Skip to main content

Command-line tool for generating environment variables from AWS Secrets

Project description

Build Status


Command-line tool for generating sourcable environment variables from secrets in AWS Secrets Manager using a YAML definition.


$ pip install secrets2env

Environment Definition

Below is an example environment definition. The values for environment variables will be generated using .format() and keyword arguments.

- secret: aws/secret-name
  name: ENV_SECRET
  value: "{key1-in-secret}"
- secret: production/postgresql
  name: PSQL_URI
  value: "postgresql://{username}:{password}@postgresql:5432/{dbname}"


Path to a definition like the one can be provided as argument, otherwise it defaults to ./aws-secrets.yml. Running secrets2env will print a sourceable environment to STDOUT which can be evald or redirected to an environment file.

# with path to definition file
$ secrets2env --definition path/to/definition.yml
# or using the default path (./aws-secrets.yml) with the definition above
$ secrets2env

It will result in the following output

# Autogenerated by <path/to/installed/>
export ENV_SECRET='some-secret'
export PSQL_URI='postgresql://pg-user:pg-pw@postgresql:5432/pgdb'
# you can eval directly
eval "`secrets2env`"
# or redirect to file
echo -e "\n`secrets2env`" >>

Limitations / TODOs

  • currently only supports SecretString
  • currently only supports OsX and Linux
  • no automated tests

Project details

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

secrets2env-0.1.4.tar.gz (3.3 kB view hashes)

Uploaded source

Built Distribution

secrets2env-0.1.4-py2.py3-none-any.whl (4.0 kB view hashes)

Uploaded py2 py3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page