
"node": ">=12.0.0"
|
|
65
|
+
},
|
|
66
|
+
"bugs": "https://github.com/codemowers/oidc-key-manager/issues",
|
|
67
|
+
"types": "dist/index.d.ts"
|
|
68
|
+
}
|