@codemowers/oidc-key-manager 0.2.2 → 1.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -1,27 +1,27 @@
1
- oidc-key-manager
2
- =================
3
-
4
- CLI to manage secret keys required by oidc-gateway
5
-
1
+ oidc-key-manager
2
+ =================
3
+
4
+ CLI to manage secret keys required by oidc-gateway
5
+
6
6
  <!-- toc -->
7
7
  * [Usage](#usage)
8
8
  * [Commands](#commands)
9
- <!-- tocstop -->
10
- # Usage
9
+ <!-- tocstop -->
10
+ # Usage
11
11
  <!-- usage -->
12
12
  ```sh-session
13
13
  $ npm install -g @codemowers/oidc-key-manager
14
14
  $ key-manager COMMAND
15
15
  running command...
16
16
  $ key-manager (--version)
17
- @codemowers/oidc-key-manager/0.2.2 linux-x64 node-v16.17.0
17
+ @codemowers/oidc-key-manager/1.0.0 linux-x64 node-v20.12.0
18
18
  $ key-manager --help [COMMAND]
19
19
  USAGE
20
20
  $ key-manager COMMAND
21
21
  ...
22
22
  ```
23
- <!-- usagestop -->
24
- # Commands
23
+ <!-- usagestop -->
24
+ # Commands
25
25
  <!-- commands -->
26
26
  * [`key-manager initialize`](#key-manager-initialize)
27
27
  * [`key-manager rotate`](#key-manager-rotate)
@@ -39,7 +39,7 @@ FLAGS
39
39
  <options: local|cluster>
40
40
  -n, --namespace=<value> namespace, defaults to current namespace if service account is used
41
41
  -s, --secret=<value> [default: oidc-keys] secret name
42
- --recreate recreate the secret if it exists
42
+ --recreate recreate the secret if it exists
43
43
 
44
44
  GLOBAL FLAGS
45
45
  --json Format output as json.
@@ -57,7 +57,7 @@ EXAMPLES
57
57
  $ key-manager initialize --namespace <kube namespace> --secret <secret name> --recreate
58
58
  ```
59
59
 
60
- _See code: [dist/commands/initialize.ts](https://github.com/codemowers/oidc-key-manager/blob/v0.2.2/dist/commands/initialize.ts)_
60
+ _See code: [src/commands/initialize.ts](https://github.com/codemowers/oidc-key-manager/blob/v1.0.0/src/commands/initialize.ts)_
61
61
 
62
62
  ## `key-manager rotate`
63
63
 
@@ -70,17 +70,17 @@ USAGE
70
70
  --restart-deployment <value>]
71
71
 
72
72
  FLAGS
73
- -c, --config=<option> (required) use local or in-cluster Kubernetes config
74
- <options: local|cluster>
75
- -n, --namespace=<value> namespace, defaults to current namespace if service account is used
76
- -s, --secret=<value> [default: oidc-keys] secret name
77
- --both rotate both JWKs and cookie keys
78
- --cookie-keys rotate cookie keys
79
- --jwks rotate JWKs
80
- --max-number-of-cookie-keys=<value> [default: 3]
81
- --max-number-of-jwks=<value> [default: 3]
82
- --restart-deployment=<value> Kubernetes deployment name to restart while rotating
83
- --restart-deployment-backoff=<value> [default: 60] Seconds to wait for deployment to restart
73
+ -c, --config=<option> (required) use local or in-cluster Kubernetes config
74
+ <options: local|cluster>
75
+ -n, --namespace=<value> namespace, defaults to current namespace if service account is used
76
+ -s, --secret=<value> [default: oidc-keys] secret name
77
+ --both rotate both JWKs and cookie keys
78
+ --cookie-keys rotate cookie keys
79
+ --jwks rotate JWKs
80
+ --max-number-of-cookie-keys=<value> [default: 3]
81
+ --max-number-of-jwks=<value> [default: 3]
82
+ --restart-deployment=<value> Kubernetes deployment name to restart while rotating
83
+ --restart-deployment-backoff=<value> [default: 60] Seconds to wait for deployment to restart
84
84
 
85
85
  DESCRIPTION
86
86
  Append new JWK|cookie key|both and rotate the array, optionally restarting the deployment
@@ -89,5 +89,5 @@ EXAMPLES
89
89
  $ key-manager rotate
90
90
  ```
91
91
 
92
- _See code: [dist/commands/rotate.ts](https://github.com/codemowers/oidc-key-manager/blob/v0.2.2/dist/commands/rotate.ts)_
92
+ _See code: [src/commands/rotate.ts](https://github.com/codemowers/oidc-key-manager/blob/v1.0.0/src/commands/rotate.ts)_
93
93
  <!-- commandsstop -->
package/bin/dev.cmd CHANGED
@@ -1,3 +1,3 @@
1
- @echo off
2
-
1
+ @echo off
2
+
3
3
  node "%~dp0\dev" %*
package/bin/run.cmd CHANGED
@@ -1,3 +1,3 @@
1
- @echo off
2
-
3
- node "%~dp0\run" %*
1
+ @echo off
2
+
3
+ node "%~dp0\run" %*
@@ -5,9 +5,9 @@ export default class Initialize extends Command {
5
5
  static examples: string[];
6
6
  static flags: {
7
7
  recreate: import("@oclif/core/lib/interfaces").BooleanFlag<boolean>;
8
- namespace: import("@oclif/core/lib/interfaces").OptionFlag<string | undefined, import("@oclif/core/lib/interfaces/parser").CustomOptions>;
9
- secret: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces/parser").CustomOptions>;
10
- config: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces/parser").CustomOptions>;
8
+ namespace: import("@oclif/core/lib/interfaces").OptionFlag<string | undefined, import("@oclif/core/lib/interfaces").CustomOptions>;
9
+ secret: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces").CustomOptions>;
10
+ config: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces").CustomOptions>;
11
11
  };
12
12
  static args: {};
13
13
  run(): Promise<void>;
@@ -23,7 +23,6 @@ class Initialize extends core_1.Command {
23
23
  await kubeApiService.createSecret(secret);
24
24
  }
25
25
  }
26
- exports.default = Initialize;
27
26
  Initialize.description = 'Initialize the secret with initial keys';
28
27
  Initialize.enableJsonFlag = true;
29
28
  Initialize.examples = [
@@ -37,3 +36,4 @@ Initialize.flags = {
37
36
  recreate: core_1.Flags.boolean({ description: 'recreate the secret if it exists', aliases: ['recreate'], required: false }),
38
37
  };
39
38
  Initialize.args = {};
39
+ exports.default = Initialize;
@@ -6,13 +6,13 @@ export default class Rotate extends Command {
6
6
  both: import("@oclif/core/lib/interfaces").BooleanFlag<boolean>;
7
7
  jwks: import("@oclif/core/lib/interfaces").BooleanFlag<boolean>;
8
8
  'cookie-keys': import("@oclif/core/lib/interfaces").BooleanFlag<boolean>;
9
- 'max-number-of-jwks': import("@oclif/core/lib/interfaces").OptionFlag<number, import("@oclif/core/lib/interfaces/parser").CustomOptions>;
10
- 'max-number-of-cookie-keys': import("@oclif/core/lib/interfaces").OptionFlag<number, import("@oclif/core/lib/interfaces/parser").CustomOptions>;
11
- 'restart-deployment': import("@oclif/core/lib/interfaces").OptionFlag<string | undefined, import("@oclif/core/lib/interfaces/parser").CustomOptions>;
12
- 'restart-deployment-backoff': import("@oclif/core/lib/interfaces").OptionFlag<number, import("@oclif/core/lib/interfaces/parser").CustomOptions>;
13
- namespace: import("@oclif/core/lib/interfaces").OptionFlag<string | undefined, import("@oclif/core/lib/interfaces/parser").CustomOptions>;
14
- secret: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces/parser").CustomOptions>;
15
- config: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces/parser").CustomOptions>;
9
+ 'max-number-of-jwks': import("@oclif/core/lib/interfaces").OptionFlag<number, import("@oclif/core/lib/interfaces").CustomOptions>;
10
+ 'max-number-of-cookie-keys': import("@oclif/core/lib/interfaces").OptionFlag<number, import("@oclif/core/lib/interfaces").CustomOptions>;
11
+ 'restart-deployment': import("@oclif/core/lib/interfaces").OptionFlag<string | undefined, import("@oclif/core/lib/interfaces").CustomOptions>;
12
+ 'restart-deployment-backoff': import("@oclif/core/lib/interfaces").OptionFlag<number, import("@oclif/core/lib/interfaces").CustomOptions>;
13
+ namespace: import("@oclif/core/lib/interfaces").OptionFlag<string | undefined, import("@oclif/core/lib/interfaces").CustomOptions>;
14
+ secret: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces").CustomOptions>;
15
+ config: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces").CustomOptions>;
16
16
  };
17
17
  static args: {};
18
18
  run(): Promise<void>;
@@ -55,7 +55,6 @@ class Rotate extends core_1.Command {
55
55
  this.log('Keys rotated' + (restarted ? '' : ', but deployment not restarted'));
56
56
  }
57
57
  }
58
- exports.default = Rotate;
59
58
  Rotate.description = 'Append new JWK|cookie key|both and rotate the array, optionally restarting the deployment';
60
59
  Rotate.examples = [
61
60
  '<%= config.bin %> <%= command.id %>',
@@ -71,3 +70,4 @@ Rotate.flags = {
71
70
  'restart-deployment-backoff': core_1.Flags.integer({ description: 'Seconds to wait for deployment to restart', default: 60, dependsOn: ['restart-deployment'] }),
72
71
  };
73
72
  Rotate.args = {};
73
+ exports.default = Rotate;
@@ -8,8 +8,8 @@ export declare enum ConfigType {
8
8
  InCluster = "cluster"
9
9
  }
10
10
  declare const _default: {
11
- namespace: import("@oclif/core/lib/interfaces").OptionFlag<string | undefined, import("@oclif/core/lib/interfaces/parser").CustomOptions>;
12
- secret: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces/parser").CustomOptions>;
13
- config: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces/parser").CustomOptions>;
11
+ namespace: import("@oclif/core/lib/interfaces").OptionFlag<string | undefined, import("@oclif/core/lib/interfaces").CustomOptions>;
12
+ secret: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces").CustomOptions>;
13
+ config: import("@oclif/core/lib/interfaces").OptionFlag<string, import("@oclif/core/lib/interfaces").CustomOptions>;
14
14
  };
15
15
  export default _default;
@@ -6,7 +6,7 @@ var ConfigType;
6
6
  (function (ConfigType) {
7
7
  ConfigType["Local"] = "local";
8
8
  ConfigType["InCluster"] = "cluster";
9
- })(ConfigType = exports.ConfigType || (exports.ConfigType = {}));
9
+ })(ConfigType || (exports.ConfigType = ConfigType = {}));
10
10
  exports.default = {
11
11
  namespace: core_1.Flags.string({ char: 'n', description: 'namespace, defaults to current namespace if service account is used', aliases: ['namespace'], required: false }),
12
12
  secret: core_1.Flags.string({ char: 's', description: 'secret name', aliases: ['secret'], default: 'oidc-keys', required: false }),
@@ -1,14 +1,9 @@
1
1
  {
2
- "version": "0.2.2",
3
2
  "commands": {
4
3
  "initialize": {
5
- "id": "initialize",
6
- "description": "Initialize the secret with initial keys",
7
- "strict": true,
8
- "pluginName": "@codemowers/oidc-key-manager",
9
- "pluginAlias": "@codemowers/oidc-key-manager",
10
- "pluginType": "core",
11
4
  "aliases": [],
5
+ "args": {},
6
+ "description": "Initialize the secret with initial keys",
12
7
  "examples": [
13
8
  "<%= config.bin %> <%= command.id %>",
14
9
  "<%= config.bin %> <%= command.id %>",
@@ -17,161 +12,194 @@
17
12
  ],
18
13
  "flags": {
19
14
  "json": {
20
- "name": "json",
21
- "type": "boolean",
22
15
  "description": "Format output as json.",
23
16
  "helpGroup": "GLOBAL",
24
- "allowNo": false
17
+ "name": "json",
18
+ "allowNo": false,
19
+ "type": "boolean"
25
20
  },
26
21
  "namespace": {
27
- "name": "namespace",
28
- "type": "option",
22
+ "aliases": [
23
+ "namespace"
24
+ ],
29
25
  "char": "n",
30
26
  "description": "namespace, defaults to current namespace if service account is used",
27
+ "name": "namespace",
31
28
  "required": false,
29
+ "hasDynamicHelp": false,
32
30
  "multiple": false,
33
- "aliases": [
34
- "namespace"
35
- ]
31
+ "type": "option"
36
32
  },
37
33
  "secret": {
38
- "name": "secret",
39
- "type": "option",
34
+ "aliases": [
35
+ "secret"
36
+ ],
40
37
  "char": "s",
41
38
  "description": "secret name",
39
+ "name": "secret",
42
40
  "required": false,
43
- "multiple": false,
44
41
  "default": "oidc-keys",
45
- "aliases": [
46
- "secret"
47
- ]
42
+ "hasDynamicHelp": false,
43
+ "multiple": false,
44
+ "type": "option"
48
45
  },
49
46
  "config": {
50
- "name": "config",
51
- "type": "option",
47
+ "aliases": [
48
+ "config"
49
+ ],
52
50
  "char": "c",
53
51
  "description": "use local or in-cluster Kubernetes config",
52
+ "name": "config",
54
53
  "required": true,
54
+ "hasDynamicHelp": false,
55
55
  "multiple": false,
56
56
  "options": [
57
57
  "local",
58
58
  "cluster"
59
59
  ],
60
- "aliases": [
61
- "config"
62
- ]
60
+ "type": "option"
63
61
  },
64
62
  "recreate": {
65
- "name": "recreate",
66
- "type": "boolean",
63
+ "aliases": [
64
+ "recreate"
65
+ ],
67
66
  "description": "recreate the secret if it exists",
67
+ "name": "recreate",
68
68
  "required": false,
69
69
  "allowNo": false,
70
- "aliases": [
71
- "recreate"
72
- ]
70
+ "type": "boolean"
73
71
  }
74
72
  },
75
- "args": {}
76
- },
77
- "rotate": {
78
- "id": "rotate",
79
- "description": "Append new JWK|cookie key|both and rotate the array, optionally restarting the deployment",
80
- "strict": true,
81
- "pluginName": "@codemowers/oidc-key-manager",
73
+ "hasDynamicHelp": false,
74
+ "hiddenAliases": [],
75
+ "id": "initialize",
82
76
  "pluginAlias": "@codemowers/oidc-key-manager",
77
+ "pluginName": "@codemowers/oidc-key-manager",
83
78
  "pluginType": "core",
79
+ "strict": true,
80
+ "enableJsonFlag": true,
81
+ "isESM": false,
82
+ "relativePath": [
83
+ "dist",
84
+ "commands",
85
+ "initialize.js"
86
+ ]
87
+ },
88
+ "rotate": {
84
89
  "aliases": [],
90
+ "args": {},
91
+ "description": "Append new JWK|cookie key|both and rotate the array, optionally restarting the deployment",
85
92
  "examples": [
86
93
  "<%= config.bin %> <%= command.id %>"
87
94
  ],
88
95
  "flags": {
89
96
  "namespace": {
90
- "name": "namespace",
91
- "type": "option",
97
+ "aliases": [
98
+ "namespace"
99
+ ],
92
100
  "char": "n",
93
101
  "description": "namespace, defaults to current namespace if service account is used",
102
+ "name": "namespace",
94
103
  "required": false,
104
+ "hasDynamicHelp": false,
95
105
  "multiple": false,
96
- "aliases": [
97
- "namespace"
98
- ]
106
+ "type": "option"
99
107
  },
100
108
  "secret": {
101
- "name": "secret",
102
- "type": "option",
109
+ "aliases": [
110
+ "secret"
111
+ ],
103
112
  "char": "s",
104
113
  "description": "secret name",
114
+ "name": "secret",
105
115
  "required": false,
106
- "multiple": false,
107
116
  "default": "oidc-keys",
108
- "aliases": [
109
- "secret"
110
- ]
117
+ "hasDynamicHelp": false,
118
+ "multiple": false,
119
+ "type": "option"
111
120
  },
112
121
  "config": {
113
- "name": "config",
114
- "type": "option",
122
+ "aliases": [
123
+ "config"
124
+ ],
115
125
  "char": "c",
116
126
  "description": "use local or in-cluster Kubernetes config",
127
+ "name": "config",
117
128
  "required": true,
129
+ "hasDynamicHelp": false,
118
130
  "multiple": false,
119
131
  "options": [
120
132
  "local",
121
133
  "cluster"
122
134
  ],
123
- "aliases": [
124
- "config"
125
- ]
135
+ "type": "option"
126
136
  },
127
137
  "both": {
128
- "name": "both",
129
- "type": "boolean",
130
138
  "description": "rotate both JWKs and cookie keys",
131
- "allowNo": false
139
+ "name": "both",
140
+ "allowNo": false,
141
+ "type": "boolean"
132
142
  },
133
143
  "jwks": {
134
- "name": "jwks",
135
- "type": "boolean",
136
144
  "description": "rotate JWKs",
137
- "allowNo": false
145
+ "name": "jwks",
146
+ "allowNo": false,
147
+ "type": "boolean"
138
148
  },
139
149
  "cookie-keys": {
140
- "name": "cookie-keys",
141
- "type": "boolean",
142
150
  "description": "rotate cookie keys",
143
- "allowNo": false
151
+ "name": "cookie-keys",
152
+ "allowNo": false,
153
+ "type": "boolean"
144
154
  },
145
155
  "max-number-of-jwks": {
146
156
  "name": "max-number-of-jwks",
147
- "type": "option",
157
+ "default": 3,
158
+ "hasDynamicHelp": false,
148
159
  "multiple": false,
149
- "default": 3
160
+ "type": "option"
150
161
  },
151
162
  "max-number-of-cookie-keys": {
152
163
  "name": "max-number-of-cookie-keys",
153
- "type": "option",
164
+ "default": 3,
165
+ "hasDynamicHelp": false,
154
166
  "multiple": false,
155
- "default": 3
167
+ "type": "option"
156
168
  },
157
169
  "restart-deployment": {
158
- "name": "restart-deployment",
159
- "type": "option",
160
170
  "description": "Kubernetes deployment name to restart while rotating",
161
- "multiple": false
171
+ "name": "restart-deployment",
172
+ "hasDynamicHelp": false,
173
+ "multiple": false,
174
+ "type": "option"
162
175
  },
163
176
  "restart-deployment-backoff": {
164
- "name": "restart-deployment-backoff",
165
- "type": "option",
166
- "description": "Seconds to wait for deployment to restart",
167
- "multiple": false,
168
177
  "dependsOn": [
169
178
  "restart-deployment"
170
179
  ],
171
- "default": 60
180
+ "description": "Seconds to wait for deployment to restart",
181
+ "name": "restart-deployment-backoff",
182
+ "default": 60,
183
+ "hasDynamicHelp": false,
184
+ "multiple": false,
185
+ "type": "option"
172
186
  }
173
187
  },
174
- "args": {}
188
+ "hasDynamicHelp": false,
189
+ "hiddenAliases": [],
190
+ "id": "rotate",
191
+ "pluginAlias": "@codemowers/oidc-key-manager",
192
+ "pluginName": "@codemowers/oidc-key-manager",
193
+ "pluginType": "core",
194
+ "strict": true,
195
+ "enableJsonFlag": false,
196
+ "isESM": false,
197
+ "relativePath": [
198
+ "dist",
199
+ "commands",
200
+ "rotate.js"
201
+ ]
175
202
  }
176
- }
203
+ },
204
+ "version": "1.0.0"
177
205
  }
package/package.json CHANGED
@@ -1,68 +1,68 @@
1
- {
2
- "name": "@codemowers/oidc-key-manager",
3
- "version": "0.2.2",
4
- "description": "CLI to manage secret keys required by oidc-gateway",
5
- "author": "Erki Aas",
6
- "bin": {
7
- "key-manager": "./bin/run"
8
- },
9
- "homepage": "https://github.com/codemowers/oidc-key-manager",
10
- "license": "MIT",
11
- "main": "dist/index.js",
12
- "repository": "codemowers/oidc-key-manager",
13
- "files": [
14
- "/bin",
15
- "/dist",
16
- "/npm-shrinkwrap.json",
17
- "/oclif.manifest.json"
18
- ],
19
- "dependencies": {
20
- "@kubernetes/client-node": "^0.18.1",
21
- "@oclif/core": "^2.8.4",
22
- "@oclif/plugin-help": "^5",
23
- "@oclif/plugin-plugins": "^2.4.7",
24
- "@types/jsrsasign": "^10.5.8",
25
- "jsrsasign": "^10.8.6"
26
- },
27
- "devDependencies": {
28
- "@oclif/test": "^2.3.17",
29
- "@types/chai": "^4",
30
- "@types/mocha": "^9.0.0",
31
- "@types/node": "^16.18.25",
32
- "chai": "^4",
33
- "eslint": "^7.32.0",
34
- "eslint-config-oclif": "^4",
35
- "eslint-config-oclif-typescript": "^1.0.3",
36
- "mocha": "^9",
37
- "oclif": "^3",
38
- "shx": "^0.3.4",
39
- "ts-node": "^10.9.1",
40
- "tslib": "^2.5.0",
41
- "typescript": "^4.9.5"
42
- },
43
- "oclif": {
44
- "bin": "key-manager",
45
- "dirname": "key-manager",
46
- "commands": "./dist/commands",
47
- "topicSeparator": " ",
48
- "topics": {
49
- "hello": {
50
- "description": "Say hello to the world and others"
51
- }
52
- }
53
- },
54
- "scripts": {
55
- "build": "shx rm -rf dist && tsc -b",
56
- "lint": "eslint . --ext .ts --config .eslintrc",
57
- "postpack": "shx rm -f oclif.manifest.json",
58
- "posttest": "npm run lint",
59
- "prepack": "npm run build && oclif manifest && oclif readme",
60
- "test": "mocha --forbid-only \"test/**/*.test.ts\"",
61
- "version": "oclif readme && git add README.md"
62
- },
63
- "engines": {
64
- "node": ">=12.0.0"
65
- },
66
- "bugs": "https://github.com/codemowers/oidc-key-manager/issues",
67
- "types": "dist/index.d.ts"
68
- }
1
+ {
2
+ "name": "@codemowers/oidc-key-manager",
3
+ "version": "1.0.0",
4
+ "description": "CLI to manage secret keys required by oidc-gateway",
5
+ "author": "Erki Aas",
6
+ "bin": {
7
+ "key-manager": "./bin/run"
8
+ },
9
+ "homepage": "https://github.com/codemowers/oidc-key-manager",
10
+ "license": "MIT",
11
+ "main": "dist/index.js",
12
+ "repository": "codemowers/oidc-key-manager",
13
+ "files": [
14
+ "/bin",
15
+ "/dist",
16
+ "/npm-shrinkwrap.json",
17
+ "/oclif.manifest.json"
18
+ ],
19
+ "dependencies": {
20
+ "@kubernetes/client-node": "^0.20.0",
21
+ "@oclif/core": "^3.26.0",
22
+ "@oclif/plugin-help": "^6.0.20",
23
+ "@oclif/plugin-plugins": "^2.4.7",
24
+ "@types/jsrsasign": "^10.5.13",
25
+ "jsrsasign": "^11.1.0"
26
+ },
27
+ "devDependencies": {
28
+ "@oclif/test": "^3.2.8",
29
+ "@types/chai": "^4.3.14",
30
+ "@types/mocha": "^10.0.6",
31
+ "@types/node": "^20.12.2",
32
+ "chai": "^5.1.0",
33
+ "eslint": "^8.57.0",
34
+ "eslint-config-oclif": "^5.1.1",
35
+ "eslint-config-oclif-typescript": "^2.0.1",
36
+ "mocha": "^10.4.0",
37
+ "oclif": "^4.7.5",
38
+ "shx": "^0.3.4",
39
+ "ts-node": "^10.9.2",
40
+ "tslib": "^2.6.2",
41
+ "typescript": "^5.4.3"
42
+ },
43
+ "oclif": {
44
+ "bin": "key-manager",
45
+ "dirname": "key-manager",
46
+ "commands": "./dist/commands",
47
+ "topicSeparator": " ",
48
+ "topics": {
49
+ "hello": {
50
+ "description": "Say hello to the world and others"
51
+ }
52
+ }
53
+ },
54
+ "scripts": {
55
+ "build": "shx rm -rf dist && tsc -b",
56
+ "lint": "eslint . --ext .ts --config .eslintrc",
57
+ "postpack": "shx rm -f oclif.manifest.json",
58
+ "posttest": "npm run lint",
59
+ "prepack": "npm run build && oclif manifest && oclif readme",
60
+ "test": "mocha --forbid-only \"test/**/*.test.ts\"",
61
+ "version": "oclif readme && git add README.md"
62
+ },
63
+ "engines": {
64
+ "node": ">=12.0.0"
65
+ },
66
+ "bugs": "https://github.com/codemowers/oidc-key-manager/issues",
67
+ "types": "dist/index.d.ts"
68
+ }