Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Share Environnment Variables Securely

License

NotificationsYou must be signed in to change notification settings

chronark/envshare

Repository files navigation

Share Environment Variables Securely

EnvShare is a simple tool to share environment variables securely. It usesAES-GCM to encrypt your data before sending it to the server. The encryptionkey never leaves your browser.

Features

  • Shareable Links: Share your environment variables securely by sending alink
  • End-to-End Encryption: AES-GCM encryption is used to encrypt your databefore sending it to the server
  • Limit number of reads: Limit the number of times a link can be read
  • Auto Expire: Automatically expire links and delete data after a certaintime

Built with

Deploy your own

Detailed instructions can be foundhere

All you need is a Redis database on Upstash and a Vercel account. Click thebutton below to clone and deploy:

Deploy with Vercel

Sponsors

Upstash

Upstash: Serverless Database for Redis

  • Serverless Redis with global replication and durable storage
  • Price scales to zero with per request pricing
  • Built-in REST API designed for serverless and edge functions

Start for free in 30 seconds!

Configuration

Environment Variables

ENABLE_VERCEL_ANALYTICS Any truthy value will enable Vercel Analytics. This is turned off by default

Contributing

This repository usespnpm to manage dependencies. Install it usingnpm install -g pnpm

Please runpnpm fmt before committing to format the code.

Docs

Docs in the README are temporary and will be moved to the website soon.

API

Store a secret

PLEASE NEVER EVER UPLOAD UNENCRYPTED SECRETS.

This endpoint is only meant to storealready encrypted secrets. Theencrypted secrets are stored in plain text.

$curl -XPOST -s https://envshare.dev/api/v1/secret -d"already-encrypted-secret"

You can add optional headers to configure the ttl and number of reads.

$curl -XPOST -s https://envshare.dev/api/v1/secret -d"already-encrypted-secret" -H"envshare-ttl: 3600" -H"envshare-reads: 10"
  • Omitting theenvshare-ttl header will set a default of 30 days. Disable thettl by setting it to 0. (envshare-ttl: 0)
  • Omitting theenvshare-reads header will simply disable it and allow readingfor an unlimited number of times.

This endpoint returns a JSON response with the secret id:

{"data": {"id":"HdPbXgpvUvNk43oxSdK97u","ttl":86400,"reads":2,"expiresAt":"2023-01-19T20:47:28.383Z","url":"http://envshare.dev/api/v1/secret/HdPbXgpvUvNk43oxSdK97u"  }}

Retrieve a secret

You need an id to retrieve a secret. The id is returned when you store a secret.

$curl -s https://envshare.dev/api/v1/secret/HdPbXgpvUvNk43oxSdK97u
{"data": {"secret":"Hello","remainingReads":1  }}

About

Share Environnment Variables Securely

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors7


[8]ページ先頭

©2009-2026 Movatter.jp