@azure/keyvault-admin 4.2.0-alpha.20211214.4 → 4.2.0-alpha.20220105.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (43) hide show
  1. package/CHANGELOG.md +10 -0
  2. package/dist/index.js +45 -49
  3. package/dist/index.js.map +1 -1
  4. package/dist-esm/keyvault-admin/src/accessControlClient.js +9 -13
  5. package/dist-esm/keyvault-admin/src/accessControlClient.js.map +1 -1
  6. package/dist-esm/keyvault-admin/src/accessControlModels.js +1 -1
  7. package/dist-esm/keyvault-admin/src/accessControlModels.js.map +1 -1
  8. package/dist-esm/keyvault-admin/src/backupClient.js +4 -4
  9. package/dist-esm/keyvault-admin/src/backupClient.js.map +1 -1
  10. package/dist-esm/keyvault-admin/src/challengeAuthenticationCallbacks.js +5 -5
  11. package/dist-esm/keyvault-admin/src/challengeAuthenticationCallbacks.js.map +1 -1
  12. package/dist-esm/keyvault-admin/src/constants.js +1 -1
  13. package/dist-esm/keyvault-admin/src/constants.js.map +1 -1
  14. package/dist-esm/keyvault-admin/src/generated/keyVaultClientContext.js +1 -1
  15. package/dist-esm/keyvault-admin/src/generated/keyVaultClientContext.js.map +1 -1
  16. package/dist-esm/keyvault-admin/src/lro/backup/operation.js +4 -4
  17. package/dist-esm/keyvault-admin/src/lro/backup/operation.js.map +1 -1
  18. package/dist-esm/keyvault-admin/src/lro/backup/poller.js +2 -2
  19. package/dist-esm/keyvault-admin/src/lro/backup/poller.js.map +1 -1
  20. package/dist-esm/keyvault-admin/src/lro/keyVaultAdminPoller.js +2 -2
  21. package/dist-esm/keyvault-admin/src/lro/keyVaultAdminPoller.js.map +1 -1
  22. package/dist-esm/keyvault-admin/src/lro/restore/operation.js +5 -5
  23. package/dist-esm/keyvault-admin/src/lro/restore/operation.js.map +1 -1
  24. package/dist-esm/keyvault-admin/src/lro/restore/poller.js +2 -2
  25. package/dist-esm/keyvault-admin/src/lro/restore/poller.js.map +1 -1
  26. package/dist-esm/keyvault-admin/src/lro/selectiveKeyRestore/operation.js +4 -4
  27. package/dist-esm/keyvault-admin/src/lro/selectiveKeyRestore/operation.js.map +1 -1
  28. package/dist-esm/keyvault-admin/src/lro/selectiveKeyRestore/poller.js +2 -2
  29. package/dist-esm/keyvault-admin/src/lro/selectiveKeyRestore/poller.js.map +1 -1
  30. package/dist-esm/keyvault-admin/src/mappings.js +7 -7
  31. package/dist-esm/keyvault-admin/src/mappings.js.map +1 -1
  32. package/dist-esm/keyvault-admin/src/tracingHelpers.js +3 -3
  33. package/dist-esm/keyvault-admin/src/tracingHelpers.js.map +1 -1
  34. package/dist-esm/keyvault-common/src/challengeBasedAuthenticationPolicy.js +3 -3
  35. package/dist-esm/keyvault-common/src/challengeBasedAuthenticationPolicy.js.map +1 -1
  36. package/dist-esm/keyvault-common/src/parseKeyvaultIdentifier.js +1 -1
  37. package/dist-esm/keyvault-common/src/parseKeyvaultIdentifier.js.map +1 -1
  38. package/dist-esm/keyvault-common/src/parseWWWAuthenticate.js +1 -1
  39. package/dist-esm/keyvault-common/src/parseWWWAuthenticate.js.map +1 -1
  40. package/dist-esm/keyvault-common/src/tracingHelpers.js +3 -3
  41. package/dist-esm/keyvault-common/src/tracingHelpers.js.map +1 -1
  42. package/package.json +2 -3
  43. package/types/keyvault-admin.d.ts +34 -6
package/CHANGELOG.md CHANGED
@@ -1,5 +1,15 @@
1
1
  # Release History
2
2
 
3
+ ## 4.2.0-beta.3 (Unreleased)
4
+
5
+ ### Features Added
6
+
7
+ ### Breaking Changes
8
+
9
+ ### Bugs Fixed
10
+
11
+ ### Other Changes
12
+
3
13
  ## 4.2.0-beta.2 (2021-11-09)
4
14
 
5
15
  ### Features Added
package/dist/index.js CHANGED
@@ -17,7 +17,7 @@ var coreLro = require('@azure/core-lro');
17
17
  /**
18
18
  * Current version of the Key Vault Admin SDK.
19
19
  */
20
- const SDK_VERSION = "4.2.0-beta.2";
20
+ const SDK_VERSION = "4.2.0-beta.3";
21
21
  /**
22
22
  * The latest supported Key Vault service API version.
23
23
  */
@@ -1423,7 +1423,7 @@ const validParsedWWWAuthenticateProperties = [
1423
1423
  "authorization_url",
1424
1424
  "resource",
1425
1425
  "scope",
1426
- "tenantId"
1426
+ "tenantId",
1427
1427
  ];
1428
1428
  /**
1429
1429
  * Parses an WWW-Authenticate response.
@@ -1484,9 +1484,9 @@ function createChallengeCallbacks() {
1484
1484
  return {
1485
1485
  abortSignal: request.abortSignal,
1486
1486
  requestOptions: {
1487
- timeout: request.timeout
1487
+ timeout: request.timeout,
1488
1488
  },
1489
- tracingOptions: request.tracingOptions
1489
+ tracingOptions: request.tracingOptions,
1490
1490
  };
1491
1491
  }
1492
1492
  async function authorizeRequest(options) {
@@ -1496,7 +1496,7 @@ function createChallengeCallbacks() {
1496
1496
  case "none":
1497
1497
  challengeState = {
1498
1498
  status: "started",
1499
- originalBody: request.body
1499
+ originalBody: request.body,
1500
1500
  };
1501
1501
  request.body = null;
1502
1502
  break;
@@ -1532,13 +1532,13 @@ function createChallengeCallbacks() {
1532
1532
  }
1533
1533
  options.request.headers.set("Authorization", `Bearer ${accessToken.token}`);
1534
1534
  challengeState = {
1535
- status: "complete"
1535
+ status: "complete",
1536
1536
  };
1537
1537
  return true;
1538
1538
  }
1539
1539
  return {
1540
1540
  authorizeRequest,
1541
- authorizeRequestOnChallenge
1541
+ authorizeRequestOnChallenge,
1542
1542
  };
1543
1543
  }
1544
1544
 
@@ -1555,7 +1555,7 @@ function createChallengeCallbacks() {
1555
1555
  function createTraceFunction(prefix) {
1556
1556
  const createSpan = coreTracing.createSpanFunction({
1557
1557
  namespace: "Microsoft.KeyVault",
1558
- packagePrefix: prefix
1558
+ packagePrefix: prefix,
1559
1559
  });
1560
1560
  return async function (operationName, options, cb) {
1561
1561
  const { updatedOptions, span } = createSpan(operationName, options);
@@ -1565,14 +1565,14 @@ function createTraceFunction(prefix) {
1565
1565
  const result = await cb(updatedOptions, span);
1566
1566
  // otel 0.16+ needs this or else the code ends up being set as UNSET
1567
1567
  span.setStatus({
1568
- code: coreTracing.SpanStatusCode.OK
1568
+ code: coreTracing.SpanStatusCode.OK,
1569
1569
  });
1570
1570
  return result;
1571
1571
  }
1572
1572
  catch (err) {
1573
1573
  span.setStatus({
1574
1574
  code: coreTracing.SpanStatusCode.ERROR,
1575
- message: err.message
1575
+ message: err.message,
1576
1576
  });
1577
1577
  throw err;
1578
1578
  }
@@ -1602,10 +1602,10 @@ const mappings = {
1602
1602
  properties: {
1603
1603
  scope: scope,
1604
1604
  roleDefinitionId: roleDefinitionId,
1605
- principalId: principalId
1606
- }
1605
+ principalId: principalId,
1606
+ },
1607
1607
  };
1608
- }
1608
+ },
1609
1609
  },
1610
1610
  roleDefinition: {
1611
1611
  generatedToPublic(roleDefinition) {
@@ -1618,9 +1618,9 @@ const mappings = {
1618
1618
  description: description,
1619
1619
  roleType: roleType,
1620
1620
  permissions: permissions,
1621
- assignableScopes: assignableScopes
1621
+ assignableScopes: assignableScopes,
1622
1622
  };
1623
- }
1623
+ },
1624
1624
  },
1625
1625
  folderUriParts(folderUri) {
1626
1626
  const uriParts = folderUri.split("/");
@@ -1631,9 +1631,9 @@ const mappings = {
1631
1631
  }
1632
1632
  return {
1633
1633
  folderName,
1634
- folderUri: storageUri
1634
+ folderUri: storageUri,
1635
1635
  };
1636
- }
1636
+ },
1637
1637
  };
1638
1638
 
1639
1639
  // Copyright (c) Microsoft Corporation.
@@ -1669,14 +1669,14 @@ class KeyVaultAccessControlClient {
1669
1669
  additionalAllowedHeaderNames: [
1670
1670
  "x-ms-keyvault-region",
1671
1671
  "x-ms-keyvault-network-info",
1672
- "x-ms-keyvault-service-version"
1673
- ]
1672
+ "x-ms-keyvault-service-version",
1673
+ ],
1674
1674
  } });
1675
1675
  this.client = new KeyVaultClient(serviceVersion, clientOptions);
1676
1676
  this.client.pipeline.addPolicy(coreRestPipeline.bearerTokenAuthenticationPolicy({
1677
1677
  credential,
1678
1678
  scopes: authenticationScopes,
1679
- challengeCallbacks: createChallengeCallbacks()
1679
+ challengeCallbacks: createChallengeCallbacks(),
1680
1680
  }));
1681
1681
  }
1682
1682
  /**
@@ -1701,8 +1701,8 @@ class KeyVaultAccessControlClient {
1701
1701
  const response = await this.client.roleAssignments.create(this.vaultUrl, roleScope, name, {
1702
1702
  properties: {
1703
1703
  roleDefinitionId,
1704
- principalId
1705
- }
1704
+ principalId,
1705
+ },
1706
1706
  }, updatedOptions);
1707
1707
  return mappings.roleAssignment.generatedToPublic(response);
1708
1708
  });
@@ -1748,7 +1748,6 @@ class KeyVaultAccessControlClient {
1748
1748
  });
1749
1749
  }
1750
1750
  /**
1751
- * @internal
1752
1751
  * Deals with the pagination of {@link listRoleAssignments}.
1753
1752
  * @param roleScope - The scope of the role assignments.
1754
1753
  * @param continuationState - An object that indicates the position of the paginated request.
@@ -1781,7 +1780,6 @@ class KeyVaultAccessControlClient {
1781
1780
  });
1782
1781
  }
1783
1782
  /**
1784
- * @internal
1785
1783
  * Deals with the iteration of all the available results of {@link listRoleAssignments}.
1786
1784
  * @param roleScope - The scope of the role assignments.
1787
1785
  * @param options - Common options for the iterative endpoints.
@@ -1827,11 +1825,10 @@ class KeyVaultAccessControlClient {
1827
1825
  [Symbol.asyncIterator]() {
1828
1826
  return this;
1829
1827
  },
1830
- byPage: (settings = {}) => this.listRoleAssignmentsPage(roleScope, settings, options)
1828
+ byPage: (settings = {}) => this.listRoleAssignmentsPage(roleScope, settings, options),
1831
1829
  };
1832
1830
  }
1833
1831
  /**
1834
- * @internal
1835
1832
  * Deals with the pagination of {@link listRoleDefinitions}.
1836
1833
  * @param roleScope - The scope of the role definition.
1837
1834
  * @param continuationState - An object that indicates the position of the paginated request.
@@ -1860,7 +1857,6 @@ class KeyVaultAccessControlClient {
1860
1857
  });
1861
1858
  }
1862
1859
  /**
1863
- * @internal
1864
1860
  * Deals with the iteration of all the available results of {@link listRoleDefinitions}.
1865
1861
  * @param roleScope - The scope of the role definition.
1866
1862
  * @param options - Common options for the iterative endpoints.
@@ -1906,7 +1902,7 @@ class KeyVaultAccessControlClient {
1906
1902
  [Symbol.asyncIterator]() {
1907
1903
  return this;
1908
1904
  },
1909
- byPage: (settings = {}) => this.listRoleDefinitionsPage(roleScope, settings, options)
1905
+ byPage: (settings = {}) => this.listRoleDefinitionsPage(roleScope, settings, options),
1910
1906
  };
1911
1907
  }
1912
1908
  /**
@@ -1953,8 +1949,8 @@ class KeyVaultAccessControlClient {
1953
1949
  permissions: options.permissions,
1954
1950
  assignableScopes: [roleScope],
1955
1951
  roleName: options.roleName,
1956
- roleType: "CustomRole"
1957
- }
1952
+ roleType: "CustomRole",
1953
+ },
1958
1954
  }, updatedOptions);
1959
1955
  return mappings.roleDefinition.generatedToPublic(response);
1960
1956
  });
@@ -2097,7 +2093,7 @@ function cleanState(state) {
2097
2093
  isCancelled: state.isCancelled,
2098
2094
  isCompleted: state.isCompleted,
2099
2095
  error: state.error,
2100
- result: state.result
2096
+ result: state.result,
2101
2097
  };
2102
2098
  }
2103
2099
  /**
@@ -2149,7 +2145,7 @@ class KeyVaultAdminPollOperation {
2149
2145
  */
2150
2146
  toString() {
2151
2147
  return JSON.stringify({
2152
- state: cleanState(this.state)
2148
+ state: cleanState(this.state),
2153
2149
  });
2154
2150
  }
2155
2151
  }
@@ -2194,7 +2190,7 @@ class KeyVaultBackupPollOperation extends KeyVaultAdminPollOperation {
2194
2190
  if (!state.isStarted) {
2195
2191
  const serviceOperation = await this.fullBackup(Object.assign(Object.assign({}, this.requestOptions), { azureStorageBlobContainerUri: {
2196
2192
  storageResourceUri: blobStorageUri,
2197
- token: sasToken
2193
+ token: sasToken,
2198
2194
  } }));
2199
2195
  this.mapState(serviceOperation);
2200
2196
  }
@@ -2209,7 +2205,7 @@ class KeyVaultBackupPollOperation extends KeyVaultAdminPollOperation {
2209
2205
  }
2210
2206
  mapState(serviceOperation) {
2211
2207
  const state = this.state;
2212
- const { startTime, jobId, azureStorageBlobContainerUri, endTime, error, status, statusDetails } = serviceOperation;
2208
+ const { startTime, jobId, azureStorageBlobContainerUri, endTime, error, status, statusDetails, } = serviceOperation;
2213
2209
  if (!startTime) {
2214
2210
  throw new Error(`Missing "startTime" from the full backup operation. Full backup did not start successfully.`);
2215
2211
  }
@@ -2227,7 +2223,7 @@ class KeyVaultBackupPollOperation extends KeyVaultAdminPollOperation {
2227
2223
  state.result = {
2228
2224
  folderUri: azureStorageBlobContainerUri,
2229
2225
  startTime,
2230
- endTime
2226
+ endTime,
2231
2227
  };
2232
2228
  }
2233
2229
  }
@@ -2239,7 +2235,7 @@ class KeyVaultBackupPollOperation extends KeyVaultAdminPollOperation {
2239
2235
  */
2240
2236
  class KeyVaultBackupPoller extends KeyVaultAdminPoller {
2241
2237
  constructor(options) {
2242
- const { client, vaultUrl, blobStorageUri, sasToken, requestOptions, intervalInMs = 2000, resumeFrom } = options;
2238
+ const { client, vaultUrl, blobStorageUri, sasToken, requestOptions, intervalInMs = 2000, resumeFrom, } = options;
2243
2239
  let state;
2244
2240
  if (resumeFrom) {
2245
2241
  state = JSON.parse(resumeFrom).state;
@@ -2262,7 +2258,7 @@ const withTrace$2 = createTraceFunction("Azure.KeyVault.Admin.KeyVaultRestorePol
2262
2258
  class KeyVaultRestorePollOperation extends KeyVaultAdminPollOperation {
2263
2259
  constructor(state, vaultUrl, client, requestOptions = {}) {
2264
2260
  super(state, {
2265
- cancelMessage: "Cancelling the restoration full Key Vault backup is not supported."
2261
+ cancelMessage: "Cancelling the restoration full Key Vault backup is not supported.",
2266
2262
  });
2267
2263
  this.state = state;
2268
2264
  this.vaultUrl = vaultUrl;
@@ -2295,8 +2291,8 @@ class KeyVaultRestorePollOperation extends KeyVaultAdminPollOperation {
2295
2291
  folderToRestore: folderName,
2296
2292
  sasTokenParameters: {
2297
2293
  storageResourceUri: folderUri,
2298
- token: sasToken
2299
- }
2294
+ token: sasToken,
2295
+ },
2300
2296
  } }));
2301
2297
  this.mapState(serviceOperation);
2302
2298
  }
@@ -2328,7 +2324,7 @@ class KeyVaultRestorePollOperation extends KeyVaultAdminPollOperation {
2328
2324
  if (state.isCompleted) {
2329
2325
  state.result = {
2330
2326
  startTime,
2331
- endTime
2327
+ endTime,
2332
2328
  };
2333
2329
  }
2334
2330
  }
@@ -2340,7 +2336,7 @@ class KeyVaultRestorePollOperation extends KeyVaultAdminPollOperation {
2340
2336
  */
2341
2337
  class KeyVaultRestorePoller extends KeyVaultAdminPoller {
2342
2338
  constructor(options) {
2343
- const { client, vaultUrl, folderUri, sasToken, folderName, requestOptions, intervalInMs = 2000, resumeFrom } = options;
2339
+ const { client, vaultUrl, folderUri, sasToken, folderName, requestOptions, intervalInMs = 2000, resumeFrom, } = options;
2344
2340
  let state;
2345
2341
  if (resumeFrom) {
2346
2342
  state = JSON.parse(resumeFrom).state;
@@ -2395,8 +2391,8 @@ class KeyVaultSelectiveKeyRestorePollOperation extends KeyVaultAdminPollOperatio
2395
2391
  folder: folderName,
2396
2392
  sasTokenParameters: {
2397
2393
  storageResourceUri: folderUri,
2398
- token: sasToken
2399
- }
2394
+ token: sasToken,
2395
+ },
2400
2396
  } }));
2401
2397
  this.mapState(selectiveRestoreOperation);
2402
2398
  }
@@ -2428,7 +2424,7 @@ class KeyVaultSelectiveKeyRestorePollOperation extends KeyVaultAdminPollOperatio
2428
2424
  if (state.isCompleted) {
2429
2425
  state.result = {
2430
2426
  startTime,
2431
- endTime
2427
+ endTime,
2432
2428
  };
2433
2429
  }
2434
2430
  }
@@ -2440,7 +2436,7 @@ class KeyVaultSelectiveKeyRestorePollOperation extends KeyVaultAdminPollOperatio
2440
2436
  */
2441
2437
  class KeyVaultSelectiveKeyRestorePoller extends KeyVaultAdminPoller {
2442
2438
  constructor(options) {
2443
- const { client, vaultUrl, keyName, folderUri, sasToken, folderName, requestOptions, intervalInMs = 2000, resumeFrom } = options;
2439
+ const { client, vaultUrl, keyName, folderUri, sasToken, folderName, requestOptions, intervalInMs = 2000, resumeFrom, } = options;
2444
2440
  let state;
2445
2441
  if (resumeFrom) {
2446
2442
  state = JSON.parse(resumeFrom).state;
@@ -2485,14 +2481,14 @@ class KeyVaultBackupClient {
2485
2481
  additionalAllowedHeaderNames: [
2486
2482
  "x-ms-keyvault-region",
2487
2483
  "x-ms-keyvault-network-info",
2488
- "x-ms-keyvault-service-version"
2489
- ]
2484
+ "x-ms-keyvault-service-version",
2485
+ ],
2490
2486
  } });
2491
2487
  this.client = new KeyVaultClient(apiVersion, clientOptions);
2492
2488
  this.client.pipeline.addPolicy(coreRestPipeline.bearerTokenAuthenticationPolicy({
2493
2489
  credential,
2494
2490
  scopes: authenticationScopes,
2495
- challengeCallbacks: createChallengeCallbacks()
2491
+ challengeCallbacks: createChallengeCallbacks(),
2496
2492
  }));
2497
2493
  }
2498
2494
  /**
@@ -2534,7 +2530,7 @@ class KeyVaultBackupClient {
2534
2530
  vaultUrl: this.vaultUrl,
2535
2531
  intervalInMs: options.intervalInMs,
2536
2532
  resumeFrom: options.resumeFrom,
2537
- requestOptions: options
2533
+ requestOptions: options,
2538
2534
  });
2539
2535
  // This will initialize the poller's operation (the generation of the backup).
2540
2536
  await poller.poll();