| 12
 3
 4
 5
 6
 7
 8
 9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 
 | # ------------------------------------
# Copyright (c) Microsoft Corporation.
# Licensed under the MIT License.
# ------------------------------------
import asyncio
import datetime
import os
from azure.keyvault.secrets.aio import SecretClient
from azure.identity.aio import DefaultAzureCredential
# ----------------------------------------------------------------------------------------------------------
# Prerequisites:
# 1. An Azure Key Vault (https://learn.microsoft.com/azure/key-vault/quick-create-cli)
#
# 2. azure-keyvault-secrets and azure-identity libraries (pip install these)
#
# 3. Set up your environment to use azure-identity's DefaultAzureCredential. For more information about how to configure
#    the DefaultAzureCredential, refer to https://aka.ms/azsdk/python/identity/docs#azure.identity.DefaultAzureCredential
#
# ----------------------------------------------------------------------------------------------------------
# Sample - demonstrates the basic CRUD operations on a vault(secret) resource for Azure Key Vault
#
# 1. Create a new secret (set_secret)
#
# 2. Get an existing secret (get_secret)
#
# 3. Update an existing secret's properties (update_secret_properties)
#
# 4. Delete a secret (delete_secret)
#
# ----------------------------------------------------------------------------------------------------------
async def run_sample():
    # Instantiate a secret client that will be used to call the service.
    # Here we use the DefaultAzureCredential, but any azure-identity credential can be used.
    VAULT_URL = os.environ["VAULT_URL"]
    credential = DefaultAzureCredential()
    client = SecretClient(vault_url=VAULT_URL, credential=credential)
    # Let's create a secret holding bank account credentials valid for 1 year.
    # if the secret already exists in the key vault, then a new version of the secret is created.
    print("\n.. Create Secret")
    expires_on = datetime.datetime.utcnow() + datetime.timedelta(days=365)
    secret = await client.set_secret("helloWorldSecretNameAsync", "helloWorldSecretValue", expires_on=expires_on)
    assert secret.name
    print(f"Secret with name '{secret.name}' created with value '{secret.value}'")
    print(f"Secret with name '{secret.name}' expires on '{secret.properties.expires_on}'")
    # Let's get the bank secret using its name
    print("\n.. Get a Secret by name")
    bank_secret = await client.get_secret(secret.name)
    assert bank_secret.properties.expires_on
    print(f"Secret with name '{bank_secret.name}' was found with value '{bank_secret.value}'.")
    # After one year, the bank account is still active, we need to update the expiry time of the secret.
    # The update method can be used to update the expiry attribute of the secret. It cannot be used to update
    # the value of the secret.
    print("\n.. Update a Secret by name")
    expires_on = bank_secret.properties.expires_on + datetime.timedelta(days=365)
    updated_secret_properties = await client.update_secret_properties(secret.name, expires_on=expires_on)
    print(
        f"Secret with name '{updated_secret_properties.name}' was updated on date "
        f"'{updated_secret_properties.updated_on}'"
    )
    print(
        f"Secret with name '{updated_secret_properties.name}' was updated to expire on "
        f"'{updated_secret_properties.expires_on}'"
    )
    # Bank forced a password update for security purposes. Let's change the value of the secret in the key vault.
    # To achieve this, we need to create a new version of the secret in the key vault. The update operation cannot
    # change the value of the secret.
    new_secret = await client.set_secret(secret.name, "newSecretValueAsync")
    print(f"Secret with name '{new_secret.name}' created with value '{new_secret.value}'")
    # The bank account was closed, need to delete its credentials from the Key Vault.
    print("\n.. Deleting Secret...")
    deleted_secret = await client.delete_secret(secret.name)
    print(f"Secret with name '{deleted_secret.name}' was deleted.")
    print("\nrun_sample done")
    await credential.close()
    await client.close()
if __name__ == "__main__":
    asyncio.run(run_sample())
 |