Skip to main content

Simple wrapper to secure your secrets.

Project description

sosecrets

sosecrets is a Python module that provides a secure way to handle sensitive data by encapsulating it and only exposing it through a controlled interface.

Version: 0.1.11

Documentation

Installation

To install sosecrets, you can use pip:

pip install sosecrets

Usage

Here's are the examples of how to use sosecrets:

Secret

Here's an example of how to use Secret:

from sosecrets import Secret

# Create a secret value
secret_value = Secret("my secret value")

# Use the secret value while keeping it encapsulated
result: Secret[T] = secret_value.apply(len)
print(result.expose_secret())  # Output: 14

# Get the value of the secret
value = secret_value.expose_secret()
print(value)  # Output: "my secret value"

In this example, we create a Secret object with the value "my secret value". We then use the apply method to apply the len function to the secret value while keeping it encapsulated. Finally, we use the expose_secret method to retrieve the value of the secret.

ImmutableSecretMapping

Here's an example of how to use ImmutableSecretMapping:

from pathlib import Path
from sosecrets import ImmutableSecretMapping
from dotenv import dotenv_values

# Define the path to the `.env` file
THIS_SCRIPT_FILE_PATH = Path(__file__)
EXAMPLES = THIS_SCRIPT_FILE_PATH.parent / '.env'

# Load the environment variables and store them securely
secret_env_dict = ImmutableSecretMapping.from_func(dotenv_values, dotenv_path=EXAMPLES)

# Get a dictionary of the exposed values of the secret variables
exposed_dict = secret_env_dict.expose_dict()
print("exposed_dict: ", exposed_dict)

# Print the `ImmutableSecretMapping` object itself
print("secret_env_dict: ", secret_env_dict)

# Get the value associated with a key using the `get()` method
value0 = secret_env_dict.get('value0')
print("value0: ", value0)

# Get the exposed value of a key using the `get_exposed()` method
value1 = secret_env_dict.get_exposed('value1')
print("value1: ", value1)

The output of the above codes is shown below:

exposed_dict = {
    'value0': '3c976b3c66a2aa1d440d3ad99a9653c7',
    'value1': '8f7047cda0532a374dbc380edad96c25',
...
    'value14': '277103129cbf6050b7cbd6502eca9810'}

secret_env_dict =  {'value0': <secrets.Secret object at 0x000002210A017540>, 
                    'value1': <secrets.Secret object at 0x000002210A017580>, 
                    ...
                    'value14': <secrets.Secret object at 0x000002210A0178C0>}

value0 = <secrets.Secret object at 0x000002210A017540>
value1 = 8f7047cda0532a374dbc380edad96c25

The example code does the following:

  1. Imports the necessary packages: Path from pathlib, src from the sosecrets module, ImmutableSecretMapping from secretdicts in the sosecrets module, and dotenv_values from the dotenv package.
  2. Defines the path to a .env file that contains environment variables to be loaded.
  3. Uses ImmutableSecretMapping.from_func(dotenv_values, dotenv_path=EXAMPLES) to load the environment variables from the .env file and store them in an instance of ImmutableSecretMapping.
  4. Prints the exposed dictionary of the ImmutableSecretMapping object using the expose_dict() method.
  5. Prints the ImmutableSecretMapping object itself.
  6. Gets a value from the ImmutableSecretMapping object using the get() method and prints it.
  7. Gets the exposed value of a key using the get_exposed() method

MutableSecretMapping

Similar to ImmutableSecretMapping.

Use Cases

sosecrets can be used in a variety of scenarios where sensitive data needs to be securely handled. Here are some common use cases:

Storing API keys, passwords, and other credentials: sosecrets can be used to securely store sensitive information such as API keys, passwords, and other credentials that are required for authentication or authorization in an application.

Handling personal identifiable information (PII): sosecrets can be used to protect personal identifiable information (PII) such as names, addresses, social security numbers, and other sensitive data that needs to be kept confidential.

API Reference

Secret

The Secret class encapsulates a secret value and only exposes it through a controlled interface.

Secret(value: Optional[T] = None, func: Optional[Callable[..., T]] = None, func_args: Tuple[Any, ...] = tuple(), func_kwargs: Dict[str, Any] = dict()) -> Secret
  • value: The secret value to encapsulate.
  • func: A function to generate the secret value.
  • func_args: The positional arguments to pass to the func function.
  • func_kwargs: The keyword arguments to pass to the func function.

apply

The apply method applies a function to the secret value while keeping it encapsulated.

apply(self, func: Callable[[Any], Any], *args: Tuple[Any], **kwargs: Dict[str, Any]) -> SecretType:
  • func: The function to apply to the secret value.
  • args: The positional arguments to pass to the func function.
  • kwargs: The keyword arguments to pass to the func function.

expose_secret

The expose_secret method returns the value of the secret.

def expose_secret(self) -> T:

Contributing

Contributions are welcome! Let me know if you need help with anything else.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

sosecrets-0.1.11.tar.gz (6.7 kB view details)

Uploaded Source

Built Distribution

sosecrets-0.1.11-py3-none-any.whl (6.4 kB view details)

Uploaded Python 3

File details

Details for the file sosecrets-0.1.11.tar.gz.

File metadata

  • Download URL: sosecrets-0.1.11.tar.gz
  • Upload date:
  • Size: 6.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.3.2 CPython/3.10.6 Windows/10

File hashes

Hashes for sosecrets-0.1.11.tar.gz
Algorithm Hash digest
SHA256 6815381783e81067b79d719be88bfe840467c1e9f1f2d0962025fff1e8f27bc6
MD5 28c48da299a022c8c61b29af0ed90536
BLAKE2b-256 081100ac91766321ae76fce201bc9d5feee1944511368ae07a85f7fadb4869b9

See more details on using hashes here.

File details

Details for the file sosecrets-0.1.11-py3-none-any.whl.

File metadata

  • Download URL: sosecrets-0.1.11-py3-none-any.whl
  • Upload date:
  • Size: 6.4 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.3.2 CPython/3.10.6 Windows/10

File hashes

Hashes for sosecrets-0.1.11-py3-none-any.whl
Algorithm Hash digest
SHA256 ae8884e3b3e0a39506e57df300129368dd740c6e4dbc0420af4701667f110724
MD5 dcc04a2b961b697b6661747d0d61d7e6
BLAKE2b-256 cc44e390a47ffb6b835937bafe7421ef825abff99238568c29350c2bf2089f26

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page