@azure/keyvault-admin 4.2.0-alpha.20211214.4 → 4.2.0-alpha.20220105.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +10 -0
- package/dist/index.js +45 -49
- package/dist/index.js.map +1 -1
- package/dist-esm/keyvault-admin/src/accessControlClient.js +9 -13
- package/dist-esm/keyvault-admin/src/accessControlClient.js.map +1 -1
- package/dist-esm/keyvault-admin/src/accessControlModels.js +1 -1
- package/dist-esm/keyvault-admin/src/accessControlModels.js.map +1 -1
- package/dist-esm/keyvault-admin/src/backupClient.js +4 -4
- package/dist-esm/keyvault-admin/src/backupClient.js.map +1 -1
- package/dist-esm/keyvault-admin/src/challengeAuthenticationCallbacks.js +5 -5
- package/dist-esm/keyvault-admin/src/challengeAuthenticationCallbacks.js.map +1 -1
- package/dist-esm/keyvault-admin/src/constants.js +1 -1
- package/dist-esm/keyvault-admin/src/constants.js.map +1 -1
- package/dist-esm/keyvault-admin/src/generated/keyVaultClientContext.js +1 -1
- package/dist-esm/keyvault-admin/src/generated/keyVaultClientContext.js.map +1 -1
- package/dist-esm/keyvault-admin/src/lro/backup/operation.js +4 -4
- package/dist-esm/keyvault-admin/src/lro/backup/operation.js.map +1 -1
- package/dist-esm/keyvault-admin/src/lro/backup/poller.js +2 -2
- package/dist-esm/keyvault-admin/src/lro/backup/poller.js.map +1 -1
- package/dist-esm/keyvault-admin/src/lro/keyVaultAdminPoller.js +2 -2
- package/dist-esm/keyvault-admin/src/lro/keyVaultAdminPoller.js.map +1 -1
- package/dist-esm/keyvault-admin/src/lro/restore/operation.js +5 -5
- package/dist-esm/keyvault-admin/src/lro/restore/operation.js.map +1 -1
- package/dist-esm/keyvault-admin/src/lro/restore/poller.js +2 -2
- package/dist-esm/keyvault-admin/src/lro/restore/poller.js.map +1 -1
- package/dist-esm/keyvault-admin/src/lro/selectiveKeyRestore/operation.js +4 -4
- package/dist-esm/keyvault-admin/src/lro/selectiveKeyRestore/operation.js.map +1 -1
- package/dist-esm/keyvault-admin/src/lro/selectiveKeyRestore/poller.js +2 -2
- package/dist-esm/keyvault-admin/src/lro/selectiveKeyRestore/poller.js.map +1 -1
- package/dist-esm/keyvault-admin/src/mappings.js +7 -7
- package/dist-esm/keyvault-admin/src/mappings.js.map +1 -1
- package/dist-esm/keyvault-admin/src/tracingHelpers.js +3 -3
- package/dist-esm/keyvault-admin/src/tracingHelpers.js.map +1 -1
- package/dist-esm/keyvault-common/src/challengeBasedAuthenticationPolicy.js +3 -3
- package/dist-esm/keyvault-common/src/challengeBasedAuthenticationPolicy.js.map +1 -1
- package/dist-esm/keyvault-common/src/parseKeyvaultIdentifier.js +1 -1
- package/dist-esm/keyvault-common/src/parseKeyvaultIdentifier.js.map +1 -1
- package/dist-esm/keyvault-common/src/parseWWWAuthenticate.js +1 -1
- package/dist-esm/keyvault-common/src/parseWWWAuthenticate.js.map +1 -1
- package/dist-esm/keyvault-common/src/tracingHelpers.js +3 -3
- package/dist-esm/keyvault-common/src/tracingHelpers.js.map +1 -1
- package/package.json +2 -3
- package/types/keyvault-admin.d.ts +34 -6
package/CHANGELOG.md
CHANGED
package/dist/index.js
CHANGED
|
@@ -17,7 +17,7 @@ var coreLro = require('@azure/core-lro');
|
|
|
17
17
|
/**
|
|
18
18
|
* Current version of the Key Vault Admin SDK.
|
|
19
19
|
*/
|
|
20
|
-
const SDK_VERSION = "4.2.0-beta.
|
|
20
|
+
const SDK_VERSION = "4.2.0-beta.3";
|
|
21
21
|
/**
|
|
22
22
|
* The latest supported Key Vault service API version.
|
|
23
23
|
*/
|
|
@@ -1423,7 +1423,7 @@ const validParsedWWWAuthenticateProperties = [
|
|
|
1423
1423
|
"authorization_url",
|
|
1424
1424
|
"resource",
|
|
1425
1425
|
"scope",
|
|
1426
|
-
"tenantId"
|
|
1426
|
+
"tenantId",
|
|
1427
1427
|
];
|
|
1428
1428
|
/**
|
|
1429
1429
|
* Parses an WWW-Authenticate response.
|
|
@@ -1484,9 +1484,9 @@ function createChallengeCallbacks() {
|
|
|
1484
1484
|
return {
|
|
1485
1485
|
abortSignal: request.abortSignal,
|
|
1486
1486
|
requestOptions: {
|
|
1487
|
-
timeout: request.timeout
|
|
1487
|
+
timeout: request.timeout,
|
|
1488
1488
|
},
|
|
1489
|
-
tracingOptions: request.tracingOptions
|
|
1489
|
+
tracingOptions: request.tracingOptions,
|
|
1490
1490
|
};
|
|
1491
1491
|
}
|
|
1492
1492
|
async function authorizeRequest(options) {
|
|
@@ -1496,7 +1496,7 @@ function createChallengeCallbacks() {
|
|
|
1496
1496
|
case "none":
|
|
1497
1497
|
challengeState = {
|
|
1498
1498
|
status: "started",
|
|
1499
|
-
originalBody: request.body
|
|
1499
|
+
originalBody: request.body,
|
|
1500
1500
|
};
|
|
1501
1501
|
request.body = null;
|
|
1502
1502
|
break;
|
|
@@ -1532,13 +1532,13 @@ function createChallengeCallbacks() {
|
|
|
1532
1532
|
}
|
|
1533
1533
|
options.request.headers.set("Authorization", `Bearer ${accessToken.token}`);
|
|
1534
1534
|
challengeState = {
|
|
1535
|
-
status: "complete"
|
|
1535
|
+
status: "complete",
|
|
1536
1536
|
};
|
|
1537
1537
|
return true;
|
|
1538
1538
|
}
|
|
1539
1539
|
return {
|
|
1540
1540
|
authorizeRequest,
|
|
1541
|
-
authorizeRequestOnChallenge
|
|
1541
|
+
authorizeRequestOnChallenge,
|
|
1542
1542
|
};
|
|
1543
1543
|
}
|
|
1544
1544
|
|
|
@@ -1555,7 +1555,7 @@ function createChallengeCallbacks() {
|
|
|
1555
1555
|
function createTraceFunction(prefix) {
|
|
1556
1556
|
const createSpan = coreTracing.createSpanFunction({
|
|
1557
1557
|
namespace: "Microsoft.KeyVault",
|
|
1558
|
-
packagePrefix: prefix
|
|
1558
|
+
packagePrefix: prefix,
|
|
1559
1559
|
});
|
|
1560
1560
|
return async function (operationName, options, cb) {
|
|
1561
1561
|
const { updatedOptions, span } = createSpan(operationName, options);
|
|
@@ -1565,14 +1565,14 @@ function createTraceFunction(prefix) {
|
|
|
1565
1565
|
const result = await cb(updatedOptions, span);
|
|
1566
1566
|
// otel 0.16+ needs this or else the code ends up being set as UNSET
|
|
1567
1567
|
span.setStatus({
|
|
1568
|
-
code: coreTracing.SpanStatusCode.OK
|
|
1568
|
+
code: coreTracing.SpanStatusCode.OK,
|
|
1569
1569
|
});
|
|
1570
1570
|
return result;
|
|
1571
1571
|
}
|
|
1572
1572
|
catch (err) {
|
|
1573
1573
|
span.setStatus({
|
|
1574
1574
|
code: coreTracing.SpanStatusCode.ERROR,
|
|
1575
|
-
message: err.message
|
|
1575
|
+
message: err.message,
|
|
1576
1576
|
});
|
|
1577
1577
|
throw err;
|
|
1578
1578
|
}
|
|
@@ -1602,10 +1602,10 @@ const mappings = {
|
|
|
1602
1602
|
properties: {
|
|
1603
1603
|
scope: scope,
|
|
1604
1604
|
roleDefinitionId: roleDefinitionId,
|
|
1605
|
-
principalId: principalId
|
|
1606
|
-
}
|
|
1605
|
+
principalId: principalId,
|
|
1606
|
+
},
|
|
1607
1607
|
};
|
|
1608
|
-
}
|
|
1608
|
+
},
|
|
1609
1609
|
},
|
|
1610
1610
|
roleDefinition: {
|
|
1611
1611
|
generatedToPublic(roleDefinition) {
|
|
@@ -1618,9 +1618,9 @@ const mappings = {
|
|
|
1618
1618
|
description: description,
|
|
1619
1619
|
roleType: roleType,
|
|
1620
1620
|
permissions: permissions,
|
|
1621
|
-
assignableScopes: assignableScopes
|
|
1621
|
+
assignableScopes: assignableScopes,
|
|
1622
1622
|
};
|
|
1623
|
-
}
|
|
1623
|
+
},
|
|
1624
1624
|
},
|
|
1625
1625
|
folderUriParts(folderUri) {
|
|
1626
1626
|
const uriParts = folderUri.split("/");
|
|
@@ -1631,9 +1631,9 @@ const mappings = {
|
|
|
1631
1631
|
}
|
|
1632
1632
|
return {
|
|
1633
1633
|
folderName,
|
|
1634
|
-
folderUri: storageUri
|
|
1634
|
+
folderUri: storageUri,
|
|
1635
1635
|
};
|
|
1636
|
-
}
|
|
1636
|
+
},
|
|
1637
1637
|
};
|
|
1638
1638
|
|
|
1639
1639
|
// Copyright (c) Microsoft Corporation.
|
|
@@ -1669,14 +1669,14 @@ class KeyVaultAccessControlClient {
|
|
|
1669
1669
|
additionalAllowedHeaderNames: [
|
|
1670
1670
|
"x-ms-keyvault-region",
|
|
1671
1671
|
"x-ms-keyvault-network-info",
|
|
1672
|
-
"x-ms-keyvault-service-version"
|
|
1673
|
-
]
|
|
1672
|
+
"x-ms-keyvault-service-version",
|
|
1673
|
+
],
|
|
1674
1674
|
} });
|
|
1675
1675
|
this.client = new KeyVaultClient(serviceVersion, clientOptions);
|
|
1676
1676
|
this.client.pipeline.addPolicy(coreRestPipeline.bearerTokenAuthenticationPolicy({
|
|
1677
1677
|
credential,
|
|
1678
1678
|
scopes: authenticationScopes,
|
|
1679
|
-
challengeCallbacks: createChallengeCallbacks()
|
|
1679
|
+
challengeCallbacks: createChallengeCallbacks(),
|
|
1680
1680
|
}));
|
|
1681
1681
|
}
|
|
1682
1682
|
/**
|
|
@@ -1701,8 +1701,8 @@ class KeyVaultAccessControlClient {
|
|
|
1701
1701
|
const response = await this.client.roleAssignments.create(this.vaultUrl, roleScope, name, {
|
|
1702
1702
|
properties: {
|
|
1703
1703
|
roleDefinitionId,
|
|
1704
|
-
principalId
|
|
1705
|
-
}
|
|
1704
|
+
principalId,
|
|
1705
|
+
},
|
|
1706
1706
|
}, updatedOptions);
|
|
1707
1707
|
return mappings.roleAssignment.generatedToPublic(response);
|
|
1708
1708
|
});
|
|
@@ -1748,7 +1748,6 @@ class KeyVaultAccessControlClient {
|
|
|
1748
1748
|
});
|
|
1749
1749
|
}
|
|
1750
1750
|
/**
|
|
1751
|
-
* @internal
|
|
1752
1751
|
* Deals with the pagination of {@link listRoleAssignments}.
|
|
1753
1752
|
* @param roleScope - The scope of the role assignments.
|
|
1754
1753
|
* @param continuationState - An object that indicates the position of the paginated request.
|
|
@@ -1781,7 +1780,6 @@ class KeyVaultAccessControlClient {
|
|
|
1781
1780
|
});
|
|
1782
1781
|
}
|
|
1783
1782
|
/**
|
|
1784
|
-
* @internal
|
|
1785
1783
|
* Deals with the iteration of all the available results of {@link listRoleAssignments}.
|
|
1786
1784
|
* @param roleScope - The scope of the role assignments.
|
|
1787
1785
|
* @param options - Common options for the iterative endpoints.
|
|
@@ -1827,11 +1825,10 @@ class KeyVaultAccessControlClient {
|
|
|
1827
1825
|
[Symbol.asyncIterator]() {
|
|
1828
1826
|
return this;
|
|
1829
1827
|
},
|
|
1830
|
-
byPage: (settings = {}) => this.listRoleAssignmentsPage(roleScope, settings, options)
|
|
1828
|
+
byPage: (settings = {}) => this.listRoleAssignmentsPage(roleScope, settings, options),
|
|
1831
1829
|
};
|
|
1832
1830
|
}
|
|
1833
1831
|
/**
|
|
1834
|
-
* @internal
|
|
1835
1832
|
* Deals with the pagination of {@link listRoleDefinitions}.
|
|
1836
1833
|
* @param roleScope - The scope of the role definition.
|
|
1837
1834
|
* @param continuationState - An object that indicates the position of the paginated request.
|
|
@@ -1860,7 +1857,6 @@ class KeyVaultAccessControlClient {
|
|
|
1860
1857
|
});
|
|
1861
1858
|
}
|
|
1862
1859
|
/**
|
|
1863
|
-
* @internal
|
|
1864
1860
|
* Deals with the iteration of all the available results of {@link listRoleDefinitions}.
|
|
1865
1861
|
* @param roleScope - The scope of the role definition.
|
|
1866
1862
|
* @param options - Common options for the iterative endpoints.
|
|
@@ -1906,7 +1902,7 @@ class KeyVaultAccessControlClient {
|
|
|
1906
1902
|
[Symbol.asyncIterator]() {
|
|
1907
1903
|
return this;
|
|
1908
1904
|
},
|
|
1909
|
-
byPage: (settings = {}) => this.listRoleDefinitionsPage(roleScope, settings, options)
|
|
1905
|
+
byPage: (settings = {}) => this.listRoleDefinitionsPage(roleScope, settings, options),
|
|
1910
1906
|
};
|
|
1911
1907
|
}
|
|
1912
1908
|
/**
|
|
@@ -1953,8 +1949,8 @@ class KeyVaultAccessControlClient {
|
|
|
1953
1949
|
permissions: options.permissions,
|
|
1954
1950
|
assignableScopes: [roleScope],
|
|
1955
1951
|
roleName: options.roleName,
|
|
1956
|
-
roleType: "CustomRole"
|
|
1957
|
-
}
|
|
1952
|
+
roleType: "CustomRole",
|
|
1953
|
+
},
|
|
1958
1954
|
}, updatedOptions);
|
|
1959
1955
|
return mappings.roleDefinition.generatedToPublic(response);
|
|
1960
1956
|
});
|
|
@@ -2097,7 +2093,7 @@ function cleanState(state) {
|
|
|
2097
2093
|
isCancelled: state.isCancelled,
|
|
2098
2094
|
isCompleted: state.isCompleted,
|
|
2099
2095
|
error: state.error,
|
|
2100
|
-
result: state.result
|
|
2096
|
+
result: state.result,
|
|
2101
2097
|
};
|
|
2102
2098
|
}
|
|
2103
2099
|
/**
|
|
@@ -2149,7 +2145,7 @@ class KeyVaultAdminPollOperation {
|
|
|
2149
2145
|
*/
|
|
2150
2146
|
toString() {
|
|
2151
2147
|
return JSON.stringify({
|
|
2152
|
-
state: cleanState(this.state)
|
|
2148
|
+
state: cleanState(this.state),
|
|
2153
2149
|
});
|
|
2154
2150
|
}
|
|
2155
2151
|
}
|
|
@@ -2194,7 +2190,7 @@ class KeyVaultBackupPollOperation extends KeyVaultAdminPollOperation {
|
|
|
2194
2190
|
if (!state.isStarted) {
|
|
2195
2191
|
const serviceOperation = await this.fullBackup(Object.assign(Object.assign({}, this.requestOptions), { azureStorageBlobContainerUri: {
|
|
2196
2192
|
storageResourceUri: blobStorageUri,
|
|
2197
|
-
token: sasToken
|
|
2193
|
+
token: sasToken,
|
|
2198
2194
|
} }));
|
|
2199
2195
|
this.mapState(serviceOperation);
|
|
2200
2196
|
}
|
|
@@ -2209,7 +2205,7 @@ class KeyVaultBackupPollOperation extends KeyVaultAdminPollOperation {
|
|
|
2209
2205
|
}
|
|
2210
2206
|
mapState(serviceOperation) {
|
|
2211
2207
|
const state = this.state;
|
|
2212
|
-
const { startTime, jobId, azureStorageBlobContainerUri, endTime, error, status, statusDetails } = serviceOperation;
|
|
2208
|
+
const { startTime, jobId, azureStorageBlobContainerUri, endTime, error, status, statusDetails, } = serviceOperation;
|
|
2213
2209
|
if (!startTime) {
|
|
2214
2210
|
throw new Error(`Missing "startTime" from the full backup operation. Full backup did not start successfully.`);
|
|
2215
2211
|
}
|
|
@@ -2227,7 +2223,7 @@ class KeyVaultBackupPollOperation extends KeyVaultAdminPollOperation {
|
|
|
2227
2223
|
state.result = {
|
|
2228
2224
|
folderUri: azureStorageBlobContainerUri,
|
|
2229
2225
|
startTime,
|
|
2230
|
-
endTime
|
|
2226
|
+
endTime,
|
|
2231
2227
|
};
|
|
2232
2228
|
}
|
|
2233
2229
|
}
|
|
@@ -2239,7 +2235,7 @@ class KeyVaultBackupPollOperation extends KeyVaultAdminPollOperation {
|
|
|
2239
2235
|
*/
|
|
2240
2236
|
class KeyVaultBackupPoller extends KeyVaultAdminPoller {
|
|
2241
2237
|
constructor(options) {
|
|
2242
|
-
const { client, vaultUrl, blobStorageUri, sasToken, requestOptions, intervalInMs = 2000, resumeFrom } = options;
|
|
2238
|
+
const { client, vaultUrl, blobStorageUri, sasToken, requestOptions, intervalInMs = 2000, resumeFrom, } = options;
|
|
2243
2239
|
let state;
|
|
2244
2240
|
if (resumeFrom) {
|
|
2245
2241
|
state = JSON.parse(resumeFrom).state;
|
|
@@ -2262,7 +2258,7 @@ const withTrace$2 = createTraceFunction("Azure.KeyVault.Admin.KeyVaultRestorePol
|
|
|
2262
2258
|
class KeyVaultRestorePollOperation extends KeyVaultAdminPollOperation {
|
|
2263
2259
|
constructor(state, vaultUrl, client, requestOptions = {}) {
|
|
2264
2260
|
super(state, {
|
|
2265
|
-
cancelMessage: "Cancelling the restoration full Key Vault backup is not supported."
|
|
2261
|
+
cancelMessage: "Cancelling the restoration full Key Vault backup is not supported.",
|
|
2266
2262
|
});
|
|
2267
2263
|
this.state = state;
|
|
2268
2264
|
this.vaultUrl = vaultUrl;
|
|
@@ -2295,8 +2291,8 @@ class KeyVaultRestorePollOperation extends KeyVaultAdminPollOperation {
|
|
|
2295
2291
|
folderToRestore: folderName,
|
|
2296
2292
|
sasTokenParameters: {
|
|
2297
2293
|
storageResourceUri: folderUri,
|
|
2298
|
-
token: sasToken
|
|
2299
|
-
}
|
|
2294
|
+
token: sasToken,
|
|
2295
|
+
},
|
|
2300
2296
|
} }));
|
|
2301
2297
|
this.mapState(serviceOperation);
|
|
2302
2298
|
}
|
|
@@ -2328,7 +2324,7 @@ class KeyVaultRestorePollOperation extends KeyVaultAdminPollOperation {
|
|
|
2328
2324
|
if (state.isCompleted) {
|
|
2329
2325
|
state.result = {
|
|
2330
2326
|
startTime,
|
|
2331
|
-
endTime
|
|
2327
|
+
endTime,
|
|
2332
2328
|
};
|
|
2333
2329
|
}
|
|
2334
2330
|
}
|
|
@@ -2340,7 +2336,7 @@ class KeyVaultRestorePollOperation extends KeyVaultAdminPollOperation {
|
|
|
2340
2336
|
*/
|
|
2341
2337
|
class KeyVaultRestorePoller extends KeyVaultAdminPoller {
|
|
2342
2338
|
constructor(options) {
|
|
2343
|
-
const { client, vaultUrl, folderUri, sasToken, folderName, requestOptions, intervalInMs = 2000, resumeFrom } = options;
|
|
2339
|
+
const { client, vaultUrl, folderUri, sasToken, folderName, requestOptions, intervalInMs = 2000, resumeFrom, } = options;
|
|
2344
2340
|
let state;
|
|
2345
2341
|
if (resumeFrom) {
|
|
2346
2342
|
state = JSON.parse(resumeFrom).state;
|
|
@@ -2395,8 +2391,8 @@ class KeyVaultSelectiveKeyRestorePollOperation extends KeyVaultAdminPollOperatio
|
|
|
2395
2391
|
folder: folderName,
|
|
2396
2392
|
sasTokenParameters: {
|
|
2397
2393
|
storageResourceUri: folderUri,
|
|
2398
|
-
token: sasToken
|
|
2399
|
-
}
|
|
2394
|
+
token: sasToken,
|
|
2395
|
+
},
|
|
2400
2396
|
} }));
|
|
2401
2397
|
this.mapState(selectiveRestoreOperation);
|
|
2402
2398
|
}
|
|
@@ -2428,7 +2424,7 @@ class KeyVaultSelectiveKeyRestorePollOperation extends KeyVaultAdminPollOperatio
|
|
|
2428
2424
|
if (state.isCompleted) {
|
|
2429
2425
|
state.result = {
|
|
2430
2426
|
startTime,
|
|
2431
|
-
endTime
|
|
2427
|
+
endTime,
|
|
2432
2428
|
};
|
|
2433
2429
|
}
|
|
2434
2430
|
}
|
|
@@ -2440,7 +2436,7 @@ class KeyVaultSelectiveKeyRestorePollOperation extends KeyVaultAdminPollOperatio
|
|
|
2440
2436
|
*/
|
|
2441
2437
|
class KeyVaultSelectiveKeyRestorePoller extends KeyVaultAdminPoller {
|
|
2442
2438
|
constructor(options) {
|
|
2443
|
-
const { client, vaultUrl, keyName, folderUri, sasToken, folderName, requestOptions, intervalInMs = 2000, resumeFrom } = options;
|
|
2439
|
+
const { client, vaultUrl, keyName, folderUri, sasToken, folderName, requestOptions, intervalInMs = 2000, resumeFrom, } = options;
|
|
2444
2440
|
let state;
|
|
2445
2441
|
if (resumeFrom) {
|
|
2446
2442
|
state = JSON.parse(resumeFrom).state;
|
|
@@ -2485,14 +2481,14 @@ class KeyVaultBackupClient {
|
|
|
2485
2481
|
additionalAllowedHeaderNames: [
|
|
2486
2482
|
"x-ms-keyvault-region",
|
|
2487
2483
|
"x-ms-keyvault-network-info",
|
|
2488
|
-
"x-ms-keyvault-service-version"
|
|
2489
|
-
]
|
|
2484
|
+
"x-ms-keyvault-service-version",
|
|
2485
|
+
],
|
|
2490
2486
|
} });
|
|
2491
2487
|
this.client = new KeyVaultClient(apiVersion, clientOptions);
|
|
2492
2488
|
this.client.pipeline.addPolicy(coreRestPipeline.bearerTokenAuthenticationPolicy({
|
|
2493
2489
|
credential,
|
|
2494
2490
|
scopes: authenticationScopes,
|
|
2495
|
-
challengeCallbacks: createChallengeCallbacks()
|
|
2491
|
+
challengeCallbacks: createChallengeCallbacks(),
|
|
2496
2492
|
}));
|
|
2497
2493
|
}
|
|
2498
2494
|
/**
|
|
@@ -2534,7 +2530,7 @@ class KeyVaultBackupClient {
|
|
|
2534
2530
|
vaultUrl: this.vaultUrl,
|
|
2535
2531
|
intervalInMs: options.intervalInMs,
|
|
2536
2532
|
resumeFrom: options.resumeFrom,
|
|
2537
|
-
requestOptions: options
|
|
2533
|
+
requestOptions: options,
|
|
2538
2534
|
});
|
|
2539
2535
|
// This will initialize the poller's operation (the generation of the backup).
|
|
2540
2536
|
await poller.poll();
|