kawa: Key-value store in single files.

This is a package candidate release! Here you can preview how this package release will appear once published to the main package index (which can be accomplished via the 'maintain' link below). Please note that once a package has been published to the main package index it cannot be undone! Please consult the package uploading documentation for more information.

[maintain]

Simple command-line tool to manage some key-value store in a single file.


[Skip to ReadMe]

Properties

Versions0.1.0.0, 0.1.0.0
Change logCHANGELOG.md
Dependenciesattoparsec, base (>=4.9 && <5), directory, hashable, kawa, optparse-applicative, text, unordered-containers [details]
LicenseBSD-3-Clause
AuthorThomas Feron
Maintainerthomas.feron@redspline.com
CategoryDatabase
Home pagehttps://github.com/thoferon/kawa#readme
Bug trackerhttps://github.com/thoferon/kawa/issues
Source repositoryhead: git clone https://github.com/thoferon/kawa
Executableskawa
UploadedMon Jan 15 13:20:32 UTC 2018 by thoferon

Modules

[Index]

Downloads

Maintainers' corner

For package maintainers and hackage trustees


Readme for kawa-0.1.0.0

[back to package description]

Kawa is a small command-line tool to manage some key-value store in a single file. It manages files containing key-value pairs like the following. These files are meant to be human-readable.

hostname = localhost
port = 5432
username = myuser
password = secret
database = mydb

There are three commands supported by the executable: get, set and replace which, respectively, gets the value assigned to a key from a store, sets a new value to a key in a store and replaces all occurences of keys by their values in a file.

This can be used to generate a file from a template and some secrets contained in such a store. For instance, a provisioning tool could create a file config.template.yml for some application containing its configuration with lines like username: USERNAME and the variables would be stored in secrets.kawa. Then, before launching the application, a systemd service could run kawa replace secrets.kawa -i config.template.yml -o config.yml.

For more information, run kawa --help.