Skip to content

Commit 065b37a

Browse files
committed
2 parents ca3b2fa + 4ea284a commit 065b37a

File tree

9 files changed

+22
-13
lines changed

9 files changed

+22
-13
lines changed

backend/src/config/index.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
const PORT = process.env.PORT || 4000;
2-
const EMAIL_TOKEN_LIFETIME = process.env.EMAIL_TOKEN_LIFETIME! || '86400'; // investigate
2+
const EMAIL_TOKEN_LIFETIME = process.env.EMAIL_TOKEN_LIFETIME! || '86400';
33
const ENCRYPTION_KEY = process.env.ENCRYPTION_KEY!;
44
const JWT_AUTH_LIFETIME = process.env.JWT_AUTH_LIFETIME! || '10d';
55
const JWT_AUTH_SECRET = process.env.JWT_AUTH_SECRET!;

backend/src/controllers/organizationController.ts

+1
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,7 @@ import {
88
STRIPE_PRODUCT_CARD_AUTH
99
} from '../config';
1010
import Stripe from 'stripe';
11+
1112
const stripe = new Stripe(STRIPE_SECRET_KEY, {
1213
apiVersion: '2022-08-01'
1314
});

cli/packages/cmd/root.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ var rootCmd = &cobra.Command{
1515
Short: "Infisical CLI is used to inject environment variables into any process",
1616
Long: `Infisical is a simple, end-to-end encrypted service that enables teams to sync and manage their environment variables across their development life cycle.`,
1717
CompletionOptions: cobra.CompletionOptions{DisableDefaultCmd: true},
18-
Version: "0.1.4",
18+
Version: "0.1.5",
1919
}
2020

2121
// Execute adds all child commands to the root command and sets flags appropriately.

cli/packages/cmd/run.go

+3-3
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ var runCmd = &cobra.Command{
3333
return
3434
}
3535

36-
substitute, err := cmd.Flags().GetBool("substitute")
36+
shouldExpandSecrets, err := cmd.Flags().GetBool("expand")
3737
if err != nil {
3838
log.Errorln("Unable to parse the substitute flag")
3939
log.Debugln(err)
@@ -89,7 +89,7 @@ var runCmd = &cobra.Command{
8989
}
9090
}
9191

92-
if substitute {
92+
if shouldExpandSecrets {
9393
substitutions := util.SubstituteSecrets(envsFromApi)
9494
execCmd(args[0], args[1:], substitutions)
9595
} else {
@@ -103,7 +103,7 @@ func init() {
103103
rootCmd.AddCommand(runCmd)
104104
runCmd.Flags().StringP("env", "e", "dev", "Set the environment (dev, prod, etc.) from which your secrets should be pulled from")
105105
runCmd.Flags().String("projectId", "", "The project ID from which your secrets should be pulled from")
106-
runCmd.Flags().Bool("substitute", true, "Parse shell variable substitutions in your secrets")
106+
runCmd.Flags().Bool("expand", true, "Parse shell parameter expansions in your secrets")
107107
}
108108

109109
// Credit: inspired by AWS Valut

docker-compose.dev.yml

+2
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,8 @@ services:
5555
- NEXT_PUBLIC_WEBSITE_URL=${SITE_URL}
5656
- NEXT_PUBLIC_POSTHOG_HOST=${POSTHOG_HOST}
5757
- NEXT_PUBLIC_POSTHOG_API_KEY=${POSTHOG_PROJECT_API_KEY}
58+
- NEXT_PUBLIC_STRIPE_PRODUCT_PRO=${STRIPE_PRODUCT_PRO}
59+
- NEXT_PUBLIC_STRIPE_PRODUCT_STARTER=${STRIPE_PRODUCT_STARTER}
5860
- NEXT_PUBLIC_TELEMETRY_ENABLED=${TELEMETRY_ENABLED}
5961
networks:
6062
- infisical-dev

docker-compose.yml

+3
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,9 @@ services:
4949
- NEXT_PUBLIC_WEBSITE_URL=${SITE_URL}
5050
- NEXT_PUBLIC_POSTHOG_HOST=${POSTHOG_HOST}
5151
- NEXT_PUBLIC_POSTHOG_API_KEY=${POSTHOG_PROJECT_API_KEY}
52+
- NEXT_PUBLIC_STRIPE_PRODUCT_PRO=${STRIPE_PRODUCT_PRO}
53+
- NEXT_PUBLIC_STRIPE_PRODUCT_STARTER=${STRIPE_PRODUCT_STARTER}
54+
- NEXT_PUBLIC_TELEMETRY_ENABLED=${TELEMETRY_ENABLED}
5255
networks:
5356
- infisical
5457

docs/cli/reference/run.mdx

+5-4
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,8 @@ Inject environment variables from the platform into an application process.
1212

1313
## Options
1414

15-
| Option | Description | Default value |
16-
| ------------- | ----------------------------------------------------------------------------------------------------------- | ------------- |
17-
| `--env` | Used to set the environment that secrets are pulled from. Accepted values: `dev`, `staging`, `test`, `prod` | `dev` |
18-
| `--projectId` | Used to link a local project to the platform (required only if injecting via the service token method) | `None` |
15+
| Option | Description | Default value |
16+
| -------------- | ----------------------------------------------------------------------------------------------------------- | ------------- |
17+
| `--env` | Used to set the environment that secrets are pulled from. Accepted values: `dev`, `staging`, `test`, `prod` | `dev` |
18+
| `--projectId` | Used to link a local project to the platform (required only if injecting via the service token method) | `None` |
19+
| `--expand` | Parse shell parameter expansions in your secrets (e.g., `${DOMAIN}`) | `true` |

docs/cli/usage.mdx

+5-4
Original file line numberDiff line numberDiff line change
@@ -29,10 +29,11 @@ infisical run -- [your application start command]
2929

3030
Options you can specify:
3131

32-
| Option | Description | Default value |
33-
| ------------- | ----------------------------------------------------------------------------------------------------------- | ------------- |
34-
| `--env` | Used to set the environment that secrets are pulled from. Accepted values: `dev`, `staging`, `test`, `prod` | `dev` |
35-
| `--projectId` | Used to link a local project to the platform (required only if injecting via the service token method) | `None` |
32+
| Option | Description | Default value |
33+
| ------------- | ----------------------------------------------------------------------------------------------------------- | ------------- |
34+
| `--env` | Used to set the environment that secrets are pulled from. Accepted values: `dev`, `staging`, `test`, `prod` | `dev` |
35+
| `--projectId` | Used to link a local project to the platform (required only if injecting via the service token method) | `None` |
36+
| `--expand` | Parse shell parameter expansions in your secrets (e.g., `${DOMAIN}`) | `true` |
3637

3738
## Examples:
3839

frontend/pages/settings/billing/[id].js

+1
Original file line numberDiff line numberDiff line change
@@ -50,6 +50,7 @@ export default function SettingsBilling() {
5050
const subscriptions = await getOrganizationSubscriptions({
5151
orgId: localStorage.getItem("orgData.id"),
5252
});
53+
5354
setCurrentPlan(subscriptions.data[0].plan.product);
5455
const orgUsers = await getOrganizationUsers({
5556
orgId: localStorage.getItem("orgData.id"),

0 commit comments

Comments
 (0)