@enspirit/emb 0.15.0 → 0.17.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (54) hide show
  1. package/README.md +162 -43
  2. package/dist/src/cli/abstract/BaseCommand.d.ts +1 -0
  3. package/dist/src/cli/abstract/BaseCommand.js +23 -4
  4. package/dist/src/cli/abstract/FlavouredCommand.d.ts +1 -0
  5. package/dist/src/cli/abstract/KubernetesCommand.d.ts +1 -0
  6. package/dist/src/cli/commands/components/logs.d.ts +2 -1
  7. package/dist/src/cli/commands/components/logs.js +21 -24
  8. package/dist/src/cli/commands/secrets/index.d.ts +14 -0
  9. package/dist/src/cli/commands/secrets/index.js +71 -0
  10. package/dist/src/cli/commands/secrets/providers.d.ts +12 -0
  11. package/dist/src/cli/commands/secrets/providers.js +50 -0
  12. package/dist/src/cli/commands/secrets/validate.d.ts +18 -0
  13. package/dist/src/cli/commands/secrets/validate.js +145 -0
  14. package/dist/src/cli/hooks/init.js +7 -1
  15. package/dist/src/config/index.d.ts +10 -1
  16. package/dist/src/config/index.js +28 -3
  17. package/dist/src/config/schema.d.ts +7 -4
  18. package/dist/src/config/schema.json +173 -9
  19. package/dist/src/context.d.ts +9 -0
  20. package/dist/src/context.js +19 -0
  21. package/dist/src/docker/compose/operations/ComposeLogsOperation.d.ts +21 -0
  22. package/dist/src/docker/compose/operations/ComposeLogsOperation.js +85 -0
  23. package/dist/src/docker/compose/operations/index.d.ts +1 -0
  24. package/dist/src/docker/compose/operations/index.js +1 -0
  25. package/dist/src/index.d.ts +1 -0
  26. package/dist/src/index.js +1 -0
  27. package/dist/src/monorepo/monorepo.js +13 -5
  28. package/dist/src/monorepo/operations/tasks/RunTasksOperation.d.ts +1 -1
  29. package/dist/src/monorepo/operations/tasks/RunTasksOperation.js +1 -1
  30. package/dist/src/monorepo/plugins/VaultPlugin.d.ts +46 -0
  31. package/dist/src/monorepo/plugins/VaultPlugin.js +91 -0
  32. package/dist/src/monorepo/plugins/index.d.ts +1 -0
  33. package/dist/src/monorepo/plugins/index.js +3 -0
  34. package/dist/src/secrets/SecretDiscovery.d.ts +46 -0
  35. package/dist/src/secrets/SecretDiscovery.js +82 -0
  36. package/dist/src/secrets/SecretManager.d.ts +52 -0
  37. package/dist/src/secrets/SecretManager.js +75 -0
  38. package/dist/src/secrets/SecretProvider.d.ts +45 -0
  39. package/dist/src/secrets/SecretProvider.js +38 -0
  40. package/dist/src/secrets/index.d.ts +3 -0
  41. package/dist/src/secrets/index.js +3 -0
  42. package/dist/src/secrets/providers/VaultOidcHelper.d.ts +39 -0
  43. package/dist/src/secrets/providers/VaultOidcHelper.js +226 -0
  44. package/dist/src/secrets/providers/VaultProvider.d.ts +74 -0
  45. package/dist/src/secrets/providers/VaultProvider.js +266 -0
  46. package/dist/src/secrets/providers/VaultTokenCache.d.ts +60 -0
  47. package/dist/src/secrets/providers/VaultTokenCache.js +188 -0
  48. package/dist/src/secrets/providers/index.d.ts +2 -0
  49. package/dist/src/secrets/providers/index.js +2 -0
  50. package/dist/src/types.d.ts +2 -0
  51. package/dist/src/utils/TemplateExpander.d.ts +13 -1
  52. package/dist/src/utils/TemplateExpander.js +68 -15
  53. package/oclif.manifest.json +454 -49
  54. package/package.json +8 -5
@@ -1,10 +1,17 @@
1
1
  import { Args, Flags } from '@oclif/core';
2
2
  import { BaseCommand, getContext } from '../../index.js';
3
+ import { ComposeLogsOperation } from '../../../docker/index.js';
3
4
  export default class ComponentsLogs extends BaseCommand {
4
5
  static aliases = ['logs'];
5
6
  static description = 'Get components logs.';
6
7
  static enableJsonFlag = false;
7
- static examples = ['<%= config.bin %> <%= command.id %>'];
8
+ static examples = [
9
+ '<%= config.bin %> <%= command.id %>',
10
+ '<%= config.bin %> <%= command.id %> backend',
11
+ '<%= config.bin %> <%= command.id %> backend frontend',
12
+ '<%= config.bin %> <%= command.id %> --no-follow backend',
13
+ ];
14
+ static strict = false;
8
15
  static flags = {
9
16
  follow: Flags.boolean({
10
17
  name: 'follow',
@@ -17,32 +24,22 @@ export default class ComponentsLogs extends BaseCommand {
17
24
  static args = {
18
25
  component: Args.string({
19
26
  name: 'component',
20
- description: 'The component you want to see the logs of',
21
- required: true,
27
+ description: 'The component(s) you want to see the logs of (all if omitted)',
28
+ required: false,
22
29
  }),
23
30
  };
24
31
  async run() {
25
- const { flags, args } = await this.parse(ComponentsLogs);
26
- const { monorepo, docker, compose } = await getContext();
27
- const component = monorepo.component(args.component);
28
- const containerId = await compose.getContainer(component.name, {
29
- mustBeRunning: false,
32
+ const { flags, argv } = await this.parse(ComponentsLogs);
33
+ const { monorepo } = await getContext();
34
+ const componentNames = argv;
35
+ // Validate that all specified components exist
36
+ const services = componentNames.map((name) => {
37
+ const component = monorepo.component(name);
38
+ return component.name;
39
+ });
40
+ await monorepo.run(new ComposeLogsOperation(), {
41
+ services: services.length > 0 ? services : undefined,
42
+ follow: flags.follow,
30
43
  });
31
- const container = await docker.getContainer(containerId);
32
- if (flags.follow) {
33
- const stream = await container.logs({
34
- follow: true,
35
- stderr: true,
36
- stdout: true,
37
- });
38
- docker.modem.demuxStream(stream, process.stdout, process.stderr);
39
- }
40
- else {
41
- const res = await container.logs({
42
- stderr: true,
43
- stdout: true,
44
- });
45
- this.log(res.toString());
46
- }
47
44
  }
48
45
  }
@@ -0,0 +1,14 @@
1
+ import { FlavoredCommand } from '../../index.js';
2
+ export interface SecretInfo {
3
+ component?: string;
4
+ key?: string;
5
+ path: string;
6
+ provider: string;
7
+ usageCount: number;
8
+ }
9
+ export default class SecretsIndex extends FlavoredCommand<typeof SecretsIndex> {
10
+ static description: string;
11
+ static enableJsonFlag: boolean;
12
+ static examples: string[];
13
+ run(): Promise<SecretInfo[]>;
14
+ }
@@ -0,0 +1,71 @@
1
+ import { getContext } from '../../../index.js';
2
+ import { printTable } from '@oclif/table';
3
+ import { FlavoredCommand, TABLE_DEFAULTS } from '../../index.js';
4
+ import { aggregateSecrets, discoverSecrets, } from '../../../secrets/SecretDiscovery.js';
5
+ export default class SecretsIndex extends FlavoredCommand {
6
+ static description = 'List all secret references in the configuration.';
7
+ static enableJsonFlag = true;
8
+ static examples = [
9
+ '<%= config.bin %> <%= command.id %>',
10
+ '<%= config.bin %> <%= command.id %> --json',
11
+ ];
12
+ async run() {
13
+ const { flags } = await this.parse(SecretsIndex);
14
+ const context = getContext();
15
+ const { monorepo, secrets } = context;
16
+ // Get registered secret providers dynamically
17
+ const secretProviders = new Set(secrets.getProviderNames());
18
+ // Collect secrets from all configuration sources
19
+ const allSecrets = [];
20
+ // Scan monorepo-level config (env, vars, tasks, defaults, flavors)
21
+ allSecrets.push(...discoverSecrets({
22
+ env: monorepo.config.env,
23
+ vars: monorepo.config.vars,
24
+ tasks: monorepo.config.tasks,
25
+ defaults: monorepo.config.defaults,
26
+ flavors: monorepo.config.flavors,
27
+ }, { file: '.emb.yml' }, secretProviders));
28
+ // Scan each component's config
29
+ for (const component of monorepo.components) {
30
+ allSecrets.push(...discoverSecrets({
31
+ tasks: component.config.tasks,
32
+ resources: component.config.resources,
33
+ }, {
34
+ file: `${component.name}/Embfile.yml`,
35
+ component: component.name,
36
+ }, secretProviders));
37
+ }
38
+ // Aggregate by unique secret reference
39
+ const aggregated = aggregateSecrets(allSecrets);
40
+ // Convert to output format
41
+ const result = aggregated.map((secret) => ({
42
+ provider: secret.provider,
43
+ path: secret.path,
44
+ key: secret.key,
45
+ component: secret.locations
46
+ .map((l) => l.component)
47
+ .filter(Boolean)
48
+ .join(', ') || undefined,
49
+ usageCount: secret.locations.length,
50
+ }));
51
+ if (!flags.json) {
52
+ if (result.length === 0) {
53
+ this.log('No secret references found in configuration.');
54
+ }
55
+ else {
56
+ printTable({
57
+ ...TABLE_DEFAULTS,
58
+ columns: ['provider', 'path', 'key', 'component', 'usageCount'],
59
+ data: result.map((r) => ({
60
+ ...r,
61
+ key: r.key || '-',
62
+ component: r.component || '-',
63
+ })),
64
+ });
65
+ const providerCount = new Set(result.map((r) => r.provider)).size;
66
+ this.log(`\nFound ${result.length} secret reference(s) using ${providerCount} provider(s).`);
67
+ }
68
+ }
69
+ return result;
70
+ }
71
+ }
@@ -0,0 +1,12 @@
1
+ import { FlavoredCommand } from '../../index.js';
2
+ export interface ProviderInfo {
3
+ name: string;
4
+ status: 'connected' | 'not_configured';
5
+ type: string;
6
+ }
7
+ export default class SecretsProviders extends FlavoredCommand<typeof SecretsProviders> {
8
+ static description: string;
9
+ static enableJsonFlag: boolean;
10
+ static examples: string[];
11
+ run(): Promise<ProviderInfo[]>;
12
+ }
@@ -0,0 +1,50 @@
1
+ import { getContext } from '../../../index.js';
2
+ import { printTable } from '@oclif/table';
3
+ import { FlavoredCommand, TABLE_DEFAULTS } from '../../index.js';
4
+ export default class SecretsProviders extends FlavoredCommand {
5
+ static description = 'Show configured secret providers and their status.';
6
+ static enableJsonFlag = true;
7
+ static examples = ['<%= config.bin %> <%= command.id %>'];
8
+ async run() {
9
+ const { flags } = await this.parse(SecretsProviders);
10
+ const context = getContext();
11
+ const { secrets } = context;
12
+ const providerNames = secrets.getProviderNames();
13
+ if (providerNames.length === 0) {
14
+ if (!flags.json) {
15
+ this.log('No secret providers configured.');
16
+ this.log('\nTo configure a provider, add it to your .emb.yml:');
17
+ this.log(`
18
+ plugins:
19
+ - name: vault
20
+ config:
21
+ address: https://vault.example.com
22
+ auth:
23
+ method: oidc
24
+ `);
25
+ }
26
+ return [];
27
+ }
28
+ const results = providerNames.map((name) => {
29
+ const provider = secrets.get(name);
30
+ return {
31
+ name,
32
+ type: provider?.constructor.name || 'Unknown',
33
+ status: provider ? 'connected' : 'not_configured',
34
+ };
35
+ });
36
+ if (!flags.json) {
37
+ printTable({
38
+ ...TABLE_DEFAULTS,
39
+ columns: ['name', 'type', 'status'],
40
+ data: results.map((r) => ({
41
+ name: r.name,
42
+ type: r.type,
43
+ status: r.status === 'connected' ? '✔ Connected' : '✖ Not configured',
44
+ })),
45
+ });
46
+ this.log(`\n${results.length} provider(s) configured.`);
47
+ }
48
+ return results;
49
+ }
50
+ }
@@ -0,0 +1,18 @@
1
+ import { FlavoredCommand } from '../../index.js';
2
+ export interface ValidationResult {
3
+ error?: string;
4
+ key?: string;
5
+ path: string;
6
+ provider: string;
7
+ status: 'error' | 'ok';
8
+ }
9
+ export default class SecretsValidate extends FlavoredCommand<typeof SecretsValidate> {
10
+ static description: string;
11
+ static enableJsonFlag: boolean;
12
+ static examples: string[];
13
+ static flags: {
14
+ 'fail-fast': import("@oclif/core/interfaces").BooleanFlag<boolean>;
15
+ };
16
+ run(): Promise<ValidationResult[]>;
17
+ private validateSecret;
18
+ }
@@ -0,0 +1,145 @@
1
+ import { getContext } from '../../../index.js';
2
+ import { Flags } from '@oclif/core';
3
+ import { printTable } from '@oclif/table';
4
+ import { FlavoredCommand, TABLE_DEFAULTS } from '../../index.js';
5
+ import { aggregateSecrets, discoverSecrets, } from '../../../secrets/SecretDiscovery.js';
6
+ export default class SecretsValidate extends FlavoredCommand {
7
+ static description = 'Validate that all secret references can be resolved (without showing values).';
8
+ static enableJsonFlag = true;
9
+ static examples = [
10
+ '<%= config.bin %> <%= command.id %>',
11
+ '<%= config.bin %> <%= command.id %> --fail-fast',
12
+ '<%= config.bin %> <%= command.id %> --json',
13
+ ];
14
+ static flags = {
15
+ 'fail-fast': Flags.boolean({
16
+ default: false,
17
+ description: 'Stop on first validation error',
18
+ }),
19
+ };
20
+ async run() {
21
+ const { flags } = await this.parse(SecretsValidate);
22
+ const context = getContext();
23
+ const { monorepo, secrets } = context;
24
+ // Get registered secret providers dynamically
25
+ const secretProviders = new Set(secrets.getProviderNames());
26
+ // Collect secrets from all configuration sources
27
+ const allSecrets = [];
28
+ // Scan monorepo-level config (env, vars, tasks, defaults, flavors)
29
+ allSecrets.push(...discoverSecrets({
30
+ env: monorepo.config.env,
31
+ vars: monorepo.config.vars,
32
+ tasks: monorepo.config.tasks,
33
+ defaults: monorepo.config.defaults,
34
+ flavors: monorepo.config.flavors,
35
+ }, { file: '.emb.yml' }, secretProviders));
36
+ // Scan each component's config
37
+ for (const component of monorepo.components) {
38
+ allSecrets.push(...discoverSecrets({
39
+ tasks: component.config.tasks,
40
+ resources: component.config.resources,
41
+ }, {
42
+ file: `${component.name}/Embfile.yml`,
43
+ component: component.name,
44
+ }, secretProviders));
45
+ }
46
+ // Aggregate by unique secret reference
47
+ const aggregated = aggregateSecrets(allSecrets);
48
+ if (aggregated.length === 0) {
49
+ if (!flags.json) {
50
+ this.log('No secret references found in configuration.');
51
+ }
52
+ return [];
53
+ }
54
+ // Validate each secret
55
+ const results = [];
56
+ let hasErrors = false;
57
+ for (const secret of aggregated) {
58
+ // Sequential validation is intentional for fail-fast support
59
+ // eslint-disable-next-line no-await-in-loop
60
+ const result = await this.validateSecret(secret, secrets);
61
+ results.push(result);
62
+ if (result.status === 'error') {
63
+ hasErrors = true;
64
+ if (flags['fail-fast']) {
65
+ break;
66
+ }
67
+ }
68
+ }
69
+ if (!flags.json) {
70
+ printTable({
71
+ ...TABLE_DEFAULTS,
72
+ columns: ['status', 'provider', 'path', 'key'],
73
+ data: results.map((r) => ({
74
+ status: r.status === 'ok' ? '✔' : '✖',
75
+ provider: r.provider,
76
+ path: r.path,
77
+ key: r.key || '-',
78
+ })),
79
+ });
80
+ const passed = results.filter((r) => r.status === 'ok').length;
81
+ const failed = results.filter((r) => r.status === 'error').length;
82
+ this.log(`\nValidation: ${passed} passed, ${failed} failed`);
83
+ // Show error details
84
+ const errors = results.filter((r) => r.status === 'error');
85
+ if (errors.length > 0) {
86
+ this.log('\nError details:');
87
+ for (const error of errors) {
88
+ const ref = error.key
89
+ ? `${error.provider}:${error.path}#${error.key}`
90
+ : `${error.provider}:${error.path}`;
91
+ this.log(` - ${ref}: ${error.error}`);
92
+ }
93
+ }
94
+ }
95
+ // Exit with error code if validation failed
96
+ if (hasErrors) {
97
+ this.exit(1);
98
+ }
99
+ return results;
100
+ }
101
+ async validateSecret(secret, secrets) {
102
+ const provider = secrets.get(secret.provider);
103
+ if (!provider) {
104
+ return {
105
+ provider: secret.provider,
106
+ path: secret.path,
107
+ key: secret.key,
108
+ status: 'error',
109
+ error: `Provider '${secret.provider}' not configured`,
110
+ };
111
+ }
112
+ try {
113
+ // Actually fetch the secret to verify access
114
+ const result = await provider.get({
115
+ path: secret.path,
116
+ key: secret.key,
117
+ });
118
+ // If a key was specified, verify it exists
119
+ if (secret.key && result === undefined) {
120
+ return {
121
+ provider: secret.provider,
122
+ path: secret.path,
123
+ key: secret.key,
124
+ status: 'error',
125
+ error: `Key '${secret.key}' not found in secret`,
126
+ };
127
+ }
128
+ return {
129
+ provider: secret.provider,
130
+ path: secret.path,
131
+ key: secret.key,
132
+ status: 'ok',
133
+ };
134
+ }
135
+ catch (error) {
136
+ return {
137
+ provider: secret.provider,
138
+ path: secret.path,
139
+ key: secret.key,
140
+ status: 'error',
141
+ error: error instanceof Error ? error.message : String(error),
142
+ };
143
+ }
144
+ }
145
+ }
@@ -1,2 +1,8 @@
1
- const hook = async function (_options) { };
1
+ import { settings } from '@oclif/core';
2
+ const hook = async function (_options) {
3
+ // Disable oclif's auto-transpilation to avoid spurious warnings when npm-linked.
4
+ // We always run from compiled JS in dist/, so auto-transpilation is not needed.
5
+ // This prevents a double tsPath() call that produces "Could not find source" warnings.
6
+ settings.enableAutoTranspile = false;
7
+ };
2
8
  export default hook;
@@ -1,6 +1,15 @@
1
1
  export * from './types.js';
2
2
  export * from './validation.js';
3
- export declare const loadConfig: () => Promise<{
3
+ export interface LoadConfigOptions {
4
+ /**
5
+ * Explicit root directory path. Takes precedence over EMB_ROOT env var.
6
+ * Can be either:
7
+ * - A directory containing .emb.yml
8
+ * - A direct path to a .emb.yml file
9
+ */
10
+ root?: string;
11
+ }
12
+ export declare const loadConfig: (options?: LoadConfigOptions) => Promise<{
4
13
  rootDir: string;
5
14
  config: import("./schema.js").EMBConfig;
6
15
  }>;
@@ -1,10 +1,35 @@
1
1
  import { findUp } from 'find-up';
2
- import { dirname } from 'node:path';
2
+ import { existsSync } from 'node:fs';
3
+ import { dirname, join, resolve } from 'node:path';
3
4
  import { validateUserConfig } from './validation.js';
4
5
  export * from './types.js';
5
6
  export * from './validation.js';
6
- export const loadConfig = async () => {
7
- const path = await findUp('.emb.yml');
7
+ export const loadConfig = async (options = {}) => {
8
+ let path;
9
+ // Priority 1: Explicit root option (from --root/-C flag)
10
+ // Priority 2: EMB_ROOT environment variable
11
+ // Priority 3: Walk up to find .emb.yml (original behavior)
12
+ const explicitRoot = options.root || process.env.EMB_ROOT;
13
+ if (explicitRoot) {
14
+ const resolved = resolve(explicitRoot);
15
+ // Check if it's a direct path to a config file
16
+ if (resolved.endsWith('.emb.yml') && existsSync(resolved)) {
17
+ path = resolved;
18
+ }
19
+ else {
20
+ // Assume it's a directory, look for .emb.yml inside
21
+ const configPath = join(resolved, '.emb.yml');
22
+ if (existsSync(configPath)) {
23
+ path = configPath;
24
+ }
25
+ else {
26
+ throw new Error(`Could not find .emb.yml in specified root: ${explicitRoot}`);
27
+ }
28
+ }
29
+ }
30
+ else {
31
+ path = await findUp('.emb.yml');
32
+ }
8
33
  if (!path) {
9
34
  throw new Error('Could not find EMB config anywhere');
10
35
  }
@@ -3,6 +3,12 @@
3
3
  * DO NOT MODIFY IT BY HAND. Instead, modify the source JSONSchema file,
4
4
  * and run json-schema-to-typescript to regenerate this file.
5
5
  */
6
+ export type PluginConfigItem = {
7
+ [k: string]: unknown;
8
+ } & {
9
+ name: Identifier;
10
+ config?: unknown;
11
+ };
6
12
  export type Identifier = string;
7
13
  export type TaskConfig = TaskConfig1 & {
8
14
  description?: string;
@@ -55,10 +61,7 @@ export interface EMBConfig {
55
61
  */
56
62
  rootDir?: string;
57
63
  };
58
- plugins?: {
59
- name: Identifier;
60
- config?: unknown;
61
- }[];
64
+ plugins?: PluginConfigItem[];
62
65
  /**
63
66
  * Variables to install on the environment
64
67
  */
@@ -24,15 +24,7 @@
24
24
  "plugins": {
25
25
  "type": "array",
26
26
  "items": {
27
- "type": "object",
28
- "required": ["name"],
29
- "properties": {
30
- "name": {
31
- "$ref": "#/definitions/Identifier"
32
- },
33
- "config": {}
34
- },
35
- "additionalProperties": false
27
+ "$ref": "#/definitions/PluginConfigItem"
36
28
  }
37
29
  },
38
30
  "env": {
@@ -376,6 +368,178 @@
376
368
  { "$ref": "#/definitions/JsonPatchMoveOperation" },
377
369
  { "$ref": "#/definitions/JsonPatchCopyOperation" }
378
370
  ]
371
+ },
372
+ "VaultTokenAuth": {
373
+ "type": "object",
374
+ "required": ["method", "token"],
375
+ "properties": {
376
+ "method": { "const": "token" },
377
+ "token": { "type": "string", "description": "Vault token for authentication" }
378
+ },
379
+ "additionalProperties": false
380
+ },
381
+ "VaultAppRoleAuth": {
382
+ "type": "object",
383
+ "required": ["method", "roleId", "secretId"],
384
+ "properties": {
385
+ "method": { "const": "approle" },
386
+ "roleId": { "type": "string", "description": "AppRole role ID" },
387
+ "secretId": { "type": "string", "description": "AppRole secret ID" }
388
+ },
389
+ "additionalProperties": false
390
+ },
391
+ "VaultKubernetesAuth": {
392
+ "type": "object",
393
+ "required": ["method", "role"],
394
+ "properties": {
395
+ "method": { "const": "kubernetes" },
396
+ "role": { "type": "string", "description": "Kubernetes auth role name" }
397
+ },
398
+ "additionalProperties": false
399
+ },
400
+ "VaultJwtAuth": {
401
+ "type": "object",
402
+ "required": ["method", "role", "jwt"],
403
+ "properties": {
404
+ "method": { "const": "jwt" },
405
+ "role": { "type": "string", "description": "JWT auth role name" },
406
+ "jwt": { "type": "string", "description": "JWT token for authentication" }
407
+ },
408
+ "additionalProperties": false
409
+ },
410
+ "VaultOidcAuth": {
411
+ "type": "object",
412
+ "required": ["method"],
413
+ "properties": {
414
+ "method": { "const": "oidc" },
415
+ "role": { "type": "string", "description": "OIDC auth role name" },
416
+ "port": { "type": "integer", "description": "Local port for OIDC callback" }
417
+ },
418
+ "additionalProperties": false
419
+ },
420
+ "VaultAuthConfig": {
421
+ "description": "Authentication configuration for HashiCorp Vault",
422
+ "oneOf": [
423
+ { "$ref": "#/definitions/VaultTokenAuth" },
424
+ { "$ref": "#/definitions/VaultAppRoleAuth" },
425
+ { "$ref": "#/definitions/VaultKubernetesAuth" },
426
+ { "$ref": "#/definitions/VaultJwtAuth" },
427
+ { "$ref": "#/definitions/VaultOidcAuth" }
428
+ ]
429
+ },
430
+ "VaultPluginConfig": {
431
+ "type": "object",
432
+ "description": "Configuration for the HashiCorp Vault plugin",
433
+ "properties": {
434
+ "address": {
435
+ "type": "string",
436
+ "description": "Vault server address. Defaults to VAULT_ADDR env var."
437
+ },
438
+ "namespace": {
439
+ "type": "string",
440
+ "description": "Vault namespace. Defaults to VAULT_NAMESPACE env var."
441
+ },
442
+ "auth": {
443
+ "$ref": "#/definitions/VaultAuthConfig"
444
+ }
445
+ },
446
+ "additionalProperties": false
447
+ },
448
+ "AutoDockerPluginConfig": {
449
+ "type": "object",
450
+ "description": "Configuration for the AutoDocker plugin",
451
+ "properties": {
452
+ "glob": {
453
+ "type": "string",
454
+ "description": "Glob pattern to find Dockerfiles. Defaults to '*/Dockerfile'."
455
+ },
456
+ "ignore": {
457
+ "oneOf": [
458
+ { "type": "string" },
459
+ { "type": "array", "items": { "type": "string" } }
460
+ ],
461
+ "description": "Patterns to ignore when searching for Dockerfiles."
462
+ }
463
+ },
464
+ "additionalProperties": false
465
+ },
466
+ "DotEnvPluginConfig": {
467
+ "type": "array",
468
+ "description": "Array of .env file paths to load",
469
+ "items": {
470
+ "type": "string"
471
+ }
472
+ },
473
+ "EmbfilesPluginConfig": {
474
+ "type": "object",
475
+ "description": "Configuration for the Embfiles loader plugin",
476
+ "properties": {
477
+ "glob": {
478
+ "oneOf": [
479
+ { "type": "string" },
480
+ { "type": "array", "items": { "type": "string" } }
481
+ ],
482
+ "description": "Glob pattern(s) to find Embfiles. Defaults to '*/Embfile.{yaml,yml}'."
483
+ }
484
+ },
485
+ "additionalProperties": false
486
+ },
487
+ "PluginConfigItem": {
488
+ "type": "object",
489
+ "required": ["name"],
490
+ "properties": {
491
+ "name": {
492
+ "$ref": "#/definitions/Identifier"
493
+ },
494
+ "config": {}
495
+ },
496
+ "additionalProperties": false,
497
+ "allOf": [
498
+ {
499
+ "if": {
500
+ "properties": { "name": { "const": "vault" } },
501
+ "required": ["name"]
502
+ },
503
+ "then": {
504
+ "properties": {
505
+ "config": { "$ref": "#/definitions/VaultPluginConfig" }
506
+ }
507
+ }
508
+ },
509
+ {
510
+ "if": {
511
+ "properties": { "name": { "const": "autodocker" } },
512
+ "required": ["name"]
513
+ },
514
+ "then": {
515
+ "properties": {
516
+ "config": { "$ref": "#/definitions/AutoDockerPluginConfig" }
517
+ }
518
+ }
519
+ },
520
+ {
521
+ "if": {
522
+ "properties": { "name": { "const": "dotenv" } },
523
+ "required": ["name"]
524
+ },
525
+ "then": {
526
+ "properties": {
527
+ "config": { "$ref": "#/definitions/DotEnvPluginConfig" }
528
+ }
529
+ }
530
+ },
531
+ {
532
+ "if": {
533
+ "properties": { "name": { "const": "embfiles" } },
534
+ "required": ["name"]
535
+ },
536
+ "then": {
537
+ "properties": {
538
+ "config": { "$ref": "#/definitions/EmbfilesPluginConfig" }
539
+ }
540
+ }
541
+ }
542
+ ]
379
543
  }
380
544
  }
381
545
  }