aissemble-extensions-encryption-vault-python


Nameaissemble-extensions-encryption-vault-python JSON
Version 1.10.0 PyPI version JSON
download
home_pageNone
SummaryVault data encryption classes (python)
upload_time2024-11-20 01:14:56
maintainerNone
docs_urlNone
authoraiSSEMBLE Baseline Community
requires_python>=3.8
licenseNone
keywords
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            ## aiSSEMBLE™ Extensions Data Encryption Vault Python

[![PyPI](https://img.shields.io/pypi/v/aissemble-extensions-encryption-vault-python?logo=python&logoColor=gold)](https://pypi.org/project/aissemble-extensions-encryption-vault-python/)
![PyPI - Python Version](https://img.shields.io/pypi/pyversions/aissemble-extensions-encryption-vault-python?logo=python&logoColor=gold)
![PyPI - Wheel](https://img.shields.io/pypi/wheel/aissemble-extensions-encryption-vault-python?logo=python&logoColor=gold)

This module provides a package for encrypting Python based pipeline data.  There are multiple encryption algorithms
available.  Each with their own strengths and weaknesses as outlined below.  

| Strategy                      | Description                                                                                                                                                                                                                                                                                                                                   |
|-------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| VaultRemoteEncryptionStrategy | Leverages the Hashicorp Vault secrets as a service capabilities.  This is a highly recommended strategy given it follows best practices and has the advantage of a large developer base working to secure the service.                                                                                                                        |
| VaultLocalEncryptionStrategy  | Leverages the Vault service to provide encryption keys (key rotation and secure storage) but allows for local encryption.  This is a good option if you have to encrypt large data objects.  It can also provide a performance boost over remote Vault encryption given there is no need for a roundtrip to the server for each data element. |
| AesCbcEncryptionStrategy      | A good basic 128 bit encryption strategy.  To use this you only need to supply a single encryption key in the encrypt.properties file (128 bit or 16 character).  This algorithm works well, but is less efficient than the AES GCM algorithm.                                                                                                |
| AesGcm96EncryptionStrategy    | This is a good strategy for most encryption needs.  It is efficient and strong against most attacks.  You can optionally use an encryption key retrieved from the Vault service with this strategy.                                                                                                                                           |


The following example illustrates how to perform encryption.

1. Example usage
    - Add the following to your code
    #### VaultRemoteEncryptionStrategy
    ```         
    # Uses remote Vault encryption
    from aissemble_encrypt.vault_remote_encryption_strategy import VaultRemoteEncryptionStrategy

    vault_remote = VaultRemoteEncryptionStrategy()

    # encrypt plain text data using Vault
    encrypted_value = vault_remote.encrypt('SOME PLAIN TEXT')

    # decrypt cipher text data using Vault
    decrypted_value = vault_remote.decrypt(encrypted_value)
    ```         
 
    _NOTE: If you are encrypting your data through a User Defined Function (udf) in PySpark you need to use
           the VaultLocalEncryptionStrategy (see below).  Currently the remote version causes threading issues.  This issue will
           likely be resolved in a future update to the Hashicorp Vault client_
    #### VaultLocalEncryptionStrategy
    ```
    # Uses an encryption key retrieved from the Vault server, but performs the encryption locally.
    from aissemble_encrypt.vault_local_encryption_strategy import VaultLocalEncryptionStrategy
    
    vault_local = VaultLocalEncryptionStrategy()

    # encrypt plain text data using local Vault
    encrypted_value = vault_local.encrypt('SOME PLAIN TEXT')

    # decrypt cipher text data using local Vault
    decrypted_value = vault_local.decrypt(encrypted_value)
    ```

    #### AesCbcEncryptionStrategy
    ```         
    # Uses the AES CBC encryption
    from aissemble_encrypt.aes_cbc_encryption_strategy import AesCbcEncryptionStrategy

    aes_cbc = AesCbcEncryptionStrategy()

    # encrypt plain text data using AES CBC
    encrypted_value = aes_cbc.encrypt('SOME PLAIN TEXT')

    # decrypt cipher text data using AES CBC
    decrypted_value = aes_cbc.decrypt(encrypted_value)
    ```   

    #### AesGcm96EncryptionStrategy
    ```         
    # AES GCM encryption with a 96 bit initialization vector (same algorithm as Vault)
    from aissemble_encrypt.aes_gcm_96_encryption_strategy import AesGcm96EncryptionStrategy

    aes_gcm_96 = AesGcm96EncryptionStrategy()

    # encrypt plain text data using AES GCM
    encrypted_value = aes_gcm_96.encrypt('SOME PLAIN TEXT')

    # decrypt cipher text data using AES CBC
    decrypted_value = aes_gcm_96.decrypt(encrypted_value)
    ```
## AISSEMBLE Data Encryption

This package includes one security client for calling the "Secrets as a Service" encryption service.

### Vault encryption
See the extensions-encryption [README](../../extensions-encryption/README.md#vault-encryption) for more information on how to configure Vault encryption.

            

Raw data

            {
    "_id": null,
    "home_page": null,
    "name": "aissemble-extensions-encryption-vault-python",
    "maintainer": null,
    "docs_url": null,
    "requires_python": ">=3.8",
    "maintainer_email": null,
    "keywords": null,
    "author": "aiSSEMBLE Baseline Community",
    "author_email": "aissemble@bah.com",
    "download_url": "https://files.pythonhosted.org/packages/88/f6/c0dde90f30929cc2d3c6e075dff4b1748243030e9decb796ea90c85260dd/aissemble_extensions_encryption_vault_python-1.10.0.tar.gz",
    "platform": null,
    "description": "## aiSSEMBLE™ Extensions Data Encryption Vault Python\n\n[![PyPI](https://img.shields.io/pypi/v/aissemble-extensions-encryption-vault-python?logo=python&logoColor=gold)](https://pypi.org/project/aissemble-extensions-encryption-vault-python/)\n![PyPI - Python Version](https://img.shields.io/pypi/pyversions/aissemble-extensions-encryption-vault-python?logo=python&logoColor=gold)\n![PyPI - Wheel](https://img.shields.io/pypi/wheel/aissemble-extensions-encryption-vault-python?logo=python&logoColor=gold)\n\nThis module provides a package for encrypting Python based pipeline data.  There are multiple encryption algorithms\navailable.  Each with their own strengths and weaknesses as outlined below.  \n\n| Strategy                      | Description                                                                                                                                                                                                                                                                                                                                   |\n|-------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|\n| VaultRemoteEncryptionStrategy | Leverages the Hashicorp Vault secrets as a service capabilities.  This is a highly recommended strategy given it follows best practices and has the advantage of a large developer base working to secure the service.                                                                                                                        |\n| VaultLocalEncryptionStrategy  | Leverages the Vault service to provide encryption keys (key rotation and secure storage) but allows for local encryption.  This is a good option if you have to encrypt large data objects.  It can also provide a performance boost over remote Vault encryption given there is no need for a roundtrip to the server for each data element. |\n| AesCbcEncryptionStrategy      | A good basic 128 bit encryption strategy.  To use this you only need to supply a single encryption key in the encrypt.properties file (128 bit or 16 character).  This algorithm works well, but is less efficient than the AES GCM algorithm.                                                                                                |\n| AesGcm96EncryptionStrategy    | This is a good strategy for most encryption needs.  It is efficient and strong against most attacks.  You can optionally use an encryption key retrieved from the Vault service with this strategy.                                                                                                                                           |\n\n\nThe following example illustrates how to perform encryption.\n\n1. Example usage\n    - Add the following to your code\n    #### VaultRemoteEncryptionStrategy\n    ```         \n    # Uses remote Vault encryption\n    from aissemble_encrypt.vault_remote_encryption_strategy import VaultRemoteEncryptionStrategy\n\n    vault_remote = VaultRemoteEncryptionStrategy()\n\n    # encrypt plain text data using Vault\n    encrypted_value = vault_remote.encrypt('SOME PLAIN TEXT')\n\n    # decrypt cipher text data using Vault\n    decrypted_value = vault_remote.decrypt(encrypted_value)\n    ```         \n \n    _NOTE: If you are encrypting your data through a User Defined Function (udf) in PySpark you need to use\n           the VaultLocalEncryptionStrategy (see below).  Currently the remote version causes threading issues.  This issue will\n           likely be resolved in a future update to the Hashicorp Vault client_\n    #### VaultLocalEncryptionStrategy\n    ```\n    # Uses an encryption key retrieved from the Vault server, but performs the encryption locally.\n    from aissemble_encrypt.vault_local_encryption_strategy import VaultLocalEncryptionStrategy\n    \n    vault_local = VaultLocalEncryptionStrategy()\n\n    # encrypt plain text data using local Vault\n    encrypted_value = vault_local.encrypt('SOME PLAIN TEXT')\n\n    # decrypt cipher text data using local Vault\n    decrypted_value = vault_local.decrypt(encrypted_value)\n    ```\n\n    #### AesCbcEncryptionStrategy\n    ```         \n    # Uses the AES CBC encryption\n    from aissemble_encrypt.aes_cbc_encryption_strategy import AesCbcEncryptionStrategy\n\n    aes_cbc = AesCbcEncryptionStrategy()\n\n    # encrypt plain text data using AES CBC\n    encrypted_value = aes_cbc.encrypt('SOME PLAIN TEXT')\n\n    # decrypt cipher text data using AES CBC\n    decrypted_value = aes_cbc.decrypt(encrypted_value)\n    ```   \n\n    #### AesGcm96EncryptionStrategy\n    ```         \n    # AES GCM encryption with a 96 bit initialization vector (same algorithm as Vault)\n    from aissemble_encrypt.aes_gcm_96_encryption_strategy import AesGcm96EncryptionStrategy\n\n    aes_gcm_96 = AesGcm96EncryptionStrategy()\n\n    # encrypt plain text data using AES GCM\n    encrypted_value = aes_gcm_96.encrypt('SOME PLAIN TEXT')\n\n    # decrypt cipher text data using AES CBC\n    decrypted_value = aes_gcm_96.decrypt(encrypted_value)\n    ```\n## AISSEMBLE Data Encryption\n\nThis package includes one security client for calling the \"Secrets as a Service\" encryption service.\n\n### Vault encryption\nSee the extensions-encryption [README](../../extensions-encryption/README.md#vault-encryption) for more information on how to configure Vault encryption.\n",
    "bugtrack_url": null,
    "license": null,
    "summary": "Vault data encryption classes (python)",
    "version": "1.10.0",
    "project_urls": null,
    "split_keywords": [],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "0e628b8c72a489ad2601aaf8e4fdce2aaeb8c4a8b31ba23cfeb2ae66e1930365",
                "md5": "ed029dc0dfc3157a2f549a6db3864abf",
                "sha256": "b8016fa0443dabb35ccf83c3de84feae641c3c79eb996df6ced77f3d2e18bae4"
            },
            "downloads": -1,
            "filename": "aissemble_extensions_encryption_vault_python-1.10.0-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "ed029dc0dfc3157a2f549a6db3864abf",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.8",
            "size": 15684,
            "upload_time": "2024-11-20T01:14:54",
            "upload_time_iso_8601": "2024-11-20T01:14:54.926818Z",
            "url": "https://files.pythonhosted.org/packages/0e/62/8b8c72a489ad2601aaf8e4fdce2aaeb8c4a8b31ba23cfeb2ae66e1930365/aissemble_extensions_encryption_vault_python-1.10.0-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "88f6c0dde90f30929cc2d3c6e075dff4b1748243030e9decb796ea90c85260dd",
                "md5": "73f15e27fb0c72b157f90b3a0aa7e144",
                "sha256": "34514d712576825821195aad1c95d674568d561e69bd2de461f65942cae78e2c"
            },
            "downloads": -1,
            "filename": "aissemble_extensions_encryption_vault_python-1.10.0.tar.gz",
            "has_sig": false,
            "md5_digest": "73f15e27fb0c72b157f90b3a0aa7e144",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.8",
            "size": 10358,
            "upload_time": "2024-11-20T01:14:56",
            "upload_time_iso_8601": "2024-11-20T01:14:56.494989Z",
            "url": "https://files.pythonhosted.org/packages/88/f6/c0dde90f30929cc2d3c6e075dff4b1748243030e9decb796ea90c85260dd/aissemble_extensions_encryption_vault_python-1.10.0.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-11-20 01:14:56",
    "github": false,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "lcname": "aissemble-extensions-encryption-vault-python"
}
        
Elapsed time: 0.34522s