Skip to content

Commit 3b07475

Browse files
authored
{Keyvault} Migrate azure-mgmt-keyvault to typespec generated SDK (#32419)
1 parent 05644f3 commit 3b07475

File tree

12 files changed

+40402
-4493
lines changed

12 files changed

+40402
-4493
lines changed

src/azure-cli-core/azure/cli/core/util.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -644,7 +644,7 @@ def todict(obj, post_processor=None):
644644
"""
645645
from datetime import date, time, datetime, timedelta
646646
from enum import Enum
647-
from azure.core.serialization import attribute_list
647+
from azure.core.serialization import attribute_list, get_backcompat_attr_name
648648
if isinstance(obj, dict):
649649
result = {k: todict(v, post_processor) for (k, v) in obj.items()}
650650
return post_processor(obj, result) if post_processor else result
@@ -662,7 +662,7 @@ def todict(obj, post_processor=None):
662662
# azure-core provided new function `attribute_list` to list all attribute names
663663
# so that we don't need to use raw __dict__ directly
664664
if getattr(obj, "_is_model", False):
665-
result = {to_camel_case(attr): todict(getattr(obj, attr), post_processor)
665+
result = {to_camel_case(get_backcompat_attr_name(obj, attr)): todict(getattr(obj, attr), post_processor)
666666
for attr in attribute_list(obj) if hasattr(obj, attr)}
667667
return post_processor(obj, result) if post_processor else result
668668
if hasattr(obj, '_asdict'):

src/azure-cli-core/setup.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@
4545
DEPENDENCIES = [
4646
'argcomplete~=3.5.2',
4747
'azure-cli-telemetry==1.1.0.*',
48-
'azure-core~=1.35.0',
48+
'azure-core~=1.37.0',
4949
'azure-mgmt-core>=1.2.0,<2',
5050
'cryptography',
5151
# On Linux, the distribution (Ubuntu, Debian, etc) and version are logged in telemetry

src/azure-cli/azure/cli/command_modules/keyvault/custom.py

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -347,9 +347,9 @@ def recover_vault(cmd, client, vault_name, resource_group_name, location, no_wai
347347
tenant_id = profile.get_subscription(subscription=cmd.cli_ctx.data.get('subscription_id', None))[_TENANT_ID]
348348

349349
params = VaultCreateOrUpdateParameters(location=location,
350-
properties={'tenant_id': tenant_id,
350+
properties={'tenantId': tenant_id,
351351
'sku': Sku(name=SkuName.standard.value, family='A'),
352-
'create_mode': CreateMode.recover.value})
352+
'createMode': CreateMode.recover.value})
353353

354354
return sdk_no_wait(no_wait, client.begin_create_or_update,
355355
resource_group_name=resource_group_name,
@@ -623,7 +623,7 @@ def create_vault(cmd, client, # pylint: disable=too-many-locals, too-many-state
623623
if no_self_perms or enable_rbac_authorization:
624624
access_policies = []
625625
else:
626-
permissions = Permissions(keys=[KeyPermissions.all],
626+
permissions = Permissions(keys_property=[KeyPermissions.all],
627627
secrets=[SecretPermissions.all],
628628
certificates=[CertificatePermissions.all],
629629
storage=[StoragePermissions.all])
@@ -820,19 +820,19 @@ def set_policy(cmd, client, resource_group_name, vault_name,
820820
tenant_id=vault.properties.tenant_id,
821821
object_id=object_id,
822822
application_id=application_id,
823-
permissions=Permissions(keys=key_permissions,
823+
permissions=Permissions(keys_property=key_permissions,
824824
secrets=secret_permissions,
825825
certificates=certificate_permissions,
826826
storage=storage_permissions)))
827827
else:
828828
# Modify existing policy.
829829
# If key_permissions is not set, use prev. value (similarly with secret_permissions).
830-
keys = policy.permissions.keys if key_permissions is None else key_permissions
830+
keys = policy.permissions.keys_property if key_permissions is None else key_permissions
831831
secrets = policy.permissions.secrets if secret_permissions is None else secret_permissions
832832
certs = policy.permissions.certificates \
833833
if certificate_permissions is None else certificate_permissions
834834
storage = policy.permissions.storage if storage_permissions is None else storage_permissions
835-
policy.permissions = Permissions(keys=keys, secrets=secrets, certificates=certs, storage=storage)
835+
policy.permissions = Permissions(keys_property=keys, secrets=secrets, certificates=certs, storage=storage)
836836

837837
return sdk_no_wait(no_wait, client.begin_create_or_update,
838838
resource_group_name=resource_group_name,

src/azure-cli/azure/cli/command_modules/keyvault/tests/latest/recordings/test_hsm_private_endpoint_connection.yaml

Lines changed: 12973 additions & 418 deletions
Large diffs are not rendered by default.

src/azure-cli/azure/cli/command_modules/keyvault/tests/latest/recordings/test_keyvault_hsm_security_domain.yaml

Lines changed: 12938 additions & 1872 deletions
Large diffs are not rendered by default.

src/azure-cli/azure/cli/command_modules/keyvault/tests/latest/recordings/test_keyvault_private_endpoint_connection.yaml

Lines changed: 6515 additions & 262 deletions
Large diffs are not rendered by default.

src/azure-cli/azure/cli/command_modules/keyvault/tests/latest/recordings/test_keyvault_softdelete.yaml

Lines changed: 7957 additions & 1897 deletions
Large diffs are not rendered by default.

src/azure-cli/azure/cli/command_modules/servicefabric/custom.py

Lines changed: 3 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -1604,34 +1604,9 @@ def _create_keyvault(cmd,
16041604
if no_self_perms:
16051605
access_policies = []
16061606
else:
1607-
permissions = Permissions(keys=[KeyPermissions.get,
1608-
KeyPermissions.create,
1609-
KeyPermissions.delete,
1610-
KeyPermissions.list,
1611-
KeyPermissions.update,
1612-
KeyPermissions.import_enum,
1613-
KeyPermissions.backup,
1614-
KeyPermissions.restore],
1615-
secrets=[SecretPermissions.get,
1616-
SecretPermissions.list,
1617-
SecretPermissions.set,
1618-
SecretPermissions.delete,
1619-
SecretPermissions.backup,
1620-
SecretPermissions.restore,
1621-
SecretPermissions.recover],
1622-
certificates=[CertificatePermissions.get,
1623-
CertificatePermissions.list,
1624-
CertificatePermissions.delete,
1625-
CertificatePermissions.create,
1626-
CertificatePermissions.import_enum,
1627-
CertificatePermissions.update,
1628-
CertificatePermissions.managecontacts,
1629-
CertificatePermissions.getissuers,
1630-
CertificatePermissions.listissuers,
1631-
CertificatePermissions.setissuers,
1632-
CertificatePermissions.deleteissuers,
1633-
CertificatePermissions.manageissuers,
1634-
CertificatePermissions.recover])
1607+
permissions = Permissions(keys_property=[KeyPermissions.all],
1608+
secrets=[SecretPermissions.all],
1609+
certificates=[CertificatePermissions.all])
16351610

16361611
from azure.cli.command_modules.role.util import get_current_identity_object_id
16371612
object_id = get_current_identity_object_id(cli_ctx)

src/azure-cli/requirements.py3.Darwin.txt

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ azure-cli-core==2.81.0
88
azure-cli-telemetry==1.1.0
99
azure-cli==2.81.0
1010
azure-common==1.1.22
11-
azure-core==1.35.0
11+
azure-core==1.37.0
1212
azure-cosmos==3.2.0
1313
azure-data-tables==12.4.0
1414
azure-datalake-store==1.0.1
@@ -46,7 +46,7 @@ azure-mgmt-imagebuilder==1.3.0
4646
azure-mgmt-iotcentral==10.0.0b1
4747
azure-mgmt-iothub==5.0.0b1
4848
azure-mgmt-iothubprovisioningservices==1.1.0
49-
azure-mgmt-keyvault==12.1.0
49+
azure-mgmt-keyvault==13.0.0
5050
azure-mgmt-loganalytics==13.0.0b4
5151
azure-mgmt-managementgroups==1.0.0
5252
azure-mgmt-maps==2.0.0

src/azure-cli/requirements.py3.Linux.txt

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ azure-cli-core==2.81.0
88
azure-cli-telemetry==1.1.0
99
azure-cli==2.81.0
1010
azure-common==1.1.22
11-
azure-core==1.35.0
11+
azure-core==1.37.0
1212
azure-cosmos==3.2.0
1313
azure-data-tables==12.4.0
1414
azure-datalake-store==1.0.1
@@ -46,7 +46,7 @@ azure-mgmt-imagebuilder==1.3.0
4646
azure-mgmt-iotcentral==10.0.0b1
4747
azure-mgmt-iothub==5.0.0b1
4848
azure-mgmt-iothubprovisioningservices==1.1.0
49-
azure-mgmt-keyvault==12.1.0
49+
azure-mgmt-keyvault==13.0.0
5050
azure-mgmt-loganalytics==13.0.0b4
5151
azure-mgmt-managementgroups==1.0.0
5252
azure-mgmt-maps==2.0.0

0 commit comments

Comments
 (0)