Introduction
Now that you have downloaded our CLI, we will now walk you through how to securely store, fetch, and inject environment variables (aka SECRETS) into your applications.
Register and Login
Lets go ahead and register for an account. Then lets login to get started.
$ seekrit register -e hello@seekrit.io -p 12345678
# Check your email and accept invite.
$ seekrit login -e hello@seekrit.io -p 12345678
Create an organization
An organization is used to hold ALL your teams and environment variables. We will go ahead and name ours "playground", since this organization's mission is to create a playground for learning. You will need create your own organization name that you would want to keep for all future use past this tutorial.
$ seekrit orgs:create playground
Let's create our first project
A project lives within an organization and is typically named after the application you need to manage secrets for. Because this is our first project, lets name it "hello-world".
$ seekrit projects:create -o playground hello-world
All projects need an environment
Environments allow you to create different sets of secrets within a project that are isolated from each other.
$ seekrit envs:create -o playground -p hello-world develop
Automating our workflow! ⚙️
Lets use the link command to create a seekrit.json configuration file to avoid having to specify an organization, project, and environment on each command.
This is not permanent. You can override the flags, delete and create multiple configuration files.
$ seekrit link -o playground -p hello-world -e develop
Creating your first secret! 🔑
Creating a secret is simple, you just need to specify where you want to create the secret and assign it a name and value. Because we automated our workflow earlier, we can just focus on creating our secret.
# flag "-n" specifies the name of the secret and "-v" represents its value
$ seekrit secrets:create -n foo -v bar
Verifying our progress ✅
Let's do a list call to fetch all secrets that we will be injecting into our application in the next step.
$ seekrit secrets:list
Fetching Secrets... done
foo=bar
Last step! Injecting our secrets 🎉 🚀 💥 💪
Congratulations! We are now ready to spin up a process with all your secrets injected into its environment variables.
In the example below, we used the printenv
command to verify that our secrets got injected successfully.
$ seekrit run -- printenv
Injecting secrets into environment... done
foo=bar