@azure/keyvault-secrets 4.4.0-beta.2 → 4.4.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (38) hide show
  1. package/CHANGELOG.md +6 -0
  2. package/README.md +5 -2
  3. package/dist/index.js +119 -86
  4. package/dist/index.js.map +1 -1
  5. package/dist-esm/keyvault-common/src/challengeBasedAuthenticationPolicy.js +4 -4
  6. package/dist-esm/keyvault-common/src/challengeBasedAuthenticationPolicy.js.map +1 -1
  7. package/dist-esm/keyvault-common/src/parseKeyvaultIdentifier.js +1 -1
  8. package/dist-esm/keyvault-common/src/parseKeyvaultIdentifier.js.map +1 -1
  9. package/dist-esm/keyvault-common/src/parseWWWAuthenticate.js +1 -1
  10. package/dist-esm/keyvault-common/src/parseWWWAuthenticate.js.map +1 -1
  11. package/dist-esm/keyvault-common/src/tracingHelpers.js +4 -4
  12. package/dist-esm/keyvault-common/src/tracingHelpers.js.map +1 -1
  13. package/dist-esm/keyvault-secrets/src/constants.js +1 -1
  14. package/dist-esm/keyvault-secrets/src/constants.js.map +1 -1
  15. package/dist-esm/keyvault-secrets/src/generated/keyVaultClient.js +4 -4
  16. package/dist-esm/keyvault-secrets/src/generated/keyVaultClient.js.map +1 -1
  17. package/dist-esm/keyvault-secrets/src/generated/keyVaultClientContext.js +6 -7
  18. package/dist-esm/keyvault-secrets/src/generated/keyVaultClientContext.js.map +1 -1
  19. package/dist-esm/keyvault-secrets/src/generated/models/index.js +24 -1
  20. package/dist-esm/keyvault-secrets/src/generated/models/index.js.map +1 -1
  21. package/dist-esm/keyvault-secrets/src/identifier.js.map +1 -1
  22. package/dist-esm/keyvault-secrets/src/index.js +12 -23
  23. package/dist-esm/keyvault-secrets/src/index.js.map +1 -1
  24. package/dist-esm/keyvault-secrets/src/lro/delete/operation.js +1 -1
  25. package/dist-esm/keyvault-secrets/src/lro/delete/operation.js.map +1 -1
  26. package/dist-esm/keyvault-secrets/src/lro/delete/poller.js.map +1 -1
  27. package/dist-esm/keyvault-secrets/src/lro/keyVaultSecretPoller.js +1 -1
  28. package/dist-esm/keyvault-secrets/src/lro/keyVaultSecretPoller.js.map +1 -1
  29. package/dist-esm/keyvault-secrets/src/lro/recover/operation.js +1 -1
  30. package/dist-esm/keyvault-secrets/src/lro/recover/operation.js.map +1 -1
  31. package/dist-esm/keyvault-secrets/src/lro/recover/poller.js +1 -1
  32. package/dist-esm/keyvault-secrets/src/lro/recover/poller.js.map +1 -1
  33. package/dist-esm/keyvault-secrets/src/secretsModels.js +1 -1
  34. package/dist-esm/keyvault-secrets/src/secretsModels.js.map +1 -1
  35. package/dist-esm/keyvault-secrets/src/transformations.js +2 -2
  36. package/dist-esm/keyvault-secrets/src/transformations.js.map +1 -1
  37. package/package.json +12 -27
  38. package/types/keyvault-secrets.d.ts +42 -10
package/CHANGELOG.md CHANGED
@@ -1,5 +1,11 @@
1
1
  # Release History
2
2
 
3
+ ## 4.4.0 (2022-03-24)
4
+
5
+ ### Other Changes
6
+
7
+ - This release updates `SecretClient` to support service version 7.3 by default.
8
+
3
9
  ## 4.4.0-beta.2 (2021-11-09)
4
10
 
5
11
  ### Features Added
package/README.md CHANGED
@@ -20,6 +20,7 @@ Use the client library for Azure Key Vault Secrets in your Node.js application t
20
20
  > Note: This package cannot be used in the browser due to Azure Key Vault service limitations, please refer to [this document](https://github.com/Azure/azure-sdk-for-js/blob/main/samples/cors/ts/README.md) for guidance.
21
21
 
22
22
  Key links:
23
+
23
24
  - [Source code](https://github.com/Azure/azure-sdk-for-js/tree/main/sdk/keyvault/keyvault-secrets)
24
25
  - [Package (npm)](https://www.npmjs.com/package/@azure/keyvault-secrets)
25
26
  - [API Reference Documentation](https://docs.microsoft.com/javascript/api/@azure/keyvault-secrets)
@@ -165,7 +166,7 @@ const url = `https://${vaultName}.vault.azure.net`;
165
166
 
166
167
  // Change the Azure Key Vault service API version being used via the `serviceVersion` option
167
168
  const client = new SecretClient(url, credential, {
168
- serviceVersion: "7.0"
169
+ serviceVersion: "7.0",
169
170
  });
170
171
  ```
171
172
 
@@ -265,7 +266,7 @@ const secretName = "MySecretName";
265
266
 
266
267
  async function main() {
267
268
  const result = await client.setSecret(secretName, "MySecretValue", {
268
- enabled: false
269
+ enabled: false,
269
270
  });
270
271
  }
271
272
 
@@ -517,6 +518,8 @@ main();
517
518
 
518
519
  ## Troubleshooting
519
520
 
521
+ See our [troubleshooting guide](https://github.com/Azure/azure-sdk-for-js/blob/main/sdk/keyvault/keyvault-secrets/TROUBLESHOOTING.md) for details on how to diagnose various failure scenarios.
522
+
520
523
  Enabling logging may help uncover useful information about failures. In order to see a log of HTTP requests and responses, set the `AZURE_LOG_LEVEL` environment variable to `info`. Alternatively, logging can be enabled at runtime by calling `setLogLevel` in the `@azure/logger`:
521
524
 
522
525
  ```javascript