Skip to main content

op-env allows you to use 1Password entries as environment variable-style secrets

Project description

op-env

https://circleci.com/gh/apiology/op_env.svg?style=svg https://img.shields.io/pypi/v/op_env.svg Documentation Status

Features

op-env allows you to use 1Password entries as environment variable-style secrets. This makes it easier to rotate secrets in places where the source of truth is 1Password.

You can use op-env by setting your desired environment variable name as a tag in the 1Password entry that you want to use.

Q&A

How do I install op-env?

  1. You’ll first need to install and configure the “op” CLI from 1Password. I personally use brew install 1password-cli for that.

  2. To make using that a little less painful, I wrote with-op, which will stash your op temporary key in your system’s keychain so you don’t need to fiddle around with your environment. Your choice, though! Install using pip. python3 -m pip install with_op

  3. Install using pip. python3 -m pip install op_env

How do I run it?

Let’s say you have a web server you’re running locally named web-server. Let’s pass in environment variables pointing to the database it should connect to.

  1. Find or create your 1Password entry. Make sure the server, port, username and password are there, with those strings as the keys in the 1Password entry (this lines up with the ‘Server’ category if you want to use that!)

  2. Edit the entry and add tags for the env variable that your web server uses. Let’s say they’re called WEB_DB_SERVER, WEB_DB_PORT, WEB_DB_USERNAME, WEB_DB_PASSWORD - so add four tags.

  3. Run your server with with-op op-env run -e WEB_DB_SERVER -e WEB_DB_PORT -e WEB_DB_USERNAME -e WEB_DB_PASSWORD web-server

  4. Smile with the smug satisfaction of someone who doesn’t have yet another password hanging around in a text file on disk.

Can I share my list of env variables with my docker-compose.yml file?

Heck yeah! Just create a text file listing your environment variable names (one per line), point to it using [env_file:](https://docs.docker.com/compose/environment-variables/#the-env_file-configuration-option) in docker-compose.yml, and point to the same file with the --file-environment / -f flag in op_env.

Which field does op-env read? Can I pull a username, password, servername and port from 1Password?

op-env uses the name of the env variable to infer which field in the entry should be used - e.g., ‘server’ for WEB_DB_SERVER. It tries to handle common synonyms (more welcome in PRs!) like ‘user’ for ‘username’. Note that it won’t pull from the password field unless you give it ‘PASSWORD’ or ‘PASSWD’ or ‘PASS’ as the last underscored bit.

What if the env variable naming doesn’t line up with the field in 1Passsword?

Right now your best bet is to either duplicate the field in 1Password with the new name, rename the field in 1Password, or rename the env variable.

If you’d like to PR this and add a feature to add a mapping somewhere, file an issue and let’s talk.

What if I have more than one environment?

Currently you can use the --title / -t flag to point to a particular 1Password item title. All tags from that item will be added.

In the future I could imagine having some new flag that down-selects by requiring a certain tag (e.g., web-server-prod) or perhaps vault be applied to the 1Password entry to downselect to the right set of entries. File an issue if you’re interested in taking this on!

I want something like this, but as something which populates Heroku/Kubernetes/etc.

That’s not a question. But yeah, I’d definitely imagine these as an extension here - something like op-env k8s -e WEB_DB_SERVER that creates a secret.

For now, you can use op-env json -e WEB_DB_SERVER and write a script to process the JSON that it puts out on stdout into what you need. For that matter, you could write a script (maybe an ERB/jinja template?) that pastes in env variables and run it with op-env run. Or you could use the jq tool to manipulate the results like this:

with-op op-env json -e WEB_DB_SERVER | jq -r 'to_entries | map("heroku config:set --app my-app " + .key + "=" + .value) | join("\n")' | sh

Or perhaps even create a Rake task like this:

require 'yaml'

def pull_vars_and_values
  vars_file = Rails.root.join('config', 'vars.yml')
  vars = YAML.safe_load(File.read(vars_file))
  cmd = %w[with-op op-env json] + vars.flat_map { |var| ['-e', var] }
  stdout, status = Open3.capture2(*cmd)
  raise "Failure running #{cmd}" if status != 0

  JSON.parse(stdout)
end

desc 'Populate Heroku config'
task :populate_heroku do
  vars_and_values = pull_vars_and_values
  vars_and_values.each do |var, value|
    sh 'heroku', 'config:set', '--app', 'my-app', "#{var}=#{value}"
  end
end

This isn’t quite the problem I’m facing. Are there other things out there that are related I should know about?

Some pointers to things that might be helpful:

  1. ope sets environment variables based on a configuration file in your home directory, and predates this tool by a few years. I didn’t know about it when I wrote op-env. It lets you point to a selected 1Password entry which has all of the env variables you need, and lets you run in a similar way to op-env. My take is that it’ll be easier to see all your related secrets in one place, but you may have to duplicate some things if you have an existing 1Password structure you need to keep (the tag concept in op-env is designed to keep your 1Password secrets DRY).

  2. db-facts specializes on setting database information, and integrates well with LastPass (but not yet 1Password). I wrote this.

  3. op is a CLI tool for interacting with 1Password. It’s pretty good, but requires you stash a temporary token in your environment.

  4. with-op helps by stashing that token in your system keychain so you don’t need to create wacky shell aliases or whatever. I wrote this.

  5. lastpass-cli is a CLI tool for interacting with LastPass. It is cruddy and not well-maintained, but it’s what’s available and is the basis for LastPass support in db-facts.

Credits

This package was created with Cookiecutter and the audreyr/cookiecutter-pypackage project template.

History

0.1.0 (2021-03-25)

  • First release on PyPI.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

op_env-0.9.0.tar.gz (24.2 kB view details)

Uploaded Source

File details

Details for the file op_env-0.9.0.tar.gz.

File metadata

  • Download URL: op_env-0.9.0.tar.gz
  • Upload date:
  • Size: 24.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.3.0 pkginfo/1.7.1 requests/2.26.0 setuptools/57.4.0 requests-toolbelt/0.9.1 tqdm/4.62.3 CPython/3.10.0

File hashes

Hashes for op_env-0.9.0.tar.gz
Algorithm Hash digest
SHA256 f550e4c461ce0e50b329ac29f7cbfdaddd3f104366133c0ca4486fe79548051e
MD5 033718f028d60c99cee40da1cc31ece5
BLAKE2b-256 30ec28cbda15476c8b3814bfa638fd629505a9892d843dc22003f744736a2598

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page