Hacker News new | past | comments | ask | show | jobs | submit login
Ask HN: How do you share and sync .env files and secrets with your team
51 points by Debkanchan 26 days ago | hide | past | favorite | 60 comments
I am trying to figure out how to securely share and sync .env files and secrets with my team. Is there a saas/oss solution that "just works" or there's no way around using hashicorp vault/GCP Secrets/etc. with custom scripts?



Since nobody else asked. If your team isn't infra/acting as infra then you don't.

Least required access, set up a dev environment with CI/CD and if they need to do any local dev(frontend contacting your API etc) then implement auth you are in control of.

If your team needs to make actual API calls to external services for dev, change that, you codebase is likely not testable. Integration tests should run on CI.

Much of this is likely a few days work if your codebase isn't massive and if your codebase is massive then put that in the next sprint.


Around 100 lines of shell scripting and an encrypted S3 bucket that has a shared secrets .env file which is ignored from version control for each project.

IAM handles access control and the shell script makes it easy for folks to show, diff, download and upload secrets for a project.

When a secret gets changed it also sends a Slack notification so folks know to download the latest copy.

It costs practically nothing, is super easy to maintain and it keeps your app only needing to deal with environment variables.


You should put this online somewhere!


I'll see what I can do.

I do have a blog at https://nickjanetakis.com/blog where I post about a bunch of tech topics. If it gets posted it would get posted there.


Can you share a gist


I'm currently using direnv + 1password + https://github.com/tmatilai/direnv-1password. `direnv` to load shell environment dynamically upon entering a directory. It can load static .env files, but can also source shell scripts to load envvars.

1password is the company password manager. It has shared 'vaults' where a team can share secrets with one another. They can thus be used for authorization, who can access which secrets.

direnv-1password is a plugin for direnv that will load secrets from 1password into envvars. With this, upon entering a project, you'll be asked to unlock 1password (using yubi or fingerprint scan) and it'll fetch the needed secrets from the project.

This way secrets secrets are not easily readable from your disk, like they would with .env files.

Other password managers likely have similar tooling for direnv. Though I don't know whether it'll be this convenient.


I've mostly used the 1Password CLI. A simple `op inject .env.template > .env` (off the top of my head) and done!


Also using 1Password and I think it’s great. If possible, I would suggest to avoid plaintext secrets in files though. Instead, it is possible to store references to secrets in a dotenv file (example: .env.development): DATABASE_URL=op://development/database/url

and use op run to inject the secrets into a subprocess instead of storing them in a file: op run --env-file="./.env.development" -- cargo run


I love that, that's much better! Thanks!


But doesn’t that still write the secrets to disk? I thought the point of 1pass CLI was so you could avoid having unencrypted secrets on disk?


An alternative is using `direnv` and `.envrc` instead:

export TOKEN=$(op item get 'My Service' --fields label=token --vault workwork)


Why not just use op run? It auto replaces references with values.


I built Rot to solve this. It creates a git diff-able list of keyrings and secrets that you can inject via environment variables to sub commands, like `rot run mykeyring terraform apply`. You can use Shamir Secret Sharing to create "disaster recovery" access into the keyrings too.

https://rotx.dev


I have a question, why would you call it rot? To me that sound something similar to Caesar cipher, also called rot13, which is far from being safe.


Rot's primary goal is crypto agility: you should be able to easily change secret values as well as the ciphers used to encrypt your stuff. Rot provides a robust rekey mechanism to ensure you're using the best encryption available.

So the naming of rot is because cryptographic keys have a tendency to "rot" rather quickly. Frequent use of keys inevitably leads to leakage and/or compromise, and the underlying encryption algorithms may not be secure in the future. Cryptographic material doesn't age well in general.


If you need your developers to use legitimate secrets for local development, something is seriously wrong. External providers (say, payment integrators) that don't offer integration/development keys and environments should be named and shamed until they provide that. And everything else? Create "harmless secrets" that can be used by your developers and where even a complete compromise of their machines, say as part of a supply chain attack, does not have the potential to cause a security issue.

Put legitimate production keys into k8s secrets and expose these to containers (either natively via serviceaccounts, via secret files, or via environment variables), or into Docker containers, or if you're running bare metal, somewhere in /etc (or an NFS mount if you want to avoid dealing with secrets in Ansible). Deployment pipelines shouldn't ever touch any kind of credentials, they should all be provisioned out of band.


SOPS is pretty great. On year ~6 of using it across two companies and no complaints to speak of.


Agreed, SOPS can be great for small teams and requires very little setup. We followed this demo's example when setting it up:

https://github.com/CaseyLabs/kcUtils/tree/main/utils/kcSops


(Writing in with a story/telling of what happened, not a suggestion!)

I joined a company where we used Slack to bother teammates, as we went around setting up dozens and dozens and dozens and dozens of microservices. Pretty poor consistency across variable names. People unsure what changes they'd made locally. It was a mess.

I was setting everything up for myself via Ansible. So I'd try to extract each variable into a vars/main.yaml, deduplicating with anything else having that value (unless there was a good reason). And then write the .env file for each project.

After a couple years of this, we ended up moving more and more into a .env-defaults file. Since I'd kind of paved the way of checking in some localdev creds, we encoded a lot of the copy-pasted secret values into git in each project.

Our services run on AWS's SSM Parameter Store. We've talked about trying to mine that for localdev, on and off, but hasn't happened.


Secrets manager, but the secrets are JSON objects. Each secret contains all the secrets for a specific "environment". Then we use scripts in the repo to download the secrets and set up the env.

We use the same pattern in production and CI/CD


We use Fernet[1] or Ansible vault[2] with the encrypted secrets committed to the code repositories, but I guess we can do that because the code is not public.

The rest we share over a secure, company approved, channel, and save them into local KeePass-es (KeePassXC)

[1] https://docs.ansible.com/ansible/latest/vault_guide/index.ht...

[2] https://cryptography.io/en/latest/fernet/


Is the ansible vault password in the repo too?

Also, anytime I put an ansible vault secret into Bitbucket, I get a yelly email back from BB about “detected secreted in repo!”

So general question, is this within security standards or is it very bad and should be using off-the-repo secret infra like Hashicorp vault etc? Downside there is have to manually update the secrets on Hashi vault side (eg they are not in code/repo) and you still have to have some visibility to the hashi key in any case in your CI/CD/code/ansible in any case right?


Commiting the passwords for decrypting Ansible vaults would render the encryption useless and you should consider all secrets already in the vault when committing and pushing the vault password compromised. Makes for a couple of fun days, if it happens.


Right that’s why I asked OP.


> Is the ansible vault password in the repo too?

No no, this is one of those secrets we share among the team and save to KeePass or whatever.


Why does the team need to share secrets? What's the problem that needs to be solved here? We don't need to share any secrets.


If your code integrates with third party services often you'll need an api key, or sometimes client id and secrets for authentication.


That doesn't explain anything. I didn't ask why people need secrets, I asked why you need shared secrets.

Your production deployment is what needs access to the third party services, not "the code". Developers shouldn't be accessing these services from dev instances. Developers should get their own credentials or use some kind of staging service which can be shared, but isn't secret.


Tell me you've never worked with a third party API without telling me you haven't worked with a third party API.

Generally speaking they aren't willing to make accounts for each dev on your team and manage that on their end. You might have a test env, but the creds for it are still secret for many reasons.


Of course I've worked with third party APIs. What ones don't let you make dev accounts? Do you really give devs the prod credentials for these services?


In every organization I've worked in, if the devs didn't have the production creds nothing would get shipped.

Google, Facebook, etc do with 100 people what normal companies do with 2.


usernames and passwords for various services your app needs to talk with.


It depends on how big a team you are and where you need things to work. If vault seems like too much, I'm guessing you're a smaller team, at which point, a password manager with a command line interface is what you're looking for. There are heavier weight options, but then you're in hashicorp vault territory again.


We use Doppler and it seems pretty decent


We also use Doppler.

Generally, Doppler has solved both dev and prod env issues for us.


+1 on doppler, works well so far.


+1, I've used Doppler for quite a while now at various places, and it works.


We use Infisical for both our dev and prod environments. If you're a YC company you can get your first year free.

https://infisical.com


You could securely exchange .env files using public key cryptography with a tool such as GPG. Broadly, you'd 1) generate a key-pair, 2) export and share the key to your co-worker, 3) import your co-worker's public key 4) encrypt your file 5) send the encrypted file via email or any channel to your co-worker 6) decrypt!

You can revoke access to that person by changing your .env file credentials and deleting your co-worker's key.


Years ago, before going full on Vault, I was using git-crypt, a git plugin that uses gpg to encrypt files before committing them to the repo.

Not sure if it’s still fine, I see their last release is 2 years old nowadays.

https://github.com/AGWA/git-crypt


I moved to the `pass` ecosystem years ago and never looked back:

https://www.passwordstore.org/


I use `ess` (env sample sync) to sync my `.env` with `env.sample`: https://github.com/acaloiaro/ess.

This of course does not share the secrets themselves, but helps document what secrets an application requires.


Secrets committed and encrypted with sops. You can decrypt it locally with a key shared in 1Password


For .NET env's, we're in the process of putting each element into an AWS SSM secret or non-secret which can then be pulled out to form an appsettings.json.

All SSM parameters will be managed through pulumi.

Pulled via a script run via aws-vault.

Should be fine once the work is done, all


If you have to share secrets, it's usually a sign you've screwed up your design. Every (user, computer) tuple should have its own unique secrets. Roots of trust need to be backed up safely, but other secrets should be easily replaceable.


At a former workplace I wrote this tool which was put to use.

It utilizes GPG to store the secrets and Golang templates to support the files.

https://github.com/jyap808/jaeger


I used dotenv-vault at my last job (paid customers) and it worked well. I think that service has been replaced by dotenvx but I haven’t tried that.


We use Vercel and have configured a way to pull the dev environment keys from there. This is of course a very tech stack-specific solution.


I whisper them into their ears whilst they sleep.


Infisical should work well for your use case! https://infisical.com


Store the encrypted env file (ejson is good) in your project and have a shared 1Password key to decrypt them.


Recent versions of rails takes this approach. But I’ve wondered: is it possible to avoid copying the key onto disk, and leave it in 1Password, eg via their cli?


Yes, it is possible to inject secrets directly into a subprocess without writing them to disk via op run. Also see https://news.ycombinator.com/item?id=41482194 … we responded to the parent around the same time :D


Vault. Save to Vault and make it so that team members can sync to/from Vault.


We use 1password with op (1password cli) to sync secrets on dev


Encrypted with sops; pgp pass phrase in 1password


Ignoring the point about managing secrets for a moment, and just speaking about "sharing/syncing .env files" —

I would like to suggest that anyone that cares about this, first gets onto using direnv(1) — and getting their collaborators on projects to do the same — rather than relying on the `.env`-file support included in Python / Docker Compose / etc.

Why? Because of a specific function that direnv(1) injects into its script execution environment, called source_env_if_exists().

You can use this function to separate your env-var config into two "layers": a project-global env, and a user-specific local-worktree env. The global layer can just call source_env_if_exists at the end, pointing at the local layer.

(In my own projects, I usually name this local overlay env-file `.envrc.local`)

With this approach, rather that creating an `.envrc.template` and telling each dev that they need to copy it into place, you can instead create and commit the `.envrc` file itself, holding any public/static base configs; tell your devs to override and add env in `.envrc.local`; and add `.envrc.local` to your project's `.gitignore`, so that nobody will accidentally commit their env overrides.

This also has an interesting impact: direnv(1) normally de-authorizes the sourcing of the `.envrc` file whenever its content-hash changes — which is annoying when you're constantly tweaking local env-vars. But (perhaps surprisingly), direnv(1) does not recursively hash the script files depended on through source_env_if_exists() for purposes of calculating the overall authorization hash of the toplevel script — so changing `.envrc.local` in this setup, doesn't result in having to type `direnv allow`.

As another bonus, with the `.envrc.template` approach, as soon as you copy `.envrc.template` to `.envrc`, this base config is now no longer "managed" by the project, and so can age/break. Whereas, a repo base `.envrc` can be updated by the project maintainers, and the resulting derived env will change along with it! (But, of course, making any change to the project base `.envrc` will result in each developer needing to re-authorize the `.envrc` file with `direnv allow` — which is the correct security model, as you don't want maintainers of public projects being able to attack users who've `direnv allow`ed the `.envrc` of their repo, by silently changing the content of that `.envrc`.)

And as an interesting extension to this, you can add code after source_env_if_exists(). So you can:

• validate the env-var values the developer set in `.envrc.local`

• require that certain env-vars be set in `.envrc.local` — where a value not being set results in the `.envrc` script printing an error message and exiting. The dev will see this as soon as they `direnv allow` in the dir, and the message can guide them to configuring the env-vars. (You can even do this conditionally, where e.g. a connstring env-var must be set for a provider if-and-only-if that provider is enabled.)

• allow env-vars to be specified in various different styles, together as URLs or separately as host/username/password/etc, and then canonicalize / synthesize the env-vars your project actually wants, filling in the parts of a computed var the dev didn't specify with default values

• you can require the `.envrc.local` file export an ENVRC_ABI_VERSION var, and compare that to a constant burned into the `.envrc` file, and error on mismatch. Then, if the project's base `.envrc` gets updated in a way where it now looks for different env-vars than before, you can just bump the constant in `.envrc`. When devs re-authorize the new `.envrc` version, rather than just being confused why everything is now broken, the `direnv allow` command will error out, pointing the dev to a URL on the project wiki, where there's `.envrc.local` version-migration guidance (which tells them whatever semantic changes they need to make, and then ends by telling them the new value to update ENVRC_ABI_VERSION to.)

...and lots of other things that I can't even think of right now.

(Of course, a lot of these benefits could also come from using a fancy configuration library in your actual application. But if your app is intended to be configured in a very specific way in production — for example, if it's a k8s CRD controller, and expects its config as a YAML ConfigMap resource — then it wouldn't really make sense to have all this extra plumbing in your app just for development. And so it can make a lot of sense to instead handle env-config glue-logic like this purely at the dev-env level, outside of the software.)


I've tried to convince my team to use direnv and they just won't. I don't get it. Is it because it's not easy for them to install?


We use Doppler. It’s pretty good.


We use Doppler and it’s been great.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: