ek) provides commands to authenticate, configure and run your applications with secrets injected as environment variables.
Usage
Global Flags
-h, --help: help forek-v, --version: get the current version of the CLI
Commands
login
login
Authenticate with Enkryptify to access your secrets.This opens a web browser to complete the OAuth flow. After successful authentication, credentials are stored securely in your system keyring.Options:
-f, --force: force re-authentication even if already logged in
configure
configure
Link the current git repository to an Enkryptify workspace, project and environment.The configuration is saved to
~/.enkryptify/config.json and associated with the current directory path.run
run
Run a command with secrets from Enkryptify injected as environment variables.This fetches secrets for your configured workspace, project and environment, then executes the provided command with those secrets available as env vars.Arguments:Examples:
cmd: command and arguments to run
-e, --env <environmentName>: environment name to use (overrides default from config)
-- to separate ek run from the command you want to execute.run-file
run-file
Replace all Arguments:Examples of files to replace variables in:
${VARIABLES} in a file with the corresponding secrets from Enkryptify.file: file to replace variables in
create
create
Create a new secret in the current environment.Arguments:Expected result: the
name: secret key (A-Z, a-z, 0-9, underscore, hyphen)value: secret value (use quotes for spaces or special characters)
DATABASE_URL secret is created in the current environment.update
update
Update a secret in the current environment.Arguments:Expected result: the
name: secret key to update
--ispersonal: make the secret personal (Enkryptify provider only)
DATABASE_URL secret is updated in the current environment.delete
delete
Delete a secret from the current environment.Arguments:Expected result: the
name: secret key to delete
DATABASE_URL secret is removed from the current environment.list
list
List secrets in the current environment.Options:Expected result: a table of secrets with values visible.
-s, --show: show secret values (defaults to masked)