Skip to main content

Vault asyncio

Project description

https://img.shields.io/pypi/v/aiovault.svg https://img.shields.io/pypi/dm/aiovault.svg https://img.shields.io/travis/terrycain/aiovault/master.svg?label=master%20build https://img.shields.io/travis/terrycain/aiovault/stable.svg?label=stable%20build https://codecov.io/gh/terrycain/aiovault/branch/master/graph/badge.svg Documentation Status Updates Python 3

aiovault 1.1.1 release

Minor bugfixes

aiovault 1.0.0 release

First major release. Should be pretty stable… all the tests pass so cant be too bad.

This library is mainly just a glorified wrapper around aiohttp calling the many Vault URLs. Eventually I want to add some helper methods to make using vault with microservices easier, like having a coroutine which will just sit there renewing tokens/secrets etc…

Example

Simple example of authenticating with vault and then writing then reading a secret

import aiovault

with aiovault.VaultClient(token='6c84fb90-12c4-11e1-840d-7b25c5ee775a') as client:
    is_authed = await client.is_authenticated()
    print(is_authed)  # True

    await client.secrets.generic.create('some_secret', key1='value1', key2='value2')

    secret = await client.secrets.generic.read('some_secret')

    print(secret['key1'])  # value1
    print(secret['key2'])  # value2

Documentation

https://pyaiovault.readthedocs.io/en/latest/

Features

  • Token, GitHub, AppRole, LDAP, RADIUS and User/Password Authentication backends

  • Generic Secret, Consul, TOTP and Transit backends

  • File and Syslog Audit backends

  • Policy management

  • Backend renaming

  • Initialization, seal and health management

TODO (Near future)

  • Improve code coverage

  • Secret backends: Databases, RabbitMQ, Cubbyhole

  • Auth backends: Okta, AWS (hopefully)

TODO (Long term)

  • More docs, more examples

  • Possibly utility functions like a coroutine to keep renewing a token/secret

  • Policy validation with hcl library?

  • Socket audit backend

  • TLS auth support

  • PKI, SSH secret support

Testing

As many of the unit tests that can, interact directly with Vault/Consul/LDAP/RADIUS without mocking. Currently my reasoning is that this way, if we change the variable that determins the vault version and incompatabilites in the REST interface were introduced they would appear immediatly in the masses of failing unit tests.

Credits

I used the _Cookiecutter package to setup the initial project. Was pretty good.

And most of the credit goes to the wonderful _aiohttp library which this library is pretty much a wrapper around.

License

History

1.1.1 (2017-11-16)

  • Updated readme

1.1.0 (2017-11-16)

  • Fixed verify=False bug

1.0.0 (2017-07-29)

  • First stable release

0.2.0 (2017-07-20)

  • Switched to use the dev version of Python 2.6

  • Fixed link target in README

  • Fixed typo in README code example

  • Added AppRole authentication backend

  • Added Transit secret backend

  • Created test harness for running Vault in non dev mode

  • Added Seal/Unseal, initialization and health methods

0.1.3 (2017-07-17)

  • Fixed rendering of README on PyPI

0.1.2 (2017-07-17)

  • Mostly repository maintenance.

  • Updated requirements_dev.txt and setup.py

  • Fixed issue where tox was not passing environment variables

  • Limited coverage scope to the library not test suite

0.1.1 (2017-07-17)

  • First release on PyPI.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

aiovault-1.1.1.tar.gz (41.2 kB view details)

Uploaded Source

Built Distribution

aiovault-1.1.1-py2.py3-none-any.whl (25.0 kB view details)

Uploaded Python 2 Python 3

File details

Details for the file aiovault-1.1.1.tar.gz.

File metadata

  • Download URL: aiovault-1.1.1.tar.gz
  • Upload date:
  • Size: 41.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No

File hashes

Hashes for aiovault-1.1.1.tar.gz
Algorithm Hash digest
SHA256 d6ca1498d829af30b6436883b051f474d1a52515f561b9f20b4934ae01a1b34f
MD5 4d9500c9c0fc0e2e23179c1335e10edd
BLAKE2b-256 83eb3fbcfd4b135515385025fbcff8d73aadfd23a674ac6c08c4cc57e263b0eb

See more details on using hashes here.

File details

Details for the file aiovault-1.1.1-py2.py3-none-any.whl.

File metadata

File hashes

Hashes for aiovault-1.1.1-py2.py3-none-any.whl
Algorithm Hash digest
SHA256 9eefcf111f6cb405f8116cd7fb20908b9a48a0977ab2fa461496f5573b4abdfb
MD5 8653e84787ac6a0f40e80f86f994d61c
BLAKE2b-256 09228c8fe985ecb97eabbaf92ac727be0ba68a3f6dd33b7fb784bde7d2057786

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page