Tool for dealing with your Secrets App from anywhere
- ⬇️ Pull secrets as file (.json, .env)
- 🔑 Support for Doppler (at the moment), more will coming..
npx sikret-cli
Add your auth token from your provider (ex: from Doppler) with SIKRET_TOKEN
export SIKRET_TOKEN=<YOUR_TOKEN>
npx sikret-cli pull -p sikret -e dev
npx sikret-cli --help
sikret <command>
Commands:
sikret pull Pull secret from specific provider. Default to: Doppler
Options:
--version Show version number [boolean]
--help Show help [boolean]
or detail for pull
npx sikret-cli pull --help
sikret pull
Pull secret from specific provider. Default to: Doppler
Options:
--version Show version number [boolean]
--help Show help [boolean]
--provider, --pv Secret provider. Ex: doppler | [TODO] hashicorp-consul |
[TODO] hashicorp-vault | [TODO] gcp-secretmanager
[string] [default: "doppler"]
-p, --project Key/Label from the secret [string]
-e, --environment Scope/Environment from the secret [string]
-f, --format Output format: dotenv | json | [TODO] tmpl
[string] [default: "dotenv"]
-o, --output Output file path [string] [default: ".env"]
-t, --token Auth Token from provider [string]
From here, you should be ready to go to kickstart your project ✅
Learn how to contribute by following this doc.
- Capabilities
- Pull secrets
- Write secrets (.json)
- Write secrets (.env)
- Write secrets (.tmpl)
- Inject to runtime
- Create secrets
- Update secrets
- More providers
- Doppler
- AWS Secret Manager
- GCP Secret Manager
- Hashicorp Vault
- Hashicorp Consul
- Chore
- Linters, formatters, ci/cd
- Semantic-release
- Unit Tests
- Migrate to RUST 🔥