Bindings (env)
Bindings allow your Worker to interact with resources on the Cloudflare Developer Platform.
The following bindings available today:
- AI
- Analytics Engine
- Assets
- Browser Rendering
- D1
- Dispatcher (Workers for Platforms)
- Durable Objects
- Environment Variables
- Hyperdrive
- KV
- mTLS
- Queues
- R2
- Rate Limiting
- Secrets
- Service bindings
- Tail Workers
- Vectorize
- Version metadata
When you declare a binding on your Worker, you grant it a specific capability, such as being able to read and write files to an R2 bucket. For example:
You can think of a binding as a permission and an API in one piece. With bindings, you never have to add secret keys or tokens to your Worker in order to access resources on your Cloudflare account — the permission is embedded within the API itself. The underlying secret is never exposed to your Worker’s code, and therefore can’t be accidentally leaked.
When you deploy a change to your Worker, and only change its bindings (i.e. you don’t change the Worker’s code), Cloudflare may reuse existing isolates that are already running your Worker. This improves performance — you can change an environment variable or other binding without unnecessarily reloading your code.
As a result, you must be careful when “polluting” global scope with derivatives of your bindings. Anything you create there might continue to exist despite making changes to any underlying bindings. Consider an external client instance which uses a secret API key accessed from env
: if you put this client instance in global scope and then make changes to the secret, a client instance using the original value might continue to exist. The correct approach would be to create a new client instance for each request.
The following is a good approach:
Compared to this alternative, which might have surprising and unwanted behavior:
If you have more advanced needs, explore the AsyncLocalStorage API, which provides a mechanism for exposing values down to child execution handlers.