Put secrets from Vault to environment variables
Project description
Put secrets from Vault KV engine to environment variables like a .env loader, without landing data on disk.
$ cat .secrets-env.yaml
source:
url: http://localhost:8200
auth: token
secrets:
EXAMPLE:
path: secrets/example
field: foo
$ secrets.env run sh -c 'echo \$EXAMPLE = $EXAMPLE'
[secrets_env] Read secrets.env config from /Users/tim_shih/.secrets-env.yaml
[secrets_env] 🔑 1 secrets loaded
$EXAMPLE = hello
Security is important, but don’t want it to be a stumbling block. We love secret manager, but the practice of getting secrets for local development could be a trouble.
This app is built to plug in secrets into development without landing data on disk, easily reproduce the environment, and reduce the risk of uploading the secrets to the server.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
secrets_env-0.25.0.tar.gz
(22.5 kB
view hashes)
Built Distribution
Close
Hashes for secrets_env-0.25.0-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 0615960b655cf36adbd39c9d2358c94e14e4d6466ad70b3dec110c28801a9c68 |
|
MD5 | d4861044330e116ee6129d517e9920e0 |
|
BLAKE2b-256 | ee87b905a2252d6b5f6584ad40cb0b341dcb1730e8ad3a398d31c5bfbc8c9909 |