@azure/keyvault-admin 4.2.0-alpha.20211221.3 → 4.2.0-alpha.20220105.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.js +44 -44
- package/dist/index.js.map +1 -1
- package/dist-esm/keyvault-admin/src/accessControlClient.js +9 -9
- package/dist-esm/keyvault-admin/src/accessControlClient.js.map +1 -1
- package/dist-esm/keyvault-admin/src/accessControlModels.js +1 -1
- package/dist-esm/keyvault-admin/src/accessControlModels.js.map +1 -1
- package/dist-esm/keyvault-admin/src/backupClient.js +4 -4
- package/dist-esm/keyvault-admin/src/backupClient.js.map +1 -1
- package/dist-esm/keyvault-admin/src/challengeAuthenticationCallbacks.js +5 -5
- package/dist-esm/keyvault-admin/src/challengeAuthenticationCallbacks.js.map +1 -1
- package/dist-esm/keyvault-admin/src/lro/backup/operation.js +4 -4
- package/dist-esm/keyvault-admin/src/lro/backup/operation.js.map +1 -1
- package/dist-esm/keyvault-admin/src/lro/backup/poller.js +2 -2
- package/dist-esm/keyvault-admin/src/lro/backup/poller.js.map +1 -1
- package/dist-esm/keyvault-admin/src/lro/keyVaultAdminPoller.js +2 -2
- package/dist-esm/keyvault-admin/src/lro/keyVaultAdminPoller.js.map +1 -1
- package/dist-esm/keyvault-admin/src/lro/restore/operation.js +5 -5
- package/dist-esm/keyvault-admin/src/lro/restore/operation.js.map +1 -1
- package/dist-esm/keyvault-admin/src/lro/restore/poller.js +2 -2
- package/dist-esm/keyvault-admin/src/lro/restore/poller.js.map +1 -1
- package/dist-esm/keyvault-admin/src/lro/selectiveKeyRestore/operation.js +4 -4
- package/dist-esm/keyvault-admin/src/lro/selectiveKeyRestore/operation.js.map +1 -1
- package/dist-esm/keyvault-admin/src/lro/selectiveKeyRestore/poller.js +2 -2
- package/dist-esm/keyvault-admin/src/lro/selectiveKeyRestore/poller.js.map +1 -1
- package/dist-esm/keyvault-admin/src/mappings.js +7 -7
- package/dist-esm/keyvault-admin/src/mappings.js.map +1 -1
- package/dist-esm/keyvault-admin/src/tracingHelpers.js +3 -3
- package/dist-esm/keyvault-admin/src/tracingHelpers.js.map +1 -1
- package/dist-esm/keyvault-common/src/challengeBasedAuthenticationPolicy.js +3 -3
- package/dist-esm/keyvault-common/src/challengeBasedAuthenticationPolicy.js.map +1 -1
- package/dist-esm/keyvault-common/src/parseKeyvaultIdentifier.js +1 -1
- package/dist-esm/keyvault-common/src/parseKeyvaultIdentifier.js.map +1 -1
- package/dist-esm/keyvault-common/src/parseWWWAuthenticate.js +1 -1
- package/dist-esm/keyvault-common/src/parseWWWAuthenticate.js.map +1 -1
- package/dist-esm/keyvault-common/src/tracingHelpers.js +3 -3
- package/dist-esm/keyvault-common/src/tracingHelpers.js.map +1 -1
- package/package.json +2 -2
package/dist/index.js
CHANGED
|
@@ -1423,7 +1423,7 @@ const validParsedWWWAuthenticateProperties = [
|
|
|
1423
1423
|
"authorization_url",
|
|
1424
1424
|
"resource",
|
|
1425
1425
|
"scope",
|
|
1426
|
-
"tenantId"
|
|
1426
|
+
"tenantId",
|
|
1427
1427
|
];
|
|
1428
1428
|
/**
|
|
1429
1429
|
* Parses an WWW-Authenticate response.
|
|
@@ -1484,9 +1484,9 @@ function createChallengeCallbacks() {
|
|
|
1484
1484
|
return {
|
|
1485
1485
|
abortSignal: request.abortSignal,
|
|
1486
1486
|
requestOptions: {
|
|
1487
|
-
timeout: request.timeout
|
|
1487
|
+
timeout: request.timeout,
|
|
1488
1488
|
},
|
|
1489
|
-
tracingOptions: request.tracingOptions
|
|
1489
|
+
tracingOptions: request.tracingOptions,
|
|
1490
1490
|
};
|
|
1491
1491
|
}
|
|
1492
1492
|
async function authorizeRequest(options) {
|
|
@@ -1496,7 +1496,7 @@ function createChallengeCallbacks() {
|
|
|
1496
1496
|
case "none":
|
|
1497
1497
|
challengeState = {
|
|
1498
1498
|
status: "started",
|
|
1499
|
-
originalBody: request.body
|
|
1499
|
+
originalBody: request.body,
|
|
1500
1500
|
};
|
|
1501
1501
|
request.body = null;
|
|
1502
1502
|
break;
|
|
@@ -1532,13 +1532,13 @@ function createChallengeCallbacks() {
|
|
|
1532
1532
|
}
|
|
1533
1533
|
options.request.headers.set("Authorization", `Bearer ${accessToken.token}`);
|
|
1534
1534
|
challengeState = {
|
|
1535
|
-
status: "complete"
|
|
1535
|
+
status: "complete",
|
|
1536
1536
|
};
|
|
1537
1537
|
return true;
|
|
1538
1538
|
}
|
|
1539
1539
|
return {
|
|
1540
1540
|
authorizeRequest,
|
|
1541
|
-
authorizeRequestOnChallenge
|
|
1541
|
+
authorizeRequestOnChallenge,
|
|
1542
1542
|
};
|
|
1543
1543
|
}
|
|
1544
1544
|
|
|
@@ -1555,7 +1555,7 @@ function createChallengeCallbacks() {
|
|
|
1555
1555
|
function createTraceFunction(prefix) {
|
|
1556
1556
|
const createSpan = coreTracing.createSpanFunction({
|
|
1557
1557
|
namespace: "Microsoft.KeyVault",
|
|
1558
|
-
packagePrefix: prefix
|
|
1558
|
+
packagePrefix: prefix,
|
|
1559
1559
|
});
|
|
1560
1560
|
return async function (operationName, options, cb) {
|
|
1561
1561
|
const { updatedOptions, span } = createSpan(operationName, options);
|
|
@@ -1565,14 +1565,14 @@ function createTraceFunction(prefix) {
|
|
|
1565
1565
|
const result = await cb(updatedOptions, span);
|
|
1566
1566
|
// otel 0.16+ needs this or else the code ends up being set as UNSET
|
|
1567
1567
|
span.setStatus({
|
|
1568
|
-
code: coreTracing.SpanStatusCode.OK
|
|
1568
|
+
code: coreTracing.SpanStatusCode.OK,
|
|
1569
1569
|
});
|
|
1570
1570
|
return result;
|
|
1571
1571
|
}
|
|
1572
1572
|
catch (err) {
|
|
1573
1573
|
span.setStatus({
|
|
1574
1574
|
code: coreTracing.SpanStatusCode.ERROR,
|
|
1575
|
-
message: err.message
|
|
1575
|
+
message: err.message,
|
|
1576
1576
|
});
|
|
1577
1577
|
throw err;
|
|
1578
1578
|
}
|
|
@@ -1602,10 +1602,10 @@ const mappings = {
|
|
|
1602
1602
|
properties: {
|
|
1603
1603
|
scope: scope,
|
|
1604
1604
|
roleDefinitionId: roleDefinitionId,
|
|
1605
|
-
principalId: principalId
|
|
1606
|
-
}
|
|
1605
|
+
principalId: principalId,
|
|
1606
|
+
},
|
|
1607
1607
|
};
|
|
1608
|
-
}
|
|
1608
|
+
},
|
|
1609
1609
|
},
|
|
1610
1610
|
roleDefinition: {
|
|
1611
1611
|
generatedToPublic(roleDefinition) {
|
|
@@ -1618,9 +1618,9 @@ const mappings = {
|
|
|
1618
1618
|
description: description,
|
|
1619
1619
|
roleType: roleType,
|
|
1620
1620
|
permissions: permissions,
|
|
1621
|
-
assignableScopes: assignableScopes
|
|
1621
|
+
assignableScopes: assignableScopes,
|
|
1622
1622
|
};
|
|
1623
|
-
}
|
|
1623
|
+
},
|
|
1624
1624
|
},
|
|
1625
1625
|
folderUriParts(folderUri) {
|
|
1626
1626
|
const uriParts = folderUri.split("/");
|
|
@@ -1631,9 +1631,9 @@ const mappings = {
|
|
|
1631
1631
|
}
|
|
1632
1632
|
return {
|
|
1633
1633
|
folderName,
|
|
1634
|
-
folderUri: storageUri
|
|
1634
|
+
folderUri: storageUri,
|
|
1635
1635
|
};
|
|
1636
|
-
}
|
|
1636
|
+
},
|
|
1637
1637
|
};
|
|
1638
1638
|
|
|
1639
1639
|
// Copyright (c) Microsoft Corporation.
|
|
@@ -1669,14 +1669,14 @@ class KeyVaultAccessControlClient {
|
|
|
1669
1669
|
additionalAllowedHeaderNames: [
|
|
1670
1670
|
"x-ms-keyvault-region",
|
|
1671
1671
|
"x-ms-keyvault-network-info",
|
|
1672
|
-
"x-ms-keyvault-service-version"
|
|
1673
|
-
]
|
|
1672
|
+
"x-ms-keyvault-service-version",
|
|
1673
|
+
],
|
|
1674
1674
|
} });
|
|
1675
1675
|
this.client = new KeyVaultClient(serviceVersion, clientOptions);
|
|
1676
1676
|
this.client.pipeline.addPolicy(coreRestPipeline.bearerTokenAuthenticationPolicy({
|
|
1677
1677
|
credential,
|
|
1678
1678
|
scopes: authenticationScopes,
|
|
1679
|
-
challengeCallbacks: createChallengeCallbacks()
|
|
1679
|
+
challengeCallbacks: createChallengeCallbacks(),
|
|
1680
1680
|
}));
|
|
1681
1681
|
}
|
|
1682
1682
|
/**
|
|
@@ -1701,8 +1701,8 @@ class KeyVaultAccessControlClient {
|
|
|
1701
1701
|
const response = await this.client.roleAssignments.create(this.vaultUrl, roleScope, name, {
|
|
1702
1702
|
properties: {
|
|
1703
1703
|
roleDefinitionId,
|
|
1704
|
-
principalId
|
|
1705
|
-
}
|
|
1704
|
+
principalId,
|
|
1705
|
+
},
|
|
1706
1706
|
}, updatedOptions);
|
|
1707
1707
|
return mappings.roleAssignment.generatedToPublic(response);
|
|
1708
1708
|
});
|
|
@@ -1825,7 +1825,7 @@ class KeyVaultAccessControlClient {
|
|
|
1825
1825
|
[Symbol.asyncIterator]() {
|
|
1826
1826
|
return this;
|
|
1827
1827
|
},
|
|
1828
|
-
byPage: (settings = {}) => this.listRoleAssignmentsPage(roleScope, settings, options)
|
|
1828
|
+
byPage: (settings = {}) => this.listRoleAssignmentsPage(roleScope, settings, options),
|
|
1829
1829
|
};
|
|
1830
1830
|
}
|
|
1831
1831
|
/**
|
|
@@ -1902,7 +1902,7 @@ class KeyVaultAccessControlClient {
|
|
|
1902
1902
|
[Symbol.asyncIterator]() {
|
|
1903
1903
|
return this;
|
|
1904
1904
|
},
|
|
1905
|
-
byPage: (settings = {}) => this.listRoleDefinitionsPage(roleScope, settings, options)
|
|
1905
|
+
byPage: (settings = {}) => this.listRoleDefinitionsPage(roleScope, settings, options),
|
|
1906
1906
|
};
|
|
1907
1907
|
}
|
|
1908
1908
|
/**
|
|
@@ -1949,8 +1949,8 @@ class KeyVaultAccessControlClient {
|
|
|
1949
1949
|
permissions: options.permissions,
|
|
1950
1950
|
assignableScopes: [roleScope],
|
|
1951
1951
|
roleName: options.roleName,
|
|
1952
|
-
roleType: "CustomRole"
|
|
1953
|
-
}
|
|
1952
|
+
roleType: "CustomRole",
|
|
1953
|
+
},
|
|
1954
1954
|
}, updatedOptions);
|
|
1955
1955
|
return mappings.roleDefinition.generatedToPublic(response);
|
|
1956
1956
|
});
|
|
@@ -2093,7 +2093,7 @@ function cleanState(state) {
|
|
|
2093
2093
|
isCancelled: state.isCancelled,
|
|
2094
2094
|
isCompleted: state.isCompleted,
|
|
2095
2095
|
error: state.error,
|
|
2096
|
-
result: state.result
|
|
2096
|
+
result: state.result,
|
|
2097
2097
|
};
|
|
2098
2098
|
}
|
|
2099
2099
|
/**
|
|
@@ -2145,7 +2145,7 @@ class KeyVaultAdminPollOperation {
|
|
|
2145
2145
|
*/
|
|
2146
2146
|
toString() {
|
|
2147
2147
|
return JSON.stringify({
|
|
2148
|
-
state: cleanState(this.state)
|
|
2148
|
+
state: cleanState(this.state),
|
|
2149
2149
|
});
|
|
2150
2150
|
}
|
|
2151
2151
|
}
|
|
@@ -2190,7 +2190,7 @@ class KeyVaultBackupPollOperation extends KeyVaultAdminPollOperation {
|
|
|
2190
2190
|
if (!state.isStarted) {
|
|
2191
2191
|
const serviceOperation = await this.fullBackup(Object.assign(Object.assign({}, this.requestOptions), { azureStorageBlobContainerUri: {
|
|
2192
2192
|
storageResourceUri: blobStorageUri,
|
|
2193
|
-
token: sasToken
|
|
2193
|
+
token: sasToken,
|
|
2194
2194
|
} }));
|
|
2195
2195
|
this.mapState(serviceOperation);
|
|
2196
2196
|
}
|
|
@@ -2205,7 +2205,7 @@ class KeyVaultBackupPollOperation extends KeyVaultAdminPollOperation {
|
|
|
2205
2205
|
}
|
|
2206
2206
|
mapState(serviceOperation) {
|
|
2207
2207
|
const state = this.state;
|
|
2208
|
-
const { startTime, jobId, azureStorageBlobContainerUri, endTime, error, status, statusDetails } = serviceOperation;
|
|
2208
|
+
const { startTime, jobId, azureStorageBlobContainerUri, endTime, error, status, statusDetails, } = serviceOperation;
|
|
2209
2209
|
if (!startTime) {
|
|
2210
2210
|
throw new Error(`Missing "startTime" from the full backup operation. Full backup did not start successfully.`);
|
|
2211
2211
|
}
|
|
@@ -2223,7 +2223,7 @@ class KeyVaultBackupPollOperation extends KeyVaultAdminPollOperation {
|
|
|
2223
2223
|
state.result = {
|
|
2224
2224
|
folderUri: azureStorageBlobContainerUri,
|
|
2225
2225
|
startTime,
|
|
2226
|
-
endTime
|
|
2226
|
+
endTime,
|
|
2227
2227
|
};
|
|
2228
2228
|
}
|
|
2229
2229
|
}
|
|
@@ -2235,7 +2235,7 @@ class KeyVaultBackupPollOperation extends KeyVaultAdminPollOperation {
|
|
|
2235
2235
|
*/
|
|
2236
2236
|
class KeyVaultBackupPoller extends KeyVaultAdminPoller {
|
|
2237
2237
|
constructor(options) {
|
|
2238
|
-
const { client, vaultUrl, blobStorageUri, sasToken, requestOptions, intervalInMs = 2000, resumeFrom } = options;
|
|
2238
|
+
const { client, vaultUrl, blobStorageUri, sasToken, requestOptions, intervalInMs = 2000, resumeFrom, } = options;
|
|
2239
2239
|
let state;
|
|
2240
2240
|
if (resumeFrom) {
|
|
2241
2241
|
state = JSON.parse(resumeFrom).state;
|
|
@@ -2258,7 +2258,7 @@ const withTrace$2 = createTraceFunction("Azure.KeyVault.Admin.KeyVaultRestorePol
|
|
|
2258
2258
|
class KeyVaultRestorePollOperation extends KeyVaultAdminPollOperation {
|
|
2259
2259
|
constructor(state, vaultUrl, client, requestOptions = {}) {
|
|
2260
2260
|
super(state, {
|
|
2261
|
-
cancelMessage: "Cancelling the restoration full Key Vault backup is not supported."
|
|
2261
|
+
cancelMessage: "Cancelling the restoration full Key Vault backup is not supported.",
|
|
2262
2262
|
});
|
|
2263
2263
|
this.state = state;
|
|
2264
2264
|
this.vaultUrl = vaultUrl;
|
|
@@ -2291,8 +2291,8 @@ class KeyVaultRestorePollOperation extends KeyVaultAdminPollOperation {
|
|
|
2291
2291
|
folderToRestore: folderName,
|
|
2292
2292
|
sasTokenParameters: {
|
|
2293
2293
|
storageResourceUri: folderUri,
|
|
2294
|
-
token: sasToken
|
|
2295
|
-
}
|
|
2294
|
+
token: sasToken,
|
|
2295
|
+
},
|
|
2296
2296
|
} }));
|
|
2297
2297
|
this.mapState(serviceOperation);
|
|
2298
2298
|
}
|
|
@@ -2324,7 +2324,7 @@ class KeyVaultRestorePollOperation extends KeyVaultAdminPollOperation {
|
|
|
2324
2324
|
if (state.isCompleted) {
|
|
2325
2325
|
state.result = {
|
|
2326
2326
|
startTime,
|
|
2327
|
-
endTime
|
|
2327
|
+
endTime,
|
|
2328
2328
|
};
|
|
2329
2329
|
}
|
|
2330
2330
|
}
|
|
@@ -2336,7 +2336,7 @@ class KeyVaultRestorePollOperation extends KeyVaultAdminPollOperation {
|
|
|
2336
2336
|
*/
|
|
2337
2337
|
class KeyVaultRestorePoller extends KeyVaultAdminPoller {
|
|
2338
2338
|
constructor(options) {
|
|
2339
|
-
const { client, vaultUrl, folderUri, sasToken, folderName, requestOptions, intervalInMs = 2000, resumeFrom } = options;
|
|
2339
|
+
const { client, vaultUrl, folderUri, sasToken, folderName, requestOptions, intervalInMs = 2000, resumeFrom, } = options;
|
|
2340
2340
|
let state;
|
|
2341
2341
|
if (resumeFrom) {
|
|
2342
2342
|
state = JSON.parse(resumeFrom).state;
|
|
@@ -2391,8 +2391,8 @@ class KeyVaultSelectiveKeyRestorePollOperation extends KeyVaultAdminPollOperatio
|
|
|
2391
2391
|
folder: folderName,
|
|
2392
2392
|
sasTokenParameters: {
|
|
2393
2393
|
storageResourceUri: folderUri,
|
|
2394
|
-
token: sasToken
|
|
2395
|
-
}
|
|
2394
|
+
token: sasToken,
|
|
2395
|
+
},
|
|
2396
2396
|
} }));
|
|
2397
2397
|
this.mapState(selectiveRestoreOperation);
|
|
2398
2398
|
}
|
|
@@ -2424,7 +2424,7 @@ class KeyVaultSelectiveKeyRestorePollOperation extends KeyVaultAdminPollOperatio
|
|
|
2424
2424
|
if (state.isCompleted) {
|
|
2425
2425
|
state.result = {
|
|
2426
2426
|
startTime,
|
|
2427
|
-
endTime
|
|
2427
|
+
endTime,
|
|
2428
2428
|
};
|
|
2429
2429
|
}
|
|
2430
2430
|
}
|
|
@@ -2436,7 +2436,7 @@ class KeyVaultSelectiveKeyRestorePollOperation extends KeyVaultAdminPollOperatio
|
|
|
2436
2436
|
*/
|
|
2437
2437
|
class KeyVaultSelectiveKeyRestorePoller extends KeyVaultAdminPoller {
|
|
2438
2438
|
constructor(options) {
|
|
2439
|
-
const { client, vaultUrl, keyName, folderUri, sasToken, folderName, requestOptions, intervalInMs = 2000, resumeFrom } = options;
|
|
2439
|
+
const { client, vaultUrl, keyName, folderUri, sasToken, folderName, requestOptions, intervalInMs = 2000, resumeFrom, } = options;
|
|
2440
2440
|
let state;
|
|
2441
2441
|
if (resumeFrom) {
|
|
2442
2442
|
state = JSON.parse(resumeFrom).state;
|
|
@@ -2481,14 +2481,14 @@ class KeyVaultBackupClient {
|
|
|
2481
2481
|
additionalAllowedHeaderNames: [
|
|
2482
2482
|
"x-ms-keyvault-region",
|
|
2483
2483
|
"x-ms-keyvault-network-info",
|
|
2484
|
-
"x-ms-keyvault-service-version"
|
|
2485
|
-
]
|
|
2484
|
+
"x-ms-keyvault-service-version",
|
|
2485
|
+
],
|
|
2486
2486
|
} });
|
|
2487
2487
|
this.client = new KeyVaultClient(apiVersion, clientOptions);
|
|
2488
2488
|
this.client.pipeline.addPolicy(coreRestPipeline.bearerTokenAuthenticationPolicy({
|
|
2489
2489
|
credential,
|
|
2490
2490
|
scopes: authenticationScopes,
|
|
2491
|
-
challengeCallbacks: createChallengeCallbacks()
|
|
2491
|
+
challengeCallbacks: createChallengeCallbacks(),
|
|
2492
2492
|
}));
|
|
2493
2493
|
}
|
|
2494
2494
|
/**
|
|
@@ -2530,7 +2530,7 @@ class KeyVaultBackupClient {
|
|
|
2530
2530
|
vaultUrl: this.vaultUrl,
|
|
2531
2531
|
intervalInMs: options.intervalInMs,
|
|
2532
2532
|
resumeFrom: options.resumeFrom,
|
|
2533
|
-
requestOptions: options
|
|
2533
|
+
requestOptions: options,
|
|
2534
2534
|
});
|
|
2535
2535
|
// This will initialize the poller's operation (the generation of the backup).
|
|
2536
2536
|
await poller.poll();
|