Skip to content

Latest commit

 

History

History
194 lines (142 loc) · 5.78 KB

README.md

File metadata and controls

194 lines (142 loc) · 5.78 KB

CloudSecretEnv

CloudSecretEnv handles populating your ruby program's environment via cloud secrets providers. All you have to do is configure it for your desired provider (AWS SecretsManager, Hashicorp Vault, etc.) and then call run when your application starts. This library has no opinions as to how you populate your configuration, whether you use environment variables, locally loaded files, or just hardcoded arguments.

Current supported providers:

Getting Started

These instructions will get you a copy of the project up and running on your local machine for development and testing purposes. See deployment for notes on how to deploy the project on a live system.

Prerequisites for Development

Required:

  • Ruby 2.0+
  • Rubocop
gem install rubocop

Optional:

Usage

Bundler install

gem 'cloud_secret_env', git: 'https://github.com/thinkific/cloud-secret-env'

In your program

require 'cloud_secret_env'

# You need to configure before running.
# => Typical configs use provider, region and secret_ids
# => A few optional arguments are override and verbose
CloudSecretEnv.configure do |cse|
  cse.provider = 'aws' # which cloud provider to use
  cse.region = 'us-east-1' # which region for the cloud provider (if applicable)
  cse.secret_ids = 'secret1,secret2' # comma-separated list of secrets to retrieve
end

CloudSecretEnv.run

Running the tests

Running tests depends on whether you're using Docker or not.

Local Dev

Run tests

bundle exec rake

Docker

Start container and exec into it

docker-compose up -d && docker-compose exec ruby bash

Run tests

bundle exec rake

Unit Tests

Unit tests are implemented using RSpec and we do our best to follow Better Specs

RSpec.describe CloudSecretEnv::Config do
  # use efficient variable assignments
  let(:config) { described_class.new }
  ...
  # describe the method being tested
  describe '#validate!' do
    subject { config.validate! }

    # use contexts for representing state
    context 'provider is blank' do
      # and it blocks for expectations
      it 'fails validation' do
        # use described_class when referring to parent class
        expect { subject }.to raise_error described_class::ConfigValidationError
      end

      ...
    end

    context 'region is blank' do
      it 'fails validation' do
        expect { subject }.to raise_error described_class::ConfigValidationError
      end

      ...
    end
  end
end

Code style tests

This project is linted using Rubocop. It's run in SemaphoreCI and can also be run in your editor of choice.

Links for popular editors:

Deployment

Make sure you have the required credentials for whichever cloud provider you're using.

As an example with AWS Secrets Manager, you'll need one of:

  • ENV credentials 'AWS_ACCESS_KEY_ID' and 'AWS_SECRET_ACCESS_KEY'
  • Profile + credentials files in $HOME/.aws/
  • Instance profiles attached to resources in AWS

Timing

As a note on timing, be careful where you call CloudSecretEnv#run. By default, it will only set environment variables that are already empty, but by setting override to true in the configure block, you can force CloudSecretEnv to overwrite existing variables.

The best way to test this is by setting verbose to true in the configure block, which will display all the credentials to the terminal after setting them. Don't do this in production of course, but it can be useful for testing your development and testing environments.

For example, let's set an env var first without override. This means that SERVICE_A_ACCESS_ENABLED will remain set to 'false'.

ENV['SERVICE_A_ACCESS_ENABLED'] = 'false'
CloudSecretEnv.configure do |cse|
  cse.provider = 'aws'
  cse.region = 'us-east-1'
  cse.secret_ids = 'secret1,secret2'
  cse.verbose = true # output secrets hash to console
  # override is false by default
end
CloudSecretEnv.run

# example output
# {"SERVICE_A_ACCESS_ENABLED"=>"false",
#  "SERVICE_B_ACCESS_ENABLED"=>"true",
#  "SERVICE_C_ACCESS_ENABLED"=>"true",
#  "API_KEY"=>"aaaaaabbbbbbbbbb",
#  "DOMAIN"=>"cdcdcdcdcdcdcdcd",
# ...}

But if you set override to true, SERVICE_A_ACCESS_ENABLED is set to 'true'.

ENV['SERVICE_A_ACCESS_ENABLED'] = 'false'
CloudSecretEnv.configure do |cse|
  cse.provider = 'aws'
  cse.region = 'us-east-1'
  cse.secret_ids = 'secret1,secret2'
  cse.verbose = true
  cse.override = true
end
CloudSecretEnv.run

# example output
# {"SERVICE_A_ACCESS_ENABLED"=>"true",
#  "SERVICE_B_ACCESS_ENABLED"=>"true",
#  "SERVICE_C_ACCESS_ENABLED"=>"true",
#  "API_KEY"=>"aaaaaabbbbbbbbbb",
#  "DOMAIN"=>"cdcdcdcdcdcdcdcd",
# ...}

Built With

Contributing

Please read CONTRIBUTING.md for details on our code of conduct, and the process for submitting pull requests to us.

Versioning

We use SemVer for versioning. For the versions available, see the tags on this repository.

Authors

See also the list of contributors who participated in this project.

License

This project is licensed under the MIT License - see the LICENSE.md file for details