Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/softprops/envy-store
🏪 deserialize AWS Parameter Store values into type safe structs
https://github.com/softprops/envy-store
aws aws-lambda aws-parameter-store config configuration configuration-management secret-management
Last synced: 17 days ago
JSON representation
🏪 deserialize AWS Parameter Store values into type safe structs
- Host: GitHub
- URL: https://github.com/softprops/envy-store
- Owner: softprops
- License: mit
- Created: 2018-10-13T05:43:23.000Z (about 6 years ago)
- Default Branch: master
- Last Pushed: 2021-07-22T10:14:45.000Z (over 3 years ago)
- Last Synced: 2024-08-17T15:09:27.556Z (3 months ago)
- Topics: aws, aws-lambda, aws-parameter-store, config, configuration, configuration-management, secret-management
- Language: Rust
- Homepage:
- Size: 573 KB
- Stars: 39
- Watchers: 3
- Forks: 5
- Open Issues: 8
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- Contributing: CONTRIBUTING.md
- License: LICENSE
Awesome Lists containing this project
README
# envy store [![Build Status](https://travis-ci.org/softprops/envy-store.svg?branch=master)](https://travis-ci.org/softprops/envy-store) [![Coverage Status](https://coveralls.io/repos/github/softprops/envy-store/badge.svg?branch=master)](https://coveralls.io/github/softprops/envy-store?branch=master) [![Software License](https://img.shields.io/badge/license-MIT-brightgreen.svg)](LICENSE) [![crates.io](http://meritbadge.herokuapp.com/envy-store)](https://crates.io/crates/envy-store) [![Released API docs](https://docs.rs/envy-store/badge.svg)](http://docs.rs/envy-store) [![Master API docs](https://img.shields.io/badge/docs-master-green.svg)](https://softprops.github.io/envy-store)
> 🏪 deserialize [AWS Parameter Store](https://docs.aws.amazon.com/systems-manager/latest/userguide/systems-manager-paramstore.html) values into typesafe structs
## 📦 Install
```toml
[dependencies]
envy-store = "0."
```## 🤸 Usage
Envy store assumes you are using the AWS best practice of [storing related parameters under
a prefixed hierarchy](https://aws.amazon.com/blogs/mt/organize-parameters-by-hierarchy-tags-or-amazon-cloudwatch-events-with-amazon-ec2-systems-manager-parameter-store/).
This leads to better clarity on what application a set of parameters belong to as well as enables
the paths based query API which has performance benefits and is the recommended best practice by AWS.Envy store also assumes the use of the [AWS default credential chain](https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-getting-started.html) for authenticating requests
with AWS. Don't worry, if you've used any AWS tooling in the past, you likely already have this configured. You will also need to ensure these credentials have the `ssm:GetParametersByPath` [IAM permission](https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-paramstore-access.html).See the [demo example](examples/demo.rs) for an example application and [documentation](https://softprops.github.io/envy-store) for more information
> 👭 Consider this crate a cousin of [envy](https://github.com/softprops/envy), a crate for deserializing environment variables into typesafe structs.
## 🤔 Why AWS Parameter Store
Environment variables are a perfectly good and probably
best solution for storing application configuration as they are more or less
universally supported across runtimes and languages.As an application grows additional factors need may come into consideration.
1) Security. Environment variables alone are a poor transport for secret information
as they can easily be leaked in their plain text format. AWS Parameter Store has
built-in support for storing values in encrypted format preventing unwanted access
from prying eyes.2) Management. The strategy for configuring environment variables for your application
will likely vary and become less managable over time. The source of truth for their
values may require some centralization in order to manage. Systems exist for helping
you manage these. AWS Parameter Store is a self managed system as a service removing
the need for you to operate one of these systems yourself.3) Access control. Related to encryption security, you may also want to limit _who_ can access
configuration. Identity access management is [built into AWS Parameter Store](https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-paramstore-access.html) so you don't have to implement this yourself.> 💡 Note that as AWS Parameter Store is a hosted service, it comes with limits to ensure quality of service for its users. You can review a list of these limits [here](https://docs.aws.amazon.com/general/latest/gr/aws_service_limits.html#limits_ssm)
Doug Tangren (softprops) 2018