Astro
While Astro has astro:env to help with environment variables, we think Varlock has more to offer:
- Your
.env.schemais not tied to JavaScript, and is a better place to store this schema info versus yourastro.config.*file - Facilitates loading and composing multiple
.envfiles - You can use validated env vars right away within your
astro.config.*file - Facilitates setting values and handling multiple environments, not just setting defaults
- More data types and options available
- Leak detection, log redaction, and more security guardrails
To integrate varlock into an Astro application, you must use our @varlock/astro-integration package, which is an Astro integration.
-
Install varlock and the Astro integration package
Terminal window npm install @varlock/astro-integration varlockTerminal window yarn add @varlock/astro-integration varlockTerminal window pnpm add @varlock/astro-integration varlock -
Run
varlock initto set up your.env.schemafileThis will guide you through setting up your
.env.schemafile, based on your existing.envfile(s). Make sure to review it carefully.Terminal window npm exec -- varlock initTerminal window yarn exec -- varlock initTerminal window pnpm exec -- varlock init -
Enable the Astro integration
You must add our
varlockAstroIntegrationto yourastro.config.*file:astro.config.ts import { defineConfig } from 'astro/config';import varlockAstroIntegration from '@varlock/astro-integration';export default defineConfig({integrations: [varlockAstroIntegration(), otherIntegration()],});
Accessing environment variables
Section titled “Accessing environment variables”You can continue to use import.meta.env.SOMEVAR as usual, but we recommend using varlock’s imported ENV object for better type-safety and improved developer experience:
import { ENV } from 'varlock/env';
console.log(import.meta.env.SOMEVAR); // 🆗 still worksconsole.log(ENV.SOMEVAR); // ✨ recommendedWhy use ENV instead of import.meta.env?
Section titled “Why use ENV instead of import.meta.env?”- Non-string values (e.g., number, boolean) are properly typed and coerced
- All non-sensitive items are replaced at build time (not just
VITE_prefixed ones) - Better error messages for invalid or unavailable keys
- Enables future DX improvements and tighter control over what is bundled
Within astro.config.*
Section titled “Within astro.config.*”It’s often useful to be able to access env vars in your Astro config. Without varlock, it’s a bit awkward, but varlock makes it dead simple - in fact it’s already available! Just import varlock’s ENV object and reference env vars via ENV.SOME_ITEM like you do everywhere else.
import { defineConfig } from 'astro/config';import varlockAstroIntegration from '@varlock/astro-integration';import { ENV } from 'varlock/env';
doSomethingWithEnvVar(ENV.FOO);
export default defineConfig({ /* ... */ });Within other scripts
Section titled “Within other scripts”Even in a static front-end project, you may have other scripts in your project that rely on sensitive config.
You can use varlock run to inject resolved config into other scripts as regular env vars.
npm exec -- varlock run -- node ./script.jsyarn exec -- varlock run -- node ./script.jspnpm exec -- varlock run -- node ./script.jsType-safety and IntelliSense
Section titled “Type-safety and IntelliSense”To enable type-safety and IntelliSense for your env vars, enable the @generateTypes root decorator in your .env.schema. Note that if your schema was created using varlock init, it will include this by default.
# @generateTypes(lang='ts', path='env.d.ts')# ---# your config items...Managing multiple environments
Section titled “Managing multiple environments”Varlock can load multiple environment-specific .env files (e.g., .env.development, .env.preview, .env.production).
By default, Astro relies on Vite’s MODE flag to determine which env file(s) to load.
With varlock, instead you set your own environment flag using the @currentEnv root decorator, e.g. APP_ENV. See the environments guide for more information.
Managing sensitive config values
Section titled “Managing sensitive config values”Astro uses the PUBLIC_ prefix to determine which env vars are public (bundled for the browser). Varlock decouples the concept of being sensitive from key names, and instead you control this with the @defaultSensitive root decorator and the @sensitive item decorator. See the secrets guide for more information.
Set a default and explicitly mark items:
# @defaultSensitive=false# ---NON_SECRET_FOO= # sensitive by default# @sensitiveSECRET_FOO=Or if you’d like to continue using Astro’s prefix behavior:
# @defaultSensitive=inferFromPrefix('PUBLIC_')# ---FOO= # sensitivePUBLIC_FOO= # non-sensitive, due to prefixLeak Detection
Section titled “Leak Detection”This integration will automatically inject a new middleware that scans outgoing http responses for any sensitive values.