-
Notifications
You must be signed in to change notification settings - Fork 1.3k
[Key Vault Admin] Convenience layer - KeyVaultAccessControlClient #10815
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from 1 commit
7c3cfc5
28b4eb6
eb9cbe0
a5524f5
167935d
44e9eb3
3790bd1
2188a87
60f4bd3
ac414c9
9e5505a
57fd102
0ce383e
7f179ef
8919a93
ee1d71e
b7d3bf5
26e9583
a10a592
09148fd
1b0f642
4513d72
6ab4ae1
7c845ca
9030441
18d7911
74b7bfc
ca12be4
e306ff4
d61f0b6
64a5d1d
1386365
590a835
23431cc
66bcdd4
8484177
24380a7
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
- Loading branch information
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -28,14 +28,22 @@ export interface GetRoleAssignmentOptions extends coreHttp.OperationOptions { | |
| // @public (undocumented) | ||
| export class KeyVaultAccessControlClient { | ||
| constructor(vaultUrl: string, credential: TokenCredential, pipelineOptions?: AccessControlClientOptions); | ||
| createRoleAssignment(scope: RoleAssignmentScope, name: string, roleDefinitionId: string, principalId: string, options?: CreateRoleAssignmentOptions): Promise<KeyVaultRoleAssignment>; | ||
| deleteRoleAssignment(scope: RoleAssignmentScope, name: string, options?: DeleteRoleAssignmentOptions): Promise<KeyVaultRoleAssignment>; | ||
| getRoleAssignment(scope: RoleAssignmentScope, name: string, options?: GetRoleAssignmentOptions): Promise<KeyVaultRoleAssignment>; | ||
| listRoleAssignments(scope: RoleAssignmentScope, options?: ListRoleAssignmentsOptions): PagedAsyncIterableIterator<KeyVaultRoleAssignment>; | ||
| listRoleDefinitions(scope: RoleAssignmentScope, options?: ListRoleDefinitionsOptions): PagedAsyncIterableIterator<KeyVaultRoleDefinition>; | ||
| createRoleAssignment(roleScope: RoleAssignmentScope, name: string, roleDefinitionId: string, principalId: string, options?: CreateRoleAssignmentOptions): Promise<KeyVaultRoleAssignment>; | ||
| deleteRoleAssignment(roleScope: RoleAssignmentScope, name: string, options?: DeleteRoleAssignmentOptions): Promise<KeyVaultRoleAssignment>; | ||
sadasant marked this conversation as resolved.
Show resolved
Hide resolved
|
||
| getRoleAssignment(roleScope: RoleAssignmentScope, name: string, options?: GetRoleAssignmentOptions): Promise<KeyVaultRoleAssignment>; | ||
| listRoleAssignments(roleScope: RoleAssignmentScope, options?: ListRoleAssignmentsOptions): PagedAsyncIterableIterator<KeyVaultRoleAssignment>; | ||
| listRoleDefinitions(roleScope: RoleAssignmentScope, options?: ListRoleDefinitionsOptions): PagedAsyncIterableIterator<KeyVaultRoleDefinition>; | ||
| readonly vaultUrl: string; | ||
| } | ||
|
|
||
| // @public | ||
| export interface KeyVaultPermission { | ||
sadasant marked this conversation as resolved.
Show resolved
Hide resolved
|
||
| actions?: string[]; | ||
| dataActions?: string[]; | ||
| notActions?: string[]; | ||
| notDataActions?: string[]; | ||
| } | ||
|
|
||
| // @public | ||
| export interface KeyVaultRoleAssignment { | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Just
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Before I do this change, let's argue about prefixes here: #10815 (comment)
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. @heaths I'm assuming KeyVaultRoleAssignment is favored after that conversation I mentioned ^ There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. python has |
||
| readonly id?: string; | ||
|
|
@@ -50,7 +58,7 @@ export interface KeyVaultRoleDefinition { | |
| description?: string; | ||
| readonly id?: string; | ||
| readonly name?: string; | ||
| permissions?: RoleDefinitionPermission[]; | ||
| permissions?: KeyVaultPermission[]; | ||
| roleName?: string; | ||
| roleType?: string; | ||
| readonly type?: string; | ||
sadasant marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
@@ -81,14 +89,6 @@ export interface RoleAssignmentPropertiesWithScope extends RoleAssignmentPropert | |
| // @public | ||
| export type RoleAssignmentScope = "/" | "/keys" | string; | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. this feels like a weird type, though I'm not sure what would be better
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. The string part is because it accepts UUIDs. I wonder if we could have some UUID validator as a type? That would be generally helpful in our clients. |
||
|
|
||
| // @public | ||
| export interface RoleDefinitionPermission { | ||
| actions?: string[]; | ||
| dataActions?: string[]; | ||
| notActions?: string[]; | ||
| notDataActions?: string[]; | ||
| } | ||
|
|
||
| // @public | ||
| export const SDK_VERSION: string; | ||
|
|
||
|
|
||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
in python we have it as
role_assignment_nameThere was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
same for every name parameter for role assignments
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
.Net is using
name. I don't mind, but I'd rather reach to an agreement with @heaths , @christothes