home / skills / jeremylongshore / claude-code-plugins-plus-skills / supabase-multi-env-setup
/plugins/saas-packs/supabase-pack/skills/supabase-multi-env-setup
This skill helps configure Supabase across development, staging, and production by managing per environment secrets and safeguards.
npx playbooks add skill jeremylongshore/claude-code-plugins-plus-skills --skill supabase-multi-env-setupReview the files below or copy the command above to add this skill to your agents.
---
name: supabase-multi-env-setup
description: |
Configure Supabase across development, staging, and production environments.
Use when setting up multi-environment deployments, configuring per-environment secrets,
or implementing environment-specific Supabase configurations.
Trigger with phrases like "supabase environments", "supabase staging",
"supabase dev prod", "supabase environment setup", "supabase config by env".
allowed-tools: Read, Write, Edit, Bash(aws:*), Bash(gcloud:*), Bash(vault:*)
version: 1.0.0
license: MIT
author: Jeremy Longshore <[email protected]>
---
# Supabase Multi Env Setup
## Prerequisites
- Separate Supabase accounts or API keys per environment
- Secret management solution (Vault, AWS Secrets Manager, etc.)
- CI/CD pipeline with environment variables
- Environment detection in application
## Instructions
### Step 1: Create Config Structure
Set up the base and per-environment configuration files.
### Step 2: Implement Environment Detection
Add logic to detect and load environment-specific config.
### Step 3: Configure Secrets
Store API keys securely using your secret management solution.
### Step 4: Add Environment Guards
Implement safeguards for production-only operations.
## Output
- Multi-environment config structure
- Environment detection logic
- Secure secret management
- Production safeguards enabled
## Error Handling
See `{baseDir}/references/errors.md` for comprehensive error handling.
## Examples
See `{baseDir}/references/examples.md` for detailed examples.
## Resources
- [Supabase Environments Guide](https://supabase.com/docs/environments)
- [12-Factor App Config](https://12factor.net/config)
This skill configures Supabase across development, staging, and production environments to enforce safe, repeatable deployments. It creates a clear config structure, integrates secret management, and adds environment guards so operations behave correctly per environment. Use it to centralize Supabase connection logic and reduce runtime mistakes.
The skill generates a base configuration and environment-specific overrides, then injects detection logic so the application loads the correct settings at runtime. It integrates recommended secret management (Vault, AWS Secrets Manager, or CI secrets) to prevent embedding keys in code. Finally, it inserts production-only guards and CI/CD checks to avoid accidental destructive operations in non-production environments.
How should I detect the current environment at runtime?
Use a dedicated environment variable (e.g., APP_ENV) with allowed values (development, staging, production) and validate it on startup; fail fast if it is missing or invalid.
Where do I store Supabase keys?
Keep keys in a secrets manager (Vault, AWS Secrets Manager, GitHub Actions secrets) and inject them into the runtime via CI/CD environment variables rather than committing them to code.
What production safeguards are recommended?
Require an explicit production flag for migrations and destructive scripts, add CI approvals for production deploys, and log attempts to run production-only actions.