-
Notifications
You must be signed in to change notification settings - Fork 2.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Respect nbf and exp in local encrypt/wrap operations #11953
Conversation
return | ||
|
||
now = datetime.now(_UTC) | ||
if (nbf and exp) and not nbf <= now <= exp: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
just one quick question: are you sure that you can use a key on its expiration date? Makes sense to me, just want to clarify because it can get a bit confusing given an expiration date whether you can't use it on that date, or after that date
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As long as your datetime
has second (or lower) resolution, it really wouldn't matter much.
…into regenerate_keys * 'master' of https://github.com/Azure/azure-sdk-for-python: (26 commits) [formrecognizer] update formrecognizer links to new aka.ms naming (Azure#12079) changes in samples tests (Azure#12090) readme & sample updates (Azure#12095) Update Key Vault minimum azure-core to 1.4.0 (Azure#12074) [formrecognizer] test parity with other languages (Azure#12059) syncing missing changelog items (Azure#12089) updating doc references (Azure#12086) reserve 1 more version for storage and network (Azure#12082) Fix format in swagger_to_sdk_config.json (Azure#12083) modify changelog (Azure#12071) Update Cosmos CODEOWNERS (Azure#11500) Regenerate LUIS (Azure#12064) Enable track2 SDK Automation config on master branch (Azure#11654) Update KeyVaultPreparer with track 2 mgmt changes (Azure#12060) Increment version for storage releases (Azure#12034) AzureCliCredential correctly invokes /bin/sh (Azure#12056) [formrecognizer] reduce time for recorded tests runs (Azure#11970) disable some bandit warnings (Azure#12054) Respect nbf and exp in local encrypt/wrap operations (Azure#11953) add bug_bash template (Azure#12045) ...
…into regenerate_certs * 'master' of https://github.com/Azure/azure-sdk-for-python: (21 commits) [formrecognizer] update formrecognizer links to new aka.ms naming (Azure#12079) changes in samples tests (Azure#12090) readme & sample updates (Azure#12095) Update Key Vault minimum azure-core to 1.4.0 (Azure#12074) [formrecognizer] test parity with other languages (Azure#12059) syncing missing changelog items (Azure#12089) updating doc references (Azure#12086) reserve 1 more version for storage and network (Azure#12082) Fix format in swagger_to_sdk_config.json (Azure#12083) modify changelog (Azure#12071) Update Cosmos CODEOWNERS (Azure#11500) Regenerate LUIS (Azure#12064) Enable track2 SDK Automation config on master branch (Azure#11654) Update KeyVaultPreparer with track 2 mgmt changes (Azure#12060) Increment version for storage releases (Azure#12034) AzureCliCredential correctly invokes /bin/sh (Azure#12056) [formrecognizer] reduce time for recorded tests runs (Azure#11970) disable some bandit warnings (Azure#12054) Respect nbf and exp in local encrypt/wrap operations (Azure#11953) add bug_bash template (Azure#12045) ...
When encrypting locally,
CryptographyClient
should enforce key validity periods with Key Vault's semantics to ensure that a user can't encrypt something Key Vault would refuse to decrypt. This PR adds that enforcement to encrypt and wrap operations. It should apply to sign as well, butCryptographyClient
currently doesn't sign locally.