Agent-skills-standard nestjs-configuration
Environment variables validation and ConfigModule setup. Use when validating environment variables with Joi/Zod or configuring ConfigModule in NestJS. (triggers: .env, app.module.ts, **/config.ts, ConfigModule, Joi, env)
install
source · Clone the upstream repo
git clone https://github.com/HoangNguyen0403/agent-skills-standard
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/HoangNguyen0403/agent-skills-standard "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/nestjs/nestjs-configuration" ~/.claude/skills/hoangnguyen0403-agent-skills-standard-nestjs-configuration && rm -rf "$T"
manifest:
skills/nestjs/nestjs-configuration/SKILL.mdsource content
NestJS Configuration Standards
Priority: P1 (OPERATIONAL)
Setup
- Library: Use
.@nestjs/config - Initialization: Import
inConfigModule.forRoot({ isGlobal: true })
.AppModule
Validation
- Mandatory: Validate environment variables at startup.
- Tool: Use
or custom validation class.joi - Effect: app must crash immediately if required env var (e.g.,
) missing.DB_URL
// app.module.ts ConfigModule.forRoot({ validationSchema: Joi.object({ NODE_ENV: Joi.string() .valid('development', 'production') .default('development'), PORT: Joi.number().default(3000), DATABASE_URL: Joi.string().required(), }), });
Usage
- Injection: Inject
to access values.ConfigService - Typing: Avoid magic strings. Use type-safe getter helper or dedicated configuration object/interface.
- Secrets: Never commit
files. Add.env
to.env*
..gitignore
⚠️ Adding New Variables
When adding new environment variable to application, you MUST update all of following:
: Add class property with appropriatesrc/config/env.validation.ts
decorators.class-validator
: Add placeholder value so other developers know about it..env.example
/.env.development
: Add actual development values..env.test- CI/CD Pipelines & Infrastructure: You MUST map new variable in your deployment scripts (e.g.,
,.github/workflows/*.yml
, Terraform, or Azure Pipelines). Most modern cloud platforms (Cloud Run, ECS, Kubernetes) require explicit mapping of secrets/env-vars into container runtime. Failure to this will cause production deployment to crash or silently fail.gitlab-ci.yml
Anti-Patterns
- No unchecked env vars: Validate all required variables at startup; app must crash if missing.
- No committed secrets: Add
to.env*
; load values via ConfigService only..gitignore - No new vars without CI/CD update: Always update
,env.validation.ts
, and pipeline manifests..env.example