secrets-env


Namesecrets-env JSON
Version 0.28.0 PyPI version JSON
download
home_pagehttps://github.com/tzing/secrets.env
SummaryBridge between Vault and your app
upload_time2023-08-03 14:26:54
maintainer
docs_urlNone
authortzing
requires_python>=3.8,<4.0
licenseApache-2.0
keywords vault environment variables
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            Secrets.env
===========

Secrets.env is the bridge between `Vault <https://www.vaultproject.io/>`_ and your app.

It put values from Vault KV engine to environment variables like a ``.env`` loader, without landing credentials on disk.

.. code-block:: bash

   $ cat .secrets-env.yaml
   source:
     url: http://localhost:8200
     auth: token

   secrets:
     EXAMPLE:
       path: secrets/example
       field: foo

   $ secrets.env run sh -c 'echo \$EXAMPLE = $EXAMPLE'
   [secrets_env] Read secrets.env config from /Users/tim_shih/.secrets-env.yaml
   [secrets_env] 🔑 1 secrets loaded
   $EXAMPLE = hello

Security is important, but don't want it to be a stumbling block. We love secret manager, but the practice of getting secrets for local development could be a trouble.

This app is built to *plug in* secrets into development without landing data on disk, easily reproduce the environment, and reduce the risk of uploading the secrets to the server.


            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/tzing/secrets.env",
    "name": "secrets-env",
    "maintainer": "",
    "docs_url": null,
    "requires_python": ">=3.8,<4.0",
    "maintainer_email": "",
    "keywords": "vault,environment variables",
    "author": "tzing",
    "author_email": "tzingshih@gmail.com",
    "download_url": "https://files.pythonhosted.org/packages/37/cc/c6595b19fd5c44a6910fa2d27782170c854488acd55c5130e387ac643bcc/secrets_env-0.28.0.tar.gz",
    "platform": null,
    "description": "Secrets.env\n===========\n\nSecrets.env is the bridge between `Vault <https://www.vaultproject.io/>`_ and your app.\n\nIt put values from Vault KV engine to environment variables like a ``.env`` loader, without landing credentials on disk.\n\n.. code-block:: bash\n\n   $ cat .secrets-env.yaml\n   source:\n     url: http://localhost:8200\n     auth: token\n\n   secrets:\n     EXAMPLE:\n       path: secrets/example\n       field: foo\n\n   $ secrets.env run sh -c 'echo \\$EXAMPLE = $EXAMPLE'\n   [secrets_env] Read secrets.env config from /Users/tim_shih/.secrets-env.yaml\n   [secrets_env] \ud83d\udd11 1 secrets loaded\n   $EXAMPLE = hello\n\nSecurity is important, but don't want it to be a stumbling block. We love secret manager, but the practice of getting secrets for local development could be a trouble.\n\nThis app is built to *plug in* secrets into development without landing data on disk, easily reproduce the environment, and reduce the risk of uploading the secrets to the server.\n\n",
    "bugtrack_url": null,
    "license": "Apache-2.0",
    "summary": "Bridge between Vault and your app",
    "version": "0.28.0",
    "project_urls": {
        "Documentation": "https://secretsenv.readthedocs.io/",
        "Homepage": "https://github.com/tzing/secrets.env",
        "Repository": "https://github.com/tzing/secrets.env"
    },
    "split_keywords": [
        "vault",
        "environment variables"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "af22064653f385bcce128a2fa240b17d8dcf9c9b29f5bc5441729d5211cf7a14",
                "md5": "1c9aaa4634fbf132d8ab17544a070d6c",
                "sha256": "d7373411d76745c1782612f34bdef28d8ad4d3f05940b9571233582d2d9d1e26"
            },
            "downloads": -1,
            "filename": "secrets_env-0.28.0-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "1c9aaa4634fbf132d8ab17544a070d6c",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.8,<4.0",
            "size": 44022,
            "upload_time": "2023-08-03T14:26:52",
            "upload_time_iso_8601": "2023-08-03T14:26:52.881778Z",
            "url": "https://files.pythonhosted.org/packages/af/22/064653f385bcce128a2fa240b17d8dcf9c9b29f5bc5441729d5211cf7a14/secrets_env-0.28.0-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "37ccc6595b19fd5c44a6910fa2d27782170c854488acd55c5130e387ac643bcc",
                "md5": "238822b82bb0969eddd2c8d76ede59ad",
                "sha256": "4ae985bab57695f9bda1ab94f2f3c153096275a9c550ae5785c8846daf8dd789"
            },
            "downloads": -1,
            "filename": "secrets_env-0.28.0.tar.gz",
            "has_sig": false,
            "md5_digest": "238822b82bb0969eddd2c8d76ede59ad",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.8,<4.0",
            "size": 31509,
            "upload_time": "2023-08-03T14:26:54",
            "upload_time_iso_8601": "2023-08-03T14:26:54.065981Z",
            "url": "https://files.pythonhosted.org/packages/37/cc/c6595b19fd5c44a6910fa2d27782170c854488acd55c5130e387ac643bcc/secrets_env-0.28.0.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2023-08-03 14:26:54",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "tzing",
    "github_project": "secrets.env",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": true,
    "lcname": "secrets-env"
}
        
Elapsed time: 0.09536s