@azure/keyvault-admin 4.2.0-beta.1 → 4.2.1-alpha.20220325.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (54) hide show
  1. package/CHANGELOG.md +27 -1
  2. package/README.md +3 -0
  3. package/dist/index.js +311 -237
  4. package/dist/index.js.map +1 -1
  5. package/dist-esm/keyvault-admin/src/accessControlClient.js +14 -21
  6. package/dist-esm/keyvault-admin/src/accessControlClient.js.map +1 -1
  7. package/dist-esm/keyvault-admin/src/accessControlModels.js +2 -70
  8. package/dist-esm/keyvault-admin/src/accessControlModels.js.map +1 -1
  9. package/dist-esm/keyvault-admin/src/backupClient.js +7 -7
  10. package/dist-esm/keyvault-admin/src/backupClient.js.map +1 -1
  11. package/dist-esm/keyvault-admin/src/challengeAuthenticationCallbacks.js +7 -29
  12. package/dist-esm/keyvault-admin/src/challengeAuthenticationCallbacks.js.map +1 -1
  13. package/dist-esm/keyvault-admin/src/constants.js +2 -2
  14. package/dist-esm/keyvault-admin/src/constants.js.map +1 -1
  15. package/dist-esm/keyvault-admin/src/generated/keyVaultClient.js +2 -1
  16. package/dist-esm/keyvault-admin/src/generated/keyVaultClient.js.map +1 -1
  17. package/dist-esm/keyvault-admin/src/generated/keyVaultClientContext.js +2 -2
  18. package/dist-esm/keyvault-admin/src/generated/keyVaultClientContext.js.map +1 -1
  19. package/dist-esm/keyvault-admin/src/generated/models/index.js +99 -1
  20. package/dist-esm/keyvault-admin/src/generated/models/index.js.map +1 -1
  21. package/dist-esm/keyvault-admin/src/generated/operations/roleAssignments.js +1 -1
  22. package/dist-esm/keyvault-admin/src/generated/operations/roleAssignments.js.map +1 -1
  23. package/dist-esm/keyvault-admin/src/generated/operations/roleDefinitions.js +1 -1
  24. package/dist-esm/keyvault-admin/src/generated/operations/roleDefinitions.js.map +1 -1
  25. package/dist-esm/keyvault-admin/src/lro/backup/operation.js +4 -4
  26. package/dist-esm/keyvault-admin/src/lro/backup/operation.js.map +1 -1
  27. package/dist-esm/keyvault-admin/src/lro/backup/poller.js +2 -2
  28. package/dist-esm/keyvault-admin/src/lro/backup/poller.js.map +1 -1
  29. package/dist-esm/keyvault-admin/src/lro/keyVaultAdminPoller.js +2 -2
  30. package/dist-esm/keyvault-admin/src/lro/keyVaultAdminPoller.js.map +1 -1
  31. package/dist-esm/keyvault-admin/src/lro/restore/operation.js +5 -5
  32. package/dist-esm/keyvault-admin/src/lro/restore/operation.js.map +1 -1
  33. package/dist-esm/keyvault-admin/src/lro/restore/poller.js +2 -2
  34. package/dist-esm/keyvault-admin/src/lro/restore/poller.js.map +1 -1
  35. package/dist-esm/keyvault-admin/src/lro/selectiveKeyRestore/operation.js +4 -4
  36. package/dist-esm/keyvault-admin/src/lro/selectiveKeyRestore/operation.js.map +1 -1
  37. package/dist-esm/keyvault-admin/src/lro/selectiveKeyRestore/poller.js +2 -2
  38. package/dist-esm/keyvault-admin/src/lro/selectiveKeyRestore/poller.js.map +1 -1
  39. package/dist-esm/keyvault-admin/src/mappings.js +7 -7
  40. package/dist-esm/keyvault-admin/src/mappings.js.map +1 -1
  41. package/dist-esm/keyvault-admin/src/tracingHelpers.js +4 -4
  42. package/dist-esm/keyvault-admin/src/tracingHelpers.js.map +1 -1
  43. package/dist-esm/keyvault-common/src/challengeBasedAuthenticationPolicy.js +14 -25
  44. package/dist-esm/keyvault-common/src/challengeBasedAuthenticationPolicy.js.map +1 -1
  45. package/dist-esm/keyvault-common/src/index.js +1 -0
  46. package/dist-esm/keyvault-common/src/index.js.map +1 -1
  47. package/dist-esm/keyvault-common/src/parseKeyvaultIdentifier.js +1 -1
  48. package/dist-esm/keyvault-common/src/parseKeyvaultIdentifier.js.map +1 -1
  49. package/dist-esm/keyvault-common/src/parseWWWAuthenticate.js +52 -0
  50. package/dist-esm/keyvault-common/src/parseWWWAuthenticate.js.map +1 -0
  51. package/dist-esm/keyvault-common/src/tracingHelpers.js +4 -4
  52. package/dist-esm/keyvault-common/src/tracingHelpers.js.map +1 -1
  53. package/package.json +20 -37
  54. package/types/keyvault-admin.d.ts +54 -13
@@ -1,6 +1,6 @@
1
1
  // Copyright (c) Microsoft Corporation.
2
2
  // Licensed under the MIT license.
3
- import { createSpanFunction, SpanStatusCode } from "@azure/core-tracing";
3
+ import { SpanStatusCode, createSpanFunction } from "@azure/core-tracing";
4
4
  /**
5
5
  * Returns a function that can be used for tracing options.
6
6
  *
@@ -13,7 +13,7 @@ import { createSpanFunction, SpanStatusCode } from "@azure/core-tracing";
13
13
  export function createTraceFunction(prefix) {
14
14
  const createSpan = createSpanFunction({
15
15
  namespace: "Microsoft.KeyVault",
16
- packagePrefix: prefix
16
+ packagePrefix: prefix,
17
17
  });
18
18
  return async function (operationName, options, cb) {
19
19
  const { updatedOptions, span } = createSpan(operationName, options);
@@ -23,14 +23,14 @@ export function createTraceFunction(prefix) {
23
23
  const result = await cb(updatedOptions, span);
24
24
  // otel 0.16+ needs this or else the code ends up being set as UNSET
25
25
  span.setStatus({
26
- code: SpanStatusCode.OK
26
+ code: SpanStatusCode.OK,
27
27
  });
28
28
  return result;
29
29
  }
30
30
  catch (err) {
31
31
  span.setStatus({
32
32
  code: SpanStatusCode.ERROR,
33
- message: err.message
33
+ message: err.message,
34
34
  });
35
35
  throw err;
36
36
  }
@@ -1 +1 @@
1
- {"version":3,"file":"tracingHelpers.js","sourceRoot":"","sources":["../../../../keyvault-common/src/tracingHelpers.ts"],"names":[],"mappings":"AAAA,uCAAuC;AACvC,kCAAkC;AAGlC,OAAO,EAAE,kBAAkB,EAAQ,cAAc,EAAE,MAAM,qBAAqB,CAAC;AAqB/E;;;;;;;;GAQG;AACH,MAAM,UAAU,mBAAmB,CAAC,MAAc;IAChD,MAAM,UAAU,GAAG,kBAAkB,CAAC;QACpC,SAAS,EAAE,oBAAoB;QAC/B,aAAa,EAAE,MAAM;KACtB,CAAC,CAAC;IAEH,OAAO,KAAK,WAAU,aAAa,EAAE,OAAO,EAAE,EAAE;QAC9C,MAAM,EAAE,cAAc,EAAE,IAAI,EAAE,GAAG,UAAU,CAAC,aAAa,EAAE,OAAO,CAAC,CAAC;QAEpE,IAAI;YACF,6GAA6G;YAC7G,kBAAkB;YAClB,MAAM,MAAM,GAAG,MAAM,EAAE,CAAC,cAAc,EAAE,IAAI,CAAC,CAAC;YAE9C,oEAAoE;YACpE,IAAI,CAAC,SAAS,CAAC;gBACb,IAAI,EAAE,cAAc,CAAC,EAAE;aACxB,CAAC,CAAC;YACH,OAAO,MAAM,CAAC;SACf;QAAC,OAAO,GAAG,EAAE;YACZ,IAAI,CAAC,SAAS,CAAC;gBACb,IAAI,EAAE,cAAc,CAAC,KAAK;gBAC1B,OAAO,EAAE,GAAG,CAAC,OAAO;aACrB,CAAC,CAAC;YACH,MAAM,GAAG,CAAC;SACX;gBAAS;YACR,IAAI,CAAC,GAAG,EAAE,CAAC;SACZ;IACH,CAAC,CAAC;AACJ,CAAC","sourcesContent":["// Copyright (c) Microsoft Corporation.\n// Licensed under the MIT license.\n\nimport { OperationOptions } from \"@azure/core-http\";\nimport { createSpanFunction, Span, SpanStatusCode } from \"@azure/core-tracing\";\n\n/**\n * An interface representing a function that is traced.\n *\n * A traced function will automatically create and close tracing '\n * spans as needed and will handle setting the status / errors as a\n * result of calling the underlying callback.\n *\n * use {@link createTraceFunction} to add tracing to a block of code.\n *\n * @internal\n */\nexport interface TracedFunction {\n <TOptions extends OperationOptions, TReturn>(\n operationName: string,\n options: TOptions,\n cb: (options: TOptions, span: Span) => Promise<TReturn>\n ): Promise<TReturn>;\n}\n\n/**\n * Returns a function that can be used for tracing options.\n *\n * @param prefix - The prefix to use, likely the name of the class / client.\n *\n * @example const withTrace = createTraceFunction(\"Azure.KeyVault.Certificates.CertificateClient\")\n *\n * @internal\n */\nexport function createTraceFunction(prefix: string): TracedFunction {\n const createSpan = createSpanFunction({\n namespace: \"Microsoft.KeyVault\",\n packagePrefix: prefix\n });\n\n return async function(operationName, options, cb) {\n const { updatedOptions, span } = createSpan(operationName, options);\n\n try {\n // NOTE: we really do need to await on this function here so we can handle any exceptions thrown and properly\n // close the span.\n const result = await cb(updatedOptions, span);\n\n // otel 0.16+ needs this or else the code ends up being set as UNSET\n span.setStatus({\n code: SpanStatusCode.OK\n });\n return result;\n } catch (err) {\n span.setStatus({\n code: SpanStatusCode.ERROR,\n message: err.message\n });\n throw err;\n } finally {\n span.end();\n }\n };\n}\n"]}
1
+ {"version":3,"file":"tracingHelpers.js","sourceRoot":"","sources":["../../../../keyvault-common/src/tracingHelpers.ts"],"names":[],"mappings":"AAAA,uCAAuC;AACvC,kCAAkC;AAElC,OAAO,EAAQ,cAAc,EAAE,kBAAkB,EAAE,MAAM,qBAAqB,CAAC;AAsB/E;;;;;;;;GAQG;AACH,MAAM,UAAU,mBAAmB,CAAC,MAAc;IAChD,MAAM,UAAU,GAAG,kBAAkB,CAAC;QACpC,SAAS,EAAE,oBAAoB;QAC/B,aAAa,EAAE,MAAM;KACtB,CAAC,CAAC;IAEH,OAAO,KAAK,WAAW,aAAa,EAAE,OAAO,EAAE,EAAE;QAC/C,MAAM,EAAE,cAAc,EAAE,IAAI,EAAE,GAAG,UAAU,CAAC,aAAa,EAAE,OAAO,CAAC,CAAC;QAEpE,IAAI;YACF,6GAA6G;YAC7G,kBAAkB;YAClB,MAAM,MAAM,GAAG,MAAM,EAAE,CAAC,cAAc,EAAE,IAAI,CAAC,CAAC;YAE9C,oEAAoE;YACpE,IAAI,CAAC,SAAS,CAAC;gBACb,IAAI,EAAE,cAAc,CAAC,EAAE;aACxB,CAAC,CAAC;YACH,OAAO,MAAM,CAAC;SACf;QAAC,OAAO,GAAG,EAAE;YACZ,IAAI,CAAC,SAAS,CAAC;gBACb,IAAI,EAAE,cAAc,CAAC,KAAK;gBAC1B,OAAO,EAAE,GAAG,CAAC,OAAO;aACrB,CAAC,CAAC;YACH,MAAM,GAAG,CAAC;SACX;gBAAS;YACR,IAAI,CAAC,GAAG,EAAE,CAAC;SACZ;IACH,CAAC,CAAC;AACJ,CAAC","sourcesContent":["// Copyright (c) Microsoft Corporation.\n// Licensed under the MIT license.\n\nimport { Span, SpanStatusCode, createSpanFunction } from \"@azure/core-tracing\";\nimport { OperationOptions } from \"@azure/core-http\";\n\n/**\n * An interface representing a function that is traced.\n *\n * A traced function will automatically create and close tracing '\n * spans as needed and will handle setting the status / errors as a\n * result of calling the underlying callback.\n *\n * use {@link createTraceFunction} to add tracing to a block of code.\n *\n * @internal\n */\nexport interface TracedFunction {\n <TOptions extends OperationOptions, TReturn>(\n operationName: string,\n options: TOptions,\n cb: (options: TOptions, span: Span) => Promise<TReturn>\n ): Promise<TReturn>;\n}\n\n/**\n * Returns a function that can be used for tracing options.\n *\n * @param prefix - The prefix to use, likely the name of the class / client.\n *\n * @example const withTrace = createTraceFunction(\"Azure.KeyVault.Certificates.CertificateClient\")\n *\n * @internal\n */\nexport function createTraceFunction(prefix: string): TracedFunction {\n const createSpan = createSpanFunction({\n namespace: \"Microsoft.KeyVault\",\n packagePrefix: prefix,\n });\n\n return async function (operationName, options, cb) {\n const { updatedOptions, span } = createSpan(operationName, options);\n\n try {\n // NOTE: we really do need to await on this function here so we can handle any exceptions thrown and properly\n // close the span.\n const result = await cb(updatedOptions, span);\n\n // otel 0.16+ needs this or else the code ends up being set as UNSET\n span.setStatus({\n code: SpanStatusCode.OK,\n });\n return result;\n } catch (err) {\n span.setStatus({\n code: SpanStatusCode.ERROR,\n message: err.message,\n });\n throw err;\n } finally {\n span.end();\n }\n };\n}\n"]}
package/package.json CHANGED
@@ -2,7 +2,7 @@
2
2
  "name": "@azure/keyvault-admin",
3
3
  "sdk-type": "client",
4
4
  "author": "Microsoft Corporation",
5
- "version": "4.2.0-beta.1",
5
+ "version": "4.2.1-alpha.20220325.3",
6
6
  "license": "MIT",
7
7
  "description": "Isomorphic client library for Azure KeyVault's administrative functions.",
8
8
  "homepage": "https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/keyvault/keyvault-admin/README.md",
@@ -44,16 +44,18 @@
44
44
  "scripts": {
45
45
  "audit": "node ../../../common/scripts/rush-audit.js && rimraf node_modules package-lock.json && npm i --package-lock-only 2>&1 && npm audit",
46
46
  "build:samples": "echo Obsolete.",
47
- "build:node": "tsc -p . && cross-env ONLY_NODE=true rollup -c 2>&1",
48
- "build:browser": "tsc -p . && cross-env ONLY_BROWSER=true rollup -c 2>&1",
49
- "build:nodebrowser": "rollup -c 2>&1",
50
- "build:test": "tsc -p . && rollup -c rollup.test.config.js 2>&1",
51
- "build": "tsc -p . && npm run build:nodebrowser && api-extractor run --local",
47
+ "build:node": "tsc -p . && npm run bundle",
48
+ "build:browser": "tsc -p . && npm run bundle",
49
+ "build:nodebrowser": "npm run bundle",
50
+ "build:test": "tsc -p . && npm run bundle",
51
+ "build": "npm run clean && tsc -p . && npm run build:nodebrowser && api-extractor run --local",
52
+ "bundle": "dev-tool run bundle --polyfill-node=false",
52
53
  "check-format": "prettier --list-different --config ../../../.prettierrc.json --ignore-path ../../../.prettierignore \"src/**/*.ts\" \"test/**/*.ts\" \"samples-dev/**/*.ts\" \"*.{js,json}\"",
53
54
  "clean": "rimraf dist dist-* types *.tgz *.log statistics.html coverage && rimraf src/**/*.js && rimraf test/**/*.js",
54
55
  "execute:samples": "dev-tool samples run samples-dev",
55
56
  "extract-api": "tsc -p . && api-extractor run --local",
56
57
  "format": "prettier --write --config ../../../.prettierrc.json --ignore-path ../../../.prettierignore \"src/**/*.ts\" \"test/**/*.ts\" \"samples-dev/**/*.ts\" \"*.{js,json}\"",
58
+ "generate:client": "autorest --typescript swagger/README.md",
57
59
  "integration-test:browser": "echo skipped",
58
60
  "integration-test:node": "nyc mocha -r esm --require source-map-support/register --reporter ../../../common/tools/mocha-multi-reporter.js --timeout 180000 --full-trace \"dist-esm/**/*.spec.js\"",
59
61
  "integration-test:node:no-timeout": "nyc mocha -r esm --require source-map-support/register --reporter ../../../common/tools/mocha-multi-reporter.js --no-timeouts --full-trace \"dist-esm/**/*.spec.js\"",
@@ -61,21 +63,18 @@
61
63
  "lint:fix": "eslint package.json src --ext .ts --fix --fix-type [problem,suggestion]",
62
64
  "lint": "eslint package.json api-extractor.json src --ext .ts",
63
65
  "pack": "npm pack 2>&1",
64
- "prebuild": "npm run clean",
65
- "regenerate": "npx autorest swagger/README.md --typescript",
66
66
  "test:browser": "npm run clean && npm run build:test && npm run unit-test:browser",
67
67
  "test:node": "npm run clean && npm run build:test && npm run unit-test:node",
68
68
  "test": "npm run clean && npm run build:test && npm run unit-test",
69
69
  "unit-test:browser": "echo skipped",
70
- "unit-test:node": "mocha --require source-map-support/register --reporter ../../../common/tools/mocha-multi-reporter.js --timeout 180000 --full-trace \"dist-test/index.node.js\"",
71
- "unit-test": "npm run unit-test:node && npm run unit-test:browser",
72
- "docs": "typedoc --excludePrivate --excludeNotExported --excludeExternals --stripInternal --mode file --out ./dist/docs ./src"
70
+ "unit-test:node": "mocha -r esm --require ts-node/register --reporter ../../../common/tools/mocha-multi-reporter.js --timeout 180000 --full-trace \"test/{,!(browser)/**/}*.spec.ts\"",
71
+ "unit-test": "npm run unit-test:node && npm run unit-test:browser"
73
72
  },
74
73
  "//metadata": {
75
74
  "constantPaths": [
76
75
  {
77
76
  "path": "src/generated/keyVaultClientContext.ts",
78
- "prefix": "packageDetails"
77
+ "prefix": "packageVersion"
79
78
  },
80
79
  {
81
80
  "path": "src/constants.ts",
@@ -119,43 +118,27 @@
119
118
  "devDependencies": {
120
119
  "@azure/abort-controller": "^1.0.0",
121
120
  "@azure/core-util": "^1.0.0-beta.1",
122
- "@azure/dev-tool": "^1.0.0",
123
- "@azure/eslint-plugin-azure-sdk": "^3.0.0",
124
- "@azure/identity": "2.0.0-beta.4",
121
+ "@azure/dev-tool": ">=1.0.0-alpha <1.0.0-alphb",
122
+ "@azure/eslint-plugin-azure-sdk": ">=3.0.0-alpha <3.0.0-alphb",
123
+ "@azure/identity": "^2.0.1",
125
124
  "@azure/keyvault-keys": "^4.2.1",
126
- "@azure/test-utils": "^1.0.0",
127
- "@azure/test-utils-recorder": "^1.0.0",
128
- "@microsoft/api-extractor": "7.7.11",
129
- "@rollup/plugin-commonjs": "11.0.2",
130
- "@rollup/plugin-json": "^4.0.0",
131
- "@rollup/plugin-multi-entry": "^3.0.0",
132
- "@rollup/plugin-node-resolve": "^8.0.0",
133
- "@rollup/plugin-replace": "^2.2.0",
134
- "@types/chai": "^4.1.6",
135
- "@types/chai-as-promised": "^7.1.0",
125
+ "@azure/test-utils": ">=1.0.0-alpha <1.0.0-alphb",
126
+ "@azure-tools/test-recorder": "^1.0.0",
127
+ "@microsoft/api-extractor": "^7.18.11",
136
128
  "@types/mocha": "^7.0.2",
137
129
  "@types/node": "^12.0.0",
138
130
  "@types/sinon": "^9.0.4",
139
- "assert": "^1.4.1",
140
- "chai": "^4.2.0",
141
- "chai-as-promised": "^7.1.1",
142
131
  "cross-env": "^7.0.2",
143
132
  "dotenv": "^8.2.0",
144
133
  "eslint": "^7.15.0",
145
134
  "esm": "^3.2.18",
146
135
  "mocha": "^7.1.1",
147
- "mocha-junit-reporter": "^1.18.0",
148
- "nyc": "^14.0.0",
149
- "prettier": "^1.16.4",
136
+ "mocha-junit-reporter": "^2.0.0",
137
+ "nyc": "^15.0.0",
138
+ "prettier": "^2.5.1",
150
139
  "rimraf": "^3.0.0",
151
- "rollup": "^1.16.3",
152
- "rollup-plugin-shim": "^1.0.0",
153
- "rollup-plugin-sourcemaps": "^0.4.2",
154
- "rollup-plugin-terser": "^5.1.1",
155
- "rollup-plugin-visualizer": "^4.0.4",
156
140
  "sinon": "^9.0.2",
157
141
  "source-map-support": "^0.5.9",
158
- "typedoc": "0.15.2",
159
142
  "typescript": "~4.2.0"
160
143
  }
161
144
  }
@@ -1,4 +1,5 @@
1
1
  /// <reference lib="esnext.asynciterable" />
2
+
2
3
  import { CommonClientOptions } from '@azure/core-client';
3
4
  import { OperationOptions } from '@azure/core-client';
4
5
  import { PagedAsyncIterableIterator } from '@azure/core-paging';
@@ -59,7 +60,10 @@ export declare class KeyVaultAccessControlClient {
59
60
  * The base URL to the vault
60
61
  */
61
62
  readonly vaultUrl: string;
62
- /* Excluded from this release type: client */
63
+ /**
64
+ * A reference to the auto-generated Key Vault HTTP client.
65
+ */
66
+ private readonly client;
63
67
  /**
64
68
  * Creates an instance of the KeyVaultAccessControlClient.
65
69
  *
@@ -127,8 +131,19 @@ export declare class KeyVaultAccessControlClient {
127
131
  * @param options - The optional parameters.
128
132
  */
129
133
  getRoleAssignment(roleScope: KeyVaultRoleScope, name: string, options?: GetRoleAssignmentOptions): Promise<KeyVaultRoleAssignment>;
130
- /* Excluded from this release type: listRoleAssignmentsPage */
131
- /* Excluded from this release type: listRoleAssignmentsAll */
134
+ /**
135
+ * Deals with the pagination of {@link listRoleAssignments}.
136
+ * @param roleScope - The scope of the role assignments.
137
+ * @param continuationState - An object that indicates the position of the paginated request.
138
+ * @param options - Common options for the iterative endpoints.
139
+ */
140
+ private listRoleAssignmentsPage;
141
+ /**
142
+ * Deals with the iteration of all the available results of {@link listRoleAssignments}.
143
+ * @param roleScope - The scope of the role assignments.
144
+ * @param options - Common options for the iterative endpoints.
145
+ */
146
+ private listRoleAssignmentsAll;
132
147
  /**
133
148
  * Iterates over all of the available role assignments in an Azure Key Vault.
134
149
  *
@@ -144,8 +159,19 @@ export declare class KeyVaultAccessControlClient {
144
159
  * @param options - The optional parameters.
145
160
  */
146
161
  listRoleAssignments(roleScope: KeyVaultRoleScope, options?: ListRoleAssignmentsOptions): PagedAsyncIterableIterator<KeyVaultRoleAssignment>;
147
- /* Excluded from this release type: listRoleDefinitionsPage */
148
- /* Excluded from this release type: listRoleDefinitionsAll */
162
+ /**
163
+ * Deals with the pagination of {@link listRoleDefinitions}.
164
+ * @param roleScope - The scope of the role definition.
165
+ * @param continuationState - An object that indicates the position of the paginated request.
166
+ * @param options - Common options for the iterative endpoints.
167
+ */
168
+ private listRoleDefinitionsPage;
169
+ /**
170
+ * Deals with the iteration of all the available results of {@link listRoleDefinitions}.
171
+ * @param roleScope - The scope of the role definition.
172
+ * @param options - Common options for the iterative endpoints.
173
+ */
174
+ private listRoleDefinitionsAll;
149
175
  /**
150
176
  * Iterates over all of the available role definitions in an Azure Key Vault.
151
177
  *
@@ -187,9 +213,6 @@ export declare class KeyVaultAccessControlClient {
187
213
  * console.log(roleDefinition);
188
214
  * ```
189
215
  * @param roleScope - The scope of the role definition.
190
- * @param name - The name of the role definition. Must be a UUID.
191
- * @param permissions - The set of {@link KeyVaultPermission} for this role definition.
192
- * @param description - The role definition description.
193
216
  * @param options - The optional parameters.
194
217
  */
195
218
  setRoleDefinition(roleScope: KeyVaultRoleScope, options?: SetRoleDefinitionOptions): Promise<KeyVaultRoleDefinition>;
@@ -246,7 +269,10 @@ export declare class KeyVaultBackupClient {
246
269
  * The base URL to the vault
247
270
  */
248
271
  readonly vaultUrl: string;
249
- /* Excluded from this release type: client */
272
+ /**
273
+ * A reference to the auto-generated Key Vault HTTP client.
274
+ */
275
+ private readonly client;
250
276
  /**
251
277
  * Creates an instance of the KeyVaultBackupClient.
252
278
  *
@@ -450,6 +476,8 @@ export declare interface KeyVaultBeginSelectiveKeyRestoreOptions extends KeyVaul
450
476
  * **Microsoft.KeyVault\/managedHsm\/roleAssignments\/read\/action**: Get role assignment. \
451
477
  * **Microsoft.KeyVault\/managedHsm\/roleAssignments\/write\/action**: Create or update role assignment. \
452
478
  * **Microsoft.KeyVault\/managedHsm\/roleDefinitions\/read\/action**: Get role definition. \
479
+ * **Microsoft.KeyVault\/managedHsm\/roleDefinitions\/write\/action**: Create or update role definition. \
480
+ * **Microsoft.KeyVault\/managedHsm\/roleDefinitions\/delete\/action**: Delete role definition. \
453
481
  * **Microsoft.KeyVault\/managedHsm\/keys\/encrypt\/action**: Encrypt using an HSM key. \
454
482
  * **Microsoft.KeyVault\/managedHsm\/keys\/decrypt\/action**: Decrypt using an HSM key. \
455
483
  * **Microsoft.KeyVault\/managedHsm\/keys\/wrap\/action**: Wrap using an HSM key. \
@@ -459,16 +487,19 @@ export declare interface KeyVaultBeginSelectiveKeyRestoreOptions extends KeyVaul
459
487
  * **Microsoft.KeyVault\/managedHsm\/keys\/create**: Create an HSM key. \
460
488
  * **Microsoft.KeyVault\/managedHsm\/keys\/delete**: Delete an HSM key. \
461
489
  * **Microsoft.KeyVault\/managedHsm\/keys\/export\/action**: Export an HSM key. \
490
+ * **Microsoft.KeyVault\/managedHsm\/keys\/release\/action**: Release an HSM key using Secure Key Release. \
462
491
  * **Microsoft.KeyVault\/managedHsm\/keys\/import\/action**: Import an HSM key. \
463
492
  * **Microsoft.KeyVault\/managedHsm\/keys\/deletedKeys\/delete**: Purge a deleted HSM key. \
464
493
  * **Microsoft.KeyVault\/managedHsm\/securitydomain\/download\/action**: Download an HSM security domain. \
494
+ * **Microsoft.KeyVault\/managedHsm\/securitydomain\/download\/read**: Check status of HSM security domain download. \
465
495
  * **Microsoft.KeyVault\/managedHsm\/securitydomain\/upload\/action**: Upload an HSM security domain. \
466
496
  * **Microsoft.KeyVault\/managedHsm\/securitydomain\/upload\/read**: Check the status of the HSM security domain exchange file. \
467
497
  * **Microsoft.KeyVault\/managedHsm\/securitydomain\/transferkey\/read**: Download an HSM security domain transfer key. \
468
498
  * **Microsoft.KeyVault\/managedHsm\/backup\/start\/action**: Start an HSM backup. \
469
499
  * **Microsoft.KeyVault\/managedHsm\/restore\/start\/action**: Start an HSM restore. \
470
500
  * **Microsoft.KeyVault\/managedHsm\/backup\/status\/action**: Read an HSM backup status. \
471
- * **Microsoft.KeyVault\/managedHsm\/restore\/status\/action**: Read an HSM restore status.
501
+ * **Microsoft.KeyVault\/managedHsm\/restore\/status\/action**: Read an HSM restore status. \
502
+ * **Microsoft.KeyVault\/managedHsm\/rng\/action**: Generate random numbers.
472
503
  */
473
504
  export declare type KeyVaultDataAction = string;
474
505
 
@@ -644,6 +675,10 @@ export declare enum KnownKeyVaultDataAction {
644
675
  WriteRoleAssignment = "Microsoft.KeyVault/managedHsm/roleAssignments/write/action",
645
676
  /** Get role definition. */
646
677
  ReadRoleDefinition = "Microsoft.KeyVault/managedHsm/roleDefinitions/read/action",
678
+ /** Create or update role definition. */
679
+ WriteRoleDefinition = "Microsoft.KeyVault/managedHsm/roleDefinitions/write/action",
680
+ /** Delete role definition. */
681
+ DeleteRoleDefinition = "Microsoft.KeyVault/managedHsm/roleDefinitions/delete/action",
647
682
  /** Encrypt using an HSM key. */
648
683
  EncryptHsmKey = "Microsoft.KeyVault/managedHsm/keys/encrypt/action",
649
684
  /** Decrypt using an HSM key. */
@@ -662,12 +697,16 @@ export declare enum KnownKeyVaultDataAction {
662
697
  DeleteHsmKey = "Microsoft.KeyVault/managedHsm/keys/delete",
663
698
  /** Export an HSM key. */
664
699
  ExportHsmKey = "Microsoft.KeyVault/managedHsm/keys/export/action",
700
+ /** Release an HSM key using Secure Key Release. */
701
+ ReleaseKey = "Microsoft.KeyVault/managedHsm/keys/release/action",
665
702
  /** Import an HSM key. */
666
703
  ImportHsmKey = "Microsoft.KeyVault/managedHsm/keys/import/action",
667
704
  /** Purge a deleted HSM key. */
668
705
  PurgeDeletedHsmKey = "Microsoft.KeyVault/managedHsm/keys/deletedKeys/delete",
669
706
  /** Download an HSM security domain. */
670
707
  DownloadHsmSecurityDomain = "Microsoft.KeyVault/managedHsm/securitydomain/download/action",
708
+ /** Check status of HSM security domain download. */
709
+ DownloadHsmSecurityDomainStatus = "Microsoft.KeyVault/managedHsm/securitydomain/download/read",
671
710
  /** Upload an HSM security domain. */
672
711
  UploadHsmSecurityDomain = "Microsoft.KeyVault/managedHsm/securitydomain/upload/action",
673
712
  /** Check the status of the HSM security domain exchange file. */
@@ -681,7 +720,9 @@ export declare enum KnownKeyVaultDataAction {
681
720
  /** Read an HSM backup status. */
682
721
  ReadHsmBackupStatus = "Microsoft.KeyVault/managedHsm/backup/status/action",
683
722
  /** Read an HSM restore status. */
684
- ReadHsmRestoreStatus = "Microsoft.KeyVault/managedHsm/restore/status/action"
723
+ ReadHsmRestoreStatus = "Microsoft.KeyVault/managedHsm/restore/status/action",
724
+ /** Generate random numbers. */
725
+ RandomNumbersGenerate = "Microsoft.KeyVault/managedHsm/rng/action"
685
726
  }
686
727
 
687
728
  /** Known values of {@link RoleScope} that the service accepts. */
@@ -695,7 +736,7 @@ export declare enum KnownKeyVaultRoleScope {
695
736
  /**
696
737
  * The latest supported Key Vault service API version.
697
738
  */
698
- export declare const LATEST_API_VERSION = "7.2";
739
+ export declare const LATEST_API_VERSION = "7.3";
699
740
 
700
741
  /**
701
742
  * An interface representing optional parameters passed to {@link listRoleAssignments}.
@@ -765,6 +806,6 @@ export declare interface SetRoleDefinitionOptions extends OperationOptions {
765
806
  /**
766
807
  * Supported API versions
767
808
  */
768
- export declare type SUPPORTED_API_VERSIONS = "7.2";
809
+ export declare type SUPPORTED_API_VERSIONS = "7.2" | "7.3";
769
810
 
770
811
  export { }