Secure configuration management library with encryption support for Python
Project description
VaultConfig
Secure configuration management library with encryption support for Python
VaultConfig provides an easy way to manage application configurations with support for multiple formats (TOML, INI, YAML), password obscuring, and full config file encryption.
Features
- Multiple Format Support: TOML, INI, and YAML (optional)
- Password Obscuring: Hide sensitive fields from casual viewing (AES-CTR based)
- Config File Encryption: Strong authenticated encryption using NaCl secretbox (XSalsa20-Poly1305) with PBKDF2 key derivation
- Schema Validation: Pydantic-based schema system for type validation
- CLI Tool: Command-line interface for config management
- Project-Specific: Each project can have its own config directory
- Easy Integration: Simple API for embedding into Python applications
- Security Features: Atomic file writes, secure file permissions, password validation
Installation
# Basic installation
pip install vaultconfig
# With YAML support
pip install vaultconfig[yaml]
# For development
pip install vaultconfig[dev]
Quick Start
Command Line Usage
# Initialize a new config directory
vaultconfig init ./myapp-config --format toml
# Initialize with encryption
vaultconfig init ./myapp-config --format toml --encrypt
# List all configurations
vaultconfig list ./myapp-config
# Show a configuration
vaultconfig show ./myapp-config myconfig
# Show with revealed passwords
vaultconfig show ./myapp-config myconfig --reveal
# Delete a configuration
vaultconfig delete ./myapp-config myconfig
# Manage encryption
vaultconfig encrypt set ./myapp-config # Set/change password
vaultconfig encrypt remove ./myapp-config # Remove encryption
vaultconfig encrypt check ./myapp-config # Check encryption status
Python API Usage
Basic Usage
from pathlib import Path
from vaultconfig import ConfigManager
# Create manager
manager = ConfigManager(
config_dir=Path("./myapp-config"),
format="toml", # or "ini", "yaml"
)
# Add a configuration
manager.add_config(
name="database",
config={
"host": "localhost",
"port": 5432,
"username": "myuser",
"password": "secret123", # Will be obscured
},
)
# Get configuration
config = manager.get_config("database")
if config:
host = config.get("host")
password = config.get("password") # Automatically revealed
# List all configs
configs = manager.list_configs()
# Remove a config
manager.remove_config("database")
With Encryption
from vaultconfig import ConfigManager
# Create encrypted manager
manager = ConfigManager(
config_dir=Path("./secure-config"),
format="toml",
password="my-secure-password", # Or use env var VAULTCONFIG_PASSWORD
)
# Add configs - they'll be encrypted automatically
manager.add_config("secrets", {"api_key": "12345", "token": "abcde"})
# Change encryption password
manager.set_encryption_password("new-password")
# Remove encryption
manager.remove_encryption()
With Schema Validation
from vaultconfig import ConfigManager, ConfigSchema, FieldDef, create_simple_schema
# Define schema
schema = create_simple_schema({
"host": FieldDef(str, default="localhost"),
"port": FieldDef(int, default=5432),
"username": FieldDef(str, default="postgres"),
"password": FieldDef(str, sensitive=True), # Will be auto-obscured
})
# Create manager with schema
manager = ConfigManager(
config_dir=Path("./myapp-config"),
schema=schema,
)
# Schema validation happens automatically
manager.add_config("db", {
"host": "db.example.com",
"port": 5432,
"password": "secret",
})
Using Pydantic Models
from pydantic import BaseModel, Field
from vaultconfig import ConfigManager, ConfigSchema
# Define Pydantic model
class DatabaseConfig(BaseModel):
host: str = "localhost"
port: int = 5432
username: str
password: str = Field(json_schema_extra={"sensitive": True})
# Create schema from model
schema = ConfigSchema(DatabaseConfig)
# Use with manager
manager = ConfigManager(
config_dir=Path("./myapp-config"),
schema=schema,
)
Password Obscuring vs Encryption
VaultConfig provides two levels of security:
Password Obscuring
- Purpose: Hide passwords from casual viewing (shoulder surfing)
- Method: AES-CTR with a fixed key + base64 encoding
- Security: NOT secure encryption - anyone with access to the code can decrypt
- Use Case: Prevent accidental exposure in config files, logs, or screens
- Automatic: Sensitive fields are automatically obscured when
sensitive=True - Warning: A security warning is logged on first use to remind users this is obfuscation only
from vaultconfig import obscure
# Obscure a password
obscured = obscure.obscure("my_password") # Returns base64 string
# Reveal it later
revealed = obscure.reveal(obscured) # Returns "my_password"
IMPORTANT: This is obfuscation, not encryption! Anyone with access to vaultconfig can decrypt obscured passwords. Use config file encryption for real security.
Config File Encryption
- Purpose: Secure encryption of entire config files
- Method: NaCl secretbox (XSalsa20-Poly1305) with PBKDF2-HMAC-SHA256 key derivation
- Key Derivation: 600,000 iterations of PBKDF2 with random salt (OWASP 2023 recommended)
- Security: Strong authenticated encryption - lost password = lost data
- Use Case: Protect sensitive configs at rest
- Format:
VAULTCONFIG_ENCRYPT_V1:<base64-encrypted-data> - Password Requirements: Minimum 4 characters (12+ recommended)
# Encrypt all configs
manager = ConfigManager(
config_dir=Path("./config"),
password="strong-password",
)
# Or set password later
manager.set_encryption_password("strong-password")
# Password can also come from:
# - Environment variable: VAULTCONFIG_PASSWORD
# - External command: VAULTCONFIG_PASSWORD_COMMAND
# - Interactive prompt (if TTY available)
Configuration Formats
TOML (Default)
# config.toml
host = "localhost"
port = 5432
password = "obscured-password-here"
[nested]
key = "value"
INI
# config.ini
[database]
host = localhost
port = 5432
password = obscured-password-here
YAML (Optional)
# config.yaml
host: localhost
port: 5432
password: obscured-password-here
nested:
key: value
Environment Variables
VAULTCONFIG_PASSWORD: Password for encrypted configsVAULTCONFIG_PASSWORD_COMMAND: Command to retrieve password (e.g., from password manager)VAULTCONFIG_PASSWORD_CHANGE: Set to "1" when changing password (used by password command)
Security Considerations
-
Password Obscuring:
- NOT secure encryption - only prevents casual viewing
- Anyone with code access can reveal passwords
- Use for convenience, not security
- A warning is logged on first use
-
Config File Encryption:
- Uses strong authenticated encryption (NaCl secretbox)
- Password is derived using PBKDF2-HMAC-SHA256 with 600,000 iterations
- Random salt generated per encryption
- No password recovery - lost password = lost data
- Minimum password length: 4 characters (12+ strongly recommended)
- Warnings shown for weak or short passwords
-
File Security:
- Config files automatically set to 0600 permissions (owner read/write only)
- Atomic file writes prevent partial/corrupted files
- Secure deletion of temporary files on error
- No race conditions in file permission setting
-
Best Practices:
- Use config file encryption for production
- Use strong passwords (12+ characters recommended)
- Store encryption passwords in system keychain/password manager
- Use
VAULTCONFIG_PASSWORD_COMMANDfor automation - Never commit encrypted configs with weak passwords
- Keep PyYAML updated (>= 6.0 for security fixes)
- Avoid using shell=True with password commands (use proper escaping)
Integration Examples
Flask Application
from flask import Flask
from pathlib import Path
from vaultconfig import ConfigManager
app = Flask(__name__)
# Load config on startup
config_manager = ConfigManager(
config_dir=Path.home() / ".config" / "myapp",
password=os.environ.get("MYAPP_CONFIG_PASSWORD"),
)
db_config = config_manager.get_config("database")
if db_config:
app.config["SQLALCHEMY_DATABASE_URI"] = (
f"postgresql://{db_config.get('username')}:{db_config.get('password')}"
f"@{db_config.get('host')}:{db_config.get('port')}/{db_config.get('database')}"
)
CLI Application
import click
from vaultconfig import ConfigManager
@click.group()
@click.pass_context
def cli(ctx):
"""My CLI application."""
ctx.obj = ConfigManager(
config_dir=Path.home() / ".config" / "myapp",
)
@cli.command()
@click.pass_obj
def connect(manager):
"""Connect to service."""
config = manager.get_config("service")
# Use config...
Migrating from pywebdavserver
If you're migrating from the old pywebdavserver config system:
# Old way
from pywebdavserver.config import get_config_manager
manager = get_config_manager()
# New way (vaultconfig is now used internally)
from pywebdavserver.config import get_config_manager
manager = get_config_manager() # Same API, now powered by vaultconfig
The API remains the same for backward compatibility.
Development
# Clone repository
git clone https://github.com/your-org/vaultconfig.git
cd vaultconfig
# Install in development mode
pip install -e ".[dev,yaml]"
# Run tests
pytest
# Format code
ruff check --fix .
License
MIT License - see LICENSE file for details.
Contributing
Contributions are welcome! Please:
- Fork the repository
- Create a feature branch
- Make your changes with tests
- Submit a pull request
Acknowledgments
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file vaultconfig-0.1.0.tar.gz.
File metadata
- Download URL: vaultconfig-0.1.0.tar.gz
- Upload date:
- Size: 63.6 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.9.25
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
b660dc9390ac9c1483e4edda54a2e52be6400e688220c408fe1379cbd3c92372
|
|
| MD5 |
d84e0fc6b6097ca69a14322a311dd9aa
|
|
| BLAKE2b-256 |
52467c1ebb112fdf914ec0bd6bd1897db2dbe8acb7b6418deae8bfdfe0c13ba7
|
File details
Details for the file vaultconfig-0.1.0-py3-none-any.whl.
File metadata
- Download URL: vaultconfig-0.1.0-py3-none-any.whl
- Upload date:
- Size: 26.7 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.9.25
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
fcdbb12d9a3224318cdcfba2b5918b0f213f0c696c5b86bdcfd428c4b41eca50
|
|
| MD5 |
465d64cb8aed145aacc27c8b00c405af
|
|
| BLAKE2b-256 |
bf190e9d17e41b07e46ea3f786d8a749e5cee722b46a38506c437c48b2d7d7d9
|