A small package for handling project secrets
Project description
Azure key vaults
Repository for explaining how to use Azure key vaults in our projects.
Index
Usage
This package is designed for easily pulling and creating secrets in Azure key vaults.
pip install this public package
pip install git+ssh://git@github.com/zypp-io/keyvault.git
Secrets to environment
This function sets the keyvault secrets to the runtime environment variables. This function will only work if you have set the required environment variables
from keyvault import secrets_to_environment
secrets_to_environment(keyvault_name="mykeyvault")
Get dotenv secrets
Function for reading the local .env file and capturing the secret_name, secret_value as key value pairs.
from keyvault import get_dotenv_secrets
get_dotenv_secrets(dotenv_file=".env")
Get keyvault secrets
This function can be used to pull secrets from the vault. This function will only work if you have set the required environment variables
from keyvault import get_keyvault_secrets
secrets = get_keyvault_secrets(keyvault_name="mykeyvault")
# Returns a dictionary containing secret_name, secret_value pairs
dotenv to keyvault
This function is designed for making it easy to upload sensitive project secrets to Azure key vault.
The function reads the .env
file and uploads the names and values to Azure key vault.
from keyvault import dotenv_to_keyvault
dotenv_to_keyvault(keyvault_name="mykeyvault", dotenv_file=".env")
# Uploads your current .env variables to azure key vault
Dict to keyvault
The function lets you upload a dictionary, where the key-value pairs are the secretname-secretvalues in Azure key vault.
from keyvault import dict_to_keyvault
dict_to_keyvault(keyvault_name="mykeyvault", secret_dict={'SECRET_NAME': 'secret value'})
It is also possible to add an expiry date or the content type of the secrets:
from keyvault import dict_to_keyvault
from datetime import datetime, timedelta
expiry_date = datetime.now() + timedelta(days=80)
dict_to_keyvault(
keyvault_name="mykeyvault",
secret_dict={'SECRET_NAME': 'secret value'},
expires_on=expiry_date,
content_type="text/plain"
)
Delete keyvault secrets
The function lets you delete secrets in the keyvault. Secrets will be deleted with soft_delete enabled.
from keyvault import delete_keyvault_secrets
delete_keyvault_secrets(keyvault_name="mykeyvault", secret_list=["SECRET_NAME"])
mandatory environment variables
There are 3 environment variables that are necessary for authenticating with the azure key vault. These variables always need to be present in the project in order for the secrets to be retrieved.
AZURE_CLIENT_ID=REPLACE-ME
AZURE_CLIENT_SECRET=REPLACE-ME
AZURE_TENANT_ID=REPLACE-ME
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file keyvault-0.2.0.tar.gz
.
File metadata
- Download URL: keyvault-0.2.0.tar.gz
- Upload date:
- Size: 5.4 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.1 CPython/3.12.5
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 6a2a763c4b1e08798f535875a59887a305b7d7ff1258b0937c8248cebffbaa50 |
|
MD5 | 14578bf0ec2cd2cc61246c63d8365376 |
|
BLAKE2b-256 | a3c48944e1f666f1724b63b2d312b029d809d421097acfae084daaab6d196c12 |
File details
Details for the file keyvault-0.2.0-py3-none-any.whl
.
File metadata
- Download URL: keyvault-0.2.0-py3-none-any.whl
- Upload date:
- Size: 6.4 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.1 CPython/3.12.5
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | ebf5150d228117c3f7a0896a979b3a07bb930cd47b55f6fb51be181c13381fef |
|
MD5 | da4fc505aea11af6c581f28009482180 |
|
BLAKE2b-256 | b7effedfdf9242f86e250d469e779e1f5be518fc19a1352502c5f53170137b7b |