@strv/shh
v0.6.7
Published
CLI tool to manage versioned environment variable files using git-crypt
Downloads
20
Keywords
Readme
CLI tool to manage versioned environment variable files using git-crypt.
Motivation
While many projects deserve proper secrets handling solution such as Vault, by HashiCorp or AWS KMS, these solutions are often costy and simply an overkill for more simpler setups. However, manually managing environment variables is a pain and prone to much human mistakes.
Meanwhile, git-crypt has been providing a good solution to manage your secrets together with your codebase. Although simple, git-crypt is not really feature rich and not at all focused on this particular use-case alone.
Comes @strv/shh
. Together with git-crypt, this tool will help you:
- Encrypt versioned environment variables
- Setup CI usage of these environment variables
- Share environment variables safely with colleagues
- Compare environment variable of different targets
- Switch environments locally
How it works
The main idea here is to have a set of environment files (by default at ./envs/env.[name]
) that are encrypted using git-crypt, and a .env
symbolic link to one of the available environments.
@strv/shh
will helps setting this up, and switching/selecting environments both on local machines and on CI.
Install
Make sure to have git-crypt installed. On Mac OS, I recommend using brew.
npm add @strv/shh --dev
Usage
First user
The first user will be the one to setup @strv/shh
on the repository. Execute the following steps:
Setup
npx shh init
This command has sensible defaults that can be overriden with extra options. After initialization, make sure to commit all generated files, and changes made to
.gitattributes
and.gitignore
.Save key
You'll need the to provide other users with the encryption key in order to unlock the repository (or for CI usage). Run the following to get the key:
npx shh export-key
The output key can be shared with other developers that are allowed to unlock the environment variables, and used on the CI setup.
Disclaimer: the output is a base64 encoded secret for easier handling.
Other users
Whenever doing a fresh clone of the repository, it's necessary to unlock the environment variable files. Having the key generated on the step above, run:
npx shh unlock
You'll be prompted to provide the key.
During development
Create environments
Different environments (development, production, etc) are defined by their variable declaring files. By default, this files should be found on ./envs/env.[name]
(replacing [name]
with the environment name).
You can either create new environments by manually create these files, or you can use the following command:
npx shh new
The benefit of using the command is mainly to reuse the template, if set.
Switching environments
Whenever you intend to execute the application under a different environment locally, run the base CLI:
npx shh
CI setup
Setup on CI isn't much different than locally. However, we recommend this shortcut:
SHH_KEY=[key] npx shh -e [environment]
SSH_KEY
becomes the only environment variable that has to be made available manually on the CI admin setup.
git-crypt
The main problem to use @strv/shh
on CI is having git-crypt available, which depends entirely on the OS in use.
Vercel uses an image based on Amazon Linux 2. @strv/shh
includes a pre-built git-crypt binary for that image available on @strv/shh/bin/git-crypt--amazon-linux
, and this binary will be used by default when executing commands under a Vercel environment, but for safety reasons, we recommend you setup your CI environment following the git-crypt install instructions.
Commands & Options
All commands have available options and descriptions available by appending --help
to the command.
Global options
The following options are available to all commands, and are saved to .shhrc
in case they differ from the defaults upon initializing.
| | Description | Default |
| --------------------------- | -------------------------------------------------------------------------- | --------------------- |
| -t, --target <path>
| The path to the managed env file | ".env"
|
| -T, --template <path>
| The path to the env template file | "./envs/template"
|
| -E, --environments <path>
| The path pattern to the environment files | "./envs/env.[name]"
|
| -l, --log-level <level>
| What level of logs to report (choices: "log", "silent", "warn", "nothing") | "log"
|
| -c, --copy
| Whether we should install environments using copy instead of symlink | false
|
Initializes @strv/shh
and git-crypt setup.
| | Description | Default |
| ----------- | ------------------------------ | -------- |
| -y, --yes
| Confirm YES to warning prompts | prompted |
Switch to an available environment. Options:
| | Description | Default |
| -------------------------- | ---------------------------- | -------- |
| -e, --environment <name>
| The environment to switch to | prompted |
Unlock repository using git-crypt. Options:
| | Environment variable | Description | Default |
| ------------------------- | -------------------- | ---------------------- | -------- |
| -k, --encoded-key <key>
| SHH_KEY
| The base64 encoded key | prompted |
Locks the repository's and encrypt environment files.
| | Description | Default |
| ----------- | ------------------------------ | -------- |
| -y, --yes
| Confirm YES to warning prompts | prompted |
Create a new environment based on the template. Options:
| | Description | Default |
| -------------------------- | -------------------------- | -------- |
| -e, --environment <name>
| The environment to install | prompted |
Compares variables available on all environments (including template).
Outputs a base64 encoded version of the encryption key.