cqr-me

Have multiple env files in json/js that can be encrypted and included in version control

Usage no npm install needed!

<script type="module">
  import cqrMe from 'https://cdn.skypack.dev/cqr-me';
</script>

README

CQr-ME

Secured Multiple Env Files

Have multiple env files in json/js that can be encrypted and included in version control (e.g. git)

Motivation

This is yet another package for loading env files. After researching for npm packages, I've found several solutions but none to my avail. They all lack some handy features (at the same time or altogether):

  • have multiple env files
    • for staging purposes (production, development, testing, local, etc)
    • for modularization - a root env, a component env, some common env (motif), "external" env (for database A, for service B, for API C)
    • to segregate sensible information from non-sensible information (like credentials)
  • multiple formats (raw/shell-like, json, js), including javascript (dynamic, interpreted at runtime). JSON supported by JSON5 (comments, single-quotes, line breaks, trailing commas and more)
  • special cases for raw files: multiline strings, ignore blank lines, parse as js types (numbers as numbers, objects, etc.), don't parse comments (//, #, <!-- -->, /**/)
  • encrypt sensible information
    • allowing to include in version control (otherwise when sharing projects, one should send private env files separately)
    • possibility to use encrypted env file without decrypting it (decrypt on the fly)
    • if decrypted, change extension so to not commit it by mistake

Some packages researched: dotenv, dotenvjs, @alucarpd86/dotenv-json, @eddiewen/dotenvjson, envdot, envdotjs, envdotjson, envdotenv, dotenv-expand, dotenv-packed, dotenv-extended, expand-dotenv, dotenv-defaults, dotenv-flow, encrypt-env, environment-crypt, secure-env, encrypted-env

Usage

Loading multiple env files (.js, .json, raw)

📂 Project
├ 📂 modules
│ ├ 📂 x
│ │ └ 📄 x.env.js  // { mode: 'on' }
│ ├ 📂 y
│ │ └ 📄 y.env.json  // [1, 2, 3]
│ └ 📂 z
│   └ 📄 z.env  // url=example.com
└ 📄 index.js
/* index.js */
const env = require('cqr-me')(['**/*.env.js', '**/*.env.json', '**/*.env'])
// { x: { mode: 'on' }, y: [1, 2, 3], url: 'example.com' }

Don't use filename as key / specify key name

📂 Project
├ 📄 development.env.js  // { host: 'localhost' }
├ 📄 production.env.js   // { host: 'example.com' }
└ 📄 index.js
/* index.js */
console.log(process.env.NODE_ENV) // 'production'

const env = require('cqr-me')(`${process.env.NODE_ENV}.js`, { name: false })
// { host: 'example.com' }, not { production: { host: 'example.com' }}

const env = require('cqr-me')(`${process.env.NODE_ENV}.js`, { name: 'node_env' })
// { node_env: { host: 'example.com' }}

Set defaults

📂 Project
├ 📄 default.env.js      // { host: 'localhost', port: 1234 }
├ 📄 development.env.js  // { host: 'localhost' }
├ 📄 production.env.js   // { host: 'example.com' }
└ 📄 index.js
/* index.js */

// default file
process.env.NODE_ENV = ''
const env = require('cqr-me')(`${process.env.NODE_ENV || 'default'}.env.js`, { name: false })
// { host: 'localhost', port: 1234 })

// using destructuring
process.env.NODE_ENV = 'production'
const Default = require('cqr-me')('default.env.js', { name: false })
const env2 = { ...Default, ...pkg(`${process.env.NODE_ENV}.env.js`, { name: false }) }
// { host: 'example.com', port: 1234})

Encrypt env files

  1. Add *.exposed to .gitignore to prevent any decrypted/unsafe files to be committed.
  2. Create a file with desired name and extension + .exposed. Fill sensible information.
  3. Set password key in environment variable. E.g.: setx proj_key 1234 or export proj_key=1234
  4. Encrypt file(s) using cqr-me e "gloob" "key_name" (files must end with .exposed)

Decrypt env files (for editing)

  1. Decrypt file(s) using cqr-me d "gloob" "key_name" (files must end with .encrypted)

Decrypt and load env files on-the-fly

📂 Project
├ 📄 production.env.js.encrypted   // 790ffd1b2e51f77aa5621331dfd4dbec586d4276076c2129562cd2baef4fbb937574ab2b9416b9e06b5bf9d273f7a5f8P7PhoZco+zGRQJnddS7VwmTxZr6gd+4jwCsp1yLG0ck+RzoRXgExT/3tvMgwGp0AVJ8MFtcsybRNbuv6dq0RM4HmAIwQCDi5con96O8YjyAmKlsBj2G1nDb1GZ7iBD2EWX8w9GlRop6b12H5FyxxLB9BUGYcdg83vTW5s3+PgNZ9Mlx2LFLZiApn4DR91GOsB13wgCoy/7CZa+6wOiguIOtw+H1pGWunmJmi8NR3HGhbJp7Gmj4b6URAFuUgg0FGKUY2JCLQfLM4ogSE3QbSZwlzQZ5mawRrNm8PhPrG0+RXozyClYo3e0SsZeqdVimL
└ 📄 index.js
/* index.js */
console.log(process.env.NODE_ENV) // 'production'

const env = require('cqr-me')(`${process.env.NODE_ENV}.env.js.encrypted`, { name: false, envvar: 'key_name' } )
// { host: 'example.com', pw: 'abcde' }

Options

envvar (string): name of the environment variable that contains the password/key to decrypt a protected file

name (bool/string): don't use filename as key. Instead, destruct keys into parent (false) or give it a name (string).