Put secrets from Vault to environment variables
Project description
Secrets.env 🔓
Put secrets from Vault KV engine to environment variables like a .env
loader, without landing data on disk.
Security is important, but don't want it to be a stumbling block. We love secret manager, but the practice of getting secrets for local development could be a trouble.
This app is built to plug in secrets into development without landing data on disk, easily reproduce the environment, and reduce the risk of uploading the secrets to the server.
- 📦 PyPI
- 📐 Source code
- 📗 Documentation
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
secrets_env-0.16.0.tar.gz
(20.0 kB
view hashes)
Built Distribution
Close
Hashes for secrets_env-0.16.0-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 1d4e44f128c023c7c710363ceeb913302f619dc651e429a32bda6465f567159c |
|
MD5 | ca8bcbaf92eff2b1ae9dea4bea5678a1 |
|
BLAKE2b-256 | 5131de5663aa7bae88207e74e38b13df28a4c6ef73c88f89b3e620f9c0d587d0 |