├── .gitignore ├── .babelrc ├── webpack.config.js ├── .eslintrc ├── package.json ├── README.md ├── src └── index.js └── dist └── index.js /.gitignore: -------------------------------------------------------------------------------- 1 | node_modules 2 | .vault* 3 | _* -------------------------------------------------------------------------------- /.babelrc: -------------------------------------------------------------------------------- 1 | { 2 | "presets": [ 3 | "es2015", 4 | "react", 5 | "stage-0" 6 | ], 7 | "plugins": [ 8 | "transform-decorators-legacy", 9 | "transform-decorators", 10 | "transform-runtime", 11 | "transform-class-properties", 12 | "add-module-exports" 13 | ] 14 | } -------------------------------------------------------------------------------- /webpack.config.js: -------------------------------------------------------------------------------- 1 | module.exports = { 2 | target: 'node', 3 | node: { 4 | __dirname: false, 5 | __filename: false 6 | }, 7 | entry: './src/index', 8 | output: { 9 | path: __dirname + '/dist', 10 | libraryTarget: 'commonjs2', 11 | filename: 'index.js' 12 | }, 13 | externals: [require('webpack-node-externals')()], 14 | module: { 15 | loaders: [ 16 | {test: /\.js$/, loader: 'babel-loader'} 17 | ] 18 | }, 19 | devtool: 'inline-source-map' 20 | }; -------------------------------------------------------------------------------- /.eslintrc: -------------------------------------------------------------------------------- 1 | { 2 | "parser": "babel-eslint", 3 | "env": { 4 | "node": true 5 | }, 6 | "plugins": [ 7 | "babel" 8 | ], 9 | "rules": { 10 | "prefer-arrow-callback": "error", 11 | "wrap-iife": ["error", "inside"], 12 | "babel/func-params-comma-dangle": 1, 13 | "no-var": 1, 14 | "no-redeclare": 1, 15 | "no-undef": 1, 16 | "strict": 1, 17 | "no-unused-vars": 1, 18 | "semi": [1, "always"], // require or disallow use of semicolons instead of ASI 19 | "semi-spacing": [1, {"before": false, "after": true}], // enforce spacing before and after semicolons 20 | "quotes": ["error", "single"] 21 | } 22 | } -------------------------------------------------------------------------------- /package.json: -------------------------------------------------------------------------------- 1 | { 2 | "name": "vault-config", 3 | "version": "0.0.23", 4 | "description": "an insanely simple way to back your apps config by vault", 5 | "main": "dist/index.js", 6 | "scripts": { 7 | "test": "echo \"Error: no test specified\" && exit 1", 8 | "build": "./node_modules/.bin/webpack --config webpack.config.js" 9 | }, 10 | "repository": { 11 | "type": "git", 12 | "url": "https://github.com/icodeforlove/vault-config.git" 13 | }, 14 | "author": { 15 | "name": "Chad Scira", 16 | "email": "chadvscira@gmail.com" 17 | }, 18 | "license": "MIT", 19 | "dependencies": { 20 | "app-root-path": "2.2.1", 21 | "atmpt": "1.0.3", 22 | "babel-runtime": "6.11.6", 23 | "deasync": "0.1.15", 24 | "debug": "4.1.1", 25 | "deep-extend": "0.6.0", 26 | "fs-promise": "2.0.3", 27 | "node-vault": "0.9.0", 28 | "vault-get": "0.0.12" 29 | }, 30 | "devDependencies": { 31 | "babel": "6.5.2", 32 | "babel-cli": "6.14.0", 33 | "babel-eslint": "6.1.2", 34 | "babel-loader": "6.2.5", 35 | "babel-plugin-add-module-exports": "0.2.1", 36 | "babel-plugin-transform-class-properties": "6.11.5", 37 | "babel-plugin-transform-decorators": "6.13.0", 38 | "babel-plugin-transform-decorators-legacy": "1.3.4", 39 | "babel-plugin-transform-runtime": "6.12.0", 40 | "babel-preset-es2015": "6.14.0", 41 | "babel-preset-react": "6.11.1", 42 | "babel-preset-stage-0": "6.5.0", 43 | "eslint": "3.4.0", 44 | "eslint-plugin-babel": "3.3.0", 45 | "webpack": "1.13.2", 46 | "webpack-node-externals": "1.4.3" 47 | } 48 | } 49 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # vault-config 2 | 3 | an insanely simple way to back your apps config by vault, and make it committable 4 | 5 | [node-config](https://github.com/lorenwest/node-config) inspired config that is backed by hashicorp vault that is backed by [vault-get](https://github.com/icodeforlove/vault-get) data interface 6 | 7 | ![image](https://img42.com/grqHE+) 8 | 9 | ## install 10 | 11 | ```bash 12 | npm install vault-config 13 | ``` 14 | 15 | ## usage 16 | 17 | setup your `.vaultrc` (you can commit this to your repo) 18 | 19 | ```javascript 20 | { 21 | "VAULT_CONFIG_ENDPOINT": "...", // or use env var (required) 22 | "VAULT_CONFIG_ROOT_PATH": "...", // or use env var (default "secret") 23 | "VAULT_CONFIG_SECRET_SHARES": "...", // or use env var (default 1) 24 | 25 | "NODE_ENV=.*": { // default config (every other match extends this) 26 | "vault": { // vault-get interface 27 | "database": { 28 | "host": "website.com/databases/mysql/master/host", 29 | "username": "website.com/databases/mysql/master/username", 30 | "password": "website.com/databases/mysql/master/password" 31 | } 32 | } 33 | }, 34 | 35 | "NODE_ENV=development": { 36 | "local": { // local temp overrides 37 | "database": { 38 | "host": "localhost", 39 | "username": "root", 40 | "password": "" 41 | } 42 | } 43 | }, 44 | 45 | "NODE_ENV=production": { 46 | "vault": { // vault-get interface 47 | "gmail": { 48 | "username": "prod.website.com/accounts/gmail/username", 49 | "password": "prod.website.com/accounts/gmail/password" 50 | } 51 | } 52 | } 53 | } 54 | ``` 55 | 56 | setup your `.vaultsecrets` (do not commit to repo) 57 | 58 | ```javascript 59 | { 60 | "VAULT_CONFIG_TOKEN": "...", // or use env var (required) 61 | "VAULT_CONFIG_KEYS": ["...", "..."], // or use env var (optional) 62 | "VAULT_CONFIG_KEY": "..." // or use env var (optional) 63 | } 64 | ``` 65 | 66 | if everything is correct you should be able to do the following 67 | 68 | ```javascript 69 | // blocks on first module load if vault keys are requested 70 | import config from 'vault-config'; 71 | 72 | console.log(config); 73 | ``` 74 | 75 | which would log out the following 76 | 77 | ```javascript 78 | // in development 79 | { 80 | database: { 81 | host: 'localhost', 82 | username: 'root', 83 | password: '' 84 | } 85 | } 86 | 87 | // in production 88 | { 89 | database: { 90 | host: 'VAULE OBTAINED FROM VAULT', 91 | username: 'VAULE OBTAINED FROM VAULT', 92 | password: 'VAULE OBTAINED FROM VAULT' 93 | }, 94 | gmail: { 95 | username: 'VAULE OBTAINED FROM VAULT', 96 | password: 'VAULE OBTAINED FROM VAULT' 97 | } 98 | } 99 | ``` 100 | 101 | You can also specify the location of the `.vaultrc` / `.vaultsecret` files via env variables 102 | 103 | ``` 104 | VAULT_CONFIG_RCPATH=/path/to/.vaultrc 105 | VAULT_CONFIG_SECRETSPATH=/path/to/.vaultsecret 106 | ``` 107 | 108 | ## autorenew (token renewal) 109 | 110 | by default tokens will be autorenewed you can disable this by specifying `VAULT_AUTORENEW_DISABLED=1`, and you can override the increment by doing `VAULT_AUTORENEW_INCREMENT=86400` 111 | 112 | ## localoverrides 113 | 114 | you can create a `.vaultlocalrc` next to your `.vaultrc` and it will merge into `.vaultrc` (a `.vaultlocalrc` is not intended to be commited) 115 | 116 | ## debugging 117 | 118 | ```javascript 119 | DEBUG=vault ... 120 | ``` 121 | -------------------------------------------------------------------------------- /src/index.js: -------------------------------------------------------------------------------- 1 | import VaultRaw from 'node-vault'; 2 | import Vault from 'vault-get'; 3 | import fs from 'fs-promise'; 4 | import deasync from 'deasync'; 5 | import __rootdirname from 'app-root-path'; 6 | import extend from 'deep-extend'; 7 | import Debug from 'debug'; 8 | import atmpt from 'atmpt'; 9 | 10 | const debug = Debug('vault-config'); 11 | const VAULT_CONFIG_RCPATH = process.env.VAULT_CONFIG_RCPATH || `${__rootdirname}/.vaultrc`; 12 | const VAULT_CONFIG_SECRETSPATH = process.env.VAULT_CONFIG_SECRETSPATH || `${__rootdirname}/.vaultsecrets`; 13 | const VAULT_GLOBAL = '__vault-config-shared__'; 14 | 15 | async function renewToken (settings, increment) { 16 | let vault = VaultRaw({ 17 | apiVersion: 'v1', 18 | endpoint: settings.VAULT_CONFIG_ENDPOINT, 19 | token: settings.VAULT_CONFIG_TOKEN 20 | }); 21 | await vault.tokenRenewSelf({increment: increment}); 22 | } 23 | 24 | async function loadConfigAsync () { 25 | if (process[VAULT_GLOBAL]) { 26 | return process[VAULT_GLOBAL]; 27 | } 28 | 29 | let vaultrc, 30 | vaultlocalrc, 31 | vaultsecrets; 32 | 33 | try { 34 | vaultrc = await fs.readFile(VAULT_CONFIG_RCPATH, 'utf8'); 35 | } catch (error) { 36 | throw new Error(`vault-config: can't find "${VAULT_CONFIG_RCPATH}"\n${error.stack}`); 37 | } 38 | try { 39 | vaultrc = JSON.parse(vaultrc); 40 | } catch (error) { 41 | throw new Error(`vault-config: can't parse JSON in "${VAULT_CONFIG_RCPATH}"\n${error.stack}`); 42 | } 43 | 44 | try { 45 | vaultlocalrc = await fs.readFile(`${__rootdirname}/.vaultlocalrc`, 'utf8'); 46 | } catch (error) {} 47 | if (vaultlocalrc) { 48 | try { 49 | vaultlocalrc = JSON.parse(vaultlocalrc); 50 | vaultrc = extend(vaultrc, vaultlocalrc); 51 | } catch (error) { 52 | throw new Error(`vault-config: can't parse JSON in "${__rootdirname}/.vaultlocalrc"\n${error.stack}`); 53 | } 54 | } 55 | 56 | try { 57 | vaultsecrets = await fs.readFile(VAULT_CONFIG_SECRETSPATH, 'utf8'); 58 | } catch (error) { 59 | vaultsecrets = {}; 60 | } 61 | if (typeof vaultsecrets === 'string') { 62 | try { 63 | vaultsecrets = JSON.parse(vaultsecrets); 64 | } catch (error) { 65 | throw new Error(`vault-config: can't parse JSON in "${VAULT_CONFIG_SECRETSPATH}"\n${error.stack}`); 66 | } 67 | } 68 | 69 | // merge configs 70 | let configs = Object.keys(vaultrc) 71 | .map(key => { 72 | let envMatch = key.match(/^NODE_ENV=(.+)/), 73 | nodeEnv = process.env.NODE_ENV || ''; 74 | 75 | if (envMatch && nodeEnv.match(`^${envMatch[1]}$`)) { 76 | return key; 77 | } 78 | }) 79 | .filter(key => key) 80 | .map(key => vaultrc[key]); 81 | 82 | if (configs.length) { 83 | configs = configs.reduce(extend); 84 | configs.vault = configs.vault || {}; 85 | configs.local = configs.local || {}; 86 | 87 | // break out early, we have no matching vault rules 88 | if (!Object.keys(configs.vault).length) { 89 | return configs.local; 90 | } 91 | } else { 92 | // break out early, we dont have any rules 93 | return {}; 94 | } 95 | 96 | let settings = {}; 97 | settings.VAULT_CONFIG_TOKEN = process.env.VAULT_CONFIG_TOKEN || vaultsecrets.VAULT_CONFIG_TOKEN; 98 | settings.VAULT_CONFIG_KEY = process.env.VAULT_CONFIG_KEY || vaultsecrets.VAULT_CONFIG_KEY; 99 | if (process.env.VAULT_CONFIG_KEYS) { 100 | settings.VAULT_CONFIG_KEYS = process.env.VAULT_CONFIG_KEYS.split(','); 101 | } else { 102 | settings.VAULT_CONFIG_KEYS = vaultsecrets.VAULT_CONFIG_KEYS; 103 | } 104 | settings.VAULT_CONFIG_ENDPOINT = vaultrc.VAULT_CONFIG_ENDPOINT || process.env.VAULT_CONFIG_ENDPOINT; 105 | settings.VAULT_CONFIG_ROOTPATH = vaultrc.VAULT_CONFIG_ROOTPATH || process.env.VAULT_CONFIG_ROOTPATH; 106 | settings.VAULT_CONFIG_SECRET_SHARES = vaultrc.VAULT_CONFIG_SECRET_SHARES || process.env.VAULT_CONFIG_SECRET_SHARES; 107 | 108 | if (!settings.VAULT_CONFIG_ENDPOINT) { 109 | debug('missing "VAULT_CONFIG_ENDPOINT"'); 110 | return configs.local; 111 | } 112 | 113 | if (!settings.VAULT_CONFIG_TOKEN) { 114 | throw new Error('vault-config: missing "VAULT_CONFIG_TOKEN"'); 115 | } 116 | 117 | let vault = Vault({ 118 | endpoint: settings.VAULT_CONFIG_ENDPOINT, 119 | token: settings.VAULT_CONFIG_TOKEN, 120 | keys: settings.VAULT_CONFIG_KEYS, 121 | key: settings.VAULT_CONFIG_KEY, 122 | rootPath: settings.VAULT_CONFIG_ROOTPATH, 123 | secretShares: settings.VAULT_CONFIG_SECRET_SHARES 124 | }); 125 | 126 | try { 127 | if (!process.env.VAULT_DISABLE_AUTORENEW) { 128 | const increment = parseInt(process.env.VAULT_AUTORENEW_INCREMENT || 2580000, 10); 129 | await renewToken(settings, increment); 130 | } 131 | configs.vault = await vault.get(configs.vault); 132 | } catch (error) { 133 | error.message = `vault-config: \n${error.message}`; 134 | throw error; 135 | } 136 | 137 | return process[VAULT_GLOBAL] = extend(configs.vault, configs.local); 138 | } 139 | 140 | export default deasync(callback => { 141 | atmpt(loadConfigAsync, {maxAttempts: 10, delay: attempt => attempt * 1000}).then( 142 | config => callback(null, config), 143 | callback 144 | ).catch(callback); 145 | })(); -------------------------------------------------------------------------------- /dist/index.js: -------------------------------------------------------------------------------- 1 | module.exports = 2 | /******/ (function(modules) { // webpackBootstrap 3 | /******/ // The module cache 4 | /******/ var installedModules = {}; 5 | /******/ 6 | /******/ // The require function 7 | /******/ function __webpack_require__(moduleId) { 8 | /******/ 9 | /******/ // Check if module is in cache 10 | /******/ if(installedModules[moduleId]) 11 | /******/ return installedModules[moduleId].exports; 12 | /******/ 13 | /******/ // Create a new module (and put it into the cache) 14 | /******/ var module = installedModules[moduleId] = { 15 | /******/ exports: {}, 16 | /******/ id: moduleId, 17 | /******/ loaded: false 18 | /******/ }; 19 | /******/ 20 | /******/ // Execute the module function 21 | /******/ modules[moduleId].call(module.exports, module, module.exports, __webpack_require__); 22 | /******/ 23 | /******/ // Flag the module as loaded 24 | /******/ module.loaded = true; 25 | /******/ 26 | /******/ // Return the exports of the module 27 | /******/ return module.exports; 28 | /******/ } 29 | /******/ 30 | /******/ 31 | /******/ // expose the modules object (__webpack_modules__) 32 | /******/ __webpack_require__.m = modules; 33 | /******/ 34 | /******/ // expose the module cache 35 | /******/ __webpack_require__.c = installedModules; 36 | /******/ 37 | /******/ // __webpack_public_path__ 38 | /******/ __webpack_require__.p = ""; 39 | /******/ 40 | /******/ // Load entry module and return exports 41 | /******/ return __webpack_require__(0); 42 | /******/ }) 43 | /************************************************************************/ 44 | /******/ ([ 45 | /* 0 */ 46 | /***/ function(module, exports, __webpack_require__) { 47 | 48 | 'use strict'; 49 | 50 | Object.defineProperty(exports, "__esModule", { 51 | value: true 52 | }); 53 | 54 | var _keys = __webpack_require__(1); 55 | 56 | var _keys2 = _interopRequireDefault(_keys); 57 | 58 | var _regenerator = __webpack_require__(2); 59 | 60 | var _regenerator2 = _interopRequireDefault(_regenerator); 61 | 62 | var _asyncToGenerator2 = __webpack_require__(3); 63 | 64 | var _asyncToGenerator3 = _interopRequireDefault(_asyncToGenerator2); 65 | 66 | var renewToken = function () { 67 | var _ref = (0, _asyncToGenerator3.default)( /*#__PURE__*/_regenerator2.default.mark(function _callee(settings, increment) { 68 | var vault; 69 | return _regenerator2.default.wrap(function _callee$(_context) { 70 | while (1) { 71 | switch (_context.prev = _context.next) { 72 | case 0: 73 | vault = (0, _nodeVault2.default)({ 74 | apiVersion: 'v1', 75 | endpoint: settings.VAULT_CONFIG_ENDPOINT, 76 | token: settings.VAULT_CONFIG_TOKEN 77 | }); 78 | _context.next = 3; 79 | return vault.tokenRenewSelf({ increment: increment }); 80 | 81 | case 3: 82 | case 'end': 83 | return _context.stop(); 84 | } 85 | } 86 | }, _callee, this); 87 | })); 88 | 89 | return function renewToken(_x, _x2) { 90 | return _ref.apply(this, arguments); 91 | }; 92 | }(); 93 | 94 | var loadConfigAsync = function () { 95 | var _ref2 = (0, _asyncToGenerator3.default)( /*#__PURE__*/_regenerator2.default.mark(function _callee2() { 96 | var vaultrc, vaultlocalrc, vaultsecrets, configs, settings, vault, increment; 97 | return _regenerator2.default.wrap(function _callee2$(_context2) { 98 | while (1) { 99 | switch (_context2.prev = _context2.next) { 100 | case 0: 101 | if (!process[VAULT_GLOBAL]) { 102 | _context2.next = 2; 103 | break; 104 | } 105 | 106 | return _context2.abrupt('return', process[VAULT_GLOBAL]); 107 | 108 | case 2: 109 | vaultrc = void 0, vaultlocalrc = void 0, vaultsecrets = void 0; 110 | _context2.prev = 3; 111 | _context2.next = 6; 112 | return _fsPromise2.default.readFile(VAULT_CONFIG_RCPATH, 'utf8'); 113 | 114 | case 6: 115 | vaultrc = _context2.sent; 116 | _context2.next = 12; 117 | break; 118 | 119 | case 9: 120 | _context2.prev = 9; 121 | _context2.t0 = _context2['catch'](3); 122 | throw new Error('vault-config: can\'t find "' + VAULT_CONFIG_RCPATH + '"\n' + _context2.t0.stack); 123 | 124 | case 12: 125 | _context2.prev = 12; 126 | 127 | vaultrc = JSON.parse(vaultrc); 128 | _context2.next = 19; 129 | break; 130 | 131 | case 16: 132 | _context2.prev = 16; 133 | _context2.t1 = _context2['catch'](12); 134 | throw new Error('vault-config: can\'t parse JSON in "' + VAULT_CONFIG_RCPATH + '"\n' + _context2.t1.stack); 135 | 136 | case 19: 137 | _context2.prev = 19; 138 | _context2.next = 22; 139 | return _fsPromise2.default.readFile(_appRootPath2.default + '/.vaultlocalrc', 'utf8'); 140 | 141 | case 22: 142 | vaultlocalrc = _context2.sent; 143 | _context2.next = 27; 144 | break; 145 | 146 | case 25: 147 | _context2.prev = 25; 148 | _context2.t2 = _context2['catch'](19); 149 | 150 | case 27: 151 | if (!vaultlocalrc) { 152 | _context2.next = 36; 153 | break; 154 | } 155 | 156 | _context2.prev = 28; 157 | 158 | vaultlocalrc = JSON.parse(vaultlocalrc); 159 | vaultrc = (0, _deepExtend2.default)(vaultrc, vaultlocalrc); 160 | _context2.next = 36; 161 | break; 162 | 163 | case 33: 164 | _context2.prev = 33; 165 | _context2.t3 = _context2['catch'](28); 166 | throw new Error('vault-config: can\'t parse JSON in "' + _appRootPath2.default + '/.vaultlocalrc"\n' + _context2.t3.stack); 167 | 168 | case 36: 169 | _context2.prev = 36; 170 | _context2.next = 39; 171 | return _fsPromise2.default.readFile(VAULT_CONFIG_SECRETSPATH, 'utf8'); 172 | 173 | case 39: 174 | vaultsecrets = _context2.sent; 175 | _context2.next = 45; 176 | break; 177 | 178 | case 42: 179 | _context2.prev = 42; 180 | _context2.t4 = _context2['catch'](36); 181 | 182 | vaultsecrets = {}; 183 | 184 | case 45: 185 | if (!(typeof vaultsecrets === 'string')) { 186 | _context2.next = 53; 187 | break; 188 | } 189 | 190 | _context2.prev = 46; 191 | 192 | vaultsecrets = JSON.parse(vaultsecrets); 193 | _context2.next = 53; 194 | break; 195 | 196 | case 50: 197 | _context2.prev = 50; 198 | _context2.t5 = _context2['catch'](46); 199 | throw new Error('vault-config: can\'t parse JSON in "' + VAULT_CONFIG_SECRETSPATH + '"\n' + _context2.t5.stack); 200 | 201 | case 53: 202 | 203 | // merge configs 204 | configs = (0, _keys2.default)(vaultrc).map(function (key) { 205 | var envMatch = key.match(/^NODE_ENV=(.+)/), 206 | nodeEnv = process.env.NODE_ENV || ''; 207 | 208 | if (envMatch && nodeEnv.match('^' + envMatch[1] + '$')) { 209 | return key; 210 | } 211 | }).filter(function (key) { 212 | return key; 213 | }).map(function (key) { 214 | return vaultrc[key]; 215 | }); 216 | 217 | if (!configs.length) { 218 | _context2.next = 62; 219 | break; 220 | } 221 | 222 | configs = configs.reduce(_deepExtend2.default); 223 | configs.vault = configs.vault || {}; 224 | configs.local = configs.local || {}; 225 | 226 | // break out early, we have no matching vault rules 227 | 228 | if ((0, _keys2.default)(configs.vault).length) { 229 | _context2.next = 60; 230 | break; 231 | } 232 | 233 | return _context2.abrupt('return', configs.local); 234 | 235 | case 60: 236 | _context2.next = 63; 237 | break; 238 | 239 | case 62: 240 | return _context2.abrupt('return', {}); 241 | 242 | case 63: 243 | settings = {}; 244 | 245 | settings.VAULT_CONFIG_TOKEN = process.env.VAULT_CONFIG_TOKEN || vaultsecrets.VAULT_CONFIG_TOKEN; 246 | settings.VAULT_CONFIG_KEY = process.env.VAULT_CONFIG_KEY || vaultsecrets.VAULT_CONFIG_KEY; 247 | if (process.env.VAULT_CONFIG_KEYS) { 248 | settings.VAULT_CONFIG_KEYS = process.env.VAULT_CONFIG_KEYS.split(','); 249 | } else { 250 | settings.VAULT_CONFIG_KEYS = vaultsecrets.VAULT_CONFIG_KEYS; 251 | } 252 | settings.VAULT_CONFIG_ENDPOINT = vaultrc.VAULT_CONFIG_ENDPOINT || process.env.VAULT_CONFIG_ENDPOINT; 253 | settings.VAULT_CONFIG_ROOTPATH = vaultrc.VAULT_CONFIG_ROOTPATH || process.env.VAULT_CONFIG_ROOTPATH; 254 | settings.VAULT_CONFIG_SECRET_SHARES = vaultrc.VAULT_CONFIG_SECRET_SHARES || process.env.VAULT_CONFIG_SECRET_SHARES; 255 | 256 | if (settings.VAULT_CONFIG_ENDPOINT) { 257 | _context2.next = 73; 258 | break; 259 | } 260 | 261 | debug('missing "VAULT_CONFIG_ENDPOINT"'); 262 | return _context2.abrupt('return', configs.local); 263 | 264 | case 73: 265 | if (settings.VAULT_CONFIG_TOKEN) { 266 | _context2.next = 75; 267 | break; 268 | } 269 | 270 | throw new Error('vault-config: missing "VAULT_CONFIG_TOKEN"'); 271 | 272 | case 75: 273 | vault = (0, _vaultGet2.default)({ 274 | endpoint: settings.VAULT_CONFIG_ENDPOINT, 275 | token: settings.VAULT_CONFIG_TOKEN, 276 | keys: settings.VAULT_CONFIG_KEYS, 277 | key: settings.VAULT_CONFIG_KEY, 278 | rootPath: settings.VAULT_CONFIG_ROOTPATH, 279 | secretShares: settings.VAULT_CONFIG_SECRET_SHARES 280 | }); 281 | _context2.prev = 76; 282 | 283 | if (process.env.VAULT_DISABLE_AUTORENEW) { 284 | _context2.next = 81; 285 | break; 286 | } 287 | 288 | increment = parseInt(process.env.VAULT_AUTORENEW_INCREMENT || 2580000, 10); 289 | _context2.next = 81; 290 | return renewToken(settings, increment); 291 | 292 | case 81: 293 | _context2.next = 83; 294 | return vault.get(configs.vault); 295 | 296 | case 83: 297 | configs.vault = _context2.sent; 298 | _context2.next = 90; 299 | break; 300 | 301 | case 86: 302 | _context2.prev = 86; 303 | _context2.t6 = _context2['catch'](76); 304 | 305 | _context2.t6.message = 'vault-config: \n' + _context2.t6.message; 306 | throw _context2.t6; 307 | 308 | case 90: 309 | return _context2.abrupt('return', process[VAULT_GLOBAL] = (0, _deepExtend2.default)(configs.vault, configs.local)); 310 | 311 | case 91: 312 | case 'end': 313 | return _context2.stop(); 314 | } 315 | } 316 | }, _callee2, this, [[3, 9], [12, 16], [19, 25], [28, 33], [36, 42], [46, 50], [76, 86]]); 317 | })); 318 | 319 | return function loadConfigAsync() { 320 | return _ref2.apply(this, arguments); 321 | }; 322 | }(); 323 | 324 | var _nodeVault = __webpack_require__(4); 325 | 326 | var _nodeVault2 = _interopRequireDefault(_nodeVault); 327 | 328 | var _vaultGet = __webpack_require__(5); 329 | 330 | var _vaultGet2 = _interopRequireDefault(_vaultGet); 331 | 332 | var _fsPromise = __webpack_require__(6); 333 | 334 | var _fsPromise2 = _interopRequireDefault(_fsPromise); 335 | 336 | var _deasync = __webpack_require__(7); 337 | 338 | var _deasync2 = _interopRequireDefault(_deasync); 339 | 340 | var _appRootPath = __webpack_require__(8); 341 | 342 | var _appRootPath2 = _interopRequireDefault(_appRootPath); 343 | 344 | var _deepExtend = __webpack_require__(9); 345 | 346 | var _deepExtend2 = _interopRequireDefault(_deepExtend); 347 | 348 | var _debug = __webpack_require__(10); 349 | 350 | var _debug2 = _interopRequireDefault(_debug); 351 | 352 | var _atmpt = __webpack_require__(11); 353 | 354 | var _atmpt2 = _interopRequireDefault(_atmpt); 355 | 356 | function _interopRequireDefault(obj) { return obj && obj.__esModule ? obj : { default: obj }; } 357 | 358 | var debug = (0, _debug2.default)('vault-config'); 359 | var VAULT_CONFIG_RCPATH = process.env.VAULT_CONFIG_RCPATH || _appRootPath2.default + '/.vaultrc'; 360 | var VAULT_CONFIG_SECRETSPATH = process.env.VAULT_CONFIG_SECRETSPATH || _appRootPath2.default + '/.vaultsecrets'; 361 | var VAULT_GLOBAL = '__vault-config-shared__'; 362 | 363 | exports.default = (0, _deasync2.default)(function (callback) { 364 | (0, _atmpt2.default)(loadConfigAsync, { maxAttempts: 10, delay: function delay(attempt) { 365 | return attempt * 1000; 366 | } }).then(function (config) { 367 | return callback(null, config); 368 | }, callback).catch(callback); 369 | })(); 370 | module.exports = exports['default']; 371 | 372 | /***/ }, 373 | /* 1 */ 374 | /***/ function(module, exports) { 375 | 376 | module.exports = require("babel-runtime/core-js/object/keys"); 377 | 378 | /***/ }, 379 | /* 2 */ 380 | /***/ function(module, exports) { 381 | 382 | module.exports = require("babel-runtime/regenerator"); 383 | 384 | /***/ }, 385 | /* 3 */ 386 | /***/ function(module, exports) { 387 | 388 | module.exports = require("babel-runtime/helpers/asyncToGenerator"); 389 | 390 | /***/ }, 391 | /* 4 */ 392 | /***/ function(module, exports) { 393 | 394 | module.exports = require("node-vault"); 395 | 396 | /***/ }, 397 | /* 5 */ 398 | /***/ function(module, exports) { 399 | 400 | module.exports = require("vault-get"); 401 | 402 | /***/ }, 403 | /* 6 */ 404 | /***/ function(module, exports) { 405 | 406 | module.exports = require("fs-promise"); 407 | 408 | /***/ }, 409 | /* 7 */ 410 | /***/ function(module, exports) { 411 | 412 | module.exports = require("deasync"); 413 | 414 | /***/ }, 415 | /* 8 */ 416 | /***/ function(module, exports) { 417 | 418 | module.exports = require("app-root-path"); 419 | 420 | /***/ }, 421 | /* 9 */ 422 | /***/ function(module, exports) { 423 | 424 | module.exports = require("deep-extend"); 425 | 426 | /***/ }, 427 | /* 10 */ 428 | /***/ function(module, exports) { 429 | 430 | module.exports = require("debug"); 431 | 432 | /***/ }, 433 | /* 11 */ 434 | /***/ function(module, exports) { 435 | 436 | module.exports = require("atmpt"); 437 | 438 | /***/ } 439 | /******/ ]); 440 | //# sourceMappingURL=data:application/json;charset=utf-8;base64,{"version":3,"sources":["webpack:///webpack/bootstrap e89aaefc6462bae90f06","webpack:///./src/index.js","webpack:///external \"babel-runtime/core-js/object/keys\"","webpack:///external \"babel-runtime/regenerator\"","webpack:///external \"babel-runtime/helpers/asyncToGenerator\"","webpack:///external \"node-vault\"","webpack:///external \"vault-get\"","webpack:///external \"fs-promise\"","webpack:///external \"deasync\"","webpack:///external \"app-root-path\"","webpack:///external \"deep-extend\"","webpack:///external \"debug\"","webpack:///external \"atmpt\""],"names":["settings","increment","vault","apiVersion","endpoint","VAULT_CONFIG_ENDPOINT","token","VAULT_CONFIG_TOKEN","tokenRenewSelf","renewToken","process","VAULT_GLOBAL","vaultrc","vaultlocalrc","vaultsecrets","fs","readFile","VAULT_CONFIG_RCPATH","Error","stack","JSON","parse","__rootdirname","VAULT_CONFIG_SECRETSPATH","configs","map","envMatch","key","match","nodeEnv","env","NODE_ENV","filter","length","reduce","extend","local","VAULT_CONFIG_KEY","VAULT_CONFIG_KEYS","split","VAULT_CONFIG_ROOTPATH","VAULT_CONFIG_SECRET_SHARES","debug","keys","rootPath","secretShares","VAULT_DISABLE_AUTORENEW","parseInt","VAULT_AUTORENEW_INCREMENT","get","message","loadConfigAsync","maxAttempts","delay","attempt","then","callback","config","catch"],"mappings":";;AAAA;AACA;;AAEA;AACA;;AAEA;AACA;AACA;;AAEA;AACA;AACA,uBAAe;AACf;AACA;AACA;;AAEA;AACA;;AAEA;AACA;;AAEA;AACA;AACA;;;AAGA;AACA;;AAEA;AACA;;AAEA;AACA;;AAEA;AACA;;;;;;;;;;;;;;;;;;;;;;;;;;sFCxBA,iBAA2BA,QAA3B,EAAqCC,SAArC;AAAA;AAAA;AAAA;AAAA;AAAA;AACKC,YADL,GACa,yBAAS;AACpBC,oBAAY,IADQ;AAEpBC,kBAAUJ,SAASK,qBAFC;AAGpBC,eAAON,SAASO;AAHI,QAAT,CADb;AAAA;AAAA,cAMOL,MAAMM,cAAN,CAAqB,EAACP,WAAWA,SAAZ,EAArB,CANP;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,G;;kBAAeQ,U;;;;;;uFASf;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,YACKC,QAAQC,YAAR,CADL;AAAA;AAAA;AAAA;;AAAA,yCAESD,QAAQC,YAAR,CAFT;;AAAA;AAKKC,cALL,WAMEC,YANF,WAOEC,YAPF;AAAA;AAAA;AAAA,cAUkBC,oBAAGC,QAAH,CAAYC,mBAAZ,EAAiC,MAAjC,CAVlB;;AAAA;AAUEL,cAVF;AAAA;AAAA;;AAAA;AAAA;AAAA;AAAA,aAYQ,IAAIM,KAAJ,iCAAuCD,mBAAvC,WAAgE,aAAME,KAAtE,CAZR;;AAAA;AAAA;;AAeEP,iBAAUQ,KAAKC,KAAL,CAAWT,OAAX,CAAV;AAfF;AAAA;;AAAA;AAAA;AAAA;AAAA,aAiBQ,IAAIM,KAAJ,0CAAgDD,mBAAhD,WAAyE,aAAME,KAA/E,CAjBR;;AAAA;AAAA;AAAA;AAAA,cAqBuBJ,oBAAGC,QAAH,CAAeM,qBAAf,qBAA8C,MAA9C,CArBvB;;AAAA;AAqBET,mBArBF;AAAA;AAAA;;AAAA;AAAA;AAAA;;AAAA;AAAA,YAuBKA,YAvBL;AAAA;AAAA;AAAA;;AAAA;;AAyBGA,sBAAeO,KAAKC,KAAL,CAAWR,YAAX,CAAf;AACAD,iBAAU,0BAAOA,OAAP,EAAgBC,YAAhB,CAAV;AA1BH;AAAA;;AAAA;AAAA;AAAA;AAAA,aA4BS,IAAIK,KAAJ,0CAAgDI,qBAAhD,yBAAiF,aAAMH,KAAvF,CA5BT;;AAAA;AAAA;AAAA;AAAA,cAiCuBJ,oBAAGC,QAAH,CAAYO,wBAAZ,EAAsC,MAAtC,CAjCvB;;AAAA;AAiCET,mBAjCF;AAAA;AAAA;;AAAA;AAAA;AAAA;;AAmCEA,sBAAe,EAAf;;AAnCF;AAAA,aAqCK,OAAOA,YAAP,KAAwB,QArC7B;AAAA;AAAA;AAAA;;AAAA;;AAuCGA,sBAAeM,KAAKC,KAAL,CAAWP,YAAX,CAAf;AAvCH;AAAA;;AAAA;AAAA;AAAA;AAAA,aAyCS,IAAII,KAAJ,0CAAgDK,wBAAhD,WAA8E,aAAMJ,KAApF,CAzCT;;AAAA;;AA6CC;AACIK,cA9CL,GA8Ce,oBAAYZ,OAAZ,EACZa,GADY,CACR,eAAO;AACX,YAAIC,WAAWC,IAAIC,KAAJ,CAAU,gBAAV,CAAf;AAAA,YACCC,UAAUnB,QAAQoB,GAAR,CAAYC,QAAZ,IAAwB,EADnC;;AAGA,YAAIL,YAAYG,QAAQD,KAAR,OAAkBF,SAAS,CAAT,CAAlB,OAAhB,EAAmD;AAClD,gBAAOC,GAAP;AACA;AACD,QARY,EASZK,MATY,CASL;AAAA,eAAOL,GAAP;AAAA,QATK,EAUZF,GAVY,CAUR;AAAA,eAAOb,QAAQe,GAAR,CAAP;AAAA,QAVQ,CA9Cf;;AAAA,YA0DKH,QAAQS,MA1Db;AAAA;AAAA;AAAA;;AA2DET,iBAAUA,QAAQU,MAAR,CAAeC,oBAAf,CAAV;AACAX,eAAQtB,KAAR,GAAgBsB,QAAQtB,KAAR,IAAiB,EAAjC;AACAsB,eAAQY,KAAR,GAAgBZ,QAAQY,KAAR,IAAiB,EAAjC;;AAEA;;AA/DF,WAgEO,oBAAYZ,QAAQtB,KAApB,EAA2B+B,MAhElC;AAAA;AAAA;AAAA;;AAAA,yCAiEUT,QAAQY,KAjElB;;AAAA;AAAA;AAAA;;AAAA;AAAA,yCAqES,EArET;;AAAA;AAwEKpC,eAxEL,GAwEgB,EAxEhB;;AAyECA,gBAASO,kBAAT,GAA8BG,QAAQoB,GAAR,CAAYvB,kBAAZ,IAAkCO,aAAaP,kBAA7E;AACAP,gBAASqC,gBAAT,GAA4B3B,QAAQoB,GAAR,CAAYO,gBAAZ,IAAgCvB,aAAauB,gBAAzE;AACA,WAAI3B,QAAQoB,GAAR,CAAYQ,iBAAhB,EAAmC;AAClCtC,iBAASsC,iBAAT,GAA6B5B,QAAQoB,GAAR,CAAYQ,iBAAZ,CAA8BC,KAA9B,CAAoC,GAApC,CAA7B;AACA,QAFD,MAEO;AACNvC,iBAASsC,iBAAT,GAA6BxB,aAAawB,iBAA1C;AACA;AACDtC,gBAASK,qBAAT,GAAiCO,QAAQP,qBAAR,IAAiCK,QAAQoB,GAAR,CAAYzB,qBAA9E;AACAL,gBAASwC,qBAAT,GAAiC5B,QAAQ4B,qBAAR,IAAiC9B,QAAQoB,GAAR,CAAYU,qBAA9E;AACAxC,gBAASyC,0BAAT,GAAsC7B,QAAQ6B,0BAAR,IAAsC/B,QAAQoB,GAAR,CAAYW,0BAAxF;;AAlFD,WAoFMzC,SAASK,qBApFf;AAAA;AAAA;AAAA;;AAqFEqC,aAAM,iCAAN;AArFF,yCAsFSlB,QAAQY,KAtFjB;;AAAA;AAAA,WAyFMpC,SAASO,kBAzFf;AAAA;AAAA;AAAA;;AAAA,aA0FQ,IAAIW,KAAJ,CAAU,4CAAV,CA1FR;;AAAA;AA6FKhB,YA7FL,GA6Fa,wBAAM;AACjBE,kBAAUJ,SAASK,qBADF;AAEjBC,eAAON,SAASO,kBAFC;AAGjBoC,cAAM3C,SAASsC,iBAHE;AAIjBX,aAAK3B,SAASqC,gBAJG;AAKjBO,kBAAU5C,SAASwC,qBALF;AAMjBK,sBAAc7C,SAASyC;AANN,QAAN,CA7Fb;AAAA;;AAAA,WAuGO/B,QAAQoB,GAAR,CAAYgB,uBAvGnB;AAAA;AAAA;AAAA;;AAwGS7C,gBAxGT,GAwGqB8C,SAASrC,QAAQoB,GAAR,CAAYkB,yBAAZ,IAAyC,OAAlD,EAA2D,EAA3D,CAxGrB;AAAA;AAAA,cAyGSvC,WAAWT,QAAX,EAAqBC,SAArB,CAzGT;;AAAA;AAAA;AAAA,cA2GwBC,MAAM+C,GAAN,CAAUzB,QAAQtB,KAAlB,CA3GxB;;AAAA;AA2GEsB,eAAQtB,KA3GV;AAAA;AAAA;;AAAA;AAAA;AAAA;;AA6GE,oBAAMgD,OAAN,wBAAmC,aAAMA,OAAzC;AA7GF;;AAAA;AAAA,yCAiHQxC,QAAQC,YAAR,IAAwB,0BAAOa,QAAQtB,KAAf,EAAsBsB,QAAQY,KAA9B,CAjHhC;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,G;;kBAAee,e;;;;;AAvBf;;;;AACA;;;;AACA;;;;AACA;;;;AACA;;;;AACA;;;;AACA;;;;AACA;;;;;;AAEA,KAAMT,QAAQ,qBAAM,cAAN,CAAd;AACA,KAAMzB,sBAAsBP,QAAQoB,GAAR,CAAYb,mBAAZ,IAAsCK,qBAAtC,cAA5B;AACA,KAAMC,2BAA2Bb,QAAQoB,GAAR,CAAYP,wBAAZ,IAA2CD,qBAA3C,mBAAjC;AACA,KAAMX,eAAe,yBAArB;;mBA+He,uBAAQ,oBAAY;AAClC,uBAAMwC,eAAN,EAAuB,EAACC,aAAa,EAAd,EAAkBC,OAAO;AAAA,WAAWC,UAAU,IAArB;AAAA,IAAzB,EAAvB,EAA4EC,IAA5E,CACC;AAAA,UAAUC,SAAS,IAAT,EAAeC,MAAf,CAAV;AAAA,GADD,EAECD,QAFD,EAGEE,KAHF,CAGQF,QAHR;AAIA,EALc,G;;;;;;;AC3If,+D;;;;;;ACAA,uD;;;;;;ACAA,oE;;;;;;ACAA,wC;;;;;;ACAA,uC;;;;;;ACAA,wC;;;;;;ACAA,qC;;;;;;ACAA,2C;;;;;;ACAA,yC;;;;;;ACAA,mC;;;;;;ACAA,mC","file":"index.js","sourcesContent":[" \t// The module cache\n \tvar installedModules = {};\n\n \t// The require function\n \tfunction __webpack_require__(moduleId) {\n\n \t\t// Check if module is in cache\n \t\tif(installedModules[moduleId])\n \t\t\treturn installedModules[moduleId].exports;\n\n \t\t// Create a new module (and put it into the cache)\n \t\tvar module = installedModules[moduleId] = {\n \t\t\texports: {},\n \t\t\tid: moduleId,\n \t\t\tloaded: false\n \t\t};\n\n \t\t// Execute the module function\n \t\tmodules[moduleId].call(module.exports, module, module.exports, __webpack_require__);\n\n \t\t// Flag the module as loaded\n \t\tmodule.loaded = true;\n\n \t\t// Return the exports of the module\n \t\treturn module.exports;\n \t}\n\n\n \t// expose the modules object (__webpack_modules__)\n \t__webpack_require__.m = modules;\n\n \t// expose the module cache\n \t__webpack_require__.c = installedModules;\n\n \t// __webpack_public_path__\n \t__webpack_require__.p = \"\";\n\n \t// Load entry module and return exports\n \treturn __webpack_require__(0);\n\n\n\n/** WEBPACK FOOTER **\n ** webpack/bootstrap e89aaefc6462bae90f06\n **/","import VaultRaw from 'node-vault';\nimport Vault from 'vault-get';\nimport fs from 'fs-promise';\nimport deasync from 'deasync';\nimport __rootdirname from 'app-root-path';\nimport extend from 'deep-extend';\nimport Debug from 'debug';\nimport atmpt from 'atmpt';\n\nconst debug = Debug('vault-config');\nconst VAULT_CONFIG_RCPATH = process.env.VAULT_CONFIG_RCPATH || `${__rootdirname}/.vaultrc`;\nconst VAULT_CONFIG_SECRETSPATH = process.env.VAULT_CONFIG_SECRETSPATH || `${__rootdirname}/.vaultsecrets`;\nconst VAULT_GLOBAL = '__vault-config-shared__';\n\nasync function renewToken (settings, increment) {\n\tlet vault = VaultRaw({\n\t\tapiVersion: 'v1',\n\t\tendpoint: settings.VAULT_CONFIG_ENDPOINT,\n\t\ttoken: settings.VAULT_CONFIG_TOKEN\n\t});\n\tawait vault.tokenRenewSelf({increment: increment});\n}\n\nasync function loadConfigAsync () {\n\tif (process[VAULT_GLOBAL]) {\n\t\treturn process[VAULT_GLOBAL];\n\t}\n\n\tlet vaultrc,\n\t\tvaultlocalrc,\n\t\tvaultsecrets;\n\n\ttry {\n\t\tvaultrc = await fs.readFile(VAULT_CONFIG_RCPATH, 'utf8');\n\t} catch (error) {\n\t\tthrow new Error(`vault-config: can't find \"${VAULT_CONFIG_RCPATH}\"\\n${error.stack}`);\n\t}\n\ttry {\n\t\tvaultrc = JSON.parse(vaultrc);\n\t} catch (error) {\n\t\tthrow new Error(`vault-config: can't parse JSON in \"${VAULT_CONFIG_RCPATH}\"\\n${error.stack}`);\n\t}\n\n\ttry {\n\t\tvaultlocalrc = await fs.readFile(`${__rootdirname}/.vaultlocalrc`, 'utf8');\n\t} catch (error) {}\n\tif (vaultlocalrc) {\n\t\ttry {\n\t\t\tvaultlocalrc = JSON.parse(vaultlocalrc);\n\t\t\tvaultrc = extend(vaultrc, vaultlocalrc);\n\t\t} catch (error) {\n\t\t\tthrow new Error(`vault-config: can't parse JSON in \"${__rootdirname}/.vaultlocalrc\"\\n${error.stack}`);\n\t\t}\n\t}\n\n\ttry {\n\t\tvaultsecrets = await fs.readFile(VAULT_CONFIG_SECRETSPATH, 'utf8');\n\t} catch (error) {\n\t\tvaultsecrets = {};\n\t}\n\tif (typeof vaultsecrets === 'string') {\n\t\ttry {\n\t\t\tvaultsecrets = JSON.parse(vaultsecrets);\n\t\t} catch (error) {\n\t\t\tthrow new Error(`vault-config: can't parse JSON in \"${VAULT_CONFIG_SECRETSPATH}\"\\n${error.stack}`);\n\t\t}\n\t}\n\n\t// merge configs\n\tlet configs = Object.keys(vaultrc)\n\t\t.map(key => {\n\t\t\tlet envMatch = key.match(/^NODE_ENV=(.+)/),\n\t\t\t\tnodeEnv = process.env.NODE_ENV || '';\n\n\t\t\tif (envMatch && nodeEnv.match(`^${envMatch[1]}$`)) {\n\t\t\t\treturn key;\n\t\t\t}\n\t\t})\n\t\t.filter(key => key)\n\t\t.map(key => vaultrc[key]);\n\n\tif (configs.length) {\n\t\tconfigs = configs.reduce(extend);\n\t\tconfigs.vault = configs.vault || {};\n\t\tconfigs.local = configs.local || {};\n\n\t\t// break out early, we have no matching vault rules\n\t\tif (!Object.keys(configs.vault).length) {\n\t\t\treturn configs.local;\n\t\t}\n\t} else {\n\t\t// break out early, we dont have any rules\n\t\treturn {};\n\t}\n\n\tlet settings = {};\n\tsettings.VAULT_CONFIG_TOKEN = process.env.VAULT_CONFIG_TOKEN || vaultsecrets.VAULT_CONFIG_TOKEN;\n\tsettings.VAULT_CONFIG_KEY = process.env.VAULT_CONFIG_KEY || vaultsecrets.VAULT_CONFIG_KEY;\n\tif (process.env.VAULT_CONFIG_KEYS) {\n\t\tsettings.VAULT_CONFIG_KEYS = process.env.VAULT_CONFIG_KEYS.split(',');\n\t} else {\n\t\tsettings.VAULT_CONFIG_KEYS = vaultsecrets.VAULT_CONFIG_KEYS;\n\t}\n\tsettings.VAULT_CONFIG_ENDPOINT = vaultrc.VAULT_CONFIG_ENDPOINT || process.env.VAULT_CONFIG_ENDPOINT;\n\tsettings.VAULT_CONFIG_ROOTPATH = vaultrc.VAULT_CONFIG_ROOTPATH || process.env.VAULT_CONFIG_ROOTPATH;\n\tsettings.VAULT_CONFIG_SECRET_SHARES = vaultrc.VAULT_CONFIG_SECRET_SHARES || process.env.VAULT_CONFIG_SECRET_SHARES;\n\n\tif (!settings.VAULT_CONFIG_ENDPOINT) {\n\t\tdebug('missing \"VAULT_CONFIG_ENDPOINT\"');\n\t\treturn configs.local;\n\t}\n\n\tif (!settings.VAULT_CONFIG_TOKEN) {\n\t\tthrow new Error('vault-config: missing \"VAULT_CONFIG_TOKEN\"');\n\t}\n\n\tlet vault = Vault({\n\t\tendpoint: settings.VAULT_CONFIG_ENDPOINT,\n\t\ttoken: settings.VAULT_CONFIG_TOKEN,\n\t\tkeys: settings.VAULT_CONFIG_KEYS,\n\t\tkey: settings.VAULT_CONFIG_KEY,\n\t\trootPath: settings.VAULT_CONFIG_ROOTPATH,\n\t\tsecretShares: settings.VAULT_CONFIG_SECRET_SHARES\n\t});\n\n\ttry {\n\t\tif (!process.env.VAULT_DISABLE_AUTORENEW) {\n\t\t\tconst increment = parseInt(process.env.VAULT_AUTORENEW_INCREMENT || 2580000, 10);\n\t\t\tawait renewToken(settings, increment);\n\t\t}\n\t\tconfigs.vault = await vault.get(configs.vault);\n\t} catch (error) {\n\t\terror.message = `vault-config: \\n${error.message}`;\n\t\tthrow error;\n\t}\n\n\treturn process[VAULT_GLOBAL] = extend(configs.vault, configs.local);\n}\n\nexport default deasync(callback => {\n\tatmpt(loadConfigAsync, {maxAttempts: 10, delay: attempt => attempt * 1000}).then(\n\t\tconfig => callback(null, config),\n\t\tcallback\n\t).catch(callback);\n})();\n\n\n/** WEBPACK FOOTER **\n ** ./src/index.js\n **/","module.exports = require(\"babel-runtime/core-js/object/keys\");\n\n\n/*****************\n ** WEBPACK FOOTER\n ** external \"babel-runtime/core-js/object/keys\"\n ** module id = 1\n ** module chunks = 0\n **/","module.exports = require(\"babel-runtime/regenerator\");\n\n\n/*****************\n ** WEBPACK FOOTER\n ** external \"babel-runtime/regenerator\"\n ** module id = 2\n ** module chunks = 0\n **/","module.exports = require(\"babel-runtime/helpers/asyncToGenerator\");\n\n\n/*****************\n ** WEBPACK FOOTER\n ** external \"babel-runtime/helpers/asyncToGenerator\"\n ** module id = 3\n ** module chunks = 0\n **/","module.exports = require(\"node-vault\");\n\n\n/*****************\n ** WEBPACK FOOTER\n ** external \"node-vault\"\n ** module id = 4\n ** module chunks = 0\n **/","module.exports = require(\"vault-get\");\n\n\n/*****************\n ** WEBPACK FOOTER\n ** external \"vault-get\"\n ** module id = 5\n ** module chunks = 0\n **/","module.exports = require(\"fs-promise\");\n\n\n/*****************\n ** WEBPACK FOOTER\n ** external \"fs-promise\"\n ** module id = 6\n ** module chunks = 0\n **/","module.exports = require(\"deasync\");\n\n\n/*****************\n ** WEBPACK FOOTER\n ** external \"deasync\"\n ** module id = 7\n ** module chunks = 0\n **/","module.exports = require(\"app-root-path\");\n\n\n/*****************\n ** WEBPACK FOOTER\n ** external \"app-root-path\"\n ** module id = 8\n ** module chunks = 0\n **/","module.exports = require(\"deep-extend\");\n\n\n/*****************\n ** WEBPACK FOOTER\n ** external \"deep-extend\"\n ** module id = 9\n ** module chunks = 0\n **/","module.exports = require(\"debug\");\n\n\n/*****************\n ** WEBPACK FOOTER\n ** external \"debug\"\n ** module id = 10\n ** module chunks = 0\n **/","module.exports = require(\"atmpt\");\n\n\n/*****************\n ** WEBPACK FOOTER\n ** external \"atmpt\"\n ** module id = 11\n ** module chunks = 0\n **/"],"sourceRoot":""} --------------------------------------------------------------------------------