Simple tool to keep your app secrets encrypted in-repo. Easily decrypt using a master.key
.
The vault is YAML encoded by default, and is encrypted using AES-GCM-256 authenticated encryption.
Inspired by Rails credentials - it pairs nicely with mrsk. But it can be used as a standalone CLI tool or as a library.
- Install it:
$ pip install secrets-vault
- Create a new vault:
$ secrets init
Generated new secrets vault at ./secrets.yml.enc
Generated new master key at ./master.key - keep it safe!
- Open vault in your editor:
$ secrets edit
# Add your secrets below, comments are supported too.
# dev:
# secret-key: abc123
#
# database-url: postgres://user:pass@localhost:5432/dev
- Read secrets:
$ secrets get database-url
> postgres://user:pass@localhost:5432/dev
- Consume secrets as environment variables:
$ secrets envify -o dotenv
$ cat .env
> DATABASE_URL=postgres://...
> REDIS_URL=redis://...
> COOKIE_SECRET=abc123
Important: You should keep the master.key
secret, do NOT commit it. Ignore it in your .gitignore
file. The secrets.yml.enc
file is encrypted and can be committed.
You can view the help anytime by running secrets --help
:
Usage: secrets [OPTIONS] COMMAND [ARGS]...
Manage a local secrets vault.
Options:
-s, --secrets-filepath TEXT Path to the encrypted secrets vault.
[default: ./secrets.yml.enc]
-m, --master-key-filepath TEXT Path to the master.key file. [default:
./master.key]
-f, --format [yaml|json] Format to use for the secrets vault.
[default: yaml]
-v, --verbose Enable verbose output.
--help Show this message and exit.
Commands:
del Delete a secret.
edit Open the secrets vault in your configured $EDITOR.
envify Prints a provided secret key as one or more env variables.
get Get a secret value.
init Generate a new secrets vault and master.key pair.
set Store a secret.
version Show the package version.
List all secrets:
$ secrets get
# Add your secrets below, comments are supported too.
# dev:
# secret-key: abc123
#
# database-url: postgres://user:pass@localhost:5432/dev
Get a secret:
$ secrets get database-url
> postgres://user:pass@localhost:5432/dev
Traverse nested objects:
$ secrets get
dev:
secret-key: abc123
admins: [zero, one, two three]
database-url: postgres://user:pass@localhost:5432/dev
$ secrets get dev.admins.2
> two
Simply call get
with the key. Note that if the secret is missing it will return None
from secrets_vault import SecretsVault
vault = SecretsVault()
admins = vault.get('dev.admins')
You can set secrets from the CLI with a key and value:
$ secrets set foo bar
To edit secrets, run secrets edit
, the file will be decrypted and your editor will open.
$ secrets edit
>> Opening secrets file in editor...
# Add your secrets below, comments are supported too.
# dev:
# secret-key: abc123
#
# database-url: postgres://user:pass@localhost:5432/dev
Any saved changes will be encrypted and saved to the file on disk when you close the editor.
You can also edit secrets from code:
from secrets_vault import SecretsVault
vault = SecretsVault()
vault.set('foo', 'bar')
vault.save()
You can delete secrets from the CLI with a key:
$ secrets del foo
You can achieve the same in Python like this:
from secrets_vault import SecretsVault
vault = SecretsVault()
vault.delete('foo')
vault.save()
Sometimes you may want to print a secret as environment variables. It will also apply if you have nested objects. You can do so by running:
$ secrets edit
aws-credentials:
aws-access-key-id: abc123
aws-secret-access-key: abc456
database-url: postgres://user:pass@localhost:5432/dev
Envify will print the secrets ready for consumption as environment variables:
$ secrets envify aws-credentials
AWS_ACCESS_KEY_ID=abc123
AWS_SECRET_ACCESS_KEY=abc456
You can also print the entire vault as environment variables:
$ secrets envify
AWS_CREDENTIALS={"aws-access-key-id": "abc123", "aws-secret-access-key": "abc456"}
DATABASE_URL=postgres://user:pass@localhost:5432/dev
The following conventions are applied:
- The key is uppercased
- Dashes are replaced with underscores
- Values are serialized as plain-text (eg. strings and numbers)
- Objects are JSON encoded (eg. lists and dicts)
You can then use it in your shell like this:
$ $(secrets envify --export aws-credentials)
$ echo $AWS_ACCESS_KEY_ID
abc123
Dump output to a dotenv file:
$ secrets envify aws-credentials -o .env.aws
$ cat .env.aws
> AWS_ACCESS_KEY_ID=abc123
> AWS_SECRET_ACCESS_KEY=abc456
By default, the vault will look for the master key in a file located at ./master.key
.
You can also provide it via an environment variable MASTER_KEY
. For example:
MASTER_KEY=my-super-secret-master-key secrets edit
When a master key is provided via an environment variable, it takes precedence over the file on disk.
You can load the master_key from anywhere else and provide it when initializing the class:
from secrets_vault import SecretsVault
# Load from somewhere else
master_key = 'my-super-secret-master-key'
vault = SecretsVault(master_key=master_key)
The order of precedence for the master key is:
- Provided via the constructor
- Provided via the
MASTER_KEY
environment variable - Loaded from the file on disk
You can also provide them as a CLI arguments before the command:
$ secrets \
--master-key-filepath ./prod/master.key \
--secrets-filepath ./prod/secrets.yml.enc \
init
This can be used to separate your secrets by environments such as prod
, staging
, dev
, each having with their own key.
You can also configure the filepaths at which your secrets.yml.enc
and master.key
files are located.
from secrets_vault import SecretsVault
vault = SecretsVault(master_key_filepath=..., secrets_filepath=...)
See CHANGELOG for the list of releases.
If you discover any issue regarding security, please disclose the information responsibly by sending an email to [email protected]. Do NOT create a Issue on the GitHub repo.
Please check for any existing issues before openning a new Issue. If you'd like to work on something, please open a new Issue describing what you'd like to do before submitting a Pull Request.
See LICENSE.