-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
KeyVault: replacing 'purgeDisabled' attribute with 'deletionRecoveryLevel' #3432
Conversation
…rated deletion recovery level (restoring lost commit) adding deletion recovery level to KV attributes updated tests and recordings
…rated deletion recovery level (restoring lost commit) adding deletion recovery level to KV attributes updated tests and recordings
<PackageReference Include="Newtonsoft.Json"> | ||
<Version>6.0.8</Version> | ||
</PackageReference> | ||
</ItemGroup> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Added twice?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yep, one was from the merge.. Fixed, thanks.
: base(enabled, notBefore, expires, created, updated) | ||
{ | ||
PurgeDisabled = purgeDisabled; | ||
RecoveryLevel = recoveryLevel; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is breaking change. We just published a stable nuget package. Please unlist that before publishing your changes.
@@ -4,7 +4,7 @@ | |||
<PackageId>Microsoft.Azure.KeyVault</PackageId> | |||
<Description>Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys. In addition, Azure Key Vault allows users to securely store secrets in a Key Vault; secrets are limited size octet objects and Azure Key Vault applies no specific semantics to these objects. A Key Vault may contain a mix of keys and secrets at the same time, and access control for the two types of object is independently controlled. Users, subject to appropriate authorization, may: 1) Manage cryptographic keys using Create, Import, Update, Delete and other operations 2) Manage secrets using Get, Set, Delete and other operations 3) Use cryptographic keys with Sign/Verify, WrapKey/UnwrapKey and Encrypt/Decrypt operations. Operations against Key Vaults are authenticated and authorized using Azure Active Directory. Key Vault now supports certificates, a complex type that makes use of existing key and secret infrastructure for certificate operations. KV certificates also support notification and auto-renewal as well as other management features.</Description> | |||
<AssemblyTitle>Microsoft Azure key vault</AssemblyTitle> | |||
<VersionPrefix>2.3.1</VersionPrefix> | |||
<VersionPrefix>2.3.2</VersionPrefix> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@dragav if you have a breaking change, you should bump up your major version
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@shahabhijeet as discussed offline, this change would have been breaking if we kept the previous SDK version (v2.3.1). Since you unlisted that package, that makes this version (2.3.2) the first release of the SDK in this version range, and so we're not breaking anybody. All other consumers of the KV SDK in the 2.3* line would have used 'prerelease' builds, which implies the possibility of changes.
Thanks for your consideration.
Description
This checklist is used to make sure that common guidelines for a pull request are followed.
General Guidelines
Testing Guidelines
SDK Generation Guidelines
*.csproj
andAssemblyInfo.cs
files have been updated with the new version of the SDK.