{ "info": { "author": "Andy Brody", "author_email": "git@abrody.com", "bugtrack_url": null, "classifiers": [ "Development Status :: 3 - Alpha", "Intended Audience :: Developers", "Intended Audience :: System Administrators", "License :: Public Domain", "Programming Language :: Python :: 2", "Programming Language :: Python :: 2.6", "Programming Language :: Python :: 2.7", "Topic :: Security" ], "description": "Microsecrets, a lightweight secrets manager powered by S3 + KMS\n===============================================================\n\n.. image:: https://img.shields.io/pypi/v/microsecrets.svg\n :target: https://pypi.python.org/pypi/microsecrets\n\n**Microsecrets** is a secrets distribution tool powered by Amazon S3 and Amazon\nKMS. It provides a bare-bones approach to passing credentials securely in an\nAmazon Web Services environment. Credentials are uploaded to S3 and encrypted\nat rest by KMS. They can then be passed to programs through environment\nvariables.\n\nInstallation\n------------\n\n.. code-block:: bash\n\n $ pip install microsecrets\n\nUsage\n-----\n\nSetup\n~~~~~\n\n1. Create the S3 bucket you'll use for secrets storage. You may want one bucket\n per organization, such as ``example.com-microsecrets``.\n\n2. Create one KMS master key for each service that will be using microsecrets.\n The key should by default be named ``microsecrets-myservice`` for a service\n called myservice. Users uploading the credentials and systems downloading\n the credentials will need privileges to encrypt/decrypt data using this key.\n None of the normal users need key administration privileges.\n\nUploading environment and files\n~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n\n1. Upload environment variable data. Environment variables may be passed as\n ``=`` separated pairs on stdin or in a file. *NB: whitespace is stripped and\n all other characters are treated literally.* Or pass them as a JSON dict\n with the ``--json`` flag.\n\n .. code-block:: bash\n\n $ microsecrets-upload -b example-microsecrets -s myservice <