@vaharoni/devops 1.2.9 → 1.2.11
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/app-support/crypto/index.d.ts +1 -1
- package/dist/app-support/crypto/index.d.ts.map +1 -1
- package/dist/app-support/crypto/index.js +1 -1
- package/package.json +1 -1
- package/src/app-support/crypto/index.ts +1 -1
- package/src/target-templates/lang-variants-common/typescript/applications/jobs/README.md +2 -2
- package/src/target-templates/lang-variants-common/typescript/config/.env.global +1 -1
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
export { encryptAes256Gcm
|
|
1
|
+
export { encryptAes256Gcm, decryptAes256Gcm } from "./aes";
|
|
2
2
|
/**
|
|
3
3
|
* A simple token generation/verification class that relies on the subject field of an internal JWT-like token. It can:
|
|
4
4
|
* - generate a short-lived (60s) token with the given subject
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/app-support/crypto/index.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,gBAAgB,
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/app-support/crypto/index.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,gBAAgB,EAAE,gBAAgB,EAAE,MAAM,OAAO,CAAC;AAE3D;;;;;;GAMG;AACH,qBAAa,aAAa;IACL,OAAO,EAAE,MAAM;gBAAf,OAAO,EAAE,MAAM;IAElC,QAAQ;IAIR,aAAa,CAAC,KAAK,EAAE,MAAM;IAO3B,uBAAuB,CAAC,mBAAmB,CAAC,EAAE,MAAM,GAAG,IAAI;CAO5D"}
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { generateInternalAuthToken, parseInternalAuthTokenOrThrow } from "./internal-token";
|
|
2
|
-
export { encryptAes256Gcm
|
|
2
|
+
export { encryptAes256Gcm, decryptAes256Gcm } from "./aes";
|
|
3
3
|
/**
|
|
4
4
|
* A simple token generation/verification class that relies on the subject field of an internal JWT-like token. It can:
|
|
5
5
|
* - generate a short-lived (60s) token with the given subject
|
package/package.json
CHANGED
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { generateInternalAuthToken, parseInternalAuthTokenOrThrow } from "./internal-token";
|
|
2
|
-
export { encryptAes256Gcm
|
|
2
|
+
export { encryptAes256Gcm, decryptAes256Gcm } from "./aes";
|
|
3
3
|
|
|
4
4
|
/**
|
|
5
5
|
* A simple token generation/verification class that relies on the subject field of an internal JWT-like token. It can:
|
|
@@ -56,9 +56,9 @@ export async function POST(request: Request) {
|
|
|
56
56
|
|
|
57
57
|
## Testing a secure endpoint in local development
|
|
58
58
|
|
|
59
|
-
Make sure your `config/.env.global` has something like
|
|
59
|
+
Make sure your `config/.env.global` has something like the following. This represents hex of 32 bytes. When creating a namespace, devops properly set these for you in a k8s secret. Locally, something like this suffices.
|
|
60
60
|
```text
|
|
61
|
-
MONOREPO_BASE_SECRET=
|
|
61
|
+
MONOREPO_BASE_SECRET=0000111122223333444455556666777788889999aaaabbbbccccddddeeeeffff
|
|
62
62
|
```
|
|
63
63
|
|
|
64
64
|
Then run:
|
|
@@ -1,4 +1,4 @@
|
|
|
1
1
|
# Add here env variables that are global to all environments
|
|
2
2
|
|
|
3
3
|
# This should remain locally on your machine. There is no need to set this in the remote environment.
|
|
4
|
-
MONOREPO_BASE_SECRET=
|
|
4
|
+
MONOREPO_BASE_SECRET=0000111122223333444455556666777788889999aaaabbbbccccddddeeeeffff
|