@azure/arm-keyvault-profile-2020-09-01-hybrid 2.0.0-alpha.20221214.1 → 2.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (131) hide show
  1. package/CHANGELOG.md +15 -0
  2. package/dist/index.js +280 -57
  3. package/dist/index.js.map +1 -1
  4. package/dist/index.min.js +1 -1
  5. package/dist/index.min.js.map +1 -1
  6. package/dist-esm/samples-dev/operationsListSample.d.ts +2 -0
  7. package/dist-esm/samples-dev/operationsListSample.d.ts.map +1 -0
  8. package/dist-esm/samples-dev/operationsListSample.js +51 -0
  9. package/dist-esm/samples-dev/operationsListSample.js.map +1 -0
  10. package/dist-esm/samples-dev/privateEndpointConnectionsDeleteSample.d.ts +2 -0
  11. package/dist-esm/samples-dev/privateEndpointConnectionsDeleteSample.d.ts.map +1 -0
  12. package/dist-esm/samples-dev/privateEndpointConnectionsDeleteSample.js +40 -0
  13. package/dist-esm/samples-dev/privateEndpointConnectionsDeleteSample.js.map +1 -0
  14. package/dist-esm/samples-dev/privateEndpointConnectionsGetSample.d.ts +2 -0
  15. package/dist-esm/samples-dev/privateEndpointConnectionsGetSample.d.ts.map +1 -0
  16. package/dist-esm/samples-dev/privateEndpointConnectionsGetSample.js +40 -0
  17. package/dist-esm/samples-dev/privateEndpointConnectionsGetSample.js.map +1 -0
  18. package/dist-esm/samples-dev/privateEndpointConnectionsPutSample.d.ts +2 -0
  19. package/dist-esm/samples-dev/privateEndpointConnectionsPutSample.d.ts.map +1 -0
  20. package/dist-esm/samples-dev/privateEndpointConnectionsPutSample.js +47 -0
  21. package/dist-esm/samples-dev/privateEndpointConnectionsPutSample.js.map +1 -0
  22. package/dist-esm/samples-dev/privateLinkResourcesListByVaultSample.d.ts +2 -0
  23. package/dist-esm/samples-dev/privateLinkResourcesListByVaultSample.d.ts.map +1 -0
  24. package/dist-esm/samples-dev/privateLinkResourcesListByVaultSample.js +39 -0
  25. package/dist-esm/samples-dev/privateLinkResourcesListByVaultSample.js.map +1 -0
  26. package/dist-esm/samples-dev/secretsCreateOrUpdateSample.d.ts +2 -0
  27. package/dist-esm/samples-dev/secretsCreateOrUpdateSample.d.ts.map +1 -0
  28. package/dist-esm/samples-dev/secretsCreateOrUpdateSample.js +43 -0
  29. package/dist-esm/samples-dev/secretsCreateOrUpdateSample.js.map +1 -0
  30. package/dist-esm/samples-dev/secretsGetSample.d.ts +2 -0
  31. package/dist-esm/samples-dev/secretsGetSample.d.ts.map +1 -0
  32. package/dist-esm/samples-dev/secretsGetSample.js +40 -0
  33. package/dist-esm/samples-dev/secretsGetSample.js.map +1 -0
  34. package/dist-esm/samples-dev/secretsListSample.d.ts +2 -0
  35. package/dist-esm/samples-dev/secretsListSample.d.ts.map +1 -0
  36. package/dist-esm/samples-dev/secretsListSample.js +53 -0
  37. package/dist-esm/samples-dev/secretsListSample.js.map +1 -0
  38. package/dist-esm/samples-dev/secretsUpdateSample.d.ts +2 -0
  39. package/dist-esm/samples-dev/secretsUpdateSample.d.ts.map +1 -0
  40. package/dist-esm/samples-dev/secretsUpdateSample.js +43 -0
  41. package/dist-esm/samples-dev/secretsUpdateSample.js.map +1 -0
  42. package/dist-esm/samples-dev/vaultsCheckNameAvailabilitySample.d.ts +2 -0
  43. package/dist-esm/samples-dev/vaultsCheckNameAvailabilitySample.d.ts.map +1 -0
  44. package/dist-esm/samples-dev/vaultsCheckNameAvailabilitySample.js +41 -0
  45. package/dist-esm/samples-dev/vaultsCheckNameAvailabilitySample.js.map +1 -0
  46. package/dist-esm/samples-dev/vaultsCreateOrUpdateSample.d.ts +2 -0
  47. package/dist-esm/samples-dev/vaultsCreateOrUpdateSample.d.ts.map +1 -0
  48. package/dist-esm/samples-dev/vaultsCreateOrUpdateSample.js +140 -0
  49. package/dist-esm/samples-dev/vaultsCreateOrUpdateSample.js.map +1 -0
  50. package/dist-esm/samples-dev/vaultsDeleteSample.d.ts +2 -0
  51. package/dist-esm/samples-dev/vaultsDeleteSample.d.ts.map +1 -0
  52. package/dist-esm/samples-dev/vaultsDeleteSample.js +39 -0
  53. package/dist-esm/samples-dev/vaultsDeleteSample.js.map +1 -0
  54. package/dist-esm/samples-dev/vaultsGetDeletedSample.d.ts +2 -0
  55. package/dist-esm/samples-dev/vaultsGetDeletedSample.d.ts.map +1 -0
  56. package/dist-esm/samples-dev/vaultsGetDeletedSample.js +39 -0
  57. package/dist-esm/samples-dev/vaultsGetDeletedSample.js.map +1 -0
  58. package/dist-esm/samples-dev/vaultsGetSample.d.ts +2 -0
  59. package/dist-esm/samples-dev/vaultsGetSample.d.ts.map +1 -0
  60. package/dist-esm/samples-dev/vaultsGetSample.js +39 -0
  61. package/dist-esm/samples-dev/vaultsGetSample.js.map +1 -0
  62. package/dist-esm/samples-dev/vaultsListByResourceGroupSample.d.ts +2 -0
  63. package/dist-esm/samples-dev/vaultsListByResourceGroupSample.d.ts.map +1 -0
  64. package/dist-esm/samples-dev/vaultsListByResourceGroupSample.js +54 -0
  65. package/dist-esm/samples-dev/vaultsListByResourceGroupSample.js.map +1 -0
  66. package/dist-esm/samples-dev/vaultsListBySubscriptionSample.d.ts +2 -0
  67. package/dist-esm/samples-dev/vaultsListBySubscriptionSample.d.ts.map +1 -0
  68. package/dist-esm/samples-dev/vaultsListBySubscriptionSample.js +53 -0
  69. package/dist-esm/samples-dev/vaultsListBySubscriptionSample.js.map +1 -0
  70. package/dist-esm/samples-dev/vaultsListDeletedSample.d.ts +2 -0
  71. package/dist-esm/samples-dev/vaultsListDeletedSample.d.ts.map +1 -0
  72. package/dist-esm/samples-dev/vaultsListDeletedSample.js +51 -0
  73. package/dist-esm/samples-dev/vaultsListDeletedSample.js.map +1 -0
  74. package/dist-esm/samples-dev/vaultsListSample.d.ts +2 -0
  75. package/dist-esm/samples-dev/vaultsListSample.d.ts.map +1 -0
  76. package/dist-esm/samples-dev/vaultsListSample.js +53 -0
  77. package/dist-esm/samples-dev/vaultsListSample.js.map +1 -0
  78. package/dist-esm/samples-dev/vaultsPurgeDeletedSample.d.ts +2 -0
  79. package/dist-esm/samples-dev/vaultsPurgeDeletedSample.d.ts.map +1 -0
  80. package/dist-esm/samples-dev/vaultsPurgeDeletedSample.js +39 -0
  81. package/dist-esm/samples-dev/vaultsPurgeDeletedSample.js.map +1 -0
  82. package/dist-esm/samples-dev/vaultsUpdateAccessPolicySample.d.ts +2 -0
  83. package/dist-esm/samples-dev/vaultsUpdateAccessPolicySample.d.ts.map +1 -0
  84. package/dist-esm/samples-dev/vaultsUpdateAccessPolicySample.js +55 -0
  85. package/dist-esm/samples-dev/vaultsUpdateAccessPolicySample.js.map +1 -0
  86. package/dist-esm/samples-dev/vaultsUpdateSample.d.ts +2 -0
  87. package/dist-esm/samples-dev/vaultsUpdateSample.d.ts.map +1 -0
  88. package/dist-esm/samples-dev/vaultsUpdateSample.js +100 -0
  89. package/dist-esm/samples-dev/vaultsUpdateSample.js.map +1 -0
  90. package/dist-esm/src/index.d.ts +1 -0
  91. package/dist-esm/src/index.d.ts.map +1 -1
  92. package/dist-esm/src/index.js +1 -0
  93. package/dist-esm/src/index.js.map +1 -1
  94. package/dist-esm/src/keyVaultManagementClient.d.ts +2 -0
  95. package/dist-esm/src/keyVaultManagementClient.d.ts.map +1 -1
  96. package/dist-esm/src/keyVaultManagementClient.js +54 -5
  97. package/dist-esm/src/keyVaultManagementClient.js.map +1 -1
  98. package/dist-esm/src/models/index.d.ts +83 -15
  99. package/dist-esm/src/models/index.d.ts.map +1 -1
  100. package/dist-esm/src/models/index.js +75 -0
  101. package/dist-esm/src/models/index.js.map +1 -1
  102. package/dist-esm/src/operations/operations.d.ts.map +1 -1
  103. package/dist-esm/src/operations/operations.js +19 -8
  104. package/dist-esm/src/operations/operations.js.map +1 -1
  105. package/dist-esm/src/operations/privateEndpointConnections.d.ts.map +1 -1
  106. package/dist-esm/src/operations/privateEndpointConnections.js +3 -1
  107. package/dist-esm/src/operations/privateEndpointConnections.js.map +1 -1
  108. package/dist-esm/src/operations/secrets.d.ts.map +1 -1
  109. package/dist-esm/src/operations/secrets.js +19 -8
  110. package/dist-esm/src/operations/secrets.js.map +1 -1
  111. package/dist-esm/src/operations/vaults.d.ts.map +1 -1
  112. package/dist-esm/src/operations/vaults.js +79 -34
  113. package/dist-esm/src/operations/vaults.js.map +1 -1
  114. package/dist-esm/src/pagingHelper.d.ts +13 -0
  115. package/dist-esm/src/pagingHelper.d.ts.map +1 -0
  116. package/dist-esm/src/pagingHelper.js +32 -0
  117. package/dist-esm/src/pagingHelper.js.map +1 -0
  118. package/dist-esm/test/sampleTest.js +11 -13
  119. package/dist-esm/test/sampleTest.js.map +1 -1
  120. package/package.json +24 -11
  121. package/review/arm-keyvault-profile-2020-09-01-hybrid.api.md +11 -85
  122. package/src/index.ts +1 -0
  123. package/src/keyVaultManagementClient.ts +70 -5
  124. package/src/models/index.ts +86 -23
  125. package/src/operations/operations.ts +21 -9
  126. package/src/operations/privateEndpointConnections.ts +3 -1
  127. package/src/operations/secrets.ts +27 -10
  128. package/src/operations/vaults.ts +92 -39
  129. package/src/pagingHelper.ts +39 -0
  130. package/tsconfig.json +8 -2
  131. package/types/arm-keyvault-profile-2020-09-01-hybrid.d.ts +94 -15
@@ -0,0 +1,55 @@
1
+ /*
2
+ * Copyright (c) Microsoft Corporation.
3
+ * Licensed under the MIT License.
4
+ *
5
+ * Code generated by Microsoft (R) AutoRest Code Generator.
6
+ * Changes may cause incorrect behavior and will be lost if the code is regenerated.
7
+ */
8
+ import { __awaiter } from "tslib";
9
+ // Copyright (c) Microsoft Corporation.
10
+ // Licensed under the MIT License.
11
+ import { KeyVaultManagementClient } from "@azure/arm-keyvault-profile-2020-09-01-hybrid";
12
+ import { DefaultAzureCredential } from "@azure/identity";
13
+ import * as dotenv from "dotenv";
14
+ dotenv.config();
15
+ /**
16
+ * This sample demonstrates how to Update access policies in a key vault in the specified subscription.
17
+ *
18
+ * @summary Update access policies in a key vault in the specified subscription.
19
+ * x-ms-original-file: specification/keyvault/resource-manager/Microsoft.KeyVault/stable/2019-09-01/examples/updateAccessPoliciesAdd.json
20
+ */
21
+ function addAnAccessPolicyOrUpdateAnAccessPolicyWithNewPermissions() {
22
+ return __awaiter(this, void 0, void 0, function* () {
23
+ const subscriptionId = process.env["KEYVAULT_SUBSCRIPTION_ID"] ||
24
+ "00000000-0000-0000-0000-000000000000";
25
+ const resourceGroupName = process.env["KEYVAULT_RESOURCE_GROUP"] || "sample-group";
26
+ const vaultName = "sample-vault";
27
+ const operationKind = "add";
28
+ const parameters = {
29
+ properties: {
30
+ accessPolicies: [
31
+ {
32
+ objectId: "00000000-0000-0000-0000-000000000000",
33
+ permissions: {
34
+ certificates: ["get"],
35
+ keys: ["encrypt"],
36
+ secrets: ["get"]
37
+ },
38
+ tenantId: "00000000-0000-0000-0000-000000000000"
39
+ }
40
+ ]
41
+ }
42
+ };
43
+ const credential = new DefaultAzureCredential();
44
+ const client = new KeyVaultManagementClient(credential, subscriptionId);
45
+ const result = yield client.vaults.updateAccessPolicy(resourceGroupName, vaultName, operationKind, parameters);
46
+ console.log(result);
47
+ });
48
+ }
49
+ function main() {
50
+ return __awaiter(this, void 0, void 0, function* () {
51
+ addAnAccessPolicyOrUpdateAnAccessPolicyWithNewPermissions();
52
+ });
53
+ }
54
+ main().catch(console.error);
55
+ //# sourceMappingURL=vaultsUpdateAccessPolicySample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"vaultsUpdateAccessPolicySample.js","sourceRoot":"","sources":["../../samples-dev/vaultsUpdateAccessPolicySample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,wBAAwB,EACzB,MAAM,+CAA+C,CAAC;AACvD,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,yDAAyD;;QACtE,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,0BAA0B,CAAC;YACvC,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,yBAAyB,CAAC,IAAI,cAAc,CAAC;QAC3D,MAAM,SAAS,GAAG,cAAc,CAAC;QACjC,MAAM,aAAa,GAAG,KAAK,CAAC;QAC5B,MAAM,UAAU,GAAgC;YAC9C,UAAU,EAAE;gBACV,cAAc,EAAE;oBACd;wBACE,QAAQ,EAAE,sCAAsC;wBAChD,WAAW,EAAE;4BACX,YAAY,EAAE,CAAC,KAAK,CAAC;4BACrB,IAAI,EAAE,CAAC,SAAS,CAAC;4BACjB,OAAO,EAAE,CAAC,KAAK,CAAC;yBACjB;wBACD,QAAQ,EAAE,sCAAsC;qBACjD;iBACF;aACF;SACF,CAAC;QACF,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,kBAAkB,CACnD,iBAAiB,EACjB,SAAS,EACT,aAAa,EACb,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,yDAAyD,EAAE,CAAC;IAC9D,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=vaultsUpdateSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"vaultsUpdateSample.d.ts","sourceRoot":"","sources":["../../samples-dev/vaultsUpdateSample.ts"],"names":[],"mappings":""}
@@ -0,0 +1,100 @@
1
+ /*
2
+ * Copyright (c) Microsoft Corporation.
3
+ * Licensed under the MIT License.
4
+ *
5
+ * Code generated by Microsoft (R) AutoRest Code Generator.
6
+ * Changes may cause incorrect behavior and will be lost if the code is regenerated.
7
+ */
8
+ import { __awaiter } from "tslib";
9
+ // Copyright (c) Microsoft Corporation.
10
+ // Licensed under the MIT License.
11
+ import { KeyVaultManagementClient } from "@azure/arm-keyvault-profile-2020-09-01-hybrid";
12
+ import { DefaultAzureCredential } from "@azure/identity";
13
+ import * as dotenv from "dotenv";
14
+ dotenv.config();
15
+ /**
16
+ * This sample demonstrates how to Update a key vault in the specified subscription.
17
+ *
18
+ * @summary Update a key vault in the specified subscription.
19
+ * x-ms-original-file: specification/keyvault/resource-manager/Microsoft.KeyVault/stable/2019-09-01/examples/updateVault.json
20
+ */
21
+ function updateAnExistingVault() {
22
+ return __awaiter(this, void 0, void 0, function* () {
23
+ const subscriptionId = process.env["KEYVAULT_SUBSCRIPTION_ID"] ||
24
+ "00000000-0000-0000-0000-000000000000";
25
+ const resourceGroupName = process.env["KEYVAULT_RESOURCE_GROUP"] || "sample-resource-group";
26
+ const vaultName = "sample-vault";
27
+ const parameters = {
28
+ properties: {
29
+ accessPolicies: [
30
+ {
31
+ objectId: "00000000-0000-0000-0000-000000000000",
32
+ permissions: {
33
+ certificates: [
34
+ "get",
35
+ "list",
36
+ "delete",
37
+ "create",
38
+ "import",
39
+ "update",
40
+ "managecontacts",
41
+ "getissuers",
42
+ "listissuers",
43
+ "setissuers",
44
+ "deleteissuers",
45
+ "manageissuers",
46
+ "recover",
47
+ "purge"
48
+ ],
49
+ keys: [
50
+ "encrypt",
51
+ "decrypt",
52
+ "wrapKey",
53
+ "unwrapKey",
54
+ "sign",
55
+ "verify",
56
+ "get",
57
+ "list",
58
+ "create",
59
+ "update",
60
+ "import",
61
+ "delete",
62
+ "backup",
63
+ "restore",
64
+ "recover",
65
+ "purge"
66
+ ],
67
+ secrets: [
68
+ "get",
69
+ "list",
70
+ "set",
71
+ "delete",
72
+ "backup",
73
+ "restore",
74
+ "recover",
75
+ "purge"
76
+ ]
77
+ },
78
+ tenantId: "00000000-0000-0000-0000-000000000000"
79
+ }
80
+ ],
81
+ enabledForDeployment: true,
82
+ enabledForDiskEncryption: true,
83
+ enabledForTemplateDeployment: true,
84
+ sku: { name: "standard", family: "A" },
85
+ tenantId: "00000000-0000-0000-0000-000000000000"
86
+ }
87
+ };
88
+ const credential = new DefaultAzureCredential();
89
+ const client = new KeyVaultManagementClient(credential, subscriptionId);
90
+ const result = yield client.vaults.update(resourceGroupName, vaultName, parameters);
91
+ console.log(result);
92
+ });
93
+ }
94
+ function main() {
95
+ return __awaiter(this, void 0, void 0, function* () {
96
+ updateAnExistingVault();
97
+ });
98
+ }
99
+ main().catch(console.error);
100
+ //# sourceMappingURL=vaultsUpdateSample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"vaultsUpdateSample.js","sourceRoot":"","sources":["../../samples-dev/vaultsUpdateSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,wBAAwB,EACzB,MAAM,+CAA+C,CAAC;AACvD,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,qBAAqB;;QAClC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,0BAA0B,CAAC;YACvC,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,yBAAyB,CAAC,IAAI,uBAAuB,CAAC;QACpE,MAAM,SAAS,GAAG,cAAc,CAAC;QACjC,MAAM,UAAU,GAAyB;YACvC,UAAU,EAAE;gBACV,cAAc,EAAE;oBACd;wBACE,QAAQ,EAAE,sCAAsC;wBAChD,WAAW,EAAE;4BACX,YAAY,EAAE;gCACZ,KAAK;gCACL,MAAM;gCACN,QAAQ;gCACR,QAAQ;gCACR,QAAQ;gCACR,QAAQ;gCACR,gBAAgB;gCAChB,YAAY;gCACZ,aAAa;gCACb,YAAY;gCACZ,eAAe;gCACf,eAAe;gCACf,SAAS;gCACT,OAAO;6BACR;4BACD,IAAI,EAAE;gCACJ,SAAS;gCACT,SAAS;gCACT,SAAS;gCACT,WAAW;gCACX,MAAM;gCACN,QAAQ;gCACR,KAAK;gCACL,MAAM;gCACN,QAAQ;gCACR,QAAQ;gCACR,QAAQ;gCACR,QAAQ;gCACR,QAAQ;gCACR,SAAS;gCACT,SAAS;gCACT,OAAO;6BACR;4BACD,OAAO,EAAE;gCACP,KAAK;gCACL,MAAM;gCACN,KAAK;gCACL,QAAQ;gCACR,QAAQ;gCACR,SAAS;gCACT,SAAS;gCACT,OAAO;6BACR;yBACF;wBACD,QAAQ,EAAE,sCAAsC;qBACjD;iBACF;gBACD,oBAAoB,EAAE,IAAI;gBAC1B,wBAAwB,EAAE,IAAI;gBAC9B,4BAA4B,EAAE,IAAI;gBAClC,GAAG,EAAE,EAAE,IAAI,EAAE,UAAU,EAAE,MAAM,EAAE,GAAG,EAAE;gBACtC,QAAQ,EAAE,sCAAsC;aACjD;SACF,CAAC;QACF,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,MAAM,CACvC,iBAAiB,EACjB,SAAS,EACT,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,qBAAqB,EAAE,CAAC;IAC1B,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -1,4 +1,5 @@
1
1
  /// <reference lib="esnext.asynciterable" />
2
+ export { getContinuationToken } from "./pagingHelper";
2
3
  export * from "./models";
3
4
  export { KeyVaultManagementClient } from "./keyVaultManagementClient";
4
5
  export * from "./operationsInterfaces";
@@ -1 +1 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":";AASA,cAAc,UAAU,CAAC;AACzB,OAAO,EAAE,wBAAwB,EAAE,MAAM,4BAA4B,CAAC;AACtE,cAAc,wBAAwB,CAAC"}
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":";AASA,OAAO,EAAE,oBAAoB,EAAE,MAAM,gBAAgB,CAAC;AACtD,cAAc,UAAU,CAAC;AACzB,OAAO,EAAE,wBAAwB,EAAE,MAAM,4BAA4B,CAAC;AACtE,cAAc,wBAAwB,CAAC"}
@@ -6,6 +6,7 @@
6
6
  * Changes may cause incorrect behavior and will be lost if the code is regenerated.
7
7
  */
8
8
  /// <reference lib="esnext.asynciterable" />
9
+ export { getContinuationToken } from "./pagingHelper";
9
10
  export * from "./models";
10
11
  export { KeyVaultManagementClient } from "./keyVaultManagementClient";
11
12
  export * from "./operationsInterfaces";
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;AAEH,4CAA4C;AAC5C,cAAc,UAAU,CAAC;AACzB,OAAO,EAAE,wBAAwB,EAAE,MAAM,4BAA4B,CAAC;AACtE,cAAc,wBAAwB,CAAC"}
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;AAEH,4CAA4C;AAC5C,OAAO,EAAE,oBAAoB,EAAE,MAAM,gBAAgB,CAAC;AACtD,cAAc,UAAU,CAAC;AACzB,OAAO,EAAE,wBAAwB,EAAE,MAAM,4BAA4B,CAAC;AACtE,cAAc,wBAAwB,CAAC"}
@@ -14,6 +14,8 @@ export declare class KeyVaultManagementClient extends coreClient.ServiceClient {
14
14
  * @param options The parameter options
15
15
  */
16
16
  constructor(credentials: coreAuth.TokenCredential, subscriptionId: string, options?: KeyVaultManagementClientOptionalParams);
17
+ /** A function that adds a policy that sets the api-version (or equivalent) to reflect the library version. */
18
+ private addCustomApiVersionPolicy;
17
19
  vaults: Vaults;
18
20
  privateEndpointConnections: PrivateEndpointConnections;
19
21
  privateLinkResources: PrivateLinkResources;
@@ -1 +1 @@
1
- {"version":3,"file":"keyVaultManagementClient.d.ts","sourceRoot":"","sources":["../../src/keyVaultManagementClient.ts"],"names":[],"mappings":"AAQA,OAAO,KAAK,UAAU,MAAM,oBAAoB,CAAC;AACjD,OAAO,KAAK,QAAQ,MAAM,kBAAkB,CAAC;AAQ7C,OAAO,EACL,MAAM,EACN,0BAA0B,EAC1B,oBAAoB,EACpB,UAAU,EACV,OAAO,EACR,MAAM,wBAAwB,CAAC;AAChC,OAAO,EAAE,sCAAsC,EAAE,MAAM,UAAU,CAAC;AAElE,qBAAa,wBAAyB,SAAQ,UAAU,CAAC,aAAa;IACpE,KAAK,EAAE,MAAM,CAAC;IACd,UAAU,EAAE,MAAM,CAAC;IACnB,cAAc,EAAE,MAAM,CAAC;IAEvB;;;;;;OAMG;gBAED,WAAW,EAAE,QAAQ,CAAC,eAAe,EACrC,cAAc,EAAE,MAAM,EACtB,OAAO,CAAC,EAAE,sCAAsC;IAiDlD,MAAM,EAAE,MAAM,CAAC;IACf,0BAA0B,EAAE,0BAA0B,CAAC;IACvD,oBAAoB,EAAE,oBAAoB,CAAC;IAC3C,UAAU,EAAE,UAAU,CAAC;IACvB,OAAO,EAAE,OAAO,CAAC;CAClB"}
1
+ {"version":3,"file":"keyVaultManagementClient.d.ts","sourceRoot":"","sources":["../../src/keyVaultManagementClient.ts"],"names":[],"mappings":"AAQA,OAAO,KAAK,UAAU,MAAM,oBAAoB,CAAC;AAOjD,OAAO,KAAK,QAAQ,MAAM,kBAAkB,CAAC;AAQ7C,OAAO,EACL,MAAM,EACN,0BAA0B,EAC1B,oBAAoB,EACpB,UAAU,EACV,OAAO,EACR,MAAM,wBAAwB,CAAC;AAChC,OAAO,EAAE,sCAAsC,EAAE,MAAM,UAAU,CAAC;AAElE,qBAAa,wBAAyB,SAAQ,UAAU,CAAC,aAAa;IACpE,KAAK,EAAE,MAAM,CAAC;IACd,UAAU,EAAE,MAAM,CAAC;IACnB,cAAc,EAAE,MAAM,CAAC;IAEvB;;;;;;OAMG;gBAED,WAAW,EAAE,QAAQ,CAAC,eAAe,EACrC,cAAc,EAAE,MAAM,EACtB,OAAO,CAAC,EAAE,sCAAsC;IAgFlD,8GAA8G;IAC9G,OAAO,CAAC,yBAAyB;IA2BjC,MAAM,EAAE,MAAM,CAAC;IACf,0BAA0B,EAAE,0BAA0B,CAAC;IACvD,oBAAoB,EAAE,oBAAoB,CAAC;IAC3C,UAAU,EAAE,UAAU,CAAC;IACvB,OAAO,EAAE,OAAO,CAAC;CAClB"}
@@ -5,7 +5,9 @@
5
5
  * Code generated by Microsoft (R) AutoRest Code Generator.
6
6
  * Changes may cause incorrect behavior and will be lost if the code is regenerated.
7
7
  */
8
+ import { __awaiter } from "tslib";
8
9
  import * as coreClient from "@azure/core-client";
10
+ import * as coreRestPipeline from "@azure/core-rest-pipeline";
9
11
  import { VaultsImpl, PrivateEndpointConnectionsImpl, PrivateLinkResourcesImpl, OperationsImpl, SecretsImpl } from "./operations";
10
12
  export class KeyVaultManagementClient extends coreClient.ServiceClient {
11
13
  /**
@@ -16,6 +18,7 @@ export class KeyVaultManagementClient extends coreClient.ServiceClient {
16
18
  * @param options The parameter options
17
19
  */
18
20
  constructor(credentials, subscriptionId, options) {
21
+ var _a, _b, _c;
19
22
  if (credentials === undefined) {
20
23
  throw new Error("'credentials' cannot be null");
21
24
  }
@@ -30,17 +33,35 @@ export class KeyVaultManagementClient extends coreClient.ServiceClient {
30
33
  requestContentType: "application/json; charset=utf-8",
31
34
  credential: credentials
32
35
  };
33
- const packageDetails = `azsdk-js-arm-keyvault-profile-2020-09-01-hybrid/2.0.0`;
36
+ const packageDetails = `azsdk-js-arm-keyvault-profile-2020-09-01-hybrid/2.1.0`;
34
37
  const userAgentPrefix = options.userAgentOptions && options.userAgentOptions.userAgentPrefix
35
38
  ? `${options.userAgentOptions.userAgentPrefix} ${packageDetails}`
36
39
  : `${packageDetails}`;
37
- if (!options.credentialScopes) {
38
- options.credentialScopes = ["https://management.azure.com/.default"];
39
- }
40
40
  const optionsWithDefaults = Object.assign(Object.assign(Object.assign({}, defaults), options), { userAgentOptions: {
41
41
  userAgentPrefix
42
- }, baseUri: options.endpoint || "https://management.azure.com" });
42
+ }, endpoint: (_b = (_a = options.endpoint) !== null && _a !== void 0 ? _a : options.baseUri) !== null && _b !== void 0 ? _b : "https://management.azure.com" });
43
43
  super(optionsWithDefaults);
44
+ let bearerTokenAuthenticationPolicyFound = false;
45
+ if ((options === null || options === void 0 ? void 0 : options.pipeline) && options.pipeline.getOrderedPolicies().length > 0) {
46
+ const pipelinePolicies = options.pipeline.getOrderedPolicies();
47
+ bearerTokenAuthenticationPolicyFound = pipelinePolicies.some((pipelinePolicy) => pipelinePolicy.name ===
48
+ coreRestPipeline.bearerTokenAuthenticationPolicyName);
49
+ }
50
+ if (!options ||
51
+ !options.pipeline ||
52
+ options.pipeline.getOrderedPolicies().length == 0 ||
53
+ !bearerTokenAuthenticationPolicyFound) {
54
+ this.pipeline.removePolicy({
55
+ name: coreRestPipeline.bearerTokenAuthenticationPolicyName
56
+ });
57
+ this.pipeline.addPolicy(coreRestPipeline.bearerTokenAuthenticationPolicy({
58
+ credential: credentials,
59
+ scopes: (_c = optionsWithDefaults.credentialScopes) !== null && _c !== void 0 ? _c : `${optionsWithDefaults.endpoint}/.default`,
60
+ challengeCallbacks: {
61
+ authorizeRequestOnChallenge: coreClient.authorizeRequestOnClaimChallenge
62
+ }
63
+ }));
64
+ }
44
65
  // Parameter assignments
45
66
  this.subscriptionId = subscriptionId;
46
67
  // Assigning values to Constant parameters
@@ -51,6 +72,34 @@ export class KeyVaultManagementClient extends coreClient.ServiceClient {
51
72
  this.privateLinkResources = new PrivateLinkResourcesImpl(this);
52
73
  this.operations = new OperationsImpl(this);
53
74
  this.secrets = new SecretsImpl(this);
75
+ this.addCustomApiVersionPolicy(options.apiVersion);
76
+ }
77
+ /** A function that adds a policy that sets the api-version (or equivalent) to reflect the library version. */
78
+ addCustomApiVersionPolicy(apiVersion) {
79
+ if (!apiVersion) {
80
+ return;
81
+ }
82
+ const apiVersionPolicy = {
83
+ name: "CustomApiVersionPolicy",
84
+ sendRequest(request, next) {
85
+ return __awaiter(this, void 0, void 0, function* () {
86
+ const param = request.url.split("?");
87
+ if (param.length > 1) {
88
+ const newParams = param[1].split("&").map((item) => {
89
+ if (item.indexOf("api-version") > -1) {
90
+ return "api-version=" + apiVersion;
91
+ }
92
+ else {
93
+ return item;
94
+ }
95
+ });
96
+ request.url = param[0] + "?" + newParams.join("&");
97
+ }
98
+ return next(request);
99
+ });
100
+ }
101
+ };
102
+ this.pipeline.addPolicy(apiVersionPolicy);
54
103
  }
55
104
  }
56
105
  //# sourceMappingURL=keyVaultManagementClient.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"keyVaultManagementClient.js","sourceRoot":"","sources":["../../src/keyVaultManagementClient.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;AAEH,OAAO,KAAK,UAAU,MAAM,oBAAoB,CAAC;AAEjD,OAAO,EACL,UAAU,EACV,8BAA8B,EAC9B,wBAAwB,EACxB,cAAc,EACd,WAAW,EACZ,MAAM,cAAc,CAAC;AAUtB,MAAM,OAAO,wBAAyB,SAAQ,UAAU,CAAC,aAAa;IAKpE;;;;;;OAMG;IACH,YACE,WAAqC,EACrC,cAAsB,EACtB,OAAgD;QAEhD,IAAI,WAAW,KAAK,SAAS,EAAE;YAC7B,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;SACjD;QACD,IAAI,cAAc,KAAK,SAAS,EAAE;YAChC,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;SACpD;QAED,0CAA0C;QAC1C,IAAI,CAAC,OAAO,EAAE;YACZ,OAAO,GAAG,EAAE,CAAC;SACd;QACD,MAAM,QAAQ,GAA2C;YACvD,kBAAkB,EAAE,iCAAiC;YACrD,UAAU,EAAE,WAAW;SACxB,CAAC;QAEF,MAAM,cAAc,GAAG,uDAAuD,CAAC;QAC/E,MAAM,eAAe,GACnB,OAAO,CAAC,gBAAgB,IAAI,OAAO,CAAC,gBAAgB,CAAC,eAAe;YAClE,CAAC,CAAC,GAAG,OAAO,CAAC,gBAAgB,CAAC,eAAe,IAAI,cAAc,EAAE;YACjE,CAAC,CAAC,GAAG,cAAc,EAAE,CAAC;QAE1B,IAAI,CAAC,OAAO,CAAC,gBAAgB,EAAE;YAC7B,OAAO,CAAC,gBAAgB,GAAG,CAAC,uCAAuC,CAAC,CAAC;SACtE;QACD,MAAM,mBAAmB,iDACpB,QAAQ,GACR,OAAO,KACV,gBAAgB,EAAE;gBAChB,eAAe;aAChB,EACD,OAAO,EAAE,OAAO,CAAC,QAAQ,IAAI,8BAA8B,GAC5D,CAAC;QACF,KAAK,CAAC,mBAAmB,CAAC,CAAC;QAC3B,wBAAwB;QACxB,IAAI,CAAC,cAAc,GAAG,cAAc,CAAC;QAErC,0CAA0C;QAC1C,IAAI,CAAC,KAAK,GAAG,OAAO,CAAC,KAAK,IAAI,8BAA8B,CAAC;QAC7D,IAAI,CAAC,UAAU,GAAG,OAAO,CAAC,UAAU,IAAI,YAAY,CAAC;QACrD,IAAI,CAAC,MAAM,GAAG,IAAI,UAAU,CAAC,IAAI,CAAC,CAAC;QACnC,IAAI,CAAC,0BAA0B,GAAG,IAAI,8BAA8B,CAAC,IAAI,CAAC,CAAC;QAC3E,IAAI,CAAC,oBAAoB,GAAG,IAAI,wBAAwB,CAAC,IAAI,CAAC,CAAC;QAC/D,IAAI,CAAC,UAAU,GAAG,IAAI,cAAc,CAAC,IAAI,CAAC,CAAC;QAC3C,IAAI,CAAC,OAAO,GAAG,IAAI,WAAW,CAAC,IAAI,CAAC,CAAC;IACvC,CAAC;CAOF"}
1
+ {"version":3,"file":"keyVaultManagementClient.js","sourceRoot":"","sources":["../../src/keyVaultManagementClient.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,OAAO,KAAK,UAAU,MAAM,oBAAoB,CAAC;AACjD,OAAO,KAAK,gBAAgB,MAAM,2BAA2B,CAAC;AAO9D,OAAO,EACL,UAAU,EACV,8BAA8B,EAC9B,wBAAwB,EACxB,cAAc,EACd,WAAW,EACZ,MAAM,cAAc,CAAC;AAUtB,MAAM,OAAO,wBAAyB,SAAQ,UAAU,CAAC,aAAa;IAKpE;;;;;;OAMG;IACH,YACE,WAAqC,EACrC,cAAsB,EACtB,OAAgD;;QAEhD,IAAI,WAAW,KAAK,SAAS,EAAE;YAC7B,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;SACjD;QACD,IAAI,cAAc,KAAK,SAAS,EAAE;YAChC,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;SACpD;QAED,0CAA0C;QAC1C,IAAI,CAAC,OAAO,EAAE;YACZ,OAAO,GAAG,EAAE,CAAC;SACd;QACD,MAAM,QAAQ,GAA2C;YACvD,kBAAkB,EAAE,iCAAiC;YACrD,UAAU,EAAE,WAAW;SACxB,CAAC;QAEF,MAAM,cAAc,GAAG,uDAAuD,CAAC;QAC/E,MAAM,eAAe,GACnB,OAAO,CAAC,gBAAgB,IAAI,OAAO,CAAC,gBAAgB,CAAC,eAAe;YAClE,CAAC,CAAC,GAAG,OAAO,CAAC,gBAAgB,CAAC,eAAe,IAAI,cAAc,EAAE;YACjE,CAAC,CAAC,GAAG,cAAc,EAAE,CAAC;QAE1B,MAAM,mBAAmB,iDACpB,QAAQ,GACR,OAAO,KACV,gBAAgB,EAAE;gBAChB,eAAe;aAChB,EACD,QAAQ,EACN,MAAA,MAAA,OAAO,CAAC,QAAQ,mCAAI,OAAO,CAAC,OAAO,mCAAI,8BAA8B,GACxE,CAAC;QACF,KAAK,CAAC,mBAAmB,CAAC,CAAC;QAE3B,IAAI,oCAAoC,GAAY,KAAK,CAAC;QAC1D,IAAI,CAAA,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,QAAQ,KAAI,OAAO,CAAC,QAAQ,CAAC,kBAAkB,EAAE,CAAC,MAAM,GAAG,CAAC,EAAE;YACzE,MAAM,gBAAgB,GAAsC,OAAO,CAAC,QAAQ,CAAC,kBAAkB,EAAE,CAAC;YAClG,oCAAoC,GAAG,gBAAgB,CAAC,IAAI,CAC1D,CAAC,cAAc,EAAE,EAAE,CACjB,cAAc,CAAC,IAAI;gBACnB,gBAAgB,CAAC,mCAAmC,CACvD,CAAC;SACH;QACD,IACE,CAAC,OAAO;YACR,CAAC,OAAO,CAAC,QAAQ;YACjB,OAAO,CAAC,QAAQ,CAAC,kBAAkB,EAAE,CAAC,MAAM,IAAI,CAAC;YACjD,CAAC,oCAAoC,EACrC;YACA,IAAI,CAAC,QAAQ,CAAC,YAAY,CAAC;gBACzB,IAAI,EAAE,gBAAgB,CAAC,mCAAmC;aAC3D,CAAC,CAAC;YACH,IAAI,CAAC,QAAQ,CAAC,SAAS,CACrB,gBAAgB,CAAC,+BAA+B,CAAC;gBAC/C,UAAU,EAAE,WAAW;gBACvB,MAAM,EACJ,MAAA,mBAAmB,CAAC,gBAAgB,mCACpC,GAAG,mBAAmB,CAAC,QAAQ,WAAW;gBAC5C,kBAAkB,EAAE;oBAClB,2BAA2B,EACzB,UAAU,CAAC,gCAAgC;iBAC9C;aACF,CAAC,CACH,CAAC;SACH;QACD,wBAAwB;QACxB,IAAI,CAAC,cAAc,GAAG,cAAc,CAAC;QAErC,0CAA0C;QAC1C,IAAI,CAAC,KAAK,GAAG,OAAO,CAAC,KAAK,IAAI,8BAA8B,CAAC;QAC7D,IAAI,CAAC,UAAU,GAAG,OAAO,CAAC,UAAU,IAAI,YAAY,CAAC;QACrD,IAAI,CAAC,MAAM,GAAG,IAAI,UAAU,CAAC,IAAI,CAAC,CAAC;QACnC,IAAI,CAAC,0BAA0B,GAAG,IAAI,8BAA8B,CAAC,IAAI,CAAC,CAAC;QAC3E,IAAI,CAAC,oBAAoB,GAAG,IAAI,wBAAwB,CAAC,IAAI,CAAC,CAAC;QAC/D,IAAI,CAAC,UAAU,GAAG,IAAI,cAAc,CAAC,IAAI,CAAC,CAAC;QAC3C,IAAI,CAAC,OAAO,GAAG,IAAI,WAAW,CAAC,IAAI,CAAC,CAAC;QACrC,IAAI,CAAC,yBAAyB,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC;IACrD,CAAC;IAED,8GAA8G;IACtG,yBAAyB,CAAC,UAAmB;QACnD,IAAI,CAAC,UAAU,EAAE;YACf,OAAO;SACR;QACD,MAAM,gBAAgB,GAAG;YACvB,IAAI,EAAE,wBAAwB;YACxB,WAAW,CACf,OAAwB,EACxB,IAAiB;;oBAEjB,MAAM,KAAK,GAAG,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;oBACrC,IAAI,KAAK,CAAC,MAAM,GAAG,CAAC,EAAE;wBACpB,MAAM,SAAS,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE;4BACjD,IAAI,IAAI,CAAC,OAAO,CAAC,aAAa,CAAC,GAAG,CAAC,CAAC,EAAE;gCACpC,OAAO,cAAc,GAAG,UAAU,CAAC;6BACpC;iCAAM;gCACL,OAAO,IAAI,CAAC;6BACb;wBACH,CAAC,CAAC,CAAC;wBACH,OAAO,CAAC,GAAG,GAAG,KAAK,CAAC,CAAC,CAAC,GAAG,GAAG,GAAG,SAAS,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;qBACpD;oBACD,OAAO,IAAI,CAAC,OAAO,CAAC,CAAC;gBACvB,CAAC;aAAA;SACF,CAAC;QACF,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC,gBAAgB,CAAC,CAAC;IAC5C,CAAC;CAOF"}
@@ -530,7 +530,7 @@ export interface SecretListResult {
530
530
  nextLink?: string;
531
531
  }
532
532
  /** Private endpoint connection resource. */
533
- export declare type PrivateEndpointConnection = Resource & {
533
+ export interface PrivateEndpointConnection extends Resource {
534
534
  /** Modified whenever there is a change in the state of private endpoint connection. */
535
535
  etag?: string;
536
536
  /** Properties of the private endpoint object. */
@@ -542,9 +542,9 @@ export declare type PrivateEndpointConnection = Resource & {
542
542
  * NOTE: This property will not be serialized. It can only be populated by the server.
543
543
  */
544
544
  readonly provisioningState?: PrivateEndpointConnectionProvisioningState;
545
- };
545
+ }
546
546
  /** A private link resource */
547
- export declare type PrivateLinkResource = Resource & {
547
+ export interface PrivateLinkResource extends Resource {
548
548
  /**
549
549
  * Group identifier of private link resource.
550
550
  * NOTE: This property will not be serialized. It can only be populated by the server.
@@ -557,14 +557,15 @@ export declare type PrivateLinkResource = Resource & {
557
557
  readonly requiredMembers?: string[];
558
558
  /** Required DNS zone names of the the private link resource. */
559
559
  requiredZoneNames?: string[];
560
- };
560
+ }
561
561
  /** Resource information with extended details. */
562
- export declare type Secret = Resource & {
562
+ export interface Secret extends Resource {
563
563
  /** Properties of the secret */
564
564
  properties: SecretProperties;
565
- };
565
+ }
566
566
  /** The secret management attributes. */
567
- export declare type SecretAttributes = Attributes & {};
567
+ export interface SecretAttributes extends Attributes {
568
+ }
568
569
  /** Defines headers for PrivateEndpointConnections_put operation. */
569
570
  export interface PrivateEndpointConnectionsPutHeaders {
570
571
  /** (specified only if operation does not finish synchronously) The recommended number of seconds to wait before calling the URI specified in Azure-AsyncOperation. */
@@ -581,6 +582,7 @@ export interface PrivateEndpointConnectionsDeleteHeaders {
581
582
  }
582
583
  /** Known values of {@link SkuFamily} that the service accepts. */
583
584
  export declare enum KnownSkuFamily {
585
+ /** A */
584
586
  A = "A"
585
587
  }
586
588
  /**
@@ -593,22 +595,39 @@ export declare enum KnownSkuFamily {
593
595
  export declare type SkuFamily = string;
594
596
  /** Known values of {@link KeyPermissions} that the service accepts. */
595
597
  export declare enum KnownKeyPermissions {
598
+ /** All */
596
599
  All = "all",
600
+ /** Encrypt */
597
601
  Encrypt = "encrypt",
602
+ /** Decrypt */
598
603
  Decrypt = "decrypt",
604
+ /** WrapKey */
599
605
  WrapKey = "wrapKey",
606
+ /** UnwrapKey */
600
607
  UnwrapKey = "unwrapKey",
608
+ /** Sign */
601
609
  Sign = "sign",
610
+ /** Verify */
602
611
  Verify = "verify",
612
+ /** Get */
603
613
  Get = "get",
614
+ /** List */
604
615
  List = "list",
616
+ /** Create */
605
617
  Create = "create",
618
+ /** Update */
606
619
  Update = "update",
620
+ /** Import */
607
621
  Import = "import",
622
+ /** Delete */
608
623
  Delete = "delete",
624
+ /** Backup */
609
625
  Backup = "backup",
626
+ /** Restore */
610
627
  Restore = "restore",
628
+ /** Recover */
611
629
  Recover = "recover",
630
+ /** Purge */
612
631
  Purge = "purge"
613
632
  }
614
633
  /**
@@ -637,14 +656,23 @@ export declare enum KnownKeyPermissions {
637
656
  export declare type KeyPermissions = string;
638
657
  /** Known values of {@link SecretPermissions} that the service accepts. */
639
658
  export declare enum KnownSecretPermissions {
659
+ /** All */
640
660
  All = "all",
661
+ /** Get */
641
662
  Get = "get",
663
+ /** List */
642
664
  List = "list",
665
+ /** Set */
643
666
  Set = "set",
667
+ /** Delete */
644
668
  Delete = "delete",
669
+ /** Backup */
645
670
  Backup = "backup",
671
+ /** Restore */
646
672
  Restore = "restore",
673
+ /** Recover */
647
674
  Recover = "recover",
675
+ /** Purge */
648
676
  Purge = "purge"
649
677
  }
650
678
  /**
@@ -665,22 +693,39 @@ export declare enum KnownSecretPermissions {
665
693
  export declare type SecretPermissions = string;
666
694
  /** Known values of {@link CertificatePermissions} that the service accepts. */
667
695
  export declare enum KnownCertificatePermissions {
696
+ /** All */
668
697
  All = "all",
698
+ /** Get */
669
699
  Get = "get",
700
+ /** List */
670
701
  List = "list",
702
+ /** Delete */
671
703
  Delete = "delete",
704
+ /** Create */
672
705
  Create = "create",
706
+ /** Import */
673
707
  Import = "import",
708
+ /** Update */
674
709
  Update = "update",
710
+ /** Managecontacts */
675
711
  Managecontacts = "managecontacts",
712
+ /** Getissuers */
676
713
  Getissuers = "getissuers",
714
+ /** Listissuers */
677
715
  Listissuers = "listissuers",
716
+ /** Setissuers */
678
717
  Setissuers = "setissuers",
718
+ /** Deleteissuers */
679
719
  Deleteissuers = "deleteissuers",
720
+ /** Manageissuers */
680
721
  Manageissuers = "manageissuers",
722
+ /** Recover */
681
723
  Recover = "recover",
724
+ /** Purge */
682
725
  Purge = "purge",
726
+ /** Backup */
683
727
  Backup = "backup",
728
+ /** Restore */
684
729
  Restore = "restore"
685
730
  }
686
731
  /**
@@ -709,20 +754,35 @@ export declare enum KnownCertificatePermissions {
709
754
  export declare type CertificatePermissions = string;
710
755
  /** Known values of {@link StoragePermissions} that the service accepts. */
711
756
  export declare enum KnownStoragePermissions {
757
+ /** All */
712
758
  All = "all",
759
+ /** Get */
713
760
  Get = "get",
761
+ /** List */
714
762
  List = "list",
763
+ /** Delete */
715
764
  Delete = "delete",
765
+ /** Set */
716
766
  Set = "set",
767
+ /** Update */
717
768
  Update = "update",
769
+ /** Regeneratekey */
718
770
  Regeneratekey = "regeneratekey",
771
+ /** Recover */
719
772
  Recover = "recover",
773
+ /** Purge */
720
774
  Purge = "purge",
775
+ /** Backup */
721
776
  Backup = "backup",
777
+ /** Restore */
722
778
  Restore = "restore",
779
+ /** Setsas */
723
780
  Setsas = "setsas",
781
+ /** Listsas */
724
782
  Listsas = "listsas",
783
+ /** Getsas */
725
784
  Getsas = "getsas",
785
+ /** Deletesas */
726
786
  Deletesas = "deletesas"
727
787
  }
728
788
  /**
@@ -749,7 +809,9 @@ export declare enum KnownStoragePermissions {
749
809
  export declare type StoragePermissions = string;
750
810
  /** Known values of {@link NetworkRuleBypassOptions} that the service accepts. */
751
811
  export declare enum KnownNetworkRuleBypassOptions {
812
+ /** AzureServices */
752
813
  AzureServices = "AzureServices",
814
+ /** None */
753
815
  None = "None"
754
816
  }
755
817
  /**
@@ -763,7 +825,9 @@ export declare enum KnownNetworkRuleBypassOptions {
763
825
  export declare type NetworkRuleBypassOptions = string;
764
826
  /** Known values of {@link NetworkRuleAction} that the service accepts. */
765
827
  export declare enum KnownNetworkRuleAction {
828
+ /** Allow */
766
829
  Allow = "Allow",
830
+ /** Deny */
767
831
  Deny = "Deny"
768
832
  }
769
833
  /**
@@ -777,7 +841,9 @@ export declare enum KnownNetworkRuleAction {
777
841
  export declare type NetworkRuleAction = string;
778
842
  /** Known values of {@link VaultProvisioningState} that the service accepts. */
779
843
  export declare enum KnownVaultProvisioningState {
844
+ /** Succeeded */
780
845
  Succeeded = "Succeeded",
846
+ /** RegisteringDns */
781
847
  RegisteringDns = "RegisteringDns"
782
848
  }
783
849
  /**
@@ -791,9 +857,13 @@ export declare enum KnownVaultProvisioningState {
791
857
  export declare type VaultProvisioningState = string;
792
858
  /** Known values of {@link PrivateEndpointServiceConnectionStatus} that the service accepts. */
793
859
  export declare enum KnownPrivateEndpointServiceConnectionStatus {
860
+ /** Pending */
794
861
  Pending = "Pending",
862
+ /** Approved */
795
863
  Approved = "Approved",
864
+ /** Rejected */
796
865
  Rejected = "Rejected",
866
+ /** Disconnected */
797
867
  Disconnected = "Disconnected"
798
868
  }
799
869
  /**
@@ -809,11 +879,17 @@ export declare enum KnownPrivateEndpointServiceConnectionStatus {
809
879
  export declare type PrivateEndpointServiceConnectionStatus = string;
810
880
  /** Known values of {@link PrivateEndpointConnectionProvisioningState} that the service accepts. */
811
881
  export declare enum KnownPrivateEndpointConnectionProvisioningState {
882
+ /** Succeeded */
812
883
  Succeeded = "Succeeded",
884
+ /** Creating */
813
885
  Creating = "Creating",
886
+ /** Updating */
814
887
  Updating = "Updating",
888
+ /** Deleting */
815
889
  Deleting = "Deleting",
890
+ /** Failed */
816
891
  Failed = "Failed",
892
+ /** Disconnected */
817
893
  Disconnected = "Disconnected"
818
894
  }
819
895
  /**
@@ -909,15 +985,11 @@ export interface VaultsCheckNameAvailabilityOptionalParams extends coreClient.Op
909
985
  export declare type VaultsCheckNameAvailabilityResponse = CheckNameAvailabilityResult;
910
986
  /** Optional parameters. */
911
987
  export interface VaultsListByResourceGroupNextOptionalParams extends coreClient.OperationOptions {
912
- /** Maximum number of results to return. */
913
- top?: number;
914
988
  }
915
989
  /** Contains response data for the listByResourceGroupNext operation. */
916
990
  export declare type VaultsListByResourceGroupNextResponse = VaultListResult;
917
991
  /** Optional parameters. */
918
992
  export interface VaultsListBySubscriptionNextOptionalParams extends coreClient.OperationOptions {
919
- /** Maximum number of results to return. */
920
- top?: number;
921
993
  }
922
994
  /** Contains response data for the listBySubscriptionNext operation. */
923
995
  export declare type VaultsListBySubscriptionNextResponse = VaultListResult;
@@ -928,8 +1000,6 @@ export interface VaultsListDeletedNextOptionalParams extends coreClient.Operatio
928
1000
  export declare type VaultsListDeletedNextResponse = DeletedVaultListResult;
929
1001
  /** Optional parameters. */
930
1002
  export interface VaultsListNextOptionalParams extends coreClient.OperationOptions {
931
- /** Maximum number of results to return. */
932
- top?: number;
933
1003
  }
934
1004
  /** Contains response data for the listNext operation. */
935
1005
  export declare type VaultsListNextResponse = ResourceListResult;
@@ -991,8 +1061,6 @@ export interface SecretsListOptionalParams extends coreClient.OperationOptions {
991
1061
  export declare type SecretsListResponse = SecretListResult;
992
1062
  /** Optional parameters. */
993
1063
  export interface SecretsListNextOptionalParams extends coreClient.OperationOptions {
994
- /** Maximum number of results to return. */
995
- top?: number;
996
1064
  }
997
1065
  /** Contains response data for the listNext operation. */
998
1066
  export declare type SecretsListNextResponse = SecretListResult;