-
Notifications
You must be signed in to change notification settings - Fork 3.3k
[KeyVault] Add new parameter --enable-rbac-authorization during creating or updating
#12074
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I prefer not to hard-code our testing environment in the public CLI code. We can register a new cloud instead.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I prefer not to hard-code our testing environment in the public CLI code. We can register a new cloud instead.
Good idea, I'll deprecate this part.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The keyvault may be created via Azure Portal, so customer may not used --enable-rbac-authorization to enable RBAC authorization. So how about using
Cannot set policies for a vault with RBAC authorization enabled
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The keyvault may be created via Azure Portal, so customer may not used
--enable-rbac-authorizationto enable RBAC authorization. So how about usingCannot set policies for a vault with RBAC authorization enabled
Agree, this is more reasonable, will refine it.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In error message we usually use single quote '. Grave accent ` is only for markdown.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In error message we usually use single quote
'. Grave accent`is only for markdown.
Good point, will refine this.
|
add to S169 |
| type: command | ||
| short-summary: Create a key vault. | ||
| long-summary: Default permissions are created for the current user or service principal unless the `--no-self-perms` flag is specified. | ||
| long-summary: If `--enable-rbac-authorization` is not specified, then default permissions are created for the current user or service principal unless the `--no-self-perms` flag is specified. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Long summary is not shown in CLI reference. May you can move it to short summary.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Long summary is not shown in CLI reference. May you can move it to short summary.
@qwordy Good point, but I think it's ok to keep it as long summary, for the docs display issue, we'd better push docs team to display our long summaries as well. Now at least we can see the long summary using -h.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
OK. No problem.
|
/azp run |
|
Azure Pipelines successfully started running 2 pipeline(s). |
| type: command | ||
| short-summary: Create a key vault. | ||
| long-summary: Default permissions are created for the current user or service principal unless the `--no-self-perms` flag is specified. | ||
| long-summary: If `--enable-rbac-authorization` is not specified, then default permissions are created for the current user or service principal unless the `--no-self-perms` flag is specified. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This statement is cumbersome.
| long-summary: If `--enable-rbac-authorization` is not specified, then default permissions are created for the current user or service principal unless the `--no-self-perms` flag is specified. | |
| long-summary: Default permissions are created for the current user or service principal unless the `--no-self-perms` or `--enable-rbac-authorization` flag is specified. |

Support for #11268
How to test:
az keyvault create -n {} -g {} --enable-rbac-authorizationproperties.enableRbacAuthorizationThis checklist is used to make sure that common guidelines for a pull request are followed.
The PR title and description has followed the guideline in Submitting Pull Requests.
I adhere to the Command Guidelines.