@azure/arm-keyvault-profile-2020-09-01-hybrid 2.0.0-alpha.20221214.1 → 2.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +15 -0
- package/dist/index.js +280 -57
- package/dist/index.js.map +1 -1
- package/dist/index.min.js +1 -1
- package/dist/index.min.js.map +1 -1
- package/dist-esm/samples-dev/operationsListSample.d.ts +2 -0
- package/dist-esm/samples-dev/operationsListSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/operationsListSample.js +51 -0
- package/dist-esm/samples-dev/operationsListSample.js.map +1 -0
- package/dist-esm/samples-dev/privateEndpointConnectionsDeleteSample.d.ts +2 -0
- package/dist-esm/samples-dev/privateEndpointConnectionsDeleteSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/privateEndpointConnectionsDeleteSample.js +40 -0
- package/dist-esm/samples-dev/privateEndpointConnectionsDeleteSample.js.map +1 -0
- package/dist-esm/samples-dev/privateEndpointConnectionsGetSample.d.ts +2 -0
- package/dist-esm/samples-dev/privateEndpointConnectionsGetSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/privateEndpointConnectionsGetSample.js +40 -0
- package/dist-esm/samples-dev/privateEndpointConnectionsGetSample.js.map +1 -0
- package/dist-esm/samples-dev/privateEndpointConnectionsPutSample.d.ts +2 -0
- package/dist-esm/samples-dev/privateEndpointConnectionsPutSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/privateEndpointConnectionsPutSample.js +47 -0
- package/dist-esm/samples-dev/privateEndpointConnectionsPutSample.js.map +1 -0
- package/dist-esm/samples-dev/privateLinkResourcesListByVaultSample.d.ts +2 -0
- package/dist-esm/samples-dev/privateLinkResourcesListByVaultSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/privateLinkResourcesListByVaultSample.js +39 -0
- package/dist-esm/samples-dev/privateLinkResourcesListByVaultSample.js.map +1 -0
- package/dist-esm/samples-dev/secretsCreateOrUpdateSample.d.ts +2 -0
- package/dist-esm/samples-dev/secretsCreateOrUpdateSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/secretsCreateOrUpdateSample.js +43 -0
- package/dist-esm/samples-dev/secretsCreateOrUpdateSample.js.map +1 -0
- package/dist-esm/samples-dev/secretsGetSample.d.ts +2 -0
- package/dist-esm/samples-dev/secretsGetSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/secretsGetSample.js +40 -0
- package/dist-esm/samples-dev/secretsGetSample.js.map +1 -0
- package/dist-esm/samples-dev/secretsListSample.d.ts +2 -0
- package/dist-esm/samples-dev/secretsListSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/secretsListSample.js +53 -0
- package/dist-esm/samples-dev/secretsListSample.js.map +1 -0
- package/dist-esm/samples-dev/secretsUpdateSample.d.ts +2 -0
- package/dist-esm/samples-dev/secretsUpdateSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/secretsUpdateSample.js +43 -0
- package/dist-esm/samples-dev/secretsUpdateSample.js.map +1 -0
- package/dist-esm/samples-dev/vaultsCheckNameAvailabilitySample.d.ts +2 -0
- package/dist-esm/samples-dev/vaultsCheckNameAvailabilitySample.d.ts.map +1 -0
- package/dist-esm/samples-dev/vaultsCheckNameAvailabilitySample.js +41 -0
- package/dist-esm/samples-dev/vaultsCheckNameAvailabilitySample.js.map +1 -0
- package/dist-esm/samples-dev/vaultsCreateOrUpdateSample.d.ts +2 -0
- package/dist-esm/samples-dev/vaultsCreateOrUpdateSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/vaultsCreateOrUpdateSample.js +140 -0
- package/dist-esm/samples-dev/vaultsCreateOrUpdateSample.js.map +1 -0
- package/dist-esm/samples-dev/vaultsDeleteSample.d.ts +2 -0
- package/dist-esm/samples-dev/vaultsDeleteSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/vaultsDeleteSample.js +39 -0
- package/dist-esm/samples-dev/vaultsDeleteSample.js.map +1 -0
- package/dist-esm/samples-dev/vaultsGetDeletedSample.d.ts +2 -0
- package/dist-esm/samples-dev/vaultsGetDeletedSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/vaultsGetDeletedSample.js +39 -0
- package/dist-esm/samples-dev/vaultsGetDeletedSample.js.map +1 -0
- package/dist-esm/samples-dev/vaultsGetSample.d.ts +2 -0
- package/dist-esm/samples-dev/vaultsGetSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/vaultsGetSample.js +39 -0
- package/dist-esm/samples-dev/vaultsGetSample.js.map +1 -0
- package/dist-esm/samples-dev/vaultsListByResourceGroupSample.d.ts +2 -0
- package/dist-esm/samples-dev/vaultsListByResourceGroupSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/vaultsListByResourceGroupSample.js +54 -0
- package/dist-esm/samples-dev/vaultsListByResourceGroupSample.js.map +1 -0
- package/dist-esm/samples-dev/vaultsListBySubscriptionSample.d.ts +2 -0
- package/dist-esm/samples-dev/vaultsListBySubscriptionSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/vaultsListBySubscriptionSample.js +53 -0
- package/dist-esm/samples-dev/vaultsListBySubscriptionSample.js.map +1 -0
- package/dist-esm/samples-dev/vaultsListDeletedSample.d.ts +2 -0
- package/dist-esm/samples-dev/vaultsListDeletedSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/vaultsListDeletedSample.js +51 -0
- package/dist-esm/samples-dev/vaultsListDeletedSample.js.map +1 -0
- package/dist-esm/samples-dev/vaultsListSample.d.ts +2 -0
- package/dist-esm/samples-dev/vaultsListSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/vaultsListSample.js +53 -0
- package/dist-esm/samples-dev/vaultsListSample.js.map +1 -0
- package/dist-esm/samples-dev/vaultsPurgeDeletedSample.d.ts +2 -0
- package/dist-esm/samples-dev/vaultsPurgeDeletedSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/vaultsPurgeDeletedSample.js +39 -0
- package/dist-esm/samples-dev/vaultsPurgeDeletedSample.js.map +1 -0
- package/dist-esm/samples-dev/vaultsUpdateAccessPolicySample.d.ts +2 -0
- package/dist-esm/samples-dev/vaultsUpdateAccessPolicySample.d.ts.map +1 -0
- package/dist-esm/samples-dev/vaultsUpdateAccessPolicySample.js +55 -0
- package/dist-esm/samples-dev/vaultsUpdateAccessPolicySample.js.map +1 -0
- package/dist-esm/samples-dev/vaultsUpdateSample.d.ts +2 -0
- package/dist-esm/samples-dev/vaultsUpdateSample.d.ts.map +1 -0
- package/dist-esm/samples-dev/vaultsUpdateSample.js +100 -0
- package/dist-esm/samples-dev/vaultsUpdateSample.js.map +1 -0
- package/dist-esm/src/index.d.ts +1 -0
- package/dist-esm/src/index.d.ts.map +1 -1
- package/dist-esm/src/index.js +1 -0
- package/dist-esm/src/index.js.map +1 -1
- package/dist-esm/src/keyVaultManagementClient.d.ts +2 -0
- package/dist-esm/src/keyVaultManagementClient.d.ts.map +1 -1
- package/dist-esm/src/keyVaultManagementClient.js +54 -5
- package/dist-esm/src/keyVaultManagementClient.js.map +1 -1
- package/dist-esm/src/models/index.d.ts +83 -15
- package/dist-esm/src/models/index.d.ts.map +1 -1
- package/dist-esm/src/models/index.js +75 -0
- package/dist-esm/src/models/index.js.map +1 -1
- package/dist-esm/src/operations/operations.d.ts.map +1 -1
- package/dist-esm/src/operations/operations.js +19 -8
- package/dist-esm/src/operations/operations.js.map +1 -1
- package/dist-esm/src/operations/privateEndpointConnections.d.ts.map +1 -1
- package/dist-esm/src/operations/privateEndpointConnections.js +3 -1
- package/dist-esm/src/operations/privateEndpointConnections.js.map +1 -1
- package/dist-esm/src/operations/secrets.d.ts.map +1 -1
- package/dist-esm/src/operations/secrets.js +19 -8
- package/dist-esm/src/operations/secrets.js.map +1 -1
- package/dist-esm/src/operations/vaults.d.ts.map +1 -1
- package/dist-esm/src/operations/vaults.js +79 -34
- package/dist-esm/src/operations/vaults.js.map +1 -1
- package/dist-esm/src/pagingHelper.d.ts +13 -0
- package/dist-esm/src/pagingHelper.d.ts.map +1 -0
- package/dist-esm/src/pagingHelper.js +32 -0
- package/dist-esm/src/pagingHelper.js.map +1 -0
- package/dist-esm/test/sampleTest.js +11 -13
- package/dist-esm/test/sampleTest.js.map +1 -1
- package/package.json +24 -11
- package/review/arm-keyvault-profile-2020-09-01-hybrid.api.md +11 -85
- package/src/index.ts +1 -0
- package/src/keyVaultManagementClient.ts +70 -5
- package/src/models/index.ts +86 -23
- package/src/operations/operations.ts +21 -9
- package/src/operations/privateEndpointConnections.ts +3 -1
- package/src/operations/secrets.ts +27 -10
- package/src/operations/vaults.ts +92 -39
- package/src/pagingHelper.ts +39 -0
- package/tsconfig.json +8 -2
- package/types/arm-keyvault-profile-2020-09-01-hybrid.d.ts +94 -15
|
@@ -0,0 +1,55 @@
|
|
|
1
|
+
/*
|
|
2
|
+
* Copyright (c) Microsoft Corporation.
|
|
3
|
+
* Licensed under the MIT License.
|
|
4
|
+
*
|
|
5
|
+
* Code generated by Microsoft (R) AutoRest Code Generator.
|
|
6
|
+
* Changes may cause incorrect behavior and will be lost if the code is regenerated.
|
|
7
|
+
*/
|
|
8
|
+
import { __awaiter } from "tslib";
|
|
9
|
+
// Copyright (c) Microsoft Corporation.
|
|
10
|
+
// Licensed under the MIT License.
|
|
11
|
+
import { KeyVaultManagementClient } from "@azure/arm-keyvault-profile-2020-09-01-hybrid";
|
|
12
|
+
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
|
+
import * as dotenv from "dotenv";
|
|
14
|
+
dotenv.config();
|
|
15
|
+
/**
|
|
16
|
+
* This sample demonstrates how to Update access policies in a key vault in the specified subscription.
|
|
17
|
+
*
|
|
18
|
+
* @summary Update access policies in a key vault in the specified subscription.
|
|
19
|
+
* x-ms-original-file: specification/keyvault/resource-manager/Microsoft.KeyVault/stable/2019-09-01/examples/updateAccessPoliciesAdd.json
|
|
20
|
+
*/
|
|
21
|
+
function addAnAccessPolicyOrUpdateAnAccessPolicyWithNewPermissions() {
|
|
22
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
23
|
+
const subscriptionId = process.env["KEYVAULT_SUBSCRIPTION_ID"] ||
|
|
24
|
+
"00000000-0000-0000-0000-000000000000";
|
|
25
|
+
const resourceGroupName = process.env["KEYVAULT_RESOURCE_GROUP"] || "sample-group";
|
|
26
|
+
const vaultName = "sample-vault";
|
|
27
|
+
const operationKind = "add";
|
|
28
|
+
const parameters = {
|
|
29
|
+
properties: {
|
|
30
|
+
accessPolicies: [
|
|
31
|
+
{
|
|
32
|
+
objectId: "00000000-0000-0000-0000-000000000000",
|
|
33
|
+
permissions: {
|
|
34
|
+
certificates: ["get"],
|
|
35
|
+
keys: ["encrypt"],
|
|
36
|
+
secrets: ["get"]
|
|
37
|
+
},
|
|
38
|
+
tenantId: "00000000-0000-0000-0000-000000000000"
|
|
39
|
+
}
|
|
40
|
+
]
|
|
41
|
+
}
|
|
42
|
+
};
|
|
43
|
+
const credential = new DefaultAzureCredential();
|
|
44
|
+
const client = new KeyVaultManagementClient(credential, subscriptionId);
|
|
45
|
+
const result = yield client.vaults.updateAccessPolicy(resourceGroupName, vaultName, operationKind, parameters);
|
|
46
|
+
console.log(result);
|
|
47
|
+
});
|
|
48
|
+
}
|
|
49
|
+
function main() {
|
|
50
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
51
|
+
addAnAccessPolicyOrUpdateAnAccessPolicyWithNewPermissions();
|
|
52
|
+
});
|
|
53
|
+
}
|
|
54
|
+
main().catch(console.error);
|
|
55
|
+
//# sourceMappingURL=vaultsUpdateAccessPolicySample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"vaultsUpdateAccessPolicySample.js","sourceRoot":"","sources":["../../samples-dev/vaultsUpdateAccessPolicySample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,wBAAwB,EACzB,MAAM,+CAA+C,CAAC;AACvD,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,yDAAyD;;QACtE,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,0BAA0B,CAAC;YACvC,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,yBAAyB,CAAC,IAAI,cAAc,CAAC;QAC3D,MAAM,SAAS,GAAG,cAAc,CAAC;QACjC,MAAM,aAAa,GAAG,KAAK,CAAC;QAC5B,MAAM,UAAU,GAAgC;YAC9C,UAAU,EAAE;gBACV,cAAc,EAAE;oBACd;wBACE,QAAQ,EAAE,sCAAsC;wBAChD,WAAW,EAAE;4BACX,YAAY,EAAE,CAAC,KAAK,CAAC;4BACrB,IAAI,EAAE,CAAC,SAAS,CAAC;4BACjB,OAAO,EAAE,CAAC,KAAK,CAAC;yBACjB;wBACD,QAAQ,EAAE,sCAAsC;qBACjD;iBACF;aACF;SACF,CAAC;QACF,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,kBAAkB,CACnD,iBAAiB,EACjB,SAAS,EACT,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,yDAAyD,EAAE,CAAC;IAC9D,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"vaultsUpdateSample.d.ts","sourceRoot":"","sources":["../../samples-dev/vaultsUpdateSample.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,100 @@
|
|
|
1
|
+
/*
|
|
2
|
+
* Copyright (c) Microsoft Corporation.
|
|
3
|
+
* Licensed under the MIT License.
|
|
4
|
+
*
|
|
5
|
+
* Code generated by Microsoft (R) AutoRest Code Generator.
|
|
6
|
+
* Changes may cause incorrect behavior and will be lost if the code is regenerated.
|
|
7
|
+
*/
|
|
8
|
+
import { __awaiter } from "tslib";
|
|
9
|
+
// Copyright (c) Microsoft Corporation.
|
|
10
|
+
// Licensed under the MIT License.
|
|
11
|
+
import { KeyVaultManagementClient } from "@azure/arm-keyvault-profile-2020-09-01-hybrid";
|
|
12
|
+
import { DefaultAzureCredential } from "@azure/identity";
|
|
13
|
+
import * as dotenv from "dotenv";
|
|
14
|
+
dotenv.config();
|
|
15
|
+
/**
|
|
16
|
+
* This sample demonstrates how to Update a key vault in the specified subscription.
|
|
17
|
+
*
|
|
18
|
+
* @summary Update a key vault in the specified subscription.
|
|
19
|
+
* x-ms-original-file: specification/keyvault/resource-manager/Microsoft.KeyVault/stable/2019-09-01/examples/updateVault.json
|
|
20
|
+
*/
|
|
21
|
+
function updateAnExistingVault() {
|
|
22
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
23
|
+
const subscriptionId = process.env["KEYVAULT_SUBSCRIPTION_ID"] ||
|
|
24
|
+
"00000000-0000-0000-0000-000000000000";
|
|
25
|
+
const resourceGroupName = process.env["KEYVAULT_RESOURCE_GROUP"] || "sample-resource-group";
|
|
26
|
+
const vaultName = "sample-vault";
|
|
27
|
+
const parameters = {
|
|
28
|
+
properties: {
|
|
29
|
+
accessPolicies: [
|
|
30
|
+
{
|
|
31
|
+
objectId: "00000000-0000-0000-0000-000000000000",
|
|
32
|
+
permissions: {
|
|
33
|
+
certificates: [
|
|
34
|
+
"get",
|
|
35
|
+
"list",
|
|
36
|
+
"delete",
|
|
37
|
+
"create",
|
|
38
|
+
"import",
|
|
39
|
+
"update",
|
|
40
|
+
"managecontacts",
|
|
41
|
+
"getissuers",
|
|
42
|
+
"listissuers",
|
|
43
|
+
"setissuers",
|
|
44
|
+
"deleteissuers",
|
|
45
|
+
"manageissuers",
|
|
46
|
+
"recover",
|
|
47
|
+
"purge"
|
|
48
|
+
],
|
|
49
|
+
keys: [
|
|
50
|
+
"encrypt",
|
|
51
|
+
"decrypt",
|
|
52
|
+
"wrapKey",
|
|
53
|
+
"unwrapKey",
|
|
54
|
+
"sign",
|
|
55
|
+
"verify",
|
|
56
|
+
"get",
|
|
57
|
+
"list",
|
|
58
|
+
"create",
|
|
59
|
+
"update",
|
|
60
|
+
"import",
|
|
61
|
+
"delete",
|
|
62
|
+
"backup",
|
|
63
|
+
"restore",
|
|
64
|
+
"recover",
|
|
65
|
+
"purge"
|
|
66
|
+
],
|
|
67
|
+
secrets: [
|
|
68
|
+
"get",
|
|
69
|
+
"list",
|
|
70
|
+
"set",
|
|
71
|
+
"delete",
|
|
72
|
+
"backup",
|
|
73
|
+
"restore",
|
|
74
|
+
"recover",
|
|
75
|
+
"purge"
|
|
76
|
+
]
|
|
77
|
+
},
|
|
78
|
+
tenantId: "00000000-0000-0000-0000-000000000000"
|
|
79
|
+
}
|
|
80
|
+
],
|
|
81
|
+
enabledForDeployment: true,
|
|
82
|
+
enabledForDiskEncryption: true,
|
|
83
|
+
enabledForTemplateDeployment: true,
|
|
84
|
+
sku: { name: "standard", family: "A" },
|
|
85
|
+
tenantId: "00000000-0000-0000-0000-000000000000"
|
|
86
|
+
}
|
|
87
|
+
};
|
|
88
|
+
const credential = new DefaultAzureCredential();
|
|
89
|
+
const client = new KeyVaultManagementClient(credential, subscriptionId);
|
|
90
|
+
const result = yield client.vaults.update(resourceGroupName, vaultName, parameters);
|
|
91
|
+
console.log(result);
|
|
92
|
+
});
|
|
93
|
+
}
|
|
94
|
+
function main() {
|
|
95
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
96
|
+
updateAnExistingVault();
|
|
97
|
+
});
|
|
98
|
+
}
|
|
99
|
+
main().catch(console.error);
|
|
100
|
+
//# sourceMappingURL=vaultsUpdateSample.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"vaultsUpdateSample.js","sourceRoot":"","sources":["../../samples-dev/vaultsUpdateSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,wBAAwB,EACzB,MAAM,+CAA+C,CAAC;AACvD,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,qBAAqB;;QAClC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,0BAA0B,CAAC;YACvC,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,yBAAyB,CAAC,IAAI,uBAAuB,CAAC;QACpE,MAAM,SAAS,GAAG,cAAc,CAAC;QACjC,MAAM,UAAU,GAAyB;YACvC,UAAU,EAAE;gBACV,cAAc,EAAE;oBACd;wBACE,QAAQ,EAAE,sCAAsC;wBAChD,WAAW,EAAE;4BACX,YAAY,EAAE;gCACZ,KAAK;gCACL,MAAM;gCACN,QAAQ;gCACR,QAAQ;gCACR,QAAQ;gCACR,QAAQ;gCACR,gBAAgB;gCAChB,YAAY;gCACZ,aAAa;gCACb,YAAY;gCACZ,eAAe;gCACf,eAAe;gCACf,SAAS;gCACT,OAAO;6BACR;4BACD,IAAI,EAAE;gCACJ,SAAS;gCACT,SAAS;gCACT,SAAS;gCACT,WAAW;gCACX,MAAM;gCACN,QAAQ;gCACR,KAAK;gCACL,MAAM;gCACN,QAAQ;gCACR,QAAQ;gCACR,QAAQ;gCACR,QAAQ;gCACR,QAAQ;gCACR,SAAS;gCACT,SAAS;gCACT,OAAO;6BACR;4BACD,OAAO,EAAE;gCACP,KAAK;gCACL,MAAM;gCACN,KAAK;gCACL,QAAQ;gCACR,QAAQ;gCACR,SAAS;gCACT,SAAS;gCACT,OAAO;6BACR;yBACF;wBACD,QAAQ,EAAE,sCAAsC;qBACjD;iBACF;gBACD,oBAAoB,EAAE,IAAI;gBAC1B,wBAAwB,EAAE,IAAI;gBAC9B,4BAA4B,EAAE,IAAI;gBAClC,GAAG,EAAE,EAAE,IAAI,EAAE,UAAU,EAAE,MAAM,EAAE,GAAG,EAAE;gBACtC,QAAQ,EAAE,sCAAsC;aACjD;SACF,CAAC;QACF,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,MAAM,CACvC,iBAAiB,EACjB,SAAS,EACT,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,qBAAqB,EAAE,CAAC;IAC1B,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
|
package/dist-esm/src/index.d.ts
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":";AASA,cAAc,UAAU,CAAC;AACzB,OAAO,EAAE,wBAAwB,EAAE,MAAM,4BAA4B,CAAC;AACtE,cAAc,wBAAwB,CAAC"}
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":";AASA,OAAO,EAAE,oBAAoB,EAAE,MAAM,gBAAgB,CAAC;AACtD,cAAc,UAAU,CAAC;AACzB,OAAO,EAAE,wBAAwB,EAAE,MAAM,4BAA4B,CAAC;AACtE,cAAc,wBAAwB,CAAC"}
|
package/dist-esm/src/index.js
CHANGED
|
@@ -6,6 +6,7 @@
|
|
|
6
6
|
* Changes may cause incorrect behavior and will be lost if the code is regenerated.
|
|
7
7
|
*/
|
|
8
8
|
/// <reference lib="esnext.asynciterable" />
|
|
9
|
+
export { getContinuationToken } from "./pagingHelper";
|
|
9
10
|
export * from "./models";
|
|
10
11
|
export { KeyVaultManagementClient } from "./keyVaultManagementClient";
|
|
11
12
|
export * from "./operationsInterfaces";
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;AAEH,4CAA4C;AAC5C,cAAc,UAAU,CAAC;AACzB,OAAO,EAAE,wBAAwB,EAAE,MAAM,4BAA4B,CAAC;AACtE,cAAc,wBAAwB,CAAC"}
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;AAEH,4CAA4C;AAC5C,OAAO,EAAE,oBAAoB,EAAE,MAAM,gBAAgB,CAAC;AACtD,cAAc,UAAU,CAAC;AACzB,OAAO,EAAE,wBAAwB,EAAE,MAAM,4BAA4B,CAAC;AACtE,cAAc,wBAAwB,CAAC"}
|
|
@@ -14,6 +14,8 @@ export declare class KeyVaultManagementClient extends coreClient.ServiceClient {
|
|
|
14
14
|
* @param options The parameter options
|
|
15
15
|
*/
|
|
16
16
|
constructor(credentials: coreAuth.TokenCredential, subscriptionId: string, options?: KeyVaultManagementClientOptionalParams);
|
|
17
|
+
/** A function that adds a policy that sets the api-version (or equivalent) to reflect the library version. */
|
|
18
|
+
private addCustomApiVersionPolicy;
|
|
17
19
|
vaults: Vaults;
|
|
18
20
|
privateEndpointConnections: PrivateEndpointConnections;
|
|
19
21
|
privateLinkResources: PrivateLinkResources;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"keyVaultManagementClient.d.ts","sourceRoot":"","sources":["../../src/keyVaultManagementClient.ts"],"names":[],"mappings":"AAQA,OAAO,KAAK,UAAU,MAAM,oBAAoB,CAAC;
|
|
1
|
+
{"version":3,"file":"keyVaultManagementClient.d.ts","sourceRoot":"","sources":["../../src/keyVaultManagementClient.ts"],"names":[],"mappings":"AAQA,OAAO,KAAK,UAAU,MAAM,oBAAoB,CAAC;AAOjD,OAAO,KAAK,QAAQ,MAAM,kBAAkB,CAAC;AAQ7C,OAAO,EACL,MAAM,EACN,0BAA0B,EAC1B,oBAAoB,EACpB,UAAU,EACV,OAAO,EACR,MAAM,wBAAwB,CAAC;AAChC,OAAO,EAAE,sCAAsC,EAAE,MAAM,UAAU,CAAC;AAElE,qBAAa,wBAAyB,SAAQ,UAAU,CAAC,aAAa;IACpE,KAAK,EAAE,MAAM,CAAC;IACd,UAAU,EAAE,MAAM,CAAC;IACnB,cAAc,EAAE,MAAM,CAAC;IAEvB;;;;;;OAMG;gBAED,WAAW,EAAE,QAAQ,CAAC,eAAe,EACrC,cAAc,EAAE,MAAM,EACtB,OAAO,CAAC,EAAE,sCAAsC;IAgFlD,8GAA8G;IAC9G,OAAO,CAAC,yBAAyB;IA2BjC,MAAM,EAAE,MAAM,CAAC;IACf,0BAA0B,EAAE,0BAA0B,CAAC;IACvD,oBAAoB,EAAE,oBAAoB,CAAC;IAC3C,UAAU,EAAE,UAAU,CAAC;IACvB,OAAO,EAAE,OAAO,CAAC;CAClB"}
|
|
@@ -5,7 +5,9 @@
|
|
|
5
5
|
* Code generated by Microsoft (R) AutoRest Code Generator.
|
|
6
6
|
* Changes may cause incorrect behavior and will be lost if the code is regenerated.
|
|
7
7
|
*/
|
|
8
|
+
import { __awaiter } from "tslib";
|
|
8
9
|
import * as coreClient from "@azure/core-client";
|
|
10
|
+
import * as coreRestPipeline from "@azure/core-rest-pipeline";
|
|
9
11
|
import { VaultsImpl, PrivateEndpointConnectionsImpl, PrivateLinkResourcesImpl, OperationsImpl, SecretsImpl } from "./operations";
|
|
10
12
|
export class KeyVaultManagementClient extends coreClient.ServiceClient {
|
|
11
13
|
/**
|
|
@@ -16,6 +18,7 @@ export class KeyVaultManagementClient extends coreClient.ServiceClient {
|
|
|
16
18
|
* @param options The parameter options
|
|
17
19
|
*/
|
|
18
20
|
constructor(credentials, subscriptionId, options) {
|
|
21
|
+
var _a, _b, _c;
|
|
19
22
|
if (credentials === undefined) {
|
|
20
23
|
throw new Error("'credentials' cannot be null");
|
|
21
24
|
}
|
|
@@ -30,17 +33,35 @@ export class KeyVaultManagementClient extends coreClient.ServiceClient {
|
|
|
30
33
|
requestContentType: "application/json; charset=utf-8",
|
|
31
34
|
credential: credentials
|
|
32
35
|
};
|
|
33
|
-
const packageDetails = `azsdk-js-arm-keyvault-profile-2020-09-01-hybrid/2.
|
|
36
|
+
const packageDetails = `azsdk-js-arm-keyvault-profile-2020-09-01-hybrid/2.1.0`;
|
|
34
37
|
const userAgentPrefix = options.userAgentOptions && options.userAgentOptions.userAgentPrefix
|
|
35
38
|
? `${options.userAgentOptions.userAgentPrefix} ${packageDetails}`
|
|
36
39
|
: `${packageDetails}`;
|
|
37
|
-
if (!options.credentialScopes) {
|
|
38
|
-
options.credentialScopes = ["https://management.azure.com/.default"];
|
|
39
|
-
}
|
|
40
40
|
const optionsWithDefaults = Object.assign(Object.assign(Object.assign({}, defaults), options), { userAgentOptions: {
|
|
41
41
|
userAgentPrefix
|
|
42
|
-
},
|
|
42
|
+
}, endpoint: (_b = (_a = options.endpoint) !== null && _a !== void 0 ? _a : options.baseUri) !== null && _b !== void 0 ? _b : "https://management.azure.com" });
|
|
43
43
|
super(optionsWithDefaults);
|
|
44
|
+
let bearerTokenAuthenticationPolicyFound = false;
|
|
45
|
+
if ((options === null || options === void 0 ? void 0 : options.pipeline) && options.pipeline.getOrderedPolicies().length > 0) {
|
|
46
|
+
const pipelinePolicies = options.pipeline.getOrderedPolicies();
|
|
47
|
+
bearerTokenAuthenticationPolicyFound = pipelinePolicies.some((pipelinePolicy) => pipelinePolicy.name ===
|
|
48
|
+
coreRestPipeline.bearerTokenAuthenticationPolicyName);
|
|
49
|
+
}
|
|
50
|
+
if (!options ||
|
|
51
|
+
!options.pipeline ||
|
|
52
|
+
options.pipeline.getOrderedPolicies().length == 0 ||
|
|
53
|
+
!bearerTokenAuthenticationPolicyFound) {
|
|
54
|
+
this.pipeline.removePolicy({
|
|
55
|
+
name: coreRestPipeline.bearerTokenAuthenticationPolicyName
|
|
56
|
+
});
|
|
57
|
+
this.pipeline.addPolicy(coreRestPipeline.bearerTokenAuthenticationPolicy({
|
|
58
|
+
credential: credentials,
|
|
59
|
+
scopes: (_c = optionsWithDefaults.credentialScopes) !== null && _c !== void 0 ? _c : `${optionsWithDefaults.endpoint}/.default`,
|
|
60
|
+
challengeCallbacks: {
|
|
61
|
+
authorizeRequestOnChallenge: coreClient.authorizeRequestOnClaimChallenge
|
|
62
|
+
}
|
|
63
|
+
}));
|
|
64
|
+
}
|
|
44
65
|
// Parameter assignments
|
|
45
66
|
this.subscriptionId = subscriptionId;
|
|
46
67
|
// Assigning values to Constant parameters
|
|
@@ -51,6 +72,34 @@ export class KeyVaultManagementClient extends coreClient.ServiceClient {
|
|
|
51
72
|
this.privateLinkResources = new PrivateLinkResourcesImpl(this);
|
|
52
73
|
this.operations = new OperationsImpl(this);
|
|
53
74
|
this.secrets = new SecretsImpl(this);
|
|
75
|
+
this.addCustomApiVersionPolicy(options.apiVersion);
|
|
76
|
+
}
|
|
77
|
+
/** A function that adds a policy that sets the api-version (or equivalent) to reflect the library version. */
|
|
78
|
+
addCustomApiVersionPolicy(apiVersion) {
|
|
79
|
+
if (!apiVersion) {
|
|
80
|
+
return;
|
|
81
|
+
}
|
|
82
|
+
const apiVersionPolicy = {
|
|
83
|
+
name: "CustomApiVersionPolicy",
|
|
84
|
+
sendRequest(request, next) {
|
|
85
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
86
|
+
const param = request.url.split("?");
|
|
87
|
+
if (param.length > 1) {
|
|
88
|
+
const newParams = param[1].split("&").map((item) => {
|
|
89
|
+
if (item.indexOf("api-version") > -1) {
|
|
90
|
+
return "api-version=" + apiVersion;
|
|
91
|
+
}
|
|
92
|
+
else {
|
|
93
|
+
return item;
|
|
94
|
+
}
|
|
95
|
+
});
|
|
96
|
+
request.url = param[0] + "?" + newParams.join("&");
|
|
97
|
+
}
|
|
98
|
+
return next(request);
|
|
99
|
+
});
|
|
100
|
+
}
|
|
101
|
+
};
|
|
102
|
+
this.pipeline.addPolicy(apiVersionPolicy);
|
|
54
103
|
}
|
|
55
104
|
}
|
|
56
105
|
//# sourceMappingURL=keyVaultManagementClient.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"keyVaultManagementClient.js","sourceRoot":"","sources":["../../src/keyVaultManagementClient.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG
|
|
1
|
+
{"version":3,"file":"keyVaultManagementClient.js","sourceRoot":"","sources":["../../src/keyVaultManagementClient.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,OAAO,KAAK,UAAU,MAAM,oBAAoB,CAAC;AACjD,OAAO,KAAK,gBAAgB,MAAM,2BAA2B,CAAC;AAO9D,OAAO,EACL,UAAU,EACV,8BAA8B,EAC9B,wBAAwB,EACxB,cAAc,EACd,WAAW,EACZ,MAAM,cAAc,CAAC;AAUtB,MAAM,OAAO,wBAAyB,SAAQ,UAAU,CAAC,aAAa;IAKpE;;;;;;OAMG;IACH,YACE,WAAqC,EACrC,cAAsB,EACtB,OAAgD;;QAEhD,IAAI,WAAW,KAAK,SAAS,EAAE;YAC7B,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;SACjD;QACD,IAAI,cAAc,KAAK,SAAS,EAAE;YAChC,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;SACpD;QAED,0CAA0C;QAC1C,IAAI,CAAC,OAAO,EAAE;YACZ,OAAO,GAAG,EAAE,CAAC;SACd;QACD,MAAM,QAAQ,GAA2C;YACvD,kBAAkB,EAAE,iCAAiC;YACrD,UAAU,EAAE,WAAW;SACxB,CAAC;QAEF,MAAM,cAAc,GAAG,uDAAuD,CAAC;QAC/E,MAAM,eAAe,GACnB,OAAO,CAAC,gBAAgB,IAAI,OAAO,CAAC,gBAAgB,CAAC,eAAe;YAClE,CAAC,CAAC,GAAG,OAAO,CAAC,gBAAgB,CAAC,eAAe,IAAI,cAAc,EAAE;YACjE,CAAC,CAAC,GAAG,cAAc,EAAE,CAAC;QAE1B,MAAM,mBAAmB,iDACpB,QAAQ,GACR,OAAO,KACV,gBAAgB,EAAE;gBAChB,eAAe;aAChB,EACD,QAAQ,EACN,MAAA,MAAA,OAAO,CAAC,QAAQ,mCAAI,OAAO,CAAC,OAAO,mCAAI,8BAA8B,GACxE,CAAC;QACF,KAAK,CAAC,mBAAmB,CAAC,CAAC;QAE3B,IAAI,oCAAoC,GAAY,KAAK,CAAC;QAC1D,IAAI,CAAA,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,QAAQ,KAAI,OAAO,CAAC,QAAQ,CAAC,kBAAkB,EAAE,CAAC,MAAM,GAAG,CAAC,EAAE;YACzE,MAAM,gBAAgB,GAAsC,OAAO,CAAC,QAAQ,CAAC,kBAAkB,EAAE,CAAC;YAClG,oCAAoC,GAAG,gBAAgB,CAAC,IAAI,CAC1D,CAAC,cAAc,EAAE,EAAE,CACjB,cAAc,CAAC,IAAI;gBACnB,gBAAgB,CAAC,mCAAmC,CACvD,CAAC;SACH;QACD,IACE,CAAC,OAAO;YACR,CAAC,OAAO,CAAC,QAAQ;YACjB,OAAO,CAAC,QAAQ,CAAC,kBAAkB,EAAE,CAAC,MAAM,IAAI,CAAC;YACjD,CAAC,oCAAoC,EACrC;YACA,IAAI,CAAC,QAAQ,CAAC,YAAY,CAAC;gBACzB,IAAI,EAAE,gBAAgB,CAAC,mCAAmC;aAC3D,CAAC,CAAC;YACH,IAAI,CAAC,QAAQ,CAAC,SAAS,CACrB,gBAAgB,CAAC,+BAA+B,CAAC;gBAC/C,UAAU,EAAE,WAAW;gBACvB,MAAM,EACJ,MAAA,mBAAmB,CAAC,gBAAgB,mCACpC,GAAG,mBAAmB,CAAC,QAAQ,WAAW;gBAC5C,kBAAkB,EAAE;oBAClB,2BAA2B,EACzB,UAAU,CAAC,gCAAgC;iBAC9C;aACF,CAAC,CACH,CAAC;SACH;QACD,wBAAwB;QACxB,IAAI,CAAC,cAAc,GAAG,cAAc,CAAC;QAErC,0CAA0C;QAC1C,IAAI,CAAC,KAAK,GAAG,OAAO,CAAC,KAAK,IAAI,8BAA8B,CAAC;QAC7D,IAAI,CAAC,UAAU,GAAG,OAAO,CAAC,UAAU,IAAI,YAAY,CAAC;QACrD,IAAI,CAAC,MAAM,GAAG,IAAI,UAAU,CAAC,IAAI,CAAC,CAAC;QACnC,IAAI,CAAC,0BAA0B,GAAG,IAAI,8BAA8B,CAAC,IAAI,CAAC,CAAC;QAC3E,IAAI,CAAC,oBAAoB,GAAG,IAAI,wBAAwB,CAAC,IAAI,CAAC,CAAC;QAC/D,IAAI,CAAC,UAAU,GAAG,IAAI,cAAc,CAAC,IAAI,CAAC,CAAC;QAC3C,IAAI,CAAC,OAAO,GAAG,IAAI,WAAW,CAAC,IAAI,CAAC,CAAC;QACrC,IAAI,CAAC,yBAAyB,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC;IACrD,CAAC;IAED,8GAA8G;IACtG,yBAAyB,CAAC,UAAmB;QACnD,IAAI,CAAC,UAAU,EAAE;YACf,OAAO;SACR;QACD,MAAM,gBAAgB,GAAG;YACvB,IAAI,EAAE,wBAAwB;YACxB,WAAW,CACf,OAAwB,EACxB,IAAiB;;oBAEjB,MAAM,KAAK,GAAG,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;oBACrC,IAAI,KAAK,CAAC,MAAM,GAAG,CAAC,EAAE;wBACpB,MAAM,SAAS,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE;4BACjD,IAAI,IAAI,CAAC,OAAO,CAAC,aAAa,CAAC,GAAG,CAAC,CAAC,EAAE;gCACpC,OAAO,cAAc,GAAG,UAAU,CAAC;6BACpC;iCAAM;gCACL,OAAO,IAAI,CAAC;6BACb;wBACH,CAAC,CAAC,CAAC;wBACH,OAAO,CAAC,GAAG,GAAG,KAAK,CAAC,CAAC,CAAC,GAAG,GAAG,GAAG,SAAS,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;qBACpD;oBACD,OAAO,IAAI,CAAC,OAAO,CAAC,CAAC;gBACvB,CAAC;aAAA;SACF,CAAC;QACF,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC,gBAAgB,CAAC,CAAC;IAC5C,CAAC;CAOF"}
|
|
@@ -530,7 +530,7 @@ export interface SecretListResult {
|
|
|
530
530
|
nextLink?: string;
|
|
531
531
|
}
|
|
532
532
|
/** Private endpoint connection resource. */
|
|
533
|
-
export
|
|
533
|
+
export interface PrivateEndpointConnection extends Resource {
|
|
534
534
|
/** Modified whenever there is a change in the state of private endpoint connection. */
|
|
535
535
|
etag?: string;
|
|
536
536
|
/** Properties of the private endpoint object. */
|
|
@@ -542,9 +542,9 @@ export declare type PrivateEndpointConnection = Resource & {
|
|
|
542
542
|
* NOTE: This property will not be serialized. It can only be populated by the server.
|
|
543
543
|
*/
|
|
544
544
|
readonly provisioningState?: PrivateEndpointConnectionProvisioningState;
|
|
545
|
-
}
|
|
545
|
+
}
|
|
546
546
|
/** A private link resource */
|
|
547
|
-
export
|
|
547
|
+
export interface PrivateLinkResource extends Resource {
|
|
548
548
|
/**
|
|
549
549
|
* Group identifier of private link resource.
|
|
550
550
|
* NOTE: This property will not be serialized. It can only be populated by the server.
|
|
@@ -557,14 +557,15 @@ export declare type PrivateLinkResource = Resource & {
|
|
|
557
557
|
readonly requiredMembers?: string[];
|
|
558
558
|
/** Required DNS zone names of the the private link resource. */
|
|
559
559
|
requiredZoneNames?: string[];
|
|
560
|
-
}
|
|
560
|
+
}
|
|
561
561
|
/** Resource information with extended details. */
|
|
562
|
-
export
|
|
562
|
+
export interface Secret extends Resource {
|
|
563
563
|
/** Properties of the secret */
|
|
564
564
|
properties: SecretProperties;
|
|
565
|
-
}
|
|
565
|
+
}
|
|
566
566
|
/** The secret management attributes. */
|
|
567
|
-
export
|
|
567
|
+
export interface SecretAttributes extends Attributes {
|
|
568
|
+
}
|
|
568
569
|
/** Defines headers for PrivateEndpointConnections_put operation. */
|
|
569
570
|
export interface PrivateEndpointConnectionsPutHeaders {
|
|
570
571
|
/** (specified only if operation does not finish synchronously) The recommended number of seconds to wait before calling the URI specified in Azure-AsyncOperation. */
|
|
@@ -581,6 +582,7 @@ export interface PrivateEndpointConnectionsDeleteHeaders {
|
|
|
581
582
|
}
|
|
582
583
|
/** Known values of {@link SkuFamily} that the service accepts. */
|
|
583
584
|
export declare enum KnownSkuFamily {
|
|
585
|
+
/** A */
|
|
584
586
|
A = "A"
|
|
585
587
|
}
|
|
586
588
|
/**
|
|
@@ -593,22 +595,39 @@ export declare enum KnownSkuFamily {
|
|
|
593
595
|
export declare type SkuFamily = string;
|
|
594
596
|
/** Known values of {@link KeyPermissions} that the service accepts. */
|
|
595
597
|
export declare enum KnownKeyPermissions {
|
|
598
|
+
/** All */
|
|
596
599
|
All = "all",
|
|
600
|
+
/** Encrypt */
|
|
597
601
|
Encrypt = "encrypt",
|
|
602
|
+
/** Decrypt */
|
|
598
603
|
Decrypt = "decrypt",
|
|
604
|
+
/** WrapKey */
|
|
599
605
|
WrapKey = "wrapKey",
|
|
606
|
+
/** UnwrapKey */
|
|
600
607
|
UnwrapKey = "unwrapKey",
|
|
608
|
+
/** Sign */
|
|
601
609
|
Sign = "sign",
|
|
610
|
+
/** Verify */
|
|
602
611
|
Verify = "verify",
|
|
612
|
+
/** Get */
|
|
603
613
|
Get = "get",
|
|
614
|
+
/** List */
|
|
604
615
|
List = "list",
|
|
616
|
+
/** Create */
|
|
605
617
|
Create = "create",
|
|
618
|
+
/** Update */
|
|
606
619
|
Update = "update",
|
|
620
|
+
/** Import */
|
|
607
621
|
Import = "import",
|
|
622
|
+
/** Delete */
|
|
608
623
|
Delete = "delete",
|
|
624
|
+
/** Backup */
|
|
609
625
|
Backup = "backup",
|
|
626
|
+
/** Restore */
|
|
610
627
|
Restore = "restore",
|
|
628
|
+
/** Recover */
|
|
611
629
|
Recover = "recover",
|
|
630
|
+
/** Purge */
|
|
612
631
|
Purge = "purge"
|
|
613
632
|
}
|
|
614
633
|
/**
|
|
@@ -637,14 +656,23 @@ export declare enum KnownKeyPermissions {
|
|
|
637
656
|
export declare type KeyPermissions = string;
|
|
638
657
|
/** Known values of {@link SecretPermissions} that the service accepts. */
|
|
639
658
|
export declare enum KnownSecretPermissions {
|
|
659
|
+
/** All */
|
|
640
660
|
All = "all",
|
|
661
|
+
/** Get */
|
|
641
662
|
Get = "get",
|
|
663
|
+
/** List */
|
|
642
664
|
List = "list",
|
|
665
|
+
/** Set */
|
|
643
666
|
Set = "set",
|
|
667
|
+
/** Delete */
|
|
644
668
|
Delete = "delete",
|
|
669
|
+
/** Backup */
|
|
645
670
|
Backup = "backup",
|
|
671
|
+
/** Restore */
|
|
646
672
|
Restore = "restore",
|
|
673
|
+
/** Recover */
|
|
647
674
|
Recover = "recover",
|
|
675
|
+
/** Purge */
|
|
648
676
|
Purge = "purge"
|
|
649
677
|
}
|
|
650
678
|
/**
|
|
@@ -665,22 +693,39 @@ export declare enum KnownSecretPermissions {
|
|
|
665
693
|
export declare type SecretPermissions = string;
|
|
666
694
|
/** Known values of {@link CertificatePermissions} that the service accepts. */
|
|
667
695
|
export declare enum KnownCertificatePermissions {
|
|
696
|
+
/** All */
|
|
668
697
|
All = "all",
|
|
698
|
+
/** Get */
|
|
669
699
|
Get = "get",
|
|
700
|
+
/** List */
|
|
670
701
|
List = "list",
|
|
702
|
+
/** Delete */
|
|
671
703
|
Delete = "delete",
|
|
704
|
+
/** Create */
|
|
672
705
|
Create = "create",
|
|
706
|
+
/** Import */
|
|
673
707
|
Import = "import",
|
|
708
|
+
/** Update */
|
|
674
709
|
Update = "update",
|
|
710
|
+
/** Managecontacts */
|
|
675
711
|
Managecontacts = "managecontacts",
|
|
712
|
+
/** Getissuers */
|
|
676
713
|
Getissuers = "getissuers",
|
|
714
|
+
/** Listissuers */
|
|
677
715
|
Listissuers = "listissuers",
|
|
716
|
+
/** Setissuers */
|
|
678
717
|
Setissuers = "setissuers",
|
|
718
|
+
/** Deleteissuers */
|
|
679
719
|
Deleteissuers = "deleteissuers",
|
|
720
|
+
/** Manageissuers */
|
|
680
721
|
Manageissuers = "manageissuers",
|
|
722
|
+
/** Recover */
|
|
681
723
|
Recover = "recover",
|
|
724
|
+
/** Purge */
|
|
682
725
|
Purge = "purge",
|
|
726
|
+
/** Backup */
|
|
683
727
|
Backup = "backup",
|
|
728
|
+
/** Restore */
|
|
684
729
|
Restore = "restore"
|
|
685
730
|
}
|
|
686
731
|
/**
|
|
@@ -709,20 +754,35 @@ export declare enum KnownCertificatePermissions {
|
|
|
709
754
|
export declare type CertificatePermissions = string;
|
|
710
755
|
/** Known values of {@link StoragePermissions} that the service accepts. */
|
|
711
756
|
export declare enum KnownStoragePermissions {
|
|
757
|
+
/** All */
|
|
712
758
|
All = "all",
|
|
759
|
+
/** Get */
|
|
713
760
|
Get = "get",
|
|
761
|
+
/** List */
|
|
714
762
|
List = "list",
|
|
763
|
+
/** Delete */
|
|
715
764
|
Delete = "delete",
|
|
765
|
+
/** Set */
|
|
716
766
|
Set = "set",
|
|
767
|
+
/** Update */
|
|
717
768
|
Update = "update",
|
|
769
|
+
/** Regeneratekey */
|
|
718
770
|
Regeneratekey = "regeneratekey",
|
|
771
|
+
/** Recover */
|
|
719
772
|
Recover = "recover",
|
|
773
|
+
/** Purge */
|
|
720
774
|
Purge = "purge",
|
|
775
|
+
/** Backup */
|
|
721
776
|
Backup = "backup",
|
|
777
|
+
/** Restore */
|
|
722
778
|
Restore = "restore",
|
|
779
|
+
/** Setsas */
|
|
723
780
|
Setsas = "setsas",
|
|
781
|
+
/** Listsas */
|
|
724
782
|
Listsas = "listsas",
|
|
783
|
+
/** Getsas */
|
|
725
784
|
Getsas = "getsas",
|
|
785
|
+
/** Deletesas */
|
|
726
786
|
Deletesas = "deletesas"
|
|
727
787
|
}
|
|
728
788
|
/**
|
|
@@ -749,7 +809,9 @@ export declare enum KnownStoragePermissions {
|
|
|
749
809
|
export declare type StoragePermissions = string;
|
|
750
810
|
/** Known values of {@link NetworkRuleBypassOptions} that the service accepts. */
|
|
751
811
|
export declare enum KnownNetworkRuleBypassOptions {
|
|
812
|
+
/** AzureServices */
|
|
752
813
|
AzureServices = "AzureServices",
|
|
814
|
+
/** None */
|
|
753
815
|
None = "None"
|
|
754
816
|
}
|
|
755
817
|
/**
|
|
@@ -763,7 +825,9 @@ export declare enum KnownNetworkRuleBypassOptions {
|
|
|
763
825
|
export declare type NetworkRuleBypassOptions = string;
|
|
764
826
|
/** Known values of {@link NetworkRuleAction} that the service accepts. */
|
|
765
827
|
export declare enum KnownNetworkRuleAction {
|
|
828
|
+
/** Allow */
|
|
766
829
|
Allow = "Allow",
|
|
830
|
+
/** Deny */
|
|
767
831
|
Deny = "Deny"
|
|
768
832
|
}
|
|
769
833
|
/**
|
|
@@ -777,7 +841,9 @@ export declare enum KnownNetworkRuleAction {
|
|
|
777
841
|
export declare type NetworkRuleAction = string;
|
|
778
842
|
/** Known values of {@link VaultProvisioningState} that the service accepts. */
|
|
779
843
|
export declare enum KnownVaultProvisioningState {
|
|
844
|
+
/** Succeeded */
|
|
780
845
|
Succeeded = "Succeeded",
|
|
846
|
+
/** RegisteringDns */
|
|
781
847
|
RegisteringDns = "RegisteringDns"
|
|
782
848
|
}
|
|
783
849
|
/**
|
|
@@ -791,9 +857,13 @@ export declare enum KnownVaultProvisioningState {
|
|
|
791
857
|
export declare type VaultProvisioningState = string;
|
|
792
858
|
/** Known values of {@link PrivateEndpointServiceConnectionStatus} that the service accepts. */
|
|
793
859
|
export declare enum KnownPrivateEndpointServiceConnectionStatus {
|
|
860
|
+
/** Pending */
|
|
794
861
|
Pending = "Pending",
|
|
862
|
+
/** Approved */
|
|
795
863
|
Approved = "Approved",
|
|
864
|
+
/** Rejected */
|
|
796
865
|
Rejected = "Rejected",
|
|
866
|
+
/** Disconnected */
|
|
797
867
|
Disconnected = "Disconnected"
|
|
798
868
|
}
|
|
799
869
|
/**
|
|
@@ -809,11 +879,17 @@ export declare enum KnownPrivateEndpointServiceConnectionStatus {
|
|
|
809
879
|
export declare type PrivateEndpointServiceConnectionStatus = string;
|
|
810
880
|
/** Known values of {@link PrivateEndpointConnectionProvisioningState} that the service accepts. */
|
|
811
881
|
export declare enum KnownPrivateEndpointConnectionProvisioningState {
|
|
882
|
+
/** Succeeded */
|
|
812
883
|
Succeeded = "Succeeded",
|
|
884
|
+
/** Creating */
|
|
813
885
|
Creating = "Creating",
|
|
886
|
+
/** Updating */
|
|
814
887
|
Updating = "Updating",
|
|
888
|
+
/** Deleting */
|
|
815
889
|
Deleting = "Deleting",
|
|
890
|
+
/** Failed */
|
|
816
891
|
Failed = "Failed",
|
|
892
|
+
/** Disconnected */
|
|
817
893
|
Disconnected = "Disconnected"
|
|
818
894
|
}
|
|
819
895
|
/**
|
|
@@ -909,15 +985,11 @@ export interface VaultsCheckNameAvailabilityOptionalParams extends coreClient.Op
|
|
|
909
985
|
export declare type VaultsCheckNameAvailabilityResponse = CheckNameAvailabilityResult;
|
|
910
986
|
/** Optional parameters. */
|
|
911
987
|
export interface VaultsListByResourceGroupNextOptionalParams extends coreClient.OperationOptions {
|
|
912
|
-
/** Maximum number of results to return. */
|
|
913
|
-
top?: number;
|
|
914
988
|
}
|
|
915
989
|
/** Contains response data for the listByResourceGroupNext operation. */
|
|
916
990
|
export declare type VaultsListByResourceGroupNextResponse = VaultListResult;
|
|
917
991
|
/** Optional parameters. */
|
|
918
992
|
export interface VaultsListBySubscriptionNextOptionalParams extends coreClient.OperationOptions {
|
|
919
|
-
/** Maximum number of results to return. */
|
|
920
|
-
top?: number;
|
|
921
993
|
}
|
|
922
994
|
/** Contains response data for the listBySubscriptionNext operation. */
|
|
923
995
|
export declare type VaultsListBySubscriptionNextResponse = VaultListResult;
|
|
@@ -928,8 +1000,6 @@ export interface VaultsListDeletedNextOptionalParams extends coreClient.Operatio
|
|
|
928
1000
|
export declare type VaultsListDeletedNextResponse = DeletedVaultListResult;
|
|
929
1001
|
/** Optional parameters. */
|
|
930
1002
|
export interface VaultsListNextOptionalParams extends coreClient.OperationOptions {
|
|
931
|
-
/** Maximum number of results to return. */
|
|
932
|
-
top?: number;
|
|
933
1003
|
}
|
|
934
1004
|
/** Contains response data for the listNext operation. */
|
|
935
1005
|
export declare type VaultsListNextResponse = ResourceListResult;
|
|
@@ -991,8 +1061,6 @@ export interface SecretsListOptionalParams extends coreClient.OperationOptions {
|
|
|
991
1061
|
export declare type SecretsListResponse = SecretListResult;
|
|
992
1062
|
/** Optional parameters. */
|
|
993
1063
|
export interface SecretsListNextOptionalParams extends coreClient.OperationOptions {
|
|
994
|
-
/** Maximum number of results to return. */
|
|
995
|
-
top?: number;
|
|
996
1064
|
}
|
|
997
1065
|
/** Contains response data for the listNext operation. */
|
|
998
1066
|
export declare type SecretsListNextResponse = SecretListResult;
|