Put secrets from Vault to environment variables
Project description
Secrets.env 🔓
Put secrets from Vault KV engine to environment variables like a .env
loader, without landing data on disk.
Security is important, but don't want it to be a stumbling block. We love secret manager, but the practice of getting secrets for local development could be a trouble.
This app is built to plug in secrets into development without landing data on disk, easily reproduce the environment, and reduce the risk of uploading the secrets to the server.
- 📦 PyPI
- 📐 Source code
- 📗 Documentation
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
secrets_env-0.15.0.tar.gz
(17.3 kB
view hashes)
Built Distribution
Close
Hashes for secrets_env-0.15.0-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 443544b0bd4c857f855ebf20a9a9a05b8a8902fba150acae280a26da53d1b71a |
|
MD5 | 0ca04f3dca5598160af61d2247f5bfe1 |
|
BLAKE2b-256 | 98162ff35775520b90ff9cb4cb1c993902530f0b3dc320960858c0767e683403 |