@geekmidas/cli 0.10.0 → 0.13.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +525 -0
- package/dist/bundler-B1qy9b-j.cjs +112 -0
- package/dist/bundler-B1qy9b-j.cjs.map +1 -0
- package/dist/bundler-DskIqW2t.mjs +111 -0
- package/dist/bundler-DskIqW2t.mjs.map +1 -0
- package/dist/{config-C9aXOHBe.cjs → config-AmInkU7k.cjs} +8 -8
- package/dist/config-AmInkU7k.cjs.map +1 -0
- package/dist/{config-BrkUalUh.mjs → config-DYULeEv8.mjs} +3 -3
- package/dist/config-DYULeEv8.mjs.map +1 -0
- package/dist/config.cjs +1 -1
- package/dist/config.d.cts +1 -1
- package/dist/config.d.mts +1 -1
- package/dist/config.mjs +1 -1
- package/dist/encryption-C8H-38Yy.mjs +42 -0
- package/dist/encryption-C8H-38Yy.mjs.map +1 -0
- package/dist/encryption-Dyf_r1h-.cjs +44 -0
- package/dist/encryption-Dyf_r1h-.cjs.map +1 -0
- package/dist/index.cjs +2123 -179
- package/dist/index.cjs.map +1 -1
- package/dist/index.mjs +2141 -192
- package/dist/index.mjs.map +1 -1
- package/dist/{openapi-CZLI4QTr.mjs → openapi-BfFlOBCG.mjs} +801 -38
- package/dist/openapi-BfFlOBCG.mjs.map +1 -0
- package/dist/{openapi-BeHLKcwP.cjs → openapi-Bt_1FDpT.cjs} +794 -31
- package/dist/openapi-Bt_1FDpT.cjs.map +1 -0
- package/dist/{openapi-react-query-o5iMi8tz.cjs → openapi-react-query-B-sNWHFU.cjs} +5 -5
- package/dist/openapi-react-query-B-sNWHFU.cjs.map +1 -0
- package/dist/{openapi-react-query-CcciaVu5.mjs → openapi-react-query-B6XTeGqS.mjs} +5 -5
- package/dist/openapi-react-query-B6XTeGqS.mjs.map +1 -0
- package/dist/openapi-react-query.cjs +1 -1
- package/dist/openapi-react-query.d.cts.map +1 -1
- package/dist/openapi-react-query.d.mts.map +1 -1
- package/dist/openapi-react-query.mjs +1 -1
- package/dist/openapi.cjs +2 -2
- package/dist/openapi.d.cts +1 -1
- package/dist/openapi.d.cts.map +1 -1
- package/dist/openapi.d.mts +1 -1
- package/dist/openapi.d.mts.map +1 -1
- package/dist/openapi.mjs +2 -2
- package/dist/storage-BOOpAF8N.cjs +5 -0
- package/dist/storage-Bj1E26lU.cjs +187 -0
- package/dist/storage-Bj1E26lU.cjs.map +1 -0
- package/dist/storage-kSxTjkNb.mjs +133 -0
- package/dist/storage-kSxTjkNb.mjs.map +1 -0
- package/dist/storage-tgZSUnKl.mjs +3 -0
- package/dist/{types-b-vwGpqc.d.cts → types-BR0M2v_c.d.mts} +100 -1
- package/dist/types-BR0M2v_c.d.mts.map +1 -0
- package/dist/{types-DXgiA1sF.d.mts → types-BhkZc-vm.d.cts} +100 -1
- package/dist/types-BhkZc-vm.d.cts.map +1 -0
- package/examples/cron-example.ts +27 -27
- package/examples/env.ts +27 -27
- package/examples/function-example.ts +31 -31
- package/examples/gkm.config.json +20 -20
- package/examples/gkm.config.ts +8 -8
- package/examples/gkm.minimal.config.json +5 -5
- package/examples/gkm.production.config.json +25 -25
- package/examples/logger.ts +2 -2
- package/package.json +6 -6
- package/src/__tests__/EndpointGenerator.hooks.spec.ts +191 -191
- package/src/__tests__/config.spec.ts +55 -55
- package/src/__tests__/loadEnvFiles.spec.ts +93 -93
- package/src/__tests__/normalizeHooksConfig.spec.ts +58 -58
- package/src/__tests__/openapi-react-query.spec.ts +497 -497
- package/src/__tests__/openapi.spec.ts +428 -428
- package/src/__tests__/test-helpers.ts +76 -76
- package/src/auth/__tests__/credentials.spec.ts +204 -0
- package/src/auth/__tests__/index.spec.ts +168 -0
- package/src/auth/credentials.ts +187 -0
- package/src/auth/index.ts +226 -0
- package/src/build/__tests__/bundler.spec.ts +444 -0
- package/src/build/__tests__/index-new.spec.ts +474 -474
- package/src/build/__tests__/manifests.spec.ts +333 -333
- package/src/build/bundler.ts +210 -0
- package/src/build/endpoint-analyzer.ts +236 -0
- package/src/build/handler-templates.ts +1253 -0
- package/src/build/index.ts +260 -179
- package/src/build/manifests.ts +52 -52
- package/src/build/providerResolver.ts +145 -145
- package/src/build/types.ts +64 -43
- package/src/config.ts +39 -39
- package/src/deploy/__tests__/docker.spec.ts +111 -0
- package/src/deploy/__tests__/dokploy.spec.ts +245 -0
- package/src/deploy/__tests__/init.spec.ts +662 -0
- package/src/deploy/docker.ts +128 -0
- package/src/deploy/dokploy.ts +204 -0
- package/src/deploy/index.ts +136 -0
- package/src/deploy/init.ts +484 -0
- package/src/deploy/types.ts +48 -0
- package/src/dev/__tests__/index.spec.ts +266 -266
- package/src/dev/index.ts +647 -601
- package/src/docker/__tests__/compose.spec.ts +531 -0
- package/src/docker/__tests__/templates.spec.ts +280 -0
- package/src/docker/compose.ts +273 -0
- package/src/docker/index.ts +230 -0
- package/src/docker/templates.ts +446 -0
- package/src/generators/CronGenerator.ts +72 -72
- package/src/generators/EndpointGenerator.ts +699 -398
- package/src/generators/FunctionGenerator.ts +84 -84
- package/src/generators/Generator.ts +72 -72
- package/src/generators/OpenApiTsGenerator.ts +577 -577
- package/src/generators/SubscriberGenerator.ts +124 -124
- package/src/generators/__tests__/CronGenerator.spec.ts +433 -433
- package/src/generators/__tests__/EndpointGenerator.spec.ts +532 -382
- package/src/generators/__tests__/FunctionGenerator.spec.ts +244 -244
- package/src/generators/__tests__/SubscriberGenerator.spec.ts +397 -382
- package/src/generators/index.ts +4 -4
- package/src/index.ts +623 -201
- package/src/init/__tests__/generators.spec.ts +334 -334
- package/src/init/__tests__/init.spec.ts +332 -332
- package/src/init/__tests__/utils.spec.ts +89 -89
- package/src/init/generators/config.ts +175 -175
- package/src/init/generators/docker.ts +41 -41
- package/src/init/generators/env.ts +72 -72
- package/src/init/generators/index.ts +1 -1
- package/src/init/generators/models.ts +64 -64
- package/src/init/generators/monorepo.ts +161 -161
- package/src/init/generators/package.ts +71 -71
- package/src/init/generators/source.ts +6 -6
- package/src/init/index.ts +203 -208
- package/src/init/templates/api.ts +115 -115
- package/src/init/templates/index.ts +75 -75
- package/src/init/templates/minimal.ts +98 -98
- package/src/init/templates/serverless.ts +89 -89
- package/src/init/templates/worker.ts +98 -98
- package/src/init/utils.ts +54 -56
- package/src/openapi-react-query.ts +194 -194
- package/src/openapi.ts +63 -63
- package/src/secrets/__tests__/encryption.spec.ts +226 -0
- package/src/secrets/__tests__/generator.spec.ts +319 -0
- package/src/secrets/__tests__/index.spec.ts +91 -0
- package/src/secrets/__tests__/storage.spec.ts +611 -0
- package/src/secrets/encryption.ts +91 -0
- package/src/secrets/generator.ts +164 -0
- package/src/secrets/index.ts +383 -0
- package/src/secrets/storage.ts +192 -0
- package/src/secrets/types.ts +53 -0
- package/src/types.ts +295 -176
- package/tsdown.config.ts +11 -8
- package/dist/config-BrkUalUh.mjs.map +0 -1
- package/dist/config-C9aXOHBe.cjs.map +0 -1
- package/dist/openapi-BeHLKcwP.cjs.map +0 -1
- package/dist/openapi-CZLI4QTr.mjs.map +0 -1
- package/dist/openapi-react-query-CcciaVu5.mjs.map +0 -1
- package/dist/openapi-react-query-o5iMi8tz.cjs.map +0 -1
- package/dist/types-DXgiA1sF.d.mts.map +0 -1
- package/dist/types-b-vwGpqc.d.cts.map +0 -1
|
@@ -0,0 +1,164 @@
|
|
|
1
|
+
import { randomBytes } from 'node:crypto';
|
|
2
|
+
import type { ComposeServiceName } from '../types';
|
|
3
|
+
import type { ServiceCredentials, StageSecrets } from './types';
|
|
4
|
+
|
|
5
|
+
/**
|
|
6
|
+
* Generate a secure random password using URL-safe base64 characters.
|
|
7
|
+
* @param length Password length (default: 32)
|
|
8
|
+
*/
|
|
9
|
+
export function generateSecurePassword(length = 32): string {
|
|
10
|
+
return randomBytes(Math.ceil((length * 3) / 4))
|
|
11
|
+
.toString('base64url')
|
|
12
|
+
.slice(0, length);
|
|
13
|
+
}
|
|
14
|
+
|
|
15
|
+
/** Default service configurations */
|
|
16
|
+
const SERVICE_DEFAULTS: Record<
|
|
17
|
+
ComposeServiceName,
|
|
18
|
+
Omit<ServiceCredentials, 'password'>
|
|
19
|
+
> = {
|
|
20
|
+
postgres: {
|
|
21
|
+
host: 'postgres',
|
|
22
|
+
port: 5432,
|
|
23
|
+
username: 'app',
|
|
24
|
+
database: 'app',
|
|
25
|
+
},
|
|
26
|
+
redis: {
|
|
27
|
+
host: 'redis',
|
|
28
|
+
port: 6379,
|
|
29
|
+
username: 'default',
|
|
30
|
+
},
|
|
31
|
+
rabbitmq: {
|
|
32
|
+
host: 'rabbitmq',
|
|
33
|
+
port: 5672,
|
|
34
|
+
username: 'app',
|
|
35
|
+
vhost: '/',
|
|
36
|
+
},
|
|
37
|
+
};
|
|
38
|
+
|
|
39
|
+
/**
|
|
40
|
+
* Generate credentials for a specific service.
|
|
41
|
+
*/
|
|
42
|
+
export function generateServiceCredentials(
|
|
43
|
+
service: ComposeServiceName,
|
|
44
|
+
): ServiceCredentials {
|
|
45
|
+
const defaults = SERVICE_DEFAULTS[service];
|
|
46
|
+
return {
|
|
47
|
+
...defaults,
|
|
48
|
+
password: generateSecurePassword(),
|
|
49
|
+
};
|
|
50
|
+
}
|
|
51
|
+
|
|
52
|
+
/**
|
|
53
|
+
* Generate credentials for multiple services.
|
|
54
|
+
*/
|
|
55
|
+
export function generateServicesCredentials(
|
|
56
|
+
services: ComposeServiceName[],
|
|
57
|
+
): StageSecrets['services'] {
|
|
58
|
+
const result: StageSecrets['services'] = {};
|
|
59
|
+
|
|
60
|
+
for (const service of services) {
|
|
61
|
+
result[service] = generateServiceCredentials(service);
|
|
62
|
+
}
|
|
63
|
+
|
|
64
|
+
return result;
|
|
65
|
+
}
|
|
66
|
+
|
|
67
|
+
/**
|
|
68
|
+
* Generate connection URL for PostgreSQL.
|
|
69
|
+
*/
|
|
70
|
+
export function generatePostgresUrl(creds: ServiceCredentials): string {
|
|
71
|
+
const { username, password, host, port, database } = creds;
|
|
72
|
+
return `postgresql://${username}:${encodeURIComponent(password)}@${host}:${port}/${database}`;
|
|
73
|
+
}
|
|
74
|
+
|
|
75
|
+
/**
|
|
76
|
+
* Generate connection URL for Redis.
|
|
77
|
+
*/
|
|
78
|
+
export function generateRedisUrl(creds: ServiceCredentials): string {
|
|
79
|
+
const { password, host, port } = creds;
|
|
80
|
+
return `redis://:${encodeURIComponent(password)}@${host}:${port}`;
|
|
81
|
+
}
|
|
82
|
+
|
|
83
|
+
/**
|
|
84
|
+
* Generate connection URL for RabbitMQ.
|
|
85
|
+
*/
|
|
86
|
+
export function generateRabbitmqUrl(creds: ServiceCredentials): string {
|
|
87
|
+
const { username, password, host, port, vhost } = creds;
|
|
88
|
+
const encodedVhost = encodeURIComponent(vhost ?? '/');
|
|
89
|
+
return `amqp://${username}:${encodeURIComponent(password)}@${host}:${port}/${encodedVhost}`;
|
|
90
|
+
}
|
|
91
|
+
|
|
92
|
+
/**
|
|
93
|
+
* Generate connection URLs from service credentials.
|
|
94
|
+
*/
|
|
95
|
+
export function generateConnectionUrls(
|
|
96
|
+
services: StageSecrets['services'],
|
|
97
|
+
): StageSecrets['urls'] {
|
|
98
|
+
const urls: StageSecrets['urls'] = {};
|
|
99
|
+
|
|
100
|
+
if (services.postgres) {
|
|
101
|
+
urls.DATABASE_URL = generatePostgresUrl(services.postgres);
|
|
102
|
+
}
|
|
103
|
+
|
|
104
|
+
if (services.redis) {
|
|
105
|
+
urls.REDIS_URL = generateRedisUrl(services.redis);
|
|
106
|
+
}
|
|
107
|
+
|
|
108
|
+
if (services.rabbitmq) {
|
|
109
|
+
urls.RABBITMQ_URL = generateRabbitmqUrl(services.rabbitmq);
|
|
110
|
+
}
|
|
111
|
+
|
|
112
|
+
return urls;
|
|
113
|
+
}
|
|
114
|
+
|
|
115
|
+
/**
|
|
116
|
+
* Create a new StageSecrets object with generated credentials.
|
|
117
|
+
*/
|
|
118
|
+
export function createStageSecrets(
|
|
119
|
+
stage: string,
|
|
120
|
+
services: ComposeServiceName[],
|
|
121
|
+
): StageSecrets {
|
|
122
|
+
const now = new Date().toISOString();
|
|
123
|
+
const serviceCredentials = generateServicesCredentials(services);
|
|
124
|
+
const urls = generateConnectionUrls(serviceCredentials);
|
|
125
|
+
|
|
126
|
+
return {
|
|
127
|
+
stage,
|
|
128
|
+
createdAt: now,
|
|
129
|
+
updatedAt: now,
|
|
130
|
+
services: serviceCredentials,
|
|
131
|
+
urls,
|
|
132
|
+
custom: {},
|
|
133
|
+
};
|
|
134
|
+
}
|
|
135
|
+
|
|
136
|
+
/**
|
|
137
|
+
* Rotate password for a specific service.
|
|
138
|
+
*/
|
|
139
|
+
export function rotateServicePassword(
|
|
140
|
+
secrets: StageSecrets,
|
|
141
|
+
service: ComposeServiceName,
|
|
142
|
+
): StageSecrets {
|
|
143
|
+
const currentCreds = secrets.services[service];
|
|
144
|
+
if (!currentCreds) {
|
|
145
|
+
throw new Error(`Service "${service}" not configured in secrets`);
|
|
146
|
+
}
|
|
147
|
+
|
|
148
|
+
const newCreds: ServiceCredentials = {
|
|
149
|
+
...currentCreds,
|
|
150
|
+
password: generateSecurePassword(),
|
|
151
|
+
};
|
|
152
|
+
|
|
153
|
+
const newServices = {
|
|
154
|
+
...secrets.services,
|
|
155
|
+
[service]: newCreds,
|
|
156
|
+
};
|
|
157
|
+
|
|
158
|
+
return {
|
|
159
|
+
...secrets,
|
|
160
|
+
updatedAt: new Date().toISOString(),
|
|
161
|
+
services: newServices,
|
|
162
|
+
urls: generateConnectionUrls(newServices),
|
|
163
|
+
};
|
|
164
|
+
}
|
|
@@ -0,0 +1,383 @@
|
|
|
1
|
+
import { existsSync } from 'node:fs';
|
|
2
|
+
import { readFile } from 'node:fs/promises';
|
|
3
|
+
import { loadConfig } from '../config';
|
|
4
|
+
import type { ComposeServiceName, ComposeServicesConfig } from '../types';
|
|
5
|
+
import { createStageSecrets, rotateServicePassword } from './generator';
|
|
6
|
+
import {
|
|
7
|
+
maskPassword,
|
|
8
|
+
readStageSecrets,
|
|
9
|
+
secretsExist,
|
|
10
|
+
setCustomSecret,
|
|
11
|
+
writeStageSecrets,
|
|
12
|
+
} from './storage';
|
|
13
|
+
|
|
14
|
+
const logger = console;
|
|
15
|
+
|
|
16
|
+
export interface SecretsInitOptions {
|
|
17
|
+
stage: string;
|
|
18
|
+
force?: boolean;
|
|
19
|
+
}
|
|
20
|
+
|
|
21
|
+
export interface SecretsSetOptions {
|
|
22
|
+
stage: string;
|
|
23
|
+
}
|
|
24
|
+
|
|
25
|
+
export interface SecretsShowOptions {
|
|
26
|
+
stage: string;
|
|
27
|
+
reveal?: boolean;
|
|
28
|
+
}
|
|
29
|
+
|
|
30
|
+
export interface SecretsRotateOptions {
|
|
31
|
+
stage: string;
|
|
32
|
+
service?: ComposeServiceName;
|
|
33
|
+
}
|
|
34
|
+
|
|
35
|
+
export interface SecretsImportOptions {
|
|
36
|
+
stage: string;
|
|
37
|
+
/** Merge with existing secrets (default: true) */
|
|
38
|
+
merge?: boolean;
|
|
39
|
+
}
|
|
40
|
+
|
|
41
|
+
/**
|
|
42
|
+
* Extract service names from compose config.
|
|
43
|
+
*/
|
|
44
|
+
export function getServicesFromConfig(
|
|
45
|
+
services: ComposeServicesConfig | ComposeServiceName[] | undefined,
|
|
46
|
+
): ComposeServiceName[] {
|
|
47
|
+
if (!services) {
|
|
48
|
+
return [];
|
|
49
|
+
}
|
|
50
|
+
|
|
51
|
+
if (Array.isArray(services)) {
|
|
52
|
+
return services;
|
|
53
|
+
}
|
|
54
|
+
|
|
55
|
+
// Object format - get keys where value is truthy
|
|
56
|
+
return (Object.entries(services) as [ComposeServiceName, unknown][])
|
|
57
|
+
.filter(([, config]) => config)
|
|
58
|
+
.map(([name]) => name);
|
|
59
|
+
}
|
|
60
|
+
|
|
61
|
+
/**
|
|
62
|
+
* Initialize secrets for a stage.
|
|
63
|
+
* Generates secure random passwords for configured services.
|
|
64
|
+
*/
|
|
65
|
+
export async function secretsInitCommand(
|
|
66
|
+
options: SecretsInitOptions,
|
|
67
|
+
): Promise<void> {
|
|
68
|
+
const { stage, force } = options;
|
|
69
|
+
|
|
70
|
+
// Check if secrets already exist
|
|
71
|
+
if (!force && secretsExist(stage)) {
|
|
72
|
+
logger.error(
|
|
73
|
+
`Secrets already exist for stage "${stage}". Use --force to overwrite.`,
|
|
74
|
+
);
|
|
75
|
+
process.exit(1);
|
|
76
|
+
}
|
|
77
|
+
|
|
78
|
+
// Load config to get services
|
|
79
|
+
const config = await loadConfig();
|
|
80
|
+
const services = getServicesFromConfig(config.docker?.compose?.services);
|
|
81
|
+
|
|
82
|
+
if (services.length === 0) {
|
|
83
|
+
logger.warn(
|
|
84
|
+
'No services configured in docker.compose.services. Creating secrets with empty services.',
|
|
85
|
+
);
|
|
86
|
+
}
|
|
87
|
+
|
|
88
|
+
// Generate secrets
|
|
89
|
+
const secrets = createStageSecrets(stage, services);
|
|
90
|
+
|
|
91
|
+
// Write to file
|
|
92
|
+
await writeStageSecrets(secrets);
|
|
93
|
+
|
|
94
|
+
logger.log(`\n✓ Secrets initialized for stage "${stage}"`);
|
|
95
|
+
logger.log(` Location: .gkm/secrets/${stage}.json`);
|
|
96
|
+
logger.log('\n Generated credentials for:');
|
|
97
|
+
|
|
98
|
+
for (const service of services) {
|
|
99
|
+
logger.log(` - ${service}`);
|
|
100
|
+
}
|
|
101
|
+
|
|
102
|
+
if (secrets.urls.DATABASE_URL) {
|
|
103
|
+
logger.log(`\n DATABASE_URL: ${maskUrl(secrets.urls.DATABASE_URL)}`);
|
|
104
|
+
}
|
|
105
|
+
if (secrets.urls.REDIS_URL) {
|
|
106
|
+
logger.log(` REDIS_URL: ${maskUrl(secrets.urls.REDIS_URL)}`);
|
|
107
|
+
}
|
|
108
|
+
if (secrets.urls.RABBITMQ_URL) {
|
|
109
|
+
logger.log(` RABBITMQ_URL: ${maskUrl(secrets.urls.RABBITMQ_URL)}`);
|
|
110
|
+
}
|
|
111
|
+
|
|
112
|
+
logger.log(`\n Use "gkm secrets:show --stage ${stage}" to view secrets`);
|
|
113
|
+
logger.log(
|
|
114
|
+
' Use "gkm secrets:set <KEY> <VALUE> --stage ' +
|
|
115
|
+
stage +
|
|
116
|
+
'" to add custom secrets',
|
|
117
|
+
);
|
|
118
|
+
}
|
|
119
|
+
|
|
120
|
+
/**
|
|
121
|
+
* Read all data from stdin.
|
|
122
|
+
*/
|
|
123
|
+
async function readStdin(): Promise<string> {
|
|
124
|
+
const chunks: Buffer[] = [];
|
|
125
|
+
|
|
126
|
+
for await (const chunk of process.stdin) {
|
|
127
|
+
chunks.push(chunk);
|
|
128
|
+
}
|
|
129
|
+
|
|
130
|
+
return Buffer.concat(chunks).toString('utf-8').trim();
|
|
131
|
+
}
|
|
132
|
+
|
|
133
|
+
/**
|
|
134
|
+
* Set a custom secret.
|
|
135
|
+
* If value is not provided, reads from stdin.
|
|
136
|
+
*/
|
|
137
|
+
export async function secretsSetCommand(
|
|
138
|
+
key: string,
|
|
139
|
+
value: string | undefined,
|
|
140
|
+
options: SecretsSetOptions,
|
|
141
|
+
): Promise<void> {
|
|
142
|
+
const { stage } = options;
|
|
143
|
+
|
|
144
|
+
// Read from stdin if value not provided
|
|
145
|
+
let secretValue = value;
|
|
146
|
+
if (!secretValue) {
|
|
147
|
+
if (process.stdin.isTTY) {
|
|
148
|
+
logger.error(
|
|
149
|
+
'No value provided. Use: gkm secrets:set KEY VALUE --stage <stage>',
|
|
150
|
+
);
|
|
151
|
+
logger.error(
|
|
152
|
+
'Or pipe from stdin: echo "value" | gkm secrets:set KEY --stage <stage>',
|
|
153
|
+
);
|
|
154
|
+
process.exit(1);
|
|
155
|
+
}
|
|
156
|
+
secretValue = await readStdin();
|
|
157
|
+
if (!secretValue) {
|
|
158
|
+
logger.error('No value received from stdin');
|
|
159
|
+
process.exit(1);
|
|
160
|
+
}
|
|
161
|
+
}
|
|
162
|
+
|
|
163
|
+
try {
|
|
164
|
+
await setCustomSecret(stage, key, secretValue);
|
|
165
|
+
logger.log(`\n✓ Secret "${key}" set for stage "${stage}"`);
|
|
166
|
+
} catch (error) {
|
|
167
|
+
logger.error(
|
|
168
|
+
error instanceof Error ? error.message : 'Failed to set secret',
|
|
169
|
+
);
|
|
170
|
+
process.exit(1);
|
|
171
|
+
}
|
|
172
|
+
}
|
|
173
|
+
|
|
174
|
+
/**
|
|
175
|
+
* Show secrets for a stage.
|
|
176
|
+
*/
|
|
177
|
+
export async function secretsShowCommand(
|
|
178
|
+
options: SecretsShowOptions,
|
|
179
|
+
): Promise<void> {
|
|
180
|
+
const { stage, reveal } = options;
|
|
181
|
+
|
|
182
|
+
const secrets = await readStageSecrets(stage);
|
|
183
|
+
|
|
184
|
+
if (!secrets) {
|
|
185
|
+
logger.error(
|
|
186
|
+
`No secrets found for stage "${stage}". Run "gkm secrets:init --stage ${stage}" first.`,
|
|
187
|
+
);
|
|
188
|
+
process.exit(1);
|
|
189
|
+
}
|
|
190
|
+
|
|
191
|
+
logger.log(`\nSecrets for stage "${stage}":`);
|
|
192
|
+
logger.log(` Created: ${secrets.createdAt}`);
|
|
193
|
+
logger.log(` Updated: ${secrets.updatedAt}`);
|
|
194
|
+
|
|
195
|
+
// Show service credentials
|
|
196
|
+
logger.log('\nService Credentials:');
|
|
197
|
+
for (const [service, creds] of Object.entries(secrets.services)) {
|
|
198
|
+
if (creds) {
|
|
199
|
+
logger.log(`\n ${service}:`);
|
|
200
|
+
logger.log(` host: ${creds.host}`);
|
|
201
|
+
logger.log(` port: ${creds.port}`);
|
|
202
|
+
logger.log(` username: ${creds.username}`);
|
|
203
|
+
logger.log(
|
|
204
|
+
` password: ${reveal ? creds.password : maskPassword(creds.password)}`,
|
|
205
|
+
);
|
|
206
|
+
if (creds.database) {
|
|
207
|
+
logger.log(` database: ${creds.database}`);
|
|
208
|
+
}
|
|
209
|
+
if (creds.vhost) {
|
|
210
|
+
logger.log(` vhost: ${creds.vhost}`);
|
|
211
|
+
}
|
|
212
|
+
}
|
|
213
|
+
}
|
|
214
|
+
|
|
215
|
+
// Show URLs
|
|
216
|
+
logger.log('\nConnection URLs:');
|
|
217
|
+
if (secrets.urls.DATABASE_URL) {
|
|
218
|
+
logger.log(
|
|
219
|
+
` DATABASE_URL: ${reveal ? secrets.urls.DATABASE_URL : maskUrl(secrets.urls.DATABASE_URL)}`,
|
|
220
|
+
);
|
|
221
|
+
}
|
|
222
|
+
if (secrets.urls.REDIS_URL) {
|
|
223
|
+
logger.log(
|
|
224
|
+
` REDIS_URL: ${reveal ? secrets.urls.REDIS_URL : maskUrl(secrets.urls.REDIS_URL)}`,
|
|
225
|
+
);
|
|
226
|
+
}
|
|
227
|
+
if (secrets.urls.RABBITMQ_URL) {
|
|
228
|
+
logger.log(
|
|
229
|
+
` RABBITMQ_URL: ${reveal ? secrets.urls.RABBITMQ_URL : maskUrl(secrets.urls.RABBITMQ_URL)}`,
|
|
230
|
+
);
|
|
231
|
+
}
|
|
232
|
+
|
|
233
|
+
// Show custom secrets
|
|
234
|
+
const customKeys = Object.keys(secrets.custom);
|
|
235
|
+
if (customKeys.length > 0) {
|
|
236
|
+
logger.log('\nCustom Secrets:');
|
|
237
|
+
for (const [key, value] of Object.entries(secrets.custom)) {
|
|
238
|
+
logger.log(` ${key}: ${reveal ? value : maskPassword(value)}`);
|
|
239
|
+
}
|
|
240
|
+
}
|
|
241
|
+
|
|
242
|
+
if (!reveal) {
|
|
243
|
+
logger.log('\nUse --reveal to show actual values');
|
|
244
|
+
}
|
|
245
|
+
}
|
|
246
|
+
|
|
247
|
+
/**
|
|
248
|
+
* Rotate passwords for services.
|
|
249
|
+
*/
|
|
250
|
+
export async function secretsRotateCommand(
|
|
251
|
+
options: SecretsRotateOptions,
|
|
252
|
+
): Promise<void> {
|
|
253
|
+
const { stage, service } = options;
|
|
254
|
+
|
|
255
|
+
const secrets = await readStageSecrets(stage);
|
|
256
|
+
|
|
257
|
+
if (!secrets) {
|
|
258
|
+
logger.error(
|
|
259
|
+
`No secrets found for stage "${stage}". Run "gkm secrets:init --stage ${stage}" first.`,
|
|
260
|
+
);
|
|
261
|
+
process.exit(1);
|
|
262
|
+
}
|
|
263
|
+
|
|
264
|
+
if (service) {
|
|
265
|
+
// Rotate specific service
|
|
266
|
+
if (!secrets.services[service]) {
|
|
267
|
+
logger.error(`Service "${service}" not configured in stage "${stage}"`);
|
|
268
|
+
process.exit(1);
|
|
269
|
+
}
|
|
270
|
+
|
|
271
|
+
const updated = rotateServicePassword(secrets, service);
|
|
272
|
+
await writeStageSecrets(updated);
|
|
273
|
+
logger.log(`\n✓ Password rotated for ${service} in stage "${stage}"`);
|
|
274
|
+
} else {
|
|
275
|
+
// Rotate all services
|
|
276
|
+
let updated = secrets;
|
|
277
|
+
const services = Object.keys(secrets.services) as ComposeServiceName[];
|
|
278
|
+
|
|
279
|
+
for (const svc of services) {
|
|
280
|
+
updated = rotateServicePassword(updated, svc);
|
|
281
|
+
}
|
|
282
|
+
|
|
283
|
+
await writeStageSecrets(updated);
|
|
284
|
+
logger.log(
|
|
285
|
+
`\n✓ Passwords rotated for all services in stage "${stage}": ${services.join(', ')}`,
|
|
286
|
+
);
|
|
287
|
+
}
|
|
288
|
+
|
|
289
|
+
logger.log(`\nUse "gkm secrets:show --stage ${stage}" to view new values`);
|
|
290
|
+
}
|
|
291
|
+
|
|
292
|
+
/**
|
|
293
|
+
* Import secrets from a JSON file.
|
|
294
|
+
*/
|
|
295
|
+
export async function secretsImportCommand(
|
|
296
|
+
file: string,
|
|
297
|
+
options: SecretsImportOptions,
|
|
298
|
+
): Promise<void> {
|
|
299
|
+
const { stage, merge = true } = options;
|
|
300
|
+
|
|
301
|
+
// Check if file exists
|
|
302
|
+
if (!existsSync(file)) {
|
|
303
|
+
logger.error(`File not found: ${file}`);
|
|
304
|
+
process.exit(1);
|
|
305
|
+
}
|
|
306
|
+
|
|
307
|
+
// Read and parse JSON file
|
|
308
|
+
let importedSecrets: Record<string, string>;
|
|
309
|
+
try {
|
|
310
|
+
const content = await readFile(file, 'utf-8');
|
|
311
|
+
importedSecrets = JSON.parse(content);
|
|
312
|
+
|
|
313
|
+
// Validate it's a flat object with string values
|
|
314
|
+
if (typeof importedSecrets !== 'object' || importedSecrets === null) {
|
|
315
|
+
throw new Error('JSON must be an object');
|
|
316
|
+
}
|
|
317
|
+
|
|
318
|
+
for (const [key, value] of Object.entries(importedSecrets)) {
|
|
319
|
+
if (typeof value !== 'string') {
|
|
320
|
+
throw new Error(
|
|
321
|
+
`Value for "${key}" must be a string, got ${typeof value}`,
|
|
322
|
+
);
|
|
323
|
+
}
|
|
324
|
+
}
|
|
325
|
+
} catch (error) {
|
|
326
|
+
logger.error(
|
|
327
|
+
`Failed to parse JSON file: ${error instanceof Error ? error.message : 'Invalid JSON'}`,
|
|
328
|
+
);
|
|
329
|
+
process.exit(1);
|
|
330
|
+
}
|
|
331
|
+
|
|
332
|
+
// Check if secrets exist for stage
|
|
333
|
+
const secrets = await readStageSecrets(stage);
|
|
334
|
+
|
|
335
|
+
if (!secrets) {
|
|
336
|
+
logger.error(
|
|
337
|
+
`No secrets found for stage "${stage}". Run "gkm secrets:init --stage ${stage}" first.`,
|
|
338
|
+
);
|
|
339
|
+
process.exit(1);
|
|
340
|
+
}
|
|
341
|
+
|
|
342
|
+
// Merge or replace custom secrets
|
|
343
|
+
const updatedCustom = merge
|
|
344
|
+
? { ...secrets.custom, ...importedSecrets }
|
|
345
|
+
: importedSecrets;
|
|
346
|
+
|
|
347
|
+
const updated = {
|
|
348
|
+
...secrets,
|
|
349
|
+
updatedAt: new Date().toISOString(),
|
|
350
|
+
custom: updatedCustom,
|
|
351
|
+
};
|
|
352
|
+
|
|
353
|
+
await writeStageSecrets(updated);
|
|
354
|
+
|
|
355
|
+
const importedCount = Object.keys(importedSecrets).length;
|
|
356
|
+
const totalCount = Object.keys(updatedCustom).length;
|
|
357
|
+
|
|
358
|
+
logger.log(`\n✓ Imported ${importedCount} secrets for stage "${stage}"`);
|
|
359
|
+
|
|
360
|
+
if (merge && totalCount > importedCount) {
|
|
361
|
+
logger.log(` Total custom secrets: ${totalCount}`);
|
|
362
|
+
}
|
|
363
|
+
|
|
364
|
+
logger.log('\n Imported keys:');
|
|
365
|
+
for (const key of Object.keys(importedSecrets)) {
|
|
366
|
+
logger.log(` - ${key}`);
|
|
367
|
+
}
|
|
368
|
+
}
|
|
369
|
+
|
|
370
|
+
/**
|
|
371
|
+
* Mask password in a URL for display.
|
|
372
|
+
*/
|
|
373
|
+
export function maskUrl(url: string): string {
|
|
374
|
+
try {
|
|
375
|
+
const parsed = new URL(url);
|
|
376
|
+
if (parsed.password) {
|
|
377
|
+
parsed.password = maskPassword(parsed.password);
|
|
378
|
+
}
|
|
379
|
+
return parsed.toString();
|
|
380
|
+
} catch {
|
|
381
|
+
return url;
|
|
382
|
+
}
|
|
383
|
+
}
|