Tuesday, April 21, 2026
HomeiOS Developmentretailer keys in env recordsdata?

retailer keys in env recordsdata?

[ad_1]

On this tutorial I will present you tips on how to save and cargo secret keys as base64 encoded strings utilizing dotenv recordsdata in Vapor 4.

Vapor

Utilizing the Surroundings in Vapor 4

Identical to many well-liked server facet frameworks, your Vapor primarily based backend utility can load a file referred to as .env. It’s potential to retailer key-value primarily based (secret) configuration values inside this file. Once you run the app, one of many following file can be loaded, primarily based on the present surroundings:

  • Manufacturing (.env)
  • Improvement (.env.growth)
  • Testing (.env.testing)

Once you execute your checks the .env.testing file can be used. When you begin the app utilizing the serve Vapor command you can even change the surroundings utilizing the --env or -e flag. The obtainable choices are manufacturing and growth, and the corresponding .env file can be loaded. It’s potential to create a customized surroundings, you possibly can learn extra about this within the official Vapor docs. The .env file normally incorporates one key and worth per line, now the issue begins while you wish to retailer a multiline secret key within the file. So what can we do about this? 🤔




Base64 encoded secret keys

Sure, we will encode the key key utilizing a base64 encoding. No, I do not wish to copy my secrets and techniques into an on-line base64 encoder, as a result of there’s a fairly easy shell command that I can use.


echo "<my-secret-key>" | base64


When you do not like unix instructions, we will at all times put collectively a bit of Swift script and use an extension on the String kind to encode keys. Simply save the snippet from beneath right into a base64.swift file, put your key into the important thing part, give the file some executable permission & run it utilizing the chmod o+x && ./base64.swift one-liner command and voilá…


#! /usr/bin/swift

import Basis

extension String {

    func base64Encoded() -> String? {
        return information(utilizing: .utf8)?.base64EncodedString()
    }
}

let key = """
    <my-secret-key-comes-here>
"""

print(key.base64Encoded()!)


You possibly can copy & paste the encoded worth of the key key into your personal .env.* file, substitute the asterix image along with your present surroundings after all, earlier than you do it. 🙈


//e.g. .env.growth
SECRET_KEY="<base64-encoded-secret-key>"


Now we simply need to decode this key in some way, earlier than we will begin utilizing it…



Decoding the key key

You possibly can implement a base64 decoder as a String extension with just some strains of Swift code.

import Basis

extension String {

    func base64Decoded() -> String? {
        guard let information = Information(base64Encoded: self) else { return nil }
        return String(information: information, encoding: .utf8)
    }
}


Now in my initiatives I like to increase the Surroundings object and place all my customized variables there as static constants, this manner I can entry them in a very handy approach, plus if one thing goes fallacious (normally after I do not re-create the .env file after a git reset or I haven’t got all of the variables current within the dotenv file) the app will crash due to the pressured unwraps, and I will know for positive that one thing is fallacious with my surroundings. It is a crash for my very own security. 💥


import Vapor

extension Surroundings {
    static let secretKey = Self.get("SECRET_KEY")!.base64Decoded()!
}


Surroundings.secretKey


I believe this method may be very helpful. After all you must place the .env.* sample into your .gitignore file, in any other case for those who place some secrets and techniques into the dotenv file and also you push that into the distant… effectively, everybody else will know your keys, passwords, and so forth. You do not need that, proper? ⚠️


Be at liberty to make use of this technique when it’s a must to implement a Check in With Apple workflow, or a Apple Push Notification service (APNs). In these instances you may undoubtedly need to go one ore extra secret keys to your Vapor primarily based backend utility. That is it for now, thanks for studying.


[ad_2]

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments