@azure/keyvault-keys 4.8.0-beta.1 → 4.8.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (34) hide show
  1. package/README.md +1 -1
  2. package/dist/index.js +11 -12
  3. package/dist/index.js.map +1 -1
  4. package/dist-esm/keyvault-common/src/challengeBasedAuthenticationPolicy.js.map +1 -1
  5. package/dist-esm/keyvault-common/src/parseKeyVaultIdentifier.js.map +1 -1
  6. package/dist-esm/keyvault-common/src/parseWWWAuthenticate.js.map +1 -1
  7. package/dist-esm/keyvault-keys/src/constants.js +1 -1
  8. package/dist-esm/keyvault-keys/src/constants.js.map +1 -1
  9. package/dist-esm/keyvault-keys/src/cryptography/aesCryptographyProvider.browser.js.map +1 -1
  10. package/dist-esm/keyvault-keys/src/cryptography/aesCryptographyProvider.js.map +1 -1
  11. package/dist-esm/keyvault-keys/src/cryptography/conversions.js.map +1 -1
  12. package/dist-esm/keyvault-keys/src/cryptography/crypto.browser.js.map +1 -1
  13. package/dist-esm/keyvault-keys/src/cryptography/crypto.js.map +1 -1
  14. package/dist-esm/keyvault-keys/src/cryptography/models.js.map +1 -1
  15. package/dist-esm/keyvault-keys/src/cryptography/remoteCryptographyProvider.js +1 -1
  16. package/dist-esm/keyvault-keys/src/cryptography/remoteCryptographyProvider.js.map +1 -1
  17. package/dist-esm/keyvault-keys/src/cryptography/rsaCryptographyProvider.browser.js.map +1 -1
  18. package/dist-esm/keyvault-keys/src/cryptography/rsaCryptographyProvider.js.map +1 -1
  19. package/dist-esm/keyvault-keys/src/cryptographyClient.js.map +1 -1
  20. package/dist-esm/keyvault-keys/src/generated/keyVaultClient.js +1 -1
  21. package/dist-esm/keyvault-keys/src/generated/keyVaultClient.js.map +1 -1
  22. package/dist-esm/keyvault-keys/src/generated/models/index.js +6 -6
  23. package/dist-esm/keyvault-keys/src/generated/models/index.js.map +1 -1
  24. package/dist-esm/keyvault-keys/src/index.js +1 -2
  25. package/dist-esm/keyvault-keys/src/index.js.map +1 -1
  26. package/dist-esm/keyvault-keys/src/keysModels.js +1 -1
  27. package/dist-esm/keyvault-keys/src/keysModels.js.map +1 -1
  28. package/dist-esm/keyvault-keys/src/lro/delete/operation.js.map +1 -1
  29. package/dist-esm/keyvault-keys/src/lro/delete/poller.js.map +1 -1
  30. package/dist-esm/keyvault-keys/src/lro/keyVaultKeyPoller.js.map +1 -1
  31. package/dist-esm/keyvault-keys/src/lro/recover/operation.js.map +1 -1
  32. package/dist-esm/keyvault-keys/src/lro/recover/poller.js.map +1 -1
  33. package/dist-esm/keyvault-keys/src/transformations.js.map +1 -1
  34. package/package.json +7 -10
package/README.md CHANGED
@@ -387,7 +387,7 @@ Another way to wait until the key is fully deleted is to do individual calls, as
387
387
  ```typescript
388
388
  const { DefaultAzureCredential } = require("@azure/identity");
389
389
  const { KeyClient } = require("@azure/keyvault-keys");
390
- const { delay } = require("@azure/core-http");
390
+ const { delay } = require("@azure/core-util");
391
391
 
392
392
  const credential = new DefaultAzureCredential();
393
393
 
package/dist/index.js CHANGED
@@ -5,7 +5,6 @@ Object.defineProperty(exports, '__esModule', { value: true });
5
5
  var tslib = require('tslib');
6
6
  var coreRestPipeline = require('@azure/core-rest-pipeline');
7
7
  var logger$1 = require('@azure/logger');
8
- require('@azure/core-paging');
9
8
  var coreClient = require('@azure/core-client');
10
9
  var coreHttpCompat = require('@azure/core-http-compat');
11
10
  var coreTracing = require('@azure/core-tracing');
@@ -50,12 +49,12 @@ const logger = logger$1.createClientLogger("keyvault-keys");
50
49
  * Code generated by Microsoft (R) AutoRest Code Generator.
51
50
  * Changes may cause incorrect behavior and will be lost if the code is regenerated.
52
51
  */
53
- /** Known values of {@link ApiVersion75Preview1} that the service accepts. */
54
- var KnownApiVersion75Preview1;
55
- (function (KnownApiVersion75Preview1) {
56
- /** Api Version '7.5-preview.1' */
57
- KnownApiVersion75Preview1["Seven5Preview1"] = "7.5-preview.1";
58
- })(KnownApiVersion75Preview1 || (KnownApiVersion75Preview1 = {}));
52
+ /** Known values of {@link ApiVersion75} that the service accepts. */
53
+ var KnownApiVersion75;
54
+ (function (KnownApiVersion75) {
55
+ /** Api Version '7.5' */
56
+ KnownApiVersion75["Seven5"] = "7.5";
57
+ })(KnownApiVersion75 || (KnownApiVersion75 = {}));
59
58
  /** Known values of {@link JsonWebKeyType} that the service accepts. */
60
59
  exports.KnownKeyTypes = void 0;
61
60
  (function (KnownJsonWebKeyType) {
@@ -1370,7 +1369,7 @@ class KeyVaultClient extends coreHttpCompat__namespace.ExtendedServiceClient {
1370
1369
  const defaults = {
1371
1370
  requestContentType: "application/json; charset=utf-8"
1372
1371
  };
1373
- const packageDetails = `azsdk-js-keyvault-keys/4.8.0-beta.1`;
1372
+ const packageDetails = `azsdk-js-keyvault-keys/4.8.0`;
1374
1373
  const userAgentPrefix = options.userAgentOptions && options.userAgentOptions.userAgentPrefix
1375
1374
  ? `${options.userAgentOptions.userAgentPrefix} ${packageDetails}`
1376
1375
  : `${packageDetails}`;
@@ -2344,7 +2343,7 @@ const getDeletedKeysNextOperationSpec = {
2344
2343
 
2345
2344
  // Copyright (c) Microsoft Corporation.
2346
2345
  // Licensed under the MIT license.
2347
- const SDK_VERSION = "4.8.0-beta.1";
2346
+ const SDK_VERSION = "4.8.0";
2348
2347
 
2349
2348
  // Copyright (c) Microsoft Corporation.
2350
2349
  // Licensed under the MIT license.
@@ -2941,7 +2940,7 @@ class RecoverDeletedKeyPoller extends KeyVaultKeyPoller {
2941
2940
  /**
2942
2941
  * The latest supported Key Vault service API version
2943
2942
  */
2944
- const LATEST_API_VERSION = "7.5-preview.1";
2943
+ const LATEST_API_VERSION = "7.5";
2945
2944
  /** Known values of {@link KeyOperation} that the service accepts. */
2946
2945
  exports.KnownKeyOperations = void 0;
2947
2946
  (function (KnownKeyOperations) {
@@ -3198,7 +3197,7 @@ function getOrInitializeClient(credential, options) {
3198
3197
  };
3199
3198
  const authPolicy = coreRestPipeline.bearerTokenAuthenticationPolicy({
3200
3199
  credential,
3201
- scopes: [],
3200
+ scopes: [], // Scopes are going to be defined by the challenge callbacks.
3202
3201
  challengeCallbacks: createKeyVaultChallengeCallbacks(options),
3203
3202
  });
3204
3203
  const internalPipelineOptions = Object.assign(Object.assign({}, options), { loggingOptions: {
@@ -4016,7 +4015,7 @@ class KeyClient {
4016
4015
  };
4017
4016
  const authPolicy = coreRestPipeline.bearerTokenAuthenticationPolicy({
4018
4017
  credential,
4019
- scopes: [],
4018
+ scopes: [], // Scopes are going to be defined by the challenge callbacks.
4020
4019
  challengeCallbacks: createKeyVaultChallengeCallbacks(pipelineOptions),
4021
4020
  });
4022
4021
  const internalPipelineOptions = Object.assign(Object.assign({}, pipelineOptions), { loggingOptions: {