Commandline tool to pull secrets from multiple sources and push to AWS SSM and Secrets Manager with rate limiting.
Project description
Secrets Sync
Async CLI to pull secrets from multiple sources (env, YAML, 1Password) and push to AWS SSM Parameter Store and/or AWS Secrets Manager with concurrency, per-sink rate limiting, retry/backoff, multi-file config merging, variable templating, and per-sink routing.
Install
Requires Python 3.10+.
uv venv && uv pip install --editable .
source .venv/bin/activate
Usage
Merge multiple YAML config files (later files override earlier values):
secrets-sync -f ./defaults.yml -f ./test-1.yml
Flags:
--file, -f PATH: add a config file to merge (may be repeated; later overrides earlier).--print-values: print a preview of what will be pushed, grouped by sink. Combine with--dry-runfor preview only.--print-format {list,table,json}: output format for preview (defaultlist).--dry-run: collect and optionally print, but do not push to AWS.--print-sync-details: print a line for each item as it's synced (success/failure plus created/unchanged/changed). When combined with--print-values, each log also shows value snapshots (created 'new',unchanged 'old', orchanged 'old' -> 'new').
Config
vars: key/value map. Values here override environment variables during template interpolation. Placeholders{{ VAR_NAME }}in strings are replaced at load time. Missing variables cause an error.aws: configure which AWS region/profile the CLI should use for AWS API calls (same as the AWS CLI/boto3 provider chain):region: optional explicit region. If omitted, the CLI falls back toAWS_DEFAULT_REGIONorAWS_REGION.profile: optional profile name from your~/.aws/config/~/.aws/credentials. If omitted,AWS_PROFILE(when set) is used, otherwise boto3 falls back to its default profile chain.- Regardless of profile, boto3 can still authenticate with exported credentials such as
AWS_ACCESS_KEY_ID,AWS_SECRET_ACCESS_KEY, andAWS_SESSION_TOKEN.
sources: list of sources, each withname,type, andoptions(See the Sources section below for more details).sinks: list of sinks, each withtype,options, and optionalsourcesfilter listing source names to route (See the Sinks section below for more details).
Example: examples/basic/dev.yaml.
Sources
-
env: Reads directly from the running process environment. Use this source to capture secrets already loaded into the shell or CI job. See docs/SOURCE_ENV.md for scenarios and examples.include_regex: regex to include (orinclude: [patterns])exclude: list of regexes to excludekeys: explicit variable names to includestrip_prefix: remove leading prefix from names
-
yaml: Loads values from one or more YAML documents on disk. Files are merged in order so you can provide layered defaults plus environment overrides. Additional details live in docs/SOURCE_YAML.md.files: list of YAML file paths (merged in order; later files override earlier)key: dot-path to the subtree to read (e.g.,valuesfor the example shape)- Supported structures: mapping of
name: value, or{ values: [ { name, value, description } ] }, or a list of{ name, value, description }. - Relative paths are resolved against the config file where they are declared (not the working directory). This also holds when merging multiple config files.
-
1password: Fetches items from a 1Password vault and maps each item title to a secret. Requires the 1PasswordopCLI to be installed plus either a configuredservice_account_tokenor theOP_SERVICE_ACCOUNT_TOKENenvironment variable for authentication. Full walkthrough: docs/SOURCE_1PASSWORD.md.vault: Vault name (required).tag_filters: Only items containing any of these tags are included. The list order also determines override priority when multiple items share the same title.include_regex: Optional regex applied to item titles for additional filtering.service_account_token: Inline token value; falls back to theOP_SERVICE_ACCOUNT_TOKENenvironment variable when omitted.concurrency: Number of parallel fetches when pulling item details (default8).
-
keeper: Uses the Keeper Commander SDK/CLI session to pull records from Keeper Enterprise. Requires a logged-in Keeper Commander environment with persistent login or inline credentials. Reference guide: docs/SOURCE_KEEPER.md.folder: Keeper folder or path to read from (required).tag_filters: Only records whose customtagsfield matches any supplied tag are included. The list order also determines override priority when multiple items share the same title.include_regex: Optional regex applied to record titles.config_file: Path to the Keeper Commander config (default~/.keeper/config.json).keeper_server,keeper_user,keeper_password: Inline overrides (orKEEPER_SERVER,KEEPER_USER,KEEPER_PASSWORDenv vars) for CLI login values. Overrides what is read fromconfig_file.
Sinks
-
ssmoptions:prefix: optional string prefix for parameter names (supports{{ VAR }}placeholders)type:SecureString(default) orString(any other value errors at load time)overwrite: boolean (default true)kms_key_id: optional KMS key id for SecureStringrate_limit_rps,concurrency: control throughput
-
secrets_manageroptions:prefix: optional string prefix for secret names (supports{{ VAR }})kms_key_id,rate_limit_rps,concurrencysimilar to SSM
The AWS API usage for both AWS sinks are paced automatically: the sinks meter requests so they stay within the configured rate_limit_rps, and they fall back to exponential backoff with jitter whenever AWS responds with throttling errors.
Each sink may specify sources: [source-name, ...] to only accept items from those sources. If a sink references a source that does not exist, config loading fails with a clear error.
Variables and templating
varsprovides values for{{ VAR }}placeholders anywhere in the config. Values invarsoverride environment variables with the same keys.- If a placeholder cannot be resolved, config loading fails.
Preview output
--print-values --print-format=list(default): printsfull_name=valueunder each sink header.--print-format=table: prints two columns (Name, Value) per sink.--print-format=json: prints a JSON array of sink objects withname,type,prefix,sources, anditems[](each withname,value,description).
Examples:
secrets-sync --dry-run --print-values -f ./defaults.yaml -f ./env.yaml
secrets-sync --dry-run --print-values --print-format=table -f ./examples/basic/dev.yaml
secrets-sync --dry-run --print-values --print-format=json -f ./examples/basic/dev.yaml
Example config
vars:
ENVIRONMENT_NAME: test-1
aws:
region: ap-southeast-2
sources:
- name: env
type: env
options:
include_regex: '^APP_.*'
strip_prefix: 'APP_'
- name: external-yaml-file
type: yaml
options:
files:
- configs/default.yaml
- configs/test-1.yaml
key: values
- name: 1password
type: 1password
options:
vault: 'EnvironmentSecrets'
include_regex: '^APP_.*'
tag_filters: ['default','prod']
sinks:
- name: ssm-secrets
type: ssm
options:
prefix: '/env/{{ ENVIRONMENT_NAME }}/secret/'
overwrite: true
type: SecureString
rate_limit_rps: 10
concurrency: 10
sources: [ '1password' ]
- name: ssm-config
type: ssm
options:
prefix: '/env/{{ ENVIRONMENT_NAME }}/config/'
overwrite: true
type: String
sources: [ 'external-yaml-file', 'env' ]
- name: secrets-manager
type: secrets_manager
options:
prefix: 'env/{{ ENVIRONMENT_NAME }}/secret/'
sources: [ '1password' ]
Requirements
- Python 3.10+
- AWS credentials/auth per your environment (respects
AWS_PROFILE,AWS_DEFAULT_REGION/AWS_REGION). - 1Password source requires the
opCLI with a service account token (viaOP_SERVICE_ACCOUNT_TOKENoroptions.service_account_token). - Keeper source requires the Keeper Commander CLI config (
~/.keeper/config.json) and thekeepercommanderPython package (installed with this tool). The Keeper CLI credentials can be overridden withoptions.keeper_*orKEEPER_*environment variables.
Notes
- Lists of dicts with
namefields are deep-merged by name across config files (later files override earlier entries). Other lists are replaced. - YAML source
filesare resolved relative to the config file they are declared in.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file secrets_sync-0.2.0.tar.gz.
File metadata
- Download URL: secrets_sync-0.2.0.tar.gz
- Upload date:
- Size: 33.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: uv/0.9.13 {"installer":{"name":"uv","version":"0.9.13"},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
58803903c79c5a63d31988e1ac07b63e25a952817fc64ede0bab8d06a6802b43
|
|
| MD5 |
b2e038674047f4b1a32dcc487187cb10
|
|
| BLAKE2b-256 |
8ecc630c6f1115c78f00a1216df5050b8dba456ff71c64ca0cc4a77ab8288908
|
File details
Details for the file secrets_sync-0.2.0-py3-none-any.whl.
File metadata
- Download URL: secrets_sync-0.2.0-py3-none-any.whl
- Upload date:
- Size: 37.2 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: uv/0.9.13 {"installer":{"name":"uv","version":"0.9.13"},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
ff87befee68b7d2eb78ec73995da12cbd09b506127eea03a664759abec3d3fa4
|
|
| MD5 |
fb92365d31ae41c8774cd64e19ba3bb5
|
|
| BLAKE2b-256 |
3465289086eaa7f4193deb58c906f20bcd7065bc7b0a1542d1b81ad0f175440a
|