@azure/arm-keyvault-profile-2020-09-01-hybrid 2.0.0 → 2.1.0-alpha.20230103.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (133) hide show
  1. package/CHANGELOG.md +15 -0
  2. package/README.md +1 -1
  3. package/dist/index.js +280 -57
  4. package/dist/index.js.map +1 -1
  5. package/dist/index.min.js +1 -1
  6. package/dist/index.min.js.map +1 -1
  7. package/dist-esm/samples-dev/operationsListSample.d.ts +2 -0
  8. package/dist-esm/samples-dev/operationsListSample.d.ts.map +1 -0
  9. package/dist-esm/samples-dev/operationsListSample.js +51 -0
  10. package/dist-esm/samples-dev/operationsListSample.js.map +1 -0
  11. package/dist-esm/samples-dev/privateEndpointConnectionsDeleteSample.d.ts +2 -0
  12. package/dist-esm/samples-dev/privateEndpointConnectionsDeleteSample.d.ts.map +1 -0
  13. package/dist-esm/samples-dev/privateEndpointConnectionsDeleteSample.js +40 -0
  14. package/dist-esm/samples-dev/privateEndpointConnectionsDeleteSample.js.map +1 -0
  15. package/dist-esm/samples-dev/privateEndpointConnectionsGetSample.d.ts +2 -0
  16. package/dist-esm/samples-dev/privateEndpointConnectionsGetSample.d.ts.map +1 -0
  17. package/dist-esm/samples-dev/privateEndpointConnectionsGetSample.js +40 -0
  18. package/dist-esm/samples-dev/privateEndpointConnectionsGetSample.js.map +1 -0
  19. package/dist-esm/samples-dev/privateEndpointConnectionsPutSample.d.ts +2 -0
  20. package/dist-esm/samples-dev/privateEndpointConnectionsPutSample.d.ts.map +1 -0
  21. package/dist-esm/samples-dev/privateEndpointConnectionsPutSample.js +47 -0
  22. package/dist-esm/samples-dev/privateEndpointConnectionsPutSample.js.map +1 -0
  23. package/dist-esm/samples-dev/privateLinkResourcesListByVaultSample.d.ts +2 -0
  24. package/dist-esm/samples-dev/privateLinkResourcesListByVaultSample.d.ts.map +1 -0
  25. package/dist-esm/samples-dev/privateLinkResourcesListByVaultSample.js +39 -0
  26. package/dist-esm/samples-dev/privateLinkResourcesListByVaultSample.js.map +1 -0
  27. package/dist-esm/samples-dev/secretsCreateOrUpdateSample.d.ts +2 -0
  28. package/dist-esm/samples-dev/secretsCreateOrUpdateSample.d.ts.map +1 -0
  29. package/dist-esm/samples-dev/secretsCreateOrUpdateSample.js +43 -0
  30. package/dist-esm/samples-dev/secretsCreateOrUpdateSample.js.map +1 -0
  31. package/dist-esm/samples-dev/secretsGetSample.d.ts +2 -0
  32. package/dist-esm/samples-dev/secretsGetSample.d.ts.map +1 -0
  33. package/dist-esm/samples-dev/secretsGetSample.js +40 -0
  34. package/dist-esm/samples-dev/secretsGetSample.js.map +1 -0
  35. package/dist-esm/samples-dev/secretsListSample.d.ts +2 -0
  36. package/dist-esm/samples-dev/secretsListSample.d.ts.map +1 -0
  37. package/dist-esm/samples-dev/secretsListSample.js +53 -0
  38. package/dist-esm/samples-dev/secretsListSample.js.map +1 -0
  39. package/dist-esm/samples-dev/secretsUpdateSample.d.ts +2 -0
  40. package/dist-esm/samples-dev/secretsUpdateSample.d.ts.map +1 -0
  41. package/dist-esm/samples-dev/secretsUpdateSample.js +43 -0
  42. package/dist-esm/samples-dev/secretsUpdateSample.js.map +1 -0
  43. package/dist-esm/samples-dev/vaultsCheckNameAvailabilitySample.d.ts +2 -0
  44. package/dist-esm/samples-dev/vaultsCheckNameAvailabilitySample.d.ts.map +1 -0
  45. package/dist-esm/samples-dev/vaultsCheckNameAvailabilitySample.js +41 -0
  46. package/dist-esm/samples-dev/vaultsCheckNameAvailabilitySample.js.map +1 -0
  47. package/dist-esm/samples-dev/vaultsCreateOrUpdateSample.d.ts +2 -0
  48. package/dist-esm/samples-dev/vaultsCreateOrUpdateSample.d.ts.map +1 -0
  49. package/dist-esm/samples-dev/vaultsCreateOrUpdateSample.js +140 -0
  50. package/dist-esm/samples-dev/vaultsCreateOrUpdateSample.js.map +1 -0
  51. package/dist-esm/samples-dev/vaultsDeleteSample.d.ts +2 -0
  52. package/dist-esm/samples-dev/vaultsDeleteSample.d.ts.map +1 -0
  53. package/dist-esm/samples-dev/vaultsDeleteSample.js +39 -0
  54. package/dist-esm/samples-dev/vaultsDeleteSample.js.map +1 -0
  55. package/dist-esm/samples-dev/vaultsGetDeletedSample.d.ts +2 -0
  56. package/dist-esm/samples-dev/vaultsGetDeletedSample.d.ts.map +1 -0
  57. package/dist-esm/samples-dev/vaultsGetDeletedSample.js +39 -0
  58. package/dist-esm/samples-dev/vaultsGetDeletedSample.js.map +1 -0
  59. package/dist-esm/samples-dev/vaultsGetSample.d.ts +2 -0
  60. package/dist-esm/samples-dev/vaultsGetSample.d.ts.map +1 -0
  61. package/dist-esm/samples-dev/vaultsGetSample.js +39 -0
  62. package/dist-esm/samples-dev/vaultsGetSample.js.map +1 -0
  63. package/dist-esm/samples-dev/vaultsListByResourceGroupSample.d.ts +2 -0
  64. package/dist-esm/samples-dev/vaultsListByResourceGroupSample.d.ts.map +1 -0
  65. package/dist-esm/samples-dev/vaultsListByResourceGroupSample.js +54 -0
  66. package/dist-esm/samples-dev/vaultsListByResourceGroupSample.js.map +1 -0
  67. package/dist-esm/samples-dev/vaultsListBySubscriptionSample.d.ts +2 -0
  68. package/dist-esm/samples-dev/vaultsListBySubscriptionSample.d.ts.map +1 -0
  69. package/dist-esm/samples-dev/vaultsListBySubscriptionSample.js +53 -0
  70. package/dist-esm/samples-dev/vaultsListBySubscriptionSample.js.map +1 -0
  71. package/dist-esm/samples-dev/vaultsListDeletedSample.d.ts +2 -0
  72. package/dist-esm/samples-dev/vaultsListDeletedSample.d.ts.map +1 -0
  73. package/dist-esm/samples-dev/vaultsListDeletedSample.js +51 -0
  74. package/dist-esm/samples-dev/vaultsListDeletedSample.js.map +1 -0
  75. package/dist-esm/samples-dev/vaultsListSample.d.ts +2 -0
  76. package/dist-esm/samples-dev/vaultsListSample.d.ts.map +1 -0
  77. package/dist-esm/samples-dev/vaultsListSample.js +53 -0
  78. package/dist-esm/samples-dev/vaultsListSample.js.map +1 -0
  79. package/dist-esm/samples-dev/vaultsPurgeDeletedSample.d.ts +2 -0
  80. package/dist-esm/samples-dev/vaultsPurgeDeletedSample.d.ts.map +1 -0
  81. package/dist-esm/samples-dev/vaultsPurgeDeletedSample.js +39 -0
  82. package/dist-esm/samples-dev/vaultsPurgeDeletedSample.js.map +1 -0
  83. package/dist-esm/samples-dev/vaultsUpdateAccessPolicySample.d.ts +2 -0
  84. package/dist-esm/samples-dev/vaultsUpdateAccessPolicySample.d.ts.map +1 -0
  85. package/dist-esm/samples-dev/vaultsUpdateAccessPolicySample.js +55 -0
  86. package/dist-esm/samples-dev/vaultsUpdateAccessPolicySample.js.map +1 -0
  87. package/dist-esm/samples-dev/vaultsUpdateSample.d.ts +2 -0
  88. package/dist-esm/samples-dev/vaultsUpdateSample.d.ts.map +1 -0
  89. package/dist-esm/samples-dev/vaultsUpdateSample.js +100 -0
  90. package/dist-esm/samples-dev/vaultsUpdateSample.js.map +1 -0
  91. package/dist-esm/src/index.d.ts +1 -0
  92. package/dist-esm/src/index.d.ts.map +1 -1
  93. package/dist-esm/src/index.js +1 -0
  94. package/dist-esm/src/index.js.map +1 -1
  95. package/dist-esm/src/keyVaultManagementClient.d.ts +2 -0
  96. package/dist-esm/src/keyVaultManagementClient.d.ts.map +1 -1
  97. package/dist-esm/src/keyVaultManagementClient.js +54 -5
  98. package/dist-esm/src/keyVaultManagementClient.js.map +1 -1
  99. package/dist-esm/src/models/index.d.ts +83 -15
  100. package/dist-esm/src/models/index.d.ts.map +1 -1
  101. package/dist-esm/src/models/index.js +75 -0
  102. package/dist-esm/src/models/index.js.map +1 -1
  103. package/dist-esm/src/operations/operations.d.ts.map +1 -1
  104. package/dist-esm/src/operations/operations.js +19 -8
  105. package/dist-esm/src/operations/operations.js.map +1 -1
  106. package/dist-esm/src/operations/privateEndpointConnections.d.ts.map +1 -1
  107. package/dist-esm/src/operations/privateEndpointConnections.js +3 -1
  108. package/dist-esm/src/operations/privateEndpointConnections.js.map +1 -1
  109. package/dist-esm/src/operations/secrets.d.ts.map +1 -1
  110. package/dist-esm/src/operations/secrets.js +19 -8
  111. package/dist-esm/src/operations/secrets.js.map +1 -1
  112. package/dist-esm/src/operations/vaults.d.ts.map +1 -1
  113. package/dist-esm/src/operations/vaults.js +79 -34
  114. package/dist-esm/src/operations/vaults.js.map +1 -1
  115. package/dist-esm/src/pagingHelper.d.ts +13 -0
  116. package/dist-esm/src/pagingHelper.d.ts.map +1 -0
  117. package/dist-esm/src/pagingHelper.js +32 -0
  118. package/dist-esm/src/pagingHelper.js.map +1 -0
  119. package/dist-esm/test/sampleTest.js +11 -13
  120. package/dist-esm/test/sampleTest.js.map +1 -1
  121. package/package.json +26 -13
  122. package/review/arm-keyvault-profile-2020-09-01-hybrid.api.md +11 -85
  123. package/src/index.ts +1 -0
  124. package/src/keyVaultManagementClient.ts +70 -5
  125. package/src/models/index.ts +86 -23
  126. package/src/operations/operations.ts +21 -9
  127. package/src/operations/privateEndpointConnections.ts +3 -1
  128. package/src/operations/secrets.ts +27 -10
  129. package/src/operations/vaults.ts +92 -39
  130. package/src/pagingHelper.ts +39 -0
  131. package/tsconfig.json +8 -2
  132. package/types/arm-keyvault-profile-2020-09-01-hybrid.d.ts +94 -15
  133. package/types/tsdoc-metadata.json +1 -1
@@ -0,0 +1,40 @@
1
+ /*
2
+ * Copyright (c) Microsoft Corporation.
3
+ * Licensed under the MIT License.
4
+ *
5
+ * Code generated by Microsoft (R) AutoRest Code Generator.
6
+ * Changes may cause incorrect behavior and will be lost if the code is regenerated.
7
+ */
8
+ import { __awaiter } from "tslib";
9
+ // Copyright (c) Microsoft Corporation.
10
+ // Licensed under the MIT License.
11
+ import { KeyVaultManagementClient } from "@azure/arm-keyvault-profile-2020-09-01-hybrid";
12
+ import { DefaultAzureCredential } from "@azure/identity";
13
+ import * as dotenv from "dotenv";
14
+ dotenv.config();
15
+ /**
16
+ * This sample demonstrates how to Deletes the specified private endpoint connection associated with the key vault.
17
+ *
18
+ * @summary Deletes the specified private endpoint connection associated with the key vault.
19
+ * x-ms-original-file: specification/keyvault/resource-manager/Microsoft.KeyVault/stable/2019-09-01/examples/deletePrivateEndpointConnection.json
20
+ */
21
+ function keyVaultDeletePrivateEndpointConnection() {
22
+ return __awaiter(this, void 0, void 0, function* () {
23
+ const subscriptionId = process.env["KEYVAULT_SUBSCRIPTION_ID"] ||
24
+ "00000000-0000-0000-0000-000000000000";
25
+ const resourceGroupName = process.env["KEYVAULT_RESOURCE_GROUP"] || "sample-group";
26
+ const vaultName = "sample-vault";
27
+ const privateEndpointConnectionName = "sample-pec";
28
+ const credential = new DefaultAzureCredential();
29
+ const client = new KeyVaultManagementClient(credential, subscriptionId);
30
+ const result = yield client.privateEndpointConnections.beginDeleteAndWait(resourceGroupName, vaultName, privateEndpointConnectionName);
31
+ console.log(result);
32
+ });
33
+ }
34
+ function main() {
35
+ return __awaiter(this, void 0, void 0, function* () {
36
+ keyVaultDeletePrivateEndpointConnection();
37
+ });
38
+ }
39
+ main().catch(console.error);
40
+ //# sourceMappingURL=privateEndpointConnectionsDeleteSample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"privateEndpointConnectionsDeleteSample.js","sourceRoot":"","sources":["../../samples-dev/privateEndpointConnectionsDeleteSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+CAA+C,CAAC;AACzF,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,uCAAuC;;QACpD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,0BAA0B,CAAC;YACvC,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,yBAAyB,CAAC,IAAI,cAAc,CAAC;QAC3D,MAAM,SAAS,GAAG,cAAc,CAAC;QACjC,MAAM,6BAA6B,GAAG,YAAY,CAAC;QACnD,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,0BAA0B,CAAC,kBAAkB,CACvE,iBAAiB,EACjB,SAAS,EACT,6BAA6B,CAC9B,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,uCAAuC,EAAE,CAAC;IAC5C,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=privateEndpointConnectionsGetSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"privateEndpointConnectionsGetSample.d.ts","sourceRoot":"","sources":["../../samples-dev/privateEndpointConnectionsGetSample.ts"],"names":[],"mappings":""}
@@ -0,0 +1,40 @@
1
+ /*
2
+ * Copyright (c) Microsoft Corporation.
3
+ * Licensed under the MIT License.
4
+ *
5
+ * Code generated by Microsoft (R) AutoRest Code Generator.
6
+ * Changes may cause incorrect behavior and will be lost if the code is regenerated.
7
+ */
8
+ import { __awaiter } from "tslib";
9
+ // Copyright (c) Microsoft Corporation.
10
+ // Licensed under the MIT License.
11
+ import { KeyVaultManagementClient } from "@azure/arm-keyvault-profile-2020-09-01-hybrid";
12
+ import { DefaultAzureCredential } from "@azure/identity";
13
+ import * as dotenv from "dotenv";
14
+ dotenv.config();
15
+ /**
16
+ * This sample demonstrates how to Gets the specified private endpoint connection associated with the key vault.
17
+ *
18
+ * @summary Gets the specified private endpoint connection associated with the key vault.
19
+ * x-ms-original-file: specification/keyvault/resource-manager/Microsoft.KeyVault/stable/2019-09-01/examples/getPrivateEndpointConnection.json
20
+ */
21
+ function keyVaultGetPrivateEndpointConnection() {
22
+ return __awaiter(this, void 0, void 0, function* () {
23
+ const subscriptionId = process.env["KEYVAULT_SUBSCRIPTION_ID"] ||
24
+ "00000000-0000-0000-0000-000000000000";
25
+ const resourceGroupName = process.env["KEYVAULT_RESOURCE_GROUP"] || "sample-group";
26
+ const vaultName = "sample-vault";
27
+ const privateEndpointConnectionName = "sample-pec";
28
+ const credential = new DefaultAzureCredential();
29
+ const client = new KeyVaultManagementClient(credential, subscriptionId);
30
+ const result = yield client.privateEndpointConnections.get(resourceGroupName, vaultName, privateEndpointConnectionName);
31
+ console.log(result);
32
+ });
33
+ }
34
+ function main() {
35
+ return __awaiter(this, void 0, void 0, function* () {
36
+ keyVaultGetPrivateEndpointConnection();
37
+ });
38
+ }
39
+ main().catch(console.error);
40
+ //# sourceMappingURL=privateEndpointConnectionsGetSample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"privateEndpointConnectionsGetSample.js","sourceRoot":"","sources":["../../samples-dev/privateEndpointConnectionsGetSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+CAA+C,CAAC;AACzF,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,oCAAoC;;QACjD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,0BAA0B,CAAC;YACvC,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,yBAAyB,CAAC,IAAI,cAAc,CAAC;QAC3D,MAAM,SAAS,GAAG,cAAc,CAAC;QACjC,MAAM,6BAA6B,GAAG,YAAY,CAAC;QACnD,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,0BAA0B,CAAC,GAAG,CACxD,iBAAiB,EACjB,SAAS,EACT,6BAA6B,CAC9B,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,oCAAoC,EAAE,CAAC;IACzC,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=privateEndpointConnectionsPutSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"privateEndpointConnectionsPutSample.d.ts","sourceRoot":"","sources":["../../samples-dev/privateEndpointConnectionsPutSample.ts"],"names":[],"mappings":""}
@@ -0,0 +1,47 @@
1
+ /*
2
+ * Copyright (c) Microsoft Corporation.
3
+ * Licensed under the MIT License.
4
+ *
5
+ * Code generated by Microsoft (R) AutoRest Code Generator.
6
+ * Changes may cause incorrect behavior and will be lost if the code is regenerated.
7
+ */
8
+ import { __awaiter } from "tslib";
9
+ // Copyright (c) Microsoft Corporation.
10
+ // Licensed under the MIT License.
11
+ import { KeyVaultManagementClient } from "@azure/arm-keyvault-profile-2020-09-01-hybrid";
12
+ import { DefaultAzureCredential } from "@azure/identity";
13
+ import * as dotenv from "dotenv";
14
+ dotenv.config();
15
+ /**
16
+ * This sample demonstrates how to Updates the specified private endpoint connection associated with the key vault.
17
+ *
18
+ * @summary Updates the specified private endpoint connection associated with the key vault.
19
+ * x-ms-original-file: specification/keyvault/resource-manager/Microsoft.KeyVault/stable/2019-09-01/examples/putPrivateEndpointConnection.json
20
+ */
21
+ function keyVaultPutPrivateEndpointConnection() {
22
+ return __awaiter(this, void 0, void 0, function* () {
23
+ const subscriptionId = process.env["KEYVAULT_SUBSCRIPTION_ID"] ||
24
+ "00000000-0000-0000-0000-000000000000";
25
+ const resourceGroupName = process.env["KEYVAULT_RESOURCE_GROUP"] || "sample-group";
26
+ const vaultName = "sample-vault";
27
+ const privateEndpointConnectionName = "sample-pec";
28
+ const properties = {
29
+ etag: "",
30
+ privateLinkServiceConnectionState: {
31
+ description: "My name is Joe and I'm approving this.",
32
+ status: "Approved"
33
+ }
34
+ };
35
+ const credential = new DefaultAzureCredential();
36
+ const client = new KeyVaultManagementClient(credential, subscriptionId);
37
+ const result = yield client.privateEndpointConnections.put(resourceGroupName, vaultName, privateEndpointConnectionName, properties);
38
+ console.log(result);
39
+ });
40
+ }
41
+ function main() {
42
+ return __awaiter(this, void 0, void 0, function* () {
43
+ keyVaultPutPrivateEndpointConnection();
44
+ });
45
+ }
46
+ main().catch(console.error);
47
+ //# sourceMappingURL=privateEndpointConnectionsPutSample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"privateEndpointConnectionsPutSample.js","sourceRoot":"","sources":["../../samples-dev/privateEndpointConnectionsPutSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,wBAAwB,EACzB,MAAM,+CAA+C,CAAC;AACvD,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,oCAAoC;;QACjD,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,0BAA0B,CAAC;YACvC,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,yBAAyB,CAAC,IAAI,cAAc,CAAC;QAC3D,MAAM,SAAS,GAAG,cAAc,CAAC;QACjC,MAAM,6BAA6B,GAAG,YAAY,CAAC;QACnD,MAAM,UAAU,GAA8B;YAC5C,IAAI,EAAE,EAAE;YACR,iCAAiC,EAAE;gBACjC,WAAW,EAAE,wCAAwC;gBACrD,MAAM,EAAE,UAAU;aACnB;SACF,CAAC;QACF,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,0BAA0B,CAAC,GAAG,CACxD,iBAAiB,EACjB,SAAS,EACT,6BAA6B,EAC7B,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,oCAAoC,EAAE,CAAC;IACzC,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=privateLinkResourcesListByVaultSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"privateLinkResourcesListByVaultSample.d.ts","sourceRoot":"","sources":["../../samples-dev/privateLinkResourcesListByVaultSample.ts"],"names":[],"mappings":""}
@@ -0,0 +1,39 @@
1
+ /*
2
+ * Copyright (c) Microsoft Corporation.
3
+ * Licensed under the MIT License.
4
+ *
5
+ * Code generated by Microsoft (R) AutoRest Code Generator.
6
+ * Changes may cause incorrect behavior and will be lost if the code is regenerated.
7
+ */
8
+ import { __awaiter } from "tslib";
9
+ // Copyright (c) Microsoft Corporation.
10
+ // Licensed under the MIT License.
11
+ import { KeyVaultManagementClient } from "@azure/arm-keyvault-profile-2020-09-01-hybrid";
12
+ import { DefaultAzureCredential } from "@azure/identity";
13
+ import * as dotenv from "dotenv";
14
+ dotenv.config();
15
+ /**
16
+ * This sample demonstrates how to Gets the private link resources supported for the key vault.
17
+ *
18
+ * @summary Gets the private link resources supported for the key vault.
19
+ * x-ms-original-file: specification/keyvault/resource-manager/Microsoft.KeyVault/stable/2019-09-01/examples/listPrivateLinkResources.json
20
+ */
21
+ function keyVaultListPrivateLinkResources() {
22
+ return __awaiter(this, void 0, void 0, function* () {
23
+ const subscriptionId = process.env["KEYVAULT_SUBSCRIPTION_ID"] ||
24
+ "00000000-0000-0000-0000-000000000000";
25
+ const resourceGroupName = process.env["KEYVAULT_RESOURCE_GROUP"] || "sample-group";
26
+ const vaultName = "sample-vault";
27
+ const credential = new DefaultAzureCredential();
28
+ const client = new KeyVaultManagementClient(credential, subscriptionId);
29
+ const result = yield client.privateLinkResources.listByVault(resourceGroupName, vaultName);
30
+ console.log(result);
31
+ });
32
+ }
33
+ function main() {
34
+ return __awaiter(this, void 0, void 0, function* () {
35
+ keyVaultListPrivateLinkResources();
36
+ });
37
+ }
38
+ main().catch(console.error);
39
+ //# sourceMappingURL=privateLinkResourcesListByVaultSample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"privateLinkResourcesListByVaultSample.js","sourceRoot":"","sources":["../../samples-dev/privateLinkResourcesListByVaultSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+CAA+C,CAAC;AACzF,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,gCAAgC;;QAC7C,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,0BAA0B,CAAC;YACvC,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,yBAAyB,CAAC,IAAI,cAAc,CAAC;QAC3D,MAAM,SAAS,GAAG,cAAc,CAAC;QACjC,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,oBAAoB,CAAC,WAAW,CAC1D,iBAAiB,EACjB,SAAS,CACV,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,gCAAgC,EAAE,CAAC;IACrC,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=secretsCreateOrUpdateSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"secretsCreateOrUpdateSample.d.ts","sourceRoot":"","sources":["../../samples-dev/secretsCreateOrUpdateSample.ts"],"names":[],"mappings":""}
@@ -0,0 +1,43 @@
1
+ /*
2
+ * Copyright (c) Microsoft Corporation.
3
+ * Licensed under the MIT License.
4
+ *
5
+ * Code generated by Microsoft (R) AutoRest Code Generator.
6
+ * Changes may cause incorrect behavior and will be lost if the code is regenerated.
7
+ */
8
+ import { __awaiter } from "tslib";
9
+ // Copyright (c) Microsoft Corporation.
10
+ // Licensed under the MIT License.
11
+ import { KeyVaultManagementClient } from "@azure/arm-keyvault-profile-2020-09-01-hybrid";
12
+ import { DefaultAzureCredential } from "@azure/identity";
13
+ import * as dotenv from "dotenv";
14
+ dotenv.config();
15
+ /**
16
+ * This sample demonstrates how to Create or update a secret in a key vault in the specified subscription. NOTE: This API is intended for internal use in ARM deployments. Users should use the data-plane REST service for interaction with vault secrets.
17
+ *
18
+ * @summary Create or update a secret in a key vault in the specified subscription. NOTE: This API is intended for internal use in ARM deployments. Users should use the data-plane REST service for interaction with vault secrets.
19
+ * x-ms-original-file: specification/keyvault/resource-manager/Microsoft.KeyVault/stable/2019-09-01/examples/createSecret.json
20
+ */
21
+ function createASecret() {
22
+ return __awaiter(this, void 0, void 0, function* () {
23
+ const subscriptionId = process.env["KEYVAULT_SUBSCRIPTION_ID"] ||
24
+ "00000000-0000-0000-0000-000000000000";
25
+ const resourceGroupName = process.env["KEYVAULT_RESOURCE_GROUP"] || "sample-group";
26
+ const vaultName = "sample-vault";
27
+ const secretName = "secret-name";
28
+ const parameters = {
29
+ properties: { value: "secret-value" }
30
+ };
31
+ const credential = new DefaultAzureCredential();
32
+ const client = new KeyVaultManagementClient(credential, subscriptionId);
33
+ const result = yield client.secrets.createOrUpdate(resourceGroupName, vaultName, secretName, parameters);
34
+ console.log(result);
35
+ });
36
+ }
37
+ function main() {
38
+ return __awaiter(this, void 0, void 0, function* () {
39
+ createASecret();
40
+ });
41
+ }
42
+ main().catch(console.error);
43
+ //# sourceMappingURL=secretsCreateOrUpdateSample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"secretsCreateOrUpdateSample.js","sourceRoot":"","sources":["../../samples-dev/secretsCreateOrUpdateSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,wBAAwB,EACzB,MAAM,+CAA+C,CAAC;AACvD,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,aAAa;;QAC1B,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,0BAA0B,CAAC;YACvC,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,yBAAyB,CAAC,IAAI,cAAc,CAAC;QAC3D,MAAM,SAAS,GAAG,cAAc,CAAC;QACjC,MAAM,UAAU,GAAG,aAAa,CAAC;QACjC,MAAM,UAAU,GAAmC;YACjD,UAAU,EAAE,EAAE,KAAK,EAAE,cAAc,EAAE;SACtC,CAAC;QACF,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,OAAO,CAAC,cAAc,CAChD,iBAAiB,EACjB,SAAS,EACT,UAAU,EACV,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,aAAa,EAAE,CAAC;IAClB,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=secretsGetSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"secretsGetSample.d.ts","sourceRoot":"","sources":["../../samples-dev/secretsGetSample.ts"],"names":[],"mappings":""}
@@ -0,0 +1,40 @@
1
+ /*
2
+ * Copyright (c) Microsoft Corporation.
3
+ * Licensed under the MIT License.
4
+ *
5
+ * Code generated by Microsoft (R) AutoRest Code Generator.
6
+ * Changes may cause incorrect behavior and will be lost if the code is regenerated.
7
+ */
8
+ import { __awaiter } from "tslib";
9
+ // Copyright (c) Microsoft Corporation.
10
+ // Licensed under the MIT License.
11
+ import { KeyVaultManagementClient } from "@azure/arm-keyvault-profile-2020-09-01-hybrid";
12
+ import { DefaultAzureCredential } from "@azure/identity";
13
+ import * as dotenv from "dotenv";
14
+ dotenv.config();
15
+ /**
16
+ * This sample demonstrates how to Gets the specified secret. NOTE: This API is intended for internal use in ARM deployments. Users should use the data-plane REST service for interaction with vault secrets.
17
+ *
18
+ * @summary Gets the specified secret. NOTE: This API is intended for internal use in ARM deployments. Users should use the data-plane REST service for interaction with vault secrets.
19
+ * x-ms-original-file: specification/keyvault/resource-manager/Microsoft.KeyVault/stable/2019-09-01/examples/getSecret.json
20
+ */
21
+ function getASecret() {
22
+ return __awaiter(this, void 0, void 0, function* () {
23
+ const subscriptionId = process.env["KEYVAULT_SUBSCRIPTION_ID"] ||
24
+ "00000000-0000-0000-0000-000000000000";
25
+ const resourceGroupName = process.env["KEYVAULT_RESOURCE_GROUP"] || "sample-group";
26
+ const vaultName = "sample-vault";
27
+ const secretName = "secret-name";
28
+ const credential = new DefaultAzureCredential();
29
+ const client = new KeyVaultManagementClient(credential, subscriptionId);
30
+ const result = yield client.secrets.get(resourceGroupName, vaultName, secretName);
31
+ console.log(result);
32
+ });
33
+ }
34
+ function main() {
35
+ return __awaiter(this, void 0, void 0, function* () {
36
+ getASecret();
37
+ });
38
+ }
39
+ main().catch(console.error);
40
+ //# sourceMappingURL=secretsGetSample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"secretsGetSample.js","sourceRoot":"","sources":["../../samples-dev/secretsGetSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+CAA+C,CAAC;AACzF,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,UAAU;;QACvB,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,0BAA0B,CAAC;YACvC,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,yBAAyB,CAAC,IAAI,cAAc,CAAC;QAC3D,MAAM,SAAS,GAAG,cAAc,CAAC;QACjC,MAAM,UAAU,GAAG,aAAa,CAAC;QACjC,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,OAAO,CAAC,GAAG,CACrC,iBAAiB,EACjB,SAAS,EACT,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,UAAU,EAAE,CAAC;IACf,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=secretsListSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"secretsListSample.d.ts","sourceRoot":"","sources":["../../samples-dev/secretsListSample.ts"],"names":[],"mappings":""}
@@ -0,0 +1,53 @@
1
+ /*
2
+ * Copyright (c) Microsoft Corporation.
3
+ * Licensed under the MIT License.
4
+ *
5
+ * Code generated by Microsoft (R) AutoRest Code Generator.
6
+ * Changes may cause incorrect behavior and will be lost if the code is regenerated.
7
+ */
8
+ import { __asyncValues, __awaiter } from "tslib";
9
+ // Copyright (c) Microsoft Corporation.
10
+ // Licensed under the MIT License.
11
+ import { KeyVaultManagementClient } from "@azure/arm-keyvault-profile-2020-09-01-hybrid";
12
+ import { DefaultAzureCredential } from "@azure/identity";
13
+ import * as dotenv from "dotenv";
14
+ dotenv.config();
15
+ /**
16
+ * This sample demonstrates how to The List operation gets information about the secrets in a vault. NOTE: This API is intended for internal use in ARM deployments. Users should use the data-plane REST service for interaction with vault secrets.
17
+ *
18
+ * @summary The List operation gets information about the secrets in a vault. NOTE: This API is intended for internal use in ARM deployments. Users should use the data-plane REST service for interaction with vault secrets.
19
+ * x-ms-original-file: specification/keyvault/resource-manager/Microsoft.KeyVault/stable/2019-09-01/examples/listSecrets.json
20
+ */
21
+ function listSecretsInTheVault() {
22
+ var e_1, _a;
23
+ return __awaiter(this, void 0, void 0, function* () {
24
+ const subscriptionId = process.env["KEYVAULT_SUBSCRIPTION_ID"] ||
25
+ "00000000-0000-0000-0000-000000000000";
26
+ const resourceGroupName = process.env["KEYVAULT_RESOURCE_GROUP"] || "sample-group";
27
+ const vaultName = "sample-vault";
28
+ const credential = new DefaultAzureCredential();
29
+ const client = new KeyVaultManagementClient(credential, subscriptionId);
30
+ const resArray = new Array();
31
+ try {
32
+ for (var _b = __asyncValues(client.secrets.list(resourceGroupName, vaultName)), _c; _c = yield _b.next(), !_c.done;) {
33
+ let item = _c.value;
34
+ resArray.push(item);
35
+ }
36
+ }
37
+ catch (e_1_1) { e_1 = { error: e_1_1 }; }
38
+ finally {
39
+ try {
40
+ if (_c && !_c.done && (_a = _b.return)) yield _a.call(_b);
41
+ }
42
+ finally { if (e_1) throw e_1.error; }
43
+ }
44
+ console.log(resArray);
45
+ });
46
+ }
47
+ function main() {
48
+ return __awaiter(this, void 0, void 0, function* () {
49
+ listSecretsInTheVault();
50
+ });
51
+ }
52
+ main().catch(console.error);
53
+ //# sourceMappingURL=secretsListSample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"secretsListSample.js","sourceRoot":"","sources":["../../samples-dev/secretsListSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAAE,wBAAwB,EAAE,MAAM,+CAA+C,CAAC;AACzF,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,qBAAqB;;;QAClC,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,0BAA0B,CAAC;YACvC,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,yBAAyB,CAAC,IAAI,cAAc,CAAC;QAC3D,MAAM,SAAS,GAAG,cAAc,CAAC;QACjC,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;;YAC7B,KAAuB,IAAA,KAAA,cAAA,MAAM,CAAC,OAAO,CAAC,IAAI,CAAC,iBAAiB,EAAE,SAAS,CAAC,CAAA,IAAA;gBAA7D,IAAI,IAAI,WAAA,CAAA;gBACjB,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;aACrB;;;;;;;;;QACD,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;;CACvB;AAED,SAAe,IAAI;;QACjB,qBAAqB,EAAE,CAAC;IAC1B,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=secretsUpdateSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"secretsUpdateSample.d.ts","sourceRoot":"","sources":["../../samples-dev/secretsUpdateSample.ts"],"names":[],"mappings":""}
@@ -0,0 +1,43 @@
1
+ /*
2
+ * Copyright (c) Microsoft Corporation.
3
+ * Licensed under the MIT License.
4
+ *
5
+ * Code generated by Microsoft (R) AutoRest Code Generator.
6
+ * Changes may cause incorrect behavior and will be lost if the code is regenerated.
7
+ */
8
+ import { __awaiter } from "tslib";
9
+ // Copyright (c) Microsoft Corporation.
10
+ // Licensed under the MIT License.
11
+ import { KeyVaultManagementClient } from "@azure/arm-keyvault-profile-2020-09-01-hybrid";
12
+ import { DefaultAzureCredential } from "@azure/identity";
13
+ import * as dotenv from "dotenv";
14
+ dotenv.config();
15
+ /**
16
+ * This sample demonstrates how to Update a secret in the specified subscription. NOTE: This API is intended for internal use in ARM deployments. Users should use the data-plane REST service for interaction with vault secrets.
17
+ *
18
+ * @summary Update a secret in the specified subscription. NOTE: This API is intended for internal use in ARM deployments. Users should use the data-plane REST service for interaction with vault secrets.
19
+ * x-ms-original-file: specification/keyvault/resource-manager/Microsoft.KeyVault/stable/2019-09-01/examples/updateSecret.json
20
+ */
21
+ function updateASecret() {
22
+ return __awaiter(this, void 0, void 0, function* () {
23
+ const subscriptionId = process.env["KEYVAULT_SUBSCRIPTION_ID"] ||
24
+ "00000000-0000-0000-0000-000000000000";
25
+ const resourceGroupName = process.env["KEYVAULT_RESOURCE_GROUP"] || "sample-group";
26
+ const vaultName = "sample-vault";
27
+ const secretName = "secret-name";
28
+ const parameters = {
29
+ properties: { value: "secret-value2" }
30
+ };
31
+ const credential = new DefaultAzureCredential();
32
+ const client = new KeyVaultManagementClient(credential, subscriptionId);
33
+ const result = yield client.secrets.update(resourceGroupName, vaultName, secretName, parameters);
34
+ console.log(result);
35
+ });
36
+ }
37
+ function main() {
38
+ return __awaiter(this, void 0, void 0, function* () {
39
+ updateASecret();
40
+ });
41
+ }
42
+ main().catch(console.error);
43
+ //# sourceMappingURL=secretsUpdateSample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"secretsUpdateSample.js","sourceRoot":"","sources":["../../samples-dev/secretsUpdateSample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,wBAAwB,EACzB,MAAM,+CAA+C,CAAC;AACvD,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,aAAa;;QAC1B,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,0BAA0B,CAAC;YACvC,sCAAsC,CAAC;QACzC,MAAM,iBAAiB,GACrB,OAAO,CAAC,GAAG,CAAC,yBAAyB,CAAC,IAAI,cAAc,CAAC;QAC3D,MAAM,SAAS,GAAG,cAAc,CAAC;QACjC,MAAM,UAAU,GAAG,aAAa,CAAC;QACjC,MAAM,UAAU,GAA0B;YACxC,UAAU,EAAE,EAAE,KAAK,EAAE,eAAe,EAAE;SACvC,CAAC;QACF,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,OAAO,CAAC,MAAM,CACxC,iBAAiB,EACjB,SAAS,EACT,UAAU,EACV,UAAU,CACX,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,aAAa,EAAE,CAAC;IAClB,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=vaultsCheckNameAvailabilitySample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"vaultsCheckNameAvailabilitySample.d.ts","sourceRoot":"","sources":["../../samples-dev/vaultsCheckNameAvailabilitySample.ts"],"names":[],"mappings":""}
@@ -0,0 +1,41 @@
1
+ /*
2
+ * Copyright (c) Microsoft Corporation.
3
+ * Licensed under the MIT License.
4
+ *
5
+ * Code generated by Microsoft (R) AutoRest Code Generator.
6
+ * Changes may cause incorrect behavior and will be lost if the code is regenerated.
7
+ */
8
+ import { __awaiter } from "tslib";
9
+ // Copyright (c) Microsoft Corporation.
10
+ // Licensed under the MIT License.
11
+ import { KeyVaultManagementClient } from "@azure/arm-keyvault-profile-2020-09-01-hybrid";
12
+ import { DefaultAzureCredential } from "@azure/identity";
13
+ import * as dotenv from "dotenv";
14
+ dotenv.config();
15
+ /**
16
+ * This sample demonstrates how to Checks that the vault name is valid and is not already in use.
17
+ *
18
+ * @summary Checks that the vault name is valid and is not already in use.
19
+ * x-ms-original-file: specification/keyvault/resource-manager/Microsoft.KeyVault/stable/2019-09-01/examples/checkVaultNameAvailability.json
20
+ */
21
+ function validateAVaultName() {
22
+ return __awaiter(this, void 0, void 0, function* () {
23
+ const subscriptionId = process.env["KEYVAULT_SUBSCRIPTION_ID"] ||
24
+ "00000000-0000-0000-0000-000000000000";
25
+ const vaultName = {
26
+ name: "sample-vault",
27
+ type: "Microsoft.KeyVault/vaults"
28
+ };
29
+ const credential = new DefaultAzureCredential();
30
+ const client = new KeyVaultManagementClient(credential, subscriptionId);
31
+ const result = yield client.vaults.checkNameAvailability(vaultName);
32
+ console.log(result);
33
+ });
34
+ }
35
+ function main() {
36
+ return __awaiter(this, void 0, void 0, function* () {
37
+ validateAVaultName();
38
+ });
39
+ }
40
+ main().catch(console.error);
41
+ //# sourceMappingURL=vaultsCheckNameAvailabilitySample.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"vaultsCheckNameAvailabilitySample.js","sourceRoot":"","sources":["../../samples-dev/vaultsCheckNameAvailabilitySample.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;;AAEH,uCAAuC;AACvC,kCAAkC;AAClC,OAAO,EAEL,wBAAwB,EACzB,MAAM,+CAA+C,CAAC;AACvD,OAAO,EAAE,sBAAsB,EAAE,MAAM,iBAAiB,CAAC;AACzD,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAEjC,MAAM,CAAC,MAAM,EAAE,CAAC;AAEhB;;;;;GAKG;AACH,SAAe,kBAAkB;;QAC/B,MAAM,cAAc,GAClB,OAAO,CAAC,GAAG,CAAC,0BAA0B,CAAC;YACvC,sCAAsC,CAAC;QACzC,MAAM,SAAS,GAAyC;YACtD,IAAI,EAAE,cAAc;YACpB,IAAI,EAAE,2BAA2B;SAClC,CAAC;QACF,MAAM,UAAU,GAAG,IAAI,sBAAsB,EAAE,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,wBAAwB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,qBAAqB,CAAC,SAAS,CAAC,CAAC;QACpE,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;IACtB,CAAC;CAAA;AAED,SAAe,IAAI;;QACjB,kBAAkB,EAAE,CAAC;IACvB,CAAC;CAAA;AAED,IAAI,EAAE,CAAC,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=vaultsCreateOrUpdateSample.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"vaultsCreateOrUpdateSample.d.ts","sourceRoot":"","sources":["../../samples-dev/vaultsCreateOrUpdateSample.ts"],"names":[],"mappings":""}