@whenlabs/envalid
v1.0.0
Published
Type safety for .env files
Downloads
1,353
Maintainers
Readme
Envalid
Type safety for .env files. Define a schema, validate every environment against it. Catch missing vars, wrong types, format mismatches, and drift between environments before they cause runtime failures.
Part of the WhenLabs toolchain.
Part of the WhenLabs toolkit — install all 6 tools with one command:
npx @whenlabs/when install
Why envalid?
| | envalid | dotenv | Manual .env checking |
|---|---|---|---|
| Type-safe schema | YAML schema with types, ranges, patterns | No validation | Eyeball it |
| Detects undocumented vars | Scans codebase for process.env usage missing from schema | No detection | grep and hope |
| Validates against schema | Catches wrong types, missing vars, format mismatches | Loads vars, no validation | Compare files by hand |
| Multi-environment sync | Validates .env, .env.staging, .env.production together | One file at a time | Diff files manually |
| CI-ready | --ci flag, exit codes, JSON/Markdown output | Not designed for CI | Custom scripting |
Install
Recommended: Install the full WhenLabs toolkit with
npx @whenlabs/when installto get envalid plus 5 other tools in one step.
npm install -g @whenlabs/envalidOr use directly with npx:
npx @whenlabs/envalid initRequirements: Node.js >= 20
Quick Start
# 1. Generate a schema from your existing .env
envalid init
# 2. Validate your .env against the schema
envalid validate
# 3. Generate an up-to-date .env.example
envalid generate-exampleSchema Format
Create a .env.schema file in your project root (YAML):
version: 1
variables:
NODE_ENV:
type: enum
values: [development, staging, production, test]
required: true
default: development
description: "Application environment"
PORT:
type: integer
required: true
default: 3000
range: [1024, 65535]
description: "HTTP server port"
DATABASE_URL:
type: url
required: true
protocol: [postgres, postgresql]
description: "PostgreSQL connection string"
sensitive: true
STRIPE_SECRET_KEY:
type: string
required: true
pattern: "^sk_(test|live)_[a-zA-Z0-9]+"
sensitive: true
environments: [staging, production]
ENABLE_FEATURE_X:
type: boolean
required: false
default: false
CORS_ORIGINS:
type: csv
required: false
description: "Comma-separated list of allowed CORS origins"
groups:
payments:
variables: [STRIPE_SECRET_KEY]
required_in: [staging, production]Supported Types
| Type | Validates | Example |
|------|-----------|---------|
| string | Non-empty string, optional regex pattern, minLength, maxLength | sk_test_abc123 |
| integer | Parseable integer, optional range | 3000 |
| float | Parseable float, optional range | 0.95 |
| boolean | true, false, 1, 0 | true |
| url | Valid URL, optional protocol constraint | postgres://localhost/db |
| email | Valid email format | [email protected] |
| enum | One of specified values | development |
| csv | Comma-separated values | http://a.com,http://b.com |
| json | Valid JSON string | {"key": "value"} |
| path | File/directory path | ./data/uploads |
| semver | Valid semver string | 1.2.3 |
Variable Options
| Option | Type | Description |
|--------|------|-------------|
| type | string | One of the supported types above (required) |
| required | boolean | Whether the variable must be present (default: true) |
| default | any | Default value |
| description | string | Human-readable description |
| sensitive | boolean | Mask value in output |
| environments | string[] | Only required in these environments |
| pattern | string | Regex pattern (for string type) |
| range | [min, max] | Numeric range (for integer/float types) |
| values | string[] | Allowed values (for enum type) |
| protocol | string[] | Allowed URL protocols (for url type) |
| minLength | number | Minimum string length |
| maxLength | number | Maximum string length |
Groups
Groups let you bundle related variables and enforce that all variables in a group are present for specific environments:
groups:
payments:
variables: [STRIPE_SECRET_KEY, STRIPE_WEBHOOK_SECRET]
description: "Payment processing"
required_in: [staging, production]Commands
envalid init
Scan an existing .env file and generate a starter .env.schema with inferred types. Envalid auto-detects booleans, integers, floats, URLs, emails, semver strings, JSON, CSV values, and flags sensitive-looking keys (containing secret, key, token, password, etc.).
envalid init # reads .env, writes .env.schema
envalid init -e .env.production # read from a specific file
envalid init --force # overwrite existing schemaenvalid validate
Validate a .env file against the schema.
envalid validate # basic validation
envalid validate --environment production # check production requirements
envalid validate --ci # strict mode (warnings become errors)
envalid validate --format json # machine-readable output
envalid validate -s custom.schema -e .env.staging # custom pathsExit codes: 0 = valid, 1 = validation failed, 2 = tool error
envalid diff
Compare two .env files side by side. When a schema is provided, sensitive values are automatically masked.
envalid diff .env .env.production
envalid diff .env .env.staging -s .env.schema # masks sensitive values
envalid diff .env .env.production --format jsonenvalid sync
Validate multiple environments against the schema at once. Environment names are inferred from file names (e.g. .env.production → production).
envalid sync --environments .env,.env.staging,.env.production
envalid sync --environments .env,.env.production --cienvalid generate-example
Generate an .env.example file from the schema with descriptions, defaults, and type-appropriate placeholders.
envalid generate-example # writes .env.example
envalid generate-example -o .env.template # custom output pathenvalid detect
Scan your codebase for environment variable usage and compare with the schema. Finds variables referenced in code but missing from the schema, and schema variables not used in code.
envalid detect # scan current directory
envalid detect -d src # scan specific directory
envalid detect --exclude vendor,tmp # exclude directories
# Auto-generate a schema from detected env vars in code
envalid detect --generate
# Generate schema to a custom path
envalid detect --generate -o custom.schemaThe --generate flag scans your codebase for process.env (and equivalents), infers types, and writes a .env.schema — useful for projects that don't have a schema yet.
Supports: process.env.X (Node.js), import.meta.env.X (Vite), os.environ / os.getenv (Python), ENV[] (Ruby), os.Getenv (Go), env::var (Rust), getenv / $_ENV (PHP).
envalid detect shows exactly where each undocumented variable is used:
REDIS_URL (missing from schema)
src/cache.ts:14
src/workers/queue.ts:7envalid secrets
Scan your codebase for hardcoded API keys, tokens, and passwords. Reports file:line locations but redacts actual values to keep output safe for logs.
envalid secrets # scan current directory
envalid secrets -d src # scan specific directory src/config.ts:23 STRIPE_KEY = "sk_live_••••••••"
src/email.ts:5 SENDGRID_TOKEN = "SG.••••••••"envalid codegen
Generate a fully-typed env.ts from the schema. Literal unions for enums, coerced numbers/booleans, readonly arrays for CSV, defaults folded in. Drop in next to process.env and stop writing ! casts.
envalid codegen -o src/env.ts # Node / default (process.env)
envalid codegen --runtime import-meta # Vite (import.meta.env)Smart Type Inference
envalid init infers richer types from .env values:
- Empty or missing values are marked
required: false(optional) PORT,*_PORTvariables gettype: integerwith range[1, 65535]"true"/"false"values are inferred astype: boolean- URL-shaped values are inferred as
type: url
Schema composition
Compose schemas across monorepos. extends contributes defaults; imports overlays last-wins.
# apps/web/.env.schema
version: 1
extends: ../../.env.schema
imports:
- ./payments.schema.yaml
variables:
SESSION_SECRET:
type: string
required: trueCycles are detected; groups merge variable-lists and required_in arrays.
CI Integration
npx @whenlabs/envalid validate --ci --environment productionThe --ci flag makes warnings into errors and returns exit code 1 on any issue.
Example GitHub Actions step:
name: Environment Validation
on: [pull_request]
jobs:
validate:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: actions/setup-node@v4
with:
node-version: 20
- run: npx @whenlabs/envalid validate --ci --environment productionOutput Formats
Use --format to control output:
- terminal (default) — colored, human-readable with icons
- json — machine-readable for CI pipelines
- markdown — tables for PR comments
Configuration
Configure defaults via .envalidrc, .envalidrc.json, envalid.config.js, or package.json#envalid:
{
"schema": ".env.schema",
"env": ".env",
"format": "terminal",
"ci": false,
"exclude": ["vendor", "tmp"]
}CLI flags always override config file values.
Programmatic API
import { parseSchemaFile, readEnvFile, validate } from "@whenlabs/envalid";
const schema = parseSchemaFile(".env.schema");
const envFile = readEnvFile(".env");
const result = validate(schema, envFile, { environment: "production" });
console.log(result.valid); // true/false
console.log(result.issues); // ValidationIssue[]Importable functions:
import {
// Schema
parseSchemaFile, parseSchemaString, loadSchema, mergeSchemas, validateValue,
// Validation
validate, diffEnvFiles, syncCheck,
// Env files
readEnvFile, parseEnvString, detectEnvUsage, detectEnvVarsInCode,
// Generation
generateExample, inferType, generateSchema, generateSchemaFromCode,
// Secrets
scanSecrets,
// Codegen
runCodegen, generateTypedClient,
// Reporting
createReporter,
// Config
loadConfig, mergeOptions,
// Utilities
maskValue,
} from "@whenlabs/envalid";Full TypeScript types are exported for EnvSchema, VariableSchema, ValidationResult, ValidationIssue, DiffResult, Reporter, EnvFile, DetectionResult, SecretsResult, CodegenOptions, and more.
Tech Stack
- TypeScript (ESM, targeting ES2022)
- Commander.js — CLI framework
- Zod — schema-of-schema validation
- yaml + dotenv — file parsing
- Chalk — colored terminal output
- cosmiconfig — config file discovery
- tsup — build tooling
- Vitest — test framework
Development
# Install dependencies
npm install
# Build
npm run build
# Watch mode (rebuild on changes)
npm run dev
# Run tests
npm test
# Run tests once
npm run test:run
# Type check
npm run lintLicense
MIT
