Skip to main content

Yaml-based secret manager for secret load/set/clean.

Project description

Secret Transfer

YaML-based secret manager for secret load/transfer from different sources to destinations.

Base idea

The base idea is to have a simple and flexible way to transfer secrets from different sources to different destinations.

The main components are:

  • Source - A place where secrets are stored. It can be a file, environment variables, a database, a cloud service, etc.
  • Destination - A place where secrets are transferred. It can be environment variables, a file, a cloud service, etc.
  • Collection - A collection of secrets from sources. It can be used to combine secrets from different sources.
  • Transfer - A transfer of secrets from a collection to a destination.

Features

  • YaML-based - Define sources, destinations, collections, and transfers in a YaML file.
  • Lazy loading - Define objects in no particular order and reference them from one another.
  • Cross-referencing - Reference sources, destinations, collections, and transfers from one another.
  • Built-in classes - Use built-in classes for sources, destinations, collections, and transfers.
  • Extensible - Add custom classes for sources, destinations, collections, and transfers.

Usage

CLI Commands

Run

Run all transfers in the given YaML file.

secret-transfer run -f <path_to_yaml_file>

Options:

  • -f, --file <path_to_yaml_file> - Path to the YaML file with secrets. [required]
  • -n, --name <name> - Name of the transfer to run. [optional]

Clean

Clean all secrets in all transfer destinations in the given YaML file.

secret-transfer clean -f <path_to_yaml_file>

Options:

  • -f, --file <path_to_yaml_file> - Path to the YaML file with secrets. [required]
  • -n, --name <name> - Name of the transfer to clean. [optional]

YaML schema

The YaML file should contain the following optional sections:

Custom class definitions for sources, destinations, collections, and transfers.

source_classes:
  <name>: # Name to be registered
    module: <module> # Module to import from
    class_name: <class_name> # Class to be registered
destination_classes: ...
collection_classes: ...
transfer_classes: ...

Sources, destinations, collections, and transfers.

sources:
  <name>:
    class_name: <source_class_name> # Class to use, either from source_classes or built-in
    init_args: # Arguments to pass to the class constructor, can be omitted if no arguments are needed
      <arg_name>: <arg_value>
      ...
destinations:
  ...
collections:
  ...
transfers:
  ...

Lasy loading

All items are lazily loaded, so they are not created until they are used. This allows to define objects in no particular order and reference them from one another. The only exception is built-in classes, which are registered at import-time.

Cross-referencing is allowed, so you can reference sources, destinations, collections, transfers and their values from init_args. Circular references are not allowed.

Cross-referencing

Instance references

To reference instances of sources, destinations, collections, and transfers, use the following syntax:

$<type>[<name>]

Where:

  • <type> - Type of the instance (source, destination, collection, or transfer).
  • <name> - Name of the instance.

Value references

To reference values from sources or collections, use the following syntax:

$<type>[<name>][<key>]

Where:

  • <type> - Type of the gettable instance (usually, but not necessarily source or collection).
  • <name> - Name of the instance.
  • <key> - Key of the value.

Where:

Built-in classes

Sources

DotEnvSource

Load secrets from a .env file using dotenv package. Arguments:

  • file_path - Path to the .env file. [required]

Example:

sources:
  dotenv:
    class_name: DotEnvSource
    init_args:
      file_path: .env
EnvSource

Load secrets from environment variables. Arguments: none.

Already registered with name env, no need to define in the YaML file.

Example:

collections:
  default:
    init_args:
      TEST_KEY:
        source: $sources[env]
PresetSource

Load secrets from a preset dictionary. Arguments: key-value pairs of variables.

Example:

sources:
  preset:
    class_name: PresetSource
    init_args:
      TEST_KEY: test_value
UserInputSource

Asks the user for input. Arguments: none.

Already registered with name user_input, no need to define in the YaML file.

Example:

collections:
  default:
    init_args:
      TEST_KEY:
        source: $sources[user_input]
VaultCLIKVSource

Load secrets from HashiCorp Vault KV using vault kv get CLI command. Arguments:

  • address - Address of the Vault server. [required]
  • mount - Mount point of the KV engine. [required]
  • secret_name - Name(path) of the secret. [required]

Pre-requisites:

  • vault CLI installed and authenticated.

Example:

sources:
  vault:
    class_name: VaultCLIKVSource
    init_args:
      address: https://vault.example.com
      mount: secrets
      secret_name: TEST_SECRET
YCCLILockboxSource

Load secrets from Yandex.Cloud Lockbox using yc lockbox payload get CLI command. Arguments:

  • profile - Name of the Yandex.Cloud CLI profile. [required]
  • folder - Folder name. [required]
  • lockbox - Lockbox name. [required]

Pre-requisites:

  • yc CLI installed and authenticated.

Example:

sources:
  yc_lockbox:
    class_name: YCCLILockboxSource
    init_args:
      profile: my-profile
      folder: my-folder
      lockbox: my-lockbox

Destinations

BashExportDestination

Print secrets as export commands to the console. Useful for setting environment variables. Never let stdout to be captured by a process, as it will expose the secrets. Arguments: none.

Already registered with name bash_export, no need to define in the YaML file.

Example:

transfers:
  default:
    init_args:
      source: ...
      destination: $destinations[bash_export]
EnvDestination

Set secrets as environment variables. Arguments: none.

Already registered with name env, no need to define in the YaML file.

Example:

transfers:
  default:
    init_args:
      source: ...
      destination: $destinations[env]
GithubCliSecretsDestination

Set secrets as GitHub repository secrets using gh secret set CLI command. Arguments:

  • repo_name - Name of the repository. [required]
  • owner_name - Name of the repository owner. [required]
  • base_url - Base URL of the GitHub API. [optional] (default: https://github.com)

Pre-requisites:

  • gh CLI installed and authenticated.

Example:

destinations:
  github:
    class_name: GithubCliSecretsDestination
    init_args:
      repo_name: my-repo
      owner_name: my-org

Collections

DefaultCollection

Default collection to combine secrets from sources. Default collection class, so class_name can be omitted.

Example:

collections:
  default:
    init_args:
      COLLECTION_KEY:
        source: $sources[env]
        key: SOURCE_KEY

Transfers

DefaultTransfer

Default transfer to transfer secrets from collection to destination. Default transfer class, so class_name can be omitted.

Example:

transfers:
  default:
    init_args:
      collection: $collections[default]
      destination: $destinations[env]

Custom class definitions

You can define custom classes for sources, destinations, collections, and transfers.

Any resource

import typing
import typing_extensions

import secret_transfer.core as secret_transfer_core


class CustomResource(...):
    __register__ = ... # bool: Should the class be registered on creation (optional, default: True)
    __default__ = ... # bool: Should the class be used as default for its type (optional, default: False)

    @classmethod
    def parse_init_arguments(
      cls,
      **arguments: secret_transfer_core.InitArgumentType
    ) -> typing.Mapping[str, typing.Any]:
        # Optional to implement
        # Parse and validate init arguments passed from the YaML definition for the future instance creation
        ...

    @classmethod
    def get_default_instances(cls) -> typing.Mapping[str, typing_extensions.Self]:
        # Optional to implement
        # Return default instances of the class to be registered at import-time
        ...

Source

import secret_transfer.core as secret_transfer_core
import secret_transfer.utils.types as secret_transfer_types


class CustomSource(secret_transfer_core.AbstractSource):
    def __getitem__(self, key: str) -> secret_transfer_types.Literal:
        # Required to implement
        # Return the value of the secret by key
        ...

Destination

import secret_transfer.core as secret_transfer_core
import secret_transfer.utils.types as secret_transfer_types


class CustomDestination(secret_transfer_core.AbstractDestination):
    def __setitem__(self, key: str, value: secret_transfer_types.Literal) -> None:
        # Required to implement
        # Set the value of the secret by key
        ...

    def __delitem__(self, key: str) -> None:
        # Optional to implement
        # Clean all secrets in the destination
        ...

Collection

import typing

import secret_transfer.core as secret_transfer_core
import secret_transfer.utils.types as secret_transfer_types


class CustomCollection(secret_transfer_core.AbstractCollection):
    def __getitem__(self, key: str) -> secret_transfer_types.Literal:
        # Required to implement
        # Return the value of the secret by key
        ...

    def __iter__(self) -> typing.Iterator[str]:
        # Required to implement
        # Return an iterator over the keys of the collection
        ...

    def items(self) -> typing.Iterator[tuple[str, secret_transfer_types.Literal]]:
        # Required to implement
        # Return an iterator over the items of the collection
        ...

Transfer

import secret_transfer.core as secret_transfer_core


class CustomTransfer(secret_transfer_core.AbstractTransfer):
    def run(self) -> None:
        # Required to implement
        # Transfer secrets
        ...

    def clean(self) -> None:
        # Required to implement
        # Clean all secrets in the transfer
        ...

Usage Examples

Check examples for usage examples.

Development

Taskfile commands

For all commands see Taskfile or task --list-all.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

secret_transfer-0.4.0.tar.gz (19.3 kB view details)

Uploaded Source

Built Distribution

secret_transfer-0.4.0-py3-none-any.whl (34.0 kB view details)

Uploaded Python 3

File details

Details for the file secret_transfer-0.4.0.tar.gz.

File metadata

  • Download URL: secret_transfer-0.4.0.tar.gz
  • Upload date:
  • Size: 19.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.7.1 CPython/3.9.18 Linux/6.2.0-1019-azure

File hashes

Hashes for secret_transfer-0.4.0.tar.gz
Algorithm Hash digest
SHA256 c1f147e9c5a5ac7ba51f74fdf6d6daa14f6902256cd5915299e81a94086ffe50
MD5 790eef6b7c900351c35c5eb64539bb44
BLAKE2b-256 72913a7f90bb556ef515654ef78f491b3d03bd9c1d9528bd671665ad711df229

See more details on using hashes here.

File details

Details for the file secret_transfer-0.4.0-py3-none-any.whl.

File metadata

  • Download URL: secret_transfer-0.4.0-py3-none-any.whl
  • Upload date:
  • Size: 34.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.7.1 CPython/3.9.18 Linux/6.2.0-1019-azure

File hashes

Hashes for secret_transfer-0.4.0-py3-none-any.whl
Algorithm Hash digest
SHA256 bce55f9fda601a6eba2c3faef2d5c78ebc141b3081a3dcb3363b0c7ba8a229da
MD5 b0640ce232f7a77e191725a9f64f4191
BLAKE2b-256 ace9519bb6032484fba0917e08074c73e06cceb2ecff1b64489ecf965efdc750

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page