jseeqret - v1.0.4
    Preparing search index...

    Getting Started

    This guide walks through installing jseeqret, initializing your first vault, and storing and retrieving a secret from both the CLI and the Node.js API.

    npm install -g jseeqret
    

    The jseeqret command is now on your PATH. If you prefer not to install globally, use npx jseeqret ... or add it as a dev dependency of a single project.

    Every user has one or more vaults — directories that hold the encrypted SQLite database (seeqrets.db), a symmetric Fernet key (seeqret.key), and an asymmetric NaCl keypair (public.key / private.key). Create one with:

    jseeqret init ./my-vault \
    --user alice \
    --email alice@example.com

    The default vault location is resolved from the JSEEQRET env var (falling back to SEEQRET, then /srv/.seeqret). For the rest of this guide, point the env var at your fresh vault:

    export JSEEQRET="$(pwd)/my-vault/seeqret"
    
    jseeqret add key DATABASE_URL 'postgres://localhost/app' \
    --app myapp --env prod

    jseeqret list -f 'myapp:prod:*'
    jseeqret get myapp:prod:DATABASE_URL

    Secrets are scoped by an app:env:key triple. Both app and env default to * if omitted, which is fine for single-project vaults but useful once you start sharing the same vault across projects.

    When your app just needs a local .env file at deploy time, write an env.template that lists the filter specs you need:

    @seeqret>=1.0
    myapp:prod:*
    DB_URL=myapp:prod:DATABASE_URL

    Then run jseeqret env in the same directory to produce .env. The DB_URL=filter form renames the materialized variable.

    The same core used by the CLI is exposed as an npm package:

    import { init, get } from 'jseeqret/core'

    await init('/srv/.seeqret')
    const db_url = await get('myapp:prod:DATABASE_URL')

    See the core module for the full API surface.