def run_sample(): # Instantiate a key client that will be used to call the service. # Notice that the client is using default Azure credentials. # To make default credentials work, ensure that environment variables 'AZURE_CLIENT_ID', # 'AZURE_CLIENT_SECRET' and 'AZURE_TENANT_ID' are set with the service principal credentials. VAULT_URL = os.environ["VAULT_URL"] credential = DefaultAzureCredential() client = KeyClient(vault_url=VAULT_URL, credential=credential) try: # Let's create keys with RSA and EC type. If the key # already exists in the Key Vault, then a new version of the key is created. print("\n1. Create Key") rsa_key = client.create_rsa_key("rsaKeyName", hsm=False) ec_key = client.create_ec_key("ecKeyName", hsm=False) print("Key with name '{0}' was created of type '{1}'.".format(rsa_key.name, rsa_key.key_material.kty)) print("Key with name '{0}' was created of type '{1}'.".format(ec_key.name, ec_key.key_material.kty)) # The ec key is no longer needed. Need to delete it from the Key Vault. print("\n2. Delete a Key") key = client.delete_key(rsa_key.name) time.sleep(20) print("Key with name '{0}' was deleted on date {1}.".format(key.name, key.deleted_date)) # We accidentally deleted the rsa key. Let's recover it. # A deleted key can only be recovered if the Key Vault is soft-delete enabled. print("\n3. Recover Deleted Key") recovered_key = client.recover_deleted_key(rsa_key.name) print("Recovered Key with name '{0}'.".format(recovered_key.name)) # Let's delete ec key now. # If the keyvault is soft-delete enabled, then for permanent deletion deleted key needs to be purged. client.delete_key(ec_key.name) # To ensure key is deleted on the server side. print("\nDeleting EC Key...") time.sleep(20) # To ensure permanent deletion, we might need to purge the key. print("\n4. Purge Deleted Key") client.purge_deleted_key(ec_key.name) print("EC Key has been permanently deleted.") except HttpResponseError as e: if "(NotSupported)" in e.message: print("\n{0} Please enable soft delete on Key Vault to perform this operation.".format(e.message)) else: print("\nrun_sample has caught an error. {0}".format(e.message)) finally: print("\nrun_sample done")
rsa_key = client.create_rsa_key("rsaKeyName", hsm=False) ec_key = client.create_ec_key("ecKeyName", hsm=False) print("Created key '{0}' of type '{1}'.".format(rsa_key.name, rsa_key.key_material.kty)) print("Created key '{0}' of type '{1}'.".format(ec_key.name, ec_key.key_material.kty)) print("\n.. Delete the keys") for key_name in (ec_key.name, rsa_key.name): deleted_key = client.delete_key(key_name) print("Deleted key '{0}'".format(deleted_key.name)) time.sleep(20) print("\n.. Recover a deleted key") recovered_key = client.recover_deleted_key(rsa_key.name) print("Recovered key '{0}'".format(recovered_key.name)) # deleting the recovered key so it doesn't outlast this script time.sleep(20) client.delete_key(recovered_key.name) time.sleep(20) print("\n.. Purge keys") for key_name in (ec_key.name, rsa_key.name): client.purge_deleted_key(key_name) print("Purged '{}'".format(key_name)) except HttpResponseError as e: if "(NotSupported)" in e.message: print(