Skip to main content

A reusable python vault utility service for other projects to use hashicorp vault

Project description

Vault Service

The Vault Service package provides a convenient interface for interacting with HashiCorp Vault. It offers various methods to manage secrets for both services and tenants.

Table of Contents

Installation

You can install the Vault Service package using pip:

pip install vault-service

Usage

To use the Vault Service, you need to initialize the VaultController and then call the utility functions. Make sure to set the required environment variables for Vault connection:

export VAULT_ADDR='https://your-vault-address'
export APP_ROLE_ID='your-app-role-id'
export APP_SECRET_ID='your-app-secret-id'

Methods

Service Methods

store_service_secret(root_path: str, sub_path: str, secret_name: str, secret_data: SecretData, credentials: dict)

Stores a new secret in HashiCorp Vault under the "secret" mount path.

Parameters:

  • root_path: The root path in Vault
  • sub_path: The sub path in Vault
  • secret_name: The name of the secret to store
  • secret_data: An instance of SecretData, containing the secret information
  • credentials: Dictionary containing Vault credentials:
    {
        'app_role_id': 'your-app-role-id',
        'app_secret_id': 'your-app-secret-id'
    }
    

Returns:

  • dict: Response object containing:
    • status: "success" or "error"
    • message: Description of the operation result

Sample Payload for secret_data:

{
  "auth_key": "<auth-key>",
  "database_credentials": {
    "host": "localhost",
    "port": 5432,
    "database": "my_database",
    "user": "my_user",
    "password": "my_password"
  },
  "redis_credentials": {
    "host": "localhost",
    "port": 6379,
    "password": "my_password"
  }
}

get_service_secret(root_path: str, sub_path: str, secret_name: str, credentials: dict)

Retrieves a secret from HashiCorp Vault.

Parameters:

  • root_path: The root path in Vault.
  • sub_path: The sub path in Vault.
  • secret_name: The name of the secret to retrieve.
  • credentials: Dictionary containing Vault credentials.

Returns:

  • dict: Response object containing:
    • status: "success" or "error"
    • message: Description of the operation result
    • data: The retrieved secret data (when successful)

update_service_secret(root_path: str, sub_path: str, secret_name: str, secret_data: SecretData, credentials: Optional[dict] = None)

Updates an existing secret in HashiCorp Vault for the specified service, tenant, and secret name.

Parameters:

  • root_path: The root path in Vault
  • sub_path: The sub path in Vault
  • secret_name: The name of the secret to update
  • secret_data: An instance of SecretData, containing the updated secret information
  • credentials: Optional dictionary containing Vault credentials:
    {
        'app_role_id': 'your-app-role-id',
        'app_secret_id': 'your-app-secret-id'
    }
    

Returns: A message indicating the success or failure of the operation.

Sample Payload for secret_data:

{
  "auth_key": "<new-auth-key>",
  "database_credentials": {
    "host": "localhost",
    "port": 5432,
    "database": "my_database",
    "user": "my_user",
    "password": "new_password"
  },
  "redis_credentials": {
    "host": "localhost",
    "port": 6379,
    "password": "new_password"
  }
}

delete_service_secret(root_path: str, sub_path: str, secret_name: str, credentials: dict)

Deletes a secret from HashiCorp Vault for the specified service, tenant, and secret name.

Parameters:

  • root_path: The root path in Vault
  • sub_path: The sub path in Vault
  • secret_name: The name of the secret to delete.

Returns: A message indicating the success or failure of the deletion.


Tenant Methods

store_tenant_secret(tenant_id: str, sub_path: str, secret_name: str, secret_data: SecretData, credentials: dict)

Stores a new secret in HashiCorp Vault under the "tenant" mount path.

Parameters:

  • tenant_id: The ID of the tenant
  • sub_path: The sub path in Vault
  • secret_name: The name of the secret to store
  • secret_data: An instance of SecretData, containing the secret information
  • credentials: Dictionary containing Vault credentials:
    {
        'app_role_id': 'your-app-role-id',
        'app_secret_id': 'your-app-secret-id'
    }
    

Returns:

  • dict: Response object containing:
    • status: "success" or "error"
    • message: Description of the operation result

Sample Payload for secret_data:

{
  "auth_key": "<auth-key>",
  "database_credentials": {
    "host": "localhost",
    "port": 5432,
    "database": "my_database",
    "user": "my_user",
    "password": "my_password"
  },
  "redis_credentials": {
    "host": "localhost",
    "port": 6379,
    "password": "my_password"
  }
}

get_tenant_secret(tenant_id: str, sub_path: str, secret_name: str, credentials: dict)

Retrieves a secret from HashiCorp Vault under the tenant mount path.

Parameters:

  • tenant_id: The ID of the tenant
  • sub_path: The sub path in Vault
  • secret_name: The name of the secret to retrieve
  • credentials: Dictionary containing Vault credentials

Returns:

  • dict: Response object containing:
    • status: "success" or "error"
    • message: Description of the operation result
    • data: The retrieved secret data (when successful)

update_tenant_secret(tenant_id: str, sub_path: str, secret_name: str, secret_data: SecretData, credentials: dict)

Updates an existing secret in HashiCorp Vault under the tenant mount path.

Parameters:

  • tenant_id: The ID of the tenant
  • sub_path: The sub path in Vault
  • secret_name: The name of the secret to update
  • secret_data: An instance of SecretData, containing the updated secret information
  • credentials: Dictionary containing Vault credentials:
    {
        'app_role_id': 'your-app-role-id',
        'app_secret_id': 'your-app-secret-id'
    }
    

Returns: A message indicating the success or failure of the operation.

Sample Payload for secret_data:

{
  "auth_key": "<new-auth-key>",
  "database_credentials": {
    "host": "localhost",
    "port": 5432,
    "database": "my_database",
    "user": "my_user",
    "password": "new_password"
  },
  "redis_credentials": {
    "host": "localhost",
    "port": 6379,
    "password": "new_password"
  }
}

delete_tenant_secret(tenant_id: str, sub_path: str, secret_name: str, credentials: dict)

Deletes a secret from HashiCorp Vault under the tenant mount path.

Parameters:

  • tenant_id: The ID of the tenant
  • sub_path: The sub path in Vault
  • secret_name: The name of the secret to delete
  • credentials: Dictionary containing Vault credentials

Returns: A message indicating the success or failure of the deletion.

License

This project is licensed under the MIT License. See the LICENSE file for details.


### Changes:
- Added `tenant_id` as the first required parameter for each method.
- Specified that `tenant_id` is not optional in each method.
- Added `credentials` parameter to each method signature.
- Specified that `credentials` is optional in each method documentation.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

vault_service-1.3.3.tar.gz (8.4 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

vault_service-1.3.3-py3-none-any.whl (8.2 kB view details)

Uploaded Python 3

File details

Details for the file vault_service-1.3.3.tar.gz.

File metadata

  • Download URL: vault_service-1.3.3.tar.gz
  • Upload date:
  • Size: 8.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for vault_service-1.3.3.tar.gz
Algorithm Hash digest
SHA256 966d9e6536c092f91da6f572e2061266363ce9d25ace00429c0bca1f011f0a9e
MD5 c52ed78e3a50058468d508c7ba02cae7
BLAKE2b-256 bd9ebf9e5d9a2be21dd8c5b58ba0e1e158d4b3fa718041e49d612bd8634daef3

See more details on using hashes here.

File details

Details for the file vault_service-1.3.3-py3-none-any.whl.

File metadata

  • Download URL: vault_service-1.3.3-py3-none-any.whl
  • Upload date:
  • Size: 8.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for vault_service-1.3.3-py3-none-any.whl
Algorithm Hash digest
SHA256 8f96aa8d57f6316718cfc54e3c897a81911e210c5300fea077c676dcee6bd3b9
MD5 65ed01c1db2629bbb53adc96ddbe597d
BLAKE2b-256 7524a486b1ee6fc8ee2e0abb5fda282d7d1b992dbeefd0e8c6f5ec1e8430c789

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page