Skip to content

Commit e6dbd47

Browse files
authored
Update prettier dev-dependency to v2.5.1 in KeyVault (Azure#19541)
* Upgrade prettier version * Format files * Format keyvault-secrets
1 parent c26f9c2 commit e6dbd47

File tree

153 files changed

+1304
-1361
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

153 files changed

+1304
-1361
lines changed

common/config/rush/pnpm-lock.yaml

Lines changed: 16 additions & 16 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

sdk/keyvault/keyvault-admin/package.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@
138138
"mocha": "^7.1.1",
139139
"mocha-junit-reporter": "^2.0.0",
140140
"nyc": "^15.0.0",
141-
"prettier": "^1.16.4",
141+
"prettier": "^2.5.1",
142142
"rimraf": "^3.0.0",
143143
"rollup": "^1.16.3",
144144
"sinon": "^9.0.2",

sdk/keyvault/keyvault-admin/samples-dev/accessControlHelloWorld.ts

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ import {
99
KeyVaultAccessControlClient,
1010
KeyVaultPermission,
1111
KnownKeyVaultDataAction,
12-
KnownKeyVaultRoleScope
12+
KnownKeyVaultRoleScope,
1313
} from "@azure/keyvault-admin";
1414
import { DefaultAzureCredential } from "@azure/identity";
1515
import * as uuid from "uuid";
@@ -38,14 +38,17 @@ export async function main(): Promise<void> {
3838
const roleDefinitionName = uuid.v4();
3939
const permissions: KeyVaultPermission[] = [
4040
{
41-
dataActions: [KnownKeyVaultDataAction.StartHsmBackup, KnownKeyVaultDataAction.StartHsmRestore]
42-
}
41+
dataActions: [
42+
KnownKeyVaultDataAction.StartHsmBackup,
43+
KnownKeyVaultDataAction.StartHsmRestore,
44+
],
45+
},
4346
];
4447
let roleDefinition = await client.setRoleDefinition(globalScope, {
4548
roleDefinitionName,
4649
roleName: "Backup Manager",
4750
permissions,
48-
description: "Allow backup actions"
51+
description: "Allow backup actions",
4952
});
5053
console.log(roleDefinition);
5154

sdk/keyvault/keyvault-admin/src/accessControlClient.ts

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ import {
1616
ListRoleAssignmentsPageSettings,
1717
ListRoleDefinitionsOptions,
1818
ListRoleDefinitionsPageSettings,
19-
SetRoleDefinitionOptions
19+
SetRoleDefinitionOptions,
2020
} from "./accessControlModels";
2121
import { LATEST_API_VERSION, authenticationScopes } from "./constants";
2222
import { KeyVaultClient } from "./generated/keyVaultClient";
@@ -81,9 +81,9 @@ export class KeyVaultAccessControlClient {
8181
additionalAllowedHeaderNames: [
8282
"x-ms-keyvault-region",
8383
"x-ms-keyvault-network-info",
84-
"x-ms-keyvault-service-version"
85-
]
86-
}
84+
"x-ms-keyvault-service-version",
85+
],
86+
},
8787
};
8888

8989
this.client = new KeyVaultClient(serviceVersion, clientOptions);
@@ -92,7 +92,7 @@ export class KeyVaultAccessControlClient {
9292
bearerTokenAuthenticationPolicy({
9393
credential,
9494
scopes: authenticationScopes,
95-
challengeCallbacks: createChallengeCallbacks()
95+
challengeCallbacks: createChallengeCallbacks(),
9696
})
9797
);
9898
}
@@ -129,8 +129,8 @@ export class KeyVaultAccessControlClient {
129129
{
130130
properties: {
131131
roleDefinitionId,
132-
principalId
133-
}
132+
principalId,
133+
},
134134
},
135135
updatedOptions
136136
);
@@ -282,7 +282,7 @@ export class KeyVaultAccessControlClient {
282282
return this;
283283
},
284284
byPage: (settings: ListRoleAssignmentsPageSettings = {}) =>
285-
this.listRoleAssignmentsPage(roleScope, settings, options)
285+
this.listRoleAssignmentsPage(roleScope, settings, options),
286286
};
287287
}
288288

@@ -370,7 +370,7 @@ export class KeyVaultAccessControlClient {
370370
return this;
371371
},
372372
byPage: (settings: ListRoleDefinitionsPageSettings = {}) =>
373-
this.listRoleDefinitionsPage(roleScope, settings, options)
373+
this.listRoleDefinitionsPage(roleScope, settings, options),
374374
};
375375
}
376376

@@ -435,8 +435,8 @@ export class KeyVaultAccessControlClient {
435435
permissions: options.permissions,
436436
assignableScopes: [roleScope],
437437
roleName: options.roleName,
438-
roleType: "CustomRole"
439-
}
438+
roleType: "CustomRole",
439+
},
440440
},
441441
updatedOptions
442442
);

sdk/keyvault/keyvault-admin/src/accessControlModels.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ import {
66
DataAction as KeyVaultDataAction,
77
RoleScope as KeyVaultRoleScope,
88
KnownDataAction as KnownKeyVaultDataAction,
9-
KnownRoleScope as KnownKeyVaultRoleScope
9+
KnownRoleScope as KnownKeyVaultRoleScope,
1010
} from "./generated/index";
1111
import { SUPPORTED_API_VERSIONS } from "./constants";
1212

sdk/keyvault/keyvault-admin/src/backupClient.ts

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ import {
88
KeyVaultBeginRestoreOptions,
99
KeyVaultBeginSelectiveKeyRestoreOptions,
1010
KeyVaultRestoreResult,
11-
KeyVaultSelectiveKeyRestoreResult
11+
KeyVaultSelectiveKeyRestoreResult,
1212
} from "./backupClientModels";
1313
import { LATEST_API_VERSION, authenticationScopes } from "./constants";
1414
import { KeyVaultAdminPollOperationState } from "./lro/keyVaultAdminPoller";
@@ -30,7 +30,7 @@ export {
3030
KeyVaultBackupOperationState,
3131
KeyVaultRestoreOperationState,
3232
KeyVaultSelectiveKeyRestoreOperationState,
33-
KeyVaultAdminPollOperationState
33+
KeyVaultAdminPollOperationState,
3434
};
3535

3636
/**
@@ -83,17 +83,17 @@ export class KeyVaultBackupClient {
8383
additionalAllowedHeaderNames: [
8484
"x-ms-keyvault-region",
8585
"x-ms-keyvault-network-info",
86-
"x-ms-keyvault-service-version"
87-
]
88-
}
86+
"x-ms-keyvault-service-version",
87+
],
88+
},
8989
};
9090

9191
this.client = new KeyVaultClient(apiVersion, clientOptions);
9292
this.client.pipeline.addPolicy(
9393
bearerTokenAuthenticationPolicy({
9494
credential,
9595
scopes: authenticationScopes,
96-
challengeCallbacks: createChallengeCallbacks()
96+
challengeCallbacks: createChallengeCallbacks(),
9797
})
9898
);
9999
}
@@ -141,7 +141,7 @@ export class KeyVaultBackupClient {
141141
vaultUrl: this.vaultUrl,
142142
intervalInMs: options.intervalInMs,
143143
resumeFrom: options.resumeFrom,
144-
requestOptions: options
144+
requestOptions: options,
145145
});
146146

147147
// This will initialize the poller's operation (the generation of the backup).
@@ -194,7 +194,7 @@ export class KeyVaultBackupClient {
194194
vaultUrl: this.vaultUrl,
195195
intervalInMs: options.intervalInMs,
196196
resumeFrom: options.resumeFrom,
197-
requestOptions: options
197+
requestOptions: options,
198198
});
199199

200200
// This will initialize the poller's operation (the generation of the backup).
@@ -252,7 +252,7 @@ export class KeyVaultBackupClient {
252252
vaultUrl: this.vaultUrl,
253253
intervalInMs: options.intervalInMs,
254254
resumeFrom: options.resumeFrom,
255-
requestOptions: options
255+
requestOptions: options,
256256
});
257257

258258
// This will initialize the poller's operation (the generation of the backup).

sdk/keyvault/keyvault-admin/src/challengeAuthenticationCallbacks.ts

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ import {
66
AuthorizeRequestOptions,
77
ChallengeCallbacks,
88
PipelineRequest,
9-
RequestBodyType
9+
RequestBodyType,
1010
} from "@azure/core-rest-pipeline";
1111
import { ParsedWWWAuthenticate, parseWWWAuthenticate } from "../../keyvault-common/src";
1212
import { GetTokenOptions } from "@azure/core-auth";
@@ -56,9 +56,9 @@ export function createChallengeCallbacks(): ChallengeCallbacks {
5656
return {
5757
abortSignal: request.abortSignal,
5858
requestOptions: {
59-
timeout: request.timeout
59+
timeout: request.timeout,
6060
},
61-
tracingOptions: request.tracingOptions
61+
tracingOptions: request.tracingOptions,
6262
};
6363
}
6464

@@ -70,7 +70,7 @@ export function createChallengeCallbacks(): ChallengeCallbacks {
7070
case "none":
7171
challengeState = {
7272
status: "started",
73-
originalBody: request.body
73+
originalBody: request.body,
7474
};
7575
request.body = null;
7676
break;
@@ -119,14 +119,14 @@ export function createChallengeCallbacks(): ChallengeCallbacks {
119119
options.request.headers.set("Authorization", `Bearer ${accessToken.token}`);
120120

121121
challengeState = {
122-
status: "complete"
122+
status: "complete",
123123
};
124124

125125
return true;
126126
}
127127

128128
return {
129129
authorizeRequest,
130-
authorizeRequestOnChallenge
130+
authorizeRequestOnChallenge,
131131
};
132132
}

0 commit comments

Comments
 (0)