VaultClient#
- class phalanx.storage.vault.VaultClient(url, path)#
 Bases:
objectStore, retrieve, and manipulate data stored in Vault.
This client is specific to a particular Phalanx environment. It is created using the metadata of a Phalanx environment by
VaultStorage.The Vault authentication token is taken from either the
VAULT_TOKENenvironment variable or a.vault-tokenfile in the user’s home directory.- Parameters:
 
Methods Summary
create_approle(name, policies)Create a new Vault AppRole for secret access.
create_policy(name, policy)Create a policy allowing read of secrets for this environment.
create_token(display_name, policies, lifetime)Create a new Vault token.
delete_application_secret(application)Delete the secrets for an application currently stored in Vault.
get_application_secret(application)Get the secrets for an application currently stored in Vault.
get_approle(name)Retrieve metadata about a Vault AppRole if it exists.
Get the secrets for an environment currently stored in Vault.
get_policy(name)Get the contents of a Vault policy.
get_token(accessor)Get a token by accessor.
List the available application secrets in Vault.
List the accessors of all known tokens.
Revoke all existing SecretIDs for a Vault AppRole.
revoke_token(accessor)Revoke a token by accessor.
store_application_secret(application, values)Store the full set of secrets for an application.
update_application_secret(application, key, ...)Update the value of a specific secret key.
Methods Documentation
- create_approle(name, policies)#
 Create a new Vault AppRole for secret access.
- Parameters:
 - Returns:
 Newly-created AppRole.
- Return type:
 
- create_policy(name, policy)#
 Create a policy allowing read of secrets for this environment.
- create_token(display_name, policies, lifetime)#
 Create a new Vault token.
- Parameters:
 - Returns:
 Newly-created Vault token.
- Return type:
 
- delete_application_secret(application)#
 Delete the secrets for an application currently stored in Vault.
If the secret does not exist, still returns success without raising an exception.
- get_application_secret(application)#
 Get the secrets for an application currently stored in Vault.
- Parameters:
 application (
str) – Name of the application.- Returns:
 Mapping from secret key to its secret from Vault.
- Return type:
 dict of pydantic.types.SecretStr
- Raises:
 VaultNotFoundError – Raised if the requested secret was not found in Vault.
- get_approle(name)#
 Retrieve metadata about a Vault AppRole if it exists.
- Parameters:
 approle – Name of the AppRole.
name (
str) –
- Returns:
 Metadata about the AppRole if it exists, else None.
- Return type:
 VaultAppRoleMetadata or None
- get_environment_secrets()#
 Get the secrets for an environment currently stored in Vault.
- get_policy(name)#
 Get the contents of a Vault policy.
- get_token(accessor)#
 Get a token by accessor.
- Parameters:
 accessor (
str) – Accessor for the token.- Returns:
 Metadata for the token, or None if no token exists with that accessor.
- Return type:
 VaultTokenMetadata or None
- list_application_secrets()#
 List the available application secrets in Vault.
- Returns:
 Names of available application secrets.
- Return type:
 - Raises:
 VaultNotFoundError – Raised if the path for application secrets does not exist.
- list_token_accessors()#
 List the accessors of all known tokens.
- revoke_approle_secret_ids(name)#
 Revoke all existing SecretIDs for a Vault AppRole.
- revoke_token(accessor)#
 Revoke a token by accessor.
- store_application_secret(application, values)#
 Store the full set of secrets for an application.