Secure configuration management library with encryption support for Python
Project description
VaultConfig
Secure configuration management library with encryption support for Python
VaultConfig provides an easy way to manage application configurations with support for multiple formats (TOML, INI, YAML), password obscuring, and full config file encryption.
Features
- Multiple Format Support: TOML, INI, and YAML (optional)
- Password Obscuring: Hide sensitive fields from casual viewing (AES-CTR based)
- Config File Encryption: Strong authenticated encryption using NaCl secretbox (XSalsa20-Poly1305) with PBKDF2 key derivation
- Schema Validation: Pydantic-based schema system for type validation
- CLI Tool: Command-line interface for config management
- Project-Specific: Each project can have its own config directory
- Easy Integration: Simple API for embedding into Python applications
- Security Features: Atomic file writes, secure file permissions, password validation
Installation
# Basic installation
pip install vaultconfig
# With YAML support
pip install vaultconfig[yaml]
# For development
pip install vaultconfig[dev]
Quick Start
Command Line Usage
The CLI provides complete configuration management without requiring Python programming.
Default Config Directory
VaultConfig uses a platform-specific default config directory so you don't need to specify it every time:
- Linux/macOS:
~/.config/vaultconfig - Windows:
%APPDATA%\vaultconfig
You can override this with:
--config-dir(or-d) option on any commandVAULTCONFIG_DIRenvironment variable
# Use default directory
vaultconfig init
vaultconfig set database host=localhost --create
# Use custom directory
vaultconfig init -d ./myapp-config
vaultconfig set -d ./myapp-config database host=localhost --create
# Or set environment variable
export VAULTCONFIG_DIR=./myapp-config
vaultconfig list
Initialization
# Initialize default config directory
vaultconfig init --format toml
# Initialize with encryption
vaultconfig init --encrypt
# Initialize custom directory
vaultconfig init -d ./myapp-config --format toml
Creating & Updating Configs
# Create a configuration interactively (uses default directory)
vaultconfig create database
# Prompts for key-value pairs
# Create from a file
vaultconfig create database --from-file config.json
# Set individual values
vaultconfig set database host=localhost port=5432
# Set with automatic creation
vaultconfig set newconfig key=value --create
# Set obscured password
vaultconfig set database password=secret --obscure
# Remove keys
vaultconfig unset database old_key
# All commands work with custom directories too
vaultconfig set -d ./myapp-config database host=localhost
Reading Configs
# List all configurations (table format, uses default directory)
vaultconfig list
# List as JSON
vaultconfig list --output json
# List as plain names
vaultconfig list --output plain
# Show a configuration (pretty format)
vaultconfig show database
# Show with revealed passwords
vaultconfig show database --reveal
# Show as JSON
vaultconfig show database --output json
# Get a specific value
vaultconfig get database host
# Get with reveal (for obscured values)
vaultconfig get database password --reveal
Import/Export
# Export to JSON
vaultconfig export database -e json -o database.json
# Export with revealed passwords
vaultconfig export database -e json --reveal
# Export to YAML
vaultconfig export database -e yaml
# Export to stdout
vaultconfig export database -e json
# Import from file
vaultconfig import database --from-file database.json
# Import with overwrite
vaultconfig import database --from-file config.yaml --overwrite
Environment Variables
# Preview what will be exported (dry-run mode)
vaultconfig export-env database --dry-run
# Export as environment variables (auto-detects shell)
vaultconfig export-env database --prefix DB_
# Use in bash/zsh
eval $(vaultconfig export-env database --prefix DB_ --reveal)
echo $DB_HOST # localhost
# Use in fish
vaultconfig export-env database --shell fish | source
# Use in nushell
vaultconfig export-env database --shell nushell | save -f env.nu
source env.nu
# Use in PowerShell
vaultconfig export-env database --shell powershell | Invoke-Expression
# Specify shell explicitly
vaultconfig export-env database --shell bash
vaultconfig export-env database --shell zsh
vaultconfig export-env database --shell fish
vaultconfig export-env database --shell nushell
vaultconfig export-env database --shell powershell
# Preview with prefix before exporting
vaultconfig export-env database --prefix DB_ --dry-run
Supported Shells:
- bash - Bash shell (default)
- zsh - Zsh shell
- fish - Fish shell
- nushell - Nushell
- powershell - PowerShell
The shell type is auto-detected from your environment if not specified.
Dry-Run Mode: Use --dry-run to preview the environment variables in a readable
table format. The output includes:
- A formatted table showing all variables and their values
- Shell-specific copyable commands that you can paste directly into your terminal
- Helpful tips and notes
This is useful for verifying what will be exported before actually using it, and provides ready-to-copy commands for manual setup.
Run Command with Config
The run command loads a configuration and executes a command with config values as
environment variables. This is similar to dotenv run but works with VaultConfig
configurations.
# Run a command with config values as environment variables
vaultconfig run database python app.py
# Use custom prefix for env vars (default is config name + underscore)
vaultconfig run database --prefix DB_ python app.py
# Reveal obscured passwords
vaultconfig run database --reveal python app.py
# Keep lowercase keys (default converts to uppercase)
vaultconfig run database --no-uppercase python app.py
# Don't override existing environment variables
vaultconfig run database --no-override python app.py
# Combine options
vaultconfig run database --prefix MYAPP_ --reveal -- python app.py --arg value
How it works:
- Loads the specified configuration
- Flattens nested configs (e.g.,
database.host→DATABASE_HOST) - Converts keys to uppercase by default (disable with
--no-uppercase) - Adds optional prefix to all variable names
- Executes the command with the config as environment variables
- Exits with the same exit code as the command
Examples:
# Run a Python script with database config
vaultconfig run database python manage.py migrate
# Run tests with test config
vaultconfig run test-env pytest tests/
# Run Docker with config
vaultconfig run docker-config docker-compose up
# Use with custom directory
vaultconfig run -d ./myapp-config prod-db python deploy.py
Copy & Rename
# Copy a configuration
vaultconfig copy database database-backup
# Rename a configuration
vaultconfig rename database database-prod
Schema Validation
# Create a schema file (schema.yaml)
cat > schema.yaml <<EOF
fields:
host:
type: str
default: localhost
port:
type: int
default: 5432
password:
type: str
sensitive: true
required: true
EOF
# Validate configuration
vaultconfig validate database --schema schema.yaml
Encryption Management
# Set/change password (uses default directory or specify with -d)
vaultconfig encrypt set
vaultconfig encrypt set -d ./myapp-config
# Remove encryption
vaultconfig encrypt remove
vaultconfig encrypt remove -d ./myapp-config
# Check encryption status
vaultconfig encrypt check
vaultconfig encrypt check -d ./myapp-config
Deletion
# Delete a configuration (prompts for confirmation)
vaultconfig delete myconfig
# Delete without confirmation
vaultconfig delete myconfig --yes
# Delete from custom directory
vaultconfig delete -d ./myapp-config myconfig
Python API Usage
Basic Usage
from pathlib import Path
from vaultconfig import ConfigManager
# Create manager
manager = ConfigManager(
config_dir=Path("./myapp-config"),
format="toml", # or "ini", "yaml"
)
# Add a configuration
manager.add_config(
name="database",
config={
"host": "localhost",
"port": 5432,
"username": "myuser",
"password": "secret123", # Will be obscured
},
)
# Get configuration
config = manager.get_config("database")
if config:
host = config.get("host")
password = config.get("password") # Automatically revealed
# List all configs
configs = manager.list_configs()
# Remove a config
manager.remove_config("database")
With Encryption
from vaultconfig import ConfigManager
# Create encrypted manager
manager = ConfigManager(
config_dir=Path("./secure-config"),
format="toml",
password="my-secure-password", # Or use env var VAULTCONFIG_PASSWORD
)
# Add configs - they'll be encrypted automatically
manager.add_config("secrets", {"api_key": "12345", "token": "abcde"})
# Change encryption password
manager.set_encryption_password("new-password")
# Remove encryption
manager.remove_encryption()
With Schema Validation
from vaultconfig import ConfigManager, ConfigSchema, FieldDef, create_simple_schema
# Define schema
schema = create_simple_schema({
"host": FieldDef(str, default="localhost"),
"port": FieldDef(int, default=5432),
"username": FieldDef(str, default="postgres"),
"password": FieldDef(str, sensitive=True), # Will be auto-obscured
})
# Create manager with schema
manager = ConfigManager(
config_dir=Path("./myapp-config"),
schema=schema,
)
# Schema validation happens automatically
manager.add_config("db", {
"host": "db.example.com",
"port": 5432,
"password": "secret",
})
Using Pydantic Models
from pydantic import BaseModel, Field
from vaultconfig import ConfigManager, ConfigSchema
# Define Pydantic model
class DatabaseConfig(BaseModel):
host: str = "localhost"
port: int = 5432
username: str
password: str = Field(json_schema_extra={"sensitive": True})
# Create schema from model
schema = ConfigSchema(DatabaseConfig)
# Use with manager
manager = ConfigManager(
config_dir=Path("./myapp-config"),
schema=schema,
)
Password Obscuring vs Encryption
VaultConfig provides two levels of security:
Password Obscuring
- Purpose: Hide passwords from casual viewing (shoulder surfing)
- Method: AES-CTR with a fixed key + base64 encoding
- Security: NOT secure encryption - anyone with access to the code can decrypt
- Use Case: Prevent accidental exposure in config files, logs, or screens
- Automatic: Sensitive fields are automatically obscured when
sensitive=True - Warning: A security warning is logged on first use to remind users this is obfuscation only
from vaultconfig import obscure
# Obscure a password
obscured = obscure.obscure("my_password") # Returns base64 string
# Reveal it later
revealed = obscure.reveal(obscured) # Returns "my_password"
IMPORTANT: This is obfuscation, not encryption! Anyone with access to vaultconfig can decrypt obscured passwords. Use config file encryption for real security.
Using Custom Cipher Keys
By default, vaultconfig uses a hardcoded cipher key for password obscuring. While this prevents casual viewing, anyone with access to the vaultconfig library can reveal these passwords. For better protection, you can use your own custom cipher key:
Python API
from vaultconfig import ConfigManager, create_obscurer_from_passphrase
import secrets
# Option 1: Generate a random key (most secure)
cipher_key = secrets.token_bytes(32)
from vaultconfig import Obscurer
obscurer = Obscurer(cipher_key=cipher_key)
# Option 2: Use a passphrase (easiest - recommended for most apps)
obscurer = create_obscurer_from_passphrase("MyApp-Unique-Secret-2024")
# Option 3: Use a hex string (good for storing in env vars/files)
from vaultconfig import create_obscurer_from_hex
obscurer = create_obscurer_from_hex("a73b9f2c...") # 64 hex chars
# Use with ConfigManager
manager = ConfigManager(
config_dir=Path("./myapp-config"),
obscurer=obscurer, # All password obscuring uses YOUR key
)
# Everything else works the same
manager.add_config("db", {"password": "secret"})
config = manager.get_config("db")
password = config.get("password") # Revealed automatically
CLI Usage
# Generate a cipher key
vaultconfig obscure generate-key > ~/.myapp_cipher_key
# Generate from passphrase (reproducible)
vaultconfig obscure generate-key --from-passphrase
# Use with environment variable
export VAULTCONFIG_CIPHER_KEY=$(cat ~/.myapp_cipher_key)
vaultconfig list ./myapp-config
# Or point to key file
export VAULTCONFIG_CIPHER_KEY_FILE=~/.myapp_cipher_key
vaultconfig show database --reveal
Key Management Best Practices
- Generate Once: Create your key once and store it securely
- Secure Storage: Keep the key in a secure location (not in git!)
- Environment Variables: Use env vars or key files for deployment
- Backup: Keep a backup of your key - without it, passwords cannot be revealed
- App-Specific: Use different keys for different applications
- Still Not Encryption: Custom keys improve security but this is still obfuscation
Benefits of Custom Keys:
- Other apps/users cannot reveal your obscured passwords without your specific key
- Adds an application-specific layer of protection
- Easy to implement with passphrases or random keys
Limitations:
- Still not real encryption - anyone with your key can reveal passwords
- Lost key = lost ability to reveal passwords
- For real security, use config file encryption (see below)
Config File Encryption
- Purpose: Secure encryption of entire config files
- Method: NaCl secretbox (XSalsa20-Poly1305) with PBKDF2-HMAC-SHA256 key derivation
- Key Derivation: 600,000 iterations of PBKDF2 with random salt (OWASP 2023 recommended)
- Security: Strong authenticated encryption - lost password = lost data
- Use Case: Protect sensitive configs at rest
- Format:
VAULTCONFIG_ENCRYPT_V1:<base64-encrypted-data> - Password Requirements: Minimum 4 characters (12+ recommended)
# Encrypt all configs
manager = ConfigManager(
config_dir=Path("./config"),
password="strong-password",
)
# Or set password later
manager.set_encryption_password("strong-password")
# Password can also come from:
# - Environment variable: VAULTCONFIG_PASSWORD
# - External command: VAULTCONFIG_PASSWORD_COMMAND
# - Interactive prompt (if TTY available)
Configuration Formats
TOML (Default)
# config.toml
host = "localhost"
port = 5432
password = "obscured-password-here"
[nested]
key = "value"
INI
# config.ini
[database]
host = localhost
port = 5432
password = obscured-password-here
YAML (Optional)
# config.yaml
host: localhost
port: 5432
password: obscured-password-here
nested:
key: value
Environment Variables
VAULTCONFIG_DIR: Default config directory (overrides platform default)VAULTCONFIG_PASSWORD: Password for encrypted configsVAULTCONFIG_PASSWORD_COMMAND: Command to retrieve password (e.g., from password manager)VAULTCONFIG_PASSWORD_CHANGE: Set to "1" when changing password (used by password command)VAULTCONFIG_CIPHER_KEY: Hex-encoded custom cipher key (64 hex characters)VAULTCONFIG_CIPHER_KEY_FILE: Path to file containing hex-encoded cipher key
Security Considerations
-
Password Obscuring:
- NOT secure encryption - only prevents casual viewing
- Anyone with code access can reveal passwords
- Use for convenience, not security
- A warning is logged on first use
- Custom Cipher Keys: Using custom keys improves security but is still obfuscation
- Custom keys prevent other apps from revealing your passwords
- Lost custom key = lost ability to reveal passwords
-
Config File Encryption:
- Uses strong authenticated encryption (NaCl secretbox)
- Password is derived using PBKDF2-HMAC-SHA256 with 600,000 iterations
- Random salt generated per encryption
- No password recovery - lost password = lost data
- Minimum password length: 4 characters (12+ strongly recommended)
- Warnings shown for weak or short passwords
-
File Security:
- Config files automatically set to 0600 permissions (owner read/write only)
- Atomic file writes prevent partial/corrupted files
- Secure deletion of temporary files on error
- No race conditions in file permission setting
-
Best Practices:
- Use config file encryption for production
- Use strong passwords (12+ characters recommended)
- Store encryption passwords in system keychain/password manager
- Use
VAULTCONFIG_PASSWORD_COMMANDfor automation - Never commit encrypted configs with weak passwords
- Keep PyYAML updated (>= 6.0 for security fixes)
- Avoid using shell=True with password commands (use proper escaping)
- Use custom cipher keys for password obscuring (better than default)
- Generate cipher keys with
vaultconfig obscure generate-key - Store cipher keys securely (env vars, key files, not in code/git)
Integration Examples
Flask Application
from flask import Flask
from pathlib import Path
from vaultconfig import ConfigManager
app = Flask(__name__)
# Load config on startup
config_manager = ConfigManager(
config_dir=Path.home() / ".config" / "myapp",
password=os.environ.get("MYAPP_CONFIG_PASSWORD"),
)
db_config = config_manager.get_config("database")
if db_config:
app.config["SQLALCHEMY_DATABASE_URI"] = (
f"postgresql://{db_config.get('username')}:{db_config.get('password')}"
f"@{db_config.get('host')}:{db_config.get('port')}/{db_config.get('database')}"
)
CLI Application
import click
from vaultconfig import ConfigManager
@click.group()
@click.pass_context
def cli(ctx):
"""My CLI application."""
ctx.obj = ConfigManager(
config_dir=Path.home() / ".config" / "myapp",
)
@cli.command()
@click.pass_obj
def connect(manager):
"""Connect to service."""
config = manager.get_config("service")
# Use config...
Migrating from pywebdavserver
If you're migrating from the old pywebdavserver config system:
# Old way
from pywebdavserver.config import get_config_manager
manager = get_config_manager()
# New way (vaultconfig is now used internally)
from pywebdavserver.config import get_config_manager
manager = get_config_manager() # Same API, now powered by vaultconfig
The API remains the same for backward compatibility.
Development
# Clone repository
git clone https://github.com/your-org/vaultconfig.git
cd vaultconfig
# Install in development mode
pip install -e ".[dev,yaml]"
# Run tests
pytest
# Format code
ruff check --fix .
License
MIT License - see LICENSE file for details.
Contributing
Contributions are welcome! Please:
- Fork the repository
- Create a feature branch
- Make your changes with tests
- Submit a pull request
Acknowledgments
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file vaultconfig-0.2.1.tar.gz.
File metadata
- Download URL: vaultconfig-0.2.1.tar.gz
- Upload date:
- Size: 119.6 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.9.25
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
d93102b794de81d1c893111daa17ab219bf4874c53dc711be004291a574bfb6b
|
|
| MD5 |
05e603a532ba0c48770cf78e45de0d0b
|
|
| BLAKE2b-256 |
08f9b8204376905f6ae879ad0ec2c2f4c8e4187ffe0214b339175da067cb0736
|
File details
Details for the file vaultconfig-0.2.1-py3-none-any.whl.
File metadata
- Download URL: vaultconfig-0.2.1-py3-none-any.whl
- Upload date:
- Size: 44.0 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.9.25
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
8016c151bfb7672fcce50da99b3a636cc520f9c7533fa2e6c531dc4c2b4c62a7
|
|
| MD5 |
5e93fa154d0be7db6817b6a2b7531c3d
|
|
| BLAKE2b-256 |
450f9818b239306d2bbc82695b7fe49eff6ad0c1a6bc7dbd05d3e366394373c0
|