Put secrets from Vault to environment variables
Project description
Secrets.env 🔓
Put secrets from Vault KV engine to environment variables like a .env
loader, without landing data on disk.
Security is important, but don't want it to be a stumbling block. We love secret manager, but the practice of getting secrets for local development could be a trouble.
This app is built to plug in secrets into development without landing data on disk, easily reproduce the environment, and reduce the risk of uploading the secrets to the server.
- 📦 PyPI
- 📐 Source code
- 📗 Documentation
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
secrets_env-0.17.0.tar.gz
(20.0 kB
view hashes)
Built Distribution
Close
Hashes for secrets_env-0.17.0-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 1b4e64955c58fade636461f94092573074c63ea655a18d3a39b3aca961b7402f |
|
MD5 | 5f2b783cab0508a4a389ff023d1c9237 |
|
BLAKE2b-256 | 8f8f7927163ccf3db2392e5c2db6e1506e03f720fa533a0ba030250e3f925cf6 |