Pycape

Latest version: v3.1.1

Safety actively analyzes 622275 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 1 of 2

3.1.1

What's Changed

* Limit synchronicity dependency < 0.3.0 (122) yanndupis
* nonce check (121) justin1121
* Reeenable verify cert chain when downloading key (120) justin1121

3.1.0

AWS cert chains have a 3hr expiry, so using Cape keys that were generated >3hrs ago will fail while verifying the cert chain. We're temporarily skipping this for `cape.key` because that's the only affected client method. We're working on a better fix and will re-release when that lands.

What's Changed

* skip cert chain verification for now on key route (119) justin1121
* add section about updating pydocs to releasing doc (115) jvmncs

3.0.0

Breaking Changes
Function tokens have been removed from latest versions of Cape SDKs; the new authentication method is to use [personal access tokens](https://docs.capeprivacy.com/reference/user-tokens). Technically this introduces a feature regression, since PATs give access to a user's entire set of deployed functions. A future update will allow PATs to be scoped to only authenticate run requests for specific functions, which will bring back parity with the function token approach.

What's Changed

* bump cryptography to resolve security alert (117) jvmncs
* bump dependencies, resolving some dependabot warnings (116) jvmncs
* fix docsite logo and missing cape_encrypt api ref (114) jvmncs
* refactor pycape api to use PATs, not fn tokens (113) jvmncs
* small fix to Cape.key response handler (112) jvmncs

2.1.0

Not secure
What's Changed

* refactor cape key/encrypt to accept username parameter (111) jvmncs
* Revert "cape_encrypt bump version 0.1.0 -> 0.1.1" (110) ChrisFriesen
* Removing quotes from release tag and commit message (109) ChrisFriesen
* "cape_encrypt bump version 0.1.0 -> 0.1.1" (108) ChrisFriesen
* Add cape_encrypt release action (107) ChrisFriesen
* Cape Encrypt (within a function) as a separate package (106) ChrisFriesen
* update cryptography and pytest based on alerts from github (105) justin1121
* Properly verify cert chain (104) justin1121
* Update default URL (103) yanndupis
* check for + load cached keys in Cape.key again (102) jvmncs
* Add to_json to FunctionRef (101) yanndupis
* Update walkthrough with function token (100) yanndupis

2.0.0

Not secure
Breaking Changes

As of https://github.com/capeprivacy/pycape/pull/96, a function ID is no longer sufficient to connect to a Cape function. Whenever one intends to use a Cape function, they must pass a fully-specified `pycape.FunctionRef` (which now requires both function ID and function token). The idiomatic way of doing this is to load the `FunctionRef` from JSON ([see examples](https://github.com/capeprivacy/pycape/tree/2.0.0#usage)).

Previously, one could supply function ID strings instead of the full `FunctionRef`. For example, the following two code snippets were equivalent:
python
Method 1
cape.connect("sa15lcf12td45s1")
cape.close()

Method 2
fref = pycape.FunctionRef("sa15lcf12td45s1")
cape.connect(fref)
cape.close()


The breaking change is that `Method 1` is now forbidden and will yield a `TypeError` if attempted.

What's Changed

* Make the function token the default to run function (96) yanndupis
* add timeout error handling to Cape.invoke (99) jvmncs
* update id in pycape docs to latest (97) justin1121

1.1.0

Not secure
What's Changed

* revert 1.1.0 release candidate and fix release build (95) jvmncs
* Add timeout warning to Cape.connect docstring (94) jvmncs
* Add cape deploy & token from cli (92) yanndupis
* Update README.md (93) jlapierre
* allow Cape client methods to be used sync or async (91) jvmncs
* optionally verify pcrs (90) justin1121
* set up codeowners (89) jvmncs
* add Cape encrypt command (88) jvmncs
* Explict function checksum naming and userdata reference update (87) ChrisFriesen
* add Cape.key command (85) jvmncs
* improve cape config handling (84) jvmncs
* Rename function hash to checksum for clarity (83) ChrisFriesen
* remove weakref for root cert in _EnclaveContext (82) jvmncs
* Hide non-public API from docs (81) jvmncs
* added a bit more detail to run and invoke; minor wording updates (80) miiklay
* Add remaining missing type hints to Public API (78) yanndupis
* Improve pycape/serdio docs with consistent style/cross-referencing (79) jvmncs
* Fix Serdio docs typos (77) jvmncs
* Add type hint to cape module & activate sphinx type hint (76) yanndupis
* Improve Serdio docs; tweak Sphinx configuration (75) jvmncs
* Refactor Cape client statefulness (73) jvmncs
* Refactor function token/auth to be part of FunctionRef (72) jvmncs
* Add connection context manager (71) yanndupis
* Generate API docs w/ Sphinx (70) jvmncs
* update examples readme (62) ekloberdanz
* Add doctrings for pycape.cape & serdio.serde contents (69) ekloberdanz
* Add function token to run and connect (68) yanndupis
* Tests (66) ekloberdanz
* added example syntax for compiling serdio as a dep (65) miiklay
* updated import and function id/hashes in readme (63) miiklay
* add deploy and run script for echo example (57) ekloberdanz
* Add pip install instruction to README (61) yanndupis
* Amend releasing doc (60) jvmncs

Page 1 of 2

Links

Releases

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.