@vaultkeeper/test-helpers 0.1.1 → 0.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.cjs +4 -0
- package/dist/index.cjs.map +1 -1
- package/dist/index.d.cts +4 -2
- package/dist/index.d.ts +4 -2
- package/dist/index.js +4 -0
- package/dist/index.js.map +1 -1
- package/package.json +2 -2
package/dist/index.cjs
CHANGED
|
@@ -33,6 +33,10 @@ var InMemoryBackend = class {
|
|
|
33
33
|
exists(id) {
|
|
34
34
|
return Promise.resolve(this.#store.has(id));
|
|
35
35
|
}
|
|
36
|
+
/** @public */
|
|
37
|
+
list() {
|
|
38
|
+
return Promise.resolve([...this.#store.keys()]);
|
|
39
|
+
}
|
|
36
40
|
/**
|
|
37
41
|
* Remove all stored secrets. Useful for test teardown.
|
|
38
42
|
* @public
|
package/dist/index.cjs.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../src/in-memory-backend.ts","../src/test-vault.ts"],"names":["BackendRegistry","VaultKeeper"],"mappings":";;;;;AAeO,IAAM,kBAAN,
|
|
1
|
+
{"version":3,"sources":["../src/in-memory-backend.ts","../src/test-vault.ts"],"names":["BackendRegistry","VaultKeeper"],"mappings":";;;;;AAeO,IAAM,kBAAN,MAAiD;AAAA,EAC7C,IAAA,GAAO,QAAA;AAAA,EACP,WAAA,GAAc,mBAAA;AAAA,EACd,MAAA,uBAAa,GAAA,EAAoB;AAAA;AAAA,EAG1C,WAAA,GAAgC;AAC9B,IAAA,OAAO,OAAA,CAAQ,QAAQ,IAAI,CAAA;AAAA,EAC7B;AAAA;AAAA,EAGA,KAAA,CAAM,IAAY,MAAA,EAA+B;AAC/C,IAAA,IAAA,CAAK,MAAA,CAAO,GAAA,CAAI,EAAA,EAAI,MAAM,CAAA;AAC1B,IAAA,OAAO,QAAQ,OAAA,EAAQ;AAAA,EACzB;AAAA;AAAA,EAGA,SAAS,EAAA,EAA6B;AACpC,IAAA,MAAM,GAAA,GAAM,IAAA,CAAK,MAAA,CAAO,GAAA,CAAI,EAAE,CAAA;AAC9B,IAAA,IAAI,QAAQ,MAAA,EAAW;AACrB,MAAA,OAAO,QAAQ,MAAA,CAAO,IAAI,MAAM,CAAA,kBAAA,EAAqB,EAAE,EAAE,CAAC,CAAA;AAAA,IAC5D;AACA,IAAA,OAAO,OAAA,CAAQ,QAAQ,GAAG,CAAA;AAAA,EAC5B;AAAA;AAAA,EAGA,OAAO,EAAA,EAA2B;AAChC,IAAA,IAAA,CAAK,MAAA,CAAO,OAAO,EAAE,CAAA;AACrB,IAAA,OAAO,QAAQ,OAAA,EAAQ;AAAA,EACzB;AAAA;AAAA,EAGA,OAAO,EAAA,EAA8B;AACnC,IAAA,OAAO,QAAQ,OAAA,CAAQ,IAAA,CAAK,MAAA,CAAO,GAAA,CAAI,EAAE,CAAC,CAAA;AAAA,EAC5C;AAAA;AAAA,EAGA,IAAA,GAA0B;AACxB,IAAA,OAAO,OAAA,CAAQ,QAAQ,CAAC,GAAG,KAAK,MAAA,CAAO,IAAA,EAAM,CAAC,CAAA;AAAA,EAChD;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,KAAA,GAAc;AACZ,IAAA,IAAA,CAAK,OAAO,KAAA,EAAM;AAAA,EACpB;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,IAAI,IAAA,GAAe;AACjB,IAAA,OAAO,KAAK,MAAA,CAAO,IAAA;AAAA,EACrB;AACF;AC9DA,IAAM,WAAA,GAA2B;AAAA,EAC/B,OAAA,EAAS,CAAA;AAAA,EACT,UAAU,CAAC,EAAE,MAAM,QAAA,EAAU,OAAA,EAAS,MAAM,CAAA;AAAA,EAC5C,WAAA,EAAa,EAAE,eAAA,EAAiB,CAAA,EAAE;AAAA,EAClC,QAAA,EAAU,EAAE,UAAA,EAAY,CAAA,EAAG,WAAW,CAAA,EAAE;AAAA,EACxC,eAAA,EAAiB,EAAE,WAAA,EAAa,CAAC,KAAK,CAAA;AACxC,CAAA;AA+BO,IAAM,SAAA,GAAN,MAAM,UAAA,CAAU;AAAA;AAAA,EAEZ,MAAA;AAAA;AAAA,EAGA,OAAA;AAAA,EAED,WAAA,CAAY,QAAqB,OAAA,EAA0B;AACjE,IAAA,IAAA,CAAK,MAAA,GAAS,MAAA;AACd,IAAA,IAAA,CAAK,OAAA,GAAU,OAAA;AAAA,EACjB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAUA,aAAa,OAAO,OAAA,EAAgD;AAClE,IAAA,MAAM,OAAA,GAAU,IAAI,eAAA,EAAgB;AAGpC,IAAAA,2BAAA,CAAgB,QAAA,CAAS,QAAA,EAAU,MAAM,OAAO,CAAA;AAEhD,IAAA,MAAM,MAAA,GAAsB;AAAA,MAC1B,GAAG,WAAA;AAAA,MACH,QAAA,EAAU;AAAA,QACR,UAAA,EAAY,OAAA,EAAS,UAAA,IAAc,WAAA,CAAY,QAAA,CAAS,UAAA;AAAA,QACxD,SAAA,EAAW,OAAA,EAAS,SAAA,IAAa,WAAA,CAAY,QAAA,CAAS;AAAA;AACxD,KACF;AAEA,IAAA,MAAM,MAAA,GAAS,MAAMC,uBAAA,CAAY,IAAA,CAAK;AAAA,MACpC,UAAA,EAAY,IAAA;AAAA,MACZ;AAAA,KACD,CAAA;AAED,IAAA,OAAO,IAAI,UAAA,CAAU,MAAA,EAAQ,OAAO,CAAA;AAAA,EACtC;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,KAAA,GAAc;AACZ,IAAA,IAAA,CAAK,QAAQ,KAAA,EAAM;AAAA,EACrB;AACF","file":"index.cjs","sourcesContent":["/**\n * In-memory secret backend for testing.\n */\n\nimport type { ListableBackend } from 'vaultkeeper'\n\n/**\n * A fully in-memory `SecretBackend` for testing.\n *\n * @remarks\n * This backend stores secrets in a plain `Map` and has no external\n * dependencies. It is suitable for unit, integration, and e2e tests.\n *\n * @public\n */\nexport class InMemoryBackend implements ListableBackend {\n readonly type = 'memory'\n readonly displayName = 'In-Memory Backend'\n readonly #store = new Map<string, string>()\n\n /** @public */\n isAvailable(): Promise<boolean> {\n return Promise.resolve(true)\n }\n\n /** @public */\n store(id: string, secret: string): Promise<void> {\n this.#store.set(id, secret)\n return Promise.resolve()\n }\n\n /** @public */\n retrieve(id: string): Promise<string> {\n const val = this.#store.get(id)\n if (val === undefined) {\n return Promise.reject(new Error(`Secret not found: ${id}`))\n }\n return Promise.resolve(val)\n }\n\n /** @public */\n delete(id: string): Promise<void> {\n this.#store.delete(id)\n return Promise.resolve()\n }\n\n /** @public */\n exists(id: string): Promise<boolean> {\n return Promise.resolve(this.#store.has(id))\n }\n\n /** @public */\n list(): Promise<string[]> {\n return Promise.resolve([...this.#store.keys()])\n }\n\n /**\n * Remove all stored secrets. Useful for test teardown.\n * @public\n */\n clear(): void {\n this.#store.clear()\n }\n\n /**\n * The number of secrets currently stored.\n * @public\n */\n get size(): number {\n return this.#store.size\n }\n}\n","/**\n * Pre-configured VaultKeeper for consumer tests.\n */\n\nimport type { VaultConfig } from 'vaultkeeper'\nimport { VaultKeeper, BackendRegistry } from 'vaultkeeper'\nimport { InMemoryBackend } from './in-memory-backend.js'\n\n/** Default test configuration with short TTL and dev-mode trust. */\nconst TEST_CONFIG: VaultConfig = {\n version: 1,\n backends: [{ type: 'memory', enabled: true }],\n keyRotation: { gracePeriodDays: 1 },\n defaults: { ttlMinutes: 5, trustTier: 1 },\n developmentMode: { executables: ['dev'] },\n}\n\n/**\n * Options for creating a {@link TestVault}.\n * @public\n */\nexport interface TestVaultOptions {\n /** Override the default TTL in minutes. */\n ttlMinutes?: number | undefined\n /** Override the default trust tier. */\n trustTier?: 1 | 2 | 3 | undefined\n}\n\n/**\n * A pre-configured vault for consumer test workflows.\n *\n * @remarks\n * `TestVault` wraps a real `VaultKeeper` instance backed by an\n * {@link InMemoryBackend}. It skips doctor checks and uses dev-mode\n * identity, making it suitable for fast, hermetic tests.\n *\n * @example\n * ```ts\n * const vault = await TestVault.create()\n * await vault.backend.store('my-secret', 'hunter2')\n * const jwe = await vault.keeper.setup('my-secret')\n * const { token } = await vault.keeper.authorize(jwe)\n * ```\n *\n * @public\n */\nexport class TestVault {\n /** The underlying VaultKeeper instance. */\n readonly keeper: VaultKeeper\n\n /** The in-memory backend used by this test vault. */\n readonly backend: InMemoryBackend\n\n private constructor(keeper: VaultKeeper, backend: InMemoryBackend) {\n this.keeper = keeper\n this.backend = backend\n }\n\n /**\n * Create a new TestVault, ready for use.\n *\n * @param options - Optional overrides for TTL and trust tier.\n * @returns A fully-initialized TestVault.\n *\n * @public\n */\n static async create(options?: TestVaultOptions): Promise<TestVault> {\n const backend = new InMemoryBackend()\n\n // Register the in-memory backend so VaultKeeper can resolve it\n BackendRegistry.register('memory', () => backend)\n\n const config: VaultConfig = {\n ...TEST_CONFIG,\n defaults: {\n ttlMinutes: options?.ttlMinutes ?? TEST_CONFIG.defaults.ttlMinutes,\n trustTier: options?.trustTier ?? TEST_CONFIG.defaults.trustTier,\n },\n }\n\n const keeper = await VaultKeeper.init({\n skipDoctor: true,\n config,\n })\n\n return new TestVault(keeper, backend)\n }\n\n /**\n * Reset the test vault by clearing all stored secrets.\n * @public\n */\n reset(): void {\n this.backend.clear()\n }\n}\n"]}
|
package/dist/index.d.cts
CHANGED
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import {
|
|
1
|
+
import { ListableBackend, VaultKeeper } from 'vaultkeeper';
|
|
2
2
|
|
|
3
3
|
/**
|
|
4
4
|
* In-memory secret backend for testing.
|
|
@@ -13,7 +13,7 @@ import { SecretBackend, VaultKeeper } from 'vaultkeeper';
|
|
|
13
13
|
*
|
|
14
14
|
* @public
|
|
15
15
|
*/
|
|
16
|
-
declare class InMemoryBackend implements
|
|
16
|
+
declare class InMemoryBackend implements ListableBackend {
|
|
17
17
|
#private;
|
|
18
18
|
readonly type = "memory";
|
|
19
19
|
readonly displayName = "In-Memory Backend";
|
|
@@ -27,6 +27,8 @@ declare class InMemoryBackend implements SecretBackend {
|
|
|
27
27
|
delete(id: string): Promise<void>;
|
|
28
28
|
/** @public */
|
|
29
29
|
exists(id: string): Promise<boolean>;
|
|
30
|
+
/** @public */
|
|
31
|
+
list(): Promise<string[]>;
|
|
30
32
|
/**
|
|
31
33
|
* Remove all stored secrets. Useful for test teardown.
|
|
32
34
|
* @public
|
package/dist/index.d.ts
CHANGED
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import {
|
|
1
|
+
import { ListableBackend, VaultKeeper } from 'vaultkeeper';
|
|
2
2
|
|
|
3
3
|
/**
|
|
4
4
|
* In-memory secret backend for testing.
|
|
@@ -13,7 +13,7 @@ import { SecretBackend, VaultKeeper } from 'vaultkeeper';
|
|
|
13
13
|
*
|
|
14
14
|
* @public
|
|
15
15
|
*/
|
|
16
|
-
declare class InMemoryBackend implements
|
|
16
|
+
declare class InMemoryBackend implements ListableBackend {
|
|
17
17
|
#private;
|
|
18
18
|
readonly type = "memory";
|
|
19
19
|
readonly displayName = "In-Memory Backend";
|
|
@@ -27,6 +27,8 @@ declare class InMemoryBackend implements SecretBackend {
|
|
|
27
27
|
delete(id: string): Promise<void>;
|
|
28
28
|
/** @public */
|
|
29
29
|
exists(id: string): Promise<boolean>;
|
|
30
|
+
/** @public */
|
|
31
|
+
list(): Promise<string[]>;
|
|
30
32
|
/**
|
|
31
33
|
* Remove all stored secrets. Useful for test teardown.
|
|
32
34
|
* @public
|
package/dist/index.js
CHANGED
|
@@ -31,6 +31,10 @@ var InMemoryBackend = class {
|
|
|
31
31
|
exists(id) {
|
|
32
32
|
return Promise.resolve(this.#store.has(id));
|
|
33
33
|
}
|
|
34
|
+
/** @public */
|
|
35
|
+
list() {
|
|
36
|
+
return Promise.resolve([...this.#store.keys()]);
|
|
37
|
+
}
|
|
34
38
|
/**
|
|
35
39
|
* Remove all stored secrets. Useful for test teardown.
|
|
36
40
|
* @public
|
package/dist/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../src/in-memory-backend.ts","../src/test-vault.ts"],"names":[],"mappings":";;;AAeO,IAAM,kBAAN,
|
|
1
|
+
{"version":3,"sources":["../src/in-memory-backend.ts","../src/test-vault.ts"],"names":[],"mappings":";;;AAeO,IAAM,kBAAN,MAAiD;AAAA,EAC7C,IAAA,GAAO,QAAA;AAAA,EACP,WAAA,GAAc,mBAAA;AAAA,EACd,MAAA,uBAAa,GAAA,EAAoB;AAAA;AAAA,EAG1C,WAAA,GAAgC;AAC9B,IAAA,OAAO,OAAA,CAAQ,QAAQ,IAAI,CAAA;AAAA,EAC7B;AAAA;AAAA,EAGA,KAAA,CAAM,IAAY,MAAA,EAA+B;AAC/C,IAAA,IAAA,CAAK,MAAA,CAAO,GAAA,CAAI,EAAA,EAAI,MAAM,CAAA;AAC1B,IAAA,OAAO,QAAQ,OAAA,EAAQ;AAAA,EACzB;AAAA;AAAA,EAGA,SAAS,EAAA,EAA6B;AACpC,IAAA,MAAM,GAAA,GAAM,IAAA,CAAK,MAAA,CAAO,GAAA,CAAI,EAAE,CAAA;AAC9B,IAAA,IAAI,QAAQ,MAAA,EAAW;AACrB,MAAA,OAAO,QAAQ,MAAA,CAAO,IAAI,MAAM,CAAA,kBAAA,EAAqB,EAAE,EAAE,CAAC,CAAA;AAAA,IAC5D;AACA,IAAA,OAAO,OAAA,CAAQ,QAAQ,GAAG,CAAA;AAAA,EAC5B;AAAA;AAAA,EAGA,OAAO,EAAA,EAA2B;AAChC,IAAA,IAAA,CAAK,MAAA,CAAO,OAAO,EAAE,CAAA;AACrB,IAAA,OAAO,QAAQ,OAAA,EAAQ;AAAA,EACzB;AAAA;AAAA,EAGA,OAAO,EAAA,EAA8B;AACnC,IAAA,OAAO,QAAQ,OAAA,CAAQ,IAAA,CAAK,MAAA,CAAO,GAAA,CAAI,EAAE,CAAC,CAAA;AAAA,EAC5C;AAAA;AAAA,EAGA,IAAA,GAA0B;AACxB,IAAA,OAAO,OAAA,CAAQ,QAAQ,CAAC,GAAG,KAAK,MAAA,CAAO,IAAA,EAAM,CAAC,CAAA;AAAA,EAChD;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,KAAA,GAAc;AACZ,IAAA,IAAA,CAAK,OAAO,KAAA,EAAM;AAAA,EACpB;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,IAAI,IAAA,GAAe;AACjB,IAAA,OAAO,KAAK,MAAA,CAAO,IAAA;AAAA,EACrB;AACF;AC9DA,IAAM,WAAA,GAA2B;AAAA,EAC/B,OAAA,EAAS,CAAA;AAAA,EACT,UAAU,CAAC,EAAE,MAAM,QAAA,EAAU,OAAA,EAAS,MAAM,CAAA;AAAA,EAC5C,WAAA,EAAa,EAAE,eAAA,EAAiB,CAAA,EAAE;AAAA,EAClC,QAAA,EAAU,EAAE,UAAA,EAAY,CAAA,EAAG,WAAW,CAAA,EAAE;AAAA,EACxC,eAAA,EAAiB,EAAE,WAAA,EAAa,CAAC,KAAK,CAAA;AACxC,CAAA;AA+BO,IAAM,SAAA,GAAN,MAAM,UAAA,CAAU;AAAA;AAAA,EAEZ,MAAA;AAAA;AAAA,EAGA,OAAA;AAAA,EAED,WAAA,CAAY,QAAqB,OAAA,EAA0B;AACjE,IAAA,IAAA,CAAK,MAAA,GAAS,MAAA;AACd,IAAA,IAAA,CAAK,OAAA,GAAU,OAAA;AAAA,EACjB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAUA,aAAa,OAAO,OAAA,EAAgD;AAClE,IAAA,MAAM,OAAA,GAAU,IAAI,eAAA,EAAgB;AAGpC,IAAA,eAAA,CAAgB,QAAA,CAAS,QAAA,EAAU,MAAM,OAAO,CAAA;AAEhD,IAAA,MAAM,MAAA,GAAsB;AAAA,MAC1B,GAAG,WAAA;AAAA,MACH,QAAA,EAAU;AAAA,QACR,UAAA,EAAY,OAAA,EAAS,UAAA,IAAc,WAAA,CAAY,QAAA,CAAS,UAAA;AAAA,QACxD,SAAA,EAAW,OAAA,EAAS,SAAA,IAAa,WAAA,CAAY,QAAA,CAAS;AAAA;AACxD,KACF;AAEA,IAAA,MAAM,MAAA,GAAS,MAAM,WAAA,CAAY,IAAA,CAAK;AAAA,MACpC,UAAA,EAAY,IAAA;AAAA,MACZ;AAAA,KACD,CAAA;AAED,IAAA,OAAO,IAAI,UAAA,CAAU,MAAA,EAAQ,OAAO,CAAA;AAAA,EACtC;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,KAAA,GAAc;AACZ,IAAA,IAAA,CAAK,QAAQ,KAAA,EAAM;AAAA,EACrB;AACF","file":"index.js","sourcesContent":["/**\n * In-memory secret backend for testing.\n */\n\nimport type { ListableBackend } from 'vaultkeeper'\n\n/**\n * A fully in-memory `SecretBackend` for testing.\n *\n * @remarks\n * This backend stores secrets in a plain `Map` and has no external\n * dependencies. It is suitable for unit, integration, and e2e tests.\n *\n * @public\n */\nexport class InMemoryBackend implements ListableBackend {\n readonly type = 'memory'\n readonly displayName = 'In-Memory Backend'\n readonly #store = new Map<string, string>()\n\n /** @public */\n isAvailable(): Promise<boolean> {\n return Promise.resolve(true)\n }\n\n /** @public */\n store(id: string, secret: string): Promise<void> {\n this.#store.set(id, secret)\n return Promise.resolve()\n }\n\n /** @public */\n retrieve(id: string): Promise<string> {\n const val = this.#store.get(id)\n if (val === undefined) {\n return Promise.reject(new Error(`Secret not found: ${id}`))\n }\n return Promise.resolve(val)\n }\n\n /** @public */\n delete(id: string): Promise<void> {\n this.#store.delete(id)\n return Promise.resolve()\n }\n\n /** @public */\n exists(id: string): Promise<boolean> {\n return Promise.resolve(this.#store.has(id))\n }\n\n /** @public */\n list(): Promise<string[]> {\n return Promise.resolve([...this.#store.keys()])\n }\n\n /**\n * Remove all stored secrets. Useful for test teardown.\n * @public\n */\n clear(): void {\n this.#store.clear()\n }\n\n /**\n * The number of secrets currently stored.\n * @public\n */\n get size(): number {\n return this.#store.size\n }\n}\n","/**\n * Pre-configured VaultKeeper for consumer tests.\n */\n\nimport type { VaultConfig } from 'vaultkeeper'\nimport { VaultKeeper, BackendRegistry } from 'vaultkeeper'\nimport { InMemoryBackend } from './in-memory-backend.js'\n\n/** Default test configuration with short TTL and dev-mode trust. */\nconst TEST_CONFIG: VaultConfig = {\n version: 1,\n backends: [{ type: 'memory', enabled: true }],\n keyRotation: { gracePeriodDays: 1 },\n defaults: { ttlMinutes: 5, trustTier: 1 },\n developmentMode: { executables: ['dev'] },\n}\n\n/**\n * Options for creating a {@link TestVault}.\n * @public\n */\nexport interface TestVaultOptions {\n /** Override the default TTL in minutes. */\n ttlMinutes?: number | undefined\n /** Override the default trust tier. */\n trustTier?: 1 | 2 | 3 | undefined\n}\n\n/**\n * A pre-configured vault for consumer test workflows.\n *\n * @remarks\n * `TestVault` wraps a real `VaultKeeper` instance backed by an\n * {@link InMemoryBackend}. It skips doctor checks and uses dev-mode\n * identity, making it suitable for fast, hermetic tests.\n *\n * @example\n * ```ts\n * const vault = await TestVault.create()\n * await vault.backend.store('my-secret', 'hunter2')\n * const jwe = await vault.keeper.setup('my-secret')\n * const { token } = await vault.keeper.authorize(jwe)\n * ```\n *\n * @public\n */\nexport class TestVault {\n /** The underlying VaultKeeper instance. */\n readonly keeper: VaultKeeper\n\n /** The in-memory backend used by this test vault. */\n readonly backend: InMemoryBackend\n\n private constructor(keeper: VaultKeeper, backend: InMemoryBackend) {\n this.keeper = keeper\n this.backend = backend\n }\n\n /**\n * Create a new TestVault, ready for use.\n *\n * @param options - Optional overrides for TTL and trust tier.\n * @returns A fully-initialized TestVault.\n *\n * @public\n */\n static async create(options?: TestVaultOptions): Promise<TestVault> {\n const backend = new InMemoryBackend()\n\n // Register the in-memory backend so VaultKeeper can resolve it\n BackendRegistry.register('memory', () => backend)\n\n const config: VaultConfig = {\n ...TEST_CONFIG,\n defaults: {\n ttlMinutes: options?.ttlMinutes ?? TEST_CONFIG.defaults.ttlMinutes,\n trustTier: options?.trustTier ?? TEST_CONFIG.defaults.trustTier,\n },\n }\n\n const keeper = await VaultKeeper.init({\n skipDoctor: true,\n config,\n })\n\n return new TestVault(keeper, backend)\n }\n\n /**\n * Reset the test vault by clearing all stored secrets.\n * @public\n */\n reset(): void {\n this.backend.clear()\n }\n}\n"]}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@vaultkeeper/test-helpers",
|
|
3
|
-
"version": "0.
|
|
3
|
+
"version": "0.2.0",
|
|
4
4
|
"description": "Test utilities for vaultkeeper consumers",
|
|
5
5
|
"type": "module",
|
|
6
6
|
"main": "./dist/index.cjs",
|
|
@@ -31,7 +31,7 @@
|
|
|
31
31
|
"access": "public"
|
|
32
32
|
},
|
|
33
33
|
"dependencies": {
|
|
34
|
-
"vaultkeeper": "0.
|
|
34
|
+
"vaultkeeper": "0.3.0"
|
|
35
35
|
},
|
|
36
36
|
"devDependencies": {
|
|
37
37
|
"@microsoft/api-extractor": "^7.57.2",
|