npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2024 – Pkg Stats / Ryan Hefner

@reactioncommerce/merge-sops-secrets

v1.2.1

Published

Decrypt sops secret files and combine into a helm values yaml file

Downloads

6

Readme

Merge sops secrets

These are command-line utilities that help with decrypting secrets via sops in the context of kubernetes and/or helm.

Prerequisites

  • node.js with npx
    • npx shipped with node since version 8 I think, but version 12 or newer recommended
  • sops command line tool
  • valid AWS credentials configured (via env vars, profile, etc)

CLI Usage: merge-sops-secrets

merge-sops-secrets will enhance a helm chart values.yaml file with a bunch of extra data from encrypted sops files on disk.

npx --quiet --package @reactioncommerce/merge-sops-secrets --command merge-sops-secrets path/to/my/values.yaml

  • Pass the path to your values.yaml file as the first command line argument

A final JSON document (which is also valid YAML) will be written to standard output. You can pipe this in to the helm CLI using /dev/stdin for the values path.

Data File Layout

This program expects your encrypted files:

  • are in the same directory as your values.yaml
  • Filename is MY_VAR.sops where MY_VAR is your environment variable name

Example

Chart.yaml
README.md
templates
templates/deployment.yaml
templates/service.yaml
values-acme-staging
values-acme-staging/AWS_ACCESS_KEY_ID.sops
values-acme-staging/DATABASE_PASSWORD.sops
values-acme-staging/SAMPLE_API_KEY.sops
values-acme-staging/values.yml

CLI Usage: sops-to-secret

sops-to-secret will enhance a kubernetes secret.yaml file with a bunch of extra data from encrypted sops files on disk.

npx --quiet --package @reactioncommerce/merge-sops-secrets --command sops-to-secret path/to/secret-stub.yaml > path/to/secret.yaml

Data File Layout

This program expects your encrypted files:

  • are in subdirectory named .sops from where your secrets-stub.yaml file lives
  • Filename is MY_VAR.enc where MY_VAR is your environment variable name

Example

secret-stub.yaml
.sops/AWS_ACCESS_KEY_ID.enc
.sops/DATABASE_PASSWORD.enc
.sops/SAMPLE_API_KEY.enc