Why is my .env file blocked?
.env files, database files and dumps, and even Terraform state files are among the most controversial policies that BluBracket supports by default.
Understanding the risk of
The majority of our users have asked us to alert them about these in their code because they represent risks they’re trying to eliminate. From dev.to :
Let’s face it,
.envfiles are amazing. They have an easy-to-read syntax that stores all of our essential configurations into one file. Not only that, they keep our deepest, darkest secrets as web developers. They make sure that our precious API keys and database passwords are kept locally, away from prying eyes. Having such a critical role in our code bases, we are constantly reminded by the community to never share our
.envfiles; to treat them like how the government treats their confidential information.
This is especially enforced in the open-source community where everyone shares, copies, and reuses code with each other. Accidentally committing and pushing the
.envfile is considered by many as a relatable moment. Personally, I have never done it myself yet, but I’m sure my fate is sealed at this point.
A stain in the commit history
Running a quick search on GitHub reveals that there are still a number of people who didn’t get the memo. The occasional add
.envcommit titles appear every now and then in the search results. Looking into the content of the commits indeed shows their precious API keys and database passwords. It’s honestly funny to see how they revert their changes like how a child becomes guilty of doing something they shouldn’t have.
What’s more alarming about this is that there are still some others who have not reverted their commits. The
.envfile is still alive and well in their repositories. For all we know, these might be real, actual API keys and database passwords they currently depend on in a regular basis. To make matters worse, sorting the search results by recently committed shows how common and frequent these commits are.
The problem with simply removing the
.envfile in the working tree is the fact that Git keeps a record of all the commits made in a repository, even the earliest ones. Unless clever tricks have been made (more on that later), committing that
.envfile will forever be a stain in the commit history. This is just what a version control system is supposed to do after all: keep a history of changes, even the bad ones.
Configuration best practices
Many of our users who have asked us to alert on
.env files have also pointed out that they want to exclude them from repos even if they can ensure there are no secrets in them.
Larry Garfield has an excellent overview of this
that starts from first principles of how to configure applications and extends all the way out how to make localized adjustments to that configuration as needed for testing and local development. It’s worth looking at the whole thing, but here’s the part that gets at
This is where the
.envfile comes into play.
.envis a de facto standard for an ini-like file that contains fake environment variables. An application that supports
.envfiles will, on boot, run through each line in that file and read key=value pairs. For each, it will run “IF an environment variable with this name doesn’t already exist, set it based on this file.” That will set the variable only within the scope of your application’s process, without impacting any other processes on the computer. Then the rest of your application can proceed and read from the environment as it would anywhere else, entirely ignorant of that switcheroo. (Don’t write that code yourself. There are
.envsupport libraries in every language that all do exactly the same thing. Use one of those.)
That, and only that, is the purpose of
.envfiles: values that change per-environment, and thus are not part of your code base. Which brings up the most important thing to remember about
.envfiles: they do not belong in Git. Anything in Git is going to be the same on every environment, by design, which is exactly the opposite of what environment variables and
.envfile are for.
Values that do not change between environments also do not belong in the
.envfile. The site name, admin email address, and so on should either be in a read-only config file that is committed to Git or in the database, depending on if you want those configuration values to be end-user modifiable. (Either way is valid, as long as you do it deliberately.) But those values do not belong in the
.envfile, because they are not environment-specific.
These are the points we’ve heard from many customers, and they reflect why BluBracket alerts users to
.env files (along with database content and more) by default.
However, BluBracket is a tool for all, and we understand not everybody shares the same policies.
Yah yah, just let me merge this
.env file already
To override the default policy that alerts on
.env file, one of the following can be used:
.env files in a single repository
.blubracket/ignore.yml file in the repository
with the following content:
# BluBracket ignore file # Full docs at # https://docs.blubracket.com/how-to/ignore-rules/per-repo/ # Ignore by file path - paths: - **/.env
.env files in any repository
Follow the documentation for global ignore rules here .