| ▲ | Show HN: SecretEnv – Run any process with secrets from all your backends(github.com) | ||||||||||||||||||||||||||||||||||
| 5 points by techalchemist 5 hours ago | 10 comments | |||||||||||||||||||||||||||||||||||
Hi Guys, I built SecretEnv to help solve one common thing that I have seen at every org, that I have worked at. We always had more than one password/credential manager. Service tokens maybe in Vault, AWS SSM etc and some team specific service account or temp account credentials being store in another password store such as 1Password or Keeper, there was never one single credential store. This is where SecretEnv comes in play, it runs any command with secrets injected as env vars, sourced from whatever combination of backend your team already uses. I am sure there are other tools as well that do a similar thing, which is run a command and inject secret. However SecretEnv does one thing differently. The key idea is separating two items which are most of the time combined. Think of SecretEnv's resolution structure like an Address Book. - Your repo gets a secretenv.toml file which has labels in there as values against ENV Vars. These can be literally anything. DB_URL, STRIPE_KEY whatever. - You have a registry that lives in your backend that you/your company uses. This registry holds the actual paths so the credentials. - You have a config file on your machine called config.toml that secretenv uses to grab the aliases from secretenv.toml and resolve against registry that lives in your backend. So imagine if you are a Platform Engineer and need to migrate password stores to different backend. You can now migrate secrets from AWS to Vault or change the naming conventions in one central place (registry) without devs having to touch their code or update config file. What this means is if the credential is used by 10, 15 or even 20 repos. All you need to do is update the alias in the registry and all repos pick up the changes. No need to open PR's, involve dev teams. The whole idea was abstracting and decoupling the dependency. The tool currently supports 14 backends already which covers most of the ground. Would love your feedback and if there is any backends or workflow that this does not cover. | |||||||||||||||||||||||||||||||||||
| ▲ | theozero 5 hours ago | parent | next [-] | ||||||||||||||||||||||||||||||||||
Check out https://varlock.dev - it uses functions and a plugin system to pull from different backends. But also allows composing values together in whatever way you like, has built in validation, extra protection for secrets, and a ton more. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
| ▲ | techalchemist 5 hours ago | parent | prev [-] | ||||||||||||||||||||||||||||||||||
The current support for backends include AWS SSM Parameter Store / AWS Secrets Manager / GCP Secrets Manager / Azure Key Vault / Hashicorp Vault / OpenBao / Cyberark Conjur / 1Password / Doppler / Infisical / Keeper / Cloudflare Workers KV / macOS Keychain / Local File | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||