Drop-in replacements for env!
and option_env!
that encrypt your variables at compile-time and decrypt them at runtime.
While it's still possible to reverse-engineer the values, envcrypt
prevents
strings <my-binary>
from trivially finding embedded secrets.
Since the secret must be decrypted at runtime,
envc!
returns an owned String
instead of &'static str
. Its API otherwise mirrors env!
and option_env!
.
The envc!
and option_envc!
macros can be used as drop-in replacements for env!
and option_env!
, respectively.
env!
```rust use envcrypt::envc;
let mysupersecretkey: String = envc!("SECRETKEY"); // ...do stuff with your secret key ```
option_env!
```rust use envcrypt::option_envc;
if let Some(optionalvalue) = optionenvc!("OPTIONALSECRETKEY") { // ...do stuff } ```
dotenvy
:.env
:
dotenv
CLIENT_SECRET="my_client_secret"
SOME_TOKEN="some_token"
build.rs
:
```rust use dotenvy::dotenv_iter;
fn main(){ println!("cargo:rerun-if-changed=.env");
for item in dotenv_iter().unwrap() { let (key, value) = item.unwrap(); println!("cargo:rustc-env=${key}=${value}"); }
} ```
main.rs
:
```rust use envcrypt::envc;
let clientsecret: String = envc!("CLIENTSECRET"); ```
Encryption is powered by magic_crypt
using AES-256 encryption. envcrypt
encrypts an environment variable, and then embeds the encrypted variable along with the encryption key and initialization vector in your binary at runtime.
You can check for yourself that your secrets are not visible in the binary by running strings
on the compiled output:
```text $ cat envcrypt-test/src/main.rs
use envcrypt::envc;
fn main() { println!("{}", envc!("ENCRYPTEDKEY")); println!("{}", env!("NAKEDKEY")); }
$ cat envcrypt-test/build.rs
fn main() { println!("cargo:rustc-env=ENCRYPTEDKEY=ENCRYPTEDVALUE"); println!("cargo:rustc-env=NAKEDKEY=NAKEDVALUE"); }
$ cargo build -p envcrypt-test Compiling envcrypt v0.2.0 (path/to/envcrypt) Compiling envcrypt-test v0.0.0 (path/to/envcrypt/envcrypt-test) Finished dev [unoptimized + debuginfo] target(s) in 1.73s
$ strings - target/debug/envcrypt-test | rg VALUE NAKED_VALUE ```
Here are instructions for running strings
yourself on MacOS, Linux, and Windows.
Inspired by litcrypt
, which I would have used except I want to open-source my code.
Dual-Licensed under MIT or APACHE-2.0.