CLI tool for hashicorp vault
Project description
CLI tool for Hashicorp Vault
This tools allows simple interactions with the vault API, allowing configuration to be done in a separate step using a YAML configuration file.
This is especially interesting if you interact with Hashicorp Vault from automated deployment tools
Installation
The tool is packaged but the package is not yet available on pypi.
pip install vault-cli
Usage
Usage: vault [OPTIONS] COMMAND [ARGS]...
Interact with a Vault. See subcommands for details.
All arguments can be passed by environment variables:
VAULT_CLI_UPPERCASE_NAME (including VAULT_CLI_PASSWORD and
VAULT_CLI_TOKEN).
Options:
-U, --url TEXT URL of the vault instance
--verify / --no-verify Verify HTTPS certificate
--ca-bundle PATH Location of the bundle containing the server
certificate to check against.
-c, --certificate-file PATH Certificate to connect to vault.
Configuration file can also contain a
"certificate" key.
-T, --token-file PATH File which contains the token to connect to
Vault. Configuration file can also contain a
"token" key.
-u, --username TEXT Username used for userpass authentication
-w, --password-file PATH Can read from stdin if "-" is used as
parameter. Configuration file can also
contain a "password" key.
-b, --base-path TEXT Base path for requests
-s, --safe-write / --unsafe-write
When activated, you can't overwrite a secret
without passing "--force" (in commands "set"
and "mv")
-v, --verbose Use multiple times to increase verbosity
--config-file PATH Config file to use. Use 'no' to disable
config file. Default value: first of
./.vault.yml, ~/.vault.yml, /etc/vault.yml
-h, --help Show this message and exit.
Commands:
delete Delete a single secret.
delete-all Delete multiple secrets.
dump-config Display settings in the format of a config file.
env Launch a command, loading secrets in environment.
get Return a single secret value.
get-all Return multiple secrets.
list List all the secrets at the given path.
mv Recursively move secrets from source to destination path.
set Set a single secret to the given value(s).
template Render the given template and insert secrets in it.
Authentication
There are three ways to authenticate against the vault:
- Username and password file: provide a username and a file to read the
password from. The file may be
-
for stdin. - Client certificate: provide the path to a certificate file.
- Token: Bypass authentication step if you already have a valid token.
Showcase
Connect to https://vault.mydomain:8200/project and list the secrets
$ vault --url=https://vault.mydomain:8200 --certificate=/etc/vault/certificate.key --base-path=project/ list
['my_secret']
On the following examples, we'll be considering that we have a complete configuration file.
Read a secret (default is yaml format)
$ vault get my_secret
--- qwerty
...
Read a secret in plain text
$ vault get my_secret --text
qwerty
Write a secret
$ vault set my_other_secret supersecret
Done
Write a secret via stdin.
You can use this when the secret has multiple lines or starts with a "-"
$ vault set third_secret --stdin
----BEGIN SECRET KEY----
...
<hit ctrl+d to end stdin>
Done
vault get --text third_secret
----BEGIN SECRET KEY----
...
Identically, piping allows you to write the content of a file into the vault:
$ cat my_certificate.key | vault set third_secret --stdin
Done
Anything following "--" will not be seen as a flag even if it starts with a "-"
$ vault set -- -secret-name -oh-so-secret
Done
$ vault get --text -- -secret-name
-oh-so-secret
Write a secret complex object
$ vault set --yaml blob_secret "{code: supercode}"
Done
Write a secret list
$ vault set list_secret secret1 secret2 secret3
Done
$ vault get list_secret
---
- secret1
- secret2
- secret3
Protect yourself from overwriting a secret by mistake
vault set a b
Done
$ vault --safe-write set a c
Error: Secret already exists at a. Use -f to force overwriting.
$ vault --safe-write set -f a c
Done
(safe-write
can be set in your configuration file, see below for details)
Get all values from the vault in a single command (yaml format)
$ vault get-all
---
-secret-name: -oh-so-secret
blob_secret:
code: supercode
list_secret:
- secret1
- secret2
- secret3
my_other_secret: supersecret
my_secret: qwerty
third_secret: '----BEGIN SECRET KEY----
...'
Get a nested secret based on a path
$ vault set test/my_folder_secret yaysecret
Done
$ vault get-all test/my_folder_secret
---
test:
my_folder_secret: yaysecret
Get all values recursively from several folders in a single command (yaml format)
$ vault get-all test my_secret
---
my_secret: qwerty
test:
my_folder_secret: yaysecret
Delete a secret
$ vault delete my_other_secret
Done
Move secrets and folders
$ vault mv my_secret test/my_secret
Move 'my_secret' to 'test/my_secret'
$ vault mv blob_secret test/blob_secret
Move 'blob_secret' to 'test/blob_secret'
$ vault get-all
---
-secret-name: -oh-so-secret
list_secret:
- secret1
- secret2
- secret3
test:
blob_secret:
code: supercode
my_folder_secret: yaysecret
my_secret: qwerty
third_secret: '----BEGIN SECRET KEY----
...'
Launch a process loading secrets through environment variables
$ vault env --path blob_secret -- env
...
code=supercode
...
Render a template file with values from the vault
$ vault template mytemplate.j2 > /etc/conf
# mytemplate.j2:
Hello={{ vault("my_secret") }}
# /etc/conf:
Hello=querty
(Use -
for stdin and -o <file or ->
to specify the file to write to, or stdout)
(Re)create a configuration file based on the current settings
$ vault --url https://something --token mytoken dump-config > .vault.yaml
Delete everything under blob-secret
$ vault delete-all blob-secret
Delete everything, no confirmation
$ vault delete-all --force
Use the testing client in your tests
$ pip install vault-cli[testing]
# conftest.py (for pytest)
from vault_cli.testing import vault
__all__ = ["vault"]
# test_something.py
def test_bla(vault):
vault.db = {"a/b": "c"}
assert vault.get_secret("a/b") == "c"
Configuration
The first file found in the following location is read, parsed and used:
/etc/vault.yml
~/.vault.yml
./.vault.yml
Any option passed as command line flag will be used over the corresponding
option in the documentation (use either -
or _
).
The expected format of the configuration is a mapping, with option names and their corresponding values:
---
username: my_username
password-file: ~/.vault-password
# or
token-file: ~/.vault-token
url: https://vault.mydomain:8200
verify: no
base-path: project/
...
Make sure the secret files have their permissions set accordingly.
For simple cases, you can directly define your token
or password
in the
file:
---
username: my_username
password: secret-password
# or
token: secret-token
url: https://vault.mydomain:8200
verify: no
base-path: project/
...
If you do so, make sure the permissions of the configuration file itself are not too broad
Just note that the --verify / --no-verify
flag become verify: yes
or
verify: no
All parameters can be defined from environment variables:
$ VAULT_CLI_URL=https://myvault.com vault list
The name is always the uppercase underscored name of the equivalent command line option. Token and password can also be passed as environment variables as VAULT_CLI_TOKEN and VAULT_CLI_PASSWORD.
State
The tool is currently in beta mode. It's missing docs and other things. Be warned.
Contributing
We welcome any help :) See CONTRIBUTING.md for details.
License
Copyright 2018-2019 PeopleDoc
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file vault-cli-0.6.0.tar.gz
.
File metadata
- Download URL: vault-cli-0.6.0.tar.gz
- Upload date:
- Size: 16.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/1.13.0 pkginfo/1.5.0.1 requests/2.22.0 setuptools/41.0.1 requests-toolbelt/0.9.1 tqdm/4.32.1 CPython/3.6.7
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 19585fa4814dda7e48535bc75c5452d37a76a0626529c632ac60c5bfd49d9be0 |
|
MD5 | 9fd23a2a4cd346d8719577f61bf25bc3 |
|
BLAKE2b-256 | b1275c0910645056a73fcd74955abe1f132e4b8e4f623a5ea6136750a4c5cca6 |
File details
Details for the file vault_cli-0.6.0-py3-none-any.whl
.
File metadata
- Download URL: vault_cli-0.6.0-py3-none-any.whl
- Upload date:
- Size: 19.2 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/1.13.0 pkginfo/1.5.0.1 requests/2.22.0 setuptools/41.0.1 requests-toolbelt/0.9.1 tqdm/4.32.1 CPython/3.6.7
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 434f4b299edc95c2356134d963e372d23c0488a39ad50690a75f2a5c1bde52eb |
|
MD5 | 850476189ba01aeba7b827e11927cb2b |
|
BLAKE2b-256 | 4501e070a4362398427ea78652856a22dbd6616bc260185ec383002465ffefc2 |