@azure/keyvault-admin 4.7.1-alpha.20250619.1 → 4.7.1-alpha.20250702.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/commonjs/accessControlClient.js.map +1 -1
- package/dist/commonjs/accessControlModels.d.ts +1 -1
- package/dist/commonjs/accessControlModels.d.ts.map +1 -1
- package/dist/commonjs/accessControlModels.js +1 -1
- package/dist/commonjs/accessControlModels.js.map +1 -1
- package/dist/commonjs/backupClient.js +1 -1
- package/dist/commonjs/backupClient.js.map +1 -1
- package/dist/commonjs/backupClientModels.d.ts +1 -1
- package/dist/commonjs/backupClientModels.d.ts.map +1 -1
- package/dist/commonjs/backupClientModels.js.map +1 -1
- package/dist/commonjs/createKeyVaultClient.d.ts +1 -1
- package/dist/commonjs/createKeyVaultClient.d.ts.map +1 -1
- package/dist/commonjs/createKeyVaultClient.js +1 -1
- package/dist/commonjs/createKeyVaultClient.js.map +1 -1
- package/dist/commonjs/generated/src/api/index.d.ts.map +1 -0
- package/dist/commonjs/generated/src/api/index.js.map +1 -0
- package/dist/commonjs/generated/src/api/keyVaultContext.d.ts.map +1 -0
- package/dist/commonjs/generated/src/api/keyVaultContext.js.map +1 -0
- package/dist/commonjs/generated/src/api/operations.d.ts.map +1 -0
- package/dist/commonjs/generated/src/api/operations.js.map +1 -0
- package/dist/commonjs/generated/src/api/options.d.ts.map +1 -0
- package/dist/commonjs/generated/src/api/options.js.map +1 -0
- package/dist/commonjs/generated/src/api/roleAssignments/index.d.ts.map +1 -0
- package/dist/commonjs/generated/src/api/roleAssignments/index.js.map +1 -0
- package/dist/commonjs/generated/src/api/roleAssignments/operations.d.ts.map +1 -0
- package/dist/commonjs/generated/src/api/roleAssignments/operations.js.map +1 -0
- package/dist/commonjs/generated/src/api/roleAssignments/options.d.ts.map +1 -0
- package/dist/commonjs/generated/src/api/roleAssignments/options.js.map +1 -0
- package/dist/commonjs/generated/src/api/roleDefinitions/index.d.ts.map +1 -0
- package/dist/commonjs/generated/src/api/roleDefinitions/index.js.map +1 -0
- package/dist/commonjs/generated/src/api/roleDefinitions/operations.d.ts.map +1 -0
- package/dist/commonjs/generated/src/api/roleDefinitions/operations.js.map +1 -0
- package/dist/commonjs/generated/src/api/roleDefinitions/options.d.ts.map +1 -0
- package/dist/commonjs/generated/src/api/roleDefinitions/options.js.map +1 -0
- package/dist/commonjs/generated/src/classic/index.d.ts.map +1 -0
- package/dist/commonjs/generated/src/classic/index.js.map +1 -0
- package/dist/commonjs/generated/src/classic/roleAssignments/index.d.ts.map +1 -0
- package/dist/commonjs/generated/src/classic/roleAssignments/index.js.map +1 -0
- package/dist/commonjs/generated/src/classic/roleDefinitions/index.d.ts.map +1 -0
- package/dist/commonjs/generated/src/classic/roleDefinitions/index.js.map +1 -0
- package/dist/commonjs/generated/src/index.d.ts.map +1 -0
- package/dist/commonjs/generated/src/index.js.map +1 -0
- package/dist/commonjs/generated/src/keyVaultClient.d.ts.map +1 -0
- package/dist/commonjs/generated/src/keyVaultClient.js.map +1 -0
- package/dist/commonjs/generated/src/logger.d.ts.map +1 -0
- package/dist/commonjs/generated/src/logger.js.map +1 -0
- package/dist/commonjs/generated/src/models/index.d.ts.map +1 -0
- package/dist/commonjs/generated/src/models/index.js.map +1 -0
- package/dist/commonjs/generated/src/models/models.d.ts.map +1 -0
- package/dist/commonjs/generated/src/models/models.js.map +1 -0
- package/dist/commonjs/generated/src/restorePollerHelpers.d.ts.map +1 -0
- package/dist/commonjs/generated/src/restorePollerHelpers.js.map +1 -0
- package/dist/commonjs/generated/src/static-helpers/pagingHelpers.d.ts.map +1 -0
- package/dist/commonjs/generated/src/static-helpers/pagingHelpers.js.map +1 -0
- package/dist/commonjs/generated/src/static-helpers/pollingHelpers.d.ts.map +1 -0
- package/dist/commonjs/generated/src/static-helpers/pollingHelpers.js.map +1 -0
- package/dist/commonjs/generated/src/static-helpers/urlTemplate.d.ts.map +1 -0
- package/dist/commonjs/generated/{static-helpers → src/static-helpers}/urlTemplate.js +1 -1
- package/dist/commonjs/generated/src/static-helpers/urlTemplate.js.map +1 -0
- package/dist/commonjs/lro/models.d.ts +2 -2
- package/dist/commonjs/lro/models.d.ts.map +1 -1
- package/dist/commonjs/lro/models.js.map +1 -1
- package/dist/commonjs/lro/shim.d.ts +1 -1
- package/dist/commonjs/lro/shim.d.ts.map +1 -1
- package/dist/commonjs/lro/shim.js.map +1 -1
- package/dist/commonjs/mappings.d.ts +2 -2
- package/dist/commonjs/mappings.d.ts.map +1 -1
- package/dist/commonjs/mappings.js.map +1 -1
- package/dist/commonjs/settingsClient.js.map +1 -1
- package/dist/esm/accessControlClient.js.map +1 -1
- package/dist/esm/accessControlModels.d.ts +1 -1
- package/dist/esm/accessControlModels.d.ts.map +1 -1
- package/dist/esm/accessControlModels.js +1 -1
- package/dist/esm/accessControlModels.js.map +1 -1
- package/dist/esm/backupClient.js +1 -1
- package/dist/esm/backupClient.js.map +1 -1
- package/dist/esm/backupClientModels.d.ts +1 -1
- package/dist/esm/backupClientModels.d.ts.map +1 -1
- package/dist/esm/backupClientModels.js.map +1 -1
- package/dist/esm/createKeyVaultClient.d.ts +1 -1
- package/dist/esm/createKeyVaultClient.d.ts.map +1 -1
- package/dist/esm/createKeyVaultClient.js +1 -1
- package/dist/esm/createKeyVaultClient.js.map +1 -1
- package/dist/esm/generated/src/api/index.d.ts.map +1 -0
- package/dist/esm/generated/src/api/index.js.map +1 -0
- package/dist/esm/generated/src/api/keyVaultContext.d.ts.map +1 -0
- package/dist/esm/generated/src/api/keyVaultContext.js.map +1 -0
- package/dist/esm/generated/src/api/operations.d.ts.map +1 -0
- package/dist/esm/generated/src/api/operations.js.map +1 -0
- package/dist/esm/generated/src/api/options.d.ts.map +1 -0
- package/dist/esm/generated/src/api/options.js.map +1 -0
- package/dist/esm/generated/src/api/roleAssignments/index.d.ts.map +1 -0
- package/dist/esm/generated/src/api/roleAssignments/index.js.map +1 -0
- package/dist/esm/generated/src/api/roleAssignments/operations.d.ts.map +1 -0
- package/dist/esm/generated/src/api/roleAssignments/operations.js.map +1 -0
- package/dist/esm/generated/src/api/roleAssignments/options.d.ts.map +1 -0
- package/dist/esm/generated/src/api/roleAssignments/options.js.map +1 -0
- package/dist/esm/generated/src/api/roleDefinitions/index.d.ts.map +1 -0
- package/dist/esm/generated/src/api/roleDefinitions/index.js.map +1 -0
- package/dist/esm/generated/src/api/roleDefinitions/operations.d.ts.map +1 -0
- package/dist/esm/generated/src/api/roleDefinitions/operations.js.map +1 -0
- package/dist/esm/generated/src/api/roleDefinitions/options.d.ts.map +1 -0
- package/dist/esm/generated/src/api/roleDefinitions/options.js.map +1 -0
- package/dist/esm/generated/src/classic/index.d.ts.map +1 -0
- package/dist/esm/generated/src/classic/index.js.map +1 -0
- package/dist/esm/generated/src/classic/roleAssignments/index.d.ts.map +1 -0
- package/dist/esm/generated/src/classic/roleAssignments/index.js.map +1 -0
- package/dist/esm/generated/src/classic/roleDefinitions/index.d.ts.map +1 -0
- package/dist/esm/generated/src/classic/roleDefinitions/index.js.map +1 -0
- package/dist/esm/generated/src/index.d.ts.map +1 -0
- package/dist/esm/generated/src/index.js.map +1 -0
- package/dist/esm/generated/src/keyVaultClient.d.ts.map +1 -0
- package/dist/esm/generated/src/keyVaultClient.js.map +1 -0
- package/dist/esm/generated/src/logger.d.ts.map +1 -0
- package/dist/esm/generated/src/logger.js.map +1 -0
- package/dist/esm/generated/src/models/index.d.ts.map +1 -0
- package/dist/esm/generated/src/models/index.js.map +1 -0
- package/dist/esm/generated/src/models/models.d.ts.map +1 -0
- package/dist/esm/generated/src/models/models.js.map +1 -0
- package/dist/esm/generated/src/restorePollerHelpers.d.ts.map +1 -0
- package/dist/esm/generated/src/restorePollerHelpers.js.map +1 -0
- package/dist/esm/generated/src/static-helpers/pagingHelpers.d.ts.map +1 -0
- package/dist/esm/generated/src/static-helpers/pagingHelpers.js.map +1 -0
- package/dist/esm/generated/src/static-helpers/pollingHelpers.d.ts.map +1 -0
- package/dist/esm/generated/src/static-helpers/pollingHelpers.js.map +1 -0
- package/dist/esm/generated/src/static-helpers/urlTemplate.d.ts.map +1 -0
- package/dist/esm/generated/{static-helpers → src/static-helpers}/urlTemplate.js +1 -1
- package/dist/esm/generated/src/static-helpers/urlTemplate.js.map +1 -0
- package/dist/esm/lro/models.d.ts +2 -2
- package/dist/esm/lro/models.d.ts.map +1 -1
- package/dist/esm/lro/models.js.map +1 -1
- package/dist/esm/lro/shim.d.ts +1 -1
- package/dist/esm/lro/shim.d.ts.map +1 -1
- package/dist/esm/lro/shim.js.map +1 -1
- package/dist/esm/mappings.d.ts +2 -2
- package/dist/esm/mappings.d.ts.map +1 -1
- package/dist/esm/mappings.js.map +1 -1
- package/dist/esm/settingsClient.js.map +1 -1
- package/package.json +2 -2
- package/dist/commonjs/generated/api/index.d.ts.map +0 -1
- package/dist/commonjs/generated/api/index.js.map +0 -1
- package/dist/commonjs/generated/api/keyVaultContext.d.ts.map +0 -1
- package/dist/commonjs/generated/api/keyVaultContext.js.map +0 -1
- package/dist/commonjs/generated/api/operations.d.ts.map +0 -1
- package/dist/commonjs/generated/api/operations.js.map +0 -1
- package/dist/commonjs/generated/api/options.d.ts.map +0 -1
- package/dist/commonjs/generated/api/options.js.map +0 -1
- package/dist/commonjs/generated/api/roleAssignments/index.d.ts.map +0 -1
- package/dist/commonjs/generated/api/roleAssignments/index.js.map +0 -1
- package/dist/commonjs/generated/api/roleAssignments/operations.d.ts.map +0 -1
- package/dist/commonjs/generated/api/roleAssignments/operations.js.map +0 -1
- package/dist/commonjs/generated/api/roleAssignments/options.d.ts.map +0 -1
- package/dist/commonjs/generated/api/roleAssignments/options.js.map +0 -1
- package/dist/commonjs/generated/api/roleDefinitions/index.d.ts.map +0 -1
- package/dist/commonjs/generated/api/roleDefinitions/index.js.map +0 -1
- package/dist/commonjs/generated/api/roleDefinitions/operations.d.ts.map +0 -1
- package/dist/commonjs/generated/api/roleDefinitions/operations.js.map +0 -1
- package/dist/commonjs/generated/api/roleDefinitions/options.d.ts.map +0 -1
- package/dist/commonjs/generated/api/roleDefinitions/options.js.map +0 -1
- package/dist/commonjs/generated/classic/index.d.ts.map +0 -1
- package/dist/commonjs/generated/classic/index.js.map +0 -1
- package/dist/commonjs/generated/classic/roleAssignments/index.d.ts.map +0 -1
- package/dist/commonjs/generated/classic/roleAssignments/index.js.map +0 -1
- package/dist/commonjs/generated/classic/roleDefinitions/index.d.ts.map +0 -1
- package/dist/commonjs/generated/classic/roleDefinitions/index.js.map +0 -1
- package/dist/commonjs/generated/index.d.ts.map +0 -1
- package/dist/commonjs/generated/index.js.map +0 -1
- package/dist/commonjs/generated/keyVaultClient.d.ts.map +0 -1
- package/dist/commonjs/generated/keyVaultClient.js.map +0 -1
- package/dist/commonjs/generated/logger.d.ts.map +0 -1
- package/dist/commonjs/generated/logger.js.map +0 -1
- package/dist/commonjs/generated/models/index.d.ts.map +0 -1
- package/dist/commonjs/generated/models/index.js.map +0 -1
- package/dist/commonjs/generated/models/models.d.ts.map +0 -1
- package/dist/commonjs/generated/models/models.js.map +0 -1
- package/dist/commonjs/generated/restorePollerHelpers.d.ts.map +0 -1
- package/dist/commonjs/generated/restorePollerHelpers.js.map +0 -1
- package/dist/commonjs/generated/static-helpers/pagingHelpers.d.ts.map +0 -1
- package/dist/commonjs/generated/static-helpers/pagingHelpers.js.map +0 -1
- package/dist/commonjs/generated/static-helpers/pollingHelpers.d.ts.map +0 -1
- package/dist/commonjs/generated/static-helpers/pollingHelpers.js.map +0 -1
- package/dist/commonjs/generated/static-helpers/urlTemplate.d.ts.map +0 -1
- package/dist/commonjs/generated/static-helpers/urlTemplate.js.map +0 -1
- package/dist/esm/generated/api/index.d.ts.map +0 -1
- package/dist/esm/generated/api/index.js.map +0 -1
- package/dist/esm/generated/api/keyVaultContext.d.ts.map +0 -1
- package/dist/esm/generated/api/keyVaultContext.js.map +0 -1
- package/dist/esm/generated/api/operations.d.ts.map +0 -1
- package/dist/esm/generated/api/operations.js.map +0 -1
- package/dist/esm/generated/api/options.d.ts.map +0 -1
- package/dist/esm/generated/api/options.js.map +0 -1
- package/dist/esm/generated/api/roleAssignments/index.d.ts.map +0 -1
- package/dist/esm/generated/api/roleAssignments/index.js.map +0 -1
- package/dist/esm/generated/api/roleAssignments/operations.d.ts.map +0 -1
- package/dist/esm/generated/api/roleAssignments/operations.js.map +0 -1
- package/dist/esm/generated/api/roleAssignments/options.d.ts.map +0 -1
- package/dist/esm/generated/api/roleAssignments/options.js.map +0 -1
- package/dist/esm/generated/api/roleDefinitions/index.d.ts.map +0 -1
- package/dist/esm/generated/api/roleDefinitions/index.js.map +0 -1
- package/dist/esm/generated/api/roleDefinitions/operations.d.ts.map +0 -1
- package/dist/esm/generated/api/roleDefinitions/operations.js.map +0 -1
- package/dist/esm/generated/api/roleDefinitions/options.d.ts.map +0 -1
- package/dist/esm/generated/api/roleDefinitions/options.js.map +0 -1
- package/dist/esm/generated/classic/index.d.ts.map +0 -1
- package/dist/esm/generated/classic/index.js.map +0 -1
- package/dist/esm/generated/classic/roleAssignments/index.d.ts.map +0 -1
- package/dist/esm/generated/classic/roleAssignments/index.js.map +0 -1
- package/dist/esm/generated/classic/roleDefinitions/index.d.ts.map +0 -1
- package/dist/esm/generated/classic/roleDefinitions/index.js.map +0 -1
- package/dist/esm/generated/index.d.ts.map +0 -1
- package/dist/esm/generated/index.js.map +0 -1
- package/dist/esm/generated/keyVaultClient.d.ts.map +0 -1
- package/dist/esm/generated/keyVaultClient.js.map +0 -1
- package/dist/esm/generated/logger.d.ts.map +0 -1
- package/dist/esm/generated/logger.js.map +0 -1
- package/dist/esm/generated/models/index.d.ts.map +0 -1
- package/dist/esm/generated/models/index.js.map +0 -1
- package/dist/esm/generated/models/models.d.ts.map +0 -1
- package/dist/esm/generated/models/models.js.map +0 -1
- package/dist/esm/generated/restorePollerHelpers.d.ts.map +0 -1
- package/dist/esm/generated/restorePollerHelpers.js.map +0 -1
- package/dist/esm/generated/static-helpers/pagingHelpers.d.ts.map +0 -1
- package/dist/esm/generated/static-helpers/pagingHelpers.js.map +0 -1
- package/dist/esm/generated/static-helpers/pollingHelpers.d.ts.map +0 -1
- package/dist/esm/generated/static-helpers/pollingHelpers.js.map +0 -1
- package/dist/esm/generated/static-helpers/urlTemplate.d.ts.map +0 -1
- package/dist/esm/generated/static-helpers/urlTemplate.js.map +0 -1
- /package/dist/commonjs/generated/{api → src/api}/index.d.ts +0 -0
- /package/dist/commonjs/generated/{api → src/api}/index.js +0 -0
- /package/dist/commonjs/generated/{api → src/api}/keyVaultContext.d.ts +0 -0
- /package/dist/commonjs/generated/{api → src/api}/keyVaultContext.js +0 -0
- /package/dist/commonjs/generated/{api → src/api}/operations.d.ts +0 -0
- /package/dist/commonjs/generated/{api → src/api}/operations.js +0 -0
- /package/dist/commonjs/generated/{api → src/api}/options.d.ts +0 -0
- /package/dist/commonjs/generated/{api → src/api}/options.js +0 -0
- /package/dist/commonjs/generated/{api → src/api}/roleAssignments/index.d.ts +0 -0
- /package/dist/commonjs/generated/{api → src/api}/roleAssignments/index.js +0 -0
- /package/dist/commonjs/generated/{api → src/api}/roleAssignments/operations.d.ts +0 -0
- /package/dist/commonjs/generated/{api → src/api}/roleAssignments/operations.js +0 -0
- /package/dist/commonjs/generated/{api → src/api}/roleAssignments/options.d.ts +0 -0
- /package/dist/commonjs/generated/{api → src/api}/roleAssignments/options.js +0 -0
- /package/dist/commonjs/generated/{api → src/api}/roleDefinitions/index.d.ts +0 -0
- /package/dist/commonjs/generated/{api → src/api}/roleDefinitions/index.js +0 -0
- /package/dist/commonjs/generated/{api → src/api}/roleDefinitions/operations.d.ts +0 -0
- /package/dist/commonjs/generated/{api → src/api}/roleDefinitions/operations.js +0 -0
- /package/dist/commonjs/generated/{api → src/api}/roleDefinitions/options.d.ts +0 -0
- /package/dist/commonjs/generated/{api → src/api}/roleDefinitions/options.js +0 -0
- /package/dist/commonjs/generated/{classic → src/classic}/index.d.ts +0 -0
- /package/dist/commonjs/generated/{classic → src/classic}/index.js +0 -0
- /package/dist/commonjs/generated/{classic → src/classic}/roleAssignments/index.d.ts +0 -0
- /package/dist/commonjs/generated/{classic → src/classic}/roleAssignments/index.js +0 -0
- /package/dist/commonjs/generated/{classic → src/classic}/roleDefinitions/index.d.ts +0 -0
- /package/dist/commonjs/generated/{classic → src/classic}/roleDefinitions/index.js +0 -0
- /package/dist/commonjs/generated/{index.d.ts → src/index.d.ts} +0 -0
- /package/dist/commonjs/generated/{index.js → src/index.js} +0 -0
- /package/dist/commonjs/generated/{keyVaultClient.d.ts → src/keyVaultClient.d.ts} +0 -0
- /package/dist/commonjs/generated/{keyVaultClient.js → src/keyVaultClient.js} +0 -0
- /package/dist/commonjs/generated/{logger.d.ts → src/logger.d.ts} +0 -0
- /package/dist/commonjs/generated/{logger.js → src/logger.js} +0 -0
- /package/dist/commonjs/generated/{models → src/models}/index.d.ts +0 -0
- /package/dist/commonjs/generated/{models → src/models}/index.js +0 -0
- /package/dist/commonjs/generated/{models → src/models}/models.d.ts +0 -0
- /package/dist/commonjs/generated/{models → src/models}/models.js +0 -0
- /package/dist/commonjs/generated/{restorePollerHelpers.d.ts → src/restorePollerHelpers.d.ts} +0 -0
- /package/dist/commonjs/generated/{restorePollerHelpers.js → src/restorePollerHelpers.js} +0 -0
- /package/dist/commonjs/generated/{static-helpers → src/static-helpers}/pagingHelpers.d.ts +0 -0
- /package/dist/commonjs/generated/{static-helpers → src/static-helpers}/pagingHelpers.js +0 -0
- /package/dist/commonjs/generated/{static-helpers → src/static-helpers}/pollingHelpers.d.ts +0 -0
- /package/dist/commonjs/generated/{static-helpers → src/static-helpers}/pollingHelpers.js +0 -0
- /package/dist/commonjs/generated/{static-helpers → src/static-helpers}/urlTemplate.d.ts +0 -0
- /package/dist/esm/generated/{api → src/api}/index.d.ts +0 -0
- /package/dist/esm/generated/{api → src/api}/index.js +0 -0
- /package/dist/esm/generated/{api → src/api}/keyVaultContext.d.ts +0 -0
- /package/dist/esm/generated/{api → src/api}/keyVaultContext.js +0 -0
- /package/dist/esm/generated/{api → src/api}/operations.d.ts +0 -0
- /package/dist/esm/generated/{api → src/api}/operations.js +0 -0
- /package/dist/esm/generated/{api → src/api}/options.d.ts +0 -0
- /package/dist/esm/generated/{api → src/api}/options.js +0 -0
- /package/dist/esm/generated/{api → src/api}/roleAssignments/index.d.ts +0 -0
- /package/dist/esm/generated/{api → src/api}/roleAssignments/index.js +0 -0
- /package/dist/esm/generated/{api → src/api}/roleAssignments/operations.d.ts +0 -0
- /package/dist/esm/generated/{api → src/api}/roleAssignments/operations.js +0 -0
- /package/dist/esm/generated/{api → src/api}/roleAssignments/options.d.ts +0 -0
- /package/dist/esm/generated/{api → src/api}/roleAssignments/options.js +0 -0
- /package/dist/esm/generated/{api → src/api}/roleDefinitions/index.d.ts +0 -0
- /package/dist/esm/generated/{api → src/api}/roleDefinitions/index.js +0 -0
- /package/dist/esm/generated/{api → src/api}/roleDefinitions/operations.d.ts +0 -0
- /package/dist/esm/generated/{api → src/api}/roleDefinitions/operations.js +0 -0
- /package/dist/esm/generated/{api → src/api}/roleDefinitions/options.d.ts +0 -0
- /package/dist/esm/generated/{api → src/api}/roleDefinitions/options.js +0 -0
- /package/dist/esm/generated/{classic → src/classic}/index.d.ts +0 -0
- /package/dist/esm/generated/{classic → src/classic}/index.js +0 -0
- /package/dist/esm/generated/{classic → src/classic}/roleAssignments/index.d.ts +0 -0
- /package/dist/esm/generated/{classic → src/classic}/roleAssignments/index.js +0 -0
- /package/dist/esm/generated/{classic → src/classic}/roleDefinitions/index.d.ts +0 -0
- /package/dist/esm/generated/{classic → src/classic}/roleDefinitions/index.js +0 -0
- /package/dist/esm/generated/{index.d.ts → src/index.d.ts} +0 -0
- /package/dist/esm/generated/{index.js → src/index.js} +0 -0
- /package/dist/esm/generated/{keyVaultClient.d.ts → src/keyVaultClient.d.ts} +0 -0
- /package/dist/esm/generated/{keyVaultClient.js → src/keyVaultClient.js} +0 -0
- /package/dist/esm/generated/{logger.d.ts → src/logger.d.ts} +0 -0
- /package/dist/esm/generated/{logger.js → src/logger.js} +0 -0
- /package/dist/esm/generated/{models → src/models}/index.d.ts +0 -0
- /package/dist/esm/generated/{models → src/models}/index.js +0 -0
- /package/dist/esm/generated/{models → src/models}/models.d.ts +0 -0
- /package/dist/esm/generated/{models → src/models}/models.js +0 -0
- /package/dist/esm/generated/{restorePollerHelpers.d.ts → src/restorePollerHelpers.d.ts} +0 -0
- /package/dist/esm/generated/{restorePollerHelpers.js → src/restorePollerHelpers.js} +0 -0
- /package/dist/esm/generated/{static-helpers → src/static-helpers}/pagingHelpers.d.ts +0 -0
- /package/dist/esm/generated/{static-helpers → src/static-helpers}/pagingHelpers.js +0 -0
- /package/dist/esm/generated/{static-helpers → src/static-helpers}/pollingHelpers.d.ts +0 -0
- /package/dist/esm/generated/{static-helpers → src/static-helpers}/pollingHelpers.js +0 -0
- /package/dist/esm/generated/{static-helpers → src/static-helpers}/urlTemplate.d.ts +0 -0
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"accessControlClient.js","sourceRoot":"","sources":["../../src/accessControlClient.ts"],"names":[],"mappings":";AAAA,uCAAuC;AACvC,kCAAkC;AAClC,4CAA4C;;;AAmB5C,+CAAgE;AAChE,6CAA6C;AAC7C,gDAA8C;AAC9C,uEAAiE;AAEjE;;;;GAIG;AACH,MAAa,2BAA2B;IAWtC;;;;;;;;;;;;;;;OAeG;IACH,YACE,QAAgB,EAChB,UAA2B;IAC3B,8DAA8D;IAC9D,UAAsC,EAAE;QAExC,IAAI,CAAC,QAAQ,GAAG,QAAQ,CAAC;QAEzB,IAAI,CAAC,MAAM,GAAG,IAAA,8CAAoB,EAAC,QAAQ,EAAE,UAAU,EAAE,OAAO,CAAC,CAAC;IACpE,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA4BG;IACI,oBAAoB,CACzB,SAA4B,EAC5B,IAAY,EACZ,gBAAwB,EACxB,WAAmB,EACnB,UAAuC,EAAE;QAEzC,OAAO,0BAAa,CAAC,QAAQ,CAC3B,kDAAkD,EAClD,OAAO,EACP,KAAK,EAAE,cAAc,EAAE,EAAE;YACvB,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,eAAe,CAAC,MAAM,CACvD,SAAS,EACT,IAAI,EACJ;gBACE,UAAU,EAAE;oBACV,gBAAgB;oBAChB,WAAW;iBACZ;aACF,EACD,cAAc,CACf,CAAC;YACF,OAAO,sBAAQ,CAAC,cAAc,CAAC,iBAAiB,CAAC,QAAQ,CAAC,CAAC;QAC7D,CAAC,CACF,CAAC;IACJ,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA4BG;IACI,oBAAoB,CACzB,SAA4B,EAC5B,IAAY,EACZ,UAAuC,EAAE;QAEzC,OAAO,0BAAa,CAAC,QAAQ,CAC3B,kDAAkD,EAClD,OAAO,EACP,KAAK,EAAE,cAAc,EAAE,EAAE;YACvB,IAAI,CAAC;gBACH,MAAM,IAAI,CAAC,MAAM,CAAC,eAAe,CAAC,MAAM,CAAC,SAAS,EAAE,IAAI,EAAE,cAAc,CAAC,CAAC;YAC5E,CAAC;YAAC,OAAO,GAAQ,EAAE,CAAC;gBAClB,oEAAoE;gBACpE,IAAI,GAAG,CAAC,UAAU,KAAK,GAAG,EAAE,CAAC;oBAC3B,MAAM,GAAG,CAAC;gBACZ,CAAC;YACH,CAAC;QACH,CAAC,CACF,CAAC;IACJ,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OAgCG;IACI,iBAAiB,CACtB,SAA4B,EAC5B,IAAY,EACZ,UAAoC,EAAE;QAEtC,OAAO,0BAAa,CAAC,QAAQ,CAC3B,+CAA+C,EAC/C,OAAO,EACP,KAAK,EAAE,cAAc,EAAE,EAAE;YACvB,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,eAAe,CAAC,GAAG,CAAC,SAAS,EAAE,IAAI,EAAE,cAAc,CAAC,CAAC;YACxF,OAAO,sBAAQ,CAAC,cAAc,CAAC,iBAAiB,CAAC,QAAQ,CAAC,CAAC;QAC7D,CAAC,CACF,CAAC;IACJ,CAAC;IAED;;;;;;;;;;;;;;;;;;;OAmBG;IACI,mBAAmB,CACxB,SAA4B,EAC5B,UAAsC,EAAE;QAExC,OAAO,IAAA,mCAAqB,EAC1B,OAAO,EACP,CAAC,aAAa,EAAE,EAAE,CAAC,IAAI,CAAC,MAAM,CAAC,eAAe,CAAC,YAAY,CAAC,SAAS,EAAE,aAAa,CAAC,EACrF,sBAAQ,CAAC,cAAc,CAAC,iBAAiB,CAC1C,CAAC;IACJ,CAAC;IAED;;;;;;;;;;;;;;;;;;;OAmBG;IACI,mBAAmB,CACxB,SAA4B,EAC5B,UAAsC,EAAE;QAExC,OAAO,IAAA,mCAAqB,EAC1B,OAAO,EACP,CAAC,aAAa,EAAE,EAAE,CAAC,IAAI,CAAC,MAAM,CAAC,eAAe,CAAC,IAAI,CAAC,SAAS,EAAE,aAAa,CAAC,EAC7E,sBAAQ,CAAC,cAAc,CAAC,iBAAiB,CAC1C,CAAC;IACJ,CAAC;IAED;;;;;;;;;;;;;;;;;;OAkBG;IACI,iBAAiB,CACtB,SAA4B,EAC5B,IAAY,EACZ,UAAoC,EAAE;QAEtC,OAAO,0BAAa,CAAC,QAAQ,CAC3B,+CAA+C,EAC/C,OAAO,EACP,KAAK,EAAE,cAAc,EAAE,EAAE;YACvB,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,eAAe,CAAC,GAAG,CAAC,SAAS,EAAE,IAAI,EAAE,cAAc,CAAC,CAAC;YACxF,OAAO,sBAAQ,CAAC,cAAc,CAAC,iBAAiB,CAAC,QAAQ,CAAC,CAAC;QAC7D,CAAC,CACF,CAAC;IACJ,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;;;;;OA0BG;IACI,iBAAiB,CACtB,SAA4B,EAC5B,UAAoC,EAAE;QAEtC,OAAO,0BAAa,CAAC,QAAQ,CAC3B,+CAA+C,EAC/C,OAAO,EACP,KAAK,EAAE,cAAc,EAAE,EAAE;YACvB,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,eAAe,CAAC,cAAc,CAC/D,SAAS,EACT,OAAO,CAAC,kBAAkB,IAAI,IAAA,sBAAU,GAAE,EAC1C;gBACE,UAAU,EAAE;oBACV,WAAW,EAAE,OAAO,CAAC,WAAW;oBAChC,WAAW,EAAE,OAAO,CAAC,WAAW;oBAChC,gBAAgB,EAAE,CAAC,SAAS,CAAC;oBAC7B,QAAQ,EAAE,OAAO,CAAC,QAAQ;oBAC1B,QAAQ,EAAE,YAAY;iBACvB;aACF,EACD,cAAc,CACf,CAAC;YACF,OAAO,sBAAQ,CAAC,cAAc,CAAC,iBAAiB,CAAC,QAAQ,CAAC,CAAC;QAC7D,CAAC,CACF,CAAC;IACJ,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA4BG;IACI,oBAAoB,CACzB,SAA4B,EAC5B,IAAY,EACZ,UAAuC,EAAE;QAEzC,OAAO,0BAAa,CAAC,QAAQ,CAC3B,kDAAkD,EAClD,OAAO,EACP,KAAK,EAAE,cAAc,EAAE,EAAE;YACvB,IAAI,CAAC;gBACH,MAAM,IAAI,CAAC,MAAM,CAAC,eAAe,CAAC,MAAM,CAAC,SAAS,EAAE,IAAI,EAAE,cAAc,CAAC,CAAC;YAC5E,CAAC;YAAC,OAAO,GAAQ,EAAE,CAAC;gBAClB,oEAAoE;gBACpE,IAAI,GAAG,CAAC,UAAU,KAAK,GAAG,EAAE,CAAC;oBAC3B,MAAM,GAAG,CAAC;gBACZ,CAAC;YACH,CAAC;QACH,CAAC,CACF,CAAC;IACJ,CAAC;CACF;AAvYD,kEAuYC","sourcesContent":["// Copyright (c) Microsoft Corporation.\n// Licensed under the MIT License.\n/// <reference lib=\"esnext.asynciterable\" />\n\nimport type {\n AccessControlClientOptions,\n CreateRoleAssignmentOptions,\n DeleteRoleAssignmentOptions,\n DeleteRoleDefinitionOptions,\n GetRoleAssignmentOptions,\n GetRoleDefinitionOptions,\n KeyVaultRoleAssignment,\n KeyVaultRoleDefinition,\n KeyVaultRoleScope,\n ListRoleAssignmentsOptions,\n ListRoleDefinitionsOptions,\n SetRoleDefinitionOptions,\n} from \"./accessControlModels.js\";\nimport type { KeyVaultClient } from \"./generated/keyVaultClient.js\";\nimport type { PagedAsyncIterableIterator } from \"@azure/core-paging\";\nimport type { TokenCredential } from \"@azure/core-auth\";\nimport { mapPagedAsyncIterable, mappings } from \"./mappings.js\";\nimport { tracingClient } from \"./tracing.js\";\nimport { randomUUID } from \"@azure/core-util\";\nimport { createKeyVaultClient } from \"./createKeyVaultClient.js\";\n\n/**\n * The KeyVaultAccessControlClient provides methods to manage\n * access control and role assignments in any given Azure Key Vault instance.\n * The client supports creating, retrieving and deleting roles.\n */\nexport class KeyVaultAccessControlClient {\n /**\n * The base URL to the vault\n */\n public readonly vaultUrl: string;\n\n /**\n * A reference to the auto-generated Key Vault HTTP client.\n */\n private readonly client: KeyVaultClient;\n\n /**\n * Creates an instance of the KeyVaultAccessControlClient.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleCreateAccessControlClient\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultAccessControlClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultAccessControlClient(vaultUrl, credentials);\n * ```\n * @param vaultUrl - the URL of the Key Vault. It should have this shape: `https://${your-key-vault-name}.vault.azure.net`. You should validate that this URL references a valid Key Vault or Managed HSM resource. See https://aka.ms/azsdk/blog/vault-uri for details.\n * @param credential - An object that implements the `TokenCredential` interface used to authenticate requests to the service. Use the \\@azure/identity package to create a credential that suits your needs.\n * @param options - Options used to configure Key Vault API requests. Omit this parameter to use the default configuration.\n */\n constructor(\n vaultUrl: string,\n credential: TokenCredential,\n // eslint-disable-next-line @azure/azure-sdk/ts-naming-options\n options: AccessControlClientOptions = {},\n ) {\n this.vaultUrl = vaultUrl;\n\n this.client = createKeyVaultClient(vaultUrl, credential, options);\n }\n\n /**\n * Creates a role assignment in an Azure Key Vault.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleCreateRoleAssignment\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultAccessControlClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultAccessControlClient(vaultUrl, credentials);\n *\n * const { value: roleDefinition } = await client.listRoleDefinitions(\"/\").next();\n *\n * const principalId = \"4871f6a6-374f-4b6b-8b0c-f5d84db823f6\";\n * const result = await client.createRoleAssignment(\n * \"/\",\n * \"295c179b-9ad3-4117-99cd-b1aa66cf4517\",\n * roleDefinition.id,\n * principalId,\n * );\n * ```\n * Creates a new role assignment.\n * @param roleScope - The scope of the role assignment.\n * @param name - The name of the role assignment. Must be a UUID.\n * @param roleDefinitionId - The role definition ID used in the role assignment.\n * @param principalId - The principal ID assigned to the role. This maps to the ID inside the Active Directory. It can point to a user, service principal, or security group.\n * @param options - The optional parameters.\n */\n public createRoleAssignment(\n roleScope: KeyVaultRoleScope,\n name: string,\n roleDefinitionId: string,\n principalId: string,\n options: CreateRoleAssignmentOptions = {},\n ): Promise<KeyVaultRoleAssignment> {\n return tracingClient.withSpan(\n \"KeyVaultAccessControlClient.createRoleAssignment\",\n options,\n async (updatedOptions) => {\n const response = await this.client.roleAssignments.create(\n roleScope,\n name,\n {\n properties: {\n roleDefinitionId,\n principalId,\n },\n },\n updatedOptions,\n );\n return mappings.roleAssignment.generatedToPublic(response);\n },\n );\n }\n\n /**\n * Deletes role assignments previously created in an Azure Key Vault.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleDeleteRoleAssignment\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultAccessControlClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultAccessControlClient(vaultUrl, credentials);\n *\n * const { value: roleDefinition } = await client.listRoleDefinitions(\"/\").next();\n * const principalId = \"4871f6a6-374f-4b6b-8b0c-f5d84db823f6\";\n *\n * const roleAssignment = await client.createRoleAssignment(\n * \"/\",\n * \"295c179b-9ad3-4117-99cd-b1aa66cf4517\",\n * roleDefinition.id,\n * principalId,\n * );\n *\n * await client.deleteRoleAssignment(roleAssignment.properties.scope, roleAssignment.name);\n * ```\n * Deletes an existing role assignment.\n * @param roleScope - The scope of the role assignment.\n * @param name - The name of the role assignment.\n * @param options - The optional parameters.\n */\n public deleteRoleAssignment(\n roleScope: KeyVaultRoleScope,\n name: string,\n options: DeleteRoleAssignmentOptions = {},\n ): Promise<void> {\n return tracingClient.withSpan(\n \"KeyVaultAccessControlClient.deleteRoleAssignment\",\n options,\n async (updatedOptions) => {\n try {\n await this.client.roleAssignments.delete(roleScope, name, updatedOptions);\n } catch (err: any) {\n // If the role assignment doesn't exist, we can consider it deleted.\n if (err.statusCode !== 404) {\n throw err;\n }\n }\n },\n );\n }\n\n /**\n * Gets a role assignments previously created in an Azure Key Vault.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleGetRoleAssignment\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultAccessControlClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultAccessControlClient(vaultUrl, credentials);\n *\n * const { value: roleDefinition } = await client.listRoleDefinitions(\"/\").next();\n * const principalId = \"4871f6a6-374f-4b6b-8b0c-f5d84db823f6\";\n *\n * let roleAssignment = await client.createRoleAssignment(\n * \"/\",\n * \"295c179b-9ad3-4117-99cd-b1aa66cf4517\",\n * roleDefinition.id,\n * principalId,\n * );\n *\n * roleAssignment = await client.getRoleAssignment(\n * roleAssignment.properties.scope,\n * roleAssignment.name,\n * );\n * console.log(roleAssignment);\n * ```\n * Gets an existing role assignment.\n * @param roleScope - The scope of the role assignment.\n * @param name - The name of the role assignment.\n * @param options - The optional parameters.\n */\n public getRoleAssignment(\n roleScope: KeyVaultRoleScope,\n name: string,\n options: GetRoleAssignmentOptions = {},\n ): Promise<KeyVaultRoleAssignment> {\n return tracingClient.withSpan(\n \"KeyVaultAccessControlClient.getRoleAssignment\",\n options,\n async (updatedOptions) => {\n const response = await this.client.roleAssignments.get(roleScope, name, updatedOptions);\n return mappings.roleAssignment.generatedToPublic(response);\n },\n );\n }\n\n /**\n * Iterates over all of the available role assignments in an Azure Key Vault.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleListRoleAssignments\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultAccessControlClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultAccessControlClient(vaultUrl, credentials);\n *\n * for await (const roleAssignment of client.listRoleAssignments(\"/\")) {\n * console.log(\"Role assignment: \", roleAssignment);\n * }\n * ```\n * Lists all of the role assignments in a given scope.\n * @param roleScope - The scope of the role assignments.\n * @param options - The optional parameters.\n */\n public listRoleAssignments(\n roleScope: KeyVaultRoleScope,\n options: ListRoleAssignmentsOptions = {},\n ): PagedAsyncIterableIterator<KeyVaultRoleAssignment> {\n return mapPagedAsyncIterable(\n options,\n (mappedOptions) => this.client.roleAssignments.listForScope(roleScope, mappedOptions),\n mappings.roleAssignment.generatedToPublic,\n );\n }\n\n /**\n * Iterates over all of the available role definitions in an Azure Key Vault.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleListRoleDefinitions\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultAccessControlClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultAccessControlClient(vaultUrl, credentials);\n *\n * for await (const roleDefinitions of client.listRoleDefinitions(\"/\")) {\n * console.log(\"Role definition: \", roleDefinitions);\n * }\n * ```\n * Lists all of the role definition in a given scope.\n * @param roleScope - The scope of the role definition.\n * @param options - The optional parameters.\n */\n public listRoleDefinitions(\n roleScope: KeyVaultRoleScope,\n options: ListRoleDefinitionsOptions = {},\n ): PagedAsyncIterableIterator<KeyVaultRoleDefinition> {\n return mapPagedAsyncIterable(\n options,\n (mappedOptions) => this.client.roleDefinitions.list(roleScope, mappedOptions),\n mappings.roleDefinition.generatedToPublic,\n );\n }\n\n /**\n * Gets a role definition from Azure Key Vault.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleGetRoleDefinition\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultAccessControlClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultAccessControlClient(vaultUrl, credentials);\n *\n * const roleDefinition = await client.getRoleDefinition(\"/\", \"b86a8fe4-44ce-4948-aee5-eccb2c155cd7\");\n * console.log(roleDefinition);\n * ```\n * @param roleScope - The scope of the role definition.\n * @param name - The name of the role definition.\n * @param options - The optional parameters.\n */\n public getRoleDefinition(\n roleScope: KeyVaultRoleScope,\n name: string,\n options: GetRoleDefinitionOptions = {},\n ): Promise<KeyVaultRoleDefinition> {\n return tracingClient.withSpan(\n \"KeyVaultAccessControlClient.getRoleDefinition\",\n options,\n async (updatedOptions) => {\n const response = await this.client.roleDefinitions.get(roleScope, name, updatedOptions);\n return mappings.roleDefinition.generatedToPublic(response);\n },\n );\n }\n\n /**\n * Creates or updates a role definition in an Azure Key Vault.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleSetRoleDefinition\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import {\n * KeyVaultAccessControlClient,\n * KnownKeyVaultDataAction,\n * KnownKeyVaultRoleScope,\n * } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultAccessControlClient(vaultUrl, credentials);\n *\n * const permissions = [{ dataActions: [KnownKeyVaultDataAction.BackupHsmKeys] }];\n * const roleDefinitionName = \"23b8bb1a-39c0-4c89-a85b-dd3c99273a8a\";\n * const roleDefinition = await client.setRoleDefinition(KnownKeyVaultRoleScope.Global, {\n * permissions,\n * roleDefinitionName,\n * });\n * console.log(roleDefinition);\n * ```\n * @param roleScope - The scope of the role definition.\n * @param options - The optional parameters.\n */\n public setRoleDefinition(\n roleScope: KeyVaultRoleScope,\n options: SetRoleDefinitionOptions = {},\n ): Promise<KeyVaultRoleDefinition> {\n return tracingClient.withSpan(\n \"KeyVaultAccessControlClient.setRoleDefinition\",\n options,\n async (updatedOptions) => {\n const response = await this.client.roleDefinitions.createOrUpdate(\n roleScope,\n options.roleDefinitionName || randomUUID(),\n {\n properties: {\n description: options.description,\n permissions: options.permissions,\n assignableScopes: [roleScope],\n roleName: options.roleName,\n roleType: \"CustomRole\",\n },\n },\n updatedOptions,\n );\n return mappings.roleDefinition.generatedToPublic(response);\n },\n );\n }\n\n /**\n * Deletes a custom role definition previously created in an Azure Key Vault.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleDeleteRoleDefinition\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import {\n * KeyVaultAccessControlClient,\n * KnownKeyVaultDataAction,\n * KnownKeyVaultRoleScope,\n * } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultAccessControlClient(vaultUrl, credentials);\n *\n * const permissions = [{ dataActions: [KnownKeyVaultDataAction.BackupHsmKeys] }];\n * const roleDefinitionName = \"23b8bb1a-39c0-4c89-a85b-dd3c99273a8a\";\n * const roleDefinition = await client.setRoleDefinition(KnownKeyVaultRoleScope.Global, {\n * permissions,\n * roleDefinitionName,\n * });\n *\n * await client.deleteRoleDefinition(\"/\", roleDefinition.name);\n * ```\n * @param roleScope - The scope of the role definition.\n * @param name - The name of the role definition to delete.\n * @param options - The optional parameters.\n */\n public deleteRoleDefinition(\n roleScope: KeyVaultRoleScope,\n name: string,\n options: DeleteRoleDefinitionOptions = {},\n ): Promise<void> {\n return tracingClient.withSpan(\n \"KeyVaultAccessControlClient.deleteRoleDefinition\",\n options,\n async (updatedOptions) => {\n try {\n await this.client.roleDefinitions.delete(roleScope, name, updatedOptions);\n } catch (err: any) {\n // If the role definition doesn't exist, we can consider it deleted.\n if (err.statusCode !== 404) {\n throw err;\n }\n }\n },\n );\n }\n}\n"]}
|
|
1
|
+
{"version":3,"file":"accessControlClient.js","sourceRoot":"","sources":["../../src/accessControlClient.ts"],"names":[],"mappings":";AAAA,uCAAuC;AACvC,kCAAkC;AAClC,4CAA4C;;;AAmB5C,+CAAgE;AAChE,6CAA6C;AAC7C,gDAA8C;AAC9C,uEAAiE;AAEjE;;;;GAIG;AACH,MAAa,2BAA2B;IAWtC;;;;;;;;;;;;;;;OAeG;IACH,YACE,QAAgB,EAChB,UAA2B;IAC3B,8DAA8D;IAC9D,UAAsC,EAAE;QAExC,IAAI,CAAC,QAAQ,GAAG,QAAQ,CAAC;QAEzB,IAAI,CAAC,MAAM,GAAG,IAAA,8CAAoB,EAAC,QAAQ,EAAE,UAAU,EAAE,OAAO,CAAC,CAAC;IACpE,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA4BG;IACI,oBAAoB,CACzB,SAA4B,EAC5B,IAAY,EACZ,gBAAwB,EACxB,WAAmB,EACnB,UAAuC,EAAE;QAEzC,OAAO,0BAAa,CAAC,QAAQ,CAC3B,kDAAkD,EAClD,OAAO,EACP,KAAK,EAAE,cAAc,EAAE,EAAE;YACvB,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,eAAe,CAAC,MAAM,CACvD,SAAS,EACT,IAAI,EACJ;gBACE,UAAU,EAAE;oBACV,gBAAgB;oBAChB,WAAW;iBACZ;aACF,EACD,cAAc,CACf,CAAC;YACF,OAAO,sBAAQ,CAAC,cAAc,CAAC,iBAAiB,CAAC,QAAQ,CAAC,CAAC;QAC7D,CAAC,CACF,CAAC;IACJ,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA4BG;IACI,oBAAoB,CACzB,SAA4B,EAC5B,IAAY,EACZ,UAAuC,EAAE;QAEzC,OAAO,0BAAa,CAAC,QAAQ,CAC3B,kDAAkD,EAClD,OAAO,EACP,KAAK,EAAE,cAAc,EAAE,EAAE;YACvB,IAAI,CAAC;gBACH,MAAM,IAAI,CAAC,MAAM,CAAC,eAAe,CAAC,MAAM,CAAC,SAAS,EAAE,IAAI,EAAE,cAAc,CAAC,CAAC;YAC5E,CAAC;YAAC,OAAO,GAAQ,EAAE,CAAC;gBAClB,oEAAoE;gBACpE,IAAI,GAAG,CAAC,UAAU,KAAK,GAAG,EAAE,CAAC;oBAC3B,MAAM,GAAG,CAAC;gBACZ,CAAC;YACH,CAAC;QACH,CAAC,CACF,CAAC;IACJ,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OAgCG;IACI,iBAAiB,CACtB,SAA4B,EAC5B,IAAY,EACZ,UAAoC,EAAE;QAEtC,OAAO,0BAAa,CAAC,QAAQ,CAC3B,+CAA+C,EAC/C,OAAO,EACP,KAAK,EAAE,cAAc,EAAE,EAAE;YACvB,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,eAAe,CAAC,GAAG,CAAC,SAAS,EAAE,IAAI,EAAE,cAAc,CAAC,CAAC;YACxF,OAAO,sBAAQ,CAAC,cAAc,CAAC,iBAAiB,CAAC,QAAQ,CAAC,CAAC;QAC7D,CAAC,CACF,CAAC;IACJ,CAAC;IAED;;;;;;;;;;;;;;;;;;;OAmBG;IACI,mBAAmB,CACxB,SAA4B,EAC5B,UAAsC,EAAE;QAExC,OAAO,IAAA,mCAAqB,EAC1B,OAAO,EACP,CAAC,aAAa,EAAE,EAAE,CAAC,IAAI,CAAC,MAAM,CAAC,eAAe,CAAC,YAAY,CAAC,SAAS,EAAE,aAAa,CAAC,EACrF,sBAAQ,CAAC,cAAc,CAAC,iBAAiB,CAC1C,CAAC;IACJ,CAAC;IAED;;;;;;;;;;;;;;;;;;;OAmBG;IACI,mBAAmB,CACxB,SAA4B,EAC5B,UAAsC,EAAE;QAExC,OAAO,IAAA,mCAAqB,EAC1B,OAAO,EACP,CAAC,aAAa,EAAE,EAAE,CAAC,IAAI,CAAC,MAAM,CAAC,eAAe,CAAC,IAAI,CAAC,SAAS,EAAE,aAAa,CAAC,EAC7E,sBAAQ,CAAC,cAAc,CAAC,iBAAiB,CAC1C,CAAC;IACJ,CAAC;IAED;;;;;;;;;;;;;;;;;;OAkBG;IACI,iBAAiB,CACtB,SAA4B,EAC5B,IAAY,EACZ,UAAoC,EAAE;QAEtC,OAAO,0BAAa,CAAC,QAAQ,CAC3B,+CAA+C,EAC/C,OAAO,EACP,KAAK,EAAE,cAAc,EAAE,EAAE;YACvB,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,eAAe,CAAC,GAAG,CAAC,SAAS,EAAE,IAAI,EAAE,cAAc,CAAC,CAAC;YACxF,OAAO,sBAAQ,CAAC,cAAc,CAAC,iBAAiB,CAAC,QAAQ,CAAC,CAAC;QAC7D,CAAC,CACF,CAAC;IACJ,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;;;;;OA0BG;IACI,iBAAiB,CACtB,SAA4B,EAC5B,UAAoC,EAAE;QAEtC,OAAO,0BAAa,CAAC,QAAQ,CAC3B,+CAA+C,EAC/C,OAAO,EACP,KAAK,EAAE,cAAc,EAAE,EAAE;YACvB,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,eAAe,CAAC,cAAc,CAC/D,SAAS,EACT,OAAO,CAAC,kBAAkB,IAAI,IAAA,sBAAU,GAAE,EAC1C;gBACE,UAAU,EAAE;oBACV,WAAW,EAAE,OAAO,CAAC,WAAW;oBAChC,WAAW,EAAE,OAAO,CAAC,WAAW;oBAChC,gBAAgB,EAAE,CAAC,SAAS,CAAC;oBAC7B,QAAQ,EAAE,OAAO,CAAC,QAAQ;oBAC1B,QAAQ,EAAE,YAAY;iBACvB;aACF,EACD,cAAc,CACf,CAAC;YACF,OAAO,sBAAQ,CAAC,cAAc,CAAC,iBAAiB,CAAC,QAAQ,CAAC,CAAC;QAC7D,CAAC,CACF,CAAC;IACJ,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA4BG;IACI,oBAAoB,CACzB,SAA4B,EAC5B,IAAY,EACZ,UAAuC,EAAE;QAEzC,OAAO,0BAAa,CAAC,QAAQ,CAC3B,kDAAkD,EAClD,OAAO,EACP,KAAK,EAAE,cAAc,EAAE,EAAE;YACvB,IAAI,CAAC;gBACH,MAAM,IAAI,CAAC,MAAM,CAAC,eAAe,CAAC,MAAM,CAAC,SAAS,EAAE,IAAI,EAAE,cAAc,CAAC,CAAC;YAC5E,CAAC;YAAC,OAAO,GAAQ,EAAE,CAAC;gBAClB,oEAAoE;gBACpE,IAAI,GAAG,CAAC,UAAU,KAAK,GAAG,EAAE,CAAC;oBAC3B,MAAM,GAAG,CAAC;gBACZ,CAAC;YACH,CAAC;QACH,CAAC,CACF,CAAC;IACJ,CAAC;CACF;AAvYD,kEAuYC","sourcesContent":["// Copyright (c) Microsoft Corporation.\n// Licensed under the MIT License.\n/// <reference lib=\"esnext.asynciterable\" />\n\nimport type {\n AccessControlClientOptions,\n CreateRoleAssignmentOptions,\n DeleteRoleAssignmentOptions,\n DeleteRoleDefinitionOptions,\n GetRoleAssignmentOptions,\n GetRoleDefinitionOptions,\n KeyVaultRoleAssignment,\n KeyVaultRoleDefinition,\n KeyVaultRoleScope,\n ListRoleAssignmentsOptions,\n ListRoleDefinitionsOptions,\n SetRoleDefinitionOptions,\n} from \"./accessControlModels.js\";\nimport type { KeyVaultClient } from \"./generated/src/keyVaultClient.js\";\nimport type { PagedAsyncIterableIterator } from \"@azure/core-paging\";\nimport type { TokenCredential } from \"@azure/core-auth\";\nimport { mapPagedAsyncIterable, mappings } from \"./mappings.js\";\nimport { tracingClient } from \"./tracing.js\";\nimport { randomUUID } from \"@azure/core-util\";\nimport { createKeyVaultClient } from \"./createKeyVaultClient.js\";\n\n/**\n * The KeyVaultAccessControlClient provides methods to manage\n * access control and role assignments in any given Azure Key Vault instance.\n * The client supports creating, retrieving and deleting roles.\n */\nexport class KeyVaultAccessControlClient {\n /**\n * The base URL to the vault\n */\n public readonly vaultUrl: string;\n\n /**\n * A reference to the auto-generated Key Vault HTTP client.\n */\n private readonly client: KeyVaultClient;\n\n /**\n * Creates an instance of the KeyVaultAccessControlClient.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleCreateAccessControlClient\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultAccessControlClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultAccessControlClient(vaultUrl, credentials);\n * ```\n * @param vaultUrl - the URL of the Key Vault. It should have this shape: `https://${your-key-vault-name}.vault.azure.net`. You should validate that this URL references a valid Key Vault or Managed HSM resource. See https://aka.ms/azsdk/blog/vault-uri for details.\n * @param credential - An object that implements the `TokenCredential` interface used to authenticate requests to the service. Use the \\@azure/identity package to create a credential that suits your needs.\n * @param options - Options used to configure Key Vault API requests. Omit this parameter to use the default configuration.\n */\n constructor(\n vaultUrl: string,\n credential: TokenCredential,\n // eslint-disable-next-line @azure/azure-sdk/ts-naming-options\n options: AccessControlClientOptions = {},\n ) {\n this.vaultUrl = vaultUrl;\n\n this.client = createKeyVaultClient(vaultUrl, credential, options);\n }\n\n /**\n * Creates a role assignment in an Azure Key Vault.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleCreateRoleAssignment\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultAccessControlClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultAccessControlClient(vaultUrl, credentials);\n *\n * const { value: roleDefinition } = await client.listRoleDefinitions(\"/\").next();\n *\n * const principalId = \"4871f6a6-374f-4b6b-8b0c-f5d84db823f6\";\n * const result = await client.createRoleAssignment(\n * \"/\",\n * \"295c179b-9ad3-4117-99cd-b1aa66cf4517\",\n * roleDefinition.id,\n * principalId,\n * );\n * ```\n * Creates a new role assignment.\n * @param roleScope - The scope of the role assignment.\n * @param name - The name of the role assignment. Must be a UUID.\n * @param roleDefinitionId - The role definition ID used in the role assignment.\n * @param principalId - The principal ID assigned to the role. This maps to the ID inside the Active Directory. It can point to a user, service principal, or security group.\n * @param options - The optional parameters.\n */\n public createRoleAssignment(\n roleScope: KeyVaultRoleScope,\n name: string,\n roleDefinitionId: string,\n principalId: string,\n options: CreateRoleAssignmentOptions = {},\n ): Promise<KeyVaultRoleAssignment> {\n return tracingClient.withSpan(\n \"KeyVaultAccessControlClient.createRoleAssignment\",\n options,\n async (updatedOptions) => {\n const response = await this.client.roleAssignments.create(\n roleScope,\n name,\n {\n properties: {\n roleDefinitionId,\n principalId,\n },\n },\n updatedOptions,\n );\n return mappings.roleAssignment.generatedToPublic(response);\n },\n );\n }\n\n /**\n * Deletes role assignments previously created in an Azure Key Vault.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleDeleteRoleAssignment\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultAccessControlClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultAccessControlClient(vaultUrl, credentials);\n *\n * const { value: roleDefinition } = await client.listRoleDefinitions(\"/\").next();\n * const principalId = \"4871f6a6-374f-4b6b-8b0c-f5d84db823f6\";\n *\n * const roleAssignment = await client.createRoleAssignment(\n * \"/\",\n * \"295c179b-9ad3-4117-99cd-b1aa66cf4517\",\n * roleDefinition.id,\n * principalId,\n * );\n *\n * await client.deleteRoleAssignment(roleAssignment.properties.scope, roleAssignment.name);\n * ```\n * Deletes an existing role assignment.\n * @param roleScope - The scope of the role assignment.\n * @param name - The name of the role assignment.\n * @param options - The optional parameters.\n */\n public deleteRoleAssignment(\n roleScope: KeyVaultRoleScope,\n name: string,\n options: DeleteRoleAssignmentOptions = {},\n ): Promise<void> {\n return tracingClient.withSpan(\n \"KeyVaultAccessControlClient.deleteRoleAssignment\",\n options,\n async (updatedOptions) => {\n try {\n await this.client.roleAssignments.delete(roleScope, name, updatedOptions);\n } catch (err: any) {\n // If the role assignment doesn't exist, we can consider it deleted.\n if (err.statusCode !== 404) {\n throw err;\n }\n }\n },\n );\n }\n\n /**\n * Gets a role assignments previously created in an Azure Key Vault.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleGetRoleAssignment\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultAccessControlClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultAccessControlClient(vaultUrl, credentials);\n *\n * const { value: roleDefinition } = await client.listRoleDefinitions(\"/\").next();\n * const principalId = \"4871f6a6-374f-4b6b-8b0c-f5d84db823f6\";\n *\n * let roleAssignment = await client.createRoleAssignment(\n * \"/\",\n * \"295c179b-9ad3-4117-99cd-b1aa66cf4517\",\n * roleDefinition.id,\n * principalId,\n * );\n *\n * roleAssignment = await client.getRoleAssignment(\n * roleAssignment.properties.scope,\n * roleAssignment.name,\n * );\n * console.log(roleAssignment);\n * ```\n * Gets an existing role assignment.\n * @param roleScope - The scope of the role assignment.\n * @param name - The name of the role assignment.\n * @param options - The optional parameters.\n */\n public getRoleAssignment(\n roleScope: KeyVaultRoleScope,\n name: string,\n options: GetRoleAssignmentOptions = {},\n ): Promise<KeyVaultRoleAssignment> {\n return tracingClient.withSpan(\n \"KeyVaultAccessControlClient.getRoleAssignment\",\n options,\n async (updatedOptions) => {\n const response = await this.client.roleAssignments.get(roleScope, name, updatedOptions);\n return mappings.roleAssignment.generatedToPublic(response);\n },\n );\n }\n\n /**\n * Iterates over all of the available role assignments in an Azure Key Vault.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleListRoleAssignments\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultAccessControlClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultAccessControlClient(vaultUrl, credentials);\n *\n * for await (const roleAssignment of client.listRoleAssignments(\"/\")) {\n * console.log(\"Role assignment: \", roleAssignment);\n * }\n * ```\n * Lists all of the role assignments in a given scope.\n * @param roleScope - The scope of the role assignments.\n * @param options - The optional parameters.\n */\n public listRoleAssignments(\n roleScope: KeyVaultRoleScope,\n options: ListRoleAssignmentsOptions = {},\n ): PagedAsyncIterableIterator<KeyVaultRoleAssignment> {\n return mapPagedAsyncIterable(\n options,\n (mappedOptions) => this.client.roleAssignments.listForScope(roleScope, mappedOptions),\n mappings.roleAssignment.generatedToPublic,\n );\n }\n\n /**\n * Iterates over all of the available role definitions in an Azure Key Vault.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleListRoleDefinitions\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultAccessControlClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultAccessControlClient(vaultUrl, credentials);\n *\n * for await (const roleDefinitions of client.listRoleDefinitions(\"/\")) {\n * console.log(\"Role definition: \", roleDefinitions);\n * }\n * ```\n * Lists all of the role definition in a given scope.\n * @param roleScope - The scope of the role definition.\n * @param options - The optional parameters.\n */\n public listRoleDefinitions(\n roleScope: KeyVaultRoleScope,\n options: ListRoleDefinitionsOptions = {},\n ): PagedAsyncIterableIterator<KeyVaultRoleDefinition> {\n return mapPagedAsyncIterable(\n options,\n (mappedOptions) => this.client.roleDefinitions.list(roleScope, mappedOptions),\n mappings.roleDefinition.generatedToPublic,\n );\n }\n\n /**\n * Gets a role definition from Azure Key Vault.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleGetRoleDefinition\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultAccessControlClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultAccessControlClient(vaultUrl, credentials);\n *\n * const roleDefinition = await client.getRoleDefinition(\"/\", \"b86a8fe4-44ce-4948-aee5-eccb2c155cd7\");\n * console.log(roleDefinition);\n * ```\n * @param roleScope - The scope of the role definition.\n * @param name - The name of the role definition.\n * @param options - The optional parameters.\n */\n public getRoleDefinition(\n roleScope: KeyVaultRoleScope,\n name: string,\n options: GetRoleDefinitionOptions = {},\n ): Promise<KeyVaultRoleDefinition> {\n return tracingClient.withSpan(\n \"KeyVaultAccessControlClient.getRoleDefinition\",\n options,\n async (updatedOptions) => {\n const response = await this.client.roleDefinitions.get(roleScope, name, updatedOptions);\n return mappings.roleDefinition.generatedToPublic(response);\n },\n );\n }\n\n /**\n * Creates or updates a role definition in an Azure Key Vault.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleSetRoleDefinition\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import {\n * KeyVaultAccessControlClient,\n * KnownKeyVaultDataAction,\n * KnownKeyVaultRoleScope,\n * } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultAccessControlClient(vaultUrl, credentials);\n *\n * const permissions = [{ dataActions: [KnownKeyVaultDataAction.BackupHsmKeys] }];\n * const roleDefinitionName = \"23b8bb1a-39c0-4c89-a85b-dd3c99273a8a\";\n * const roleDefinition = await client.setRoleDefinition(KnownKeyVaultRoleScope.Global, {\n * permissions,\n * roleDefinitionName,\n * });\n * console.log(roleDefinition);\n * ```\n * @param roleScope - The scope of the role definition.\n * @param options - The optional parameters.\n */\n public setRoleDefinition(\n roleScope: KeyVaultRoleScope,\n options: SetRoleDefinitionOptions = {},\n ): Promise<KeyVaultRoleDefinition> {\n return tracingClient.withSpan(\n \"KeyVaultAccessControlClient.setRoleDefinition\",\n options,\n async (updatedOptions) => {\n const response = await this.client.roleDefinitions.createOrUpdate(\n roleScope,\n options.roleDefinitionName || randomUUID(),\n {\n properties: {\n description: options.description,\n permissions: options.permissions,\n assignableScopes: [roleScope],\n roleName: options.roleName,\n roleType: \"CustomRole\",\n },\n },\n updatedOptions,\n );\n return mappings.roleDefinition.generatedToPublic(response);\n },\n );\n }\n\n /**\n * Deletes a custom role definition previously created in an Azure Key Vault.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleDeleteRoleDefinition\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import {\n * KeyVaultAccessControlClient,\n * KnownKeyVaultDataAction,\n * KnownKeyVaultRoleScope,\n * } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultAccessControlClient(vaultUrl, credentials);\n *\n * const permissions = [{ dataActions: [KnownKeyVaultDataAction.BackupHsmKeys] }];\n * const roleDefinitionName = \"23b8bb1a-39c0-4c89-a85b-dd3c99273a8a\";\n * const roleDefinition = await client.setRoleDefinition(KnownKeyVaultRoleScope.Global, {\n * permissions,\n * roleDefinitionName,\n * });\n *\n * await client.deleteRoleDefinition(\"/\", roleDefinition.name);\n * ```\n * @param roleScope - The scope of the role definition.\n * @param name - The name of the role definition to delete.\n * @param options - The optional parameters.\n */\n public deleteRoleDefinition(\n roleScope: KeyVaultRoleScope,\n name: string,\n options: DeleteRoleDefinitionOptions = {},\n ): Promise<void> {\n return tracingClient.withSpan(\n \"KeyVaultAccessControlClient.deleteRoleDefinition\",\n options,\n async (updatedOptions) => {\n try {\n await this.client.roleDefinitions.delete(roleScope, name, updatedOptions);\n } catch (err: any) {\n // If the role definition doesn't exist, we can consider it deleted.\n if (err.statusCode !== 404) {\n throw err;\n }\n }\n },\n );\n }\n}\n"]}
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import type { ClientOptions, OperationOptions } from "@azure-rest/core-client";
|
|
2
|
-
import { DataAction as KeyVaultDataAction, RoleScope as KeyVaultRoleScope, KnownDataAction as KnownKeyVaultDataAction, KnownRoleScope as KnownKeyVaultRoleScope } from "./generated/index.js";
|
|
2
|
+
import { DataAction as KeyVaultDataAction, RoleScope as KeyVaultRoleScope, KnownDataAction as KnownKeyVaultDataAction, KnownRoleScope as KnownKeyVaultRoleScope } from "./generated/src/index.js";
|
|
3
3
|
import type { SUPPORTED_API_VERSIONS } from "./constants.js";
|
|
4
4
|
export { KeyVaultDataAction, KeyVaultRoleScope, KnownKeyVaultDataAction, KnownKeyVaultRoleScope };
|
|
5
5
|
/**
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"accessControlModels.d.ts","sourceRoot":"","sources":["../../src/accessControlModels.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,aAAa,EAAE,gBAAgB,EAAE,MAAM,yBAAyB,CAAC;AAC/E,OAAO,EACL,UAAU,IAAI,kBAAkB,EAChC,SAAS,IAAI,iBAAiB,EAC9B,eAAe,IAAI,uBAAuB,EAC1C,cAAc,IAAI,sBAAsB,EACzC,MAAM,
|
|
1
|
+
{"version":3,"file":"accessControlModels.d.ts","sourceRoot":"","sources":["../../src/accessControlModels.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,aAAa,EAAE,gBAAgB,EAAE,MAAM,yBAAyB,CAAC;AAC/E,OAAO,EACL,UAAU,IAAI,kBAAkB,EAChC,SAAS,IAAI,iBAAiB,EAC9B,eAAe,IAAI,uBAAuB,EAC1C,cAAc,IAAI,sBAAsB,EACzC,MAAM,0BAA0B,CAAC;AAClC,OAAO,KAAK,EAAE,sBAAsB,EAAE,MAAM,gBAAgB,CAAC;AAE7D,OAAO,EAAE,kBAAkB,EAAE,iBAAiB,EAAE,uBAAuB,EAAE,sBAAsB,EAAE,CAAC;AAElG;;GAEG;AACH,MAAM,WAAW,0BAA2B,SAAQ,aAAa;IAC/D;;OAEG;IACH,cAAc,CAAC,EAAE,sBAAsB,CAAC;IAExC;;;OAGG;IACH,oCAAoC,CAAC,EAAE,OAAO,CAAC;CAChD;AAED;;GAEG;AACH,MAAM,WAAW,sBAAsB;IACrC;;OAEG;IACH,QAAQ,CAAC,EAAE,EAAE,MAAM,CAAC;IACpB;;OAEG;IACH,QAAQ,CAAC,IAAI,EAAE,MAAM,CAAC;IACtB;;OAEG;IACH,QAAQ,CAAC,IAAI,EAAE,MAAM,CAAC;IACtB;;OAEG;IACH,UAAU,EAAE,gCAAgC,CAAC;CAC9C;AAED;;GAEG;AACH,MAAM,WAAW,kBAAkB;IACjC;;OAEG;IACH,OAAO,CAAC,EAAE,MAAM,EAAE,CAAC;IACnB;;OAEG;IACH,UAAU,CAAC,EAAE,MAAM,EAAE,CAAC;IACtB;;OAEG;IACH,WAAW,CAAC,EAAE,kBAAkB,EAAE,CAAC;IACnC;;OAEG;IACH,cAAc,CAAC,EAAE,kBAAkB,EAAE,CAAC;CACvC;AAED;;GAEG;AACH,MAAM,WAAW,sBAAsB;IACrC;;OAEG;IACH,QAAQ,CAAC,EAAE,EAAE,MAAM,CAAC;IACpB;;OAEG;IACH,QAAQ,CAAC,IAAI,EAAE,MAAM,CAAC;IACtB;;OAEG;IACH,QAAQ,CAAC,IAAI,EAAE,MAAM,CAAC;IACtB;;OAEG;IACH,QAAQ,EAAE,MAAM,CAAC;IACjB;;OAEG;IACH,WAAW,EAAE,MAAM,CAAC;IACpB;;OAEG;IACH,QAAQ,EAAE,MAAM,CAAC;IACjB;;OAEG;IACH,WAAW,EAAE,kBAAkB,EAAE,CAAC;IAClC;;OAEG;IACH,gBAAgB,EAAE,MAAM,EAAE,CAAC;CAC5B;AAED;;GAEG;AACH,MAAM,WAAW,gCAAgC;IAC/C;;OAEG;IACH,gBAAgB,EAAE,MAAM,CAAC;IACzB;;OAEG;IACH,WAAW,EAAE,MAAM,CAAC;IACpB;;OAEG;IACH,KAAK,CAAC,EAAE,iBAAiB,CAAC;CAC3B;AAED;;;GAGG;AACH,MAAM,WAAW,2BAA4B,SAAQ,gBAAgB;CAAG;AAExE;;;GAGG;AACH,MAAM,WAAW,2BAA4B,SAAQ,gBAAgB;CAAG;AAExE;;;GAGG;AACH,MAAM,WAAW,wBAAyB,SAAQ,gBAAgB;CAAG;AAErE;;GAEG;AACH,MAAM,WAAW,0BAA2B,SAAQ,gBAAgB;CAAG;AAEvE;;GAEG;AACH,MAAM,WAAW,0BAA2B,SAAQ,gBAAgB;CAAG;AAEvE;;GAEG;AACH,MAAM,WAAW,wBAAyB,SAAQ,gBAAgB;CAAG;AAErE;;GAEG;AACH,MAAM,WAAW,wBAAyB,SAAQ,gBAAgB;IAChE;;OAEG;IACH,kBAAkB,CAAC,EAAE,MAAM,CAAC;IAC5B;;OAEG;IACH,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB;;OAEG;IACH,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB;;OAEG;IACH,WAAW,CAAC,EAAE,kBAAkB,EAAE,CAAC;IACnC;;OAEG;IACH,gBAAgB,CAAC,EAAE,iBAAiB,EAAE,CAAC;CACxC;AAED;;GAEG;AACH,MAAM,WAAW,2BAA4B,SAAQ,gBAAgB;CAAG;AAExE;;GAEG;AACH,MAAM,WAAW,+BAA+B;IAC9C;;;OAGG;IACH,iBAAiB,CAAC,EAAE,MAAM,CAAC;CAC5B;AAED;;GAEG;AACH,MAAM,WAAW,+BAA+B;IAC9C;;;OAGG;IACH,iBAAiB,CAAC,EAAE,MAAM,CAAC;CAC5B"}
|
|
@@ -3,7 +3,7 @@
|
|
|
3
3
|
// Licensed under the MIT License.
|
|
4
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
5
|
exports.KnownKeyVaultRoleScope = exports.KnownKeyVaultDataAction = void 0;
|
|
6
|
-
const index_js_1 = require("./generated/index.js");
|
|
6
|
+
const index_js_1 = require("./generated/src/index.js");
|
|
7
7
|
Object.defineProperty(exports, "KnownKeyVaultDataAction", { enumerable: true, get: function () { return index_js_1.KnownDataAction; } });
|
|
8
8
|
Object.defineProperty(exports, "KnownKeyVaultRoleScope", { enumerable: true, get: function () { return index_js_1.KnownRoleScope; } });
|
|
9
9
|
//# sourceMappingURL=accessControlModels.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"accessControlModels.js","sourceRoot":"","sources":["../../src/accessControlModels.ts"],"names":[],"mappings":";AAAA,uCAAuC;AACvC,kCAAkC;;;AAGlC,
|
|
1
|
+
{"version":3,"file":"accessControlModels.js","sourceRoot":"","sources":["../../src/accessControlModels.ts"],"names":[],"mappings":";AAAA,uCAAuC;AACvC,kCAAkC;;;AAGlC,uDAKkC;AAGc,wGAL3B,0BAAuB,OAK2B;AAAE,uGAJrD,yBAAsB,OAIqD","sourcesContent":["// Copyright (c) Microsoft Corporation.\n// Licensed under the MIT License.\n\nimport type { ClientOptions, OperationOptions } from \"@azure-rest/core-client\";\nimport {\n DataAction as KeyVaultDataAction,\n RoleScope as KeyVaultRoleScope,\n KnownDataAction as KnownKeyVaultDataAction,\n KnownRoleScope as KnownKeyVaultRoleScope,\n} from \"./generated/src/index.js\";\nimport type { SUPPORTED_API_VERSIONS } from \"./constants.js\";\n\nexport { KeyVaultDataAction, KeyVaultRoleScope, KnownKeyVaultDataAction, KnownKeyVaultRoleScope };\n\n/**\n * The optional parameters accepted by the Key Vault's AccessControlClient\n */\nexport interface AccessControlClientOptions extends ClientOptions {\n /**\n * The accepted versions of the Key Vault's service API.\n */\n serviceVersion?: SUPPORTED_API_VERSIONS;\n\n /**\n * Whether to disable verification that the authentication challenge resource matches the Key Vault or Managed HSM domain.\n * Defaults to false.\n */\n disableChallengeResourceVerification?: boolean;\n}\n\n/**\n * A Key Vault role assignment.\n */\nexport interface KeyVaultRoleAssignment {\n /**\n * The role assignment ID.\n */\n readonly id: string;\n /**\n * The role assignment name.\n */\n readonly name: string;\n /**\n * The role assignment type.\n */\n readonly kind: string;\n /**\n * Role assignment properties.\n */\n properties: KeyVaultRoleAssignmentProperties;\n}\n\n/**\n * A list of Key Vault permissions.\n */\nexport interface KeyVaultPermission {\n /**\n * Allowed actions.\n */\n actions?: string[];\n /**\n * Actions that are excluded but not denied. They may be granted by other role definitions assigned to a principal.\n */\n notActions?: string[];\n /**\n * Allowed Data actions.\n */\n dataActions?: KeyVaultDataAction[];\n /**\n * Data actions that are excluded but not denied. They may be granted by other role definitions assigned to a principal.\n */\n notDataActions?: KeyVaultDataAction[];\n}\n\n/**\n * A Key Vault role definition.\n */\nexport interface KeyVaultRoleDefinition {\n /**\n * The role definition ID.\n */\n readonly id: string;\n /**\n * The role definition name.\n */\n readonly name: string;\n /**\n * The role definition type.\n */\n readonly kind: string;\n /**\n * The role name.\n */\n roleName: string;\n /**\n * The role definition description.\n */\n description: string;\n /**\n * The role type.\n */\n roleType: string;\n /**\n * A list of Key Vault permissions.\n */\n permissions: KeyVaultPermission[];\n /**\n * Role definition assignable scopes.\n */\n assignableScopes: string[];\n}\n\n/**\n * Role assignment properties.\n */\nexport interface KeyVaultRoleAssignmentProperties {\n /**\n * The role definition ID.\n */\n roleDefinitionId: string;\n /**\n * The principal ID.\n */\n principalId: string;\n /**\n * The role assignment scope.\n */\n scope?: KeyVaultRoleScope;\n}\n\n/**\n * An interface representing the optional parameters that can be\n * passed to {@link createRoleAssignment}\n */\nexport interface CreateRoleAssignmentOptions extends OperationOptions {}\n\n/**\n * An interface representing the optional parameters that can be\n * passed to {@link deleteRoleAssignment}\n */\nexport interface DeleteRoleAssignmentOptions extends OperationOptions {}\n\n/**\n * An interface representing the optional parameters that can be\n * passed to {@link getRoleAssignment}\n */\nexport interface GetRoleAssignmentOptions extends OperationOptions {}\n\n/**\n * An interface representing optional parameters passed to {@link listRoleAssignments}.\n */\nexport interface ListRoleAssignmentsOptions extends OperationOptions {}\n\n/**\n * An interface representing optional parameters passed to {@link listRoleDefinitions}.\n */\nexport interface ListRoleDefinitionsOptions extends OperationOptions {}\n\n/**\n * An interface representing optional parameters passed to {@link getRoleDefinition}.\n */\nexport interface GetRoleDefinitionOptions extends OperationOptions {}\n\n/**\n * An interface representing optional parameters passed to {@link setRoleDefinition}.\n */\nexport interface SetRoleDefinitionOptions extends OperationOptions {\n /**\n * UUID used as the name of the role definition to create. If it's not provided, a new UUID will be generated.\n */\n roleDefinitionName?: string;\n /**\n * Friendly display name for the role definition.\n */\n roleName?: string;\n /**\n * Long-form description of the role definition.\n */\n description?: string;\n /**\n * List of Key Vault permissions\n */\n permissions?: KeyVaultPermission[];\n /**\n * List of assignable Key Vault role scopes\n */\n assignableScopes?: KeyVaultRoleScope[];\n}\n\n/**\n * An interface representing optional parameters passed to {@link deleteRoleDefinition}.\n */\nexport interface DeleteRoleDefinitionOptions extends OperationOptions {}\n\n/**\n * Arguments for retrieving the next page of search results.\n */\nexport interface ListRoleDefinitionsPageSettings {\n /**\n * A token used for retrieving the next page of results when the server\n * enforces pagination.\n */\n continuationToken?: string;\n}\n\n/**\n * Arguments for retrieving the next page of search results.\n */\nexport interface ListRoleAssignmentsPageSettings {\n /**\n * A token used for retrieving the next page of results when the server\n * enforces pagination.\n */\n continuationToken?: string;\n}\n"]}
|
|
@@ -6,7 +6,7 @@ exports.KeyVaultBackupClient = void 0;
|
|
|
6
6
|
const mappings_js_1 = require("./mappings.js");
|
|
7
7
|
const createKeyVaultClient_js_1 = require("./createKeyVaultClient.js");
|
|
8
8
|
const shim_js_1 = require("./lro/shim.js");
|
|
9
|
-
const restorePollerHelpers_js_1 = require("./generated/restorePollerHelpers.js");
|
|
9
|
+
const restorePollerHelpers_js_1 = require("./generated/src/restorePollerHelpers.js");
|
|
10
10
|
/**
|
|
11
11
|
* The KeyVaultBackupClient provides methods to generate backups
|
|
12
12
|
* and restore backups of any given Azure Key Vault instance.
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"backupClient.js","sourceRoot":"","sources":["../../src/backupClient.ts"],"names":[],"mappings":";AAAA,uCAAuC;AACvC,kCAAkC;;;AAelC,+CAAyC;AACzC,uEAAiE;AAEjE,2CAAwD;AAOxD,iFAAoE;AASpE;;;;;GAKG;AACH,MAAa,oBAAoB;IAW/B;;;;;;;;;;;;;;;OAeG;IACH,YACE,QAAgB,EAChB,UAA2B,EAC3B,UAAuC,EAAE;QAEzC,IAAI,CAAC,QAAQ,GAAG,QAAQ,CAAC;QAEzB,IAAI,CAAC,MAAM,GAAG,IAAA,8CAAoB,EAAC,QAAQ,EAAE,UAAU,EAAE,OAAO,CAAC,CAAC;IACpE,CAAC;IAyEM,KAAK,CAAC,cAAc,CACzB,cAAsB,EACtB,oBAA4D,EAAE,EAC9D,+BAA8D,EAAE;QAEhE,MAAM,QAAQ,GAAG,OAAO,iBAAiB,KAAK,QAAQ,CAAC,CAAC,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;QACvF,MAAM,OAAO,GACX,OAAO,iBAAiB,KAAK,QAAQ,CAAC,CAAC,CAAC,4BAA4B,CAAC,CAAC,CAAC,iBAAiB,CAAC;QAE3F,IAAI,MAAM,CAAC;QACX,IAAI,OAAO,CAAC,UAAU,EAAE,CAAC;YACvB,MAAM,GAAG,IAAA,uCAAa,EAAC,IAAI,CAAC,MAAM,EAAE,OAAO,CAAC,UAAU,EAAE,IAAI,CAAC,MAAM,CAAC,aAAa,EAAE,OAAO,CAAC,CAAC;QAC9F,CAAC;aAAM,CAAC;YACN,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC,aAAa,CAChC;gBACE,kBAAkB,EAAE,cAAc;gBAClC,KAAK,EAAE,QAAQ;gBACf,kBAAkB,EAAE,QAAQ,KAAK,SAAS;aAC3C,EACD;gBACE,WAAW,EAAE,OAAO,CAAC,WAAW;gBAChC,cAAc,EAAE,OAAO,CAAC,cAAc;gBACtC,UAAU,EAAE,OAAO,CAAC,UAAU;gBAC9B,cAAc,EAAE,OAAO,CAAC,cAAc;gBACtC,kBAAkB,EAAE,OAAO,CAAC,YAAY;aACzC,CACF,CAAC;QACJ,CAAC;QAED,MAAM,CAAC,UAAU,CAAC,qBAAW,CAAC,CAAC;QAE/B,OAAO,IAAA,oBAAU,EAAC,MAAM,CAA2C,CAAC;IACtE,CAAC;IAyED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA8BG;IACI,KAAK,CAAC,eAAe,CAC1B,SAAiB,EACjB,oBAA6D,EAAE,EAC/D,+BAA+D,EAAE;QAEjE,MAAM,QAAQ,GAAG,OAAO,iBAAiB,KAAK,QAAQ,CAAC,CAAC,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;QACvF,MAAM,OAAO,GACX,OAAO,iBAAiB,KAAK,QAAQ,CAAC,CAAC,CAAC,4BAA4B,CAAC,CAAC,CAAC,iBAAiB,CAAC;QAE3F,MAAM,cAAc,GAAG,sBAAQ,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC;QAE1D,IAAI,MAAM,CAAC;QACX,IAAI,OAAO,CAAC,UAAU,EAAE,CAAC;YACvB,MAAM,GAAG,IAAA,uCAAa,EACpB,IAAI,CAAC,MAAM,EACX,OAAO,CAAC,UAAU,EAClB,IAAI,CAAC,MAAM,CAAC,uBAAuB,EACnC,OAAO,CACR,CAAC;QACJ,CAAC;aAAM,CAAC;YACN,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC,uBAAuB,CAC1C;gBACE,eAAe,EAAE,cAAc,CAAC,UAAU;gBAC1C,kBAAkB,EAAE;oBAClB,kBAAkB,EAAE,cAAc,CAAC,SAAS;oBAC5C,KAAK,EAAE,QAAQ;oBACf,kBAAkB,EAAE,QAAQ,KAAK,SAAS;iBAC3C;aACF,EACD;gBACE,WAAW,EAAE,OAAO,CAAC,WAAW;gBAChC,cAAc,EAAE,OAAO,CAAC,cAAc;gBACtC,UAAU,EAAE,OAAO,CAAC,UAAU;gBAC9B,cAAc,EAAE,OAAO,CAAC,cAAc;gBACtC,kBAAkB,EAAE,OAAO,CAAC,YAAY;aACzC,CACF,CAAC;QACJ,CAAC;QACD,MAAM,CAAC,UAAU,CAAC,qBAAW,CAAC,CAAC;QAE/B,OAAO,IAAA,oBAAU,EAAC,MAAM,CAA4C,CAAC;IACvE,CAAC;IA8EM,KAAK,CAAC,WAAW,CACtB,cAAsB,EACtB,oBAAyD,EAAE,EAC3D,+BAA2D,EAAE;QAE7D,MAAM,QAAQ,GAAG,OAAO,iBAAiB,KAAK,QAAQ,CAAC,CAAC,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;QACvF,MAAM,OAAO,GACX,OAAO,iBAAiB,KAAK,QAAQ,CAAC,CAAC,CAAC,4BAA4B,CAAC,CAAC,CAAC,iBAAiB,CAAC;QAE3F,IAAI,MAAM,CAAC;QACX,IAAI,OAAO,CAAC,UAAU,EAAE,CAAC;YACvB,MAAM,GAAG,IAAA,uCAAa,EAAC,IAAI,CAAC,MAAM,EAAE,OAAO,CAAC,UAAU,EAAE,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,OAAO,CAAC,CAAC;QAC3F,CAAC;aAAM,CAAC;YACN,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC,UAAU,CAC7B;gBACE,kBAAkB,EAAE,cAAc;gBAClC,KAAK,EAAE,QAAQ;gBACf,kBAAkB,EAAE,QAAQ,KAAK,SAAS;aAC3C,EACD;gBACE,WAAW,EAAE,OAAO,CAAC,WAAW;gBAChC,cAAc,EAAE,OAAO,CAAC,cAAc;gBACtC,UAAU,EAAE,OAAO,CAAC,UAAU;gBAC9B,cAAc,EAAE,OAAO,CAAC,cAAc;gBACtC,kBAAkB,EAAE,OAAO,CAAC,YAAY;aACzC,CACF,CAAC;QACJ,CAAC;QAED,MAAM,CAAC,UAAU,CAAC,qBAAW,CAAC,CAAC;QAE/B,OAAO,IAAA,oBAAU,EAAC,MAAM,CAAwC,CAAC;IACnE,CAAC;IA+EM,KAAK,CAAC,YAAY,CACvB,SAAiB,EACjB,oBAA0D,EAAE,EAC5D,+BAA4D,EAAE;QAE9D,MAAM,QAAQ,GAAG,OAAO,iBAAiB,KAAK,QAAQ,CAAC,CAAC,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;QACvF,MAAM,OAAO,GACX,OAAO,iBAAiB,KAAK,QAAQ,CAAC,CAAC,CAAC,4BAA4B,CAAC,CAAC,CAAC,iBAAiB,CAAC;QAE3F,MAAM,cAAc,GAAG,sBAAQ,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC;QAE1D,IAAI,MAAM,CAAC;QACX,IAAI,OAAO,CAAC,UAAU,EAAE,CAAC;YACvB,MAAM,GAAG,IAAA,uCAAa,EACpB,IAAI,CAAC,MAAM,EACX,OAAO,CAAC,UAAU,EAClB,IAAI,CAAC,MAAM,CAAC,oBAAoB,EAChC,OAAO,CACR,CAAC;QACJ,CAAC;aAAM,CAAC;YACN,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC,oBAAoB,CACvC;gBACE,eAAe,EAAE,cAAc,CAAC,UAAU;gBAC1C,kBAAkB,EAAE;oBAClB,kBAAkB,EAAE,cAAc,CAAC,SAAS;oBAC5C,KAAK,EAAE,QAAQ;oBACf,kBAAkB,EAAE,QAAQ,KAAK,SAAS;iBAC3C;aACF,EACD;gBACE,WAAW,EAAE,OAAO,CAAC,WAAW;gBAChC,cAAc,EAAE,OAAO,CAAC,cAAc;gBACtC,UAAU,EAAE,OAAO,CAAC,UAAU;gBAC9B,cAAc,EAAE,OAAO,CAAC,cAAc;gBACtC,kBAAkB,EAAE,OAAO,CAAC,YAAY;aACzC,CACF,CAAC;QACJ,CAAC;QACD,MAAM,CAAC,UAAU,CAAC,qBAAW,CAAC,CAAC;QAE/B,OAAO,IAAA,oBAAU,EAAC,MAAM,CAAyC,CAAC;IACpE,CAAC;IA0FM,KAAK,CAAC,wBAAwB,CACnC,OAAe,EACf,SAAiB,EACjB,oBAAsE,EAAE,EACxE,+BAAwE,EAAE;QAI1E,MAAM,QAAQ,GAAG,OAAO,iBAAiB,KAAK,QAAQ,CAAC,CAAC,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;QACvF,MAAM,OAAO,GACX,OAAO,iBAAiB,KAAK,QAAQ,CAAC,CAAC,CAAC,4BAA4B,CAAC,CAAC,CAAC,iBAAiB,CAAC;QAE3F,MAAM,cAAc,GAAG,sBAAQ,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC;QAE1D,IAAI,MAAM,CAAC;QACX,IAAI,OAAO,CAAC,UAAU,EAAE,CAAC;YACvB,MAAM,GAAG,IAAA,uCAAa,EACpB,IAAI,CAAC,MAAM,EACX,OAAO,CAAC,UAAU,EAClB,IAAI,CAAC,MAAM,CAAC,4BAA4B,EACxC,OAAO,CACR,CAAC;QACJ,CAAC;aAAM,CAAC;YACN,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC,4BAA4B,CAC/C,OAAO,EACP;gBACE,MAAM,EAAE,cAAc,CAAC,UAAU;gBACjC,kBAAkB,EAAE;oBAClB,kBAAkB,EAAE,cAAc,CAAC,SAAS;oBAC5C,KAAK,EAAE,QAAQ;oBACf,kBAAkB,EAAE,QAAQ,KAAK,SAAS;iBAC3C;aACF,EACD;gBACE,WAAW,EAAE,OAAO,CAAC,WAAW;gBAChC,cAAc,EAAE,OAAO,CAAC,cAAc;gBACtC,UAAU,EAAE,OAAO,CAAC,UAAU;gBAC9B,cAAc,EAAE,OAAO,CAAC,cAAc;gBACtC,kBAAkB,EAAE,OAAO,CAAC,YAAY;aACzC,CACF,CAAC;QACJ,CAAC;QACD,MAAM,CAAC,UAAU,CAAC,qBAAW,CAAC,CAAC;QAE/B,OAAO,IAAA,oBAAU,EAAC,MAAM,CAAqD,CAAC;IAChF,CAAC;CACF;AA3oBD,oDA2oBC","sourcesContent":["// Copyright (c) Microsoft Corporation.\n// Licensed under the MIT License.\n\nimport type {\n KeyVaultBackupClientOptions,\n KeyVaultBackupResult,\n KeyVaultBeginBackupOptions,\n KeyVaultBeginPreBackupOptions,\n KeyVaultBeginPreRestoreOptions,\n KeyVaultBeginRestoreOptions,\n KeyVaultBeginSelectiveKeyRestoreOptions,\n KeyVaultRestoreResult,\n KeyVaultSelectiveKeyRestoreResult,\n} from \"./backupClientModels.js\";\nimport type { KeyVaultClient } from \"./generated/keyVaultClient.js\";\nimport type { TokenCredential } from \"@azure/core-auth\";\nimport { mappings } from \"./mappings.js\";\nimport { createKeyVaultClient } from \"./createKeyVaultClient.js\";\nimport type { PollerLike } from \"./lro/shim.js\";\nimport { wrapPoller, updateState } from \"./lro/shim.js\";\nimport {\n KeyVaultAdminPollOperationState,\n KeyVaultBackupOperationState,\n KeyVaultRestoreOperationState,\n KeyVaultSelectiveKeyRestoreOperationState,\n} from \"./lro/models.js\";\nimport { restorePoller } from \"./generated/restorePollerHelpers.js\";\n\nexport {\n KeyVaultBackupOperationState,\n KeyVaultRestoreOperationState,\n KeyVaultSelectiveKeyRestoreOperationState,\n KeyVaultAdminPollOperationState,\n};\n\n/**\n * The KeyVaultBackupClient provides methods to generate backups\n * and restore backups of any given Azure Key Vault instance.\n * This client supports generating full backups, selective restores of specific keys\n * and full restores of Key Vault instances.\n */\nexport class KeyVaultBackupClient {\n /**\n * The base URL to the vault\n */\n public readonly vaultUrl: string;\n\n /**\n * A reference to the auto-generated Key Vault HTTP client.\n */\n private readonly client: KeyVaultClient;\n\n /**\n * Creates an instance of the KeyVaultBackupClient.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleCreateBackupClient\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultBackupClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultBackupClient(vaultUrl, credentials);\n * ```\n * @param vaultUrl - the URL of the Key Vault. It should have this shape: `https://${your-key-vault-name}.vault.azure.net`. You should validate that this URL references a valid Key Vault or Managed HSM resource. See https://aka.ms/azsdk/blog/vault-uri for details.\n * @param credential - An object that implements the `TokenCredential` interface used to authenticate requests to the service. Use the \\@azure/identity package to create a credential that suits your needs.\n * @param options - options used to configure Key Vault API requests.\n */\n constructor(\n vaultUrl: string,\n credential: TokenCredential,\n options: KeyVaultBackupClientOptions = {},\n ) {\n this.vaultUrl = vaultUrl;\n\n this.client = createKeyVaultClient(vaultUrl, credential, options);\n }\n\n /**\n * Starts a pre-backup operation which can be used to check whether the customer can perform a {@link beginBackup} operation using the provided SAS token.\n *\n * This function returns a Long Running Operation poller that allows you to wait indefinitely until the operation completes.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleBeginPreBackup_SAS\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultBackupClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultBackupClient(vaultUrl, credentials);\n *\n * const blobStorageUri = \"<blob-storage-uri>\"; // <Blob storage URL>/<folder name>\n * const sasToken = \"<sas-token>\";\n * const poller = await client.beginPreBackup(blobStorageUri, sasToken);\n *\n * // Serializing the poller\n * const serialized = poller.toString();\n *\n * // A new poller can be created with:\n * await client.beginPreBackup(blobStorageUri, sasToken, { resumeFrom: serialized });\n *\n * // Waiting until it's done\n * const result = await poller.pollUntilDone();\n * console.log(result);\n * ```\n * @param blobStorageUri - The URL of the blob storage resource, including the path to the container where the backup will end up being stored.\n * @param sasToken - The SAS token used to access the blob storage resource.\n * @param options - The optional parameters.\n */\n public async beginPreBackup(\n blobStorageUri: string,\n sasToken: string,\n options?: KeyVaultBeginPreBackupOptions,\n ): Promise<PollerLike<KeyVaultBackupOperationState, KeyVaultBackupResult>>;\n /**\n * Starts a pre-backup operation which can be used to check whether the customer can perform a {@link beginBackup} operation using the Managed HSM's configured user-assigned managed identity to authenticate with Azure Storage.\n *\n * This function returns a Long Running Operation poller that allows you to wait indefinitely until the operation completes.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleBeginPreBackup_NonSAS\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultBackupClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultBackupClient(vaultUrl, credentials);\n *\n * const blobStorageUri = \"<blob-storage-uri>\"; // <Blob storage URL>/<folder name>\n * const poller = await client.beginPreBackup(blobStorageUri);\n *\n * // Serializing the poller\n * const serialized = poller.toString();\n *\n * // A new poller can be created with:\n * await client.beginPreBackup(blobStorageUri, { resumeFrom: serialized });\n *\n * // Waiting until it's done\n * const result = await poller.pollUntilDone();\n * console.log(result);\n * ```\n * @param blobStorageUri - The URL of the blob storage resource, including the path to the container where the backup will end up being stored.\n * @param options - The optional parameters.\n */\n public async beginPreBackup(\n blobStorageUri: string,\n options?: KeyVaultBeginPreBackupOptions,\n ): Promise<PollerLike<KeyVaultBackupOperationState, KeyVaultBackupResult>>;\n public async beginPreBackup(\n blobStorageUri: string,\n sasTokenOrOptions: string | KeyVaultBeginPreBackupOptions = {},\n optionsWhenSasTokenSpecified: KeyVaultBeginPreBackupOptions = {},\n ): Promise<PollerLike<KeyVaultBackupOperationState, KeyVaultBackupResult>> {\n const sasToken = typeof sasTokenOrOptions === \"string\" ? sasTokenOrOptions : undefined;\n const options =\n typeof sasTokenOrOptions === \"string\" ? optionsWhenSasTokenSpecified : sasTokenOrOptions;\n\n let poller;\n if (options.resumeFrom) {\n poller = restorePoller(this.client, options.resumeFrom, this.client.preFullBackup, options);\n } else {\n poller = this.client.preFullBackup(\n {\n storageResourceUri: blobStorageUri,\n token: sasToken,\n useManagedIdentity: sasToken === undefined,\n },\n {\n abortSignal: options.abortSignal,\n requestOptions: options.requestOptions,\n onResponse: options.onResponse,\n tracingOptions: options.tracingOptions,\n updateIntervalInMs: options.intervalInMs,\n },\n );\n }\n\n poller.onProgress(updateState);\n\n return wrapPoller(poller) as ReturnType<typeof this.beginPreBackup>;\n }\n\n /**\n * Starts a pre-restore operation which can be used to check whether the customer can perform a {@link beginRestore} operation using the provided SAS token.\n *\n * This function returns a Long Running Operation poller that allows you to wait indefinitely until the operation completes.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleBeginPreRestore_SAS\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultBackupClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultBackupClient(vaultUrl, credentials);\n *\n * const blobStorageUri = \"<blob-storage-uri>\"; // <Blob storage URL>/<folder name>\n * const sasToken = \"<sas-token>\";\n * const poller = await client.beginPreRestore(blobStorageUri, sasToken);\n *\n * // The poller can be serialized with:\n * const serialized = poller.toString();\n *\n * // A new poller can be created with:\n * await client.beginPreRestore(blobStorageUri, sasToken, { resumeFrom: serialized });\n *\n * // Waiting until it's done\n * await poller.pollUntilDone();\n * ```\n * @param folderUri - The URL of the blob storage resource where the previous successful full backup was stored.\n * @param sasToken - The SAS token. If no SAS token is provided, user-assigned Managed Identity will be used to access the blob storage resource.\n * @param options - The optional parameters.\n */\n public async beginPreRestore(\n folderUri: string,\n sasToken: string,\n options?: KeyVaultBeginPreRestoreOptions,\n ): Promise<PollerLike<KeyVaultRestoreOperationState, KeyVaultRestoreResult>>;\n /**\n * Starts a pre-restore operation which can be used to check whether the customer can perform a {@link beginRestore} operation using the provided SAS token.\n *\n * This function returns a Long Running Operation poller that allows you to wait indefinitely until the operation completes.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleBeginPreRestore_SAS\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultBackupClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultBackupClient(vaultUrl, credentials);\n *\n * const blobStorageUri = \"<blob-storage-uri>\"; // <Blob storage URL>/<folder name>\n * const sasToken = \"<sas-token>\";\n * const poller = await client.beginPreRestore(blobStorageUri, sasToken);\n *\n * // The poller can be serialized with:\n * const serialized = poller.toString();\n *\n * // A new poller can be created with:\n * await client.beginPreRestore(blobStorageUri, sasToken, { resumeFrom: serialized });\n *\n * // Waiting until it's done\n * await poller.pollUntilDone();\n * ```\n * @param folderUri - The URL of the blob storage resource where the previous successful full backup was stored.\n * @param sasToken - The SAS token. If no SAS token is provided, user-assigned Managed Identity will be used to access the blob storage resource.\n * @param options - The optional parameters.\n */\n public async beginPreRestore(\n folderUri: string,\n options?: KeyVaultBeginPreRestoreOptions,\n ): Promise<PollerLike<KeyVaultRestoreOperationState, KeyVaultRestoreResult>>;\n /**\n * Starts a pre-restore operation which can be used to check whether the customer can perform a {@link beginRestore} operation using the Managed HSM's configured user-assigned managed identity to authenticate with Azure Storage.\n *\n * This function returns a Long Running Operation poller that allows you to wait indefinitely until the operation completes.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleBeginPreRestore_SAS\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultBackupClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultBackupClient(vaultUrl, credentials);\n *\n * const blobStorageUri = \"<blob-storage-uri>\"; // <Blob storage URL>/<folder name>\n * const sasToken = \"<sas-token>\";\n * const poller = await client.beginPreRestore(blobStorageUri, sasToken);\n *\n * // The poller can be serialized with:\n * const serialized = poller.toString();\n *\n * // A new poller can be created with:\n * await client.beginPreRestore(blobStorageUri, sasToken, { resumeFrom: serialized });\n *\n * // Waiting until it's done\n * await poller.pollUntilDone();\n * ```\n * @param folderUri - The URL of the blob storage resource where the previous successful full backup was stored.\n * @param sasToken - The SAS token. If no SAS token is provided, user-assigned Managed Identity will be used to access the blob storage resource.\n * @param options - The optional parameters.\n */\n public async beginPreRestore(\n folderUri: string,\n sasTokenOrOptions: string | KeyVaultBeginPreRestoreOptions = {},\n optionsWhenSasTokenSpecified: KeyVaultBeginPreRestoreOptions = {},\n ): Promise<PollerLike<KeyVaultRestoreOperationState, KeyVaultRestoreResult>> {\n const sasToken = typeof sasTokenOrOptions === \"string\" ? sasTokenOrOptions : undefined;\n const options =\n typeof sasTokenOrOptions === \"string\" ? optionsWhenSasTokenSpecified : sasTokenOrOptions;\n\n const folderUriParts = mappings.folderUriParts(folderUri);\n\n let poller;\n if (options.resumeFrom) {\n poller = restorePoller(\n this.client,\n options.resumeFrom,\n this.client.preFullRestoreOperation,\n options,\n );\n } else {\n poller = this.client.preFullRestoreOperation(\n {\n folderToRestore: folderUriParts.folderName,\n sasTokenParameters: {\n storageResourceUri: folderUriParts.folderUri,\n token: sasToken,\n useManagedIdentity: sasToken === undefined,\n },\n },\n {\n abortSignal: options.abortSignal,\n requestOptions: options.requestOptions,\n onResponse: options.onResponse,\n tracingOptions: options.tracingOptions,\n updateIntervalInMs: options.intervalInMs,\n },\n );\n }\n poller.onProgress(updateState);\n\n return wrapPoller(poller) as ReturnType<typeof this.beginPreRestore>;\n }\n\n /**\n * Starts generating a backup of an Azure Key Vault on the specified Storage Blob account.\n *\n * This function returns a Long Running Operation poller that allows you to wait indefinitely until the Key Vault backup is generated.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleBeginBackup_SAS\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultBackupClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultBackupClient(vaultUrl, credentials);\n *\n * const blobStorageUri = \"<blob-storage-uri>\"; // <Blob storage URL>/<folder name>\n * const sasToken = \"<sas-token>\";\n * const poller = await client.beginBackup(blobStorageUri, sasToken);\n *\n * // Serializing the poller\n * const serialized = poller.toString();\n *\n * // A new poller can be created with:\n * await client.beginBackup(blobStorageUri, sasToken, { resumeFrom: serialized });\n *\n * // Waiting until it's done\n * const backupUri = await poller.pollUntilDone();\n * console.log(backupUri);\n * ```\n * Starts a full backup operation.\n * @param blobStorageUri - The URL of the blob storage resource, including the path to the container where the backup will end up being stored.\n * @param sasToken - The SAS token used to access the blob storage resource.\n * @param options - The optional parameters.\n */\n public async beginBackup(\n blobStorageUri: string,\n sasToken: string,\n options?: KeyVaultBeginBackupOptions,\n ): Promise<PollerLike<KeyVaultBackupOperationState, KeyVaultBackupResult>>;\n\n /**\n * Starts generating a backup of an Azure Key Vault on the specified Storage Blob account, using a user-assigned Managed Identity\n * to access the Storage account.\n *\n * This function returns a Long Running Operation poller that allows you to wait indefinitely until the Key Vault backup is generated.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleBeginBackup_NonSAS\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultBackupClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultBackupClient(vaultUrl, credentials);\n *\n * const blobStorageUri = \"<blob-storage-uri>\"; // <Blob storage URL>/<folder name>\n * const poller = await client.beginBackup(blobStorageUri);\n *\n * // Serializing the poller\n * const serialized = poller.toString();\n *\n * // A new poller can be created with:\n * await client.beginBackup(blobStorageUri, { resumeFrom: serialized });\n *\n * // Waiting until it's done\n * const backupUri = await poller.pollUntilDone();\n * console.log(backupUri);\n * ```\n * Starts a full backup operation.\n * @param blobStorageUri - The URL of the blob storage resource, including the path to the container where the backup will end up being stored.\n * @param options - The optional parameters.\n */\n public async beginBackup(\n blobStorageUri: string,\n options?: KeyVaultBeginBackupOptions,\n ): Promise<PollerLike<KeyVaultBackupOperationState, KeyVaultBackupResult>>;\n\n public async beginBackup(\n blobStorageUri: string,\n sasTokenOrOptions: string | KeyVaultBeginBackupOptions = {},\n optionsWhenSasTokenSpecified: KeyVaultBeginBackupOptions = {},\n ): Promise<PollerLike<KeyVaultBackupOperationState, KeyVaultBackupResult>> {\n const sasToken = typeof sasTokenOrOptions === \"string\" ? sasTokenOrOptions : undefined;\n const options =\n typeof sasTokenOrOptions === \"string\" ? optionsWhenSasTokenSpecified : sasTokenOrOptions;\n\n let poller;\n if (options.resumeFrom) {\n poller = restorePoller(this.client, options.resumeFrom, this.client.fullBackup, options);\n } else {\n poller = this.client.fullBackup(\n {\n storageResourceUri: blobStorageUri,\n token: sasToken,\n useManagedIdentity: sasToken === undefined,\n },\n {\n abortSignal: options.abortSignal,\n requestOptions: options.requestOptions,\n onResponse: options.onResponse,\n tracingOptions: options.tracingOptions,\n updateIntervalInMs: options.intervalInMs,\n },\n );\n }\n\n poller.onProgress(updateState);\n\n return wrapPoller(poller) as ReturnType<typeof this.beginBackup>;\n }\n\n /**\n * Starts restoring all key materials using the SAS token pointing to a previously stored Azure Blob storage\n * backup folder.\n *\n * This function returns a Long Running Operation poller that allows you to wait indefinitely until the Key Vault restore operation is complete.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleBeginRestore_SAS\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultBackupClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultBackupClient(vaultUrl, credentials);\n *\n * const blobStorageUri = \"<blob-storage-uri>\"; // <Blob storage URL>/<folder name>\n * const sasToken = \"<sas-token>\";\n * const poller = await client.beginRestore(blobStorageUri, sasToken);\n *\n * // The poller can be serialized with:\n * const serialized = poller.toString();\n *\n * // A new poller can be created with:\n * await client.beginRestore(blobStorageUri, sasToken, { resumeFrom: serialized });\n *\n * // Waiting until it's done\n * const backupUri = await poller.pollUntilDone();\n * console.log(backupUri);\n * ```\n * Starts a full restore operation.\n * @param folderUri - The URL of the blob storage resource where the previous successful full backup was stored.\n * @param sasToken - The SAS token. If no SAS token is provided, user-assigned Managed Identity will be used to access the blob storage resource.\n * @param options - The optional parameters.\n */\n public async beginRestore(\n folderUri: string,\n sasToken: string,\n options?: KeyVaultBeginRestoreOptions,\n ): Promise<PollerLike<KeyVaultRestoreOperationState, KeyVaultRestoreResult>>;\n\n /**\n * Starts restoring all key materials using the SAS token pointing to a previously stored Azure Blob storage\n * backup folder, using a user-assigned Managed Identity to access the storage account.\n *\n * This function returns a Long Running Operation poller that allows you to wait indefinitely until the Key Vault restore operation is complete.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleBeginRestore_NonSAS\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultBackupClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultBackupClient(vaultUrl, credentials);\n *\n * const blobStorageUri = \"<blob-storage-uri>\"; // <Blob storage URL>/<folder name>\n * const poller = await client.beginRestore(blobStorageUri);\n *\n * // The poller can be serialized with:\n * const serialized = poller.toString();\n *\n * // A new poller can be created with:\n * await client.beginRestore(blobStorageUri, { resumeFrom: serialized });\n *\n * // Waiting until it's done\n * await poller.pollUntilDone();\n * ```\n * Starts a full restore operation.\n * @param folderUri - The URL of the blob storage resource where the previous successful full backup was stored.\n * @param sasToken - The SAS token. If no SAS token is provided, user-assigned Managed Identity will be used to access the blob storage resource.\n * @param options - The optional parameters.\n */\n public async beginRestore(\n folderUri: string,\n options?: KeyVaultBeginRestoreOptions,\n ): Promise<PollerLike<KeyVaultRestoreOperationState, KeyVaultRestoreResult>>;\n\n public async beginRestore(\n folderUri: string,\n sasTokenOrOptions: string | KeyVaultBeginRestoreOptions = {},\n optionsWhenSasTokenSpecified: KeyVaultBeginRestoreOptions = {},\n ): Promise<PollerLike<KeyVaultRestoreOperationState, KeyVaultRestoreResult>> {\n const sasToken = typeof sasTokenOrOptions === \"string\" ? sasTokenOrOptions : undefined;\n const options =\n typeof sasTokenOrOptions === \"string\" ? optionsWhenSasTokenSpecified : sasTokenOrOptions;\n\n const folderUriParts = mappings.folderUriParts(folderUri);\n\n let poller;\n if (options.resumeFrom) {\n poller = restorePoller(\n this.client,\n options.resumeFrom,\n this.client.fullRestoreOperation,\n options,\n );\n } else {\n poller = this.client.fullRestoreOperation(\n {\n folderToRestore: folderUriParts.folderName,\n sasTokenParameters: {\n storageResourceUri: folderUriParts.folderUri,\n token: sasToken,\n useManagedIdentity: sasToken === undefined,\n },\n },\n {\n abortSignal: options.abortSignal,\n requestOptions: options.requestOptions,\n onResponse: options.onResponse,\n tracingOptions: options.tracingOptions,\n updateIntervalInMs: options.intervalInMs,\n },\n );\n }\n poller.onProgress(updateState);\n\n return wrapPoller(poller) as ReturnType<typeof this.beginRestore>;\n }\n\n /**\n * Starts restoring all key versions of a given key using user supplied SAS token pointing to a previously\n * stored Azure Blob storage backup folder.\n *\n * This function returns a Long Running Operation poller that allows you to wait indefinitely until the Key Vault selective restore is complete.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleBeginSelectiveKeyRestore_SAS\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultBackupClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultBackupClient(vaultUrl, credentials);\n *\n * const blobStorageUri = \"<blob-storage-uri>\";\n * const sasToken = \"<sas-token>\";\n * const keyName = \"<key-name>\";\n * const poller = await client.beginSelectiveKeyRestore(keyName, blobStorageUri, sasToken);\n *\n * // Serializing the poller\n * const serialized = poller.toString();\n *\n * // A new poller can be created with:\n * await client.beginSelectiveKeyRestore(keyName, blobStorageUri, sasToken, {\n * resumeFrom: serialized,\n * });\n *\n * // Waiting until it's done\n * await poller.pollUntilDone();\n * ```\n * Creates a new role assignment.\n * @param keyName - The name of the key that wants to be restored.\n * @param folderUri - The URL of the blob storage resource, with the folder name of the blob where the previous successful full backup was stored.\n * @param sasToken - The SAS token. If no SAS token is provided, user-assigned Managed Identity will be used to access the blob storage resource.\n * @param options - The optional parameters.\n */\n public async beginSelectiveKeyRestore(\n keyName: string,\n folderUri: string,\n sasToken: string,\n options?: KeyVaultBeginSelectiveKeyRestoreOptions,\n ): Promise<\n PollerLike<KeyVaultSelectiveKeyRestoreOperationState, KeyVaultSelectiveKeyRestoreResult>\n >;\n\n /**\n * Starts restoring all key versions of a given key using to a previously\n * stored Azure Blob storage backup folder. The Blob storage backup folder will be accessed using user-assigned Managed Identity.\n *\n * This function returns a Long Running Operation poller that allows you to wait indefinitely until the Key Vault selective restore is complete.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleBeginSelectiveKeyRestore_NonSAS\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultBackupClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultBackupClient(vaultUrl, credentials);\n *\n * const blobStorageUri = \"<blob-storage-uri>\";\n * const keyName = \"<key-name>\";\n * const poller = await client.beginSelectiveKeyRestore(keyName, blobStorageUri);\n *\n * // Serializing the poller\n * const serialized = poller.toString();\n *\n * // A new poller can be created with:\n * await client.beginSelectiveKeyRestore(keyName, blobStorageUri, { resumeFrom: serialized });\n *\n * // Waiting until it's done\n * await poller.pollUntilDone();\n * ```\n * Creates a new role assignment.\n * @param keyName - The name of the key that wants to be restored.\n * @param folderUri - The URL of the blob storage resource, with the folder name of the blob where the previous successful full backup was stored.\n * @param sasToken - The SAS token. If no SAS token is provided, user-assigned Managed Identity will be used to access the blob storage resource.\n * @param options - The optional parameters.\n */\n public async beginSelectiveKeyRestore(\n keyName: string,\n folderUri: string,\n options?: KeyVaultBeginSelectiveKeyRestoreOptions,\n ): Promise<\n PollerLike<KeyVaultSelectiveKeyRestoreOperationState, KeyVaultSelectiveKeyRestoreResult>\n >;\n\n public async beginSelectiveKeyRestore(\n keyName: string,\n folderUri: string,\n sasTokenOrOptions: string | KeyVaultBeginSelectiveKeyRestoreOptions = {},\n optionsWhenSasTokenSpecified: KeyVaultBeginSelectiveKeyRestoreOptions = {},\n ): Promise<\n PollerLike<KeyVaultSelectiveKeyRestoreOperationState, KeyVaultSelectiveKeyRestoreResult>\n > {\n const sasToken = typeof sasTokenOrOptions === \"string\" ? sasTokenOrOptions : undefined;\n const options =\n typeof sasTokenOrOptions === \"string\" ? optionsWhenSasTokenSpecified : sasTokenOrOptions;\n\n const folderUriParts = mappings.folderUriParts(folderUri);\n\n let poller;\n if (options.resumeFrom) {\n poller = restorePoller(\n this.client,\n options.resumeFrom,\n this.client.selectiveKeyRestoreOperation,\n options,\n );\n } else {\n poller = this.client.selectiveKeyRestoreOperation(\n keyName,\n {\n folder: folderUriParts.folderName,\n sasTokenParameters: {\n storageResourceUri: folderUriParts.folderUri,\n token: sasToken,\n useManagedIdentity: sasToken === undefined,\n },\n },\n {\n abortSignal: options.abortSignal,\n requestOptions: options.requestOptions,\n onResponse: options.onResponse,\n tracingOptions: options.tracingOptions,\n updateIntervalInMs: options.intervalInMs,\n },\n );\n }\n poller.onProgress(updateState);\n\n return wrapPoller(poller) as ReturnType<typeof this.beginSelectiveKeyRestore>;\n }\n}\n"]}
|
|
1
|
+
{"version":3,"file":"backupClient.js","sourceRoot":"","sources":["../../src/backupClient.ts"],"names":[],"mappings":";AAAA,uCAAuC;AACvC,kCAAkC;;;AAelC,+CAAyC;AACzC,uEAAiE;AAEjE,2CAAwD;AAOxD,qFAAwE;AASxE;;;;;GAKG;AACH,MAAa,oBAAoB;IAW/B;;;;;;;;;;;;;;;OAeG;IACH,YACE,QAAgB,EAChB,UAA2B,EAC3B,UAAuC,EAAE;QAEzC,IAAI,CAAC,QAAQ,GAAG,QAAQ,CAAC;QAEzB,IAAI,CAAC,MAAM,GAAG,IAAA,8CAAoB,EAAC,QAAQ,EAAE,UAAU,EAAE,OAAO,CAAC,CAAC;IACpE,CAAC;IAyEM,KAAK,CAAC,cAAc,CACzB,cAAsB,EACtB,oBAA4D,EAAE,EAC9D,+BAA8D,EAAE;QAEhE,MAAM,QAAQ,GAAG,OAAO,iBAAiB,KAAK,QAAQ,CAAC,CAAC,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;QACvF,MAAM,OAAO,GACX,OAAO,iBAAiB,KAAK,QAAQ,CAAC,CAAC,CAAC,4BAA4B,CAAC,CAAC,CAAC,iBAAiB,CAAC;QAE3F,IAAI,MAAM,CAAC;QACX,IAAI,OAAO,CAAC,UAAU,EAAE,CAAC;YACvB,MAAM,GAAG,IAAA,uCAAa,EAAC,IAAI,CAAC,MAAM,EAAE,OAAO,CAAC,UAAU,EAAE,IAAI,CAAC,MAAM,CAAC,aAAa,EAAE,OAAO,CAAC,CAAC;QAC9F,CAAC;aAAM,CAAC;YACN,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC,aAAa,CAChC;gBACE,kBAAkB,EAAE,cAAc;gBAClC,KAAK,EAAE,QAAQ;gBACf,kBAAkB,EAAE,QAAQ,KAAK,SAAS;aAC3C,EACD;gBACE,WAAW,EAAE,OAAO,CAAC,WAAW;gBAChC,cAAc,EAAE,OAAO,CAAC,cAAc;gBACtC,UAAU,EAAE,OAAO,CAAC,UAAU;gBAC9B,cAAc,EAAE,OAAO,CAAC,cAAc;gBACtC,kBAAkB,EAAE,OAAO,CAAC,YAAY;aACzC,CACF,CAAC;QACJ,CAAC;QAED,MAAM,CAAC,UAAU,CAAC,qBAAW,CAAC,CAAC;QAE/B,OAAO,IAAA,oBAAU,EAAC,MAAM,CAA2C,CAAC;IACtE,CAAC;IAyED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA8BG;IACI,KAAK,CAAC,eAAe,CAC1B,SAAiB,EACjB,oBAA6D,EAAE,EAC/D,+BAA+D,EAAE;QAEjE,MAAM,QAAQ,GAAG,OAAO,iBAAiB,KAAK,QAAQ,CAAC,CAAC,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;QACvF,MAAM,OAAO,GACX,OAAO,iBAAiB,KAAK,QAAQ,CAAC,CAAC,CAAC,4BAA4B,CAAC,CAAC,CAAC,iBAAiB,CAAC;QAE3F,MAAM,cAAc,GAAG,sBAAQ,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC;QAE1D,IAAI,MAAM,CAAC;QACX,IAAI,OAAO,CAAC,UAAU,EAAE,CAAC;YACvB,MAAM,GAAG,IAAA,uCAAa,EACpB,IAAI,CAAC,MAAM,EACX,OAAO,CAAC,UAAU,EAClB,IAAI,CAAC,MAAM,CAAC,uBAAuB,EACnC,OAAO,CACR,CAAC;QACJ,CAAC;aAAM,CAAC;YACN,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC,uBAAuB,CAC1C;gBACE,eAAe,EAAE,cAAc,CAAC,UAAU;gBAC1C,kBAAkB,EAAE;oBAClB,kBAAkB,EAAE,cAAc,CAAC,SAAS;oBAC5C,KAAK,EAAE,QAAQ;oBACf,kBAAkB,EAAE,QAAQ,KAAK,SAAS;iBAC3C;aACF,EACD;gBACE,WAAW,EAAE,OAAO,CAAC,WAAW;gBAChC,cAAc,EAAE,OAAO,CAAC,cAAc;gBACtC,UAAU,EAAE,OAAO,CAAC,UAAU;gBAC9B,cAAc,EAAE,OAAO,CAAC,cAAc;gBACtC,kBAAkB,EAAE,OAAO,CAAC,YAAY;aACzC,CACF,CAAC;QACJ,CAAC;QACD,MAAM,CAAC,UAAU,CAAC,qBAAW,CAAC,CAAC;QAE/B,OAAO,IAAA,oBAAU,EAAC,MAAM,CAA4C,CAAC;IACvE,CAAC;IA8EM,KAAK,CAAC,WAAW,CACtB,cAAsB,EACtB,oBAAyD,EAAE,EAC3D,+BAA2D,EAAE;QAE7D,MAAM,QAAQ,GAAG,OAAO,iBAAiB,KAAK,QAAQ,CAAC,CAAC,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;QACvF,MAAM,OAAO,GACX,OAAO,iBAAiB,KAAK,QAAQ,CAAC,CAAC,CAAC,4BAA4B,CAAC,CAAC,CAAC,iBAAiB,CAAC;QAE3F,IAAI,MAAM,CAAC;QACX,IAAI,OAAO,CAAC,UAAU,EAAE,CAAC;YACvB,MAAM,GAAG,IAAA,uCAAa,EAAC,IAAI,CAAC,MAAM,EAAE,OAAO,CAAC,UAAU,EAAE,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,OAAO,CAAC,CAAC;QAC3F,CAAC;aAAM,CAAC;YACN,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC,UAAU,CAC7B;gBACE,kBAAkB,EAAE,cAAc;gBAClC,KAAK,EAAE,QAAQ;gBACf,kBAAkB,EAAE,QAAQ,KAAK,SAAS;aAC3C,EACD;gBACE,WAAW,EAAE,OAAO,CAAC,WAAW;gBAChC,cAAc,EAAE,OAAO,CAAC,cAAc;gBACtC,UAAU,EAAE,OAAO,CAAC,UAAU;gBAC9B,cAAc,EAAE,OAAO,CAAC,cAAc;gBACtC,kBAAkB,EAAE,OAAO,CAAC,YAAY;aACzC,CACF,CAAC;QACJ,CAAC;QAED,MAAM,CAAC,UAAU,CAAC,qBAAW,CAAC,CAAC;QAE/B,OAAO,IAAA,oBAAU,EAAC,MAAM,CAAwC,CAAC;IACnE,CAAC;IA+EM,KAAK,CAAC,YAAY,CACvB,SAAiB,EACjB,oBAA0D,EAAE,EAC5D,+BAA4D,EAAE;QAE9D,MAAM,QAAQ,GAAG,OAAO,iBAAiB,KAAK,QAAQ,CAAC,CAAC,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;QACvF,MAAM,OAAO,GACX,OAAO,iBAAiB,KAAK,QAAQ,CAAC,CAAC,CAAC,4BAA4B,CAAC,CAAC,CAAC,iBAAiB,CAAC;QAE3F,MAAM,cAAc,GAAG,sBAAQ,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC;QAE1D,IAAI,MAAM,CAAC;QACX,IAAI,OAAO,CAAC,UAAU,EAAE,CAAC;YACvB,MAAM,GAAG,IAAA,uCAAa,EACpB,IAAI,CAAC,MAAM,EACX,OAAO,CAAC,UAAU,EAClB,IAAI,CAAC,MAAM,CAAC,oBAAoB,EAChC,OAAO,CACR,CAAC;QACJ,CAAC;aAAM,CAAC;YACN,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC,oBAAoB,CACvC;gBACE,eAAe,EAAE,cAAc,CAAC,UAAU;gBAC1C,kBAAkB,EAAE;oBAClB,kBAAkB,EAAE,cAAc,CAAC,SAAS;oBAC5C,KAAK,EAAE,QAAQ;oBACf,kBAAkB,EAAE,QAAQ,KAAK,SAAS;iBAC3C;aACF,EACD;gBACE,WAAW,EAAE,OAAO,CAAC,WAAW;gBAChC,cAAc,EAAE,OAAO,CAAC,cAAc;gBACtC,UAAU,EAAE,OAAO,CAAC,UAAU;gBAC9B,cAAc,EAAE,OAAO,CAAC,cAAc;gBACtC,kBAAkB,EAAE,OAAO,CAAC,YAAY;aACzC,CACF,CAAC;QACJ,CAAC;QACD,MAAM,CAAC,UAAU,CAAC,qBAAW,CAAC,CAAC;QAE/B,OAAO,IAAA,oBAAU,EAAC,MAAM,CAAyC,CAAC;IACpE,CAAC;IA0FM,KAAK,CAAC,wBAAwB,CACnC,OAAe,EACf,SAAiB,EACjB,oBAAsE,EAAE,EACxE,+BAAwE,EAAE;QAI1E,MAAM,QAAQ,GAAG,OAAO,iBAAiB,KAAK,QAAQ,CAAC,CAAC,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;QACvF,MAAM,OAAO,GACX,OAAO,iBAAiB,KAAK,QAAQ,CAAC,CAAC,CAAC,4BAA4B,CAAC,CAAC,CAAC,iBAAiB,CAAC;QAE3F,MAAM,cAAc,GAAG,sBAAQ,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC;QAE1D,IAAI,MAAM,CAAC;QACX,IAAI,OAAO,CAAC,UAAU,EAAE,CAAC;YACvB,MAAM,GAAG,IAAA,uCAAa,EACpB,IAAI,CAAC,MAAM,EACX,OAAO,CAAC,UAAU,EAClB,IAAI,CAAC,MAAM,CAAC,4BAA4B,EACxC,OAAO,CACR,CAAC;QACJ,CAAC;aAAM,CAAC;YACN,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC,4BAA4B,CAC/C,OAAO,EACP;gBACE,MAAM,EAAE,cAAc,CAAC,UAAU;gBACjC,kBAAkB,EAAE;oBAClB,kBAAkB,EAAE,cAAc,CAAC,SAAS;oBAC5C,KAAK,EAAE,QAAQ;oBACf,kBAAkB,EAAE,QAAQ,KAAK,SAAS;iBAC3C;aACF,EACD;gBACE,WAAW,EAAE,OAAO,CAAC,WAAW;gBAChC,cAAc,EAAE,OAAO,CAAC,cAAc;gBACtC,UAAU,EAAE,OAAO,CAAC,UAAU;gBAC9B,cAAc,EAAE,OAAO,CAAC,cAAc;gBACtC,kBAAkB,EAAE,OAAO,CAAC,YAAY;aACzC,CACF,CAAC;QACJ,CAAC;QACD,MAAM,CAAC,UAAU,CAAC,qBAAW,CAAC,CAAC;QAE/B,OAAO,IAAA,oBAAU,EAAC,MAAM,CAAqD,CAAC;IAChF,CAAC;CACF;AA3oBD,oDA2oBC","sourcesContent":["// Copyright (c) Microsoft Corporation.\n// Licensed under the MIT License.\n\nimport type {\n KeyVaultBackupClientOptions,\n KeyVaultBackupResult,\n KeyVaultBeginBackupOptions,\n KeyVaultBeginPreBackupOptions,\n KeyVaultBeginPreRestoreOptions,\n KeyVaultBeginRestoreOptions,\n KeyVaultBeginSelectiveKeyRestoreOptions,\n KeyVaultRestoreResult,\n KeyVaultSelectiveKeyRestoreResult,\n} from \"./backupClientModels.js\";\nimport type { KeyVaultClient } from \"./generated/src/keyVaultClient.js\";\nimport type { TokenCredential } from \"@azure/core-auth\";\nimport { mappings } from \"./mappings.js\";\nimport { createKeyVaultClient } from \"./createKeyVaultClient.js\";\nimport type { PollerLike } from \"./lro/shim.js\";\nimport { wrapPoller, updateState } from \"./lro/shim.js\";\nimport {\n KeyVaultAdminPollOperationState,\n KeyVaultBackupOperationState,\n KeyVaultRestoreOperationState,\n KeyVaultSelectiveKeyRestoreOperationState,\n} from \"./lro/models.js\";\nimport { restorePoller } from \"./generated/src/restorePollerHelpers.js\";\n\nexport {\n KeyVaultBackupOperationState,\n KeyVaultRestoreOperationState,\n KeyVaultSelectiveKeyRestoreOperationState,\n KeyVaultAdminPollOperationState,\n};\n\n/**\n * The KeyVaultBackupClient provides methods to generate backups\n * and restore backups of any given Azure Key Vault instance.\n * This client supports generating full backups, selective restores of specific keys\n * and full restores of Key Vault instances.\n */\nexport class KeyVaultBackupClient {\n /**\n * The base URL to the vault\n */\n public readonly vaultUrl: string;\n\n /**\n * A reference to the auto-generated Key Vault HTTP client.\n */\n private readonly client: KeyVaultClient;\n\n /**\n * Creates an instance of the KeyVaultBackupClient.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleCreateBackupClient\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultBackupClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultBackupClient(vaultUrl, credentials);\n * ```\n * @param vaultUrl - the URL of the Key Vault. It should have this shape: `https://${your-key-vault-name}.vault.azure.net`. You should validate that this URL references a valid Key Vault or Managed HSM resource. See https://aka.ms/azsdk/blog/vault-uri for details.\n * @param credential - An object that implements the `TokenCredential` interface used to authenticate requests to the service. Use the \\@azure/identity package to create a credential that suits your needs.\n * @param options - options used to configure Key Vault API requests.\n */\n constructor(\n vaultUrl: string,\n credential: TokenCredential,\n options: KeyVaultBackupClientOptions = {},\n ) {\n this.vaultUrl = vaultUrl;\n\n this.client = createKeyVaultClient(vaultUrl, credential, options);\n }\n\n /**\n * Starts a pre-backup operation which can be used to check whether the customer can perform a {@link beginBackup} operation using the provided SAS token.\n *\n * This function returns a Long Running Operation poller that allows you to wait indefinitely until the operation completes.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleBeginPreBackup_SAS\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultBackupClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultBackupClient(vaultUrl, credentials);\n *\n * const blobStorageUri = \"<blob-storage-uri>\"; // <Blob storage URL>/<folder name>\n * const sasToken = \"<sas-token>\";\n * const poller = await client.beginPreBackup(blobStorageUri, sasToken);\n *\n * // Serializing the poller\n * const serialized = poller.toString();\n *\n * // A new poller can be created with:\n * await client.beginPreBackup(blobStorageUri, sasToken, { resumeFrom: serialized });\n *\n * // Waiting until it's done\n * const result = await poller.pollUntilDone();\n * console.log(result);\n * ```\n * @param blobStorageUri - The URL of the blob storage resource, including the path to the container where the backup will end up being stored.\n * @param sasToken - The SAS token used to access the blob storage resource.\n * @param options - The optional parameters.\n */\n public async beginPreBackup(\n blobStorageUri: string,\n sasToken: string,\n options?: KeyVaultBeginPreBackupOptions,\n ): Promise<PollerLike<KeyVaultBackupOperationState, KeyVaultBackupResult>>;\n /**\n * Starts a pre-backup operation which can be used to check whether the customer can perform a {@link beginBackup} operation using the Managed HSM's configured user-assigned managed identity to authenticate with Azure Storage.\n *\n * This function returns a Long Running Operation poller that allows you to wait indefinitely until the operation completes.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleBeginPreBackup_NonSAS\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultBackupClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultBackupClient(vaultUrl, credentials);\n *\n * const blobStorageUri = \"<blob-storage-uri>\"; // <Blob storage URL>/<folder name>\n * const poller = await client.beginPreBackup(blobStorageUri);\n *\n * // Serializing the poller\n * const serialized = poller.toString();\n *\n * // A new poller can be created with:\n * await client.beginPreBackup(blobStorageUri, { resumeFrom: serialized });\n *\n * // Waiting until it's done\n * const result = await poller.pollUntilDone();\n * console.log(result);\n * ```\n * @param blobStorageUri - The URL of the blob storage resource, including the path to the container where the backup will end up being stored.\n * @param options - The optional parameters.\n */\n public async beginPreBackup(\n blobStorageUri: string,\n options?: KeyVaultBeginPreBackupOptions,\n ): Promise<PollerLike<KeyVaultBackupOperationState, KeyVaultBackupResult>>;\n public async beginPreBackup(\n blobStorageUri: string,\n sasTokenOrOptions: string | KeyVaultBeginPreBackupOptions = {},\n optionsWhenSasTokenSpecified: KeyVaultBeginPreBackupOptions = {},\n ): Promise<PollerLike<KeyVaultBackupOperationState, KeyVaultBackupResult>> {\n const sasToken = typeof sasTokenOrOptions === \"string\" ? sasTokenOrOptions : undefined;\n const options =\n typeof sasTokenOrOptions === \"string\" ? optionsWhenSasTokenSpecified : sasTokenOrOptions;\n\n let poller;\n if (options.resumeFrom) {\n poller = restorePoller(this.client, options.resumeFrom, this.client.preFullBackup, options);\n } else {\n poller = this.client.preFullBackup(\n {\n storageResourceUri: blobStorageUri,\n token: sasToken,\n useManagedIdentity: sasToken === undefined,\n },\n {\n abortSignal: options.abortSignal,\n requestOptions: options.requestOptions,\n onResponse: options.onResponse,\n tracingOptions: options.tracingOptions,\n updateIntervalInMs: options.intervalInMs,\n },\n );\n }\n\n poller.onProgress(updateState);\n\n return wrapPoller(poller) as ReturnType<typeof this.beginPreBackup>;\n }\n\n /**\n * Starts a pre-restore operation which can be used to check whether the customer can perform a {@link beginRestore} operation using the provided SAS token.\n *\n * This function returns a Long Running Operation poller that allows you to wait indefinitely until the operation completes.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleBeginPreRestore_SAS\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultBackupClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultBackupClient(vaultUrl, credentials);\n *\n * const blobStorageUri = \"<blob-storage-uri>\"; // <Blob storage URL>/<folder name>\n * const sasToken = \"<sas-token>\";\n * const poller = await client.beginPreRestore(blobStorageUri, sasToken);\n *\n * // The poller can be serialized with:\n * const serialized = poller.toString();\n *\n * // A new poller can be created with:\n * await client.beginPreRestore(blobStorageUri, sasToken, { resumeFrom: serialized });\n *\n * // Waiting until it's done\n * await poller.pollUntilDone();\n * ```\n * @param folderUri - The URL of the blob storage resource where the previous successful full backup was stored.\n * @param sasToken - The SAS token. If no SAS token is provided, user-assigned Managed Identity will be used to access the blob storage resource.\n * @param options - The optional parameters.\n */\n public async beginPreRestore(\n folderUri: string,\n sasToken: string,\n options?: KeyVaultBeginPreRestoreOptions,\n ): Promise<PollerLike<KeyVaultRestoreOperationState, KeyVaultRestoreResult>>;\n /**\n * Starts a pre-restore operation which can be used to check whether the customer can perform a {@link beginRestore} operation using the provided SAS token.\n *\n * This function returns a Long Running Operation poller that allows you to wait indefinitely until the operation completes.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleBeginPreRestore_SAS\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultBackupClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultBackupClient(vaultUrl, credentials);\n *\n * const blobStorageUri = \"<blob-storage-uri>\"; // <Blob storage URL>/<folder name>\n * const sasToken = \"<sas-token>\";\n * const poller = await client.beginPreRestore(blobStorageUri, sasToken);\n *\n * // The poller can be serialized with:\n * const serialized = poller.toString();\n *\n * // A new poller can be created with:\n * await client.beginPreRestore(blobStorageUri, sasToken, { resumeFrom: serialized });\n *\n * // Waiting until it's done\n * await poller.pollUntilDone();\n * ```\n * @param folderUri - The URL of the blob storage resource where the previous successful full backup was stored.\n * @param sasToken - The SAS token. If no SAS token is provided, user-assigned Managed Identity will be used to access the blob storage resource.\n * @param options - The optional parameters.\n */\n public async beginPreRestore(\n folderUri: string,\n options?: KeyVaultBeginPreRestoreOptions,\n ): Promise<PollerLike<KeyVaultRestoreOperationState, KeyVaultRestoreResult>>;\n /**\n * Starts a pre-restore operation which can be used to check whether the customer can perform a {@link beginRestore} operation using the Managed HSM's configured user-assigned managed identity to authenticate with Azure Storage.\n *\n * This function returns a Long Running Operation poller that allows you to wait indefinitely until the operation completes.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleBeginPreRestore_SAS\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultBackupClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultBackupClient(vaultUrl, credentials);\n *\n * const blobStorageUri = \"<blob-storage-uri>\"; // <Blob storage URL>/<folder name>\n * const sasToken = \"<sas-token>\";\n * const poller = await client.beginPreRestore(blobStorageUri, sasToken);\n *\n * // The poller can be serialized with:\n * const serialized = poller.toString();\n *\n * // A new poller can be created with:\n * await client.beginPreRestore(blobStorageUri, sasToken, { resumeFrom: serialized });\n *\n * // Waiting until it's done\n * await poller.pollUntilDone();\n * ```\n * @param folderUri - The URL of the blob storage resource where the previous successful full backup was stored.\n * @param sasToken - The SAS token. If no SAS token is provided, user-assigned Managed Identity will be used to access the blob storage resource.\n * @param options - The optional parameters.\n */\n public async beginPreRestore(\n folderUri: string,\n sasTokenOrOptions: string | KeyVaultBeginPreRestoreOptions = {},\n optionsWhenSasTokenSpecified: KeyVaultBeginPreRestoreOptions = {},\n ): Promise<PollerLike<KeyVaultRestoreOperationState, KeyVaultRestoreResult>> {\n const sasToken = typeof sasTokenOrOptions === \"string\" ? sasTokenOrOptions : undefined;\n const options =\n typeof sasTokenOrOptions === \"string\" ? optionsWhenSasTokenSpecified : sasTokenOrOptions;\n\n const folderUriParts = mappings.folderUriParts(folderUri);\n\n let poller;\n if (options.resumeFrom) {\n poller = restorePoller(\n this.client,\n options.resumeFrom,\n this.client.preFullRestoreOperation,\n options,\n );\n } else {\n poller = this.client.preFullRestoreOperation(\n {\n folderToRestore: folderUriParts.folderName,\n sasTokenParameters: {\n storageResourceUri: folderUriParts.folderUri,\n token: sasToken,\n useManagedIdentity: sasToken === undefined,\n },\n },\n {\n abortSignal: options.abortSignal,\n requestOptions: options.requestOptions,\n onResponse: options.onResponse,\n tracingOptions: options.tracingOptions,\n updateIntervalInMs: options.intervalInMs,\n },\n );\n }\n poller.onProgress(updateState);\n\n return wrapPoller(poller) as ReturnType<typeof this.beginPreRestore>;\n }\n\n /**\n * Starts generating a backup of an Azure Key Vault on the specified Storage Blob account.\n *\n * This function returns a Long Running Operation poller that allows you to wait indefinitely until the Key Vault backup is generated.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleBeginBackup_SAS\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultBackupClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultBackupClient(vaultUrl, credentials);\n *\n * const blobStorageUri = \"<blob-storage-uri>\"; // <Blob storage URL>/<folder name>\n * const sasToken = \"<sas-token>\";\n * const poller = await client.beginBackup(blobStorageUri, sasToken);\n *\n * // Serializing the poller\n * const serialized = poller.toString();\n *\n * // A new poller can be created with:\n * await client.beginBackup(blobStorageUri, sasToken, { resumeFrom: serialized });\n *\n * // Waiting until it's done\n * const backupUri = await poller.pollUntilDone();\n * console.log(backupUri);\n * ```\n * Starts a full backup operation.\n * @param blobStorageUri - The URL of the blob storage resource, including the path to the container where the backup will end up being stored.\n * @param sasToken - The SAS token used to access the blob storage resource.\n * @param options - The optional parameters.\n */\n public async beginBackup(\n blobStorageUri: string,\n sasToken: string,\n options?: KeyVaultBeginBackupOptions,\n ): Promise<PollerLike<KeyVaultBackupOperationState, KeyVaultBackupResult>>;\n\n /**\n * Starts generating a backup of an Azure Key Vault on the specified Storage Blob account, using a user-assigned Managed Identity\n * to access the Storage account.\n *\n * This function returns a Long Running Operation poller that allows you to wait indefinitely until the Key Vault backup is generated.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleBeginBackup_NonSAS\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultBackupClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultBackupClient(vaultUrl, credentials);\n *\n * const blobStorageUri = \"<blob-storage-uri>\"; // <Blob storage URL>/<folder name>\n * const poller = await client.beginBackup(blobStorageUri);\n *\n * // Serializing the poller\n * const serialized = poller.toString();\n *\n * // A new poller can be created with:\n * await client.beginBackup(blobStorageUri, { resumeFrom: serialized });\n *\n * // Waiting until it's done\n * const backupUri = await poller.pollUntilDone();\n * console.log(backupUri);\n * ```\n * Starts a full backup operation.\n * @param blobStorageUri - The URL of the blob storage resource, including the path to the container where the backup will end up being stored.\n * @param options - The optional parameters.\n */\n public async beginBackup(\n blobStorageUri: string,\n options?: KeyVaultBeginBackupOptions,\n ): Promise<PollerLike<KeyVaultBackupOperationState, KeyVaultBackupResult>>;\n\n public async beginBackup(\n blobStorageUri: string,\n sasTokenOrOptions: string | KeyVaultBeginBackupOptions = {},\n optionsWhenSasTokenSpecified: KeyVaultBeginBackupOptions = {},\n ): Promise<PollerLike<KeyVaultBackupOperationState, KeyVaultBackupResult>> {\n const sasToken = typeof sasTokenOrOptions === \"string\" ? sasTokenOrOptions : undefined;\n const options =\n typeof sasTokenOrOptions === \"string\" ? optionsWhenSasTokenSpecified : sasTokenOrOptions;\n\n let poller;\n if (options.resumeFrom) {\n poller = restorePoller(this.client, options.resumeFrom, this.client.fullBackup, options);\n } else {\n poller = this.client.fullBackup(\n {\n storageResourceUri: blobStorageUri,\n token: sasToken,\n useManagedIdentity: sasToken === undefined,\n },\n {\n abortSignal: options.abortSignal,\n requestOptions: options.requestOptions,\n onResponse: options.onResponse,\n tracingOptions: options.tracingOptions,\n updateIntervalInMs: options.intervalInMs,\n },\n );\n }\n\n poller.onProgress(updateState);\n\n return wrapPoller(poller) as ReturnType<typeof this.beginBackup>;\n }\n\n /**\n * Starts restoring all key materials using the SAS token pointing to a previously stored Azure Blob storage\n * backup folder.\n *\n * This function returns a Long Running Operation poller that allows you to wait indefinitely until the Key Vault restore operation is complete.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleBeginRestore_SAS\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultBackupClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultBackupClient(vaultUrl, credentials);\n *\n * const blobStorageUri = \"<blob-storage-uri>\"; // <Blob storage URL>/<folder name>\n * const sasToken = \"<sas-token>\";\n * const poller = await client.beginRestore(blobStorageUri, sasToken);\n *\n * // The poller can be serialized with:\n * const serialized = poller.toString();\n *\n * // A new poller can be created with:\n * await client.beginRestore(blobStorageUri, sasToken, { resumeFrom: serialized });\n *\n * // Waiting until it's done\n * const backupUri = await poller.pollUntilDone();\n * console.log(backupUri);\n * ```\n * Starts a full restore operation.\n * @param folderUri - The URL of the blob storage resource where the previous successful full backup was stored.\n * @param sasToken - The SAS token. If no SAS token is provided, user-assigned Managed Identity will be used to access the blob storage resource.\n * @param options - The optional parameters.\n */\n public async beginRestore(\n folderUri: string,\n sasToken: string,\n options?: KeyVaultBeginRestoreOptions,\n ): Promise<PollerLike<KeyVaultRestoreOperationState, KeyVaultRestoreResult>>;\n\n /**\n * Starts restoring all key materials using the SAS token pointing to a previously stored Azure Blob storage\n * backup folder, using a user-assigned Managed Identity to access the storage account.\n *\n * This function returns a Long Running Operation poller that allows you to wait indefinitely until the Key Vault restore operation is complete.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleBeginRestore_NonSAS\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultBackupClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultBackupClient(vaultUrl, credentials);\n *\n * const blobStorageUri = \"<blob-storage-uri>\"; // <Blob storage URL>/<folder name>\n * const poller = await client.beginRestore(blobStorageUri);\n *\n * // The poller can be serialized with:\n * const serialized = poller.toString();\n *\n * // A new poller can be created with:\n * await client.beginRestore(blobStorageUri, { resumeFrom: serialized });\n *\n * // Waiting until it's done\n * await poller.pollUntilDone();\n * ```\n * Starts a full restore operation.\n * @param folderUri - The URL of the blob storage resource where the previous successful full backup was stored.\n * @param sasToken - The SAS token. If no SAS token is provided, user-assigned Managed Identity will be used to access the blob storage resource.\n * @param options - The optional parameters.\n */\n public async beginRestore(\n folderUri: string,\n options?: KeyVaultBeginRestoreOptions,\n ): Promise<PollerLike<KeyVaultRestoreOperationState, KeyVaultRestoreResult>>;\n\n public async beginRestore(\n folderUri: string,\n sasTokenOrOptions: string | KeyVaultBeginRestoreOptions = {},\n optionsWhenSasTokenSpecified: KeyVaultBeginRestoreOptions = {},\n ): Promise<PollerLike<KeyVaultRestoreOperationState, KeyVaultRestoreResult>> {\n const sasToken = typeof sasTokenOrOptions === \"string\" ? sasTokenOrOptions : undefined;\n const options =\n typeof sasTokenOrOptions === \"string\" ? optionsWhenSasTokenSpecified : sasTokenOrOptions;\n\n const folderUriParts = mappings.folderUriParts(folderUri);\n\n let poller;\n if (options.resumeFrom) {\n poller = restorePoller(\n this.client,\n options.resumeFrom,\n this.client.fullRestoreOperation,\n options,\n );\n } else {\n poller = this.client.fullRestoreOperation(\n {\n folderToRestore: folderUriParts.folderName,\n sasTokenParameters: {\n storageResourceUri: folderUriParts.folderUri,\n token: sasToken,\n useManagedIdentity: sasToken === undefined,\n },\n },\n {\n abortSignal: options.abortSignal,\n requestOptions: options.requestOptions,\n onResponse: options.onResponse,\n tracingOptions: options.tracingOptions,\n updateIntervalInMs: options.intervalInMs,\n },\n );\n }\n poller.onProgress(updateState);\n\n return wrapPoller(poller) as ReturnType<typeof this.beginRestore>;\n }\n\n /**\n * Starts restoring all key versions of a given key using user supplied SAS token pointing to a previously\n * stored Azure Blob storage backup folder.\n *\n * This function returns a Long Running Operation poller that allows you to wait indefinitely until the Key Vault selective restore is complete.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleBeginSelectiveKeyRestore_SAS\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultBackupClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultBackupClient(vaultUrl, credentials);\n *\n * const blobStorageUri = \"<blob-storage-uri>\";\n * const sasToken = \"<sas-token>\";\n * const keyName = \"<key-name>\";\n * const poller = await client.beginSelectiveKeyRestore(keyName, blobStorageUri, sasToken);\n *\n * // Serializing the poller\n * const serialized = poller.toString();\n *\n * // A new poller can be created with:\n * await client.beginSelectiveKeyRestore(keyName, blobStorageUri, sasToken, {\n * resumeFrom: serialized,\n * });\n *\n * // Waiting until it's done\n * await poller.pollUntilDone();\n * ```\n * Creates a new role assignment.\n * @param keyName - The name of the key that wants to be restored.\n * @param folderUri - The URL of the blob storage resource, with the folder name of the blob where the previous successful full backup was stored.\n * @param sasToken - The SAS token. If no SAS token is provided, user-assigned Managed Identity will be used to access the blob storage resource.\n * @param options - The optional parameters.\n */\n public async beginSelectiveKeyRestore(\n keyName: string,\n folderUri: string,\n sasToken: string,\n options?: KeyVaultBeginSelectiveKeyRestoreOptions,\n ): Promise<\n PollerLike<KeyVaultSelectiveKeyRestoreOperationState, KeyVaultSelectiveKeyRestoreResult>\n >;\n\n /**\n * Starts restoring all key versions of a given key using to a previously\n * stored Azure Blob storage backup folder. The Blob storage backup folder will be accessed using user-assigned Managed Identity.\n *\n * This function returns a Long Running Operation poller that allows you to wait indefinitely until the Key Vault selective restore is complete.\n *\n * Example usage:\n * ```ts snippet:ReadmeSampleBeginSelectiveKeyRestore_NonSAS\n * import { DefaultAzureCredential } from \"@azure/identity\";\n * import { KeyVaultBackupClient } from \"@azure/keyvault-admin\";\n *\n * const vaultUrl = `https://<MY KEY VAULT HERE>.vault.azure.net`;\n * const credentials = new DefaultAzureCredential();\n * const client = new KeyVaultBackupClient(vaultUrl, credentials);\n *\n * const blobStorageUri = \"<blob-storage-uri>\";\n * const keyName = \"<key-name>\";\n * const poller = await client.beginSelectiveKeyRestore(keyName, blobStorageUri);\n *\n * // Serializing the poller\n * const serialized = poller.toString();\n *\n * // A new poller can be created with:\n * await client.beginSelectiveKeyRestore(keyName, blobStorageUri, { resumeFrom: serialized });\n *\n * // Waiting until it's done\n * await poller.pollUntilDone();\n * ```\n * Creates a new role assignment.\n * @param keyName - The name of the key that wants to be restored.\n * @param folderUri - The URL of the blob storage resource, with the folder name of the blob where the previous successful full backup was stored.\n * @param sasToken - The SAS token. If no SAS token is provided, user-assigned Managed Identity will be used to access the blob storage resource.\n * @param options - The optional parameters.\n */\n public async beginSelectiveKeyRestore(\n keyName: string,\n folderUri: string,\n options?: KeyVaultBeginSelectiveKeyRestoreOptions,\n ): Promise<\n PollerLike<KeyVaultSelectiveKeyRestoreOperationState, KeyVaultSelectiveKeyRestoreResult>\n >;\n\n public async beginSelectiveKeyRestore(\n keyName: string,\n folderUri: string,\n sasTokenOrOptions: string | KeyVaultBeginSelectiveKeyRestoreOptions = {},\n optionsWhenSasTokenSpecified: KeyVaultBeginSelectiveKeyRestoreOptions = {},\n ): Promise<\n PollerLike<KeyVaultSelectiveKeyRestoreOperationState, KeyVaultSelectiveKeyRestoreResult>\n > {\n const sasToken = typeof sasTokenOrOptions === \"string\" ? sasTokenOrOptions : undefined;\n const options =\n typeof sasTokenOrOptions === \"string\" ? optionsWhenSasTokenSpecified : sasTokenOrOptions;\n\n const folderUriParts = mappings.folderUriParts(folderUri);\n\n let poller;\n if (options.resumeFrom) {\n poller = restorePoller(\n this.client,\n options.resumeFrom,\n this.client.selectiveKeyRestoreOperation,\n options,\n );\n } else {\n poller = this.client.selectiveKeyRestoreOperation(\n keyName,\n {\n folder: folderUriParts.folderName,\n sasTokenParameters: {\n storageResourceUri: folderUriParts.folderUri,\n token: sasToken,\n useManagedIdentity: sasToken === undefined,\n },\n },\n {\n abortSignal: options.abortSignal,\n requestOptions: options.requestOptions,\n onResponse: options.onResponse,\n tracingOptions: options.tracingOptions,\n updateIntervalInMs: options.intervalInMs,\n },\n );\n }\n poller.onProgress(updateState);\n\n return wrapPoller(poller) as ReturnType<typeof this.beginSelectiveKeyRestore>;\n }\n}\n"]}
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import type { ClientOptions, OperationOptions } from "@azure-rest/core-client";
|
|
2
2
|
import type { SUPPORTED_API_VERSIONS } from "./constants.js";
|
|
3
3
|
export type { PollerLike } from "./lro/shim.js";
|
|
4
|
-
export type { OperationStatus } from "./generated/index.js";
|
|
4
|
+
export type { OperationStatus } from "./generated/src/index.js";
|
|
5
5
|
/**
|
|
6
6
|
* The optional parameters accepted by the KeyVaultBackupClient
|
|
7
7
|
*/
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"backupClientModels.d.ts","sourceRoot":"","sources":["../../src/backupClientModels.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,aAAa,EAAE,gBAAgB,EAAE,MAAM,yBAAyB,CAAC;AAC/E,OAAO,KAAK,EAAE,sBAAsB,EAAE,MAAM,gBAAgB,CAAC;AAG7D,YAAY,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;AAChD,YAAY,EAAE,eAAe,EAAE,MAAM,
|
|
1
|
+
{"version":3,"file":"backupClientModels.d.ts","sourceRoot":"","sources":["../../src/backupClientModels.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,aAAa,EAAE,gBAAgB,EAAE,MAAM,yBAAyB,CAAC;AAC/E,OAAO,KAAK,EAAE,sBAAsB,EAAE,MAAM,gBAAgB,CAAC;AAG7D,YAAY,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;AAChD,YAAY,EAAE,eAAe,EAAE,MAAM,0BAA0B,CAAC;AAEhE;;GAEG;AACH,MAAM,WAAW,2BAA4B,SAAQ,aAAa;IAChE;;OAEG;IACH,cAAc,CAAC,EAAE,sBAAsB,CAAC;IAExC;;;OAGG;IACH,oCAAoC,CAAC,EAAE,OAAO,CAAC;CAChD;AAED;;;GAGG;AACH,MAAM,WAAW,2BAA4B,SAAQ,gBAAgB;IACnE;;OAEG;IACH,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB;;OAEG;IACH,UAAU,CAAC,EAAE,MAAM,CAAC;CACrB;AAED;;;GAGG;AACH,MAAM,WAAW,6BAA8B,SAAQ,2BAA2B;CAAG;AAErF;;;GAGG;AACH,MAAM,WAAW,0BAA2B,SAAQ,2BAA2B;CAAG;AAElF;;;GAGG;AACH,MAAM,WAAW,2BAA4B,SAAQ,2BAA2B;CAAG;AAEnF;;;GAGG;AACH,MAAM,WAAW,8BAA+B,SAAQ,2BAA2B;CAAG;AAEtF;;;GAGG;AACH,MAAM,WAAW,uCAAwC,SAAQ,2BAA2B;CAAG;AAE/F;;GAEG;AACH,MAAM,WAAW,oBAAoB;IACnC;;OAEG;IACH,SAAS,CAAC,EAAE,MAAM,CAAC;IAEnB;;OAEG;IACH,SAAS,CAAC,EAAE,IAAI,CAAC;IAEjB;;OAEG;IACH,OAAO,CAAC,EAAE,IAAI,CAAC;CAChB;AAED;;GAEG;AACH,MAAM,WAAW,qBAAqB;IACpC;;OAEG;IACH,SAAS,CAAC,EAAE,IAAI,CAAC;IAEjB;;OAEG;IACH,OAAO,CAAC,EAAE,IAAI,CAAC;CAChB;AAED;;GAEG;AACH,MAAM,WAAW,iCAAiC;IAChD;;OAEG;IACH,SAAS,CAAC,EAAE,IAAI,CAAC;IAEjB;;OAEG;IACH,OAAO,CAAC,EAAE,IAAI,CAAC;CAChB"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"backupClientModels.js","sourceRoot":"","sources":["../../src/backupClientModels.ts"],"names":[],"mappings":";AAAA,uCAAuC;AACvC,kCAAkC","sourcesContent":["// Copyright (c) Microsoft Corporation.\n// Licensed under the MIT License.\n\nimport type { ClientOptions, OperationOptions } from \"@azure-rest/core-client\";\nimport type { SUPPORTED_API_VERSIONS } from \"./constants.js\";\nimport { KeyVaultBackupClient } from \"./backupClient.js\";\n\nexport type { PollerLike } from \"./lro/shim.js\";\nexport type { OperationStatus } from \"./generated/index.js\";\n\n/**\n * The optional parameters accepted by the KeyVaultBackupClient\n */\nexport interface KeyVaultBackupClientOptions extends ClientOptions {\n /**\n * The accepted versions of the Key Vault's service API.\n */\n serviceVersion?: SUPPORTED_API_VERSIONS;\n\n /**\n * Whether to disable verification that the authentication challenge resource matches the Key Vault or Managed HSM domain.\n * Defaults to false.\n */\n disableChallengeResourceVerification?: boolean;\n}\n\n/**\n * An interface representing the optional parameters that can be\n * passed to {@link beginBackup}\n */\nexport interface KeyVaultBackupPollerOptions extends OperationOptions {\n /**\n * Time between each polling\n */\n intervalInMs?: number;\n /**\n * A serialized poller, used to resume an existing operation\n */\n resumeFrom?: string;\n}\n\n/**\n * An interface representing the optional parameters that can be\n * passed to {@link KeyVaultBackupClient.beginPreBackup}\n */\nexport interface KeyVaultBeginPreBackupOptions extends KeyVaultBackupPollerOptions {}\n\n/**\n * An interface representing the optional parameters that can be\n * passed to {@link KeyVaultBackupClient.beginBackup}\n */\nexport interface KeyVaultBeginBackupOptions extends KeyVaultBackupPollerOptions {}\n\n/**\n * An interface representing the optional parameters that can be\n * passed to {@link KeyVaultBackupClient.beginRestore}\n */\nexport interface KeyVaultBeginRestoreOptions extends KeyVaultBackupPollerOptions {}\n\n/**\n * An interface representing the optional parameters that can be\n * passed to {@link KeyVaultBackupClient.beginPreRestore}\n */\nexport interface KeyVaultBeginPreRestoreOptions extends KeyVaultBackupPollerOptions {}\n\n/**\n * An interface representing the optional parameters that can be\n * passed to {@link KeyVaultBackupClient.beginSelectiveKeyRestore}\n */\nexport interface KeyVaultBeginSelectiveKeyRestoreOptions extends KeyVaultBackupPollerOptions {}\n\n/**\n * An interface representing the result of a backup operation.\n */\nexport interface KeyVaultBackupResult {\n /**\n * The location of the full backup.\n */\n folderUri?: string;\n\n /**\n * The start time of the backup operation.\n */\n startTime?: Date;\n\n /**\n * The end time of the backup operation.\n */\n endTime?: Date;\n}\n\n/**\n * An interface representing the result of a restore operation.\n */\nexport interface KeyVaultRestoreResult {\n /**\n * The start time of the restore operation.\n */\n startTime?: Date;\n\n /**\n * The end time of the restore operation.\n */\n endTime?: Date;\n}\n\n/**\n * An interface representing the result of a selective key restore operation.\n */\nexport interface KeyVaultSelectiveKeyRestoreResult {\n /**\n * The start time of the selective key restore operation.\n */\n startTime?: Date;\n\n /**\n * The end time of the selective key restore operation.\n */\n endTime?: Date;\n}\n"]}
|
|
1
|
+
{"version":3,"file":"backupClientModels.js","sourceRoot":"","sources":["../../src/backupClientModels.ts"],"names":[],"mappings":";AAAA,uCAAuC;AACvC,kCAAkC","sourcesContent":["// Copyright (c) Microsoft Corporation.\n// Licensed under the MIT License.\n\nimport type { ClientOptions, OperationOptions } from \"@azure-rest/core-client\";\nimport type { SUPPORTED_API_VERSIONS } from \"./constants.js\";\nimport { KeyVaultBackupClient } from \"./backupClient.js\";\n\nexport type { PollerLike } from \"./lro/shim.js\";\nexport type { OperationStatus } from \"./generated/src/index.js\";\n\n/**\n * The optional parameters accepted by the KeyVaultBackupClient\n */\nexport interface KeyVaultBackupClientOptions extends ClientOptions {\n /**\n * The accepted versions of the Key Vault's service API.\n */\n serviceVersion?: SUPPORTED_API_VERSIONS;\n\n /**\n * Whether to disable verification that the authentication challenge resource matches the Key Vault or Managed HSM domain.\n * Defaults to false.\n */\n disableChallengeResourceVerification?: boolean;\n}\n\n/**\n * An interface representing the optional parameters that can be\n * passed to {@link beginBackup}\n */\nexport interface KeyVaultBackupPollerOptions extends OperationOptions {\n /**\n * Time between each polling\n */\n intervalInMs?: number;\n /**\n * A serialized poller, used to resume an existing operation\n */\n resumeFrom?: string;\n}\n\n/**\n * An interface representing the optional parameters that can be\n * passed to {@link KeyVaultBackupClient.beginPreBackup}\n */\nexport interface KeyVaultBeginPreBackupOptions extends KeyVaultBackupPollerOptions {}\n\n/**\n * An interface representing the optional parameters that can be\n * passed to {@link KeyVaultBackupClient.beginBackup}\n */\nexport interface KeyVaultBeginBackupOptions extends KeyVaultBackupPollerOptions {}\n\n/**\n * An interface representing the optional parameters that can be\n * passed to {@link KeyVaultBackupClient.beginRestore}\n */\nexport interface KeyVaultBeginRestoreOptions extends KeyVaultBackupPollerOptions {}\n\n/**\n * An interface representing the optional parameters that can be\n * passed to {@link KeyVaultBackupClient.beginPreRestore}\n */\nexport interface KeyVaultBeginPreRestoreOptions extends KeyVaultBackupPollerOptions {}\n\n/**\n * An interface representing the optional parameters that can be\n * passed to {@link KeyVaultBackupClient.beginSelectiveKeyRestore}\n */\nexport interface KeyVaultBeginSelectiveKeyRestoreOptions extends KeyVaultBackupPollerOptions {}\n\n/**\n * An interface representing the result of a backup operation.\n */\nexport interface KeyVaultBackupResult {\n /**\n * The location of the full backup.\n */\n folderUri?: string;\n\n /**\n * The start time of the backup operation.\n */\n startTime?: Date;\n\n /**\n * The end time of the backup operation.\n */\n endTime?: Date;\n}\n\n/**\n * An interface representing the result of a restore operation.\n */\nexport interface KeyVaultRestoreResult {\n /**\n * The start time of the restore operation.\n */\n startTime?: Date;\n\n /**\n * The end time of the restore operation.\n */\n endTime?: Date;\n}\n\n/**\n * An interface representing the result of a selective key restore operation.\n */\nexport interface KeyVaultSelectiveKeyRestoreResult {\n /**\n * The start time of the selective key restore operation.\n */\n startTime?: Date;\n\n /**\n * The end time of the selective key restore operation.\n */\n endTime?: Date;\n}\n"]}
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import type { TokenCredential } from "@azure/core-auth";
|
|
2
|
-
import { KeyVaultClient } from "./generated/keyVaultClient.js";
|
|
2
|
+
import { KeyVaultClient } from "./generated/src/keyVaultClient.js";
|
|
3
3
|
import type { AccessControlClientOptions } from "./accessControlModels.js";
|
|
4
4
|
import type { KeyVaultBackupClientOptions } from "./backupClientModels.js";
|
|
5
5
|
import type { SettingsClientOptions } from "./settingsClientModels.js";
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"createKeyVaultClient.d.ts","sourceRoot":"","sources":["../../src/createKeyVaultClient.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,kBAAkB,CAAC;AAExD,OAAO,EAAE,cAAc,EAAE,MAAM
|
|
1
|
+
{"version":3,"file":"createKeyVaultClient.d.ts","sourceRoot":"","sources":["../../src/createKeyVaultClient.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,kBAAkB,CAAC;AAExD,OAAO,EAAE,cAAc,EAAE,MAAM,mCAAmC,CAAC;AAGnE,OAAO,KAAK,EAAE,0BAA0B,EAAE,MAAM,0BAA0B,CAAC;AAC3E,OAAO,KAAK,EAAE,2BAA2B,EAAE,MAAM,yBAAyB,CAAC;AAC3E,OAAO,KAAK,EAAE,qBAAqB,EAAE,MAAM,2BAA2B,CAAC;AAIvE,wBAAgB,oBAAoB,CAClC,QAAQ,EAAE,MAAM,EAChB,UAAU,EAAE,eAAe,EAC3B,OAAO,EAAE,0BAA0B,GAAG,2BAA2B,GAAG,qBAAqB,GACxF,cAAc,CAgChB"}
|
|
@@ -3,7 +3,7 @@
|
|
|
3
3
|
// Licensed under the MIT License.
|
|
4
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
5
|
exports.createKeyVaultClient = createKeyVaultClient;
|
|
6
|
-
const keyVaultClient_js_1 = require("./generated/keyVaultClient.js");
|
|
6
|
+
const keyVaultClient_js_1 = require("./generated/src/keyVaultClient.js");
|
|
7
7
|
const core_rest_pipeline_1 = require("@azure/core-rest-pipeline");
|
|
8
8
|
const keyvault_common_1 = require("@azure/keyvault-common");
|
|
9
9
|
const constants_js_1 = require("./constants.js");
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"createKeyVaultClient.js","sourceRoot":"","sources":["../../src/createKeyVaultClient.ts"],"names":[],"mappings":";AAAA,uCAAuC;AACvC,kCAAkC;;AAalC,oDAoCC;AA7CD,
|
|
1
|
+
{"version":3,"file":"createKeyVaultClient.js","sourceRoot":"","sources":["../../src/createKeyVaultClient.ts"],"names":[],"mappings":";AAAA,uCAAuC;AACvC,kCAAkC;;AAalC,oDAoCC;AA7CD,yEAAmE;AACnE,kEAAgF;AAChF,4DAAsE;AAItE,iDAAiE;AACjE,qCAAkC;AAElC,SAAgB,oBAAoB,CAClC,QAAgB,EAChB,UAA2B,EAC3B,OAAyF;;IAEzF,MAAM,aAAa,mCACd,OAAO,KACV,UAAU,EAAE,OAAO,CAAC,cAAc,IAAI,iCAAkB,EACxD,cAAc,EAAE;YACd,MAAM,EAAE,eAAM,CAAC,IAAI;YACnB,4BAA4B,EAAE;gBAC5B,sBAAsB;gBACtB,4BAA4B;gBAC5B,+BAA+B;aAChC;SACF,GACF,CAAC;IACF,MAAA,aAAa,CAAC,gBAAgB,oCAA9B,aAAa,CAAC,gBAAgB,GAAK,EAAE,EAAC;IACtC,aAAa,CAAC,gBAAgB,CAAC,eAAe,GAAG,GAAG,MAAA,aAAa,CAAC,gBAAgB,CAAC,eAAe,mCAAI,EAAE,4BAA4B,0BAAW,EAAE,CAAC;IAElJ,MAAM,MAAM,GAAG,IAAI,kCAAc,CAAC,QAAQ,EAAE,UAAU,EAAE,aAAa,CAAC,CAAC;IAEvE,MAAM,CAAC,QAAQ,CAAC,YAAY,CAAC,EAAE,IAAI,EAAE,wDAAmC,EAAE,CAAC,CAAC;IAC5E,MAAM,CAAC,QAAQ,CAAC,SAAS,CAAC,IAAA,8CAA4B,EAAC,UAAU,EAAE,OAAO,CAAC,CAAC,CAAC;IAC7E,yEAAyE;IACzE,MAAM,CAAC,QAAQ,CAAC,SAAS,CAAC;QACxB,IAAI,EAAE,mBAAmB;QACzB,WAAW,CAAC,OAAO,EAAE,IAAI;;YACvB,MAAM,WAAW,GAAG,MAAA,OAAO,CAAC,OAAO,CAAC,GAAG,CAAC,cAAc,CAAC,mCAAI,EAAE,CAAC;YAC9D,IAAI,WAAW,CAAC,UAAU,CAAC,kBAAkB,CAAC,EAAE,CAAC;gBAC/C,OAAO,CAAC,OAAO,CAAC,GAAG,CAAC,cAAc,EAAE,kBAAkB,CAAC,CAAC;YAC1D,CAAC;YACD,OAAO,IAAI,CAAC,OAAO,CAAC,CAAC;QACvB,CAAC;KACF,CAAC,CAAC;IACH,OAAO,MAAM,CAAC;AAChB,CAAC","sourcesContent":["// Copyright (c) Microsoft Corporation.\n// Licensed under the MIT License.\n\nimport type { TokenCredential } from \"@azure/core-auth\";\nimport type { KeyVaultClientOptionalParams } from \"./generated/src/keyVaultClient.js\";\nimport { KeyVaultClient } from \"./generated/src/keyVaultClient.js\";\nimport { bearerTokenAuthenticationPolicyName } from \"@azure/core-rest-pipeline\";\nimport { keyVaultAuthenticationPolicy } from \"@azure/keyvault-common\";\nimport type { AccessControlClientOptions } from \"./accessControlModels.js\";\nimport type { KeyVaultBackupClientOptions } from \"./backupClientModels.js\";\nimport type { SettingsClientOptions } from \"./settingsClientModels.js\";\nimport { LATEST_API_VERSION, SDK_VERSION } from \"./constants.js\";\nimport { logger } from \"./log.js\";\n\nexport function createKeyVaultClient(\n vaultUrl: string,\n credential: TokenCredential,\n options: AccessControlClientOptions | KeyVaultBackupClientOptions | SettingsClientOptions,\n): KeyVaultClient {\n const clientOptions: KeyVaultClientOptionalParams = {\n ...options,\n apiVersion: options.serviceVersion || LATEST_API_VERSION,\n loggingOptions: {\n logger: logger.info,\n additionalAllowedHeaderNames: [\n \"x-ms-keyvault-region\",\n \"x-ms-keyvault-network-info\",\n \"x-ms-keyvault-service-version\",\n ],\n },\n };\n clientOptions.userAgentOptions ??= {};\n clientOptions.userAgentOptions.userAgentPrefix = `${clientOptions.userAgentOptions.userAgentPrefix ?? \"\"} azsdk-js-keyvault-admin/${SDK_VERSION}`;\n\n const client = new KeyVaultClient(vaultUrl, credential, clientOptions);\n\n client.pipeline.removePolicy({ name: bearerTokenAuthenticationPolicyName });\n client.pipeline.addPolicy(keyVaultAuthenticationPolicy(credential, options));\n // Workaround for: https://github.com/Azure/azure-sdk-for-js/issues/31843\n client.pipeline.addPolicy({\n name: \"ContentTypePolicy\",\n sendRequest(request, next) {\n const contentType = request.headers.get(\"Content-Type\") ?? \"\";\n if (contentType.startsWith(\"application/json\")) {\n request.headers.set(\"Content-Type\", \"application/json\");\n }\n return next(request);\n },\n });\n return client;\n}\n"]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../src/generated/src/api/index.ts"],"names":[],"mappings":"AAGA,OAAO,EACL,cAAc,EACd,eAAe,EACf,4BAA4B,GAC7B,MAAM,sBAAsB,CAAC;AAC9B,OAAO,EACL,WAAW,EACX,UAAU,EACV,aAAa,EACb,4BAA4B,EAC5B,yBAAyB,EACzB,uBAAuB,EACvB,oBAAoB,EACpB,aAAa,EACb,aAAa,EACb,UAAU,EACV,gBAAgB,GACjB,MAAM,iBAAiB,CAAC;AACzB,OAAO,EACL,yBAAyB,EACzB,wBAAwB,EACxB,2BAA2B,EAC3B,0CAA0C,EAC1C,uCAAuC,EACvC,qCAAqC,EACrC,kCAAkC,EAClC,2BAA2B,EAC3B,2BAA2B,EAC3B,wBAAwB,EACxB,8BAA8B,GAC/B,MAAM,cAAc,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../../../src/generated/src/api/index.ts"],"names":[],"mappings":";AAAA,uCAAuC;AACvC,kCAAkC;;;AAElC,2DAI8B;AAH5B,oHAAA,cAAc,OAAA;AAIhB,iDAYyB;AAXvB,4GAAA,WAAW,OAAA;AACX,2GAAA,UAAU,OAAA;AACV,8GAAA,aAAa,OAAA;AACb,6HAAA,4BAA4B,OAAA;AAC5B,0HAAA,yBAAyB,OAAA;AACzB,wHAAA,uBAAuB,OAAA;AACvB,qHAAA,oBAAoB,OAAA;AACpB,8GAAA,aAAa,OAAA;AACb,8GAAA,aAAa,OAAA;AACb,2GAAA,UAAU,OAAA;AACV,iHAAA,gBAAgB,OAAA","sourcesContent":["// Copyright (c) Microsoft Corporation.\n// Licensed under the MIT License.\n\nexport {\n createKeyVault,\n KeyVaultContext,\n KeyVaultClientOptionalParams,\n} from \"./keyVaultContext.js\";\nexport {\n getSettings,\n getSetting,\n updateSetting,\n selectiveKeyRestoreOperation,\n selectiveKeyRestoreStatus,\n preFullRestoreOperation,\n fullRestoreOperation,\n restoreStatus,\n preFullBackup,\n fullBackup,\n fullBackupStatus,\n} from \"./operations.js\";\nexport {\n GetSettingsOptionalParams,\n GetSettingOptionalParams,\n UpdateSettingOptionalParams,\n SelectiveKeyRestoreOperationOptionalParams,\n SelectiveKeyRestoreStatusOptionalParams,\n PreFullRestoreOperationOptionalParams,\n FullRestoreOperationOptionalParams,\n RestoreStatusOptionalParams,\n PreFullBackupOptionalParams,\n FullBackupOptionalParams,\n FullBackupStatusOptionalParams,\n} from \"./options.js\";\n"]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"keyVaultContext.d.ts","sourceRoot":"","sources":["../../../../../src/generated/src/api/keyVaultContext.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,MAAM,EAAE,aAAa,EAAa,MAAM,yBAAyB,CAAC;AAC3E,OAAO,EAAE,eAAe,EAAE,MAAM,kBAAkB,CAAC;AAEnD,qHAAqH;AACrH,MAAM,WAAW,eAAgB,SAAQ,MAAM;IAC7C,iDAAiD;IACjD,sEAAsE;IACtE,UAAU,EAAE,MAAM,CAAC;CACpB;AAED,0CAA0C;AAC1C,MAAM,WAAW,4BAA6B,SAAQ,aAAa;IACjE,iDAAiD;IACjD,sEAAsE;IACtE,UAAU,CAAC,EAAE,MAAM,CAAC;CACrB;AAED,qHAAqH;AACrH,wBAAgB,cAAc,CAC5B,aAAa,EAAE,MAAM,EACrB,UAAU,EAAE,eAAe,EAC3B,OAAO,GAAE,4BAAiC,GACzC,eAAe,CAqCjB"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"keyVaultContext.js","sourceRoot":"","sources":["../../../../../src/generated/src/api/keyVaultContext.ts"],"names":[],"mappings":";AAAA,uCAAuC;AACvC,kCAAkC;;AAsBlC,wCAyCC;;AA7DD,4CAAsC;AAEtC,yDAA2E;AAiB3E,qHAAqH;AACrH,SAAgB,cAAc,CAC5B,aAAqB,EACrB,UAA2B,EAC3B,UAAwC,EAAE;;IAE1C,MAAM,WAAW,GACf,MAAA,MAAA,OAAO,CAAC,QAAQ,mCAAI,OAAO,CAAC,OAAO,mCAAI,MAAM,CAAC,aAAa,CAAC,CAAC;IAC/D,MAAM,iBAAiB,GAAG,MAAA,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,gBAAgB,0CAAE,eAAe,CAAC;IACrE,MAAM,aAAa,GAAG,sCAAsC,CAAC;IAC7D,MAAM,eAAe,GAAG,iBAAiB;QACvC,CAAC,CAAC,GAAG,iBAAiB,iBAAiB,aAAa,EAAE;QACtD,CAAC,CAAC,gBAAgB,aAAa,EAAE,CAAC;IACpC,MAAM,qCACD,OAAO,KACV,gBAAgB,EAAE,EAAE,eAAe,EAAE,EACrC,cAAc,EAAE,EAAE,MAAM,EAAE,MAAA,MAAA,OAAO,CAAC,cAAc,0CAAE,MAAM,mCAAI,kBAAM,CAAC,IAAI,EAAE,EACzE,WAAW,EAAE;YACX,MAAM,EAAE,MAAA,MAAA,OAAO,CAAC,WAAW,0CAAE,MAAM,mCAAI;gBACrC,kCAAkC;aACnC;SACF,GACF,EATK,EAAE,UAAU,EAAE,CAAC,OASpB,EATyB,cAAc,sBAAlC,cAAoC,CASzC,CAAC;IACF,MAAM,aAAa,GAAG,IAAA,uBAAS,EAAC,WAAW,EAAE,UAAU,EAAE,cAAc,CAAC,CAAC;IACzE,aAAa,CAAC,QAAQ,CAAC,YAAY,CAAC,EAAE,IAAI,EAAE,kBAAkB,EAAE,CAAC,CAAC;IAClE,MAAM,UAAU,GAAG,MAAA,OAAO,CAAC,UAAU,mCAAI,KAAK,CAAC;IAC/C,aAAa,CAAC,QAAQ,CAAC,SAAS,CAAC;QAC/B,IAAI,EAAE,wBAAwB;QAC9B,WAAW,EAAE,CAAC,GAAG,EAAE,IAAI,EAAE,EAAE;YACzB,qDAAqD;YACrD,yEAAyE;YACzE,MAAM,GAAG,GAAG,IAAI,GAAG,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;YAC7B,IAAI,CAAC,GAAG,CAAC,YAAY,CAAC,GAAG,CAAC,aAAa,CAAC,EAAE,CAAC;gBACzC,GAAG,CAAC,GAAG,GAAG,GAAG,GAAG,CAAC,GAAG,GAClB,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,YAAY,CAAC,IAAI,EAAE,CAAC,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,GACzD,eAAe,UAAU,EAAE,CAAC;YAC9B,CAAC;YAED,OAAO,IAAI,CAAC,GAAG,CAAC,CAAC;QACnB,CAAC;KACF,CAAC,CAAC;IACH,OAAO,gCAAK,aAAa,KAAE,UAAU,GAAqB,CAAC;AAC7D,CAAC","sourcesContent":["// Copyright (c) Microsoft Corporation.\n// Licensed under the MIT License.\n\nimport { logger } from \"../logger.js\";\nimport { KnownVersions } from \"../models/models.js\";\nimport { Client, ClientOptions, getClient } from \"@azure-rest/core-client\";\nimport { TokenCredential } from \"@azure/core-auth\";\n\n/** The key vault client performs cryptographic key operations and vault operations against the Key Vault service. */\nexport interface KeyVaultContext extends Client {\n /** The API version to use for this operation. */\n /** Known values of {@link KnownVersions} that the service accepts. */\n apiVersion: string;\n}\n\n/** Optional parameters for the client. */\nexport interface KeyVaultClientOptionalParams extends ClientOptions {\n /** The API version to use for this operation. */\n /** Known values of {@link KnownVersions} that the service accepts. */\n apiVersion?: string;\n}\n\n/** The key vault client performs cryptographic key operations and vault operations against the Key Vault service. */\nexport function createKeyVault(\n endpointParam: string,\n credential: TokenCredential,\n options: KeyVaultClientOptionalParams = {},\n): KeyVaultContext {\n const endpointUrl =\n options.endpoint ?? options.baseUrl ?? String(endpointParam);\n const prefixFromOptions = options?.userAgentOptions?.userAgentPrefix;\n const userAgentInfo = `azsdk-js-keyvault-admin/1.0.0-beta.1`;\n const userAgentPrefix = prefixFromOptions\n ? `${prefixFromOptions} azsdk-js-api ${userAgentInfo}`\n : `azsdk-js-api ${userAgentInfo}`;\n const { apiVersion: _, ...updatedOptions } = {\n ...options,\n userAgentOptions: { userAgentPrefix },\n loggingOptions: { logger: options.loggingOptions?.logger ?? logger.info },\n credentials: {\n scopes: options.credentials?.scopes ?? [\n \"https://vault.azure.net/.default\",\n ],\n },\n };\n const clientContext = getClient(endpointUrl, credential, updatedOptions);\n clientContext.pipeline.removePolicy({ name: \"ApiVersionPolicy\" });\n const apiVersion = options.apiVersion ?? \"7.6\";\n clientContext.pipeline.addPolicy({\n name: \"ClientApiVersionPolicy\",\n sendRequest: (req, next) => {\n // Use the apiVersion defined in request url directly\n // Append one if there is no apiVersion and we have one at client options\n const url = new URL(req.url);\n if (!url.searchParams.get(\"api-version\")) {\n req.url = `${req.url}${\n Array.from(url.searchParams.keys()).length > 0 ? \"&\" : \"?\"\n }api-version=${apiVersion}`;\n }\n\n return next(req);\n },\n });\n return { ...clientContext, apiVersion } as KeyVaultContext;\n}\n"]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"operations.d.ts","sourceRoot":"","sources":["../../../../../src/generated/src/api/operations.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,eAAe,IAAI,MAAM,EAAE,MAAM,YAAY,CAAC;AACvD,OAAO,EACL,mBAAmB,EAGnB,iBAAiB,EAEjB,4BAA4B,EAE5B,gBAAgB,EAEhB,0BAA0B,EAE1B,6BAA6B,EAE7B,4BAA4B,EAE5B,sCAAsC,EAEtC,oBAAoB,EAEpB,OAAO,EAEP,kBAAkB,EAEnB,MAAM,qBAAqB,CAAC;AAC7B,OAAO,EACL,yBAAyB,EACzB,wBAAwB,EACxB,2BAA2B,EAC3B,0CAA0C,EAC1C,uCAAuC,EACvC,qCAAqC,EACrC,kCAAkC,EAClC,2BAA2B,EAC3B,2BAA2B,EAC3B,wBAAwB,EACxB,8BAA8B,EAC/B,MAAM,cAAc,CAAC;AAGtB,OAAO,EACL,gBAAgB,EAChB,qBAAqB,EAGtB,MAAM,yBAAyB,CAAC;AACjC,OAAO,EAAE,UAAU,EAAE,cAAc,EAAE,MAAM,iBAAiB,CAAC;AAE7D,wBAAgB,gBAAgB,CAC9B,OAAO,EAAE,MAAM,EACf,OAAO,GAAE,yBAAkD,GAC1D,gBAAgB,CAmBlB;AAED,wBAAsB,uBAAuB,CAC3C,MAAM,EAAE,qBAAqB,GAC5B,OAAO,CAAC,kBAAkB,CAAC,CAS7B;AAED,qFAAqF;AACrF,wBAAsB,WAAW,CAC/B,OAAO,EAAE,MAAM,EACf,OAAO,GAAE,yBAAkD,GAC1D,OAAO,CAAC,kBAAkB,CAAC,CAG7B;AAED,wBAAgB,eAAe,CAC7B,OAAO,EAAE,MAAM,EACf,WAAW,EAAE,MAAM,EACnB,OAAO,GAAE,wBAAiD,GACzD,gBAAgB,CAoBlB;AAED,wBAAsB,sBAAsB,CAC1C,MAAM,EAAE,qBAAqB,GAC5B,OAAO,CAAC,OAAO,CAAC,CASlB;AAED,gEAAgE;AAChE,wBAAsB,UAAU,CAC9B,OAAO,EAAE,MAAM,EACf,WAAW,EAAE,MAAM,EACnB,OAAO,GAAE,wBAAiD,GACzD,OAAO,CAAC,OAAO,CAAC,CAGlB;AAED,wBAAgB,kBAAkB,CAChC,OAAO,EAAE,MAAM,EACf,WAAW,EAAE,MAAM,EACnB,UAAU,EAAE,oBAAoB,EAChC,OAAO,GAAE,2BAAoD,GAC5D,gBAAgB,CAsBlB;AAED,wBAAsB,yBAAyB,CAC7C,MAAM,EAAE,qBAAqB,GAC5B,OAAO,CAAC,OAAO,CAAC,CASlB;AAED,oDAAoD;AACpD,wBAAsB,aAAa,CACjC,OAAO,EAAE,MAAM,EACf,WAAW,EAAE,MAAM,EACnB,UAAU,EAAE,oBAAoB,EAChC,OAAO,GAAE,2BAAoD,GAC5D,OAAO,CAAC,OAAO,CAAC,CAQlB;AAED,wBAAgB,iCAAiC,CAC/C,OAAO,EAAE,MAAM,EACf,OAAO,EAAE,MAAM,EACf,kBAAkB,EAAE,sCAAsC,EAC1D,OAAO,GAAE,0CAAmE,GAC3E,gBAAgB,CAwBlB;AAED,wBAAsB,wCAAwC,CAC5D,MAAM,EAAE,qBAAqB,GAC5B,OAAO,CAAC,4BAA4B,CAAC,CASvC;AAED,8IAA8I;AAC9I,wBAAgB,4BAA4B,CAC1C,OAAO,EAAE,MAAM,EACf,OAAO,EAAE,MAAM,EACf,kBAAkB,EAAE,sCAAsC,EAC1D,OAAO,GAAE,0CAAmE,GAC3E,UAAU,CACX,cAAc,CAAC,4BAA4B,CAAC,EAC5C,4BAA4B,CAC7B,CAqBA;AAED,wBAAgB,8BAA8B,CAC5C,OAAO,EAAE,MAAM,EACf,KAAK,EAAE,MAAM,EACb,OAAO,GAAE,uCAAgE,GACxE,gBAAgB,CAoBlB;AAED,wBAAsB,qCAAqC,CACzD,MAAM,EAAE,qBAAqB,GAC5B,OAAO,CAAC,4BAA4B,CAAC,CASvC;AAED,gEAAgE;AAChE,wBAAsB,yBAAyB,CAC7C,OAAO,EAAE,MAAM,EACf,KAAK,EAAE,MAAM,EACb,OAAO,GAAE,uCAAgE,GACxE,OAAO,CAAC,4BAA4B,CAAC,CAGvC;AAED,wBAAgB,4BAA4B,CAC1C,OAAO,EAAE,MAAM,EACf,6BAA6B,EAAE,6BAA6B,EAC5D,OAAO,GAAE,qCAA8D,GACtE,gBAAgB,CAuBlB;AAED,wBAAsB,mCAAmC,CACvD,MAAM,EAAE,qBAAqB,GAC5B,OAAO,CAAC,gBAAgB,CAAC,CAS3B;AAED,oGAAoG;AACpG,wBAAgB,uBAAuB,CACrC,OAAO,EAAE,MAAM,EACf,6BAA6B,EAAE,6BAA6B,EAC5D,OAAO,GAAE,qCAA8D,GACtE,UAAU,CAAC,cAAc,CAAC,gBAAgB,CAAC,EAAE,gBAAgB,CAAC,CAiBhE;AAED,wBAAgB,yBAAyB,CACvC,OAAO,EAAE,MAAM,EACf,kBAAkB,EAAE,0BAA0B,EAC9C,OAAO,GAAE,kCAA2D,GACnE,gBAAgB,CAqBlB;AAED,wBAAsB,gCAAgC,CACpD,MAAM,EAAE,qBAAqB,GAC5B,OAAO,CAAC,gBAAgB,CAAC,CAS3B;AAED,sHAAsH;AACtH,wBAAgB,oBAAoB,CAClC,OAAO,EAAE,MAAM,EACf,kBAAkB,EAAE,0BAA0B,EAC9C,OAAO,GAAE,kCAA2D,GACnE,UAAU,CAAC,cAAc,CAAC,gBAAgB,CAAC,EAAE,gBAAgB,CAAC,CAahE;AAED,wBAAgB,kBAAkB,CAChC,OAAO,EAAE,MAAM,EACf,KAAK,EAAE,MAAM,EACb,OAAO,GAAE,2BAAoD,GAC5D,gBAAgB,CAoBlB;AAED,wBAAsB,yBAAyB,CAC7C,MAAM,EAAE,qBAAqB,GAC5B,OAAO,CAAC,gBAAgB,CAAC,CAS3B;AAED,8CAA8C;AAC9C,wBAAsB,aAAa,CACjC,OAAO,EAAE,MAAM,EACf,KAAK,EAAE,MAAM,EACb,OAAO,GAAE,2BAAoD,GAC5D,OAAO,CAAC,gBAAgB,CAAC,CAG3B;AAED,wBAAgB,kBAAkB,CAChC,OAAO,EAAE,MAAM,EACf,4BAA4B,EAAE,4BAA4B,EAC1D,OAAO,GAAE,2BAAoD,GAC5D,gBAAgB,CAuBlB;AAED,wBAAsB,yBAAyB,CAC7C,MAAM,EAAE,qBAAqB,GAC5B,OAAO,CAAC,mBAAmB,CAAC,CAS9B;AAED,kGAAkG;AAClG,wBAAgB,aAAa,CAC3B,OAAO,EAAE,MAAM,EACf,4BAA4B,EAAE,4BAA4B,EAC1D,OAAO,GAAE,2BAAoD,GAC5D,UAAU,CAAC,cAAc,CAAC,mBAAmB,CAAC,EAAE,mBAAmB,CAAC,CAatE;AAED,wBAAgB,eAAe,CAC7B,OAAO,EAAE,MAAM,EACf,4BAA4B,EAAE,iBAAiB,EAC/C,OAAO,GAAE,wBAAiD,GACzD,gBAAgB,CAqBlB;AAED,wBAAsB,sBAAsB,CAC1C,MAAM,EAAE,qBAAqB,GAC5B,OAAO,CAAC,mBAAmB,CAAC,CAS9B;AAED,gGAAgG;AAChG,wBAAgB,UAAU,CACxB,OAAO,EAAE,MAAM,EACf,4BAA4B,EAAE,iBAAiB,EAC/C,OAAO,GAAE,wBAAiD,GACzD,UAAU,CAAC,cAAc,CAAC,mBAAmB,CAAC,EAAE,mBAAmB,CAAC,CAQtE;AAED,wBAAgB,qBAAqB,CACnC,OAAO,EAAE,MAAM,EACf,KAAK,EAAE,MAAM,EACb,OAAO,GAAE,8BAAuD,GAC/D,gBAAgB,CAoBlB;AAED,wBAAsB,4BAA4B,CAChD,MAAM,EAAE,qBAAqB,GAC5B,OAAO,CAAC,mBAAmB,CAAC,CAS9B;AAED,kDAAkD;AAClD,wBAAsB,gBAAgB,CACpC,OAAO,EAAE,MAAM,EACf,KAAK,EAAE,MAAM,EACb,OAAO,GAAE,8BAAuD,GAC/D,OAAO,CAAC,mBAAmB,CAAC,CAG9B"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"operations.js","sourceRoot":"","sources":["../../../../../src/generated/src/api/operations.ts"],"names":[],"mappings":";AAAA,uCAAuC;AACvC,kCAAkC;;AAmDlC,4CAsBC;AAED,0DAWC;AAGD,kCAMC;AAED,0CAwBC;AAED,wDAWC;AAGD,gCAOC;AAED,gDA2BC;AAED,8DAWC;AAGD,sCAaC;AAED,8EA6BC;AAED,4FAWC;AAGD,oEA6BC;AAED,wEAwBC;AAED,sFAWC;AAGD,8DAOC;AAED,oEA2BC;AAED,kFAWC;AAGD,0DAqBC;AAED,8DAyBC;AAED,4EAWC;AAGD,oDAiBC;AAED,gDAwBC;AAED,8DAWC;AAGD,sCAOC;AAED,gDA2BC;AAED,8DAWC;AAGD,sCAiBC;AAED,0CAyBC;AAED,wDAWC;AAGD,gCAYC;AAED,sDAwBC;AAED,oEAWC;AAGD,4CAOC;AAzpBD,mDAwB6B;AAc7B,2EAA2E;AAC3E,qEAAqE;AACrE,yDAKiC;AAGjC,SAAgB,gBAAgB,CAC9B,OAAe,EACf,UAAqC,EAAE,cAAc,EAAE,EAAE,EAAE;;IAE3D,MAAM,IAAI,GAAG,IAAA,kCAAiB,EAC5B,2BAA2B,EAC3B;QACE,eAAe,EAAE,OAAO,CAAC,UAAU;KACpC,EACD;QACE,aAAa,EAAE,MAAA,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,cAAc,0CAAE,eAAe;KACxD,CACF,CAAC;IACF,OAAO,OAAO;SACX,IAAI,CAAC,IAAI,CAAC;SACV,GAAG,iCACC,IAAA,iDAAmC,EAAC,OAAO,CAAC,KAC/C,OAAO,kBACL,MAAM,EAAE,kBAAkB,IACvB,MAAA,OAAO,CAAC,cAAc,0CAAE,OAAO,KAEpC,CAAC;AACP,CAAC;AAEM,KAAK,UAAU,uBAAuB,CAC3C,MAA6B;IAE7B,MAAM,gBAAgB,GAAG,CAAC,KAAK,CAAC,CAAC;IACjC,IAAI,CAAC,gBAAgB,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC;QAC9C,MAAM,KAAK,GAAG,IAAA,6BAAe,EAAC,MAAM,CAAC,CAAC;QACtC,KAAK,CAAC,OAAO,GAAG,IAAA,qCAAyB,EAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QACvD,MAAM,KAAK,CAAC;IACd,CAAC;IAED,OAAO,IAAA,0CAA8B,EAAC,MAAM,CAAC,IAAI,CAAC,CAAC;AACrD,CAAC;AAED,qFAAqF;AAC9E,KAAK,UAAU,WAAW,CAC/B,OAAe,EACf,UAAqC,EAAE,cAAc,EAAE,EAAE,EAAE;IAE3D,MAAM,MAAM,GAAG,MAAM,gBAAgB,CAAC,OAAO,EAAE,OAAO,CAAC,CAAC;IACxD,OAAO,uBAAuB,CAAC,MAAM,CAAC,CAAC;AACzC,CAAC;AAED,SAAgB,eAAe,CAC7B,OAAe,EACf,WAAmB,EACnB,UAAoC,EAAE,cAAc,EAAE,EAAE,EAAE;;IAE1D,MAAM,IAAI,GAAG,IAAA,kCAAiB,EAC5B,0CAA0C,EAC1C;QACE,cAAc,EAAE,WAAW;QAC3B,eAAe,EAAE,OAAO,CAAC,UAAU;KACpC,EACD;QACE,aAAa,EAAE,MAAA,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,cAAc,0CAAE,eAAe;KACxD,CACF,CAAC;IACF,OAAO,OAAO;SACX,IAAI,CAAC,IAAI,CAAC;SACV,GAAG,iCACC,IAAA,iDAAmC,EAAC,OAAO,CAAC,KAC/C,OAAO,kBACL,MAAM,EAAE,kBAAkB,IACvB,MAAA,OAAO,CAAC,cAAc,0CAAE,OAAO,KAEpC,CAAC;AACP,CAAC;AAEM,KAAK,UAAU,sBAAsB,CAC1C,MAA6B;IAE7B,MAAM,gBAAgB,GAAG,CAAC,KAAK,CAAC,CAAC;IACjC,IAAI,CAAC,gBAAgB,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC;QAC9C,MAAM,KAAK,GAAG,IAAA,6BAAe,EAAC,MAAM,CAAC,CAAC;QACtC,KAAK,CAAC,OAAO,GAAG,IAAA,qCAAyB,EAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QACvD,MAAM,KAAK,CAAC;IACd,CAAC;IAED,OAAO,IAAA,+BAAmB,EAAC,MAAM,CAAC,IAAI,CAAC,CAAC;AAC1C,CAAC;AAED,gEAAgE;AACzD,KAAK,UAAU,UAAU,CAC9B,OAAe,EACf,WAAmB,EACnB,UAAoC,EAAE,cAAc,EAAE,EAAE,EAAE;IAE1D,MAAM,MAAM,GAAG,MAAM,eAAe,CAAC,OAAO,EAAE,WAAW,EAAE,OAAO,CAAC,CAAC;IACpE,OAAO,sBAAsB,CAAC,MAAM,CAAC,CAAC;AACxC,CAAC;AAED,SAAgB,kBAAkB,CAChC,OAAe,EACf,WAAmB,EACnB,UAAgC,EAChC,UAAuC,EAAE,cAAc,EAAE,EAAE,EAAE;;IAE7D,MAAM,IAAI,GAAG,IAAA,kCAAiB,EAC5B,0CAA0C,EAC1C;QACE,cAAc,EAAE,WAAW;QAC3B,eAAe,EAAE,OAAO,CAAC,UAAU;KACpC,EACD;QACE,aAAa,EAAE,MAAA,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,cAAc,0CAAE,eAAe;KACxD,CACF,CAAC;IACF,OAAO,OAAO;SACX,IAAI,CAAC,IAAI,CAAC;SACV,KAAK,iCACD,IAAA,iDAAmC,EAAC,OAAO,CAAC,KAC/C,WAAW,EAAE,kBAAkB,EAC/B,OAAO,kBACL,MAAM,EAAE,kBAAkB,IACvB,MAAA,OAAO,CAAC,cAAc,0CAAE,OAAO,GAEpC,IAAI,EAAE,IAAA,0CAA8B,EAAC,UAAU,CAAC,IAChD,CAAC;AACP,CAAC;AAEM,KAAK,UAAU,yBAAyB,CAC7C,MAA6B;IAE7B,MAAM,gBAAgB,GAAG,CAAC,KAAK,CAAC,CAAC;IACjC,IAAI,CAAC,gBAAgB,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC;QAC9C,MAAM,KAAK,GAAG,IAAA,6BAAe,EAAC,MAAM,CAAC,CAAC;QACtC,KAAK,CAAC,OAAO,GAAG,IAAA,qCAAyB,EAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QACvD,MAAM,KAAK,CAAC;IACd,CAAC;IAED,OAAO,IAAA,+BAAmB,EAAC,MAAM,CAAC,IAAI,CAAC,CAAC;AAC1C,CAAC;AAED,oDAAoD;AAC7C,KAAK,UAAU,aAAa,CACjC,OAAe,EACf,WAAmB,EACnB,UAAgC,EAChC,UAAuC,EAAE,cAAc,EAAE,EAAE,EAAE;IAE7D,MAAM,MAAM,GAAG,MAAM,kBAAkB,CACrC,OAAO,EACP,WAAW,EACX,UAAU,EACV,OAAO,CACR,CAAC;IACF,OAAO,yBAAyB,CAAC,MAAM,CAAC,CAAC;AAC3C,CAAC;AAED,SAAgB,iCAAiC,CAC/C,OAAe,EACf,OAAe,EACf,kBAA0D,EAC1D,UAAsD,EAAE,cAAc,EAAE,EAAE,EAAE;;IAE5E,MAAM,IAAI,GAAG,IAAA,kCAAiB,EAC5B,yCAAyC,EACzC;QACE,OAAO,EAAE,OAAO;QAChB,eAAe,EAAE,OAAO,CAAC,UAAU;KACpC,EACD;QACE,aAAa,EAAE,MAAA,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,cAAc,0CAAE,eAAe;KACxD,CACF,CAAC;IACF,OAAO,OAAO;SACX,IAAI,CAAC,IAAI,CAAC;SACV,GAAG,iCACC,IAAA,iDAAmC,EAAC,OAAO,CAAC,KAC/C,WAAW,EAAE,kBAAkB,EAC/B,OAAO,kBACL,MAAM,EAAE,kBAAkB,IACvB,MAAA,OAAO,CAAC,cAAc,0CAAE,OAAO,GAEpC,IAAI,EAAE,IAAA,4DAAgD,EACpD,kBAAkB,CACnB,IACD,CAAC;AACP,CAAC;AAEM,KAAK,UAAU,wCAAwC,CAC5D,MAA6B;IAE7B,MAAM,gBAAgB,GAAG,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;IACxC,IAAI,CAAC,gBAAgB,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC;QAC9C,MAAM,KAAK,GAAG,IAAA,6BAAe,EAAC,MAAM,CAAC,CAAC;QACtC,KAAK,CAAC,OAAO,GAAG,IAAA,qCAAyB,EAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QACvD,MAAM,KAAK,CAAC;IACd,CAAC;IAED,OAAO,IAAA,oDAAwC,EAAC,MAAM,CAAC,IAAI,CAAC,CAAC;AAC/D,CAAC;AAED,8IAA8I;AAC9I,SAAgB,4BAA4B,CAC1C,OAAe,EACf,OAAe,EACf,kBAA0D,EAC1D,UAAsD,EAAE,cAAc,EAAE,EAAE,EAAE;IAK5E,OAAO,IAAA,wCAAoB,EACzB,OAAO,EACP,wCAAwC,EACxC,CAAC,KAAK,EAAE,KAAK,CAAC,EACd;QACE,kBAAkB,EAAE,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,kBAAkB;QAC/C,WAAW,EAAE,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,WAAW;QACjC,kBAAkB,EAAE,GAAG,EAAE,CACvB,iCAAiC,CAC/B,OAAO,EACP,OAAO,EACP,kBAAkB,EAClB,OAAO,CACR;QACH,sBAAsB,EAAE,uBAAuB;KAChD,CAIF,CAAC;AACJ,CAAC;AAED,SAAgB,8BAA8B,CAC5C,OAAe,EACf,KAAa,EACb,UAAmD,EAAE,cAAc,EAAE,EAAE,EAAE;;IAEzE,MAAM,IAAI,GAAG,IAAA,kCAAiB,EAC5B,0CAA0C,EAC1C;QACE,KAAK,EAAE,KAAK;QACZ,eAAe,EAAE,OAAO,CAAC,UAAU;KACpC,EACD;QACE,aAAa,EAAE,MAAA,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,cAAc,0CAAE,eAAe;KACxD,CACF,CAAC;IACF,OAAO,OAAO;SACX,IAAI,CAAC,IAAI,CAAC;SACV,GAAG,iCACC,IAAA,iDAAmC,EAAC,OAAO,CAAC,KAC/C,OAAO,kBACL,MAAM,EAAE,kBAAkB,IACvB,MAAA,OAAO,CAAC,cAAc,0CAAE,OAAO,KAEpC,CAAC;AACP,CAAC;AAEM,KAAK,UAAU,qCAAqC,CACzD,MAA6B;IAE7B,MAAM,gBAAgB,GAAG,CAAC,KAAK,CAAC,CAAC;IACjC,IAAI,CAAC,gBAAgB,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC;QAC9C,MAAM,KAAK,GAAG,IAAA,6BAAe,EAAC,MAAM,CAAC,CAAC;QACtC,KAAK,CAAC,OAAO,GAAG,IAAA,qCAAyB,EAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QACvD,MAAM,KAAK,CAAC;IACd,CAAC;IAED,OAAO,IAAA,oDAAwC,EAAC,MAAM,CAAC,IAAI,CAAC,CAAC;AAC/D,CAAC;AAED,gEAAgE;AACzD,KAAK,UAAU,yBAAyB,CAC7C,OAAe,EACf,KAAa,EACb,UAAmD,EAAE,cAAc,EAAE,EAAE,EAAE;IAEzE,MAAM,MAAM,GAAG,MAAM,8BAA8B,CAAC,OAAO,EAAE,KAAK,EAAE,OAAO,CAAC,CAAC;IAC7E,OAAO,qCAAqC,CAAC,MAAM,CAAC,CAAC;AACvD,CAAC;AAED,SAAgB,4BAA4B,CAC1C,OAAe,EACf,6BAA4D,EAC5D,UAAiD,EAAE,cAAc,EAAE,EAAE,EAAE;;IAEvE,MAAM,IAAI,GAAG,IAAA,kCAAiB,EAC5B,6BAA6B,EAC7B;QACE,eAAe,EAAE,OAAO,CAAC,UAAU;KACpC,EACD;QACE,aAAa,EAAE,MAAA,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,cAAc,0CAAE,eAAe;KACxD,CACF,CAAC;IACF,OAAO,OAAO;SACX,IAAI,CAAC,IAAI,CAAC;SACV,GAAG,iCACC,IAAA,iDAAmC,EAAC,OAAO,CAAC,KAC/C,WAAW,EAAE,kBAAkB,EAC/B,OAAO,kBACL,MAAM,EAAE,kBAAkB,IACvB,MAAA,OAAO,CAAC,cAAc,0CAAE,OAAO,GAEpC,IAAI,EAAE,IAAA,mDAAuC,EAC3C,6BAA6B,CAC9B,IACD,CAAC;AACP,CAAC;AAEM,KAAK,UAAU,mCAAmC,CACvD,MAA6B;IAE7B,MAAM,gBAAgB,GAAG,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;IACxC,IAAI,CAAC,gBAAgB,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC;QAC9C,MAAM,KAAK,GAAG,IAAA,6BAAe,EAAC,MAAM,CAAC,CAAC;QACtC,KAAK,CAAC,OAAO,GAAG,IAAA,qCAAyB,EAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QACvD,MAAM,KAAK,CAAC;IACd,CAAC;IAED,OAAO,IAAA,wCAA4B,EAAC,MAAM,CAAC,IAAI,CAAC,CAAC;AACnD,CAAC;AAED,oGAAoG;AACpG,SAAgB,uBAAuB,CACrC,OAAe,EACf,6BAA4D,EAC5D,UAAiD,EAAE,cAAc,EAAE,EAAE,EAAE;IAEvE,OAAO,IAAA,wCAAoB,EACzB,OAAO,EACP,mCAAmC,EACnC,CAAC,KAAK,EAAE,KAAK,CAAC,EACd;QACE,kBAAkB,EAAE,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,kBAAkB;QAC/C,WAAW,EAAE,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,WAAW;QACjC,kBAAkB,EAAE,GAAG,EAAE,CACvB,4BAA4B,CAC1B,OAAO,EACP,6BAA6B,EAC7B,OAAO,CACR;QACH,sBAAsB,EAAE,uBAAuB;KAChD,CACgE,CAAC;AACtE,CAAC;AAED,SAAgB,yBAAyB,CACvC,OAAe,EACf,kBAA8C,EAC9C,UAA8C,EAAE,cAAc,EAAE,EAAE,EAAE;;IAEpE,MAAM,IAAI,GAAG,IAAA,kCAAiB,EAC5B,0BAA0B,EAC1B;QACE,eAAe,EAAE,OAAO,CAAC,UAAU;KACpC,EACD;QACE,aAAa,EAAE,MAAA,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,cAAc,0CAAE,eAAe;KACxD,CACF,CAAC;IACF,OAAO,OAAO;SACX,IAAI,CAAC,IAAI,CAAC;SACV,GAAG,iCACC,IAAA,iDAAmC,EAAC,OAAO,CAAC,KAC/C,WAAW,EAAE,kBAAkB,EAC/B,OAAO,kBACL,MAAM,EAAE,kBAAkB,IACvB,MAAA,OAAO,CAAC,cAAc,0CAAE,OAAO,GAEpC,IAAI,EAAE,IAAA,gDAAoC,EAAC,kBAAkB,CAAC,IAC9D,CAAC;AACP,CAAC;AAEM,KAAK,UAAU,gCAAgC,CACpD,MAA6B;IAE7B,MAAM,gBAAgB,GAAG,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;IACxC,IAAI,CAAC,gBAAgB,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC;QAC9C,MAAM,KAAK,GAAG,IAAA,6BAAe,EAAC,MAAM,CAAC,CAAC;QACtC,KAAK,CAAC,OAAO,GAAG,IAAA,qCAAyB,EAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QACvD,MAAM,KAAK,CAAC;IACd,CAAC;IAED,OAAO,IAAA,wCAA4B,EAAC,MAAM,CAAC,IAAI,CAAC,CAAC;AACnD,CAAC;AAED,sHAAsH;AACtH,SAAgB,oBAAoB,CAClC,OAAe,EACf,kBAA8C,EAC9C,UAA8C,EAAE,cAAc,EAAE,EAAE,EAAE;IAEpE,OAAO,IAAA,wCAAoB,EACzB,OAAO,EACP,gCAAgC,EAChC,CAAC,KAAK,EAAE,KAAK,CAAC,EACd;QACE,kBAAkB,EAAE,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,kBAAkB;QAC/C,WAAW,EAAE,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,WAAW;QACjC,kBAAkB,EAAE,GAAG,EAAE,CACvB,yBAAyB,CAAC,OAAO,EAAE,kBAAkB,EAAE,OAAO,CAAC;QACjE,sBAAsB,EAAE,uBAAuB;KAChD,CACgE,CAAC;AACtE,CAAC;AAED,SAAgB,kBAAkB,CAChC,OAAe,EACf,KAAa,EACb,UAAuC,EAAE,cAAc,EAAE,EAAE,EAAE;;IAE7D,MAAM,IAAI,GAAG,IAAA,kCAAiB,EAC5B,0CAA0C,EAC1C;QACE,KAAK,EAAE,KAAK;QACZ,eAAe,EAAE,OAAO,CAAC,UAAU;KACpC,EACD;QACE,aAAa,EAAE,MAAA,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,cAAc,0CAAE,eAAe;KACxD,CACF,CAAC;IACF,OAAO,OAAO;SACX,IAAI,CAAC,IAAI,CAAC;SACV,GAAG,iCACC,IAAA,iDAAmC,EAAC,OAAO,CAAC,KAC/C,OAAO,kBACL,MAAM,EAAE,kBAAkB,IACvB,MAAA,OAAO,CAAC,cAAc,0CAAE,OAAO,KAEpC,CAAC;AACP,CAAC;AAEM,KAAK,UAAU,yBAAyB,CAC7C,MAA6B;IAE7B,MAAM,gBAAgB,GAAG,CAAC,KAAK,CAAC,CAAC;IACjC,IAAI,CAAC,gBAAgB,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC;QAC9C,MAAM,KAAK,GAAG,IAAA,6BAAe,EAAC,MAAM,CAAC,CAAC;QACtC,KAAK,CAAC,OAAO,GAAG,IAAA,qCAAyB,EAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QACvD,MAAM,KAAK,CAAC;IACd,CAAC;IAED,OAAO,IAAA,wCAA4B,EAAC,MAAM,CAAC,IAAI,CAAC,CAAC;AACnD,CAAC;AAED,8CAA8C;AACvC,KAAK,UAAU,aAAa,CACjC,OAAe,EACf,KAAa,EACb,UAAuC,EAAE,cAAc,EAAE,EAAE,EAAE;IAE7D,MAAM,MAAM,GAAG,MAAM,kBAAkB,CAAC,OAAO,EAAE,KAAK,EAAE,OAAO,CAAC,CAAC;IACjE,OAAO,yBAAyB,CAAC,MAAM,CAAC,CAAC;AAC3C,CAAC;AAED,SAAgB,kBAAkB,CAChC,OAAe,EACf,4BAA0D,EAC1D,UAAuC,EAAE,cAAc,EAAE,EAAE,EAAE;;IAE7D,MAAM,IAAI,GAAG,IAAA,kCAAiB,EAC5B,4BAA4B,EAC5B;QACE,eAAe,EAAE,OAAO,CAAC,UAAU;KACpC,EACD;QACE,aAAa,EAAE,MAAA,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,cAAc,0CAAE,eAAe;KACxD,CACF,CAAC;IACF,OAAO,OAAO;SACX,IAAI,CAAC,IAAI,CAAC;SACV,IAAI,iCACA,IAAA,iDAAmC,EAAC,OAAO,CAAC,KAC/C,WAAW,EAAE,kBAAkB,EAC/B,OAAO,kBACL,MAAM,EAAE,kBAAkB,IACvB,MAAA,OAAO,CAAC,cAAc,0CAAE,OAAO,GAEpC,IAAI,EAAE,IAAA,kDAAsC,EAC1C,4BAA4B,CAC7B,IACD,CAAC;AACP,CAAC;AAEM,KAAK,UAAU,yBAAyB,CAC7C,MAA6B;IAE7B,MAAM,gBAAgB,GAAG,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;IACxC,IAAI,CAAC,gBAAgB,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC;QAC9C,MAAM,KAAK,GAAG,IAAA,6BAAe,EAAC,MAAM,CAAC,CAAC;QACtC,KAAK,CAAC,OAAO,GAAG,IAAA,qCAAyB,EAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QACvD,MAAM,KAAK,CAAC;IACd,CAAC;IAED,OAAO,IAAA,2CAA+B,EAAC,MAAM,CAAC,IAAI,CAAC,CAAC;AACtD,CAAC;AAED,kGAAkG;AAClG,SAAgB,aAAa,CAC3B,OAAe,EACf,4BAA0D,EAC1D,UAAuC,EAAE,cAAc,EAAE,EAAE,EAAE;IAE7D,OAAO,IAAA,wCAAoB,EACzB,OAAO,EACP,yBAAyB,EACzB,CAAC,KAAK,EAAE,KAAK,CAAC,EACd;QACE,kBAAkB,EAAE,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,kBAAkB;QAC/C,WAAW,EAAE,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,WAAW;QACjC,kBAAkB,EAAE,GAAG,EAAE,CACvB,kBAAkB,CAAC,OAAO,EAAE,4BAA4B,EAAE,OAAO,CAAC;QACpE,sBAAsB,EAAE,uBAAuB;KAChD,CACsE,CAAC;AAC5E,CAAC;AAED,SAAgB,eAAe,CAC7B,OAAe,EACf,4BAA+C,EAC/C,UAAoC,EAAE,cAAc,EAAE,EAAE,EAAE;;IAE1D,MAAM,IAAI,GAAG,IAAA,kCAAiB,EAC5B,yBAAyB,EACzB;QACE,eAAe,EAAE,OAAO,CAAC,UAAU;KACpC,EACD;QACE,aAAa,EAAE,MAAA,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,cAAc,0CAAE,eAAe;KACxD,CACF,CAAC;IACF,OAAO,OAAO;SACX,IAAI,CAAC,IAAI,CAAC;SACV,IAAI,iCACA,IAAA,iDAAmC,EAAC,OAAO,CAAC,KAC/C,WAAW,EAAE,kBAAkB,EAC/B,OAAO,kBACL,MAAM,EAAE,kBAAkB,IACvB,MAAA,OAAO,CAAC,cAAc,0CAAE,OAAO,GAEpC,IAAI,EAAE,IAAA,uCAA2B,EAAC,4BAA4B,CAAC,IAC/D,CAAC;AACP,CAAC;AAEM,KAAK,UAAU,sBAAsB,CAC1C,MAA6B;IAE7B,MAAM,gBAAgB,GAAG,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;IACxC,IAAI,CAAC,gBAAgB,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC;QAC9C,MAAM,KAAK,GAAG,IAAA,6BAAe,EAAC,MAAM,CAAC,CAAC;QACtC,KAAK,CAAC,OAAO,GAAG,IAAA,qCAAyB,EAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QACvD,MAAM,KAAK,CAAC;IACd,CAAC;IAED,OAAO,IAAA,2CAA+B,EAAC,MAAM,CAAC,IAAI,CAAC,CAAC;AACtD,CAAC;AAED,gGAAgG;AAChG,SAAgB,UAAU,CACxB,OAAe,EACf,4BAA+C,EAC/C,UAAoC,EAAE,cAAc,EAAE,EAAE,EAAE;IAE1D,OAAO,IAAA,wCAAoB,EAAC,OAAO,EAAE,sBAAsB,EAAE,CAAC,KAAK,EAAE,KAAK,CAAC,EAAE;QAC3E,kBAAkB,EAAE,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,kBAAkB;QAC/C,WAAW,EAAE,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,WAAW;QACjC,kBAAkB,EAAE,GAAG,EAAE,CACvB,eAAe,CAAC,OAAO,EAAE,4BAA4B,EAAE,OAAO,CAAC;QACjE,sBAAsB,EAAE,uBAAuB;KAChD,CAAyE,CAAC;AAC7E,CAAC;AAED,SAAgB,qBAAqB,CACnC,OAAe,EACf,KAAa,EACb,UAA0C,EAAE,cAAc,EAAE,EAAE,EAAE;;IAEhE,MAAM,IAAI,GAAG,IAAA,kCAAiB,EAC5B,yCAAyC,EACzC;QACE,KAAK,EAAE,KAAK;QACZ,eAAe,EAAE,OAAO,CAAC,UAAU;KACpC,EACD;QACE,aAAa,EAAE,MAAA,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,cAAc,0CAAE,eAAe;KACxD,CACF,CAAC;IACF,OAAO,OAAO;SACX,IAAI,CAAC,IAAI,CAAC;SACV,GAAG,iCACC,IAAA,iDAAmC,EAAC,OAAO,CAAC,KAC/C,OAAO,kBACL,MAAM,EAAE,kBAAkB,IACvB,MAAA,OAAO,CAAC,cAAc,0CAAE,OAAO,KAEpC,CAAC;AACP,CAAC;AAEM,KAAK,UAAU,4BAA4B,CAChD,MAA6B;IAE7B,MAAM,gBAAgB,GAAG,CAAC,KAAK,CAAC,CAAC;IACjC,IAAI,CAAC,gBAAgB,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC;QAC9C,MAAM,KAAK,GAAG,IAAA,6BAAe,EAAC,MAAM,CAAC,CAAC;QACtC,KAAK,CAAC,OAAO,GAAG,IAAA,qCAAyB,EAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QACvD,MAAM,KAAK,CAAC;IACd,CAAC;IAED,OAAO,IAAA,2CAA+B,EAAC,MAAM,CAAC,IAAI,CAAC,CAAC;AACtD,CAAC;AAED,kDAAkD;AAC3C,KAAK,UAAU,gBAAgB,CACpC,OAAe,EACf,KAAa,EACb,UAA0C,EAAE,cAAc,EAAE,EAAE,EAAE;IAEhE,MAAM,MAAM,GAAG,MAAM,qBAAqB,CAAC,OAAO,EAAE,KAAK,EAAE,OAAO,CAAC,CAAC;IACpE,OAAO,4BAA4B,CAAC,MAAM,CAAC,CAAC;AAC9C,CAAC","sourcesContent":["// Copyright (c) Microsoft Corporation.\n// Licensed under the MIT License.\n\nimport { KeyVaultContext as Client } from \"./index.js\";\nimport {\n FullBackupOperation,\n fullBackupOperationDeserializer,\n keyVaultErrorDeserializer,\n SASTokenParameter,\n sasTokenParameterSerializer,\n PreBackupOperationParameters,\n preBackupOperationParametersSerializer,\n RestoreOperation,\n restoreOperationDeserializer,\n RestoreOperationParameters,\n restoreOperationParametersSerializer,\n PreRestoreOperationParameters,\n preRestoreOperationParametersSerializer,\n SelectiveKeyRestoreOperation,\n selectiveKeyRestoreOperationDeserializer,\n SelectiveKeyRestoreOperationParameters,\n selectiveKeyRestoreOperationParametersSerializer,\n UpdateSettingRequest,\n updateSettingRequestSerializer,\n Setting,\n settingDeserializer,\n SettingsListResult,\n settingsListResultDeserializer,\n} from \"../models/models.js\";\nimport {\n GetSettingsOptionalParams,\n GetSettingOptionalParams,\n UpdateSettingOptionalParams,\n SelectiveKeyRestoreOperationOptionalParams,\n SelectiveKeyRestoreStatusOptionalParams,\n PreFullRestoreOperationOptionalParams,\n FullRestoreOperationOptionalParams,\n RestoreStatusOptionalParams,\n PreFullBackupOptionalParams,\n FullBackupOptionalParams,\n FullBackupStatusOptionalParams,\n} from \"./options.js\";\nimport { getLongRunningPoller } from \"../static-helpers/pollingHelpers.js\";\nimport { expandUrlTemplate } from \"../static-helpers/urlTemplate.js\";\nimport {\n StreamableMethod,\n PathUncheckedResponse,\n createRestError,\n operationOptionsToRequestParameters,\n} from \"@azure-rest/core-client\";\nimport { PollerLike, OperationState } from \"@azure/core-lro\";\n\nexport function _getSettingsSend(\n context: Client,\n options: GetSettingsOptionalParams = { requestOptions: {} },\n): StreamableMethod {\n const path = expandUrlTemplate(\n \"/settings{?api%2Dversion}\",\n {\n \"api%2Dversion\": context.apiVersion,\n },\n {\n allowReserved: options?.requestOptions?.skipUrlEncoding,\n },\n );\n return context\n .path(path)\n .get({\n ...operationOptionsToRequestParameters(options),\n headers: {\n accept: \"application/json\",\n ...options.requestOptions?.headers,\n },\n });\n}\n\nexport async function _getSettingsDeserialize(\n result: PathUncheckedResponse,\n): Promise<SettingsListResult> {\n const expectedStatuses = [\"200\"];\n if (!expectedStatuses.includes(result.status)) {\n const error = createRestError(result);\n error.details = keyVaultErrorDeserializer(result.body);\n throw error;\n }\n\n return settingsListResultDeserializer(result.body);\n}\n\n/** Retrieves a list of all the available account settings that can be configured. */\nexport async function getSettings(\n context: Client,\n options: GetSettingsOptionalParams = { requestOptions: {} },\n): Promise<SettingsListResult> {\n const result = await _getSettingsSend(context, options);\n return _getSettingsDeserialize(result);\n}\n\nexport function _getSettingSend(\n context: Client,\n settingName: string,\n options: GetSettingOptionalParams = { requestOptions: {} },\n): StreamableMethod {\n const path = expandUrlTemplate(\n \"/settings/{setting-name}{?api%2Dversion}\",\n {\n \"setting-name\": settingName,\n \"api%2Dversion\": context.apiVersion,\n },\n {\n allowReserved: options?.requestOptions?.skipUrlEncoding,\n },\n );\n return context\n .path(path)\n .get({\n ...operationOptionsToRequestParameters(options),\n headers: {\n accept: \"application/json\",\n ...options.requestOptions?.headers,\n },\n });\n}\n\nexport async function _getSettingDeserialize(\n result: PathUncheckedResponse,\n): Promise<Setting> {\n const expectedStatuses = [\"200\"];\n if (!expectedStatuses.includes(result.status)) {\n const error = createRestError(result);\n error.details = keyVaultErrorDeserializer(result.body);\n throw error;\n }\n\n return settingDeserializer(result.body);\n}\n\n/** Retrieves the setting object of a specified setting name. */\nexport async function getSetting(\n context: Client,\n settingName: string,\n options: GetSettingOptionalParams = { requestOptions: {} },\n): Promise<Setting> {\n const result = await _getSettingSend(context, settingName, options);\n return _getSettingDeserialize(result);\n}\n\nexport function _updateSettingSend(\n context: Client,\n settingName: string,\n parameters: UpdateSettingRequest,\n options: UpdateSettingOptionalParams = { requestOptions: {} },\n): StreamableMethod {\n const path = expandUrlTemplate(\n \"/settings/{setting-name}{?api%2Dversion}\",\n {\n \"setting-name\": settingName,\n \"api%2Dversion\": context.apiVersion,\n },\n {\n allowReserved: options?.requestOptions?.skipUrlEncoding,\n },\n );\n return context\n .path(path)\n .patch({\n ...operationOptionsToRequestParameters(options),\n contentType: \"application/json\",\n headers: {\n accept: \"application/json\",\n ...options.requestOptions?.headers,\n },\n body: updateSettingRequestSerializer(parameters),\n });\n}\n\nexport async function _updateSettingDeserialize(\n result: PathUncheckedResponse,\n): Promise<Setting> {\n const expectedStatuses = [\"200\"];\n if (!expectedStatuses.includes(result.status)) {\n const error = createRestError(result);\n error.details = keyVaultErrorDeserializer(result.body);\n throw error;\n }\n\n return settingDeserializer(result.body);\n}\n\n/** Description of the pool setting to be updated */\nexport async function updateSetting(\n context: Client,\n settingName: string,\n parameters: UpdateSettingRequest,\n options: UpdateSettingOptionalParams = { requestOptions: {} },\n): Promise<Setting> {\n const result = await _updateSettingSend(\n context,\n settingName,\n parameters,\n options,\n );\n return _updateSettingDeserialize(result);\n}\n\nexport function _selectiveKeyRestoreOperationSend(\n context: Client,\n keyName: string,\n restoreBlobDetails: SelectiveKeyRestoreOperationParameters,\n options: SelectiveKeyRestoreOperationOptionalParams = { requestOptions: {} },\n): StreamableMethod {\n const path = expandUrlTemplate(\n \"/keys/{keyName}/restore{?api%2Dversion}\",\n {\n keyName: keyName,\n \"api%2Dversion\": context.apiVersion,\n },\n {\n allowReserved: options?.requestOptions?.skipUrlEncoding,\n },\n );\n return context\n .path(path)\n .put({\n ...operationOptionsToRequestParameters(options),\n contentType: \"application/json\",\n headers: {\n accept: \"application/json\",\n ...options.requestOptions?.headers,\n },\n body: selectiveKeyRestoreOperationParametersSerializer(\n restoreBlobDetails,\n ),\n });\n}\n\nexport async function _selectiveKeyRestoreOperationDeserialize(\n result: PathUncheckedResponse,\n): Promise<SelectiveKeyRestoreOperation> {\n const expectedStatuses = [\"202\", \"200\"];\n if (!expectedStatuses.includes(result.status)) {\n const error = createRestError(result);\n error.details = keyVaultErrorDeserializer(result.body);\n throw error;\n }\n\n return selectiveKeyRestoreOperationDeserializer(result.body);\n}\n\n/** Restores all key versions of a given key using user supplied SAS token pointing to a previously stored Azure Blob storage backup folder */\nexport function selectiveKeyRestoreOperation(\n context: Client,\n keyName: string,\n restoreBlobDetails: SelectiveKeyRestoreOperationParameters,\n options: SelectiveKeyRestoreOperationOptionalParams = { requestOptions: {} },\n): PollerLike<\n OperationState<SelectiveKeyRestoreOperation>,\n SelectiveKeyRestoreOperation\n> {\n return getLongRunningPoller(\n context,\n _selectiveKeyRestoreOperationDeserialize,\n [\"202\", \"200\"],\n {\n updateIntervalInMs: options?.updateIntervalInMs,\n abortSignal: options?.abortSignal,\n getInitialResponse: () =>\n _selectiveKeyRestoreOperationSend(\n context,\n keyName,\n restoreBlobDetails,\n options,\n ),\n resourceLocationConfig: \"azure-async-operation\",\n },\n ) as PollerLike<\n OperationState<SelectiveKeyRestoreOperation>,\n SelectiveKeyRestoreOperation\n >;\n}\n\nexport function _selectiveKeyRestoreStatusSend(\n context: Client,\n jobId: string,\n options: SelectiveKeyRestoreStatusOptionalParams = { requestOptions: {} },\n): StreamableMethod {\n const path = expandUrlTemplate(\n \"/restore/{jobId}/pending{?api%2Dversion}\",\n {\n jobId: jobId,\n \"api%2Dversion\": context.apiVersion,\n },\n {\n allowReserved: options?.requestOptions?.skipUrlEncoding,\n },\n );\n return context\n .path(path)\n .get({\n ...operationOptionsToRequestParameters(options),\n headers: {\n accept: \"application/json\",\n ...options.requestOptions?.headers,\n },\n });\n}\n\nexport async function _selectiveKeyRestoreStatusDeserialize(\n result: PathUncheckedResponse,\n): Promise<SelectiveKeyRestoreOperation> {\n const expectedStatuses = [\"200\"];\n if (!expectedStatuses.includes(result.status)) {\n const error = createRestError(result);\n error.details = keyVaultErrorDeserializer(result.body);\n throw error;\n }\n\n return selectiveKeyRestoreOperationDeserializer(result.body);\n}\n\n/** Returns the status of the selective key restore operation */\nexport async function selectiveKeyRestoreStatus(\n context: Client,\n jobId: string,\n options: SelectiveKeyRestoreStatusOptionalParams = { requestOptions: {} },\n): Promise<SelectiveKeyRestoreOperation> {\n const result = await _selectiveKeyRestoreStatusSend(context, jobId, options);\n return _selectiveKeyRestoreStatusDeserialize(result);\n}\n\nexport function _preFullRestoreOperationSend(\n context: Client,\n preRestoreOperationParameters: PreRestoreOperationParameters,\n options: PreFullRestoreOperationOptionalParams = { requestOptions: {} },\n): StreamableMethod {\n const path = expandUrlTemplate(\n \"/prerestore{?api%2Dversion}\",\n {\n \"api%2Dversion\": context.apiVersion,\n },\n {\n allowReserved: options?.requestOptions?.skipUrlEncoding,\n },\n );\n return context\n .path(path)\n .put({\n ...operationOptionsToRequestParameters(options),\n contentType: \"application/json\",\n headers: {\n accept: \"application/json\",\n ...options.requestOptions?.headers,\n },\n body: preRestoreOperationParametersSerializer(\n preRestoreOperationParameters,\n ),\n });\n}\n\nexport async function _preFullRestoreOperationDeserialize(\n result: PathUncheckedResponse,\n): Promise<RestoreOperation> {\n const expectedStatuses = [\"202\", \"200\"];\n if (!expectedStatuses.includes(result.status)) {\n const error = createRestError(result);\n error.details = keyVaultErrorDeserializer(result.body);\n throw error;\n }\n\n return restoreOperationDeserializer(result.body);\n}\n\n/** Pre-restore operation for checking whether the customer can perform a full restore operation. */\nexport function preFullRestoreOperation(\n context: Client,\n preRestoreOperationParameters: PreRestoreOperationParameters,\n options: PreFullRestoreOperationOptionalParams = { requestOptions: {} },\n): PollerLike<OperationState<RestoreOperation>, RestoreOperation> {\n return getLongRunningPoller(\n context,\n _preFullRestoreOperationDeserialize,\n [\"202\", \"200\"],\n {\n updateIntervalInMs: options?.updateIntervalInMs,\n abortSignal: options?.abortSignal,\n getInitialResponse: () =>\n _preFullRestoreOperationSend(\n context,\n preRestoreOperationParameters,\n options,\n ),\n resourceLocationConfig: \"azure-async-operation\",\n },\n ) as PollerLike<OperationState<RestoreOperation>, RestoreOperation>;\n}\n\nexport function _fullRestoreOperationSend(\n context: Client,\n restoreBlobDetails: RestoreOperationParameters,\n options: FullRestoreOperationOptionalParams = { requestOptions: {} },\n): StreamableMethod {\n const path = expandUrlTemplate(\n \"/restore{?api%2Dversion}\",\n {\n \"api%2Dversion\": context.apiVersion,\n },\n {\n allowReserved: options?.requestOptions?.skipUrlEncoding,\n },\n );\n return context\n .path(path)\n .put({\n ...operationOptionsToRequestParameters(options),\n contentType: \"application/json\",\n headers: {\n accept: \"application/json\",\n ...options.requestOptions?.headers,\n },\n body: restoreOperationParametersSerializer(restoreBlobDetails),\n });\n}\n\nexport async function _fullRestoreOperationDeserialize(\n result: PathUncheckedResponse,\n): Promise<RestoreOperation> {\n const expectedStatuses = [\"202\", \"200\"];\n if (!expectedStatuses.includes(result.status)) {\n const error = createRestError(result);\n error.details = keyVaultErrorDeserializer(result.body);\n throw error;\n }\n\n return restoreOperationDeserializer(result.body);\n}\n\n/** Restores all key materials using the SAS token pointing to a previously stored Azure Blob storage backup folder */\nexport function fullRestoreOperation(\n context: Client,\n restoreBlobDetails: RestoreOperationParameters,\n options: FullRestoreOperationOptionalParams = { requestOptions: {} },\n): PollerLike<OperationState<RestoreOperation>, RestoreOperation> {\n return getLongRunningPoller(\n context,\n _fullRestoreOperationDeserialize,\n [\"202\", \"200\"],\n {\n updateIntervalInMs: options?.updateIntervalInMs,\n abortSignal: options?.abortSignal,\n getInitialResponse: () =>\n _fullRestoreOperationSend(context, restoreBlobDetails, options),\n resourceLocationConfig: \"azure-async-operation\",\n },\n ) as PollerLike<OperationState<RestoreOperation>, RestoreOperation>;\n}\n\nexport function _restoreStatusSend(\n context: Client,\n jobId: string,\n options: RestoreStatusOptionalParams = { requestOptions: {} },\n): StreamableMethod {\n const path = expandUrlTemplate(\n \"/restore/{jobId}/pending{?api%2Dversion}\",\n {\n jobId: jobId,\n \"api%2Dversion\": context.apiVersion,\n },\n {\n allowReserved: options?.requestOptions?.skipUrlEncoding,\n },\n );\n return context\n .path(path)\n .get({\n ...operationOptionsToRequestParameters(options),\n headers: {\n accept: \"application/json\",\n ...options.requestOptions?.headers,\n },\n });\n}\n\nexport async function _restoreStatusDeserialize(\n result: PathUncheckedResponse,\n): Promise<RestoreOperation> {\n const expectedStatuses = [\"200\"];\n if (!expectedStatuses.includes(result.status)) {\n const error = createRestError(result);\n error.details = keyVaultErrorDeserializer(result.body);\n throw error;\n }\n\n return restoreOperationDeserializer(result.body);\n}\n\n/** Returns the status of restore operation */\nexport async function restoreStatus(\n context: Client,\n jobId: string,\n options: RestoreStatusOptionalParams = { requestOptions: {} },\n): Promise<RestoreOperation> {\n const result = await _restoreStatusSend(context, jobId, options);\n return _restoreStatusDeserialize(result);\n}\n\nexport function _preFullBackupSend(\n context: Client,\n preBackupOperationParameters: PreBackupOperationParameters,\n options: PreFullBackupOptionalParams = { requestOptions: {} },\n): StreamableMethod {\n const path = expandUrlTemplate(\n \"/prebackup{?api%2Dversion}\",\n {\n \"api%2Dversion\": context.apiVersion,\n },\n {\n allowReserved: options?.requestOptions?.skipUrlEncoding,\n },\n );\n return context\n .path(path)\n .post({\n ...operationOptionsToRequestParameters(options),\n contentType: \"application/json\",\n headers: {\n accept: \"application/json\",\n ...options.requestOptions?.headers,\n },\n body: preBackupOperationParametersSerializer(\n preBackupOperationParameters,\n ),\n });\n}\n\nexport async function _preFullBackupDeserialize(\n result: PathUncheckedResponse,\n): Promise<FullBackupOperation> {\n const expectedStatuses = [\"202\", \"200\"];\n if (!expectedStatuses.includes(result.status)) {\n const error = createRestError(result);\n error.details = keyVaultErrorDeserializer(result.body);\n throw error;\n }\n\n return fullBackupOperationDeserializer(result.body);\n}\n\n/** Pre-backup operation for checking whether the customer can perform a full backup operation. */\nexport function preFullBackup(\n context: Client,\n preBackupOperationParameters: PreBackupOperationParameters,\n options: PreFullBackupOptionalParams = { requestOptions: {} },\n): PollerLike<OperationState<FullBackupOperation>, FullBackupOperation> {\n return getLongRunningPoller(\n context,\n _preFullBackupDeserialize,\n [\"202\", \"200\"],\n {\n updateIntervalInMs: options?.updateIntervalInMs,\n abortSignal: options?.abortSignal,\n getInitialResponse: () =>\n _preFullBackupSend(context, preBackupOperationParameters, options),\n resourceLocationConfig: \"azure-async-operation\",\n },\n ) as PollerLike<OperationState<FullBackupOperation>, FullBackupOperation>;\n}\n\nexport function _fullBackupSend(\n context: Client,\n azureStorageBlobContainerUri: SASTokenParameter,\n options: FullBackupOptionalParams = { requestOptions: {} },\n): StreamableMethod {\n const path = expandUrlTemplate(\n \"/backup{?api%2Dversion}\",\n {\n \"api%2Dversion\": context.apiVersion,\n },\n {\n allowReserved: options?.requestOptions?.skipUrlEncoding,\n },\n );\n return context\n .path(path)\n .post({\n ...operationOptionsToRequestParameters(options),\n contentType: \"application/json\",\n headers: {\n accept: \"application/json\",\n ...options.requestOptions?.headers,\n },\n body: sasTokenParameterSerializer(azureStorageBlobContainerUri),\n });\n}\n\nexport async function _fullBackupDeserialize(\n result: PathUncheckedResponse,\n): Promise<FullBackupOperation> {\n const expectedStatuses = [\"202\", \"200\"];\n if (!expectedStatuses.includes(result.status)) {\n const error = createRestError(result);\n error.details = keyVaultErrorDeserializer(result.body);\n throw error;\n }\n\n return fullBackupOperationDeserializer(result.body);\n}\n\n/** Creates a full backup using a user-provided SAS token to an Azure blob storage container. */\nexport function fullBackup(\n context: Client,\n azureStorageBlobContainerUri: SASTokenParameter,\n options: FullBackupOptionalParams = { requestOptions: {} },\n): PollerLike<OperationState<FullBackupOperation>, FullBackupOperation> {\n return getLongRunningPoller(context, _fullBackupDeserialize, [\"202\", \"200\"], {\n updateIntervalInMs: options?.updateIntervalInMs,\n abortSignal: options?.abortSignal,\n getInitialResponse: () =>\n _fullBackupSend(context, azureStorageBlobContainerUri, options),\n resourceLocationConfig: \"azure-async-operation\",\n }) as PollerLike<OperationState<FullBackupOperation>, FullBackupOperation>;\n}\n\nexport function _fullBackupStatusSend(\n context: Client,\n jobId: string,\n options: FullBackupStatusOptionalParams = { requestOptions: {} },\n): StreamableMethod {\n const path = expandUrlTemplate(\n \"/backup/{jobId}/pending{?api%2Dversion}\",\n {\n jobId: jobId,\n \"api%2Dversion\": context.apiVersion,\n },\n {\n allowReserved: options?.requestOptions?.skipUrlEncoding,\n },\n );\n return context\n .path(path)\n .get({\n ...operationOptionsToRequestParameters(options),\n headers: {\n accept: \"application/json\",\n ...options.requestOptions?.headers,\n },\n });\n}\n\nexport async function _fullBackupStatusDeserialize(\n result: PathUncheckedResponse,\n): Promise<FullBackupOperation> {\n const expectedStatuses = [\"200\"];\n if (!expectedStatuses.includes(result.status)) {\n const error = createRestError(result);\n error.details = keyVaultErrorDeserializer(result.body);\n throw error;\n }\n\n return fullBackupOperationDeserializer(result.body);\n}\n\n/** Returns the status of full backup operation */\nexport async function fullBackupStatus(\n context: Client,\n jobId: string,\n options: FullBackupStatusOptionalParams = { requestOptions: {} },\n): Promise<FullBackupOperation> {\n const result = await _fullBackupStatusSend(context, jobId, options);\n return _fullBackupStatusDeserialize(result);\n}\n"]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"options.d.ts","sourceRoot":"","sources":["../../../../../src/generated/src/api/options.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,gBAAgB,EAAE,MAAM,yBAAyB,CAAC;AAE3D,2BAA2B;AAC3B,MAAM,WAAW,yBAA0B,SAAQ,gBAAgB;CAAG;AAEtE,2BAA2B;AAC3B,MAAM,WAAW,wBAAyB,SAAQ,gBAAgB;CAAG;AAErE,2BAA2B;AAC3B,MAAM,WAAW,2BAA4B,SAAQ,gBAAgB;CAAG;AAExE,2BAA2B;AAC3B,MAAM,WAAW,0CACf,SAAQ,gBAAgB;IACxB,sDAAsD;IACtD,kBAAkB,CAAC,EAAE,MAAM,CAAC;CAC7B;AAED,2BAA2B;AAC3B,MAAM,WAAW,uCACf,SAAQ,gBAAgB;CAAG;AAE7B,2BAA2B;AAC3B,MAAM,WAAW,qCACf,SAAQ,gBAAgB;IACxB,sDAAsD;IACtD,kBAAkB,CAAC,EAAE,MAAM,CAAC;CAC7B;AAED,2BAA2B;AAC3B,MAAM,WAAW,kCAAmC,SAAQ,gBAAgB;IAC1E,sDAAsD;IACtD,kBAAkB,CAAC,EAAE,MAAM,CAAC;CAC7B;AAED,2BAA2B;AAC3B,MAAM,WAAW,2BAA4B,SAAQ,gBAAgB;CAAG;AAExE,2BAA2B;AAC3B,MAAM,WAAW,2BAA4B,SAAQ,gBAAgB;IACnE,sDAAsD;IACtD,kBAAkB,CAAC,EAAE,MAAM,CAAC;CAC7B;AAED,2BAA2B;AAC3B,MAAM,WAAW,wBAAyB,SAAQ,gBAAgB;IAChE,sDAAsD;IACtD,kBAAkB,CAAC,EAAE,MAAM,CAAC;CAC7B;AAED,2BAA2B;AAC3B,MAAM,WAAW,8BAA+B,SAAQ,gBAAgB;CAAG"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"options.js","sourceRoot":"","sources":["../../../../../src/generated/src/api/options.ts"],"names":[],"mappings":";AAAA,uCAAuC;AACvC,kCAAkC","sourcesContent":["// Copyright (c) Microsoft Corporation.\n// Licensed under the MIT License.\n\nimport { OperationOptions } from \"@azure-rest/core-client\";\n\n/** Optional parameters. */\nexport interface GetSettingsOptionalParams extends OperationOptions {}\n\n/** Optional parameters. */\nexport interface GetSettingOptionalParams extends OperationOptions {}\n\n/** Optional parameters. */\nexport interface UpdateSettingOptionalParams extends OperationOptions {}\n\n/** Optional parameters. */\nexport interface SelectiveKeyRestoreOperationOptionalParams\n extends OperationOptions {\n /** Delay to wait until next poll, in milliseconds. */\n updateIntervalInMs?: number;\n}\n\n/** Optional parameters. */\nexport interface SelectiveKeyRestoreStatusOptionalParams\n extends OperationOptions {}\n\n/** Optional parameters. */\nexport interface PreFullRestoreOperationOptionalParams\n extends OperationOptions {\n /** Delay to wait until next poll, in milliseconds. */\n updateIntervalInMs?: number;\n}\n\n/** Optional parameters. */\nexport interface FullRestoreOperationOptionalParams extends OperationOptions {\n /** Delay to wait until next poll, in milliseconds. */\n updateIntervalInMs?: number;\n}\n\n/** Optional parameters. */\nexport interface RestoreStatusOptionalParams extends OperationOptions {}\n\n/** Optional parameters. */\nexport interface PreFullBackupOptionalParams extends OperationOptions {\n /** Delay to wait until next poll, in milliseconds. */\n updateIntervalInMs?: number;\n}\n\n/** Optional parameters. */\nexport interface FullBackupOptionalParams extends OperationOptions {\n /** Delay to wait until next poll, in milliseconds. */\n updateIntervalInMs?: number;\n}\n\n/** Optional parameters. */\nexport interface FullBackupStatusOptionalParams extends OperationOptions {}\n"]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../../src/generated/src/api/roleAssignments/index.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,YAAY,EAAE,GAAG,EAAE,MAAM,EAAE,OAAO,EAAE,MAAM,iBAAiB,CAAC;AACrE,OAAO,EACL,yCAAyC,EACzC,gCAAgC,EAChC,mCAAmC,EACnC,mCAAmC,GACpC,MAAM,cAAc,CAAC"}
|