| Name | kubernetes-secrets-keyring JSON |
| Version |
0.2.5
JSON |
| download |
| home_page | None |
| Summary | Keyring backend using Kubernetes secrets. |
| upload_time | 2024-08-10 20:32:48 |
| maintainer | None |
| docs_url | None |
| author | None |
| requires_python | >=3.9 |
| license | None |
| keywords |
|
| VCS |
 |
| bugtrack_url |
|
| requirements |
No requirements were recorded.
|
| Travis-CI |
No Travis.
|
| coveralls test coverage |
No coveralls.
|
# Kubernetes Secrets Keyring Backend
Keyring backend that uses Kubernetes secrets. It uses `kubectl` commands to set, read, and delete credentials stored as Kubernetes secrets.
It automatically installs as backend with priority 20 (by default, can be adjusted with the `KUBERNETES_KEYRING_PRIORITY` environment variable) if installed on a system within a Kubernetes cluster, above any keyring present by default. This means after installing this package, you can use keyring exactly as usual without any need to reference this package. If installed on a system without Kubernetes, it should have no effect, as it checks if `KUBERNETES_SERVICE_HOST` is set and assigns itself a negative priority otherwise.
The usual `keyring` commands can be used with this package to set and manage the credentials. Kubernetes secrets are immutable, so you need to delete a secret before you can set a new password if the password changed.
The keyring package can be used as normal within code to get credentials saved as Kubernetes secrets, without any modifications to the code from what is done on regular Windows servers using the credential manager backend.
## Install Normally
To install use the command: `pip install kubernetes-secrets-keyring`
## Install for Debugging
The following describes how to install and use within the git repo (for instance, if making changes). Make sure to set the current directory to the root of the repo for the following commands.
To install as Python package use the command: `pip install .`
To test simply run `pytest` command.
To build use the command: `python -m build`
Raw data
{
"_id": null,
"home_page": null,
"name": "kubernetes-secrets-keyring",
"maintainer": null,
"docs_url": null,
"requires_python": ">=3.9",
"maintainer_email": null,
"keywords": null,
"author": null,
"author_email": "Stan Hatko <stan_hatko@live.com>",
"download_url": "https://files.pythonhosted.org/packages/a7/47/11c890670a00bacf4e512fdc6945893419858aaac2643587a8dd89aecf27/kubernetes_secrets_keyring-0.2.5.tar.gz",
"platform": null,
"description": "# Kubernetes Secrets Keyring Backend\n\nKeyring backend that uses Kubernetes secrets. It uses `kubectl` commands to set, read, and delete credentials stored as Kubernetes secrets.\n\nIt automatically installs as backend with priority 20 (by default, can be adjusted with the `KUBERNETES_KEYRING_PRIORITY` environment variable) if installed on a system within a Kubernetes cluster, above any keyring present by default. This means after installing this package, you can use keyring exactly as usual without any need to reference this package. If installed on a system without Kubernetes, it should have no effect, as it checks if `KUBERNETES_SERVICE_HOST` is set and assigns itself a negative priority otherwise.\n\nThe usual `keyring` commands can be used with this package to set and manage the credentials. Kubernetes secrets are immutable, so you need to delete a secret before you can set a new password if the password changed.\n\nThe keyring package can be used as normal within code to get credentials saved as Kubernetes secrets, without any modifications to the code from what is done on regular Windows servers using the credential manager backend.\n\n## Install Normally\n\nTo install use the command: `pip install kubernetes-secrets-keyring`\n\n## Install for Debugging\n\nThe following describes how to install and use within the git repo (for instance, if making changes). Make sure to set the current directory to the root of the repo for the following commands.\n\nTo install as Python package use the command: `pip install .`\n\nTo test simply run `pytest` command.\n\nTo build use the command: `python -m build`\n",
"bugtrack_url": null,
"license": null,
"summary": "Keyring backend using Kubernetes secrets.",
"version": "0.2.5",
"project_urls": {
"Repository": "https://github.com/StanHatko/kubernetes_secrets_backend"
},
"split_keywords": [],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "5bf9b8a66fd04ff184bcecbe22c37449f18b1d340f49dc99b034eb30858f0d8e",
"md5": "2554cc032f2be15f12bb1e095ed9d1c7",
"sha256": "1539323811c64615a7e41918de33a062a4ecc77599380be68486ddbbb7894781"
},
"downloads": -1,
"filename": "kubernetes_secrets_keyring-0.2.5-py3-none-any.whl",
"has_sig": false,
"md5_digest": "2554cc032f2be15f12bb1e095ed9d1c7",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3.9",
"size": 4159,
"upload_time": "2024-08-10T20:32:47",
"upload_time_iso_8601": "2024-08-10T20:32:47.042051Z",
"url": "https://files.pythonhosted.org/packages/5b/f9/b8a66fd04ff184bcecbe22c37449f18b1d340f49dc99b034eb30858f0d8e/kubernetes_secrets_keyring-0.2.5-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": "",
"digests": {
"blake2b_256": "a74711c890670a00bacf4e512fdc6945893419858aaac2643587a8dd89aecf27",
"md5": "f7d483b99c50f6fc4b2acd6ab1a76306",
"sha256": "8b8c9229518fd4a6d8cd7c50757ba5027f65d8ddb0e1c6e97d91ec1947f28677"
},
"downloads": -1,
"filename": "kubernetes_secrets_keyring-0.2.5.tar.gz",
"has_sig": false,
"md5_digest": "f7d483b99c50f6fc4b2acd6ab1a76306",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.9",
"size": 4024,
"upload_time": "2024-08-10T20:32:48",
"upload_time_iso_8601": "2024-08-10T20:32:48.525179Z",
"url": "https://files.pythonhosted.org/packages/a7/47/11c890670a00bacf4e512fdc6945893419858aaac2643587a8dd89aecf27/kubernetes_secrets_keyring-0.2.5.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2024-08-10 20:32:48",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "StanHatko",
"github_project": "kubernetes_secrets_backend",
"travis_ci": false,
"coveralls": false,
"github_actions": false,
"lcname": "kubernetes-secrets-keyring"
}