Skip to main content

Microsoft Azure Key Vault Client Libraries for Python

Project description

Azure Key Vault client libraries for Python

This is the Microsoft Azure Key Vault libraries bundle.

This package does not contain any code in itself. It installs a set of packages that provide APIs for Key Vault operations:

Install the package

Install the Azure Key Vault client libraries for Python with [pip][pip]:

pip install azure-keyvault

Documentation

Please refer to the individual packages for documentation.

Contributing

This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit https://cla.microsoft.com.

When you submit a pull request, a CLA-bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., label, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA.

This project has adopted the Microsoft Open Source Code of Conduct. For more information, see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments.

Impressions

Release History

2019-10-31 4.0.0

Disclaimer

This package and the azure.keyvault namespace does not contain code anymore. This package now installs three sub-packages instead:

  • azure-keyvault-keys
  • azure-keyvault-secrets

Certificates scenarios are in preview with the additional package azure-keyvault-certificates.

All code needs to be adapted to use the new namespaces. See individual package readme for details.

2018-08-07 1.1.0

  • Adding support for multi-api and API profiles

2018-06-27 1.0.0

  • Moving azure-keyvault to stable API version 7.0
  • Adding support for EC certificate create and import
  • Renaming curve SECP256K1 and algorithm ECDSA256 to P-256K and ES256K respectively

2018-04-10 1.0.0b1

  • Upgraded to autorest 3.0 generated code

General Breaking changes

This version uses a next-generation code generator that might introduce breaking changes.

  • Model signatures now use only keyword-argument syntax. All positional arguments must be re-written as keyword-arguments. To keep auto-completion in most cases, models are now generated for Python 2 and Python 3. Python 3 uses the "*" syntax for keyword-only arguments.

  • Enum types now use the "str" mixin (class AzureEnum(str, Enum)) to improve the behavior when unrecognized enum values are encountered. While this is not a breaking change, the distinctions are important, and are documented here: https://docs.python.org/3/library/enum.html#others At a glance:

    • "is" should not be used at all.
    • "format" will return the string value, where "%s" string formatting will return NameOfEnum.stringvalue. Format syntax should be prefered.
  • New Long Running Operation:

    • Return type changes from msrestazure.azure_operation.AzureOperationPoller to msrest.polling.LROPoller. External API is the same.
    • Return type is now always a msrest.polling.LROPoller, regardless of the optional parameters used.
    • The behavior has changed when using raw=True. Instead of returning the initial call result as ClientRawResponse, without polling, now this returns an LROPoller. After polling, the final resource will be returned as a ClientRawResponse.
    • New polling parameter. The default behavior is Polling=True which will poll using ARM algorithm. When Polling=False, the response of the initial call will be returned without polling.
    • polling parameter accepts instances of subclasses of msrest.polling.PollingMethod.
    • add_done_callback will no longer raise if called after polling is finished, but will instead execute the callback right away.

2018-03-28 1.0.0a2

  • Upgrading to API version 7.0-preview
  • Adding elliptic curve key support
  • Adding managed storage account key backup, restore and soft delete support
  • Breaking update to managed storage account SasDefinition creation
  • Adding certificate backup and restore support
  • Adding certificate transparency

2018-01-25 1.0.0a1

  • Added message encryption support for message encryption enabled vaults

2017-09-22 0.3.7

2017-08-16 0.3.6

  • Updated KeyVaultClient to accept both KeyVaultAuthentication and azure.common.credentials instances for authentication

2017-06-23 0.3.5

2017-06-07 0.3.4

  • Adding Preview Features
    • Managed Storage Account keys for managing storage credentials and provisioning SAS tokens
    • Key Vault "Soft Delete" allowing for recovery of deleted keys, secrets and certificates
    • Secret Backup and Restore for secret recovery and migration

2017-05-10 0.3.3

  • Reverting to 0.3.0, since behavior of 0.3.2 is not satisfaying either.

2017-05-09 0.3.2

  • Fix critical regression on 0.3.1 (#1157)
  • Now the client respects 'REQUESTS_CA_BUNDLE' and 'CURL_CA_BUNDLE'

2017-05-09 0.3.1

  • Support for REQUESTS_CA_BUNDLE (#1154)

2017-05-08 0.3.0

  • Moving KeyVaultClient class to the azure.keyvault namespace
  • Moving model classes to the azure.keyvault.models namespace
  • Deprecating 'generated' namespaces azure.keyvault.generated and azure.keyvault.generated.models
  • Exposed KeyVaultId class through azure.keyvault namespace
  • Moving identifier parsing methods to static methods on KeyVaultId class
  • Removing convenience overridden methods from KeyVaultClient
    • update_key(self, key_identifier, ...
    • get_key(self, key_identifier, ...
    • encrypt(self, key_identifier, ...
    • decrypt(self, key_identifier, ...
    • sign(self, key_identifier, ...
    • verify(self, key_identifier, ...
    • wrap_key(self, key_identifier, ...
    • unwrap_key(self, key_identifier, ...
    • update_secret(self, secret_identifer, ...
    • get_secret(self, secret_identifer, ...
    • get_certificate(self, certificate_identifier, ...

2017-04-09 0.2.0

Bugfixes

  • Fix possible deserialization error, but updating from list to list when applicable

Notes

  • This wheel package is now built with the azure wheel extension

2016-12-29 0.1.0

  • Initial Release

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

azure-keyvault-4.0.0.zip (12.7 kB view details)

Uploaded Source

Built Distribution

azure_keyvault-4.0.0-py2.py3-none-any.whl (4.1 kB view details)

Uploaded Python 2 Python 3

File details

Details for the file azure-keyvault-4.0.0.zip.

File metadata

  • Download URL: azure-keyvault-4.0.0.zip
  • Upload date:
  • Size: 12.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/2.0.0 pkginfo/1.5.0.1 requests/2.22.0 setuptools/40.8.0 requests-toolbelt/0.9.1 tqdm/4.37.0 CPython/3.7.4

File hashes

Hashes for azure-keyvault-4.0.0.zip
Algorithm Hash digest
SHA256 e85f5bd6cb4f10b3248b99bbf02e3acc6371d366846897027d4153f18025a2d7
MD5 067a0143cee1bbdc3f4c6d3ec53135da
BLAKE2b-256 31a3ddd2f6d039d436c4d936bdcb5833fb10020cc41f1684c30e4721f84caffe

See more details on using hashes here.

File details

Details for the file azure_keyvault-4.0.0-py2.py3-none-any.whl.

File metadata

  • Download URL: azure_keyvault-4.0.0-py2.py3-none-any.whl
  • Upload date:
  • Size: 4.1 kB
  • Tags: Python 2, Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/2.0.0 pkginfo/1.5.0.1 requests/2.22.0 setuptools/40.8.0 requests-toolbelt/0.9.1 tqdm/4.37.0 CPython/3.7.4

File hashes

Hashes for azure_keyvault-4.0.0-py2.py3-none-any.whl
Algorithm Hash digest
SHA256 76f75cb83929f312a08616d426ad6f597f1beae180131cf445876fb88f2c8ef1
MD5 4aa695bef54abbf45443f2a6db716f7d
BLAKE2b-256 c1dd9bd955205b11f179cc39e6df26ad4cea1956809951c04346596f92f6c19f

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page