cosmian-kms 4.12.0__cp37-abi3-macosx_10_12_x86_64.whl → 4.13.1__cp37-abi3-macosx_10_12_x86_64.whl

Sign up to get free protection for your applications and to get access to all the features.
cosmian_kms/__init__.pyi CHANGED
@@ -151,55 +151,56 @@ class KmsClient:
151
151
  Returns:
152
152
  Future[str]: the unique identifier of the key
153
153
  """
154
- def rotate_cover_crypt_attributes(
154
+ def rekey_cover_crypt_access_policy(
155
155
  self,
156
- attributes: List[Union[Attribute, str]],
156
+ access_policy: str,
157
157
  master_secret_key_identifier: UidOrTags,
158
158
  ) -> Future[Tuple[str, str]]:
159
- """Rotate the given policy attributes. This will rekey in the KMS:
160
- - the Master Keys
161
- - all User Decryption Keys that contain one of these attributes in their policy and are not rotated.
159
+ """Generate new keys associated to the given access policy in the master keys.
160
+ This will automatically refresh the corresponding user keys.
162
161
 
163
162
  Args:
164
- attributes (List[Union[Attribute, str]]): attributes to rotate e.g. ["Department::HR"]
165
- master_secret_key_identifier (Union[str, List[str])): master secret key referenced by its UID or a list of tags
163
+ - `access_policy` (str): describe the keys to renew
164
+ - `master_secret_key_identifier` (Union[str, List[str])): master secret key referenced by its UID or a list of tags
166
165
 
167
166
  Returns:
168
167
  Future[Tuple[str, str]]: (Public key UID, Master secret key UID)
169
168
  """
170
- async def clear_cover_crypt_attributes_rotations(
169
+ async def prune_cover_crypt_access_policy(
171
170
  self,
172
- attributes: List[Union[Attribute, str]],
171
+ access_policy: str,
173
172
  master_secret_key_identifier: UidOrTags,
174
173
  ) -> Tuple[str, str]:
175
174
  """
176
- Remove old rotations from the specified policy attributes.
177
-
178
- This will rekey in the KMS:
179
- - the Master Keys
180
- - all User Decryption Keys that contain one of these attributes in their policy.
181
-
175
+ Removes old keys associated to the access policy from the master keys.
176
+ This will automatically refresh the corresponding user keys.
177
+ This will permanently remove access to old ciphertexts.
178
+
182
179
  Args:
183
- attributes (List[Union[Attribute, str]): Attributes to rotate e.g. ["Department::HR"]
184
- master_secret_key_identifier (Union[str, List[str])): master secret key referenced by its UID or a list of tags
180
+ - `access_policy` (str): describe the keys to renew
181
+ - `master_secret_key_identifier` (Union[str, List[str])): master secret key referenced by its UID or a list of tags
185
182
 
186
183
  Returns:
187
184
  Tuple[str, str]: (Public key UID, Master secret key UID)
188
185
  """
189
186
  async def remove_cover_crypt_attribute(
190
187
  self,
191
- attribute: Union[Attribute, str],
188
+ attribute: str,
192
189
  master_secret_key_identifier: UidOrTags,
193
190
  ) -> Tuple[str, str]:
194
191
  """
195
192
  Remove a specific attribute from a keypair's policy.
193
+ Permanently removes the ability to use this attribute in both encryptions and decryptions.
194
+
195
+ Note that messages whose encryption policy does not contain any other attributes
196
+ belonging to the dimension of the deleted attribute will be lost.
196
197
 
197
198
  This will rekey in the KMS:
198
- - the Master Keys
199
- - all User Decryption Keys that contain one of these attributes in their policy.
199
+ - the master keys
200
+ - all user decryption keys that contain one of these attributes in their policy.
200
201
 
201
202
  Args:
202
- attributes (List[Union[Attribute, str]): Attributes to remove e.g. "Department::HR"
203
+ attributes (Union[Attribute, str]): Attributes to remove e.g. "Department::HR"
203
204
  master_secret_key_identifier (Union[str, List[str])): master secret key referenced by its UID or a list of tags
204
205
 
205
206
  Returns:
@@ -207,18 +208,18 @@ class KmsClient:
207
208
  """
208
209
  async def disable_cover_crypt_attribute(
209
210
  self,
210
- attribute: Union[Attribute, str],
211
+ attribute: str,
211
212
  master_secret_key_identifier: UidOrTags,
212
213
  ) -> Tuple[str, str]:
213
214
  """
214
215
  Disable a specific attribute from a keypair's policy.
216
+ Prevents the encryption of new messages for this attribute while keeping the ability to decrypt existing ciphertexts.
215
217
 
216
218
  This will rekey in the KMS:
217
- - the Master Keys
218
- - all User Decryption Keys that contain one of these attributes in their policy.
219
+ - the master keys
219
220
 
220
221
  Args:
221
- attributes (List[Union[Attribute, str]): Attributes to disable e.g. "Department::HR"
222
+ attributes (Union[Attribute, str]): Attributes to disable e.g. "Department::HR"
222
223
  master_secret_key_identifier (Union[str, List[str])): master secret key referenced by its UID or a list of tags
223
224
 
224
225
  Returns:
@@ -226,7 +227,7 @@ class KmsClient:
226
227
  """
227
228
  async def add_cover_crypt_attribute(
228
229
  self,
229
- attribute: Union[Attribute, str],
230
+ attribute: str,
230
231
  is_hybridized: bool,
231
232
  master_secret_key_identifier: UidOrTags,
232
233
  ) -> Tuple[str, str]:
@@ -234,11 +235,10 @@ class KmsClient:
234
235
  Add a specific attribute to a keypair's policy.
235
236
 
236
237
  This will rekey in the KMS:
237
- - the Master Keys
238
- - all User Decryption Keys that contain one of these attributes in their policy.
238
+ - the master keys
239
239
 
240
240
  Args:
241
- attributes (List[Union[Attribute, str]): Attributes to disable e.g. "Department::HR"
241
+ attributes (Union[Attribute, str]): Attributes to disable e.g. "Department::HR"
242
242
  is_hybridized (bool): hint for encryption
243
243
  master_secret_key_identifier (Union[str, List[str])): master secret key referenced by its UID or a list of tags
244
244
 
@@ -248,19 +248,15 @@ class KmsClient:
248
248
  """
249
249
  async def rename_cover_crypt_attribute(
250
250
  self,
251
- attribute: Union[Attribute, str],
251
+ attribute: str,
252
252
  new_name: str,
253
253
  master_secret_key_identifier: UidOrTags,
254
254
  ) -> Tuple[str, str]:
255
255
  """
256
256
  Add a specific attribute to a keypair's policy.
257
257
 
258
- This will rekey in the KMS:
259
- - the Master Keys
260
- - all User Decryption Keys that contain one of these attributes in their policy.
261
-
262
258
  Args:
263
- attributes (List[Union[Attribute, str]): Attributes to disable e.g. "Department::HR"
259
+ attributes (Union[Attribute, str]): Attributes to disable e.g. "Department::HR"
264
260
  new_name (str): the new name for the attribute
265
261
  master_secret_key_identifier (Union[str, List[str])): master secret key referenced by its UID or a list of tags
266
262
 
@@ -269,7 +265,7 @@ class KmsClient:
269
265
  """
270
266
  def create_cover_crypt_user_decryption_key(
271
267
  self,
272
- access_policy_str: str,
268
+ access_policy: str,
273
269
  master_secret_key_identifier: str,
274
270
  tags: Optional[str] = None,
275
271
  ) -> Future[str]:
@@ -277,7 +273,7 @@ class KmsClient:
277
273
  A new user secret key does NOT include to old (i.e. rotated) partitions.
278
274
 
279
275
  Args:
280
- access_policy_str (str): user access policy
276
+ access_policy(str): user access policy
281
277
  master_secret_key_identifier (str): master secret key UID
282
278
  tags (Optional[List[str]]): optional tags to use with the keys
283
279
 
@@ -289,7 +285,7 @@ class KmsClient:
289
285
  private_key: bytes,
290
286
  replace_existing: bool,
291
287
  link_master_private_key_id: str,
292
- access_policy_str: str,
288
+ access_policy: str,
293
289
  tags: Optional[List[str]] = None,
294
290
  is_wrapped: Optional[bool] = None,
295
291
  wrapping_password: Optional[str] = None,
@@ -301,7 +297,7 @@ class KmsClient:
301
297
  private_key (bytes): key bytes
302
298
  replace_existing (bool): set to true to replace an existing key with the same identifier
303
299
  link_master_private_key_id (str): id of the matching master private key
304
- access_policy_str (str): user access policy
300
+ access_policy(str): user access policy
305
301
  tags (Optional[List[str]]): tags associated to the key
306
302
  is_wrapped (bool): whether the key is wrapped
307
303
  wrapping_password (Optional[str]): password used to wrap the key
Binary file
@@ -1,6 +1,6 @@
1
- Metadata-Version: 2.1
1
+ Metadata-Version: 2.3
2
2
  Name: cosmian_kms
3
- Version: 4.12.0
3
+ Version: 4.13.1
4
4
  Classifier: Programming Language :: Rust
5
5
  Classifier: Programming Language :: Python :: Implementation :: CPython
6
6
  Classifier: Programming Language :: Python :: Implementation :: PyPy
@@ -0,0 +1,8 @@
1
+ cosmian_kms-4.13.1.dist-info/METADATA,sha256=qE7DwhcI0GgeIbPc8t2tlHHGXFKK6KUPakV_fbM4fPc,1037
2
+ cosmian_kms-4.13.1.dist-info/WHEEL,sha256=w7SWGRBKOTBmBbs8zq8adZ6B1VkNFmQek3CisucTsm8,104
3
+ cosmian_kms-4.13.1.dist-info/license_files/LICENSE.md,sha256=LfpyRX3ytu-bjM_tRWreUpT6uZPNKr9Aa_fHflEq7AM,2993
4
+ cosmian_kms/__init__.pyi,sha256=MfWAs80uIXnhOPDTEHyzYCy-NFk9uAiFCMOdbDPCSuI,15698
5
+ cosmian_kms/__init__.py,sha256=hFdRE02W0kEFxAj-F7jcOb91vgyojXlHWmhXKUDKl_U,352
6
+ cosmian_kms/py.typed,sha256=bWew9mHgMy8LqMu7RuqQXFXLBxh2CRx0dUbSx-3wE48,27
7
+ cosmian_kms/cosmian_kms.abi3.so,sha256=I65Mtuxi3MAXmKfVP9X4u8eb0RptqMufdMVqm6VwBXU,6517712
8
+ cosmian_kms-4.13.1.dist-info/RECORD,,
@@ -1,4 +1,4 @@
1
1
  Wheel-Version: 1.0
2
- Generator: maturin (1.4.0)
2
+ Generator: maturin (1.5.0)
3
3
  Root-Is-Purelib: false
4
4
  Tag: cp37-abi3-macosx_10_12_x86_64
@@ -1,8 +0,0 @@
1
- cosmian_kms-4.12.0.dist-info/METADATA,sha256=tpU9Rbg2Oi4Tq-0QQePk2D2qewCWegI4m2Ucq7243sM,1037
2
- cosmian_kms-4.12.0.dist-info/WHEEL,sha256=TpJSAkvDKe49rLSkU55RTzL6Acgm_KccVTJYx3xxiz8,104
3
- cosmian_kms-4.12.0.dist-info/license_files/LICENSE.md,sha256=LfpyRX3ytu-bjM_tRWreUpT6uZPNKr9Aa_fHflEq7AM,2993
4
- cosmian_kms/__init__.pyi,sha256=ZuHpvjGQ4hq34EMxwWeQ2YTk3t_sXayOh5_GB5pdIII,15914
5
- cosmian_kms/__init__.py,sha256=hFdRE02W0kEFxAj-F7jcOb91vgyojXlHWmhXKUDKl_U,352
6
- cosmian_kms/py.typed,sha256=bWew9mHgMy8LqMu7RuqQXFXLBxh2CRx0dUbSx-3wE48,27
7
- cosmian_kms/cosmian_kms.abi3.so,sha256=xsav9alUi6sLGMvf8VVY2CZEVy2n4Gq4CcElvsFZj4s,6435664
8
- cosmian_kms-4.12.0.dist-info/RECORD,,