CtrlK
BlogDocsLog inGet started
Tessl Logo

ideogram-multi-env-setup

Configure Ideogram across development, staging, and production environments. Use when setting up multi-environment deployments, configuring per-environment secrets, or implementing environment-specific Ideogram configurations. Trigger with phrases like "ideogram environments", "ideogram staging", "ideogram dev prod", "ideogram environment setup", "ideogram config by env".

Install with Tessl CLI

npx tessl i github:jeremylongshore/claude-code-plugins-plus-skills --skill ideogram-multi-env-setup
What are skills?

83

1.43x

Quality

77%

Does it follow best practices?

Impact

96%

1.43x

Average score across 3 eval scenarios

Optimize this skill with Tessl

npx tessl skill review --optimize ./plugins/saas-packs/ideogram-pack/skills/ideogram-multi-env-setup/SKILL.md
SKILL.md
Review
Evals

Ideogram Multi-Environment Setup

Overview

Configure Ideogram across development, staging, and production environments.

Prerequisites

  • Separate Ideogram accounts or API keys per environment
  • Secret management solution (Vault, AWS Secrets Manager, etc.)
  • CI/CD pipeline with environment variables
  • Environment detection in application

Environment Strategy

EnvironmentPurposeAPI KeysData
DevelopmentLocal devTest keysSandbox
StagingPre-prod validationStaging keysTest data
ProductionLive trafficProduction keysReal data

Configuration Structure

config/
├── ideogram/
│   ├── base.json           # Shared config
│   ├── development.json    # Dev overrides
│   ├── staging.json        # Staging overrides
│   └── production.json     # Prod overrides

base.json

{
  "timeout": 30000,
  "retries": 3,
  "cache": {
    "enabled": true,
    "ttlSeconds": 60
  }
}

development.json

{
  "apiKey": "${IDEOGRAM_API_KEY}",
  "baseUrl": "https://api-sandbox.ideogram.com",
  "debug": true,
  "cache": {
    "enabled": false
  }
}

staging.json

{
  "apiKey": "${IDEOGRAM_API_KEY_STAGING}",
  "baseUrl": "https://api-staging.ideogram.com",
  "debug": false
}

production.json

{
  "apiKey": "${IDEOGRAM_API_KEY_PROD}",
  "baseUrl": "https://api.ideogram.com",
  "debug": false,
  "retries": 5
}

Environment Detection

// src/ideogram/config.ts
import baseConfig from '../../config/ideogram/base.json';

type Environment = 'development' | 'staging' | 'production';

function detectEnvironment(): Environment {
  const env = process.env.NODE_ENV || 'development';
  const validEnvs: Environment[] = ['development', 'staging', 'production'];
  return validEnvs.includes(env as Environment)
    ? (env as Environment)
    : 'development';
}

export function getIdeogramConfig() {
  const env = detectEnvironment();
  const envConfig = require(`../../config/ideogram/${env}.json`);

  return {
    ...baseConfig,
    ...envConfig,
    environment: env,
  };
}

Secret Management by Environment

Local Development

# .env.local (git-ignored)
IDEOGRAM_API_KEY=sk_test_dev_***

CI/CD (GitHub Actions)

env:
  IDEOGRAM_API_KEY: ${{ secrets.IDEOGRAM_API_KEY_${{ matrix.environment }} }}

Production (Vault/Secrets Manager)

# AWS Secrets Manager
aws secretsmanager get-secret-value --secret-id ideogram/production/api-key

# GCP Secret Manager
gcloud secrets versions access latest --secret=ideogram-api-key

# HashiCorp Vault
vault kv get -field=api_key secret/ideogram/production

Environment Isolation

// Prevent production operations in non-prod
function guardProductionOperation(operation: string): void {
  const config = getIdeogramConfig();

  if (config.environment !== 'production') {
    console.warn(`[ideogram] ${operation} blocked in ${config.environment}`);
    throw new Error(`${operation} only allowed in production`);
  }
}

// Usage
async function deleteAllData() {
  guardProductionOperation('deleteAllData');
  // Dangerous operation here
}

Feature Flags by Environment

const featureFlags: Record<Environment, Record<string, boolean>> = {
  development: {
    newFeature: true,
    betaApi: true,
  },
  staging: {
    newFeature: true,
    betaApi: false,
  },
  production: {
    newFeature: false,
    betaApi: false,
  },
};

Instructions

Step 1: Create Config Structure

Set up the base and per-environment configuration files.

Step 2: Implement Environment Detection

Add logic to detect and load environment-specific config.

Step 3: Configure Secrets

Store API keys securely using your secret management solution.

Step 4: Add Environment Guards

Implement safeguards for production-only operations.

Output

  • Multi-environment config structure
  • Environment detection logic
  • Secure secret management
  • Production safeguards enabled

Error Handling

IssueCauseSolution
Wrong environmentMissing NODE_ENVSet environment variable
Secret not foundWrong secret pathVerify secret manager config
Config merge failsInvalid JSONValidate config files
Production guard triggeredWrong environmentCheck NODE_ENV value

Examples

Quick Environment Check

const env = getIdeogramConfig();
console.log(`Running in ${env.environment} with ${env.baseUrl}`);

Resources

  • Ideogram Environments Guide
  • 12-Factor App Config

Next Steps

For observability setup, see ideogram-observability.

Repository
jeremylongshore/claude-code-plugins-plus-skills
Last updated
Created

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.