cosmian-kms 4.12.0__cp37-abi3-win_amd64.whl → 4.13.0__cp37-abi3-win_amd64.whl
Sign up to get free protection for your applications and to get access to all the features.
- cosmian_kms/__init__.pyi +35 -39
- cosmian_kms/cosmian_kms.pyd +0 -0
- {cosmian_kms-4.12.0.dist-info → cosmian_kms-4.13.0.dist-info}/METADATA +1 -1
- cosmian_kms-4.13.0.dist-info/RECORD +8 -0
- {cosmian_kms-4.12.0.dist-info → cosmian_kms-4.13.0.dist-info}/WHEEL +1 -1
- cosmian_kms-4.12.0.dist-info/RECORD +0 -8
- {cosmian_kms-4.12.0.dist-info → cosmian_kms-4.13.0.dist-info}/license_files/LICENSE.md +0 -0
cosmian_kms/__init__.pyi
CHANGED
@@ -151,55 +151,56 @@ class KmsClient:
|
|
151
151
|
Returns:
|
152
152
|
Future[str]: the unique identifier of the key
|
153
153
|
"""
|
154
|
-
def
|
154
|
+
def rekey_cover_crypt_access_policy(
|
155
155
|
self,
|
156
|
-
|
156
|
+
access_policy: str,
|
157
157
|
master_secret_key_identifier: UidOrTags,
|
158
158
|
) -> Future[Tuple[str, str]]:
|
159
|
-
"""
|
160
|
-
|
161
|
-
- all User Decryption Keys that contain one of these attributes in their policy and are not rotated.
|
159
|
+
"""Generate new keys associated to the given access policy in the master keys.
|
160
|
+
This will automatically refresh the corresponding user keys.
|
162
161
|
|
163
162
|
Args:
|
164
|
-
|
165
|
-
master_secret_key_identifier (Union[str, List[str])): master secret key referenced by its UID or a list of tags
|
163
|
+
- `access_policy` (str): describe the keys to renew
|
164
|
+
- `master_secret_key_identifier` (Union[str, List[str])): master secret key referenced by its UID or a list of tags
|
166
165
|
|
167
166
|
Returns:
|
168
167
|
Future[Tuple[str, str]]: (Public key UID, Master secret key UID)
|
169
168
|
"""
|
170
|
-
async def
|
169
|
+
async def prune_cover_crypt_access_policy(
|
171
170
|
self,
|
172
|
-
|
171
|
+
access_policy: str,
|
173
172
|
master_secret_key_identifier: UidOrTags,
|
174
173
|
) -> Tuple[str, str]:
|
175
174
|
"""
|
176
|
-
|
177
|
-
|
178
|
-
This will
|
179
|
-
|
180
|
-
- all User Decryption Keys that contain one of these attributes in their policy.
|
181
|
-
|
175
|
+
Removes old keys associated to the access policy from the master keys.
|
176
|
+
This will automatically refresh the corresponding user keys.
|
177
|
+
This will permanently remove access to old ciphertexts.
|
178
|
+
|
182
179
|
Args:
|
183
|
-
|
184
|
-
master_secret_key_identifier (Union[str, List[str])): master secret key referenced by its UID or a list of tags
|
180
|
+
- `access_policy` (str): describe the keys to renew
|
181
|
+
- `master_secret_key_identifier` (Union[str, List[str])): master secret key referenced by its UID or a list of tags
|
185
182
|
|
186
183
|
Returns:
|
187
184
|
Tuple[str, str]: (Public key UID, Master secret key UID)
|
188
185
|
"""
|
189
186
|
async def remove_cover_crypt_attribute(
|
190
187
|
self,
|
191
|
-
attribute:
|
188
|
+
attribute: str,
|
192
189
|
master_secret_key_identifier: UidOrTags,
|
193
190
|
) -> Tuple[str, str]:
|
194
191
|
"""
|
195
192
|
Remove a specific attribute from a keypair's policy.
|
193
|
+
Permanently removes the ability to use this attribute in both encryptions and decryptions.
|
194
|
+
|
195
|
+
Note that messages whose encryption policy does not contain any other attributes
|
196
|
+
belonging to the dimension of the deleted attribute will be lost.
|
196
197
|
|
197
198
|
This will rekey in the KMS:
|
198
|
-
- the
|
199
|
-
- all
|
199
|
+
- the master keys
|
200
|
+
- all user decryption keys that contain one of these attributes in their policy.
|
200
201
|
|
201
202
|
Args:
|
202
|
-
attributes (
|
203
|
+
attributes (Union[Attribute, str]): Attributes to remove e.g. "Department::HR"
|
203
204
|
master_secret_key_identifier (Union[str, List[str])): master secret key referenced by its UID or a list of tags
|
204
205
|
|
205
206
|
Returns:
|
@@ -207,18 +208,18 @@ class KmsClient:
|
|
207
208
|
"""
|
208
209
|
async def disable_cover_crypt_attribute(
|
209
210
|
self,
|
210
|
-
attribute:
|
211
|
+
attribute: str,
|
211
212
|
master_secret_key_identifier: UidOrTags,
|
212
213
|
) -> Tuple[str, str]:
|
213
214
|
"""
|
214
215
|
Disable a specific attribute from a keypair's policy.
|
216
|
+
Prevents the encryption of new messages for this attribute while keeping the ability to decrypt existing ciphertexts.
|
215
217
|
|
216
218
|
This will rekey in the KMS:
|
217
|
-
- the
|
218
|
-
- all User Decryption Keys that contain one of these attributes in their policy.
|
219
|
+
- the master keys
|
219
220
|
|
220
221
|
Args:
|
221
|
-
attributes (
|
222
|
+
attributes (Union[Attribute, str]): Attributes to disable e.g. "Department::HR"
|
222
223
|
master_secret_key_identifier (Union[str, List[str])): master secret key referenced by its UID or a list of tags
|
223
224
|
|
224
225
|
Returns:
|
@@ -226,7 +227,7 @@ class KmsClient:
|
|
226
227
|
"""
|
227
228
|
async def add_cover_crypt_attribute(
|
228
229
|
self,
|
229
|
-
attribute:
|
230
|
+
attribute: str,
|
230
231
|
is_hybridized: bool,
|
231
232
|
master_secret_key_identifier: UidOrTags,
|
232
233
|
) -> Tuple[str, str]:
|
@@ -234,11 +235,10 @@ class KmsClient:
|
|
234
235
|
Add a specific attribute to a keypair's policy.
|
235
236
|
|
236
237
|
This will rekey in the KMS:
|
237
|
-
- the
|
238
|
-
- all User Decryption Keys that contain one of these attributes in their policy.
|
238
|
+
- the master keys
|
239
239
|
|
240
240
|
Args:
|
241
|
-
attributes (
|
241
|
+
attributes (Union[Attribute, str]): Attributes to disable e.g. "Department::HR"
|
242
242
|
is_hybridized (bool): hint for encryption
|
243
243
|
master_secret_key_identifier (Union[str, List[str])): master secret key referenced by its UID or a list of tags
|
244
244
|
|
@@ -248,19 +248,15 @@ class KmsClient:
|
|
248
248
|
"""
|
249
249
|
async def rename_cover_crypt_attribute(
|
250
250
|
self,
|
251
|
-
attribute:
|
251
|
+
attribute: str,
|
252
252
|
new_name: str,
|
253
253
|
master_secret_key_identifier: UidOrTags,
|
254
254
|
) -> Tuple[str, str]:
|
255
255
|
"""
|
256
256
|
Add a specific attribute to a keypair's policy.
|
257
257
|
|
258
|
-
This will rekey in the KMS:
|
259
|
-
- the Master Keys
|
260
|
-
- all User Decryption Keys that contain one of these attributes in their policy.
|
261
|
-
|
262
258
|
Args:
|
263
|
-
attributes (
|
259
|
+
attributes (Union[Attribute, str]): Attributes to disable e.g. "Department::HR"
|
264
260
|
new_name (str): the new name for the attribute
|
265
261
|
master_secret_key_identifier (Union[str, List[str])): master secret key referenced by its UID or a list of tags
|
266
262
|
|
@@ -269,7 +265,7 @@ class KmsClient:
|
|
269
265
|
"""
|
270
266
|
def create_cover_crypt_user_decryption_key(
|
271
267
|
self,
|
272
|
-
|
268
|
+
access_policy: str,
|
273
269
|
master_secret_key_identifier: str,
|
274
270
|
tags: Optional[str] = None,
|
275
271
|
) -> Future[str]:
|
@@ -277,7 +273,7 @@ class KmsClient:
|
|
277
273
|
A new user secret key does NOT include to old (i.e. rotated) partitions.
|
278
274
|
|
279
275
|
Args:
|
280
|
-
|
276
|
+
access_policy(str): user access policy
|
281
277
|
master_secret_key_identifier (str): master secret key UID
|
282
278
|
tags (Optional[List[str]]): optional tags to use with the keys
|
283
279
|
|
@@ -289,7 +285,7 @@ class KmsClient:
|
|
289
285
|
private_key: bytes,
|
290
286
|
replace_existing: bool,
|
291
287
|
link_master_private_key_id: str,
|
292
|
-
|
288
|
+
access_policy: str,
|
293
289
|
tags: Optional[List[str]] = None,
|
294
290
|
is_wrapped: Optional[bool] = None,
|
295
291
|
wrapping_password: Optional[str] = None,
|
@@ -301,7 +297,7 @@ class KmsClient:
|
|
301
297
|
private_key (bytes): key bytes
|
302
298
|
replace_existing (bool): set to true to replace an existing key with the same identifier
|
303
299
|
link_master_private_key_id (str): id of the matching master private key
|
304
|
-
|
300
|
+
access_policy(str): user access policy
|
305
301
|
tags (Optional[List[str]]): tags associated to the key
|
306
302
|
is_wrapped (bool): whether the key is wrapped
|
307
303
|
wrapping_password (Optional[str]): password used to wrap the key
|
cosmian_kms/cosmian_kms.pyd
CHANGED
Binary file
|
@@ -0,0 +1,8 @@
|
|
1
|
+
cosmian_kms-4.13.0.dist-info/METADATA,sha256=RKAVCBHYCWj48tqo8km3kfFQpH-0T2N-vP2JymNYmBg,1037
|
2
|
+
cosmian_kms-4.13.0.dist-info/WHEEL,sha256=TZt2KSIVxFBqGJ3Nlzs-Ax5C_okeQ7lJKl6eUhy0Us4,94
|
3
|
+
cosmian_kms-4.13.0.dist-info/license_files/LICENSE.md,sha256=LfpyRX3ytu-bjM_tRWreUpT6uZPNKr9Aa_fHflEq7AM,2993
|
4
|
+
cosmian_kms/__init__.py,sha256=hFdRE02W0kEFxAj-F7jcOb91vgyojXlHWmhXKUDKl_U,352
|
5
|
+
cosmian_kms/__init__.pyi,sha256=MfWAs80uIXnhOPDTEHyzYCy-NFk9uAiFCMOdbDPCSuI,15698
|
6
|
+
cosmian_kms/py.typed,sha256=bWew9mHgMy8LqMu7RuqQXFXLBxh2CRx0dUbSx-3wE48,27
|
7
|
+
cosmian_kms/cosmian_kms.pyd,sha256=xaYUxFF33yTwx4gmNpI2R6eF6MzpexKc6EhETQ7zN80,9497600
|
8
|
+
cosmian_kms-4.13.0.dist-info/RECORD,,
|
@@ -1,8 +0,0 @@
|
|
1
|
-
cosmian_kms-4.12.0.dist-info/METADATA,sha256=tpU9Rbg2Oi4Tq-0QQePk2D2qewCWegI4m2Ucq7243sM,1037
|
2
|
-
cosmian_kms-4.12.0.dist-info/WHEEL,sha256=UkiIbgdHMLHW2gq5sK0KIz7BWr-fIhJ0YDadI2YbUjg,94
|
3
|
-
cosmian_kms-4.12.0.dist-info/license_files/LICENSE.md,sha256=LfpyRX3ytu-bjM_tRWreUpT6uZPNKr9Aa_fHflEq7AM,2993
|
4
|
-
cosmian_kms/__init__.pyi,sha256=ZuHpvjGQ4hq34EMxwWeQ2YTk3t_sXayOh5_GB5pdIII,15914
|
5
|
-
cosmian_kms/py.typed,sha256=bWew9mHgMy8LqMu7RuqQXFXLBxh2CRx0dUbSx-3wE48,27
|
6
|
-
cosmian_kms/__init__.py,sha256=hFdRE02W0kEFxAj-F7jcOb91vgyojXlHWmhXKUDKl_U,352
|
7
|
-
cosmian_kms/cosmian_kms.pyd,sha256=q7SBqBw-iYuiDNlbFPeMlDh-M72wIWmRBAC_74Ck5-s,9390592
|
8
|
-
cosmian_kms-4.12.0.dist-info/RECORD,,
|
File without changes
|