A simple CLI tool to run a process with secrets from AWS Secrets Manager.
Envault focuses on integrating AWS Secrets Manager in your application with ease without having to write a single line of code in your source files. Simply run your commands with the Envault CLI and the secrets will be injected in that process.
- Install Envault
- Verify Installation
- AWS Credentials
- Setup
- List Secrets
- Run With Secrets
- Usage with CI/CD
- Using custom .env files
curl -sf https://raw.githubusercontent.com/pratishshr/envault/master/install.sh | sudo sh
Note:
If your architecture is not supported, clone this repo and run go build
to generate a binary.
Then, simply place the binary in your local bin
.
envault
Before using envault, you have to provide your AWS credentials. This allows envault to fetch secrets from the AWS Secrets Manager. Also, make sure you have the correct access for your credentials.
Simply create ~/.aws/credentials
file for storing AWS credentials.
Example:
[example-profile]
aws_access_key_id = xxxxxx
aws_secret_access_key = xxxxxx
To know more about AWS configurations, view Configuring the AWS CLI
Go to your project directory and run setup
command to initiate the setup process.
envault setup
- Choose your AWS profile that was setup earlier.
- Choose the AWS Region where your secrets are kept.
- You can also add a deployment environment associated with the secret name. You may add any number of environment you want.
- Set a default env
Example:
AWS profile: default
Region: US West (Oregon)
Add an environment (eg. dev): dev
Secret Name: api/dev
Add an environment (eg. dev): uat
Secret Name: api/uat
envault.json
file will be created in your project directory like below.
{
"profile": "default",
"region": "us-west-2",
"environments": {
"dev": "api/dev",
"uat": "api/uat"
},
"defaultEnv": "dev"
}
If you do not want a project-specific config file, you can skip the above step.
envault list -e dev
envault list -e uat
Here dev
and uat
are the environments you specified in envault.json
.
If you have not setup a envault.json
file, you can still pass --secret
or -s
flag with the secrets path.
This will use the default
profile from your ~/.aws/credentials
file.
envault list --secret=api/dev
envault list --secret=api/uat
envault run 'yarn build' -e dev
This will inject the secrets from dev
to the yarn build
process.
Similarly, if you have not setup a envault.json
file, you can still pass --secret
or -s
flag with the secrets path.
This will use the default
profile from your ~/.aws/credentials
file.
envault run 'yarn build' --secret=api/dev
Instead of setting up a ~/.aws/credentials
file. You can also use the following environment variables to set up your AWS credentials.
Variable | Description |
---|---|
AWS_ACCESS_KEY_ID | Your AWS access key |
AWS_SECRET_ACCESS_KEY | Your AWS secret key |
AWS_REGION | AWS region where you added your secret |
ENVIRONMENT | Environment which you set in envault.json |
SECRET_NAME | AWS Secret Name |
If you want to inject environment keys from a file instead of using AWS Secrets Manager. You can use the-ef
flag.
envault run 'envault run 'go run main.go' -ef env/staging.env
This project is licensed under the MIT License - see the LICENSE file for details