{ "info": { "author": "Microsoft Corporation", "author_email": "azurekeyvault@microsoft.com", "bugtrack_url": null, "classifiers": [ "Development Status :: 4 - Beta", "License :: OSI Approved :: MIT License", "Programming Language :: Python", "Programming Language :: Python :: 2", "Programming Language :: Python :: 2.7", "Programming Language :: Python :: 3", "Programming Language :: Python :: 3.5", "Programming Language :: Python :: 3.6", "Programming Language :: Python :: 3.7" ], "description": "# Azure Key Vault Secret client library for Python\nAzure Key Vault helps solve the following problems:\n- Secrets management (this library) -\nsecurely store and control access to tokens, passwords, certificates, API keys,\nand other secrets\n- Cryptographic key management\n([`azure-keyvault-keys`](https://github.com/Azure/azure-sdk-for-python/tree/master/sdk/keyvault/azure-keyvault-secrets)) -\ncreate, store, and control access to the keys used to encrypt your data\n- Certificate management\n([`azure-keyvault-certificates`](https://github.com/Azure/azure-sdk-for-python/tree/master/sdk/keyvault/azure-keyvault-certificates)) -\ncreate, manage, and deploy public and private SSL/TLS certificates\n\n[Source code][secret_client_src] | [Package (PyPI)][pypi_package_secrets] | [API reference documentation][reference_docs] | [Product documentation][keyvault_docs] | [Samples][secret_samples]\n\n## Getting started\n### Install the package\nInstall the Azure Key Vault Secrets client library for Python with [pip][pip]:\n\n```Bash\npip install azure-keyvault-secrets\n```\n\n### Prerequisites\n* An [Azure subscription][azure_sub]\n* Python 2.7, 3.5.3, or later\n* A Key Vault. If you need to create one, you can use the\n[Azure Cloud Shell][azure_cloud_shell] to create one with these commands\n(replace `\"my-resource-group\"` and `\"my-key-vault\"` with your own, unique\nnames):\n * (Optional) if you want a new resource group to hold the Key Vault:\n ```sh\n az group create --name my-resource-group --location westus2\n ```\n * Create the Key Vault:\n ```Bash\n az keyvault create --resource-group my-resource-group --name my-key-vault\n ```\n\n Output:\n ```json\n {\n \"id\": \"...\",\n \"location\": \"westus2\",\n \"name\": \"my-key-vault\",\n \"properties\": {\n \"accessPolicies\": [...],\n \"createMode\": null,\n \"enablePurgeProtection\": null,\n \"enableSoftDelete\": null,\n \"enabledForDeployment\": false,\n \"enabledForDiskEncryption\": null,\n \"enabledForTemplateDeployment\": null,\n \"networkAcls\": null,\n \"provisioningState\": \"Succeeded\",\n \"sku\": { \"name\": \"standard\" },\n \"tenantId\": \"...\",\n \"vaultUri\": \"https://my-key-vault.vault.azure.net/\"\n },\n \"resourceGroup\": \"my-resource-group\",\n \"type\": \"Microsoft.KeyVault/vaults\"\n }\n ```\n\n > The `\"vaultUri\"` property is the `vault_endpoint` used by `SecretClient`\n\n### Authenticate the client\nIn order to interact with a Key Vault's secrets, you'll need an instance of the\n[`SecretClient`][secret_client_docs] class. Creating one requires a **vault url** and\n**credential**. This document demonstrates using `DefaultAzureCredential` as\nthe credential, authenticating with a service principal's client id, secret,\nand tenant id. Other authentication methods are supported. See the\n[azure-identity][azure_identity] documentation for more details.\n\n#### Create a service principal\nThis [Azure Cloud Shell][azure_cloud_shell] snippet shows how to create a\nnew service principal. Before using it, replace \"your-application-name\" with\na more appropriate name for your service principal.\n\n * Create a service principal:\n ```Bash\n az ad sp create-for-rbac --name http://my-application --skip-assignment\n ```\n Output:\n ```json\n {\n \"appId\": \"generated app id\",\n \"displayName\": \"my-application\",\n \"name\": \"http://my-application\",\n \"password\": \"random password\",\n \"tenant\": \"tenant id\"\n }\n ```\n\n* Use the output to set **AZURE_CLIENT_ID** (appId), **AZURE_CLIENT_SECRET**\n(password) and **AZURE_TENANT_ID** (tenant) environment variables. The\nfollowing example shows a way to do this in Bash:\n ```Bash\n export AZURE_CLIENT_ID=\"generated app id\"\n export AZURE_CLIENT_SECRET=\"random password\"\n export AZURE_TENANT_ID=\"tenant id\"\n ```\n\n* Authorize the service principal to perform key operations in your Key Vault:\n ```Bash\n az keyvault set-policy --name my-key-vault --spn $AZURE_CLIENT_ID --key-permissions backup delete get list create\n ```\n > Possible key permissions:\n > - Key management: backup, delete, get, list, purge, recover, restore, create, update, import\n > - Cryptographic operations: decrypt, encrypt, unwrapKey, wrapKey, verify, sign\n\n\n#### Create a client\nAfter setting the **AZURE_CLIENT_ID**, **AZURE_CLIENT_SECRET** and\n**AZURE_TENANT_ID** environment variables, you can create the\n[`SecretClient`][secret_client_docs]:\n\n```python\n from azure.identity import DefaultAzureCredential\n from azure.keyvault.secrets import SecretClient\n\n credential = DefaultAzureCredential()\n\n secret_client = SecretClient(vault_endpoint=, credential=credential)\n```\n\n## Key concepts\nWith a `SecretClient`, you can get secrets from the vault, create new secrets\nand update their values, and delete secrets, as shown in the\n[examples](#examples) below.\n\n### Secret\nA Secret consists of a secret value and its associated metadata and management\ninformation. For this library secret values are strings, but Azure Key Vault\ndoesn't store them as such. For more information about secrets and how Key\nVault stores and manages them, see the\n[Key Vault documentation](https://docs.microsoft.com/en-us/azure/key-vault/about-keys-secrets-and-certificates#key-vault-secrets)\n.\n\n## Examples\nThis section contains code snippets covering common tasks:\n* [Retrieve a Secret](#retrieve-a-secret)\n* [Update Secret metadata](#update-secret-metadata)\n* [Delete a Secret](#delete-a-secret)\n* [List Secrets](#list-secrets)\n* [Async create a Secret](#async-create-a-secret)\n* [Async list Secrets](#async-list-secrets)\n\n### Create a Secret\n`set_secret` creates a Secret in the vault. If a secret with the same name\nalready exists, a new version of that secret is created.\n\n```python\n secret = secret_client.set_secret(\"secret-name\", \"secret-value\")\n\n print(secret.name)\n print(secret.value)\n print(secret.properties.version)\n```\n\n### Retrieve a Secret\n`get_secret` retrieves a secret previously stored in the Key Vault.\n\n```python\n secret = secret_client.get_secret(\"secret-name\")\n\n print(secret.name)\n print(secret.value)\n```\n\n### Update Secret metadata\n`update_secret` updates a secret's metadata. It cannot change the secret's\nvalue; use [`set_secret`](#create-a-secret) to set a secret's value.\n\n```python\n # Clients may specify the content type of a secret to assist in interpreting the secret data when it's retrieved\n content_type = \"text/plain\"\n # You can specify additional application-specific metadata in the form of tags.\n tags = {\"foo\": \"updated tag\"}\n\n updated_secret_properties = secret_client.update_secret_properties(\"secret-name\", content_type=content_type, tags=tags)\n\n print(updated_secret_properties.updated)\n print(updated_secret_properties.content_type)\n print(updated_secret_properties.tags)\n```\n\n### Delete a Secret\n`delete_secret` deletes a secret. If [soft-delete][soft_delete] is not enabled\nfor the vault, this permanently deletes the secret.\n\n```python\n deleted_secret = secret_client.delete_secret(\"secret-name\")\n\n print(deleted_secret.name)\n print(deleted_secret.properties.deleted_date)\n```\n\n### List secrets\nThis example lists all the secrets in the vault. The list doesn't include\nsecret values; use [`get_secret`](#retrieve-a-secret) to get a secret's value.\n\n```python\n secret_properties = secret_client.list_secrets()\n\n for secret_property in secret_properties:\n # the list doesn't include values or versions of the secrets\n print(secret_property.name)\n```\n\n### Async operations\nThis library includes a complete async API supported on Python 3.5+. To use it, you must\nfirst install an async transport, such as [`aiohttp`](https://pypi.org/project/aiohttp/).\nSee\n[azure-core documentation](https://github.com/Azure/azure-sdk-for-python/blob/master/sdk/core/azure-core/README.md#transport)\nfor more information.\n\n### Async create a secret\nThis example creates a secret in the Key Vault with the specified optional arguments.\n```python\n from azure.identity.aio import DefaultAzureCredential\n from azure.keyvault.secrets.aio import SecretClient\n\n credential = DefaultAzureCredential()\n secret_client = SecretClient(vault_endpoint=vault_endpoint, credential=credential)\n\n secret = await secret_client.set_secret(\"secret-name\", \"secret-value\")\n\n print(secret.name)\n print(secret.value)\n print(secret.properties.version)\n```\n\n### Async list secrets\nThis example lists all the secrets in the specified Key Vault.\n\n```python\n secret_properties = secret_client.list_secrets()\n\n async for secret_property in secret_properties:\n # the list doesn't include values or versions of the secrets\n print(secret_property.name)\n```\n\n## Troubleshooting\n### General\nKey Vault clients raise exceptions defined in [`azure-core`][azure_core_exceptions].\nFor example, if you try to get a key that doesn't exist in the vault,\n`SecretClient` raises `ResourceNotFoundError`:\n\n```python\nfrom azure.core.exceptions import ResourceNotFoundError\n\nsecret_client.delete_secret(\"my-secret\")\n\ntry:\n secret_client.get_secret(\"my-secret\")\nexcept ResourceNotFoundError as e:\n print(e.message)\n```\n\n### Logging\nNetwork trace logging is disabled by default for this library. When enabled,\nHTTP requests will be logged at DEBUG level using the `logging` library. You\ncan configure logging to print debugging information to stdout or write it\nto a file:\n\n```python\nimport sys\nimport logging\n\n# Create a logger for the 'azure' SDK\nlogger = logging.getLogger(__name__)\nlogger.setLevel(logging.DEBUG)\n\n# Configure a console output\nhandler = logging.StreamHandler(stream=sys.stdout)\nlogger.addHandler(handler)\n\n# Configure a file output\nfile_handler = logging.FileHandler(filename)\nlogger.addHandler(file_handler)\n\n# Enable network trace logging. Each HTTP request will be logged at DEBUG level.\nclient = SecretClient(vault_endpoint=url, credential=credential, logging_enable=True)\n```\n\nNetwork trace logging can also be enabled for any single operation:\n ```python\nsecret = secret_client.get_secret(\"secret-name\", logging_enable=True)\n```\n\n## Next steps\nSeveral samples are available in the Azure SDK for Python GitHub repository.\nThese provide example code for additional Key Vault scenarios:\n* [test_samples_secrets.py][test_examples_secrets] and\n[test_samples_secrets_async.py][test_example_secrets_async] - code snippets\nfrom the library's documentation\n* [hello_world.py][hello_world_sample] and\n[hello_world_async.py][hello_world_async_sample] - create/get/update/delete\nsecrets\n* [list_operations.py][list_operations_sample] and\n[list_operations_async.py][list_operations_async_sample] - list secrets\n\n### Additional Documentation\nFor more extensive documentation on Azure Key Vault, see the\n[API reference documentation][reference_docs].\n\n## Contributing\nThis project welcomes contributions and suggestions. Most contributions require\nyou to agree to a Contributor License Agreement (CLA) declaring that you have\nthe right to, and actually do, grant us the rights to use your contribution.\nFor details, visit https://cla.microsoft.com.\n\nWhen you submit a pull request, a CLA-bot will automatically determine whether\nyou need to provide a CLA and decorate the PR appropriately (e.g., label,\ncomment). Simply follow the instructions provided by the bot. You will only\nneed to do this once across all repos using our CLA.\n\nThis project has adopted the\n[Microsoft Open Source Code of Conduct][code_of_conduct]. For more information,\nsee the Code of Conduct FAQ or contact opencode@microsoft.com with any\nadditional questions or comments.\n\n[azure_cloud_shell]: https://shell.azure.com/bash\n[azure_core_exceptions]: https://github.com/Azure/azure-sdk-for-python/blob/master/sdk/core/azure-core/docs/exceptions.md\n[azure_identity]: https://github.com/Azure/azure-sdk-for-python/tree/master/sdk/identity/azure-identity\n[azure_sub]: https://azure.microsoft.com/free/\n[code_of_conduct]: https://opensource.microsoft.com/codeofconduct/\n[hello_world_sample]: https://github.com/Azure/azure-sdk-for-python/blob/master/sdk/keyvault/azure-keyvault-secrets/samples/hello_world.py\n[hello_world_async_sample]: https://github.com/Azure/azure-sdk-for-python/blob/master/sdk/keyvault/azure-keyvault-secrets/samples/hello_world_async.py\n[keyvault_docs]: https://docs.microsoft.com/en-us/azure/key-vault/\n[list_operations_sample]: https://github.com/Azure/azure-sdk-for-python/blob/master/sdk/keyvault/azure-keyvault-secrets/samples/list_operations.py\n[list_operations_async_sample]: https://github.com/Azure/azure-sdk-for-python/blob/master/sdk/keyvault/azure-keyvault-secrets/samples/list_operations_async.py\n[pip]: https://pypi.org/project/pip/\n[pypi_package_secrets]: https://pypi.org/project/azure-keyvault-secrets/\n[reference_docs]: https://azure.github.io/azure-sdk-for-python/ref/azure.keyvault.secrets.html\n[secret_client_src]: https://github.com/Azure/azure-sdk-for-python/tree/master/sdk/keyvault/azure-keyvault-secrets/azure/keyvault/secrets\n[secret_client_docs]: https://azure.github.io/azure-sdk-for-python/ref/azure.keyvault.secrets.html#azure.keyvault.secrets.SecretClient\n[secret_samples]: https://github.com/Azure/azure-sdk-for-python/tree/master/sdk/keyvault/azure-keyvault-secrets/samples\n[soft_delete]: https://docs.microsoft.com/en-us/azure/key-vault/key-vault-ovw-soft-delete\n[test_examples_secrets]: https://github.com/Azure/azure-sdk-for-python/blob/master/sdk/keyvault/azure-keyvault-secrets/tests/test_samples_secrets.py\n[test_example_secrets_async]: https://github.com/Azure/azure-sdk-for-python/blob/master/sdk/keyvault/azure-keyvault-secrets/tests/test_samples_secrets_async.py\n\n![Impressions](https://azure-sdk-impressions.azurewebsites.net/api/impressions/azure-sdk-for-python%2Fsdk%2Fkeyvault%2Fazure-keyvault-secrets%2FFREADME.png)\n\n\n# Release History\n\n## 4.0.0b4 (2019-10-08)\n### Breaking changes:\n- `Secret` now has attribute `properties`, which holds certain properties of the\nsecret, such as `version`. This changes the shape of the returned `Secret` type,\nas certain properties of `Secret` (such as `version`) have to be accessed\nthrough the `properties` property. See the updated [docs](https://azure.github.io/azure-sdk-for-python/ref/azure.keyvault.secrets.html)\nfor details.\n- `update_secret` has been renamed to `update_secret_properties`\n- The `vault_url` parameter of `SecretClient` has been renamed to `vault_endpoint`\n- The property `vault_url` has been renamed to `vault_endpoint` in all models\n\n### Fixes and improvements\n- `list_secrets` and `list_secret_versions` return the correct type\n\n## 4.0.0b3 (2019-09-11)\nThis release includes only internal changes.\n\n## 4.0.0b2 (2019-08-06)\n### Breaking changes:\n- Removed `azure.core.Configuration` from the public API in preparation for a\nrevamped configuration API. Static `create_config` methods have been renamed\n`_create_config`, and will be removed in a future release.\n- This version of the library requires `azure-core` 1.0.0b2\n - If you later want to revert to a version requiring azure-core 1.0.0b1,\n of this or another Azure SDK library, you must explicitly install azure-core\n 1.0.0b1 as well. For example:\n `pip install azure-core==1.0.0b1 azure-keyvault-secrets==4.0.0b1`\n\n### New features:\n- Distributed tracing framework OpenCensus is now supported\n- Added support for HTTP challenge based authentication, allowing clients to\ninteract with vaults in sovereign clouds.\n\n## 4.0.0b1 (2019-06-28)\nVersion 4.0.0b1 is the first preview of our efforts to create a user-friendly\nand Pythonic client library for Azure Key Vault. For more information about\npreview releases of other Azure SDK libraries, please visit\nhttps://aka.ms/azure-sdk-preview1-python.\n\nThis library is not a direct replacement for `azure-keyvault`. Applications\nusing that library would require code changes to use `azure-keyvault-secrets`.\nThis package's\n[documentation](https://github.com/Azure/azure-sdk-for-python/tree/master/sdk/keyvault/azure-keyvault-secrets/README.md)\nand\n[samples](https://github.com/Azure/azure-sdk-for-python/tree/master/sdk/keyvault/azure-keyvault-secrets/samples)\ndemonstrate the new API.\n\n### Major changes from `azure-keyvault`\n- Packages scoped by functionality\n - `azure-keyvault-secrets` contains a client for secret operations,\n `azure-keyvault-keys` contains a client for key operations\n- Client instances are scoped to vaults (an instance interacts with one vault\nonly)\n- Asynchronous API supported on Python 3.5.3+\n - the `azure.keyvault.secrets.aio` namespace contains an async equivalent of\n the synchronous client in `azure.keyvault.secrets`\n- Authentication using `azure-identity` credentials\n - see this package's\n [documentation](https://github.com/Azure/azure-sdk-for-python/tree/master/sdk/keyvault/azure-keyvault-secrets/README.md)\n , and the\n [Azure Identity documentation](https://github.com/Azure/azure-sdk-for-python/blob/master/sdk/identity/azure-identity/README.md)\n for more information\n\n### `azure-keyvault` features not implemented in this library\n- Certificate management APIs\n- National cloud support. This release supports public global cloud vaults,\n e.g. https://{vault-name}.vault.azure.net\n\n\n", "description_content_type": "text/markdown", "docs_url": null, "download_url": "", "downloads": { "last_day": -1, "last_month": -1, "last_week": -1 }, "home_page": "https://github.com/Azure/azure-sdk-for-python/tree/master/sdk/keyvault/azure-keyvault-secrets", "keywords": "", "license": "MIT License", "maintainer": "", "maintainer_email": "", "name": "azure-keyvault-secrets", "package_url": "https://pypi.org/project/azure-keyvault-secrets/", "platform": "", "project_url": "https://pypi.org/project/azure-keyvault-secrets/", "project_urls": { "Homepage": "https://github.com/Azure/azure-sdk-for-python/tree/master/sdk/keyvault/azure-keyvault-secrets" }, "release_url": "https://pypi.org/project/azure-keyvault-secrets/4.0.0b4/", "requires_dist": [ "azure-core (<2.0.0,>=1.0.0b2)", "azure-common (~=1.1)", "msrest (>=0.5.0)", "azure-keyvault-nspkg ; python_version<'3.0'", "enum34 (>=1.0.4) ; python_version<'3.4'", "typing ; python_version<'3.5'" ], "requires_python": "", "summary": "Microsoft Azure Key Vault Secrets Client Library for Python", "version": "4.0.0b4" }, "last_serial": 5946484, "releases": { "4.0.0b1": [ { "comment_text": "", "digests": { "md5": "8dfec1e4f89ecc9693bdaa90acc52879", "sha256": "f91901729f7492067b944687381110632251dfaad2059eaff16356723810e714" }, "downloads": -1, "filename": "azure_keyvault_secrets-4.0.0b1-py2.py3-none-any.whl", "has_sig": false, "md5_digest": "8dfec1e4f89ecc9693bdaa90acc52879", "packagetype": "bdist_wheel", "python_version": "py2.py3", "requires_python": null, "size": 146098, "upload_time": "2019-06-28T23:40:03", "url": "https://files.pythonhosted.org/packages/52/d5/083dc8a4a0f2b66a2be6b69e56434734599066ba481cc1d45d924935c983/azure_keyvault_secrets-4.0.0b1-py2.py3-none-any.whl" }, { "comment_text": "", "digests": { "md5": "e1917bd29327775bc7062a75f4647b8d", "sha256": "b43fc67115f424777956b1e2f65446aa3d746d5846b6790358f5b5df78804343" }, "downloads": -1, "filename": "azure-keyvault-secrets-4.0.0b1.zip", "has_sig": false, "md5_digest": "e1917bd29327775bc7062a75f4647b8d", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 163633, "upload_time": "2019-06-28T23:40:09", "url": "https://files.pythonhosted.org/packages/17/de/f6a85ab45deea3daaef9c5c0c8238bdd9134694f4995a9ece5da6eec0625/azure-keyvault-secrets-4.0.0b1.zip" } ], "4.0.0b2": [ { "comment_text": "", "digests": { "md5": "7db3a1ff5cc8cda1dcb23db1ef80684c", "sha256": "746f941f3d6fb61f6f24d080d6d9902de6e31f2fef7fd819253ab213c1909dec" }, "downloads": -1, "filename": "azure_keyvault_secrets-4.0.0b2-py2.py3-none-any.whl", "has_sig": false, "md5_digest": "7db3a1ff5cc8cda1dcb23db1ef80684c", "packagetype": "bdist_wheel", "python_version": "py2.py3", "requires_python": null, "size": 150461, "upload_time": "2019-08-06T22:11:20", "url": "https://files.pythonhosted.org/packages/63/85/71a65d67a2a69a8bef7877d7a4da6bd47e8c84246e938acefd9ddf815c8e/azure_keyvault_secrets-4.0.0b2-py2.py3-none-any.whl" }, { "comment_text": "", "digests": { "md5": "94f8da273b645df41495deca31a72524", "sha256": "bcef7a09f6d339cf0f3f3ba9ab0824ef29388ef9826aef1271627d5c62db38c4" }, "downloads": -1, "filename": "azure-keyvault-secrets-4.0.0b2.zip", "has_sig": false, "md5_digest": "94f8da273b645df41495deca31a72524", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 170007, "upload_time": "2019-08-06T22:11:22", "url": "https://files.pythonhosted.org/packages/cb/f7/adb87b2bd152d2522339b9d5fdca18c91cadf4060b02a539d502ff9b5324/azure-keyvault-secrets-4.0.0b2.zip" } ], "4.0.0b3": [ { "comment_text": "", "digests": { "md5": "eeeb56e0fbe7a5a44fc9c048aecf5c7d", "sha256": "4da2fc215b97f283af4fe74fa3fa171786e460496df07e8bde4cea81e2d4143e" }, "downloads": -1, "filename": "azure_keyvault_secrets-4.0.0b3-py2.py3-none-any.whl", "has_sig": false, "md5_digest": "eeeb56e0fbe7a5a44fc9c048aecf5c7d", "packagetype": "bdist_wheel", "python_version": "py2.py3", "requires_python": null, "size": 150256, "upload_time": "2019-09-11T17:50:47", "url": "https://files.pythonhosted.org/packages/e6/5f/ec38b65a7123ba35550e98cd96858c3ea5fa04886aa13790d934cf609330/azure_keyvault_secrets-4.0.0b3-py2.py3-none-any.whl" }, { "comment_text": "", "digests": { "md5": "360a10c701488aff12e41166550fab2b", "sha256": "91a882f20499b582fe4e0f7e76a23e1bfbb37fd28220d79712b4f41497b75170" }, "downloads": -1, "filename": "azure-keyvault-secrets-4.0.0b3.zip", "has_sig": false, "md5_digest": "360a10c701488aff12e41166550fab2b", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 170141, "upload_time": "2019-09-11T17:50:48", "url": "https://files.pythonhosted.org/packages/7a/67/a2a62499bd6d9f7ea0fe5caa77978c0b71f42077b3d6927f3deae6531980/azure-keyvault-secrets-4.0.0b3.zip" } ], "4.0.0b4": [ { "comment_text": "", "digests": { "md5": "619c86bb78a3e5c855363d83856f5b09", "sha256": "c738596eaead8b6cbc4b2d5177e4042a64ce20e6e9bf804f89eaf13ce1e14de5" }, "downloads": -1, "filename": "azure_keyvault_secrets-4.0.0b4-py2.py3-none-any.whl", "has_sig": false, "md5_digest": "619c86bb78a3e5c855363d83856f5b09", "packagetype": "bdist_wheel", "python_version": "py2.py3", "requires_python": null, "size": 151678, "upload_time": "2019-10-08T20:17:06", "url": "https://files.pythonhosted.org/packages/04/94/2ccb6b8866759c267befce847e0d0b53a2775efee7d758891a62bc2a83ce/azure_keyvault_secrets-4.0.0b4-py2.py3-none-any.whl" }, { "comment_text": "", "digests": { "md5": "07bc68967aff7fc4dba48418feac9328", "sha256": "17b544a47247258e8e6a44ec7a115d18cc63aa7f49ed43c8647f3524326114c4" }, "downloads": -1, "filename": "azure-keyvault-secrets-4.0.0b4.zip", "has_sig": false, "md5_digest": "07bc68967aff7fc4dba48418feac9328", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 253610, "upload_time": "2019-10-08T20:17:09", "url": "https://files.pythonhosted.org/packages/fd/c0/ded23ee82cbeaf9fb795882731111f7cf73231b8c026bbe0b524aeab3b9e/azure-keyvault-secrets-4.0.0b4.zip" } ] }, "urls": [ { "comment_text": "", "digests": { "md5": "619c86bb78a3e5c855363d83856f5b09", "sha256": "c738596eaead8b6cbc4b2d5177e4042a64ce20e6e9bf804f89eaf13ce1e14de5" }, "downloads": -1, "filename": "azure_keyvault_secrets-4.0.0b4-py2.py3-none-any.whl", "has_sig": false, "md5_digest": "619c86bb78a3e5c855363d83856f5b09", "packagetype": "bdist_wheel", "python_version": "py2.py3", "requires_python": null, "size": 151678, "upload_time": "2019-10-08T20:17:06", "url": "https://files.pythonhosted.org/packages/04/94/2ccb6b8866759c267befce847e0d0b53a2775efee7d758891a62bc2a83ce/azure_keyvault_secrets-4.0.0b4-py2.py3-none-any.whl" }, { "comment_text": "", "digests": { "md5": "07bc68967aff7fc4dba48418feac9328", "sha256": "17b544a47247258e8e6a44ec7a115d18cc63aa7f49ed43c8647f3524326114c4" }, "downloads": -1, "filename": "azure-keyvault-secrets-4.0.0b4.zip", "has_sig": false, "md5_digest": "07bc68967aff7fc4dba48418feac9328", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 253610, "upload_time": "2019-10-08T20:17:09", "url": "https://files.pythonhosted.org/packages/fd/c0/ded23ee82cbeaf9fb795882731111f7cf73231b8c026bbe0b524aeab3b9e/azure-keyvault-secrets-4.0.0b4.zip" } ] }