@azure/keyvault-admin 4.2.0-alpha.20211221.3 → 4.2.0-alpha.20220105.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (37) hide show
  1. package/dist/index.js +44 -44
  2. package/dist/index.js.map +1 -1
  3. package/dist-esm/keyvault-admin/src/accessControlClient.js +9 -9
  4. package/dist-esm/keyvault-admin/src/accessControlClient.js.map +1 -1
  5. package/dist-esm/keyvault-admin/src/accessControlModels.js +1 -1
  6. package/dist-esm/keyvault-admin/src/accessControlModels.js.map +1 -1
  7. package/dist-esm/keyvault-admin/src/backupClient.js +4 -4
  8. package/dist-esm/keyvault-admin/src/backupClient.js.map +1 -1
  9. package/dist-esm/keyvault-admin/src/challengeAuthenticationCallbacks.js +5 -5
  10. package/dist-esm/keyvault-admin/src/challengeAuthenticationCallbacks.js.map +1 -1
  11. package/dist-esm/keyvault-admin/src/lro/backup/operation.js +4 -4
  12. package/dist-esm/keyvault-admin/src/lro/backup/operation.js.map +1 -1
  13. package/dist-esm/keyvault-admin/src/lro/backup/poller.js +2 -2
  14. package/dist-esm/keyvault-admin/src/lro/backup/poller.js.map +1 -1
  15. package/dist-esm/keyvault-admin/src/lro/keyVaultAdminPoller.js +2 -2
  16. package/dist-esm/keyvault-admin/src/lro/keyVaultAdminPoller.js.map +1 -1
  17. package/dist-esm/keyvault-admin/src/lro/restore/operation.js +5 -5
  18. package/dist-esm/keyvault-admin/src/lro/restore/operation.js.map +1 -1
  19. package/dist-esm/keyvault-admin/src/lro/restore/poller.js +2 -2
  20. package/dist-esm/keyvault-admin/src/lro/restore/poller.js.map +1 -1
  21. package/dist-esm/keyvault-admin/src/lro/selectiveKeyRestore/operation.js +4 -4
  22. package/dist-esm/keyvault-admin/src/lro/selectiveKeyRestore/operation.js.map +1 -1
  23. package/dist-esm/keyvault-admin/src/lro/selectiveKeyRestore/poller.js +2 -2
  24. package/dist-esm/keyvault-admin/src/lro/selectiveKeyRestore/poller.js.map +1 -1
  25. package/dist-esm/keyvault-admin/src/mappings.js +7 -7
  26. package/dist-esm/keyvault-admin/src/mappings.js.map +1 -1
  27. package/dist-esm/keyvault-admin/src/tracingHelpers.js +3 -3
  28. package/dist-esm/keyvault-admin/src/tracingHelpers.js.map +1 -1
  29. package/dist-esm/keyvault-common/src/challengeBasedAuthenticationPolicy.js +3 -3
  30. package/dist-esm/keyvault-common/src/challengeBasedAuthenticationPolicy.js.map +1 -1
  31. package/dist-esm/keyvault-common/src/parseKeyvaultIdentifier.js +1 -1
  32. package/dist-esm/keyvault-common/src/parseKeyvaultIdentifier.js.map +1 -1
  33. package/dist-esm/keyvault-common/src/parseWWWAuthenticate.js +1 -1
  34. package/dist-esm/keyvault-common/src/parseWWWAuthenticate.js.map +1 -1
  35. package/dist-esm/keyvault-common/src/tracingHelpers.js +3 -3
  36. package/dist-esm/keyvault-common/src/tracingHelpers.js.map +1 -1
  37. package/package.json +2 -2
package/dist/index.js CHANGED
@@ -1423,7 +1423,7 @@ const validParsedWWWAuthenticateProperties = [
1423
1423
  "authorization_url",
1424
1424
  "resource",
1425
1425
  "scope",
1426
- "tenantId"
1426
+ "tenantId",
1427
1427
  ];
1428
1428
  /**
1429
1429
  * Parses an WWW-Authenticate response.
@@ -1484,9 +1484,9 @@ function createChallengeCallbacks() {
1484
1484
  return {
1485
1485
  abortSignal: request.abortSignal,
1486
1486
  requestOptions: {
1487
- timeout: request.timeout
1487
+ timeout: request.timeout,
1488
1488
  },
1489
- tracingOptions: request.tracingOptions
1489
+ tracingOptions: request.tracingOptions,
1490
1490
  };
1491
1491
  }
1492
1492
  async function authorizeRequest(options) {
@@ -1496,7 +1496,7 @@ function createChallengeCallbacks() {
1496
1496
  case "none":
1497
1497
  challengeState = {
1498
1498
  status: "started",
1499
- originalBody: request.body
1499
+ originalBody: request.body,
1500
1500
  };
1501
1501
  request.body = null;
1502
1502
  break;
@@ -1532,13 +1532,13 @@ function createChallengeCallbacks() {
1532
1532
  }
1533
1533
  options.request.headers.set("Authorization", `Bearer ${accessToken.token}`);
1534
1534
  challengeState = {
1535
- status: "complete"
1535
+ status: "complete",
1536
1536
  };
1537
1537
  return true;
1538
1538
  }
1539
1539
  return {
1540
1540
  authorizeRequest,
1541
- authorizeRequestOnChallenge
1541
+ authorizeRequestOnChallenge,
1542
1542
  };
1543
1543
  }
1544
1544
 
@@ -1555,7 +1555,7 @@ function createChallengeCallbacks() {
1555
1555
  function createTraceFunction(prefix) {
1556
1556
  const createSpan = coreTracing.createSpanFunction({
1557
1557
  namespace: "Microsoft.KeyVault",
1558
- packagePrefix: prefix
1558
+ packagePrefix: prefix,
1559
1559
  });
1560
1560
  return async function (operationName, options, cb) {
1561
1561
  const { updatedOptions, span } = createSpan(operationName, options);
@@ -1565,14 +1565,14 @@ function createTraceFunction(prefix) {
1565
1565
  const result = await cb(updatedOptions, span);
1566
1566
  // otel 0.16+ needs this or else the code ends up being set as UNSET
1567
1567
  span.setStatus({
1568
- code: coreTracing.SpanStatusCode.OK
1568
+ code: coreTracing.SpanStatusCode.OK,
1569
1569
  });
1570
1570
  return result;
1571
1571
  }
1572
1572
  catch (err) {
1573
1573
  span.setStatus({
1574
1574
  code: coreTracing.SpanStatusCode.ERROR,
1575
- message: err.message
1575
+ message: err.message,
1576
1576
  });
1577
1577
  throw err;
1578
1578
  }
@@ -1602,10 +1602,10 @@ const mappings = {
1602
1602
  properties: {
1603
1603
  scope: scope,
1604
1604
  roleDefinitionId: roleDefinitionId,
1605
- principalId: principalId
1606
- }
1605
+ principalId: principalId,
1606
+ },
1607
1607
  };
1608
- }
1608
+ },
1609
1609
  },
1610
1610
  roleDefinition: {
1611
1611
  generatedToPublic(roleDefinition) {
@@ -1618,9 +1618,9 @@ const mappings = {
1618
1618
  description: description,
1619
1619
  roleType: roleType,
1620
1620
  permissions: permissions,
1621
- assignableScopes: assignableScopes
1621
+ assignableScopes: assignableScopes,
1622
1622
  };
1623
- }
1623
+ },
1624
1624
  },
1625
1625
  folderUriParts(folderUri) {
1626
1626
  const uriParts = folderUri.split("/");
@@ -1631,9 +1631,9 @@ const mappings = {
1631
1631
  }
1632
1632
  return {
1633
1633
  folderName,
1634
- folderUri: storageUri
1634
+ folderUri: storageUri,
1635
1635
  };
1636
- }
1636
+ },
1637
1637
  };
1638
1638
 
1639
1639
  // Copyright (c) Microsoft Corporation.
@@ -1669,14 +1669,14 @@ class KeyVaultAccessControlClient {
1669
1669
  additionalAllowedHeaderNames: [
1670
1670
  "x-ms-keyvault-region",
1671
1671
  "x-ms-keyvault-network-info",
1672
- "x-ms-keyvault-service-version"
1673
- ]
1672
+ "x-ms-keyvault-service-version",
1673
+ ],
1674
1674
  } });
1675
1675
  this.client = new KeyVaultClient(serviceVersion, clientOptions);
1676
1676
  this.client.pipeline.addPolicy(coreRestPipeline.bearerTokenAuthenticationPolicy({
1677
1677
  credential,
1678
1678
  scopes: authenticationScopes,
1679
- challengeCallbacks: createChallengeCallbacks()
1679
+ challengeCallbacks: createChallengeCallbacks(),
1680
1680
  }));
1681
1681
  }
1682
1682
  /**
@@ -1701,8 +1701,8 @@ class KeyVaultAccessControlClient {
1701
1701
  const response = await this.client.roleAssignments.create(this.vaultUrl, roleScope, name, {
1702
1702
  properties: {
1703
1703
  roleDefinitionId,
1704
- principalId
1705
- }
1704
+ principalId,
1705
+ },
1706
1706
  }, updatedOptions);
1707
1707
  return mappings.roleAssignment.generatedToPublic(response);
1708
1708
  });
@@ -1825,7 +1825,7 @@ class KeyVaultAccessControlClient {
1825
1825
  [Symbol.asyncIterator]() {
1826
1826
  return this;
1827
1827
  },
1828
- byPage: (settings = {}) => this.listRoleAssignmentsPage(roleScope, settings, options)
1828
+ byPage: (settings = {}) => this.listRoleAssignmentsPage(roleScope, settings, options),
1829
1829
  };
1830
1830
  }
1831
1831
  /**
@@ -1902,7 +1902,7 @@ class KeyVaultAccessControlClient {
1902
1902
  [Symbol.asyncIterator]() {
1903
1903
  return this;
1904
1904
  },
1905
- byPage: (settings = {}) => this.listRoleDefinitionsPage(roleScope, settings, options)
1905
+ byPage: (settings = {}) => this.listRoleDefinitionsPage(roleScope, settings, options),
1906
1906
  };
1907
1907
  }
1908
1908
  /**
@@ -1949,8 +1949,8 @@ class KeyVaultAccessControlClient {
1949
1949
  permissions: options.permissions,
1950
1950
  assignableScopes: [roleScope],
1951
1951
  roleName: options.roleName,
1952
- roleType: "CustomRole"
1953
- }
1952
+ roleType: "CustomRole",
1953
+ },
1954
1954
  }, updatedOptions);
1955
1955
  return mappings.roleDefinition.generatedToPublic(response);
1956
1956
  });
@@ -2093,7 +2093,7 @@ function cleanState(state) {
2093
2093
  isCancelled: state.isCancelled,
2094
2094
  isCompleted: state.isCompleted,
2095
2095
  error: state.error,
2096
- result: state.result
2096
+ result: state.result,
2097
2097
  };
2098
2098
  }
2099
2099
  /**
@@ -2145,7 +2145,7 @@ class KeyVaultAdminPollOperation {
2145
2145
  */
2146
2146
  toString() {
2147
2147
  return JSON.stringify({
2148
- state: cleanState(this.state)
2148
+ state: cleanState(this.state),
2149
2149
  });
2150
2150
  }
2151
2151
  }
@@ -2190,7 +2190,7 @@ class KeyVaultBackupPollOperation extends KeyVaultAdminPollOperation {
2190
2190
  if (!state.isStarted) {
2191
2191
  const serviceOperation = await this.fullBackup(Object.assign(Object.assign({}, this.requestOptions), { azureStorageBlobContainerUri: {
2192
2192
  storageResourceUri: blobStorageUri,
2193
- token: sasToken
2193
+ token: sasToken,
2194
2194
  } }));
2195
2195
  this.mapState(serviceOperation);
2196
2196
  }
@@ -2205,7 +2205,7 @@ class KeyVaultBackupPollOperation extends KeyVaultAdminPollOperation {
2205
2205
  }
2206
2206
  mapState(serviceOperation) {
2207
2207
  const state = this.state;
2208
- const { startTime, jobId, azureStorageBlobContainerUri, endTime, error, status, statusDetails } = serviceOperation;
2208
+ const { startTime, jobId, azureStorageBlobContainerUri, endTime, error, status, statusDetails, } = serviceOperation;
2209
2209
  if (!startTime) {
2210
2210
  throw new Error(`Missing "startTime" from the full backup operation. Full backup did not start successfully.`);
2211
2211
  }
@@ -2223,7 +2223,7 @@ class KeyVaultBackupPollOperation extends KeyVaultAdminPollOperation {
2223
2223
  state.result = {
2224
2224
  folderUri: azureStorageBlobContainerUri,
2225
2225
  startTime,
2226
- endTime
2226
+ endTime,
2227
2227
  };
2228
2228
  }
2229
2229
  }
@@ -2235,7 +2235,7 @@ class KeyVaultBackupPollOperation extends KeyVaultAdminPollOperation {
2235
2235
  */
2236
2236
  class KeyVaultBackupPoller extends KeyVaultAdminPoller {
2237
2237
  constructor(options) {
2238
- const { client, vaultUrl, blobStorageUri, sasToken, requestOptions, intervalInMs = 2000, resumeFrom } = options;
2238
+ const { client, vaultUrl, blobStorageUri, sasToken, requestOptions, intervalInMs = 2000, resumeFrom, } = options;
2239
2239
  let state;
2240
2240
  if (resumeFrom) {
2241
2241
  state = JSON.parse(resumeFrom).state;
@@ -2258,7 +2258,7 @@ const withTrace$2 = createTraceFunction("Azure.KeyVault.Admin.KeyVaultRestorePol
2258
2258
  class KeyVaultRestorePollOperation extends KeyVaultAdminPollOperation {
2259
2259
  constructor(state, vaultUrl, client, requestOptions = {}) {
2260
2260
  super(state, {
2261
- cancelMessage: "Cancelling the restoration full Key Vault backup is not supported."
2261
+ cancelMessage: "Cancelling the restoration full Key Vault backup is not supported.",
2262
2262
  });
2263
2263
  this.state = state;
2264
2264
  this.vaultUrl = vaultUrl;
@@ -2291,8 +2291,8 @@ class KeyVaultRestorePollOperation extends KeyVaultAdminPollOperation {
2291
2291
  folderToRestore: folderName,
2292
2292
  sasTokenParameters: {
2293
2293
  storageResourceUri: folderUri,
2294
- token: sasToken
2295
- }
2294
+ token: sasToken,
2295
+ },
2296
2296
  } }));
2297
2297
  this.mapState(serviceOperation);
2298
2298
  }
@@ -2324,7 +2324,7 @@ class KeyVaultRestorePollOperation extends KeyVaultAdminPollOperation {
2324
2324
  if (state.isCompleted) {
2325
2325
  state.result = {
2326
2326
  startTime,
2327
- endTime
2327
+ endTime,
2328
2328
  };
2329
2329
  }
2330
2330
  }
@@ -2336,7 +2336,7 @@ class KeyVaultRestorePollOperation extends KeyVaultAdminPollOperation {
2336
2336
  */
2337
2337
  class KeyVaultRestorePoller extends KeyVaultAdminPoller {
2338
2338
  constructor(options) {
2339
- const { client, vaultUrl, folderUri, sasToken, folderName, requestOptions, intervalInMs = 2000, resumeFrom } = options;
2339
+ const { client, vaultUrl, folderUri, sasToken, folderName, requestOptions, intervalInMs = 2000, resumeFrom, } = options;
2340
2340
  let state;
2341
2341
  if (resumeFrom) {
2342
2342
  state = JSON.parse(resumeFrom).state;
@@ -2391,8 +2391,8 @@ class KeyVaultSelectiveKeyRestorePollOperation extends KeyVaultAdminPollOperatio
2391
2391
  folder: folderName,
2392
2392
  sasTokenParameters: {
2393
2393
  storageResourceUri: folderUri,
2394
- token: sasToken
2395
- }
2394
+ token: sasToken,
2395
+ },
2396
2396
  } }));
2397
2397
  this.mapState(selectiveRestoreOperation);
2398
2398
  }
@@ -2424,7 +2424,7 @@ class KeyVaultSelectiveKeyRestorePollOperation extends KeyVaultAdminPollOperatio
2424
2424
  if (state.isCompleted) {
2425
2425
  state.result = {
2426
2426
  startTime,
2427
- endTime
2427
+ endTime,
2428
2428
  };
2429
2429
  }
2430
2430
  }
@@ -2436,7 +2436,7 @@ class KeyVaultSelectiveKeyRestorePollOperation extends KeyVaultAdminPollOperatio
2436
2436
  */
2437
2437
  class KeyVaultSelectiveKeyRestorePoller extends KeyVaultAdminPoller {
2438
2438
  constructor(options) {
2439
- const { client, vaultUrl, keyName, folderUri, sasToken, folderName, requestOptions, intervalInMs = 2000, resumeFrom } = options;
2439
+ const { client, vaultUrl, keyName, folderUri, sasToken, folderName, requestOptions, intervalInMs = 2000, resumeFrom, } = options;
2440
2440
  let state;
2441
2441
  if (resumeFrom) {
2442
2442
  state = JSON.parse(resumeFrom).state;
@@ -2481,14 +2481,14 @@ class KeyVaultBackupClient {
2481
2481
  additionalAllowedHeaderNames: [
2482
2482
  "x-ms-keyvault-region",
2483
2483
  "x-ms-keyvault-network-info",
2484
- "x-ms-keyvault-service-version"
2485
- ]
2484
+ "x-ms-keyvault-service-version",
2485
+ ],
2486
2486
  } });
2487
2487
  this.client = new KeyVaultClient(apiVersion, clientOptions);
2488
2488
  this.client.pipeline.addPolicy(coreRestPipeline.bearerTokenAuthenticationPolicy({
2489
2489
  credential,
2490
2490
  scopes: authenticationScopes,
2491
- challengeCallbacks: createChallengeCallbacks()
2491
+ challengeCallbacks: createChallengeCallbacks(),
2492
2492
  }));
2493
2493
  }
2494
2494
  /**
@@ -2530,7 +2530,7 @@ class KeyVaultBackupClient {
2530
2530
  vaultUrl: this.vaultUrl,
2531
2531
  intervalInMs: options.intervalInMs,
2532
2532
  resumeFrom: options.resumeFrom,
2533
- requestOptions: options
2533
+ requestOptions: options,
2534
2534
  });
2535
2535
  // This will initialize the poller's operation (the generation of the backup).
2536
2536
  await poller.poll();