-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Is there away to decrypt the env.enc back into a .env plaintext? #4
Comments
Hey @mendeljacks, let secureEnv = require('secure-env');
global.env = secureEnv({ secret: process.env.secretKey }); Adding the dycrypt functionality to secure-env CLI seems to be a valid request though. I will keep this issue open and mark it closed when this feature is implemented. I will add this as a task for next release v1.0.0. |
Fixed with #10 |
The use case is that developers and production servers each have copies of a private key. The env.enc is committed to the git repository, and assuming the developer knows the private key they can add or remove from the env.enc. Ideally a server such as heroku or aws would only need one env varaible which is the secret key to get the rest of the env variables.
At the moment however, it appears as though once someone locks and commits the env.enc, the other developers have no way of reading the env variables even if they know the secret key because the file can only be unencrypted programmatically and not with a cli
The text was updated successfully, but these errors were encountered: