@codemowers/oidc-key-manager 1.1.0 → 1.1.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md
CHANGED
|
@@ -14,7 +14,7 @@ $ npm install -g @codemowers/oidc-key-manager
|
|
|
14
14
|
$ key-manager COMMAND
|
|
15
15
|
running command...
|
|
16
16
|
$ key-manager (--version)
|
|
17
|
-
@codemowers/oidc-key-manager/1.1.
|
|
17
|
+
@codemowers/oidc-key-manager/1.1.2 linux-x64 node-v22.20.0
|
|
18
18
|
$ key-manager --help [COMMAND]
|
|
19
19
|
USAGE
|
|
20
20
|
$ key-manager COMMAND
|
|
@@ -60,7 +60,7 @@ EXAMPLES
|
|
|
60
60
|
$ key-manager initialize --additional-label "app.kubernetes.io/instance: passmower"
|
|
61
61
|
```
|
|
62
62
|
|
|
63
|
-
_See code: [src/commands/initialize.ts](https://github.com/codemowers/oidc-key-manager/blob/v1.1.
|
|
63
|
+
_See code: [src/commands/initialize.ts](https://github.com/codemowers/oidc-key-manager/blob/v1.1.2/src/commands/initialize.ts)_
|
|
64
64
|
|
|
65
65
|
## `key-manager rotate`
|
|
66
66
|
|
|
@@ -93,5 +93,5 @@ EXAMPLES
|
|
|
93
93
|
$ key-manager rotate
|
|
94
94
|
```
|
|
95
95
|
|
|
96
|
-
_See code: [src/commands/rotate.ts](https://github.com/codemowers/oidc-key-manager/blob/v1.1.
|
|
96
|
+
_See code: [src/commands/rotate.ts](https://github.com/codemowers/oidc-key-manager/blob/v1.1.2/src/commands/rotate.ts)_
|
|
97
97
|
<!-- commandsstop -->
|
|
@@ -15,6 +15,6 @@ export declare class KubeApiService {
|
|
|
15
15
|
restartDeployment(deploymentName: string, timeoutInSeconds: number): Promise<any>;
|
|
16
16
|
getSecret(): Promise<V1Secret | undefined | null>;
|
|
17
17
|
deleteSecret(): Promise<void>;
|
|
18
|
-
createSecret(secret: Secret, labels?:
|
|
19
|
-
replaceSecret(secret: Secret, labels?:
|
|
18
|
+
createSecret(secret: Secret, labels?: string[]): Promise<void>;
|
|
19
|
+
replaceSecret(secret: Secret, labels?: string[]): Promise<void>;
|
|
20
20
|
}
|
|
@@ -85,7 +85,12 @@ class KubeApiService {
|
|
|
85
85
|
}
|
|
86
86
|
async createSecret(secret, labels) {
|
|
87
87
|
this.command.log(`Creating secret ${this.secretName}`);
|
|
88
|
-
|
|
88
|
+
try {
|
|
89
|
+
await this.coreV1Api.createNamespacedSecret(this.namespace, secret.toKubeSecret(this.secretName, labels));
|
|
90
|
+
}
|
|
91
|
+
catch (error) {
|
|
92
|
+
console.error(error);
|
|
93
|
+
}
|
|
89
94
|
this.command.log(`Created secret ${this.secretName}`);
|
|
90
95
|
}
|
|
91
96
|
async replaceSecret(secret, labels) {
|
package/dist/helpers/secret.d.ts
CHANGED
|
@@ -7,7 +7,7 @@ export declare class Secret {
|
|
|
7
7
|
private command;
|
|
8
8
|
constructor(command: Command);
|
|
9
9
|
generateNew(): void;
|
|
10
|
-
toKubeSecret(secretName: string, labels?:
|
|
10
|
+
toKubeSecret(secretName: string, labels?: string[]): V1Secret;
|
|
11
11
|
fromKubeSecret(kubeSecret: V1Secret): void;
|
|
12
12
|
appendJWK(maxNumber: number): void;
|
|
13
13
|
appendCookieKey(maxNumber: number): void;
|
package/dist/helpers/secret.js
CHANGED
|
@@ -76,8 +76,15 @@ _Secret_instances = new WeakSet(), _Secret_append = function _Secret_append(prop
|
|
|
76
76
|
}, _Secret_getKubeSecretMetadata = function _Secret_getKubeSecretMetadata(secretName, labels) {
|
|
77
77
|
const metaData = new client_node_1.V1ObjectMeta();
|
|
78
78
|
metaData.name = secretName;
|
|
79
|
-
if (labels) {
|
|
80
|
-
metaData.labels =
|
|
79
|
+
if (labels && labels.length > 0) {
|
|
80
|
+
metaData.labels = {};
|
|
81
|
+
for (const label of labels) {
|
|
82
|
+
const [key, ...valueParts] = label.split(':');
|
|
83
|
+
const value = valueParts.join(':').trim();
|
|
84
|
+
if (key && value) {
|
|
85
|
+
metaData.labels[key.trim()] = value;
|
|
86
|
+
}
|
|
87
|
+
}
|
|
81
88
|
}
|
|
82
89
|
return metaData;
|
|
83
90
|
};
|
package/oclif.manifest.json
CHANGED