@azure/keyvault-secrets 4.4.0-beta.2 → 4.4.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +6 -0
- package/README.md +5 -2
- package/dist/index.js +119 -86
- package/dist/index.js.map +1 -1
- package/dist-esm/keyvault-common/src/challengeBasedAuthenticationPolicy.js +4 -4
- package/dist-esm/keyvault-common/src/challengeBasedAuthenticationPolicy.js.map +1 -1
- package/dist-esm/keyvault-common/src/parseKeyvaultIdentifier.js +1 -1
- package/dist-esm/keyvault-common/src/parseKeyvaultIdentifier.js.map +1 -1
- package/dist-esm/keyvault-common/src/parseWWWAuthenticate.js +1 -1
- package/dist-esm/keyvault-common/src/parseWWWAuthenticate.js.map +1 -1
- package/dist-esm/keyvault-common/src/tracingHelpers.js +4 -4
- package/dist-esm/keyvault-common/src/tracingHelpers.js.map +1 -1
- package/dist-esm/keyvault-secrets/src/constants.js +1 -1
- package/dist-esm/keyvault-secrets/src/constants.js.map +1 -1
- package/dist-esm/keyvault-secrets/src/generated/keyVaultClient.js +4 -4
- package/dist-esm/keyvault-secrets/src/generated/keyVaultClient.js.map +1 -1
- package/dist-esm/keyvault-secrets/src/generated/keyVaultClientContext.js +6 -7
- package/dist-esm/keyvault-secrets/src/generated/keyVaultClientContext.js.map +1 -1
- package/dist-esm/keyvault-secrets/src/generated/models/index.js +24 -1
- package/dist-esm/keyvault-secrets/src/generated/models/index.js.map +1 -1
- package/dist-esm/keyvault-secrets/src/identifier.js.map +1 -1
- package/dist-esm/keyvault-secrets/src/index.js +12 -23
- package/dist-esm/keyvault-secrets/src/index.js.map +1 -1
- package/dist-esm/keyvault-secrets/src/lro/delete/operation.js +1 -1
- package/dist-esm/keyvault-secrets/src/lro/delete/operation.js.map +1 -1
- package/dist-esm/keyvault-secrets/src/lro/delete/poller.js.map +1 -1
- package/dist-esm/keyvault-secrets/src/lro/keyVaultSecretPoller.js +1 -1
- package/dist-esm/keyvault-secrets/src/lro/keyVaultSecretPoller.js.map +1 -1
- package/dist-esm/keyvault-secrets/src/lro/recover/operation.js +1 -1
- package/dist-esm/keyvault-secrets/src/lro/recover/operation.js.map +1 -1
- package/dist-esm/keyvault-secrets/src/lro/recover/poller.js +1 -1
- package/dist-esm/keyvault-secrets/src/lro/recover/poller.js.map +1 -1
- package/dist-esm/keyvault-secrets/src/secretsModels.js +1 -1
- package/dist-esm/keyvault-secrets/src/secretsModels.js.map +1 -1
- package/dist-esm/keyvault-secrets/src/transformations.js +2 -2
- package/dist-esm/keyvault-secrets/src/transformations.js.map +1 -1
- package/package.json +12 -27
- package/types/keyvault-secrets.d.ts +42 -10
package/CHANGELOG.md
CHANGED
package/README.md
CHANGED
|
@@ -20,6 +20,7 @@ Use the client library for Azure Key Vault Secrets in your Node.js application t
|
|
|
20
20
|
> Note: This package cannot be used in the browser due to Azure Key Vault service limitations, please refer to [this document](https://github.com/Azure/azure-sdk-for-js/blob/main/samples/cors/ts/README.md) for guidance.
|
|
21
21
|
|
|
22
22
|
Key links:
|
|
23
|
+
|
|
23
24
|
- [Source code](https://github.com/Azure/azure-sdk-for-js/tree/main/sdk/keyvault/keyvault-secrets)
|
|
24
25
|
- [Package (npm)](https://www.npmjs.com/package/@azure/keyvault-secrets)
|
|
25
26
|
- [API Reference Documentation](https://docs.microsoft.com/javascript/api/@azure/keyvault-secrets)
|
|
@@ -165,7 +166,7 @@ const url = `https://${vaultName}.vault.azure.net`;
|
|
|
165
166
|
|
|
166
167
|
// Change the Azure Key Vault service API version being used via the `serviceVersion` option
|
|
167
168
|
const client = new SecretClient(url, credential, {
|
|
168
|
-
serviceVersion: "7.0"
|
|
169
|
+
serviceVersion: "7.0",
|
|
169
170
|
});
|
|
170
171
|
```
|
|
171
172
|
|
|
@@ -265,7 +266,7 @@ const secretName = "MySecretName";
|
|
|
265
266
|
|
|
266
267
|
async function main() {
|
|
267
268
|
const result = await client.setSecret(secretName, "MySecretValue", {
|
|
268
|
-
enabled: false
|
|
269
|
+
enabled: false,
|
|
269
270
|
});
|
|
270
271
|
}
|
|
271
272
|
|
|
@@ -517,6 +518,8 @@ main();
|
|
|
517
518
|
|
|
518
519
|
## Troubleshooting
|
|
519
520
|
|
|
521
|
+
See our [troubleshooting guide](https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/keyvault/keyvault-secrets/TROUBLESHOOTING.md) for details on how to diagnose various failure scenarios.
|
|
522
|
+
|
|
520
523
|
Enabling logging may help uncover useful information about failures. In order to see a log of HTTP requests and responses, set the `AZURE_LOG_LEVEL` environment variable to `info`. Alternatively, logging can be enabled at runtime by calling `setLogLevel` in the `@azure/logger`:
|
|
521
524
|
|
|
522
525
|
```javascript
|