@wovin/daemon-utils 0.0.19 → 0.0.21
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{chunk-XAFSYOU2.min.js → chunk-IUNRH65Q.min.js} +3 -2
- package/dist/chunk-IUNRH65Q.min.js.map +1 -0
- package/dist/index.min.js +1 -1
- package/dist/secrets.d.ts +2 -2
- package/dist/secrets.d.ts.map +1 -1
- package/dist/secrets.min.js +1 -1
- package/package.json +5 -5
- package/dist/chunk-XAFSYOU2.min.js.map +0 -1
|
@@ -13,8 +13,9 @@ async function loadSecret(envVar, secretFile) {
|
|
|
13
13
|
async function loadSecretOrThrow(envVar, secretFile, displayName) {
|
|
14
14
|
const secret = await loadSecret(envVar, secretFile);
|
|
15
15
|
if (!secret) {
|
|
16
|
+
const name = displayName || envVar.split("_").map((word) => word.charAt(0) + word.slice(1).toLowerCase()).join(" ");
|
|
16
17
|
throw new Error(
|
|
17
|
-
`${
|
|
18
|
+
`${name} not found. Set ${envVar} environment variable or create ${secretFile} file`
|
|
18
19
|
);
|
|
19
20
|
}
|
|
20
21
|
return secret;
|
|
@@ -24,4 +25,4 @@ export {
|
|
|
24
25
|
loadSecret,
|
|
25
26
|
loadSecretOrThrow
|
|
26
27
|
};
|
|
27
|
-
//# sourceMappingURL=chunk-
|
|
28
|
+
//# sourceMappingURL=chunk-IUNRH65Q.min.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../src/secrets.ts"],"sourcesContent":["import { readFile } from 'node:fs/promises'\n\n/**\n * Utility functions for loading API keys from environment variables or secret files\n */\n\n/**\n * Load an API key from environment variable or secret file\n * @param envVar - Environment variable name (e.g., 'REGOLO_API_KEY')\n * @param secretFile - Path to secret file (e.g., 'secret/regolo')\n * @returns The API key, or undefined if not found\n */\nexport async function loadSecret(envVar: string, secretFile: string): Promise<string | undefined> {\n\t// Try environment variable first\n\tconst envValue = process.env[envVar]\n\tif (envValue) return envValue\n\n\t// Fall back to secret file\n\ttry {\n\t\tconst fileContent = await readFile(secretFile, 'utf-8')\n\t\treturn fileContent.trim() || undefined\n\t} catch {\n\t\t// File doesn't exist or can't be read\n\t\treturn undefined\n\t}\n}\n\n/**\n * Load an API key from environment variable or secret file, with error handling\n * @param envVar - Environment variable name\n * @param secretFile - Path to secret file\n * @param displayName - Human-readable name for error messages. Defaults to capitalized envVar (e.g., 'MISTRAL_API_KEY' -> 'Mistral Api Key')\n * @returns The API key\n * @throws If the key is not found\n */\nexport async function loadSecretOrThrow(\n\tenvVar: string,\n\tsecretFile: string,\n\tdisplayName?: string,\n): Promise<string> {\n\tconst secret = await loadSecret(envVar, secretFile)\n\tif (!secret) {\n\t\tconst name = displayName || envVar.split('_').map(word => word.charAt(0) + word.slice(1).toLowerCase()).join(' ')\n\t\tthrow new Error(\n\t\t\t`${name} not found. Set ${envVar} environment variable or create ${secretFile} file`,\n\t\t)\n\t}\n\treturn secret\n}\n"],"mappings":";AAAA,SAAS,gBAAgB;AAYzB,eAAsB,WAAW,QAAgB,YAAiD;AAEjG,QAAM,WAAW,QAAQ,IAAI,MAAM;AACnC,MAAI,SAAU,QAAO;AAGrB,MAAI;AACH,UAAM,cAAc,MAAM,SAAS,YAAY,OAAO;AACtD,WAAO,YAAY,KAAK,KAAK;AAAA,EAC9B,QAAQ;AAEP,WAAO;AAAA,EACR;AACD;AAUA,eAAsB,kBACrB,QACA,YACA,aACkB;AAClB,QAAM,SAAS,MAAM,WAAW,QAAQ,UAAU;AAClD,MAAI,CAAC,QAAQ;AACZ,UAAM,OAAO,eAAe,OAAO,MAAM,GAAG,EAAE,IAAI,UAAQ,KAAK,OAAO,CAAC,IAAI,KAAK,MAAM,CAAC,EAAE,YAAY,CAAC,EAAE,KAAK,GAAG;AAChH,UAAM,IAAI;AAAA,MACT,GAAG,IAAI,mBAAmB,MAAM,mCAAmC,UAAU;AAAA,IAC9E;AAAA,EACD;AACA,SAAO;AACR;","names":[]}
|
package/dist/index.min.js
CHANGED
package/dist/secrets.d.ts
CHANGED
|
@@ -12,9 +12,9 @@ export declare function loadSecret(envVar: string, secretFile: string): Promise<
|
|
|
12
12
|
* Load an API key from environment variable or secret file, with error handling
|
|
13
13
|
* @param envVar - Environment variable name
|
|
14
14
|
* @param secretFile - Path to secret file
|
|
15
|
-
* @param displayName - Human-readable name for error messages (e.g., '
|
|
15
|
+
* @param displayName - Human-readable name for error messages. Defaults to capitalized envVar (e.g., 'MISTRAL_API_KEY' -> 'Mistral Api Key')
|
|
16
16
|
* @returns The API key
|
|
17
17
|
* @throws If the key is not found
|
|
18
18
|
*/
|
|
19
|
-
export declare function loadSecretOrThrow(envVar: string, secretFile: string, displayName
|
|
19
|
+
export declare function loadSecretOrThrow(envVar: string, secretFile: string, displayName?: string): Promise<string>;
|
|
20
20
|
//# sourceMappingURL=secrets.d.ts.map
|
package/dist/secrets.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secrets.d.ts","sourceRoot":"","sources":["../src/secrets.ts"],"names":[],"mappings":"AAEA;;GAEG;AAEH;;;;;GAKG;AACH,wBAAsB,UAAU,CAAC,MAAM,EAAE,MAAM,EAAE,UAAU,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,GAAG,SAAS,CAAC,CAahG;AAED;;;;;;;GAOG;AACH,wBAAsB,iBAAiB,CACtC,MAAM,EAAE,MAAM,EACd,UAAU,EAAE,MAAM,EAClB,WAAW,EAAE,MAAM,
|
|
1
|
+
{"version":3,"file":"secrets.d.ts","sourceRoot":"","sources":["../src/secrets.ts"],"names":[],"mappings":"AAEA;;GAEG;AAEH;;;;;GAKG;AACH,wBAAsB,UAAU,CAAC,MAAM,EAAE,MAAM,EAAE,UAAU,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,GAAG,SAAS,CAAC,CAahG;AAED;;;;;;;GAOG;AACH,wBAAsB,iBAAiB,CACtC,MAAM,EAAE,MAAM,EACd,UAAU,EAAE,MAAM,EAClB,WAAW,CAAC,EAAE,MAAM,GAClB,OAAO,CAAC,MAAM,CAAC,CASjB"}
|
package/dist/secrets.min.js
CHANGED
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@wovin/daemon-utils",
|
|
3
|
-
"version": "0.0.
|
|
3
|
+
"version": "0.0.21",
|
|
4
4
|
"type": "module",
|
|
5
5
|
"main": "./dist/index.min.js",
|
|
6
6
|
"module": "./dist/index.min.js",
|
|
@@ -18,8 +18,8 @@
|
|
|
18
18
|
"access": "public"
|
|
19
19
|
},
|
|
20
20
|
"peerDependencies": {
|
|
21
|
-
"@wovin/core": "0.0.
|
|
22
|
-
"@wovin/connect-ucan-store-proxy": "0.0.
|
|
21
|
+
"@wovin/core": "0.0.21",
|
|
22
|
+
"@wovin/connect-ucan-store-proxy": "0.0.21"
|
|
23
23
|
},
|
|
24
24
|
"dependencies": {
|
|
25
25
|
"besonders-logger": "1.0.2",
|
|
@@ -29,8 +29,8 @@
|
|
|
29
29
|
},
|
|
30
30
|
"devDependencies": {
|
|
31
31
|
"@types/node": "^22.15.21",
|
|
32
|
-
"@wovin/connect-ucan-store-proxy": "0.0.
|
|
33
|
-
"@wovin/core": "0.0.
|
|
32
|
+
"@wovin/connect-ucan-store-proxy": "0.0.21",
|
|
33
|
+
"@wovin/core": "0.0.21",
|
|
34
34
|
"concurrently": "^8.2.2",
|
|
35
35
|
"tsup": "^8.5.0",
|
|
36
36
|
"tsx": "^4.19.2",
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"sources":["../src/secrets.ts"],"sourcesContent":["import { readFile } from 'node:fs/promises'\n\n/**\n * Utility functions for loading API keys from environment variables or secret files\n */\n\n/**\n * Load an API key from environment variable or secret file\n * @param envVar - Environment variable name (e.g., 'REGOLO_API_KEY')\n * @param secretFile - Path to secret file (e.g., 'secret/regolo')\n * @returns The API key, or undefined if not found\n */\nexport async function loadSecret(envVar: string, secretFile: string): Promise<string | undefined> {\n\t// Try environment variable first\n\tconst envValue = process.env[envVar]\n\tif (envValue) return envValue\n\n\t// Fall back to secret file\n\ttry {\n\t\tconst fileContent = await readFile(secretFile, 'utf-8')\n\t\treturn fileContent.trim() || undefined\n\t} catch {\n\t\t// File doesn't exist or can't be read\n\t\treturn undefined\n\t}\n}\n\n/**\n * Load an API key from environment variable or secret file, with error handling\n * @param envVar - Environment variable name\n * @param secretFile - Path to secret file\n * @param displayName - Human-readable name for error messages (e.g., 'REGOLO API key')\n * @returns The API key\n * @throws If the key is not found\n */\nexport async function loadSecretOrThrow(\n\tenvVar: string,\n\tsecretFile: string,\n\tdisplayName: string,\n): Promise<string> {\n\tconst secret = await loadSecret(envVar, secretFile)\n\tif (!secret) {\n\t\tthrow new Error(\n\t\t\t`${displayName} not found. Set ${envVar} environment variable or create ${secretFile} file`,\n\t\t)\n\t}\n\treturn secret\n}\n"],"mappings":";AAAA,SAAS,gBAAgB;AAYzB,eAAsB,WAAW,QAAgB,YAAiD;AAEjG,QAAM,WAAW,QAAQ,IAAI,MAAM;AACnC,MAAI,SAAU,QAAO;AAGrB,MAAI;AACH,UAAM,cAAc,MAAM,SAAS,YAAY,OAAO;AACtD,WAAO,YAAY,KAAK,KAAK;AAAA,EAC9B,QAAQ;AAEP,WAAO;AAAA,EACR;AACD;AAUA,eAAsB,kBACrB,QACA,YACA,aACkB;AAClB,QAAM,SAAS,MAAM,WAAW,QAAQ,UAAU;AAClD,MAAI,CAAC,QAAQ;AACZ,UAAM,IAAI;AAAA,MACT,GAAG,WAAW,mBAAmB,MAAM,mCAAmC,UAAU;AAAA,IACrF;AAAA,EACD;AACA,SAAO;AACR;","names":[]}
|