Skip to main content

A reusable python vault utility service for other projects to use hashicorp vault

Project description

# Vault Service

The **Vault Service** package provides a convenient interface for interacting with HashiCorp Vault. It offers various methods to manage secrets for different tenants and connectors. This package is designed for seamless integration into your applications.

## Table of Contents

- [Installation](#installation)
- [Usage](#usage)
- [Methods](#methods)
  - [store_secret](#store_secret)
  - [get_secret](#get_secret)
  - [update_secret](#update_secret)
  - [delete_secret](#delete_secret)
  - [get_all_secrets_for_tenant](#get_all_secrets_for_tenant)
  - [delete_all_secrets_for_tenant](#delete_all_secrets_for_tenant)
- [License](#license)

## Installation

You can install the Vault Service package using pip:

```bash
pip install vault-service

Usage

To use the Vault Service, you need to initialize the VaultController and then call the utility functions. Make sure to set the required environment variables for Vault connection:

export VAULT_ADDR='https://your-vault-address'
export VAULT_TOKEN='your-vault-token'
export BASE_PATH='your-base-path'

Methods

store_secret(service_id: str, tenant_id: str, secret_name: str, secret_data: SecretData)

Stores a new secret in HashiCorp Vault under the specified service, tenant, and secret name.

Parameters:

  • service_id: The ID of the service.
  • tenant_id: The ID of the tenant.
  • secret_name: The name of the secret to store.
  • secret_data: An instance of SecretData, containing the secret information to be stored.

Sample Payload for secret_data:

{
  "auth_key": "<auth-key>",
  "database_credentials": {
    "host": "localhost",
    "port": 5432,
    "database": "my_database",
    "user": "my_user",
    "password": "my_password"
  },
  "redis_credentials": {
    "host": "localhost",
    "port": 6379,
    "password": "my_password"
  }
}

Returns: A message indicating the success or failure of the operation.


get_secret(service_id: str, tenant_id: str, secret_name: str)

Retrieves a secret from HashiCorp Vault for the specified service, tenant, and secret name.

Parameters:

  • service_id: The ID of the service.
  • tenant_id: The ID of the tenant.
  • secret_name: The name of the secret to retrieve.

Returns: The retrieved secret data as a dictionary, or an error message if not found.


update_secret(service_id: str, tenant_id: str, secret_name: str, secret_data: SecretData)

Updates an existing secret in HashiCorp Vault for the specified service, tenant, and secret name.

Parameters:

  • service_id: The ID of the service.
  • tenant_id: The ID of the tenant.
  • secret_name: The name of the secret to update.
  • secret_data: An instance of SecretData, containing the updated secret information.

Sample Payload for secret_data:

{
  "auth_key": "<new-auth-key>",
  "database_credentials": {
    "host": "localhost",
    "port": 5432,
    "database": "my_database",
    "user": "my_user",
    "password": "new_password"
  },
  "redis_credentials": {
    "host": "localhost",
    "port": 6379,
    "password": "new_password"
  }
}

Returns: A message indicating the success or failure of the operation.


delete_secret(service_id: str, tenant_id: str, secret_name: str)

Deletes a secret from HashiCorp Vault for the specified service, tenant, and secret name.

Parameters:

  • service_id: The ID of the service.
  • tenant_id: The ID of the tenant.
  • secret_name: The name of the secret to delete.

Returns: A message indicating the success or failure of the deletion.


get_all_secrets_for_tenant(service_id: str, tenant_id: str)

Retrieves all secrets for a specific tenant and service from HashiCorp Vault.

Parameters:

  • service_id: The ID of the service.
  • tenant_id: The ID of the tenant.

Returns: A list of all secrets associated with the tenant.


delete_all_secrets_for_tenant(service_id: str, tenant_id: str)

Deletes all secrets associated with a specific tenant and service from HashiCorp Vault.

Parameters:

  • service_id: The ID of the service.
  • tenant_id: The ID of the tenant.

Returns: A message indicating the success or failure of the deletion.

License

This project is licensed under the MIT License. See the LICENSE file for details.


### Changes:
- Added `service_id` as the first required parameter for each method.
- Specified that `tenant_id` is not optional in each method.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

vault_service-0.4.7.tar.gz (7.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

vault_service-0.4.7-py3-none-any.whl (7.5 kB view details)

Uploaded Python 3

File details

Details for the file vault_service-0.4.7.tar.gz.

File metadata

  • Download URL: vault_service-0.4.7.tar.gz
  • Upload date:
  • Size: 7.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.1.1 CPython/3.12.7

File hashes

Hashes for vault_service-0.4.7.tar.gz
Algorithm Hash digest
SHA256 d4509ee8bb5272bcfdfaa9590d0dfcc0e30bcd925698ac2e9bfdba26f2983a4d
MD5 4f9776f999c6a1289ec36adb5081e9f2
BLAKE2b-256 fd24af6aba3b146c88617c4d9f05542ed7c173c9e7f04d3dbb3cdb4691761c60

See more details on using hashes here.

File details

Details for the file vault_service-0.4.7-py3-none-any.whl.

File metadata

  • Download URL: vault_service-0.4.7-py3-none-any.whl
  • Upload date:
  • Size: 7.5 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.1.1 CPython/3.12.7

File hashes

Hashes for vault_service-0.4.7-py3-none-any.whl
Algorithm Hash digest
SHA256 78066be4c7c24ceb51ce83e289ef5f3f8a1a63e5ca79e86c054e3dec340e92ac
MD5 e875cabe6201dcd928d4e427f6ad5f22
BLAKE2b-256 57d445eacda1578750c5a744db9d466452c45fdfca9fa578e978cf1bcab9fa2c

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page