|
const fs = require('fs') |
|
const path = require('path') |
|
const os = require('os') |
|
const crypto = require('crypto') |
|
const packageJson = require('../package.json') |
|
|
|
const version = packageJson.version |
|
|
|
const LINE = /(?:^|^)\s*(?:export\s+)?([\w.-]+)(?:\s*=\s*?|:\s+?)(\s*'(?:\\'|[^'])*'|\s*"(?:\\"|[^"])*"|\s*`(?:\\`|[^`])*`|[^#\r\n]+)?\s*(?:#.*)?(?:$|$)/mg |
|
|
|
|
|
function parse (src) { |
|
const obj = {} |
|
|
|
|
|
let lines = src.toString() |
|
|
|
|
|
lines = lines.replace(/\r\n?/mg, '\n') |
|
|
|
let match |
|
while ((match = LINE.exec(lines)) != null) { |
|
const key = match[1] |
|
|
|
|
|
let value = (match[2] || '') |
|
|
|
|
|
value = value.trim() |
|
|
|
|
|
const maybeQuote = value[0] |
|
|
|
|
|
value = value.replace(/^(['"`])([\s\S]*)\1$/mg, '$2') |
|
|
|
|
|
if (maybeQuote === '"') { |
|
value = value.replace(/\\n/g, '\n') |
|
value = value.replace(/\\r/g, '\r') |
|
} |
|
|
|
|
|
obj[key] = value |
|
} |
|
|
|
return obj |
|
} |
|
|
|
function _parseVault (options) { |
|
const vaultPath = _vaultPath(options) |
|
|
|
|
|
const result = DotenvModule.configDotenv({ path: vaultPath }) |
|
if (!result.parsed) { |
|
const err = new Error(`MISSING_DATA: Cannot parse ${vaultPath} for an unknown reason`) |
|
err.code = 'MISSING_DATA' |
|
throw err |
|
} |
|
|
|
|
|
|
|
const keys = _dotenvKey(options).split(',') |
|
const length = keys.length |
|
|
|
let decrypted |
|
for (let i = 0; i < length; i++) { |
|
try { |
|
|
|
const key = keys[i].trim() |
|
|
|
|
|
const attrs = _instructions(result, key) |
|
|
|
|
|
decrypted = DotenvModule.decrypt(attrs.ciphertext, attrs.key) |
|
|
|
break |
|
} catch (error) { |
|
|
|
if (i + 1 >= length) { |
|
throw error |
|
} |
|
|
|
} |
|
} |
|
|
|
|
|
return DotenvModule.parse(decrypted) |
|
} |
|
|
|
function _log (message) { |
|
console.log(`[dotenv@${version}][INFO] ${message}`) |
|
} |
|
|
|
function _warn (message) { |
|
console.log(`[dotenv@${version}][WARN] ${message}`) |
|
} |
|
|
|
function _debug (message) { |
|
console.log(`[dotenv@${version}][DEBUG] ${message}`) |
|
} |
|
|
|
function _dotenvKey (options) { |
|
|
|
if (options && options.DOTENV_KEY && options.DOTENV_KEY.length > 0) { |
|
return options.DOTENV_KEY |
|
} |
|
|
|
|
|
if (process.env.DOTENV_KEY && process.env.DOTENV_KEY.length > 0) { |
|
return process.env.DOTENV_KEY |
|
} |
|
|
|
|
|
return '' |
|
} |
|
|
|
function _instructions (result, dotenvKey) { |
|
|
|
let uri |
|
try { |
|
uri = new URL(dotenvKey) |
|
} catch (error) { |
|
if (error.code === 'ERR_INVALID_URL') { |
|
const err = new Error('INVALID_DOTENV_KEY: Wrong format. Must be in valid uri format like dotenv://:[email protected]/vault/.env.vault?environment=development') |
|
err.code = 'INVALID_DOTENV_KEY' |
|
throw err |
|
} |
|
|
|
throw error |
|
} |
|
|
|
|
|
const key = uri.password |
|
if (!key) { |
|
const err = new Error('INVALID_DOTENV_KEY: Missing key part') |
|
err.code = 'INVALID_DOTENV_KEY' |
|
throw err |
|
} |
|
|
|
|
|
const environment = uri.searchParams.get('environment') |
|
if (!environment) { |
|
const err = new Error('INVALID_DOTENV_KEY: Missing environment part') |
|
err.code = 'INVALID_DOTENV_KEY' |
|
throw err |
|
} |
|
|
|
|
|
const environmentKey = `DOTENV_VAULT_${environment.toUpperCase()}` |
|
const ciphertext = result.parsed[environmentKey] |
|
if (!ciphertext) { |
|
const err = new Error(`NOT_FOUND_DOTENV_ENVIRONMENT: Cannot locate environment ${environmentKey} in your .env.vault file.`) |
|
err.code = 'NOT_FOUND_DOTENV_ENVIRONMENT' |
|
throw err |
|
} |
|
|
|
return { ciphertext, key } |
|
} |
|
|
|
function _vaultPath (options) { |
|
let possibleVaultPath = null |
|
|
|
if (options && options.path && options.path.length > 0) { |
|
if (Array.isArray(options.path)) { |
|
for (const filepath of options.path) { |
|
if (fs.existsSync(filepath)) { |
|
possibleVaultPath = filepath.endsWith('.vault') ? filepath : `${filepath}.vault` |
|
} |
|
} |
|
} else { |
|
possibleVaultPath = options.path.endsWith('.vault') ? options.path : `${options.path}.vault` |
|
} |
|
} else { |
|
possibleVaultPath = path.resolve(process.cwd(), '.env.vault') |
|
} |
|
|
|
if (fs.existsSync(possibleVaultPath)) { |
|
return possibleVaultPath |
|
} |
|
|
|
return null |
|
} |
|
|
|
function _resolveHome (envPath) { |
|
return envPath[0] === '~' ? path.join(os.homedir(), envPath.slice(1)) : envPath |
|
} |
|
|
|
function _configVault (options) { |
|
_log('Loading env from encrypted .env.vault') |
|
|
|
const parsed = DotenvModule._parseVault(options) |
|
|
|
let processEnv = process.env |
|
if (options && options.processEnv != null) { |
|
processEnv = options.processEnv |
|
} |
|
|
|
DotenvModule.populate(processEnv, parsed, options) |
|
|
|
return { parsed } |
|
} |
|
|
|
function configDotenv (options) { |
|
const dotenvPath = path.resolve(process.cwd(), '.env') |
|
let encoding = 'utf8' |
|
const debug = Boolean(options && options.debug) |
|
|
|
if (options && options.encoding) { |
|
encoding = options.encoding |
|
} else { |
|
if (debug) { |
|
_debug('No encoding is specified. UTF-8 is used by default') |
|
} |
|
} |
|
|
|
let optionPaths = [dotenvPath] |
|
if (options && options.path) { |
|
if (!Array.isArray(options.path)) { |
|
optionPaths = [_resolveHome(options.path)] |
|
} else { |
|
optionPaths = [] |
|
for (const filepath of options.path) { |
|
optionPaths.push(_resolveHome(filepath)) |
|
} |
|
} |
|
} |
|
|
|
|
|
|
|
let lastError |
|
const parsedAll = {} |
|
for (const path of optionPaths) { |
|
try { |
|
|
|
const parsed = DotenvModule.parse(fs.readFileSync(path, { encoding })) |
|
|
|
DotenvModule.populate(parsedAll, parsed, options) |
|
} catch (e) { |
|
if (debug) { |
|
_debug(`Failed to load ${path} ${e.message}`) |
|
} |
|
lastError = e |
|
} |
|
} |
|
|
|
let processEnv = process.env |
|
if (options && options.processEnv != null) { |
|
processEnv = options.processEnv |
|
} |
|
|
|
DotenvModule.populate(processEnv, parsedAll, options) |
|
|
|
if (lastError) { |
|
return { parsed: parsedAll, error: lastError } |
|
} else { |
|
return { parsed: parsedAll } |
|
} |
|
} |
|
|
|
|
|
function config (options) { |
|
|
|
if (_dotenvKey(options).length === 0) { |
|
return DotenvModule.configDotenv(options) |
|
} |
|
|
|
const vaultPath = _vaultPath(options) |
|
|
|
|
|
if (!vaultPath) { |
|
_warn(`You set DOTENV_KEY but you are missing a .env.vault file at ${vaultPath}. Did you forget to build it?`) |
|
|
|
return DotenvModule.configDotenv(options) |
|
} |
|
|
|
return DotenvModule._configVault(options) |
|
} |
|
|
|
function decrypt (encrypted, keyStr) { |
|
const key = Buffer.from(keyStr.slice(-64), 'hex') |
|
let ciphertext = Buffer.from(encrypted, 'base64') |
|
|
|
const nonce = ciphertext.subarray(0, 12) |
|
const authTag = ciphertext.subarray(-16) |
|
ciphertext = ciphertext.subarray(12, -16) |
|
|
|
try { |
|
const aesgcm = crypto.createDecipheriv('aes-256-gcm', key, nonce) |
|
aesgcm.setAuthTag(authTag) |
|
return `${aesgcm.update(ciphertext)}${aesgcm.final()}` |
|
} catch (error) { |
|
const isRange = error instanceof RangeError |
|
const invalidKeyLength = error.message === 'Invalid key length' |
|
const decryptionFailed = error.message === 'Unsupported state or unable to authenticate data' |
|
|
|
if (isRange || invalidKeyLength) { |
|
const err = new Error('INVALID_DOTENV_KEY: It must be 64 characters long (or more)') |
|
err.code = 'INVALID_DOTENV_KEY' |
|
throw err |
|
} else if (decryptionFailed) { |
|
const err = new Error('DECRYPTION_FAILED: Please check your DOTENV_KEY') |
|
err.code = 'DECRYPTION_FAILED' |
|
throw err |
|
} else { |
|
throw error |
|
} |
|
} |
|
} |
|
|
|
|
|
function populate (processEnv, parsed, options = {}) { |
|
const debug = Boolean(options && options.debug) |
|
const override = Boolean(options && options.override) |
|
|
|
if (typeof parsed !== 'object') { |
|
const err = new Error('OBJECT_REQUIRED: Please check the processEnv argument being passed to populate') |
|
err.code = 'OBJECT_REQUIRED' |
|
throw err |
|
} |
|
|
|
|
|
for (const key of Object.keys(parsed)) { |
|
if (Object.prototype.hasOwnProperty.call(processEnv, key)) { |
|
if (override === true) { |
|
processEnv[key] = parsed[key] |
|
} |
|
|
|
if (debug) { |
|
if (override === true) { |
|
_debug(`"${key}" is already defined and WAS overwritten`) |
|
} else { |
|
_debug(`"${key}" is already defined and was NOT overwritten`) |
|
} |
|
} |
|
} else { |
|
processEnv[key] = parsed[key] |
|
} |
|
} |
|
} |
|
|
|
const DotenvModule = { |
|
configDotenv, |
|
_configVault, |
|
_parseVault, |
|
config, |
|
decrypt, |
|
parse, |
|
populate |
|
} |
|
|
|
module.exports.configDotenv = DotenvModule.configDotenv |
|
module.exports._configVault = DotenvModule._configVault |
|
module.exports._parseVault = DotenvModule._parseVault |
|
module.exports.config = DotenvModule.config |
|
module.exports.decrypt = DotenvModule.decrypt |
|
module.exports.parse = DotenvModule.parse |
|
module.exports.populate = DotenvModule.populate |
|
|
|
module.exports = DotenvModule |
|
|