Skip to content

Commit fa7752b

Browse files
committed
feat: add service/{service}/{env}/env_vars path
Allow dev values to be loaded in services namespace. Change order of operations to always load env specific values over base path
1 parent a9e33a5 commit fa7752b

File tree

3 files changed

+49
-22
lines changed

3 files changed

+49
-22
lines changed

README.md

+33-15
Original file line numberDiff line numberDiff line change
@@ -19,22 +19,38 @@ ENTRYPOINT [ "/entrypoint" ]
1919

2020
## Usage
2121

22-
To load a environment variables, you'll need to set a `SERVICE_ENV` environment
23-
variable to `prod`, `stage`, `dev`, or `peer`. The following paths get loaded as
24-
environment variables, but some environments may change this. You can view exact
25-
paths used in each template.
22+
To load values from Consul's KV store, you will need to set `CONSUL_ADDR`. It
23+
will load keys from the following paths, using the basename as the variable name:
2624

27-
* `global/env_vars/*` (_Consul_)
28-
* `services/${SERVICE_NAME}/env_vars/*` (_Consul_)
29-
* `secrets/global/env_vars/*` (_Vault_ using the `value` key)
30-
* `services/${SERVICE_NAME}/env_vars/*` (_Vault_ using the `value` key)
25+
* `global/env_vars/*`
26+
* `global/${SERVICE_ENV}/env_vars/*`
27+
* `services/${SERVICE_NAME}/env_vars/*`
28+
* `service/${SERVICE_NAME}/${SERVICE_ENV}/env_vars/*`
3129

32-
To load values from Consul, you'll need to make sure `CONSUL_ADDR` is accessible
33-
from your Docker container.
30+
For example, `consul kv put services/foo/env_vars/API_SERVICE_URI https://api.priv/v1`
31+
will load an environment variable `API_SERVICE_URI=https://api.priv/v1`.
3432

35-
To load values from Vault, you'll need to make sure both `CONSUL_ADDR` and `VAULT_ADDR`
36-
are accessible. You'll also need to authenticate with Vault in one of the following
37-
ways:
33+
Any environment variables set previous to calling the script, will not change.
34+
Paths later in the list will overwrite any previous values. For example,
35+
`global/env_vars/FOO` will be overwritten by `service/my-service/env_vars/FOO`.
36+
37+
To load values from Vault, you will need to set `VAULT_ADDR` and authenticate with
38+
Vault (see below). Values from vault will use the `value` key as the variable value.
39+
Values are read from the following paths:
40+
41+
* `secret/global/env_vars/*` (in `stage` or `prod`)
42+
* `secret/global/${SERVICE_ENV}/env_vars/*`
43+
* `secret/services/${SERVICE_NAME}/env_vars/*` (in `stage` or `prod`)
44+
* `secret/service/${SERVICE_NAME}/${SERVICE_ENV}/env_vars/*`
45+
46+
For example, `vault write secret/foo/env_vars/API_KEY value=secretkey` will load
47+
an environment variable `API_KEY=secretkey`. Values from Vault will overrwrite
48+
Consul values, but follow the same rules otherwise.
49+
50+
<details>
51+
<summary>Vault Authentication</summary>
52+
53+
You can authenticate with Vault in one of the following ways:
3854

3955
* Set `VAULT_TOKEN`
4056
* Set `ENCRYPTED_VAULT_TOKEN` with a value encrypted by AWS KMS
@@ -43,6 +59,8 @@ ways:
4359
* If running on AWS ECS or Lambda, use the AWS IAM auth method
4460
* If Vault role does not match IAM role, set with `VAULT_ROLE`
4561

62+
</details>
63+
4664
## Development
4765

4866
You'll need to install the following:
@@ -61,5 +79,5 @@ or [commitizen](https://github.com/commitizen-tools/commitizen#installation).
6179

6280
## Creating a Release
6381

64-
To create a release, create a tag that follows [semver](https://semver.org/) and
65-
a GitHub Action workflow will take care of creating the release.
82+
To create a release, create a tag that follows [semver](https://semver.org/). A
83+
GitHub Action workflow will take care of creating the release.

config.go

+9-4
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,8 @@
11
package main
22

3-
import "fmt"
3+
import (
4+
"fmt"
5+
)
46

57
type Config struct {
68
Service string
@@ -12,29 +14,32 @@ type Config struct {
1214
// ConsulPaths returns the paths from Consul to load
1315
func (c *Config) ConsulPaths() []string {
1416
return []string{
15-
fmt.Sprintf("global/%s/env_vars", c.Environment), // DEPRECATED
1617
"global/env_vars",
18+
fmt.Sprintf("global/%s/env_vars", c.Environment),
1719
fmt.Sprintf("products/%s/env_vars", c.Product), // DEPRECATED
1820
fmt.Sprintf("apps/%s/%s/env_vars", c.Service, c.Environment), // DEPRECATED
1921
fmt.Sprintf("services/%s/env_vars", c.Service),
22+
fmt.Sprintf("services/%s/%s/env_vars", c.Service, c.Environment),
2023
}
2124
}
2225

2326
// VaultPaths returns the paths from Vault to load
2427
func (c *Config) VaultPaths() []string {
2528
if c.Environment == "stage" || c.Environment == "prod" {
2629
return []string{
27-
fmt.Sprintf("secret/global/%s/env_vars", c.Environment), // DEPRECATED
2830
"secret/global/env_vars",
31+
fmt.Sprintf("secret/global/%s/env_vars", c.Environment),
2932
fmt.Sprintf("secret/products/%s/env_vars", c.Product), // DEPRECATED
3033
fmt.Sprintf("secret/apps/%s/%s/env_vars", c.Service, c.Environment), // DEPRECATED
3134
fmt.Sprintf("secret/services/%s/env_vars", c.Service),
35+
fmt.Sprintf("secret/services/%s/%s/env_vars", c.Service, c.Environment),
3236
}
3337
}
3438

3539
return []string{
36-
fmt.Sprintf("secret/global/%s/env_vars", c.Environment), // DEPRECATED
40+
fmt.Sprintf("secret/global/%s/env_vars", c.Environment),
3741
fmt.Sprintf("secret/products/%s/%s/env_vars", c.Product, c.Environment), // DEPRECATED
3842
fmt.Sprintf("secret/apps/%s/%s/env_vars", c.Service, c.Environment), // DEPRECATED
43+
fmt.Sprintf("secret/services/%s/%s/env_vars", c.Service, c.Environment),
3944
}
4045
}

config_test.go

+7-3
Original file line numberDiff line numberDiff line change
@@ -14,11 +14,12 @@ func TestConfig_ConsulPaths(t *testing.T) {
1414
}
1515

1616
assert.Equal(t, []string{
17-
"global/stage/env_vars",
1817
"global/env_vars",
18+
"global/stage/env_vars",
1919
"products/bar/env_vars",
2020
"apps/foo/stage/env_vars",
2121
"services/foo/env_vars",
22+
"services/foo/stage/env_vars",
2223
}, c.ConsulPaths())
2324
}
2425

@@ -30,26 +31,29 @@ func TestConfig_VaultPaths(t *testing.T) {
3031
}
3132

3233
assert.Equal(t, []string{
33-
"secret/global/stage/env_vars",
3434
"secret/global/env_vars",
35+
"secret/global/stage/env_vars",
3536
"secret/products/bar/env_vars",
3637
"secret/apps/foo/stage/env_vars",
3738
"secret/services/foo/env_vars",
39+
"secret/services/foo/stage/env_vars",
3840
}, c.VaultPaths())
3941

4042
c.Environment = "prod"
4143
assert.Equal(t, []string{
42-
"secret/global/prod/env_vars",
4344
"secret/global/env_vars",
45+
"secret/global/prod/env_vars",
4446
"secret/products/bar/env_vars",
4547
"secret/apps/foo/prod/env_vars",
4648
"secret/services/foo/env_vars",
49+
"secret/services/foo/prod/env_vars",
4750
}, c.VaultPaths())
4851

4952
c.Environment = "dev"
5053
assert.Equal(t, []string{
5154
"secret/global/dev/env_vars",
5255
"secret/products/bar/dev/env_vars",
5356
"secret/apps/foo/dev/env_vars",
57+
"secret/services/foo/dev/env_vars",
5458
}, c.VaultPaths())
5559
}

0 commit comments

Comments
 (0)