azure.keyvault.secrets.aio package¶
- class azure.keyvault.secrets.aio.SecretClient(vault_url: str, credential: AsyncTokenCredential, **kwargs: Any)[source]¶
A high-level asynchronous interface for managing a vault’s secrets.
- Parameters:
vault_url (str) – URL of the vault the client will access. This is also called the vault’s “DNS Name”. You should validate that this URL references a valid Key Vault resource. See https://aka.ms/azsdk/blog/vault-uri for details.
credential (AsyncTokenCredential) – An object which can provide an access token for the vault, such as a credential from
azure.identity.aio
- Keyword Arguments:
api_version (ApiVersion or str) – Version of the service API to use. Defaults to the most recent.
verify_challenge_resource (bool) – Whether to verify the authentication challenge resource matches the Key Vault domain. Defaults to True.
Example
from azure.identity.aio import DefaultAzureCredential from azure.keyvault.secrets.aio import SecretClient # Create a SecretClient using default Azure credentials credential = DefaultAzureCredential() secret_client = SecretClient(vault_url, credential) # the client and credential should be closed when no longer needed # (both are also async context managers) await secret_client.close() await credential.close()
- async backup_secret(name: str, **kwargs: Any) bytes [source]¶
Back up a secret in a protected form useable only by Azure Key Vault. Requires secrets/backup permission.
- Parameters:
name (str) – Name of the secret to back up
- Returns:
The backup result, in a protected bytes format that can only be used by Azure Key Vault.
- Return type:
- Raises:
ResourceNotFoundError or HttpResponseError – the former if the secret doesn’t exist; the latter for other errors
Example
# backup secret secret_backup = await secret_client.backup_secret(secret_name) # returns the raw bytes of the backed up secret print(secret_backup)
- async close() None ¶
Close sockets opened by the client.
Calling this method is unnecessary when using the client as a context manager.
- async delete_secret(name: str, **kwargs: Any) DeletedSecret [source]¶
Delete all versions of a secret. Requires secrets/delete permission.
If the vault has soft-delete enabled, deletion may take several seconds to complete.
- Parameters:
name (str) – Name of the secret to delete.
- Returns:
The deleted secret.
- Return type:
- Raises:
ResourceNotFoundError or HttpResponseError – the former if the secret doesn’t exist; the latter for other errors
Example
# delete a secret deleted_secret = await secret_client.delete_secret(secret_name) print(deleted_secret.name) # if the vault has soft-delete enabled, the secret's deleted_date, # scheduled purge date and recovery id are set print(deleted_secret.deleted_date) print(deleted_secret.scheduled_purge_date) print(deleted_secret.recovery_id)
- async get_deleted_secret(name: str, **kwargs: Any) DeletedSecret [source]¶
Get a deleted secret. Possible only in vaults with soft-delete enabled. Requires secrets/get permission.
- Parameters:
name (str) – Name of the deleted secret
- Returns:
The deleted secret.
- Return type:
- Raises:
ResourceNotFoundError or HttpResponseError – the former if the deleted secret doesn’t exist; the latter for other errors
Example
# gets a deleted secret (requires soft-delete enabled for the vault) deleted_secret = await secret_client.get_deleted_secret(secret_name) print(deleted_secret.name)
- async get_secret(name: str, version: str | None = None, **kwargs: Any) KeyVaultSecret [source]¶
Get a secret. Requires the secrets/get permission.
- Parameters:
- Returns:
The fetched secret.
- Return type:
- Raises:
ResourceNotFoundError or HttpResponseError – the former if the secret doesn’t exist; the latter for other errors
Example
# get the latest version of a secret secret = await secret_client.get_secret(secret_name) # alternatively, specify a version secret = await secret_client.get_secret(secret_name, secret_version) print(secret.id) print(secret.name) print(secret.properties.version) print(secret.properties.vault_url)
- list_deleted_secrets(**kwargs: Any) AsyncItemPaged[DeletedSecret] [source]¶
Lists all deleted secrets. Possible only in vaults with soft-delete enabled.
Requires secrets/list permission.
- Returns:
An iterator of deleted secrets, excluding their values
- Return type:
Example
# gets a list of deleted secrets (requires soft-delete enabled for the vault) deleted_secrets = secret_client.list_deleted_secrets() async for secret in deleted_secrets: # the list doesn't include values or versions of the deleted secrets print(secret.id) print(secret.name) print(secret.scheduled_purge_date) print(secret.recovery_id) print(secret.deleted_date)
- list_properties_of_secret_versions(name: str, **kwargs: Any) AsyncItemPaged[SecretProperties] [source]¶
List properties of all versions of a secret, excluding their values. Requires secrets/list permission.
List items don’t include secret values. Use
get_secret()
to get a secret’s value.- Parameters:
name (str) – Name of the secret
- Returns:
An iterator of secrets, excluding their values
- Return type:
Example
# gets a list of all versions of a secret secret_versions = secret_client.list_properties_of_secret_versions("secret-name") async for secret in secret_versions: # the list doesn't include the versions' values print(secret.id) print(secret.enabled) print(secret.updated_on)
- list_properties_of_secrets(**kwargs: Any) AsyncItemPaged[SecretProperties] [source]¶
List identifiers and attributes of all secrets in the vault. Requires secrets/list permission.
List items don’t include secret values. Use
get_secret()
to get a secret’s value.- Returns:
An iterator of secrets
- Return type:
Example
# gets a list of secrets in the vault secrets = secret_client.list_properties_of_secrets() async for secret in secrets: # the list doesn't include values or versions of the secrets print(secret.id) print(secret.name) print(secret.enabled)
- async purge_deleted_secret(name: str, **kwargs: Any) None [source]¶
Permanently delete a deleted secret. Possible only in vaults with soft-delete enabled.
Performs an irreversible deletion of the specified secret, without possibility for recovery. The operation is not available if the
recovery_level
does not specify ‘Purgeable’. This method is only necessary for purging a secret before itsscheduled_purge_date
.Requires secrets/purge permission.
- Parameters:
name (str) – Name of the deleted secret to purge
- Returns:
None
- Raises:
Example
# if the vault has soft-delete enabled, purge permanently deletes the secret # (with soft-delete disabled, delete_secret is permanent) await secret_client.purge_deleted_secret("secret-name")
- async recover_deleted_secret(name: str, **kwargs: Any) SecretProperties [source]¶
Recover a deleted secret to its latest version. This is possible only in vaults with soft-delete enabled.
Requires the secrets/recover permission. If the vault does not have soft-delete enabled,
delete_secret()
is permanent, and this method will raise an error. Attempting to recover a non-deleted secret will also raise an error.- Parameters:
name (str) – Name of the deleted secret to recover
- Returns:
The recovered secret’s properties.
- Return type:
- Raises:
Example
# recover deleted secret to the latest version recovered_secret = await secret_client.recover_deleted_secret(secret_name) print(recovered_secret.id) print(recovered_secret.name)
- async restore_secret_backup(backup: bytes, **kwargs: Any) SecretProperties [source]¶
Restore a backed up secret. Requires the secrets/restore permission.
- Parameters:
backup (bytes) – A secret backup as returned by
backup_secret()
- Returns:
The restored secret
- Return type:
- Raises:
ResourceExistsError or HttpResponseError – the former if the secret’s name is already in use; the latter for other errors
Example
# restores a backed up secret restored_secret = await secret_client.restore_secret_backup(secret_backup) print(restored_secret.id) print(restored_secret.version)
- async send_request(request: HttpRequest, *, stream: bool = False, **kwargs: Any) Awaitable[AsyncHttpResponse] ¶
Runs a network request using the client’s existing pipeline.
The request URL can be relative to the vault URL. The service API version used for the request is the same as the client’s unless otherwise specified. This method does not raise if the response is an error; to raise an exception, call raise_for_status() on the returned response object. For more information about how to send custom requests with this method, see https://aka.ms/azsdk/dpcodegen/python/send_request.
- Parameters:
request (HttpRequest) – The network request you want to make.
- Keyword Arguments:
stream (bool) – Whether the response payload will be streamed. Defaults to False.
- Returns:
The response of your network call. Does not do error handling on your response.
- Return type:
- async set_secret(name: str, value: str, *, enabled: bool | None = None, tags: Dict[str, str] | None = None, content_type: str | None = None, not_before: datetime | None = None, expires_on: datetime | None = None, **kwargs: Any) KeyVaultSecret [source]¶
Set a secret value. If name is in use, create a new version of the secret. If not, create a new secret.
Requires secrets/set permission.
- Parameters:
- Keyword Arguments:
enabled (bool) – Whether the secret is enabled for use.
tags (Dict[str, str] or None) – Application specific metadata in the form of key-value pairs.
content_type (str) – An arbitrary string indicating the type of the secret, e.g. ‘password’
not_before (datetime) – Not before date of the secret in UTC
expires_on (datetime) – Expiry date of the secret in UTC
- Returns:
The created or updated secret.
- Return type:
- Raises:
Example
from dateutil import parser as date_parse expires_on = date_parse.parse("2050-02-02T08:00:00.000Z") async with secret_client: # create a secret, setting optional arguments secret = await secret_client.set_secret(secret_name, "secret-value", enabled=True, expires_on=expires_on) print(secret.id) print(secret.name) print(secret.properties.enabled) print(secret.properties.expires_on)
- async update_secret_properties(name: str, version: str | None = None, *, enabled: bool | None = None, tags: Dict[str, str] | None = None, content_type: str | None = None, not_before: datetime | None = None, expires_on: datetime | None = None, **kwargs: Any) SecretProperties [source]¶
Update properties of a secret other than its value. Requires secrets/set permission.
This method updates properties of the secret, such as whether it’s enabled, but can’t change the secret’s value. Use
set_secret()
to change the secret’s value.- Parameters:
- Keyword Arguments:
enabled (bool) – Whether the secret is enabled for use.
tags (Dict[str, str] or None) – Application specific metadata in the form of key-value pairs.
content_type (str) – An arbitrary string indicating the type of the secret, e.g. ‘password’
not_before (datetime) – Not before date of the secret in UTC
expires_on (datetime) – Expiry date of the secret in UTC
- Returns:
The updated secret properties.
- Return type:
- Raises:
ResourceNotFoundError or HttpResponseError – the former if the secret doesn’t exist; the latter for other errors
Example
# update attributes of an existing secret content_type = "text/plain" tags = {"foo": "updated tag"} updated_secret_properties = await secret_client.update_secret_properties( secret_name, content_type=content_type, tags=tags ) print(updated_secret_properties.version) print(updated_secret_properties.updated_on) print(updated_secret_properties.content_type) print(updated_secret_properties.tags)