@pgpm/encrypted-secrets-table 0.6.0 → 0.7.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/Makefile CHANGED
@@ -1,5 +1,5 @@
1
1
  EXTENSION = launchql-encrypted-secrets-table
2
- DATA = sql/launchql-encrypted-secrets-table--0.5.0.sql
2
+ DATA = sql/launchql-encrypted-secrets-table--0.6.0.sql
3
3
 
4
4
  PG_CONFIG = pg_config
5
5
  PGXS := $(shell $(PG_CONFIG) --pgxs)
package/README.md CHANGED
@@ -1,5 +1,17 @@
1
1
  # @pgpm/encrypted-secrets-table
2
2
 
3
+ <p align="center" width="100%">
4
+ <img height="250" src="https://raw.githubusercontent.com/launchql/launchql/refs/heads/main/assets/outline-logo.svg" />
5
+ </p>
6
+
7
+ <p align="center" width="100%">
8
+ <a href="https://github.com/launchql/pgpm-modules/actions/workflows/ci.yml">
9
+ <img height="20" src="https://github.com/launchql/pgpm-modules/actions/workflows/ci.yml/badge.svg" />
10
+ </a>
11
+ <a href="https://github.com/launchql/pgpm-modules/blob/main/LICENSE"><img height="20" src="https://img.shields.io/badge/license-MIT-blue.svg"/></a>
12
+ <a href="https://www.npmjs.com/package/@pgpm/encrypted-secrets-table"><img height="20" src="https://img.shields.io/github/package-json/v/launchql/pgpm-modules?filename=packages%2Fsecurity%2Fencrypted-secrets-table%2Fpackage.json"/></a>
13
+ </p>
14
+
3
15
  Table-based encrypted secrets storage and retrieval.
4
16
 
5
17
  ## Overview
@@ -29,40 +41,42 @@ This is a quick way to get started. The sections below provide more detailed ins
29
41
  ### Prerequisites
30
42
 
31
43
  ```bash
32
- # Install pgpm globally
44
+ # Install pgpm CLI
33
45
  npm install -g pgpm
34
46
 
35
- # Start PostgreSQL
47
+ # Start local Postgres (via Docker) and export env vars
36
48
  pgpm docker start
37
-
38
- # Set environment variables
39
49
  eval "$(pgpm env)"
40
50
  ```
41
51
 
42
- ### Deploy
52
+ > **Tip:** Already running Postgres? Skip the Docker step and just export your `PG*` environment variables.
43
53
 
44
- #### Option 1: Deploy by installing with pgpm
54
+ ### **Add to an Existing Package**
45
55
 
46
56
  ```bash
57
+ # 1. Install the package
47
58
  pgpm install @pgpm/encrypted-secrets-table
48
- pgpm deploy
59
+
60
+ # 2. Deploy locally
61
+ pgpm deploy
49
62
  ```
50
63
 
51
- #### Option 2: Deploy from Package Directory
64
+ ### **Add to a New Project**
52
65
 
53
66
  ```bash
54
- cd packages/security/encrypted-secrets-table
55
- pgpm deploy --createdb
56
- ```
67
+ # 1. Create a workspace
68
+ pgpm init --workspace
69
+ cd my-app
57
70
 
58
- #### Option 3: Deploy from Workspace Root
71
+ # 2. Create your first module
72
+ pgpm init
73
+ cd packages/your-module
59
74
 
60
- ```bash
61
- # Install workspace dependencies
62
- pnpm install
75
+ # 3. Install a package
76
+ pgpm install @pgpm/encrypted-secrets-table
63
77
 
64
- # Deploy with dependencies
65
- pgpm deploy mydb1 --yes --createdb
78
+ # 4. Deploy everything
79
+ pgpm deploy --createdb --database mydb1
66
80
  ```
67
81
 
68
82
  ## Database Schema
@@ -277,76 +291,6 @@ CREATE POLICY admin_secrets ON secrets_schema.secrets_table
277
291
  pnpm test
278
292
  ```
279
293
 
280
- ## Development
281
-
282
- See the [Development](#development) section below for information on working with this package.
283
-
284
- ---
285
-
286
- ## Development
287
-
288
- ### **Before You Begin**
289
-
290
- ```bash
291
- # 1. Install pgpm
292
- npm install -g pgpm
293
-
294
- # 2. Start Postgres (Docker or local)
295
- pgpm docker start
296
-
297
- # 3. Load PG* environment variables (PGHOST, PGUSER, ...)
298
- eval "$(pgpm env)"
299
- ```
300
-
301
- ---
302
-
303
- ### **Starting a New Project**
304
-
305
- ```bash
306
- # 1. Create a workspace
307
- pgpm init --workspace
308
- cd my-app
309
-
310
- # 2. Create your first module
311
- pgpm init
312
-
313
- # 3. Add a migration
314
- pgpm add some_change
315
-
316
- # 4. Deploy (auto-creates database)
317
- pgpm deploy --createdb
318
- ```
319
-
320
- ---
321
-
322
- ### **Working With an Existing Project**
323
-
324
- ```bash
325
- # 1. Clone and enter the project
326
- git clone <repo> && cd <project>
327
-
328
- # 2. Install dependencies
329
- pnpm install
330
-
331
- # 3. Deploy locally
332
- pgpm deploy --createdb
333
- ```
334
-
335
- ---
336
-
337
- ### **Testing a Module Inside a Workspace**
338
-
339
- ```bash
340
- # 1. Install workspace deps
341
- pnpm install
342
-
343
- # 2. Enter the module directory
344
- cd packages/<some-module>
345
-
346
- # 3. Run tests in watch mode
347
- pnpm test:watch
348
- ```
349
-
350
294
  ## Related Tooling
351
295
 
352
296
  * [pgpm](https://github.com/launchql/launchql/tree/main/packages/pgpm): **🖥️ PostgreSQL Package Manager** for modular Postgres development. Works with database workspaces, scaffolding, migrations, seeding, and installing database packages.
@@ -1,6 +1,6 @@
1
1
  # launchql-encrypted-secrets-table extension
2
2
  comment = 'launchql-encrypted-secrets-table extension'
3
- default_version = '0.5.0'
3
+ default_version = '0.6.0'
4
4
  module_pathname = '$libdir/launchql-encrypted-secrets-table'
5
5
  requires = 'pgcrypto,plpgsql,uuid-ossp,launchql-verify'
6
6
  relocatable = false
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@pgpm/encrypted-secrets-table",
3
- "version": "0.6.0",
3
+ "version": "0.7.0",
4
4
  "description": "Table-based encrypted secrets storage and retrieval",
5
5
  "publishConfig": {
6
6
  "access": "public"
@@ -11,7 +11,7 @@
11
11
  "test:watch": "jest --watch"
12
12
  },
13
13
  "dependencies": {
14
- "@pgpm/verify": "0.6.0"
14
+ "@pgpm/verify": "0.7.0"
15
15
  },
16
16
  "devDependencies": {
17
17
  "pgpm": "^0.2.0"
@@ -24,5 +24,5 @@
24
24
  "bugs": {
25
25
  "url": "https://github.com/launchql/pgpm-modules/issues"
26
26
  },
27
- "gitHead": "c7d0eae588d7a764b382a330c8b853b341b13fb2"
27
+ "gitHead": "1f24d8fa95fb141f16e5b8345458c3b687d80908"
28
28
  }