Configuration
Configure your Supabase branches using configuration as code
This guide covers how to configure your Supabase branches, using the config.toml
file. In one single file, you can configure all your branches, including branch settings and secrets.
Branch configuration with remotes
When Branching is enabled, your config.toml
settings automatically sync to all ephemeral branches through a one-to-one mapping between your Git and Supabase branches.
Basic configuration
To update configuration for a Supabase branch, modify config.toml
and push to git. The Supabase integration will detect the changes and apply them to the corresponding branch.
Remote-specific configuration
For persistent branches that need specific settings, you can use the [remotes]
block in your config.toml
. Each remote configuration must reference an existing project ID.
Here's an example of configuring a separate seed script for a staging environment:
12345[remotes.staging]project_id = "your-project-ref"[remotes.staging.db.seed]sql_paths = ["./seeds/staging.sql"]
Since the project_id
field must reference an existing branch, you need to create the persistent branch before adding its configuration. Use the CLI to create a persistent branch first:
12supabase --experimental branches create --persistent# Do you want to create a branch named develop? [Y/n]
Configuration merging
When merging a PR into a persistent branch, the Supabase integration:
- Checks for configuration changes
- Logs the changes
- Applies them to the target remote
If no remote is declared or the project ID is incorrect, the configuration step is skipped.
Available configuration options
All standard configuration options are available in the [remotes]
block. This includes:
- Database settings
- API configurations
- Authentication settings
- Edge Functions configuration
- And more
You can use this to maintain different configurations for different environments while keeping them all in version control.
Managing secrets for branches
For sensitive configuration like SMTP credentials or API keys, you can use the Supabase CLI to manage secrets for your branches. This is especially useful for custom SMTP setup or other services that require secure credentials.
To set secrets for a persistent branch:
1234567# Set secrets from a .env filesupabase secrets set --env-file ./supabase/.env# Or set individual secretssupabase secrets set SMTP_HOST=smtp.example.comsupabase secrets set SMTP_USER=your-usernamesupabase secrets set SMTP_PASSWORD=your-password
These secrets will be available to your branch's services and can be used in your configuration. For example, in your config.toml
:
1234[auth.smtp]host = "env(SMTP_HOST)"user = "env(SMTP_USER)"password = "env(SMTP_PASSWORD)"
Secrets are branch-specific
Secrets set for one branch are not automatically available in other branches. You'll need to set them separately for each branch that needs them.
Using dotenvx for git-based workflow
For managing environment variables across different branches, you can use dotenvx to securely manage your configurations. This approach is particularly useful for teams working with Git branches and preview deployments.
Environment file structure
Following the conventions used in the example repository, environments are configured using dotenv files in the supabase
directory:
File | Environment | .gitignore it? | Encrypted |
---|---|---|---|
.env.keys | All | Yes | No |
.env.local | Local | Yes | No |
.env.production | Production | No | Yes |
.env.preview | Branches | No | Yes |
.env | Any | Maybe | Yes |
Setting up encrypted secrets
- Generate key pair and encrypt your secrets:
1npx @dotenvx/dotenvx set SUPABASE_AUTH_EXTERNAL_GITHUB_SECRET "<your-secret>" -f supabase/.env.preview
This creates a new encryption key in supabase/.env.preview
and a new decryption key in supabase/.env.keys
.
- Update project secrets:
1npx supabase secrets set --env-file supabase/.env.keys
- Choose your configuration approach in
config.toml
:
Option A: Use encrypted values directly:
123[auth.external.github]enabled = truesecret = "encrypted:<encrypted-value>"
Option B: Use environment variables:
1234[auth.external.github]enabled = trueclient_id = "env(SUPABASE_AUTH_EXTERNAL_GITHUB_CLIENT_ID)"secret = "env(SUPABASE_AUTH_EXTERNAL_GITHUB_SECRET)"
Secret fields
The encrypted:
syntax only works for designated "secret" fields in the configuration (like secret
in auth providers). Using encrypted values in other fields will not be automatically decrypted and may cause issues. For non-secret fields, use environment variables with the env()
syntax instead.
Using with preview branches
When you commit your .env.preview
file with encrypted values, the branching executor will automatically retrieve and use these values when deploying your branch. This allows you to maintain different configurations for different branches while keeping sensitive information secure.
Configuration examples
Multi-environment setup
Here's an example of a complete multi-environment configuration:
1234567891011121314151617181920212223242526272829# Default configuration for all branches[api]enabled = trueport = 54321schemas = ["public", "storage", "graphql_public"][db]port = 54322pool_size = 10# Staging-specific configuration[remotes.staging]project_id = "staging-project-ref"[remotes.staging.api]max_rows = 1000[remotes.staging.db.seed]sql_paths = ["./seeds/staging.sql"]# Production-specific configuration[remotes.production]project_id = "prod-project-ref"[remotes.production.api]max_rows = 500[remotes.production.db]pool_size = 25
Feature branch configuration
For feature branches that need specific settings:
1234567[remotes.feature-oauth]project_id = "feature-branch-ref"[remotes.feature-oauth.auth.external.google]enabled = trueclient_id = "env(GOOGLE_CLIENT_ID)"secret = "env(GOOGLE_CLIENT_SECRET)"
Next steps
- Explore branching integrations
- Learn about troubleshooting branches
- Review branching pricing