CtrlK
BlogDocsLog inGet started
Tessl Logo

clay-multi-env-setup

Configure Clay across development, staging, and production environments. Use when setting up multi-environment deployments, configuring per-environment secrets, or implementing environment-specific Clay configurations. Trigger with phrases like "clay environments", "clay staging", "clay dev prod", "clay environment setup", "clay config by env".

Install with Tessl CLI

npx tessl i github:jeremylongshore/claude-code-plugins-plus-skills --skill clay-multi-env-setup
What are skills?

81

Does it follow best practices?

Validation for skill structure

SKILL.md
Review
Evals

Clay Multi-Environment Setup

Overview

Configure Clay across development, staging, and production environments.

Prerequisites

  • Separate Clay accounts or API keys per environment
  • Secret management solution (Vault, AWS Secrets Manager, etc.)
  • CI/CD pipeline with environment variables
  • Environment detection in application

Environment Strategy

EnvironmentPurposeAPI KeysData
DevelopmentLocal devTest keysSandbox
StagingPre-prod validationStaging keysTest data
ProductionLive trafficProduction keysReal data

Configuration Structure

config/
├── clay/
│   ├── base.json           # Shared config
│   ├── development.json    # Dev overrides
│   ├── staging.json        # Staging overrides
│   └── production.json     # Prod overrides

base.json

{
  "timeout": 30000,
  "retries": 3,
  "cache": {
    "enabled": true,
    "ttlSeconds": 60
  }
}

development.json

{
  "apiKey": "${CLAY_API_KEY}",
  "baseUrl": "https://api-sandbox.clay.com",
  "debug": true,
  "cache": {
    "enabled": false
  }
}

staging.json

{
  "apiKey": "${CLAY_API_KEY_STAGING}",
  "baseUrl": "https://api-staging.clay.com",
  "debug": false
}

production.json

{
  "apiKey": "${CLAY_API_KEY_PROD}",
  "baseUrl": "https://api.clay.com",
  "debug": false,
  "retries": 5
}

Environment Detection

// src/clay/config.ts
import baseConfig from '../../config/clay/base.json';

type Environment = 'development' | 'staging' | 'production';

function detectEnvironment(): Environment {
  const env = process.env.NODE_ENV || 'development';
  const validEnvs: Environment[] = ['development', 'staging', 'production'];
  return validEnvs.includes(env as Environment)
    ? (env as Environment)
    : 'development';
}

export function getClayConfig() {
  const env = detectEnvironment();
  const envConfig = require(`../../config/clay/${env}.json`);

  return {
    ...baseConfig,
    ...envConfig,
    environment: env,
  };
}

Secret Management by Environment

Local Development

# .env.local (git-ignored)
CLAY_API_KEY=sk_test_dev_***

CI/CD (GitHub Actions)

env:
  CLAY_API_KEY: ${{ secrets.CLAY_API_KEY_${{ matrix.environment }} }}

Production (Vault/Secrets Manager)

# AWS Secrets Manager
aws secretsmanager get-secret-value --secret-id clay/production/api-key

# GCP Secret Manager
gcloud secrets versions access latest --secret=clay-api-key

# HashiCorp Vault
vault kv get -field=api_key secret/clay/production

Environment Isolation

// Prevent production operations in non-prod
function guardProductionOperation(operation: string): void {
  const config = getClayConfig();

  if (config.environment !== 'production') {
    console.warn(`[clay] ${operation} blocked in ${config.environment}`);
    throw new Error(`${operation} only allowed in production`);
  }
}

// Usage
async function deleteAllData() {
  guardProductionOperation('deleteAllData');
  // Dangerous operation here
}

Feature Flags by Environment

const featureFlags: Record<Environment, Record<string, boolean>> = {
  development: {
    newFeature: true,
    betaApi: true,
  },
  staging: {
    newFeature: true,
    betaApi: false,
  },
  production: {
    newFeature: false,
    betaApi: false,
  },
};

Instructions

Step 1: Create Config Structure

Set up the base and per-environment configuration files.

Step 2: Implement Environment Detection

Add logic to detect and load environment-specific config.

Step 3: Configure Secrets

Store API keys securely using your secret management solution.

Step 4: Add Environment Guards

Implement safeguards for production-only operations.

Output

  • Multi-environment config structure
  • Environment detection logic
  • Secure secret management
  • Production safeguards enabled

Error Handling

IssueCauseSolution
Wrong environmentMissing NODE_ENVSet environment variable
Secret not foundWrong secret pathVerify secret manager config
Config merge failsInvalid JSONValidate config files
Production guard triggeredWrong environmentCheck NODE_ENV value

Examples

Quick Environment Check

const env = getClayConfig();
console.log(`Running in ${env.environment} with ${env.baseUrl}`);

Resources

  • Clay Environments Guide
  • 12-Factor App Config

Next Steps

For observability setup, see clay-observability.

Repository
jeremylongshore/claude-code-plugins-plus-skills
Last updated
Created

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.