Skip to content

Commit c87ed08

Browse files
akosasiGitHub Enterprise
authored andcommitted
Merge pull request #29 from Conjur-Enterprise/name-change
CNJR-10970: Name Change Updates
2 parents b664799 + 23b1302 commit c87ed08

File tree

4 files changed

+29
-65
lines changed

4 files changed

+29
-65
lines changed

CHANGELOG.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,10 @@ and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.
66

77
## [Unreleased]
88

9-
## [0.1.6] - 2025-05-09
9+
## [0.1.6] - 2025-09-08
10+
11+
### Changed
12+
- Updated README.md, CONTRIBUTING.md, and SECURITY.md to align with Conjur Enterprise name change to Secrets Manager. (CNJR-10970)
1013

1114
### Security
1215
- Update python dependencies

CONTRIBUTING.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ pip3 install -r requirements.txt
5454

5555
You can now run tests and the SDK with modifiable files.
5656

57-
To test the SDK against a locally running Conjur Server, see [Manual testing](#manual-testing)
57+
To test the SDK against a locally running Conjur OSS Server, see [Manual testing](#manual-testing)
5858

5959
### Consuming the SDK locally
6060

@@ -91,18 +91,18 @@ To run integration tests run:
9191
```
9292
./ci/test/test_integration
9393
```
94-
This creates a Conjur environment with an Ubuntu container running the SDK's integration tests.
94+
This creates a Conjur OSS environment with an Ubuntu container running the SDK's integration tests.
9595

9696
### Manual testing
9797

9898
To perform manual tests, run:
9999
```
100100
./ci/test/test_integration -d
101101
```
102-
This creates a Conjur environment with an Ubuntu container running in interactive mode.
102+
This creates a Conjur OSS environment with an Ubuntu container running in interactive mode.
103103
You can now run Python and manually test the SDK.
104104

105-
The connection parameters to Conjur are:
105+
The connection parameters to Conjur OSS are:
106106
- conjur_url = `https://conjur-https`
107107
- username = `admin`
108108
- account = `conjur`

README.md

Lines changed: 19 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
1-
# Conjur Python SDK
1+
# CyberArk Secrets Manager Python SDK
22

3-
An API client for Conjur written in python.
3+
An API client for CyberArk Secrets Manager written in python.
44

55
Find more SDKs [from CyberArk](https://github.com/cyberark).
66

@@ -15,21 +15,20 @@ see [our community guidelines](https://github.com/cyberark/community/blob/master
1515

1616
## Requirements
1717

18-
This project requires a working Conjur server
18+
This project requires a working CyberArk Secrets Manager or Conjur OSS server
1919

2020
It officially requires python 3.10 and above but can run with lower versions compiled with openssl 1.1.1
2121

2222
## How to use the client
2323

2424
### Prerequisites
2525

26-
It is assumed that Conjur (OSS or Enterprise) have already been installed in the environment and running in the
26+
It is assumed that CyberArk Secrets Manager or Conjur OSS have already been installed in the environment and running in the
2727
background. If you haven't done so, follow these instructions for installation of
2828
the [OSS](https://docs.conjur.org/Latest/en/Content/OSS/Installation/Install_methods.htm) and these for installation
29-
of [Enterprise](https://docs.cyberark.com/Product-Doc/OnlineHelp/AAM-DAP/Latest/en/Content/HomeTilesLPs/LP-Tile2.htm).
29+
of [Self-Hosted](https://docs.cyberark.com/Product-Doc/OnlineHelp/AAM-DAP/Latest/en/Content/HomeTilesLPs/LP-Tile2.htm).
3030

31-
Once Conjur is running in the background, you are ready to start setting up your python app to work with our Conjur
32-
python API!
31+
Once Secrets Manager is running in the background, you are ready to start setting up your python app to work with our Secrets Manager python API!
3332

3433
### Installation
3534

@@ -60,7 +59,7 @@ pip3 install .
6059

6160
#### Define connection parameters
6261

63-
In order to login to conjur you need to have 5 parameters known from advance.
62+
In order to login to Secrets Manager you need to have 5 parameters known from advance.
6463

6564
```python
6665
from conjur_api.models import SslVerificationMode
@@ -82,11 +81,11 @@ from conjur_api.models import ConjurConnectionInfo
8281
connection_info = ConjurConnectionInfo(conjur_url=conjur_url,account=account,cert_file=None,service_id="ldap-service-id", proxy_params=None)
8382
```
8483

85-
* conjur_url - url of conjur server
84+
* conjur_url - url of Secrets Manager server
8685
* account - the account which we want to connect to
87-
* cert_file - a path to conjur rootCA file. we need it if we initialize the client in `SslVerificationMode.SELF_SIGN`
86+
* cert_file - a path to Secrets Manager rootCA file. we need it if we initialize the client in `SslVerificationMode.SELF_SIGN`
8887
or `SslVerificationMode.CA_BUNDLE` mode
89-
* service_id - a service id for the Conjur authenticator. Required when using the ldap authenticator (see below) but not when using the default `authn` authenticator.
88+
* service_id - a service id for the Secrets Manager authenticator. Required when using the ldap authenticator (see below) but not when using the default `authn` authenticator.
9089
* proxy_params - parameters for proxy connection. see `ProxyParams` class for more details - Optional
9190

9291
#### Create credentials provider
@@ -112,10 +111,10 @@ del credentials
112111

113112
#### Create authentication strategy
114113

115-
The client also uses an authentication strategy in order to authenticate to conjur. This approach allows us to implement different authentication strategies
114+
The client also uses an authentication strategy in order to authenticate to Secrets Manager. This approach allows us to implement different authentication strategies
116115
(e.g. `authn`, `authn-ldap`, `authn-k8s`) and to keep the authentication logic separate from the client implementation.
117116

118-
We provide the `AuthnAuthenticationStrategy` for the default Conjur authenticator. Example use:
117+
We provide the `AuthnAuthenticationStrategy` for the default Secrets Manager authenticator. Example use:
119118

120119
```python
121120
from conjur_api.providers import AuthnAuthenticationStrategy
@@ -152,7 +151,7 @@ client = Client(connection_info,
152151
* ssl_verification_mode = `SslVerificationMode` enum that states what is the certificate verification technique we will
153152
use when making the api request
154153

155-
After creating the client we can login to conjur and start using it. Example of usage:
154+
After creating the client we can login to Secrets Manager and start using it. Example of usage:
156155

157156
```python
158157
client.login() # login to conjur and return the api_key
@@ -189,7 +188,7 @@ dictionary object constructed from the returned JSON data.
189188

190189
#### `update_policy_file(policy_name, policy_file)`
191190

192-
Modifies an existing Conjur policy. Data may be explicitly deleted using the `!delete`, `!revoke`, and `!deny`
191+
Modifies an existing Secrets Manager policy. Data may be explicitly deleted using the `!delete`, `!revoke`, and `!deny`
193192
statements. Unlike
194193
"replace" mode, no data is ever implicitly deleted. Result is a dictionary object constructed from the returned JSON
195194
data.
@@ -270,28 +269,26 @@ Rotates the personal API key of the logged-in user and returns it as a string.
270269

271270
Updates the current, logged-in user's password with the password parameter provided.
272271

273-
Note: the new password must meet the Conjur password complexity constraints. It must contain at least 12 characters: 2
272+
Note: the new password must meet the Secrets Manager password complexity constraints. It must contain at least 12 characters: 2
274273
uppercase, 2 lowercase, 1 digit, 1 special character.
275274

276275
#### `whoami()`
277276

278-
_Note: This method requires Conjur v1.9+_
279-
280277
Returns a Python dictionary of information about the client making an API request (such as its IP address, user,
281278
account, token expiration date, etc).
282279

283280
#### `set_authenticator_state(authenticator_id, enabled)`
284281

285282
Allows enabling and disabling an authenticator.
286283

287-
_Note: This functionality relies on an endpoint in Conjur which is part of an early implementation of support for
288-
enabling Conjur authenticators via the API, and is currently available at the Community (or early alpha) level. This
284+
_Note: This functionality relies on an endpoint in Secrets Manager which is part of an early implementation of support for
285+
enabling Secrets Manager authenticators via the API, and is currently available at the Community (or early alpha) level. This
289286
endpoint is still subject to breaking changes in the future._
290287

291288
#### `authenticate()`
292289

293-
Performs an authentication with Conjur, based on the authentication strategy and credentials provider there were given to the client.
294-
This method is not required, it will also be done implicitly and automatically when session with Conjur needs to be refreshed.
290+
Performs an authentication with Secrets Manager, based on the authentication strategy and credentials provider there were given to the client.
291+
This method is not required, it will also be done implicitly and automatically when session with Secrets Manager needs to be refreshed.
295292

296293
## Contributing
297294

SECURITY.md

Lines changed: 2 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -1,42 +1,6 @@
11
# Security Policies and Procedures
22

3-
This document outlines security procedures and general policies for the CyberArk Conjur
4-
suite of tools and products.
5-
6-
* [Reporting a Bug](#reporting-a-bug)
7-
* [Disclosure Policy](#disclosure-policy)
8-
* [Comments on this Policy](#comments-on-this-policy)
9-
103
## Reporting a Bug
4+
CyberArk takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you follow responsible disclosure guidelines and contact [email protected] and work with us toward a quick resolution to protect our customers.
115

12-
The CyberArk Conjur team and community take all security bugs in the Conjur suite seriously.
13-
Thank you for improving the security of the Conjur suite. We appreciate your efforts and
14-
responsible disclosure and will make every effort to acknowledge your
15-
contributions.
16-
17-
Report security bugs by emailing the lead maintainers at [email protected].
18-
19-
The maintainers will acknowledge your email within 2 business days. Subsequently, we will
20-
send a more detailed response within 2 business days of our acknowledgement indicating
21-
the next steps in handling your report. After the initial reply to your report, the security
22-
team will endeavor to keep you informed of the progress towards a fix and full
23-
announcement, and may ask for additional information or guidance.
24-
25-
Report security bugs in third-party modules to the person or team maintaining
26-
the module.
27-
28-
## Disclosure Policy
29-
30-
When the security team receives a security bug report, they will assign it to a
31-
primary handler. This person will coordinate the fix and release process,
32-
involving the following steps:
33-
34-
* Confirm the problem and determine the affected versions.
35-
* Audit code to find any potential similar problems.
36-
* Prepare fixes for all releases still under maintenance. These fixes will be
37-
released as fast as possible.
38-
39-
## Comments on this Policy
40-
41-
If you have suggestions on how this process could be improved please submit a
42-
pull request.
6+
Refer to [CyberArk's Security Vulnerability Policy](https://www.cyberark.com/cyberark-security-vulinerability-policy.pdf) for more details

0 commit comments

Comments
 (0)