setmeup
v1.9.3
Published
SetMeUp, your single and only settings manager.
Downloads
306
Maintainers
Readme
SetMeUp
Easy to use app settings module. Settings are stored and loaded from JSON files and / or environment variables, suppoort inline comments and can be (de)encrypted on-the-fly.
Configuration files
By default SetMeUp will load configuration from 4 different JSON files, on the following order:
- settings.default.json are mainly used by libraries to define their default settings.
- settings.json should usually contain global settings for the current application.
- settings.NODE_ENV.json should have application settings relevant only to the current environment.
- settings.secret.json secrets and credentials, this file is automatically encrypted on load.
A typical application will have at least the settings.json
file, but most should also have a settings.development.json
and one settings.production.json
file as well. The settings.default.json
is meant to be used mostly by libraries and sharead modules.
Please note: the configuration files can have inline comments (they're treated as JSON5).
Basic usage
const setmeup = require("setmeup")
const settings = setmeup.settings
// By default it will load from settings.default.json, settings.json and settings.NODE_ENV.json
// automatically. Here we load settings from a custom file as well.
setmeup.load("settings.custom.json")
// Sample server listens to port defined on settings.
myExpressApp.listen(settings.app.port)
// Actual settings can be changed on the fly.
settings.app.title = "My new App Title"
settings.myFTP = {
host: "myhost.com",
folder: "/something"
}
Read only mode
const setmeup = require("setmeup")
// Enabling readOnly mode will prevent SetMeUp from ever writing to disk.
setmeup.readOnly = true
// File settings.secret.json (if present) will not be auto encrypted.
setmeup.load()
// Calling encrypt in readOnly mode won't work now.
setmeup.encrypt("settings.custom.json")
Watching updates to configuration files
const onLoad = (filename, settingsJson) => {
console.log(`Settings reloaded from disk: ${filename}`)
console.dir(settingsJson)
}
// Will get triggered whenever a config file changes.
setmeup.on("load", onLoad)
// Pretend updating files.
myApp.writeConfig("title", "New title")
Loading from enviroment variables
You can also define settings via environment variables, by using the "SMU_" (or your own) prefix and using underscore for each new level on the settings tree. For example:
- app.id = $SMU_app_id
- app.server.hostname = $SMU_app_server_hostname
{
"app": {
"id": "myapp",
"server": {
"hostname": "localhost"
}
}
}
So you could replicate the settings JSON above by executing:
$ SMU_app_id=myapp SMU_app_server_hostname=localhost node index.js
Some code samples:
// Load settings from environment variables using the default SMU_ prefix.
setmeup.loadFromEnv()
// Or specify your own prefix, for example if you have a
// variable MYAPP_general_debug for settings.general.debug.
setmeup.loadFromEnv("MYAPP")
// Sometimes we define variables all uppercased, so you can force
// lowercase them when parsing as settings. Here the variable
// SMU_APP_TITLE gets set to settings.app.title instead of settings.APP.TITLE.
setmeup.loadFromEnv(null, {lowercase: true})
// You can also disable overwriting settings already defined.
setmeup.loadFromEnv(null, {overwrite: false})
Encrypting settings
The encryption features of SetMeUp can (and should!) be customized by defininig the following environment variables:
- SMU_CRYPTO_CIPHER - the cipher, default is aes256
- SMU_CRYPTO_KEY - the encryption key, default is based on the machine ID
- SMU_CRYPTO_IV - the IV, default is set on code
Please note that you MUST define the key and IV environment variables if you are running on the cloud (GCP, AWS etc...), as the machine ID will change whenever you reboot your instances. The defaults are there mostly to be used for local development.
The file settings.secret.json
(if there's one) will be encrypted automatically by SetMeUp after load()
. So if you want to manually change some of its values, you can simply edit the desired keys as plain text, and on the next application start it will get encrypted again.
Encrypting and decrypting files programmatically
// Derive encryption key from env variables or local machine (default).
setmeup.encrypt("./settings.secret.json")
// And decrypt...
setmeup.decrypt("./settings.secret.json")
// Or using a custom key and IV.
let options = {key: "12345678901234561234567890123456", iv: "1234567890987654"}
setmeup.encrypt("./settings.secret.json", options)
setmeup.decrypt("./settings.secret.json", options)
// You can also load encrypted files by passing the crypto options.
let cryptoOptions = {crypto: options}
setmeup.encrypt("./settings.secret.json", options)
setmeup.load("./settings.secret.json", cryptoOptions)
Using the command line tool
From inside your application root, on shell:
$ ./node_modules/.bin/setmeup encrypt settings.secret.json
$ ./node_modules/.bin/setmeup decrypt settings.secret.json
Or directly on NPM scripts (package.json):
{
"name": "mypackage",
"version": "1.5.0",
"scripts": {
"build": "setmeup encrypt settings.secret.json"
}
}
The samples above are for the settings.secret.json
but you could actually use any other filename, like my-private-settings.json
.
Security considerations
The main reason why loadFromEnv()
is not called automatically like the load()
is to avoid settings hijacking on shared environments. For instance an attacker could change things like URLs and credentials even if they had no permissions to access the settings files, simply by crafting some environment variables to replace the settings.
API documentation
You can browse the full API documentation at https://setmeup.devv.com.
Or check these following modules that are using SetMeUp: