(pronounced "ee-zee kee-vee")
A non-opinionated Java bootstrapping configuration library that allows recursive chain loading of configuration from key values.
"Ezkv lemon squeezy!"
Key values are everywhere (also known as an associative arrays, list of tuples, or name value pairs)!
Environment variables, System properties, cloud meta data, vault, HTTP FORM post, URI queries, command line arguments even most forms of JSON, HOCON, TOML YAML and XML can all be represented as simple "key value" pairs.
Thus it is the perfect common denominator for providing applications with initial configuration. We call this "bootstrapping configuration" and it is usually gathered even before logging.
To do this Ezkv loads streams of key values (KeyValue) from resources. What is unique about it is that certain key values will load more key values to the current stream which is what we call chaining.
URI -> KeyValues* -> URI* -> KeyValues -> ...
Streams are useful because they can be filtered and transformed which matters because keys and values from various sources often need transformation. For example environment variable names often need to be converted to lower case and some prefix removed.
In short it is a micro configuration framework that itself can be configured with key values.
While this readme does contain some documentation the above is the preferred documentation and more likely to be correct!
Ezkv allows "users" to decide where their configuration comes from instead of developers.
A simple command line application use case might be like ripgrep where a single environment variable dictates the location of configuration. Ezkv easily supports this style as well as allow the user to then load additional configuration from other places using key values in the configuration file. Ezkv can even allow configuration to come from other environment variables which is something not really possible with ripgrep or other similar tools.
Another use case might be to simulate Spring Boot's configuration loading but without all of Spring Boot. Ezkv can do that declaratively through key values. In fact a user could make the previously mentioned ripgrep environment variable do a Spring Boot like load of configuration.
A simple example using java.util.Properties
files that could be parsed to KeyValues
would be:
var kvs = KeyValuesSystem.defaults()
.loader()
.variables(Variables::ofSystemProperties) // Use system properties as base variables for interpolation
.add("classpath:/start.properties")
.add("system:///") // add system properties to override
.add("env:///") // add env variables to override
.add("cmd:///?_filter_sed=s/^-D//") // add command line for final override using the prefix of -D
.load();
// give the key values to some other config framework like Spring:
var map = kvs.toMap();
ConfigurableEnvironment env = applicationContext.getEnvironment();
env.getPropertySources().addFirst(new MapPropertySource("start", map));
start.properties (first loaded):
message=Hello ${user.name}
_load_foo=classpath:/foo.properties
port.prefix=1
(take note of the _load_foo
key)
foo.properties loaded (second loaded resource):
user.name=Barf
message=Merchandising
db.port=${port.prefix}5672
_load_user=file:/${user.home}/.config/myapp/user.properties
_flags_user=sensitive,no_require
(take note of the _load_user
and _flags_user
key)
user.properties (third loaded resource treated as sensitive)
secret=12345 # my luggage combination
port.prefix=3
After that system properties, then environment variables and then command line key values are added.
Ignoring environment variables and system properties our effective key values printed out will be:
message=Merchandising
user.name=Barf
port.prefix=3
db.port=35672
secret=REDACTED
Let us go back to the original code. It should be pretty obvious now that the same thing can be done like:
var kvs = KeyValuesSystem.defaults()
.loader()
.add("classpath:/start.properties")
.load();
With start.properties
having the additional key values:
message=Hello ${user.name}
port.prefix=1
_load_foo=classpath:/foo.properties
_load_system=system:///
_load_env=env:///
_load_cmd=cmd:///?_filter_sed=s/^-D//
(If you don't like the syntax of the special loading keys that is indeed configurable... through key values of course.)
Most configuration frameworks are focused on "binding", dependency injection, or ergonomics on a
Map<String,String>
. They are focused on transforming the flat key values to objects. Ezkv does not do that.
These libraries often have a very opinionated loading scheme
and often the only way to configure that is through code.
Ezkv is lower level than most config libraries but yet allows the configuration to happen in configuration.
It is mostly concerned with loading and because of its zero dependency and no logging architecture it can be
used very early to provide other early init libraries with a Map<String,String>
(or the complete stream of key values found). That is why there is not really a getProperty(key)
like method provided by ezkv-kvs
. That is for configuration frameworks downstream.
In fact Ezkv rather just fill System.getProperties
from loaded resources so that
you do not have to use another library for configuration lookup. That is for retrieval
a singleton like System.getProperties
is often good enough for simple applications.
Yes Ezkv is very simple but simple is good.
That being said if you need a System.getProperty like replacement Ezkv does provide an opinionated module.
While the Ezkv KVS core does not provide an opinion on loading Ezkv does provide a separate opinionated module (ezkv-boot) that more or less mimics Spring Boot's loading of configuration without requiring Spring Boot.
This module also serves another purpose in that it is example code of using ezkv-kvs you can copy and customize for your own applications/libraries.
(Coming soon. My company has an internal implementation that I just need to port).
The Ezkv maven plugin is a far more capable replacement of the Codehaus Properties Maven plugin. This allows you to use much of the same configuration you would use in your application during the build process. This is particularly useful for database code generator plugins like jOOQ or Flyways Maven plugins.
- Zero opinions - it does not assume you want to load
app.properties
first. You define what resources and order. - Zero dependencies
- Zero reflection
- Zero auto loading - you pick that
- Zero logging (unless you want it)
- a
module-info.java
, jspecify annotations, and jdk 21 ready. - Framework agnostic!
- Fast initialization
- Simple interpolation system that can be disabled for certain resources
- Certain resources can be treated as sensitive
- Extendable key value format loading
- Chaining of overriding key values
- Can simulate other configuration frameworks loading easily with k/v configuration.
- Allow users to choose where configuration comes from without recompiling.
The last point is what really separates out Ezkv from other systems. For example if you want to use environment variables with some special prefix without recompiling the application you can. Or perhaps you want to use a special properties file in your home directory. While there are applications and such that allow naive file "includes" (for example NGINX) but usually it is only files.
Ezkv's two major concepts are:
- KeyValues - a stream of key values
- Resources - a URI with associated key value meta data.
Resources are used to load key values and key values can be used to specify and find more resources (to load more key values). Ezkv is recursive.
For the rest of the explanation of architecture we will go bottom up.
A KeyValue
object in Ezkv unlike a Map.Entry<String,String>
has more information than just the simple tuple of key
and value
.
KeyValue
are:
- Immutable
- Have interpolated value as well as the original pre-interpolated value
- Have source information
- Whether or not it should be used for interpolation
- Whether or not it should be printed out ever (e.g. a password or other sensitive information)
Ezkv provides ergonomics working with streams of key values to filter, and collect key values as well as parse and format.
Notice that Ezkv is like a list of key values and thus:
- Order can be important
- There can be duplicate "keys" (that may or may not override in the final result)
Finally a KeyValue
can be a special key that can reference another resource to load.
These keys are usually prefixed with _
to avoid collision and maximum compatibility.
The most important one is _load_name
where name is the name you like to give the resource and the value is a URI
.
This mini DSL syntax in the future will be configurable so that you can pick different key name patterns.
Ezkv can do Bash like interpolation on a stream of KeyValues
(e.g. ${somevar:-${othervar}}
). It does this by using
the key values themselves and Variables
. Variables
are simply Function<String,String>
.
This allows you to interpolate on key values with things you do not want in the final
result (KeyValues
). For example a common practice is to use System.getProperties()
as variables
but often you do not want all of the system properties to end up in the KeyValues
.
Interpolation can be disabled with the resource flag no_interpolation
.
Furthermore you can load up a resource as variables instead of KeyValues
with the resource flag no_add
.
# first loaded properties
_load_system=system:///
_flags_system=no_add
_load_app=classpath:/${app.name:-app}.properties
If app.name
was defined in system properties it would use it in the _load_app
URI otherwise app.properties
will be used.
Often interpolation will create a new stream of KeyValues where the value part of the key is replaced with the interpolated results however the original value is always retained.
A KeyValuesResource
has a URI
and symbolic name (used to find configuration).
It is backed by a key value with additional meta data on how to load that resource.
URIs are designed to point at resources and the additional meta data
in a KeyValuesResource
surprise surprise is more KeyValues
.
The additional meta data is used to know how to load the key values and what meta data should be associated with each key value.
Some examples are:
- The key values from the resource are sensitive and should not be easily printed out
- The key values should not be interpolated because the data is raw
- The loaded key values should or should not load other key values
- The key values need their names transformed or some key values ignored
This is all configurable again through key values (and URIs) particularly
the _flags_name
key.
Resource loading configuration can be done with special key values.
It can be either specified in the URI of the resource or as key values in
the resource where the _load_[name]
is specified.
The underscore is a called the prefix. That will be configurable at some point as well as the separator which is also an underscore.
The key names without the prefix and separators are:
load
- resource to load requiredmediaType
ormime
- media type of resource not requiredflags
orflag
- flags for loadingparam
orparm
- parameters for custom pluginsfilter
orfilt
- filters
The next sections will cover the default key syntax within a resource or within a URI.
The default key value pattern to specify resources is:
_load_[name]=URI
_mediaType_[name]=Content Type or file extension to resolve format of resource for parsing
_flags_[name]=CSV of flag names
_param_[name]_[key]=String
_filter_[name]_[filter]=String expression for filter
The [name]
part should be replaced with a name of ones choosing where only case sensitive alphanumeric characters are allowed.
It becomes the symbolic name of the resource. Don't worry those special keys will be filtered out.
The _load_[name]
is the most important key as it dictates the name of the resource and the URI of the resource.
TIP: the key aliases are all 4 characters which is useful for visual alignment.
_load_[name]=URI
_mime_[name]=Content Type or file extension to resolve format of resource for parsing
_flag_[name]=CSV of flag names
_parm_[name]_[key]=String
_filt_[name]_[filter]=String expression for filter
The URI of the _load_[name]
can also contribute to resource keys with the following format
_load_custom=file://./something?_mediaType=properties&_flags=optional&_filter_sed=s/myapp_//&_param_custom=something
Notice how the resource name does not need to be specified with URI parameters as that is deduced.
Resource flags can be set with _flags_[name]
in the resource or on the URI with _flags
which can be a repeatable parameter and is combined.
This is currently a subset of the flags:
no_require
/optional
- Resources are usually required to exist otherwise failure. This flag makes them not required.sensitive
- The key values loaded from the resource will be marked as sensitive and thus will not be outputted ontoString
etc.no_add
- The key values will not be added to the final result but will be used asvariables
.no_load_children
- The resource is not allowed to chain additional resources (not allowed to use_load_
).
Ezkv will try to automatically determine the media type of a resource based on the URI file extension but
in some cases that is not enough. The key _mediaType_[name]
allows you to provide that explicitly.
This is especially useful on URIs that can load a key that has key values in it.
A real world example of that is in Spring Boot
SPRING_APPLICATION_JSON
environment variable.
An example of emulating that behavior is:
_load_springJson=env:///SPRING_APPLICATION_JSON?_mediaType=json
(A caveat with the above is example is that JSON support will be a separate module and is not provided OOB).
Filters can be applied to a resource that will alter the key values after loaded but before being added to the final results. The ordering of filters does matter so it is generally recommend to use the URI notation as order is guaranteed.
The current filters provided OOB are:
- sed - just like the unix sed utility but only supporting the
s
andd
commands - grep - filter keys matching regular expression
Here is an example of using both:
_load_env=env:///?_filter_grep=^MY_APP_&_filter_sed=s/^MY_APP/myapp./
The above will only load environment variables prefixed with MY_APP_
and will replace
MY_APP_
with myapp.
The original key name is always preserved for key word tracking so regardless of how you rename people can still find where the key value originally came from.
A KeyValues loader usually takes a KeyValuesResource
and turns it into KeyValues
.
It is an extension point that in simple terms takes a URI and loads KeyValues
usually
based on the schema of the URI. For example classpath
will use the JDK
classloader mechanism and file
will use java.io
/java.nio
file loading.
This part of the library is extendable and custom loaders can be manually wired or the service loader can be used.
Out of the box Ezkv supports by schema:
classpath
- classpath resourcefile
- file resourcesystem
- System propertiesenv
- Environment variablescmd
- Command line argument pairs separated by=
.stdin
- Allows unix piping of key values often useful for passwordsprofile.[schema]
- Will load multiple resources based on a CSV of profiles where the profile name replaces part of the URI.
Other URI schemas will be added soon usually as separate modules like dotenv, HOCON, Terraform/Tofu tfvars.json
format etc.
Note that if no schema is provided Ezkv will assume it is a file path which is a URI.
We won't cover file
and classpath
as they are pretty self explanatory.
env:///
, system:///
and cmd:///
resources have a few features that are different than file or classpath.
Each one of the URI schemas above can take a path which will be used to fetch a key value where the value is used as the source of the key values. Otherwise all the key values of the resource will be loaded.
For example let us assume we have an env variable whose value is JSON we can load it like:
_load_springJson=env:///SPRING_APPLICATION_JSON?_mediaType=json
stdin:///
without a path will assume the entire contents of the stdin is in java.util.Properties
key values format.
Thus it is a good idea to specify _mediaType=
with stdin if that is not the case.
stdin:///
can also bind the contents of the input parsed as UTF-8 string to the key provided in the path of the URI.
_load_stdin=stdin:///db.password?_flag=sensitive,optional
As you can see the above is particularly useful for passwords similar to how docker takes passwords from stdin.
(TODO we will probably rename profile to profiles soon)
Probably the more confusing KeyValuesLoader is the profile
which deserves an example:
PROFILES=profile1,profile2 # this could come from env variable
_load_profiles=profile.classpath:/app-__PROFILE__.properties
_param_profiles_profile=${PROFILES}
_flags_profiles=no_require
Which will try to load:
classpath:/app-profile1.properties
classpath:/app-profile2.properties
But not fail if those resources are not found.
The above is not special internal encapsulated logic. The profiles loader just generates key values:
_load_profiles1=classpath:/app-profile1.properties
_flags_profiles1=no_require
_load_profiles2=classpath:/app-profile2.properties
_flags_profiles2=no_require
So one can make something similar if they like.
Some KeyValuesLoader
will know how to parse the URI
directly to key values
BUT many will will want to use a parser.
Ezkv provides a framework to parse and format key values from/to byte streams, or strings based on "media type" aka "Content Type" aka MIME or file extension.
This part of the library is extendable and custom media types can be manually wired or the service loader can be used.
Out of the box Ezkv supports:
java.util.Properties
format.- URL Query percent encoding format.
Other formats will be added soon usually as separate modules like dotenv, HOCON, Terraform/Tofu tfvars.json
format etc.
KeyValuesEnvironment
Ezkv provides a facade to access system properties, environment variables, class resource loaders, stdin, command line arguments and logging. This can be useful for unit testing but the most useful is the logger.
The logger in Ezkv by default does nothing but users may want to plug their own implementations to keep track of resource loading.
KeyValuesSystem
This is the entrypoint into Ezkv and used to load the initial part of the chain of resources. The bootstrapping part of your application will call it first and will often convert or pass the loaded key values to something else.
This library is a rewrite of an organic part of my companies code base that has been evolving for over 14 years.
Many libraries and frameworks have come and gone with differing opinions on configuration. While our backing frameworks have changed over the years our configuration style, format and behavior because of this library has largely not thanks to the flexibility.
Opinionated maybe vogue but not opinionated goes the distance.
Ezkv hopes to bring many of its concepts and design to avaje-config
.