@azure/keyvault-admin 4.2.0-alpha.20220105.2 → 4.2.0-alpha.20220302.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +3 -0
- package/dist/index.js +66 -44
- package/dist/index.js.map +1 -1
- package/package.json +6 -10
package/README.md
CHANGED
|
@@ -9,6 +9,7 @@ The package `@azure/keyvault-admin` provides support for administrative Key Vaul
|
|
|
9
9
|
> Note: This package cannot be used in the browser due to Azure Key Vault service limitations, please refer to [this document](https://github.com/Azure/azure-sdk-for-js/blob/main/samples/cors/ts/README.md) for guidance.
|
|
10
10
|
|
|
11
11
|
Key links:
|
|
12
|
+
|
|
12
13
|
- [Source code][package-gh]
|
|
13
14
|
- [Package (npm)][package-npm]
|
|
14
15
|
- [API Reference Documentation][docs]
|
|
@@ -220,6 +221,8 @@ We have samples both in JavaScript and TypeScript that show the access control a
|
|
|
220
221
|
|
|
221
222
|
## Troubleshooting
|
|
222
223
|
|
|
224
|
+
See our [troubleshooting guide](https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/keyvault/keyvault-admin/TROUBLESHOOTING.md) for details on how to diagnose various failure scenarios.
|
|
225
|
+
|
|
223
226
|
Enabling logging may help uncover useful information about failures. In order to see a log of HTTP requests and responses, set the `AZURE_LOG_LEVEL` environment variable to `info`. Alternatively, logging can be enabled at runtime by calling `setLogLevel` in the `@azure/logger`:
|
|
224
227
|
|
|
225
228
|
```javascript
|
package/dist/index.js
CHANGED
|
@@ -5,13 +5,31 @@ Object.defineProperty(exports, '__esModule', { value: true });
|
|
|
5
5
|
var tslib = require('tslib');
|
|
6
6
|
var coreClient = require('@azure/core-client');
|
|
7
7
|
var coreRestPipeline = require('@azure/core-rest-pipeline');
|
|
8
|
-
require('@azure/core-http');
|
|
9
|
-
require('url');
|
|
10
8
|
var coreTracing = require('@azure/core-tracing');
|
|
11
9
|
var logger$1 = require('@azure/logger');
|
|
12
10
|
var uuid = require('uuid');
|
|
13
11
|
var coreLro = require('@azure/core-lro');
|
|
14
12
|
|
|
13
|
+
function _interopNamespace(e) {
|
|
14
|
+
if (e && e.__esModule) return e;
|
|
15
|
+
var n = Object.create(null);
|
|
16
|
+
if (e) {
|
|
17
|
+
Object.keys(e).forEach(function (k) {
|
|
18
|
+
if (k !== 'default') {
|
|
19
|
+
var d = Object.getOwnPropertyDescriptor(e, k);
|
|
20
|
+
Object.defineProperty(n, k, d.get ? d : {
|
|
21
|
+
enumerable: true,
|
|
22
|
+
get: function () { return e[k]; }
|
|
23
|
+
});
|
|
24
|
+
}
|
|
25
|
+
});
|
|
26
|
+
}
|
|
27
|
+
n["default"] = e;
|
|
28
|
+
return Object.freeze(n);
|
|
29
|
+
}
|
|
30
|
+
|
|
31
|
+
var coreClient__namespace = /*#__PURE__*/_interopNamespace(coreClient);
|
|
32
|
+
|
|
15
33
|
// Copyright (c) Microsoft Corporation.
|
|
16
34
|
// Licensed under the MIT license.
|
|
17
35
|
/**
|
|
@@ -907,7 +925,7 @@ class RoleDefinitionsImpl {
|
|
|
907
925
|
* @param options The options parameters.
|
|
908
926
|
*/
|
|
909
927
|
delete(vaultBaseUrl, scope, roleDefinitionName, options) {
|
|
910
|
-
return this.client.sendOperationRequest({ vaultBaseUrl, scope, roleDefinitionName, options }, deleteOperationSpec);
|
|
928
|
+
return this.client.sendOperationRequest({ vaultBaseUrl, scope, roleDefinitionName, options }, deleteOperationSpec$1);
|
|
911
929
|
}
|
|
912
930
|
/**
|
|
913
931
|
* Creates or updates a custom role definition.
|
|
@@ -929,7 +947,7 @@ class RoleDefinitionsImpl {
|
|
|
929
947
|
* @param options The options parameters.
|
|
930
948
|
*/
|
|
931
949
|
get(vaultBaseUrl, scope, roleDefinitionName, options) {
|
|
932
|
-
return this.client.sendOperationRequest({ vaultBaseUrl, scope, roleDefinitionName, options }, getOperationSpec);
|
|
950
|
+
return this.client.sendOperationRequest({ vaultBaseUrl, scope, roleDefinitionName, options }, getOperationSpec$1);
|
|
933
951
|
}
|
|
934
952
|
/**
|
|
935
953
|
* Get all role definitions that are applicable at scope and above.
|
|
@@ -952,8 +970,8 @@ class RoleDefinitionsImpl {
|
|
|
952
970
|
}
|
|
953
971
|
}
|
|
954
972
|
// Operation Specifications
|
|
955
|
-
const serializer =
|
|
956
|
-
const deleteOperationSpec = {
|
|
973
|
+
const serializer$2 = coreClient__namespace.createSerializer(Mappers, /* isXml */ false);
|
|
974
|
+
const deleteOperationSpec$1 = {
|
|
957
975
|
path: "/{scope}/providers/Microsoft.Authorization/roleDefinitions/{roleDefinitionName}",
|
|
958
976
|
httpMethod: "DELETE",
|
|
959
977
|
responses: {
|
|
@@ -970,7 +988,7 @@ const deleteOperationSpec = {
|
|
|
970
988
|
roleDefinitionName
|
|
971
989
|
],
|
|
972
990
|
headerParameters: [accept],
|
|
973
|
-
serializer
|
|
991
|
+
serializer: serializer$2
|
|
974
992
|
};
|
|
975
993
|
const createOrUpdateOperationSpec = {
|
|
976
994
|
path: "/{scope}/providers/Microsoft.Authorization/roleDefinitions/{roleDefinitionName}",
|
|
@@ -992,9 +1010,9 @@ const createOrUpdateOperationSpec = {
|
|
|
992
1010
|
],
|
|
993
1011
|
headerParameters: [accept, contentType],
|
|
994
1012
|
mediaType: "json",
|
|
995
|
-
serializer
|
|
1013
|
+
serializer: serializer$2
|
|
996
1014
|
};
|
|
997
|
-
const getOperationSpec = {
|
|
1015
|
+
const getOperationSpec$1 = {
|
|
998
1016
|
path: "/{scope}/providers/Microsoft.Authorization/roleDefinitions/{roleDefinitionName}",
|
|
999
1017
|
httpMethod: "GET",
|
|
1000
1018
|
responses: {
|
|
@@ -1012,7 +1030,7 @@ const getOperationSpec = {
|
|
|
1012
1030
|
roleDefinitionName
|
|
1013
1031
|
],
|
|
1014
1032
|
headerParameters: [accept],
|
|
1015
|
-
serializer
|
|
1033
|
+
serializer: serializer$2
|
|
1016
1034
|
};
|
|
1017
1035
|
const listOperationSpec = {
|
|
1018
1036
|
path: "/{scope}/providers/Microsoft.Authorization/roleDefinitions",
|
|
@@ -1028,7 +1046,7 @@ const listOperationSpec = {
|
|
|
1028
1046
|
queryParameters: [apiVersion, filter],
|
|
1029
1047
|
urlParameters: [vaultBaseUrl, scope],
|
|
1030
1048
|
headerParameters: [accept],
|
|
1031
|
-
serializer
|
|
1049
|
+
serializer: serializer$2
|
|
1032
1050
|
};
|
|
1033
1051
|
const listNextOperationSpec = {
|
|
1034
1052
|
path: "{nextLink}",
|
|
@@ -1048,7 +1066,7 @@ const listNextOperationSpec = {
|
|
|
1048
1066
|
nextLink
|
|
1049
1067
|
],
|
|
1050
1068
|
headerParameters: [accept],
|
|
1051
|
-
serializer
|
|
1069
|
+
serializer: serializer$2
|
|
1052
1070
|
};
|
|
1053
1071
|
|
|
1054
1072
|
/*
|
|
@@ -1075,7 +1093,7 @@ class RoleAssignmentsImpl {
|
|
|
1075
1093
|
* @param options The options parameters.
|
|
1076
1094
|
*/
|
|
1077
1095
|
delete(vaultBaseUrl, scope, roleAssignmentName, options) {
|
|
1078
|
-
return this.client.sendOperationRequest({ vaultBaseUrl, scope, roleAssignmentName, options }, deleteOperationSpec
|
|
1096
|
+
return this.client.sendOperationRequest({ vaultBaseUrl, scope, roleAssignmentName, options }, deleteOperationSpec);
|
|
1079
1097
|
}
|
|
1080
1098
|
/**
|
|
1081
1099
|
* Creates a role assignment.
|
|
@@ -1096,7 +1114,7 @@ class RoleAssignmentsImpl {
|
|
|
1096
1114
|
* @param options The options parameters.
|
|
1097
1115
|
*/
|
|
1098
1116
|
get(vaultBaseUrl, scope, roleAssignmentName, options) {
|
|
1099
|
-
return this.client.sendOperationRequest({ vaultBaseUrl, scope, roleAssignmentName, options }, getOperationSpec
|
|
1117
|
+
return this.client.sendOperationRequest({ vaultBaseUrl, scope, roleAssignmentName, options }, getOperationSpec);
|
|
1100
1118
|
}
|
|
1101
1119
|
/**
|
|
1102
1120
|
* Gets role assignments for a scope.
|
|
@@ -1119,8 +1137,8 @@ class RoleAssignmentsImpl {
|
|
|
1119
1137
|
}
|
|
1120
1138
|
}
|
|
1121
1139
|
// Operation Specifications
|
|
1122
|
-
const serializer$1 =
|
|
1123
|
-
const deleteOperationSpec
|
|
1140
|
+
const serializer$1 = coreClient__namespace.createSerializer(Mappers, /* isXml */ false);
|
|
1141
|
+
const deleteOperationSpec = {
|
|
1124
1142
|
path: "/{scope}/providers/Microsoft.Authorization/roleAssignments/{roleAssignmentName}",
|
|
1125
1143
|
httpMethod: "DELETE",
|
|
1126
1144
|
responses: {
|
|
@@ -1161,7 +1179,7 @@ const createOperationSpec = {
|
|
|
1161
1179
|
mediaType: "json",
|
|
1162
1180
|
serializer: serializer$1
|
|
1163
1181
|
};
|
|
1164
|
-
const getOperationSpec
|
|
1182
|
+
const getOperationSpec = {
|
|
1165
1183
|
path: "/{scope}/providers/Microsoft.Authorization/roleAssignments/{roleAssignmentName}",
|
|
1166
1184
|
httpMethod: "GET",
|
|
1167
1185
|
responses: {
|
|
@@ -1225,7 +1243,7 @@ const listForScopeNextOperationSpec = {
|
|
|
1225
1243
|
* Code generated by Microsoft (R) AutoRest Code Generator.
|
|
1226
1244
|
* Changes may cause incorrect behavior and will be lost if the code is regenerated.
|
|
1227
1245
|
*/
|
|
1228
|
-
class KeyVaultClientContext extends
|
|
1246
|
+
class KeyVaultClientContext extends coreClient__namespace.ServiceClient {
|
|
1229
1247
|
/**
|
|
1230
1248
|
* Initializes a new instance of the KeyVaultClientContext class.
|
|
1231
1249
|
* @param apiVersion Api Version
|
|
@@ -1320,7 +1338,7 @@ class KeyVaultClient extends KeyVaultClientContext {
|
|
|
1320
1338
|
}
|
|
1321
1339
|
}
|
|
1322
1340
|
// Operation Specifications
|
|
1323
|
-
const serializer
|
|
1341
|
+
const serializer = coreClient__namespace.createSerializer(Mappers, /* isXml */ false);
|
|
1324
1342
|
const fullBackupOperationSpec = {
|
|
1325
1343
|
path: "/backup",
|
|
1326
1344
|
httpMethod: "POST",
|
|
@@ -1338,7 +1356,7 @@ const fullBackupOperationSpec = {
|
|
|
1338
1356
|
urlParameters: [vaultBaseUrl],
|
|
1339
1357
|
headerParameters: [accept, contentType],
|
|
1340
1358
|
mediaType: "json",
|
|
1341
|
-
serializer
|
|
1359
|
+
serializer
|
|
1342
1360
|
};
|
|
1343
1361
|
const fullBackupStatusOperationSpec = {
|
|
1344
1362
|
path: "/backup/{jobId}/pending",
|
|
@@ -1354,7 +1372,7 @@ const fullBackupStatusOperationSpec = {
|
|
|
1354
1372
|
queryParameters: [apiVersion],
|
|
1355
1373
|
urlParameters: [vaultBaseUrl, jobId],
|
|
1356
1374
|
headerParameters: [accept],
|
|
1357
|
-
serializer
|
|
1375
|
+
serializer
|
|
1358
1376
|
};
|
|
1359
1377
|
const fullRestoreOperationOperationSpec = {
|
|
1360
1378
|
path: "/restore",
|
|
@@ -1373,7 +1391,7 @@ const fullRestoreOperationOperationSpec = {
|
|
|
1373
1391
|
urlParameters: [vaultBaseUrl],
|
|
1374
1392
|
headerParameters: [accept, contentType],
|
|
1375
1393
|
mediaType: "json",
|
|
1376
|
-
serializer
|
|
1394
|
+
serializer
|
|
1377
1395
|
};
|
|
1378
1396
|
const restoreStatusOperationSpec = {
|
|
1379
1397
|
path: "/restore/{jobId}/pending",
|
|
@@ -1389,7 +1407,7 @@ const restoreStatusOperationSpec = {
|
|
|
1389
1407
|
queryParameters: [apiVersion],
|
|
1390
1408
|
urlParameters: [vaultBaseUrl, jobId],
|
|
1391
1409
|
headerParameters: [accept],
|
|
1392
|
-
serializer
|
|
1410
|
+
serializer
|
|
1393
1411
|
};
|
|
1394
1412
|
const selectiveKeyRestoreOperationOperationSpec = {
|
|
1395
1413
|
path: "/keys/{keyName}/restore",
|
|
@@ -1408,7 +1426,7 @@ const selectiveKeyRestoreOperationOperationSpec = {
|
|
|
1408
1426
|
urlParameters: [vaultBaseUrl, keyName],
|
|
1409
1427
|
headerParameters: [accept, contentType],
|
|
1410
1428
|
mediaType: "json",
|
|
1411
|
-
serializer
|
|
1429
|
+
serializer
|
|
1412
1430
|
};
|
|
1413
1431
|
|
|
1414
1432
|
// Copyright (c) Microsoft Corporation.
|
|
@@ -1637,7 +1655,7 @@ const mappings = {
|
|
|
1637
1655
|
};
|
|
1638
1656
|
|
|
1639
1657
|
// Copyright (c) Microsoft Corporation.
|
|
1640
|
-
const withTrace = createTraceFunction("Azure.KeyVault.Admin.KeyVaultAccessControlClient");
|
|
1658
|
+
const withTrace$3 = createTraceFunction("Azure.KeyVault.Admin.KeyVaultAccessControlClient");
|
|
1641
1659
|
/**
|
|
1642
1660
|
* The KeyVaultAccessControlClient provides methods to manage
|
|
1643
1661
|
* access control and role assignments in any given Azure Key Vault instance.
|
|
@@ -1697,7 +1715,7 @@ class KeyVaultAccessControlClient {
|
|
|
1697
1715
|
* @param options - The optional parameters.
|
|
1698
1716
|
*/
|
|
1699
1717
|
createRoleAssignment(roleScope, name, roleDefinitionId, principalId, options = {}) {
|
|
1700
|
-
return withTrace("createRoleAssignment", options, async (updatedOptions) => {
|
|
1718
|
+
return withTrace$3("createRoleAssignment", options, async (updatedOptions) => {
|
|
1701
1719
|
const response = await this.client.roleAssignments.create(this.vaultUrl, roleScope, name, {
|
|
1702
1720
|
properties: {
|
|
1703
1721
|
roleDefinitionId,
|
|
@@ -1722,7 +1740,7 @@ class KeyVaultAccessControlClient {
|
|
|
1722
1740
|
* @param options - The optional parameters.
|
|
1723
1741
|
*/
|
|
1724
1742
|
deleteRoleAssignment(roleScope, name, options = {}) {
|
|
1725
|
-
return withTrace("deleteRoleAssignment", options, async (updatedOptions) => {
|
|
1743
|
+
return withTrace$3("deleteRoleAssignment", options, async (updatedOptions) => {
|
|
1726
1744
|
await this.client.roleAssignments.delete(this.vaultUrl, roleScope, name, updatedOptions);
|
|
1727
1745
|
});
|
|
1728
1746
|
}
|
|
@@ -1742,7 +1760,7 @@ class KeyVaultAccessControlClient {
|
|
|
1742
1760
|
* @param options - The optional parameters.
|
|
1743
1761
|
*/
|
|
1744
1762
|
getRoleAssignment(roleScope, name, options = {}) {
|
|
1745
|
-
return withTrace("getRoleAssignment", options, async (updatedOptions) => {
|
|
1763
|
+
return withTrace$3("getRoleAssignment", options, async (updatedOptions) => {
|
|
1746
1764
|
const response = await this.client.roleAssignments.get(this.vaultUrl, roleScope, name, updatedOptions);
|
|
1747
1765
|
return mappings.roleAssignment.generatedToPublic(response);
|
|
1748
1766
|
});
|
|
@@ -1757,7 +1775,7 @@ class KeyVaultAccessControlClient {
|
|
|
1757
1775
|
return tslib.__asyncGenerator(this, arguments, function* listRoleAssignmentsPage_1() {
|
|
1758
1776
|
if (!continuationState.continuationToken) {
|
|
1759
1777
|
const optionsComplete = options || {};
|
|
1760
|
-
const currentSetResponse = yield tslib.__await(withTrace("listRoleAssignments", optionsComplete, async (updatedOptions) => {
|
|
1778
|
+
const currentSetResponse = yield tslib.__await(withTrace$3("listRoleAssignments", optionsComplete, async (updatedOptions) => {
|
|
1761
1779
|
return this.client.roleAssignments.listForScope(this.vaultUrl, roleScope, updatedOptions);
|
|
1762
1780
|
}));
|
|
1763
1781
|
continuationState.continuationToken = currentSetResponse.nextLink;
|
|
@@ -1766,7 +1784,7 @@ class KeyVaultAccessControlClient {
|
|
|
1766
1784
|
}
|
|
1767
1785
|
}
|
|
1768
1786
|
while (continuationState.continuationToken) {
|
|
1769
|
-
const currentSetResponse = yield tslib.__await(withTrace("listRoleAssignments", options || {}, async (updatedOptions) => {
|
|
1787
|
+
const currentSetResponse = yield tslib.__await(withTrace$3("listRoleAssignments", options || {}, async (updatedOptions) => {
|
|
1770
1788
|
return this.client.roleAssignments.listForScopeNext(this.vaultUrl, roleScope, continuationState.continuationToken, updatedOptions);
|
|
1771
1789
|
}));
|
|
1772
1790
|
continuationState.continuationToken = currentSetResponse.nextLink;
|
|
@@ -1838,14 +1856,14 @@ class KeyVaultAccessControlClient {
|
|
|
1838
1856
|
return tslib.__asyncGenerator(this, arguments, function* listRoleDefinitionsPage_1() {
|
|
1839
1857
|
if (!continuationState.continuationToken) {
|
|
1840
1858
|
const optionsComplete = options || {};
|
|
1841
|
-
const currentSetResponse = yield tslib.__await(withTrace("listRoleDefinitions", optionsComplete, (updatedOptions) => this.client.roleDefinitions.list(this.vaultUrl, roleScope, updatedOptions)));
|
|
1859
|
+
const currentSetResponse = yield tslib.__await(withTrace$3("listRoleDefinitions", optionsComplete, (updatedOptions) => this.client.roleDefinitions.list(this.vaultUrl, roleScope, updatedOptions)));
|
|
1842
1860
|
continuationState.continuationToken = currentSetResponse.nextLink;
|
|
1843
1861
|
if (currentSetResponse.value) {
|
|
1844
1862
|
yield yield tslib.__await(currentSetResponse.value.map(mappings.roleDefinition.generatedToPublic, this));
|
|
1845
1863
|
}
|
|
1846
1864
|
}
|
|
1847
1865
|
while (continuationState.continuationToken) {
|
|
1848
|
-
const currentSetResponse = yield tslib.__await(withTrace("listRoleDefinitions", options, (updatedOptions) => this.client.roleDefinitions.listNext(this.vaultUrl, roleScope, continuationState.continuationToken, updatedOptions)));
|
|
1866
|
+
const currentSetResponse = yield tslib.__await(withTrace$3("listRoleDefinitions", options, (updatedOptions) => this.client.roleDefinitions.listNext(this.vaultUrl, roleScope, continuationState.continuationToken, updatedOptions)));
|
|
1849
1867
|
continuationState.continuationToken = currentSetResponse.nextLink;
|
|
1850
1868
|
if (currentSetResponse.value) {
|
|
1851
1869
|
yield yield tslib.__await(currentSetResponse.value.map(mappings.roleDefinition.generatedToPublic, this));
|
|
@@ -1919,7 +1937,7 @@ class KeyVaultAccessControlClient {
|
|
|
1919
1937
|
* @param options - The optional parameters.
|
|
1920
1938
|
*/
|
|
1921
1939
|
getRoleDefinition(roleScope, name, options = {}) {
|
|
1922
|
-
return withTrace("getRoleDefinition", options, async (updatedOptions) => {
|
|
1940
|
+
return withTrace$3("getRoleDefinition", options, async (updatedOptions) => {
|
|
1923
1941
|
const response = await this.client.roleDefinitions.get(this.vaultUrl, roleScope, name, updatedOptions);
|
|
1924
1942
|
return mappings.roleDefinition.generatedToPublic(response);
|
|
1925
1943
|
});
|
|
@@ -1942,7 +1960,7 @@ class KeyVaultAccessControlClient {
|
|
|
1942
1960
|
* @param options - The optional parameters.
|
|
1943
1961
|
*/
|
|
1944
1962
|
setRoleDefinition(roleScope, options = {}) {
|
|
1945
|
-
return withTrace("setRoleDefinition", options, async (updatedOptions) => {
|
|
1963
|
+
return withTrace$3("setRoleDefinition", options, async (updatedOptions) => {
|
|
1946
1964
|
const response = await this.client.roleDefinitions.createOrUpdate(this.vaultUrl, roleScope, options.roleDefinitionName || uuid.v4(), {
|
|
1947
1965
|
properties: {
|
|
1948
1966
|
description: options.description,
|
|
@@ -1969,7 +1987,7 @@ class KeyVaultAccessControlClient {
|
|
|
1969
1987
|
* @param options - The optional parameters.
|
|
1970
1988
|
*/
|
|
1971
1989
|
deleteRoleDefinition(roleScope, name, options = {}) {
|
|
1972
|
-
return withTrace("deleteRoleDefinition", options, async (updatedOptions) => {
|
|
1990
|
+
return withTrace$3("deleteRoleDefinition", options, async (updatedOptions) => {
|
|
1973
1991
|
await this.client.roleDefinitions.delete(this.vaultUrl, roleScope, name, updatedOptions);
|
|
1974
1992
|
});
|
|
1975
1993
|
}
|
|
@@ -1996,6 +2014,8 @@ var KnownRoleType;
|
|
|
1996
2014
|
/** Custom role. */
|
|
1997
2015
|
KnownRoleType["CustomRole"] = "CustomRole";
|
|
1998
2016
|
})(KnownRoleType || (KnownRoleType = {}));
|
|
2017
|
+
/** Known values of {@link DataAction} that the service accepts. */
|
|
2018
|
+
exports.KnownKeyVaultDataAction = void 0;
|
|
1999
2019
|
(function (KnownDataAction) {
|
|
2000
2020
|
/** Read HSM key metadata. */
|
|
2001
2021
|
KnownDataAction["ReadHsmKey"] = "Microsoft.KeyVault/managedHsm/keys/read/action";
|
|
@@ -2066,6 +2086,8 @@ var KnownRoleType;
|
|
|
2066
2086
|
/** Generate random numbers. */
|
|
2067
2087
|
KnownDataAction["RandomNumbersGenerate"] = "Microsoft.KeyVault/managedHsm/rng/action";
|
|
2068
2088
|
})(exports.KnownKeyVaultDataAction || (exports.KnownKeyVaultDataAction = {}));
|
|
2089
|
+
/** Known values of {@link RoleScope} that the service accepts. */
|
|
2090
|
+
exports.KnownKeyVaultRoleScope = void 0;
|
|
2069
2091
|
(function (KnownRoleScope) {
|
|
2070
2092
|
/** Global scope */
|
|
2071
2093
|
KnownRoleScope["Global"] = "/";
|
|
@@ -2154,7 +2176,7 @@ class KeyVaultAdminPollOperation {
|
|
|
2154
2176
|
/**
|
|
2155
2177
|
* @internal
|
|
2156
2178
|
*/
|
|
2157
|
-
const withTrace$
|
|
2179
|
+
const withTrace$2 = createTraceFunction("Azure.KeyVault.Admin.KeyVaultBackupPoller");
|
|
2158
2180
|
/**
|
|
2159
2181
|
* The backup Key Vault's poll operation.
|
|
2160
2182
|
*/
|
|
@@ -2170,13 +2192,13 @@ class KeyVaultBackupPollOperation extends KeyVaultAdminPollOperation {
|
|
|
2170
2192
|
* Tracing the fullBackup operation
|
|
2171
2193
|
*/
|
|
2172
2194
|
fullBackup(options) {
|
|
2173
|
-
return withTrace$
|
|
2195
|
+
return withTrace$2("fullBackup", options, (updatedOptions) => this.client.fullBackup(this.vaultUrl, updatedOptions));
|
|
2174
2196
|
}
|
|
2175
2197
|
/**
|
|
2176
2198
|
* Tracing the fullBackupStatus operation
|
|
2177
2199
|
*/
|
|
2178
2200
|
fullBackupStatus(jobId, options) {
|
|
2179
|
-
return withTrace$
|
|
2201
|
+
return withTrace$2("fullBackupStatus", options, (updatedOptions) => this.client.fullBackupStatus(this.vaultUrl, jobId, updatedOptions));
|
|
2180
2202
|
}
|
|
2181
2203
|
/**
|
|
2182
2204
|
* Reaches to the service and updates the backup's poll operation.
|
|
@@ -2251,7 +2273,7 @@ class KeyVaultBackupPoller extends KeyVaultAdminPoller {
|
|
|
2251
2273
|
/**
|
|
2252
2274
|
* @internal
|
|
2253
2275
|
*/
|
|
2254
|
-
const withTrace$
|
|
2276
|
+
const withTrace$1 = createTraceFunction("Azure.KeyVault.Admin.KeyVaultRestorePoller");
|
|
2255
2277
|
/**
|
|
2256
2278
|
* An interface representing a restore Key Vault's poll operation.
|
|
2257
2279
|
*/
|
|
@@ -2269,13 +2291,13 @@ class KeyVaultRestorePollOperation extends KeyVaultAdminPollOperation {
|
|
|
2269
2291
|
* Tracing the fullRestore operation
|
|
2270
2292
|
*/
|
|
2271
2293
|
fullRestore(options) {
|
|
2272
|
-
return withTrace$
|
|
2294
|
+
return withTrace$1("fullRestore", options, (updatedOptions) => this.client.fullRestoreOperation(this.vaultUrl, updatedOptions));
|
|
2273
2295
|
}
|
|
2274
2296
|
/**
|
|
2275
2297
|
* Tracing the restoreStatus operation.
|
|
2276
2298
|
*/
|
|
2277
2299
|
async restoreStatus(jobId, options) {
|
|
2278
|
-
return withTrace$
|
|
2300
|
+
return withTrace$1("restoreStatus", options, (updatedOptions) => this.client.restoreStatus(this.vaultUrl, jobId, updatedOptions));
|
|
2279
2301
|
}
|
|
2280
2302
|
/**
|
|
2281
2303
|
* Reaches to the service and updates the restore poll operation.
|
|
@@ -2353,7 +2375,7 @@ class KeyVaultRestorePoller extends KeyVaultAdminPoller {
|
|
|
2353
2375
|
/**
|
|
2354
2376
|
* @internal
|
|
2355
2377
|
*/
|
|
2356
|
-
const withTrace
|
|
2378
|
+
const withTrace = createTraceFunction("Azure.KeyVault.Admin.KeyVaultSelectiveKeyRestorePoller");
|
|
2357
2379
|
/**
|
|
2358
2380
|
* The selective restore Key Vault's poll operation.
|
|
2359
2381
|
*/
|
|
@@ -2369,13 +2391,13 @@ class KeyVaultSelectiveKeyRestorePollOperation extends KeyVaultAdminPollOperatio
|
|
|
2369
2391
|
* Tracing the selectiveRestore operation
|
|
2370
2392
|
*/
|
|
2371
2393
|
selectiveRestore(keyName, options) {
|
|
2372
|
-
return withTrace
|
|
2394
|
+
return withTrace("selectiveRestore", options, (updatedOptions) => this.client.selectiveKeyRestoreOperation(this.vaultUrl, keyName, updatedOptions));
|
|
2373
2395
|
}
|
|
2374
2396
|
/**
|
|
2375
2397
|
* Tracing the restoreStatus operation.
|
|
2376
2398
|
*/
|
|
2377
2399
|
restoreStatus(jobId, options) {
|
|
2378
|
-
return withTrace
|
|
2400
|
+
return withTrace("restoreStatus", options, (updatedOptions) => this.client.restoreStatus(this.vaultUrl, jobId, updatedOptions));
|
|
2379
2401
|
}
|
|
2380
2402
|
/**
|
|
2381
2403
|
* Reaches to the service and updates the selective restore poll operation.
|