# AnySecret.io - Universal Secret & Configuration Management
[](https://pypi.org/project/anysecret-io/)
[](https://pypi.org/project/anysecret-io/)
[](https://pypi.org/project/anysecret-io/)
[](https://github.com/anysecret-io/anysecret-lib/actions/workflows/test.yml)
[](https://www.gnu.org/licenses/agpl-3.0)
[](https://anysecret.io/license)
[](https://anysecret.io)
**One CLI. One SDK. All your cloud providers.**
Stop writing boilerplate code for every cloud provider. AnySecret.io provides a universal interface for secret and configuration management across AWS, GCP, Azure, Kubernetes, and more.
## 🎯 Why AnySecret.io?
### The Problem
- 🔄 **Different APIs for each cloud provider** - AWS Secrets Manager vs GCP Secret Manager vs Azure Key Vault
- 📝 **Boilerplate code everywhere** - Same logic repeated for each provider
- 🚨 **Migration nightmares** - Vendor lock-in when switching clouds
- 🔀 **Mixed configurations** - Secrets and parameters scattered across services
- 🏗️ **Months of development** - Building your own abstraction layer
### Our Solution
```python
import anysecret
# Works everywhere - AWS, GCP, Azure, K8s, local dev
db_password = await anysecret.get("db_password")
api_timeout = await anysecret.get("api_timeout")
# That's it. No provider-specific code needed.
```
## ✨ Key Features
🚀 **Universal Interface** - Single API for all cloud providers
🔄 **Auto-Detection** - Automatically detects your cloud environment
🛡️ **Smart Classification** - Auto-routes secrets to secure storage, configs to parameter stores
📦 **Zero Configuration** - Works out of the box in most environments
🔐 **Migration Ready** - Switch clouds without changing application code
⚡ **Async First** - Built for modern Python with FastAPI/asyncio
🎯 **DevOps Friendly** - CLI tools for CI/CD pipelines
🏥 **HIPAA Compliant** - Encrypted file support for healthcare
## 🚀 Quick Start
### Installation
```bash
# Basic installation
pip install anysecret-io
# With specific providers
pip install anysecret-io[aws] # AWS support
pip install anysecret-io[gcp] # Google Cloud support
pip install anysecret-io[azure] # Azure support
pip install anysecret-io[k8s] # Kubernetes support
# All providers
pip install anysecret-io[all]
```
### Basic Usage
```python
import asyncio
import anysecret
async def main():
# Just use .get() - auto-classification handles everything!
# These automatically go to secure storage (secrets)
db_password = await anysecret.get("database.password")
api_key = await anysecret.get("stripe.secret.key")
# These automatically go to config storage (parameters)
api_timeout = await anysecret.get("api.timeout", default=30)
feature_flag = await anysecret.get("features.new.ui", default=False)
# Override auto-classification when needed
admin_token = await anysecret.get("admin.token", hint="secret")
# Or use explicit methods if you prefer
config = await anysecret.get_config_manager()
jwt_secret = await config.get_secret("jwt.signing.key")
asyncio.run(main())
```
### CLI Usage
```bash
# Auto-classification works in CLI too!
anysecret get database.password # → Secure storage
anysecret get database.host # → Config storage
anysecret get api.timeout # → Config storage
# For Terraform/CloudFormation
anysecret get stripe.secret.key --format json
# For CI/CD pipelines
export DB_HOST=$(anysecret get database.host)
export DB_PASS=$(anysecret get database.password)
# For Docker - same code works everywhere
docker run -e DB_HOST=$(anysecret get database.host) myapp
# For Kubernetes
anysecret get-all --format yaml | kubectl apply -f -
```
## 🔧 DevOps & CI/CD Integration
### Jenkins Pipeline
```groovy
pipeline {
stage('Deploy') {
steps {
script {
env.DB_PASSWORD = sh(script: 'anysecret get db/password', returnStdout: true)
env.API_KEY = sh(script: 'anysecret get api/key', returnStdout: true)
}
}
}
}
```
### GitHub Actions
```yaml
- name: Get secrets
run: |
echo "DB_PASSWORD=$(anysecret get db/password)" >> $GITHUB_ENV
echo "API_KEY=$(anysecret get api/key)" >> $GITHUB_ENV
```
### Terraform
```hcl
data "external" "secrets" {
program = ["anysecret", "get-all", "--format", "json"]
}
resource "aws_instance" "app" {
user_data = <<-EOF
DB_PASSWORD=${data.external.secrets.result.db_password}
API_KEY=${data.external.secrets.result.api_key}
EOF
}
```
### Kubernetes Integration
```yaml
# Automatically sync to K8s secrets
anysecret sync-k8s --namespace production
# Or use in manifests
apiVersion: v1
kind: Pod
spec:
containers:
- name: app
env:
- name: DB_PASSWORD
value: $(anysecret get db/password)
```
## 🌐 Supported Providers
| Provider | Secrets Storage | Config Storage | Auto-Detection |
|----------|----------------|----------------|----------------|
| **AWS** | Secrets Manager | Parameter Store | ✅ |
| **Google Cloud** | Secret Manager | Config Connector | ✅ |
| **Azure** | Key Vault | App Configuration | ✅ |
| **Kubernetes** | Secrets | ConfigMaps | ✅ |
| **HashiCorp Vault** | KV Store | KV Store | ✅ |
| **Encrypted Files** | AES-256 | JSON/YAML | ✅ |
| **Environment** | .env files | .env files | ✅ |
## 🔐 Intelligent Secret vs Parameter Classification
AnySecret.io automatically determines if a value should be stored securely (secret) or as configuration (parameter):
```python
# Automatically classified as SECRETS (secure storage):
DATABASE_PASSWORD → Secret Manager/Key Vault
API_KEY → Secret Manager/Key Vault
JWT_SECRET → Secret Manager/Key Vault
# Automatically classified as PARAMETERS (config storage):
DATABASE_HOST → Parameter Store/Config Maps
API_TIMEOUT → Parameter Store/Config Maps
LOG_LEVEL → Parameter Store/Config Maps
```
## 🚄 Migration Example
Migrating from AWS to GCP? No code changes needed:
```python
# Your application code stays the same
db_password = await config.get_secret("DATABASE_PASSWORD")
# Just change the environment:
# AWS → export SECRET_MANAGER_TYPE=aws
# GCP → export SECRET_MANAGER_TYPE=gcp
# Azure → export SECRET_MANAGER_TYPE=azure
```
## 📖 Documentation
- **[Quick Start Guide](https://anysecret.io/docs/quickstart)** - Get up and running in 5 minutes
- **[API Reference](https://anysecret.io/docs/api)** - Complete API documentation
- **[Provider Setup](https://anysecret.io/docs/providers)** - Configure each cloud provider
- **[Best Practices](https://anysecret.io/docs/best-practices)** - Security and performance tips
- **[Migration Guide](https://anysecret.io/docs/migration)** - Switch between cloud providers
- **[Examples](https://github.com/anysecret-io/examples)** - Sample applications and use cases
## 🤝 Contributing
We love contributions! Please see our [Contributing Guide](CONTRIBUTING.md) for details.
```bash
# Clone the repository
git clone https://github.com/anysecret-io/anysecret-lib.git
cd anysecret-lib
# Install development dependencies
pip install -e ".[dev,all]"
# Run tests
pytest
# Format code
black anysecret tests
isort anysecret tests
```
### Development Setup
1. Fork the repository
2. Create your feature branch (`git checkout -b feature/AmazingFeature`)
3. Commit your changes (`git commit -m 'Add some AmazingFeature'`)
4. Push to the branch (`git push origin feature/AmazingFeature`)
5. Open a Pull Request
## 📊 Benchmarks
| Operation | Direct SDK | AnySecret.io | Overhead |
|-----------|------------|--------------|----------|
| Get Secret (AWS) | 45ms | 47ms | +4.4% |
| Get Secret (GCP) | 38ms | 40ms | +5.2% |
| Get Secret (Azure) | 52ms | 54ms | +3.8% |
| Batch Get (10 items) | 125ms | 85ms | -32% (cached) |
## 🛡️ Security
- **SOC2 Compliant** - Enterprise-grade security practices
- **HIPAA Ready** - Healthcare compliance with encrypted storage
- **Zero Trust** - Never logs or caches sensitive values
- **Audit Trail** - Complete access logging for compliance
Found a security issue? Please email security@anysecret.io (do not open a public issue).
## 📄 License
AnySecret.io uses dual licensing to support both open source and commercial use:
### Open Source (AGPL-3.0)
- ✅ **Free forever** for all users and companies
- ✅ **Commercial use allowed** - Build and sell products
- ✅ **Modification allowed** - Customize for your needs
- ⚠️ **Service providers** - Must open-source modifications if offering as a service
### Commercial License
- 🏢 **For SaaS platforms** - Include in your service without AGPL requirements
- 🔒 **Private modifications** - Keep your changes proprietary
- 📞 **Priority support** - Direct access to our team
- 💼 **Custom features** - We'll build what you need
**Need a commercial license?** Visit [anysecret.io/license](https://anysecret.io/license)
## 🌟 Community & Support
- **💬 Discord**: [Join our community](https://discord.gg/anysecret)
- **🐛 Issues**: [GitHub Issues](https://github.com/anysecret-io/anysecret-lib/issues)
- **💡 Discussions**: [GitHub Discussions](https://github.com/anysecret-io/anysecret-lib/discussions)
- **📧 Email**: support@anysecret.io
- **🐦 Twitter**: [@anysecret_io](https://twitter.com/anysecret_io)
## 🎯 Roadmap
### Current Release (v1.0)
- ✅ Universal secret/config interface
- ✅ AWS, GCP, Azure, K8s support
- ✅ Auto-environment detection
- ✅ Smart classification
- ✅ CLI tools for DevOps
### Coming Soon (v1.1)
- 🚧 Secret rotation automation
- 🚧 Web UI dashboard
- 🚧 Terraform provider
- 🚧 Ansible module
- 🚧 GitHub Action
### Future (v2.0)
- 📋 Multi-region replication
- 📋 Disaster recovery
- 📋 Advanced RBAC
- 📋 Compliance reporting
- 📋 Cost optimization
## 💪 Powered By
Built by [Adaptive Digital Ventures](https://anysecret.io) - We're hiring! Check our [careers page](https://anysecret.io/careers).
## 🏆 Users
AnySecret.io is used in production by:
- 🏥 **Healthcare** - HIPAA-compliant secret management
- 💰 **FinTech** - SOC2 compliant configuration
- 🛍️ **E-commerce** - Multi-region secret distribution
- 🎮 **Gaming** - Low-latency config updates
- 🚀 **Startups** - Simple, cost-effective secret management
---
<p align="center">
<strong>Stop building secret management. Start shipping features.</strong><br>
<a href="https://anysecret.io">anysecret.io</a> •
<a href="https://anysecret.io/docs">Docs</a> •
<a href="https://discord.gg/anysecret">Discord</a> •
<a href="https://twitter.com/anysecret_io">Twitter</a>
</p>
Raw data
{
"_id": null,
"home_page": null,
"name": "anysecret-io",
"maintainer": null,
"docs_url": null,
"requires_python": ">=3.8",
"maintainer_email": null,
"keywords": "secrets, secret-management, cloud, aws, gcp, azure, vault, fastapi, async",
"author": null,
"author_email": "\"AnySecret.io Team\" <hello@anysecret.io>",
"download_url": "https://files.pythonhosted.org/packages/9e/be/f1eb4ce1b14f921c42e9bc64f603a11cd4244c33ef7e4efd9e30c600ddfb/anysecret_io-1.0.2.tar.gz",
"platform": null,
"description": "# AnySecret.io - Universal Secret & Configuration Management\n\n[](https://pypi.org/project/anysecret-io/)\n[](https://pypi.org/project/anysecret-io/)\n[](https://pypi.org/project/anysecret-io/)\n[](https://github.com/anysecret-io/anysecret-lib/actions/workflows/test.yml)\n[](https://www.gnu.org/licenses/agpl-3.0)\n[](https://anysecret.io/license)\n[](https://anysecret.io)\n\n**One CLI. One SDK. All your cloud providers.**\n\nStop writing boilerplate code for every cloud provider. AnySecret.io provides a universal interface for secret and configuration management across AWS, GCP, Azure, Kubernetes, and more.\n\n## \ud83c\udfaf Why AnySecret.io?\n\n### The Problem\n- \ud83d\udd04 **Different APIs for each cloud provider** - AWS Secrets Manager vs GCP Secret Manager vs Azure Key Vault\n- \ud83d\udcdd **Boilerplate code everywhere** - Same logic repeated for each provider\n- \ud83d\udea8 **Migration nightmares** - Vendor lock-in when switching clouds\n- \ud83d\udd00 **Mixed configurations** - Secrets and parameters scattered across services\n- \ud83c\udfd7\ufe0f **Months of development** - Building your own abstraction layer\n\n### Our Solution\n```python\nimport anysecret\n\n# Works everywhere - AWS, GCP, Azure, K8s, local dev\ndb_password = await anysecret.get(\"db_password\")\napi_timeout = await anysecret.get(\"api_timeout\") \n\n# That's it. No provider-specific code needed.\n```\n\n## \u2728 Key Features\n\n\ud83d\ude80 **Universal Interface** - Single API for all cloud providers \n\ud83d\udd04 **Auto-Detection** - Automatically detects your cloud environment \n\ud83d\udee1\ufe0f **Smart Classification** - Auto-routes secrets to secure storage, configs to parameter stores \n\ud83d\udce6 **Zero Configuration** - Works out of the box in most environments \n\ud83d\udd10 **Migration Ready** - Switch clouds without changing application code \n\u26a1 **Async First** - Built for modern Python with FastAPI/asyncio \n\ud83c\udfaf **DevOps Friendly** - CLI tools for CI/CD pipelines \n\ud83c\udfe5 **HIPAA Compliant** - Encrypted file support for healthcare \n\n## \ud83d\ude80 Quick Start\n\n### Installation\n\n```bash\n# Basic installation\npip install anysecret-io\n\n# With specific providers\npip install anysecret-io[aws] # AWS support\npip install anysecret-io[gcp] # Google Cloud support \npip install anysecret-io[azure] # Azure support\npip install anysecret-io[k8s] # Kubernetes support\n\n# All providers\npip install anysecret-io[all]\n```\n\n### Basic Usage\n\n```python\nimport asyncio\nimport anysecret\n\nasync def main():\n # Just use .get() - auto-classification handles everything!\n \n # These automatically go to secure storage (secrets)\n db_password = await anysecret.get(\"database.password\")\n api_key = await anysecret.get(\"stripe.secret.key\")\n \n # These automatically go to config storage (parameters) \n api_timeout = await anysecret.get(\"api.timeout\", default=30)\n feature_flag = await anysecret.get(\"features.new.ui\", default=False)\n \n # Override auto-classification when needed\n admin_token = await anysecret.get(\"admin.token\", hint=\"secret\")\n \n # Or use explicit methods if you prefer\n config = await anysecret.get_config_manager()\n jwt_secret = await config.get_secret(\"jwt.signing.key\")\n\nasyncio.run(main())\n```\n\n### CLI Usage\n\n```bash\n# Auto-classification works in CLI too!\nanysecret get database.password # \u2192 Secure storage\nanysecret get database.host # \u2192 Config storage\nanysecret get api.timeout # \u2192 Config storage\n\n# For Terraform/CloudFormation\nanysecret get stripe.secret.key --format json\n\n# For CI/CD pipelines \nexport DB_HOST=$(anysecret get database.host)\nexport DB_PASS=$(anysecret get database.password)\n\n# For Docker - same code works everywhere\ndocker run -e DB_HOST=$(anysecret get database.host) myapp\n\n# For Kubernetes\nanysecret get-all --format yaml | kubectl apply -f -\n```\n\n## \ud83d\udd27 DevOps & CI/CD Integration\n\n### Jenkins Pipeline\n```groovy\npipeline {\n stage('Deploy') {\n steps {\n script {\n env.DB_PASSWORD = sh(script: 'anysecret get db/password', returnStdout: true)\n env.API_KEY = sh(script: 'anysecret get api/key', returnStdout: true)\n }\n }\n }\n}\n```\n\n### GitHub Actions\n```yaml\n- name: Get secrets\n run: |\n echo \"DB_PASSWORD=$(anysecret get db/password)\" >> $GITHUB_ENV\n echo \"API_KEY=$(anysecret get api/key)\" >> $GITHUB_ENV\n```\n\n### Terraform\n```hcl\ndata \"external\" \"secrets\" {\n program = [\"anysecret\", \"get-all\", \"--format\", \"json\"]\n}\n\nresource \"aws_instance\" \"app\" {\n user_data = <<-EOF\n DB_PASSWORD=${data.external.secrets.result.db_password}\n API_KEY=${data.external.secrets.result.api_key}\n EOF\n}\n```\n\n### Kubernetes Integration\n```yaml\n# Automatically sync to K8s secrets\nanysecret sync-k8s --namespace production\n\n# Or use in manifests\napiVersion: v1\nkind: Pod\nspec:\n containers:\n - name: app\n env:\n - name: DB_PASSWORD\n value: $(anysecret get db/password)\n```\n\n## \ud83c\udf10 Supported Providers\n\n| Provider | Secrets Storage | Config Storage | Auto-Detection |\n|----------|----------------|----------------|----------------|\n| **AWS** | Secrets Manager | Parameter Store | \u2705 |\n| **Google Cloud** | Secret Manager | Config Connector | \u2705 |\n| **Azure** | Key Vault | App Configuration | \u2705 |\n| **Kubernetes** | Secrets | ConfigMaps | \u2705 |\n| **HashiCorp Vault** | KV Store | KV Store | \u2705 |\n| **Encrypted Files** | AES-256 | JSON/YAML | \u2705 |\n| **Environment** | .env files | .env files | \u2705 |\n\n## \ud83d\udd10 Intelligent Secret vs Parameter Classification\n\nAnySecret.io automatically determines if a value should be stored securely (secret) or as configuration (parameter):\n\n```python\n# Automatically classified as SECRETS (secure storage):\nDATABASE_PASSWORD \u2192 Secret Manager/Key Vault\nAPI_KEY \u2192 Secret Manager/Key Vault \nJWT_SECRET \u2192 Secret Manager/Key Vault\n\n# Automatically classified as PARAMETERS (config storage):\nDATABASE_HOST \u2192 Parameter Store/Config Maps\nAPI_TIMEOUT \u2192 Parameter Store/Config Maps\nLOG_LEVEL \u2192 Parameter Store/Config Maps\n```\n\n## \ud83d\ude84 Migration Example\n\nMigrating from AWS to GCP? No code changes needed:\n\n```python\n# Your application code stays the same\ndb_password = await config.get_secret(\"DATABASE_PASSWORD\")\n\n# Just change the environment:\n# AWS \u2192 export SECRET_MANAGER_TYPE=aws\n# GCP \u2192 export SECRET_MANAGER_TYPE=gcp\n# Azure \u2192 export SECRET_MANAGER_TYPE=azure\n```\n\n## \ud83d\udcd6 Documentation\n\n- **[Quick Start Guide](https://anysecret.io/docs/quickstart)** - Get up and running in 5 minutes\n- **[API Reference](https://anysecret.io/docs/api)** - Complete API documentation\n- **[Provider Setup](https://anysecret.io/docs/providers)** - Configure each cloud provider\n- **[Best Practices](https://anysecret.io/docs/best-practices)** - Security and performance tips\n- **[Migration Guide](https://anysecret.io/docs/migration)** - Switch between cloud providers\n- **[Examples](https://github.com/anysecret-io/examples)** - Sample applications and use cases\n\n## \ud83e\udd1d Contributing\n\nWe love contributions! Please see our [Contributing Guide](CONTRIBUTING.md) for details.\n\n```bash\n# Clone the repository\ngit clone https://github.com/anysecret-io/anysecret-lib.git\ncd anysecret-lib\n\n# Install development dependencies\npip install -e \".[dev,all]\"\n\n# Run tests\npytest\n\n# Format code\nblack anysecret tests\nisort anysecret tests\n```\n\n### Development Setup\n\n1. Fork the repository\n2. Create your feature branch (`git checkout -b feature/AmazingFeature`)\n3. Commit your changes (`git commit -m 'Add some AmazingFeature'`)\n4. Push to the branch (`git push origin feature/AmazingFeature`)\n5. Open a Pull Request\n\n## \ud83d\udcca Benchmarks\n\n| Operation | Direct SDK | AnySecret.io | Overhead |\n|-----------|------------|--------------|----------|\n| Get Secret (AWS) | 45ms | 47ms | +4.4% |\n| Get Secret (GCP) | 38ms | 40ms | +5.2% |\n| Get Secret (Azure) | 52ms | 54ms | +3.8% |\n| Batch Get (10 items) | 125ms | 85ms | -32% (cached) |\n\n## \ud83d\udee1\ufe0f Security\n\n- **SOC2 Compliant** - Enterprise-grade security practices\n- **HIPAA Ready** - Healthcare compliance with encrypted storage\n- **Zero Trust** - Never logs or caches sensitive values\n- **Audit Trail** - Complete access logging for compliance\n\nFound a security issue? Please email security@anysecret.io (do not open a public issue).\n\n## \ud83d\udcc4 License\n\nAnySecret.io uses dual licensing to support both open source and commercial use:\n\n### Open Source (AGPL-3.0)\n- \u2705 **Free forever** for all users and companies\n- \u2705 **Commercial use allowed** - Build and sell products\n- \u2705 **Modification allowed** - Customize for your needs\n- \u26a0\ufe0f **Service providers** - Must open-source modifications if offering as a service\n\n### Commercial License\n- \ud83c\udfe2 **For SaaS platforms** - Include in your service without AGPL requirements\n- \ud83d\udd12 **Private modifications** - Keep your changes proprietary\n- \ud83d\udcde **Priority support** - Direct access to our team\n- \ud83d\udcbc **Custom features** - We'll build what you need\n\n**Need a commercial license?** Visit [anysecret.io/license](https://anysecret.io/license)\n\n## \ud83c\udf1f Community & Support\n\n- **\ud83d\udcac Discord**: [Join our community](https://discord.gg/anysecret)\n- **\ud83d\udc1b Issues**: [GitHub Issues](https://github.com/anysecret-io/anysecret-lib/issues)\n- **\ud83d\udca1 Discussions**: [GitHub Discussions](https://github.com/anysecret-io/anysecret-lib/discussions)\n- **\ud83d\udce7 Email**: support@anysecret.io\n- **\ud83d\udc26 Twitter**: [@anysecret_io](https://twitter.com/anysecret_io)\n\n## \ud83c\udfaf Roadmap\n\n### Current Release (v1.0)\n- \u2705 Universal secret/config interface\n- \u2705 AWS, GCP, Azure, K8s support\n- \u2705 Auto-environment detection\n- \u2705 Smart classification\n- \u2705 CLI tools for DevOps\n\n### Coming Soon (v1.1)\n- \ud83d\udea7 Secret rotation automation\n- \ud83d\udea7 Web UI dashboard\n- \ud83d\udea7 Terraform provider\n- \ud83d\udea7 Ansible module\n- \ud83d\udea7 GitHub Action\n\n### Future (v2.0)\n- \ud83d\udccb Multi-region replication\n- \ud83d\udccb Disaster recovery\n- \ud83d\udccb Advanced RBAC\n- \ud83d\udccb Compliance reporting\n- \ud83d\udccb Cost optimization\n\n## \ud83d\udcaa Powered By\n\nBuilt by [Adaptive Digital Ventures](https://anysecret.io) - We're hiring! Check our [careers page](https://anysecret.io/careers).\n\n## \ud83c\udfc6 Users\n\nAnySecret.io is used in production by:\n\n- \ud83c\udfe5 **Healthcare** - HIPAA-compliant secret management\n- \ud83d\udcb0 **FinTech** - SOC2 compliant configuration\n- \ud83d\udecd\ufe0f **E-commerce** - Multi-region secret distribution\n- \ud83c\udfae **Gaming** - Low-latency config updates\n- \ud83d\ude80 **Startups** - Simple, cost-effective secret management\n\n---\n\n<p align=\"center\">\n <strong>Stop building secret management. Start shipping features.</strong><br>\n <a href=\"https://anysecret.io\">anysecret.io</a> \u2022 \n <a href=\"https://anysecret.io/docs\">Docs</a> \u2022 \n <a href=\"https://discord.gg/anysecret\">Discord</a> \u2022 \n <a href=\"https://twitter.com/anysecret_io\">Twitter</a>\n</p>\n",
"bugtrack_url": null,
"license": "AGPL-3.0-or-later",
"summary": "Universal secret manager for applications and CI/CD tools with CLI interface and multi-cloud support",
"version": "1.0.2",
"project_urls": {
"Bug Tracker": "https://github.com/anysecret-io/anysecret-lib/issues",
"Documentation": "https://github.com/anysecret-io/anysecret-lib/docs/quickstart.md",
"Homepage": "https://anysecret.io/",
"Repository": "https://github.com/anysecret-io/anysecret-lib"
},
"split_keywords": [
"secrets",
" secret-management",
" cloud",
" aws",
" gcp",
" azure",
" vault",
" fastapi",
" async"
],
"urls": [
{
"comment_text": null,
"digests": {
"blake2b_256": "97cda12198925fe12a406a82523dba27423c524357a88a2ac9160f8c3b235132",
"md5": "dd0c62c569ea95e8c47de45dac1d1a7c",
"sha256": "9d65d1de6b1cf84ea98162d93227af16af66f2cd1ee1cf04dcea67eee45dd2dd"
},
"downloads": -1,
"filename": "anysecret_io-1.0.2-py3-none-any.whl",
"has_sig": false,
"md5_digest": "dd0c62c569ea95e8c47de45dac1d1a7c",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3.8",
"size": 56282,
"upload_time": "2025-08-28T23:00:13",
"upload_time_iso_8601": "2025-08-28T23:00:13.656785Z",
"url": "https://files.pythonhosted.org/packages/97/cd/a12198925fe12a406a82523dba27423c524357a88a2ac9160f8c3b235132/anysecret_io-1.0.2-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": null,
"digests": {
"blake2b_256": "9ebef1eb4ce1b14f921c42e9bc64f603a11cd4244c33ef7e4efd9e30c600ddfb",
"md5": "32185b61152bbee08e5af64599fba741",
"sha256": "ee310b8b8a6c52d250ce8f8f983f0fcd9484c4098d97b27fde3278c691f914eb"
},
"downloads": -1,
"filename": "anysecret_io-1.0.2.tar.gz",
"has_sig": false,
"md5_digest": "32185b61152bbee08e5af64599fba741",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.8",
"size": 92582,
"upload_time": "2025-08-28T23:00:14",
"upload_time_iso_8601": "2025-08-28T23:00:14.811350Z",
"url": "https://files.pythonhosted.org/packages/9e/be/f1eb4ce1b14f921c42e9bc64f603a11cd4244c33ef7e4efd9e30c600ddfb/anysecret_io-1.0.2.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2025-08-28 23:00:14",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "anysecret-io",
"github_project": "anysecret-lib",
"travis_ci": false,
"coveralls": false,
"github_actions": true,
"requirements": [],
"lcname": "anysecret-io"
}