@pgpm/encrypted-secrets-table 0.16.0 → 0.18.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -13,4 +13,11 @@ CREATE TABLE secrets_schema.secrets_table (
13
13
  UNIQUE(secrets_owned_field, name)
14
14
  );
15
15
 
16
+ COMMENT ON TABLE secrets_schema.secrets_table IS 'Encrypted key-value secret storage: stores secrets as either raw bytea or encrypted text, scoped to an owning entity';
17
+ COMMENT ON COLUMN secrets_schema.secrets_table.id IS 'Unique identifier for this secret';
18
+ COMMENT ON COLUMN secrets_schema.secrets_table.secrets_owned_field IS 'UUID of the owning entity (e.g. user, organization); combined with name forms a unique key';
19
+ COMMENT ON COLUMN secrets_schema.secrets_table.name IS 'Name/key for this secret within its owner scope';
20
+ COMMENT ON COLUMN secrets_schema.secrets_table.secrets_value_field IS 'Raw binary secret value (mutually exclusive with secrets_enc_field)';
21
+ COMMENT ON COLUMN secrets_schema.secrets_table.secrets_enc_field IS 'Encrypted text secret value (mutually exclusive with secrets_value_field)';
22
+
16
23
  COMMIT;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@pgpm/encrypted-secrets-table",
3
- "version": "0.16.0",
3
+ "version": "0.18.0",
4
4
  "description": "Table-based encrypted secrets storage and retrieval",
5
5
  "author": "Dan Lynch <pyramation@gmail.com>",
6
6
  "contributors": [
@@ -21,10 +21,10 @@
21
21
  "test:watch": "jest --watch"
22
22
  },
23
23
  "dependencies": {
24
- "@pgpm/verify": "0.16.0"
24
+ "@pgpm/verify": "0.18.0"
25
25
  },
26
26
  "devDependencies": {
27
- "pgpm": "^1.3.0"
27
+ "pgpm": "^4.2.3"
28
28
  },
29
29
  "repository": {
30
30
  "type": "git",
@@ -34,5 +34,5 @@
34
34
  "bugs": {
35
35
  "url": "https://github.com/constructive-io/pgpm-modules/issues"
36
36
  },
37
- "gitHead": "3b2260bf7640d7194f237d556c7e5033bc7a9405"
37
+ "gitHead": "8144027c7fab4956bcdebd736d04c0d4f57344bc"
38
38
  }
@@ -10,6 +10,13 @@ CREATE TABLE secrets_schema.secrets_table (
10
10
  UNIQUE (secrets_owned_field, name)
11
11
  );
12
12
 
13
+ COMMENT ON TABLE secrets_schema.secrets_table IS 'Encrypted key-value secret storage: stores secrets as either raw bytea or encrypted text, scoped to an owning entity';
14
+ COMMENT ON COLUMN secrets_schema.secrets_table.id IS 'Unique identifier for this secret';
15
+ COMMENT ON COLUMN secrets_schema.secrets_table.secrets_owned_field IS 'UUID of the owning entity (e.g. user, organization); combined with name forms a unique key';
16
+ COMMENT ON COLUMN secrets_schema.secrets_table.name IS 'Name/key for this secret within its owner scope';
17
+ COMMENT ON COLUMN secrets_schema.secrets_table.secrets_value_field IS 'Raw binary secret value (mutually exclusive with secrets_enc_field)';
18
+ COMMENT ON COLUMN secrets_schema.secrets_table.secrets_enc_field IS 'Encrypted text secret value (mutually exclusive with secrets_value_field)';
19
+
13
20
  CREATE FUNCTION secrets_schema.tg_hash_secrets() RETURNS trigger AS $EOFCODE$
14
21
  BEGIN
15
22
  IF (NEW.secrets_enc_field = 'crypt') THEN
@@ -34,4 +41,4 @@ CREATE TRIGGER hash_secrets_insert
34
41
  BEFORE INSERT
35
42
  ON secrets_schema.secrets_table
36
43
  FOR EACH ROW
37
- EXECUTE PROCEDURE secrets_schema.tg_hash_secrets();
44
+ EXECUTE PROCEDURE secrets_schema.tg_hash_secrets();