Skip to main content

Microsoft Azure Key Vault Client Libraries for Python

Project description

Azure Key Vault client libraries for Python

This is the Microsoft Azure Key Vault libraries bundle.

This package does not contain any code in itself. It installs a set of packages that provide APIs for Key Vault operations:

Install the package

Install the Azure Key Vault client libraries for Python with [pip][pip]:

pip install azure-keyvault

Documentation

Please refer to the individual packages for documentation.

Contributing

This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit https://cla.microsoft.com.

When you submit a pull request, a CLA-bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., label, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA.

This project has adopted the Microsoft Open Source Code of Conduct. For more information, see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments.

Impressions

Release History

4.1.0 (2020-04-10)

Disclaimer

This package and the azure.keyvault namespace does not contain code anymore. This package now installs three sub-packages instead:

All code needs to be adapted to use the new namespaces. See individual package readmes for details.

4.0.0 (2019-10-31)

Disclaimer

This package and the azure.keyvault namespace does not contain code anymore. This package now installs three sub-packages instead:

  • azure-keyvault-keys
  • azure-keyvault-secrets

Certificates scenarios are in preview with the additional package azure-keyvault-certificates.

All code needs to be adapted to use the new namespaces. See individual package readme for details.

1.1.0 (2018-08-07)

  • Adding support for multi-api and API profiles

1.0.0 (2018-06-27)

  • Moving azure-keyvault to stable API version 7.0
  • Adding support for EC certificate create and import
  • Renaming curve SECP256K1 and algorithm ECDSA256 to P-256K and ES256K respectively

1.0.0b1 (2018-04-10)

  • Upgraded to autorest 3.0 generated code

General Breaking changes

This version uses a next-generation code generator that might introduce breaking changes.

  • Model signatures now use only keyword-argument syntax. All positional arguments must be re-written as keyword-arguments. To keep auto-completion in most cases, models are now generated for Python 2 and Python 3. Python 3 uses the "*" syntax for keyword-only arguments.

  • Enum types now use the "str" mixin (class AzureEnum(str, Enum)) to improve the behavior when unrecognized enum values are encountered. While this is not a breaking change, the distinctions are important, and are documented here: https://docs.python.org/3/library/enum.html#others At a glance:

    • "is" should not be used at all.
    • "format" will return the string value, where "%s" string formatting will return NameOfEnum.stringvalue. Format syntax should be prefered.
  • New Long Running Operation:

    • Return type changes from msrestazure.azure_operation.AzureOperationPoller to msrest.polling.LROPoller. External API is the same.
    • Return type is now always a msrest.polling.LROPoller, regardless of the optional parameters used.
    • The behavior has changed when using raw=True. Instead of returning the initial call result as ClientRawResponse, without polling, now this returns an LROPoller. After polling, the final resource will be returned as a ClientRawResponse.
    • New polling parameter. The default behavior is Polling=True which will poll using ARM algorithm. When Polling=False, the response of the initial call will be returned without polling.
    • polling parameter accepts instances of subclasses of msrest.polling.PollingMethod.
    • add_done_callback will no longer raise if called after polling is finished, but will instead execute the callback right away.

1.0.0a2 (2018-03-28)

  • Upgrading to API version 7.0-preview
  • Adding elliptic curve key support
  • Adding managed storage account key backup, restore and soft delete support
  • Breaking update to managed storage account SasDefinition creation
  • Adding certificate backup and restore support
  • Adding certificate transparency

1.0.0a1 (2018-01-25)

  • Added message encryption support for message encryption enabled vaults

0.3.7 (2017-09-22)

0.3.6 (2017-08-16)

  • Updated KeyVaultClient to accept both KeyVaultAuthentication and azure.common.credentials instances for authentication

0.3.5 (2017-06-23)

0.3.4 (2017-06-07)

  • Adding Preview Features
    • Managed Storage Account keys for managing storage credentials and provisioning SAS tokens
    • Key Vault "Soft Delete" allowing for recovery of deleted keys, secrets and certificates
    • Secret Backup and Restore for secret recovery and migration

0.3.3 (2017-05-10)

  • Reverting to 0.3.0, since behavior of 0.3.2 is not satisfaying either.

0.3.2 (2017-05-09)

  • Fix critical regression on 0.3.1 (#1157)
  • Now the client respects 'REQUESTS_CA_BUNDLE' and 'CURL_CA_BUNDLE'

0.3.1 (2017-05-09)

  • Support for REQUESTS_CA_BUNDLE (#1154)

0.3.0 (2017-05-08)

  • Moving KeyVaultClient class to the azure.keyvault namespace
  • Moving model classes to the azure.keyvault.models namespace
  • Deprecating 'generated' namespaces azure.keyvault.generated and azure.keyvault.generated.models
  • Exposed KeyVaultId class through azure.keyvault namespace
  • Moving identifier parsing methods to static methods on KeyVaultId class
  • Removing convenience overridden methods from KeyVaultClient
    • update_key(self, key_identifier, ...
    • get_key(self, key_identifier, ...
    • encrypt(self, key_identifier, ...
    • decrypt(self, key_identifier, ...
    • sign(self, key_identifier, ...
    • verify(self, key_identifier, ...
    • wrap_key(self, key_identifier, ...
    • unwrap_key(self, key_identifier, ...
    • update_secret(self, secret_identifer, ...
    • get_secret(self, secret_identifer, ...
    • get_certificate(self, certificate_identifier, ...

0.2.0 (2017-04-09)

Bugfixes

  • Fix possible deserialization error, but updating from list to list when applicable

Notes

  • This wheel package is now built with the azure wheel extension

0.1.0 (2016-12-29)

  • Initial Release

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

azure-keyvault-4.1.0.zip (12.9 kB view details)

Uploaded Source

Built Distribution

azure_keyvault-4.1.0-py2.py3-none-any.whl (4.2 kB view details)

Uploaded Python 2 Python 3

File details

Details for the file azure-keyvault-4.1.0.zip.

File metadata

  • Download URL: azure-keyvault-4.1.0.zip
  • Upload date:
  • Size: 12.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.1.1 pkginfo/1.5.0.1 requests/2.23.0 setuptools/41.2.0 requests-toolbelt/0.9.1 tqdm/4.45.0 CPython/3.8.2

File hashes

Hashes for azure-keyvault-4.1.0.zip
Algorithm Hash digest
SHA256 69002a546921a8290eb54d9a3805cfc515c321bc1d4c0bfcfb463620245eca40
MD5 b7f0aaf05fc9febea519fef3c58e7fb8
BLAKE2b-256 9994a7cc3a0e794681e049d1882cb041513dd3624be5d6e138ac486cc8415a81

See more details on using hashes here.

File details

Details for the file azure_keyvault-4.1.0-py2.py3-none-any.whl.

File metadata

  • Download URL: azure_keyvault-4.1.0-py2.py3-none-any.whl
  • Upload date:
  • Size: 4.2 kB
  • Tags: Python 2, Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.1.1 pkginfo/1.5.0.1 requests/2.23.0 setuptools/41.2.0 requests-toolbelt/0.9.1 tqdm/4.45.0 CPython/3.8.2

File hashes

Hashes for azure_keyvault-4.1.0-py2.py3-none-any.whl
Algorithm Hash digest
SHA256 5fa0438f7f6e2e79543f2724957acf77c3c187e558f4d030a4f9b7493b9f946d
MD5 0c0c3fe7bc58269a4ee3f7aff09f62bc
BLAKE2b-256 34d976d295cf6324cc811612710ca5d913015340efb558bdaf5d4a59884958c0

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page