Many people think shipping config json files is an upgrade over environment variables. It's not.
Don't let your app load its config.
... inject it instead.
Unix environment vars are ideal for configuration and I have yet to encounter an application that woudn't be better off with them.
- You can change a value at near-runtime:
DEBUG=*.* node run.js
- You can inject environment variables into a process belonging to a non-privileged user:
source envs/production.sh && sudo -EHu www-data node run.js
- You can inherit, inside
staging.sh
, just source production.sh
, inside kevin.sh
source development.sh
- Your operating system is aware and provides tools for inspection, debugging, optionally passing onto other processes, etc.
- You can re-use config in supporting BASH scripts
- You can use config in the terminal yourself. E.g.
cd ${MYAPP_DIR}
And as with any other type of config:
- You can group/save them into files and keep them out of version control
One downside of environment variables is that there is little convention and syntactic sugar in the high-level languages. This module attempts to change that.
Environmental doesn't:
Environmental does:
- Impose one way of dealing with environment variables
- Make vars available in nested format inside your app (e.g.
MYAPP_REDIS_HOST
) becomes config.redis.host
- Play well with unix
- Interpret multiple inherited bash environment files in an isolated environment to capture them, and prepare them for exporting to Nodejitsu or Heroku.
Conventions
Layout
Environmental tree:
_default.sh
├── development.sh
│ └── test.sh
└── production.sh
└── staging.sh.sh
On disk:
envs/
├── _default.sh
├── development.sh
├── production.sh
├── staging.sh
└── test.sh
You could make this super-DRY, but I actually recommend using mainly
development.sh
and production.sh
, and duplicate keys between them
so you can easily compare side by side.
Then just use _default.sh
, test.sh
, staging.sh
for tweaks, to keep things
clear.
Inheritance can be a bitch
One common pitfall is re-use of variables:
export MYSQL_HOST="127.0.0.1"
export MYSQL_URL="mysql://user:pass@${MYSQL_HOST}/dbname"
Then when you extend this and only override MYSQL_HOST
, obviously the MYSQL_URL
will remain unaware of your host change. Ergo: duplication of vars might be the lesser evil than going out of your way to DRY things up.
Mandatory and unprefixed variables
These variables are mandatory and have special meaning:
export NODE_APP_PREFIX="MYAPP"
export NODE_ENV="production"
export DEPLOY_ENV="staging"
export DEBUG=*.*
After getting that out of the way, feel free to start hacking, prefixing all
other vars with MYAPP
- or the actual short abbreviation of your app name. Don't use an underscore _
in this name.
In this example, TLS
is our app name:
export NODE_APP_PREFIX="TLS"
export TLS_REDIS_HOST="127.0.0.1"
export TLS_REDIS_USER="jane"
Getting started
In a new project, type
$ npm install --save environmental
This will install the node module. Next you'll want to set up an example environment as shown in layout, using these templates:
cp -Ra node_modules/environmental/envs ./envs
Add envs/*.sh
to your project's .gitignore
file so they are not accidentally committed into your repository.
Having env files in Git can be convenient as you're still protoyping, but once you go live you'll want to change all credentails and sync your env files separate from your code.
Accessing config inside your app
Start your app in any of these ways:
source envs/development.sh && node myapp.js
source envs/development.sh && node myapp.js
Inside your app you can now obviously already just access process.env.MYAPP_REDIS_HOST
, but Environmental also provides some syntactic sugar so you could type config.redis.host
instead. Here's how:
var Environmental = require ('environmental');
var environmental = new Environmental();
var config = environmental.nested(process.env, process.env.NODE_APP_PREFIX);
console.log(config);
As you see
- any underscore
_
in env var names signifies a new nesting level of configuration - all remaining keys are lowercased
Exporting to Nodejitsu
Nodejitsu als works with environment variables. But since they are hard to ship, they want you to bundle them in a json file.
Environmental can create such a temporary json file for you. In this example it figures out all vars from envs/production.sh
(even if it inherits from other files):
$ ./node_modules/.bin/environmental envs/production.sh
{"MYAPP_REDIS_PORT":"6379","NODE_APP_PREFIX":"MYAPP","MYAPP_REDIS_PASS":"","DEPLOY_ENV":"production","SUBDOMAIN":"mycompany-myapp","NODE_ENV":"production","MYAPP_REDIS_HOST":"127.0.0.1","DEBUG":""}
$ ./node_modules/.bin/environmental envs/production.sh > /tmp/jitsu-env.json
$ jitsu --confirm env load /tmp/jitsu-env.json
$ jitsu --confirm deploy
$ rm /tmp/jitsu-env.json
Exporting to Heroku
@TODO
Exporting to your own servers
You could use rsync for this. For instance:
for host in `echo ${MYAPP_SSH_HOSTS}`; do
rsync \
--recursive \
--links \
--perms \
--times \
--devices \
--specials \
--progress \
./envs/ ${host}:${MYAPP_DIR}/envs
done
Injecting into a non-privileged user process
When you deploy your app into production and you run the servers yourself, you might want to use upstart to respawn your process after crashes.
Here's how an upstart file (/etc/init/myapp
) could look like, where the root user injects the environment keys into process memory of an unpriviliged user.
This has the big security advantage that you own program cannot even read its credentials from disk.
stop on runlevel [016]
start on (started networking)
respawn
respawn limit 10 5
limit nofile 32768 32768
pre-stop exec status myapp | grep -q "stop/waiting" && initctl emit --no-wait stopped JOB=myapp || true
script
exec bash -c "cd /srv/myapp/current \
&& chown root envs/*.sh \
&& chmod 600 envs/*.sh \
&& source envs/production.sh \
&& exec sudo -EHu www-data make start 2>&1"
end script
Todo