Microsoft Corporation Key Vault Certificates Client Library for Python
—
Quality
Pending
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Efficiently browse and discover certificates with filtering, paging, and version management. List active certificates, deleted certificates, and certificate versions.
def list_properties_of_certificates(
*,
include_pending: Optional[bool] = None,
max_page_size: Optional[int] = None,
**kwargs: Any
) -> ItemPaged[CertificateProperties]:
"""List all certificates in the vault."""
def list_deleted_certificates(
*, max_page_size: Optional[int] = None, **kwargs: Any
) -> ItemPaged[DeletedCertificate]:
"""List soft-deleted certificates."""
def list_properties_of_certificate_versions(
certificate_name: str,
*, max_page_size: Optional[int] = None,
**kwargs: Any
) -> ItemPaged[CertificateProperties]:
"""List all versions of a certificate."""# List all certificates
for cert_props in client.list_properties_of_certificates():
print(f"Name: {cert_props.name}")
print(f"Expires: {cert_props.expires_on}")
print(f"Enabled: {cert_props.enabled}")
# List with paging
for cert_props in client.list_properties_of_certificates(max_page_size=10):
print(cert_props.name)
# List deleted certificates
for deleted_cert in client.list_deleted_certificates():
print(f"Deleted: {deleted_cert.name} on {deleted_cert.deleted_on}")Install with Tessl CLI
npx tessl i tessl/pypi-azure-keyvault-certificates