@pgpm/encrypted-secrets 0.13.0 → 0.15.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/LICENSE CHANGED
@@ -1,7 +1,7 @@
1
1
  The MIT License (MIT)
2
2
 
3
3
  Copyright (c) 2025 Dan Lynch <pyramation@gmail.com>
4
- Copyright (c) 2025 Interweb, Inc.
4
+ Copyright (c) 2025 Constructive
5
5
 
6
6
  Permission is hereby granted, free of charge, to any person obtaining a copy
7
7
  of this software and associated documentation files (the "Software"), to deal
package/Makefile CHANGED
@@ -1,5 +1,5 @@
1
- EXTENSION = launchql-encrypted-secrets
2
- DATA = sql/launchql-encrypted-secrets--0.9.0.sql
1
+ EXTENSION = pgpm-encrypted-secrets
2
+ DATA = sql/pgpm-encrypted-secrets--0.14.0.sql
3
3
 
4
4
  PG_CONFIG = pg_config
5
5
  PGXS := $(shell $(PG_CONFIG) --pgxs)
package/README.md CHANGED
@@ -1,15 +1,15 @@
1
1
  # @pgpm/encrypted-secrets
2
2
 
3
3
  <p align="center" width="100%">
4
- <img height="250" src="https://raw.githubusercontent.com/launchql/launchql/refs/heads/main/assets/outline-logo.svg" />
4
+ <img height="250" src="https://raw.githubusercontent.com/constructive-io/constructive/refs/heads/main/assets/outline-logo.svg" />
5
5
  </p>
6
6
 
7
7
  <p align="center" width="100%">
8
- <a href="https://github.com/launchql/pgpm-modules/actions/workflows/ci.yml">
9
- <img height="20" src="https://github.com/launchql/pgpm-modules/actions/workflows/ci.yml/badge.svg" />
8
+ <a href="https://github.com/constructive-io/pgpm-modules/actions/workflows/ci.yml">
9
+ <img height="20" src="https://github.com/constructive-io/pgpm-modules/actions/workflows/ci.yml/badge.svg" />
10
10
  </a>
11
- <a href="https://github.com/launchql/pgpm-modules/blob/main/LICENSE"><img height="20" src="https://img.shields.io/badge/license-MIT-blue.svg"/></a>
12
- <a href="https://www.npmjs.com/package/@pgpm/encrypted-secrets"><img height="20" src="https://img.shields.io/github/package-json/v/launchql/pgpm-modules?filename=packages%2Fsecurity%2Fencrypted-secrets%2Fpackage.json"/></a>
11
+ <a href="https://github.com/constructive-io/pgpm-modules/blob/main/LICENSE"><img height="20" src="https://img.shields.io/badge/license-MIT-blue.svg"/></a>
12
+ <a href="https://www.npmjs.com/package/@pgpm/encrypted-secrets"><img height="20" src="https://img.shields.io/github/package-json/v/constructive-io/pgpm-modules?filename=packages%2Fsecurity%2Fencrypted-secrets%2Fpackage.json"/></a>
13
13
  </p>
14
14
 
15
15
  Encrypted secrets management for PostgreSQL.
@@ -66,7 +66,7 @@ pgpm deploy
66
66
 
67
67
  ```bash
68
68
  # 1. Create a workspace
69
- pgpm init --workspace
69
+ pgpm init workspace
70
70
 
71
71
  # 2. Create your first module
72
72
  cd my-workspace
@@ -493,13 +493,13 @@ pnpm test
493
493
 
494
494
  ## Related Tooling
495
495
 
496
- * [pgpm](https://github.com/launchql/launchql/tree/main/packages/pgpm): **🖥️ PostgreSQL Package Manager** for modular Postgres development. Works with database workspaces, scaffolding, migrations, seeding, and installing database packages.
497
- * [pgsql-test](https://github.com/launchql/launchql/tree/main/packages/pgsql-test): **📊 Isolated testing environments** with per-test transaction rollbacks—ideal for integration tests, complex migrations, and RLS simulation.
498
- * [supabase-test](https://github.com/launchql/launchql/tree/main/packages/supabase-test): **🧪 Supabase-native test harness** preconfigured for the local Supabase stack—per-test rollbacks, JWT/role context helpers, and CI/GitHub Actions ready.
499
- * [graphile-test](https://github.com/launchql/launchql/tree/main/packages/graphile-test): **🔐 Authentication mocking** for Graphile-focused test helpers and emulating row-level security contexts.
500
- * [pgsql-parser](https://github.com/launchql/pgsql-parser): **🔄 SQL conversion engine** that interprets and converts PostgreSQL syntax.
501
- * [libpg-query-node](https://github.com/launchql/libpg-query-node): **🌉 Node.js bindings** for `libpg_query`, converting SQL into parse trees.
502
- * [pg-proto-parser](https://github.com/launchql/pg-proto-parser): **📦 Protobuf parser** for parsing PostgreSQL Protocol Buffers definitions to generate TypeScript interfaces, utility functions, and JSON mappings for enums.
496
+ * [pgpm](https://github.com/constructive-io/constructive/tree/main/packages/pgpm): **🖥️ PostgreSQL Package Manager** for modular Postgres development. Works with database workspaces, scaffolding, migrations, seeding, and installing database packages.
497
+ * [pgsql-test](https://github.com/constructive-io/constructive/tree/main/packages/pgsql-test): **📊 Isolated testing environments** with per-test transaction rollbacks—ideal for integration tests, complex migrations, and RLS simulation.
498
+ * [supabase-test](https://github.com/constructive-io/constructive/tree/main/packages/supabase-test): **🧪 Supabase-native test harness** preconfigured for the local Supabase stack—per-test rollbacks, JWT/role context helpers, and CI/GitHub Actions ready.
499
+ * [graphile-test](https://github.com/constructive-io/constructive/tree/main/packages/graphile-test): **🔐 Authentication mocking** for Graphile-focused test helpers and emulating row-level security contexts.
500
+ * [pgsql-parser](https://github.com/constructive-io/pgsql-parser): **🔄 SQL conversion engine** that interprets and converts PostgreSQL syntax.
501
+ * [libpg-query-node](https://github.com/constructive-io/libpg-query-node): **🌉 Node.js bindings** for `libpg_query`, converting SQL into parse trees.
502
+ * [pg-proto-parser](https://github.com/constructive-io/pg-proto-parser): **📦 Protobuf parser** for parsing PostgreSQL Protocol Buffers definitions to generate TypeScript interfaces, utility functions, and JSON mappings for enums.
503
503
 
504
504
  ## Disclaimer
505
505
 
package/package.json CHANGED
@@ -1,10 +1,10 @@
1
1
  {
2
2
  "name": "@pgpm/encrypted-secrets",
3
- "version": "0.13.0",
3
+ "version": "0.15.0",
4
4
  "description": "Encrypted secrets management for PostgreSQL",
5
5
  "author": "Dan Lynch <pyramation@gmail.com>",
6
6
  "contributors": [
7
- "Interweb <developers@interweb.co>"
7
+ "Constructive <developers@constructive.io>"
8
8
  ],
9
9
  "keywords": [
10
10
  "postgresql",
@@ -21,20 +21,20 @@
21
21
  "test:watch": "jest --watch"
22
22
  },
23
23
  "dependencies": {
24
- "@pgpm/default-roles": "0.13.0",
25
- "@pgpm/encrypted-secrets-table": "0.13.0",
26
- "@pgpm/verify": "0.13.0"
24
+ "@pgpm/default-roles": "0.15.0",
25
+ "@pgpm/encrypted-secrets-table": "0.15.0",
26
+ "@pgpm/verify": "0.15.0"
27
27
  },
28
28
  "devDependencies": {
29
- "pgpm": "^0.2.0"
29
+ "pgpm": "^1.0.0"
30
30
  },
31
31
  "repository": {
32
32
  "type": "git",
33
- "url": "https://github.com/launchql/pgpm-modules"
33
+ "url": "https://github.com/constructive-io/pgpm-modules"
34
34
  },
35
- "homepage": "https://github.com/launchql/pgpm-modules",
35
+ "homepage": "https://github.com/constructive-io/pgpm-modules",
36
36
  "bugs": {
37
- "url": "https://github.com/launchql/pgpm-modules/issues"
37
+ "url": "https://github.com/constructive-io/pgpm-modules/issues"
38
38
  },
39
- "gitHead": "e7de11be3a2fd806929adf48acc556d812c75aa6"
39
+ "gitHead": "118ac6f810720378fa954e9620abf2516293c148"
40
40
  }
@@ -0,0 +1,8 @@
1
+ # pgpm-encrypted-secrets extension
2
+ comment = 'pgpm-encrypted-secrets extension'
3
+ default_version = '0.14.0'
4
+ module_pathname = '$libdir/pgpm-encrypted-secrets'
5
+ requires = 'pgcrypto,plpgsql,uuid-ossp,pgpm-encrypted-secrets-table,pgpm-default-roles,pgpm-verify'
6
+ relocatable = false
7
+ superuser = false
8
+
package/pgpm.plan CHANGED
@@ -1,6 +1,6 @@
1
1
  %syntax-version=1.0.0
2
- %project=launchql-encrypted-secrets
3
- %uri=launchql-encrypted-secrets
2
+ %project=pgpm-encrypted-secrets
3
+ %uri=pgpm-encrypted-secrets
4
4
 
5
5
  schemas/encrypted_secrets/schema 2020-11-01T21:22:30Z Dan Lynch <dlynch@Dans-MBP-3> # add schemas/encrypted_secrets/schema
6
6
  schemas/encrypted_secrets/procedures/encrypt_field_bytea_to_text [schemas/encrypted_secrets/schema] 2020-11-01T21:22:54Z Dan Lynch <dlynch@Dans-MBP-3> # add schemas/encrypted_secrets/procedures/encrypt_field_bytea_to_text
@@ -1,4 +1,4 @@
1
- \echo Use "CREATE EXTENSION launchql-encrypted-secrets" to load this file. \quit
1
+ \echo Use "CREATE EXTENSION pgpm-encrypted-secrets" to load this file. \quit
2
2
  CREATE SCHEMA encrypted_secrets;
3
3
 
4
4
  CREATE FUNCTION encrypted_secrets.encrypt_field_bytea_to_text(secret_value bytea) RETURNS text AS $EOFCODE$
@@ -1,8 +0,0 @@
1
- # launchql-encrypted-secrets extension
2
- comment = 'launchql-encrypted-secrets extension'
3
- default_version = '0.9.0'
4
- module_pathname = '$libdir/launchql-encrypted-secrets'
5
- requires = 'pgcrypto,plpgsql,uuid-ossp,launchql-encrypted-secrets-table,launchql-default-roles,launchql-verify'
6
- relocatable = false
7
- superuser = false
8
-